• Title/Summary/Keyword: card data

Search Result 725, Processing Time 0.025 seconds

The Development Trend of Transportation Information System through Transportation Card Data (교통카드자료를 활용한 교통정보시스템 발전 방향)

  • Kim, Se-Won;Sohn, Moo-Sung;Min, Jae-Hong;Oh, Seog-Mun
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1835-1847
    • /
    • 2011
  • After conducting demonstration of transportation card for bus from Godeok-dong to Sangil-dong in 1996, due to continuously support for public transportation, the transportation card utilization of metropolitan public transportation passengers is currently going beyond 90%. In the current situation, transportation information system is mainly focused on road operation and control, offer of real time information and research of transportation information system using transportation card data which is differentiated by previous transportation information system is needed to study. This paper compare and analyze transportation information system, which is being used to each country, based on foreign examples of activating use of transportation card then introduce figure of advanced transportation information system which provide decision making feature for improving policy and institution of public transportation based on transportation card data, scientific analysis of passenger information, information of demand forecasting, variation and so on for constructing new route.

  • PDF

SVM based Bankruptcy Prediction Model for Small & Micro Businesses Using Credit Card Sales Information (신용카드 매출정보를 이용한 SVM 기반 소상공인 부실예측모형)

  • Yoon, Jong-Sik;Kwon, Young-Sik;Roh, Tae-Hyup
    • IE interfaces
    • /
    • v.20 no.4
    • /
    • pp.448-457
    • /
    • 2007
  • The small & micro business has the characteristics of both consumer credit risk and business credit risk. In predicting the bankruptcy for small-micro businesses, the problem is that in most cases, the financial data for evaluating business credit risks of small & micro businesses are not available. To alleviate such problem, we propose a bankruptcy prediction mechanism using the credit card sales information available, because most small businesses are member store of some credit card issuers, which is the main purpose of this study. In order to perform this study, we derive some variables and analyze the relationship between good and bad signs. We employ the new statistical learning technique, support vector machines (SVM) as a classifier. We use grid search technique to find out better parameter for SVM. The experimental result shows that credit card sales information could be a good substitute for the financial data for evaluating business credit risk in predicting the bankruptcy for small-micro businesses. In addition, we also find out that SVM performs best, when compared with other classifiers such as neural networks, CART, C5.0 multivariate discriminant analysis (MDA), and logistic regression.

MDPREF and Perceptual Map via INDSCAL Method

  • Hwang, S.Y.;Hahm, J.H.
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.3
    • /
    • pp.501-510
    • /
    • 2003
  • Ordinary computer program in the context of MDS for providing separate graphs according to "individuals" is usually referred to as INDSCAL(individual difference scaling), which enables one to detect dissimilarities between "subjects". This article is concerned with applications of INDSCAL concept to MDPREF and perceptual map. Related algorithm is presented and is implemented through illustrative analysis of Korean credit card data.

  • PDF

A Side Channel Attack with Vibration Signal on Card Terminal (진동 신호를 이용한 카드 단말기 부채널 공격)

  • Jang, Soohee;Ha, Youngmok;Yoon, Jiwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1045-1053
    • /
    • 2014
  • In this paper, we assume that the information leakage through side-channel signal may occur from the card payment terminal and newly introduce a real application attack model. The attack model is a side channel attack based on vibration signals, which are detected by a small sensor attached on card terminal by attacker. This study is similar to some other studies regarding side channel attack. However, this paper is different in that it is based on the non-language model. Because the financial transaction information such as a card number, password, mobile phone number and etc cannot have a constant pattern. In addition, there was no study about card terminal. Therefore, this new study is meaningful. We collected vibration signals on card terminal with a small wireless sensor and analyzed signal data with statistical signal processing techniques using spectrum of frequency domain and principal component analysis and pattern recognition algorithms. Finally, we evaluated the performances by using real data from the sensor.

초고속 정보통신망에 접속되는 ATM Adapter Card (Mnet-155s, Mnet-155p)

  • 김한수;이승섭
    • The Magazine of the IEIE
    • /
    • v.22 no.12
    • /
    • pp.27-44
    • /
    • 1995
  • 초고속 통신망에 근간이 되는 ATM 통신망에 SUN W/S, PC 컴퓨터들을 접속시키는 ATM Adapter Card은 하드웨어, 시스템 소프트웨어 및 응용 소프트웨어로 구성된다. 하드웨어의 구조 및 시스템 소프트웨어의 구조, 성능에 따라서 ATM Adapter Card 위에서 수행되는 응용 소프트웨어의 성능을 결정할 것이다. ATM Adapter Card는 효율적으로 Native ATM 응용 소프트웨어를 지원할 뿐 아니라, 기존의 TCP/IP 응용 소프트웨어를 수용하는 IPoverATM, LAN Emulation 기능도 지원하여야 한다. 또한 PVC(Permanent Virtual Channel), SVC(Siganlling Virtual Channel)을 위하여 ATM Forum UNI 3.1에 준한 Signalling도 필요하다. 이러한 조건들을 만족시키기위하여, 현재 개발 완료된 SUN W/S SBus용 디바이스 드라이버는 DLPI(Data Link Provider Interface), STREAM 방식으로 구현하였으며, 현재 개발 중인 PC PCI용 ATM Adapter Card의 디바이스 드라이버는 NDIS 3.0 방식으로 구현 다양한 Transport Layer를 ATM망에 수용하도록 하였다. Signalling은 Daemon Process를 이용하여 구현하였다.

  • PDF

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

An Analysis of Convergence Relation on Economic Activity with Credit cards in Korea and China & A Development of the Algorithm on economic trend Estimation (한중 신용카드가 경제활동에 미치는 융합적 영향 및 경제추이 예측을 위한 알고리즘 개발 연구)

  • Baik, Ran;Ryu, Jae Hee
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • This study is to analyze korea credit card market and the China credit card market, and predict future economic activity by developing the Algorithm for future economic trend Estimation As a results, there is no significant correlation between personal income growth and the credit card usage amount, and significant correlation between the credit card per capita and the credit card usage amount, in korea. there is significant correlation between personal income growth and the credit card usage amount, and between the credit card per capita and the credit card usage amount in china. it could be predicted that the china credit card market would be increased and the rate of increase would be gradually increased over the next five years, under the condition without constraints in the external environment.

A Study on the Fault Analysis and Security Assessment for Smart Card Management System (스마트카드 관리 시스템(SCMS)의 결함분석과 보안성 평가에 관한 연구)

  • Jang, Soo-Mi;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.1
    • /
    • pp.52-59
    • /
    • 2014
  • These days, smart card management system(SCMS) have been broadly used for security conformability, efficiency of issuance management, key management and expert management in the smart card market. SCMS is composed of card management, issuance management, key management, application management, and issuers management systems. SCMS enables card issuers from banks, credit card companies, and telecommunications companies to provide these cards to card users. And then SCMS enables card users to download new programs to chips for use of these cards successively and provide related smart card data in safety and efficiency. In this paper, we propose a framework for security assessment and an efficient method for security improvement through fault analysis which is more effective.

An Empirical Study on the Detection of Phantom Transaction in Online Auction (온라인 경매에의 카드깡 탐지요인에 대한 실증적 연구)

  • Chae Myeong-Sin;Jo Hyeong-Jun;Lee Byeong-Chae
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.68-98
    • /
    • 2004
  • Although the internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders because the chance of detection and punishment are decreased. One of fraud is phantom transaction which is a colluding transaction by the buyer and seller to commit illegal discounting of credit card. They pretend to fulfill the transaction paid by credit card, without actual selling products, and the seller receives cash from credit card corporations. Then seller lends it out buyer with quite high interest rate whose credit score is so bad that he cannot borrow money from anywhere. The purpose of this study is to empirically investigate the factors to detect of the phantom transaction in online auction. Based up on the studies that explored behaviors of buyers and sellers in online auction, bidding numbers, bid increments, sellers' credit, auction length, and starting bids were suggested as independent variables. We developed an Internet-based data collection software agent and collect data on transactions of notebook computers each of which winning bid was over 1,000,000 won. Data analysis with logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transaction.

  • PDF

An Empirical Study on the Detection of Phantom Transaction in Online Auction (온라인 경매에서의 신용카드 허위거래 탐지 요인에 대한 실증 연구)

  • Chae Myungsin;Cho Hyungjun;Lee Byungtae
    • Korean Management Science Review
    • /
    • v.21 no.2
    • /
    • pp.273-289
    • /
    • 2004
  • Although the Internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders, because the chance of detection and punishment is decreased. One of these frauds is the phantom transaction, which is a colluding transaction by the buyer and seller to commit the illegal discounting of a credit card. They pretend to fulfill the transaction paid by credit card, without actually selling products, and the seller receives cash from the credit card corporations. Then the seller lends it out with quite a high interest rate to the buyer, whose credit rating is so poor that he cannot borrow money from anywhere else. The purpose of this study is to empirically investigate the factors necessary to detect phantom transactions in an online auction. Based upon studies that have explored the behaviors of buyers and sellers in online auctions, the following have been suggested as independent variables: bidding numbers, bid increments, sellers' credit, auction lengths, and starting bids. In this study. we developed Internet-based data collection software and collected data on transactions of notebook computers, each of which had a winning bid of over W one million. Data analysis with a logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transactions.