• Title/Summary/Keyword: credit problems

검색결과 276건 처리시간 0.028초

Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks

  • Widanapathirana, Chathuranga H.;Sekercioglu, Y. Ahmet;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권11호
    • /
    • pp.1909-1928
    • /
    • 2011
  • Node cooperation during packet forwarding operations is critically important for fair resource utilization in Community Wireless Mesh Networks (CoWMNs). In a CoWMN, node cooperation is achieved by using fairness protocols specifically designed to detect and isolate malicious nodes, discourage unfair behavior, and encourage node participation in forwarding packets. In general, these protocols can be split into two groups: Incentive-based ones, which are managed centrally, and use credit allocation schemes. In contrast, reputation-based protocols that are decentralized, and rely on information exchange among neighboring nodes. Centrally managed protocols inevitably suffer from scalability problems. The decentralized, reputation-based protocols lacks in detection capability, suffer from false detections and error propagation compared to the centralized, incentive-based protocols. In this study, we present a new fairness protocol management scheme, called Hybrid FPMS that captures the superior detection capability of incentive-based fairness protocols without the scalability problems inherently expected from a centralized management scheme as a network's size and density grows. Simulation results show that Hybrid FPMS is more efficient than the current centralized approach and significantly reduces the network delays and overhead.

A Study on the Improvement of the Malware Evidence Collection Module Based On Windows (윈도우 기반 악성코드 증거 수집 모듈 개선에 관한 연구)

  • Heo, Geon-Il;Park, Chan-Uk;Park, Won-Hyung;Kuk, Kwang-Ho
    • Convergence Security Journal
    • /
    • 제10권3호
    • /
    • pp.61-68
    • /
    • 2010
  • Recently a malware is increasing for leaking personal data, credit information, financial information, etc. The secondary damage is also rapidly increasing such as the illegal use of stolen name, financial fraud, etc. But when a system is infected by a malware of leaking information, the existing malware evidence collection tools do not provide evidences conveniently or sometimes cannot provide necessary evidences. So security officials have much difficulty in responding to malwares. This paper analyzes the current status and problems of the existing malware evidence collection tools and suggests new ways to improve those problems.

The implementation of Biometric System using RF-ID (RF(RF-ID)을 이용한 Biometric System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.626-629
    • /
    • 2003
  • In this paper, a system that implementation of Biometric System Using RF-ID. We organize a certification system which the security is strengthened, the information is flowed out and the presentation will do the possibility not to be abused. The loss of the credit card and problems which there is many of forgery back are happening. To solve such problems, We organized the system to use after we stored a fingerprint data at RF Card and going through certification necessary formalities. Various research to be related uses this system and is predicted. The development to common use goods will be possible through a certification procedure.

  • PDF

A Study on the Countermeasure Technology for Fin-Tech Optimized Financial Security (금융 보안에 최적화된 Fin-Tech 대응기술 연구)

  • Kim, Seokhoon;Kwak, Ha-Min
    • Journal of Convergence Society for SMB
    • /
    • 제5권4호
    • /
    • pp.25-30
    • /
    • 2015
  • Recently, interest in Fin-Tech, a compound word of finance and technology, has been increased. However, Fin-Tech that is a mixture of finance and IT is exposed in terms of security. In this paper, we propose a method to solve the security-related problem that occurs in the financial sector where the Fin-Tech is used. Proposed method found out different problems of services which are provided by companies through a variety of financial sectors and described a method to facilitate the security service. In particular, proposed method presents a service plan to secure safety and to minimize the damage. Also, proposed method set an objective to stabilize financial services based on analyzed result after analyzing the problems of existing FinTech security services.

  • PDF

New Direction of Pilot Rural Development -With Respect to Rural Settlement Zone Development Project- (새로운 시범(示範) 농촌(農村) 건설(建設) 방향(方向) - 농어촌정주생활권개발사업(農漁村定住生活圈開發事業)을 중심으로 -)

  • Lim, Jae Hwan
    • Korean Journal of Agricultural Science
    • /
    • 제22권2호
    • /
    • pp.209-222
    • /
    • 1995
  • To mitigate the development gap between urban and rural area, the government has implemented project planning as the Rural Integrated Development in each Gun level since 1986. On account of shortage of the development fund, the government had changed the Gun level development into Myeon level development so called the Rural Central Settlement Zone Development. The government had started nine pilot projects throughout Korea from 1990. This study is aimed at identifing problems that found in the course of implementation of the projects and recommending the new direction of the successful implementation of the projects in the future. The problems and directions found in the cource of project implementation were as follows: 1. Project implementation by investment priority considering economic and financial rate of return should be made. 2. Objective project planning should be made. 3. Equal allocation of the limited investment fund by group interest and egoism should be prohibited. 4. Enforcement of special man power should be taken into account. 5. Unification of the diversified existing terms and conditions of loans for house construction and improvement. 6. Road development oriented budget allocation should be improved. 7. Sufficient development fund should be procured considering the present rate of sufficiency of the project cost as 36%. 8. Sufficient supply of the credit loans for improvement of living environment of the farmers should be realized. 9. Rational implementation planning in connection with farm household income source development should be made.

  • PDF

Searching a global optimum by stochastic perturbation in error back-propagation algorithm (오류 역전파 학습에서 확률적 가중치 교란에 의한 전역적 최적해의 탐색)

  • 김삼근;민창우;김명원
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • 제35C권3호
    • /
    • pp.79-89
    • /
    • 1998
  • The Error Back-Propagation(EBP) algorithm is widely applied to train a multi-layer perceptron, which is a neural network model frequently used to solve complex problems such as pattern recognition, adaptive control, and global optimization. However, the EBP is basically a gradient descent method, which may get stuck in a local minimum, leading to failure in finding the globally optimal solution. Moreover, a multi-layer perceptron suffers from locking a systematic determination of the network structure appropriate for a given problem. It is usually the case to determine the number of hidden nodes by trial and error. In this paper, we propose a new algorithm to efficiently train a multi-layer perceptron. OUr algorithm uses stochastic perturbation in the weight space to effectively escape from local minima in multi-layer perceptron learning. Stochastic perturbation probabilistically re-initializes weights associated with hidden nodes to escape a local minimum if the probabilistically re-initializes weights associated with hidden nodes to escape a local minimum if the EGP learning gets stuck to it. Addition of new hidden nodes also can be viewed asa special case of stochastic perturbation. Using stochastic perturbation we can solve the local minima problem and the network structure design in a unified way. The results of our experiments with several benchmark test problems including theparity problem, the two-spirals problem, andthe credit-screening data show that our algorithm is very efficient.

  • PDF

A Study on the Problems and Its Improvement Plans in Operation of Korean Trade Finance System (무역금융제도의 운용상 문제점과 그 개선방안에 관한 연구)

  • Chae, Jing-Ik
    • Korea Trade Review
    • /
    • 제44권6호
    • /
    • pp.39-54
    • /
    • 2019
  • Trade finance promotes export performance, and every small- and medium-sized export business has the right to use policy finance. The credit line is also stipulated by relevant laws and regulations. However, trade finance has repeatedly been misused, so these matters can lead to substantial financial loss and damage to the related financial institutions. The lack of expertise of K-SURE and the backwardness of banks represent even bigger problems in the follow-up management. The existing trade finance system should be improved in the following ways from the institutional and legal perspectives. Firstly, follow-up management of beneficiary companies should be reinforced and systematized through examining business tendencies, financial status, and other important factors. There is also a need for advancement of following up management. An effective and streamlined financing system must be established by abolishing the Korea Trade Insurance Corporation. This study presents improvements and their implications by looking into the main issues under the current trade finance system. This study is based on documentary research and practical cases.

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제25권6호
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

A Reinforcement Loaming Method using TD-Error in Ant Colony System (개미 집단 시스템에서 TD-오류를 이용한 강화학습 기법)

  • Lee, Seung-Gwan;Chung, Tae-Choong
    • The KIPS Transactions:PartB
    • /
    • 제11B권1호
    • /
    • pp.77-82
    • /
    • 2004
  • Reinforcement learning takes reward about selecting action when agent chooses some action and did state transition in Present state. this can be the important subject in reinforcement learning as temporal-credit assignment problems. In this paper, by new meta heuristic method to solve hard combinational optimization problem, examine Ant-Q learning method that is proposed to solve Traveling Salesman Problem (TSP) to approach that is based for population that use positive feedback as well as greedy search. And, suggest Ant-TD reinforcement learning method that apply state transition through diversification strategy to this method and TD-error. We can show through experiments that the reinforcement learning method proposed in this Paper can find out an optimal solution faster than other reinforcement learning method like ACS and Ant-Q learning.

A Study of Response and Plan to Decrease Damage of ISP Secure Payment (ISP 안전결제 서비스 피해를 최소화하기 ISP 대응방안 연구)

  • Kim, Byung-Man;Ma, Sangjun
    • Journal of Convergence Society for SMB
    • /
    • 제5권2호
    • /
    • pp.33-38
    • /
    • 2015
  • The damage to the security is increasing as public key-based ISP secure payment service is used in online banking payment system. Security technology aspect to ISP secure payment security has no special problems. But, security damage that occurs due to the simplicity of the payment system is a problem. In this paper, we propose response and plan for ISP secure payment service to minimize the damage that occurs due to the simplicity of a security settlement system. Proposed scheme is applicable to various billing systems such as secure payments, online payment, mobile payment, credit card. Proposed scheme is characterized in that can stably support the capabilities of the new billing system. Also, proposed scheme is to analyze the various security threats arising from the payment of the financial services and to describe response and plan technology.

  • PDF