• Title/Summary/Keyword: information systems theories

Search Result 240, Processing Time 0.026 seconds

A Selective Induction Framework for Improving Prediction in Financial Markets

  • Kim, Sung Kun
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.3
    • /
    • pp.1-18
    • /
    • 2015
  • Financial markets are characterized by large numbers of complex and interacting factors which are ill-understood and frequently difficult to measure. Mathematical models developed in finance are precise formulations of theories of how these factors interact to produce the market value of financial asset. While these models are quite good at predicting these market values, because these forces and their interactions are not precisely understood, the model value nevertheless deviates to some extent from the observable market value. In this paper we propose a framework for augmenting the predictive capabilities of mathematical model with a learning component which is primed with an initial set of historical data and then adjusts its behavior after the event of prediction.

주제 색인법의 분석적 고찰(1)

  • 윤구호
    • Journal of the Korean Society for information Management
    • /
    • v.5 no.1
    • /
    • pp.3-30
    • /
    • 1988
  • Various theories and techniques for the subject index have been developed since Charles Ammi Cutter first tried to formulate rules for the construction of subject headings in 1876. However, they do not seem to be appropriate to Korean language since the syntax and semantics of Korean language are different from those of English and other European languages. This study therefore reviews and analysis most notable subject indexing systems as a preliminaries to developing a new Korean subject indexing system.

  • PDF

NUMERICAL METHOD FOR A 2NTH-ORDER BOUNDARY VALUE PROBLEM

  • Xu, Chenmei;Jian, Shuai;Wang, Bo
    • Journal of the Korean Mathematical Society
    • /
    • v.50 no.4
    • /
    • pp.715-725
    • /
    • 2013
  • In this paper, a finite difference scheme for a two-point boundary value problem of 2nth-order ordinary differential equations is presented. The convergence and uniqueness of the solution for the scheme are proved by means of theories on matrix eigenvalues and norm. Numerical examples show that our method is very simple and effective, and that this method can be used effectively for other types of boundary value problems.

Unequal Error Protection: Survey and Standardization Prospect (비균등 오류정정기법의 연구 동향과 표준화 전망)

  • Park, Ki-Hyeon;Nam, Mi-Young;Park, Jin-Soo;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1054-1063
    • /
    • 2012
  • In this paper, we introduce basic theories, effects and applications of the unequal error protection (UEP) system that is expected to play a major role in the future multi-layered broadcast system. Also we show results of surveys on the various previous studies and standards about the UEP systems, and we give prospects of standardizations and future applications of UEP based on the surveys.

A Study of Classification Systems in the Internet Shopping Malls (인터넷 쇼핑몰의 상품 분류체계에 대한 연구)

  • 곽철완
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.201-215
    • /
    • 2001
  • The purpose of this study is to identify how to construct an internet shopping mall classification system used on the library classification theories. To aid in identifying classification system, this study focused on the Ranganathan’s classification canons; canons for characteristics, canons for terms. The study shows six priniciples for an internet shopping mall classification system construct: products’characteristics, inclusiveness, various access points, category sequence and term consistency, term currency and obviousness, no term duplication. For future research, product’s search patterns and relationship to interface are suggested.

  • PDF

Design and Implementation of User-oriented Face Detection System for Application Developers (응용개발자를 위한 사용자 중심 얼굴검출 시스템 설계 및 구현)

  • Jang, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.161-170
    • /
    • 2010
  • This paper provides a novel approach for a user oriented system for face detection system for application developers. Even though there are many open source or commercial libraries to solve the problem of face detection, they are still hard to use because they require specific knowledge on detail algorithmic techniques. The purpose of this paper is to come up with a high-level system for face detection with which users can develop systems easily and even without specific knowledge on face detection theories and algorithms. Important conditions are firstly considered to categorize the large problem space of face detection. The conditions identified here are then represented as expressions so that application developers can use them to express various problems. Once the conditions are expressed by developers, the interpreter proposed take the role to interpret the conditions, find and organize the optimal algorithms to solve the represented problem with corresponding conditions. A proof-of-concept is implemented and some example problems are tested and analyzed to show the ease of use and usability.

Multiscale Implicit Functions for Unified Data Representation

  • Yun, Seong-Min;Park, Sang-Hun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.12
    • /
    • pp.2374-2391
    • /
    • 2011
  • A variety of reconstruction methods has been developed to convert a set of scattered points generated from real models into explicit forms, such as polygonal meshes, parametric or implicit surfaces. In this paper, we present a method to construct multi-scale implicit surfaces from scattered points using multiscale kernels based on kernel and multi-resolution analysis theories. Our approach differs from other methods in that multi-scale reconstruction can be done without additional manipulation on input data, calculated functions support level of detail representation, and it can be naturally expanded for n-dimensional data. The method also works well with point-sets that are noisy or not uniformly distributed. We show features and performances of the proposed method via experimental results for various data sets.

투자 결정 시스템의 설계에 관한 연구

  • 정충영
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.5 no.2
    • /
    • pp.28-34
    • /
    • 1987
  • This paper, according to modern theories of investment decision, designed physical investment decision system. The design of this system, mainly on the basis of both the evaluation of investment proposal and the procurement of fund, consists of the designs of input/output system, the evaluation system of investment proposal, the calculating system of capital cost, and the investment system integrated all the above systems. This system premised the use of computer intended to transform the unreasonable methods of present investment decision making into more reasonable one.

A Novel Authenticated Group Key Distribution Scheme

  • Shi, Run-hua;Zhong, Hong;Zhang, Shun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.935-949
    • /
    • 2016
  • In this paper, we present a novel authenticated group key distribution scheme for large and dynamic multicast groups without employing traditional symmetric and asymmetric cryptographic operations. The security of our scheme is mainly based on the basic theories for solving linear equations. In our scheme, a large group is divided into many subgroups, where each subgroup is managed by a subgroup key manager (SGKM) and a group key generation center (GKGC) further manages all SGKMs. The group key is generated by the GKGC and then propagated to all group members through the SGKMs, such that only authorized group members can recover the group key but unauthorized users cannot. In addition, all authorized group members can verify the authenticity of group keys by a public one-way function. The analysis results show that our scheme is secure and efficient, and especially it is very appropriate for secure multicast communications in large and dynamic client-server networks.

A Survey on the Detection of SQL Injection Attacks and Their Countermeasures

  • Nagpal, Bharti;Chauhan, Naresh;Singh, Nanhay
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.689-702
    • /
    • 2017
  • The Structured Query Language (SQL) Injection continues to be one of greatest security risks in the world according to the Open Web Application Security Project's (OWASP) [1] Top 10 Security vulnerabilities 2013. The ease of exploitability and severe impact puts this attack at the top. As the countermeasures become more sophisticated, SOL Injection Attacks also continue to evolve, thus thwarting the attempt to eliminate this attack completely. The vulnerable data is a source of worry for government and financial institutions. In this paper, a detailed survey of different types of SQL Injection and proposed methods and theories are presented, along with various tools and their efficiency in intercepting and preventing SQL attacks.