• Title/Summary/Keyword: 스마트카드데이터

Search Result 113, Processing Time 0.025 seconds

Analysis of User Demand Characteristics of Currently-established Night Bus in Seoul by Using Smart Card Data : Case Study on Gangnam Station (스마트카드 데이터를 이용한 심야버스 이용수요 특성분석 : 강남역을 중심으로)

  • Kim, Min ju;Lee, Young ihn
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.101-116
    • /
    • 2017
  • This Study estimates the actual night traffic using the smart card data used by most of the public transportation users, and compares it with the current night bus routes by KT Telecom based on the night time call volume. In order to compare the current night bus and night trips evaluated by smart card data, we presented indicators related to the degree of matching, and estimated the volume of service currently provided. The unique approach of the study is that we chose subway station instead of bus stop for the unit of the study. Bus stops has their complexity in a way that stops with same name could belong to different administrative area depending on its direction. For this reason, we decided to use subway station and defined its adjacent administrative district as the scope of influence. Since night bus is the primary means of transportation during the late night, it is anticipated that they will be able to provide better service by calculating the actual traffic and selecting the routes.

Card Transaction Data-based Deep Tourism Recommendation Study (카드 데이터 기반 심층 관광 추천 연구)

  • Hong, Minsung;Kim, Taekyung;Chung, Namho
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.277-299
    • /
    • 2022
  • The massive card transaction data generated in the tourism industry has become an important resource that implies tourist consumption behaviors and patterns. Based on the transaction data, developing a smart service system becomes one of major goals in both tourism businesses and knowledge management system developer communities. However, the lack of rating scores, which is the basis of traditional recommendation techniques, makes it hard for system designers to evaluate a learning process. In addition, other auxiliary factors such as temporal, spatial, and demographic information are needed to increase the performance of a recommendation system; but, gathering those are not easy in the card transaction context. In this paper, we introduce CTDDTR, a novel approach using card transaction data to recommend tourism services. It consists of two main components: i) Temporal preference Embedding (TE) represents tourist groups and services into vectors through Doc2Vec. And ii) Deep tourism Recommendation (DR) integrates the vectors and the auxiliary factors from a tourism RDF (resource description framework) through MLP (multi-layer perceptron) to provide services to tourist groups. In addition, we adopt RFM analysis from the field of knowledge management to generate explicit feedback (i.e., rating scores) used in the DR part. To evaluate CTDDTR, the card transactions data that happened over eight years on Jeju island is used. Experimental results demonstrate that the proposed method is more positive in effectiveness and efficacies.

Wireless Internet Security using Smart Card in Public Key Infrastructure (PKI기반의 스마트카드를 이용한 무선 인터넷 보안)

  • Lee, Kyoung-Hyo;Go, Hyeo-Seon;Oh, Byeong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.857-860
    • /
    • 2002
  • 오늘날 인터넷 사용자의 급속한 증가와 데이터 중심의 무선 동신 기술의 빠른 성장으로, 중요한 정보를 비밀리에 전달하고자하는 보안성의 요구가 증가하고 있다. 무선인터넷은 데이터 공개성을 갖는 무선 매체를 사용한다는 점과 단말 혹은 사용자가 이동한다는 고유의 특성으로 인하여 제한된 CPU와 메모리 때문에 기존의 유선 PKI(Public Key Infrastructure)체계를 그대로 적용할 수 없는 기존 인터넷 보안 체계에 비해서 훨씬 복잡한 구조가 요구된다. [1] 본 논문에서는 이동하는 단말의 인증을 위한 효율적이고 유용한 식별자 적용기술인 스마트카드를 이용한 무선 인터넷 보안을 제공하기 위해 Mobile PKI 기반의 보안구조를 제안하여 보안을 강화하고자한다.

  • PDF

Lightweight User Authentication and Key Agreement Protocol in IPTV (경량화된 IPTV 사용자 인증 및 키 동의 프로토콜)

  • Kang, Yong-Goo;Oh, Hee-Kuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.667-668
    • /
    • 2009
  • IPTV 시스템에서 서비스 제공자는 제한수신시스템(CAS, Conditional Access System)을 통해 미디어 콘텐츠의 안전한 전송을 제공한다. Scramble Function의 Pseudo-random sequence 생성 초기화 단계에서 사용하는 CW(Control Word)를 허가된 사용자만 획득하게 함으로써 데이터를 보호한다. 적합한 사용자 측에서는 스마트카드를 통해 획득한 CW를 셋톱박스에 전송하고, 셋톱박스는 CW를 이용해 암호화된 데이터로부터 원본의 미디어 콘텐츠를 획득한다. 이 때, CW가 그대로 셋톱박스에게 전송되기 때문에 비인가된 사용자가 공격을 통해 CW를 획득할 수 있어서 암호화된 전송이 요구된다. 이본 논문에서는 스마트카드와 셋톱박스 사이의 암호화 통신을 위해 기존의 방법보다 경량화된 상호인증 및 키 동의 프로토콜을 제안한다.

Implementation of Dual-Mode Channel Card for SDR-based Smart Antenna System (SDR기반 스마트 안테나 시스템을 위한 듀얼 모드 채널 카드 구현)

  • Kim, Jong-Eun;Choi, Seung-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12A
    • /
    • pp.1172-1176
    • /
    • 2008
  • In this paper, we describe the implementation and performance of a dual-mode Software Define Radio (SDR) smart antenna base station system. SDR technology enables a communication system to be reconfigured through software downloads to the flexible hardware platform that is implemented using programmable devices such as Digital Signal Processors (DSPs), Field Programmable Gate Arrays (FPGAs), and microprocessors. The presented base station channel card comprises the physical layer (pHY) including the baseband modem as well as the beamforming module. This channel card is designed to support TDD High-Speed Downlink Packet Access (HSDPA) as well as Wireless Broadband Portable Internet (WiBro) utilizing the SDR technology. We first describe the operations and functions required in WiBro and TDD HSDPA. Then, we explain the channel card design procedure and hardware implementation. Finally, we evaluate WiBro and TDD HSDPA performance by simulation and actual channel-card-based processing. Our smart antenna base-station dual-mode channel card shows flexibility and tremendous performance gains in terms of communication capacity and cell coverage.

Discovery of Travel Patterns in Seoul Metropolitan Subway Using Big Data of Smart Card Transaction Systems (스마트카드 빅데이터를 이용한 서울시 지하철 이동패턴 분석)

  • Kim, Kwanho;Oh, Kyuhyup;Lee, Yeong Kyu;Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.211-222
    • /
    • 2013
  • Discovering zones which a1re sets of geographically adjacent regions are essential in sophisticated urban developments and people's movement improvements. While there are some studies that separately focus on movements between particular regions and zone discovery, they show limitations to understand people's movements from a wider viewpoint. Therefore, in this research, we propose a clustering based analysis method that aims at discovering movement patterns, which involves zones and their relations, based on a big data of smart card transaction systems. Moreover, the effectiveness of discovered movement patterns is quantitatively evaluated by using the proposed metrics. By using a real-world dataset obtained in Seoul metropolitan subway networks, we investigate and visualize hidden movement patterns in Seoul.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

Evaluation of Transit Transfer Pattern for the Mobility Handicapped Using Traffic Card Big Data: Focus on Transfer between Bus and Metro (교통카드데이터를 활용한 교통약자 대중교통 환승통행패턴 분석: 버스 지하철 간 환승을 중심으로)

  • Kwon, Min young;Kim, Young chan;Ku, Ji sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.2
    • /
    • pp.58-71
    • /
    • 2021
  • The number of elderly people worldwide is rapidly increasing and the mobility handicapped suffering from inconvenient public transportation service is also increasing. In Korea and abroad, various policies are being implemented to provide high-quality transportation services for the mobility handicapped, and budget support and investment related to mobility facilities are being expanded. The mobility handicapped spends more time for transit transfer than normal users and their satisfaction with transit service is also lower. There exist transfer inconvenience points of the mobility handicapped due to various factors such as long transfer distances, absence of transportation facilities like elevators, escalators, etc. The purpose of this study is to find transfer inconvenience points for convenient transit transfer of the mobility handicapped using Smart card Big data. This study process traffic card transaction data and construct transfer travel data by user groups using smart card big data and analysis of the transfer characteristics for each user group ; normal, children, elderly, etc. Finally, find transfer inconveniences points by comparing transfer patterns between normal users and the mobility handicapped. This study is significant in that it can find transfer inconvenience points for convenient transit transfer of the mobility handicapped using Smart card Big data. In addition, it can be applicated of Smart card Big data for developing public transportation polices in the future. It is expected that the result of this study be used to improve the accessibility of transit transportation for mobility handicapped.

The Design of Hybrid Cryptosystem for Smart Card (스마트카드용 Hybrid 암호시스템 설계)

  • Song, Je-Ho;Lee, Woo-Choun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2322-2326
    • /
    • 2011
  • General cryptosystem uses differently the data and key value for the increment of security level, processes the repetition of limited number and increases the periodic feature of LFSR similar infinite series. So, it cause the efficiency of the cryptosystem. In this thesis, proposed algorithm is composed of reformat, permutation, data cipher block and key scheduler which is applied the new function by mixed symmetric cryptography and asymmetric cryptography. We design the cryptosystem of smart card using the common Synopsys and simulate by ALTERA MAX+PLUS II at 40MHz. Consequently, we confirm the 52% increment of processing rate and the security level of 16 rounds.

Formal Analysis of Authentication System based on Password using Smart Card (스마트카드를 이용한 패스워드 기반 인증시스템 정형분석)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Jeong, Yeon-Oh;Han, Keun-Hee;Chai, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.304-310
    • /
    • 2009
  • Due to widely use of internet, a lot of users frequently access into remote server in distributed computing environment. However, transmitting the information using vulnerable channel without authentication security system can be exposed to replay attack, offline password attack, and impersonation attack. According to this possibility, there is research about authentication protocol to prevent these hostile attacks using smart card. In this paper, we analyze vulnerability of user authentication system based on password and propose modified user authentication system.