• Title/Summary/Keyword: Platform Risks

Search Result 109, Processing Time 0.022 seconds

Exploring the Performance of Synthetic Minority Over-sampling Technique (SMOTE) to Predict Good Borrowers in P2P Lending (P2P 대부 우수 대출자 예측을 위한 합성 소수집단 오버샘플링 기법 성과에 관한 탐색적 연구)

  • Costello, Francis Joseph;Lee, Kun Chang
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.71-78
    • /
    • 2019
  • This study aims to identify good borrowers within the context of P2P lending. P2P lending is a growing platform that allows individuals to lend and borrow money from each other. Inherent in any loans is credit risk of borrowers and needs to be considered before any lending. Specifically in the context of P2P lending, traditional models fall short and thus this study aimed to rectify this as well as explore the problem of class imbalances seen within credit risk data sets. This study implemented an over-sampling technique known as Synthetic Minority Over-sampling Technique (SMOTE). To test our approach, we implemented five benchmarking classifiers such as support vector machines, logistic regression, k-nearest neighbor, random forest, and deep neural network. The data sample used was retrieved from the publicly available LendingClub dataset. The proposed SMOTE revealed significantly improved results in comparison with the benchmarking classifiers. These results should help actors engaged within P2P lending to make better informed decisions when selecting potential borrowers eliminating the higher risks present in P2P lending.

Effect of Personality Traits and Use Motivations of YouTube Users on Compulsive YouTube Usage (유튜브 이용자의 성격 특성과 이용 동기가 강박적 유튜브 사용에 미치는 영향)

  • Lee, Jong Man
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.512-520
    • /
    • 2019
  • This study is to investigate the compulsive use of the social media platform, YouTube. For this purpose, this study built a research model that considered how the personality trait perspective(agreeableness, conscientiousness, neuroticism, extraversion, openness) and the use motivation perspective(utilitarian, hedonic and social use motivations) work together to explain compulsive use of YouTube. The survey method was used for this paper, and data from a total of 165 were used for the analysis. And structural equation model was used to analyze the data. The results of this empirical study is summarized as followings. First, both agreeableness and conscientiousness have a negative effect on compulsive use of YouTube. Second, utilitarian use motivation has a negative effect on compulsive use of YouTube. The results of this study are meaningful in that it not only alerts YouTube users to the risks of compulsive YouTube use, but also helps them to develop self-management strategies.

Dynamic quantitative risk assessment of accidents induced by leakage on offshore platforms using DEMATEL-BN

  • Meng, Xiangkun;Chen, Guoming;Zhu, Gaogeng;Zhu, Yuan
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.11 no.1
    • /
    • pp.22-32
    • /
    • 2019
  • On offshore platforms, oil and gas leaks are apt to be the initial events of major accidents that may result in significant loss of life and property damage. To prevent accidents induced by leakage, it is vital to perform a case-specific and accurate risk assessment. This paper presents an integrated method of Ddynamic Qquantitative Rrisk Aassessment (DQRA)-using the Decision Making Trial and Evaluation Laboratory (DEMATEL)-Bayesian Network (BN)-for evaluation of the system vulnerabilities and prediction of the occurrence probabilities of accidents induced by leakage. In the method, three-level indicators are established to identify factors, events, and subsystems that may lead to leakage, fire, and explosion. The critical indicators that directly influence the evolution of risk are identified using DEMATEL. Then, a sequential model is developed to describe the escalation of initial events using an Event Tree (ET), which is converted into a BN to calculate the posterior probabilities of indicators. Using the newly introduced accident precursor data, the failure probabilities of safety barriers and basic factors, and the occurrence probabilities of different consequences can be updated using the BN. The proposed method overcomes the limitations of traditional methods that cannot effectively utilize the operational data of platforms. This work shows trends of accident risks over time and provides useful information for risk control of floating marine platforms.

Developing an XR based Hyper-realistic Counter-Terrorism, Education, Training, and Evaluation System (확장현실(XR) 기반 초실감 대테러 교육훈련체계 구축 방안 연구)

  • Shin, Kyuyong;Lee, Sehwan
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.65-74
    • /
    • 2020
  • Recently, with the rapid development of eXtended Reality(XR) technology, the development and use of education and training systems using XR technology is increasing significantly. In particular, in areas that involve great risks and high costs such as military training and counter-terrorism training, the use of XR based simulators is preferred because they can improve training performance, reduce training costs, and minimize the risk of safety issues that may occur in actual training, by creating a training environment similar to actual training. In this paper, we propose a plan to build and evaluate an XR based hyper-realistic counter-terrorism education, training, and evaluation system to improve the ROK police's ability to respond to terrorist situations using the 5G and AR based Integrated Command and Control Platform previously developed by the Korea Military Academy. The proposed system is designed to improve counter-terrorism capabilities with virtual training for individual and team units based on hyper-realistic content and training scenarios. Futhermore, it can also be used as a on-site command and control post in connection with a simulation training site and an actual operation site.

A Study on the Analysis Techniques for Big Data Computing (빅데이터 컴퓨팅을 위한 분석기법에 관한 연구)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.475-480
    • /
    • 2021
  • With the rapid development of mobile, cloud computing technology and social network services, we are in the flood of huge data and realize that these large-scale data contain very precious value and important information. Big data, however, have both latent useful value and critical risks, so, nowadays, a lot of researches and applications for big data has been executed actively in order to extract useful information from big data efficiently and make the most of the potential information effectively. At this moment, the data analysis technique that can extract precious information from big data efficiently is the most important step in big data computing process. In this study, we investigate various data analysis techniques that can extract the most useful information in big data computing process efficiently, compare pros and cons of those techniques, and propose proper data analysis method that can help us to find out the best solution of the big data analysis in the peculiar situation.

A Cross-Sectional Analysis of Breast Reconstruction with Fat Grafting Content on TikTok

  • Gupta, Rohun;John, Jithin;Gupta, Monik;Haq, Misha;Peshel, Emanuela;Boudiab, Elizabeth;Shaheen, Kenneth;Chaiyasate, Kongkrit
    • Archives of Plastic Surgery
    • /
    • v.49 no.5
    • /
    • pp.614-616
    • /
    • 2022
  • As of November 2021, TikTok has one billion monthly active users and is recognized as the most engaging social media platform. TikTok has seen a surge in users and content creators, ranging from athletes to medical professionals. In the past year, content creators have utilized the app to advocate for social reforms, education, and other uses that were not previously considered. Breast cancer is the most commonly diagnosed cancer in women, with an expected 281,550 new cases of invasive breast cancer in 2021. As more individuals with breast cancer choose to undergo resection, the demand for autologous fat grafting in breast reconstruction has increased due to the natural look and feel of breast tissue. The purpose of this article is to analyze content related to breast reconstruction with fat grafting found on TikTok and recommend methods to improve patient education, care, and outcomes. We searched TikTok on November 1, 2021, for videos using the phrase "breast reconstruction with fat grafting." The top 200 videos retrieved from the TikTok search algorithm were analyzed, and all commentaries, duplicates, and nonrelevant videos were removed. Video characteristics were collected, and two independent reviewers generated a DISCERN score A total of 131 videos were included in the study. They were found to have a combined 1,871,980 likes, 41,113 comments, and 58,662 shares. The videos had an average DISCERN score of 2.16. Content creators had an overall low DISCERN score in items involving the use of references, disclosure of risks for not obtaining treatment, and support for shared decision-making. When stratified, the DISCERN score was higher for videos created by physicians (DISCERN average 2.48) than for videos created by nonphysicians (DISCERN average 1.99; p < 0.001).

A Study on the Development of an Automatic Classification System for Life Safety Prevention Service Reporting Images through the Development of AI Learning Model and AI Model Serving Server (AI 학습모델 및 AI모델 서빙 서버 개발을 통한 생활안전 예방 서비스 신고 이미지 자동분류 시스템 개발에 대한 연구)

  • Young Sic Jeong;Yong-Woon Kim;Jeongil Yim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.432-438
    • /
    • 2023
  • Purpose: The purpose of this study is to enable users to conveniently report risks by automatically classifying risk categories in real time using AI for images reported in the life safety prevention service app. Method: Through a system consisting of a life safety prevention service platform, life safety prevention service app, AI model serving server and sftp server interconnected through the Internet, the reported life safety images are automatically classified in real time, and the AI model used at this time An AI learning algorithm for generation was also developed. Result: Images can be automatically classified by AI processing in real time, making it easier for reporters to report matters related to life safety.Conclusion: The AI image automatic classification system presented in this paper automatically classifies reported images in real time with a classification accuracy of over 90%, enabling reporters to easily report images related to life safety. It is necessary to develop faster and more accurate AI models and improve system processing capacity.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Study on the Strength Evaluation Method of Submersible Mooring Pulleys for Detachable Mooring Systems (탈착계류시스템 반잠수식 무어링 풀리의 구조강도평가법에 관한 연구)

  • Kangsu Lee;Byoungjae Park
    • Journal of Wind Energy
    • /
    • v.15 no.1
    • /
    • pp.91-102
    • /
    • 2024
  • Rapid progress is being made in foundational technology research and engineering for the construction of floating offshore wind farms. There is active development of technology for detachable mooring systems, which have strengths in addressing maintenance issues that arise in floating offshore wind farms and enhance their economic viability. Conventional detachable mooring systems use Kenter links inserted into the middle of mooring chains, which require excessive time for retrieval by Anchor Handling Tug Supply (AHTS) vessels during detachment operations. Moreover, these operations pose risks of link damage and accidents. Therefore, there is a demand for the development of a new concept of detachable mooring systems. The proposed detachable mooring system in this study simultaneously integrates a fairlead chain stoppers (FCS) and submersible mooring pulleys (SMP), which enables all operations to be conducted on the AHTS vessel without underwater tasks. This study detailed the design and safety evaluation of the SMP, a core component of the detachable mooring system, based on the minimum breaking load (MBL) of selected mooring lines according to the capacity of the floating platform. It referenced international codes (AISC Specification for Structural Steel Buildings D5, Pin-Connected Members) for design verification and performed finite element analysis to evaluate the strength of major components in installation and operation scenarios. Additionally, procedures and techniques for evaluating the structural strength of components under uncertain boundary conditions were proposed.

Development of Industrial Embedded System Platform (산업용 임베디드 시스템 플랫폼 개발)

  • Kim, Dae-Nam;Kim, Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.50-60
    • /
    • 2010
  • For the last half a century, the personal computer and software industries have been prosperous due to the incessant evolution of computer systems. In the 21st century, the embedded system market has greatly increased as the market shifted to the mobile gadget field. While a lot of multimedia gadgets such as mobile phone, navigation system, PMP, etc. are pouring into the market, most industrial control systems still rely on 8-bit micro-controllers and simple application software techniques. Unfortunately, the technological barrier which requires additional investment and higher quality manpower to overcome, and the business risks which come from the uncertainty of the market growth and the competitiveness of the resulting products have prevented the companies in the industry from taking advantage of such fancy technologies. However, high performance, low-power and low-cost hardware and software platforms will enable their high-technology products to be developed and recognized by potential clients in the future. This paper presents such a platform for industrial embedded systems. The platform was designed based on Telechips TCC8300 multimedia processor which embedded a variety of parallel hardware for the implementation of multimedia functions. And open-source Embedded Linux, TinyX and GTK+ are used for implementation of GUI to minimize technology costs. In order to estimate the expected performance and power consumption, the performance improvement and the power consumption due to each of enabled hardware sub-systems including YUV2RGB frame converter are measured. An analytic model was devised to check the feasibility of a new application and trade off its performance and power consumption. The validity of the model has been confirmed by implementing a real target system. The cost can be further mitigated by using the hardware parts which are being used for mass production products mostly in the cell-phone market.