• Title/Summary/Keyword: User Private Information

Search Result 363, Processing Time 0.022 seconds

Disaggregate Demand Forecasting and Estimation of the Optimal Price for VTIS (부가교통정보시스템(VTIS) 이용수요예측 및 적정이용료 산정에 관한 연구)

  • 정헌영;진재업;손태민
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.4
    • /
    • pp.27-38
    • /
    • 2002
  • VTIS(Value-added Traffic Information System), among the sub-systems of ATIS, is an Advanced Traffic System which innovates efficiency and safety. And this system, having marketability and publicness, is very important. Moreover, This system offers definite traffic information according to the demand of specified users. And it is expected to produce additional spread effects because of high participation rate of private sector. However, the VTIS service media are varied and there are varied optimal Prices and payment methods according to each medium. Because of that, there needs the study on these problems or optimal criteria. But because existing studies were devoted to estimate the optimal route, the study toward the optimal price which was considered part of user and service use demand do not exist. Accordingly, we surveyed under imaginary alternative pricing scenarios and forecasted the use demand of VTIS by using Binary Logit model. Also, for the users who answered that they would use VTIS service in survey, we classified their use's behaviors as four categories and estimated the use ratio to each category by using Ordered Probit model. Last, using sensitivity analysis for results form above, we derived the optimal price that is 2800won in monthly. 145won in payment per call. Then, VTIS service use rate is respectively 65%, 75%.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

A Knowledge Graph on Japanese "Comfort Women": Interlinking Fragmented Digital Archival Resources (일본군 '위안부' 지식그래프: 파편화된 디지털 기록의 연결)

  • Park, Haram;Kim, Haklae
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.3
    • /
    • pp.61-78
    • /
    • 2021
  • Records on Japanese "Comfort Women" have been individually managed by private sectors or institutions, and some are provided as digital archives on the Internet. However, records of digital archives differ in the composition and representation of metadata by individual institutions. Meanwhile, there is a lack of a consistent structure to describe the relationships between and among these records, leading to their fragmentation and disconnectedness. This paper proposes a knowledge model for interlinking the digital archival resources and builds a knowledge graph by integrating the records from distributed digital archives. It derives common elements by analyzing metadata from the diverse digital archives and expresses them in standard vocabularies to semantically describe multiple entities and relationships of the digital archival resources. In particular, the study includes the refinement of collected data to search and thread dispersed records and the enrichment of external data to provide significant contextual information of records. An evaluation of the knowledge graph is performed via a query measuring the (dis)connectivity between the distributed records. As a result, the knowledge graph is capable of interlinking and retrieving fragmented records, providing substantial contextual information on the records with external data enrichment, and searching accurately to match the user's intentions through semantic-based queries.

Job Preference Analysis and Job Matching System Development for the Middle Aged Class (중장년층 일자리 요구사항 분석 및 인력 고용 매칭 시스템 개발)

  • Kim, Seongchan;Jang, Jincheul;Kim, Seong Jung;Chin, Hyojin;Yi, Mun Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.247-264
    • /
    • 2016
  • With the rapid acceleration of low-birth rate and population aging, the employment of the neglected groups of people including the middle aged class is a crucial issue in South Korea. In particular, in the 2010s, the number of the middle aged who want to find a new job after retirement age is significantly increasing with the arrival of the retirement time of the baby boom generation (born 1955-1963). Despite the importance of matching jobs to this emerging middle aged class, private job portals as well as the Korean government do not provide any online job service tailored for them. A gigantic amount of job information is available online; however, the current recruiting systems do not meet the demand of the middle aged class as their primary targets are young workers. We are in dire need of a specially designed recruiting system for the middle aged. Meanwhile, when users are searching the desired occupations on the Worknet website, provided by the Korean Ministry of Employment and Labor, users are experiencing discomfort to search for similar jobs because Worknet is providing filtered search results on the basis of exact matches of a preferred job code. Besides, according to our Worknet data analysis, only about 24% of job seekers had landed on a job position consistent with their initial preferred job code while the rest had landed on a position different from their initial preference. To improve the situation, particularly for the middle aged class, we investigate a soft job matching technique by performing the following: 1) we review a user behavior logs of Worknet, which is a public job recruiting system set up by the Korean government and point out key system design implications for the middle aged. Specifically, we analyze the job postings that include preferential tags for the middle aged in order to disclose what types of jobs are in favor of the middle aged; 2) we develope a new occupation classification scheme for the middle aged, Korea Occupation Classification for the Middle-aged (KOCM), based on the similarity between jobs by reorganizing and modifying a general occupation classification scheme. When viewed from the perspective of job placement, an occupation classification scheme is a way to connect the enterprises and job seekers and a basic mechanism for job placement. The key features of KOCM include establishing the Simple Labor category, which is the most requested category by enterprises; and 3) we design MOMA (Middle-aged Occupation Matching Algorithm), which is a hybrid job matching algorithm comprising constraint-based reasoning and case-based reasoning. MOMA incorporates KOCM to expand query to search similar jobs in the database. MOMA utilizes cosine similarity between user requirement and job posting to rank a set of postings in terms of preferred job code, salary, distance, and job type. The developed system using MOMA demonstrates about 20 times of improvement over the hard matching performance. In implementing the algorithm for a web-based application of recruiting system for the middle aged, we also considered the usability issue of making the system easier to use, which is especially important for this particular class of users. That is, we wanted to improve the usability of the system during the job search process for the middle aged users by asking to enter only a few simple and core pieces of information such as preferred job (job code), salary, and (allowable) distance to the working place, enabling the middle aged to find a job suitable to their needs efficiently. The Web site implemented with MOMA should be able to contribute to improving job search of the middle aged class. We also expect the overall approach to be applicable to other groups of people for the improvement of job matching results.

Application and Evaluation of ITS Map Datum and Location Referencing System for ITS User Services (ITS서비스를 위한 Map Datum 및 위치참조체계 모델의 적용 및 평가)

  • 최기주;이광섭
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.2
    • /
    • pp.55-68
    • /
    • 1999
  • Many ITS services require map databases in digital form to meet desired needs. Due to the dynamic nature of ITS and the sheer diversity of applications, the design and development of spatial databases to meet those needs pose a major challenge to both the public and private sectors. This challenge is further complicated by the necessity to transfer locationally referenced information between different kinds of databases and spatial data handling systems so that ITS products will work seamlessly across the region and nation. The Purpose of this paper is to develop the framework-models commonly to reference locations in the various applications and systems-the ITS Map Datum and LRS(Location Referencing System). The ITS Map Datum consists of the around control points which are the prime intersections (nodes) of the nationwide road network In this study, the major points have been determined along wish link-node modeling procedure. LRS, defined as a system for determining the position (location) of an entity relative to other entities or to some external frame of reference, has also been set up using CSOM type method. The method has been implemented using ArcView GIS software over the Kangnam and Seocho districts in the city of Seoul, showing that the implemented LRS scheme can be used successfully elsewhere. With the proper advent of the K.ITS architecture and services, the procedure can be used to improve the data sharing and to inter operate among systems, enhancing the efficiency both in terms of money and time.

  • PDF

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

A Study of Perceived Value and Intention to Use for Car Sharing Service : Based on User Experiences Serviced by Seoul Car Sharing (차량공유 서비스에 대한 지각된 가치와 이용의향에 관한 연구 : 서울시 나눔카 서비스 이용자를 중심으로)

  • Park, Keon Chul;Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.109-118
    • /
    • 2019
  • The purpose of this study is to deliver both market-practical and civil-centric political implication for sharing economy by investigating the nature of consumer-adoption for car-sharing service. With the global interest and market proliferation of the sharing economy, various service models for sharing idle resources have also been released in Korea. Particularly, in case of car sharing service, public - private partnership projects are spreading rapidly in various local governments including Seoul, along with the growing demand for alternative transportation system centering on the urban area. This study conducted an empirical study on the process of accepting the car sharing service by analyzing the data collected from users of the car sharing service "Sharing Car(Nanum Car)" of Seoul Metropolitan Government. A survey was conducted on 281 users in their twenties who are in the age of main use among the experienced users of the "Sharing Car(NaNum)" residing in Seoul. The result of analysis on the relationship between these users' perceived value and intention to use the vehicle sharing service would provide implications for establishing consumer(citizen)-centeric policies as well as market implications.

Analysis the Appropriate Schedule for the Installment Payment Amount and Establishment of the Post sale System and Policy in the Apartment Construction (공동주택 건설사업에서 후분양의 제도 및 정책 수립을 위한 분담금 납부 적정시기 분석)

  • Yoon, Inhwan;Bae, Byungyun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.22 no.4
    • /
    • pp.59-65
    • /
    • 2021
  • Since the 2016 "Housing Act Partial Amendment" and the "2018 Housing Comprehensive Amendment Plan", interest in the pre sale system and post sale system of apartment houses has been on the rise. In order to compare the advantages and disadvantages of the pre sale system and the post sale system of apartment houses, and to establish the basis for the institutional policy of the post sale system, a questionnaire survey method was used for tenants of the apartment house from the public side, and issues of time and cost. The time series analysis method is intended to suggest an appropriate time for payment of contributions. Accordingly, through a review of existing theories and literature, the post sale system of public and private institutions was organized, and through a questionnaire survey, the path to securing pre sale money, product information of the model house, and the degree of awareness of the effect of the post sale system were investigated. For the post sale fund support and payment method, it is necessary to increase the commercial line for existing financiers from the user's point of view, and it is necessary to operate in consideration of the economic power of the pre sale market by region. Both 60% post sale and 80% post sale have a price range of up to KRW 10 million, and the total interest rate is 5.0%, and the annual interest rate is about 2.8% for 60% post sale, and about 2.1% for 80% post sale, which is lower than the current 3.1%. I need an interest rate. The research is a perception survey targeting a total of 5,213 households in a sample of after sale apartments in public institutions. As the actual values are analyzed using a time series on the effects of market supply and demand and market prices, there is a limit to applying them to prospective residents of private apartments. In addition, to respond to first time tenants, a questionnaire survey was conducted on five complexes that have moved in within the last five years.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.