• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.033 seconds

Analyzing Online Fake Business News Communication and the Influence on Stock Price: A Real Case in Taiwan

  • Wang, Chih-Chien;Chiang, Cheng-Yu
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.6
    • /
    • pp.1-12
    • /
    • 2019
  • On the Internet age, the news is generated and distributed not only by traditional news media, but also by a variety of online news media, news platforms, content websites/content farms, and social media. Since it is an easy task to create and distribute news, some of these news reports may contain fake or false facts. In the end, the cyberspace is full of fake or false messages. People may wonder if these fake news actually influence our decision making. In this paper, we discussed a real case of fake news. In this case, a Taiwanese company used some fake news, advertorial news, and news placement to manipulate or influence its stock price and trade volume. We collected all news for the case company during a period of four years and five months (from January 2013 to May 2017). We analyzed the relationship between published news and stock price. Based on the analysis results, we conclude that we should not ignore the influence of news placement and fake business news on the stock price.

Cereal Resources in National BioResource Project of Japan

  • Sato, Kazuhiro;Endo, Takashi R.;Kurata, Nori
    • Interdisciplinary Bio Central
    • /
    • v.2 no.4
    • /
    • pp.13.1-13.8
    • /
    • 2010
  • The National BioResource Project of Japan is a governmental project to promote domestic/international research activities using biological resources. The project has 27 biological resources including three cereal resources. The core center and sub-center which historically collected the cereal resources were selected for each cereal program. These resources are categorized into several different types in the project; germplasm, genetic stocks, genome resources and database information. Contents of rice resources are wild species, local varieties in East and Southwest Asia & wild relatives, MNU-induced chemical mutant lines, marker tester lines, chromosome substitution lines and other experimental lines. Contents of wheat resources are wild strains, cultivated strains, experimental lines, rye wild and cultivated strains; EST clones and full-length cDNA clones. Contents of barley resources are cultivar and experimental lines, core collection, EST/cDNA clones, BAC clones, their filters and superpool DNA. Each resource is accessible from the online database to see the contents and information about the resources. Links to the genome information and genomic tools are also important function of each database. The major contents and some examples are presented here.

Cross-layered Video Information Sharing Method and Selective Retransmission Technique for The Efficient Video Streaming Services (효율적인 영상 스트리밍 서비스를 위한 Cross-layer 영상 정보 공유 방법 및 선택적 재전송 기법)

  • Chung, Taewook;Chung, Chulho;Kim, Jaeseok
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.853-863
    • /
    • 2015
  • In this paper, we proposed cross-layered approach of video codec and communication system for the efficient video streaming service. Conventional video streaming is served by divided system which consist of video codec layer and communication layer. Its disintegration causes the limitation of the performance of video streaming service. With the cross-layered design, each layer could share the information and the service is able to enhance the performance. And we proposed the selective retransmission method in communication system based on the cross-layered system that reflect the information of encoded video data. Selective retransmission method which consider the characteristics of video data improves the performance of video streaming services. We verified the proposed method with raw format full HD test sequence with H.264/AVC codec and MATLAB simulation. The simulation results show that the proposed method improves about 10% PSNR performance.

Design and Implementation of Embedded Ethernet Module for Home Network (홈 네트워크를 위한 Embedded Ethernet Module 설계 및 구현)

  • Kim Pan-kyu;Hoan Tae-Moon;Lee Jong-hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1111-1116
    • /
    • 2005
  • The necessity of the home network have been enlarged gradually according to the distribution of ultra-high speed internet, the expansion of a digital information equipment and the change of a life pattern. In this paper, we proposed the embedded ethernet module that could be operate on eight bit system, but it could control home appliance with full ethernet speed. The embedded ethernet module consists of 8051 MCU and Hardware TCP/IP. In this module, we construct simple web server and port remote control program for I/O device control. We verified through internet that the developed embedded ethernet module could control and check home appliances anywhere and anytime. We expect the developed ethernet module can build up niche market at home network. And it will be helpful to activate home network market.

The development of Real-time textbooks video training solution (실시간 교재 영상 교육 솔루션 개발)

  • Im, Kwang-Hyuk;Lee, Moon-Sub;Jung, Hyun-Chul;Lee, ByoungKwon;Kim, SeokHun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.963-965
    • /
    • 2012
  • There are various educational aids which we can use in classroom. In classes, video presenters have been used for presenting full-text book to screen. In this study, we developed an educational solution to support real-time video capture of contents of text-book using video presenter. If teachers use this solution, they can teach using real-time captured video of text-book in anytime, anywhere.

  • PDF

Software Implementation of WAVE Security Algorithms (WAVE 보안 알고리즘의 소프트웨어 구현)

  • Kang, Jung-Ha;Ok, Sung-Jin;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1691-1699
    • /
    • 2014
  • IEEE developing WAVE specifications are able to support V2V and V2I wireless communications, and these functionalities can be used to enhance vehicle operational safety. To overcome any security weaknesses that are inherent in wireless communications, WAVE specification should support message encryption and authentication functions. In this study, we have implemented WAVE security algorithms in IEEE P1609.2 with openssl library and C language. We have verified the normal operation of implemented software, using the test vectors of related specifications, and measured their performance. Our software is platform independent, and can be used for the full implementation of WAVE specification.

MSCT: AN EFFICIENT DATA COLLECTION HEURISTIC FOR WIRELESS SENSOR NETWORKS WITH LIMITED SENSOR MEMORY CAPACITY

  • Karakaya, Murat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3396-3411
    • /
    • 2015
  • Sensors used in Wireless Sensor Networks (WSN) have mostly limited capacity which affects the performance of their applications. One of the data-gathering methods is to use mobile sinks to visit these sensors so that they can save their limited battery energies from forwarding data packages to static sinks. The main disadvantage of employing mobile sinks is the delay of data collection due to relative low speed of mobile sinks. Since sensors have very limited memory capacities, whenever a mobile sink is too late to visit a sensor, that sensor's memory would be full, which is called a 'memory overflow', and thus, needs to be purged, which causes loss of collected data. In this work, a method is proposed to generate mobile sink tours, such that the number of overflows and the amount of lost data are minimized. Moreover, the proposed method does not need either the sensor locations or sensor memory status in advance. Hence, the overhead stemmed from the information exchange of these requirements are avoided. The proposed method is compared with a previously published heuristic. The simulation experiment results show the success of the proposed method over the rival heuristic with respect to the considered metrics under various parameters.

A Study on the Preference of Hospital Names in Korea (우리나라 병원의 명칭 선호도에 관한 연구)

  • Lee, Kwang-Soo;Hong, Sang-Jin
    • The Korean Journal of Health Service Management
    • /
    • v.5 no.1
    • /
    • pp.61-75
    • /
    • 2011
  • This study purposed to analyze the preference of names in Korean hospitals. Names were analyzed in terms of hospital's characteristics such as hospital type, location, ownership. Also, multivariate regression analysis was applied to assess how the amount of information measured from their names was varied by the hospitals' internal characteristics. Yearbook of Korean Hospital Association in 2008 was used to collect the study data. The full name of hospitals was divided into meaningful words to investigate the preferred words. The amount of information in hospital names was measured based on the number of words extracted. The study results showed that hospitals preferred different words depending on their characteristics. The amount of information contained in hospital names tends to decrease between before and after year 2000. Korean hospitals increased the uses of Hangeul and foreign words for their names in recent years. These changes were considered as the responses of Korean hospitals to increase competitive advantages by establishing unique brand power.

Measurement-based AP Deployment Mechanism for Fingerprint-based Indoor Location Systems

  • Li, Dong;Yan, Yan;Zhang, Baoxian;Li, Cheng;Xu, Peng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1611-1629
    • /
    • 2016
  • Recently, deploying WiFi access points (APs) for facilitating indoor localization has attracted increasing attention. However, most existing mechanisms in this aspect are typically simulation based and further they did not consider how to jointly utilize pre-existing APs in target environment and newly deployed APs for achieving high localization performance. In this paper, we propose a measurement-based AP deployment mechanism (MAPD) for placing APs in target indoor environment for assisting fingerprint based indoor localization. In the mechanism design, MAPD takes full consideration of pre-existing APs to assist the selection of good candidate positions for deploying new APs. For this purpose, we first choose a number of candidate positions with low location accuracy on a radio map calibrated using the pre-existing APs and then use over-deployment and on-site measurement to determine the actual positions for AP deployment. MAPD uses minimal mean location error and progressive greedy search for actual AP position selection. Experimental results demonstrate that MAPD can largely reduce the localization error as compared with existing work.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.