• Title/Summary/Keyword: internet finance

Search Result 187, Processing Time 0.024 seconds

Clustering Algorithm for Time Series with Similar Shapes

  • Ahn, Jungyu;Lee, Ju-Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3112-3127
    • /
    • 2018
  • Since time series clustering is performed without prior information, it is used for exploratory data analysis. In particular, clusters of time series with similar shapes can be used in various fields, such as business, medicine, finance, and communications. However, existing time series clustering algorithms have a problem in that time series with different shapes are included in the clusters. The reason for such a problem is that the existing algorithms do not consider the limitations on the size of the generated clusters, and use a dimension reduction method in which the information loss is large. In this paper, we propose a method to alleviate the disadvantages of existing methods and to find a better quality of cluster containing similarly shaped time series. In the data preprocessing step, we normalize the time series using z-transformation. Then, we use piecewise aggregate approximation (PAA) to reduce the dimension of the time series. In the clustering step, we use density-based spatial clustering of applications with noise (DBSCAN) to create a precluster. We then use a modified K-means algorithm to refine the preclusters containing differently shaped time series into subclusters containing only similarly shaped time series. In our experiments, our method showed better results than the existing method.

Crowd Activity Classification Using Category Constrained Correlated Topic Model

  • Huang, Xianping;Wang, Wanliang;Shen, Guojiang;Feng, Xiaoqing;Kong, Xiangjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5530-5546
    • /
    • 2016
  • Automatic analysis and understanding of human activities is a challenging task in computer vision, especially for the surveillance scenarios which typically contains crowds, complex motions and occlusions. To address these issues, a Bag-of-words representation of videos is developed by leveraging information including crowd positions, motion directions and velocities. We infer the crowd activity in a motion field using Category Constrained Correlated Topic Model (CC-CTM) with latent topics. We represent each video by a mixture of learned motion patterns, and predict the associated activity by training a SVM classifier. The experiment dataset we constructed are from Crowd_PETS09 bench dataset and UCF_Crowds dataset, including 2000 documents. Experimental results demonstrate that accuracy reaches 90%, and the proposed approach outperforms the state-of-the-arts by a large margin.

High-Capacity and Robust Watermarking Scheme for Small-Scale Vector Data

  • Tong, Deyu;Zhu, Changqing;Ren, Na;Shi, Wenzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6190-6213
    • /
    • 2019
  • For small-scale vector data, restrictions on watermark scheme capacity and robustness limit the use of copyright protection. A watermarking scheme based on robust geometric features and capacity maximization strategy that simultaneously improves capacity and robustness is presented in this paper. The distance ratio and angle of adjacent vertices are chosen as the watermark domain due to their resistance to vertex and geometric attacks. Regarding watermark embedding and extraction, a capacity-improved strategy based on quantization index modulation, which divides more intervals to carry sufficient watermark bits, is proposed. By considering the error tolerance of the vector map and the numerical accuracy, the optimization of the capacity-improved strategy is studied to maximize the embedded watermark bits for each vertex. The experimental results demonstrated that the map distortion caused by watermarks is small and much lower than the map tolerance. Additionally, the proposed scheme can embed a copyright image of 1024 bits into vector data of 150 vertices, which reaches capacity at approximately 14 bits/vertex, and shows prominent robustness against vertex and geometric attacks for small-scale vector data.

A Noisy Videos Background Subtraction Algorithm Based on Dictionary Learning

  • Xiao, Huaxin;Liu, Yu;Tan, Shuren;Duan, Jiang;Zhang, Maojun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1946-1963
    • /
    • 2014
  • Most background subtraction methods focus on dynamic and complex scenes without considering robustness against noise. This paper proposes a background subtraction algorithm based on dictionary learning and sparse coding for handling low light conditions. The proposed method formulates background modeling as the linear and sparse combination of atoms in the dictionary. The background subtraction is considered as the difference between sparse representations of the current frame and the background model. Assuming that the projection of the noise over the dictionary is irregular and random guarantees the adaptability of the approach in large noisy scenes. Experimental results divided in simulated large noise and realistic low light conditions show the promising robustness of the proposed approach compared with other competing methods.

A Study on Improving Cyber Liability Insurance for Electronic Financial Incident in Easy Payment System (간편결제 서비스에서 전자금융사고 시 국내 사이버 배상책임보험의 한계 및 개선방안에 대한 연구)

  • Lee, Han-Jun;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2016
  • A convergence of finance and information technology brought a remarkable development in Fin-Tech industry. On the other hand, currently existing laws seemed inappropriate to address the liability of financial institutions, Fin-tech enterprises and consumers in case of financial accidents due to its ambiguity. The minimum insurance obligation by financial institutions specified under the Electronic Financial Transaction Act 2006 is not keeping with current reality, considering transaction volume, frequency of incidents, and security investments. This paper aims to lay stress on the need of cyber liability insurance by understanding the domestic financial incidents and management, and the limit of existing insurance policy.

E-SERVQUAL and Its Impact on the Performance of Islamic Banks in Malaysia from the Customer's Perspective

  • Baber, Hasnan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.1
    • /
    • pp.169-175
    • /
    • 2019
  • Service quality has been a point of discussion from the decades as it is important for customer satisfaction, loyalty and retention. Various models have been proposed to measure the quality in the service sector. Models are modified in accordance with context and geography to assess the quality of service better. This study aims to investigate the impact of the modified e-SERVQUAL model on the customer perception about the existing relation and potential scope of doing business with a bank which in-turn will decide the performance of the bank. Statistical data was analyzed through various tests like reliability analysis, correlation and regression analysis using SPSS 25.0. The primary data of e-SQ and performance was gathered from 721 internet banking users using 32 item questionnaire, representing 72% response rates, of four selected Islamic banks of Malaysia. E-SERQUAL was modified by adding Shariah Compliance information about banks and products for Islamic banking customers. The finding specified that efficient & reliable services, fulfillment, security/trust, and Shariah compliance information have a significant association with the performance of Islamic banks. The research is original and its implications will be helpful for Islamic banks across the world to enhance the online experience of customers, which will help them to retain the customers in the rapid changing virtual environment.

Dual-Encoded Features from Both Spatial and Curvelet Domains for Image Smoke Recognition

  • Yuan, Feiniu;Tang, Tiantian;Xia, Xue;Shi, Jinting;Li, Shuying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2078-2093
    • /
    • 2019
  • Visual smoke recognition is a challenging task due to large variations in shape, texture and color of smoke. To improve performance, we propose a novel smoke recognition method by combining dual-encoded features that are extracted from both spatial and Curvelet domains. A Curvelet transform is used to filter an image to generate fifty sub-images of Curvelet coefficients. Then we extract Local Binary Pattern (LBP) maps from these coefficient maps and aggregate histograms of these LBP maps to produce a histogram map. Afterwards, we encode the histogram map again to generate Dual-encoded Local Binary Patterns (Dual-LBP). Histograms of Dual-LBPs from Curvelet domain and Completed Local Binary Patterns (CLBP) from spatial domain are concatenated to form the feature for smoke recognition. Finally, we adopt Gaussian Kernel Optimization (GKO) algorithm to search the optimal kernel parameters of Support Vector Machine (SVM) for further improvement of classification accuracy. Experimental results demonstrate that our method can extract effective and reasonable features of smoke images, and achieve good classification accuracy.

A Study on the Competency Assessment for Smart Phone Based Simple Payment (스마트폰 기반 간편결제 서비스의 확산 가능성 평가 요인에 관한 연구)

  • Jung, Hoon;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.111-117
    • /
    • 2019
  • We categorize the model of simple payment into Magnetic Secure Transmission, Near Filed Communication, and App Card based on the Focus Group Interview. We also define the key drivers for the diffusion of simple payment services based on the literature review with the experts. Through Analytic Hierarchy Process our finding suggests that the degree of acceptance at the stores is the most critical factor which decides the diffusion of simple payment service model. Security is also the important driver but due to the fact that service providers should follow the information security rule and supervisory guidance, it actually did not make a big difference in terms of assessing competence of each model.

An automatic detection method for lung nodules based on multi-scale enhancement filters and 3D shape features

  • Hao, Rui;Qiang, Yan;Liao, Xiaolei;Yan, Xiaofei;Ji, Guohua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.347-370
    • /
    • 2019
  • In the computer-aided detection (CAD) system of pulmonary nodules, a high false positive rate is common because the density and the computed tomography (CT) values of the vessel and the nodule in the CT images are similar, which affects the detection accuracy of pulmonary nodules. In this paper, a method of automatic detection of pulmonary nodules based on multi-scale enhancement filters and 3D shape features is proposed. The method uses an iterative threshold and a region growing algorithm to segment lung parenchyma. Two types of multi-scale enhancement filters are constructed to enhance the images of nodules and blood vessels in 3D lung images, and most of the blood vessel images in the nodular images are removed to obtain a suspected nodule image. An 18 neighborhood region growing algorithm is then used to extract the lung nodules. A new pulmonary nodules feature descriptor is proposed, and the features of the suspected nodules are extracted. A support vector machine (SVM) classifier is used to classify the pulmonary nodules. The experimental results show that our method can effectively detect pulmonary nodules and reduce false positive rates, and the feature descriptor proposed in this paper is valid which can be used to distinguish between nodules and blood vessels.

Traffic Engineering with Segment Routing under Uncertain Failures

  • Zheng, Zengwei;Zhao, Chenwei;Zhang, Jianwei;Cai, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2589-2609
    • /
    • 2021
  • Segment routing (SR) is a highly implementable approach for traffic engineering (TE) with high flexibility, high scalability, and high stability, which can be established upon existing network infrastructure. Thus, when a network failure occurs, it can leverage the existing rerouting methods, such as rerouting based on Interior Gateway Protocol (IGP) and fast rerouting with loop-free alternates. To better exploit these features, we propose a high-performance and easy-to-deploy method SRUF (Segment Routing under Uncertain Failures). The method is inspired by the Value-at-Risk (VaR) theory in finance. Just as each investment risk is considered in financial investment, SRUF also considers each traffic distribution scheme's risk when forwarding traffic to achieve optimal traffic distribution. Specifically, SRUF takes into account that every link may fail and therefore has inherent robustness and high availability. Also, SRUF considers that a single link failure is a low-probability event; hence it can achieve high performance. We perform experiments on real topologies to validate the flexibility, high-availability, and load balancing of SRUF. The results show that when given an availability requirement, SRUF has greater load balancing performance under uncertain failures and that when given a demand requirement, SRUF can achieve higher availability.