• Title/Summary/Keyword: public realm

Search Result 79, Processing Time 0.027 seconds

Deep Learning-based Delinquent Taxpayer Prediction: A Scientific Administrative Approach

  • YongHyun Lee;Eunchan Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.30-45
    • /
    • 2024
  • This study introduces an effective method for predicting individual local tax delinquencies using prevalent machine learning and deep learning algorithms. The evaluation of credit risk holds great significance in the financial realm, impacting both companies and individuals. While credit risk prediction has been explored using statistical and machine learning techniques, their application to tax arrears prediction remains underexplored. We forecast individual local tax defaults in Republic of Korea using machine and deep learning algorithms, including convolutional neural networks (CNN), long short-term memory (LSTM), and sequence-to-sequence (seq2seq). Our model incorporates diverse credit and public information like loan history, delinquency records, credit card usage, and public taxation data, offering richer insights than prior studies. The results highlight the superior predictive accuracy of the CNN model. Anticipating local tax arrears more effectively could lead to efficient allocation of administrative resources. By leveraging advanced machine learning, this research offers a promising avenue for refining tax collection strategies and resource management.

Design of a Strong Authentication Mechanism using Public-Key based on Kerberos (공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계)

  • 김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.67-76
    • /
    • 2002
  • Kerberos is designed to provide strong authentication between client and application servers which are working in distributed network environment by using symmetric-key cryptography, and supposed to trust other systems of the realm. In this paper, we design an efficient and strong authentication mechanism by introducing the public/private-key to Kerberos. In the mechanism to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we employ a mutual authentication method, which is used on challenge-response mechanism based on digital signatures, to improve trust between realms, and present a way of reducing the number of keys by simplifying authentication steps.

A Research on the Calligraphic Critique of Seongjeok Jeong-Jik Lee - Based on 'Wongyo-Jinjeok' of Wongyo Gwang-Sa Lee (석정 이정직의 서예비평 연구 - 원교 이광사의 『원교진적』을 중심으로 -)

  • Gu, Sa Whae
    • (The)Study of the Eastern Classic
    • /
    • no.32
    • /
    • pp.29-50
    • /
    • 2008
  • This thesis is an introduction and critique of the recently released 'Wongyo-Jinjeok(원교진적)'. 'Wongyo-Jinjeok' is the critique of Seokjeong Jeong-Jik Lee (석정 이정직, 1841-1910), a practical scientist and writer during the last years of the Korean Empire, on the calligraphy of Wongyo(원교) Gwang-Sa Lee (이광사, 1705-1777). Even though whether or not Seokjeong follows the flow of Donggukjinche(동국진체) is to be determined by the specialists in this field, this thesis is based on the view that Seokjeong was influenced by Donggukjinche. The academic value of 'Wongyo-Jinjeok' is Seokjeong's preface and epilogue which critiques Wongyo's writing. 'Wongyo-Jinjeok'is a collection of calligraphic specimens from the 18 pieces of Chinese poetry Wongyo had written before and after June 1756 which was the year after he was banished to Booryung. Seokjeong critiqued the writing of Wongyo from the perspective of calligraphic history in the preface and epilogue of 'Wongyo-Jinjeok'. Seokjeong had been positive about Wongyo's taking after the pre-Wangheejee calligraphic style. But at the same time, Seokjeong thought that Wongyo's ability to create was limited by the public morals of that time. Such thought of Seokjeong can be interpreted as an evaluation of Wongyo's calligraphy as having been externally stern but failing to transcend the realm of mastery to the realm of creation.

A Study on the Effect of Middle-Aged People's Use of Cultural Programs in Public Library on their Library Perception and Life Satisfaction (중장년층의 공공도서관 문화프로그램 이용이 도서관 인식과 생활만족에 미치는 영향)

  • Jeong, Mi Ok;Kim, Giyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.3
    • /
    • pp.181-211
    • /
    • 2022
  • This study designed the research model to identify whether the characteristics of cultural programs of public libraries and middle-aged people's experience of the programs impact on their life satisfaction. To verify our model, we conducted our survey to random middle-aged users of five public libraries in Gyeonggi-do and nine public libraries in Seoul, and 246 valid samples are used. Our analysis showed that the characteristics of cultural programs and middle aged people's experience of the programs affect their perception of cultural programs, and the regional perception of public libraries had a significant effect on fulfilling personal needs for life satisfaction. Our analysis also showed the change in values of public libraries that spread to the realm of daily life. This study is meaningful in suggesting directions for national and local public library policies and public library cultural programs.

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

  • Lim, Shin-Young;Chung, Lawrence;Helal, Sumi;Yang, Hen-I
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.198-205
    • /
    • 2009
  • In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where there are current users already being served in the new location. In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other. As users move about, they will have to roam from private smart space to public smart space and vice versa. When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing. The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision with limited available networked devices.

A Study on the Characteristics of Graphics on Architectural Surfaces through Artistic Intervention (예술적 개입을 통한 건축표피의 그래픽 특성 연구)

  • Moon, Eun-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.3
    • /
    • pp.119-127
    • /
    • 2010
  • This study investigates the examples of artistic intervention especially on the surface of architecture as a meeting place of art and architecture. Artistic intervention demonstrates the possibilities for the meaningful integration of arts into architectural spaces. This study summarizes the characteristics of artistic intervention on the surfaces of architectures as follow; first, the artistic intervention is applied to the broad ranges of designs including public art, architectural design and sign design that establish identities and unique characters to the spaces. Second, the artistic intervention on the surfaces is conducted by the participation of the various fields of artists, i.e. painters, installation artists, graphic designers and landscape designers. The artistic intervention is also conducted by individual collaboration between artists and architects as well as by the forms of public art of art-in-architecture program. Third, the artistic intervention on the surfaces is expressed using the complex combination of images, colors, patterns, and texts. They are applied to enhance the aesthetic and symbolic characters of buildings in public arts, to improve the visual characters of architectural design with graphics, colors, and patterns, as well as to increase communication skills and cognitive effects of sign design with letters and colors on walls and floor surfaces. Fourth, the artistic intervention is also applied on the surfaces to encourage people to communicate historic and symbolic meanings related to the locations and functions. Thus, graphics on the architectural surfaces could provide a public space, with which people could share common feeling on public arts. As a conclusion, the study finds that artistic intervention either as artworks or as elements of architectural design can not only enhance the aesthetic quality of architectural space but also expand the techniques of design representation. In addition, the artistic intervention can contribute to create a new realm of design where artists and architects work together to enrich our surroundings.

Bringing the Multiscalar Approach into Feminist Spatial Studies: On the Study of Women's Movement (페미니스트 공간연구에 다중스케일적 접근 접목하기: 여성운동연구를 중심으로)

  • Hwang, Jin-Tae;Jung, Hyunjoo
    • Journal of the Korean Geographical Society
    • /
    • v.50 no.1
    • /
    • pp.123-139
    • /
    • 2015
  • This paper attempts to complement the methodological and conceptual lack of spatial thinking in Korean women's movement research and to facilitate further discussion on this field of research, by drawing on recent academic discussion on scale developed particularly among the Western critical and feminist geographers. The purposes of the paper are following. First, it addresses the need to utilize the concept of scale in women's movement research. Numerous spatial metaphors often proliferated with indiscretion in the feminist approach have rather tended to hinder fully understanding the spatiality of social movements. In order to examine the spatiality of social movements as both conceptual tool and praxis, not merely as metaphor, the paper incorporates main issues in recent scale discourses with particular attention to the debate between Marston and Brenner, and explores their implications for women's movement research in Korea. Second, it emphasizes the multi-scalar approach by highlighting the role of micro-scale, the less studied side in social movement literature. The public and the private divide, the long time battle ground in feminist research, is often intermingled with the hierarchical scalar understanding which considers the global as more powerful and important than the local. The reproductive realm, however, is indispensably related to production and political economic realm. The paper explores the very site where both the public/private divide and the hierarchical scalar understanding can be dismantled. It is the site where the private becomes public and the local becomes the global (and vice versa). Drawing on a brief example of an anti-FTA movement of women with strollers in Korea, it examines the way the multi-scalar approach advances the understanding of Korean women's movement.

  • PDF

A study on Kerberos Authentication and Key Exchange based on PKINIT (PKINIT기반의 Kerberos 인증과 키 교환에 관한 연구)

  • Sin, Gwang-Cheol;Jeong, Il-Yong;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.313-322
    • /
    • 2002
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Ggroup. Did to certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, acquire public key from DNS server by chain (CertPath) between realms by certification and Key exchange way that provide service between realms applying X.509, DS/BNS of PKINIT base. In order to provide regional services, Certification and key exchange between realms use Kerberos' symmetric method and Session connection used Directory service to connection X.509 is designed using an asymmetric method. Excluded random number ($K_{rand}$) generation and duplex encryption progress to confirm Client. A Design of Kerberos system that have effect and simplification of certification formality that reduce Overload on communication.

A Study on the Virtual Reality-based Museums : Exhibition Characteristics and Possibilities of Utilization (가상현실 기반 박물관의 전시특성 및 활용 가능성 연구 -세컨드라이프 내 박물관을 중심으로)

  • Son, Hee-Joo;Choi, Jin-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.862-867
    • /
    • 2009
  • The development of internet has changed the realm of life from off-line to on-line, causing not only the overall change in society but also urgently demanding change in the basic concept of museum. Virtual Museums have appeared in line with such changes, and they utilize space regardless of real time and space unlike the traditional museums that collected and preserved works for exhibition in physical space thereby playing a role of catalyst for exhibition in virtual space and for direct exchange with the public. Through relevant literatures and case studies, the present research particularly investigated the exhibition characteristics of virtual reality-based museums out of all types of cyber museum, in an effort to make a comparison with those of offline museums, and eventually to suggest a direction of virtual reality museums that would be established in the future and to consider the possibilities of utilizing them.

  • PDF

Authentication for Distributed Computer Network Using Public Key Algorithm (공개키 알고리듬을 이용한 분산 컴퓨터망에서의 인증 방식)

  • 염홍열;백종현;김창련;김성우
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.190-204
    • /
    • 1996
  • 분산 컴퓨터망에서의 고객과 서버간의 서비스는 인증이 완료된 후 제공되어야 한다. 분산망에서의 지금까지 알려진 대표적인 인증 시스템은 Kerberos 인증 기법이다. 현재 Kerberos 인증 방식에서는 대칭형 알고리듬인 DES 알고리듬과 패스워드에 바탕을 두고 있다. 그러나 여기서는 DES 의 채용으로 인한 안전성 문제와 영역(Realm) 간 인증 정보교환시 복잡한 키 관리가 요구되는 단점이 있다. 본 논문에서는 Kerberos 인증 방식이 갖는 문제점을 분석하고, 이를 바탕으로 공개키 알고리듬을 이용한 인증 구조를 제안한다 또한 IDEA 를 이용한 인증 방식과 공개키 암호 알고리듬을 이용한 인증 방식을 시뮬레이션한다. 시뮬레이션에 이용된 C 루틴은 64 비트 IDEA 루틴, 128 비트 MD5 루틴, 고속의 지수 연산 루틴, 768 비트 지수 연산 루틴, 그리고 RSA 암호키 생성 루틴 등이다. 본 논문의 결과는 분산 컴퓨터 망에서의 인증 시스템 설계시 유용하게 활용될 수 있을 것이다.

  • PDF