• Title/Summary/Keyword: Blockchain technology

Search Result 616, Processing Time 0.029 seconds

A Study on Zero Pay Image Recognition Using Big Data Analysis

  • Kim, Myung-He;Ryu, Ki-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.193-204
    • /
    • 2022
  • The 2018 Seoul Zero Pay is a policy actively promoted by the government as an economic stimulus package for small business owners and the self-employed who are experiencing economic depression due to COVID-19. However, the controversy over the effectiveness of Zero Pay continues even after two years have passed since the implementation of the policy. Zero Pay is a joint QR code mobile payment service introduced by the government, Seoul city, financial companies, and private simple payment providers to reduce the burden of card merchant fees for small business owners and self-employed people who are experiencing economic difficulties due to the economic downturn., it was attempted in the direction of economic revitalization for the return of alleyways[1]. Therefore, this study intends to draw implications for improvement measures so that the ongoing zero-pay can be further activated and the economy can be settled normally. The analysis results of this study are as follows. First, it shows the effect of increasing the income of small business owners by inducing consumption in alleyways through the economic revitalization policy of Zero Pay. Second, the issuance and distribution of Zero Pay helps to revitalize the local economy and contribute to the establishment of a virtuous cycle system. Third, stable operation is being realized by the introduction of blockchain technology to the Zero Pay platform. In terms of academic significance, the direction of Zero Pay's policies and systems was able to identify changes in the use of Zero Pay through big data analysis. The implementation of the zero-pay policy is in its infancy, and there are limitations in factors for examining the consumer image perception of zero-pay as there are insufficient prior studies. Therefore, continuous follow-up research on Zero Pay should be conducted.

Metaverse App Market and Leisure: Analysis on Oculus Apps (메타버스 앱 시장과 여가: 오큘러스 앱 분석)

  • Kim, Taekyung;Kim, Seongsu
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.37-60
    • /
    • 2022
  • The growth of virtual reality games and the popularization of blockchain technology are bringing significant changes to the formation of the metaverse industry ecosystem. Especially, after Meta acquired Oculus, a VR device and application company, the growth of VR-based metaverse services is accelerating. In this study, the concept that supports leisure activities in the metaverse environment is explored realting to game-like features in VR apps, which differentiates traditional mobile apps based on a smart phone device. Using exploratory text mining methods and network analysis approches, 241 apps registed in the Oculus Quest 2 App Store were analyzed. Analysis results from a quasi-network show that a leisure concept is closely related to various genre features including a game and tourism. Additionally, the anlaysis results of G & F model indicate that the leisure concept is distictive in the view of gateway brokerage role. Those results were also confirmed in LDA topic modeling analysis.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

Development and Application of Private-focused Digital Public Service Evaluation Framework: Focused on AHP Analysis (민간 중심 디지털 공공 서비스 적합성 평가 프레임워크 개발 및 시범 적용 연구: AHP를 중심으로)

  • Sangjun Lee;DaeChul Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.2
    • /
    • pp.71-92
    • /
    • 2023
  • Globally, under the leadership of advanced ICT countries, the private sector is promoting various policies to promote the digital transformation of public services. Looking at the research trend, design of public service indicators, development of evaluation system, and empirical research are being carried out steadily, but there are insufficient research cases on models in which the private sector participates in the planning, development, and operation of public services. In this study, Private-centric digital public service suitability evaluation indicators were discovered through interviews with experts in various fields, and weights for each indicator were analyzed through AHP evaluation. In addition, by applying the analysis results to 18 digital public services on a trial basis, the importance and priority of evaluation indicators for each service were derived, and at the same time, the evaluation framework was designed and applied to diagnose implications. As a result of the study, 'social utility', 'corporate acceptability', and 'public acceptability' were selected as the top three indicators of suitability evaluation. At this time, it was analyzed that the weight of the 'company acceptability' index, which includes sub-indices such as 'service profitability', 'service scalability', and 'private initiative possibility', was the highest among the three top indicators. As a result of the demonstration for public services, "IoT facility unmanned remote monitoring service", "blockchain real estate transaction service", and "digital twin disaster prediction service" were evaluated as the most suitable public services for the transition to the private sector.

A Proposal for the Development of Online Graduate School for Lifelong Education (평생교육을 위한 온라인 대학원 발전방안 제안)

  • Kwon, Arum;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.415-422
    • /
    • 2022
  • This study requires a new paradigm for universities in line with the global pandemic and the 4th industrial revolution. Accordingly, we propose an educational plan for the H university online graduate school in Korea. As a research method, the implications of scholars and experts on future education were synthesized, and the cases of overseas universities using it were analyzed to propose an online graduate school education plan. As a result of the study, online graduate school needs diversity as a venue for providing new opportunities as lifelong education, and to realize this, they use a microcredit. Blockchain technology is introduced so that microcredit can be transparently verified. In addition, to correspond to various convergence major programs and further develop them, problem-solving-oriented teaching methods enhance students' convergent skills as well as active learning and interaction. More detailed curriculum research at online graduate schools is needed in the future, and we hope that you will contribute to the development of online graduate school education based on this study.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

The Interface between Wearable Devices and Metaverse: A Study on Soccer Game Character Ability Mapping using Mi Band (웨어러블 디바이스와 메타버스의 접점: 미밴드를 이용한 축구 게임 캐릭터 능력치 매핑 연구)

  • Hyun-Su Kim;Mi-Kyeong Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1345-1352
    • /
    • 2023
  • With the development of virtual reality (VR) and blockchain technology, Metaverse is being used in various fields such as games, education, and social networking. At the same time, shipments of wearable devices such as smartwatches are growing every year, becoming more and more integrated into people's daily lives. This study presents a new possibility of reflecting the user's body signals measured through the combination of the two phenomena in the metaverse character. Various biometric information such as the user's heart rate and amount of exercise collected through the smartwatch are reflected on the character in the metaverse, allowing the user's physical condition to be reflected in the virtual world. Through this, Metaverse is expected to provide a new experience that can be called 'extended reality' beyond simple virtual reality, improve user's satisfaction with Metaverse, and suggest a direction for the development of smartwatches.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Block Chain Application Technology to Improve Reliability of Real Estate Market (부동산 시장의 신뢰성 향상을 위한 블록체인 응용 기술)

  • Oh, Seoyoung;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.51-64
    • /
    • 2017
  • After Bitcoin was proposed by Satoshi Nakamoto in 2009, studies have been carried out to apply the Block Chain technology in various environment, which was applied as a distributed transaction of Bitcoin. Smart contracts, voting and proof of ownership of digital contents are typical applications of Block Chain. They used the feature that it is impossible to modify or delete once recorded facts. They also applied to prove relevant facts and to provide data integrity. The applied cases are mainly made in an environment where the data should or could be open to the public, and they have been proposed as solutions to solve the problems occurred in relations. This fact has led to the attention that Block Chain can be applied as a good alternative in similar circumstances. In this study, real estate market service was selected to expand the application range of Block Chain. Although there are about 250 applications and web services in total, the satisfaction is not high due to false offerings. Thus we propose a countermeasure against the problem by applying the Block Chain to the real estate market service, and investigate the research direction of the Block Chain in the future market.

Research on the limiting factors and countermeasures of the virtual asset industry (가상자산 산업의 한계요인과 대응방안 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • The purpose of this study is to provide an environment that can support the development of the virtual asset industry. The limiting factors and countermeasures currently possessed by the virtual asset industry were considered in terms of legal and institutional aspects, technical aspects, and market aspects.Small businesses classified as virtual asset operators have difficulty meeting the government's requirements.Accordingly, SMEs with insufficient funds and manpower are withdrawn from the market, creating an environment where only large-scale enterprises with capital power survive.It is difficult to develop desirable technologies and markets in the virtual asset technology industry. In addition, small and medium-sized companies may be expelled from the market, causing damage to current users. Therefore, in terms of legal and institutional aspects, there is a lack of an exact scope of virtual asset providers, and thus it is necessary to respond to the controversial elements of virtual asset providers. In terms of technology, it is necessary to cope with the slowdown of the P2P method, the difficulty in recovering errors, and the absence of operational experts. Therefore, technology standardization and stabilization are required, and efforts must be made to cultivate operational technical personnel who can support them.In terms of the market, it is necessary to prepare measures to protect users of virtual assets and to establish countermeasures for companies operating virtual assets against weak user protection, inadequate application of the AML method, and limitations of taxation. This study is expected to contribute to active utilization support or related policies in the virtual asset industry.