• Title/Summary/Keyword: Data Transactions

Search Result 8,770, Processing Time 0.029 seconds

Bad Data Detection Method in Power System State Estimation (전력계통 상태주정에서의 불량정보 검출기법)

  • 최상봉;문영현
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.40 no.2
    • /
    • pp.144-153
    • /
    • 1991
  • This paper presents an algorithm to improve accuracy and reliability in the state estimation of contaminated bad data. The conventional algorithms for detection of bad data have the problems of excessive memory requirements and long computation time. In order to overcome these problems, a measurement compensation approach is proposed to reduce computation time, and the partitioned measurement error model has the advantage of remarkable reduction in computation time and memory requirements in estimated error computation. The proposed algorithm has been tested for IEEE sample systems, which shows its applicability to on-line power systems.

Characteristics of 5/8 Modulation Code of Misalignments for Holographic Data Storage (홀로그래픽 저장장치용 5/8변조 부호의 어긋남 특성)

  • Kim, Jin-Young;Lee, Jae-Jin
    • Transactions of the Society of Information Storage Systems
    • /
    • v.6 no.2
    • /
    • pp.47-51
    • /
    • 2010
  • We investigate misalignment characteristics of 5/8 modulation code for holographic data storage. The 5/8 modulation code does not have any isolated patterns that is the most unwanted problem for holographic data storage. As the results, the 5/8 modulation code showed a strong side of misalignments, and the code has the best performance among uncoded, 5/9, and 6/8 modulation codes when there are large misalignments.

Global Concurrency Control using Message Ordering of Group Communication Messaging System in Multidatabase (그룹통신 메시징 시스템의 메시지 순서를 이용한 멀티 데이터베이스에서 전역 동시성 제어 기법)

  • 문애경;남궁한;조행래
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5B
    • /
    • pp.520-530
    • /
    • 2004
  • A multidatabase system (MDBS) is designed to provide universal access to distributed data across multiple autonomous, heterogeneous local database systems (LDBSs). In this paper, we propose a global concurrency control (GCC) algorithm in MDBS. The proposed GCC algorithm adopts the idea of message ordering in group communication messaging system. A necessary condition of GCC algorithm is that global transactions are serialized in the same order at all LDBSs that they execute. n all operations of a transaction are bundled in a single message and the message arrives at LDBSs in the same order using message ordering property, each LDBS can perform subtransactions in the same order. As a result, message ordering allows to determine easily the relative serialization order of global transactions, and then it can support a local autonomy without any information about the serialization order of transactions executing locally.

Data Priority-Based Timestamp-Ordering Protocol for Transactions (트랜잭션을 위한 데이터 우선순위 기반형 시간소인 순서화 기법)

  • Yun, Seok-Hwan;Kim, Pyeong-Jung;Park, Ji-Eun;Lee, Jae-Yeong;Lee, Dong-Hyeon;Gung, Sang-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1196-1210
    • /
    • 1997
  • Timestamp-Ordering Prltocol among trancaction scheduling alforithms can cause the priority teversion that a transaction with higher priority is processed after the teansaction the trancaction withe lower priority by assigning timestamp to transactions entering system and scheduling them based on the timestamp.To prevent this reversion,we suggest a data priority-based timestamp ordering prioity within the same timestamp group after grouping teansactions into constant time interval based on entering points.To evaluate the performance of this protocol,we compared the performance of this protocol with that of others after constructing the simulation environment with real time database system.We verified that the performance of proposed protocol is supweior to that of timestamp ordering protocol under the comdition of high load and high data conflicts.

  • PDF

Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers

  • Kwon, Hyun;Yoon, Hyunsoo;Choi, Daeseon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3243-3257
    • /
    • 2021
  • Deep neural networks provide excellent performance in pattern recognition, audio classification, and image recognition. It is important that they accurately recognize input data, particularly when they are used in autonomous vehicles or for medical services. In this study, we propose a data correction method for increasing the accuracy of an unknown classifier by modifying the input data without changing the classifier. This method modifies the input data slightly so that the unknown classifier will correctly recognize the input data. It is an ensemble method that has the characteristic of transferability to an unknown classifier by generating corrected data that are correctly recognized by several classifiers that are known in advance. We tested our method using MNIST and CIFAR-10 as experimental data. The experimental results exhibit that the accuracy of the unknown classifier is a 100% correct recognition rate owing to the data correction generated by the proposed method, which minimizes data distortion to maintain the data's recognizability by humans.

Enhanced Hybrid Privacy Preserving Data Mining Technique

  • Kundeti Naga Prasanthi;M V P Chandra Sekhara Rao;Ch Sudha Sree;P Seshu Babu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.99-106
    • /
    • 2023
  • Now a days, large volumes of data is accumulating in every field due to increase in capacity of storage devices. These large volumes of data can be applied with data mining for finding useful patterns which can be used for business growth, improving services, improving health conditions etc. Data from different sources can be combined before applying data mining. The data thus gathered can be misused for identity theft, fake credit/debit card transactions, etc. To overcome this, data mining techniques which provide privacy are required. There are several privacy preserving data mining techniques available in literature like randomization, perturbation, anonymization etc. This paper proposes an Enhanced Hybrid Privacy Preserving Data Mining(EHPPDM) technique. The proposed technique provides more privacy of data than existing techniques while providing better classification accuracy. The experimental results show that classification accuracies have increased using EHPPDM technique.

Concurrency Control Method using the Asynchronous Data Broadcast in Mobile Computing Environments (이동 컴퓨팅 환경에서 비동기적 데이터방송을 사용한 동시성 제어 기법)

  • Ko Seung-Min;Kim Dae-In;Im Sun-Mo;Hwang Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.21-30
    • /
    • 2005
  • In mobile computing environments, a mobile host caches the data to use the narrow bandwidth efficiently and improve the response time. A server periodically broadcasts the update data for maintaining the cache consistency of a mobile host. However, a method for maintaining cache consistency using periodic invalidation report has a problem that defers the commit decision of a mobile transaction to guarantee its serializable execution. In this paper, we propose CCM-AD method that guarantees the serializable execution of a mobile transaction even in the case that it is executed using cached data. As CCM-AD method guarantees the serializable execution of mobile transactions by using the intersection between the data broadcast to mobile host and the data updated at server. Then the CCM-AD method can reduce the delay of commitment decision of a mobile transaction. Also our method can reduce the size of invalidation report.

Design and Implement of Power-Data Processing System with Optimal Sharding Method in Ethereum Blockchain Environments

  • Lee, Taeyoung;Park, Jaehyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.143-150
    • /
    • 2021
  • In the recent power industry, a change is taking place from manual meter reading to remote meter reading using AMI(Advanced Metering Infrastructure). If such the power data generated from the AMI is recorded on the blockchain, integrity is guaranteed by preventing forgery and tampering. As data sharing becomes transparent, new business can be created. However, Ethereum blockchain is not suitable for processing large amounts of transactions due to the limitation of processing speed. As a solution to overcome such the limitation, various On/Off-Chain methods are being investigated. In this paper, we propose a interface server using data sharding as a solution for storing large amounts of power data in Etherium blockchain environments. Experimental results show that our power-data processing system with sharding method lessen the data omission rate to 0% that occurs when the transactions are transmitted to Ethereum and enhance the processing speed approximately 9 times.

A Technique for Recovering Logs in Real-time Transactions by using a LIFO Method (LIFO 방식을 이용한 실시간 트랜잭션 로그 회복 방안)

  • Park, Il Tae;Choi, Dong Yeul;Oh, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.51-57
    • /
    • 2003
  • The Real-time DBMS must provide the keeping, fabrication and control function which the data where the user requsets for processing inside the hour when it is restricted, it is quick most and safely[3]. In order lide this to take chare of the real-time control and fabrication function, details recording (log) of the control processing is very important in accomplished transactions from inside the Real-time DBMS. In this proposal, it sees recording which is like this in base and it proposes the new recovery function for transactions log. This recovery technique which it sees used the concept of the LIFO (Last-In-First-Out) method with basic. The proposed technique will becomes the technique which it will be able and to record to process efficiently with a same attribute and the continuous transactions log.

  • PDF

Reliable blockchain-based ring signature protocol for online financial transactions

  • Jinqi Su;Lin He;Runtao Ren;Qilei Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2083-2100
    • /
    • 2023
  • The rise of Industry 5.0 has led to a smarter and more digital way of doing business, but with it comes the issue of user privacy and security. Only when privacy and security issues are addressed, will users be able to transact online with greater peace of mind. Thus, to address the security and privacy problems associated with industry blockchain technology, we propose a privacy protection scheme for online financial transactions based on verifiable ring signatures and blockchain by comparing and combining the unconditional anonymity provided by ring signatures with the high integrity provided by blockchain technology. Firstly, we present an algorithm for verifying ring signature based on distributed key generation, which can ensure the integrity of transaction data. Secondly, by using the block chain technique, we choose the proxy node to send the plaintext message into the block chain, and guarantee the security of the asset transaction. On this basis, the designed scheme is subjected to a security analysis to verify that it is completely anonymous, verifiable and unerasable. The protection of user privacy can be achieved while enabling online transactions. Finally, it is shown that the proposed method is more effective and practical than other similar solutions in performance assessment and simulation. It is proved that the scheme is a safe and efficient online financial transaction ring signature scheme.