• Title/Summary/Keyword: Decentralized Application

Search Result 137, Processing Time 0.025 seconds

A Study for Strategic Congruence Effects of Information System Technology Structure (정보시스템기술 구조의 전략 적합성 효과에 관한 연구)

  • Chung, Lak-Chae
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.40-48
    • /
    • 2004
  • In a study involving 52 large organizations in the savings institutions industry, the relationship between information systems technology(IT) structure and competitive strategy was investigated based on structural contingency theory. Two dimensions of IT structure and two types of competitive strategy were employed to test a contingency mood. It was found that enhanced congruence between IT structure and competitive strategy was associated with higher competitive advantage. The structural dimension significantly associated with the "defender" strategic stance was more centralized and more integrated application of IT, while the structural dimension significantly associated with "prospector〃 positioning was more decentralized and less integrated application of IT.lication of IT.

  • PDF

Block-chain based Secure Data Access over Internet of Health Application Things (IHoT)

  • A. Ezil Sam, Leni;R. Shankar;R. Thiagarajan;Vishal Ratansing Patil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1484-1502
    • /
    • 2023
  • The medical sector actively changes and implements innovative features in response to technical development and revolutions. Many of the most crucial elements in IoT-connected health services are safeguarding critical patient records from prospective attackers. As a result, BlockChain (BC) is gaining traction in the business sector owing to its large implementations. As a result, BC can efficiently handle everyday life activities as a distributed and decentralized technology. Compared to other industries, the medical sector is one of the most prominent areas where the BC network might be valuable. It generates a wide range of possibilities and probabilities in existing medical institutions. So, throughout this study, we address BC technology's widespread application and influence in modern medical systems, focusing on the critical requirements for such systems, such as trustworthiness, security, and safety. Furthermore, we built the shared ledger for blockchain-based healthcare providers for patient information, contractual between several other parties. The study's findings demonstrate the usefulness of BC technology in IoHT for keeping patient health data. The BDSA-IoHT eliminates 2.01 seconds of service delay and 1.9 seconds of processing time, enhancing efficiency by nearly 30%.

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Development for Worker Safety Management System on the EOS Blockchain (EOS 블록체인 기반의 작업자 안전관리 시스템 개발)

  • Jo, Yeon-Jeong;Eom, Hyun-Min;Sim, Chae-Lin;Koo, Hyeong-Seo;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.10
    • /
    • pp.797-808
    • /
    • 2019
  • In a closed workplace, the management of the workplace is important because the environmental data at the workplace has a great influence on the safety of workers. Today's industrial sites are transformed into data-based factories that collect and analyze data through sensors in those sites, requiring a management system to ensure safety. In general, a safety management system stores and manages data on a central server associated with a database. Since such management system introduces high possibility of forgery and loss of data, workers often suspect the reliability of the information on the management system. In this paper, we present a worker safety management system based on the EOS blockchain which is considered as third-generation blockchain technology. The developed system consists of a set of smart contracts on the EOS blockchain and 3 decentralized applications associated with the blockchain. According to the roles of users, the worker and manager applications respectively perform the process of initiating or terminating tasks as blockchain transactions. The entire transaction history is distributed and stored in all nodes participating in the blockchain network, so forgery and loss of data is practically impossible. The system administrator application assigns the account rights of workers and managers appropriate for performing the functions, and specifies the safety standards of IoT data for ensuring workplace safety. The IoT data received from sensor platforms in workplaces and the information on initiation, termination or approval of tasks assigned to workers, are explicitly stored and managed in the EOS smart contracts.

Data Resource Management under Distributed Computing Environment (분산 컴퓨팅 환경하에서의 데이타 자원 관리)

  • 조희경;안중호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1994.09a
    • /
    • pp.105-129
    • /
    • 1994
  • The information system of corporations are facing a new environment expressed by miniaturization, decentralization and Open System. It is therefore of utmost importance for corporations to adapt flexibly th such new environment by providing for corresponding changes to their existing information systems. The objectives of this study are to identify this new environment faced by today′s information system and develop effective methods for data resource management under this new environment. In this study, it is assumed that the new environment faced by information systems can be specified as Distributed Computing Environment, and in order to achieve such system, presents Client/server architecture as its representative computing structure, This study defines Client/server architecture as a computing architecture which specialize the fuctionality of the client system and the server system in order to have an application distribute and perform cooperative processing at the best platform. Furthermore, from among the five structures utilized in Client/server architecture for distribution and cooperative processing of application between server and client this study presents two different data management methods under the Client/server environment; one is "Remote Data Management Method" which uses file server or database server and. the other is "Distributed Data Management Method" using distributed database management system. The result of this study leads to the conclusion that in the client/server environment although distributed application is assumed, the data could become centralized (in the case of file server or database server) or decentralized (in the case of distributed database system) and the data management method through a distributed database system where complete responsibility and powers with respect to control of data used by the user are given not only is it more adaptable to modern flexible corporate environment, but in terms of system operation, it presents a more efficient data management alternative compared to existing data management methods in terms of cutting costs.

  • PDF

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

Control of Multiple UAV's based on Swarm Intelligence (무리지능을 이용한 복수 무인기 제어)

  • Oh, Soo-Hun
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.7 no.1
    • /
    • pp.141-152
    • /
    • 2009
  • The simultaneous operation of multiple UAV's makes it possible for us to raise the mission accomplishment and cost efficiency. For this we need an easily scalable control algorithm, and swarm intelligence having the characteristics such as flexibility, robustness, decentralized control and self-organization comes into the spotlight as a practical substitute. In this paper the features of swarm intelligence are described, and various research results are introduced which show that the application of swarm intelligence to the control of multiple UAV's enables the missions of surveillance, path planning, target tracking and attack to be accomplished efficiently by simulations and tests.

  • PDF

Evaluation of Operation Reliability for Micro Gas Turbine(MGT) Power Generation System (마이크로 가스터빈 발전시스템 운전신뢰성평가)

  • Kim, Jae-Hoon;Hur, Kwang-Beom
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.17 no.5 s.122
    • /
    • pp.448-455
    • /
    • 2007
  • As Decentralized Generation(DG) becomes more reliable and economically feasible, it is expected that a higher application of DG units would be interconnected to the existing grids. This new market penetration of DG technologies is linked to a large number of factors like technologies costs and performances, interconnection issues, safety, market regulations, environmental issues or grid connection constrains. This paper describes the procedures and results for the mechanical, electrical, and environmental tests of MGT on actual grid-connection under Korean regulations. As one of the achievements, the simulation model of MGT was developed, so that it will be able to analyze or propose new distributed generation system using MGT. The field test was conducted in order to respond to a wide variety of needs for noise reduction and utilization and its performance was evaluated in consideration of its operational problems. The MGT is successfully supplying electricity to Korean grids with satisfying various regulations. The suggested strategy and experience for the evaluation of the distributed generation will be used for the introduction of other distributed generation technologies into the grid in the future.

Numerical Analysis Method for Nodal Probabilistic Production Cost Simulation (각 부하지점별 확률론적 발전비용 산정을 위한 수치해석적 방법)

  • Kim, Hong-Sik;Moon, Seung-Pil;Choi, Jae-Seok;Rho, Dae-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2001.05a
    • /
    • pp.112-115
    • /
    • 2001
  • This paper illustrates a new nodal effective load model for nodal probabilistic production cost simulation of the load point in a composite power system. The new effective load model includes capacities and uncertainties of generators as well as transmission lines. The CMELDC based on the new effective load model at HLII has been developed also. The CMELDC can be obtain from convolution integral processing of the outage capacity probabilistic distribution function of the fictitious generator and the original load duration curve given at the load point. It is expected that the new model for the CMELDC proposed. In this study will provide some solutions to many problems based on nodal and decentralized operation and control of an electric power systems under competition environment in future. The CMELDC based on the new model at HLII will extend the application areas of nodal probabilistic production cost simulation, outage cost assessment and reliability evaluation etc. at load points. The characteristics and effectiveness of this new model are illustrated by a case study of a test system.

  • PDF

A Decentralized Copyright Management Model using Mydata Concept (마이데이터 개념을 활용한 탈중앙화 저작권 관리 모델)

  • Kim, Hyebin;Shin, Weon;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.262-273
    • /
    • 2020
  • This paper analyzes the existing copyright management and copyright sharing model and discusses the limitations. It then proposes a consortium Blockchain-based copyright management model in which the service platform participates as a node, and discusses how to combine the My Data concept with Blockchain and smart contracts. Also, Blockchain-based CP-ABE is introduced and applied to the proposed model as a way for users to define access policies and store copyright data in encrypted form on the storage of the online service providers (OSP). Compared with the existing copyright management model, the proposed model allows the copyright holder to focus on copyright registration, license content design, and sharing, as the data subject. And it is expected to be able to transparently manage the usage records and the basis for the settlement of the copyrighted data that are shared and used on each platform.