• Title/Summary/Keyword: Efficient Transaction

Search Result 256, Processing Time 0.022 seconds

An Efficient Altruistic Looking Protocol for the Mobile Transaction Management System (이동 데이터베이스 시스템을 위한 효율적인 이타적 잠금기법)

  • 권혁신;김세윤;김응모
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • We propose an advanced transaction scheduling protocol to improve the concurrency and to guarantee the mobility for the mobile database management systems. Mobility, portability, and wireless link In mobile computing environment can cause certain drawbacks, and thus it is more difficult to solve the concurrency control problems. However, a locking scheme should be used to guarantee the data consistency and to prevent the data conflicts. It is well known that data consistency is guaranteed by standard transaction scheduling schemes like two-phase locking (2PL). It has two of operation, lock and unlock. But 2PL does not give solution for mobile system. Altruistic Locking (AL) and classifying transactions, we adapt, can give solution for the previous problems. AL, as an advanced protocol, has attempted to reduce delay effects associated with lock release moment by the use of donation. In this paper, we extend those approaches and classify the transactions to reduce delay effects of short-lived transaction caused by long-lived transaction. In addition, we show efficient solution for the case of disconnection occurrence. Our protocol, namely, Mobile Altruistic Locking (MAL) is shown to be efficiently used in order to reduce delay effects and to guarantee database consistency in a state of the slippery connection in mobile database systems.

  • PDF

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF

A Study on Management of Business Transaction in Regional Local Government (광역지방자치단체 단위과제 운영에 관한 연구)

  • Chung, Sang-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.327-359
    • /
    • 2016
  • The purpose of this study is to examine and analysis the problems in managing 'Business Transaction(Danwi-gwaje)' of regional local government, and propose implications. The study points out the problems emerged in the operation process of Business Transaction including creating of Business Transaction and Business Transaction Profile, setting retention period and filing records, and gives concrete example of them. It concludes with presenting improvements and considerations in managing Business Transaction for systematic and efficient records management.

An Efficient Algorithm for Mining Frequent Closed Itemsets Using Transaction Link Structure (트랜잭션 연결 구조를 이용한 빈발 Closed 항목집합 마이닝 알고리즘)

  • Han, Kyong Rok;Kim, Jae Yearn
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.3
    • /
    • pp.242-252
    • /
    • 2006
  • Data mining is the exploration and analysis of huge amounts of data to discover meaningful patterns. One of the most important data mining problems is association rule mining. Recent studies of mining association rules have proposed a closure mechanism. It is no longer necessary to mine the set of all of the frequent itemsets and their association rules. Rather, it is sufficient to mine the frequent closed itemsets and their corresponding rules. In the past, a number of algorithms for mining frequent closed itemsets have been based on items. In this paper, we use the transaction itself for mining frequent closed itemsets. An efficient algorithm is proposed that is based on a link structure between transactions. Our experimental results show that our algorithm is faster than previously proposed methods. Furthermore, our approach is significantly more efficient for dense databases.

GRID BASED ENERGY EFFICIENT AND SECURED DATA TRANSACTION FOR CLOUD ASSISTED WSN-IOT

  • L. SASIREGA;C. SHANTHI
    • Journal of applied mathematics & informatics
    • /
    • v.41 no.1
    • /
    • pp.95-105
    • /
    • 2023
  • To make the network energy efficient and to protect the network from malignant user's energy efficient grid based secret key sharing scheme is proposed. The cost function is evaluated to select the optimal nodes for carrying out the data transaction process. The network is split into equal number of grids and each grid is placed with certain number of nodes. The node cost function is estimated for all the nodes present in the network. Once the optimal energy proficient nodes are selected then the data transaction process is carried out in a secured way using malicious nodes filtration process. Therefore, the message is transmitted in a secret sharing method to the end user and this process makes the network more efficient. The proposed work is evaluated in network simulated and the performance of the work are analysed in terms of energy, delay, packet delivery ratio, and false detection ratio. From the result, we observed that the work outperforms the other works and achieves better energy and reduced packet rate.

Efficient Method of Processing Long-term Transactions for Distributed Environment (분산 환경에서 장기 트랜잭션의 효율적인 처리 방안)

  • 정지호;엄기환
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.1007-1014
    • /
    • 2003
  • It is important to integrate an enterprise application for automating of the business profess, which is responded by a flow of market environment. There are two categories of method that integrate enterprise applications. One is Synchronous Integration, and the other is Asynchronous Integration. EAI(Enterprise Application Integration) and Web service which of the asynchronous integration is focused in the automating method of the business process. After we construct the application integration for automating of the business process, we have to concern about managing of the business transaction. Many Organizations have proposed the process method of business transaction based on 2-phase commit protocol. But this method can′t supply the phase that classify the transaction by transaction weight. In this paper, we propose an efficient method of transaction process for business transactions, which is composed by ′Classify Phase′ that classify transactions. We called this model "3-Phase Commit Method Applied by Classify Phase", we design this model to manage an resource of enterprise efficiently. The proposed method is compared by the method based on 2-Phase commit that could be a problem of management the resource of enterprise, and the advantage of this method is certified to propose the solution of that problem.

  • PDF

Technology Transfer and the Technomart Related Laws (데크노마트와 지원법 제도)

  • 이영덕;강병수
    • Journal of Korea Technology Innovation Society
    • /
    • v.2 no.2
    • /
    • pp.233-248
    • /
    • 1999
  • For the last several decades, it has been recognized that technology is a key factor in becoming an ADC and an advanced firm. So many countries and individual firms have been increasing investments on technology development. Especially LDCs including Korea choose technology transfer and transaction as an important alternative of their own technology development. To activate technology transaction and transfer, it is necessary to establish an technology transaction system, namely a Technomart that will make good connections between technology suppliers and technology buyers, and efficient functional linkages of supporting infrastructures including organizations and laws related with technology transactions. Therefore this study reviewed both the characteristics of technology transfer and transaction and a conceptual structure of a Technomart through a literature review. And then, the study analyzed the Technomart related laws including an intellectual property right, a copyright, a patent right, and electric transaction related laws. In conclusion the study proposed the development directions of the Technomart related laws.

  • PDF

Portfolio Efficient Transaction Choice Strategies based on the Global Electronic Commerce (효율적 거래포트폴리오의 선택에 의한 국제간 전자상거래방식의 전략적 활용방안)

  • Kim, Ki-Sun
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.1-16
    • /
    • 2001
  • This study discusses some theoretical implications for efficient utilization of the global E-commerce in a world of uncertainty by beginning with measures of risk and return for the global E-commerce, and by moving to risk and return for a efficient transaction portfolio of many risky methods of transaction. Decision rules are developed to show how individuals choose optimal transaction portfolios that maximize their expected utility of wealth. First, the individuals will generally want to allocate positive amount to the global E-commerce, which requires that the expected marginal utility of wealth equals zero. Secondly, the optimal transaction portfolio will be determined by finding the point of tangency between the efficient trading line and the hightest indifference curve in the mean-variance plane. Thirdly, if the global E-commerce is positively correlated with wealth, it must have an expected return that is higher than the risk-free transaction methods in order to compensate for its risk. Fourthly, on the other hand, if the global E-commerce is negatively correlated with wealth, it will have an expected return that is less than the risk-free transaction methods. Finally, the valuation of global E-commerce depends on the degree of individual's risk aversion and the covariance between the expected return of total wealth and the return of global E-commerce.

  • PDF

A Solution towards Eliminating Transaction Malleability in Bitcoin

  • Rajput, Ubaidullah;Abbas, Fizza;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.837-850
    • /
    • 2018
  • Bitcoin is a decentralized crypto-currency, which is based on the peer-to-peer network, and was introduced by Satoshi Nakamoto in 2008. Bitcoin transactions are written by using a scripting language. The hash value of a transaction's script is used to identify the transaction over the network. In February 2014, a Bitcoin exchange company, Mt. Gox, claimed that they had lost hundreds of millions US dollars worth of Bitcoins in an attack known as transaction malleability. Although known about since 2011, this was the first known attack that resulted in a company loosing multi-millions of US dollars in Bitcoins. Our reason for writing this paper is to understand Bitcoin transaction malleability and to propose an efficient solution. Our solution is a softfork (i.e., it can be gradually implemented). Towards the end of the paper we present a detailed analysis of our scheme with respect to various transaction malleability-based attack scenarios to show that our simple solution can prevent future incidents involving transaction malleability from occurring. We compare our scheme with existing approaches and present an analysis regarding the computational cost and storage requirements of our proposed solution, which shows the feasibility of our proposed scheme.

Related Loan on Real Estate Firm Performance in an Emerging Market

  • PURWANTO, Purwanto
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.697-706
    • /
    • 2020
  • This study investigates the relationship between related loan, ownership concentration and real estate firm performance. The data was collected from 35 real estate firms listed on Indonesia Stock Exchange from 2007 to 2012. Related loans are viewed from the angle of related lending and loan. Related lending and loan is measured by the related lending on total lending ratio and related loan on total loan ratio. Firm performance is measured by the asset turnover ratio and return on assets ratio. Ownership concentration is measured by the right cash flow. The data analysis was done with regression analysis and panel data. The results of the study found that related loans had a positive effect on sales but had no effect on profits. This supports the efficient transaction hypothesis. On the other hand, related lending has a positive effect on profits that supports opportunistic transactions. Ownership concentration moderates the effect of related loan on company's performance. The related lending are beneficial for mutually supporting activities in the real estate sector business group in Indonesia, but related loans have the potential to be used in tunneling activities. The paper contributes to the related party transaction in benefits-risks of related lending and related loan in uncertainty context.