• Title/Summary/Keyword: Oracle

Search Result 388, Processing Time 0.022 seconds

Study on Methods for Arts Sponsorship Using Smart Contracts and Non-fungible Tokens (스마트 계약과 대체 불가능 토큰을 활용한 예술 후원 방법에 대한 연구)

  • Lee, Eun Mi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.523-529
    • /
    • 2022
  • Art sponsorship contributed to the development of culture and art by supporting art activities to be financially stable. Various problems in the non-fungible tokens (NFTs) market, such as speculative transactions, are also expected to be improved through sound art sponsorship. This study proposes methods of implementing art sponsorship using NFTs and smart contracts. First, we propose a method of posting the acknowledgement of art sponsorship using NFT metadata. Second, we propose a method to remit sponsorship funds according to the project schedule using time-locked wallets. Third, we propose a method to remit sponsorship funds when major events of the project occur or requirements are met using Event-Driven Execution. The proposed methods can be used to share the fact about art sponsorship and safely fund it. However, many decisions about art projects must be made based on information generated outside the blockchain, which can lead to Oracle problems, so further research is needed.

Classification and Risk Analysis of Stablecoins

  • Kim, Junsang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.171-178
    • /
    • 2022
  • In this paper, we propose a classification method according to the type and characteristics of stablecoins for risk analysis, and analyze the risk factors of each stablecoin based on this classification. First, this paper explains the technologies and ecosystem of blockchain and decentralized finance(DeFi) to understand stablecoins. In addition, the operation principle of the major stablecoins currently released and used is explained for each proposed classification type. Based on this, the risk type and risk factors of each stablecoin are derived. The risk types proposed in this paper are classified as defegging, liquidation, and exploit, and the risk factors are classified as depegging due to reliability of operator, depegging due to reliability of algorithm, depegging due to failure of algorithm, liquidation due to high volatilty and oracle attack. Based on the proposed classification, we analyze the risk factors of major stablecoins currently circulating in the crypto market.

A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain (블록체인을 위한 양자 내성의 격자 기반 블라인드 서명 기법)

  • Hakjun Lee
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.76-82
    • /
    • 2023
  • In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.

A Study on DB Security Problem Improvement of DB Masking by Security Grade (DB 보안의 문제점 개선을 위한 보안등급별 Masking 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.101-109
    • /
    • 2009
  • An encryption module is equipped basically at 8i version ideal of Oracle DBMS, encryption module, but a performance decrease is caused, and users are restrictive. We analyze problem of DB security by technology by circles at this paper whether or not there is an index search, object management disorder, a serious DB performance decrease by encryption, real-time data encryption beauty whether or not there is data approach control beauty circular-based IP. And presentation does the comprehensive security Frame Work which utilized the DB Masking technique that is an alternative means technical encryption in order to improve availability of DB security. We use a virtual account, and set up a DB Masking basis by security grades as alternatives, we check advance user authentication and SQL inquiry approvals and integrity after the fact through virtual accounts, utilize to method as collect by an auditing log that an officer was able to do safely DB.

A Study on Intention to Use Personal Cloud Services: Focusing on Value Comparison (개인용 클라우드 서비스 사용 의도 연구: 가치 비교를 중심으로)

  • Kyunghoi Min;Chanhee Kwak;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.1-24
    • /
    • 2020
  • Cloud computing technology is expanding its services to individual consumers through storage and applications. This study aims to compare the predisposing factors that affect the perceived value and the intention to use between users who have used or experienced services and those who have never experienced services from the perspective of benefit and sacrifice based on the value-based acceptance model. The results showed that the sacrifice factor (perceived cost) had a significant effect on perceived value and perceived value had a significant effect on intention to use, but showed a difference in perceived benefit. Perceived usefulness, ubiquity, and network effects had significant impact for experienced users' perceived value, but for inexperienced users, ubiquity did not have significant impact. In addition, usefulness was the most significant factor for experienced users while network effect was the same for inexperienced users. The results of this study suggest that consumers' intention to use personal cloud service is evaluated as a benefit and sacrifice point and a new attempt to re-examine the role of previous experience.

Exploring the Analysis of Domestic ERP Process using Process Mining: A Case Study in a Korean Cosmetics Manufacturing Company (프로세스 마이닝을 활용한 국내 중소기업 ERP 프로세스 분석에 관한 연구: 국내 화장품 제조기업의 사례를 중심으로)

  • Jin Woo Jung;Yeong Shin Lee;Bo Kyoung Lee;Jung Yeon Kim;Young Sik Kang
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.81-98
    • /
    • 2018
  • ERP supports the automation and integration of business processes of enterprises and records voluminous data about the business activities of enterprises. The academe and business enterprises are focusing on process mining, which improves the performance of business processes and strengthens compliance. However, these studies focused on analysis of the business process of large companies, which adopts foreign ERP, such as SAP ERP or Oracle ERP. In comparison with foreign ERP, domestic ERP lags behind in terms of logging and managing of event data. Therefore, the application of process mining to domestic ERP is a challenging task. The present study aims to analyze domestic ERP based on process mining to overcome this challenge. This study discusses the lessons learned from a case study in a Korean cosmetics manufacturing company. Our results are expected to strengthen the competitiveness of Korean small and medium-sized enterprises that adopt domestic ERP and realize the outcomes of the large investment of the Korean government on the ERP implementation of enterprises.

Measuring a Range of Information Dissemination in a Traffic Information System Based on a Vehicular ad hoc Network (Vehicular ad hoc network 기반 교통 정보 시스템에서 차량간 통신에 의한 정보 전달 범위 측정)

  • Kim, Hyoung-Soo;Shin, Min-Ho;Nam, Beom-Seok;Lovell, David J.
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.12-20
    • /
    • 2008
  • Recent wireless communication technologies are envisioned as an innovative alternative to solve transportation problems. On ad hoc networks, as a wireless communication technology, nodes can communicate data without any infrastructure. In particular, vehicular ad hoc networks (VANETs), a specific ad hoc network applied to vehicles, enable vehicles equipped with a communication device to form decentralized traffic information systems in which vehicles share traffic information they experienced. This study investigated traffic information dissemination in a VANET-based traffic information system. For this study, an integrated transportation and communications simulation framework was developed, and experiments were conducted with real highway networks and traffic demands. The results showed that it took 3 minutes in the low traffic density situations (10 vehicle/lane.km) and 43 seconds in the high traffic density condition (40 vehicle/lane.km) to deliver traffic information of 5km away with 10% market penetration rate. In uncongested traffic conditions, information seems to be disseminated via equipped vehicles in the opposite direction. In congested traffic conditions, the sufficient availability of equipped vehicles traveling in the same direction reduces the chance to use vehicles in the opposing direction even though it is still possible.

  • PDF

Development of Forest Fire Information Management System using GIS (GIS를 이용한 산불 정보관리시스템 개발)

  • Jo, Myung-Hee;Oh, Jeong-Soo;Lee, Si-Young;Jo, Yun-Won;Baek, Seong-Ryul
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.3
    • /
    • pp.41-50
    • /
    • 2001
  • Recently our nature of environment has destroyed by a large scaled forest fire. In order to manage these forest fires, forecasting of it is considered as the most important thing. In this paper the database related to forest fire was first built and the efficient forest fire information management system was implemented by using GIS. The main goal of this system is that forest fire managers have GUI(graphic user interface) to analyze data of forest fire effectively and update and retrieve information in database. For the efficient GUI, this system is built in Visual Basic 6.0 and Map Object 2.0. Map Object 2.0 is combined to have various and powerful functionality of GIS analysis as component ware. The Oracle 8.0 is used as DBMS in this study to manage all the spatial and attributed information in database effectively. In the future, this system will play a critical role as making a decision supporting system for scientific forest fire protection and help real time forest fire hazard information offers service for public welfare administration business management.

  • PDF

Analysis, Detection and Prediction of some of the Structural Motifs in Proteins

  • Guruprasad, Kunchur
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.325-330
    • /
    • 2005
  • We are generally interested in the analysis, detection and prediction of structural motifs in proteins, in order to infer compatibility of amino acid sequence to structure in proteins of known three-dimensional structure available in the Protein Data Bank. In this context, we are analyzing some of the well-characterized structural motifs in proteins. We have analyzed simple structural motifs, such as, ${\beta}$-turns and ${\gamma}$-turns by evaluating the statistically significant type-dependent amino acid positional preferences in enlarged representative protein datasets and revised the amino acid preferences. In doing so, we identified a number of ‘unexpected’ isolated ${\beta}$-turns with a proline amino acid residue at the (i+2) position. We extended our study to the identification of multiple turns, continuous turns and to peptides that correspond to the combinations of individual ${\beta}$ and ${\gamma}$-turns in proteins and examined the hydrogen-bond interactions likely to stabilize these peptides. This led us to develop a database of structural motifs in proteins (DSMP) that would primarily allow us to make queries based on the various fields in the database for some well-characterized structural motifs, such as, helices, ${\beta}$-strands, turns, ${\beta}$-hairpins, ${\beta}$-${\alpha}$-${\beta}$, ${\psi}$-loops, ${\beta}$-sheets, disulphide bridges. We have recently implemented this information for all entries in the current PDB in a relational database called ODSMP using Oracle9i that is easy to update and maintain and added few additional structural motifs. We have also developed another relational database corresponding to amino acid sequences and their associated secondary structure for representative proteins in the PDB called PSSARD. This database allows flexible queries to be made on the compatibility of amino acid sequences in the PDB to ‘user-defined’ super-secondary structure conformation and vice-versa. Currently, we have extended this database to include nearly 23,000 protein crystal structures available in the PDB. Further, we have analyzed the ‘structural plasticity’ associated with the ${\beta}$-propeller structural motif We have developed a method to automatically detect ${\beta}$-propellers from the PDB codes. We evaluated the accuracy and consistency of predicting ${\beta}$ and ${\gamma}$-turns in proteins using the residue-coupled model. I will discuss results of our work and describe databases and software applications that have been developed.

  • PDF

Technique for Concurrent Processing Graph Structure and Transaction Using Topic Maps and Cassandra (토픽맵과 카산드라를 이용한 그래프 구조와 트랜잭션 동시 처리 기법)

  • Shin, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.3
    • /
    • pp.159-168
    • /
    • 2012
  • Relation in the new IT environment, such as the SNS, Cloud, Web3.0, has become an important factor. And these relations generate a transaction. However, existing relational database and graph database does not processe graph structure representing the relationships and transactions. This paper, we propose the technique that can be processed concurrently graph structures and transactions in a scalable complex network system. The proposed technique simultaneously save and navigate graph structures and transactions using the Topic Maps data model. Topic Maps is one of ontology language to implement the semantic web(Web 3.0). It has been used as the navigator of the information through the association of the information resources. In this paper, the architecture of the proposed technique was implemented and design using Cassandra - one of column type NoSQL. It is to ensure that can handle up to Big Data-level data using distributed processing. Finally, the experiments showed about the process of storage and query about typical RDBMS Oracle and the proposed technique to the same data source and the same questions. It can show that is expressed by the relationship without the 'join' enough alternative to the role of the RDBMS.