• Title/Summary/Keyword: Permission System

Search Result 277, Processing Time 0.025 seconds

Web 3.0 Business Model Canvas of Metaverse Gaming Platform, The Sandbox

  • Song, Minzheong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.119-129
    • /
    • 2024
  • We look at Web 3.0 business model canvas (BMC) of metaverse gaming platform, The Sandbox (TS). As results, the decentralized, blockchain-based platform, TS benefits its creators and players by providing true ownership, tradability of decentralized assets, and interoperability. First, in terms of the governance and ownership, The SAND functions a governance token allowing holders to participate in decision and SAND owners can vote themselves or delegate voting rights to other players of their choice. Second, in terms of decentralized assets and activities, TS offers three products as assets like Vox Edit as a 3D tool for voxel ASSETS, Marketplace as NFT market, and Game Maker as a visual scripting toolbox. The ASSETS made in Vox Edit, sold on the Marketplace, can be also utilized with Game Maker. Third, in terms of the network technology, in-game items are no longer be confined to a narrow ecosystem. The ASSETS on the InterPlanetary File System (IPFS) are not changed without the owner's permission. LAND and SAND are supported on Polygon, so that users interact with their tokens in a single place. Last, in terms of the token economics, users can acquire in-game assets, upload these assets to the marketplace, use for paying transaction fees, and use these as governance token for supporting the foundation.

The Voluntary Assurance of Quality by Contractors in the Construction Phase (건설 공사단계에서 수급자 중심의 품질확보방안)

  • Cha, Sang-Ho;Lee, Sang-Beom
    • Journal of the Korea Institute of Building Construction
    • /
    • v.11 no.3
    • /
    • pp.292-300
    • /
    • 2011
  • The construction industry in Korea has seen significant improvements in quality management techniques, driven by the dramatic development of new technology through Manhattanization and enlargements, but compared with technical development, the level of building quality improvement is still lagging behind. In the meantime, as the interest in construction quality soars due to changes in user consciousness, the level of quality that is being demanded is rising. The government has reinforced quality systems by implementing responsible supervision requirements and granting overseas companies permission to enter the supervision business in Korea, and private sector companies also are attempting quality improvement through quality assurance approaches like the preliminary qualification screening system and ISO 9000 series. But currently, building constructions are done only according to the construction specifications of project owners, whose design, materials and construction methods are already decided, and do not leave any necessity or opportunity for technical developments for the quality improvement of contractors. Therefore, in this study, a work process and system improvement plan for payment regulations is proposed, with which contractors can secure quality voluntarily in the building construction phase.

Efficient Management of Tunnel Construction Informations using ITIS(Intelligent Tunnelling Information System) (ITIS를 활용한 효율적인 터널 정보화 시공 관리)

  • Kim, Chang-Yong;Hong, Sung-Wan;Bae, Gyu-Jin;Kim, Kwang-Teom;Son, Moo-Rak;Han, Byeong-Hyeon
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2004.03b
    • /
    • pp.946-951
    • /
    • 2004
  • ITIS is applied to the several tunnel construction sites in Korea. Tunnel construction properties which are acquired from these sites are transferred to information management server(SQL 2000 server)by client application program in real time. Access permission to DB server depends on the user's roles. Some functions which cannot be embodied in SQL Server are serviced through XML and GMS server is used for spatial data based on GIS part. This system is supposed to give engineers the advantages which are not only easy handling of the program and computerized documentation on every information during construction but also analyzing the acquired data in order to predict the structure of ground and rock mass to be excavated later and show the guideline of construction. Neung-Dong tunnel and Mu-Gua express way tunnel are now under construction and with this system they have 3D visualized map of the geology and tunnel geometry and accumulate database of construction information such as tunnel face mapping results, special notes and pictures of construction and 3D monitoring data, all matters on the stability of rock bolts and shotcrete, and so on. Ground settlement prediction program included in ITIS, based on the artificial neural network(ANN) and supported by GIS technology is applying to the subway tunnel. This prediction tool can make it possible to visualize the ground settlement according to the excavation procedures by contouring the calculated result on 3D GIS map and to assess the damage of buildings in the vicinity of construction site caused by ground settlement.

  • PDF

The Signal Detection Algorithms for Reducing False Alarms of CR System in Real Environment (실환경 CR 시스템에서 오경보 감소를 위한 신호 검출 알고리즘)

  • Lim, Sun-Min;Jung, Hoi-Yoon;Kim, Sang-Won;Jeong, Byung-Jang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8C
    • /
    • pp.529-535
    • /
    • 2011
  • After permission for utilization of TV white space by FCC, a lot of attentions are focused on spectrum sensing, and various spectrum sensing methods have been proposed. However, they do not consider real environment, thus they are hard to achieve the required performance. In this paper, we propose resolutions for the problem which could be occurred in implementation of spectrum sensing module and verify performance of the proposed methods with computer simulation. The first proposed method utilizes channel status information to separate received signal and spurious for reducing false alarm probability caused by system internal spurious. The another proposed scheme is subband normalization method to prevent miss detection caused by multiple narrow band signals with different received signal strength. The simulation results verify that we can prevent false alarm cause by spurious components with the proposed system internal spurious cognition. Moreover, the proposed subband normalization method shows that it could overcome performance degradation caused by received signal strength difference.

A Study on the Construction of Charging System for Small Electric Vehicles Less than 1 [kW] (1[kW] 이하의 소형 전동차량용 충전설비 구축에 관한 연구)

  • Kim, Keunsik
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.93-99
    • /
    • 2019
  • Small electric vehicles, such as electric bicycles or electric kickboards, operate with the power charged in a battery mounted in the vehicle, and some of these users use emergency power sockets installed in apartments or public facilities without getting permission. For this reason, the necessity for a simple method to approve the use of power with instant payment system rises for the building managers and small vehicle users as well. In this paper, we propose a technique to charge batteries for small electric vehicles with less than 1 [kW] through a power supply control device installed on the existing 15 [A]. sockets on the common residential properties or public buildings. It also describes the power user authorization algorithm and how to charge fees for the power used. As a result of this research, this paper shows how the user authentication power supply system with the effect of preventing power theft can be realized by creating an environment in which a battery in a small electric vehicle can be easily charged.

A New Approach on the Arbitration Agreement (중재합의에 대한 새로운 고찰)

  • Sohn, Kyung-Han;Shim, Hyun-Joo
    • Journal of Arbitration Studies
    • /
    • v.23 no.1
    • /
    • pp.55-84
    • /
    • 2013
  • There should be an arbitration agreement between concerned parties in order to resolve a dispute through arbitration. The arbitration procedures, including the selection of the arbitrator and the adjudicative rights of the arbitrator, are based on the arbitration agreement. In other words, the arbitration procedure and adjudication can be carried out within the boundaries of the arbitration agreement. Traditionally, the Doctrine of Separability of the arbitration agreement has been acknowledged in order to emphasize its importance and to clearly separate it from the contract. Today, when the Doctrine of Separability of the arbitration agreement is well established, overemphasizing this separability could hamper its effectiveness and the autonomy of the parties. Moreover, arbitration agreements in the past were required to be written, clarifying the existence of the agreement and determining the scope of its validity. Further, an arbitration agreement was considered as narrowly as possible. However, since arbitration has become a generalized resolution for disputes, the formal or content requirements should be reconsidered. In terms of validity, the subjective and objective scope should necessarily be extended as a means to resolve disputes related to an arbitration agreement and reduce the resolution cost and duration. Under this perspective, the arbitration theory should now focus on arbitration agreements rather than the place of arbitration. We should break from the nationalistic view, which understands that the arbitration system is a part of the national legal system and that arbitration is allowed solely by permission of the nation. Instead, we should extensively reinterpret the subject of arbitration agreement and its range of effects so that disputes can be resolved between the concerned parties under a single procedure and norm, a necessary step forward. Moreover, in spite of the positive contribution and role of the New York Convention toward the establishment and development of the international arbitration system, there should be an effort to overcome its deterioration. As mentioned in the recommendations regarding the interpretation of the arbitration agreement in the New York Convention in 2006, we should begin by striving to match the Convention as a means of interpretation with the changes of the twenty-first century. Ultimately, we should meet the demands of the new era through amendments to the Convention.

  • PDF

PKI-based Distribution System of the User's Permission about Broadcast Program (PKI를 통한 방송프로그램 사용자 권한 유통시스템)

  • Im, Dae-Myung;Park, Ki-Chul;Lee, Joo-Young;Nam, Je-ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.649-652
    • /
    • 2009
  • Now Broadcasting system of TV has been developed from analogue to digital we call that IPTV(Internet Protocol Television) or DCATV(Digital Cable Television). But, The characteristics of digital broadcasting is the high-quality contents of easily and almost no damage piracy, and Copyright loss is increasing by Internet, P2P(Peer to Peer) and personal path. Nevertheless user's permissions that recorded and reuse of broadcasting can't restraint, And Training Materials etc. use of fair program needs to be separated from illegality. In this paper using a digital certificate permit the use of stored program to authorized user and user of fair purpose, And illegal distribution of restriction design and implement a distribution system.

  • PDF

Smartphone NFC based Access Control System (스마트폰 NFC 기반의 출입관리 시스템)

  • Bae, Sang-Jung;Jeon, Soon-Yeong;Lee, Sang-Hwa;Lee, Chan-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.596-597
    • /
    • 2016
  • Recently a variety of companies as the growing importance of big data are in the process of research and development for large-scale data collection and management. In addition, a situation that collects all necessary data inside and outside the enterprise to improve the manufacturing environment and the service environment. In this paper, we collect to ingest the mouth-time work for companies within the temple. Also, in conjunction with the NFC tag of the smart phone and employee information stored in the database. Utilizing this determines whether or not the employee attendance and the authority to automatically access to the database or resource within the enterprise. The proposed system is considered to be able to increase the accessibility and efficiency of a database or a resource in the enterprise.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Study on the Ways to Improve Uiwang ICD Facilities and Operation (의왕ICD 시설 및 운영개선 방안에 대한 연구)

  • Kim, Hyun-Ju;Kang, Sin-Seok;Park, Byeong-In
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.3268-3277
    • /
    • 2011
  • Uiwang ICD, which is the only inland container depot in the capital area, is equipped with modern facilities, and loading and unloading equipment, and can handle 1,000,000 TEU annually.It has many advantages such as advantageous conditions of location, the role of foothold for distribution transportation in the capital area, so it plays an important role of vitalizing the railroad transport. However, Uiwang ICD has reached the limit in the vitalization of railroad transport of containerized cargo due to the current problems in facilities and operations. This research analyzed the Uiwang ICD's problems by dividing them into facilities problems and operational problems, and presented short-term and medium and long-term improvement measures with the year 2023 when the private use permission expires as the basic year. However, the vitalization of railroad transport of Uiwang ICD can be attained only when it has support and cooperation from the government, Uiwang-si, Korea Rail Network Authority, and other related organizations together with efforts of Korea Railroad Corporation, and occupant companies. Such improvement measures for Uiwang ICD are expected to contribute to establishing combined transport system and forming efficient railroad distribution infrastructures and vitalizing railroad distribution, and also contribute to the government's low-carbon green growth policy by building environment-friendly transport system.

  • PDF