• Title/Summary/Keyword: Transaction Model

Search Result 733, Processing Time 0.024 seconds

Database Construction for Design of the Components Software by Using an Incremental Update Propagation

  • Oh, Am-Suk;Kwon, Oh-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.583-593
    • /
    • 2003
  • Engineering design applications require the support of long transactions in cooperative environments. The problem of the existing copy/update/merge approaches is that the partial effects of a committed transaction may be not part of the merged version. This paper introduces a new cooperative transaction model, which allows updates to be progressively notified or propagated into other transactions accessing the same object. To support incremental update propagation and notification, we use the term dynamic dependency to define the intertransaction dependency relationships among all the objects checked out from the public database. Consistency in multiple copies of the same object is achieved by a two-phase delta-merge protocol. Our model provides a synchronization of cooperative updates performed in several workspaces without using locking mechanisms.

  • PDF

PoW-BC: A PoW Consensus Protocol Based on Block Compression

  • Yu, Bin;Li, Xiaofeng;Zhao, He
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1389-1408
    • /
    • 2021
  • Proof-of-Work (PoW) is the first and still most common consensus protocol in blockchain. But it is costly and energy intensive, aiming at addressing these problems, we propose a consensus algorithm named Proof-of-Work-and-Block-Compression (PoW-BC). PoW-BC is an improvement of PoW to compress blocks and adjust consensus parameters. The algorithm is designed to encourage the reduction of block size, which improves transmission efficiency and reduces disk space for storing blocks. The transaction optimization model and block compression model are proposed to compress block data with a smaller compression ratio and less compression/ decompression duration. Block compression ratio is used to adjust mining difficulty and transaction count of PoW-BC consensus protocol according to the consensus parameters adjustment model. Through experiment and analysis, it shows that PoW-BC improves transaction throughput, and reduces block interval and energy consumption.

A Dual Path Model of Intention to Use QR Code Virtual Stores -The Moderating Effect of Consumer Use Experience- (QR코드 가상점포 사용의도의 이중경로모델 -소비자 사용경험의 조절효과-)

  • Kim, Eun Young;Yoon, Namhee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.38 no.6
    • /
    • pp.913-928
    • /
    • 2014
  • This study estimated a dual path model to predict consumers' intention to use a QR code virtual store by the effect of a mobile transaction system and a facilitating condition that also examined the role of experience and the use of an intention model in the context of a QR code virtual store. A longitudinal field study was conducted at selected QR code virtual stores. A questionnaire containing mobile transaction system, facilitating condition, performance expectancy, effort expectance, and intention to use was administered at two different points in time: Initial use (T1) and the second use after one month (T2). This study sampled 109 subjects who voluntarily participated in field studies twice at different time points (pooled sample=218). Participants were asked to visit at the QR code virtual store and undertake shopping tasks on their smartphones. The estimated dual path model showed that a mobile transaction system had a positive effect on performance expectancy, which influenced intention to use; however, facilitating condition had a positive effect on effort expectancy, but the effort expectance did not lead to intention to use. The effort expectance significantly also affected the performance expectance influencing intention to use QR code virtual stores. It was also found that use experience moderated the effect of mobile transaction systems on performance expectancy. The findings discussed a critical and success factor in consumer technology acceptance and use over time. A managerial implication was also discussed to capture potential users by emphasizing performance expectancy with the superiority of an innovative system or consumer facilitating condition as external resources in the introduction stage of new technology.

Business Transaction Preparation Plan for Business Reference Model Management (BRM 운영을 위한 단위과제 정비방안)

  • Kim, Hwa-Kyoung;Kim, Eun-Ju
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.14 no.4
    • /
    • pp.199-219
    • /
    • 2014
  • BRM (Business Reference Model, hereinafter referred to as BRM) has been introduced with the objective to improve task-related information sharing among organizations, task processing speed, efficiency of organization management, and administrative services. Furthermore, a Records Management Reference Table, which is a business-based records management system, has been put in to operation. However, it is necessary to reidentify if the BRM is put into use according to its initial objectives and purposes after 10 years of its introduction based on the pending problems and matters of improvement. Therefore, in this study, the necessity for business transaction management has been reviewed based on the problems present in the "business transaction" operation, which is the lowest unit of BRM, and it proposes a business transaction identification plan through a business analysis. As a result, three major points to improve BRM management have been suggested.

A Deep Learning Application for Automated Feature Extraction in Transaction-based Machine Learning (트랜잭션 기반 머신러닝에서 특성 추출 자동화를 위한 딥러닝 응용)

  • Woo, Deock-Chae;Moon, Hyun Sil;Kwon, Suhnbeom;Cho, Yoonho
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.143-159
    • /
    • 2019
  • Machine learning (ML) is a method of fitting given data to a mathematical model to derive insights or to predict. In the age of big data, where the amount of available data increases exponentially due to the development of information technology and smart devices, ML shows high prediction performance due to pattern detection without bias. The feature engineering that generates the features that can explain the problem to be solved in the ML process has a great influence on the performance and its importance is continuously emphasized. Despite this importance, however, it is still considered a difficult task as it requires a thorough understanding of the domain characteristics as well as an understanding of source data and the iterative procedure. Therefore, we propose methods to apply deep learning for solving the complexity and difficulty of feature extraction and improving the performance of ML model. Unlike other techniques, the most common reason for the superior performance of deep learning techniques in complex unstructured data processing is that it is possible to extract features from the source data itself. In order to apply these advantages to the business problems, we propose deep learning based methods that can automatically extract features from transaction data or directly predict and classify target variables. In particular, we applied techniques that show high performance in existing text processing based on the structural similarity between transaction data and text data. And we also verified the suitability of each method according to the characteristics of transaction data. Through our study, it is possible not only to search for the possibility of automated feature extraction but also to obtain a benchmark model that shows a certain level of performance before performing the feature extraction task by a human. In addition, it is expected that it will be able to provide guidelines for choosing a suitable deep learning model based on the business problem and the data characteristics.

Dynamic Transaction Processing in Distributed Real-Time Systems (실시간 분산 시스템을 위한 동적 트랜잭션 처리)

  • Yun, Yong-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.738-747
    • /
    • 1999
  • 본 논문에서는 분산 실시간 시스템의 특징인 분산 처리 과정의 신뢰성을 지원하기 위한 동적 트랜잭션 처리 구조를 연구하였다. 실시간 분산 처리 환경에서 동적으로 발생하는 실시간 분산 트랜잭션 처리를 위하여 트랜잭션 내에 필수적인 3가지 언어적 특성들을 제시하였다. 첫째는 트랜잭션 내에 실시간 시스템의 가장 중요한 특징인 시간적인 제약 조건들을 정의 할 수 있는 방안을 제시하고, 둘째는 비동기적인 처리 성격을 지닌 실시간 특성을 고려한 비동기적 트랜잭션 처리 방법을 제시한다. 또한, 분산 처리 과정에서 발생되는 예외 사항들을 처리하기 위하여 긴급성을 고려한 다중레벨 우선순위 스케줄링 (Multi-Level Priotiry Scheduling)이라 부르는 트랜잭션 스케줄링 방안을 제시한다. 그리고, 제시한 실시간 분산 트랜잭션 처리 구조의 타당성 및 가능성을 입증하기 위한 실시간 트랜잭션 처리 과정을 시물레이션을 통하여 제시한 언어적 특성에 대한 고려 사항들을 보여준다.Abstract We propose a dynamic transaction processing model that supports a reliability for distributed real-time processing. For the dynamic processing in distributed real-time transaction systems, we suggest three features that are defined in programming language. First, we propose a specification model to explicitly define the time constraints, needs in real-time distributed processing. Second, we describe an asynchronous transaction processing mechanism based on the real-time characteristics. So, we suggest three communication primitives to support asynchronous transaction processing. Lastly, a scheduling policy based on urgent transaction is suggested to manage the exception occurred during the distributed processing. This scheduling policy is called multi-level priotiry scheduling (MPLS). Based on three features and scheduling policy, we describe a direction to manage a dynamic transaction processing in distributed real-time systems.

An Empirical Study on the Detection of Phantom Transaction in Online Auction (온라인 경매에의 카드깡 탐지요인에 대한 실증적 연구)

  • Chae Myeong-Sin;Jo Hyeong-Jun;Lee Byeong-Chae
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.68-98
    • /
    • 2004
  • Although the internet is useful for transferring information, Internet auction environments make fraud more attractive to offenders because the chance of detection and punishment are decreased. One of fraud is phantom transaction which is a colluding transaction by the buyer and seller to commit illegal discounting of credit card. They pretend to fulfill the transaction paid by credit card, without actual selling products, and the seller receives cash from credit card corporations. Then seller lends it out buyer with quite high interest rate whose credit score is so bad that he cannot borrow money from anywhere. The purpose of this study is to empirically investigate the factors to detect of the phantom transaction in online auction. Based up on the studies that explored behaviors of buyers and sellers in online auction, bidding numbers, bid increments, sellers' credit, auction length, and starting bids were suggested as independent variables. We developed an Internet-based data collection software agent and collect data on transactions of notebook computers each of which winning bid was over 1,000,000 won. Data analysis with logistic regression model revealed that starting bids, sellers' credit, and auction length were significant in detecting the phantom transaction.

  • PDF

Clustering analysis and classification of cryptocurrency transaction using genetic algorithm (유전알고리즘을 이용한 암호화폐 거래정보의 군집화 분석 및 분류)

  • Park, Junhyung;Jeong, Seokhyeon;Park, Eunsik;Kim, Kyungsup;Won, Yoojae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.22-26
    • /
    • 2018
  • In this paper, we propose a model that classifies different transaction information by clustering and learning through similarity and transaction pattern of cryptocurrency transaction information. By using characteristics of genetic algorithms, we can get better clustering performance by eliminating unnecessary elements in clustering process. The transaction information including the clustering value is set as the training data, and the transaction information can be predicted through the classification algorithm. This can be used to automatically detect abnormal transactions from various transaction information of the cryptocurrency.

  • PDF

A Study on the Risk Management in International Transaction of Digital Goods (디지털물(物) 국제법래(國際去來)의 리스크관리방안(管理方案)에 관한 연구(硏究))

  • Ahn, Byung-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.143-172
    • /
    • 2006
  • This study focuses on the risk management of "Digital Goods" appeared with the progress of information technology(IT) in international transaction. As a result of that digital goods have a lot of uncertainty between the general goods or service which have been deal with object of international transaction broadly because digital goods hold uniqueness. In this study, the author give a definition of "Digital Goods" and make an examination of uniqueness of that in international transaction. Next, six risks are defined base on risk theory and risk analysis matrix applying risk mapping model is made. Conclusionally, risk transfer as insurance is adequate to manage business risk, security risk, credit risk and legal risk. Meanwhile, risk avoidance is adequate to manage reputation risk and market risk. But, this study have following three limits. Firstly, concerning definition of the risk, real case is not applied owing to lack of transaction data. Secondly, measuring of the risk is not based on absolute data but relative data. Lastly, suggesting way of risk management is not concrete and practical to international trader of digital goods.

  • PDF

The ASK_a Service Model for Public Library in Korea (우리나라 공공도서관의 ASK_a 서비스 모형 개발)

  • Nam, Young-Joon;Lee, Hyang-Sook
    • Journal of Information Management
    • /
    • v.37 no.1
    • /
    • pp.57-81
    • /
    • 2006
  • The new service of Korean public library, ASK_a service model suggests a new management practice in collaborative digital reference services. The model has three functions: input transaction, process transaction, and output transaction. The best form for input is the web form. The best form for process is a model with a hybrid type of public libraries(hierarchical and lateral type). The output suggests the archiving policy for gathering the query-answer data. The core of this model is providing an advanced information service to its users through cooperation with public libraries and external manpower.