• Title/Summary/Keyword: Transaction Support System

Search Result 148, Processing Time 0.028 seconds

A Study on the Replication Consistency Model for the Mapping System on the Client-Sewer Environment (클라이언트-서버 환경의 매핑 시스템 개발을 위한 복제 일관성 모델에 관한 연구)

  • Lee, Byung-Wook;Park, Hong-Gi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.5 no.2 s.10
    • /
    • pp.193-205
    • /
    • 1997
  • It is required for multi-users to share massive mapping data effectively that distributed data model in the Client-Server environment is developed for the replication consistency. The existing model is not effective to the long transaction just like a mapping system, since it does not account lot consistency between GUI screen and database replications even though it emphasizes on the replication consistency. The performance of concurrency control is very important for those long transactions, especially the mapping systems. This model is to support consistency between GUI screen and replicas using display locks. It suggests consistency model improving process performance by modifying memory consistency model and optimistic concurrency control for mapping data's characteristics.

  • PDF

Design and Implementation of 10 Giga VPN Acceleration Board (10 Giga급 VPN 가속보드 설계 및 구현)

  • 김기현;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.661-664
    • /
    • 2003
  • Trade-off of sorority and speed always exists in the latest network environment. Recently, developed security processors is improved very performance, and sorority connection algorithms of a lot of part were embodied by hardware. This high speed security processor is essential ingredient in string network security solution equipment development that require very big band width. In this paper, we wish to describe about design and implementation of 10 Giga VPN equipments. In this system, embodied 10 Giga to use Cavium company's Nitrox-II processor, and supports two SP14-2 interface and PCI interface. All of the password algorithm that password algorithm that support is used in common use VPN equipment for compatibility with common use VPN equipment are supported and support SEED algorithm developed in domestic. Designed to support IPsec and SSL protocol, and supports all of In-Line structure that is profitable in high speed transaction and the Look-Aside structure that is profitable in practical use degree of NPU(Network Processor Unit).

  • PDF

Development of The Safe Driving Reward System for Truck Digital Tachograph using Hyperledger Fabric (하이퍼레저 패브릭을 이용한 화물차 디지털 운행기록 단말기의 안전운행 보상시스템 구현)

  • Kim, Yong-bae;Back, Juyong;Kim, Jongweon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.47-56
    • /
    • 2022
  • The safe driving reward system aims to reduce the loss of life and property by reducing the occurrence of accidents by motivating safe driving and encouraging active participation by providing direct reward to vehicle drivers who have performed safe driving. In the case of the existing digital tachograph, the goal is to limit dangerous driving by recording the driving status of the vehicle whereas the safe driving reward system is a support measure to increase the effect of accident prevention and induces safe driving with financial reward when safe driving is performed. In other words, in an area where accidents due to speeding are high, direct reward is provided to motivate safe driving to prevent traffic accidents when safe driving instructions such as speed compliance, maintaining distance between vehicles, and driving in designated lanes are performed. Since these safe operation data and reward histories must be managed transparently and safely, the reward evidences and histories were constructed using the closed blockchain Hyperledger Fabric. However, while transparency and safety are guaranteed in the blockchain system, low data processing speed is a problem. In this study, the sequential block generation speed was as low as 10 TPS(transaction per second), and as a result of applying the acceleration function a high-performance network of 1,000 TPS or more was implemented.

A Dynamic Path Computation Database Model in Mobile LBS System (모바일 LBS 시스템에서 동적 경로 계산 데이터베이스 모델)

  • Joo, Yong-Jin
    • Spatial Information Research
    • /
    • v.19 no.3
    • /
    • pp.43-52
    • /
    • 2011
  • Recently, interest in location-based service (LBS) which utilizes a DBMS in mobile system environment has been increasing, and it is expected to overcome the existing file-based system's limitation in advanced in-vehicle system by utilizing DBMS's advantages such as efficient storage, transaction management, modelling and spatial queries etc. In particular, the road network data corresponds to the most essential domain in a route planning system, which needs efficient management and maintenance. Accordingly, this study aims to develop an efficient graph-based geodata model for topological network data and to support dynamic path computation algorithm based on heuristic approach in mobile LBS system. To achieve this goal, we design a data model for supporting the hierarchy of network, and implement a path planning system to evaluate its performance in mobile LBS system. Last but not least, we find out that the designed path computation algorithm with hierarchical graph model reduced the number of nodes used for finding and improved the efficiency of memory.

A study on Mutual Authentication of Copyright between Korea-China and Trade Cooperation (한.중 저작권 상호인증과 통상협력과제)

  • Lee, Chan-Do
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.3-24
    • /
    • 2014
  • When the Korean Wave was sweeping over China, Asia, Other Countries, Some people worried that the ambiguity of the copyright act would obstruct export of the entertainment contents. To solve this problem, the copyright authentication was introduced in the copyright act, enforcement for its, etc. There are two authentication systems at copyright. One is right authentication protected by copyright, Other one is licence authentication received from the owner. This study is meant to seeking the problem of insufficient regulation related to copyright authentication. According to analysis of FGI in this study, the existing system does not support a proper and specific way how to suggest a long term perspective in the transaction of Korean Contents between Korea and China. The key to success of copyright authentication system between Korea and China depends upon the implementation of the system of copyright mutual authentication. To do so, In reality, laws, institutions, technologies, policies, and operations, etc. should be Inter-operability. Also we should realize that this system gives mutual benefits at transaction between the two countries. Thus, it is important for two countries to effort trade cooperation continuously.

  • PDF

Design and Verification of PCI 2.2 Target Controller to support Prefetch Request (프리페치 요구를 지원하는 PCI 2.2 타겟 컨트롤러 설계 및 검증)

  • Hyun Eugin;Seong Kwang-Su
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.523-530
    • /
    • 2005
  • When a PCI 2.2 bus master requests data using Memory Read command, a target device may hold PCI bus without data to be transferred for long time because a target device needs time to prepare data infernally. Because the usage efficiency of the PCI bus and the data transfer efficiency are decreased due to this situation, the PCI specification recommends to use the Delayed Transaction mechanism to improve the system performance. But the mechanism cann't fully improve performance because a target device doesn't know the exact size of prefetched data. In the previous work, we propose a new method called Prefetch Request when a bus master intends to read data from the target device. In this paper, we design PCI 2.2 controller and local device that support the proposed method. The designed PCI 2.2 controller has simple local interface and it is used to convert the PCI protocol into the local protocol. So the typical users, who don't know the PCI protocol, can easily design the PCI target device using the proposed PCI controller. We propose the basic behavioral verification, hardware design verification, and random test verification to verify the designed hardware. We also build the test bench and define assembler instructions. And we propose random testing environment, which consist of reference model, random generator ,and compare engine, to efficiently verify corner case. This verification environment is excellent to find error which is not detected by general test vector. Also, the simulation under the proposed test environment shows that the proposed method has the higher data transfer efficiency than the Delayed Transaction about $9\%$.

U-Commerce in Service Space : Business Model Analysis and Case Study (서비스 공간에서의 유비쿼터스 상거래 비즈니스 모델 분석 및 사례연구)

  • Lee, Hyun-Seok;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.45-61
    • /
    • 2008
  • Previous U-Commerce researches have dealt with the business support systems for traditional commerce space such as real world shopping malls. This paper investigates U-Commerce business models in service space. The McDonald's Touch-Order case is analyzed from business model perspective and the Media-Embedded Place business model is introduced as a U-Commerce business model for value creation in service space. The media-embedded place business model attaches auto-identification tags to tables or billboards, triggers commercial transaction through the tags, and shares the revenues and the incentives among the place owners and commerce/content providers. This paper analyzes its scenario and applications and illustrates the profitability analysis using so-called 'tag evaluation model'.

  • PDF

A Proposal for the Online ADR Model Building on Electronic Commerce Dispute Resolution (전자상거래 분쟁해결을 위한 온라인 ADR 모델구축에 관한 연구)

  • Kim, Sun-Kwang
    • International Commerce and Information Review
    • /
    • v.8 no.2
    • /
    • pp.101-117
    • /
    • 2006
  • "Online Alternative Dispute Resolution" can refer to the use of online methods of dispute resolution to resolve disputes arising either online or offline. The range of disputes covered by online ADR has been broad : from family law to internet domain name disputes : from small transaction to insurance disputes. Online and offline consumer disputes have been a major focus of online ADR sites. This article propsed that the mediator should explain the process and the mediator's role so as to forestall misunderstanding on that score. And mediators should consider including in either usual mediation agreements additional provisions applicable to communications by email. Online ADR sites should be designed 1) to provide a simple, easily understandable process, 2) to provide detailed information on process, cost and speed, 3) to enable users to move between online and offline processes, 4) to have authentication processes for parties and documents, 5) to have automatic translation system for language barriers. And Government should play an important role in assisting people to adapt technically and emotionally to new technology through information, training and ongoing support. The days of live online television-quality videoconferencing have not yet arrived. Until then, we must hone our skills with the written word.

  • PDF

Use Analysis and Evaluation of MEDLIS(MEDical Library Information System) Document Delivery Service (의학학술지종합정보시스템(MEDLIS)의 원문제공서비스 이용 분석과 평가)

  • Chang, Hye-Rhan;Kim, Jeong-A
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.3
    • /
    • pp.233-250
    • /
    • 2012
  • The purpose of this study is to assess the development, current states, and problems of MEDLIS document delivery service. With the analysis of MEDLIS transaction data from 2001 to 2011, we identified continuous usage decrease, unbalanced contribution by type of institution, high dependence on back issues, use differences among subfields of medicine, relatively low success rate, and various reasons for failure. Based on the results, recommendations for the maintenance of union catalog database, technical support for search capability enhancements, establishment of back issue archiving policy, user training and publicity, and membership expansion are suggested to promote the service.

A cost model for determining optimal audit timing with related considerations for accounting data quality enhancement

  • Kim, Kisu
    • Korean Management Science Review
    • /
    • v.12 no.2
    • /
    • pp.129-146
    • /
    • 1995
  • As society's relience on computerized information systems to support a wide range of activities proliferates, the long recognized importance for adequate data quality becomes imperative. Furthermore, current trends in information systems such as dispersal of the data resource together with its management have increased the difficulty of maintaining suitable levels of data integrity. Especially, the importance of adequate accounting (transaction) data quality has been long recognized and many procedures (extensive and often elaborate checks and controls) to prevent errors in accounting systems have been introduced and developed. Nevertheless, over time, even in the best maintained systems, deficiencies in stored data will develop. In order to maintain the accuracy and reliability of accounting data at certain level, periodic internal checks and error corrections (internal audits) are required as a part of internal control system. In this paper we develop a general data quality degradation (error accumulation ) and cost model for an account in which we have both error occurrences and error amounts and provide a closed form of optimal audit timing in terms of the number of transactions that should occur before an internal audit should be initiated. This paper also considers the cost- effectiveness of various audit types and different error prevention efforts and suggests how to select the most economical audit type and error prevention method.

  • PDF