• Title/Summary/Keyword: block chain

Search Result 418, Processing Time 0.023 seconds

Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain (이벤트 소싱 패턴과 블록 체인을 활용한 모바일 게임 클라이언트 메모리 조작 방지 방안)

  • Park, Jihun;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.477-486
    • /
    • 2022
  • This study aims to present a method using event sourcing patterns and blockchain as a way to cope with vulnerabilities in memory manipulation at the client level. To verify the plan, the method of running the memory operation application was analyzed, and the performance was compared and analyzed when the memory operation prevention plan was applied by fabricating a test application. As a result of the analysis, the usage of memory increased compared to the method of XOR operation by storing major data in one memory, but it was possible to prevent the operation of the memory operation program without significantly affecting the performance of the game.

Smart contract research for efficient learner problem recommendation in online education environment (온라인 교육 환경에서 효율적 학습자 문제추천을 위한 스마트 컨트랙트 연구)

  • Min, Youn-A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.195-201
    • /
    • 2022
  • For a efficient distance education environment, the need for correct problem recommendation guides considering the learner's exact learning pattern is increasing. In this paper, we study block chain based smart contract technology to suggest a method for presenting the optimal problem recommendation path for individual learners based on the data given by situational weights to the problem patterns of learners collected in the distance education environment. For the performance evaluation of this study, the learning satisfaction with the existing similar learning environment, the usefulness of the problem recommendation guide, and the learner data processing speed were analyzed. Through this study, it was confirmed that the learning satisfaction improved by more than 15% and the learning data processing speed was improved by more than 20% compared to the existing learning environment.

Epidermal Growth Factor Induces Bcl-xL Gene Expression and Reduces Apoptosis in Porcine Diploid Parthenotes Developing in vitro

  • X. S. Cui;M. R. Shin;S. H. Jun;Kim, N. H.
    • Proceedings of the KSAR Conference
    • /
    • 2003.06a
    • /
    • pp.53-53
    • /
    • 2003
  • The aim of this study was to determine the interactive effects of BSA and EGF on the viability and development of porcine diploid parthenotes developing in vitro. The addition of 0.1 and 0.4% BSA to the culture medium enhanced the development of 4-cell parthenotes to the blastocyst stage but EGF had no effect. However, while BSA also increased cell numbers, it did so only when EGF was also present. Either agent on its own had no effect. Similarly, apoptosis in the blastocysts was not influenced by either agent on its own but was reduced when both BSA and EGF were present. Furthermore, semi-quantitative reverse-transcriptase polymerase chain reaction (RT-PCR) revealed that EGF enhanced the mRNA expression of BclxL in the presence of 0.4% BSA but BSA and EGF alone had no effect. EGF and/or BSA did not influence Bak gene expression in the blastocyst stage parthenotes. These results suggest that BSA has both beneficial and detrimental effects on the viability of porcine diploid parthenotes developing in vitro and that exogenous EGF may block some of the detrimental effects of BSA, possibly by inhibiting the BSA-induced apoptosis by increasing Bcl-xL expression. This results in a net increase in cell numbers in porcine diploid parthenotes developing in vitro.

  • PDF

Smart Railway Communication Standardization Trend and Direction (스마트 철도 통신 표준화 동향과 지향점)

  • Kim, Jong-Ki
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.207-212
    • /
    • 2022
  • The rail transport system is developing into a smart railroad that pursues intelligence beyond the automation stage of each component in recent years. Smart railways based on ICT (: Information & Communications Technology) technologies such as IoT (: Internet of Things), big data, deep learning, AI (: Artificial Intelligence), and block chain are expected to cause many developmental changes in domestic and foreign railway technologies. In this paper, we look at the domestic and international standardization trends of railway communication technology, which forms the basis of such smart railway system, and discuss the direction for train control technology(CBTC) in Korea's railway transportation system to become a leading technology(UBTC) in the world railway industry in the future.

Design of Multi-Step Authentication Method using Blockchain (특성화고등학교의 실습 수업을 위한 블록체인과 디지털 트윈 활용 학습 방안 : 덴소 6축 로봇을 중심으로)

  • Kim, Semin;Hong, Sunghyuck
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.511-513
    • /
    • 2021
  • In this study, digital twin technology and block chain technology are used to provide. A learning method was suggested. The medium used in this study is a 6-axis robot released by Denso, and the operating coordinates of the equipment can be converted into data through the data displayed on each axis. In addition, the results of the practice can be stored in the blockchain to ensure the confidentiality and integrity of the evaluation. The method proposed in this study is expected to be of great help to practical classes in specialized high schools even in the COVID-19 pandemic.

  • PDF

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

A Study on the Acceptability of Digital Transformation in the Port Logistics (항만물류분야의 디지털 전환 수용성에 관한 연구)

  • Hyeon-Deok Song;Myung-Hee Chang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.298-299
    • /
    • 2022
  • Digital Transformation in the maritime transportation sector means "by utilizing digital technologies such as artificial intelligence, big data, Internet of Things, block chain, and cloud to create new business models, products, and services for maritime transportation-related companies. It can be defined as a continuous process that adapts to or drives disruptive changes in the market" (Chang, 2021). In a situation where various digital conversion technologies are applied and started to be used in the domestic port logistics field, active acceptance by members can bring about the success of digital conversion. Therefore, in this study, in order to investigate the acceptability of digital transformation in the domestic port logistics sector,

  • PDF

Development of Web 3.0 based shopping mall (Web3.0 기반 쇼핑몰 개발)

  • Hyo Hyun Choi;Byeong Seon Lee;Dae Joon Lee;Dong Geon Kim;Bong Joon Kim
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.301-302
    • /
    • 2024
  • 본 논문은 웹 3.0 환경을 적용한 쇼핑몰 플랫폼의 구축을 목표로 하며, 이를 통해 참여자들이 블록체인 기술을 이해하고 활용할 수 있도록 하는 것을 중점으로 한다. MetaMask[1] 결제 및 로그인 통합을 통해 사용자는 간편하게 결제하거나 로그인할 수 있으며, 블록체인 스마트컨트랙트를 기반으로한 결제 시스템을 도입하여 높은 수준의 보안을 제공한다. 또한, 웹 3.0 기술을 도입하여 분산형 데이터 저장 방식을 채택하여 차별성을 확보한다. 이 프로젝트는 기존 쇼핑몰의 효율성을 높이고 사용자들에게 현대 기술 트렌드를 체험하게 함으로써 웹 3.0 시대에 걸맞은 차별화된 서비스를 제공하고자 한다.

  • PDF

An Empirical Study on the Factors Affecting the Intention to Use M2E Services

  • Sang Hoon Lee;Min-Ju Kim;Su-Yeon Kim
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.792-811
    • /
    • 2023
  • Recently, Web 3.0 services such as virtual currency, block chain, and NFT are attracting public attention. Users who depended on platforms are moving away from being dependent on service providers and moving to Web 3.0 services. Representative services of Web 3.0 include P2E (Play to Earn) and M2E (Move to Earn). In the case of P2E, various studies have been conducted as it is widely covered in the press and media, but research on M2E is relatively lacking. This study attempts to identify the intention to use M2E by using the expanded technology acceptance model. External factors were selected based on M2E's own characteristics and personal characteristics, a research model was designed, and the proposed hypotheses were verified through factor analysis and goodness of model fit. As a result of the study, it was confirmed that profitability, innovativeness, and self-expression had a positive effect on perceived characteristics, and that perceived usefulness, perceived enjoyment, and social influence had a positive effect on intention to use. Through the research results, practical implications for efficient service operation that meets the needs of users are presented to M2E platform providers.

Response to Security Threats through Importance Analysis of NFT Service Provider Security Level Check Items (NFT 서비스 제공자 보안 수준 점검 항목 중요도 분석을 통한 보안 위협 대응)

  • Dong Sung Im
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.126-135
    • /
    • 2023
  • Demand for NFT is expanding along with Blockchain. And cyber security threats are also increasing. Therefore, this study derives security level inspection items by analyzing status related to NFT security such as NFT features, security threats, and compliance for the purpose of strengthening NFT security. Based on this, the relative importance was confirmed by applying it to the AHP model. As a result of the empirical analysis, the priority order of importance was found in the order of Security management system establishment and operation, encryption, and risk management, etc. The significance of this study is to reduce NFT security incidents and improve the NFT security management level of related companies by deriving NFT-related security level check items and demonstrating the research model. And If you perform considering relative importance of the NFT check items, the security level can be identified early.

  • PDF