• Title/Summary/Keyword: electronic transaction records

Search Result 14, Processing Time 0.019 seconds

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng;Gui, Xiao-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2370-2387
    • /
    • 2012
  • A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.

A Theoretical Study on the Implication of Substantial Harmonization between the eUCP and UCP (eUCP 적용원리의 규명과 신용장거래질서 확대 개편방안의 모색)

  • Kim, Ki-Sun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.25
    • /
    • pp.75-98
    • /
    • 2005
  • With the advent of new customs and practice of electronic records, the eUCP provides some useful guidance to accommodate the presentation of the paper documents electronically and also provides necessary rules to allow the UCP and eUCP to work together. There is no denying the fact that many of the UCP articles are not impacted by the presentation of electronic equivalent of paper documents, so the integrated application of the UCP and eUCP will be broad enough to allow for developing practice in this area. This study discusses some theoretical implication for efficient utilization of the global usages of letter of credit through the finding of optimal solution in the state of uncertainty caused by the electronic presentation of documents. This study suggest that the decision rules be developed to show how individuals choose optimal portfolio between the eUCP and the UCP that maximize their expected utility in letter of credit transaction, and also suggest that the optimal portfolio be determined at the point of tangency between the efficient trading line and the highest indifference curve in the mean-variance plane. This study finally recommends three rebuttable doctrines with regard to the relationship between the eUCP and UCP such as linkage characteristics, generation lap propensity, and homothetic application rule, which may be the critical standards for understanding of the integrated usages of the eUCP and UCP.

  • PDF

Design of Personal Career Records Management and Duistribution using Block Chain (블록체인을 활용한 개인 경력 관리 및 유통 시스템 설계)

  • Bae, Su-Hwan;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.235-242
    • /
    • 2020
  • This paper proposes a system that can manage and verify personal career information through a block chain to solve the problem of getting a job by forging an individual's career when hiring employees. Blockchain network uses private network, and inside the block, the user's academic and career information is kept. The functions of the block chain perform the functions of block creation, block internal data retrieval, career and academic verification, which works through chain code. As a result of the performance evaluation of the proposed system, the processing time per transaction was measured at approximately 110 ms and the search time was measured at 10 ms, and it was applied to the actual system to confirm that it was available.

Utilization of Log Data Reflecting User Information-Seeking Behavior in the Digital Library

  • Lee, Seonhee;Lee, Jee Yeon
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.73-88
    • /
    • 2022
  • This exploratory study aims to understand the potential of log data analysis and expand its utilization in user research methods. Transaction log data are records of electronic interactions that have occurred between users and web services, reflecting information-seeking behavior in the context of digital libraries where users interact with the service system during the search for information. Two ways were used to analyze South Korea's National Digital Science Library (NDSL) log data for three days, including 150,000 data: a log pattern analysis, and log context analysis using statistics. First, a pattern-based analysis examined the general paths of usage by logged and unlogged users. The correlation between paths was analyzed through a χ2 analysis. The subsequent log context analysis assessed 30 identified users' data using basic statistics and visualized the individual user information-seeking behavior while accessing NDSL. The visualization shows included 30 diverse paths for 30 cases. Log analysis provided insight into general and individual user information-seeking behavior. The results of log analysis can enhance the understanding of user actions. Therefore, it can be utilized as the basic data to improve the design of services and systems in the digital library to meet users' needs.