• Title/Summary/Keyword: technology transaction

Search Result 691, Processing Time 0.02 seconds

Technology Transfer and the Technomart Related Laws (데크노마트와 지원법 제도)

  • 이영덕;강병수
    • Journal of Korea Technology Innovation Society
    • /
    • v.2 no.2
    • /
    • pp.233-248
    • /
    • 1999
  • For the last several decades, it has been recognized that technology is a key factor in becoming an ADC and an advanced firm. So many countries and individual firms have been increasing investments on technology development. Especially LDCs including Korea choose technology transfer and transaction as an important alternative of their own technology development. To activate technology transaction and transfer, it is necessary to establish an technology transaction system, namely a Technomart that will make good connections between technology suppliers and technology buyers, and efficient functional linkages of supporting infrastructures including organizations and laws related with technology transactions. Therefore this study reviewed both the characteristics of technology transfer and transaction and a conceptual structure of a Technomart through a literature review. And then, the study analyzed the Technomart related laws including an intellectual property right, a copyright, a patent right, and electric transaction related laws. In conclusion the study proposed the development directions of the Technomart related laws.

  • PDF

Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount

  • Lejun Zhang;Bo Zhang;Ran Guo;Zhujun Wang;Guopeng Wang;Jing Qiu;Shen Su;Yuan Liu;Guangxia Xu;Zhihong Tian;Sergey Gataullin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.1020-1041
    • /
    • 2024
  • With the development of covert communication technologies, the number of covert communication technologies using blockchain as a carrier is increasing. However, using the transaction amount of digital currency as a carrier for covert communication has problems such as low embedding rate, large consumption of transaction amount, and easy detection. In this paper, firstly, by experimentally analyzing the distribution of bitcoin transaction amounts, we determine the most suitable range of amounts for matrix decomposition. Secondly, we design a novel matrix decomposition method that can successfully decompose a large amount matrix into two small amount matrices and utilize the elements in the small amount matrices for covert communication. Finally, we analyze the feasibility of the novel matrix decomposition method in this scheme in detail from four aspects, and verify it by experimental comparison, which proves that our scheme not only improves the embedding rate and reduces the consumption of transaction amount, but also has a certain degree of resistance to detection.

A Study on Development of Technology Valuation Model for Technology Transfer (기술이전을 위한 기술가치 평가모텔 연구)

  • 박현우;정혜순;유선희
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2001.11a
    • /
    • pp.201-222
    • /
    • 2001
  • This study proposes a technology valuation model applicable for technology transfer or transaction, based on the review of theoretical models and practical applications. The model analyzes individual technologies that can be transacted as economic goods in terms of intellectual properties as subjects of transaction. The valuation of technology for transfer or transaction needs to be performed in view of demand side rather than supply side. This study suggests a successive approximation method in order to evaluate value of technologies quantitatively

  • PDF

Technology Valuation Reflecting Option Value Among Technology Transaction Subjects (기술거래 주체별 옵션가치를 반영한 기술가치평가방법)

  • Kim, Tae Wan;Yoon, Jae Hong
    • Korean Management Science Review
    • /
    • v.31 no.2
    • /
    • pp.71-86
    • /
    • 2014
  • There is a growing need for technology transactions between the technology providers, who develop technologies, and the technology consumers, who purchase and commercialize technologies, to be smooth, when technologies, as intangible assets, are traded as items that can be purchased and sold. In response to these challenges, this study examines new approaches to assessing the fair market value of technologies. Because corporations are the main force behind technology development and commercialization in the existing business environment, applying one valuation method to technology assets is viable; however, as the subjects of technology development and technology commercialization are separate, the need for price negotiations between the subjects of technology transaction has grown. Moreover, as the investigations into and the application of transaction prices have been performed separately by technology providers, technology consumers, and technology assessment financial institutions, the research on technology valuation methods has shown that there are differences in perceived transaction prices between the subjects involved. This research presents a new method, appropriate to technology transactions; unlike existing methods, it grants option values to the technology provider and newly defined key variables to the technology consumer.

Performance Evaluation of Deferred Locking With Shadow Transaction (그림자 트랜잭션을 이용한 지연 로킹 기법의 성능 평가)

  • 권혁민
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.117-134
    • /
    • 2000
  • Client-server DBMS based on a data-skipping model can exploit client resources effectively by allowing inter-transaction caching. However, inter-transaction caching raises the need of transactional cache consistency maintenance(TCCM) protocol, since each client is able to cache a portion of the database dynamically. Detection-based TCCM schemes can reduce the message overhead required for cache consistency if they validate clients replica asynchronously, and thus they cm show high throughput rates. However, they tend to show high ratios of transaction abort since transactions can access invalid replica. For coping with this drawback, this paper develops a new notion of shadow transaction, which is a backup-purpose one that is kept ready to replace an aborted transaction. This paper proposes a new detection-based TCCM scheme named DL-ST on the basis of the notion of shadow transaction. Using a simulation model, this paper evaluates the effect of shadow transaction in terms of transaction through rate and abort ratio.

  • PDF

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

Automatic Verification and Tuning of Transaction-based Database Applications (트랜잭션 기반 데이타베이스 응용프로그램의 안전성 자동 검증 및 자동 튜닝)

  • Kang Hyun-Goo;Yi Kwangkeun
    • Journal of KIISE:Databases
    • /
    • v.32 no.1
    • /
    • pp.86-99
    • /
    • 2005
  • In this paper, we suggest a system which automatically verifies and tunes transaction processing database applications based on program analysis technology. This system automatically verifies two kinds of transaction processing errors. The first case is the un-closed transaction. In this case, data is not updated as expected or performance of overall system can decrease seriously by locking some database tables until the process terminates. The second case is the miss-use of transaction isolation(inking) level. This causes runtime exception or abnormal termination of the program depending on runtime environment. This system automatically tunes two kinds of inefficient definition of transaction processing which decrease the performance of overall system. The first case happens when opened transaction is closed too late. And the second case happens when transaction isolation level is set too high.

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

A Study on the U.S. Cases about the Transaction of Software (소프트웨어 거래의 UCC 제2편의 적용에 관한 연구 - 미국의 판례를 중심으로 -)

  • Kim, Jae-Seong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.18
    • /
    • pp.7-25
    • /
    • 2002
  • Owing to a tremendous progress of information technology we have faced a great change of a society. This change has happened to almost all of a society. As a result intangible goods are also included as a major concern in international trade. We may say U.S. is one of the countries transaction of software is the most flourishing. I have tried to classified the cases of software transaction in U.S. into five groups. As a result I have known the UCC had been applied to the almost transaction of standard software. However UCC had not been applied to custom software and data processing. In these days UCITA which is very similar to a previous proposal UCC 2B has been presented. This is a contract law that would apply to computer software, multimedia products, and databases. It has been designed to create a uniform commercial contract law for those products. Now therefore we should make observation of a tendency about transaction of software in U.S. The reason is that we pay attention to the symbol and dormant power of U.S. in international trade.

  • PDF

A Joint Using Method of Transaction Information DB for Research Management (연구 관리를 위한 거래 정보 DB 공동 활용 방법)

  • Han Hee-Jun;Huh Tae-Sang;Lee Seung-Bock;Yae Yong-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.433-437
    • /
    • 2005
  • Most research organizations, universities and enterprises manage the transaction informations (customer informations, account informations, transaction results and so on), which is a fundamental item in the part of buying and research capital expenditure for the execution of R&D project or relative works. But because they don't only manage transaction information systematically but also don't put to practical use as sharing knowledge, many researchers duplicate their operations and it is shown a drop in efficiency. Also there are many problems because useful informations are unapproachable in the side of research management. In this paper, we propose the database design, application plan and service method for joint utilize of transaction information. And we prove the proposed method by service which is operated within intranet system. The transaction information shared by the proposed method will be useful knowledge and a major factor of efficiency improvement in research management field.

  • PDF