• Title/Summary/Keyword: virtual transaction

Search Result 89, Processing Time 0.021 seconds

Comparison of Force Calculation Methods in 2D and 3D Finite Element Method

  • Yan Xiuke;Koh, Chang-Seop;Ryu, Jae-Seop;Xie Dexin
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.11B no.4
    • /
    • pp.137-145
    • /
    • 2001
  • The magnetic force calculation methods, the Maxwell's stress tensor method, virtual work method, and nodal force method, are reviewed and the equivalence of them are theoretically proved. The methods are applied to the magnetic force calculation of 2D linear and nonlinear problems, and 3D nonlinear problem. As the results, the convergence of the methods as the number of elements increases, accuracy of the methods, and integral path dependence of the methods are discussed. Finally some recommendations on the usage of the methods, including the determination of the integral path, are given.

  • PDF

Implementation of Personalized Advertisement and Information Application Services Using RFID Virtual Tag (RFID 가상 태그를 활용한 개인화된 광고 및 정보 응용 서비스 개발)

  • Park, Nam-Je
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.151-163
    • /
    • 2009
  • In this paper, we design and develop a personalized advertisement and information services system based on mobile RFID using RFID virtual tag. It is a system to perform the use of the contents information or the commercial transaction on the contents products through internet server connection by using RFID tag information with a mobile according as transmitting immediately to a cell phone after a tag generator derived RFID tag information to be substituted for the contents information being output at present, after being transmitted from a cell phone the information request signal on the contents information being output from video media. This service system provides a mechanism for gathering advertisement information left behind by many clients visiting advertisement sites for analysis of customers property, service model for selecting personalized services, and mechanism for providing them to customers who visited in a advertisement mall joined to the shopping site.

The Vulnerability Analysis of CA Arcot VPS (CA Arcot VPS의 취약점 분석)

  • Lee, Sang-Ho;Kim, Sung-Ho;Nyang, Dea-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.825-830
    • /
    • 2013
  • CA Arcot corporation in U.S.A has secure on-line financial trade solution and patent that verify whether transaction had change using virtual session. But, VPS(Virtual Private Session) has another vulnerability by way to construct CAPTCHA. We can't fully trust safety of VPS, Cause it could be attacked by using color information of CAPTCHA. In this paper, We suggest the method of attack VPS, and also point out the vulnerability of VPS though simulation.

A study on high performance Java virtual machine for smart card (스마트카드용 고성능 자바가상기계에 대한 연구)

  • Jung, Min-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.1
    • /
    • pp.125-137
    • /
    • 2009
  • Smart card has a small sized micro computer chip. This chip contains processor, RAM, ROM, clock, bus system and crypto-co-processor. Hence it is more expensive, complicated and secure chip compared with RFID tag. The main application area of smart card is e-banking and secure communications. There are two kinds of smart card platforms; open platform and closed one. Java card is the most popular open platform because of its security, platform independency, fast developing cycle. However, the speed of Java card is slower than other ones, hence there have been hot research topics to improve the performance of Java card. In this paper, we propose an efficient transaction buffer management to improve the performance of Java card. The experimental result shows the advantage of our method.

  • PDF

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.

User-independent blockchain donation system

  • Sang-Dong Sul;Su-Jeong Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.113-123
    • /
    • 2023
  • This paper introduces the Cherry system, a user-independent blockchain donation system. This is a procedure that is delivered to the beneficiary's bank account through a virtual account when a donor makes a donation, so there is no difference from the existing donation delivery method from the user's point of view However, within the blockchain, Cherry Points, a virtual currency based on the user ID, are issued and delivered to the beneficiary, while all transactions and the beneficiary's usage history are managed on the blockchain. By adopting this method, there was an improvement in blockchain performance, with transaction processing exceeding 1,000 TPS in typical transaction condition and service completion within 21.3 seconds. By applying the automatic influence control algorithm to this system, the influence according to stake, which is an individual donation, is greatly reduced to 0.3 after 2 months, thereby concentrating influence could be controlled automatically. In addition, it was designed to enable micro tracking by adding a tracking function by timestamp to the donation ledger for each individual ID, which greatly improved the transparency in the use of donations. From a service perspective, existing blockchain donation systems were handled as limited donation delivery methods. Since it is a direct service in a user-independent method, convenience has been greatly improved by delivering donations in various forms.

A Study on Traffic Volume Prediction for e-Commerce Systems (전자상거래 시스템의 트래픽량 예측에 관한 연구)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.31-44
    • /
    • 2011
  • The applicability of network-based computing depends on the availability of the underlying network bandwidth. Such a growing gap between the capacity of the backbone network and the end users' needs results in a serious bottleneck of the access network in between. As a result, ISP incurs disadvantages in their business. If this situation is known to ISP in advance, or if ISP is able to predict traffic volume end-to-end link high-load zone, ISP and end users would be able to decrease the gap for ISP service quality. In this paper, simulation tools, such as ACE, ADM, and Flow Analysis, were used to be able to perceive traffic volume prediction and end-to-end link high-load zone. In using these simulation tools, we were able to estimate sequential transaction in real-network for e-Commerce. We also imported virtual network environment estimated network data, and create background traffic. In a virtual network environment like this, we were able to find out simulation results for traffic volume prediction and end-to-end link high-load zone according to the increase in the number of users based on virtual network environment.

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

A Proposal for Approaching Internet to Interior Design firm Management Strategy (인테리어 사무실 경영 전략을 위한 인터넷의 활용 제안)

  • 최용수
    • Korean Institute of Interior Design Journal
    • /
    • no.33
    • /
    • pp.99-105
    • /
    • 2002
  • As a new environment, the Internet proposes to us the innovation of our life. New information technologies(IT) have enabled and stimulated new organizational forms. Electronic Commerce is the new economy that changes the pattern of our life and the form of business transaction. Electronic Commerce is rapidly growing due to the increasing of internet user and the development of information technology. With the emergence of the Internet, a totally new business, the electronic commerce(EC) is emerging. Internet EC brings in many benifits to the organization such as reduced costs, fast turnaround, better customer service, and in some firms strategic advantage over their competitors. As a newly created interior design paradigm, this proposal presents its utmost advantage, interlocking interior design firm management with virtual reality of internet. Appropriately interacting on-line with off-line in virtual reality of internet improves the image of interior design firm and makes the best use of its identity in marketing. This application can rightly attract consumers' interest. Analyzing the market, the most important thing in marketing is to anticipate consumers' existing and possible demand in future. In other word, servicing consumers with idea efficiently is competence. As the point of management, to maximize managing value in interior design proposes the application of internet to management strategy of interior design firm

Nonlinear Moving Picture Editor for Multiple Watermarking (다중 워터마킹을 지원하는 비선형 동영상 편집기)

  • 윤석민;한경섭;정순기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.124-129
    • /
    • 2002
  • Currently, image processing are used widely and have various types of characteristics with the applications of VOD(Video on demand), the web casting services, the video conference systems and virtual realities. Using the scene change, at every time of video image transitions, an editor can classify the video context and also require a function of in(Boxing insertion. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. The Purpose of this thesis is to implement of nonlinear moving picture editor for the multiple watermarking. For the effective watermarking performance, this thesis considers the protection of image quality reduction and robustness for hiding information concurrently.

  • PDF