• Title/Summary/Keyword: Automated Transaction

Search Result 48, Processing Time 0.028 seconds

State-driven Business Process Transaction Management (상태 기반 비즈니스 프로세스 트랜젝션 관리)

  • Lee Sun Jae;Yun Jang Hyeok;Kim Gwang Su
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.772-779
    • /
    • 2003
  • In the real world, business processes are very complex and composed or heterogeneous business activities. As the advent or the Web services enables business processes to be Integrated and to be automated. It makes enterprises integrate heterogeneous business processes from different business partners as well as their internal business processes. To support recent trends in integration of business processes, BPEL, WS-E and WS-T specipications have been established since 2002 WS-C and WS-T describe the reliable business environment including compensation (undo) or completed business processes. The compensation of business processes is a basic requirement for automation or business processes among business partners. Systems implementing these specifications, however, very rarely exist. It's not only because those specifications are developed recently. but also because they are not perfect yet. In this paper, a new business process transaction management, which complements the deficiency of WS-E and WS-T, is suggested. Furthermore, the new approach proposes the business logics for supervisory coordinators which manage serial and parallel business gates The modification or traditional WS-T specification and the simplification or WS-E specification make business processes managed effectively.

  • PDF

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

A Dynamic Precedence Queue Mechanism to Improve Transmission Efficiency in CAN Networks

  • Yun, Jae-Mu;Choi, Ho-Seek;Lee, Jang-Myung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.761-766
    • /
    • 2005
  • This paper presents a dynamic precedence queue mechanism to resolve unexpected transmission delay of a lower priority transaction in a CAN based system which keeps a fixed priority in data transactions. The mechanism is implemented in the upper sub-layer of the data link layer (DLL), which is fully compatible with the original medium access control layer protocol of CAN. Thus the mechanism can be implemented dynamically while the data transactions are going on without any hardware modification. The CAN protocol was originally developed to be used in the automotive industry and it was recently applied for a broader class of automated factories. Even though CAN is able to satisfy most of real-time requirements found in automated environments, it is not to enforce either a fair subdivision of the network bandwidth among the stations or a satisfactory distribution of the access delays in message transmissions. The proposed solution provides a superset of the CAN logical link layer control, which can coexist with the older CAN applications. Through the real experiments, effectiveness of the proposed mechanism is verified.

  • PDF

An Intelligent Gold Price Prediction Based on Automated Machine and k-fold Cross Validation Learning

  • Baguda, Yakubu S.;Al-Jahdali, Hani Meateg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.65-74
    • /
    • 2021
  • The rapid change in gold price is an issue of concern in the global economy and financial markets. Gold has been used as a means for trading and transaction around the world for long period of time and it plays an integral role in monetary, business, commercial and financial activities. More importantly, it is used as economic measure for the global economy and will continue to play an important economic vital role - both locally and globally. There has been an explosive growth in demand for efficient and effective scheme to predict gold price due its volatility and fluctuation. Hence, there is need for the development of gold price prediction scheme to assist and support investors, marketers, and financial institutions in making effective economic and monetary decisions. This paper primarily proposed an intelligent based system for predicting and characterizing the gold market trend. The simulation result shows that the proposed intelligent gold price scheme has been able to predict the gold price with high accuracy and precision, and ultimately it has significantly reduced the prediction error when compared to baseline neural network (NN).

Development of Automated Trading Agent in Real-Time Supply Chain Environment (실시간 공급사슬 환경하에서의 거래자동화 에이전트 개발)

  • Park, Young-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.11
    • /
    • pp.4282-4290
    • /
    • 2010
  • Recently, business environment is spreading from singular business to supply-chain problem. SCM(Supply Chain Management) is changing from closed and static to opened and dynamic environment, so these environment changes of SCM require to enterprise different approach than past. As supply chain is becoming opened and dynamic, a claim is being naming that converse of real-time the get reaction from to recognizing the level of supply chain problem, grope of alternative plan to solving this problem and choosing optimum alternative plan raise the enterprise competitive. But until present, the research to deal with these changes of SCM is on insufficient situation. Thus in this paper proposes the agent system by a way of realizing dynamic supply chain. The agent is going to accomplish the management activities in real-time depends on environment and given condition and designed for solving problems development and maintenance. Also, algorithms performance of the agent is tested on TAC SCM environment. Agents in TAC SCM are simulations of small manufacturers, who must compete with each other for both supplies and customers, and manage inventories and production facilities.

An Optimized Partner Searching System for B2B Marketplace Applying Clustering Techniques (군집화 기법을 이용한 B2B Marketplace상의 최적 파트너 검색 시스템)

  • Kim Shin-Young;Kim Soo-Young
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2003.05a
    • /
    • pp.572-579
    • /
    • 2003
  • With the expansion of e-commerce, E-marketplace has become one of the most discussed topics in recent years. Limited theoretical works, however, have been done to optimize the practical use of e-marketplace systems. Other potential issues aside, this research has focused on this problem: 'the participants waste too much time, effort and cost to find out their best partner in B2B marketplace.' To solve this problem, this paper proposes a system which provides the user-company with the automated and customized brokering service. The system proposed in this paper assesses the weight on the priorities of a user-company, runs the two-stage clustering algorithm with self-organizing map and K-means clustering technique. Subsequently, the system shows the clustering result and user guide-line. This system enables B2B marketplace to have more efficiency on transaction with smaller pool of partners to be searched.

  • PDF

Development of Multiple Neural Network for Fault Diagnosis of Complex System (복합시스템 고장진단을 위한 다중신경망 개발)

  • Bae, Yong-Hwan
    • Journal of the Korean Society of Safety
    • /
    • v.15 no.2
    • /
    • pp.36-45
    • /
    • 2000
  • Automated production system is composed of many complicated techniques and it become a very difficult task to control, monitor and diagnose this compound system. Moreover, it is required to develop an effective diagnosing technique and reduce the diagnosing time while operating the system in parallel under many faults occurring concurrently. This study develops a Modular Artificial Neural Network(MANN) which can perform a diagnosing function of multiple faults with the following steps: 1) Modularizing a complicated system into subsystems. 2) Formulating a hierarchical structure by dividing the subsystem into many detailed elements. 3) Planting an artificial neural network into hierarchical module. The system developed is implemented on workstation platform with $X-Windows^{(r)}$ which provides multi-process, multi-tasking and IPC facilities for visualization of transaction, by applying the software written in $ANSI-C^{(r)}$ together with $MOTIF^{(r)}$ on the fault diagnosis of PI feedback controller reactor. It can be used as a simple stepping stone towards a perfect multiple diagnosing system covering with various industrial applications, and further provides an economical approach to prevent a disastrous failure of huge complicated systems.

  • PDF

Valuation of Knowledge Information Contents : Its Approaches and Application (지식정보 콘텐츠 가치평가의 기법과 적용 가능성)

  • 박현우
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.70-79
    • /
    • 2002
  • Valuation of intangible assets has been discussed for the purpose of transaction of a technology and investment based on intangible assets as well. Practical techniques, however, have rut been developed for valuation of automated, electronic data bases as specialized knowledge information contents. This study will summarize general intangible valuation approaches and special considerations in contents valuation, and present examples of the application of approaches to illustrative contents valuation analysis.

  • PDF

A Multi-Agent Negotiation System with Negotiation Models Changeable According to the Bargaining Environment

  • Ha, Sung-Ho;Kim, Dong-Sup
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.1-20
    • /
    • 2009
  • Negotiation is a process of reaching an agreement on the terms of a transaction. such as price, quantity, for two or more parties. Negotiation tries to maximize the benefits for all parties concerned. instead of using human-based negotiation. the e-commerce environment provides such an environment as adopting automated negotiation. Thus. choosing agent technology is appropriate for an automatic electronic negotiation platform. since autonomous software agents strive for the best deal on behalf of the human participants. Negotiation agents need a clear-cut definition of negotiation models or strategies. In reality, most bargaining systems embody nearly one negotiation model. In this article. we present a mobile agent negotiation system with reusable negotiation strategies that allows agents to dynamically embody a user's favorite negotiation strategy which can be preinstalled as a component in the system. We develop a prototype system, which is fully implemented in compliance with FIPA specifications, and then. describe the benefits of using the system.

  • PDF