• Title/Summary/Keyword: Technology Transfer/Transaction

Search Result 49, Processing Time 0.023 seconds

Investigation of the Effect of Blockchain-based Cryptocurrencies on Tourism Industry

  • Rashideh, Waleed;Alkhathami, Mohammed;Obidallah, Waeal J.;Alduraywish, Yousef;Alshammari, Abdulaziz;Alsahli, Abdulaziz
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.234-244
    • /
    • 2022
  • Tourism products involve the transfer of money that is flowing to countries with partners or borders, which do not possess any relations surrounding their business environment. Suitable platforms must be generated by the tourism industry, which are beneficial to users when their demands are satisfied based on financial, technology, knowledge, and industry matters. Intermediaries are applied to alleviate different problems that are related to the non-fulfilment of contracts of existing users and service providers who are offering their services and represent a reliable third party. However, it is significant that intermediaries must be reliable when charges are incurred for any possible commission. Cryptocurrencies rely on blockchain technology to provide smoothness in money interchange without the need for reliable third parties. This interchange allows an increasing number of different new forms, which are related to different customer-to-customer transactions. The study attempts to provide an appropriate answer to the main research question, which is: 'Will the widespread adoption of cryptocurrencies bring new types of customer-to-customer markets from a technological, organizational, and environmental perspective?'.

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

Transmission of Efficient WAP Packet Using Turbo Code Scheme in Wireless Network (무선 네트워크에서 터보 코드 기법을 적용한 효율적인 WAP 패킷 전송)

  • Moon, Il-Young;Ye, Hwi-Jin;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2006
  • In this paper, we have analyzed transmission time for WAP over CDMA using turbo code scheme. In order for SAR to improve the transfer capability, the transmission of messages have been simulated using a fragmentation that begins with the total package and incremental fragmentation for each layer using the WTP to define the resultant packet size and the level of fragmentation for each proceeding layer. This turbo code scheme decreases transmission time of RLP baseband packets by sending packets. From the results, we were able to obtain packet transmission time and optimal WTP packet size for WAP over CDMA in a Rician fading channel.

  • PDF

A Practical Off-line Electronic Cash System on Smart Cards Achieving Untraceability, Divisibility, and Transferability

  • Chung, Ho-Suk;Lee, Pil-Joong-
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.51-66
    • /
    • 1994
  • A divisible off-line electronic cash system based on cut-and-choose has first been proposed by [OO91] and recently more efficient single term divisible cash system was presented in [EO94] which is based on Brand's scheme [Bra93]. In this paper, we present a different type of single term divisible electronic cash system which is more efficient than previously proposed systems such as [OO91], [YLR93], and [EO94] in the standpoint of the amount of communication, the number of modular multiplications required in the payment transactions, and the storage requirement in the withdrawal protocol. Our scheme is a modified version of [LL93], where the major improvement has been made in its withdrawal transaction to introduce untraceability and multi-spendability. We have borrowed the idea of the withdrawal protocol of our scheme from [EO94] with minor modifications. Transferability in our scheme allows only a finite number of transfer. Our scheme satisfies an the desirable properties of an electronic cash system such as untraceability, divisibility and transferability. In addition, we present a n-spendable cash. The basic idea of extension to multi-spendability has been borrowed from [Bra93] with minor modifications.

  • PDF

A Study of WAP Packet using Turbo Code Scheme in Bluetooth piconet Environment (블루투스 피코넷 환경에서 터보코드 기법을 이용한 WAP 패킷의 연구)

  • Moon, Il-Young;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.553-556
    • /
    • 2005
  • It is analyzed that WAP packet transmission time to improve performance of WAP using SAR algorithm in Bluetooth channel. The order for SAR algorithm to improve the transfer capability, it is fragmented in WTP total messages that are coming down from upper layer and then the packets are sent one at time in baseband. And it is studied that transmission time for WAP over bluetooth according to DM1, DM3 or DM5 packet type using SAR algorithm in Bluetooth piconet environment. This SAR algorithm decreases WAP packet transmission time of L2CAP baseband packets by sending packet which are spanning multiple slots.

  • PDF

Performance Analysis of WAP Packet Considering Multi-Slot SAR-QT Algorithm in Bluetooth Ad hoc Network (Bluetooth Ad hoc 망에서 멀티 슬롯 SAR-QT 알고리즘을 고려한 WAP 패킷의 성능 분석)

  • Moon, Il-Young;Roh, Jae-Sung;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.2
    • /
    • pp.158-167
    • /
    • 2002
  • In this paper, it is analyzed that WAP packet transmission time to improve performance of WAP using SAR-QT algorithm in Bluetooth channel. The order for SAR-QT algorithm to improve the transfer capability, it is fragmented in WTP total messages that are coming down from upper layer and then the packets are sent one at time in baseband. And it is studied that transmission time for WAP over Bluetooth according to DMI, DM3 or DM5 packet type using SAR-QT algorithm in Bluetooth piconet environment. This SAR-QT algorithm decreases WAP packet transmission time of L2CAP baseband packets by sending packet that are spanning multiple slots. From the results, in WAP over Bluetooth channels, it is found out that WTP packet size ought to be increased to decrease transmission time of WAP packet. In addition, considering BER in wireless channel, optimal WTP packet size is achieved for WAP over Bluetooth in a Rician fading environment.

  • PDF

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

Sustainability Appraisal of Chinese Railway Projects In Nigeria: Afoot

  • Awodele, Imoleayo Abraham;Mewomo, Modupe Cecilia
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.967-974
    • /
    • 2022
  • It is no news that Nigeria's infrastructure challenge is enormous. In the global ranking, Nigeria ranked low in quantity and quality of its infrastructural provision which has a great impact on the ease of business transaction. Low investments in transportation have brought about the current infrastructural deficit. Recently, the Nigerian government has made effort to address at least to some extent the infrastructural deficit through Public-Private Partnership, but this has not yielded the desired result. Moreover, the sustainability issues relating to railway projects such as, emissions, noise pollution, ecosystem, and other environmental issues calls for urgent attention. Hence, this necessitated consideration on sustainability appraisal for the Chinese rail project in Nigeria. This study reviews sustainability of railway projects built by the Chinese firm in Nigeria with particular emphasis on the environmental and social impact of these projects. The study further identified issues and challenges in project implementation with a particular focus on civil dialogue and community engagements. A detailed literature search was conducted on railway projects and infrastructure by systematically reviewing selected published articles.The analysis of the selected articles identified sustainability issues and potential for improvement of Chinese railway projects and how they contribute to or inhibit competitiveness in the Nigerian railway market. From the literature searched, some of the projects constructed by Chinese firm revealed that there is economic and social impact of railway projects delivered by the Chinese firm in terms of capacity development and knowledge transfer potentiality. For instance, in the just concluded Lagos-Ibadan railway projects, the study gathered that the project brought about 5000 jobs and local staff were trained by the Chinese company, this will boost man power and local content capability. Also, it will significantly improve Nigeria's infrastructure and boost its economic development. The study suggests that Nigerian government should ensure and provide an enabling environment that is conducive for investment on the continent. Peace, improved security, and decent governance are the best conditions for sustainable transportation growth.

  • PDF

A Study on the enforceability of Shrink-wrap License under the Contract Law of USA (미국(美國) 계약법(契約法)하에서 소위 "쉬링크랩라이센스" 계약(契約)에 관한 일고찰(一考察))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.129-150
    • /
    • 2003
  • Software license agreements, to be useful in the mass market, could not be individually negotiated, and had to be standardized and concise. The software license agreement needs to be presented to the licensee-users in a fashion that would allow for mass distribution of software, also for it to enforceable, that would draw the users' attention to the terms and conditions under which the publisher allowed the use of the software. These needs have been accomplished, with or without fail, through so called the "shrink-wrap licenses" Shrink-wrap licenses purpose to transfer computer softwares to their users by defining the terms and conditions of use of the software without implicating the "first sale doctrine" of the Copyright Act. These shrink-wrap licenses have become essential to the software industry. However, in USA, the law applicable to these licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing their enforceability. Meanwhile, the National Conference of Commissioners on Uniform State Laws ("NCCUSL") in USA promulgated the Uniform Computer Information Transaction Act ("UCITA") governing contracts for computer information transaction on July 29, 1999. One clear objective of UCITA was to settle the law governing the enforceability of shrink-wrap licenses. In these respects, this paper first introduces the various forms that shrink-wrap licenses take(at Part II. Section 1.), and explains the main advantages of them(at Part II. Section 2.) Here it shows how shrink-wrap licenses value themselves for both software publishers and users, including that shrink-wrap licenses are a valuable contracting tool because they provide vital information and rights to software users and because they permit the contracting flexibility that is essential for today's software products. Next, this paper describes the current legal framework applicable to shrink-wrap licenses in USA(at Part III). Here it shows that in USA the development of case law governing shrink-wrap licenses occurred in two distinct stages. At first stage, judicial hostility toward shrink-wrap licenses marked such that they were not enforced pursuant to Article 2 of the Uniform Commercial Code. At second stage, courts began to recognize the pervasiveness of shrink-wrap licenses, their indispensability to the rapidly expanding information technology industry, and the urgent need to enforce such licenses in order to maintain low prices for consumers of computer hardware or software, resulting in the recognition of shrink-wrap licenses. Finally, in view of the importance of UCITA, this paper examines how it will affect the enforceability of shrink-wrap licenses(at Part IV). The drafters of UCITA, as well as the scholars and practitioners who have criticized it, agree that it validates shrink-wrap licenses, provided certain procedural protections are afforded to purchasers. These procedural protections include the licensee end-user must (i) manifest his assent to the shrink-wrap license, (ii) have an opportunity to review the shrink-wrap license, (iii) have a right to return the product without costs.

  • PDF

Drive Circuit of 4-Level Inverter for 42V Power System

  • Park, Yong-Won;Sul, Seung-Ki
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.11B no.3
    • /
    • pp.112-118
    • /
    • 2001
  • In the near future, the voltage of power system for passenger vehicle will be changed to 42V from existing 14V./ Because of increasing power and voltage ratings used in the vehicle the motor drive system has high switching dv/dt and it generates electromagnetic interference (EMI) To solve these problems multi-level inverter system may be used The feature of multi-level inverter is the output voltage to be synthesized from several levels of voltage Because of this feature high switching dv/dt and EMI can be reduced in the multi-level inverter system But as the number of level is increased manufacturing cost is getting expensive and system size is getting large. Because of these disadvantages the application of multi-level inverter has been restricted only to high power drives. The method to reduce manufacturing cost and system size is to integrate circuit of multi-level inverter into a few chips But isolated power supply and signal isolation circuit using transformer or opto-coupler for drive circuit are obstacles to implement the integrated circuit (IC) In this paper a drive circuit of 4-level inverter suitable for integration to hybrid or one chip is proposed In the proposed drive circuit DC link voltage is used directly as the power source of each gate drive circuit NPN transistors and PNP transistors are used to isolate to transfer the control signals. So the proposed drive circuit needs no transformers and opto-couplers for electrical isolation of drive circuit and is constructed only using components to be implemented on a silicon wafer With th e proposed drive circuit 4- level inverter system will be possible to be implemented through integrated circuit technology Using the proposed drive circuit 4- level inverter system is constructed and the validity and characteristics of the proposed drive circuit are proved through the experiments.