• Title/Summary/Keyword: Transaction needs

Search Result 165, Processing Time 0.025 seconds

A Framework for Developing Distributed Application with Web-Tier Object Modeling (웹계층 오브젝트 모델링을 통한 분산 애플리케이션 개발 프레임웍크)

  • Cheon, Sang-Ho;Kwon, Ki-Hyeon;Choi, Hyung-Jin
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1143-1148
    • /
    • 2004
  • To develop multi-tier model or distributed architecture based distributed application needs to consider various aspects such as division of role between web-designer and software developer, defining entity and its usage, database connection and transaction processing etc. This paper presents DONSL(Data Server of Non SQL-Query) architecture that provides solution to above aspects through web-tier object modeling. This is the architecture that guarantees the transaction processing and performance between web-tier and DBMS through simplified usage of query logic property. This new conceptual framework also solves enterprise site implementation problems simplifying tier, and removing DAO(Data Access Object) and entity.

Structural Change and Development Direction of The Fisheries Port Market (수산물 산지시장의 구조변화와 발전방향)

  • Kang, Jong-Ho
    • The Journal of Fisheries Business Administration
    • /
    • v.48 no.4
    • /
    • pp.1-10
    • /
    • 2017
  • The study analyzed the current status of fisheries port market and presented the direction of developments. The fisheries port market has become increasingly widespread due to the aging of the facilities and the scale of the fish product trade, and the number of distribution workers has also increased. The problems of fisheries port market are as follows. First, the transaction structure was changed as the proportion of aquaculture products increased. Second, the trading structure has changed, but it has failed to keep pace with the changes in the production structure. Third, the volume and amount of fish traded in aquaculture products and fish stocks increased. As a result, the growth rate of the fisheries port market is decreasing and profitability is deteriorating. The development direction of the fisheries port market is as follows. First, it is necessary to standardize the fisheries port market facilities, according to the type of fish products. Second, it needs to diversify its trade targets such as processed fish products and imported fish products. Third, it is necessary to diversify the business of the fisheries port market in order to increase profitability.

Educational Program for the Elder's Daily Life as a Consumer (노인 소비자를 위한 소비생활 교육 프로그램)

  • Lee, Yoon-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.265-273
    • /
    • 2010
  • The aim of this paper is developing the educational program for the elder's daily life as a consumer, according as recognize the important of their consumption function and role in modern society. This paper consider the studies for elder consumption needs and activities for educational program, then present six principles and contents in four areas. The principals are empirical, socialization, interrelation, spontaneity, individualization and respect for the aged principal. The program themes are preventive education for elder consumer, advisable transaction, advisable transaction through cases and consumer's right, responsibility, duty and process of decision for purchase.

A Study on RFID Application Method in Franchise Business (프랜차이즈산업에서의 RFID 적용 방법에 대한 연구)

  • Rim, Jae-Suk;Choi, Wean-Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2008
  • At present, companies write daily work record or use bar-code in order to collect distribution flow data in real time. However, it needs additional works to check the record or read the bar-code with a scanner. In this case, human error could decrease accuracy of data and it would cause problems in reliability. To solve this problem, RFID (Radio Frequency Identification) is introduced in many automatic recognition sector recently. RFID is a technology that identification data is inserted into micro-mini IC chip and recognize, trace, and manage object, animal, or person using wireless frequency. This is being emerged as the core technology in future ubiquitous environment. This study is intended to suggest RFID application method in franchise business. Traceability and visibility of individual product are supplied based on EPCglobal network. It includes DW system which supplies various assessment data about product in supply chain, financial transaction system which is based on product transaction and position information, and RFID middleware which refines and divides product data from RFID tag. With the suggested application methods, individual product's profile data are supplied in real time and it would boost reliability to customer and make effective cooperation with existing operation systems (SCM, CRM, and e-Business) possible.

System Level Architecture Evaluation and Optimization: an Industrial Case Study with AMBA3 AXI

  • Lee, Jong-Eun;Kwon, Woo-Cheol;Kim, Tae-Hun;Chung, Eui-Young;Choi, Kyu-Myung;Kong, Jeong-Taek;Eo, Soo-Kwan;Gwilt, David
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.5 no.4
    • /
    • pp.229-236
    • /
    • 2005
  • This paper presents a system level architecture evaluation technique that leverages transaction level modeling but also significantly extends it to the realm of system level performance evaluation. A major issue lies with the modeling effort. To reduce the modeling effort the proposed technique develops the concept of worst case scenarios. Since the memory controller is often found to be an important component that critically affects the system performance and thus needs optimization, the paper further addresses how to evaluate and optimize the memory controllers, focusing on the test environment and the methodology. The paper also presents an industrial case study using a real state-of-the-art design. In the case study, it is reported that the proposed technique has helped successfully find the performance bottleneck and provide appropriate feedback on time.

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.

An Efficient Real-Time Concrrency Control Algorithm using the Feasibility Test (실행가능성검사를 이용한 효율적인 실시간 동시성제어알고리즘)

  • Lee, Seok-Jae;Sin, Jae-Ryong;Song, Seok-Il;Yu, Jae-Su;Jo, Gi-Hyeong;Lee, Byeong-Yeop
    • Journal of KIISE:Databases
    • /
    • v.29 no.4
    • /
    • pp.297-310
    • /
    • 2002
  • The 2PL-HP(Two Phase Locking with High Priority) method has been used to guarantee preceding process of a high priority transaction(HPT) in real-time database systems. The method resolves a conflict through aborting or blocking of a low priority transaction(LPT). However, if HPT is eliminated in a system because of its deadline missing, an unnecessary aborting or blocking of LPT is occurred. Recently, to resolve the problem, a concurrency control algorithm using alternative version was proposed. However, the algorithm must always create the alternative version and needs an addtional technique to manage complex alternative versions. In this paper, we propose an efficient concurrency control algorithm that prevents needless wastes of resources and eliminates unnecessary aborting or blocking of LTP. And it is shown through the performance evaluation that the proposed concurrency control algorithm outperforms the existing concurrency control algorithm using alternative version.

User-Perspective Issue Clustering Using Multi-Layered Two-Mode Network Analysis (다계층 이원 네트워크를 활용한 사용자 관점의 이슈 클러스터링)

  • Kim, Jieun;Kim, Namgyu;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.93-107
    • /
    • 2014
  • In this paper, we report what we have observed with regard to user-perspective issue clustering based on multi-layered two-mode network analysis. This work is significant in the context of data collection by companies about customer needs. Most companies have failed to uncover such needs for products or services properly in terms of demographic data such as age, income levels, and purchase history. Because of excessive reliance on limited internal data, most recommendation systems do not provide decision makers with appropriate business information for current business circumstances. However, part of the problem is the increasing regulation of personal data gathering and privacy. This makes demographic or transaction data collection more difficult, and is a significant hurdle for traditional recommendation approaches because these systems demand a great deal of personal data or transaction logs. Our motivation for presenting this paper to academia is our strong belief, and evidence, that most customers' requirements for products can be effectively and efficiently analyzed from unstructured textual data such as Internet news text. In order to derive users' requirements from textual data obtained online, the proposed approach in this paper attempts to construct double two-mode networks, such as a user-news network and news-issue network, and to integrate these into one quasi-network as the input for issue clustering. One of the contributions of this research is the development of a methodology utilizing enormous amounts of unstructured textual data for user-oriented issue clustering by leveraging existing text mining and social network analysis. In order to build multi-layered two-mode networks of news logs, we need some tools such as text mining and topic analysis. We used not only SAS Enterprise Miner 12.1, which provides a text miner module and cluster module for textual data analysis, but also NetMiner 4 for network visualization and analysis. Our approach for user-perspective issue clustering is composed of six main phases: crawling, topic analysis, access pattern analysis, network merging, network conversion, and clustering. In the first phase, we collect visit logs for news sites by crawler. After gathering unstructured news article data, the topic analysis phase extracts issues from each news article in order to build an article-news network. For simplicity, 100 topics are extracted from 13,652 articles. In the third phase, a user-article network is constructed with access patterns derived from web transaction logs. The double two-mode networks are then merged into a quasi-network of user-issue. Finally, in the user-oriented issue-clustering phase, we classify issues through structural equivalence, and compare these with the clustering results from statistical tools and network analysis. An experiment with a large dataset was performed to build a multi-layer two-mode network. After that, we compared the results of issue clustering from SAS with that of network analysis. The experimental dataset was from a web site ranking site, and the biggest portal site in Korea. The sample dataset contains 150 million transaction logs and 13,652 news articles of 5,000 panels over one year. User-article and article-issue networks are constructed and merged into a user-issue quasi-network using Netminer. Our issue-clustering results applied the Partitioning Around Medoids (PAM) algorithm and Multidimensional Scaling (MDS), and are consistent with the results from SAS clustering. In spite of extensive efforts to provide user information with recommendation systems, most projects are successful only when companies have sufficient data about users and transactions. Our proposed methodology, user-perspective issue clustering, can provide practical support to decision-making in companies because it enhances user-related data from unstructured textual data. To overcome the problem of insufficient data from traditional approaches, our methodology infers customers' real interests by utilizing web transaction logs. In addition, we suggest topic analysis and issue clustering as a practical means of issue identification.

A Disk Group Commit Protocol for Main-Memory Database Systems (주기억 장치 데이타베이스 시스템을 위한 디스크 그룹 완료 프로토콜)

  • 이인선;염헌영
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.516-526
    • /
    • 2004
  • Main-Memory DataBase(MMDB) system where all the data reside on the main memory shows tremendous performance boost since it does not need any disk access during the transaction processing. Since MMDB still needs disk logging for transaction commit, it has become another bottleneck for the transaction throughput and the commit protocol should be examined carefully. There have been several attempts to reduce the logging overhead. The pre-commit and group commit are two well known techniques which do not require additional hardware. However, there has not been any research to analyze their effect on MMDB system. In this paper, we identify the possibility of deadlock resulting from the group commit and propose the disk group commit protocol which can be readily deployed. Using extensive simulation, we have shown that the group commit is effective on improving the MMDB transaction performance and the proposed disk group commit almost always outperform carefully tuned group commit. Also, we note that the pre-commit does not have any effect when used alone but shows some improvement if used in conjunction with the group commit.

Recovery Schemes for Spatial Data Update Transactions in Client-Server Computing Environments (클라이언트-서버 환경에서 공간 데이터의 변경 트랜잭션을 위한 회복 기법)

  • 박재관;최진오;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.1
    • /
    • pp.64-79
    • /
    • 2003
  • In client-server computing environments, update transactions of spatial data have the following characteristics. First, a transaction to update maps needs interactive work, and therefore it nay take a long time to finish. Second, a long transaction should be allowed to read the dirty data to enhance parallelism of executing concurrent transactions. when %he transaction is rolled back, it should guarantee the cascading rollback of all of the dependent transactions. Finally, two spatial objects may have a weak dependency constraint, called the spatial relationship, based on geometric topology. The existing recovery approaches cannot be directly applied to this environment, due to the high rollback cost and the overhead of cascading rollbacks. Furthermore, the previous approaches cannot guarantee the data integrity because the spatial relationship, which is a new consistency constraint of spatial data, is not considered. This paper presents new recovery schemes for update transactions of spatial data. To guarantee the data integrity, this paper defines recovery dependency as a rendition of cascading rollbacks. The partial-rollback is alto suggested to solve the problem of high rollback cost. The recovery schemes proposed in this paper can remove the unnecessary cascading rollbacks by using undo-delta, partial -redo and partial-undo. Finally, the schemes are performed to ensure the correctness.