• Title/Summary/Keyword: token

Search Result 609, Processing Time 0.03 seconds

CMTO: An Inquiry into the Activation for Real Estate Security Token of the Digital Asset Hour (CMTO: 디지털 자산 시대의 부동산 토큰 증권 활성화 방안 연구)

  • Jeongmin Lee;Minhyuk Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.81-95
    • /
    • 2023
  • The emergence of Security Token has revolutionized the way assets are traded, bringing efficiency, transparency, and accessibility to the market. However, the Real Estate Security Token market faces challenges, particularly in terms of liquidity. The CMTO(Collateralized Mortgage Token Obligation) model addresses this issue by introducing a novel approach that combines the benefits of NFT(Non-Fungible Token), STO(Security Token Offering), and CMO(Collateralized Mortgage Obligation) techniques to enhance liquidity and promote investment in Real Estate Security Token. The CMTO framework functions by allowing DABS token investors to leverage their tokens as collateral for loans. These token-collateralized loans are pooled together and form the basis for issuing Sequential CMO named CMTO. The CMTO represent a diversified portfolio of token-collateralized loans, providing investors with options based on their financial goals and risk preferences. By implementing CMTO, the Real Estate Security Token market can overcome liquidity challenges, attract a broader range of investors, and unlock the full potential of digital assets in the real estate industry.

A Study on of the recognition on the problem a token of parents' gratitude (학교교육의 촌지문제에 관한 학부모의 인식)

  • KIM, Dal-Hyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.21 no.2
    • /
    • pp.247-258
    • /
    • 2009
  • Although the problem about a token of parents' gratitude is restricted by small number of teachers, it must be solved for normal and good schooling. The purpose of this study was to investigate the problem about a token of parents' gratitude, an extent of a token of parents' gratitude, seriousness of a token of parents' gratitude, the experience of a token of parents' gratitude, an amount of money a token of parents' gratitude, the time of a token of parents' gratitude, a compensation of a token of parents' gratitude using a questionnaire to 549 parents. And a Chi-square test was used as a research tool for this study. This study indicates that many parents recognize a token of parents' gratitude as money or gift certificate. And most parents recognize different significantly about a token of parents' gratitude according to teachers' sex, ages, level of school, and type of school. We do not need a vast and experimental revolution in education based on unproved reasoning. If we want to be normal and good schooling, we have to make an effort small changes which solve a problem of a token of parents' gratitude. Our educational policies have to move from vast approaches generated from 'above' with political purpose to more particular approaches based on specific problems and generated by the community.

Scalable Ordered Broadcast Protocol in the Distributed System (분산 시스템에서 확장성 있는 순서화 방송통신 프로토콜)

  • Han, In;Hong, Young-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.125-133
    • /
    • 2002
  • In this paper, we present an efficient broadcast protocol, called Btoken, that ensures total ordering of messages and atomicity of delivery in the large scaled distributed systems. Unlike the existing token-passing based protocol, Btoken does not circulate a token around the ring, instead, it uses three kinds of control messages for token transmission. The token has a sequence number field for broadcasting message, and the only site having the token can broadcast a message. When a site wishes to broadcast, It must send a message to the token site requesting the token. The token site sends a message with the token to the requester When the requester receives the token, it becomes the current token site and broadcasts a new message after setting sequence number derived from a field of the token into its message. Upon reception of it, any operating member is informed the position of the token site and will send token requesting message to the new token site. However, the other site may request the token to the old token site prior to receiving the broadcast message from the new token site. To resolve this problem, Btoken uses a message which is sent to the current token site by the old token site notifying who is the next token requester. Results of our simulation of the protocol show that Btoken is more efficient in the large scaled distributed system compared to existing broadcast protocols.

How to design the token reinforcement based on token economy for blockchain model

  • Yoo, Soonduck
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.157-164
    • /
    • 2020
  • The reinforcement of the token, which is based on the token economy currently applied in blockchain-based cryptography, plays a critical role in forming the cryptographic-related ecosystem. Therefore, in this paper, it was investigated the reinforcement principle of token supporting the Token economy for blockchain model. In order to create a healthy ecosystem based on the reinforcement system principle, it is necessary to find ways to secure scalability by seeking consensus between the participants and the market economy structure so that it can generate an influx of more participants than seeking to maximize profits of certain people. Desirable behavior is defined as an action required by ecosystem participants that have the property of making the token ecosystem sustainable, and to do so, each individual receives appropriate incentives (rewards) when taking this action, ultimately encouraging voluntary participation and action by all participants in the ecosystem to optimize the interests of both individuals and participants. The expected benefit of this study may contribute to the establishment of various business models based on the principle of the reinforcement system.

Business Model Types of Web3.0 Social Token Shaped by Tokenomics

  • Song, Minzheong
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.156-169
    • /
    • 2024
  • We look at three use cases by business model types of Web3.0 social tokens shaped by 'token eonomics (tokenomics).' As the platform token, 'Roll' mints unique tokens to creators' reputation and allows them to own the value they create. Creators incentivize their followers contributing to the community. Tokens issued on Roll have a fixed supply with 20% minted for creators and 80% distributed across three years. With 'Roll Memberships,' followers gain benefits across token-gated platforms and protocols while getting something in return from the creator. 'Roll Staking' allows creators to integrate their community into crypto-specific products like trading markets, enhancing the features being possible in a creator's community. As the community token, 'Whale' creates WHALE token backed by non-fungible tokens (NFTs), so that it derives its value from NFTs kept in NFT art collection, 'The Vault.' 'Hold-to-Play(H2P)' rewards distributed to token holders owning a minimum threshold of tokens allow them to access to exclusive access to benefits like airdrops, tips, rewards, and exclusive information. Whale DAO open to members locking 1,000 tokens allows them to post a proposal twice a month and to vote in the senate. DAO-Voter role allows members locking 500 tokens to access the vote in the senate, but not to present proposals. As the personal token, 'RAC' distributes RAC tokens to his loyal supporters as a reward. These tokens are available for exclusive content access. RacOS makes it possible for RAC Patreon subscribers to claim RAC tokens each month corresponding with their membership tier.

Improved UPC Algorithm Adopting a Dynamic Spacer for Traffic Control in ATM Networks (ATM망에서 트래픽 제어용 동적 지연기를 적용한 개선된 UPC 알고리즘)

  • Kim Wu Woan
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.192-200
    • /
    • 2005
  • In this paper, an improved User Parameter Control (UPC) algorithm is proposed for controlling traffic in ATM networks. The present algorithm consists of Cell Buffer, Red Token Pool, Green Token Pool, and Spacer. A token is generated at a certain time period, and the tokens are consumed one each time a cell arrives. At this time, if the delay element, named Spacer, is empty, the cell comes into the network. On the other hand, if Spacer is not empty, the cell cannot come into the network. In addition, in the case that tokens do not exist in Token Pool, the corresponding cell is thrown away The arbitrary function of the token used in this paper is removed. Instead, the token is used only to control network traffic. This research proposes new UPC Algorithm to improve the current cell delay rate and cell loss rate by dynamically adopting the delay element, named Spacer, with respect to the traffic condition, which is different from controlling that the cell comes into the network after a certain delay time period.

  • PDF

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

Performance and parameter region for real time use in IEEE 802.4 token bus network

  • Park, Hong-Seong;Kim, Deok-Woo;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1805-1810
    • /
    • 1991
  • This paper derives the upper and the lower bound of the mean cycle time and the mean service time of the class 6 and the class 4, within which the minimum utilization constrain of the class 4 is guaranteed. Also, derived are conditions under which the token bus network is stable or unstable. These bounds and stable conditions are represented in terms of the high priority token hold time, the token rotation time and the arrival rate and the total station number etc. This paper suggest a parameter tuning algorithm in a partially symmetric token bus network with two classes, which maximizes the token rotation time for a suitable high priority token hold time and at the same time meets the stability condition of the network, the real time constraint and the minimum utilization constraint of the class 4.

  • PDF

A Study on DNN-based STT Error Correction

  • Jong-Eon Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.171-176
    • /
    • 2023
  • This study is about a speech recognition error correction system designed to detect and correct speech recognition errors before natural language processing to increase the success rate of intent analysis in natural language processing with optimal efficiency in various service domains. An encoder is constructed to embedded the correct speech token and one or more error speech tokens corresponding to the correct speech token so that they are all located in a dense vector space for each correct token with similar vector values. One or more utterance tokens within a preset Manhattan distance based on the correct utterance token in the dense vector space for each embedded correct utterance token are detected through an error detector, and the correct answer closest to the detected error utterance token is based on the Manhattan distance. Errors are corrected by extracting the utterance token as the correct answer.

Characteristics of accurate token and all token diadochokinesis in patients with normal pressure hydrocephalus (정상압 수두증 환자와 정상 노인의 조음교대운동 수행력 비교)

  • Seong Hee Yoon;Ki-Su Park;Kyunghun Kang;Janghyeok Yoon;Ji-Wan Ha
    • Phonetics and Speech Sciences
    • /
    • v.16 no.1
    • /
    • pp.57-65
    • /
    • 2024
  • Normal pressure hydrocephalus (NPH) is a condition wherein the cerebrospinal pressure in the brain is within the normal range, but the cerebrospinal fluid increases above the normal level, causing ventriculomegaly. In patients with NPH, the articulatory system exhibits reduced mobility and range, which may affect diadochokinesis (DDK) and speech intelligibility. In this study, we investigated the characteristics of DDK, including accurate-token DDK and all-token DDK including inaccurate tokens, in patients with NPH and healthy elderly adults (HE). We also examined the classification accuracy of DDK between the two groups. Finally, we investigated whether there was a correlation between speech intelligibility and DDKs in the NPH group. The results showed that NPH and HE groups differed significantly in both accurate-token DDK and all-token DDK, and their classification accuracy was relatively high. However, there was no correlation between speech intelligibility and DDK. The findings suggest that the DDK is a useful method for sensitively assessing speech motor performance in patients with NPH.