Artykuły w czasopismach na temat „Database transaction safety”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Database transaction safety.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 48 najlepszych artykułów w czasopismach naukowych na temat „Database transaction safety”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Sheard, Tim, i David Stemple. "Automatic verification of database transaction safety". ACM Transactions on Database Systems 14, nr 3 (wrzesień 1989): 322–68. http://dx.doi.org/10.1145/68012.68014.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Lin, Jerry Chun-Wei, Matin Pirouz, Youcef Djenouri, Chien-Fu Cheng i Usman Ahmed. "Incrementally updating the high average-utility patterns with pre-large concept". Applied Intelligence 50, nr 11 (30.06.2020): 3788–807. http://dx.doi.org/10.1007/s10489-020-01743-y.

Pełny tekst źródła
Streszczenie:
Abstract High-utility itemset mining (HUIM) is considered as an emerging approach to detect the high-utility patterns from databases. Most existing algorithms of HUIM only consider the itemset utility regardless of the length. This limitation raises the utility as a result of a growing itemset size. High average-utility itemset mining (HAUIM) considers the size of the itemset, thus providing a more balanced scale to measure the average-utility for decision-making. Several algorithms were presented to efficiently mine the set of high average-utility itemsets (HAUIs) but most of them focus on handling static databases. In the past, a fast-updated (FUP)-based algorithm was developed to efficiently handle the incremental problem but it still has to re-scan the database when the itemset in the original database is small but there is a high average-utility upper-bound itemset (HAUUBI) in the newly inserted transactions. In this paper, an efficient framework called PRE-HAUIMI for transaction insertion in dynamic databases is developed, which relies on the average-utility-list (AUL) structures. Moreover, we apply the pre-large concept on HAUIM. A pre-large concept is used to speed up the mining performance, which can ensure that if the total utility in the newly inserted transaction is within the safety bound, the small itemsets in the original database could not be the large ones after the database is updated. This, in turn, reduces the recurring database scans and obtains the correct HAUIs. Experiments demonstrate that the PRE-HAUIMI outperforms the state-of-the-art batch mode HAUI-Miner, and the state-of-the-art incremental IHAUPM and FUP-based algorithms in terms of runtime, memory, number of assessed patterns and scalability.
Style APA, Harvard, Vancouver, ISO itp.
3

Chen, Chao, Abdelsalam (Sumi) Helal, Zhi Jin, Mingyue Zhang i Choonhwa Lee. "IoTranx: Transactions for Safer Smart Spaces". ACM Transactions on Cyber-Physical Systems 6, nr 1 (31.01.2022): 1–26. http://dx.doi.org/10.1145/3471937.

Pełny tekst źródła
Streszczenie:
Smart spaces such as smart homes deliver digital services to optimize space use and enhance user experience. They are composed of an Internet of Things (IoT), people, and physical content. They differ from traditional computer systems in that their cyber-physical nature ties intimately with the users and the built environment. The impact of ill-programmed applications in such spaces goes beyond loss of data or a computer crash, risking potentially physical harm to the space and its users. Ensuring smart space safety is therefore critically important to successfully deliver intimate and convenient services surrounding our daily lives. By modeling smart space as a highly dynamic database, we present IoT Transactions, an analogy to database transactions, as an abstraction for programming and executing the services as the handling of the devices in smart space. Unlike traditional database management systems that take a “clear room approach,” smart spaces take a “dirty room approach” where imperfection and unattainability of full control and guarantees are the new normal. We identify Atomicity, Isolation, Integrity and Durability (AI 2 D) as the set of properties necessary to define the safe runtime behavior for IoT transactions for maintaining “permissible device settings” of execution and to avoid or detect and resolve “impermissible settings.” Furthermore, we introduce a lock protocol, utilizing variations of lock concepts, that enforces AI 2 D safety properties during transaction processing. We show a brief proof of the protocol correctness and a detailed analytical model to evaluate its performance.
Style APA, Harvard, Vancouver, ISO itp.
4

Rahmawati, Rianti, Anak Agung Gde Agung i Fitri Sukmawati. "Aplikasi Perhitungan Persediaan Bahan Baku dengan Metode Economic Order Quantity Berdasarkan Varian Produk". Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) 5, nr 1 (13.03.2016): 34. http://dx.doi.org/10.23887/janapati.v5i1.9915.

Pełny tekst źródła
Streszczenie:
CV Dwi Sumber is one of manufacture company which handles sales with variant product. Recording process of raw materials from the warehouse until production process was done manually. The company ordered raw material with the same amount without checking the stock quantity available in the warehouse. For every order, the company must pay order fee. Transactions record were also done manually so it was not directly reduce the stock of raw materials in the warehouse. This accumulated to overstock in the warehouse. This application used Economic Order Quantity (EOQ) to calculate optimal raw material order so it can reduce order fee. This application can also record transaction, automatically reduce stock in the warehouse, calculate safety stock in the warehouse so management can decide when they have to reorder the raw material. Transaction record can be viewed as accounting journal and general ledger. This application is built using PHP programming language and MySQL database.
Style APA, Harvard, Vancouver, ISO itp.
5

Huang, Chen, Dan Wang, Zhen Wang i Jian Yun. "Development of Cultural Investment Trading Services Platform Based on Drupal Framework". Applied Mechanics and Materials 373-375 (sierpień 2013): 1647–51. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1647.

Pełny tekst źródła
Streszczenie:
We used a untraditional techniques --- Drupal, and created a cultural investment services platform. Drupal is superior to traditional techniques in terms of efficiency and safety. Site foreground selected Bartik theme, selected mysql database as background support, core transaction functionality implemented used Ubercart e-commerce module. Site has friendly search and browsing interface, and provide a forum, private messages and other communication means.
Style APA, Harvard, Vancouver, ISO itp.
6

Mohamed, Asghaiyer. "Network load traffic on MySQL atomic transaction database". Bulletin of Social Informatics Theory and Application 4, nr 1 (23.04.2020): 35–39. http://dx.doi.org/10.31763/businta.v4i1.188.

Pełny tekst źródła
Streszczenie:
Internet technology is developing very rapidly especially on the database system. Today's database has led to data that cannot be processed into the traditional way that we call big data. Some data stored on the server requires a way for the data to be valid and intact for that transaction mechanism appears on RDBMS which ensures that the data stored will become a unified whole as in customer account data, withdrawal of money at ATMs, e-transactions -commerce and so on. Of course the use of transactions in a database by not using Atomic transactions has a difference in terms of traffic on the network. This research appears by analyzing network traffic or density from a database that uses transactions and not to users who access them. This research method uses a questionnaire method by distributing questionnaires quantitatively to 300 respondents. The results of the study of approximately 300 respondents, researchers get the results that the use of transactions in databases and databases without transactions after being accessed by 300 people, the densest network is a network owned by a system that uses transaction features, this is because there is a slight increase of about 13% of traffic when compared to a network without transactions. This statement shows that two-way communication from a database that has the transaction provides feedback to the user so that the data is reliable as an indicator that the data has been stored safely. Further research can be done by finding other information or a study of big data using the atomic transaction model.
Style APA, Harvard, Vancouver, ISO itp.
7

Vandevoort, Brecht, Bas Ketsman, Christoph Koch i Frank Neven. "Robustness against read committed for transaction templates". Proceedings of the VLDB Endowment 14, nr 11 (lipiec 2021): 2141–53. http://dx.doi.org/10.14778/3476249.3476268.

Pełny tekst źródła
Streszczenie:
The isolation level Multiversion Read Committed (RC), offered by many database systems, is known to trade consistency for increased transaction throughput. Sometimes, transaction workloads can be safely executed under RC obtaining the perfect isolation of serializability at the lower cost of RC. To identify such cases, we introduce an expressive model of transaction programs to better reason about the serializability of transactional workloads. We develop tractable algorithms to decide whether any possible schedule of a workload executed under RC is serializable (referred to as the robustness problem). Our approach yields robust subsets that are larger than those identified by previous methods. We provide experimental evidence that workloads that are robust against RC can be evaluated faster under RC compared to stronger isolation levels. We discuss techniques for making workloads robust against RC by promoting selective read operations to updates. Depending on the scenario, the performance improvements can be considerable. Robustness testing and safely executing transactions under the lower isolation level RC can therefore provide a direct way to increase transaction throughput without changing DBMS internals.
Style APA, Harvard, Vancouver, ISO itp.
8

Haoxiang, Wang, i Smys S. "A Survey on Digital Fraud Risk Control Management by Automatic Case Management System". March 2021 3, nr 1 (10.05.2021): 1–14. http://dx.doi.org/10.36548/jeea.2021.1.001.

Pełny tekst źródła
Streszczenie:
In this digital era, a huge amount of money had been laundered via digital frauds, which mainly occur in the timeframe of electronic payment transaction made by first-time credit/debit card users. Currently, Finance organizations are facing several fraud attempts and it likely happens due to the current infrastructure, which only has an older database.. The current infrastructure diminishes the working environment of any finance organization sector with frequent fraud attempts. In this perspective, the roposed research article provides an overview for the development of an automated prevention system for any finance organization to protect it from any fraudulent attacks. The proposed automated case management system is used to monitor the expenses of the behavior study of users by avoiding the undesirable contact. The proposed research work develops a new management procedure to prevent the occurrence of electronic fraud in any finance organization. The existing procedure can predict digital fraud with an old updated database. This creates disaster and destructive analysis of the finance segment in their procedure. The cyber fraud phenomenon prediction is used to predict the fraud attempt with content-based analysis. The lack of resources is one of the enormous challenges in the digital fraud identification domain. The proposed scheme addresses to integrate all safety techniques to safeguard the stakeholders and finance institutions from cyber-attacks.
Style APA, Harvard, Vancouver, ISO itp.
9

Kuznetsov, Alexandr, Inna Oleshko, Vladyslav Tymchenko, Konstantin Lisitsky, Mariia Rodinko i Andrii Kolhatin. "Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain". International Journal of Computer Network and Information Security 13, nr 2 (8.04.2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.02.01.

Pełny tekst źródła
Streszczenie:
A blockchain, or in other words a chain of transaction blocks, is a distributed database that maintains an ordered chain of blocks that reliably connect the information contained in them. Copies of chain blocks are usually stored on multiple computers and synchronized in accordance with the rules of building a chain of blocks, which provides secure and change-resistant storage of information. To build linked lists of blocks hashing is used. Hashing is a special cryptographic primitive that provides one-way, resistance to collisions and search for prototypes computation of hash value (hash or message digest). In this paper a comparative analysis of the performance of hashing algorithms that can be used in modern decentralized blockchain networks are conducted. Specifically, the hash performance on different desktop systems, the number of cycles per byte (Cycles/byte), the amount of hashed message per second (MB/s) and the hash rate (KHash/s) are investigated. The comparative analysis of different hashing algorithms allows us to choose the most suitable candidates for building decentralized systems type of blockchain.
Style APA, Harvard, Vancouver, ISO itp.
10

Ou, Jiarui, i Jianglin Zhang. "Data Mining and Meta-Analysis of Psoriasis Based on Association Rules". Journal of Healthcare Engineering 2022 (27.01.2022): 1–11. http://dx.doi.org/10.1155/2022/9188553.

Pełny tekst źródła
Streszczenie:
Psoriasis is a common chronic and recurrent disease in dermatology, which has a great impact on the physical and mental health of patients. Meta-analysis can evaluate the effectiveness and safety of defubao in the treatment of psoriasis vulgaris. This article observes psoriasis skin lesions treated with topical defubao and the changes in blood vessels under dermoscopy. Considering that the Apriori algorithm and the existing improved algorithm have the problems of ignoring the weight and repeatedly scanning the database, this paper proposes a matrix association rule method based on random forest weighting. This method uses the random forest algorithm to assign weights to each item in the data set, and introduces matrix theory to convert the transaction data set into a matrix form and store it, thereby improving operating efficiency. This article included 11 studies, of which 7 studies used the indicator “Researcher’s Overall Assessment” (IGA) to evaluate the efficacy, 5 studies used the “Patient Overall Assessment” (PGA) as the efficacy evaluation index, and Loss Area and Severity Index (PASI) was used as an observation index to evaluate the efficacy. Seven studies conducted safety comparisons. In this paper, IGA and PGA were used as evaluation indicators. The treatment effect of the defubao group was better than the calcipotriol group and the betamethasone group. The differences were statistically significant. The effect of the Fubao treatment for 8 weeks is significantly better than that of 4 weeks and 2 weeks, and the differences are statistically different. Using PASI as the evaluation index, a descriptive study was carried out, and it was found that after 4 weeks of treatment for psoriasis vulgaris, the average PASI reduction rate of patients was higher than that of the calcipotriol group and the betamethasone group. The safety evaluation found that after 8 weeks of treatment, the incidence of adverse events in the defubao group was significantly lower than that in the calcipotriol group.
Style APA, Harvard, Vancouver, ISO itp.
11

Yu, Xiaona, Chunmei Zhang i Chengcheng Wang. "Construction of Hospital Human Resource Information Management System under the Background of Artificial Intelligence". Computational and Mathematical Methods in Medicine 2022 (4.08.2022): 1–11. http://dx.doi.org/10.1155/2022/8377674.

Pełny tekst źródła
Streszczenie:
Under the background of artificial intelligence (AI), a human resource information management system was designed to facilitate hospital human resource management and improve hospital management efficiency. Based on AI, SOA was constructed and Java2 platform enterprise edition (J2EE) was combined with Java to design and research hospital human resource information management system. In addition, the function and performance required by the system were tested. The results showed that the designed system showed high safety in requirement analysis and performance. The function focused mainly on the systematic analysis of personnel management, recruitment management, organization and personnel management, and patient medical information. The constructed system could work normally and achieve the efficiency of hospital human resource management. The evaluation response time of system home page access was less than 1 second when 300 users were concurrent, and the utilization rate of service CPU was lower than 50% without abnormal memory fluctuation. The concurrent response time of all 20 managers online was less than 5 seconds, and the utilization rate of the service was lower than 70%. When the information of 100 employees in the system was queried concurrently, the average CPU utilization of the database server exceeded 90%. After performance optimization, the test result showed that the transaction response time was reduced to 0.23 seconds, which met the target requirement. In conclusion, the proposed intelligent human resource management system could reduce hospital management cost and the high sharing of human resource information provided a reference for the decision-making system of hospital leaders.
Style APA, Harvard, Vancouver, ISO itp.
12

Wolfson, Ouri, i Mihalis Yannakakis. "Deadlock-freedom (and safety) of transactions in a distributed database". Journal of Computer and System Sciences 33, nr 2 (październik 1986): 161–78. http://dx.doi.org/10.1016/0022-0000(86)90017-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
13

Lin, Jerry Chun-Wei, Wensheng Gan, Tzung-Pei Hong i Jingliang Zhang. "Updating the Built Prelarge Fast Updated Sequential Pattern Trees with Sequence Modification". International Journal of Data Warehousing and Mining 11, nr 1 (styczeń 2015): 1–22. http://dx.doi.org/10.4018/ijdwm.2015010101.

Pełny tekst źródła
Streszczenie:
Mining useful information or knowledge from a very large database to aid managers or decision makers to make appropriate decisions is a critical issue in recent years. Sequential patterns can be used to discover the purchased behaviors of customers or the usage behaviors of users from Web log data. Most approaches process a static database to discover sequential patterns in a batch way. In real-world applications, transactions or sequences in databases are frequently changed. In the past, a fast updated sequential pattern (FUSP)-tree was proposed to handle dynamic databases whether for sequence insertion, deletion or modification based on FUP concepts. Original database is required to be re-scanned if it is necessary to maintain the small sequences which was not kept in the FUSP tree. In this paper, the prelarge concept was adopted to maintain and update the built prelarge FUSP tree for sequence modification. A prelarge FUSP tree is modified from FUSP tree for preserving not only the frequent 1-sequences but also the prelarge 1-sequences in the tree structure. The PRELARGE-FUSP-TREE-MOD maintenance algorithm is proposed to reduce the rescans of the original database due to the pruning properties of prelarge concept. When the number of modified sequences is smaller than the safety bound of the prelarge concept, better results can be obtained by the proposed PRELARGE-FUSP-TREE-MOD maintenance algorithm for sequence modification in dynamic databases.
Style APA, Harvard, Vancouver, ISO itp.
14

Dhika, Harry, Merita Ayu Sri Maharani i Atikah Atikah. "PERANCANGAN SISTEM INFORMASI PEMBAYARAN SERVIS ELEKTRONIK TOKO MS COMPUTER MENGGUNAKAN JAVA DAN MYSQL". SINTECH (Science and Information Technology) Journal 4, nr 1 (21.04.2021): 59–66. http://dx.doi.org/10.31598/sintechjournal.v4i1.703.

Pełny tekst źródła
Streszczenie:
The problems in the MS Computer Store are the difficulty of officers in data collection of incoming goods, service payment transaction data and the absence of an information system related to customer service data collection. With this problem, an information system is needed to make it easier for officers in the process of data collection which will be stored safely in the database and printing of reports that will be submitted to the Manager of MS Computer. The purpose of this research is to design an electronic service payment application system which is expected to make it easier to process data and transactions properly and quickly. The system is designed using the Research and Development Method because it is more precise. Where in building this system used System Design tools, namely Data Flow Diagrams (DAD), Context, Zero and Detailed and using the Java programming language with Netbeans and MYSQL Database using Xampp. The results of research that has been carried out at the MS Computer Store, with the existence of an electronic service payment application system replacing the old system, the current employee performance becomes more effective and efficient. Admin does not need to input service data or electronic service payments manually, because this application system provides service data entry forms and payment data.
Style APA, Harvard, Vancouver, ISO itp.
15

Chakraborty, A., M. K. Garg, A. K. Majumdar i S. Sural. "Attack recovery from malicious transactions in distributed database systems". International Journal of Information and Computer Security 2, nr 2 (2008): 197. http://dx.doi.org/10.1504/ijics.2008.018519.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Prashar, Deepak, Nishant Jha, Sudan Jha, Yongju Lee i Gyanendra Prasad Joshi. "Blockchain-Based Traceability and Visibility for Agricultural Products: A Decentralized Way of Ensuring Food Safety in India". Sustainability 12, nr 8 (24.04.2020): 3497. http://dx.doi.org/10.3390/su12083497.

Pełny tekst źródła
Streszczenie:
The globalization of the food supply chain industry has significantly emerged today. Due to this, farm-to-fork food safety and quality certification have become very important. Increasing threats to food security and contamination have led to the enormous need for a revolutionary traceability system, an important mechanism for quality control that ensures sufficient food supply chain product safety. In this work, we proposed a blockchain-based solution that removes the need for a secure centralized structure, intermediaries, and exchanges of information, optimizes performance, and complies with a strong level of safety and integrity. Our approach completely relies on the use of smart contracts to monitor and manage all communications and transactions within the supply chain network among all of the stakeholders. Our approach verifies all of the transactions, which are recorded and stored in a centralized interplanetary file system database. It allows a secure and cost-effective supply chain system for the stakeholders. Thus, our proposed model gives a transparent, accurate, and traceable supply chain system. The proposed solution shows a throughput of 161 transactions per second with a convergence time of 4.82 s, and was found effective in the traceability of the agricultural products.
Style APA, Harvard, Vancouver, ISO itp.
17

Elleuch, Islam, Achraf Makni i Rafik Bouaziz. "Cooperative Overtaking Assistance System Based on V2V Communications and RTDB". Computer Journal 62, nr 10 (10.04.2019): 1426–49. http://dx.doi.org/10.1093/comjnl/bxz026.

Pełny tekst źródła
Streszczenie:
Abstract Overtaking maneuvers in roads cause a large number of accidents. To prevent collisions, numerous cooperative overtaking assistance systems, based on Vehicular Ad hoc Networks (VANET), have been proposed. However, these systems may meet problems in case of data congestion or data loss. To improve overtaking safety, this paper studies the use of Vehicle-To-Vehicle (V2V) communications and Real-Time DataBases (RTDB). More precisely, we suggest a new integrated system, called Cooperative Overtaking Assistance Persistent System (COAPS), to better avoid potential collisions during overtaking maneuvers. Each vehicle stores its information in a local RTDB, along with the adjacent vehicles’ information. While detecting an overtaking intention, the vehicle COAPS queries its database and selects the preceding vehicle(s) and the oncoming one(s) from the other direction to make decision about the overtaking. It controls the overtaking in case of positive decision or reduces the vehicle speed to avoid a collision ahead, in the other case. Simulations of different driving scenarios, under the Vehicles In Network Simulation (VEINS) framework, show that COAPS provides a high level of overtaking safety due to the V2V communications, the RTDB and the notion of Quality of Data used to reduce the number of data freshness transactions.
Style APA, Harvard, Vancouver, ISO itp.
18

Adane, Dattatraya, i Harmeet Kaur Khanuja. "Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence". International Journal of Electronic Security and Digital Forensics 12, nr 2 (2020): 154. http://dx.doi.org/10.1504/ijesdf.2020.10027593.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Khanuja, Harmeet Kaur, i Dattatraya Adane. "Monitor and detect suspicious transactions with database forensics and Dempster-Shafer theory of evidence". International Journal of Electronic Security and Digital Forensics 12, nr 2 (2020): 154. http://dx.doi.org/10.1504/ijesdf.2020.106302.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
20

Wang, Qun, i Ting Xue. "Tunnel Security Management Based on Association Rule Mining under Hadoop Platform". Mathematical Problems in Engineering 2022 (10.08.2022): 1–11. http://dx.doi.org/10.1155/2022/8508273.

Pełny tekst źródła
Streszczenie:
The problem of how to use large amounts of historical data for tunnel safety management has a greater practical application value. The association rule method in data mining technology can provide effective decision support for tunnel safety prevention by mining historical data. To address the problem of large data volume and sparse data items in tunnel safety management, an association rule method—Apriori algorithm—based on the Hadoop platform is proposed to improve the efficiency and accuracy of data mining in cloud environment. First, the parallel MapReduce implementation steps are analyzed on the basis of the distributed Hadoop framework. Then, the existing single-user data validation algorithm is improved by applying a multiuser parallel validation algorithm to Apriori in order to reduce the number of validations. Next, the traditional association rule Apriori algorithm is MapReduce optimized to generate a smaller set of useless candidate items. At the same time, Boolean ranking is used to optimize the way transactional data are stored in the database, reducing the number of redundant subsets and the number of times the database is connected, and shortening the task processing time. The experimental results show that the proposed method is able to mine the relationships between tunnel safety hazards and provide effective decision support for tunnel safety prevention. At the same time, the proposed method more efficiently operates than other association rule methods.
Style APA, Harvard, Vancouver, ISO itp.
21

Anggraini, Ria, i Andri Andri. "Sistem Informasi Webstore Online Pada Toko DK Corner Menggunakan Metode Web Design Responsive Bootstrap". Jurnal Nasional Ilmu Komputer 2, nr 3 (20.11.2021): 180–92. http://dx.doi.org/10.47747/jurnalnik.v2i3.532.

Pełny tekst źródła
Streszczenie:
Toko DK Corner is a trading company that specializes in selling women's daily fashion needs. Currently, the DK Corner Store records more than thousands of sales transactions every year, thus requiring the company to be able to provide ordering services for consumers to support better sales and service transactions and of course increase sales profits. The system development method used in system development is Web Engineering. To implement this sales and ordering information system, supporting components are needed in order to work properly. These components include using the PHP programming language (Personal Homepage), Bootstrap Framework and "for data storage using a MySQL database". "The design of this system is expected to help and overcome existing problems so that it can be useful for interested parties". The purpose of this research is expected with the information system is expected to make it easier for companies to promote the products on offer and make it easier to make online sales transactions so that they can be done anytime and safely, and can increase sales.
Style APA, Harvard, Vancouver, ISO itp.
22

Touil, Hamza, Nabil El Akkad i Khalid Satori. "H-Rotation: Secure Storage and Retrieval of Passphrases on the Authentication Process". International Journal of Safety and Security Engineering 10, nr 6 (31.12.2020): 785–96. http://dx.doi.org/10.18280/ijsse.100609.

Pełny tekst źródła
Streszczenie:
Passwords/passphrases can be either system generated or user-selected. A combination of both approaches is also possible—encryption created by the system and assigned to the user by the information system meeting the policy requirements. Policy rules can be designed to increase security and usability factors, such as information storage and retrieval. This paper proposes an algorithm dedicated to the security of passphrases in an online authentication, so the passphrase entered will be stored in a remote database. Through an SHA-3 hash function, the system must hash the pass phase. Before storage, the system must apply random rotations on the already generated HASH while eliminating any traceability performed on the different transactions performed. To prevent the hacker from using them recurrently if he wants to attack our database. Then the system must recover the real HASH and then the passphrase based on the data provided by the user in the form of codes.
Style APA, Harvard, Vancouver, ISO itp.
23

Touil, Hamza, Nabil El Akkad i Khalid Satori. "H-Rotation: Secure Storage and Retrieval of Passphrases on the Authentication Process". International Journal of Safety and Security Engineering 10, nr 6 (31.12.2020): 785–96. http://dx.doi.org/10.18280/ijsse.100609.

Pełny tekst źródła
Streszczenie:
Passwords/passphrases can be either system generated or user-selected. A combination of both approaches is also possible—encryption created by the system and assigned to the user by the information system meeting the policy requirements. Policy rules can be designed to increase security and usability factors, such as information storage and retrieval. This paper proposes an algorithm dedicated to the security of passphrases in an online authentication, so the passphrase entered will be stored in a remote database. Through an SHA-3 hash function, the system must hash the pass phase. Before storage, the system must apply random rotations on the already generated HASH while eliminating any traceability performed on the different transactions performed. To prevent the hacker from using them recurrently if he wants to attack our database. Then the system must recover the real HASH and then the passphrase based on the data provided by the user in the form of codes.
Style APA, Harvard, Vancouver, ISO itp.
24

Kaur, Amanpreet, Gurpreet Singh, Vinay Kukreja, Sparsh Sharma, Saurabh Singh i Byungun Yoon. "Adaptation of IoT with Blockchain in Food Supply Chain Management: An Analysis-Based Review in Development, Benefits and Potential Applications". Sensors 22, nr 21 (25.10.2022): 8174. http://dx.doi.org/10.3390/s22218174.

Pełny tekst źródła
Streszczenie:
In today’s scenario, blockchain technology is an emerging area and promising technology in the field of the food supply chain industry (FSCI). A literature survey comprising an analytical review of blockchain technology with the Internet of things (IoT) for food supply chain management (FSCM) is presented to better understand the associated research benefits, issues, and challenges. At present, with the concept of farm-to-fork gaining increasing popularity, food safety and quality certification are of critical concern. Blockchain technology provides the traceability of food supply from the source, i.e., the seeding factories, to the customer’s table. The main idea of this paper is to identify blockchain technology with the Internet of things (IoT) devices to investigate the food conditions and various issues faced by transporters while supplying fresh food. Blockchain provides applications such as smart contracts to monitor, observe, and manage all transactions and communications among stakeholders. IoT technology provides approaches for verifying all transactions; these transactions are recorded and then stored in a centralized database system. Thus, IoT enables a safe and cost-effective FSCM system for stakeholders. In this paper, we contribute to the awareness of blockchain applications that are relevant to the food supply chain (FSC), and we present an analysis of the literature on relevant blockchain applications which has been conducted concerning various parameters. The observations in the present survey are also relevant to the application of blockchain technology with IoT in other areas.
Style APA, Harvard, Vancouver, ISO itp.
25

Ambarwati, Ambarwati. "Rancang Bangun Sistem Penjualan Furniture Menggunakan Metode Exponential Smoothing". Journal of Computer System and Informatics (JoSYC) 2, nr 4 (31.08.2021): 280–87. http://dx.doi.org/10.47065/josyc.v2i4.816.

Pełny tekst źródła
Streszczenie:
Furniture Agung is an MSME engaged in furniture located in the district of Semarang. MSMEs are still conducting data collection, processing and transactions that are carried out manually. This process becomes ineffective and inefficient because errors can occur in recording and data can be lost. This research aims to design an information system for furniture sales and sales forecasting using the exponential smoothing method in September 2020 to May 2021. Based on the results of sales analysis testing using the exponential smoothing method using alpha 0.2 in May 2021, the calculation of forecasting demand for furniture products as many as 41 pieces. The results of calculations using mean square error (MSE) alpha 0.2 to predict the error rate of furniture demand are: 69.22 = 69. This system research uses a codeigniter framework, and MySql as a database server. The design of the web-based system is expected to make it easier for MSMEs to conduct digital transactions and manage goods data so that data reports can be known easily, quickly, accurately, and data is stored safely
Style APA, Harvard, Vancouver, ISO itp.
26

Gîrbacia, F., D. Voinea, R. Boboc, M. Duguleană i C. C. Postelnicu. "Toward blockchain adoption for the automotive industry". IOP Conference Series: Materials Science and Engineering 1220, nr 1 (1.01.2022): 012026. http://dx.doi.org/10.1088/1757-899x/1220/1/012026.

Pełny tekst źródła
Streszczenie:
Abstract Blockchain proves to be a powerful technology that can drive forward the automotive industry. This paper describes how blockchain has been applied, which automotive areas are most interested in the technology, as well as the benefits and challenges of blockchain for the automotive industry by a systematic literature review. Blockchain offers many advantages, such as: transparency, security, high speed of operations. There are numerous areas where this technology could be applied in the automotive domain: better protection against counterfeit spare parts and materials, effective preventive maintenance, by informing the services based on the data received from the car sensors, monitoring of the cars by the rental companies, the safe storage of the data used by intelligent navigation systems, in order not to affect the safety of the passengers, autonomous transactions, triggered by the vehicle for making payments in charging stations, all with the purpose of facilitating a good and safer medium for drivers. The future vehicle will be connected both with other vehicles, but also with the existing infrastructure, so a database containing cryptographically secure information is needed, and blockchain is such a solution that can be applied in the dynamic nature of traffic.
Style APA, Harvard, Vancouver, ISO itp.
27

Peng, Wang, Nuzul Azam Haron, Aidi Hizami Alias i Teik Hua Law. "Leadership in Construction: A Scientometric Review". Buildings 12, nr 11 (31.10.2022): 1825. http://dx.doi.org/10.3390/buildings12111825.

Pełny tekst źródła
Streszczenie:
Leadership plays an increasingly important role in construction projects, and numerous research studies have been conducted. This study aims to identify the structure evolution development trends of this knowledge domain using visualisation analysis with CiteSpace. A total of 1789 peer-reviewed articles are collected from Scopus and the WoS core collection database to conduct a scientometric analysis. The results indicate that the US dominates this field and that institutions from Australia have made greater contributions. However, international cooperation in this area is not active. A total of eight co-citation clusters were identified, and the research of leadership in construction primarily focused on the topics of transactional leadership, safety leadership, team performance, leadership interaction processes and actual leader behaviour. The keywords co-occurrence evolution analysis was also conducted to provide a holistic knowledge map. Based on the development of this field and its current status, we propose trends and innovative research areas for future research. The findings in this research would help scholars to understand the structure and future trends of this field. Meanwhile, the research results would provide a reference for construction enterprises to formulate project manager competency criteria.
Style APA, Harvard, Vancouver, ISO itp.
28

Sudarto, Ferry, Mulyati Mulyati, Eka Purnama Harahap i Fira Arbaimaniar Nurul. "Design Of Property Sales Information System PT.Quality Property Indonesia". Aptisi Transactions on Management (ATM) 4, nr 2 (4.06.2020): 150–57. http://dx.doi.org/10.33050/atm.v4i2.1272.

Pełny tekst źródła
Streszczenie:
In the property business, this company can help provide a place for long-term business and investment. In this discussion the property sales system used is to use SWOT, so that it can help stakeholders in make decisions. In this case the author uses several methods including research methods, analysis methods, design methods, testing methods. Where the research methods in the form of observation, interviews, literature studies. The analysis method which uses SWOT analysis. The design method uses a design model using UML (Unified modeling language), PHP a database using MYSQL, and browser using Google Chrome. The testing method uses a blackbox. In this case the researchers have several objectives in conducting research in this thesis including To facilitate marketing to market property products sold by entering the list of properties to be sold, To help the process of buying and selling transactions quickly, precisely, and safely, To help process sales reports . Then the results customer will easily find the property to be purchased, Easing the burden on admin staff in the process of buying and selling property, Can speed up sales reports and can reduce errors in recording reports. Keywords: Sales, SWOT (strengths, weaknesses, opportunities, threats), MYSQL.
Style APA, Harvard, Vancouver, ISO itp.
29

Morikawa, Landon H., Sailesh V. Tummala, Joseph C. Brinkman, Skye A. Buckner Petty i Anikar Chhabra. "Effect of a Condensed NBA Season on Injury Risk: An Analysis of the 2020 Season and Player Safety". Orthopaedic Journal of Sports Medicine 10, nr 9 (1.09.2022): 232596712211211. http://dx.doi.org/10.1177/23259671221121116.

Pełny tekst źródła
Streszczenie:
Background: Health and safety concerns surrounding the coronavirus 2019 (COVID-19) pandemic led the National Basketball Association (NBA) to condense and accelerate the 2020 season. Although prior literature has suggested that inadequate rest may lead to an increased injury risk, the unique circumstances surrounding this season offer a unique opportunity to evaluate player safety in the setting of reduced interval rest. Hypothesis: We hypothesized that the condensed 2020 NBA season resulted in an increased overall injury risk as compared with the 2015 to 2018 seasons. Study Design: Descriptive epidemiology study. Methods: A publicly available database, Pro Sports Transactions, was queried for injuries that forced players to miss ≥1 game between the 2015 and 2020 seasons. Data from the 2019 season were omitted given the abrupt suspension of the league year. All injury incidences were calculated per 1000 game-exposures (GEs). The primary outcome was the overall injury proportion ratio (IPR) between the 2020 season and previous seasons. Secondary measures included injury incidences stratified by type, severity, age, position, and minutes per game. Results: A total of 4346 injuries occurred over a 5-season span among 2572 unique player-seasons. The overall incidence of injury during the 2020 season was 48.20 per 1000 GEs but decreased to 39.97 per 1000 GEs when excluding COVID-19. Despite this exclusion, the overall injury rate in 2020 remained significantly greater (IPR, 1.42 [95% CI, 1.32-1.52]) than that of the 2015 to 2018 seasons (28.20 per 1000 GEs). On closer evaluation, the most notable increases seen in the 2020 season occurred within minor injuries requiring only a 1-game absence (IPR, 1.53 [95% CI, 1.37-1.70]) and in players who were aged 25 to 29 years (IPR, 1.57 [95% CI, 1.40-2.63]), averaging ≥30.0 minutes per game (IPR, 1.67 [95% CI, 1.47-1.90]), and playing the point guard position (IPR, 1.67 [95% 1.44-1.95]). Conclusion: Players in the condensed 2020 NBA season had a significantly higher incidence of injuries when compared with the prior 4 seasons, even when excluding COVID-19–related absences. This rise is consistent with the other congested NBA seasons of 1998 and 2011. These findings suggest that condensing the NBA schedule is associated with an increased risk to player health and safety.
Style APA, Harvard, Vancouver, ISO itp.
30

Londhe, Alka, P. V. R. D. Prasada Rao, Shrikant Upadhyay i Rituraj Jain. "Extracting Behavior Identification Features for Monitoring and Managing Speech-Dependent Smart Mental Illness Healthcare Systems". Computational Intelligence and Neuroscience 2022 (6.05.2022): 1–14. http://dx.doi.org/10.1155/2022/8579640.

Pełny tekst źródła
Streszczenie:
Speech is one of the major communication tools to share information among people. This exchange method has a complicated construction consisting of not the best imparting of voice but additionally consisting of the transmission of many-speaker unique information. The most important aim of this research is to extract individual features through the speech-dependent health monitoring and management system; through this system, the speech data can be collected from a remote location and can be accessed. The experimental analysis shows that the proposed model has a good efficiency. Consequently, in the last 5 years, many researchers from this domain come in front to explore various aspects of speech which includes speech analysis using mechanical signs, human system interaction, speaker, and speech identification. Speech is a biometric that combines physiological and behavioural characteristics. Especially beneficial for remote attack transactions over telecommunication networks, the medical information of each person is quite a challenge, e.g., like COVID-19 where the medical team has to identify each person in a particular region that how many people got affected by some disease and took a quick measure to get protected from such diseases and what are the safety measure required. Presently, this task is the most challenging one for researchers. Therefore, speech-based mechanisms might be useful for tracking his/her voice quality or throat getting affected. By collecting the database of people matched and comparing with his/her original database, it can be identified in such scenarios. This provides the better management system without touching and maintains a safe distance data that can be gathered and processed for further medical treatment. Many research studies have been done but speech-dependent approach is quite less and it requires more work to provide such a smart system in society, and it may be possible to reduce the chances to come into contact with viral effected people in the future and protect society for the same.
Style APA, Harvard, Vancouver, ISO itp.
31

de la Peña, Nuria, i Heywood Fleisig. "Romania: Law on Security Interests in Personal Property and Commentaries". Review of Central and East European Law 29, nr 2 (2004): 133–217. http://dx.doi.org/10.1163/157303504774062411.

Pełny tekst źródła
Streszczenie:
AbstractThis paper presents the Romanian Law on Security Interests in Movable Property, together with commentaries on its main articles. It also discusses the background research and analysis that preceded the enactment of the law. Problems in the legal and institutional framework for secured transactions ranked high among the factors that limited access to credit in Romania. Limited access to credit, in turn, led to lower rates of investment and, thence, to lower rates of economic growth. Moreover, since the existing credit system could safely take as collateral only large holdings of real estate, the credit system discriminated heavily against those with mainly movable property as assets—the poor and operators of small businesses and farms. These legal problems reduced access to credit in Romania more than did macroeconomic instability or a variety of other structural features of the economy. Moreover, these limits would have lingered on undiminished long after macroeconomic stability could have been achieved. Limited access to credit has been generally recognized as constraining growth and aggravating poverty. Many donors and governments have attempted to address this problem without remedying its underlying legal roots: they have supported directed credit programs, state loan guarantees, state-funded guarantee funds, and direct loans by state agencies. These efforts typically end in disaster. Even where employees of such institutions matched their private counterparts in their desire to collect loans, the legal and regulatory framework prevented collection. State lenders may be able to make loans that the private sector will not make; however, they are no more able to collect them. No one has devised a feasible and effective economic remedy to this legal problem. Good public policy relaxes limits to access to credit by addressing the legal roots of this problem. Notwithstanding the importance of collateral to lenders and of movable property to producers, before the reform, the laws and legal registries of Romania largely prevented private lenders from taking movable property as collateral for loans. The new Romanian Law on Security Interests in Personal Property remedies this problem. It sets out a comprehensive framework for using personal property as collateral for loans. It introduces a broad system of security interests in personal property that derogates the existing narrow regime of non-possessory pledges. The law broadens the range of property that can serve as collateral under the concept of security interests (Garantiile Reale) far beyond the scope of what the pre-reform pledge. Today, a wide variety of property and transactions can secure a loan. The law sets out a compulsory and unique system for establishing priority among creditors in collateral. It provides that the first creditor who files a notice of the security interest shall be the first entitled to receive the proceeds from the sale of the collateral should the borrower default. These provisions apply to any secured creditor and to any creditor who—under any contract—has a right to satisfaction from property of the debtor or from property in the debtor's possession. This includes creditors in financial leases, conditional sales, warehouse operations, and accounts receivable financing. The law provides that the ranking of priority depends only on the time of filing a notice of the security interest in an Electronic Archive. Unlike a pledge registry, this Archive system does not register the security agreement. Rather, it files in a database a notice that a security interest exists. This notice contains minimal information about the parties to the transaction and the security interest. Furthermore, the law sets out—for the first time anywhere in the world—a registry archive in the Internet that may be accessed on-line both to file and to retrieve information.
Style APA, Harvard, Vancouver, ISO itp.
32

Berman, Jules J. "Zero-Check: A Zero-Knowledge Protocol for Reconciling Patient Identities Across Institutions". Archives of Pathology & Laboratory Medicine 128, nr 3 (1.03.2004): 344–46. http://dx.doi.org/10.5858/2004-128-344-zazpfr.

Pełny tekst źródła
Streszczenie:
Abstract Context.—Large, multi-institutional studies often involve merging data records that have been de-identified to protect patient privacy. Unless patient identities can be reconciled across institutions, individuals with records held in different institutions will be falsely “counted” as multiple persons when databases are merged. Objective.—The purpose of this article is to describe a protocol that can reconcile individuals with records in multiple institutions. Design.—Institution A and Institution B each create a random character string and send it to the other institution. Each institution receives the random string from the other institution and sums it with their own random string, producing a random string common to both institutions (RandA+B). Each institution takes a unique patient identifier and sums it with RandA+B. The product is a random character string that is identical across institutions when the patient is identical in both institutions. A comparison protocol can be implemented as a zero-knowledge transaction, ensuring that neither institution obtains any knowledge of its own patient or of the patient compared at another institution. Results.—The protocol can be executed at high computational speed. No encryption algorithm or 1-way hash algorithm is employed, and there is no need to protect the protocol from discovery. Conclusion.—A zero-knowledge protocol for reconciling patients across institutions is described. This protocol is one of many computational tools that permit pathologists to safely share clinical and research data.
Style APA, Harvard, Vancouver, ISO itp.
33

Yeung, A. W. K. "The “As Low As Reasonably Achievable” (ALARA) principle: a brief historical overview and a bibliometric analysis of the most cited publications". Radioprotection 54, nr 2 (kwiecień 2019): 103–9. http://dx.doi.org/10.1051/radiopro/2019016.

Pełny tekst źródła
Streszczenie:
The “As Low As Reasonably Achievable” (ALARA) principle is largely followed in the radiology field. The current article provided a historical overview on the evolution and development of the ALARA principle and its related concepts. Meanwhile, the scientific impact of papers dealing with the ALARA principle was largely unknown. The current study aimed to identify the body of literature dealing with the ALARA principle, which of them were cited the most, and which of their references were cited the most. The Web of Science database hosted by Clarivate Analytics was accessed. Relevant papers were identified and analyzed. The search identified 979 relevant publications. Six journals (Health Physics, Pediatric Radiology, Radiation Protection Dosimetry, Transactions of the American Nuclear Society, Fusion Engineering and Design, and American Journal of Roentgenology) have accounted for nearly one-fifth of these publications. The most cited publications and references mainly related to two patient groups, children and pregnant women. It is important to adhere to the ALARA principle whenever a decision is made to irradiate a patient, because the exact effect of radiation on the patient health is not yet totally understood and predictable.
Style APA, Harvard, Vancouver, ISO itp.
34

Wijayanti, Kusumaningrum, i Qurratul Aini. "The Influence of Transformational Leadership Style to Nurse Job Satisfaction and Performance in Hospital". Journal of World Science 1, nr 7 (20.07.2022): 485–99. http://dx.doi.org/10.36418/jws.v1i7.69.

Pełny tekst źródła
Streszczenie:
The complexity of today's healthcare system challenges hospitals to provide safe, patient-oriented, and cost-effective services. Leadership style in an organization is one factor that plays an essential role in increasing or slowing down the interest and commitment of individuals in the organization. The transformational leadership style emphasizes moral principles, cooperation, and community together united in the privilege of human ethics. Job satisfaction of nurses is expected to improve their performance to create full service to patients. This literature review aims to determine the effect of transformational leadership style on job satisfaction and performance of hospital nurses. The method in this study is a literature review by searching for articles through the Ebscohost, Science direct, and Proquest electronic databases published from 2016-2021 and meeting the inclusion criteria. The review process uses the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. Results: The results of this review obtained nine articles showing that the transformational leadership style has a positive influence on job satisfaction. Five reports show that leadership positively affects nurse performance in hospitals. Transformational leadership style influences job satisfaction and nurse performance in hospitals. Transformational leadership has more influence on nurse performance than transactional leadership in public hospitals. Nurses' job satisfaction is influenced by opportunity, structural empowerment, job attachment, work environment, and stress. At the same time, nurse performance is influenced by organizational commitment, employee empowerment, workload, motivation, stress, psychological safety, work attachment, and work environment.
Style APA, Harvard, Vancouver, ISO itp.
35

Wijayanti, Kusumaningrum, i Qurratul Aini. "The Influence of Transformational Leadership Style to Nurse Job Satisfaction and Performance in Hospital". Journal of World Science 1, nr 7 (20.07.2022): 485–99. http://dx.doi.org/10.58344/jws.v1i7.69.

Pełny tekst źródła
Streszczenie:
The complexity of today's healthcare system challenges hospitals to provide safe, patient-oriented, and cost-effective services. Leadership style in an organization is one factor that plays an essential role in increasing or slowing down the interest and commitment of individuals in the organization. The transformational leadership style emphasizes moral principles, cooperation, and community together united in the privilege of human ethics. Job satisfaction of nurses is expected to improve their performance to create full service to patients. This literature review aims to determine the effect of transformational leadership style on job satisfaction and performance of hospital nurses. The method in this study is a literature review by searching for articles through the Ebscohost, Science direct, and Proquest electronic databases published from 2016-2021 and meeting the inclusion criteria. The review process uses the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. Results: The results of this review obtained nine articles showing that the transformational leadership style has a positive influence on job satisfaction. Five reports show that leadership positively affects nurse performance in hospitals. Transformational leadership style influences job satisfaction and nurse performance in hospitals. Transformational leadership has more influence on nurse performance than transactional leadership in public hospitals. Nurses' job satisfaction is influenced by opportunity, structural empowerment, job attachment, work environment, and stress. At the same time, nurse performance is influenced by organizational commitment, employee empowerment, workload, motivation, stress, psychological safety, work attachment, and work environment.
Style APA, Harvard, Vancouver, ISO itp.
36

Deng, Yinjuan, Shangping Wang, Qian Zhang i Jifang Wang. "A Secure and Efficient Access Control Scheme for Shared IoT Devices over Blockchain". Mobile Information Systems 2022 (31.12.2022): 1–21. http://dx.doi.org/10.1155/2022/4496486.

Pełny tekst źródła
Streszczenie:
The concept of shared IoT devices has attracted much attention from the industry sector, academia, and financial institutions, providing various benefits, such as saving resources, reducing personal expenses, and providing convenience. Although shared IoT devices facilitate people’s lives and work, the information exchange is over wireless networks that may suffer from some security attacks such as unauthorized access to a shared device or some private information of legitimate users being leaked. It makes the secure access control to the shared IoT devices become an intractable issue. In order to guarantee the access right of the legitimate users, to prevent the problems of privacy leakage and unnecessary economic disputes, a secure decentralized access control scheme for shared IoT devices is proposed leveraging the technologies of blockchain and a proposed authentication protocol in this paper. The new lightweight authentication protocol is proposed to perform mutual authentication between the user and the IoT device. To protect the privacy of the user, the instruction data are encrypted by a temporary session key negotiated between the user and the IoT device with the help of blockchain which enables nontamperable transactions and prevents central corruption and single point of failure. In our scheme, blockchain is maintained by the gateway nodes an acts as a distributed database and a smart contract for shared service is deployed on it. The smart contract has three functions in our scheme: (1) achieving the prepayment of users and settlement for the service contributor, (2) participating in a verification step during the key negotiation to prevent some malicious behaviour from users or devices, (3) recording the workload of the gateway. Finally, a comprehensive analysis on the safety and reliability of the entire scheme is carried out; extensive simulation experiments are conducted to reveal the authentication protocol is efficient and the scheme is feasible.
Style APA, Harvard, Vancouver, ISO itp.
37

Shandrivska, O., i N. Shynkarenko. "APPLIED RISK ASSESSMENT IN THE SYSTEM OF SOCIO-ECONOMIC PROCESSES IN CYBERSPACE". Journal of Lviv Polytechnic National University. Series of Economics and Management Issues 4, nr 2 (10.11.2020): 94–105. http://dx.doi.org/10.23939/semi2020.02.094.

Pełny tekst źródła
Streszczenie:
In the paper investigated safety of socio-economic processes in the virtual space. Studied the main trends influence on formation of preventive and adaptive mechanisms for ensuring information and cyber security enterprises. Key trends of the modern business and social environment include: globalization, informatization and individualization of consumer needs; mediatization, territorialization and universalization of social phenomena. Presented an original ensuring security model for the virtual information sphere. In this model was invented a conceptual scheme for identifying the information security system: given the identification sequence and risks assessment in cyberspace by stages; risk identification; a description of the threats it poses; identification of vulnerable market segments; analysis and assessment of the risk occurrence probability level; analysis and assessment of the risk manifestation consequences level; score determination of the general rick level; proposal to eliminate the development environment risks of the study object; net risk identification; risks in cyberspace have been identified and assessed in terms of security and financial flows. Among the dominant risks of the external and internal security environment in the information virtual Ukrainian space the following are highlighted: insufficient system security, processes and technologies, disinformation and information asymmetry; high sensitivity of financial flows to the processes of the implementation of shock macroeconomic phenomena (including almost unsignificant currencies devaluation against the pandemic background) in terms of the safety of financial flows; technical, technological and personal vulnerability growth in the information sphere, due to the increasing cybercrime in terms of the information flow security. Among the mitigation measures and neutralization of the general risk level, was proposed the creation of a single protection system. The single data protection system should be based on: data protection progressive principles, tasks to ensure security from information influences, information infrastructure security, information rights, open access to information, publicity of open information, etc.; organizational and right mechanism of data protection. This mechanism is based on the need to streamline the responsibilities of information marked actors; state control over data manipulation; data manipulation standards development; information systems certification for their processing. Construction of database registers, as well as registration of owners and/or data administrators, third parties to whom the data was transferred for further manipulation; an independent coordination center formation for the state policy implementation in terms of monitoring compliance with data protection requirements, etc.; increasing the financial flow transparency, namely risk-oriented monitoring in digital currency exchanges and licensing of transactions in virtual currencies requires support from the Financial Action Task Force on Money Laundering and the Financial Intelligence Unit.
Style APA, Harvard, Vancouver, ISO itp.
38

Ibatulin, M., O. Varchenko, I. Svynous, O. Klymchuk, O. Drahan i I. Herasymenko. "Factors of ensuring the competitiveness of Ukraine’s pig breeding production in external markets". Agricultural Science and Practice 6, nr 2 (15.07.2019): 29–46. http://dx.doi.org/10.15407/agrisp6.02.029.

Pełny tekst źródła
Streszczenie:
Aim. To substantiate the approaches to activating export transactions in the market of pig breeding products, determining the indicators of competitiveness of the main kinds of meat and relative competitiveness of pig breeding products in the leading countries based on the identifi cation of factors, restraining the export of Ukrainian pig breeding products, and elaborating the suggestions on eliminating their negative impact on the dynamics of foreign economic activity in the industry. Methods. The methodological approaches of the study were based on the information about the volumes of foreign trade, mainly used for international comparison and determined for each commodity or commodity group. The Relative Export Advantage Index (RXA), the Relative Import Penetration Index (RMP) and the Relative Trade Advantage Index (RTA) were determined while estimating competitive advantages of pig breeding products. The study involved a comprehensive comparative analysis of the main kinds of meat products in the external market using the model of “food independence – competitiveness”. The index of food independence was used along with the generalizing index of competitiveness for some kinds of meat products – the modi- fi ed Balassa index. It was determined that it was reasonable to determine the level of food independence based on food self- production within the range of 70–80 % from the commodity resources of the domestic food market. Our study involved the data of the informational database of the State Statistics Service of Ukraine and FAO regarding the volume of export-import of pig breeding production. Results. It has been proven that there are no competitive advantages of Ukraine’s pig breeding produc- tion in external markets; there is insuffi cient food independence on the background of potential advantages for the expansion of export, in particular, that of cheap fodder and logistics. A considerable decrease in the exchange rate for hryvnia compared to foreign currencies of the leading countries creates prerequisites for successful promotion of Ukrainian pork both in domestic and foreign markets. The need of monitoring the implementation of food independence criteria and diversifi cation of export specialization of the country was substantiated. In the long-term perspective, it is reasonable to optimize the level of protection for the market of pig breeding products, to stimulate domestic production, to distribute the instruments of state support for the “green box”. It has been proven that the main directions of supporting the export of domestic agrarian products should become as follows: facilitating export procedures; expanding assortment and accessibility of fi nancial services; developing the support- ing infrastructure; informational support for exporters; conducting research and implementing support programs; the activity of the system of credit-insurance institute and trade representations should be carried out in a single complex via determining the potential market and fi nancial-insurance support for the export. Conclusions. The method of two-criteria analysis of the status of domestic market for meat products based on the indices of food safety and international competitiveness has been developed and tested which will promote complex estimation of positions of some kinds of commodities in external market. The model of two-criteria analysis allows substantiating effective instruments of state regulation and protecting the relevant market of prod- ucts. The method of two-criteria analysis of meat products is universal, i.e. it may be used to determine the positions of different commodity groups in the external market. The evaluation of competitiveness of the main kinds of meat products – pork, beef and poultry meat – demonstrated the absence of competitive advantages of pig breeding production in external markets and insuf- fi cient food independence. The factors, restraining the expansion of pork export, were systematized and divided into three main groups: technological; normative and regulatory; veterinary, and the ways of eliminating them were specifi ed. The measures of creating favorable export-institutional environment were elaborated and the main directions of supporting export of domestic pig breeding production were suggested.
Style APA, Harvard, Vancouver, ISO itp.
39

Siek, Konrad, i Paweł T. Wojciechowski. "Last-use opacity: a strong safety property for transactional memory with prerelease support". Distributed Computing, 17.04.2022. http://dx.doi.org/10.1007/s00446-022-00420-2.

Pełny tekst źródła
Streszczenie:
AbstractTransaction Memory (TM) is a concurrency control abstraction that allows the programmer to specify blocks of code to be executed atomically as transactions. However, since transactional code can contain just about any operation attention must be paid to the state of shared variables at any given time. E.g., contrary to a database transaction, if a TM transaction reads a stale value it may execute dangerous operations, like attempt to divide by zero, access an illegal memory address, or enter an infinite loop. Thus serializability is insufficient, and stronger safety properties are required in TM, which regulate what values can be read, even by transactions that abort. Hence, a number of TM safety properties were developed, including opacity, and TMS1 and TMS2. However, such strong properties preclude using prerelease as a technique for optimizing TM, because they virtually forbid reading from live transactions. On the other hand, properties that do allow prerelease are either not strong enough to prevent any of the problems mentioned above (recoverability), or add additional conditions on transactions that prerelease variables that limit their applicability (elastic opacity, live opacity, virtual world consistency). This paper introduces last-use opacity and strong last-use opacity, a pair of new TM safety properties meant to be a compromise between strong properties like opacity and minimal ones like serializability. The properties eliminate all but a small class of benign inconsistent views and pose no stringent conditions on transactions.
Style APA, Harvard, Vancouver, ISO itp.
40

Younis, Mohammed Issam, i Athraa H. Alwan. "Design and Implementation of an IoT-based Transactional System for Quality Management". Iraqi Journal of Science, 27.02.2021, 658–75. http://dx.doi.org/10.24996/ijs.2021.62.2.30.

Pełny tekst źródła
Streszczenie:
The spread of Coronavirus has forced populations around the globe to adopt strict measures such as lockdown, home quarantine, and home office. Moreover, in the current development of network communications, people can exploit internet and intranet features in many systems that need to be faster, more efficient, and available on time. Furthermore, with the benefits of using internet-of-things (IoT), through which things are generated, gained, discovered, and proposed without interference, the user could receive the last status without exertion and direct contact (i.e., in a contactless manner). These specifications can be used in a transaction system. This paper proposes an electronic transaction system (ETS) as a replacement for the current paper transaction used in most organizations’ environments. The progress includes the signing privilege, access right for each position, delivery reports, transaction tracking, and transaction storage safety. Transactions will be stored in an encrypted way at the database to keep them safe from illegal changes. For that, a secure electronic transaction is created with digital signature services. The negligence can be identified in the workflow by tracking the operations and receiving exceptional cases’ alerts. Finally, this paper compared the proposed system against state-of-the-art systems.
Style APA, Harvard, Vancouver, ISO itp.
41

"A Novel Gmtds Algorithm for Dynamic Management of Transaction under Different Workload Condition". International Journal of Recent Technology and Engineering 8, nr 6 (30.03.2020): 1697–706. http://dx.doi.org/10.35940/ijrte.f7650.038620.

Pełny tekst źródła
Streszczenie:
In today’s scenario large enterprise world spread across different locations, continents or having a diverse presence over the globe, where data is enormous and handling such large data over distributed computing becomes critical in real-time database system. The transaction management system for the distributed environment must ensure that the sequence of updates in the stable warehouses in different locations is confirmed or cancelled safely as a single complete unit of work. Working with Real-Time Database System (RTDBS) and that to on a distributed computing system is a tough task. When we work with distributed environment over larger database, we need to take care of the transaction time period as well as number of transactions that are actually executed (committed) and number of transactions fail. The application on dynamic RTDBS becomes more complex when certain deadlines need to be completed. In this paper, we had carried out the test of CRUD (Create, Read, Update, and Delete) operation on transactional Real-time databases in real time dynamic distributed environment by using the existing EDF, GEDF algorithm and we had compared these algorithms with our proposed GMTDS algorithm in standalone and distributed environment with a dynamic self adaptive approach for management of transactions.
Style APA, Harvard, Vancouver, ISO itp.
42

"Eauction Web & App Synced Smart Agriculture using Iot". International Journal of Recent Technology and Engineering 8, nr 2S4 (27.08.2019): 209–12. http://dx.doi.org/10.35940/ijrte.b1039.0782s419.

Pełny tekst źródła
Streszczenie:
Agribusiness is the most important process in our Nation. But nowadays, because of movement of individuals from provincial to urban there is prevention in agriculture. So to conquer this issue we go for shrewd horticulture procedures utilizing IoT. This undertaking incorporates different highlights like GPS based remote controlled checking, dampness and temperature detecting, gatecrashers startling, security, leaf wetness and legitimate water system offices. To ensure the safety of their financial transactions new crypto graphical algorithms was introduced already. We are making one such website and app for placing online auctions and providing an audience to them. The app has been designed using RESTful - API to sync its database with the website. And to encrypt the transactions we will be using SHA-256, a one way crypto-hash function, which only encrypts the data and doesn't decrypt it, making it a secure Hash Algorithm
Style APA, Harvard, Vancouver, ISO itp.
43

Rao, Abishek B., Jammula Surya Kiran i Poornalatha G. "Application of market–basket analysis on healthcare". International Journal of System Assurance Engineering and Management, 27.08.2021. http://dx.doi.org/10.1007/s13198-021-01298-2.

Pełny tekst źródła
Streszczenie:
AbstractData analysis plays a vital role in the present era as it helps us to understand the patterns by exploring it in meaningful ways. Market—basket is one of the main methods used to find frequently occurring items in a transactional database and many researchers use the Apriori algorithm for this purpose. This paper presents the application of Market Basket Analysis to the healthcare section. The present work tries to find frequent diseases that occur together in an area by using the Apriori algorithm. This could help the residents of an area to be more cautious about the frequently occurring diseases and take all possible precautionary measures to safeguard their health. In addition, it could also help the doctors so that, they are ready with required medications to treat the patients.
Style APA, Harvard, Vancouver, ISO itp.
44

Mrs. J. Sathiya Jothi, Dr. K. Mohan, Ms. P. Abirami, Ms. J. Bhuvaneswari i Ms. S. Dhiviya. "Identifying the Genuineness of the Product using Blockchain Technology". International Journal of Advanced Research in Science, Communication and Technology, 30.05.2022, 539–44. http://dx.doi.org/10.48175/ijarsct-4538.

Pełny tekst źródła
Streszczenie:
The global development of a product or technology always comes with risk factors such as counterfeiting and duplication. Which can affect the company's name, revenue and customer review. Blockchain technology is the distributed, decentralized, and digital ledger that stores transactional information in the form of blocks in many databases which is connected with the chains. Blockchain technology is secure technology therefore any block cannot be changed or hacked. By using Blockchain technology. Customers or users do not need to rely on third-party users for confirmation of product safety. This web application uses Blockchain. Blockchain technology helps to solve the problem of counterfeiting a product and will be reliable. This web application uses SHA-256 hashing algorithm (Secured Hashing Algorithm), where every piece of data produces a unique hash that is thoroughly non- duplicable. SHA- 256 is applied to identify the genuineness of the product.
Style APA, Harvard, Vancouver, ISO itp.
45

ULUKÖK, Esra, i Ethem MERDAN. "LAISSEZ-FAIRE LEADERSHIP: A MAP OF THE FIELD AND A BIBLIOMETRIC ANALYSIS". Uluslararası Ekonomi, İşletme ve Politika Dergisi, 21.09.2022. http://dx.doi.org/10.29216/ueip.1137885.

Pełny tekst źródła
Streszczenie:
Although researches on laissez-faire leadership have increased in recent years, the knowledge in this field is not yet at a sufficient level. In this study, 58 articles published in the WoS Core Collection database with the words laissez-faire leadership, passive leadership or avoidant leadership in the title were included in the analysis. In this study, the development of the field over the years has been mapped by identifying the most important publications, journals, authors and countries in the field. Then co- occurrence of keywords analysis and bibliographic coupling analyzes were applied. The results showed that the most articles were published in 2021, the most productive journals were Work And Stress and Frontiers in Psychology, the most productive author was Skogstad, A., the most productive country was the USA, the most influential article was “The destructiveness of laissez-faire leadership behavior. According to the bibliometric analysis results, the most frequently used keywords are; the words laissez-faire leadership, passive leadership, leadership, transformational leadership, transactional leadership, laissez-faire, safety climate, passive avoidant leadership and workplace bullying. The author with the highest bibliographic coupling strength is Skogstad, A., the journal Work and Stress, and the country is USA. The results can provide future researchers with a strong basis for understanding the current trend in the field and for detecting new trends for future research.
Style APA, Harvard, Vancouver, ISO itp.
46

Zahar, Syakirah, Zilal Saari, Farahwahida Mohd Yusof i Siti Mariam Ali. "Shariah Compliance Human Milk Sharing Online Application". UMRAN - International Journal of Islamic and Civilizational Studies 6, nr 2-2 (7.10.2019). http://dx.doi.org/10.11113/umran2019.6n2-2.387.

Pełny tekst źródła
Streszczenie:
In this era of Industrial Revolution 4.0, everyone relies on the Internet in their daily lives. Recent research shows the blooming of Internet-based milk sharing, i.e. Eats On Feets and Human Milk 4 Human Babies, which are already operating in nearly 40 countries. Both organisations mentioned use Facebook to connect mothers, and practise under a commerce-free model in which milk is not bought and sold, but is freely given. However, Muslim community cannot fully utilize this platform as Islam has several guidelines regarding human milk sharing which is not covered by them. This paper presents a framework for milk sharing online web application that complies with Islamic laws featuring storing donors and recipients data in the database, managing human milk transactions and connecting both parties in the form of ‘Family Tree’ to keep track and avoid confusion regarding mixed lineage. The research methodology base on the (1) urgent need to find a human milk supply, especially for preterm babies, sick infants and those infants that cannot be breastfed, (2) high awareness of mothers who are awarded with surplus human milk to share their milk to the infants in need, and (3) online human milk selling phenomenon that will cause confusion especially among Muslims related to mahram and heredity, their infant’s safety and health issues. As a conclusion, this system is able to provide solutions to all three interrelated issues. The privilege of this system is that it provides the opportunity for infants to enjoy human milk from other women, while at the same time linking the siblings' linkages as outlined by Islamic law.
Style APA, Harvard, Vancouver, ISO itp.
47

Chien, William, Josenor De Jesus, Ben Taylor, Victor Dods, Leo Alekseyev, Diane Shoda i Perry B. Shieh. "The Last Mile: DSCSA Solution Through Blockchain Technology: Drug Tracking, Tracing, and Verification at the Last Mile of the Pharmaceutical Supply Chain with BRUINchain". Blockchain in Healthcare Today, 12.03.2020. http://dx.doi.org/10.30953/bhty.v3.134.

Pełny tekst źródła
Streszczenie:
Purpose: As part of the FDA’s DSCSA Pilot Project Program, UCLA and its solution partner, LedgerDomain (collectively referred to as the team hereafter), focused on building a complete, working blockchain-based system, BRUINchain, which would meet all the key objectives of the Drug Supply Chain Security Act (DSCSA) for a dispenser operating solely on commercial off-the-shelf (COTS) technology. Methods: The BRUINchain system requirements include scanning the drug package for a correctly formatted 2D barcode, flagging expired product, verifying the product with the manufacturer, and quarantining suspect and illegitimate products at the last mile: pharmacist to patient, the most complex area of the drug supply chain. The authors demonstrate a successful implementation where product-tracing notifications are sent automatically to key stakeholders, resulting in enhanced timeliness and reduction in paperwork burden. At the core of this effort was a blockchain-based solution to track and trace changes in custody of drug. As an immutable, time-stamped, near-real-time (50-millisecond latency), auditable record of transactions, BRUINchain makes it possible for supply chain communities to arrive at a single version of the truth. BRUINchain was tested with real data on real caregivers administering life-saving medications to real patients at one of the busiest pharmacies in the United States. Results: In addition to communicating with the manufacturer directly for verification, BRUINchain also initiated suspect product notifications. During the study, a 100% success rate was observed across scanning, expiration detection, and counterfeit detection; and paperwork reduction from approximately 1 hour to less than a minute. The authors demonstrate a successful implementation where product-tracing notifications are sent automatically to key stakeholders, resulting in enhanced timeliness and reduction in paperwork burden. At the core of this effort was a blockchain-based solution to track and trace changes in custody of drug. As an immutable, time-stamped, near-real-time (50-millisecond latency), auditable record of transactions, BRUINchain makes it possible for supply chain communities to arrive at a single version of the truth. BRUINchain was tested with real data on real caregivers administering life-saving medications to real patients at one of the busiest pharmacies in the United States. Conclusions: By automatically interrogating the manufacturer’s relational database with our blockchain-based system, our results indicate a projected DSCSA compliance cost of 17 cents per unit, and potentially much more depending on regulatory interpretation and speed of verification. We project that this cost could be reduced with manufacturers’ adoption of a highly performant, fully automated end-to-end system based on digital ledger technology (DLT). In an examination of the interoperability of such a system, we elaborate on its capacity to enable verification in real time without a human in the loop, the key feature driving lower compliance cost. With 4.2 billion prescriptions being dispensed each year in the United States, DLT would not only reduce the projected per-unit cost to 13 cents per unit (saving $183 million in annual labor costs), but also serve as a major bulwark against bad or fraudulent transactions, reduce the need for safety stock, and enhance the detection and removal of potentially dangerous drugs from the drug supply chain to protect U.S. consumers.
Style APA, Harvard, Vancouver, ISO itp.
48

Lyubchenko, Irina. "NFTs and Digital Art". M/C Journal 25, nr 2 (25.04.2022). http://dx.doi.org/10.5204/mcj.2891.

Pełny tekst źródła
Streszczenie:
Introduction This article is concerned with the recent rise in popularity of crypto art, the term given to digital artworks whose ownership and provenance are confirmed with a non-fungible token (NFT), making it possible to sell these works within decentralised cryptocurrency art markets. The goal of this analysis is to trace a genealogy of crypto art to Dada, an avant-garde movement that originated in the early twentieth century. My claim is that Dadaism in crypto art appears in its exhausted form that is a result of its revival in the 1950s and 1960s by the Neo Dada that reached the current age through Pop Art. Dada’s anti-art project of rejecting beauty and aesthetics has transformed into commercial success in the Neo Dada Pop Art movement. In turn, Pop Art produced its crypto version that explores not only the question of what art is and is not, but also when art becomes money. In what follows, I will provide a brief overview of NFT art and its three categories that could generally be found within crypto marketplaces: native crypto art, non-digital art, and digital distributed-creativity art. Throughout, I will foreground the presence of Dadaism in these artworks and provide art historical context. NFTs: Brief Overview A major technological component that made NFTs possible was developed in 1991, when cryptographers Stuart Haber and W. Scott Stornetta proposed a method for time-stamping data contained in digital documents shared within a distributed network of users (99). This work laid the foundation for what became known as blockchain and was further implemented in the development of Bitcoin, a digital currency invented by Satoshi Nakamoto in 2008. The original non-fungible tokens, Coloured Coins, were created in 2012. By “colouring” or differentiating bitcoins, Coloured Coins were assigned special properties and had a value independent of the underlying Bitcoin, allowing their use as commodity certificates, alternative currencies, and other financial instruments (Assia et al.). In 2014, fuelled by a motivation to protect digital artists from unsanctioned distribution of their work while also enabling digital art sales, media artist Kevin McCoy and tech entrepreneur Anil Dash saw the potential of blockchain to satisfy their goals and developed what became to be known as NFTs. This overnight invention was a result of McCoy and Dash’s participation in the Seven on Seven annual New York City event, a one-day creative collaboration that challenged seven pairs of artists and engineers to “make something” (Rhizome). McCoy and Dash did not patent their invention, nor were they able to popularise it, mentally archiving it as a “footnote in internet history”. Ironically, just a couple of years later NFTs exploded into a billion-dollar market, living up to an ironic name of “monetized graphics” that the pair gave to their invention. Crypto art became an international sensation in March 2021, when a digital artist Mike Winklemann, known as Beeple, sold his digital collage titled Everydays: The First 5000 Days for US$69.3 million, prompting Noah Davis, a curator who assisted with the sale at the Christie’s auction house, to proclaim: “he showed us this collage, and that was my eureka moment when I knew this was going to be extremely important. It was just so monumental and so indicative of what NFTs can do” (Kastrenakes). As a technology, a non-fungible token can create digital scarcity in an otherwise infinitely replicable digital space. Contrary to fungible tokens, which are easily interchangeable due to having an equal value, non-fungible tokens represent unique items for which one cannot find an equivalent. That is why we rely on the fungibility of money to exchange non-fungible unique goods, such as art. Employing non-fungible tokens allows owning and exchanging digital items outside of the context in which they originated. Now, one can prove one’s possession of a digital skin from a videogame, for example, and sell it on digital markets using crypto currency (“Bible”). Behind the technology of NFTs lies the use of a cryptographic hash function, which converts a digital artwork of any file size into a fixed-length hash, called message digest (Dooley 179). It is impossible to revert the process and arrive at the original image, a quality of non-reversibility that makes the hash function a perfect tool for creating a digital representation of an artwork proofed from data tampering. The issued or minted NFT enters a blockchain, a distributed database that too relies on cryptographic properties to guarantee fidelity and security of data stored. Once the NFT becomes a part of the blockchain, its transaction history is permanently recorded and publicly available. Thus, the NFT simultaneously serves as a unique representation of the artwork and a digital proof of ownership. NFTs are traded in digital marketplaces, such as SuperRare, KnownOrigin, OpenSea, and Rarible, which rely on a blockchain to sustain their operations. An analysis of these markets’ inventory can be summarised by the following list of roughly grouped types of artistic works available for purchase: native crypto art, non-digital art, distributed creativity art. Native Crypto Art In this category, I include projects that motivated the creation of NFT protocols. Among these projects are the aforementioned Colored Coins, created in 2012. These were followed by issuing other visual creations native to the crypto-world, such as LarvaLabs’s CryptoPunks, a series of 10,000 algorithmically generated 8-bit-style pixelated digital avatars originally available for free to anyone with an Ethereum blockchain account, gaining a cult status among the collectors when they became rare sought-after items. On 13 February 2022, CryptoPunk #5822 was sold for roughly $24 million in Ethereum, beating the previous record for such an NFT, CryptoPunk #3100, sold for $7.58 million. CryptoPunks laid the foundation for other collectible personal profile projects, such Bored Ape Yacht Club and Cool Cats. One of the ultimate collections of crypto art that demonstrates the exhaustion of original Dada motivations is titled Monas, an NFT project made up of 5,000 programmatically generated versions of a pixelated Mona Lisa by Leonardo da Vinci (c. 1503-1506). Each Monas, according to the creators, is “a mix of Art, history, and references from iconic NFTs” (“Monas”). Monas are a potpourri of meme and pop culture, infused with inside jokes and utmost silliness. Monas invariably bring to mind the historic Dadaist gesture of challenging bourgeois tastes through defacing iconic art historical works, such as Marcel Duchamp’s treatment of Mona Lisa in L.H.O.O.Q. In 1919, Duchamp drew a moustache and a goatee on a reproduction of La Joconde, as the French called the painting, and inscribed “L.H.O.O.Q.” that when pronounced sounds like “Elle a chaud au cul”, a vulgar expression indicating sexual arousal of the subject. At the time of its creation, this Dada act was met with the utmost public contempt, as Mona Lisa was considered a sacred work of art and a patron of the arts, an almost religious symbol (Elger and Grosenick 82). Needless to say, the effect of Monas on public consciousness is far from causing disgust and, on the contrary, brings childish joy and giggles. As an NFT artist, Mankind, explains in his YouTube video on personal profile projects: “PFPs are built around what people enjoy. People enjoy memes, people enjoy status, people enjoy being a part of something bigger than themselves, the basic primary desire to mix digital with social and belong to a community”. Somehow, “being bigger than themselves” has come to involve collecting defaced images of Mona Lisa. Turning our attention to historical analysis will help trace this transformation of the Dada insult into a collectible NFT object. Dada and Its Legacy in Crypto Art Dada was founded in 1916 in Zurich, by Hugo Ball, Tristan Tzara, Hans Richter, and other artists who fled their homelands during the First World War (Hapgood and Rittner 63). One of Dada’s primary aspirations was to challenge the dominance of reason that brought about the tragedy of the First World War through attacking the postulates of culture this form of reason produced. Already in 1921, such artists as André Breton, Louis Aragon, and Max Ernst were becoming exhausted by Dada’s nihilist tendencies and rejection of all programmes for the arts, except for the one that called for the total freedom of expression. The movement was pronounced dead about May 1921, leaving no sense of regret since, in the words of Breton, “its omnipotence and its tyranny had made it intolerable” (205). An important event associated with Dada’s revival and the birth of the Neo Dada movement was the publication of The Dada Painters and Poets in 1951. This volume, the first collection of Dada writings in English and the most comprehensive anthology in any language, was introduced to the young artists at the New School by John Cage, who revived Tristan Tzara’s concept that “life is far more interesting” than art (Hapgood and Rittner 64). The 1950s were marked by a renewed interest in Dadaism that can also be evidenced in galleries and museums organising numerous exhibitions on the movement, such as Dada 1916 –1923 curated by Marcel Duchamp at the Sidney Janis Gallery in 1953. By the end of the decade, such artists as Jasper Johns and Robert Rauschenberg began exploring materials and techniques that can be attributed to Dadaism, which prompted the title of Neo Dada to describe this thematic return (Hapgood and Rittner 64). Among the artistic approaches that Neo Dada borrowed from Dada are Duchampian readymades that question the status of the art object, Kurt Schwitters’s collage technique of incorporating often banal scraps and pieces of the everyday, and the use of chance operations as a compositional device (Hapgood and Rittner 63–64). These approaches comprise the toolbox of crypto artists as well. Monas, CryptoPunks, and Bored Ape Yacht Club are digital collages made of scraps of pop culture and the everyday Internet life assembled into compositional configurations through chance operation made possible by the application of algorithmic generation of the images in each series. Art historian Helen Molesworth sees the strategies of montage, the readymade, and chance not only as “mechanisms for making art objects” but also as “abdications of traditional forms of artistic labor” (178). Molesworth argues that Duchamp’s invention of the readymade “substituted the act of (artistic) production with consumption” and “profoundly questioned the role, stability, nature, and necessity of the artist’s labor” (179). Together with questioning the need for artistic labour, Neo Dadaists inherited what an American art historian Jack D. Flam terms the “anything goes” attitude: Dada’s liberating destruction of rules and derision of art historical canon allowed anything and everything to be considered art (xii). The “anything goes” approach can also be traced to the contemporary crypto artists, such as Beeple, whose Everydays: The First 5000 Days was a result of assembling into a collage the first 5,000 of his daily training sketches created while teaching himself new digital tools (Kastrenakes). When asked whether he genuinely liked any of his images, Beeple explained that most digital art was created by teams of people working over the course of days or even weeks. When he “is pooping something out in 45 minutes”, it “is probably not gonna look that great comparatively” (Cieplak-Mayr von Baldegg). At the core of Dada was a spirit of absurdism that drove an attack on the social, political, artistic, and philosophical norms, constituting a radical movement against the Establishment (Flam xii). In Dada Art and Anti-Art, Hans Richter’s personal historical account of the Dada movement, the artist describes the basic principle of Dada as guided by a motivation “to outrage public opinion” (66). Richter’s writings also point out a desensitisation towards Dada provocations that the public experienced as a result of Dada’s repetitive assaults, demanding an invention of new methods to disgrace the public taste. Richter recounts: our exhibitions were not enough. Not everyone in Zurich came to look at our pictures, attending our meetings, read our poems and manifestos. The devising and raising of public hell was an essential function of any Dada movement, whether its goal was pro-art, non-art or anti-art. And the public (like insects or bacteria) had developed immunity to one of kind poison, we had to think of another. (66) Richter’s account paints a cultural environment in which new artistic provocations mutate into accepted norms in a quick succession, forming a public body that is immune to anti-art “poisons”. In the foreword to Dada Painters and Poets, Flam outlines a trajectory of acceptance and subjugation of the Dadaist spirit by the subsequent revival of the movement’s core values in the Neo Dada of the 1950s and 1960s. When Dadaism was rediscovered by the writers and artists in the 1950s, the Dada spirit characterised by absurdist irony, self-parody, and deadpan realism was becoming a part of everyday life, as if art entered life and transformed it in its own image. The Neo Dada artists, such as Jasper Johns, Robert Rauschenberg, Claes Oldenburg, Roy Lichtenstein, and Andy Warhol, existed in a culturally pluralistic space where the project of a rejection of the Establishment was quickly absorbed into the mainstream, mutating into the high culture it was supposedly criticising and bringing commercial success of which the original Dada artists would have been deeply ashamed (Flam xiii). Raoul Hausmann states: “Dada fell like a raindrop from heaven. The Neo-Dadaists have learnt to imitate the fall, but not the raindrop” (as quoted in Craft 129). With a similar sentiment, Richard Huelsenbeck writes: “Neo-Dada has turned the weapons used by Dada, and later by Surrealism, into popular ploughshares with which to till the fertile soil of sensation-hungry galleries eager for business” (as quoted in Craft 130). Marcel Duchamp, the forefather of the avant-garde, comments on the loss of Dada’s original intent: this Neo-Dada, which they call New Realism, Pop Art, Assemblage, etc., is an easy way out, and lives on what Dada did. When I discovered ready-mades I thought to discourage aesthetics. In Neo-Dada they have taken my ready-mades and found aesthetic beauty in them. I threw the bottle-rack and the urinal into their faces as a challenge and now they admire them for their aesthetic beauty. (Flam xiii) In Neo Dada, the original anti-art impulse of Dadaism was converted into its opposite, becoming an artistic stance and a form of aesthetics. Flam notes that these gradual transformations resulted in the shifts in public consciousness, which it was becoming more difficult to insult. Artists, among them Roy Lichtenstein, complained that it was becoming impossible to make anything despicable: even a dirty rug could be admired (Flam xiii). The audience lost their ability to understand when they were being mocked, attacked, or challenged. Writing in 1981, Flam proclaimed that “Dada spirit has become an inescapable condition of modern life” (xiv). I contend that the current crypto art thrives on the Dada spirit of absurdism, irony, and self-parody and continues to question the border between art and non-art, while fully subscribing to the “anything goes” approach. In the current iteration of Dada in the crypto world, the original subversive narrative can be mostly found in the liberating rhetoric promoted by the proponents of the decentralised economic system. While Neo Dada understood the futility of shocking the public and questioning their tastes, crypto art is ignorant of the original Dada as a form of outrage, a revolutionary movement ignited by a social passion. In crypto art, the ambiguous relationship that Pop Art, one of the Neo Dada movements, had with commercial success is transformed into the content of the artworks. As Tristan Tzara laconically explained, the Dada project was to “assassinate beauty” and with it all the infrastructure of the art market (as quoted in Danto 39). Ironically, crypto artists, the descendants of Dada, erected the monument to Value artificially created through scarcity made possible by blockchain technology in place of the denigrated Venus demolished by the Dadaists. After all, it is the astronomical prices for crypto art that are lauded the most. If in the pre-NFT age, artistic works were evaluated based on their creative merit that included considering the prominence of the artist within art historical canon, current crypto art is evaluated based on its rareness, to which the titles of the crypto art markets SuperRare and Rarible unambiguously refer (Finucane 28–29). In crypto art, the anti-art and anti-commercialism of Dada has fully transformed into its opposite. Another evidence for considering crypto art to be a descendant of Dada is the NFT artists’ concern for the question of what art is and is not, brought to the table by the original Dada artists. This concern is expressed in the manifesto-like mission statement of the first Museum of Crypto Art: at its core, the Museum of Crypto Art (M○C△) challenges, creates conflict, provokes. M○C△ puts forward a broad representation of perspectives meant to upend our sense of who we are. It poses two questions: “what is art?” and “who decides?” We aim to resolve these questions through a multi-stakeholder decentralized platform of art curation and exhibition. (The Museum of Crypto Art) In the past, the question regarding the definition of art was overtaken by the proponent of the institutional approach to art definition, George Dickie, who besides excluding aesthetics from playing a part in differentiating art from non-art famously pronounced that an artwork created by a monkey is art if it is displayed in an art institution, and non-art if it is displayed elsewhere (Dickie 256). This development might explain why decentralisation of the art market achieved through the use of blockchain technology still relies on the endorsing of the art being sold by the widely acclaimed art auction houses: with their stamp of approval, the work is christened as legitimate art, resulting in astronomical sales. Non-Digital Art It is not surprising that an NFT marketplace is an inviting arena for the investigation of questions of commercialisation tackled in the works of Neo Dada Pop artists, who made their names in the traditional art world. This brings us to a discussion of the second type of artworks found in NFT marketplaces: non-digital art sold as NFT and created by trained visual artists, such as Damien Hirst. In his recent NFT project titled Currency, Hirst explores “the boundaries of art and currency—when art changes and becomes a currency, and when currency becomes art” (“The Currency”). The project consists of 10,000 artworks on A4 paper covered in small, coloured dots, a continuation of the so-called “spot-paintings” series that Hirst and his assistants have been producing since the 1980s. Each artwork is painted on a hand-made paper that bears the watermark of the artist’s bust, adorned with a microdot that serves as a unique identification, and is made to look very similar to the others—visual devices used to highlight the ambiguous state of these artworks that simultaneously function as Hirst-issued currency. For Hirst, this project is an experiment: after the purchase of NFTs, buyers are given an opportunity to exchange the NFT for the original art, safely stored in a UK vault; the unexchanged artworks will be burned. Is art going to fully transform into currency? Will you save it? In Hirst’s project, the transformation of physical art into crypto value becomes the ultimate act of Dada nihilism, except for one big difference: if Dada wanted to destroy art as a way to invent it anew, Hirst destroys art to affirm its death and dissolution in currency. In an ironic gesture, the gif NFT artist Nino Arteiro, as if in agreement with Hirst, attempts to sell his work titled Art Is Not Synonymous of Profit, which contains a crudely written text “ART ≠ PROFIT!” for 0.13 Ether or US$350. Buying this art will negate its own statement and affirm its analogy with money. Distributed-Creativity Art When browsing through crypto art advertised in the crypto markets, one inevitably encounters works that stand out in their emphasis on aesthetic and formal qualities. More often than not, these works are created with the use of Artificial Intelligence (AI). To a viewer bombarded with creations unconcerned with the concept of beauty, these AI works may serve as a sensory aesthetic refuge. Among the most prominent artists working in this realm is Refik Anadol, whose Synthetic Dreams series at a first glance may appear as carefully composed works of a landscape painter. However, at a closer look nodal connections between points in rendered space provide a hint at the use of algorithmic processes. These attractive landscapes are quantum AI data paintings created from a data set consisting of 200 million raw images of landscapes from around the world, with each image having been computed with a unique quantum bit string (“Synthetic Dreams”). Upon further contemplation, Anadol’s work begins to remind of the sublime Romantic landscapes, revamped through the application of AI that turned fascination with nature’s unboundedness into awe in the face of the unfathomable amounts of data used in creation of Anadol’s works. These creations can be seen as a reaction against the crypto art I call exhausted Dada, or a marketing approach that targets a different audience. In either case, Anadol revives aesthetic concern and aligns himself with the history of sublimity in art that dates back to the writings of Longinus, becoming of prime importance in the nineteenth-century Romantic painting, and finding new expressions in what is considered the technological sublime, which, according to David E. Nye. concentrates “on the triumph of machines… over space and time” (as quoted in Butler et al. 8). In relation to his Nature Dreams project, Anadol writes: “the exhibition’s eponymous, sublime AI Data Sculpture, Nature Dreams utilizes over 300 million publicly available photographs of nature collected between 2018- 2021 at Refik Anadol Studio” (“Machine Hallucinations Nature Dreams”). From this short description it is evident that Anadol’s primary focus is on the sublimity of large sets of data. There is an issue with that approach: since experiencing the sublime involves loss of rational thinking (Longinus 1.4), these artworks cease the viewer’s ability to interrogate cultural adaptation of AI technology and stay within the realm of decorative ornamentations, demanding an intervention akin to that brought about by the historical avant-garde. Conclusions I hope that this brief analysis demonstrates the mechanisms by which the strains of Dada entered the vocabulary of crypto artists. It is probably also noticeable that I equate the nihilist project of the exhausted Dada found in such works as Hirst’s Cryptocurrency with a dead end similar to so many other dead ends in art history—one only needs to remember that the death of painting was announced a myriad of times, and yet it is still alive. Each announcement of its death was followed by its radiant return. It could be that using art as a visual package for monetary value, a death statement to art’s capacity to affect human lives, will ignite artists to affirm art’s power to challenge, inspire, and enrich. References Assia, Yoni et al. “Colored Coins Whitepaper.” 2012-13. <https://docs.google.com/document/d/1AnkP_cVZTCMLIzw4DvsW6M8Q2JC0lIzrTLuoWu2z1BE/edit>. Breton, André. “Three Dada Manifestoes, before 1924.” The Dada Painters and Poets: An Anthology, Ed. Robert Motherwell, Cambridge, Mass: Belknap Press of Harvard UP, 1989. 197–206. Butler, Rebecca P., and Benjamin J. Butler. “Examples of the American Technological Sublime.” TechTrends 57.1 (2013): 9–10. Craft, Catherine Anne. Constellations of Past and Present: (Neo-) Dada, the Avant- Garde, and the New York Art World, 1951-1965. 1996. PhD dissertation. University of Texas at Austin. Cieplak-Mayr von Baldegg, Kasia. “Creativity Is Hustle: Make Something Every Day.” The Atlantic, 7 Oct. 2011. 12 July 2021 <https://www.theatlantic.com/video/archive/2011/10/creativity-is-hustle-make-something-every-day/246377/#slide15>. Danto, Arthur Coleman. The Abuse of Beauty: Aesthetics and the Concept of Art. Chicago, Ill: Open Court, 2006. Dash, Anil. “NFTs Weren’t Supposed to End like This.” The Atlantic, 2 Apr. 2021. 16 Apr. 2022 <https://www.theatlantic.com/ideas/archive/2021/04/nfts-werent-supposed-end-like/618488/>. Dickie, George. “Defining Art.” American Philosophical Quarterly 6.3 (1969): 253–256. Dooley, John F. History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. Cham: Springer, 2018. Elder, R. Bruce. Dada, Surrealism, and the Cinematic Effect. Waterloo: Wilfried Laurier UP, 2015. Elger, Dietmar, and Uta Grosenick. Dadaism. Köln: Taschen, 2004. Flam, Jack. “Foreword”. The Dada Painters and Poets: An Anthology. Ed. Robert Motherwell. Cambridge, Mass: Belknap Press of Harvard UP, 1989. xi–xiv. Finucane, B.P. Creating with Blockchain Technology: The ‘Provably Rare’ Possibilities of Crypto Art. 2018. Master’s thesis. University of British Columbia. Haber, Stuart, and W. Scott Stornetta. “How to Time-Stamp a Digital Document.” Journal of Cryptology 3.2 (1991): 99–111. Hapgood, Susan, and Jennifer Rittner. “Neo-Dada: Redefining Art, 1958-1962.” Performing Arts Journal 17.1 (1995): 63–70. Kastrenakes, Jacob. “Beeple Sold an NFT for $69 million: Through a First-of-Its-Kind Auction at Christie’s.” The Verge, 11 Mar. 2021. 14 July 2021 <https://www.theverge.com/2021/3/11/22325054/beeple-christies-nft-sale-cost-everydays-69-million>. Longinus. On the Sublime. Lewiston/Queenston: Edwin Mellen, 1987. Mankind, “What Are PFP NFTs”. YouTube. 2 Feb. 2022 <https://www.youtube.com/watch?v=Drh_fAV4XNM>. “Machine Hallucinations.” Refik Anadol. 20 Jan. 2022 <https://refikanadol.com/works/machine-hallucination/>. “Machine Hallucinations Nature Dreams.” Refik Anadol. 18 Apr. 2022 <https://refikanadol.com/works/machine-hallucinations-nature-dreams/>. Molesworth, Helen. “From Dada to Neo-Dada and Back Again.” October 105 (2003): 177–181. “Monas”. OpenSea. 17 Feb. 2022 <https://opensea.io/collection/monas>. Museum of Crypto Art. 23 Jan. 2022 <https://museumofcryptoart.com/>. Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System.” 2008. <https://bitcoin.org/bitcoin.pdf>. Richter, Hans. Dada: Art and Anti-Art. London: Thames and Hudson, 2016. Rhizome. “Seven on Seven 2019.” rhizome.org, 26 Mar. 2019. 16 Apr. 2022 <https://rhizome.org/editorial/2019/mar/26/announcing-seven-on-seven-2019-participants-details/>. “Synthetic Dreams.” OpenSea. 23 Jan. 2022 <https://opensea.io/collection/synthetic-dreams>. “The Currency.” OpenSea. 15 Feb. 2022 <https://opensea.io/collection/thecurrency>. “The Non-Fungible Token Bible: Everything You Need to Know about NFTs.” OpenSea Blog, 10 Jan. 2020. 10 June 2021 <https://blog.opensea.io/guides/non-fungible-tokens/>.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii