339 research outputs found

    Сryptocurrency and Internet of Things: Problems of Implementation and Realization

    Get PDF
    IoT (Internet of Things) requires the implementation of digital encryption of information, transaction support and recording of all events for security. It can provide cryptocurrencies protocols with adding an additional possibility of payments. This opportunity is not so much demanded at the hardware level as in the software implementation. We have discovered that IoT devices are widely used for illegal purposes for trusts or network consolidated attacks, and virtually no legal and useful ways of using their hardware-distributed capabilities. Standardization and compatibility in IOT network should become the main tools for the possibility of introducing new solutions, testing their utility, performance and safety. The standardization of a new approach to interactive protocols in the IOT network and the Internet with a finance approach is now inevitable. We need new IEEE standards for cryptocurrencies and IoT functioning. They must include standards for protocol functioning, transaction validation and saving, privacy and security support. Cryptocurrencies and IoT interaction diagram were proposed. The IoT network devices technology will be in the future instance of the smart class of digital-physical systems, which also encompasses technologies such as smart homes, intelligent transportation systems, smart cities etc. The financial aspect for purchasing software, services, solutions and sales of the resulting benefits will complement this network with additional capabilities. The development of standards for the financial level of functioning is also necessary.IoT (Internet of Things) requires the implementation of digital encryption of information, transaction support and recording of all events for security. It can provide cryptocurrencies protocols with adding an additional possibility of payments. This opportunity is not so much demanded at the hardware level as in the software implementation. We have discovered that IoT devices are widely used for illegal purposes for trusts or network consolidated attacks, and virtually no legal and useful ways of using their hardware-distributed capabilities. Standardization and compatibility in IOT network should become the main tools for the possibility of introducing new solutions, testing their utility, performance and safety. The standardization of a new approach to interactive protocols in the IOT network and the Internet with a finance approach is now inevitable. We need new IEEE standards for cryptocurrencies and IoT functioning. They must include standards for protocol functioning, transaction validation and saving, privacy and security support. Cryptocurrencies and IoT interaction diagram were proposed. The IoT network devices technology will be in the future instance of the smart class of digital-physical systems, which also encompasses technologies such as smart homes, intelligent transportation systems, smart cities etc. The financial aspect for purchasing software, services, solutions and sales of the resulting benefits will complement this network with additional capabilities. The development of standards for the financial level of functioning is also necessary

    Internet of Things Cloud: Architecture and Implementation

    Full text link
    The Internet of Things (IoT), which enables common objects to be intelligent and interactive, is considered the next evolution of the Internet. Its pervasiveness and abilities to collect and analyze data which can be converted into information have motivated a plethora of IoT applications. For the successful deployment and management of these applications, cloud computing techniques are indispensable since they provide high computational capabilities as well as large storage capacity. This paper aims at providing insights about the architecture, implementation and performance of the IoT cloud. Several potential application scenarios of IoT cloud are studied, and an architecture is discussed regarding the functionality of each component. Moreover, the implementation details of the IoT cloud are presented along with the services that it offers. The main contributions of this paper lie in the combination of the Hypertext Transfer Protocol (HTTP) and Message Queuing Telemetry Transport (MQTT) servers to offer IoT services in the architecture of the IoT cloud with various techniques to guarantee high performance. Finally, experimental results are given in order to demonstrate the service capabilities of the IoT cloud under certain conditions.Comment: 19pages, 4figures, IEEE Communications Magazin

    SISTEM PENCATATAN TRANSAKSI PENJUALAN MENGGUNAKAN VISUAL BASIC NET 2008 PADA RUMAH MAKAN SELERA BARU

    Get PDF
    This final report was aimed at making the draft application sales transactions to help Rumah Makan Selera Baru in noting every transaction a sale that he did so known large turnover gained. Data collection techniques used on the final report of the interview and documentation. Analysis technique used is qualitative analysis techniques that is describes the design of an application system of recording sales transactions are expected to be input for Rumah Makan Selera Baru. On the discussion of the final report this author explains step-by-step how to use the sales transaction logging system applications using Visual Basic 2008which will be offered to Rumah Makan Selera Baru. Conclusions of the final report is Rumah Makan Selera Baru recording system still uses a sale manually that there are several obstacles that caused the quality of information generated is still less well designed so that applications using Visual Basic2008by way of a very easy use. The advice given is as good as home party eating began to consider using transaction logging system sales in computerized recording system using an application including a sale using a Visual Basic 2008

    Questions related to Bitcoin and other Informational Money

    Get PDF
    A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various contexts, and issues about forms of use and misuse. Some questions are formulated in the more general setting of informational monies and near-monies. We also formulate questions about legal, psychological, and ethical aspects of informational money. Finally we formulate a number of questions concerning the economical merits of and outlooks for Bitcoin.Comment: 31 pages. In v2 the section on patterns for use and misuse has been improved and expanded with so-called contaminations. Other small improvements were made and 13 additional references have been include

    Subject searching requirements : the HILT II experience

    Get PDF
    The HILT Phase II project aimed to develop a pilot terminologies server with a view to improving cross-sectoral information retrieval. In order to inform this process, it was first necessary to examine how a representative group of users approached a range of information-related tasks. This paper focuses on exploratory interviews conducted to investigate the proposed ideal and actual strategies of a group of 30 users in relation to eight separate information tasks. In addition, users were asked to give examples of search terms they may employ and to describe how they would formulate search queries in each scenario. The interview process undertaken and the results compiled are outlined, and associated implications for the development of a pilot terminologies server are discussed

    A Lazy Approach for Supporting Nested Transactions

    Get PDF
    Transactional memory (TM) is a compelling alternative to traditional synchronization, and implementing TM primitives directly in hardware offers a potential performance advantage over software-based methods. In this paper, we demonstrate that many of the actions associated with transaction abort and commit may be performed lazily -- that is, incrementally, and on demand. This technique is ideal for hardware, since it requires little space or work; in addition, it can improve performance by sparing accesses to committing or aborting locations from having to stall until the commit or abort completes. We further show that our lazy abort and commit technique supports open nesting and orElse, two language-level proposals which rely on transactional nesting. We also provide design notes for supporting lazy abort and commit on our own hardware TM system, based on VTM
    • …
    corecore