PAUDIT: A Distributed Data Architecture for Fitness Data

Author(s):  
Jaco du Toit
2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Amol Thakre ◽  
Fadi Thabtah ◽  
Seyed Reza Shahamiri ◽  
Suhel Hammoud

Bitcoin is among the highest rated digital crypto-currency in financial investment markets. This technology relies on a backbone of distributed data architecture and peer-to-peer networking model called Blockchain. Unlike the current digital economy, which is governed centrally by financial institution or governments, Blockchain is fully autonomous without any third-party involvement. The exorbitant success of Bitcoin has attracted investors, scholars as well as organizations to peek into this lucrative technology for the possible application to other areas apart from crypto-currency. Blockchain can adopt Smart Contracts, which are digitally enabled contracts that can be executed and enforced fully or partially using pre-defined notions. The aim of this research is to investigate the synergy between Smart Contract and Blockchain to propose a digital framework for an academic paper publication model that has the capability to automate the entire process and challenge the existing system. It can also bring together all the stakeholders under the same system. The proposed model can further hold the stakeholders accountable for breach of contracts and/or reward them for executing the successes of terms pre-configured in the Smart Contract. The proposed model, called Digital Smart Publication or DSP (as referred in the document), is highly secure and ensures balance in distributing rewards to the involved stakeholders while keeping data integrity and security as paramount features.


2019 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Anjas Tryana

With the development of technology today, it is very important for every company to plan and develop a system to support business processes in each company. Achieving the goals of an enterprise faces challenges and changes that require strategies for effective measures and efficient use of resources. One important and increasingly widely used strategy is the use and improvement of information system support for the enterprise. This plan can utilize enterprise architecture planning methodology that produces data architecture, application architecture, technology architecture, and the direction of its implementation plan for the enterprise.CV Biensi Fesyenindo is engaged in retail garment, with branches throughout Indonesia, covering the areas of Kalimantan, Sulawesai, NTB, NTT, Bali, Java and Sumatra. In their daily activities, they carry out production to distribution processes to meet market and employee needs.The enterprise architecture model used in this study is by using Enterprise Architecture Planning (EAP). EAP is a process of defining enterprise architecture that focuses on data architecture, applications and technology in supporting business and plans to implement the architecture, where the EAP method has several stages, starting from planning in planning, business modeling , Current System and Technology (Current System & Technology), Data Architecture (Data Architecture), Application Architecture (Applications Architecture), Technology Architecture (Technology Architecture), Implementation Plans (Implementation Plans).The results of this study are recommendations for information systems for Fesyenindo Biensi CV in the form of enterprise architecture planing blue print planning that is successful in defining 5 main business processes, which consist of application architecture data architecture and for technological architecture to produce technology architecture proposals divided into 5 chapters 110 pages .


2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Author(s):  
D. V. Gribanov

Introduction. This article is devoted to legal regulation of digital assets turnover, utilization possibilities of distributed computing and distributed data storage systems in activities of public authorities and entities of public control. The author notes that some national and foreign scientists who study a “blockchain” technology (distributed computing and distributed data storage systems) emphasize its usefulness in different activities. Data validation procedure of digital transactions, legal regulation of creation, issuance and turnover of digital assets need further attention.Materials and methods. The research is based on common scientific (analysis, analogy, comparing) and particular methods of cognition of legal phenomena and processes (a method of interpretation of legal rules, a technical legal method, a formal legal method and a formal logical one).Results of the study. The author conducted an analysis which resulted in finding some advantages of the use of the “blockchain” technology in the sphere of public control which are as follows: a particular validation system; data that once were entered in the system of distributed data storage cannot be erased or forged; absolute transparency of succession of actions while exercising governing powers; automatic repeat of recurring actions. The need of fivefold validation of exercising governing powers is substantiated. The author stresses that the fivefold validation shall ensure complex control over exercising of powers by the civil society, the entities of public control and the Russian Federation as a federal state holding sovereignty over its territory. The author has also conducted a brief analysis of judicial decisions concerning digital transactions.Discussion and conclusion. The use of the distributed data storage system makes it easier to exercise control due to the decrease of risks of forge, replacement or termination of data. The author suggests defining digital transaction not only as some actions with digital assets, but also as actions toward modification and addition of information about legal facts with a purpose of its establishment in the systems of distributed data storage. The author suggests using the systems of distributed data storage for independent validation of information about activities of the bodies of state authority. In the author’s opinion, application of the “blockchain” technology may result not only in the increase of efficiency of public control, but also in the creation of a new form of public control – automatic control. It is concluded there is no legislation basis for regulation of legal relations concerning distributed data storage today.


Author(s):  
Sara Ferreira ◽  
Thiago RPM Rúbioa ◽  
João Jacob ◽  
Henrique Lopes Cardoso ◽  
Daniel Castro Silva ◽  
...  

2019 ◽  
Vol 5 (1) ◽  
pp. 48-54
Author(s):  
Dicky Yudha Handika ◽  
Rahmat Mulyana ◽  
Nia Ambarsari

Dalam mendukung program pemerintah yaitu Sistem Pemerintahan Berbasis Elektronik (SPBE), Dinas Pariwisata dan Kebudayaan Kabupaten Bandung Barat (Disparbud KBB) khususnya pada fungsi Kepegawaian Umum dan Bina Budaya diupayakan dapat menyelaraskan antara layanan bisnis dan layanan teknologi informasi dalam melakukan perubahan dari segi layanan internal maupun publik dalam mengembangkan potensi kebudayaan dan pariwisata untuk meningkatkan perekonomian masyarakat Kabupaten Bandung Barat. Enterprise Architecture (EA) menjadi jawaban sebagai pengembangan rancangan dokumentasi blueprint TI. Perancangan EA pada penelitian ini menggunakan kerangka kerja TOGAF ADM untuk memenuhi kebutuhan pengembangan sistem melalui Phase C: Information System Architecture (Data Architecture & Application Architecture). Metode analisis dokumen, wawancara dan observasi dilakukan dalam menunjang pencaharian kebutuhan informasi organisasi selama pengembangan EA. Adapun hasil yang didapatkan berupa solusi integrase proses data dan aplikasi melalui teknologi Government Service Bus (GSB).


2016 ◽  
Vol 8 (2) ◽  
pp. 24-45
Author(s):  
Tania Hayu Safira ◽  
Febryanti Simon

This study is event study that was conduct to examine the differences of abnormal return, trading volume, trading frequency and bid-ask spread before and after the events of share split. The object of this research is the companies that did share split and listed in Indonesia Stock Exchange in 2008 - 2015. The samples are 30 companies chosen by purposive sampling method. The criteria are the company did not do corporate action right issue, pre-emptive rights, a share dividend and bonus shares in the same year with share split. Event window used in this study was 30 days consisting of 15 days before and 15 days after the share split. Data analysis technique begins with a test of normality using Kolmogorov – Smirnov and transform for unnormally distributed data. Then, test of hypothesis using Paired t – test to compare the differences before and after share split. The results of this study showed that volume trading activity and trading frequency had significant differences before and after the share split. While, variable abnormal return and bid-ask spread had not significant differences before and after the share split. Keywords: Abnormal return, bid-ask spread, share split, trading frequency, trading volume.


Sign in / Sign up

Export Citation Format

Share Document