• 제목/요약/키워드: Communication theory

검색결과 1,903건 처리시간 0.026초

Conceptual Metaphor based on Embodied Cognition (체현 인지에 기반한 개념 메타포에 관한 연구)

  • Kim, Hyung-Woo
    • Journal of Korea Multimedia Society
    • /
    • 제16권7호
    • /
    • pp.888-896
    • /
    • 2013
  • The existing interface study has been focused on rhetorical metaphor based on a cognitive viewpoint in traditional objectivism. But the existing study viewpoint about the interface shows logical limitation by the changes in media environment. This study suggests conceptual metaphor based on embodied cognition for an alternative to solve the limitation, and research logical suitability of the existing interface environment. The result of this study is as follow; The first, the embodied cognitive viewpoint provides the interface as a space for holistic recognition communication, and the conceptual metaphor based on embodied cognition provides a well-structured metaphor logic and is a suitable metaphor to explain complicated metaphor structure. The second, the container image schema provides concrete and detailed metaphor structure than previous metaphor when it comes to explaining desktop metaphor by offering subsidiary image schema from 'IN-OUT-BOUNDARY' image schema. The third, path image schema is possible to make a concrete logic and works off the laxity and confusion of logical structure in existing metaphor by offering subsidiary image schema from 'SOURCE-PATH-GOAL' image schema. The conceptual metaphor based on embodied cognition is expected to be a basic theory to explain interfaces for various media environment by thinking of human physical experience as container and path image schema.

Development of a Software Do-TRIZ for TRIZ Learning (트리즈 학습용 소프트웨어 Do-TRIZ 개발)

  • Kim, Eun-Gyung;Koo, Bon-Chul;Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제19권8호
    • /
    • pp.1883-1892
    • /
    • 2015
  • TRIZ is a theory of inventive problem solving. Recently the importance of creative capabilities is being emphasized and many successful cases using TRIZ are being introduced, therefore interest in TRIZ has been increasing. But TRIZ is not easy to learn alone compared to other creative thinking tools. Although it is effective to learn TRIZ through various cases, it is not easy for beginners to experience those many cases. Therefore, we developed a software called Do-TRIZ for TRIZ learning. Do-TRIZ provides descriptions and various examples of key concepts to make it easier for beginners to learn TRIZ. Also, the learners can add new cases continuously on Do-TRIZ. Especially, process-based problem solving modules have been implemented on Do-TRIZ, in order to make it possible to solve problems based on technical contradiction, physical contradiction, and IFR(Ideal Final Result). The learners can use the modules to solve their problems and to share the results. Also, we implemented Do-TRIZ Memo app that works with Do-TRIZ.

Development and Performance Study of a Zero-Copy File Transfer Mechanism for Ink-based PC Cluster Systems (VIA 기반 PC 클러스터 시스템을 위한 무복사 파일 전송 메커니즘의 개발 및 성능분석)

  • Park Sejin;Chung Sang-Hwa;Choi Bong-Sik;Kim Sang-Moon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • 제32권11_12호
    • /
    • pp.557-565
    • /
    • 2005
  • This paper presents the development and implementation of a zero-copy file transfer mechanism that improves the efficiency of file transfers for PC cluster systems using hardware-based VIA(Virtual Interface Architecture) network adapters. VIA is one of the representative user-level communication interfaces, but because there is no library for file transfer, one copy occurs between kernel buffer and user boilers. Our mechanism presents a file transfer primitive that does not require the file system to be modified and allows the NIC to transfer data from the kernel buffer to the remote node directly without copying. To do this, we have developed a hardware-based VIA network adapter, which supports the PCI 64bit/66MHz bus and Gigabit Ethernet, as a NIC, and implemented a zero-copy file transfer mechanism. The experimental results show that the overhead of data coy and context switching in the sender is greatly reduced and the CPU utilization of the sender is reduced to $30\%\~40\%$ of the VIA send/receive mechanism. We demonstrate the performance of the zero-copy file transfer mechanism experimentally. and compare the results with those from existing file transfer mechanisms.

Characteristics and Automatic Detection of Block Reference Patterns (블록 참조 패턴의 특성 분석과 자동 발견)

  • Choe, Jong-Mu;Lee, Dong-Hui;No, Sam-Hyeok;Min, Sang-Ryeol;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • 제26권9호
    • /
    • pp.1083-1095
    • /
    • 1999
  • 최근 처리기와 입출력 시스템의 속도 차이가 점점 커짐에 따라 버퍼 캐쉬의 효율적인 관리가 더욱 중요해지고 있다. 버퍼 캐쉬는 블록 교체 정책과 선반입 정책에 의해 관리되며, 각 정책은 버퍼 캐쉬에서 블록의 가치 즉 어떤 블록이 더 가까운 미래에 참조될 것인가를 결정해야 한다. 블록의 가치는 응용들의 블록 참조 패턴의 특성에 기반하며, 블록 참조 패턴의 특성에 대한 정확한 분석은 올바른 결정을 가능하게 하여 버퍼 캐쉬의 효율을 높일 수 있다. 본 논문은 각 응용들의 블록 참조 패턴에 대한 특성을 분석하고 이를 자동으로 발견하는 기법을 제안한다. 제안된 기법은 블록의 속성과 미래 참조 거리간의 관계를 이용해 블록 참조 패턴을 발견한다. 이 기법은 2 단계 파이프라인 방법을 이용하여 온라인으로 참조 패턴을 발견할 수 있으며, 참조 패턴의 변화가 발생하면 이를 인식할 수 있다. 본 논문에서는 8개의 실제 응용 트레이스를 이용해 블록 참조 패턴의 발견을 실험하였으며, 제안된 기법이 각 응용의 블록 참조 패턴을 정확히 발견함을 확인하였다. 그리고 발견된 참조 패턴 정보를 블록 교체 정책에 적용해 보았으며, 실험 결과 기존의 대표적인 블록 교체 정책인 LRU에 비해 최대 57%까지 디스크 입출력 횟수를 줄일 수 있었다.Abstract As the speed gap between processors and disks continues to increase, the role of the buffer cache located in main memory is becoming increasingly important. The buffer cache is managed by block replacement policies and prefetching policies and each policy should decide the value of block, that is which block will be accessed in the near future. The value of block is based on the characteristics of block reference patterns of applications, hence accurate characterization of block reference patterns may improve the performance of the buffer cache. In this paper, we study the characteristics of block reference behavior of applications and propose a scheme that automatically detects the block reference patterns. The detection is made by associating block attributes of a block with the forward distance of the block. With the periodic detection using a two-stage pipeline technique, the scheme can make on-line detection of block reference patterns and monitor the changes of block reference patterns. We measured the detection capability of the proposed scheme using 8 real workload traces and found that the scheme accurately detects the block reference patterns of applications. Also, we apply the detected block reference patterns into the block replacement policy and show that replacement policies appropriate for the detected block reference patterns decreases the number of DISK I/Os by up to 57%, compared with the traditional LRU policy.

Customizable Global Job Scheduler for Computational Grid (계산 그리드를 위한 커스터마이즈 가능한 글로벌 작업 스케줄러)

  • Hwang Sun-Tae;Heo Dae-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • 제33권7호
    • /
    • pp.370-379
    • /
    • 2006
  • Computational grid provides the environment which integrates v 따 ious computing resources. Grid environment is more complex and various than traditional computing environment, and consists of various resources where various software packages are installed in different platforms. For more efficient usage of computational grid, therefore, some kind of integration is required to manage grid resources more effectively. In this paper, a global scheduler is suggested, which integrates grid resources at meta level with applying various scheduling policies. The global scheduler consists of a mechanical part and three policies. The mechanical part mainly search user queues and resource queues to select appropriate job and computing resource. An algorithm for the mechanical part is defined and optimized. Three policies are user selecting policy, resource selecting policy, and executing policy. These can be defined newly and replaced with new one freely while operation of computational grid is temporarily holding. User selecting policy, for example, can be defined to select a certain user with higher priority than other users, resource selecting policy is for selecting the computing resource which is matched well with user's requirements, and executing policy is to overcome communication overheads on grid middleware. Finally, various algorithms for user selecting policy are defined only in terms of user fairness, and their performances are compared.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제2권7호
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • 제36권5호
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Sino-Globalization Network of Chinese Migrants, Students, and Travellers (중국 이민자, 유학생, 여행자를 통해서 본 세계화 네트워크)

  • Zhu, Yupeng;Park, Hyejin;Park, Han Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제21권9호
    • /
    • pp.509-517
    • /
    • 2020
  • This study examined Sino-globalization through the network analysis of Chinese immigrants, international students, and travelers. The data were collected from the United Nations for immigrants, UNESCO for international students, and Ministry of Culture and Tourism of China for travelers. Consequently, Chinese immigrants and international students' favorite destinations were advanced Western countries, and Chinese travelers showed a high preference for Asian regions. Specifically, Thailand was the most popular destination for traveling, while the U.S. appeared to be the main destination for Chinese immigrants and students. The QAP analysis results showed a statistically significant correlation between the immigrant network and international student network. MR-QAP analysis found a causal relationship between the two networks. These findings may serve as empirical evidence for the Chinese government to review potential opportunities and problems related to Sino-globalization and provide the basis for preparing policy measures for other countries. Subsequent studies should compensate for research limitations by analyzing specific factors affecting national choice of Chinese immigrants, students, and travelers. The economic, social, and cultural impacts of China's globalization on other countries need to be discussed using qualitative research.

XSNP: An Extended SaC Network Protocol for High Performance SoC Bus Architecture (XSNP: 고성능 SoC 버스를 위한 확장된 SoC 네트워크 프로토콜)

  • Lee Chan-Ho;Lee Sang-Hun;Kim Eung-Sup;Lee Hyuk-Jae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • 제33권8호
    • /
    • pp.554-561
    • /
    • 2006
  • In recent years, as SoC design research is actively conducted, a large number of IPs are included in a system. Various bus protocols and bus architectures are designed to increase IP reusability. Among them, the AMBA AHB became a de facto standard although it is somewhat inadequate for a large scale SoC. We proposed SNP and SNA, high performance on-chip-bus protocol and architecture, respectively, to solve the problem of the conventional shared buses. However, it seems to be imperative that the new on-chip-bus system support AMBA-compatible IPs for a while since there are a lot of IPs with AMBA interface. In this paper, we propose an extended SNP specification and a corresponding SNA component to support ABMA-compatible IPs used in SNA - based system. We extend the phase of the SNP by 1 bit to add new 8 phases to support communication based on AMBA protocol without penalty of elongated cycle latency. The ARB-to -XSNP converter translates the protocol between AHB and SNP to attach AMBA -compatible IPs to SNA based system. We show that AMBA IPs can communicate through SNP without any degradation of performance using the extended SNP and AHB - to- XSNP converter.

A Study on the Improvement of the Quality Management in Apartment Construction Projects (공동주택 현장의 품질관리 개선에 관한 연구)

  • Moon Hyeon;Wang Ilkook;Chin Sangyoon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 한국건설관리학회 2001년도 학술대회지
    • /
    • pp.373-378
    • /
    • 2001
  • In order to analyze the problems and improvement methods in the quality management of domestic apartment construction projects, this study derived the four barrier factors through relevant literature survey and interviews with construction practitioners. Among these four factors, which are 1) policies and regulations, 2) technologies, 3) human and organization, and 4) other miscellaneous aspects, the human and organization factor is the main focus of this survey and it was decomposed into perception, management system, education, and system on quality management according to the Taguchi's S/N theory to survey existing problems and suggest improvement methods for them. The survey on the quality perception showed that all the members need to cooperate actively, and CEO and chief construction managers should recognize the quality as the highest priority and act by themselves accordingly. The survey on the quality management showed that they need to reform their business process to reduce redundant tasks and miscommunications among participants. Quality education should be provided in a way that people at different management level can be educated differently with close relation to their practices. Quality systems should help corrective actions against quality problems at construction fields. Also with clear quality management implantation polices and objectives, the quality system should be established in order to support better communication among project stakeholders.

  • PDF