• Title/Summary/Keyword: Computer usage

Search Result 1,226, Processing Time 0.024 seconds

An Adaptive USB(Universal Serial Bus) Protocol for Improving the Performance to Transmit/Receive Data (USB(Universal Serial Bus)의 데이터 송수신 성능향상을 위한 적응성 통신방식)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.327-332
    • /
    • 2004
  • USB(Universal Serial Bus) is one of the most popular communication interfaces. When USB is used in an extended range, especially configurating In-home network by connecting multiple digital devices each other, USB interface uses the bandwidth in the way of TDM(Time Division Multiplexing) so that the bottleneck of bus bandwidth can be brought. In this paper, the more effective usage of bus bandwidth to overcome this situation is introduced. Basically, in order to realize the system for transferring realtime moving picture data among digital information devices, we analyze USB transfer types and Descriptors and introduce the method to upgrade detailed performance of Isochronous transfer that is one of USB transfer types. In the case that Configuration descriptor of a device has Interface descriptor that has two AlternateSetting, if Isochronous transfers are not processed smoothly due to excessive bus traffic, the application of the device changes AlternateSetting of the Interface descriptor and requires a new configuration by SetInterface() request. As a result of this adaptive configuration, the least data frame rate is guaranteed to a device that the sufficient bandwidth is not alloted. And if the bus traffic is normal, the algorithm to return to the original AlteranteSetting is introduced. this introduced method resolve the bottleneck of moving picture transfer that can occur in home network connected by multiple digital devices.

  • PDF

Oilspill Damage Assessment of Natural Fisheries Resources by Ecological Models (생태학적 모델을 이용한 유류유출 사고에 의한 자연 수산자원 피해의 추정)

  • YOO Sin jae;SHIN Kyoung Soon
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.29 no.2
    • /
    • pp.174-190
    • /
    • 1996
  • Damage assessment based on in situ surveys for oil spills in marine environment is limited by fundamental difficulties as well as tremendous expenses. Except for intertidal zones, the damage is not preserved well. Also such surveys are usually confined to adult organisms. To overcome these limitations a computer model, NRDAM/CME, was developed in the case of USA (Reed et al., 1989), where an acute toxicity data base was used to assess indirect damages through food webs and loss due to recruitment as well as adult losses. In the present study damage assessment of natural biological resources for hypothetical oil spills is attempted using a computer model for hypothetical spills of Bunker C and heavy crude oil. In the model, the logical structure of NRDAM/CME was adopted, and biomass and productivity database were compiled for the Korean waters. The results showed that the damage increased in a nonlinear fashion as the spill amount increased. The magnitude of the damage depended upon the chemical properties of oil viscosity and solubility in particular, which implies that usage of oil dispersant might increase the damage by dispersing oil. The results also indicate that long term damage due to recruitment loss could be greater than short term damage.

  • PDF

Multi-Threaded Parallel H.264/AVC Decoder for Multi-Core Systems (멀티코어 시스템을 위한 멀티스레드 H.264/AVC 병렬 디코더)

  • Kim, Won-Jin;Cho, Keol;Chung, Ki-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.11
    • /
    • pp.43-53
    • /
    • 2010
  • Wide deployment of high resolution video services leads to active studies on high speed video processing. Especially, prevalent employment of multi-core systems accelerates researches on high resolution video processing based on parallelization of multimedia software. In this paper, we propose a novel parallel H.264/AVC decoding scheme on a multi-core platform. Parallel H.264/AVC decoding is challenging not only because parallelization may incur significant synchronization overhead but also because software may have complicated dependencies. To overcome such issues, we propose a novel approach called Multi-Threaded Parallelization(MTP). In MTP, to reduce synchronization overhead, a separate thread is allocated to each stage in the pipeline. In addition, an efficient memory reuse technique is used to reduce the memory requirement. To verify the effectiveness of the proposed approach, we parallelized FFmpeg H.264/AVC decoder with the proposed technique using OpenMP, and carried out experiments on an Intel Quad-Core platform. The proposed design performs better than FFmpeg H.264/AVC decoder before the parallelization by 53%. We also reduced the amount of memory usage by 65% and 81% for a high-definition(HD) and a full high-definition(FHD) video, respectively compared with that of popular existing method called 2Dwave.

An Improvement of Still Image Quality Based on Error Resilient Entropy Coding for Random Error over Wireless Communications (무선 통신상 임의 에러에 대한 에러내성 엔트로피 부호화에 기반한 정지영상의 화질 개선)

  • Kim Jeong-Sig;Lee Keun-Young
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.3 s.309
    • /
    • pp.9-16
    • /
    • 2006
  • Many image and video compression algorithms work by splitting the image into blocks and producing variable-length code bits for each block data. If variable-length code data are transmitted consecutively over error-prone channel without any error protection technique, the receiving decoder cannot decode the stream properly. So the standard image and video compression algorithms insert some redundant information into the stream to provide some protection against channel errors. One of redundancies is resynchronization marker, which enables the decoder to restart the decoding process from a known state in the event of transmission errors, but its usage should be restricted not to consume bandwidth too much. The Error Resilient Entropy Code(EREC) is well blown method which can regain synchronization without any redundant information. It can work with the overall prefix codes, which many image compression methods use. This paper proposes EREREC method to improve FEREC(Fast Error-Resilient Entropy Coding). It first calculates initial searching position according to bit lengths of consecutive blocks. Second, initial offset is decided using statistical distribution of long and short blocks, and initial offset can be adjusted to insure all offset sequence values can be used. The proposed EREREC algorithm can speed up the construction of FEREC slots, and can improve the compressed image quality in the event of transmission errors. The simulation result shows that the quality of transmitted image is enhanced about $0.3{\sim}3.5dB$ compared with the existing FEREC when random channel error happens.

Control Unit Design and Implementation for SIMD Programmable Unified Shader (SIMD 프로그래머블 통합 셰이더를 위한 제어 유닛 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Sub;Yu, Byung-Cheol;Jung, Jin-Ha;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.7
    • /
    • pp.37-47
    • /
    • 2011
  • Real picture like high quality computer graphic is widely used in various fields and shader processor, a key part of a graphic processor, has been advanced to programmable unified shader. However, The existing graphic processors have been optimized to commercial algorithms, so development of an algorithm which is not based on it requires an independent shader processor. In this paper, we have designed and implemented a control unit to support high quality 3 dimensional computer graphic image on programmable integrated shader processor. We have done evaluation through functional level simulation of designed control unit. Hardware resource usage rate are measured by implementing directly on FPGA Virtex-4 and execution speed are verified by applying ASIC library. the result of an evaluation shows that the control unit has the commands more about 1.5 times compared to the other shader processors that is a behavior similar to the control unit and with a number of processing units used in a shader processor, compared with the other processors, overall performance of the control unit is improved about 3.1 GFLOPS.

An Effective Method for Blocking Illegal Sports Gambling Ads on Social Media

  • Kim, Ji-A;Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.201-207
    • /
    • 2019
  • In this paper, we propose an effective method to block illegal gambling advertisement on social media. With the increase of smartphone and internet usage, users can easily access various information while sharing information such as text and video with a large number of others. In addition, illegal sports gambling advertisements are also continue to be transmitted on SNS. To avoid most surveillance networks, users are easily exposed to illegal sports gambling advertisement images by including phrases in the images that indicate illegal sports gambling advertisements. In order to cope with these problems, we proposed a method to actively block illegal sports gambling advertisements in a way different from the conventional passive methods. In this paper, we select words frequently used for illegal sports gambling, classifies them into three groups according to their importance, calculate WF for each word using weighted formula by degree of relevance and frequency, and then sum the WF of the words in the image. Blocking, warning, and passing were determined by cv, the total of WF. Experimenting with the proposed method, 193 out of 200 experimental images were correctly judged with 96.5% accuracy, and even though 7 images were illegal sports gambling advertisements. Further research is needed to block 3.5% of illegal sports betting ads that cannot be blocked in the future.

A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support Constraints (길이에 따라 감소하는 빈도수 제한조건을 고려한 가중화 그래프 패턴 마이닝 기법)

  • Yun, Unil;Lee, Gangin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.125-132
    • /
    • 2014
  • Since frequent pattern mining was proposed in order to search for hidden, useful pattern information from large-scale databases, various types of mining approaches and applications have been researched. Especially, frequent graph pattern mining was suggested to effectively deal with recent data that have been complicated continually, and a variety of efficient graph mining algorithms have been studied. Graph patterns obtained from graph databases have their own importance and characteristics different from one another according to the elements composing them and their lengths. However, traditional frequent graph pattern mining approaches have the limitations that do not consider such problems. That is, the existing methods consider only one minimum support threshold regardless of the lengths of graph patterns extracted from their mining operations and do not use any of the patterns' weight factors; therefore, a large number of actually useless graph patterns may be generated. Small graph patterns with a few vertices and edges tend to be interesting when their weighted supports are relatively high, while large ones with many elements can be useful even if their weighted supports are relatively low. For this reason, we propose a weight-based frequent graph pattern mining algorithm considering length-decreasing support constraints. Comprehensive experimental results provided in this paper show that the proposed method guarantees more outstanding performance compared to a state-of-the-art graph mining algorithm in terms of pattern generation, runtime, and memory usage.

Usage and Analysis on Readability of Korean Typography in WBI for Children (효과적인 아동용 WBI를 위한 한글 타이포그래피의 가해성 분석과 활용)

  • Han, Jeong-Hye;Kim, Yong-Dae
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.3
    • /
    • pp.328-337
    • /
    • 2002
  • Looking at multimedia education contents from a design point of view, the instructor's design model may differ from the child's understanding model due to gap of the instructor's and child's knowledge. This fact implies it impacts the effectiveness of the education contents. The learning efficiency of Korean typography in WBI for children depends on the font-family, line space, font-size, the age of user, the output device such as the monitor, and other various factors. In this paper, we measured and analyzed on readability of Korean typography in WBI for children by reading speed method. The results of experiments show that readability depends on the font-family of typography, age(grade), and sex of children. In detail, "Goolymche" has the shortest time to be read, and girl and the highest grade students of elementary school have shorter time than boy and the lower grade students. Moreover, we consider the elegance of typography in WBI for holding children's interests because they prefer "Yopseoche". We provide some CSSs in WBI for children based on the experimental results, to used in school fields.

  • PDF

Analyzing the Positive and the Negative SNS Behaviors of the Elementary and Middle School Students (초.중학생의 SNS에서의 긍정적.부정적 행동 분석)

  • Lee, Soojung;Yeon, Jeong-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • SNS is a social networking service that removes the barrier between cyber spaces and the real world and helps people who have common interests to have a two-way communication, manage their interpersonal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated in recent days. However, studies on SNS have just examined adults, and it's required to research the use of SNS and cyber behaviors via SNS among elementary and middle school students. This study attempted to analyze the relationship of the use of SNS, motivation of using SNS, the use of active SNS functions, SNS-dependent tendency and SNS awareness to cyber behaviors via SNS among elementary and middle school students. As a result, regardless of gender and grade, stealing private information was the most frequent activity and the frequency of 'contacting strangers' activity increased most rapidly with the usage time and grade. SNS dependency turned out to be the most highly correlated with the negative cyber behavior. Moreover, the difference of gender was not significant to the overall negative cyber behavior, whereas that of grade was.

  • PDF

Data processing techniques applying data mining based on enterprise cloud computing (데이터 마이닝을 적용한 기업형 클라우드 컴퓨팅 기반 데이터 처리 기법)

  • Kang, In-Seong;Kim, Tae-Ho;Lee, Hong-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.1-10
    • /
    • 2011
  • Recently, cloud computing which has provided enabling convenience that users can connect from anywhere and user friendly environment that offers on-demand network access to a shared pool of configurable computing resources such as smart-phones, net-books and PDA etc, is to be watched as a service that leads the digital revolution. Now, when business practices between departments being integrated through a cooperating system such as cloud computing, data streaming between departments is getting enormous and then it is inevitably necessary to find the solution that person in charge and find data they need. In previous studies the clustering simplifies the search process, but in this paper, it applies Hash Function to remove the de-duplicates in large amount of data in business firms. Also, it applies Bayesian Network of data mining for classifying the respect data and presents handling cloud computing based data. This system features improved search performance as well as the results Compared with conventional methods and CPU, Network Bandwidth Usage in such an efficient system performance is achieved.