• Title/Summary/Keyword: Copy

Search Result 1,686, Processing Time 0.024 seconds

CSR Sparse Matrix Vector Multiplication Using Zero Copy (Zero Copy를 이용한 CSR 희소행렬 연산)

  • Yoon, SangHyeuk;Jeon, Dayun;Park, Neungsoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.45-47
    • /
    • 2021
  • APU(Accelerated Processing Unit)는 CPU와 GPU가 통합되어있는 프로세서이며 같은 메모리 공간을 사용한다. CPU와 GPU가 분리되어있는 기존 이종 컴퓨팅 환경에서는 GPU가 작업을 처리하기 위해 CPU에서 GPU로 메모리 복사가 이루어졌지만, APU는 같은 메모리 공간을 사용하므로 메모리 복사 없이 가상주소 할당으로 같은 물리 주소에 접근할 수 있으며 이를 Zero Copy라 한다. Zero Copy 성능을 테스트하기 위해 희소행렬 연산을 사용하였으며 기존 메모리 복사대비 크기가 큰 데이터는 약 4.67배, 크기가 작은 데이터는 약 6.27배 빨랐다.

Attack Detection on Images Based on DCT-Based Features

  • Nirin Thanirat;Sudsanguan Ngamsuriyaroj
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.335-357
    • /
    • 2021
  • As reproduction of images can be done with ease, copy detection has increasingly become important. In the duplication process, image modifications are likely to occur and some alterations are deliberate and can be viewed as attacks. A wide range of copy detection techniques has been proposed. In our study, content-based copy detection, which basically applies DCT-based features for images, namely, pixel values, edges, texture information and frequency-domain component distribution, is employed. Experiments are carried out to evaluate robustness and sensitivity of DCT-based features from attacks. As different types of DCT-based features hold different pieces of information, how features and attacks are related can be shown in their robustness and sensitivity. Rather than searching for proper features, use of robustness and sensitivity is proposed here to realize how the attacked features have changed when an image attack occurs. The experiments show that, out of ten attacks, the neural networks are able to detect seven attacks namely, Gaussian noise, S&P noise, Gamma correction (high), blurring, resizing (big), compression and rotation with mostly related to their sensitive features.

Performance Improvement for PVM by Zero-copy Mechanism (Zero-copy 기술을 이용한 PVM의 성능 개선)

  • 임성택;심재홍;최경희;정기현;김재훈;문성근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5B
    • /
    • pp.899-912
    • /
    • 2000
  • PVM provides users with a single image of high performance parallel computing machine by collecting machines distributed over a network. Low communication overhead is essential to effectively run applications on PVM based platforms. In the original PVM, three times of memory copies are required for a PVM task to send a message to a remote task, which results in performance degradation. We propose a zero-copy model using global shared memory that can be accessed by PVM tasks, PVM daemon, and network interface card(NIC). In the scheme, a task packs data into global shared memory, and notify daemon that the data is ready to be sent, then daemon routes the data to a remote task to which it is sent with no virtual data copy overhead. Experimental result reveals that the message round trip time between two machines is reduced significantly in the proposed zero-copy scheme.

  • PDF

A Study on Video Copy Detection Methods Using Representative Color Sequence for Protecting Copyrights (저작권 보호를 위한 대표 색상 시퀀스를 이용한 동영상 복사 검출 방법)

  • Choi, Min-Seok;Choi, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.185-191
    • /
    • 2012
  • This study deals with the technical approach related to the protection of digital video contents copyright, which has currently become a major issue in the digital contents market. With the production and distribution of digital video contents rapidly increasing, various policies and technical approaches are being made in relation to the protection of intellectual property rights. The technical approach from a DRM (Digital Rights Management) perspective was made from various angles, but its limitations have also been exposed in terms of convenience and quality. In this study, rather than the existing encoding certification and watermark technologies, it introduces technical approaches from a content-based copy detection method, while suggesting a copy detection method using the representative color sequence. In particular, this study takes into consideration the distribution environment of the domestic video market and deals with the technical approach in a direction that can control the illegal distribution of high quality videos.

Replication and Consistency Control in Hybrid Architectures for Multiplayer Online Games (멀티플레이어 온라인 게임을 위한 하이브리드 구조의 복제와 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.73-80
    • /
    • 2016
  • Multiplayer Online Games(MOG) using the Internet are typically organized based on a CS(client-server) or P2P(peer-to-peer) architecture. We then propose a method that combines a P2P architecture with a CS architecture in order to utilize their advantages. Most MOGs use a primary-copy replication approach that provides strong consistency control over an object. For each object and character there exists an authoritative copy, called primary copy and all other copies are secondary copies or replicas. Any update to the object has to be first performed on the primary copy. In the proposed hybrid architecture, primary copies may reside on the server or be held by clients. In this architecture, load balancing between a server and clients can be achieved by reducing the number of objects maintained by the server. Games consist of various types of actions with different consistency requirements. A multi-level approach to game consistency is sensible as it provides the best trade-off between consistency and performance. The performance for the hybrid game architecture with the primary-copy model is evaluated through simulation experiments and analysis in this paper.

Multi-level Consistency Control Techniques in P2P Multiplayer Game Architectures with Primary Copy (기본 사본을 갖는 P2P 멀티플레이어 게임 구조의 수준별 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.135-143
    • /
    • 2015
  • A Multiplayer Online Game(MOG) is a game capable of supporting hundreds or thousands of players and is mostly played using the Internet. P2P(peer-to-peer) architectures for MOGs can potentially achieve high scalability, low cost, and good performance. The basic idea of many P2P-based games is to distribute the game state among peers and along with it processing, network, and storage tasks. In a primary-copy based replication scheme where any update to the object has to be first performed on the primary copy, this means distributing primary copies of objects among peers. Most multiplayer games use a primary-copy model in order to provide strong consistency control over an object. Games consist of various types of actions that have different levels of sensitivity and can be categorized according to their consistency requirements. With the appropriate consistency level of each action type within a game, this paper allows developers to choose the right trade-off between performance and consistency. The performance for P2P game architecture with the primary-copy model is evaluated through simulation experiments and analysis.

An Anonymous Fingerprinting Scheme with a Robust Asymmetry

  • Park, Jae-Gwi;Park, Ji-Hwan;Kouichi Sakurai
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.620-629
    • /
    • 2003
  • Fingerprinting schemes are techniques applied to protect the copyright on digital goods. These enable the merchants to identify the source of illegal redistribution. Let us assume the following situations connectedly happen: As a beginning, buyer who bought digital goods illegally distributed it, next the merchant who found it revealed identity of the buyer/traitor, then the goods is illegally distributed again. After this, we describe it as“The second illegal redistribution”. In most of anonymous fingerprinting, upon finding a redistributed copy, a merchant extracts the buyer's secret information from the copy and identifies a traitor using it. Thus the merchant can know the traitor's secret information (digital fingerprints) after identification step. The problem of the second illegal distribution is that there is a possibility of the merchant's fraud and the buyer's abuse: that is a dishonest employee of the merchant might just as well have redistributed the copy as by the buyer, or the merchant as such may want to gain money by wrongly claiming that the buyer illegally distributed it once more. The buyer also can illegally redistribute the copy again. Thus if the copy turns up, one cannot really assign responsibility to one of them. In this paper, we suggest solution of this problem using two-level fingerprinting. As a result, our scheme protects the buyer and the merchant under any conditions in sense that (1) the merchant can obtain means to prove to a third party that the buyer redistributed the copy. (2) the buyer cannot worry about being branded with infamy as a traitor again later if he never distribute it.

  • PDF

FRACTURE STRENGTH AND MARGINAL FIT OF IN-CERAM, COPY-MILLED IN-CERAM, AND IPS EMPRESS 2 ALL-CERAMIC BRIDGES

  • Hwang Jung-Won;Yang Jae-Ho;Lee Sun-Hyung
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.39 no.6
    • /
    • pp.641-658
    • /
    • 2001
  • All-ceramic restorations have become an attractive alternative to porcelain-fused-to-metal crowns. In-Ceram, and more recently IPS Empress 2 were introduced as a new all-ceramic system for single crowns and 3-unit fixed partial dentures. But their strength and marginal fit are still an important issue. This study evaluated the fracture resistance and marginal fit of three systems of 3 unit all-ceramic bridge fabricated on prepared maxillary anterior resin teeth in vitro. The 3 all-ceramic bridge systems were: (1) a glass-infiltrated, sintered alumina system (In-Ceram) fabricated conventionally, (2) the same system with copy-milled alumina cores (copy-milled In-Ceram), (3) a heat pressed, lithium disilicate reinforced glass-ceramic system (IPS Empress 2). Ten bridges of each system with standardized design of framework were fabricated. All specimens of each system were compressed at $55^{\circ}$ at the palatal surface of pontic until catastrophic fracture occurred. Another seven bridges of each system were fabricated with standard method. All of the bridge-die complexes were embedded in epoxy resin and sectioned buccolingually and mesiodistally. The absolute marginal discrepancy was measured with stereomicroscope at ${\times}50$ power. The following results were obtained: 1. There was no significant difference in the fracture strength among the 3 systems studied. 2. The Weibull modulus of copy-milled In-Ceram was higher than that of In-Ceram and IPS Empress 2 bridges. 3. Copy-milled In-Ceram($112{\mu}m$) exhibited significantly greater marginal discrepancy than In Ceram ($97{\mu}m$), and IPS Empress 2 ($94{\mu}m$) at P=0.05. 4. The lingual surfaces of the ceramic crowns showed smaller marginal discrepancies than mesial and distal points. There was no significant difference between teeth (incisor, canine) at P=0.05. 5. All-ceramic bridges of three systems appeared to exhibit sufficient initial strength and accept able marginal fit values to allow clinical application.

  • PDF

Plasmid Propagation and Heterologous Gene Expression in Recombinant Yeast (효모균에서의 Plasmid 번식체계와 혼성유전자 발현)

  • 홍억기
    • KSBB Journal
    • /
    • v.8 no.2
    • /
    • pp.133-142
    • /
    • 1993
  • The effects of genetic and environmental factors on productivity of a cloned protein were studied in recombinant Saccharomyces cerevisiae. Plasmid stability and copy level were very high for a $REP^+$ system(at ca. 10 generations, stability: 65-90%, plasmid copy number per cell: 40-200), whereas these were very low for a yep- system(at ca. 10 generations, stability: 30%, plasmid copy number per cell 20). In plasmids containing the $2{\mu}m$ circle genome, a $[cir^o]$ strain was a preferred host cell since the plasmid stability and the copy number in a $[cir^o]$ strain were higher than in a $[cir^+]$strain. Cloned gene expression was dependent on plasmid copy number and stability. The inducer (galactose) level played a very important role in cloned lacZ gene expression, showing that a galactose concentration of 0.8% was sufficient for induction of gene expression. Induction rate was very fast in the case of plasmids exhibiting high stability and copy number by a factor of 4 to 25. The time to reach the peak value of gene expression was longer when galactose was added at the start of fermentation (ca. 26 hours) than at the mid-exponential phase (ca. 6 hours). Glucose repression was reduced by a factor of 2 to 5 as the relative inducer level increased.

  • PDF