• Title/Summary/Keyword: Copy Network

Search Result 139, Processing Time 0.024 seconds

A Development and Application of the Teaching and Learning Model of Artificial Intelligence Education for Elementary Students (초등학생의 인공지능 교육을 위한 교수 학습 모델 개발 및 적용)

  • Kim, Kapsu;Park, Youngki
    • Journal of The Korean Association of Information Education
    • /
    • v.21 no.1
    • /
    • pp.139-149
    • /
    • 2017
  • Artificial intelligence education is very important in the 21st century knowledge information society. Even if it is very important to understand artificial intelligence and practice computer programming in computer education in the fourth industrial revolution, but there is no teaching and learning model to understand artificial intelligence and computer programming education. In this paper, the proposed model consists of problem understanding step, data organizing step, artificial intelligence model setting step, programming step, and report writing step. At the program step, students can choose to copy, transform, create, and challenge steps to their level. In this study, the validity of the model was proved by the Delphi evaluation of elementary school teachers. The results of this study provide a good opportunity for elementary school students to practice artificial intelligence programs.

TAILWIND: Mobility information based Routing for Delay Tolerant Network (이동 방향 정보를 이용한 DTN 라우팅: TAILWIND)

  • Cho, Seoik;Kim, Sunhyun;Moon, Soohoon;Han, Seungjae
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.408-412
    • /
    • 2015
  • In base station based networks, traffic overload at the base station is inevitable. Peer-to-peer DTN which disperses the traffic overhead to each node can relieve the traffic overload at the base station. To increase the message delivery ratio and reduce the message overhead, we present novel routing using mobility information which can be obtained from each node, unlike the existing flooding based routings. In the proposed routing scheme, the routing decision metric, which is defined based on the node mobility information, is computed by using the expected distance between each node to the destination. The message is copied to other nodes that have lower expected distance to the destination than the value for the node willing to copy the message. We conducted simulations by using both a random mobility model and a real mobility trace to compare the performance of the proposed routing scheme to the existing routing scheme that does not utilize the mobility information. The performance evaluation showed the proposed routing successfully delivers messages with 10% to 30% less copies compared to previously proposed routing schemes.

A Interoperable Digital Content Protection System Based on DMP (DMP 기반의 상호운용 가능한 디지털 콘텐츠 보호 시스템)

  • Hao, Ri-Ming;Choi, Bong-Kyu;Yoon, Hwa-Mok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.626-629
    • /
    • 2007
  • The digital content was supplied quickly with advancement of video compressive technique and the network. Simultaneously illegal copy and diffuse via Internet, it was caused to necessitate the intellectual property right protection of the digital content. With this background, Various standardization groups and content provision enterprises developed the solution for a digital content protection. But the problem which lack interoperability is appeared, cause of independent development among other equipment. To find solution about this, MPEG(Moving Picture Experts Group) has progressed standardization against IPMP (Intellectual Property Management and Protection) techniques which are possible interoperability. In spite of it, with reason why insufficient function, DMP(Digital Media Project) standard was presented with the alternative against this. In this paper, we analyze MPEG IPMP standards and DMP ToolPack concepts to compare between them, and through these, designed and implemented digital content protection system which possible interoperability.

  • PDF

A Study on the Communicative Aesthetics in UCC New Media Art (UCC 뉴미디어아트에 나타난 소통미학에 관한 연구)

  • Kim, Eel-Kwon;Suh, Yong-Duck
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.68-76
    • /
    • 2011
  • Today the new social and cultural area is generated by development of digital media and internet. Especially UCC is the new cultural area of this time, UCC is applicated and delivered the individual image and contents by digital equipment. This research tried to study the communication esthetics with the relation of a user. And it study about the function of the media communication, the cultural possibility, the value by art of UCC. From now I have not to see the UCC media technology the level of technical limit and we see it variously the level of cultural and artistic. I study the meaning of them and try the analysis. And I will study about the communication between the individual and the community. And I will study also the short aspect and the synthesize aspect of digital network, and how possible the realization of free culture. And I will analyse the meaning and system of UCC contents that product and copy today and then I will suggest that contribute the UCC culture development.

Document Replacement Policy by Site Popularity in Web Cache (웹 캐시에서 사이트의 인기도에 의한 도큐먼트 교체정책)

  • Yoo, Hang-Suk;Jang, Tea-Mu
    • Journal of Korea Game Society
    • /
    • v.3 no.1
    • /
    • pp.67-73
    • /
    • 2003
  • Most web caches save documents temporarily into themselves on the basis of those documents. And when a corresponding document exists within the cache on wei s request, web cache sends the document to corresponding user. On the contrary, when there is not any document within the cache, web cache requests a new document to the related server to copy the document into the cache and then rum it back to user. Here, web cache uses a replacement policy to change existing document into a new one due to exceeded capacity of cache. Typical replacement policy includes document-based LRU or LFU technique and other various replacement policies are used to replace the documents within cache effectively. However, these replacement policies function only with regard to the time and frequency of document request, not considering the popularity of each web site. Based on replacement policies with regard to documents on frequent requests and the popularity of each web site, this paper aims to present the document replacement policies with regard to the popularity of each web site, which are suitable for latest network environments to enhance the hit-ratio of cache and efficiently manage the contents of cache by effectively replacing documents on intermittent requests by new ones.

  • PDF

The EST Analysis and Transgene Expression System in Rice

  • Kim, Jukon;Nahm, Baek-Hie
    • Journal of Plant Biotechnology
    • /
    • v.1 no.1
    • /
    • pp.46-55
    • /
    • 1999
  • The expressed sequence tags(ESTs) from immature seed of rice, Oryza sativa cv Milyang 23, were partially sequenced and analyzed by homology. As of 1998, the partial sequences of about 6,600 cDNA clones were analyzed from normal and normalized immature seed cDNA libraries. About 2,200 ESTs were putatively identified by BLASTX deduced amino acid sequence homology analysis. About 20% of them were putatively identified as storage proteins. Also the clones were highly homologous to genes involved particularly in starch biosynthesis, glycolysis, signal transduction and defenses. Compared to 35% of redundancy in the ESTs of normal cDNA library, that from the substracted library was 15%. The Korea Rice Genome Network is maintained to provide the updated information of sequences, their homologies and sequence alignments of ESTs. For the stable expression of transgene in rice, diverse vectors were developed for overexpression, targeting and gene dosage effect with transit peptides (Tp) and matrix attachment region (MAR) sequence from chicken lysozyme locus. The rice calli were transformed via Agrobacterium tumefaciens LBA4404(pSB1) with the triparental mating technique and selected by herbicide resistance. The green fluorescent protein(GFP) gene in expression vector under the control of rbcS promoter-Tp was overexpressed upto 10 % of the total soluble protein. In addition, the Tp-sGFP fusion protein was properly processed during translocation into chloroplast. The expression of sGFP in the presence of MAR sequences was analyzed with Northern and immunoblot analysis. All the lines in which sGFP transgene with MAR sequence, showed position independent and copy number-dependent expression, while the lines without MAR showed the varied level of expression with the integration site. Thus the MAR sequence significantly reduced the variation in transgene expression between independent transformants.

  • PDF

Design and Implementation of Sensor based Intrusion Detection System (센서 기반 침입 탐지 시스템의 설계와 구현)

  • Choi, Jong-Moo;Cho, Seong-Je
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.865-874
    • /
    • 2005
  • The information stored in the computer system needs to be protected from unauthorized access, malicious destruction or alteration and accidental inconsistency. In this paper, we propose an intrusion detection system based on sensor concept for defecting and preventing malicious attacks We use software sensor objects which consist of sensor file for each important directory and sensor data for each secret file. Every sensor object is a sort of trap against the attack and it's touch tan be considered as an intrusion. The proposed system is a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. We have implemented the proposed system on the Linux operating system using loadable kernel module technique. The proposed system combines host~based detection approach and network-based one to achieve reasonably complete coverage, which makes it possible to detect unknown interception threats.

The Collision Processing Design of an Online Distributed Game Server (온라인 분산게임 서버의 충돌처리 설계)

  • Lee Sung-Ug
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.72-79
    • /
    • 2006
  • Recently, a MMORPG(Massively Multi-play Online Role Playing Game) has built distribute server by Seamless world. This paper proposes an efficient collision detection method. DLS is used to dynamically adjust spatial subdivisions in each the boundary regions of distribute server We use an index table to effectively utilize the relationships between in the nodes and can perform the collision detection efficiently by reconstructing nodes of the tree. Also, we maintain the information for the boundary region to efficiently detect the collections and adjust the boundary regions between distributed servers by using DLS. As the DLS uses pointers, the information for each server is not needed and the boundary regions between the distributed servers are efficiently searched. Using node index points, the construction table can be made to find between ray and neighborhood node, In addition, processes for Network traffic reduce because a copy of the boundary regions is not needed when a object moves with realtime.

  • PDF

A Study on the Types of "Gogyeong-Jeongripyo" and Its Genealogy ("거경정리표(距京程里表)"의 내용유형과 계통에 관한 연구)

  • Todoroki, Hiroshi
    • Journal of the Korean Geographical Society
    • /
    • v.45 no.5
    • /
    • pp.647-668
    • /
    • 2010
  • As well as "Sangyeongpyo," "Gogyeong-Jeongripyo," table of national road transportation system is important to comprehend identity of national geography in Joseon era even if it had not been researched yet. The aim of this study is to divide type of these tables and find its genealogy through mainly analyzing the road network and land names. As the result of this research, "Yeojigo," topographical researches of Korea, edited by Shin Gyeong-Jun as a palt of "Dongguk-Munheonbigo" official book in natural history of the Joseon Dynasty published in 1770, might be identified as the origin for all copy of "Gogyeong-Jeongripyo." Then "Gogyeong-Jeongripyo," can be divided into at least three major types; almost direct descent of "Yeoji go" as 'type1', minor modification as 'type2', and hybrid edition(type3) with second type that quoted many land names as route information from "Dorogo," another topography specialized for road transportation. Since "Dorogo" was also composed by Shin, after all, all genealogy of "Gogyeong-Jeongripyo" came from him.

Document Replacement Policy by Web Site Popularity (웹 사이트의 인기도에 의한 도큐먼트 교체정책)

  • Yoo, Hang-Suk;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.227-232
    • /
    • 2008
  • General web caches save documents temporarily into themselves on the basis of those documents. And when a corresponding document exists within the cache on user's request. web cache sends the document to corresponding user. On the contrary. when there is not any document within the cache, web cache requests a new document to the related server to copy the document into the cache and then turn it back to user. Here, web cache uses a replacement policy to change existing document into a new one due to exceeded capacity of cache. Typical replacement policy includes document-based LRU or LFU technique and other various replacement policies are used to replace the documents within cache effectively. However. these replacement policies function only with regard to the time and frequency of document request. not considering the popularity of each web site. Based on replacement policies with regard to documents on frequent requests and the popularity of each web site, this paper aims to present the document replacement policies with regard to the popularity of each web site, which are suitable for latest network environments to enhance the hit-ratio of cache and efficiently manage the contents of cache by effectively replacing documents on intermittent requests by new ones.

  • PDF