• Title/Summary/Keyword: Copying

Search Result 305, Processing Time 0.027 seconds

A Study on the Efficient Task Scheduling by the Reconstructed Task Graph (태스크 그래프의 재구성에 의한 효율적 태스크 스케줄링에 관한 연구)

  • Byun, Seung-Hwan;Yoo, Kwan-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2235-2246
    • /
    • 1997
  • This paper presents an effective heuristic task scheduling algorithm for multiprocessor systems. To execute task scheduling effectively which is defined as an allocation of m's tasks onto n's processors(m > n), several problems almost at NP-hard should be cleaned up. The purpose of the task scheduling obtains the minimum execution time by mapping the tasks on a system topology or reduces the total execution time to give a minimum system topology. In order to solve this problem, in this paper, the task scheduling is done by redefining a task graph to a reconstructed task graph (RTG). An RTG is obtained by merging or copying nodes to equal the number of nodes on each level of the task graph to the number of processors of the system topology and then directly scheduled to the system topology. This method obtains a fast scheduling time and a simple scheduling method, and near-optimal execution time without executing steps such as the refinement step and the duplication step after the task scheduling.

  • PDF

Digital Contents Application using Intelligence (지능을 이용한 디지털 콘텐츠 응용)

  • Kim, Man-Ki;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.65-71
    • /
    • 2009
  • The end of the 1990s due to the rapid development of Internet communications and two-way communication advertising, public relations, online music, video, movies, e-Book, and distribution of digital content is actively underway. The combination of Internet and TV, as well as born of IPTV and interactive digital content industry's future has become a key industry. However, these two-way communication that illegal adult sites, illegal Bulletin, illegal Ads, PR, shopping mall, illegal music copying, video replication, such as negative due to the emergence of IPTV and is always around us and should be recognized. For example, on the Internet, which has been operating in the ocean sounds from the music copyright issue, the prosecution decided to prosecute because of the digital cultural content, copyright issues has become an important issue. Status and issues of this paper to learn the digital content, using intelligence to solve these problems, two-way communication advertising, public relations and practice of digital content, practices and courses of students vulnerable to offers for the analysis simulation.

  • PDF

Hybrid Spray and Wait Routing Protocol in DTN (DTN에서 Hybrid Spray and Wait 라우팅 프로토콜)

  • Hyun, Sung-Su;Jeong, Hyeon-Jin;Choi, Seoung-Sik
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.53-62
    • /
    • 2014
  • DTN is the next generation network that is used in not guaranteed end-to-end connection such as communication between planet and satellite, frequent connection severance, and not enough for qualified network infrastructure. In this paper, we propose the hybrid Spray-and-Wait algorithm to predict the node contact time by monitoring the periodic contacts information between the nodes. Based on this method, we select one node on the basis of prediction time and copy a message for spray and wait algorithm. In order to verify the the hybrid Spray and Wait algorithm, we use the ONE(Opportunistic Network Environment) Simulator of Helsinki University. The delivery probability of the proposed algorithm is compared to the Binary Spray and Wait algorithm, it is showed that it has 10% less overhead than Binary Spray and Wait routing. It has also shown that it reduces unnecessary copying of this message.

A Method of Authenticating WLAN APs for Smartphones (스마트폰을 위한 무선 AP 인증 방법)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, Sokjoon;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.17-28
    • /
    • 2014
  • The increase of smartphone users have made mobile carriers offload increasingly congested traffic of 3/4G by providing Wi-Fi hot-spots in the public places such as coffee shops and subway stations. In the traditional authentication in WLAN, the users should convince the service providers that they are valid customers before they use WLAN services. Since the authentication protocol is designed for service providers. Even with the mutual authentication based on the IEEE 802.1X, which is supported by IEEE 802.11 standard, it is difficult to be convinced of that the service providers really have installed the WLAN APs, which users are confronted with. An attacker can install rogue APs that masquerade as legitimate APs by copying the SSID, MAC address, etc. in order to obtain users' private information. In this paper, we introduce a method of authenticating legitimate APs for smartphone users. And we show our proposal can be well utilized for the current Wi-Fi hot-spots as a security plug-in and prove it through our experiments.

Development and Application of Web based English Writing System through Cooperative Learning (협동학습을 통한 웹 기반 영어 쓰기 시스템 개발 및 적용)

  • Lee, Hye-Rim;Goh, Byung-Oh
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.1
    • /
    • pp.137-146
    • /
    • 2011
  • The elementary school English Education Course consists of four integrated aspects of language (Listen, Speak, Read, Write) used to develop skills for daily communication in English. yet the 6th Grade English Education Curriculum focuses almost exclusively on sentence completion through copying and "fill-in-the-blank" exercises. Further, these activities are insufficient time to develop literacy skills. Additionally, the curriculum's emphasis on memorization within the written component is very time consuming for students, leading many to develop negative opinions of the written aspect of a comprehensive understanding of English. This thesis attempts to address each these problems through development of a web-based Learning Model for Cooperative Writing in English. The study resulted in three observations. First, this model overcame limitations of the current teaching model in schools. Second, students expressed more interest in the experimental model than in the current curriculum and standard pedagogical methods. Finally, the study demonstrated that improvement of English literacy is indeed possible using the model presented here.

  • PDF

A Study on Digital Image Watermarking for Embedding Audio Logo (음성로고 삽입을 위한 디지털 영상 워터마킹에 관한 연구)

  • Cho, Gang-Seok;Koh, Sung-Shik
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.21-27
    • /
    • 2002
  • The digital watermarking methods have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia data. But it is still difficult to have been overcame the problem of the protection of property to multimedia data, such as digital images, digital video, and digital audio. This paper describes a watermarking algorithm that embeds non-linearly audio logo watermark data which is converted from audio signal of the ownership in the components of pixel intensities in an original image and that insists of ownership by hearing the audio signal transformed from the extracted audio logo through the speaker. Experimental results show that our algorithm using audio logo proposed in this paper is robust against attacks such as particularly lossy JPEG image compression. 

The Historical Lesson of the Team 10's Break Away from the CIAM (Team 10의 CIAM 탈퇴가 오늘 우리에게 주는 역사적(歷史的) 교훈(敎訓))

  • Lee, Hee-Bong
    • Journal of architectural history
    • /
    • v.7 no.3 s.16
    • /
    • pp.137-149
    • /
    • 1998
  • The purpose of this study is to learn from a lesson of the historical fact, the Team 10's break away from the CIAM, which is selected as the most important event in the whole 20th century architecture by author as a historian. The CIAM, organized in 1928 by leading European architects in order to propose new architecture in the industrial era, expanded to the world, met almost annually with an idea of economic efficiency, new functional order, and industrial production for thirty years. Young architects had conflicted with old established group from 6th congress, and after 10th congress they met independently in 1959; the CIAM was disappeared and the Team 10 was born. Main issue of the break-away was human aspect. The Team 10 started from real man, concept of 'human contact', 'sense of community', and 'belonging' instead of abstract functional order. Although CIAM did not suggest inhumane architecture, their biological criteria with sunlight, air, sufficient site became physical determinism. Critique against the Team 10, unsuccess for making humane architecture leads to underestimation like a generational hegemony struggle. However, architect is not specialist of life but form. Historical reevaluation for Team 10 should be that they are the first group to raise an human issue in architecture. Success or not to solve the problem belongs to another domain. After 1960, modern architecture was attacked from the common people, not clients but 'users'. Academic circle tried to solve the problem with behavioral approach through a clear process, 'design method' and with phenomenological approach on real human experience. However practice became reactionary tendency, to make form a little complex, they became post-modern and deconstruction form. Failure of the Team 10's form proved that a complex form does not necessarily make a good life of people. In the Korean historic situation of colony ruling, confusion of liberation, and the War, we did not know the existence of both CIAM and Team 10. After 1970s' economic development, we have just copied Western form from Modern via Post-Modern to Deconstruction. If we make architecture people mattered, we should start from the basic, learning from the Team's break-away, instead of copying.

  • PDF

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

Performance Enhancement and Evaluation of AES Cryptography using OpenCL on Embedded GPGPU (OpenCL을 이용한 임베디드 GPGPU환경에서의 AES 암호화 성능 개선과 평가)

  • Lee, Minhak;Kang, Woochul
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.303-309
    • /
    • 2016
  • Recently, an increasing number of embedded processors such as ARM Mali begin to support GPGPU programming frameworks, such as OpenCL. Thus, GPGPU technologies that have been used in PC and server environments are beginning to be applied to the embedded systems. However, many embedded systems have different architectural characteristics compare to traditional PCs and low-power consumption and real-time performance are also important performance metrics in these systems. In this paper, we implement a parallel AES cryptographic algorithm for a modern embedded GPU using OpenCL, a standard parallel computing framework, and compare performance against various baselines. Experimental results show that the parallel GPU AES implementation can reduce the response time by about 1/150 and the energy consumption by approximately 1/290 compare to OpenMP implementation when 1000KB input data is applied. Furthermore, an additional 100 % performance improvement of the parallel AES algorithm was achieved by exploiting the characteristics of embedded GPUs such as removing copying data between GPU and host memory. Our results also demonstrate that higher performance improvement can be achieved with larger size of input data.

Exploration of Hwabyung (anger syndrome) from the perspective of Korean constitutional medicine (한국의체질의학적 관점에서 본 화병환자의 특성에 관한 연구)

  • Chon Kyum-Koo;Lim Jae-Hwan;Kim Jong-Woo
    • Journal of Oriental Neuropsychiatry
    • /
    • v.12 no.2
    • /
    • pp.193-202
    • /
    • 2001
  • Purpose: Hwabyung is a culture-bound syndrome in Korea, characterized by emotional stress such as anger, depression, and anxiety. The purpose of the present study was to explore the characteristics of Hwabyung patients, based on constitutional medicine, for their symptoms, duration, and coping styles. Method: Participants were 57 Hwabyung patients selected by Hwabyung criteria. They were also diagnosed for their constitution by doctors specialized in constitutional medicine. Each participant was asked to respond to a variety of items such as cause and duration of stress, symptoms of hwabyung, anger and depression, and coping styles. Eight patients were excluded from the total sample; two male patients and six patients unable to be diagnosed for any particular type of constitution. Thus, final sample was 49 female hwabyung patients, which will be reported in what follow. Result: To begin with, constitutional type revealed significant differences in such coping styles as 'perseverance,' 'positive interpretation,' 'positive comparison,' and 'emotional pacification.' More specifically, post-hoc comparison revealed that Taeeumin(person who have taeeum characteristics) was higher in 'perseverance' compared-to other two types of constitution. Taeumin also revealed higher score than Soeumin(person who have soeum characteristics) in 'positive comparison.' With respect to the marital status, the married compared to the unmarried showed higher score in 'anger-control,' and lower score in 'anger-in.' The married compared to the unmarried, regarding coping styles, also showed higher score in 'accommodation,' but lower score in 'emotional expression.' The duration of hwabyung revealed that the longer duration of hwabyung, the more frequent utilization of 'positive interpretation' and 'emotional pacification. Conclusion: The main purpose, the exploration of hwabyung based on four types of constitution, was not supported, as a whole in the present study. However, marital status and duration of hwabyung appear to influence on emotional stress (e.g., anger) as well as coping styles, suggesting that these variables should be dealt with in future studies on hwabyung.

  • PDF