• Title/Summary/Keyword: Duplicate

Search Result 568, Processing Time 0.025 seconds

Priority-Based Duplicate Burst Transmission Mechanism in Optical Burst Switching Networks

  • Um, Tai-Won;Vu, Hai-L.;Choi, Jun-Kyun;Ryu, Won
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.164-166
    • /
    • 2008
  • This paper proposes a priority-based duplicate burst transmission mechanism in an optical burst switching network to enhance the probability of successful reception of bursts. The performance of the proposed mechanism is evaluated by NS2 simulations. Our results show that the burst loss rate is improved especially under light traffic loads.

  • PDF

ANALYSIS OF AN N DUPLICATE-SERVER SYSTEM (N개의 이중 서어버를 가진 시스팀의 해석)

  • Jeon, Gyeong-Pyo
    • ETRI Journal
    • /
    • v.10 no.4
    • /
    • pp.89-98
    • /
    • 1988
  • We consider an N duplicate-server system, where each server consists of two reconfigurable duplicated units which are subject to breakdowns. This system is studied analytically using generating functions, and also numerically using the matrix-geometric procedure. Using the generating function approach we obtain a recursive expression of the queuelength distribution for N=1. This expression in difficult to generalize to N>1. The numerical method is applicable for any value of N. For any N, we also obtain the condition for stability and the availability of the system.

What Is Research Misconducts? Publication Ethics Is as Important as Research Integrity

  • Uhm, Chang-Sub
    • Applied Microscopy
    • /
    • v.46 no.2
    • /
    • pp.67-70
    • /
    • 2016
  • Research ethics are mainly of two fields; research integrity and publication ethics. Research misconducts can occur at both areas. Examples of the research integrity violations are falsification, fabrication, and plagiarism; and those of the publication ethics violations are duplicate publication including self-plagiarism, and improper authorship. In this paper, concepts of research misconducts defined in Research Misconduct-related Rules of The Korean Society of Microscopy are explained and discussed.

Research Ethics Issues that Frequently Arise in Health Services Researches (보건학 연구에서의 주요 연구윤리 쟁점)

  • Sun-Hee Lee
    • Health Policy and Management
    • /
    • v.33 no.3
    • /
    • pp.241-242
    • /
    • 2023
  • As part of efforts to internally strengthen the research ethics capacity of the Korean Academy of Health Policy and Management, we have compiled research ethics issues that are frequently encountered in public health researches. Firstly, when reusing research reports or dissertations as papers, efforts should be made to avoid unfair duplicate publication. Compliance with the institutional review board exemption process is required, and additional efforts should be devoted during the text recycling process to prevent self-plagiarism or unjust duplicate publication.

A Light-weight Model Based on Duplicate Max-pooling for Image Classification (Duplicate Max-pooling 기반 이미지 분류 경량 모델)

  • Kim, Sanghoon;Kim, Wonjun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • fall
    • /
    • pp.152-153
    • /
    • 2021
  • 고성능 딥러닝 모델은 학습과 추론 과정에서 고비용의 전산 자원과 많은 연산량을 필요로 하여 이에 따른 개발 환경과 많은 학습 시간을 필요로 하여 개발 지연과 한계가 발생한다. 따라서 HW 또는 SW 개선을 통해 파라미터 수, 학습 시간, 추론시간, 요구 메모리를 줄이는 연구가 지속 되어 왔다. 본 논문은 EfficientNet에서 사용된 Linear Bottleneck을 변경하여 정확도는 소폭 감소 하지만 기존 모델의 파라미터를 55%로 줄이는 경량화 모델을 제안한다.

  • PDF

An Efficient Method for Detecting Duplicated Documents in a Blog Service System (블로그 서비스 시스템을 위한 효과적인 중복문서의 검출 기법)

  • Lee, Sang-Chul;Lee, Soon-Haeng;Kim, Sang-Wook
    • Journal of KIISE:Databases
    • /
    • v.37 no.1
    • /
    • pp.50-55
    • /
    • 2010
  • Duplicate documents in blog service system are one of causes that deteriorate both of the quality and the performance of blog searches. Unlike the WWW environment, the creation of documents is reported every time in blog service system, which makes it possible to identify the original document from its duplicate documents. Based on this observation, this paper proposes a novel method for detecting duplication documents in blog service system. This method determines whether a document is original or not at the time it is stored in the blog service system. As a result, it solves the problem of duplicate documents retrieved in the search result by keeping those documents from being stored in the index for the blog search engine. This paper also proposes three indexing methods that preserve an accuracy of previous work, Min-hashing. We show most effective indexing method via extensive experiments using real-life blog data.

Research on the enhancement of throughput for traffic in WLAN (초고속 무선 랜에서 트래픽 간의 처리율 향상을 위한 연구)

  • Song, Byunjin;Lee, Seonhee
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.53-56
    • /
    • 2015
  • In this paper, we want provide improved services with faster transmission, IEEE 802.11n was standardized. A-MPDU (Aggregation MAC Protocol Data UNIT) is a vital function of the IEEE 802.11n standard, which was proposed to improve transmission rate by reducing frame transmission overhead. In this paper, we show the problems of TCP retransmission with A-MPDU and propose a solution utilizing the property of TCP cumulative ACK. If the transmission of an MPDU subframe fails, A-MPDU mechanism allows selective re-transmission of failed MPDU subframe in the MAC layer. In TCP traffic transmission, however, a failed MPDU transmission causes TCP Duplicate ACK, which causes unnecessary TCP re-transmission. Furthermore, congestion control of TCP causes reduction in throughput. By supressing unnecessary duplicate ACKs the proposed mechanism reduces the overhead in transmitting redundant TCP ACKs, and transmitting only a HS-ACK with the highest sequence number. By using the RACK mechanism, through the simulation results, it was conrmed that the RACK mechanism increases up to 20% compared the conventional A-MPDU, at the same time, it tightly assures the fairness among TCP flows.

A study on the application of blockchain technology to prevent duplicate supply and demand of similar welfare services (복지서비스 유사사업의 중복수급 방지를 위한 블록체인 기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.151-156
    • /
    • 2020
  • Various institutions provide various welfare-related services, and accordingly, the quantity and quality of welfare-related services are improved. Along with the improvement of welfare services, the rate of fraudulent and redundant supply and demand due to inappropriate applicants is also increasing. In particular, in the case of similarly promoted projects by various institutions, confirmation of duplicate applications may be insufficient due to system inconsistency between institutions and delays in qualification verification, which may result in duplicate supply and demand. In this paper, in order to prevent the redundant supply and demand related to welfare service similar projects in various institutions, the problem of data management and sharing between institutions was reviewed and a method of applying blockchain technology was proposed step by step. Through the proposal of this paper, transparent data management of recipients is possible, and through this, trust-based welfare benefit management will be possible.

Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing (원격 저장소 데이터 아웃소싱에서 발생하는 중복 식별 과정에서의 부채널 분석 및 제거)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.981-987
    • /
    • 2017
  • Proliferation of cloud computing services brings about reduction of the maintenance and management costs by allowing data to be outsourced to a dedicated third-party remote storage. At the same time, the majority of storage service providers have adopted a data deduplication technique for efficient utilization of storage resources. When a hash tree is employed for duplicate identification as part of deduplication process, size information of the attested data and partial information about the tree can be deduced from eavesdropping. To mitigate such side channels, in this paper, a new duplicate identification method is presented by exploiting a multi-set hash function.

Content-based Video Retrieval for Illegal Copying Contents Detection using Hashing (Hashing을 이용한 불법 복제 콘텐츠 검출을 위한 내용 기반 영상 검색)

  • Son, Heusu;Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.10
    • /
    • pp.1358-1363
    • /
    • 2018
  • As the usage of the Internet grows and digital media become more diversified, it has become much easier for digital contents to be distributed and shared. This makes easier to access the desired digital contents. On the other hand, there is an increasing need to protect the copyright of digital works. There are some prevalent ways to protect ownership, but they accompany several disadvantages. Among those ways, watermarking methods have the advantage of ensuring invisibility, but they also have a disadvantage that they are vulnerable to external attacks such as a noise and signal processing. In this paper, we propose the detecting method of illegal contents that is robust against external attacks to protect digital works. We extract HSV and LBP features from images and use Euclidian-based hashing techniques to shorten the searching time on high-dimensional and near-duplicate videos. According to the results, the proposed method showed higher detection rates than that of the Watermarking techniques in terms of the images with fabrications or deformations.