• Title/Summary/Keyword: Memory Extension

Search Result 101, Processing Time 0.025 seconds

An experimental study about integrated service environment based on e-mail by using rich internet application concept (리치 인터넷 어플리케이션 개념을 적용한 전자메일 기반의 통합 서비스 환경 구현 사례 연구)

  • Kim, Bum-Jae;Shin, Yong-Tae
    • Journal of Digital Contents Society
    • /
    • v.7 no.4
    • /
    • pp.263-269
    • /
    • 2006
  • The trend of the web is moving from portal-centered to user-centered, and RIA(rich internet application) is considered best solution for usability and functionality of the next generation web. But the lack of reference document or technical guide for RIA implementation is a big obstacle for extension of RIA environment to practical business engineer or user. In this paper, I will suggest the implementation conceptand reference site for user-centered environment based on RIA concept. The suggested concept support wire/wireless environment, and use the e-mail that is already used by many company or portal. The contents of this paper will be very helpful to the practical engineer or portal/company that want to use or implement about RIA environment.

  • PDF

CPSN (complex Pi-sigma network) equalizer for the compensation of nonlinearities in satellite communication channels (위성 통신 채널의 비선형성 보상을 위한 CPSN (Complex Pi-sigma Network) 신경회로망 등화기)

  • 진근식;윤병문;신요안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1231-1243
    • /
    • 1997
  • Digital satellite communication channels have nonlinearities with memory due to saturation characteristics of traveling wave tube amplifier in the satellite and transmitter/receiver linear filters. In this paper, we propose a network structure and a learning algorithm for complex pi-sigma network (CPSK) and exploit CPSN in the problem of equalization of nonlinear satellite channels. The proposed CPSN is a complex-valued extension of real-valued pi-sigma network that is a higher-order feedforward network with fast learning while greatly reducing network complexity by utilizing efficient form of polynomials for many input variables. The performance of the proposed CPSN is demonstrated by computer simulations on the equalization of complex-valued QPSK input symbols distorted by a nonlinear channel modeled as a Volterra series and additive noise. The results indicate that the CPSN shows good equalization performance, fast convergence, and less computations as compared to conventional higher-order models such as Volterra filters.

  • PDF

Improved Real-time Video Conferencing System with Memory Buffer Control Management (메모리 버퍼 제어 관리 기능을 갖춘 향상된 실시간 영상회의 시스템)

  • Yoo, Woo Jong;Kim, Sang Hyong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.6
    • /
    • pp.255-260
    • /
    • 2017
  • The limitation of real-time video conferencing system is that the delay of network and buffering and the transmission of user information are not efficiently performed between systems, so real - time performance is not guaranteed completely. In order to overcome this problem, the study on the extension of the network infrastructure and the jitter delay is actively carried out, but the study on the buffering delay is insufficient. In this paper, we propose a frame-rate control buffer management (FRCB) scheme to solve the problem caused by buffering delay. The FRCB is used to prevent overflow and underflow of the buffer by adopting the two-stage buffer threshold of Fast-play THreshold (FTH) and Slow-play THreshold (STH). Therefore, it showed better performance than jitter buffer even under high CPU load, and showed that it is suitable for high quality real time video conferencing.

AE32000B: a Fully Synthesizable 32-Bit Embedded Microprocessor Core

  • Kim, Hyun-Gyu;Jung, Dae-Young;Jung, Hyun-Sup;Choi, Young-Min;Han, Jung-Su;Min, Byung-Gueon;Oh, Hyeong-Cheol
    • ETRI Journal
    • /
    • v.25 no.5
    • /
    • pp.337-344
    • /
    • 2003
  • In this paper, we introduce a fully synthesizable 32-bit embedded microprocessor core called the AE32000B. The AE32000B core is based on the extendable instruction set computer architecture, so it has high code density and a low memory access rate. In order to improve the performance of the core, we developed and adopted various design options, including the load extension register instruction (LERI) folding unit, a high performance multiply and accumulate (MAC) unit, various DSP units, and an efficient coprocessor interface. The instructions per cycle count of the Dhrystone 2.1 benchmark for the designed core is about 0.86. We verified the synthesizability and the area and time performances of our design using two CMOS standard cell libraries: a 0.35-${\mu}m$ library and a 0.18-${\mu}m$ library. With the 0.35-${\mu}m$ library, the core can be synthesized with about 47,000 gates and operate at 70 MHz or higher, while it can be synthesized with about 53,000 gates and operate at 120 MHz or higher with the 0.18-${\mu}m$ library.

  • PDF

An Implementation of Authentication and Encryption of Multimedia Conference using H.235 Protocol (H.235 프로토콜에 의한 영상회의의 인증과 암호화 구현)

  • Sim, Gyu-Bok;Lee, Keon-Bae;Seong, Dong-Su
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.343-350
    • /
    • 2002
  • This paper describes the implementation of H.235 protocol for authentication and media stream encryption of multimedia conference systems. H.235 protocol is recommended by ITU-T for H.323 multimedia conference security protocol to prevent from being eavesdropped and modified by an illegal attacker. The implementation in this paper has used password-based with symmetric encryption authentication. Media streams are encrypted using the Diffie-Hellman key exchange algorithm and symmetric encryption algorithms such as RC2, DES and Triple-DES. Also, 128-bit Advanced Encryption Standard and 128-bit Korean standard SEED algorithms are implemented for the future extension. The implemented authentication and media stream encryption has shown that it is possible to identify terminal users without exposing personal information on networks and to preserve security of multimedia conference. Also, encryption delay time and used memory are not increased even though supporting media stream encryption/decryption, thus the performance of multimedia conference system has not deteriorated.

XML Document Filtering based on Segments (세그먼트 기반의 XML 문서 필터링)

  • Kwon, Joon-Ho;Rao, Praveen;Moon, Bong-Ki;Lee, Suk-Ho
    • Journal of KIISE:Databases
    • /
    • v.35 no.4
    • /
    • pp.368-378
    • /
    • 2008
  • In recent years, publish-subscribe (pub-sub) systems based on XML document filtering have received much attention. In a typical pub-sub system, subscribed users specify their interest in profiles expressed in the XPath language, and each new content is matched against the user profiles so that the content is delivered to only the interested subscribers. As the number of subscribed users and their profiles can grow very large, the scalability of the system is critical to the success of pub-sub services. In this paper, we propose a fast and scalable XML filtering system called SFiST which is an extension of the FiST system. Sharable segments are extracted from twig patterns and stored into the hash-based Segment Table in SFiST system. Segments are used to represent user profiles as Terse Sequences and stored in the Compact Segment Index during filtering. Our experimental study shows that SFiST system has better performance than FiST system in terms of filtering time and memory usage.

An empirical study on the roles of attitudes and attitude strength in stimulus-based decision-making (자극기반 의사결정과정에서 태도와 태도강도의 역할에 관한 실증연구)

  • Beom, Sang-Kyu;Song, Kyun-Suk
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.3
    • /
    • pp.563-575
    • /
    • 2009
  • This research has found logical data directly influencing forming consideration set and attitude and attitude strength under the choosing situation based on memory-base proposed by Priester et. al (2004). We've examined the possibility of model extension through physical salient strength according to the location of product display as an external stimulate factor and attitude and attitude strength, consideration set and role on variable choice. Especially, this research practically proposed the method measuring directly the attitude on behavior instead of seeing the intension of behavior or behavior by measuring the behavior itself based on existing experiment methods and applied logistics regression analysis. In conclusion, this research confirmed the possibility of generalization of this model by verifying appropriateness through logical background and actual analysis based on stimulus-base proposed model characters as an integrated model relation between attitude in stimulus-based relation and decision-making.

  • PDF

A mobile P2P a farming support system implementation which uses JXTA (JXTA를 이용한 모바일 P2P 영농 지원 시스템 구현)

  • Bae, Il-Ho;Cho, Ai-Ri;Min, Hae-Ran;Lee, Gwang;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.579-582
    • /
    • 2004
  • File share system in client/server method requires server of High performance and capacity and this server is very expensive and management is complex and is been influenced much to flatform. Also, extension of correct memory or hard drive etc. causes a lot of expenses to server. While, may minimise human who happen by buying high-capacity server by dispersing file public ownership way unuse expensive server in client/serve. way who put up files in PC(client) to a sewer and manage files and make use of only client computers because public ownership of data and government official in P2P(peer to peer) environment, waste of material resources. Many people are interested to P2P by such reason, researches that use P2P to connection field to be Moba that have Gakgwangbatgo current are gone vigorously.

  • PDF

3차 저장 장치의 장착을 위한 MIDAS-II의 확장

  • Kim, Yeong-Seong;Gang, Hyeon-Cheol;Kim, Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.1
    • /
    • pp.21-35
    • /
    • 2000
  • MIDAS-II is the storage system for BADA DBMS developed at ETRI. This paper describes the extension of MIDAS-II for incorporating the tertiary storage device such as an optical disk jukebox or a tape library, enabling MIDAS-II to function as a storage system of the data server that stores a massive amount of multimedia data. The MIDAS-II disk volume structure is extended to efficiently function as a volume for the tertiary storage device with multiple platters, which canstore huge amount of data of the order of tera bytes. The storage structure of the LOB is changed to efficiently manage the LOB data in the tertiary storage device. The data structures of the shared memory, the process structure, and the utilities in MIDAS-II are also extended to efficiently incorporating the tertiary storage device. The functionalities of each MIDAS-II API function are expanded to handle the tertiary storage device, while the prototypes of those functions are intact in order not to affect the existing application programs. The performance evaluation shows that the extended MIDAS-II works effectively with the tertiary storage device. All these extensions and the performance evaluation are conducted in the SunOS 5.4 environment.

  • PDF

A Study on the Method of Extracting Shape and Attribute Information for Port IFC Viewing (항만 IFC Viewing을 위한 형상 및 속성 정보 추출 방법에 관한 연구)

  • Kim, Keun-Ho;Park, Nam-Kyu;Joo, Cheol-Beom;Kim, Sung-Hoon
    • Journal of KIBIM
    • /
    • v.11 no.3
    • /
    • pp.67-74
    • /
    • 2021
  • An IFC file is dependent on the IFC schema. Because of this relationship, most IFC-using software reads and interprets the IFC File by employing an early binding method, which uses a standard IFC schema. In the case of most open sources, early binding methods using standard IFC schema have a problem that they cannot express extra information of IFC File out of extended IFC schema. Also, in the case of previous studies, they suggested schema extension, such as adding attribute information to the schema, rather than the interpretation of IFC File. This study research on method of extracting shape and attribute information was conducted by analyzing the IFC File produced through the Port schema, which is an extended IFC schema. Three objects were created using the reference relationship between the Port schema definition and the IFC entity, and, at the end, the three objects were combined into one object. It has been confirmed that the shape and property data were express properly while delivering the combined object to the viewer. The process is possible because of the method of matching IFC schema and IFC File, which is dependent on IFC schema but not early binding method. However, this method has some drawbacks, such that contemporaneously generated many objects consume many memory spaces. Future research to investigate that issue further is needed.