• 제목/요약/키워드: Memory Information

검색결과 5,217건 처리시간 0.038초

ART를 이용한 기억 정보 확장 모델 제시 (Proposal of Memory Information Extension Model Using Adaptive Resonance Theory)

  • 김주훈;김성주;김용택;전홍태
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 Ⅲ
    • /
    • pp.1283-1286
    • /
    • 2003
  • Human can update the memory with new information not forgetting acquired information in the memory. ART(Adaptive Resonance Theory) does not need to change all information. The methodology of ART is followed. The ART updates the memory with the new information that is unknown if it is similar with the memorized information. On the other hand, if it is unknown information the ART adds it to the memory not updating the memory with the new one. This paper shows that ART is able to classify sensory information of a certain object. When ART receives new information of the object as an input, it searches for the nearest thing among the acquired information in the memory. If it is revealed that new information of the object has similarity with the acquired object, the model is updated to reflect new information to the memory. When new object does not have similarity with the acquired object, the model register the object into new memory

  • PDF

Effects of Information Processing Types and Product Ownership on Usage Intention

  • CHOI, Nak-Hwan
    • 산경연구논집
    • /
    • 제12권5호
    • /
    • pp.47-58
    • /
    • 2021
  • Purpose - Current research aimed at exploring the effect differences between the two types of processing product information such as the imagining and the considering on psychological product ownership which could influence the intent to purchase or use the product, and focused on identifying the interaction effects of activated memory information type and advertising information type on each of the information processing types. Research design, data, and methodology - This study divided the information processing types into imagining and considering, and the consumer's memories were divided into autobiographical or episodic and semantic memory. The advertising information was approached in each of event information being together with the product and product feature information. At empirical study, 2(two types of memory activation: episodic and semantic memory activation) ∗ 2(two types of advertising information: event-focused and product feature-focused advertising information) between-subjects design was used to make four types of questionnaire according to the type of experimental groups. Through the survey platform, 'questionnaire stars' of 'WeChat' in China, 219 questionnaire data were collected for empirical study. The structural equation model in AMOS 26 and Anova were used to verify hypotheses. Results - First, the ownership affected the usage intent positively. Second, the imagining did not affect the psychological ownership but did directly affect the usage intention, and the considering affected the ownership positively. Third, the episodic memory activation positively influenced the imagining and negatively affected the considering, whereas the semantic memory activation positively influenced the considering and negatively affected the imagining. Fourth, event-advertising information increased the effects of the activated episodic memory on the imagining, and feature-advertising information increased the effects of the activated semantic memory on the considering. Conclusions - marketers should develop and advertise their product-related event message to trigger the imaging that directly increase the intent to purchase or use their product, when consumers are under the activation of their episodic memory. And marketers should advertise their product feature-related message to trigger the considering that could induce consumers' ownership for their product to increase the intent to purchase or use their product, when they are under the activation of their semantic memory.

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment

  • Jang, Yeon-Woo;Kang, Moon-Hwan;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.499-509
    • /
    • 2018
  • Recently, hybrid transactional memory (HyTM) has gained much interest from researchers because it combines the advantages of hardware transactional memory (HTM) and software transactional memory (STM). To provide the concurrency control of transactions, the existing HyTM-based studies use a bloom filter. However, they fail to overcome the typical false positive errors of a bloom filter. Though the existing studies use a global lock, the efficiency of global lock-based memory allocation is significantly low in multi-core environment. In this paper, we propose an efficient hybrid transactional memory scheme using near-optimal retry computation and sophisticated memory management in order to efficiently process transactions in multi-core environment. First, we propose a near-optimal retry computation algorithm that provides an efficient HTM configuration using machine learning algorithms, according to the characteristic of a given workload. Second, we provide an efficient concurrency control for transactions in different environments by using a sophisticated bloom filter. Third, we propose a memory management scheme being optimized for the CPU cache line, in order to provide a fast transaction processing. Finally, it is shown from our performance evaluation that our HyTM scheme achieves up to 2.5 times better performance by using the Stanford transactional applications for multi-processing (STAMP) benchmarks than the state-of-the-art algorithms.

윈도우 시스템에서 디지털 포렌식 관점의 메모리 정보 수집 및 분석 방법에 관한 고찰 (A Study of Memory Information Collection and Analysis in a view of Digital Forensic in Window System)

  • 이석희;김현상;임종인;이상진
    • 정보보호학회논문지
    • /
    • 제16권1호
    • /
    • pp.87-96
    • /
    • 2006
  • 본 논문에서는 RFC3227 문서[1]에 따른 일반적인 디지털 증거 수집 절차를 살펴보고 메모리 정보 수집에 대한 절차를 정립하였다. 또한 디지털 증거 수집 절차의 개선 사항으로 메모리 덤프 절차를 포함시키고 시스템 전체 메모리를 획득하는 방법을 제시하였다. 실 사용자들의 메모리를 덤프하고 가상 메모리 시스템의 페이지 파일을 수집하여 얼마나 많은 정보가 검출되는 지를 확인해 보았는데, 이 과정에서 핵심 보안정보인 사용자 ID와 패스워드가 페이지 파일의 절반 정도에서 검출되었으며 데이터복구를 통해 중요 정보를 획득할 수 있음을 확인하였다. 또한 각각에 대한 분석기법과 메모리 정보를 중심으로 하는 메모리 정보 획득 절차를 제시하였다.

동영상 물체 분할을 위한 효율적인 메모리 업데이트 모듈 (Efficient Memory Update Module for Video Object Segmentation)

  • 조준호;조남익
    • 방송공학회논문지
    • /
    • 제27권4호
    • /
    • pp.561-568
    • /
    • 2022
  • 최근 대부분의 딥러닝 기반 동영상 물체 분할 방법들에서는 외부 메모리에 과거 예측 정보를 저장한 상태에서 알고리즘 수행을 하며, 일반적으로 메모리에 많은 과거 정보를 저장할수록 관심 물체의 다양한 변화에 대한 근거들이 축적되어 좋은 결과를 얻을 수 있다. 하지만 하드웨어의 제한으로 인해 메모리에 모든 정보를 저장할 수 없어 이에 따른 성능 하락이 발생한다. 본 논문에서는 저장되지 않는 정보들을 기존의 메모리에 추가적인 메모리 할당 없이 저장하는 방법을 제안한다. 구체적으로, 기존 메모리와 새로 저장할 정보들과의 어텐션 점수를 계산한 후에, 각 점수에 따라 해당 메모리에 새 정보를 더한다. 이 방법으로 물체 형체의 변화에 대한 정보가 반영되어 물체 변화에 대한 강인성이 높아져서 분할 성능이 유지됨을 확인할 수 있었다. 또한, 메모리의 누적 매칭 횟수에 따라 적응적으로 업데이트 비율을 결정하여, 업데이트가 많이 되는 샘플들은 과거의 정보를 더 기억하여 신뢰성 있는 정보를 유지할 수 있게 하였다.

플래시 메모리를 이용한 내장 메모리 자가 복구의 재배치 데이타 사용 기술 (Reallocation Data Reusing Technique for BISR of Embedded Memory Using Flash Memory)

  • 심은성;장훈
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제34권8호
    • /
    • pp.377-384
    • /
    • 2007
  • 최근 VLSI 회로 직접도가 급속도로 증가함에 따라 하나의 시스템 칩에 고밀도와 고용량의 내장 메모리가 구현되고 있다. 고장난 메모리를 여분의 메모리로 재배치함으로써 메모리 수율 향상과 사용자에게 메모리를 투명하게 사용할 수 있도록 제공할 수 있다. 본 논문에서는 고장난 메모리 부분을 여분의 행과 열 메모리로 효율적인 재배치를 위해 재배치 알고리즘을 제안하고자 한다. 재배치 정보는 고장난 메모리를 매번 테스트해야만 얻을 수 있다. 매번 테스트를 통해 재배치 정보를 얻는 것은 시간적 문제가 발생한다. 이것을 막기 위해 한번 테스트해서 얻은 재배치 정보를 플래시 메모리에 저장해 해결할 수 있다. 본 논문에서는 플래시 메모리를 이용해 재배치 정보의 활용도를 높인다.

메모리 Hard Error를 극복하기 위한 메모리 Sparing 기법 설계 I : Column Sparing (Design of Memory Sparing Technique to overcome Memory Hard Error I : Column Sparing)

  • 구철회
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(5)
    • /
    • pp.39-42
    • /
    • 2001
  • This paper proposes the design technique of memory sparing to overcome memory hard error Memory Sparing is used to increase the reliability and availability of commercial, military and space computer such as a Data Server, Communication Server, Flight Computer in airplane and On-Board Computer in spacecraft. But the documents about this technique are rare and hard to find. This paper has some useful information about memory error correction and memory error management.

  • PDF

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

어플리케이션의 가상 메모리 보호를 위한 연구 (A Study for Protecting the Virtual Memory of Applications)

  • 김동율;문종섭
    • 대한임베디드공학회논문지
    • /
    • 제11권6호
    • /
    • pp.335-341
    • /
    • 2016
  • As information technology advances rapidly, various smart devices are becoming an essential element in our lives. Smart devices are providing services to users through applications up on the operating system. Operating systems have a variety of rules, such as scheduling applications and controlling hardwares. Among those rules, it is significant to protect private information in the information-oriented society. Therefore, isolation task, that makes certain memory space separated for each application, should highly be guaranteed. However, modern operating system offers the function to access the memory space from other applications for the sake of debugging. If this ability is misused, private information can be leaked or modified. Even though the access authority to memory is strictly managed, there exist cases found exploited. In this paper, we analyze the problems of the function provided in the Android environment that is the most popular and opened operating system. Also, we discuss how to avoid such kind of problems and verify with experiments.