• Title/Summary/Keyword: Memory Manipulation

Search Result 46, Processing Time 0.028 seconds

A bilateral servo system design for master-slave manipulators (마스터-슬레이브형 원격 조작기의 쌍방향 서보제어기 제작에 관한 연구)

  • 김기엽;박찬웅
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.524-527
    • /
    • 1988
  • Basic types of bilateral servo systems were described and practical consideration in the bilateral servo controller design was introduced. Power assistance to the operator is essential for high efficiency and accurate force reflection is necessary for dexterous manipulation. This paper shows a controller structure under development at KIMM which employs nonlinear friction compensation and memory based gravity compensation technique for efficiency and dexterity.

  • PDF

A Compact and Efficient Polygonal Mesh Representation (간결하고 효율적인 폴리곤 메쉬의 표현 구조)

  • Park S. K.;Lee S. H.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.9 no.4
    • /
    • pp.294-305
    • /
    • 2004
  • Highly detailed geometric models are rapidly becoming commonplace in computer graphics and other applications. These complex models, which is often represented as complex1 triangle meshes, mainly suffer from the vast memory requirement for real-time manipulation of arbitrary geometric shapes without loss of data. Various techniques have been devised to challenge these problems in views of geometric processing, not a representation scheme. This paper proposes the new mesh structure for the compact representation and the efficient handling of the highly complex models. To verify the compactness and the efficiency, the memory requirement of our representation is first investigated and compared with other existing representations. And then we analyze the time complexity of our data structure by the most critical operation, that is, the enumeration of the so-called one-ring neighborhood of a vertex. Finally, we evaluate some elementary modeling functions such as mesh smoothing, simplification, and subdivision, which is to demonstrate the effectiveness and robustness of our mesh structure in the context of the geometric modeling and processing.

Performance Optimization of Parallel Algorithms

  • Hudik, Martin;Hodon, Michal
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.436-446
    • /
    • 2014
  • The high intensity of research and modeling in fields of mathematics, physics, biology and chemistry requires new computing resources. For the big computational complexity of such tasks computing time is large and costly. The most efficient way to increase efficiency is to adopt parallel principles. Purpose of this paper is to present the issue of parallel computing with emphasis on the analysis of parallel systems, the impact of communication delays on their efficiency and on overall execution time. Paper focuses is on finite algorithms for solving systems of linear equations, namely the matrix manipulation (Gauss elimination method, GEM). Algorithms are designed for architectures with shared memory (open multiprocessing, openMP), distributed-memory (message passing interface, MPI) and for their combination (MPI + openMP). The properties of the algorithms were analytically determined and they were experimentally verified. The conclusions are drawn for theory and practice.

Analysis of Memory Pool Jacquard Similarity between Bitcoin and Ethereum in the Same Environment (동일한 환경에서 구성된 비트코인과 이더리움의 메모리 풀 자카드 유사도 분석)

  • Maeng, SooHoon;Shin, Hye-yeong;Kim, Daeyong;Ju, Hongtaek
    • KNOM Review
    • /
    • v.22 no.3
    • /
    • pp.20-24
    • /
    • 2019
  • Blockchain is a distributed ledger-based technology where all nodes participating in the blockchain network are connected to the P2P network. When a transaction is created in the blockchain network, the transaction is propagated and validated by the blockchain nodes. The verified transaction is sent to peers connected to each node through P2P network, and the peers keep the transaction in the memory pool. Due to the nature of P2P networks, the number and type of transactions delivered by a blockchain node is different for each node. As a result, all nodes do not have the same memory pool. Research is needed to solve problems such as attack detection. In this paper, we analyze transactions in the memory pool before solving problems such as transaction fee manipulation, double payment problem, and DDos attack detection. Therefore, this study collects transactions stored in each node memory pool of Bitcoin and Ethereum, a cryptocurrency system based on blockchain technology, and analyzes how much common transactions they have using jacquard similarity.

Assessment of the effects of virus-mediated limited Oct4 overexpression on the structure of the hippocampus and behavior in mice

  • Sim, Su-Eon;Park, Soo-Won;Choi, Sun-Lim;Yu, Nam-Kyung;Ko, Hyoung-Gon;Jang, Deok-Jin;Lee, Kyung-Min;Kaang, Bong-Kiun
    • BMB Reports
    • /
    • v.44 no.12
    • /
    • pp.793-798
    • /
    • 2011
  • Recently, pluripotency induction or cellular reprogramming by introducing critical transcription factors has been extensively studied, but has been demonstrated only in vitro. Based on reports that Oct4 is critically involved in transforming neural stem cells into pluripotent cells, we used the lentiviral vector to introduce the Oct4 gene into the hippocampal dentate gyrus (DG) of adult mice. We examined whether this manipulation led to cellular or behavioral changes, possibly through processes involving the transformation of NS cells into pluripotent cells. The Oct4 lentivirus-infused group and the green fluorescent protein lentivirus-infused group showed a similar thickness of the DG and a comparable level of synaptophysin expression in the DG. Furthermore, our behavioral analyses did not show any differences between the groups concerning exploratory activity, anxiety, or memory abilities. This first trial for pluripotency induction in vivo, despite negative results, provides implications and information for future studies on in vivo cellular reprogramming.

The Daily Us (vs. Them) from Online to Offline: Japan's Media Manipulation and Cultural Transcoding of Collective Memories

  • Ogasawara, Midori
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.2
    • /
    • pp.49-67
    • /
    • 2019
  • Since returning to power in 2012, the second Abe administration has pressured Japanese mainstream media in various ways, from creating the Secrecy Act to forming close relationships with media executives and promoting anti-journalism voices on social media. This article focuses on the growth of a jingoist group called the 'Net-rightists' ('Neto-uyo' in the Japanese abbreviation) on the Internet, which has been supporting the right-wing government and amplifying its historical revisionist views of Japanese colonialism. These heavy Internet users deny Japan's war crimes against neighboring Asian countries and disseminate fake news about the past, which justifies Prime Minister Shinzo Abe's hostile diplomatic policies against South Korea and China. Over the past years, the rightist online discourses have become powerful to such an extent that the editorials of major newspapers and TV reports shifted to more nationalist tones. Who are the Neto-uyo? Why have they emerged from the online world and proliferated to the offline world? Two significant characteristics of new media are discussed to analyze their successful media manipulation: cultural transcoding and perpetual rewriting of collective memories. These characteristics have resulted in constructing and reinforcing the data loops of the 'Daily Us' versus Them, technologically raising current diplomatic tensions in East Asia.

An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking (자바스크립트 변조를 이용한 국내 인터넷 뱅킹 키보드 암호화 모듈 우회 공격)

  • Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.941-950
    • /
    • 2015
  • Internet banking is widely used in our life with the development of the internet. At the same time, phishing attacks to internet banking have been increased by using malicious object to make unfair profit. People using internet banking service in Korea is required to install security modules such as anti-virus and keyboard protection. However phishing attack technique has been progressed and the advanced technique such as memory hacking defeats the security module of internet banking service. In this paper, we describe internet banking security modules provided by Korean internet banks and analyze how keyboard encryption module works. And we propose an attack to manipulate account transfer information using javascript. Although keyboard protection module provides two functions that protect leakage and manipulation of account transfer information submitted by users against the malicious program of hackers. Our proposed technique can manipulate the account transfer information and result html pages.

Effects of the Manner of Deleting Typical Items in a Scene on False Memory (풍경 그림에서 전형적인 정보의 삭제 방법이 오기억에 미치는 영향)

  • Do, Kyung-Soo;Bae, Kyung-Sue
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.2
    • /
    • pp.113-138
    • /
    • 2007
  • The effects of schema on accurate and false memories of items in a scene were investigated in two experiments: Recognition of items in a scene was tested immediately in Experiment 1 and three days later in Experiment 2. In both experiments, the following three variables were manipulated: Exposure time (250ms or 10000ms), picture mode (completed pictures or scrambled pictures), and manipulation mode (missing item or substituted item). Experiment 1 had yielded three important results: First, although accurate memory for presented items got increased when the exposure time was longer, false memory of the critical lures was not changed. Second, false memory of critical lures in the missing condition, where there was not any conflict between verbatim information and gist information, was higher than that of the substituted condition, where verbatim information of the item that replaced the lure was in conflict with the gist information. Third, accurate memory for atypical items in the substituted rendition, which had replaced the critical lures and in conflict with the schema, was higher than that in the missing condition. In Experiment 2, recognition test were administered 72 hours after the participants saw the picture. The three effects mentioned in Experiment 1 had disappeared in Experiment 2. The results of Experiment 2 might be due to the selective weakening of verbatim information compared to the persistence of the gist (or schematic) information. The results of Experiments 1 and 2 showed that false memory of critical lures is more persistent than the accurate memory of non-critical information. Theoretical implications of the results were considered in terms of the function of the verbatim and gist information.

  • PDF

True History of the Kelly Gang and the Politics of Memory (『켈리 일당의 실화』와 기억의 정치학)

  • Rhee, Suk Koo
    • Journal of English Language & Literature
    • /
    • v.55 no.2
    • /
    • pp.337-357
    • /
    • 2009
  • Ned Kelly, the bushranger, is a legendary figure of special significance to the Australians of today. The Aussies' affection for this "horse thief" derives from the fact that the latter has become a national ideal of the "battler" who does not give up in the face of hardships. Peter Carey's is considered to be one of the "national narratives" that not only heroize but also give voice to the Irish rebels who fought for "fair go" in the colonial Australia. However, this paper asserts that there are more to the novel than merely paying a tribute to the national icon, especially when the novel is examined in the context of the "republic controversy." In 1999, the preceding year of the novel's publication, Australia had a national referendum on the issue of whether or not to secede from the Commonwealth. Due to the procedural manipulation of the royalist ruling party, republicanism was voted down. At the time when the majority of Australians were irate with the result of the referendum, Carey's retelling of the supposedly anti-British rebel failed to promote the lost cause. This paper investigates how the narrativization of the legendary figure, whose anti-British and anti-authoritarian attitude can be easily translated into the cause of republicanism, came to appeal to the general reading public. In so doing, this paper compares Carey's novel with the historical Kelly's two epistles: Jerilderie and Cameron Letter. This comparison brings to light what is left out in the process of Carey's narrativization of the rebel's life: the subversive militant voice of an Irish nationalist. The conclusion of this paper is that the possibility for Kelly's life to surface again in the 21st century as a sort of counter-memory is contained by Carey through its inclusion in a highly personalized domestic narrative.

MNFS: Design of Mobile Multimedia File System based on NAND FLASH Memory (MNFS : NAND 플래시메모리를 기반으로 하는 모바일 멀티미디어 파일시스템의 설계)

  • Kim, Hyo-Jin;Won, You-Jip;Kim, Yo-Hwan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.11
    • /
    • pp.497-508
    • /
    • 2008
  • Mobile Multimedia File System, MNFS, is a file system which extensively exploits NAND FLASH Memory, Since general Flash file systems does not precisely meet the criteria of mobile devices such as MP3 Player, PMP, Digital Camcorder, MNFS is designed to guarantee the optimal performance of FLASH Memory file system. Among many features MNFS provides, there are three distinguishable characteristics. MNFS guarantees, first, constant response time in sequential write requests of the file system, second, fast file system mounting time, and lastly least memory footprint. MNFS implements four schemes to provide such features, Hybrid mapping scheme to map file system metadata and user data, manipulation of user data allocation to fit allocation unit of file data into allocation unit of NAND FLASH Memory, iBAT (in core only Block Allocation Table) to minimize the metadata, and bottom-up representation of directory. Prototype implementation of MNFS was tested and measured its performance on ARM9 processor and 1Gbit NAND FLASH Memory environment. Its performance was compared with YAFFS, NAND FLASH File system, and FAT file system which use FTL. This enables to observe constant request time for sequential write request. It shows 30 times faster mounting time to YAFFS, and reduces 95% of HEAP memory consumption compared to YAFFS.