• Title/Summary/Keyword: Supporting Actions

Search Result 77, Processing Time 0.02 seconds

Multi-level Consistency Control Techniques in P2P Multiplayer Game Architectures with Primary Copy (기본 사본을 갖는 P2P 멀티플레이어 게임 구조의 수준별 일관성 제어 기법)

  • Kim, Jin-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.135-143
    • /
    • 2015
  • A Multiplayer Online Game(MOG) is a game capable of supporting hundreds or thousands of players and is mostly played using the Internet. P2P(peer-to-peer) architectures for MOGs can potentially achieve high scalability, low cost, and good performance. The basic idea of many P2P-based games is to distribute the game state among peers and along with it processing, network, and storage tasks. In a primary-copy based replication scheme where any update to the object has to be first performed on the primary copy, this means distributing primary copies of objects among peers. Most multiplayer games use a primary-copy model in order to provide strong consistency control over an object. Games consist of various types of actions that have different levels of sensitivity and can be categorized according to their consistency requirements. With the appropriate consistency level of each action type within a game, this paper allows developers to choose the right trade-off between performance and consistency. The performance for P2P game architecture with the primary-copy model is evaluated through simulation experiments and analysis.

An Efficient Flash Memory B-Tree Supporting Very Cheap Node Updates (플래시 메모리 B-트리를 위한 저비용 노드 갱신 기법)

  • Lim, Seong-Chae
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.706-716
    • /
    • 2016
  • Because of efficient space utilization and fast key search times, B-trees have been widely accepted for the use of indexes in HDD-based DBMSs. However, when the B-ree is stored in flash memory, its costly operations of node updates may impair the performance of a DBMS. This is because the random updates in B-tree's leaf nodes could tremendously enlarge I/O costs for the garbage collecting actions of flash storage. To solve the problem, we make all the parents of leaf nodes the virtual nodes, which are not stored physically. Rather than, those nodes are dynamically generated and buffered by referring to their child nodes, at their access times during key searching. By performing node updates and tree reconstruction within a single flash block, our proposed B-tree can reduce the I/O costs for garbage collection and update operations in flash. Moreover, our scheme provides the better performance of key searches, compared with earlier flash-based B-trees. Through a mathematical performance model, we verify the performance advantages of the proposed flash B-tree.

Multi-class Feedback Algorithm for Region-based Image Retrieval (영역 기반 영상 검색을 위한 다중클래스 피드백 알고리즘)

  • Ko Byoung-Chul;Nam Jae-Yeal
    • The KIPS Transactions:PartB
    • /
    • v.13B no.4 s.107
    • /
    • pp.383-392
    • /
    • 2006
  • In this paper, we propose a new relevance feedback algorithm using Probabilistic Neural Networks(PNN) while supporting multi-class learning. Then, to validate the effectiveness of our feedback approach, we incorporate the proposed algorithm into our region-based image retrieval tool, FRIP(Finding Regions In the Pictures). In our feedback approach, there is no need to assume that feature vectors are independent, and as well as it allows the system to insert additional classes for detail classification. In addition, it does not have a long computation time for training because it only has four layers. In the PNN classification process, we store the user's entire past feedback actions as a history in order to improve performance for future iterations. By using a history, our approach can capture the user's subjective intension more precisely and prevent retrieval performance errors which originate from fluctuating or degrading in the next iteration. The efficacy of our method is validated using a set of 3000 images derived from a Corel-photo CD.

Effective Actions of Public Official's Drunk Driving (공무원 음주운전 대응방안)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.395-401
    • /
    • 2017
  • This study has aware of the seriousness of public official. and come up with an effective counterplan about public official. This research is a study on previous research on government and officer crime. And understanding is the status about public official. It proposed ways to solve the problem Drunk driving is illegal to drive a vehicle while drunk act. Drunk driving is likely the potential to cause a traffic accident. As a result, drinking and driving is decreasing since the mid-2000s. The cause of the change is to strengthen social awareness, regulations for drunk driving. and public official was decreased. However, it did not disappear. Cause of drunk driving is wrong, such as dinners and cultural distrust of the deputy driving, drinking after misjudgment on his physical condition. public official is a bigger influence. It is a social problem. Personally great damage to organization. Therefore, this study is an analysis of international practices and domestic best practices. Officials drunk driving drunk driving prevention measures are proposed to strengthen preventive measure, it is proposed the organization of internal control measures, union officials supporting the improvement of company dinner.

Cell Cycle Modulation of MCF-7 and MDA-MB-231 by a Sub-Fraction of Strobilanthes crispus and its Combination with Tamoxifen

  • Yaacob, Nik Soriani;Kamal, Nik Nursyazni Nik Mohamed;Wong, Kah Keng;Norazmi, Mohd Nor
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.18
    • /
    • pp.8135-8140
    • /
    • 2016
  • Background: Cell cycle regulatory proteins are suitable targets for cancer therapeutic development since genetic alterations in many cancers also affect the functions of these molecules. Strobilanthes crispus (S. crispus) is traditionally known for its potential benefits in treating various ailments. We recently reported that an active sub-fraction of S. crispus leaves (SCS) caused caspase-dependent apoptosis of human breast cancer MCF-7 and MDA-MB-231 cells. Materials and Methods: Considering the ability of SCS to also promote the activity of the antiestrogen, tamoxifen, we further examined the effect of SCS in modulating cell cycle progression and related proteins in MCF-7 and MDA-MB-231 cells alone and in combination with tamoxifen. Expression of cell cycle-related transcripts was analysed based on a previous microarray dataset. Results: SCS significantly caused G1 arrest of both types of cells, similar to tamoxifen and this was associated with modulation of cyclin D1, p21 and p53. In combination with tamoxifen, the anticancer effects involved downregulation of $ER{\alpha}$ protein in MCF-7 cells but appeared independent of an ER-mediated mechanism in MDA-MB-231 cells. Microarray data analysis confirmed the clinical relevance of the proteins studied. Conclusions: The current data suggest that SCS growth inhibitory effects are similar to that of the antiestrogen, tamoxifen, further supporting the previously demonstrated cytotoxic and apoptotic actions of both agents.

The Defense Strategies against Consumer Unethical Behaviors (소비자의 비윤리적 행동에 대한 방어전략)

  • Lee, Un-Kon;Park, Jong Pil;Choi, Young Eun;Oh, Yonghui
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.17-37
    • /
    • 2012
  • The evolution of the IT facilitated the social actions of the consumers by supporting social communication of the online users. At the same time it help for the consumer to post malicious comments on the Internet or to spread the unproven news for distorting the public opinion in the SNSs. Although the number of the consumer unethical behaviors and the estimated damage of the innocent companies have been increased, a few studies had investigate on this issue. Based on the Literature on the consumer unethical behaviors and the institution based trust, we had developed the defense strategies against the consumer unethical behaviors. This study would introduce the new perspective that the consumer could always not be innocent. Also, the defense strategy developed in this study could contribute to make the guideline for consumer service manual.

GIS based Effective Methodology for GAS Accident Management (GIS를 이용한 효율적인 가스사고관리 방법에 관한 연구)

  • 김태일;김계현;전방진;곽태식
    • Spatial Information Research
    • /
    • v.12 no.1
    • /
    • pp.89-100
    • /
    • 2004
  • Nowadays, the gas utilities have been increasing constantly due to the expansion of the urban areas. Using computerized information database, the gas companies have developed a gas management system in order to maintain the current status. However, this system can only give basic functions of the maintenance and management of the gas facilities and it has no proper utilities to provide information against accidents from gas leaks. Therefore, a gas accident management system has been developed in this study. Through primary and secondary pipe searching algorithm realtime based management system was devised against gas leaks to propose proper actions. In addition, supporting decision making has been enabled providing estimated maximum amount of gas leaks. Furthermore, all the residential units could be identified thereby minimizing damages through early warning. This system can be expected to contribute to enhance the efficiency of the gas management not to mention of protecting human lives and properties of the nation.

  • PDF

Supporting Geo-Workflow Management through Object Activity Model (객체행위모델을 통한 지형정보 프로세스 관리)

  • Liou, Jaeik;Ryu, Keun Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.2
    • /
    • pp.1-16
    • /
    • 2001
  • Management of geo-workflow's changes is one of growing issues and requires more advanced ways and methods to deal with heterogeneous modifications and interactions of process, activity and event over time. A few dominant workflow models have coped with these subjects. There is, however, little consensus for explanation of six dimensions with regard to actor, activity, space, time, reason and effect. This study begins with examining environments of six dimensions and the Hexad model is proposed to elucidate the causes and results of a wide variety of geo-processes and activities. In this paper, we will introduce Hexad Object Activity Model making it possible to interpret manifest motivations, conditions and actions. Full descriptions of six dimensions are often useful for applying to the handling of diverse activities particularly requiring to clarify actor's goal and role at a specific time and space.

  • PDF

Quantified Lockscreen: Integration of Personalized Facial Expression Detection and Mobile Lockscreen application for Emotion Mining and Quantified Self (Quantified Lockscreen: 감정 마이닝과 자기정량화를 위한 개인화된 표정인식 및 모바일 잠금화면 통합 어플리케이션)

  • Kim, Sung Sil;Park, Junsoo;Woo, Woontack
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1459-1466
    • /
    • 2015
  • Lockscreen is one of the most frequently encountered interfaces by smartphone users. Although users perform unlocking actions every day, there are no benefits in using lockscreens apart from security and authentication purposes. In this paper, we replace the traditional lockscreen with an application that analyzes facial expressions in order to collect facial expression data and provide real-time feedback to users. To evaluate this concept, we have implemented Quantified Lockscreen application, supporting the following contributions of this paper: 1) an unobtrusive interface for collecting facial expression data and evaluating emotional patterns, 2) an improvement in accuracy of facial expression detection through a personalized machine learning process, and 3) an enhancement of the validity of emotion data through bidirectional, multi-channel and multi-input methodology.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.