• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.031 seconds

Video Matching Algorithm of Content-Based Video Copy Detection for Copyright Protection (저작권보호를 위한 내용기반 비디오 복사검출의 비디오 정합 알고리즘)

  • Hyun, Ki-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.315-322
    • /
    • 2008
  • Searching a location of the copied video in video database, signatures should be robust to video reediting, channel noise, time variation of frame rate. Several kinds of signatures has been proposed. Ordinal signature, one of them, is difficult to describe the spatial characteristics of frame due to the site of fixed window, $N{\times}N$, which is compute the average gray value. In this paper, I studied an algorithm of sequence matching in video copy detection for the copyright protection, employing the R-tree index method for retrieval and suggesting a robust ordinal signatures for the original video clips and the same signatures of the pirated video. Robust ordinal has a 2-dimensional vector structures that has a strong to the noise and the variation of the frame rate. Also, it express as MBR form in search space of R-tree. Moreover, I focus on building a video copy detection method into which content publishers register their valuable digital content. The video copy detection algorithms compares the web content to the registered content and notifies the content owners of illegal copies. Experimental results show the proposed method is improve the video matching rate and it has a characteristics of signature suitable to the large video databases.

  • PDF

NVM-based Write Amplification Reduction to Avoid Performance Fluctuation of Flash Storage (플래시 스토리지의 성능 지연 방지를 위한 비휘발성램 기반 쓰기 증폭 감소 기법)

  • Lee, Eunji;Jeong, Minseong;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.15-20
    • /
    • 2016
  • Write amplification is a critical factor that limits the stable performance of flash-based storage systems. To reduce write amplification, this paper presents a new technique that cooperatively manages data in flash storage and nonvolatile memory (NVM). Our scheme basically considers NVM as the cache of flash storage, but allows the original data in flash storage to be invalidated if there is a cached copy in NVM, which can temporarily serve as the original data. This scheme eliminates the copy-out operation for a substantial number of cached data, thereby enhancing garbage collection efficiency. Experimental results show that the proposed scheme reduces the copy-out overhead of garbage collection by 51.4% and decreases the standard deviation of response time by 35.4% on average.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Cache Coherency Schemes for Database Sharing Systems with Primary Copy Authority (주사본 권한을 지원하는 공유 데이터베이스 시스템을 위한 캐쉬 일관성 기법)

  • Kim, Shin-Hee;Cho, Haeng-Rae;Kim, Byeong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1390-1403
    • /
    • 1998
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory, a separate copy of operating system, and a DB'\fS. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. However, since multiple nodes may be simultaneously cached a page, cache consistency must be cnsured so that every node can always access the'latest version of pages. In this paper, we propose efficient cache consistency schemes in DSS, where the database is logically partitioned using primary copy authority to reduce locking overhead, The proposed schemes can improve performance by reducing the disk access overhead and the message overhead due to maintaining cache consistency, Furthermore, they can show good performance when database workloads are varied dynamically.

  • PDF

CS-PDM Series Resonant High Frequency Inverter for Copy Machine

  • Sugimura, Hisayuki;Eid, Ahmad Mohamad;Hiraki, Eiji;Kim, Sung-Jung;Lee, Hyun-Woo;Nakaoka, Mutsuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1066-1071
    • /
    • 2005
  • This paper presents the two lossless auxiliary inductors-assisted voltage source type half bridge (single ended push pull: SEPP) series resonant high frequency inverter for induction heated fixing roller in copy and printing machines. The simple high-frequency inverter treated here can completely achieve stable zero current soft switching (ZCS) commutation for wide its output power regulation ranges and load variations under its constant high frequency pulse density modulation (PDM) scheme. Its transient and steady state operating principle is originally described and discussed for a constant high-frequency PDM control strategy under a stable ZCS operation commutation, together with its output effective power regulation characteristics-based on the high frequency PDM strategy. The experimental operating performances of this voltage source SEPP ZCS-PDM series resonant high frequency inverter using IGBTs are illustrated as compared with computer simulation results and experimental ones. Its power losses analysis and actual efficiency are evaluated and discussed on the basis of simulation and experimental results. The feasible effectiveness of this high frequency inverter appliance implemented here is proved from the practical point of view.

  • PDF

Inquiry about 'The Theory of Brick-Copy' of the Stone Pagoda at Bunhuangsa Temple (신라 분황사탑의 '모전석탑(模塼石塔) 설(說)' 대한 문제 제기와 고찰)

  • Lee, Hee-Bong
    • Journal of architectural history
    • /
    • v.20 no.2
    • /
    • pp.39-54
    • /
    • 2011
  • The Bunhuangsa stone pagoda, constructed in AD. 634, National Treasure no. 30, has been named as 'brick-copied pagoda' since the Japanese-ruling period by scholars. It is said that the Chinese brick pagoda was its precedent model, however the Bunhuangsa Pagoda is the oldest of all the Chinese-style brick pagodas except one, the Sungaksa Pagoda. The Chinese pagoda cannot have been a precedent model to copy due to its complex detail of wood vestige, as the Bunhuangsa pagoda is simple form without ornament. Domestic brick pagodas cannot have been a precedent model to copy as well, because all the domestic brick pagodas are younger than the Bunhuangsa Pagoda. Therefore, the terminology 'brick-copied pagoda' is a fallacy; it is rather that later brick pagoda copied the precedent the Bunhuangsa stone pagoda. The Bunhuangsa Pagoda is simply a piled-up pagoda of thick or thin, big or small slates of stone, facing only one smooth side and therefore needing nothing to relate to brick. The originality of the pagoda is more related to simple piled-up Indian stone stupa rather than Chinese brick pagoda. The roof form of its gradually stepped projection comes from the harmika of the summit of Indian stupa. Contrary to general history, old Silla Dynasty imported Buddhism directly from India by sea. From written national history and by temple foundation history, the Indian Buddhism evangelist possibly made influence to the erecting of temple and pagoda. The original wrong terminology has made a harmful effect gradually to the naming of mass-styled stone pagoda of only carved stepped-roof form after brick-copied pagoda. The false term 'brick-copied pagoda' should be discarded, which comes with superficial observation based on toadyism to China and colonialism to Japan. Instead of the fallacious term, this paper suggests multi-storied 'piled-up pagoda with slate stone.'

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

Software License Management Agent System for Electronic Commerce (전자 상거래를 위한 소프트웨어 사용권 관리 에이전트 시스템)

  • Yoon, Woo-Seong;Yoon, Jung-Mo;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.77-86
    • /
    • 2001
  • With the growth of the EC(Electronic Commerce), Buying and selling software through the internet are expanded. Among the ESD(Electronic Software Distribution) methods, Buy-first method and TrY-before-bu1 method can not solve the illegal copy problem. Recently developed EL(Electronic License) model solve the illegal copy problem by separating the software and license. But this method also can not support various ways for payment. In this paper we propose the software license management system that is a newly form like ESD model. This system proposes NL(New License) to support various payment methods and SC(Software Charge) to insure that a seller takes the software price. Agent of the proposed system offers scalability to other systems and illegal copy protection function bv managing NL and SC.

  • PDF

Video Copy Detection Algorithm Against Online Piracy of DTV Broadcast Program (DTV 방송프로그램의 온라인 불법전송 차단을 위한 비디오 복사본 검출 알고리즘)

  • Kim, Joo-Sub;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.13 no.5
    • /
    • pp.662-676
    • /
    • 2008
  • This paper presents a video copy detection algorithm that blocks online transfer of illegally copied DTV broadcast programs. Particularly, the proposed algorithm establishes a set of keyframes by detecting abrupt changes of luminance, and then exploits the spatio-temporal features of keyframes. Comparing with the preregistered features stored in the database of DTV broadcast programs, the proposed scheme performs a function of video filtering in order to distinguish whether an uploaded video is illegally copied or not. Note that we analyze only a set of keyframes instead of an entire video frame. Thus, it is highly efficient to identify illegal copied video when we deal with a vast size of broadcast programs. Also, we confirm that the proposed technique is robust to a variety of video edit-effects that are often applied by online video redistribution, such as apsect-ratio change, logo insertion, caption insertion, visual quality degradation, and resolution change (downscaling). In addition, we perform a benchmark test in which the proposed scheme outperforms previous techniques.

Improvement of High-Availability Seamless Redundancy (HSR) Traffic Performance for Smart Grid Communications

  • Nsaif, Saad Allawi;Rhee, Jong Myung
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.653-661
    • /
    • 2012
  • High-availability seamless redundancy (HSR) is a redundancy protocol for Ethernet networks that provides two frame copies for each frame sent. Each copy will pass through separate physical paths, pursuing zero fault recovery time. This means that even in the case of a node or a link failure, there is no stoppage of network operations whatsoever. HSR is a potential candidate for the communications of a smart grid, but its main drawback is the unnecessary traffic created due to the duplicated copies of each sent frame, which are generated and circulated inside the network. This downside will degrade network performance and might cause network congestion or even stoppage. In this paper, we present two approaches to solve the above-mentioned problem. The first approach is called quick removing (QR), and is suited to ring or connected ring topologies. The idea is to remove the duplicated frame copies from the network when all the nodes have received one copy of the sent frame and begin to receive the second copy. Therefore, the forwarding of those frame copies until they reach the source node, as occurs in standard HSR, is not needed in QR. Our example shows a traffic reduction of 37.5%compared to the standard HSR protocol. The second approach is called the virtual ring (VRing), which divides any closed-loop HSR network into several VRings. Each VRing will circulate the traffic of a corresponding group of nodes within it. Therefore, the traffic in that group will not affect any of the other network links or nodes, which results in an enhancement of traffic performance. For our sample network, the VRing approach shows a network traffic reduction in the range of 67.7 to 48.4%in a healthy network case and 89.7 to 44.8%in a faulty network case, compared to standard HSR.