• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.028 seconds

Local animation structural Problem of screening and infringement copy right : in the centering of Chuncheon area (지역 애니메이션 상영 구조 문제와 저작권 침해 : 춘천 지역을 중심으로)

  • Seo, Jeong-Soo;Park, Ki-Bog
    • Cartoon and Animation Studies
    • /
    • s.15
    • /
    • pp.207-220
    • /
    • 2009
  • This paper researched that consumers who lived in the local small cites have a restricted and insufficient problem to screening the animation film comparing with those of capital area and the other broader local cities. And these kinds of problems caused more serious problems like a infringement of copy right as a result. This paper calculated and evaluated that the rate possibilities of criminal infringement copy right in supposing that giving the opportunity screening the all of the first-run movies the most highest criminal group in Chuncheon where the worst benefit area in aspect of screening circumstances. As a result of this research, this paper could suggest that the possibility to reduce the criminal infringement of copy right and the necessity of structural reconstruction throughout rebuilding of animation distribution and consciousness of consumers. Thus this paper try find out the importance of reducing the rate of criminal infringement copy right by recontruction of structrual access of local animation business.

  • PDF

Implementation of Memory Copy Reduction Scheme for Networked Multimedia Service in Linux (리눅스 커널에서 네트워크 멀티미디어 서비스를 위한 메모리 복사 감소 기법 구현)

  • Kim, Jeong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2B
    • /
    • pp.129-137
    • /
    • 2003
  • Multimedia streams, like MPEG continuously retrieve multimedia data because of their incessant playback. While these streams need an efficient support of kernel, the current buffer cache mechanism of Linux kernel such as Unix operating system was designed apt for small files, which is aperiodically requested as well as time uncritical. But, in case of continuous media, the CPU must enormously copy memory from kernel address space to user address space. This must lead to a large CPU overhead. This overhead both degrades system throughput and cannot guarantee QOS. In this paper, we have designed and implemented two memory copy reduction schemes in Linux kernel, direct I/O and one copy. The direct I/O skips the buffer cache layer of Linux kernel and results in dramatic reduction of CPU memory copy overhead. And, the one copy provides a fast disk-to-network data path without copying to user address space. The experimental results show considerable reduction of CPU overhead and throughput improvements.

An Efficient Network System Call Interface supporting minimum memory copy (메모리 복사를 최소화화는 효율적인 네트워크 시스템 호출 인터패이스)

  • 송창용;김은기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.397-402
    • /
    • 2004
  • In this paper, we have designed and simulated a new file transmission method. This method restricts memory copy and context switching happened in traditional file transmission. This method shows an improved performance than traditional method in network environment. When the UNIX/LINUX system that uses the existing file transfer technique transmits a packet to the remote system, a memory copy between the user and kernel space occurs over twice at least. Memory copy between the user and kernel space increase a file transmission time and the number of context switching. As a result, the existing file transfer technique has a problem of deteriorating the performance of file transmission. We propose a new algorithm for solving these problems. It doesn't perform memory copy between the user and kernel space. Hence, the number of memory copy and context switching is limited to the minimum. We have modified the network related source code of LINUX kernel 2.6.0 to analyzing the performance of proposed algorithm and implement new network system calls.

The copy networks controlling the copy number according to the fluctuations of the input traffics for an ATM Multicast Switch (입력 트래픽의 특성에 따라 복사 수가 제어되는 ATM 멀티캐스트 스위치 복사 망)

  • Paik, Jung-Hoon;Lim, Chae-Tak
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.10
    • /
    • pp.52-63
    • /
    • 1998
  • In this paper, several improvements to a copy network proposed previously for multicast packet switching are described. The improvements provide a solution to some problems inherent in multicasting. The input fairness problem caused by overf low is solved by a dynamic starting point decider(DSD), which can calculate running sums of copy requests starting from any input port. The starting point is changed adaptively in every time slot based on both the fill level of the input buffers in current time slot and the overflow situations of the previous time slot. Using the fill level of the conventional network. The DSD also provides the function of regulating overall copy requests according to the amount of input traffics. This is an essential function in improving overall throughputs of the copy networks. The throughput of a multicast switch can be improved substantially if partial service of copy request is implemented when overflow occurs. Call-splitting can also be implemented by the DSD in a straightforward manner. The hardware for the DSD is derived with the objective of simple architectures for the high speed operation. Simulation study of the copy network under various traffic conditions is presented to evaluate its performance.

  • PDF

Copy Propagation in CTOC (CTOC에서 복사 전파)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Won-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.1-8
    • /
    • 2007
  • Although the Java bytecode has numerous advantages. there ate also shortcomings such as slow execution speed and difficulty in analysis. Therefore. in order for the Java class file to be effectively executed under the execution environment such as the network, it is necessary to convert it into optimized code. We implements CTOC. CTOC generated CFG using the existing bytecode then created the SSA Form for analysis and optimization. However. due to insertion or the ${\phi}$-function in the process of conversion into the SSA Form, the number of nodes increased. As a means of reducing the number of nodes, we performed copy propagation, which is an optimization method applicable to the SSA form. Copy propagation is the process of a value of a variable being topied to another variable. There are cases where conversion due to copy propagation alone does not yield significant effects. However, when variables are not used in the later optimization stages, copy propagation provides a means for eliminating the copy statement for the corresponding variable, making it an important step. This paper shows the copy propagation to obtain a more optimized code in SSA Form.

  • PDF

Performance Evaluation of WAN Storage Migration Scheme for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 WAN 스토리지 이주 기법 성능평가)

  • Chang, Jun-Hyub;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.1-7
    • /
    • 2012
  • In this paper, we design and implement the simulator for WAN storage replication model performance evaluation in cloud computing environment. Each cloud of simulator is composed of virtual machine emulator and storage emulator. The virtual machine emulator is composed of read/write ratio module, the read/write sequence combination module, and the read/write request module. The storage emulator is composed of storage management module, data transfer module, read/write operations module, and overhead processing module. Using the simulator, we evaluate performance of migration scheme, pre-copy and the post-copy, considering about read/write ratio, network delay, and network bandwidth. Through simulation, we have confirmed that the average migration time of pre-copy was decreased proportional to the read operation. However, average migration time of post-copy was on the increase. Also, the average migration time of post-copy was increased proportional to the network delay. However, average migration time of pre-copy was shown uniformly. Therefore, we show that pre-copy model more effective to reduce the average migration time than the post-copy model. The average migration time of pre-copy and post-copy were not affected by the change of network bandwidth. Therefore, these results show that selects the storage replication model to be, the network bandwidth know not being the important element.

Ordinal Measure of DCT Coefficients for Image Correspondence and Its Application to Copy Detection

  • Changick Kim
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.168-180
    • /
    • 2002
  • This paper proposes a novel method to detect unauthorized copies of digital images. This copy detection scheme can be used as either an alternative approach or a complementary approach to watermarking. A test image is reduced to 8$\times$8 sub-image by intensity averaging, and the AC coefficients of its discrete cosine transform (DCT) are used to compute distance from those generated from the query image, of which a user wants to find copies. Copies may be Processed to avoid copy detection or enhance image quality. We show ordinal measure of DCT coefficients, which is based on relative ordering of AC magnitude values and using distance metrics between two rank permutations, are robust to various modifications of the original image. The optimal threshold selection scheme using the maximum a posteriori (MAP) criterion is also addressed.

A Studyt on the soft-proofing method on Monitor using characteristics of printing device (출력장치의 인쇄특성을 고려한 모니텅상의 컬러교정)

  • 송경철;강상훈
    • Proceedings of the Korean Printing Society Conference
    • /
    • 2000.04a
    • /
    • pp.45-55
    • /
    • 2000
  • Recently, as the prepress mainstream is changed to the digital wolkflow, various digital proofing systems such as high price dye sublimation printers and low price ink jet printers are widely used in printing industry. Generally, CRT monitors are also often used as a soft proofing device for hard-copy image output. However, displayed color image on CRT monitor does not match to the actual color printing sheets. Because, the color space of CRT monitor used RGB color space, and it is differ with printing device color space, CMY. Therefore, proper color compensations are needed to match the colors between hard-copy proofs on the printing device and soft copy proofs on the monitor. For the proper compensation, we used LUT and gamut mapping method for color space transformation between device dependent color space and device independent color space, vis a vis. This paper shows the application method and the usefulness of CRT monitor for the soft-copy proofing using the output characteristics of printing device.

Fast Detection of Forgery Image using Discrete Cosine Transform Four Step Search Algorithm

  • Shin, Yong-Dal;Cho, Yong-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.527-534
    • /
    • 2019
  • Recently, Photo editing softwares such as digital cameras, Paintshop Pro, and Photoshop digital can create counterfeit images easily. Various techniques for detection of tamper images or forgery images have been proposed in the literature. A form of digital forgery is copy-move image forgery. Copy-move is one of the forgeries and is used wherever you need to cover a part of the image to add or remove information. Copy-move image forgery refers to copying a specific area of an image itself and pasting it into another area of the same image. The purpose of copy-move image forgery detection is to detect the same or very similar region image within the original image. In this paper, we proposed fast detection of forgery image using four step search based on discrete cosine transform and a four step search algorithm using discrete cosine transform (FSSDCT). The computational complexity of our algorithm reduced 34.23 % than conventional DCT three step search algorithm (DCTTSS).

End-to-end Korean Document Summarization using Copy Mechanism and Input-feeding (복사 방법론과 입력 추가 구조를 이용한 End-to-End 한국어 문서요약)

  • Choi, Kyoung-Ho;Lee, Changki
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.503-509
    • /
    • 2017
  • In this paper, the copy mechanism and input feeding are applied to recurrent neural network(RNN)-search model in a Korean-document summarization in an end-to-end manner. In addition, the performances of the document summarizations are compared according to the model and the tokenization format; accordingly, the syllable-unit, morpheme-unit, and hybrid-unit tokenization formats are compared. For the experiments, Internet newspaper articles were collected to construct a Korean-document summary data set (train set: 30291 documents; development set: 3786 documents; test set: 3705 documents). When the format was tokenized as the morpheme-unit, the models with the input feeding and the copy mechanism showed the highest performances of ROUGE-1 35.92, ROUGE-2 15.37, and ROUGE-L 29.45.