• Title/Summary/Keyword: memory industry

Search Result 301, Processing Time 0.025 seconds

Neuroprotective Effects of Berberine in Neurodegeneration Model Rats Induced by Ibotenic Acid

  • Lim, Jung-Su;Kim, Hyo-Sup;Choi, Yoon-Seok;Kwon, Hyock-Man;Shin, Ki-Soon;Joung, In-Sil;Shin, Mi-Jung;Kim, Yun-Hee
    • Animal cells and systems
    • /
    • v.12 no.4
    • /
    • pp.203-209
    • /
    • 2008
  • Berberine, an isoquinoline alkaloid found in Coptidis Rhizoma(goldenthread) extract, has multiple pharmacological effects such as anti-inflammatory, antimicrobial and anti-ischemic effects. In the present study, we examined the effects of berberine on neuronal survival and differentiation in a hippocampal precursor cell line and in the memory deficient rat model. Berberine increased in a dose dependent manner the survival of hippocampal precursor cells as well as differentiated cells. In addition, berberine promoted neuronal differentiation of hippocampal precursor cells. In the memory deficient rat model induced by stereotaxic injection of ibotenic acid into entorhinal cortex(Ibo model), hippocampal cells were increased about 2.7 fold in the pyramidal layer of CA1 region and about 2 fold in the dentate gyrus by administration of berberine after 2 weeks of ibotenic acid injection. Furthermore, neuronal cells immunoreactive to calbindin were increased in the hippocampus and entorhinal cortex area by administration of berberine. Taken together, these results suggest that berberine has neuroprotective effect in the Ibo model rat brain by promoting the neuronal survival and differentiation.

Performance Evaluation of SSD-Index Maintenance Schemes in IR Applications

  • Jin, Du-Seok;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.377-382
    • /
    • 2010
  • With the advent of flash memory based new storage device (SSD), there is considerable interest within the computer industry in using flash memory based storage devices for many different types of application. The dynamic index structure of large text collections has been a primary issue in the Information Retrieval Applications among them. Previous studies have proven the three approaches to be effective: In- Place, merge-based index structure and a combination of both. The above-mentioned strategies have been researched with the traditional storage device (HDD) which has a constraint on how keep the contiguity of dynamic data. However, in case of the new storage device, we don' have any constraint contiguity problems due to its low access latency time. But, although the new storage device has superiority such as low access latency and improved I/O throughput speeds, it is still not well suited for traditional dynamic index structures because of the poor random write throughput in practical systems. Therefore, using the experimental performance evaluation of various index maintenance schemes on the new storage device, we propose an efficient index structure for new storage device that improves significantly the index maintenance speed without degradation of query performance.

The Study on Software Tamper Resistance for Securing Game Services (게임 서비스 보호를 위한 소프트웨어 위변조 방지기술 연구)

  • Chang, Hang-Bae;Kang, Jong-Gu;Joe, Tae-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1120-1127
    • /
    • 2009
  • The commensurate number of the attacks and infringement targeting a vulnerability of the game service has been increasing constantly, due to the dramatic growth and expansion of the impact of the game industry. However, there exist no subsequent researches for the differentiated technology, which is to prevent the reverse function of the game service. Therefore, in this study, we examined the current status of infringement toward online game services which are provided in the market currently and designed the proper technical measures for a manipulation of the game service which is the most vulnerable part. We have encrypted an execution file and decrypted it in real time process. Furthermore, we conducted debugging, disassemble, and prevented a its own memory dump, also concealed the information to overcome the module dependency to preclude a manipulation.

  • PDF

Performance Evaluation of Transaction Processing in Main Memory DBMS (주기억장치 DBMS의 트랜잭션 성능 평가)

  • Lee, Kyu-Woong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.559-566
    • /
    • 2005
  • ALTIBASE is the relational main memory DBMS that enables us to develop the high performance and fault tolerant applications. It guarantees the short and predictable execution time as well as the basic functionality of conventional disk-based DBMS. We present the overview of system architecture and the performance analysis with respect to the various design choices. The assorted experiments are performed under the various environments. The results of TPC-H and Wisconsin benchmark tests are described. We illustrate the various performance comparisons under the various index mechanisms, the replication models, the transaction durabilities, and the application structures. A performance study shows the ALTIBASE system can be applied to the wide area of industrial DBMS fields.

  • PDF

A Study of the Combinatorial Interpolation Algorithm for Scaler Hardware Design (스케일러 하드웨어 설계를 위한 조합 보간 알고리즘의 연구)

  • Si-Yeon Han;Bong-Soon Kang
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.296-302
    • /
    • 2023
  • As Multimedia industry has evolved, it has become possible to display resolutions in various formats. Therefore, the performance of a scaler algorithm that converts resolutions while maintaining high quality and its hardware implementation are important. Considering the hardware design of an image up/down scaler, this paper proposes a combinatorial scaler algorithm that uses modified bilinear interpolation in the vertical direction and bicubic interpolation in the horizontal direction to reduce the line memory burden. Through quantitative and qualitative evaluations, this paper compared the performance of the proposed algorithm with three other well-known algorithms, and also compared the hardware burden of its hardware implementation. This paper used a sinusoidal signal and eight typical images for performance evaluation.

Comparative Analysis of Prediction Performance of Aperiodic Time Series Data using LSTM and Bi-LSTM (LSTM과 Bi-LSTM을 사용한 비주기성 시계열 데이터 예측 성능 비교 분석)

  • Ju-Hyung Lee;Jun-Ki Hong
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.217-224
    • /
    • 2022
  • Since online shopping has become common, people can easily buy fashion goods anytime, anywhere. Therefore, consumers quickly respond to various environmental variables such as weather and sales prices. Therefore, utilizing big data for efficient inventory management has become very important in the fashion industry. In this paper, the changes in sales volume of fashion goods due to changes in temperature is analyzed via the proposed big data analysis algorithm by utilizing actual big data from Korean fashion company 'A'. According to the simulation results, it was confirmed that Bidirectional-LSTM(Bi-LSTM) compared to LSTM(Long Short-Term Memory) takes more simulation time about more than 50%, but the prediction accuracy of non-periodic time series data such as clothing product sales data is the same.

Analysis and solution to the phase concentration and DC-like component of correlation result in Daejeon correlator (대전 상관기의 상관 결과에 나타난 유사 DC 성분과 위상 집중 현상에 대한 원인 분석과 해결 방법)

  • Roh, Duk-Gyoo;Oh, Se-Jin;Yeom, Jae-Hwan;Oh, Chung-Sik;Jung, Jin-Seung;Chung, Dong-Kyu;Yun, Young-Joo;Oyama, Tomoaki;Ozeki, Kensuke;Onuki, Hirofumi
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.191-204
    • /
    • 2013
  • In this paper, we investigated the correlation outputs of Daejeon correlator at the viewpoints of the buffer memory setting related to the fine delay tracking and the under/overflow issue in FFT modules, in order to eliminate DC-like component and phase concentration to 0 degree. As the ring buffer memory is being used for the fine delay tracking, the DC-like component in correlation outputs is generated by improper setting of data read/write address, and then that address setting method is modified to exclude a polluted FFT segment in correlation processing when crossing the port/stream boundary. The phase concentration to 0 degree at beginning of bandpass is caused by inadequate scaling factors, which may be the origins of under/overflow occurred at internal computation of FFT stage. With the revised method of the ring buffer memory setting and the scaling factors in FFT, we could obtain higher signal-to-noise ratio and flux density, compared to the previous method, through the correlation processing of true observational data.

A Study about the Changes in Movie Theater Work after the COVID-19 : Focusing on the Cinema Industry of Korea (코로나 19시대 이후 극장체재 변화에 관한 연구 :한국 영화 산업을 중심으로)

  • Suh, Jung-In
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.447-453
    • /
    • 2021
  • The whole world was confused, unintended "COVID-19". It has become a constant phenomenon, not a temporary one, and people are getting used to this era. Among them, We are combating the form of "the film" which is playing a role of a multiplex in Korean film industry. Now we have studied the development of the future korean industry based on the movie theater form through our cultural industry, New platform OTT. As a result for the research, the OTT platform, which is located in one genre today, should be regarded as an opportunity to develop films, and the movie theater, which is a part of the development of the film industry, differs from the OTT platform. with "memory of space", the result was that "The audience's footsteps can move again." The crisis of "COVID-19" should bring about the consequences of turning into opportunity.

A Study on the Impact of the Organization Traits and New product Creativity on Development Performance (신제품개발 조직특성이 신제품 창조성과 개발성과에 미치는 영향에 관한 연구)

  • Jung, Duk-Hwa;Kim, Hyung-Jun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.16 no.2
    • /
    • pp.109-132
    • /
    • 2006
  • A Major aim of this study is to test the hypothesis that there is an association between empowerment, organizational memory, and new product creativity. In addition to exploring these relationships, this study examines the effect of new product creativity on new product performance, and identify the moderating effects of market uncertainty in the relationships between new product creativity and performance. For this purposes, we developed a research model based on the literature reviews of empowerment, organizational memory, market uncertainty, and new product creativity. A total of 121 usable survey responses has been used in the empirical research for foods manufacturing industry. The findings indicate that (1) Empowerment has a positive effect on new product creativity, (2) Organizational memory has a positive effect on new product creativity, (3) New product novelty has a positive effect on new product performance, and (4) Only competition uncertainty has a moderating effects between the new product meaningfulness and performance. The findings have implications for managers wishing to acquire the new product creativity and to better the new product development performance.

  • PDF

Rare Malware Classification Using Memory Augmented Neural Networks (메모리 추가 신경망을 이용한 희소 악성코드 분류)

  • Kang, Min Chul;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.847-857
    • /
    • 2018
  • As the number of malicious code increases steeply, cyber attack victims targeting corporations, public institutions, financial institutions, hospitals are also increasing. Accordingly, academia and security industry are conducting various researches on malicious code detection. In recent years, there have been a lot of researches using machine learning techniques including deep learning. In the case of research using Convolutional Neural Network, ResNet, etc. for classification of malicious code, it can be confirmed that the performance improvement is higher than the existing classification method. However, one of the characteristics of the target attack is that it is custom malicious code that makes it operate only for a specific company, so it is not a form spreading widely to a large number of users. Since there are not many malicious codes of this kind, it is difficult to apply the previously studied machine learning or deep learning techniques. In this paper, we propose a method to classify malicious codes when the amount of samples is insufficient such as targeting type malicious code. As a result of the study, we confirmed that the accuracy of 97% can be achieved even with a small amount of data by applying the Memory Augmented Neural Networks model.