• Title/Summary/Keyword: 중복 효과

Search Result 564, Processing Time 0.023 seconds

Implementation and Analysis of a XML Based Product Description Model (XML 기반 상품 표현 모델의 구현 및 분석)

  • Kim, Kyoung-Rea;Ha, Sang-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1167-1170
    • /
    • 2001
  • 인터넷 중심의 정보화 사회가 되면서 B2C간 또는 B2B간에 상품 정보의 교환이 활발해지고 있다. 본 논문에서는 상품정보 교환을 위한 한 표준으로 이미 제안된 바 있는 XML 기반 통합 상품 표현 모델을 참조하고 구현한다. 이 모델은 다양한 상품정보를 XML에 기반하여 효과적으로 통합하여 표현할 수 있다. 구현은 Java의 컴포넌트 기술인 Java Bean과 EJB를 사용하여 이루어진다. 참조 모델을 사용하면 모든 상품에 공통된 데이터와 본질적인 데이터로 구분하여 기술할 수 있으며, 따라서 상품의 공통된 정보를 통합하여 기술함으로써 데이터의 중복을 피한 수 있다. 논문에서는 참조 모델이 갖는 데이터 중복 제거 효과를 웹 상의 다양한 상품 정보를 대상으로 분석한다.

  • PDF

Processing of Orthography and Phonology in Reading Sino-Korean Words (한자어의 표기정보와 음운정보 처리)

  • Yi, Kwang-Oh;Bae, Sung-Bong;Nam, Ki-Chun
    • Annual Conference on Human and Language Technology
    • /
    • 2005.10a
    • /
    • pp.63-72
    • /
    • 2005
  • 한자어의 처리에서 나타나는 표기중복의 효과가 표기 처리에 기인한 것인지 음운 처리에 기인한 것인지를 결정하기 위하여 두 개의 실험을 실시하였다. 실험 1에서는, 점화어-표적어의 관계를 표기불일치(음운일치), 음운불일치(표기일치), 음운-표기일치, 무 관련의 네 가지로 조작하였다 또한, 음운규칙에 따른 차이를 알아보기 위해서 유음화, 비음화, 연음화의 세 가지 규칙이 자극의 구성에 이용되었다. 점화어의 제시방식은 차폐점화와 SOA 200ms의 두 가지가 사용되었다. 음변화의 종류 및 점화어 제시방식에 관계없이, 음운불일치조건에서의 반응 양상이 음운-표기일치조건에서의 반응 양상과 유사하게 나타났다. 이것은 선행연구에서 나타난 표기중복의 효과가 음운처리에 의한 것이 아님을 시사하는 것으로 해석되었다. 실험 1에서는 표적어에 음변화 규칙이 적용되었으나 실험 2에서는 점화어에 음변화 규칙이 적용되었다. 실험 2의 결과, 음운 불일치의 효과는 나타나지 않았으나, 표기불일치의 효과는 유의하게 나타났다 실험 1과 2의 결과는 한자어 처리에서 음운정보가 아니라 표기정보의 우선성을 지지하였다.

  • PDF

Efficient Generation of 3-D Video Holograms Using Temporal-Spatial Redundancy of 3-D Moving Images (3차원 동영상의 시ㆍ공간적 정보 중복성을 이용한 효과적인 3차원 비디오 홀로그램의 생성)

  • Kim, Dong-Wook;Koo, Jung-Sik;Kim, Seung-Cheol;Kim, Eun-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.859-869
    • /
    • 2012
  • In this paper, a new method to efficiently generate the 3-D(three-dimensional) video holograms for 3-D moving scenes, which is called here the TSR-N-LUT method, is proposed by the combined use of temporal-spatial redundancy(TSR) of 3-D video images and novel look-up table(N-LUT) technique. That is, in the proposed scheme, with the differential pulse code modulation (DPCM) algorithm, temporally redundancy redundant data in the inter-frame of a 3-D video images are removed between the frames, and then inter-line redundant data in the inter-frame of 3-D video images are also removed by using the DPCM method between the lines. Experimental results show that the proposed method could reduced the number of calculated object points and the calculation time of one object point by 23.72% and 19.55%, respectively on the average compared to the conventional method. Good experimental results with 3-D test moving pictures finally confirmed the feasibility of the proposed method to the fast generation of CGH patterns of the 3-D video images.

Improving Efficiency of Encrypted Data Deduplication with SGX (SGX를 활용한 암호화된 데이터 중복제거의 효율성 개선)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.259-268
    • /
    • 2022
  • With prosperous usage of cloud services to improve management efficiency due to the explosive increase in data volume, various cryptographic techniques are being applied in order to preserve data privacy. In spite of the vast computing resources of cloud systems, decrease in storage efficiency caused by redundancy of data outsourced from multiple users acts as a factor that significantly reduces service efficiency. Among several approaches on privacy-preserving data deduplication over encrypted data, in this paper, the research results for improving efficiency of encrypted data deduplication using trusted execution environment (TEE) published in the recent USENIX ATC are analysed in terms of security and efficiency of the participating entities. We present a way to improve the stability of a key-managing server by integrating it with individual clients, resulting in secure deduplication without independent key servers. The experimental results show that the communication efficiency of the proposed approach can be improved by about 30% with the effect of a distributed key server while providing robust security guarantees as the same level of the previous research.

지상 전술 $C^4I$체계의 위치보고체계 구축을 위한 제대간 데이터 통신망 구성 방안 (3)

  • Kim, Yong-Yun
    • Defense and Technology
    • /
    • no.4 s.254
    • /
    • pp.54-65
    • /
    • 2000
  • 셀룰라망을 이용한 위치보고체계는 전파통달거리를 고려한 셀 단위로 구축하였기 때문에 지휘망을 이용하는 방안에 비해 신뢰성 있는 보고를 기대할 수 있으며, 동일한 정보를 1, 2차 상급부대에 중복 보고할 필요가 없고, 일정거리 이상의 다른 셀에서 같은 대역의 주파수를 사용해도 무방하므로 주파수 재사용의 효과도 거둘 수 있다. 아울러 인터넷과 데이터 베이스 관리 시스템을 소프트웨어로 효과적으로 연동시킴으로써 현재 상용에서 각광 받고 있는 Web-Server 개념을 군 무선 데이터 통신에 도입하고 하드웨어도 대용량의 지능망으로 발전한다면 위치보고 뿐만 아니라 늘어나는 정보를 효과적으로 처리하기에 충분하리라 판단된다.

  • PDF

The Effects of Pedagogical Agent and Redundant Text on Learners' Social Presence and Intention to Continue Learning in Video Learning (동영상 학습에서 교육 에이전트와 자막이 학습자의 사회적실재감 및 학습지속의향에 미치는 영향)

  • Suyuan Piao;Kwanghee Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 2023
  • A 2(pedagogical agent: with vs. without) × 2(on-screen text: with vs. without) between-subject design was used in this study to investigate the effects of pedagogical agent and redundant on-screen text on video learning. In the case of the educational video without redundant on-screen text, there was no difference in social presence, satisfaction, and intention to continue learning regardless of the presence of a pedagogical agent. However, when the educational video contained redundant on-screen text, participants who watched educational video with pedagogical agent perceived higher social presence, satisfaction and intention to continue. In terms of academic achievement, no difference was found whether redundant on-screen text was contained or not. It supports some of the previous studies on the reverse-redundancy effects, suggesting that the inclusion of redundant text does not necessarily cause the reduction of learning outcomes. Video learning shows a higher dropout rate than face-to-face learning. Therefore, it is particularly important to understand how to strengthen interactions with learners and motivate them to keep themselves engaged in learning. This study discussed whether pedagogical agent and on-screen text are factors that induce continuous participation of learners in video learning.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing (원격 저장소 데이터 아웃소싱에서 발생하는 중복 식별 과정에서의 부채널 분석 및 제거)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.981-987
    • /
    • 2017
  • Proliferation of cloud computing services brings about reduction of the maintenance and management costs by allowing data to be outsourced to a dedicated third-party remote storage. At the same time, the majority of storage service providers have adopted a data deduplication technique for efficient utilization of storage resources. When a hash tree is employed for duplicate identification as part of deduplication process, size information of the attested data and partial information about the tree can be deduced from eavesdropping. To mitigate such side channels, in this paper, a new duplicate identification method is presented by exploiting a multi-set hash function.