• Title/Summary/Keyword: Computer Access and Use

Search Result 662, Processing Time 0.027 seconds

Considering Read and Write Characteristics of Page Access Separately for Efficient Memory Management

  • Hyokyung Bahn
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.70-75
    • /
    • 2023
  • With the recent proliferation of memory-intensive workloads such as deep learning, analyzing memory access characteristics for efficient memory management is becoming increasingly important. Since read and write operations in memory access have different characteristics, an efficient memory management policy should take into accountthe characteristics of thesetwo operationsseparately. Although some previous studies have considered the different characteristics of reads and writes, they require a modified hardware architecture supporting read bits and write bits. Unlike previous approaches, we propose a software-based management policy under the existing memory architecture for considering read/write characteristics. The proposed policy logically partitions memory space into the read/write area and the write area by making use of reference bits and dirty bits provided in modern paging systems. Simulation experiments with memory access traces show that our approach performs better than the CLOCK algorithm by 23% on average, and the effect is similar to the previous policy with hardware support.

Comparison of Image reformation Using Personal Computer with Dentascan Program (CT scan의 다평면 재구성을 하는 Dentascan 프로그램과 개인용 컴퓨터를 이용한 영상재형성과의 비교에 관한 연구)

  • KIM Eun Kyung
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.27 no.1
    • /
    • pp.7-16
    • /
    • 1997
  • This study was performed to demonstrate the method of image reformation for dental implants, using a personal computer with inexpensive softwares and to compare the images reformatted using the above method with those using Dentascan software. CT axial slices of 5 mandibles of 5 volunteers from GE Highspeed Advantage(GE Medical systems, U.S.A.) were used. Personal computer used for image reformation was PowerWave 6041120 (Power Computing Co, U.S.A.) and softwares used were Osiris (Univ. Hospital of Geneva, Switzerland) and Import ACCESS V1.H Designed Access Co., U.S.A.) for importing CT images and NIH Image 1.58 (NIH, U.S.A.) for image processing. Seven images were selected among the serial reconstructed cross-sectional images produced by Dentascan(DS group). Seven resliced cross-sectional images at the same position were obtained at the personal computer(PC group). Regression analysis of the measurements of PC group was done against those of DS group. Measurements of the bone height and width at the reformed cross-sectional images using Mac-compatible computer were highly correlated with those using workstation with Dentascan software(height : r²=0.999, p<0.001, width : r²=0.991, p<0.001). So, it is considered that we can use a personal computer with inexpensive softwares for the dental implant planning, instead of the expensive software and workstation.

  • PDF

A Study on Development of PC-based Wireless Data Access System (PC 기반 양방향 무선데이터 시스템 개발에 관한 연구)

  • Joo, Jong-Hyuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.3
    • /
    • pp.115-120
    • /
    • 2005
  • In this paper, we propose a personal-computer-based wireless data access system, which use DS/SS(Direct Sequence Spread Spectrum) method and the ISM band of 2.44GHz radio frequency. By applying hi-directional transmission between wireless handy terminals and PCs or servers, it can be easily connected with any kinds of database systems such as Oracle, MS-SQL and MS-ACCESS. Therefore, it could be economically adopted as peripheral equipments for ERP or SCM systems.

Storage Assignment for Variables Considering Efficient Memory Access in Embedded System Design (임베디드 시스템 설계에서 효율적인 메모리 접근을 고려한 변수 저장 방법)

  • Choi Yoonseo;Kim Taewhan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.2
    • /
    • pp.85-94
    • /
    • 2005
  • It has been reported and verified in many design experiences that a judicious utilization of the page and burst access modes supported by DRAMs contributes a great reduction in not only the DRAM access latency but also DRAM's energy consumption. Recently, researchers showed that a careful arrangement of data variables in memory directly leads to a maximum utilization of the page and burst access modes for the variable accesses, but unfortunately, found that the problems are not tractable, consequently, resorting to simple (e.g., greedy) heuristic solutions to the problems. In this parer, to improve the quality of existing solutions, we propose 0-1 ILP-based techniques which produce optimal or near-optimal solution depending on the formulation parameters. It is shown that the proposed techniques use on average 32.2%, l5.1% and 3.5% more page accesses, and 84.0%, 113.5% and 10.1% more burst accesses compared to OFU (the order of first use) and the technique in [l, 2] and the technique in [3], respectively.

Systematizing Information Use to Address Determinants of Health Worker Health in South Africa: A Cross-sectional Mixed Method Study

  • Muzimkhulu Zungu;Annalee Yassi ;Jonathan Ramodike;Kuku Voyi;Karen Lockhart;David Jones;Spo Kgalamono;Nkululeko Thunzi;Jerry Spiegel
    • Safety and Health at Work
    • /
    • v.14 no.4
    • /
    • pp.368-374
    • /
    • 2023
  • Background: Recognizing that access to safe and healthy working conditions is a human right, the World Health Organization (WHO) calls for specific occupational safety and health (OSH) programs for health workers (HWs). The WHO health systems' building blocks, and the International Labour Organization (ILO), highlight the importance of information as part of effective systems. This study examined how OSH stakeholders access, use, and value an occupational health information system (OHIS). Methods: A cross-sectional survey of OSH stakeholders was conducted as part of a larger quasi experimental study in four teaching hospitals. The study hospitals and participants were purposefully selected and data collected using a modified questionnaire with both closed and open-ended questions. Quantitative analysis was conducted and themes identified for qualitative analysis. Ethics approval was provided by the University of Pretoria and University of British Columbia. Results: There were 71 participants comprised of hospital managers, health and safety representatives, trade unions representatives and OSH professionals. At least 42% reported poor accessibility and poor timeliness of OHIS for decision-making. Only 50% had access to computers and 27% reported poor computer skills. When existing, OHIS was poorly organized and needed upgrades, with 85% reporting the need for significant reforms. Only 45% reported use of OHIS for decision-making in their OSH role. Conclusion: Given the gap in access and utilization of information needed to protect worker's rights to a safe and healthy workplace, more attention is warranted to OHIS development and use as well as education and training in South Africa and beyond.

A comparative Study on Media Environments and Media use of Korean-Chinese, Chinese, and Korean Adolescents (중국 조선족, 한족, 및 한국 아동과 청소년의 미디어환경, 이용실태 및 영향요인)

  • Koo, Jung-Sook;Park, Hye-Won;Cho, Bok-Hee
    • Journal of the Korean Home Economics Association
    • /
    • v.43 no.2
    • /
    • pp.159-174
    • /
    • 2005
  • A comparison of students' media environments and media use patterns among Korean-Chinese in Yanji and Shenyang, Chinese students in Yanji and Korean students in Ulsan revealed significant differences. The research surveyed 3,241 students between 10-18 years old on their home media environments, media use patterns and social characteristics including achievement motivation and the locus of control. Korean children not only have more media in their homes, but they are also heavier users of computers and other media than the other two groups. Despite the lower rates of access to computers and other media at home, Korean-Chinese in Yanji reported more use of media including TV, VCRs and computers at the computer rooms than Chinese students in Yanji. Additional analyses revealed negative correlations between computer gaming at home and at computer rooms and achievement, internal locus of control and psychological and physical home environments. Impacts of Korea culture and societal changes on the Korean-Chinese use of media, and choice of media language were discussed.

Mathematical Knowledge Construction in Computer Based Learing

  • Lee, Joong-Kwoen
    • Research in Mathematical Education
    • /
    • v.5 no.1
    • /
    • pp.13-24
    • /
    • 2001
  • Using computer technology in teaching school mathematics creates new instructional environments. The emphases on the use of computer technology in the classrooms and in particular the use of computer-based exploration as a context of mathematics instruction have been reflected in the recommendation of the NCTM (Curriculum and Evaluation Standards for School Mathematics, 1989). Although the power of using computer technology in the exploration of mathematical problems has been recognized and stressed by many educators, we do not have many research studies on mathematics in computer-based explorations. Especially research has failed to clarify how computer technology can contribute to the construction of procedural and conceptual knowledge of mathematics. Up to now most researches on procedural and conceptual knowledge in computer environments have only focused on classifying programming languages which program language has more random access and rich interrelationship characteristic in relation to conceptual knowledge in humans, and which computer language has more characteristic flavor of procedural knowledge. How computer-based explorations affect the knowledge construction of mathematics, therefore, emerges as an issue of research on teacher education program for theoretical framework. This situation leads to do research on the effectiveness of using computer explorations in pre-service teacher education in terms of procedural and conceptual knowledge construction.

  • PDF

Power Control in Uplink and Downlink CDMA Systems with Multiple Flow Types

  • Li Yun;Ephremides Anthony
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.313-322
    • /
    • 2006
  • We consider a power controlled code division multiple access (CDMA) system with multiple flow types. At each of the N nodes, there are F flow types with different signal-to-interference-and-noise-ratio (SINR) requirements. To keep the complexity of the transmitter low, we assume that each node uses the same power level for all its flows. The single flow case has been fully solved and is well-understood. We concentrate on the multiple flow case, and use a novel and different approach. For the uplink problem with N = 2 and F arbitrary, the necessary and sufficient conditions to have a solution are found and proved. For the general N > 1 uplink problem, we provide a necessary condition for the problem to have a solution and an iterative algorithm to find the optimum solution. For the downlink case with F > 1 some properties of the optimal sequences are obtained.

Authorization Model with Provisions and Obligations in XML

  • Kim Suhee;Park Jongjin
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.355-360
    • /
    • 2004
  • With the growing acceptance of XML technologies, XML will be the most common tool for all data manipulation and data transmission. Meeting security requirements for privacy, confidentiality and integrity is essential in order to move business online and it is important for security to be integrated with XML solutions. Many policies require certain conditions to be satisfied and actions to be performed before or after a decision is made. Binary yes/no decision to an access request is not enough for many applications. These issues were addressed and formalized as provisions and obligations by Betti et Al. In this paper, we propose an authorization model with provisions and obligations in XML. We introduce a formal definition of authorization policy and the issues involving obligation discussed by Betti et Al. We use the formal model as a basis to develop an authorization model in XML. We develop DTDs in XML for main components such as authorization request, authorization policy and authorization decision. We plan to develop an authorization system using the model proposed.

  • PDF

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.