• Title/Summary/Keyword: Data Copy

Search Result 346, Processing Time 0.028 seconds

The Influence of T-shirts Product Type and Apparel Benefit on Purchasing Behavior -Comparing Brand-parody T-shirts with Brand-copy T-shirts- (티셔츠 제품유형과 의복추구혜택이 구매행동에 미치는 영향 -브랜드 패러디 티셔츠와 카피 티셔츠를 중심으로-)

  • Shin Hye-Sun;Lee Yun-Kyung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.5 s.153
    • /
    • pp.674-683
    • /
    • 2006
  • The purpose of this study was to examine the effects of T-shirts product type and apparel benefit on consumer preference and purchasing intention. Data for the study were obtained by $3\times2$ mixed factorial design. The subjects were two hundred and thirty college male and female students. The data were analysed by factor analysis, cluster analysis, and ANOVA by using the SPSS program. The results of this study indicated that benefit did not have effects on consumers purchasing intention but significant influences on consumer preference for brand-parody products. For brand-copy products, benefit influenced the purchasing intention, and did not influence the consumer preference. This study suggested that new fashion trends, in association with consumer's benefit, have effects on consumer's purchasing behavior. The result of this study is likely to be useful in planning marketing strategy related to product type and new fashion trends.

Global Transaction Scheduling for One-Copy Quasi-Serializability with Secure Properties (보안성을 갖는 1-사본 준직렬성을 위한 전역트랜잭션 스케쥴링)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.99-108
    • /
    • 2009
  • In the security environments of heterogeneous multidatabase systems, not only the existing local autonomy but also the security autonomy as a new constraint are required. From global aspects, transactions maintain consistent data value when they assure serializability. Also, secure properties must protect these transactions and data values to prevent direct or indirect information effluence. This paper proposes scheduling algorithm for global transactions to ensure multilevel secure one-copy quasi-serializability (MLS/1QSR) in security environments of multidatabase systems with replicated data and proves its correctness. The proposed algorithm does not violate security autonomy and globally guarantees MLS/1QSR without indirect information effluence in multidatabase systems.

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

Genome-Wide Association Study between Copy Number Variation and Trans-Gene Expression by Protein-Protein Interaction-Network (단백질 상호작용 네트워크를 통한 유전체 단위반복변이와 트랜스유전자 발현과의 연관성 분석)

  • Park, Chi-Hyun;Ahn, Jae-Gyoon;Yoon, Young-Mi;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.89-100
    • /
    • 2011
  • The CNV (Copy Number Variation) which is one of the genetic structural variations in human genome is closely related with the function of gene. In particular, the genome-wide association studies for genetic diseased persons have been researched. However, there have been few studies which infer the genetic function of CNV with normal human. In this paper, we propose the analysis method to reveal the functional relationship between common CNV and genes without considering their genomic loci. To achieve that, we propose the data integration method for heterogeneity biological data and novel measurement which can calculate the correlation between common CNV and genes. To verify the significance of proposed method, we has experimented several verification tests with GO database. The result showed that the novel measurement had enough significance compared with random test and the proposed method could systematically produce the candidates of genetic function which have strong correlation with common CNV.

Secure Knowledge Management for Prevent illegal data leakage by Internal users (내부 사용자에 의한 불법 데이터 유출 방지를 위한 안전한 지식관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Lee, Min-Kyung;Yoon, Mi-Yeon;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2010
  • Rapid development of Internet has increased users' desire for more information, and as a result, it created 'deluge of information', generating so much information. Especially, profit-pursuing corporations have done a lot of research to secure its own technological power. However, damages caused by illegal copy of information by illegal outside users or insiders are coming to the fore as social problem. Therefore, this paper is to propose secure knowledge management system to prevent illegal copy of data by insiders. The proposed scheme is a secure knowledge management system that carries out explicit authentication for internal users using 2MAC and provides data based on the authentication, thereby preventing illegal copy of data by insiders.

Development and Performance Study of a Zero-Copy File Transfer Mechanism for Ink-based PC Cluster Systems (VIA 기반 PC 클러스터 시스템을 위한 무복사 파일 전송 메커니즘의 개발 및 성능분석)

  • Park Sejin;Chung Sang-Hwa;Choi Bong-Sik;Kim Sang-Moon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.557-565
    • /
    • 2005
  • This paper presents the development and implementation of a zero-copy file transfer mechanism that improves the efficiency of file transfers for PC cluster systems using hardware-based VIA(Virtual Interface Architecture) network adapters. VIA is one of the representative user-level communication interfaces, but because there is no library for file transfer, one copy occurs between kernel buffer and user boilers. Our mechanism presents a file transfer primitive that does not require the file system to be modified and allows the NIC to transfer data from the kernel buffer to the remote node directly without copying. To do this, we have developed a hardware-based VIA network adapter, which supports the PCI 64bit/66MHz bus and Gigabit Ethernet, as a NIC, and implemented a zero-copy file transfer mechanism. The experimental results show that the overhead of data coy and context switching in the sender is greatly reduced and the CPU utilization of the sender is reduced to $30\%\~40\%$ of the VIA send/receive mechanism. We demonstrate the performance of the zero-copy file transfer mechanism experimentally. and compare the results with those from existing file transfer mechanisms.

Continued image Sending in DICOM of usefulness Cosideration in Angiography (혈관조영술에서 동영상 전송의 유용성 고찰)

  • Park, Young-Sung;Lee, Jong-Woong;Jung, Hee-Dong;Kim, Jae-Yeul;Hwang, Sun-Gwang
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.9 no.2
    • /
    • pp.39-43
    • /
    • 2007
  • In angiography, the global standard agreements of DICOM is lossless. But it brings on overload and takes too much store space in DICOM sever. Because of all those things we transmit images which is classified in subjective way. But this cause data loss and would be lead doctors to make wrong reading. As a result of that we try to transmit continued image (raw data) to reduce those mistakes. We got angiography images from the equipment(Allura FD20-Philips). And compressed it in two different methods(lossless & lossy fair). and then transmitted them to PACS system. We compared the quality of QC phantom images that are compressed by different compress method and compared spatial resolution of each images after CD copy. Then compared each Image's data volume(lossless & lossy fair). We measured spatial resolution of each image. All of them had indicated 401p/mm. We measured spatial resolution of each image after CD copy. We got also same conclusion (401p/mm). The volume of continued image (raw data) was 127.8MB(360.5 sheets on average) compressed in lossless and 29.5MB(360.5 sheets) compressed in lossy fair. In case of classified image, it was 47.35MB(133.7 sheets) in lossless and 4.5MB(133.7 sheets) in lossy fair. In case of angiography the diagnosis is based on continued image(raw data). But we transmit classified image. Because transmitting continued image causes some problems in PACS system especially transmission and store field. We transmit classified image compressed in lossless But it is subjective and would be different depend on radiologist. therefore it would make doctors do wrong reading when patients transfer another hospital. So we suggest that transmit continued image(raw data) compressed in lossy fair. It reduces about 60% of data volume compared with classified image. And the image quality is same after CD copy.

  • PDF

A Study on the Masking Data in Contact Method for Transparent Copy (Contact Method에 있어서 Masking Data에 관한 연구)

  • SunYeopKwak
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.6 no.1
    • /
    • pp.67-74
    • /
    • 1988
  • Absorption rates of oxygen in water soluble inks on the printing rollers were measured. As a results of experiments, could be obtained the data of rates of absorption of oxygen in 4 kinds of water soluble inks, and found the difference of absorption rate of oxygen on the parallel plates and rotating rolles.

  • PDF

Watermarking technique and algorithm review of digital data for GIS

  • Kim Jung-Yeop;Hong Sung-Eon;Lee Yong-Ik;Park Soo-Hong
    • Spatial Information Research
    • /
    • v.13 no.4 s.35
    • /
    • pp.393-400
    • /
    • 2005
  • Due to the development of the network and Internet, it is easy to copy and spread digital data. These data has the advantage of being able to be copy without loss. However, this has generated a problem over copyright. The problem occurred in GIS, too. Although GIS data acquisition is the major cost there is insufficient effort made to protect copyright. For this reason watermarking could be a good method to guarantee owner's copyright. This paper will explain watermarking, and show an overview of watermarking studies connecting image and vector data.

  • PDF

NVM-based Write Amplification Reduction to Avoid Performance Fluctuation of Flash Storage (플래시 스토리지의 성능 지연 방지를 위한 비휘발성램 기반 쓰기 증폭 감소 기법)

  • Lee, Eunji;Jeong, Minseong;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.15-20
    • /
    • 2016
  • Write amplification is a critical factor that limits the stable performance of flash-based storage systems. To reduce write amplification, this paper presents a new technique that cooperatively manages data in flash storage and nonvolatile memory (NVM). Our scheme basically considers NVM as the cache of flash storage, but allows the original data in flash storage to be invalidated if there is a cached copy in NVM, which can temporarily serve as the original data. This scheme eliminates the copy-out operation for a substantial number of cached data, thereby enhancing garbage collection efficiency. Experimental results show that the proposed scheme reduces the copy-out overhead of garbage collection by 51.4% and decreases the standard deviation of response time by 35.4% on average.