• Title/Summary/Keyword: Data Copy

Search Result 346, Processing Time 0.027 seconds

A Multicast Middleware for the Remote Educational Systems (원격 교육 시스템을 위한 멀티캐스트 미들웨어)

  • Byun, Sang-Seon;Jin, Hyun-Wook;Yoo, Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.100-108
    • /
    • 2003
  • By choosing Multicast for transmission of educational contents in the Remote Educational System, we can reduce the server load and increase network bandwidth utilization. We design and implement Multicast Middleware for the Remote Educational System in this paper. There are three characteristics in this Multicast Middleware: 1) Through Centralized Multicast Group Management for passive members, it allows a host to make multicast group, which is composed of receivers, called Group Member and who are chosen by the host, called group Maker. Because, all groups are created by the Group Maker in Centralized Group Management, Group Member's join action will be passive 2) Maintenance and recovery of multicast group information in order to restore from exception and crash; the maintenance and recovery mechanism of Group Maker is distinct from that of Group Member. 3) The mechanism which enables to transmit large size multimedia data through multicasting and remove additional copy operation through shared buffer. Fragmentation/de-fragmentation for large data delivery results in additional copy operation in user level. But by using user level shared buffer, it can be done without user Bevel copy operation. By applying to Remote Educational environment which consists of 30 PCs and Fast Ethernet, we can examine the efficiency of this middleware, which can transmit 18frames/sec movie which resolution 320 $\times$ 120 pixels, 128Kbps encoded sound data and some text data.

GPU-Based Acceleration of Quantum-Inspired Evolutionary Algorithm (GPU를 이용한 Quantum-Inspired Evolutionary Algorithm 가속)

  • Ryoo, Ji-Hyun;Park, Han-Min;Choi, Ki-Young
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.8
    • /
    • pp.1-9
    • /
    • 2012
  • Quantum-Inspired Evolutionary Algorithm(QEA) contains sufficient data-level parallelism to be naturally accelerated on GPUs. For an efficient reduction of execution time, however, careful task-mapping should be done to properly reflect the characteristics of CPU and GPU. Furthermore, when deciding which part of the application should run on GPU, we need to consider the data transfer between CPU and GPU memory spaces as well as the data-level parallelism. In addition, the usage of zero-copy host memory, proper choice of the execution configuration, and thread organization considering memory coalescing is important to further reduce the execution time. With all these techniques, we could run QEA 3.69 times faster on average in comparison with the multi-threading CPU for the case of 0-1 knapsack problem with 30,000 items.

Molecular identification of Mariner Transposase-like Element from Four silkmoths (견사곤충에서 Mariner Transposase-like Element의 분자적 동정)

  • Lee, Jin Sung;Hwang, Jae Sam;Kim, Yong Sung;Suh, DongSang
    • Journal of Life Science
    • /
    • v.8 no.4
    • /
    • pp.457-464
    • /
    • 1998
  • As a first step for developing universal genetic transformation vector of dilkmoths., we identified the presence of mariner-like element(MLE) which is one of transposable element discovered from many insects to human species, from Bombyx mori, Bombyx mandarina, Antherae yammamai and Antherae pernyi. We used a degenerative primer pair designed from a transposase gene of Drosophila mauritiana and Hyalophora ceropia MLE. As results, major PCR product of 500bp expected as a part of transposase of MLE was detected from all the slkmoths used of this study using these primer. And hybridization assay using pBmoMAR as a probe DNA that was previously cloned from Bombyx mori by the same primer pair, confirmed the presence of MLE from all the silkmoths. This assay showed also that the endogenous MLE in genome of the silkworm is present as high copy number unlikely Drosophila mauritiana which has 10-20 copy number. This data will be a fundamental genetic information for developing mariner-derived vector to transform the silkmoths and other useful insects.

  • PDF

Concatemer-Associated Transgene Expression Patterns in Transgenic Marine Medaka Oryzias dancena Strains

  • Cho, Young Sun;Kim, Dong Soo;Nam, Yoon Kwon
    • Fisheries and Aquatic Sciences
    • /
    • v.18 no.1
    • /
    • pp.73-80
    • /
    • 2015
  • To examine the interrelationship between transgenic insertion patterns and transgene expression profiles in established transgenic fish lines, four stable transgenic marine medaka Oryzias dancena germlines harboring ${\beta}$-actin regulator-driven RFP reporter constructs were selected. The established transgenic strains were characterized with regard to their transgenic genotypes (insertion pattern, concatemer formation, and transgene copy number based on genomic Southern blot hybridization and qPCR assay) and expression characteristics at the mRNA (qRT-PCR), protein (western blot), and phenotypic (fluorescent appearance) levels. From comparative examinations, it was found that transgenic expression at both the transcription and translation levels could be significantly downregulated in transgenic strains, potentially through methylation-mediated transgene silencing that was particularly associated with the formation of a long tail-to-head tandem concatemer in the chromosomal integration site(s). When this occurred, an inverse relationship between the transgene copy number and fluorescence intensity was observed in the resultant transgenic fish. However, with the other transgenic genotype, transgenic individuals with an identical Southern blot hybridization pattern, containing a tandem concatemer(s), had very different expression levels (highly robust vs. low expression strengths), which was possibly related to the differential epigenetic modifications and/or degrees of methylation. The concatemer-dependent downregulation of transgene activity could be induced in transgenic fish, but the overall pattern was strain-specific. Our data suggest that neither a low (or single) transgene copy number nor tandem transgene concatemerization is indicative of strong or silenced transgene expression in transgenic fish carrying a ubiquitous transgene. Hence, a sufficient number of transgenic lineages, with different genotypes, should be considered to ensure the establishment of the best-performance transgenic line(s) for practical applications.

Improved BVP Candidate Selection Algorithm for HEVC Screen Content Coding (HEVC기반 스크린 콘텐츠 코딩을 위한 개선된 BVP 후보 선정 방법)

  • Kim, Yu-Seon;Lee, Si-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.5
    • /
    • pp.1-7
    • /
    • 2017
  • Joint Collaborative Team on Video Coding (JCT-VC) of ISO/IEC MPEG and ITU-T developed the HEVC Screen Content Coding (HEVC SCC) standard as the HEVC extension for the screen content video coding. The Intra Block Copy (IBC) is the most effective tool adopted in HEVC SCC and predicts current block from already reconstructed neighboring blocks in the same picture. To reduce the amount of data in BV (Block Vector) to be transmitted, a BV predictor (BVP) is used to generate the BV differences in the IBC BV coding. In this paper, we analyze the current BV prediction process using HEVC reference software SCM-2.0 and SCM-4.0. Based on the analysis results, we propose an improved BVP candidate selection algorithm by adding a search process for adjacent BVs in addition to the existing spatial BVP candidates. Experimental results show that the BD-rate reduction of our proposed improvements ranges from 0.2% to 1%.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Iterative integrated imputation for missing data and pathway models with applications to breast cancer subtypes

  • Linder, Henry;Zhang, Yuping
    • Communications for Statistical Applications and Methods
    • /
    • v.26 no.4
    • /
    • pp.411-430
    • /
    • 2019
  • Tumor development is driven by complex combinations of biological elements. Recent advances suggest that molecularly distinct subtypes of breast cancers may respond differently to pathway-targeted therapies. Thus, it is important to dissect pathway disturbances by integrating multiple molecular profiles, such as genetic, genomic and epigenomic data. However, missing data are often present in the -omic profiles of interest. Motivated by genomic data integration and imputation, we present a new statistical framework for pathway significance analysis. Specifically, we develop a new strategy for imputation of missing data in large-scale genomic studies, which adapts low-rank, structured matrix completion. Our iterative strategy enables us to impute missing data in complex configurations across multiple data platforms. In turn, we perform large-scale pathway analysis integrating gene expression, copy number, and methylation data. The advantages of the proposed statistical framework are demonstrated through simulations and real applications to breast cancer subtypes. We demonstrate superior power to identify pathway disturbances, compared with other imputation strategies. We also identify differential pathway activity across different breast tumor subtypes.

Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting

  • Chang, Ya-Fen;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3100-3116
    • /
    • 2012
  • Reversible data hiding enables the embedding of messages in a host image without any loss of host content, which is proposed for image authentication that if the watermarked image is deemed authentic, we can revert it to the exact copy of the original image before the embedding occurred. In this paper, we present an improved histogram-based reversible data hiding scheme based on prediction and sorting. A rhombus prediction is employed to explore the prediction for histogram-based embedding. Sorting the prediction has a good influence on increasing the embedding capacity. Characteristics of the pixel difference are used to achieve large hiding capacity while keeping low distortion. The proposed scheme exploits a two-stage embedding strategy to solve the problem about communicating peak points. We also present a histogram shifting technique to prevent overflow and underflow. Performance comparisons with other existing reversible data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

Comparison of Normalization Methods for Defining Copy Number Variation Using Whole-genome SNP Genotyping Data

  • Kim, Ji-Hong;Yim, Seon-Hee;Jeong, Yong-Bok;Jung, Seong-Hyun;Xu, Hai-Dong;Shin, Seung-Hun;Chung, Yeun-Jun
    • Genomics & Informatics
    • /
    • v.6 no.4
    • /
    • pp.231-234
    • /
    • 2008
  • Precise and reliable identification of CNV is still important to fully understand the effect of CNV on genetic diversity and background of complex diseases. SNP marker has been used frequently to detect CNVs, but the analysis of SNP chip data for identifying CNV has not been well established. We compared various normalization methods for CNV analysis and suggest optimal normalization procedure for reliable CNV call. Four normal Koreans and NA10851 HapMap male samples were genotyped using Affymetrix Genome-Wide Human SNP array 5.0. We evaluated the effect of median and quantile normalization to find the optimal normalization for CNV detection based on SNP array data. We also explored the effect of Robust Multichip Average (RMA) background correction for each normalization process. In total, the following 4 combinations of normalization were tried: 1) Median normalization without RMA background correction, 2) Quantile normalization without RMA background correction, 3) Median normalization with RMA background correction, and 4) Quantile normalization with RMA background correction. CNV was called using SW-ARRAY algorithm. We applied 4 different combinations of normalization and compared the effect using intensity ratio profile, box plot, and MA plot. When we applied median and quantile normalizations without RMA background correction, both methods showed similar normalization effect and the final CNV calls were also similar in terms of number and size. In both median and quantile normalizations, RMA backgroundcorrection resulted in widening the range of intensity ratio distribution, which may suggest that RMA background correction may help to detect more CNVs compared to no correction.