• Title/Summary/Keyword: Post-copy

Search Result 36, Processing Time 0.024 seconds

Performance Evaluation of WAN Storage Migration Scheme for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 WAN 스토리지 이주 기법 성능평가)

  • Chang, Jun-Hyub;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.1-7
    • /
    • 2012
  • In this paper, we design and implement the simulator for WAN storage replication model performance evaluation in cloud computing environment. Each cloud of simulator is composed of virtual machine emulator and storage emulator. The virtual machine emulator is composed of read/write ratio module, the read/write sequence combination module, and the read/write request module. The storage emulator is composed of storage management module, data transfer module, read/write operations module, and overhead processing module. Using the simulator, we evaluate performance of migration scheme, pre-copy and the post-copy, considering about read/write ratio, network delay, and network bandwidth. Through simulation, we have confirmed that the average migration time of pre-copy was decreased proportional to the read operation. However, average migration time of post-copy was on the increase. Also, the average migration time of post-copy was increased proportional to the network delay. However, average migration time of pre-copy was shown uniformly. Therefore, we show that pre-copy model more effective to reduce the average migration time than the post-copy model. The average migration time of pre-copy and post-copy were not affected by the change of network bandwidth. Therefore, these results show that selects the storage replication model to be, the network bandwidth know not being the important element.

A Design of Simulator for Storage Migration Model Selection in Cloud Computing (클라우드 컴퓨팅 환경에서 Storage Migration 기법 선정을 위한 시뮬레이터 설계)

  • Chang, Jun-Hyup;Jeon, Chang-Ho;Lee, Won-Joo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.15-16
    • /
    • 2011
  • 본 논문에서는 클라우드 컴퓨팅 환경에서 저장공간 이주(storage migration)시에 저장공간의 읽기/쓰기 비율을 고려한 저장공간 복제 모델 선정을 위한 실험 환경을 설계한다. 기존의 저장공간 이주 모델은 가상머신과 저장공간중에 저장공간이 먼저 이주하는 선복제(pre-copy)와 나중에 이주하는 후복제(post-copy)가 있다. 이러한 복제 기법은 VM과 저장공간 이주의 필요성과 그 방법만을 제안하였으며, 성능 향상을 위한 이주 기법 선정 방법은 제시하지 못하였다. 따라서 본 논문에서는 클라우드 컴퓨팅 환경에서 다양한 스토리지의 읽기/쓰기 비율에 따른 이주 모델 선정 기법을 실험할 수 있는 시뮬레이터 설계 방법을 제시한다.

  • PDF

Detecting Copy-move Forgeries in Images Based on DCT and Main Transfer Vectors

  • Zhang, Zhi;Wang, Dongyan;Wang, Chengyou;Zhou, Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4567-4587
    • /
    • 2017
  • With the growth of the Internet and the extensive applications of image editing software, it has become easier to manipulate digital images without leaving obvious traces. Copy-move is one of the most common techniques for image forgery. Image blind forensics is an effective technique for detecting tampered images. This paper proposes an improved copy-move forgery detection method based on the discrete cosine transform (DCT). The quantized DCT coefficients, which are feature representations of image blocks, are truncated using a truncation factor to reduce the feature dimensions. A method for judging whether two image blocks are similar is proposed to improve the accuracy of similarity judgments. The main transfer vectors whose frequencies exceed a threshold are found to locate the copied and pasted regions in forged images. Several experiments are conducted to test the practicability of the proposed algorithm using images from copy-move databases and to evaluate its robustness against post-processing methods such as additive white Gaussian noise (AWGN), Gaussian blurring, and JPEG compression. The results of experiments show that the proposed scheme effectively detects both copied region and pasted region of forged images and that it is robust to the post-processing methods mentioned above.

Copy-move Forgery Detection Robust to Various Transformation and Degradation Attacks

  • Deng, Jiehang;Yang, Jixiang;Weng, Shaowei;Gu, Guosheng;Li, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4467-4486
    • /
    • 2018
  • Trying to deal with the problem of low robustness of Copy-Move Forgery Detection (CMFD) under various transformation and degradation attacks, a novel CMFD method is proposed in this paper. The main advantages of proposed work include: (1) Discrete Analytical Fourier-Mellin Transform (DAFMT) and Locality Sensitive Hashing (LSH) are combined to extract the block features and detect the potential copy-move pairs; (2) The Euclidian distance is incorporated in the pixel variance to filter out the false potential copy-move pairs in the post-verification step. In addition to extracting the effective features of an image block, the DAMFT has the properties of rotation and scale invariance. Unlike the traditional lexicographic sorting method, LSH is robust to the degradations of Gaussian noise and JEPG compression. Because most of the false copy-move pairs locate closely to each other in the spatial domain or are in the homogeneous regions, the Euclidian distance and pixel variance are employed in the post-verification step. After evaluating the proposed method by the precision-recall-$F_1$ model quantitatively based on the Image Manipulation Dataset (IMD) and Copy-Move Hard Dataset (CMHD), our method outperforms Emam et al.'s and Li et al.'s works in the recall and $F_1$ aspects.

Prefractionation and Enrichment for the Analysis of Low Aboundance Proteome (극미세 단백질 분석을 위한 프로테옴 분획 농축 기술)

  • 지재웅;변상요
    • KSBB Journal
    • /
    • v.16 no.5
    • /
    • pp.435-441
    • /
    • 2001
  • In spite of the powerfulness for the simultaneous study of proteome expression and post-translational modification, 2-D PAGE has inevitable limitation on detect low aboundant proteins. Since many of the low abundant proteins are likely to have very important regulatiory functions in cells, separation and analysis of low copy number proteins is an important issue in proteome studies and challenge for 2-D techniques. Among various methods developed to detect low abundant proteins, electrophoretic protein prefractionation, chromatographic protein prefractionation, and subcellular fractionation are explained in this paper. Their practical strengths and weaknesses are also explained with current research trends.

  • PDF

A SPECTROSCOPIC STUDY OF THE OPTICAL PROPERTIES OF VARIOUS PAPERS MADE FROM RECLAIMED FIBRES

  • Ingegerd Forsskahl;Carola Olkkonen;Henrik Tylli
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 1999.04b
    • /
    • pp.296-301
    • /
    • 1999
  • Different papers such as toilet and towel tissue, newsprint and copy paper made from reclaimed fibres were characterized using UV-VIS reflectance and fluorescence spectroscopy. The emission properties of the extracts of the papers were also evaluated. Photochemical irradiation at ambient temperatures, and thermal aging of the copy papers at 105$^{\circ}C$ and 150$^{\circ}C$ were performed. Post-colour numbers (PC) were calculated from the reflectance values measured from the corresponding UV-VIS reflectance spectra. Light absorption coefficient spectra were calculated before and after irradiation, and the changes in absorption coefficient were related to the content of chromophores in the papers. Photochemical and thermal discolouration of the copy papers, similar to that of virgin fibres, was readily observed. The influence of changes in the concentrations of fluorescent brightening agents and dyes on the spectral properties was also assessed. Photostabilization studies of the copy papers were performed with the use of polymer additives polyethylene glycol (PEG) and polytetrahydrofuran (PTHF).

A Study on the Transference of Headlines and Types of Preferred Headlines in Offline and Online Newspapers

  • Kim, Man-Ki;Kang, Hyun-Jig
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.89-106
    • /
    • 2011
  • With the development of the Internet, the media market is experiencing rapid change. The traditional form of offline newspaper markets, which has created the mainstream news delivery market, have been losing large amounts of power due to the emergence of online media. On the other hand, online media armed with its ability to post breaking news almost as it occurs has increased its influence and popularity at a rapid speed. However, since the exposure time and readership of online newspapers are less than their offline counterparts online media has a high dependence on sensational titles and somewhat exaggerating headlines rather than the objective and recapitulative headlines which are preferred. This paper will examine the function and significance of headlines, and conduct a comparative analysis on contents and forms of the headlines in offline newspaper and online newspaper in order to identify the characteristics of each newspaper. Through comparisons, it examines the types of headlines and the transference of headlines. In addition, it examines the differences in recognition of copy editors according to media in determining the headline, and it illuminates which type of headlines is preferred in order to instigate readers to read online newspapers. The analysis results of title-transferring cases in offline newspaper and online newspapers are that offline newspapers try to convey the contents accurately by making use of an information-transferring headline, while attention-attracting headline or subject-hiding headlines tend to be used for attracting the eye of readers. In addition, analysis results of headlines that are put on the top with a click counts in online newspapers are that attention-attracting headlines are the majority, while subject-hiding headlines that are hardly used in offline newspapers, are well-used in online newspapers. In an interview with copy editors, they responded that offline editors focus on the fact-transference in determining the title, while online editors put the weight on immediacy in the delivery of news and the function of guiding readers.

Correlation between clinical changes and viral genome copy number in rock bream infected with red sea bream iridovirus (참돔이리도바이러스 감염 돌돔에서 임상적 변화와 viral genome copy number 간의 상관관계)

  • Dong Jun Shin;Yi Seol Jeong;Min Jae Kim;Guk Hyun Kim;Kwang Il Kim
    • Journal of fish pathology
    • /
    • v.36 no.2
    • /
    • pp.229-238
    • /
    • 2023
  • In this study, the correlation between clinical changes and RSIV genome copy number was investigated to determine the quantitative criteria for the characteristics of RSIV infection. The rock bream (Oplegnathus fasciatus) was intraperitoneally injected with three different doses (1.0×101, 1.0×103 and 1.0×105 viral genome copies/fish) as low, medium, and high doses, respectively. The clinical signs (spleen enlargement, death) observation and real-time PCR were conducted at 5, 10 and 14 days post-injection. During the experiment, spleen index as a quantitative indicator for spleen enlargement was continuously increased in the medium- (up to 2.26) and high-dose (up to 4.99) challenge groups, respectively. Notably, when the spleen index was over 1.5, 2.0, 2.5 and 3.0, a positive correlation was revealed with average viral genome copy numbers of 2.51, 3.37, 4.97 and 5.43×107 viral genome copies/mg, respectively. Moreover, the threshold of spleen index over 1.5 was 1.0×106 viral genome copies/mg, while the thresholds of spleen index over 2.0 and dead was 2.51×107 viral genome copies/mg and the thresholds of spleen index over 2.5 and 3 was 3.98×107 viral genome copies/mg. These findings suggest the possibility of quantitatively analyzing the characteristics and development process of RSIV infection.

Effect of Transgenic Genotype on Transgene Expression in Mud Loach (Misgurnus mizoIepis): I. Copy Number-Dependent Expression in Gynogenetically Derived Homozygous Transgenics

  • Nam Yoon Kwon;Noh Jae Koo;Kim Dong Soo
    • Fisheries and Aquatic Sciences
    • /
    • v.4 no.1
    • /
    • pp.39-46
    • /
    • 2001
  • To examine the effect of copy number-dependent transgenic genotype on the expression of foreign gene, stable hemizygous and homozygous transgenic breeding line was established using artificial parthenogenesis. For this purpose, induced diploid gynogenetic transgenesis was optimized in mud loach (Misgurnus mizolepis) using UV-irradiated cyprinid loach (M. anguillicaudatus) sperm and thermal shocks. Optimum UV range for inactivation of cyprinid loach sperm was between 3,150 to $4,050\;ergs/mm^2$ The UV-irradiated sperm were inseminated into eggs from recessive color strain (yellow) or heterozygous transgenic mud loach containing CAT gene. Cold shock at $2^{\circ}C$ for 60 min, 5 min post fertilization successfully restored the diploidy of eggs inseminated with UV-irradiated sperm. Restoration to diploidy was confirmed by flow cytometry and gynogenetic status was verified by examining maternal exclusive inheritance of multi-locus DNA fingerprints, body color and transgenic marker. Putative isogenic transgenic fish clearly showed homozygous status at trans gene locus based on Southern blot hybridization and progeny testing. Further, such homozygous gynogenetic diploids revealed the increased levels of transgene expression, when compared to those of heterozygous (hemizygous) transgenic fish.

  • PDF

A Study of Analysis of Hacking Attacks on Cyber Terrorism and Prognostic Analysis of Phenomena (사이버테러에 대한 해킹공격 분석과 전조 현상 분석)

  • Noh, Jung Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.123-126
    • /
    • 2013
  • Access control system, when operating the infrastructure manager and the permissions for the user to clearly define the terminology that is. Various IT incidents still happening frequently occur, and these incidents in order to prevent the situation of access control is needed. In this study, the Copy command by hackers hacking incidents, such as walking dangerous limits for instructions attacks in advance, and also the internal administrator accident accidental limit command to walk off the risk in advance and even if the incident occurred access to the command history log and post it as evidence through the analysis techniques that can be utilized are described.

  • PDF