• Title/Summary/Keyword: copying

Search Result 306, Processing Time 0.022 seconds

Mind,Intelligence,Artificial Intelligence (마음,지능,인공지능)

  • 공용현
    • Korean Journal of Cognitive Science
    • /
    • v.1 no.2
    • /
    • pp.175-192
    • /
    • 1989
  • The main problems of artificial intelligence (AI)which are vividly being discussed today are not only scientific but also involve serious philosophical dimension.The purpose of this paper is to analyze the computer scientist's definitions of AI and by this method uncober and examine the controversial arguments and problems.The result is to clarify the meaning of AI-research program. It can be said that we can clssify the definitions of AI in various types according to the interest and purpose of AI-reasearchers or the strength of their arguments.But this leaves much to be considered.We have also to consider and analyze the following related problems: Understanding how we grasp human intelligence,what relations there are between intelligence and the brain,and what the logical structure of simulating and copying is with the computer. In this respect,the key problem in AI-research is not the matter of it's use and experience such as computer technonolgy,rather it is the philosophical problem of the a priori such as logic,analysis of the concept.

Comparison of 29 Diagrams of Heart originated from MingTangZangFuTu(明堂臟腑圖) (명당장부도(明堂臟腑圖)에서 기원한 심장도(心臟圖) 29종의 비교)

  • Jo, Hak-jun
    • Journal of Korean Medical classics
    • /
    • v.30 no.3
    • /
    • pp.55-76
    • /
    • 2017
  • Objectives : The transition of the 29 diagrams of Heart originated from MingTangZangFuTu will be used to understand the shape of heart and the changes of people's understanding of heart. Methods : The 29 diagrams of Heart originated from MingTangZangFuTu are divided according to their shape elements (Heart itself, internal curvatures, structures above heart, wuzangxi, and excursus). Then its transitions are analyzed, and each shape element is compared to modern anatomy and its textual basis is searched. Results : The lengthy cylinderical organ situated above the heart is composed of upper part consisting with joints and the lower part void of joints. The upper part is Pyewan (such as the lungs) and fall into trachea. The lower part is Xinxi or Feixi which are either relative vein (or aorta) or left bronchus that passes behind the heart. This depiction of the structures around the heart can be considered to have composed by actual observance of a physical heart, a method that is similar to anatomy. However, the shape of the heart itself is described as a lotus flower that has not been bloomed, a depiction which finds its origin from Zhongguangbuzhu huangdineijing suwen (762). The three short curvatures inside the heart is described as Pericardium, influenced by Shisijingfahui (1341) in its depiction, or as sammo, influenced by Nanjing. Structures that are connected directly from the heart to spleen, kidney, and uterus are not found in modern anatomy. The saying in Excursus "All cords of five internal organs belong to heart" is based on Huatuoxuanmenneizhaotu, and this is changed to the saying cords of four internal organs belong to heart in Leijingtuyi for the first time. Conclusions : The authors of medical scriptures at the time did not have a method of direct observance when they were copying heart diagrams. Therefore, they made changes to the source material's diagram and excursus while being influenced by Nanjing, Huatuoxuanmenneizhaotu, and Shisijingfahui. Then the doctors' understandings with regards to the shape and function of heart were reflected during that process.

An Efficient Cleaning Scheme for File Defragmentation on Log-Structured File System (로그 구조 파일 시스템의 파일 단편화 해소를 위한 클리닝 기법)

  • Park, Jonggyu;Kang, Dong Hyun;Seo, Euiseong;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.627-635
    • /
    • 2016
  • When many processes issue write operations alternately on Log-structured File System (LFS), the created files can be fragmented on the file system layer although LFS sequentially allocates new blocks of each process. Unfortunately, this file fragmentation degrades read performance because it increases the number of block I/Os. Additionally, read-ahead operations which increase the number of data to request at a time exacerbates the performance degradation. In this paper, we suggest a new cleaning method on LFS that minimizes file fragmentation. During a cleaning process of LFS, our method sorts valid data blocks by inode numbers before copying the valid blocks to a new segment. This sorting re-locates fragmented blocks contiguously. Our cleaning method experimentally eliminates 60% of file fragmentation as compared to file fragmentation before cleaning. Consequently, our cleaning method improves sequential read throughput by 21% when read-ahead is applied.

An Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (신뢰기관을 이용한 익명적 비대칭 핑거프린팅 기법)

  • Yong, Seung-Lim;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.288-295
    • /
    • 2007
  • The illegal copying and redistribution of digitally-stored information is a crucial problem to distributors who electronically sell digital data. fingerprinting scheme is a technique which supports copyright protection to track redistributors of electronic information using cryptographic techniques. Anonymous asymmetric fingerprinting scheme prevents the merchant from framing a buyer by making the fingerprinted version known to the buyer only. And this scheme allows the buyer to purchase goods without revealing her identity to the seller. In this paper, a new anonymous asymmetric fingerprinting scheme with TTP is introduced. The buyer's fingerprint is generated by the Fingerprint Certificate Authority which is a TTP. When the seller embeds the fingerprint in the digital data, the protocol uses the homomorphic encryption scheme. Thus the seller cannot know the buyer's fingerprint and the buyer's anonymity is guaranteed by using anonymous key pair.

Effects of infant children Mothers' humor and ego resilience on Maternal behavior (영아기 자녀를 둔 어머니의 유머감각과 자아탄력성이 양육행동에 미치는 영향)

  • Lee, Jin-Wha;Kang, Eun-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6576-6586
    • /
    • 2014
  • This study examined the effects of the mothers' sense of humor, ego-resilience on the maternal behavior. 187 mothers of 24~36 month old children completed the questionnaires. To analyze the data, descriptive statistics, Pearson's co-relation and hierarchical regression analysis were used. The results were as follows. First, concerning the mothers' personal variables, the mean of the sense of humor, ego-resilience, and maternal behavior were relatively high. Second, the mothers' sense of humor and its sub-scales, except as a copying strategy, and ego-resilience had a positive co-relation with the maternal behavior and its sub-scales. Lastly, the mothers' sense of humor and its sub-scales, and ego-resilience were significant variables to influence the maternal behavior. As stated above, the ways were discussed to improve the mothers' sense of humor and ego-resilience.

A Study on the Current State of Illegal Distribution of Literary Works on Internet Cafes and Homepages (인터넷 카페와 홈페이지의 어문저작물 불법 전송 실태에 관한 연구)

  • Kwack, Dong-Chul
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.209-231
    • /
    • 2004
  • The purpose of this study is to examine the current state of illegal distribution of literary works on internet cafes and homepages, and figure out how to protect the rights of copyright holders. For this study, examined were the cafes and menus of homepages of major Websites on the Internet, where illegal copying and delivery of literary works could happen. For each Website, the volumes of the entire collection, the number of literary works held, the maximum and average number of transactions were investigated, and literary works categorized according to genres were analyzed. The result shows that the strict legislation and regulation by government or copyright organizations could hinder the positive distribution of awareness about the copyright : but, still strongly needed is the promotion and education of the importance of copyright to help the public understand better. Providers of portal services should take a proper step to strengthen the training of and systematic support for copyright-related issues for both operators and users of cafes and homepages on Websites.

Analysis on the Sliding Load for Hign-Tension Bolt Joint of the H-Beam in Pure Bending (Pure Bending이 작용하는 H-Beam의 도입축력 변화에 따른 고장력볼트 연결부 거동 분석)

  • Kim, Chun-Ho;Kim, Sang-Hoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.541-544
    • /
    • 2006
  • Currently the bolt joint defect occurs from the steel bridge which is in the process of using but that investigation about each kind defect is lacking state. Research to see consequently the high strength bolt joint sliding conduct bring the model it used a structural analysis program LUSAS numerical analysis execution and a plan for Steel Box Girder Bridge copying full-size H-Beam and plan pretensioned bolt force 100%. 75%, 50% and 25% pretensioned force it acted in standard. And a hold an examination, against the sliding loads which it follows in the pretensioned force it will analysis.

  • PDF

Prediction Model for Deviant Hacking Behavior and Hacking Type in Hackers Based on Psychological Variable (해커들의 심리변인에 기반한 탈선적 해킹활동 및 해킹타입 예측 모델)

  • Park, Chan Hyun;Song, In Uk;Kim, Min Ji;Chang, Eun Hee;Heo, Jun;Kim, Hyun Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.489-498
    • /
    • 2016
  • Despite the extant quantum communication technology that does not allow copying, wiretapping, and/or monitoring, cyber-terror-attempts from hackers with unconscientious purposes and motives are prospected to persist. Hence, it is imperative and necessary to invest in studies geared toward understanding the psychology of hackers. The current study referred to Beebe & Clark (2006) and sought out the psychological variables in hackers involved in deviant hacking activities, measured the purpose of hacking and actual hacking experiences, and constructed a predictive model that can categorize hacker types based on their intentions.

Link-E-Param : A URL Parameter Encryption Technique for Improving Web Application Security (Link-E-Param : 웹 애플리케이션 보안 강화를 위한 URL 파라미터 암호화 기법)

  • Lim, Deok-Byung;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1073-1081
    • /
    • 2011
  • An URL parameter can hold some information that is confidential or vulnerable to illegitimate tampering. We propose Link-E-Param(Link with Encrypted Parameters) to protect the whole URL parameter names as well as their values. Unlike other techniques concealing only some of the URL parameters, it will successfully discourage attacks based on URL analysis to steal secret information on the Web sites. We implement Link-E-Param in the form of a servlet filter to be deployed on any Java Web server by simply copying a jar file and setting a few configuration values. Thus it can be used for any existing Web application without modifying the application. It also supports numerous encryption algorithms to choose from. Experiments show that our implementation induces only 2~3% increase in user response time due to encryption and decryption, which is deemed acceptable.

Implementation of High Speed Image Data Transfer using XDMA

  • Gwon, Hyeok-Jin;Choi, Doo-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.1-8
    • /
    • 2020
  • In this paper, we present an implementation of high speed image data transfer using XDMA for a video signal generation / acquisition device developed as a military test equipment. The technology proposed in this study obtains efficiency by replacing the method of copying data using the system buffer in the kernel area with the transmission and reception through the DMA engine in the FPGA. For this study, the device was developed as a PXIe platform in consideration of life cycle, and performance was maximized by using a low-cost FPGA considering mass productivity. The video I/O board implemented in this paper was tested by changing the AXI interface clock frequency and link speed through the existing memory copy method. In addition, the board was constructed using the DMA engine of the FPGA, and as a result, it was confirmed that the transfer speed was increased from 5~8Hz to 140Hz. The proposed method will contribute to strengthening defense capability by reducing the cost of device development using the PXIe platform and increasing the technology level.