Abstract:
Provided are a harmful site collection device and method for determining a harmful site by analyzing a connection between harmful sites. The harmful site collection device includes a harmful site database configured to store a URL of a harmful site; a web page collection and extraction unit configured to collect a web page indicated by the URL of the harmful site and extract a linked URL; and a harmful site connection analysis unit configured to calculate a connection with other web pages referenced within a web page of the linked URL to determine whether the web page is a harmful site. Accordingly, the harmful site collection device can determine a harmful site more easily only with information regarding the URL linked to the web page.
Abstract:
A device for performing intra prediction for an image is disclosed. The disclosed intra prediction device includes: a subtractor configured to perform a subtraction operation on a first reference value and a second reference value of a prediction target pixel; a multiplier configured to perform a multiplication operation on a parameter set for each angular mode and an output value of the subtractor; and an adder configured to perform an addition operation on a product of the first reference value multiplied by a predetermined constant and an output value of the multiplier, where an output value of the adder is a resultant value of intra prediction for the image according to an angular mode.
Abstract:
An apparatus and a method for setting a search region for the predicting of a motion vector are disclosed. The apparatus for setting a search region for predicting a motion vector includes: a computation unit configured to compute differences between an origin vector of a search region for a target block for motion vector prediction and predictive motion vectors of multiple blocks adjacent to the target block, and compute a sum of absolute values of the differences; and a search region setting unit configured to set a range value of the search region for the target block by using at least one of the sum of absolute values of the differences and a directionality of the predictive motion vectors for the multiple adjacent blocks. According to an embodiment of the present invention, the amount of computation and the time expended for computation when predicting motion vectors can be significantly reduced.
Abstract:
A method and an apparatus for propagating a message in a social network are disclosed. A method for propagating a message in a social network according to an embodiment of the invention can include: calculating a degree of connectivity of each user; calculating a propagation capability of each user by using the calculated degree of connectivity and a probability of distribution; choosing target users for propagating a message by using the propagation capability of each user; and propagating the message to nodes of the chosen target users.
Abstract:
A method for providing a social network service includes: (a) setting an access threshold value for a content belonging to a content owner and a weight value for one or more communities of which the content owner is a member; (b) extracting a community of which a content requester is a member from among the communities of which the content owner is a member, when a request for the content is received from the content requester, and calculating an activity value of the content requester for the extracted community; (c) calculating a reputation value for the content requester by using one or more of a number of the extracted communities, a weight value set for the extracted communities, and the calculated activity value; and (d) providing the content requester with authorization to access the content according to a comparison result between the reputation value and the access threshold value.
Abstract:
A key-based method for controlling access in a social network service includes: generating a core key and sub keys by segmenting a master key that is unique to a file owner, with the sub keys assigned differently to multiple groups that are divided according to trust level and relationship type; determining the group to which a file requester belongs by using at least one of a friend list of the file requester, a trust level between the file requester and the file owner, and a friend list of the file owner, and distributing a sub key corresponding to the determined group to the file requester, when the file requester requests a key distribution; and determining whether or not access to a file of the file owner is authorized by using the sub key distributed to the file requester and the core key, when the file requester requests the file.
Abstract:
Provided is a piezoelectric stack transducer. In a transducer portion, a plurality of piezoelectric transducers which output maximum amplitude at different frequencies are continuously stacked. A stacked electrode portion is provided on both surfaces of each of the plurality of continuously stacked piezoelectric transducers and supplies an electric signal so that vibration is generated. In this case, the plurality of piezoelectric transducers have different diameters. According to the present invention, it is possible to implement a piezoelectric stack transducer which exhibits constant amplitude (output) at different frequencies by piezoelectric transducers exhibiting different amplitudes at respective frequencies according to natural frequencies supplementing amplitude of a different piezoelectric transducer.
Abstract:
Provided are a memory control apparatus and a memory control method. In the memory control apparatus and memory control method, data are distributively stored in a plurality of banks in sequence, and the corresponding data are written to or read from the memory, based on row address information obtained by exchanging a portion of row information and bank information with each other. According to the invention, if a new row begins when the host or the processor accesses the memory, a host or a processor accesses another bank, and thus the block data can be read or written without a waiting cycle. In addition, the memory control apparatus and the memory control method can be implemented with low complexity available through simple address conversion in the memory control apparatus.