• Title/Summary/Keyword: 폴더 관리

Search Result 35, Processing Time 0.021 seconds

Digital photo management system using printed images (프린트 이미지를 이용한 디지털 사진 관리)

  • Kim, Hyun-Jin;Cho, Sung-Jung;Lee, Ho-Yul;Kim, Chang-Soo;Kim, Yun-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.403-408
    • /
    • 2006
  • 디지털 카메라의 사용이 일반화되면서, 사용자가 사진을 찍고 보관하고 감상하는 행태가 과거의 일반 카메라와 다른 모습을 보이고 있다. 특히 디지털 카메라는 유지비가 거의 들지 않기 때문에 한번에 촬영하는 사진의 양이 많은 반면에 인쇄하여 보관하는 사진의 양은 매우 적은 경향을 보인다. 디지털 사진의 양이 방대하게 늘어나고, 인쇄하기 보다는 저장 장치에 보관하게 됨에 따라서 과거의 앨범에 인쇄된 사진을 보관하고 감상하던 방식과 감상하는 행태도 변화되었다. 디지털 카메라로 찍어서 하드디스크에 저장한 사진들은 각 폴더에 어떤 사진들이 들어 있는지를 기억하기 어렵기 때문에 앨범을 보는 것처럼 자주 감상하지 않게 되는 경향이 관찰되었고, 또 인쇄된 사진을 보고, 그 사진과 연관된 다른 사진들을 보고자 디지털로 저장되어 있는 하드디스크에 접속하는 경향이 관찰되었다. 본 연구에서는 촬영된 디지털 카메라의 사진을 분류하여 보관하고 감상하는 사용자의 행태를 분석하고, 이에 적합한 새로운 디지털 사진 관리 시스템을 제안하고자 한다. 특히, 자연스럽게 앨범을 넘겨보다가 인쇄된 디지털 사진과 관련된 컨텍스트를 갖는 다른 디지털 사진들을 저장 매체에서 바로 찾아서 디스플레이를 통해 감상할 수 있는 새로운 방식의 UI를 제안하였다. 이를 위해 인쇄된 사진에 사진의 컨텍스트 코드를 함께 인쇄하고, 추후에 출력된 사진의 컨텍스트 코드를 해독하여 원본 디지털 사진 및, 동일한 컨텍스트를 가지는 디지털 사진들을 자동으로 찾아서 디스플레이 하는 검색 및 감상 방식을 사용하였다. 이를 통해 디지털 사진을 감상하기 위해 거쳐야 했던 기존의 번거로운 과정을 단축하고 디지털 사진을 분류하여 보관하고 원하는 사진을 방대한 데이터 속에서 찾아야 하는 문제를 줄일 수 있었다.

  • PDF

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Differences in Finding Smartphone Apps across User Types Categorized by App Icon Arrangement Style (스마트폰 사용자의 앱정리 유형에 따른 앱아이콘 탐색의 차이 연구 -아이폰 사용자 중심으로-)

  • Kang, Minjeong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.11
    • /
    • pp.143-155
    • /
    • 2017
  • In the mobile-first era, plenty of mobile apps have been created so that the number of apps owned in a smartphone have been increasing as well. However, users spend most of time with only a few apps and the rest of apps are just kept in their smartphones for future usage. Thus, in order to help users find the apps quickly it is important to study how users arrange apps in a mobile phone screen and find an app. In the literature, we extracted 5 user types to organize mobile apps. We further conducted user survey with 30 subjects and finalized major 3 user types categorized by relatedness(A), aesthetic(B), and external concepts(C). We found that most of subjects took less than 2 minutes when finding frequently-used-apps. However we identified difference in times taken to find a barely-used-apps across three user types; while A type users turns out to be the most effective in finding barely-used-apps, the B type uses tend to be the least effective among three types. For the A type users, an app's name is more important than an icon image because they tend to guess the functionality from the name of the app. The B type users use the color of app icon to find the app in the smartphone. For the C type users who tend to remain the original position of an app when first downloading it in the smartphone, the visibility of an app icon is important to catch users' eyes while they scan a page. The results of this study is expected to be useful for UX designers who improve the usability of app icon usage considering the user types.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

Analysis and Conservation of Sheet Music Featuring the National Anthem of Korea with Lyrics in Korean, Chinese, and English - Focusing on Light Blue Pigment Analysis and Conservation Treatment - (한중영문중국판 한국애국가 악보의 분석 및 보존 - 밝은 청색안료 분석과 보존처리를 중심으로 -)

  • BAE Subin;PARK Serin;LEE Hanhyoung;JEONG Heewon
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.3
    • /
    • pp.104-114
    • /
    • 2024
  • Sheet Music of the National Anthem of Korea with Lyrics in Korean, Chinese, and English is a four-sided sheet of paper folded in half. It was first introduced to Korea on November 12, 1945, by Kim Ku, the president of the Provisional Government. The sheet music was published in three languages and is a valuable document for researching the evolution of the anthem and its history. Although it was published in large quantities at the time, it is currently known as the only in Korea and has been designated and managed as a national registered heritage. The sheet music was not significantly damaged, but discoloration and physical damage suggested raised the need for conservation treatment. A pre-treatment examination of the conservation condition revealed that the artifact was received on archival film and had been folded in half for many years, leaving it vulnerable to tears at the top and bottom of the folds and partial wear and tear at the edges. In addition, the pigments used on both sides of the sheet had discolored and transferred to the opposite side. Portable X-ray fluorescence (XRF) analysis was conducted to investigate the pigments used in the sheet music cover, specifically focusing on red, black, and light blue pigments. Titanium (Ti) was detected in the light blue pigment, characterized by a powdery coloring layer. The remaining colors in the printed form were difficult to sample and could not be analyzed further. The light blue sample underwent additional analysis using X-ray diffraction (XRD), scanning electron microscopy with energy-dispersive X-ray spectroscopy (SEM-EDS), and Raman spectroscopy. Cross-validation of the results with the artifact's historical context suggested that the bright blue color observed in the 1945 sheet music is likely due to the use of anatase white pigment, rather than rutile. Furthermore, the bright blue pigment is believed to be a blend of phthalocyanine blue, a synthetic pigment introduced in 1936. Fiber analysis revealed longitudinal striations in the hemp fibers and twists in the cotton fibers, suggesting that the paper was made from a mixture of cotton and hemp fibers. Based on the findings of the condition survey, the conservation treatment for the artifact focused on minimizing moisture to avoid stressing the paper and reinforcing the physically vulnerable areas. The reinforcement paper was dyed to match the base of the artifacts, pre-coated repair paper was used for conservation, and appropriate folders and boxes were made for storage after treatment. This study is expected to serve as an important foundational resource on the materials used in modern and contemporary records.