• Title/Summary/Keyword: Case-file

Search Result 366, Processing Time 0.024 seconds

The development of the high effective and stoppageless file system for high performance computing (High Performance Computing 환경을 위한 고성능, 무정지 파일시스템 구현)

  • Park, Yeong-Bae;Choe, Seung-Hwan;Lee, Sang-Ho;Kim, Gyeong-Su;Gong, Yong-Jun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.395-401
    • /
    • 2004
  • In the current high network-centralized computing and enterprising environment, it is getting essential to transmit data reliably at very high rates. Until now previous client/server model based NFS(Network File System) or AFS(Andrew's Files System) have met the various demands but from now couldn't satisfy those of the today's scalable high-performance computing environment. Not only performance but data sharing service redundancy have risen as a serious problem. In case of NFS, the locking issue and cache cause file system to reboot and make problem when it is used simply as ip-take over for H/A service. In case of AFS, it provides file sharing redundancy but it is not possible until the storage supporting redundancy and equipments are prepared. Lustre is an open source based cluster file system developed to meet both demands. Lustre consists of three types of subsystems : MDS(Meta-Data Server) which offers the meta-data services, OST(Objec Storage Targets) which provide file I/O, and Lustre Clients which interact with OST and MDS. These subsystems with message exchanging and pursuing scalable high-performance file system service. In this paper, we compare the transmission speed of gigabytes file between Lustre and NFS on the basis of concurrent users and also present the high availability of the file system by removing more than one OST in operation.

  • PDF

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

A Study of External Storage Device File Outflow (외장형 저장장치의 파일유출에 관한 연구)

  • Song, Yu-Jin;Lee, Jae-Yong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.59-64
    • /
    • 2011
  • A lot of computer users use external memory device. But, same time file efflux incidents are also increasing. There are two ways people use for efflux file. One is moving it after checking file which is running on computer and the other is checking file name only. Checking from running file case, we can identify vestige with running information of applied program but, the case of moving as external device without running file there is no evidence running applied program. So there are a lot of difficulty with forensic investigation. In this paper we suggest the way to help forensic investigation which is method of getting external memory device information of volume and time through its awareness method and connection information and moving to external device without running file after compare the external memory device volume information through link file analysis and getting information of link file formation & access time from link file.

STL 포맷의 구멍 오류 수정을 위한 삼각형 분할법 적용에 관한 연구

  • 손영지;조연상;전언찬
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.10a
    • /
    • pp.889-893
    • /
    • 1995
  • This paper verified error of STL file and presented a new application of reformed division method for reducing to appeared error by using Delaunay triangulation method that used to modify error of verified data. First, it is analyzed each vertices in hole error and classified follow case that is 1. case of plan or slope, 2. case of edge, 3. case of apex and 4. case of rapid curve, and reduced volume tolerance between original model and converted model after convert STL file.

  • PDF

Forgery Detection Mechanism with Abnormal Structure Analysis on Office Open XML based MS-Word File

  • Lee, HanSeong;Lee, Hyung-Woo
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.47-57
    • /
    • 2019
  • We examine the weaknesses of the existing OOXML-based MS-Word file structure, and analyze how data concealment and forgery are performed in MS-Word digital documents. In case of forgery by including hidden information in MS-Word digital document, there is no difference in opening the file with the MS-Word Processor. However, the computer system may be malfunctioned by malware or shell code hidden in the digital document. If a malicious image file or ZIP file is hidden in the document by using the structural vulnerability of the MS-Word document, it may be infected by ransomware that encrypts the entire file on the disk even if the MS-Word file is normally executed. Therefore, it is necessary to analyze forgery and alteration of digital document through internal structure analysis of MS-Word file. In this paper, we designed and implemented a mechanism to detect this efficiently and automatic detection software, and presented a method to proactively respond to attacks such as ransomware exploiting MS-Word security vulnerabilities.

Design of Lightweight CAD Files with Dimensional Verification Capability for Web-Based Collaboration (웹기반 협업을 위한 치수검증이 가능한 경량캐드파일 설계)

  • Song In-Ho;Chung Sung-Chong
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.30 no.5 s.248
    • /
    • pp.488-495
    • /
    • 2006
  • The demand for the use of 3D CAD data over the Internet environment has been increased. However, transmission of 3D CAD data has delayed the communication effectiveness because of the CAD data size. Lightweight CAD file design methodology is required for rapid transmission in the distributed environment. In this paper, to derive lightweight CAD files from commercial CAD systems, a file translation system producing a native file is constructed first by using the InterOp and API of the ACIS kernel. Using the B-rep model and mesh data extracted from the native file, the lightweight CAD file with topological information is constructed as a binary file. Since the lightweight CAD file retains topological information, it is applied to the dimensional verification, digital mock-ups and visualization of CAD files. Effectiveness of the proposed lightweight CAD file is confirmed through various case studies.

A Method of Data Hiding in a File System by Modifying Directory Information

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.85-93
    • /
    • 2018
  • In this research, it is proposed that a method to hide data by modifying directory index entry information. It consists of two methods: a directory list hiding and a file contents hiding. The directory list hiding method is to avoid the list of files from appearing in the file explorer window or the command prompt window. By modifying the file names of several index entries to make them duplicated, if the duplicated files are deleted, then the only the original file is deleted, but the modified files are retained in the MFT entry intact. So, the fact that these files are hidden is not exposed. The file contents hiding is to allocate data to be hidden on an empty index record page that is not used. If many files are made in the directory, several 4KB index records are allocated. NTFS leaves the empty index records unchanged after deleting the files. By modifying the run-list of the index record with the cluster number of the file-to-hide, the contents of the file-to-hide are hidden in the index record. By applying the proposed method to the case of hiding two files, the file lists are not exposed in the file explorer and the command prompt window, and the contents of the file-to-hide are hidden in the empty index record. It is proved that the proposed method has effectiveness and validity.

A Study on the Development of Classification for Criminal Case Files (형사사건기록의 분류방안 연구 - 사안 파일(Case file) 관리를 중심으로 -)

  • Lee, Hyun-Jung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.10 no.1
    • /
    • pp.169-197
    • /
    • 2010
  • The purpose of this study is to propose a different classification method for keeping a record of cases. After proving that criminal case files should be counted as one type of case files, based on their characteristics and characteristics, this research analyzes the current process of criminal case filling at Public Prosecutor's Office to point out some problems. This study suggests a new classification system: at first, each case gets classified based on a case: secondary, the data gets further assorted by the chronological procedures. The classification approach, which is adopted from MoReq 2's Workflow method, is more adjustable to the new electronic filing system.

A STUDY OF WORKING EFFICIENCY AND FILE DEFORMATION OF GT ROTARY FILE IN CURVED CANALS (GT rotary file을 이용한 만곡 근관형성시 작업 효율 및 file 변형 발생에 관한 연구)

  • 신주희;백승호;배광식;임성삼;윤수한;김병현
    • Restorative Dentistry and Endodontics
    • /
    • v.26 no.5
    • /
    • pp.418-435
    • /
    • 2001
  • Root canal preparation process is of utmost importance in successful treatment of root canal. Also, one of the most important purpose of the root canal preparation is to enlarge the root canal three dimensionally without changing the curvature of the root canal However as the curvature of the root canal increases, there are many difficulties involved in formation of optimum root canal. Therefore in order to solve the above mentioned problems, new developments in methods of root canal preparation and equipments for such purposes were made. Recently, vigorous studies about newly introduced engine-driven nickel-ti-tanium rotary file are conducted. As shown in research results to dates, it is well established that the use of nickel-titanium file is better suited for curved root canal than stainless steel file in maintaining the curvature or root canal and reducing the deformation of root canal. However it is also acknowledged that there are a few discrepancies in research results according to protocol, due to failure to remove variables in experiments. In addition, although it is recommended by the manufacturer that the GT rotary file should maintain a low rotational speed of 150~350rpm and 'light pressure' as light as not to break the lead of a pencil, academic studies about the vertical force which is not yet standardized are not sufficiently explored. Therefore, this research devised and utilized a special research equipment to standardize the appropriate range of vertical force for GT rotary file through experiments by breaking of the lead of a pencil as expressed by the manufacturer and to accurately measure factors involved through repeating and recreating the environment of root canal preparation. Forming nine experimental groups by varying the vertical forces (150g. 220g, 300g) and rpm (150rpm, 250rpm, 350rpm), the effects of changing vertical forces and rpm on working efficiency were measured in terms of time expended in root canal preparation by crown-down method using a transparent resin block with 35 degree curvature and GT rotary file (z-test). The following research using this special research equipment that involved nine experimental groups and varying the vertical force for root canal preparation from 300g which is within the normal vertical force range to 700g and 1000g which fall outside the normal rpm range. The results were as follows : 1. Analysis of the experiment results revealed that the time spent in root canal preparation decreased as the vertical forces and rpm increased (p<0.05). Also, the effects of rpm were greater than those of the vertical forces within the normal vertical force range ($\beta$-weight test). 2. Observation of the deformation of GT rotary file revealed that deformation increases in a direct correlation with the vertical force increase and in a reverse correlation with the rpm decrease. In the case of the vertical forces close to the normal range, the probability of GT rotary file deformation were quite different depending on the rpm changes. In the case of greater vertical forces, the occurrences of deformation of the file were more frequent regardless of the rpm changes. 3. Deformation and breakage of file were also commonly observed in the expended time measurement experiments and GT rotary file deformation experiments in which low speed rpm (150rpm) was used and at the curved portion of the resin block.

  • PDF

Performance Analysis of Flash File System for Embedded Systems on Linux Environment (리눅스 환경에서 임베디드 시스템을 위한 플래시 파일 시스템의 성능 분석)

  • Choi, Jin-oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.302-304
    • /
    • 2013
  • The embedded systems on linux environment, commonly equip a file system as mini hard disk or flash memory to keep data. The types of the file system of the system are various according to it's operating system. Anyway, the more embedded system depends on the file system, the selection of the type of the file system effects more on the performance of the system. This thesis performs the performance benchmark of a FAT and Ext file systems. As the result, it is discussed that what file system is better at which case. These results are helpful at the selection of flash file system of the embedded systems on linux environment.

  • PDF