• Title/Summary/Keyword: Download

Search Result 446, Processing Time 0.026 seconds

DEVELOPMENT OF WEB-DOWNLOADING SYSTEM ON WWW

  • Lee Sun-Gu;Jung Jae Heon;Lee Yong Il
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.612-615
    • /
    • 2005
  • Korea Aerospace Research Institute(KARl) has been receiving Terra and Aqua MODIS data at ground station of Daejeon since July 2002. MODIS data can cover whole East Asia including the Korean Peninsula, Japan and The East China each almost scene and is monitoring ocean, atmosphere and land. By this time, over two thousand scenes have been archived including Terra and Aqua in the storage system and they occupied about over 10TB of disk space. In this study, Web-Downloading system of MODIS data developed on WWW is including following main functions: spectral subset (250m, 500m, 1000m chnnels) Level 1B data of HDF format, result display, ftp download and statistic viewer etc. Users using this system can directly download MODIS data on WWW with a few input parameters. This system is available via the Internet URL after October 2005 on the following, 'http://webmodis.kari.re.kr/'

  • PDF

Biological Object Downloader (BOD) Service for Easy Download and Management of Biological Databases

  • Park, Dae-Ui;Lee, Jung-Woo;Yoon, Gi-Seok;Gong, Sung-Sam;Bhak, Jong
    • Genomics & Informatics
    • /
    • v.5 no.4
    • /
    • pp.196-199
    • /
    • 2007
  • BOD is an FTP service management tool on the Internet. It was developed for biological researchers in South Korea. It enables easier and faster access of bioinformation without having to go through foreign FTP sites. BOD includes an automatic downloader with a management and email alert service from which the user can easily select and schedule any biological database. Once listed in BOD, the user can check and modify the download status and data from an additional email alert service.

Implementation of Personalized IP Streaming System (맞춤형 IP 스트리밍 시스템 구현)

  • Yang, Chang-Mo;Kim, Kyung-Won;Lim, Tae-Beom;Kim, Yoon-Sang;Lee, Seok-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.515-517
    • /
    • 2006
  • Recently, there is a rapidly growing demand for efficient real-tine playback and transmission of large amounts of multimedia data. But most users' connections are not fast enough to download large chunks of multimedia data. Therefore a streaming technology is needed in which users enable the real-time playback of multimedia date without having to download the whole of the multimedia date. In this paper, we propose a personalized IP streaming system. The proposed IP streaming system enables users to got an intelligent recommendation of multimedia contents based on the user preference information stored on the streaming server or the home media server. Moreover, users are assured of seamless access of streamed content event if they switch to another client device by implementing streaming system based on user identification and device information. We evaluate our approach with simulation results.

  • PDF

A Data Sharing Scheme with Security and Flexibility (보안성과 유연성을 갖춘 데이터 공유 방안)

  • Lee, Goo-Yeon;Kim, Hwa-Jong;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.24 no.B
    • /
    • pp.193-198
    • /
    • 2004
  • We propose and analyse a flexible secure file sharing scheme which can be used for data sharing among members in P2P environment. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient memory management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention.

  • PDF

Fast Management of ONUs Based on Broadcast Control Channel for a 10-Gigabit-Capable Passive Optical Network (XG-PON) System

  • Lee, Youngsuk;Lee, Dongsoo;Yoo, Hark;Kim, Youngsun;Kim, Younghan
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.538-542
    • /
    • 2013
  • This paper proposes a broadcast software download (BSD) scheme for a 10-gigabit-capable passive optical network (XG-PON), which dramatically reduces the time required to update a remotely-located user terminal's software. The performance of the proposed BSD is examined by numerical analysis and demonstrated by experimental verification on our XG-PON test platforms. The results show that the BSD takes less than 5 minutes to update 45 user-terminal software, while the conventional unicast software download scheme normally takes more than one and half hours.

A Study on FOTA Upgrade Efficiency by Manipulating a Scatter Loading (FOTA에서 Scatter Loading의 최적화 방법 연구)

  • Lee, Hee-Young;Cho, Jun-Dong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.608-612
    • /
    • 2007
  • FOTA는 무선기능이 장착된 Mobile Device에 새로운 Software에 대한 알림기능이 도착하면, Software가 탐재된 서버에 접속하여 Software를 Download 받고, 그 Download한 Software를 Upgrade 하는 기능을 말한다. FOTA 기능을 장착하기 위해서 Mobile Device는 Delta Package의 사이즈를 최소화하기 위한 특별한 Binary 구조를 가지는데 두 Binary의 차이를 압축한 것을 Delta Package라고 부르며, Binary 사이에 Upgrade를 위한 여분의 Gap을 두어, 향후 수정된 내용이 있을 때, 수정사항을 공간 내에 포함할 수 있도록 한다. 바이너리를 구성하는 Object들이 Image내에 어떤 위치에 포함될 것인지를 결정하는 Scatter Loader에 따라, Binary의 구조 및 확장성, Delta의 크기를 결정하게 되는데, 이것은 Object의 Type이나 Scatter Loading File내에서 명시한 순서와는 관계가 없고, Execution Region의 분할 개수를 늘릴수록, 각 Object의 Dependency 별로 묶을수록 Delta Size가 작아지는 것을 알게 되었다. 이 논문에서는 위에서 제시한 조건이 Delta Size에 미치는 원인에 대해 분석하고, Scatter Loading File을 최적화시킬 수 있는 방안에 대해서 연구한다.

  • PDF

Design of Network Protocol based on P2P Collaboration and User's Content Using Information (P2P 협업 및 사용자 콘텐츠 이용 정보 기반의 네트워크 프로토콜 설계)

  • Nahm, Eui-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.3
    • /
    • pp.575-580
    • /
    • 2017
  • In these days, the big-size and high resolution multimedia file is widely used through networks. To transfer and service effectively, the internet network technology is necessary to substitute broadcasting. Normally Content Delivery Network(CDN) is widely used in conventional internet for multimedia services. But it has a small bandwidth to service. So to solve this problems, many researchers have suggest the protocol for download, content distribution/saving, server synchronization, caching, pushing rate, and streaming etc. But all of these has some defects like low resolution, packets loss and delay, real application implementations etc. So, this paper suggests a new method of network protocol based on P2P collaboration and user's content using information. And it evaluated the performance of suggested method. As the results, it showed the effectiveness of 4 performances indices : download speed, decreasing rate of connected user in same time, adaptive hit ratio, traffic decreasing rate.

Permissions based Automatic Android Malware Repair using Long Short Term Memory (롱 숏 텀 메모리를 활용한 권한 기반 안드로이드 말웨어 자동 복구)

  • Wu, Zhiqiang;Chen, Xin;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.387-388
    • /
    • 2019
  • As malicious apps vary significantly across Android malware, it is challenging to prevent that the end-users download apps from unsecured app markets. In this paper, we propose an approach to classify the malicious methods based on permissions using Long Short Term Memory (LSTM) that is used to embed the semantics among Intent and permissions. Then the malicious method that is an unsecured method will be removed and re-uploaded to official market. This approach may induce that the end-users download apps from official market in order to reduce the risk of attacks.

  • PDF

Enhanced Method for Preventing Malware by Detecting of Injection Site (악성코드 인젝션 사이트 탐지를 통한 방어효율 향상방안)

  • Baek, Jaejong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1290-1295
    • /
    • 2016
  • Recently, as mobile internet usage has been increasing rapidly, malware attacks through user's web browsers has been spreading in a way of social engineering or drive-by downloading. Existing defense mechanism against drive-by download attack mainly focused on final download sites and distribution paths. However, detection and prevention of injection sites to inject malicious code into the comprised websites have not been fully investigated. In this paper, for the purpose of improving defense mechanisms against these malware downloads attacks, we focus on detecting the injection site which is the key source of malware downloads spreading. As a result, in addition to the current URL blacklist techniques, we proposed the enhanced method which adds features of detecting the injection site to prevent the malware spreading. We empirically show that the proposed method can effectively minimize malware infections by blocking the source of the infection spreading, compared to other approaches of the URL blacklisting that directly uses the drive-by browser exploits.

Execution-based System and Its Performance Analysis for Detecting Malicious Web Pages using High Interaction Client Honeypot (고 상호작용 클라이언트 허니팟을 이용한 실행 기반의 악성 웹 페이지 탐지 시스템 및 성능 분석)

  • Kim, Min-Jae;Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.1003-1007
    • /
    • 2009
  • Client-side attacks including drive-by download target vulnerabilities in client applications that interact with a malicious server or process malicious data. A typical client-side attack is web-based one related to a malicious web page exploiting specific browser vulnerability that can execute mal ware on the client system (PC) or give complete control of it to the malicious server. To defend those attacks, this paper has constructed high interaction client honeypot system using Capture-HPC that adopts execution-based detection in virtual machine. We have detected and classified malicious web pages using the system. We have also analyzed the system's performance in terms of the number of virtual machine images and the number of browsers executed simultaneously in each virtual machine. Experimental results show that the system with one virtual machine image obtains better performance with less reverting overhead. The system also shows good performance when the number of browsers executed simultaneously in a virtual machine is 50.