• Title/Summary/Keyword: File API

Search Result 68, Processing Time 0.025 seconds

A Linux Cluster File System for Efficient Multimedia Services (효율적인 멀티미디어 서비스를 위한 리눅스 클러스터 파일 시스템)

  • 강미연;홍재연;김형식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.652-654
    • /
    • 2002
  • 최근 리눅스 클러스터 시스템의 활용 범위가 커지면서 멀티미디어 서비스를 제공하려는 시도가 나타났다. 리눅스 클러스터 시스템 상에서 효과적으로 멀티미디어 서비스를 제공하려면 적합한 파일 시스템의 도움이 필수적이다. 즉, 클러스터 파일 시스템을 통하여 응용 프로그램에 대한 단일 입출력공간을 제공하고 효율적인 파일/디렉토리 연산을 제공하는 기술이 중요하다. 본 논문에서는 리눅스 클러스터 시스템을 위한 클러스터 파일 시스템(Cluster File System, 이하 CFS로 표기)을 설계 및 구현한다. CFS는 리눅스 파일 시스템 위에 사용자 수준에서 구현된 시스템으로 사용자에게는 단일 시스템 이미지를 제공한다. 내부적으로는 대용량의 파일이 분산되어 저장되며 이를 위해 파일/디렉토리 정보도 각각의 노드에서 분산 관리된다. 사용자에게는 응용 프로그램의 개발이 용이하도록 API가 제공되며, 또한 CFS를 관리하기 위한 도구들이 제공된다.

  • PDF

A Chi-Square-Based Decision for Real-Time Malware Detection Using PE-File Features

  • Belaoued, Mohamed;Mazouzi, Smaine
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.644-660
    • /
    • 2016
  • The real-time detection of malware remains an open issue, since most of the existing approaches for malware categorization focus on improving the accuracy rather than the detection time. Therefore, finding a proper balance between these two characteristics is very important, especially for such sensitive systems. In this paper, we present a fast portable executable (PE) malware detection system, which is based on the analysis of the set of Application Programming Interfaces (APIs) called by a program and some technical PE features (TPFs). We used an efficient feature selection method, which first selects the most relevant APIs and TPFs using the chi-square ($KHI^2$) measure, and then the Phi (${\varphi}$) coefficient was used to classify the features in different subsets, based on their relevance. We evaluated our method using different classifiers trained on different combinations of feature subsets. We obtained very satisfying results with more than 98% accuracy. Our system is adequate for real-time detection since it is able to categorize a file (Malware or Benign) in 0.09 seconds.

Implemetation of STEP Standard Data Interface (SDAI) on Multiple Data Models (이종 데이터 모델에서의 STEP 표준 데이터 인터페이스(SDAI) 구현)

  • 권용국;유상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.1
    • /
    • pp.1-22
    • /
    • 1998
  • SDAI (Standard Data Access Interface) is an interface specification of accessing various storage systems such as file systems and database management systems for STEP data. Using SDAI, both application program developers and CAD/CAM system developers can be relieved from dealing with STEP physical file or system dependent DBMS operations. In this paper, we present implementations of SDAI on different data models, i.e., relational, extended relational, and object-oriented. In order to implement SDAI, we need to translate the EXPRESS information model into target data models. The schema translation process for three different data models are compared and other implementation issues are discussed.

  • PDF

Design and Implementation of User-level File System Supporting File Data Block Update (데이터 블록의 변경을 지원하는 사용자 수준 파일시스템 설계 및 구현)

  • Kong, Jin-San;Kim, Ho-Min;Ko, Young-Woong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.159-162
    • /
    • 2012
  • 현재 디스크 스토리지에서 기존 파일시스템은 파일의 부분 추가 또는 삭제 시 재 정렬하는 오버헤드(re-write)가 발생한다. 이러한 단점을 보완하기위해 블록 단위 변경을 지원하는 사용자 수준(User-level)의 파일시스템을 설계 및 구현하였다. 주요 아이디어는 블록 정렬된 파일에 대하여 향상된 블록 삽입/삭제를 지원하는 API를 지원함으로 블록 단위의 데이터 삭제 시 오버헤드를 줄일 수 있는 기법이다. 실험 결과 제안한 시스템이 파일의 부분 추가 및 삭제 시 수행 시간을 크게 감소시키고 데이터 쓰기 용량을 크게 감소시키는 것을 보였다.

A Digital Forensic Analysis of Timestamp Change Tools for Windows NTFS

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.51-58
    • /
    • 2019
  • Temporal analysis is very useful and important for digital forensics for reconstructing the timeline of digital events. Forgery of a file's timestamp can lead to inconsistencies in the overall temporal relationship, making it difficult to analyze the timeline in reconstructing actions or events and the results of the analysis might not be reliable. The purpose of the timestamp change is to hide the data in a steganographic way, and the other purpose is for anti-forensics. In both cases, the time stamp change tools are requested to use. In this paper, we propose a classification method based on the behavior of the timestamp change tools. The timestamp change tools are categorized three types according to patterns of the changed timestamps after using the tools. By analyzing the changed timestamps, it can be decided what kind of tool is used. And we show that the three types of the patterns are closely related to API functions which are used to develop the tools.

An Access Control System for Ubiquitous Computing based on Context Awareness (상황 인식 기반의 유비쿼터스 컴퓨팅을 위한 접근 제어 시스템)

  • Lee, Ji-Yeon;Ahn, Joon-Seon;Doh, Kyung-Goo;Chang, Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.35-44
    • /
    • 2008
  • It is important to manage access control for secure ubiquitous applications. In this paper, we present an access-control system for executing policy file which includes access control rules. We implemented Context-aware Access Control Manager(CACM) based on Java Context-Awareness Framework(JCAF) which provides infrastructure and API for creating context-aware applications. CACM controls accesses to method call based on the access control rules in the policy file. We also implemented a support tool to help programmers modify incorrect access control rules using static analysis information, and a simulator for simulating ubiquitous applications. We describe simulation results for several ubiquitous applications.

A Hybrid Parametric Translator Using the Feature Tree and the Macro File (피처 트리와 매크로 파일을 이용하는 하이브리드 파라메트릭 번역기)

  • 문두환;김병철;한순흥
    • Korean Journal of Computational Design and Engineering
    • /
    • v.7 no.4
    • /
    • pp.240-247
    • /
    • 2002
  • Most commercial CAD systems provide parametric modeling functions, and by using these capabilities designers can edit a CAD model in order to create design variants. It is necessary to transfer parametric information during a CAD model exchange to modify the model inside the receiving system. However, it is not possible to exchange parametric information of CAD models based on the cur-rent version of STEP. The designer intents which are contained in the parametric information can be lost during the STEP transfer of CAD models. This paper introduces a hybrid CAB model translator, which also uses the feature tree of commercial CAD systems in addition to the macro file to allow transfer of parametric information. The macro-parametric approach is to exchange CAD models by using the macro file, which contains the history of user commands. To exchange CAD models using the macro-parametric approach, the modeling commands of several commercial CAD systems are analyzed. Those commands are classified and a set of standard modeling commands has been defined. As a neutral fie format, a set of standard modeling commands has been defined. Mapping relations between the standard modeling commands set and the native modeling commands set of commercial CAD systems are defined. The scope of the current version is limited to parts modeling and assemblies are excluded.

Automatically Saving Editing-Files in File System Layer (편집중인 파일을 자동으로 저장하는 파일 시스템의 설계)

  • Cho, Won-Ho;Lee, In-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1519-1522
    • /
    • 2005
  • 본 논문에서는 현재 편집중인 파일을 주기적으로 저장하여 파일이 저장되지 못한 상황에서도 쉽게 복구할 수 있는 파일 시스템을 설계하였다. 제안하는 파일 시스템은 Ext3 파일 시스템을 기반으로 자동 저장에 필요한 자료 구조와 기능을 추가하여 구현하였으며 리눅스 환경에서 사용할 수 있도록 구현하였다. 또한 파일 시스템을 사용하는 데 필요한 시스템 콜과 API를 추가하였다.

  • PDF

Development and Application of Tumblr's API Permalink Automatic Extractor - Focusing on the Prevention of Secondary Damage in the Unauthorized Video - (텀블러의 API 퍼머링크(Permalink) 자동추출기 개발 및 활용방안 - 비동의 영상물 2차 피해방지 방안을 중심으로 -)

  • Oh, Wan Gyun;Jeong, Dae Yong
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.71-82
    • /
    • 2018
  • Using small cameras such as smartphones, criminals shoot secretly in public restrooms and women's changing rooms. And Revenge porn is also increasing. As a result social damage is increasing. Tumblr is an overseas service and it is very difficult to work with Tumbler on international legal cooperation and deletions. Thus In order to block the distribution of videos, victims must find and report the video URL themselves. But it's hard for victims who lack IT expertise to proceed those procedure. In this study, we automatically collect the URL of stored information and hash values of the images from API permlink of Tumbler blog. It is then saved as a document file with and presented to the victim. Through these technical methods, we can help victims report violations easily and quickly.

Morphology Representation using STT API in Rasbian OS (Rasbian OS에서 STT API를 활용한 형태소 표현에 대한 연구)

  • Woo, Park-jin;Im, Je-Sun;Lee, Sung-jin;Moon, Sang-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.373-375
    • /
    • 2021
  • In the case of Korean, the possibility of development is lower than that of English if tagging is done through the word tokenization like English. Although the form of tokenizing the corpus by separating it into morpheme units via KoNLPy is represented as a graph database, full separation of voice files and verification of practicality is required when converting the module from graph database to corpus. In this paper, morphology representation using STT API is shown in Raspberry Pi. The voice file converted to Corpus is analyzed to KoNLPy and tagged. The analyzed results are represented by graph databases and can be divided into tokens divided by morpheme, and it is judged that data mining extraction with specific purpose is possible by determining practicality and degree of separation.

  • PDF