• Title/Summary/Keyword: File Access

Search Result 404, Processing Time 0.029 seconds

Embedded Object-Oriented Micromagnetic Frame (OOMMF) for More Flexible Micromagnetic Simulations

  • Kim, Hyungsuk;You, Chun-Yeol
    • Journal of Magnetics
    • /
    • v.21 no.4
    • /
    • pp.491-495
    • /
    • 2016
  • We developed an embedded Object-Oriented Micromagnetic Frame (OOMMF) script schemes for more flexible simulations for complex and dynamic mircomagnetic behaviors. The OOMMF can be called from any kind of softwares by system calls, and we can interact with OOMMF by updating the input files for next step from the output files of the previous step of OOMMF. In our scheme, we set initial inputs for OOMMF simulation first, and run OOMMF for ${\Delta}t$ by system calls from any kind of control programs. After executing the OOMMF during ${\Delta}t$, we can obtain magnetization configuration file, and we adjust input parameters, and call OOMMF again for another ${\Delta}t$ running. We showed one example by using scripting embedded OOMMF scheme, tunneling magneto-resistance dependent switching time. We showed the simulation of tunneling magneto-resistance dependent switching process with non-uniform current density using the proposed framework as an example.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

Improvement of Reliability for Hadoop Distributed File System using Snapshot and Access Control (스냅샷과 접근제한 기법을 이용한 하둡 분산 파일 시스템의 신뢰성 향상)

  • Shin, Dong Hoon;Youn, Hee Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.137-138
    • /
    • 2009
  • 다양한 스토리지와 파일 시스템이 시스템의 신뢰도를 증가시키기 위해 스냅샷을 이용하고 있다.[1] 또한, 최근에는 정보 보호의 중요성에 관심이 많아지면서 많은 시스템이 자료 보안에 신경을 쓰고 있다. 하지만, 대표적인 분산 컴퓨터 시스템 중 하나인 하둡은 관련 기능을 제공하지 않는데, 이는 나중에 문제가 될 만한 여지가 농후하다. 본 논문에서는 현재 하둡 시스템의 신뢰도에 영향을 끼치는 결점에 대하여 언급하고, 그에 대한 보완의 일부로 스냅샷과 접근 제어 기능을 제안한다.

Log Generation for File Access on PVFS2 (PVFS2 를 위한 파일 접근 로그 생성)

  • Cha, Kwangho;Cho, Hyeyoung;Kim, Sungho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.675-677
    • /
    • 2007
  • 클러스터 시스템의 응용 분야가 다양화되고 복잡해짐에 따라, 대규모 클러스터 시스템을 보다 효율적으로 사용하기 위해서 실제 사용자의 이용 패턴을 예측할 수 있는 워크로드 분석의 필요성이 높아지고 있다. 워크로드 분석으로는 다양한 작업이 진행되는데 특히 파일 단위의 동적 접근 분석도 이에 포함된다. 본 논문에서는 실험용 병렬 파일 시스템으로 많이 보급된 PVFS2 에 파일 단위접근 기록을 가능케하는 방안을 모색하고 이 기능의 활용 가능성을 살펴 보았다.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

AN EXPERIMENTAL STUDY ON THE SEALING ABILITY OF DIFFERENT ROOT CANAL OBTURATION METHODS (각종 근관충전법의 치근단 폐쇄효과에 관한 연구)

  • Hur, Seung-Myun;Cho, Young-Gon
    • Restorative Dentistry and Endodontics
    • /
    • v.16 no.2
    • /
    • pp.143-154
    • /
    • 1991
  • The purpose of this study was to evaluate the sealing ability of five obturation methods in conjunction with sealer. Fifty extracted upper and lower anterior teeth were selected and the access cavities were prepared lingually with a round bur. The working length was determined with a #15K file, and the root canals were instrumented with a #40K file 1mm short of the apical foramen. The apical third of root canal was flared by step-back technique and the coronal two thirds of root canal using #2 - 3 Gates Glidden drills. And then, the teeth were randomly assigned to five groups of 10 teeth each. A thin coat of Tubliseal was placed into the canal into the canal using the # 35 reamer and the canals were filled by lateral condensation, vertical condensation, ultrasonic activated lateral condensation, ULTRAFIL injecting, and McSpadden compaction methods. All teeth were stored in 100 % relative humidity at 31c for 48 hours. The roots were suspended in 2 % methylene blue solution for 48 hours, left to dry for 24 hours and then, half side of root was removed longitudinally using the fissure bur. A Boley gauge wes used to measure the distance, to the nearest 0.1mm, from the apical foramen to the most coronal level of dye penetration. The measurement of dye penetration was statistically compared by Duncan's multiple range test The results were as follows 1. Ultrasonic group showed the best sealing ability among the all experimental groups, but there were statistically no significant difference in the sealing ability between ultrasonic group and vertical condensation group. 2. There were no statistically significant difference in the sealing ability among the lateral, vertical, and ultrasonic groups. 3. McSpadden group showed the worst sealing ability among the all exprimental groups.

  • PDF

Development and Validation of Exposure Models for Construction Industry: Tier 2 Model (건설업 유해화학물질 노출 모델의 개발 및 검증: Tier-2 노출 모델)

  • Kim, Seung Won;Jang, Jiyoung;Kim, Gab Bae
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.2
    • /
    • pp.219-228
    • /
    • 2014
  • Objectives: The major objective of this study was to develop a tier 2 exposure model combining tier 1 exposure model estimates and worker monitoring data and suggesting narrower exposure ranges than tier 1 results. Methods: Bayesian statistics were used to develop a tier 2 exposure model as was done for the European Union (EU) tier 2 exposure models, for example Advanced REACH Tools (ART) and Stoffenmanager. Bayesian statistics required a prior and data to calculate the posterior results. In this model, tier 1 estimated serving as a prior and worker exposure monitoring data at the worksite of interest were entered as data. The calculation of Bayesian statistics requires integration over a range, which were performed using a Riemann sum algorithm. From the calculated exposure estimates, 95% range was extracted. These algorithm have been realized on Excel spreadsheet for convenience and easy access. Some fail-proof features such as locking the spreadsheet were added in order to prevent errors or miscalculations derived from careless usage of the file. Results: The tier 2 exposure model was successfully built on a separate Excel spreadsheet in the same file containing tier 1 exposure model. To utilize the model, exposure range needs to be estimated from tier 1 model and worker monitoring data, at least one input are required. Conclusions: The developed tier 2 exposure model can help industrial hygienists obtain a narrow range of worker exposure level to a chemical by reflecting a certain set of job characteristics.

Implementation of Web Based Teleradiology Internet PACS (웹 기반 원격 방사선 인터넷 PACS 구현)

  • 지연상;이성주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.5
    • /
    • pp.1105-1110
    • /
    • 2000
  • In the past high cost and complex system configuration often discouraged hospitals from building teleradiology system or PACS(Picture Archiving and Communication System). But new standard platforms enable us to construct the same system with very low cost and simple configurations. internet as a communication channel made us overcome the regional limit and communication cost, and WWW technologies simplified the complex problems on the software developments, configurations and installations. So whoever has a Web browser to access internet can review medical images at anywhere. And we adopted DICOM technology which is a standard for medical imaging, thus we could resolve the interface problems among medical imaging systems such as modalities or archives. The implementation is comprised of three part DICOM/WWW interface subsystem, image format conversion subsystem and viewing applets which are displayed on users WWW browsers. In addition, Teleradiology intrenet PACS system includes DICOM converter that non-DICOM file format converts standard file format.

  • PDF

Secure Authentication Protocol in Hadoop Distributed File System based on Hash Chain (해쉬 체인 기반의 안전한 하둡 분산 파일 시스템 인증 프로토콜)

  • Jeong, So Won;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.831-847
    • /
    • 2013
  • The various types of data are being created in large quantities resulting from the spread of social media and the mobile popularization. Many companies want to obtain valuable business information through the analysis of these large data. As a result, it is a trend to integrate the big data technologies into the company work. Especially, Hadoop is regarded as the most representative big data technology due to its terabytes of storage capacity, inexpensive construction cost, and fast data processing speed. However, the authentication token system of Hadoop Distributed File System(HDFS) for the user authentication is currently vulnerable to the replay attack and the datanode hacking attack. This can cause that the company secrets or the personal information of customers on HDFS are exposed. In this paper, we analyze the possible security threats to HDFS when tokens or datanodes are exposed to the attackers. Finally, we propose the secure authentication protocol in HDFS based on hash chain.