• Title/Summary/Keyword: File Access

Search Result 406, Processing Time 0.032 seconds

The application of digital forensic investigation for response of cyber-crimes (사이버범죄의 대응강화를 위한 디지털 포렌식 수사 활용방안)

  • Oh, Sei-Youen
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • This study will show the digital forensic model which fights against cyber-crimes to prepare various cyber-crimes. The digital forensic model will be more useful about the investigation of cyber-crimes and arresting criminals after researching the uses of the digital forensic model and cyber-crime rates in South Korea. This model conduct the standardized data with various languages by the language support system through the digital forensic analyzer. This model will send the data to law enforcement reviewing whether or not we ought to prove criminal charges. Moreover, law enforcement can access the file system to find out admissibility of evidence. And this model simplifies lawful investigation about additional investigation. The data, which is conducted and saved by the digital forensic system, will be helpful to protect against the future crimes because of the data.

Design of the Web based Mini-PACS (웹(Web)을 기반으로 한 Mini-PACS의 설계)

  • 안종철;신현진;안면환;박복환;김성규;안현수
    • Progress in Medical Physics
    • /
    • v.14 no.1
    • /
    • pp.43-50
    • /
    • 2003
  • PACS mostly has been used in large scaled hospital due to expensive initial cost to set up the system. The network of PACS is independent of the others: network. The user's PC has to be connected physically to the network of PACS as well as the image viewer has to be installed. The web based mini-PACS can store, manage and search inexpensively a large quantity of radiologic image acquired in a hospital. The certificated user can search and diagnose the radiologic image using web browser anywhere Internet connected. The implemented Image viewer is a viewer to diagnose the radiologic image. Which support the DICOM standard and was implemented to use JAVA programming technology. The JAVA program language is cross-platform which makes easier upgrade the system than others. The image filter was added to the viewer so as to diagnose the radiologic image in detail. In order to access to the database, the user activates his web browser to specify the URL of the web based PACS. Thus, The invoked PERL script generates an HTML file, which displays a query form with two fields: Patient name and Patient ID. The user fills out the form and submits his request via the PERL script that enters the search into the relational database to determine the patient who is corresponding to the input criteria. The user selects a patient and obtains a display list of the patient's personal study and images.

  • PDF

The Design and Implementation of HTML-based Intelligent Help System (HTML 기반 지능형 도움말 시스템의 설계 및 구현)

  • 주예찬;권기항
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.2
    • /
    • pp.120-128
    • /
    • 1999
  • This paper proposes the design and implementation of HTML-based Intelligent help system for application developers and users. In existing help systems, developers had to write topics, index, and contents of whole document by themselves. Furthermore those files are linked to one project file, which is in previously compiled form, and user can't modify topics and index information of their help documents. Especially in RAD environments, even though new features or packages are additionally announced, still users should be able to access and replace new help documents with existing ones. But these procedures are very complex in real world. The proposed help system is designed to analyze existing HTML documents, extract help data with regard to user's interest and is facilitated to authorize help contents with the user interface. Removing inconvenience in implementing context-sensitive help contents with the user interface. Removing inconvenience in implementing context-sensitive help system is also considered. In conclusion the proposed system in this paper can be actually useful when adopted into any typical Java RAD such as Bluette for its help system.

  • PDF

Research on Minimizing Access to RDF Triple Store for Efficiency in Constructing Massive Bibliographic Linked Data (극대용량 서지 링크드 데이터 구축의 효율성을 위한 RDF 트리플 저장소 접근 최소화에 관한 연구)

  • Lee, Moon-Ho;Choi, Sung-Pil
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.3
    • /
    • pp.233-257
    • /
    • 2017
  • In this paper, we propose an effective method to convert and construct the MEDLINE, the world's largest biomedical bibliographic database, into linked data. To do this, we first derive the appropriate RDF schema by analyzing the MEDLINE record structure in detail, and convert each record into a valid RDF file in the derived schema. We apply the dual batch registration method to streamline the subject URI duplication checking procedure when merging all RDF files in the converted record unit and storing it in a single RDF triple storage. By applying this method, the number of RDF triple storage accesses for the subject URI duplication is reduced from 26,597,850 to 2,400, compared with the sequential configuration of linked data in units of RDF files. Therefore, it is expected that the result of this study will provide an important opportunity to eliminate the inefficiency in converting large volume bibliographic record sets into linked data, and to secure promptness and timeliness.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

A study on searching image by cluster indexing and sequential I/O (연속적 I/O와 클러스터 인덱싱 구조를 이용한 이미지 데이타 검색 연구)

  • Kim, Jin-Ok;Hwang, Dae-Joon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.779-788
    • /
    • 2002
  • There are many technically difficult issues in searching multimedia data such as image, video and audio because they are massive and more complex than simple text-based data. As a method of searching multimedia data, a similarity retrieval has been studied to retrieve automatically basic features of multimedia data and to make a search among data with retrieved features because exact match is not adaptable to a matrix of features of multimedia. In this paper, data clustering and its indexing are proposed as a speedy similarity-retrieval method of multimedia data. This approach clusters similar images on adjacent disk cylinders and then builds Indexes to access the clusters. To minimize the search cost, the hashing is adapted to index cluster. In addition, to reduce I/O time, the proposed searching takes just one I/O to look up the location of the cluster containing similar object and one sequential file I/O to read in this cluster. The proposed schema solves the problem of multi-dimension by using clustering and its indexing and has higher search efficiency than the content-based image retrieval that uses only clustering or indexing structure.

Engineering Model Design and Implementation of Mass Memory Unit for STSAT-2 (과학기술위성 2호 대용량 메모리 유닛 시험모델 설계 및 구현)

  • Seo, In-Ho;Ryu, Chang-Wan;Nam, Myeong-Ryong;Bang, Hyo-Choong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.11
    • /
    • pp.115-120
    • /
    • 2005
  • This paper describes the design and implementation of engineering model(EM) of Mass Memory Unit(MMU) for Science and Technology Satellite 2(STSAT-2) and the results of integration test. The use of Field-Programmable Gate Array(FPGA) instead of using private electric parts makes a miniaturization and lightweight of MMU possible. 2Gbits Synchronous Dynamic Random Access Memory(SDRAM) module for mass memory is used to store payload and satellite status data. Moreover, file system is applied to manage them easily in the ground station. RS(207,187) code improves the tolerance with respect to Single Event Upset(SEU) induced in SDRAM. The simulator is manufactured to verify receiving performance of payload data.

The Processing of Spatial Joins using a Bit-map Approximation (비트맵 근사 표현을 이용한 효율적인 공간 조인)

  • 홍남희;김희수
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.157-164
    • /
    • 2001
  • This paper studies on the processing of spatial joins. The spatial join operation is divided into filters and refinement steps in general. The processing of spatial joins can be greatly improved by the use of filters that reduce the polygons in order to find the intersecting ones. As a result, three possible sets of answers are identified: the positive one, the negative one and the inconclusive one. To identify all the interesting pairs of polygons with inconclusive answers, it is necessary to have access to the representation of polygons so that an exact geometry test can take place. We introduce a bit-map approximation technique to drastically reduce the computation required by the refinement step during refinement processing. Bit-map representation are used for the description of the internal, the external and the boundary regions of the polygon objects. The proposed scheme increases the chance of trivial acceptance and rejection of data objects, and reduces unnecessary disk accesses in query processing. It has been shown that the reference to the object data file can be cut down by as much as 60%.

  • PDF

Design and Implementation of Web Mail Integration System Using XML (XML을 이용한 웹 메일 통합 시스템의 설계 및 구현)

  • Kwon Jung-Sik;Cho Dae-Jea
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.89-97
    • /
    • 2004
  • Web-Mail Services are implemented with SMTP and POP3 in these days. These web mail services provide not only the basic sending and receiving functions but also additional functions for user. However, the sent and received data are stored in the web mail server. So general web mail users can't process their mail data if they have not access ID for the web mail server. In this paper, we design and implement WMIS (Web Mail Integration System) using XML. In the proposed system, mail data and user's environments in the old web mail system are transformed into XML documents and inserted into database. In order to store XML data into database, we use dynamic document processing method and analyze XML file by record unit. When the users change their mail accounts, they easily can establish the web environments and their mail data. Because the transformed XML document is converted into WML easily, the WMIS can reduce development cost, labors and time.

  • PDF

A Study on the Application Technology of Multi-dimensional Urban geo-spatial Simulation using Digital Image (디지털 영상의 다차원 도시공간 시뮬레이션 적용기술연구)

  • 연상호;박희주;홍일화
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.255-259
    • /
    • 2003
  • The technique of birdeye image generation of terrain through the use of satellite digital images and digital maps are very important elements and have applications in planning establishment as well as the actual design of several construction work in complex fields. This paper studies stereo perspective image generation as a possibility through 3-dimensional analysis combined with digital elevation data and remotely sensed images. For this, first of all, ortho-images generated by very accurate GCP and DEM from contour file makes 3-dimensional terrain analysis possible and allows stereo-viewing at the highway construction planning sites. So, we developed the technical methods for the 3-dimensional approach on the planning sites of highways by use of perspective orthoimages. From this research diverse terrain analysis is possible through stereo perspective image generation, and can leads to various application in road construction through gain study results from access to realtime virtual spatial on the objects area in korea.

  • PDF