• Title/Summary/Keyword: Image-virtualization

Search Result 20, Processing Time 0.019 seconds

A Study on the Image-Virtualization in Fashion Illustration (패션 일러스트레이션에서의 이미지 가상화 연구)

  • Kim, Soon-Ja
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.3
    • /
    • pp.505-516
    • /
    • 2008
  • Image which appears in fashion illustration on the late twentieth century is not the representative image as an equivalence to the real fashion styles but the virtual image which bears no relation to any reality. The purpose of this study is review the concept of virtuality and analyze in which way virtual image is expressed in fashion illustrations on the background of Jean Baudrillard's simulacre theory. In post-modem paintings the expression methods of image-virtualization were image mixing through photo-image appropriation, image overlapping, and the icons inserted unreasonably, the focus-out effect through scrubbing and the over-painting on the photograph. Image-virtualization in fashion illustration was expressed through image mixing and expression of image uncertainty. Image mixing was made by photo-image appropriation, image overlapping, connection of heterogeneous images and using interface image, and uncertain image was expressed through the expression of visual ambiguity and virtual movement.

A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery (VMware Workstation 가상 머신 이미지에 대한 디지털 포렌식 조사 절차 및 손상된 이미지 복구 방안)

  • Lim, Sung-Su;Yoo, Byeong-Yeong;Park, Jung-Heum;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.61-70
    • /
    • 2011
  • Virtualization is a technology that uses a logical environment to overcome physical limitations in hardware. As a part of cost savings and green IT policies, there is a tendency in which recent businesses increase the adoption of such virtualization. In particular, regarding the virtualization in desktop, it is one of the most widely used technology at the present time. Because it is able to efficiently use various types of operating systems in a physical computer. A virtual machine image that is a key component of virtualization is difficult to investigate. because the structure of virtual machine image is different from hard disk image. Therefore, we need researches about appropriate investigation procedure and method based on technical understanding of a virtual machine. In this research, we suggest a procedure of investigation on a virtual machine image and a method for a corrupted image of the VMware Workstation that has the largest number of users.

A Study on the Admissibility of the Virtual Machine Image File as a Digital Evidence in Server Virtualization Environment (서버 가상화 환경의 가상머신 이미지에 대한 법적 증거로서의 허용성에 관한 연구)

  • Kim, Dong-Hee;Baek, Seung-Jo;Shim, Mi-Na;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.163-177
    • /
    • 2008
  • As many companies are considering to use server virtualization technology to reduce cost, the crime rates in virtual server environment are expected to be increasing rapidly. The server virtualization solution has a basic function to produce virtual machine images without using any other disk imaging tools, so that investigating virtual servers are more efficient because the investigator only has to collect the virtual machine image and submit it to the court. However, the virtual machine image has no admissibility to be the legal evidence because of security, authenticity, procedural problems in collecting virtual machine images on virtual servers. In this research, we are going to provide requirements to satisfy security, authenticity and chain of custody conditions for the admissibility of the virtual machine image in server virtualization environment. Additionally, we suggest definite roles and driving plans for related organizations to produce virtual machine image as a admissible evidence.

Service Delivery Time Improvement using HDFS in Desktop Virtualization (데스크탑 가상화에서 HDFS를 이용한 서비스 제공시간 개선 연구)

  • Lee, Wan-Hee;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.913-921
    • /
    • 2012
  • The current PC-based desktop environment is being converted into server-based virtual desktop environment due to security, mobility, and low upgrade cost. In this paper, a desktop virtualization system is implemented using an open source-based cloud computing platform and hypervisor. The implemented system is applied to the virtualziation of computer in university. In order to reduce the image transfer time, we propose a solution using HDFS. In addition, an image management structure needed for desktop virtualization is designed and implemented, and applied to a real computer lab which accommodates 30 PCs. The performance of the proposed system is evaluated in various aspects including implementation cost, power saving rate, reduction rate of license cost, and management cost. The experimental results showed that the proposed system considerably reduced the image transfer time for desktop service.

Design and Implementation of a Mapping Manager for a Logical Volume Manager (논리볼륨 관리자를 위한 매핑 관리자의 설계 및 구현)

  • 최영희;유재수;오재철
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.350-362
    • /
    • 2002
  • A new architecture called the Storage Area Network(SAN) was developed in response to the requirements of high availability of data, scalable growth and system performance In order to use SAN more efficiently, must SAN operating systems support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager Days a key role in storage virtualization it realizes the storage virtualization by mapping logical addresses to physical addresses. In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. The mapping method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

Design and Implementation of a Mapping Manager for a Logical Volume Manager (논리볼륨 관리자를 위한 매핑 관리자의 설계 및 구현)

  • 최영희;유재수;오재철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.350-362
    • /
    • 2002
  • A new architecture called the Storage Area Network(SAN) was developed in response to the requirements of high availability of data scalable growth, and system performance. In order to use SAN more efficiently, most SAN operating systems support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. The nin method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

Method of Digital Forensic Investigation of Docker-Based Host (도커 기반 호스트에 대한 디지털 포렌식 조사 기법)

  • Kim, Hyeon Seung;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.75-86
    • /
    • 2017
  • Docker, which is one of the various virtualization technology in server systems, is getting popular as it provides more lightweight environment for service operation than existing virtualization technology. It supports easy way of establishment, update, and migration of server environment with the help of image and container concept. As the adoption of docker technology increases, the attack motive for the server for the distribution of docker images and the incident case of attacking docker-based hosts would also increase. Therefore, the method and procedure of digital forensic investigation of docker-based host including the way to extract the filesystem of containers when docker daemon is inactive are presented in this paper.

An Efficient Logical Volume Manager for SAN (SAN을 위한 효율적인 논리볼륨 관리자)

  • 최영희;남상수;오재철;유재수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.73-85
    • /
    • 2002
  • A new architecture coiled the Storage Area Network(SAN) was developed in response to the requirements of high availability of data, scalable growth, and system performance, In order to use SAN more efficiently, most SAN operating system support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses, In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. Additionally, to aid flexible mapping, we also design and implement free space management method, The mapping method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

A Mapping Method for a Logical Volume Manager in SAN Environment (SAN 논리볼륨 관리자를 위한 매핑 기법)

  • 남상수;송석일;유재수;김창수;김명준
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.718-731
    • /
    • 2003
  • SAN(Storage Area Network) was developed in response to the requirements of high availability of data, scalable growth, and system performance. In order to use the SAN more efficiently, most of the SAN operating software supports storage virtualization concepts that allow users to view physical storage devices of the SAN as a large volume. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses. In this paper, we design and implement an efficient and flexible mapping method for the logical volume manager. Additionally we also design and implement a free space management method for flexible mapping. Our mapping method supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to and from the SAN even while the system is running. To justify our mapping method, we compare it with the mapping method of the GFS (Global File System) through various experiments.

A Study on Digital Play Types of Virtuality through the Play Theory of Roger Caillois (로제카이와의 놀이론을 통한 가상성의 디지털 놀이 유형 연구)

  • Lee, Tae-Eun;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.383-390
    • /
    • 2018
  • The purpose of this study is to find out how the evolution of digital play in virtualization and digital play tools are combined with and stereotyping the properties of traditional play. Virtualization characteristics and play theory were examined and the case was derived in four types and analyzed in four play properties with Roser Cailliois. In the case of Agon, the targets of mutual competition are expanded to singular and plural, computer and oneself of the future, and Mimicry showed the ambiguity of the segments and boundaries crossing the on-off line boundary, and in the case of Alea, the diversity of accident occurrence by immediacy and simultaneity has been strengthened, and in the case of Ilinx, the maximization of immersion has been developed and experimented with a variety of techniques for the utilization of senses and tools and the virtuality for this. As a result, play is developing due to the tendency to expand and coexist in time and space by various fusion combinations.