• Title/Summary/Keyword: file distribution

Search Result 184, Processing Time 0.02 seconds

Optical Character Recognition based Security Document Image File Management System (광학문자인식 기반 보안문서 이미지 파일 관리 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.7-14
    • /
    • 2019
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

File Sharing Algorithm based Mutual Cooperation using Smart Device (스마트 기기를 이용한 상호 협력 기반 파일 공유 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.53-60
    • /
    • 2018
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

Design and Implementation of Relay File for Superdistribution of the Streaming Contents (스트리밍 콘텐츠의 초유통을 위한 중계파일 설계 및 구현)

  • Kim, Tae-Min;Yang, Young-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.979-988
    • /
    • 2009
  • Illegal reproductions and subsequent copyright infringement have curtailed development of digital content industry. Many DRM systems have been developed and utilized for this purpose. However, current DRM system allow only authorized user to access the contents, and as such, redistribution to other user without getting license again entails cumbersome process. Currently, super-distribution system which can be used for redistribution of downloaded contents in more streamlined fashion is being widely conducted. But for streaming type content, it is still very difficult to redistribute with super-distribution system because the client must directly connect to streaming server to access the content. Accordingly, a new DRM streaming service structure is required to allow streamed contents to be redistributed as easily as the downloaded contents. In this paper, we proposed the relay file structure that can connect the streaming server and the user for super-distribution of the streaming contents.

  • PDF

Analyzing errors in selectivity estimation using the multilevel grid file (계층 그리드 화일을 이용한 선택률 추정에서 발생되는 오차 분석)

  • 김상욱;황환규;황규영
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.9
    • /
    • pp.24-36
    • /
    • 1996
  • In this paper, we discuss the errors in selectivity estimation using the multilevel grid file (MLGF). We first demonstrate that the estimatio errors stem from the uniformity assumption that records are uniformly distributed in their belonging region represented by an entry in a level of an MLGF directory. Bsed on this demonstration, we then investigate five factors affecting the accuracy of estimation: (1) the data distribution in a region (2) the number of records stored in an MLFG (3) the page size, (4) the query region size, and (5) the level of an MLFG directory. Next we present the tendancy of estimation errors according to the change of values for each factor through experiments. The results show that the errors decrease when (1) the distribution of records in a region becomes closer to the uniform one, (2) the number of records in an MLFG increases, (3) the page size decreases, (4) the query region size increases, and (5) the level of an MLFG directory employed as data distribution information becomes lower. After the definition of the granule ratio, the core formula representing the basic relationship between the estimation errors and the above five factors, we finally examine the change of estimation errors according to the change of the values for the granule ratio through experiments. The results indicate that errors tend to be similar depending on the values for the granule ratio regardless of the various changes of the values for the five factors. factors affecting the accuracy of estimation:

  • PDF

Energy and Performance-Efficient Dynamic Load Distribution for Mobile Heterogeneous Storage Devices (에너지 및 성능 효율적인 이종 모바일 저장 장치용 동적 부하 분산)

  • Kim, Young-Jin;Kim, Ji-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2009
  • In this paper, we propose a dynamic load distribution technique at the operating system level in mobile storage systems with a heterogeneous storage pair of a small form-factor and disk and a flash memory, which aims at saving energy consumption as well as enhancing I/O performance. Our proposed technique takes a combinatory approach of file placement and buffer cache management techniques to find how the load can be distributed in an energy and performance-aware way for a heterogeneous mobile storage air of a hard disk and a flash memory. We demonstrate that the proposed technique provides better experimental results with heterogeneous mobile storage devices compared with the existing techniques through extensive simulations.

STRESS DISTRIBUTION FOR NITI FILES OF TRIANGULAR BASED AND RECTANGULAR BASED CROSS-SECTIONS USING 3-DIMENSIONAL FINITE ELEMENT ANALYSIS (만곡 근관에서 삼각 혹은 장방형 단면 구조의 니켈-티타늄 파일 응력 분포에 관한 3차원 유한요소 연구)

  • Kim, Hyun-Ju;Lee, Chan-Joo;Kim, Byung-Min;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.1
    • /
    • pp.1-7
    • /
    • 2009
  • The purpose of this study was to compare the stress distributions of NiTi rotary instruments based on their cross-sectional geometries of triangular shape-based cross-sectional design, S-shaped cross-sectional design and modified rectangular shape-based one using 3D FE models. NiTi rotary files of S-shaped and modified rectangular design of cross-section such as Mtwo or NRT showed larger stress change while file rotation during simulated shaping. The stress of files with rectangular cross-section design such as Mtwo, NRT was distributed as an intermittent pattern along the long axis of file. On the other hand, the stress of files with triangular cross-section design was distributed continuously. When the residual stresses which could increase the risk of file fatigue fracture were analyzed after their withdrawal. the NRT and Mtwo model also presented higher residual stresses. From this result, it can be inferred that S-shaped and modified rectangular shape-based files were more susceptible to file fracture than the files having triangular shape-based one.

Study on File Recovery Based on Metadata Accoring to Linux Kernel (리눅스 커널에 따른 메타데이터 기반 파일 복원 연구)

  • Shin, Yeonghun;Jo, Woo-yeon;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.77-91
    • /
    • 2019
  • Recent Linux operating systems having been increasingly used, ranging from automotive consoles, CCTV, IoT devices, and mobile devices to various versions of the kernel. Because these devices can be used as strong evidence in criminal investigations, there is a risk of destroying evidence through file deletion. Ext filesystem forensics has been studied in depth because it can recovery deleted files without depending on the kind of device. However, studies have been carried out without consideration of characteristics of file system which may vary depending on the kernel. This problem can lead to serious situations, such as those that can impair investigative ability and cause doubt of evidence ability, when an actual investigation attempts to analyze a different version of the kernel. Because investigations can be performed on various distribution and kernel versions of Linux file systems at the actual investigation site, analysis of the metadata changes that occur when files are deleted by Linux distribution and kernel versions is required. Therefore, in this paper, we analyze the difference of metadata according to the Linux kernel as a solution to this and recovery deleted file. After that, the investigating agency needs to consider the metadata change caused by the difference of Linux kernel version when performing Ext filesystem forensics.

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

Support Vector Machines-based classification of video file fragments (서포트 벡터 머신 기반 비디오 조각파일 분류)

  • Kang, Hyun-Suk;Lee, Young-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.652-657
    • /
    • 2015
  • BitTorrent is an innovative protocol related to file-sharing and file-transferring, which allows users to receive pieces of files from multiple sharer on the Internet to make the pieces into complete files. In reality, however, free distribution of illegal or copyright related video data is counted for crime. Difficulty of regulation on the copyright of data on BitTorrent is caused by the fact that data is transferred with the pieces of files instead of the complete file formats. Therefore, the classification process of file formats of the digital contents should take precedence in order to restore digital contents from the pieces of files received from BitTorrent, and to check the violation of copyright. This study has suggested SVM classifier for the classification of digital files, which has the feature vector of histogram differential on the pieces of files. The suggested classifier has evaluated the performance with the division factor by applying the classifier to three different formats of video files.

Dynamic License Control in Online Electronic Software Distribution (소프트웨어 온라인 전자 유통에서의 동적 사용권 관리 기술)

  • Ha, Young-Guk;Lim, Shin-Young;Ham, Ho-Sang;Park, Hyo-Joon;Kim, Tai-Yun
    • IE interfaces
    • /
    • v.13 no.1
    • /
    • pp.133-140
    • /
    • 2000
  • As the internet dramatically grows, internet electronic commerce is being increased. But, as products distributed with ESD(Electronic Software Distribution) are in the form of electronic file, it is difficult to prohibit illegal copy of products. Therefore, new technology is needed to distinguish legal products from illegal ones. In this paper, we present the ESD's requirements, characteristics and a new dynamic license management technology to prevent illegal copy.

  • PDF