• Title/Summary/Keyword: first to file system

Search Result 190, Processing Time 0.023 seconds

Secure logging system with self-protecting function (자체 보호 기능을 갖는 안전한 로깅 시스템)

  • Kim, Min-Su;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2442-2450
    • /
    • 1999
  • The audit logging system is to write the details of systems use and access on networks. These details are used for trailing the route, when illegal access or using system resource is occurred on networks. The logging system therefore, might be the first target of intruder. We developed the logging system which writes the information of logging and command execution on UNIX system. And we prepared the self-protecting functions of blocking intruder's attack on the logging system. They are protecting the logging process and the log file. To protect the logging process, we made it keep changing the process ID to avoid the intruder's attack. To protect the log file, we use hard link and mandatory file locking, so it can make it impossible to delete or change log file.

  • PDF

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A Clustering File Backup Server Using Multi-level De-duplication (다단계 중복 제거 기법을 이용한 클러스터 기반 파일 백업 서버)

  • Ko, Young-Woong;Jung, Ho-Min;Kim, Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.657-668
    • /
    • 2008
  • Traditional off-the-shelf file server has several potential drawbacks to store data blocks. A first drawback is a lack of practical de-duplication consideration for storing data blocks, which leads to worse storage capacity waste. Second drawback is the requirement for high performance computer system for processing large data blocks. To address these problems, this paper proposes a clustering backup system that exploits file fingerprinting mechanism for block-level de-duplication. Our approach differs from the traditional file server systems in two ways. First, we avoid the data redundancy by multi-level file fingerprints technology which enables us to use storage capacity efficiently. Second, we applied a cluster technology to I/O subsystem, which effectively reduces data I/O time and network bandwidth usage. Experimental results show that the requirement for storage capacity and the I/O performance is noticeably improved.

The experimental study of the effect of the hybrid instrumentation method with ProTaper and ProFile on the change of root canal area and distance from the canal to the root surface after canal shaping. (ProTaper와 ProFile을 사용한 Hybrid instrumentation method의 근관 형성 전, 후 근관 단면적과 근관벽에서 치근외면까지 최단거리의 변화에 미치는 영향에 대한 실험적 연구)

  • Kim, Seok-Min;Park, Dong-Sung
    • The Journal of the Korean dental association
    • /
    • v.45 no.6 s.457
    • /
    • pp.362-369
    • /
    • 2007
  • The aim of this study was to investigate the effect of the hybrid instrumentation method with ProTaper and ProFile on the change of root canal area and distance from the canal to the root surface after canal shaping. The mesial canals of twenty extracted mandibular first molars having $10-20^{\circ}\Delta$ curvature were scanned using X-ray microcomputed tomography (XMCT)-scanner before root canals were instrumented. They were divided into four groups (n=10 canals ter group). In Group 1, root canals were instrumented by the step-back technique with stainless steel K-Flexofile after coronal flaring. The remainders were instrumented by the crown-down technique with, ProTaper system (Group 2), ProFile (Group 3) or ProTaper (Group 4). All canals were prepared up to size 25 at the end-point of preparation and scanned again. Pre- and post-operative cross-sectional images of 1, 3, 5, and 7 mm from the apical foramen were compared. For each level, change of cross-sectional canal are and distance to the nearest external root surface was calculated using Adobe Photoshop 6.0 and image software program. In the change of cross-sectional area, Group 4 was less than Group 2 at 3 mm and 5 mm level (p<0.05). In the difference of the distance from the canal to the root surface after canal shaping, Group 4 was least among the other groups at 7 mm level (p<0.05). According to the results, the methods using ProFile or K file only and the hybrid instrumentation technique using ProTaper and ProFile are more appropriate methods of canal preparation than ProTaper system for narrow of curved canals.

  • PDF

Effects of the endodontic access cavity on apical debris extrusion during root canal preparation using different single-file systems

  • Tufenkci, Pelin;Yilmaz, Koray;Adiguzel, Mehmet
    • Restorative Dentistry and Endodontics
    • /
    • v.45 no.3
    • /
    • pp.33.1-33.10
    • /
    • 2020
  • Objectives: This study was conducted to evaluate the effects of traditional and contracted endodontic cavity (TEC and CEC) preparation with the use of Reciproc Blue (RPC B) and One Curve (OC) single-file systems on the amount of apical debris extrusion in mandibular first molar root canals. Materials and Methods: Eighty extracted mandibular first molar teeth were randomly assigned to 4 groups (n = 20) according to the endodontic access cavity shape and the single file system used for root canal preparation (reciprocating motion with the RCP B and rotary motion with the OC): TEC-RPC B, TEC-OC, CEC-RPC B, and CEC-OC. The apically extruded debris during preparation was collected in Eppendorf tubes. The amount of extruded debris was quantified by subtracting the weight of the empty tubes from the weight of the Eppendorf tubes containing the debris. Data were analyzed using 1-way analysis of variance with the Tukey post hoc test. The level of significance was set at p < 0.05. Results: The CEC-RPC B group showed more apical debris extrusion than the TEC-OC and CEC-OC groups (p < 0.05). There were no statistically significant differences in the amount of apical debris extrusion among the TEC-OC, CEC-OC, and TEC-RPC B groups. Conclusions: RPC B caused more apical debris extrusion in the CEC groups than did the OC single-file system. Therefore, it is suggested that the RPC B file should be used carefully in teeth with a CEC.

Records Management Systems of the Colonial Chosun Government General (조선총독부의 기록관리제도)

  • Yi, Kyung-Yong
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.226-273
    • /
    • 2004
  • The characteristics of the records management systems of the Japanese colonial government can be summarized as follows. First, the Government General adopted a "decentralized retention" of public records. The Government General did not establish its own archives for central preservation of permanent public records. Colonial agencies established its own records office and the records office managed the records its agency created. Secret records and police records were exception. They were retained by the Secretary Office of the General Affairs Division and Police Division of the Chosun Government General respectively. Second, filing systems and retention periods of the public records followed the hierarchic structure of organization. In the headquarter of the government, records were filed by a "bureau-division-activity-file" classification system and a retention period of a file was given automatically by each unit the file belonged. A closed and cut-off file was retained and arranged according to its creating unit, creating year, and retention period. The filing system was easy to use once the filing system was established well, but to make it work effectively changes in activities and organizations should be on a reflected regular basis. It had an advantageous effect that permanent records could be preserved in a unified way throughout the organization. However, it is very critical to determine the permanent records in a professional way. Selection of the permanent records should be done professionally and in a historical perspective. Otherwise, the records retained as permanent records were not the records having an enduring value. And that was not done by the colonial government. Third, classification and scheduling of records were carried out by a creating division, rather than by the Records Office, mostly from the 1920s. Compilation of the records was also done by the creating agency. It implies that the records management lacked the professionalism. In conclusion, the records management system of the Chosun Government General wes nither modern nor user oriented. It managed the records for solely administrative purpose, i.e. effective colonial rule. The legacy of the colonial records system still exists in the public records system in Korean government. One should criticize the lack of will and efforts to modernize the public records system since the establishment of the Korean government while should reflect the historical origins of the records system in Korea.

A comparison of canal centering abilities of four root canal instrument systems using X-ray micro-computed tomography (방사선 미세컴퓨터단층촬영을 이용한 네 종류 file systems의 중심유지능에 관한 비교)

  • Ko, Hye-Suk;You, Heyon-Mee;Park, Dong-Sung
    • Restorative Dentistry and Endodontics
    • /
    • v.32 no.1
    • /
    • pp.61-68
    • /
    • 2007
  • The purpose of this study was to compare the centering abilities of four root canal instrument systems and the amounts of dentin removed after root canal shaping using them. The mesial canals of twenty extracted mandibular first molars having $10-20^{\circ}$ curvature were scanned using X-ray micro-computed tomography (XMCT)-scanner before root canals were instrumented. They were divided into four groups (n = 10 per group). In Group 1, root canals were instrumented by the step-back technique with stainless steel K-Flexofile after coronal flaring. The remainders were instrumented by the crown-down technique with Profile (Group 2), ProTaper (Group 3) or K3 system (Group 4). All canals were prepared up to size 25 at the end-point of preparation and scanned again. Scanned images were processed to reconstruct three-dimensional images using three-dimensional image software and the changes of total canal volume were measured. Pre-and post-operative cross-sectional images of 1, 3, 5, and 7 mm from the apical foramen were com pared. For each level, centering ratio were calculated using Adobe Photoshop 6.0 and image software program. ProTaper and K3 systems have a tendency to remove more dentin than the other file systems. In all groups, the lowest value of centering ratio at 3 mm level was observed. And except at 3 mm level, ProTaper system made canals less centered than the other systems (p < 0.05).

The Development of Editor for Web Authoring Tool (웹 저작도구를 위한 에디터 개발)

  • 박헌정;김치수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.27-36
    • /
    • 2002
  • The purpose of this study is to develop editor applied to vector image for the distance learning system(FVU), which enables teachers effectively to construct self-page on the screen, to reduce the size of file for teaching, and to correct many different kinds of event which was already made in the previous, The design of the editor is used UML and the editor is named VUEditor. The first page which is needed in class can be constructed by using VUEditor. The contents using VUEditor ore exported into VUAuthor through Vector-transformation. Through this procedure, the size of image file comes to be reduced, it has a low bond width. In conclusion, this VUEditor enables user to construct the first page. even without using such applied program as Image Tool and Power Point, to solve the problem of network traffic for reducing size of the file.

  • PDF

Improving the Reliability and Performance of the YAFFS Flash File System (YAFFS 플래시 파일시스템의 성능과 안정성 향상)

  • Son, Ik-Joon;Kim, Yu-Mi;Baek, Seung-Jae;Choi, Jong-Moo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.9
    • /
    • pp.898-903
    • /
    • 2010
  • Popularity of smartphones such as Google Android phones and Apple iphones, is increasing the demand on more reliable high performance file system for flash memory. In this paper, we propose two techniques to improve the performance of YAFFS (Yet Another Flash File System), while enhancing the reliability of the system. Specifically, we first propose to manage metadata and user data separately on segregated blocks and indexing information piggy-back technique for reducing mount time and also enhancing performance. Second, we tailor the wear-leveling to the segregated metadata and user data blocks. Performance evaluation results based on real hardware system with 1GB NAND flash memory show that the YAFFS with our proposed techniques realized outperforms the original YAFFS by six times in terms of mount speed and five times in terms of benchmark performance, while reducing the average erase count of blocks by 14%.

A Non-Shared Metadata Management Scheme for Large Distributed File Systems (대용량 분산파일시스템을 위한 비공유 메타데이타 관리 기법)

  • Yun, Jong-Byeon;Park, Yang-Bun;Lee, Seok-Jae;Jang, Su-Min;Yoo, Jae-Soo;Kim, Hong-Yeon;Kim, Young-Kyun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.259-273
    • /
    • 2009
  • Most of large-scale distributed file systems decouple a metadata operation from read and write operations for a file. In the distributed file systems, a certain server named a metadata server (MDS) maintains metadata information in file system such as access information for a file, the position of a file in the repository, the namespace of the file system, and so on. But, the existing systems used restrictive metadata management schemes, because most of the distributed file systems designed to focus on the distributed management and the input/output performance of data rather than the metadata. Therefore, in the existing systems, the metadata throughput and expandability of the metadata server are limited. In this paper, we propose a new non-shared metadata management scheme in order to provide the high metadata throughput and scalability for a cluster of MDSs. First, we derive a dictionary partitioning scheme as a new metadata distribution technique. Then, we present a load balancing technique based on the distribution technique. It is shown through various experiments that our scheme outperforms existing metadata management schemes in terms of scalability and load balancing.