DOI QR코드

DOI QR Code

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol (Dept. of Computer Software, Daelim University) ;
  • Lee, Younlae (R&D Center, KGI, LTD.) ;
  • Kim, Hyunah (Division of General Studies, Kyonggi University) ;
  • Jang, Yeonyi (Dept. of Applied Information Technology and Security, Ansan University) ;
  • Park, Minjae (Dept. of Computer Software, Daelim University)
  • 투고 : 2018.09.05
  • 심사 : 2018.10.17
  • 발행 : 2018.12.31

초록

We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

키워드

OTJBCD_2018_v19n6_73_f0001.png 이미지

(Figure 1) Various Types of Disaster Situations

OTJBCD_2018_v19n6_73_f0002.png 이미지

(Figure 2) Complex Desktop Files

OTJBCD_2018_v19n6_73_f0003.png 이미지

(Figure 4) Various Facilities Log Files Management

OTJBCD_2018_v19n6_73_f0004.png 이미지

(Figure 3) Basic Concept for File Management

OTJBCD_2018_v19n6_73_f0005.png 이미지

(Figure 5) File Management Functions

OTJBCD_2018_v19n6_73_f0006.png 이미지

(Figure 6) Main UI of File Management Tool

OTJBCD_2018_v19n6_73_f0007.png 이미지

(Figure 7) Rules Setting UIl

OTJBCD_2018_v19n6_73_f0008.png 이미지

(Figure 8) Result Information View UI

OTJBCD_2018_v19n6_73_f0009.png 이미지

(Figure 9) Unmanaged Directory

OTJBCD_2018_v19n6_73_f0010.png 이미지

(Figure 10) Managed Directory

OTJBCD_2018_v19n6_73_f0011.png 이미지

(Figure 11) Main UI with an Example: 5 conditions setting

OTJBCD_2018_v19n6_73_f0012.png 이미지

(Figure 12) Condition Setting Popup Window UI

OTJBCD_2018_v19n6_73_f0013.png 이미지

(Figure 13) Result Information with an Example

OTJBCD_2018_v19n6_73_f0014.png 이미지

(Figure 14) Result of Unmanaged Directory with an Example

OTJBCD_2018_v19n6_73_f0015.png 이미지

(Figure 15) Result of Managed Directories with an Example

OTJBCD_2018_v19n6_73_f0016.png 이미지

(Figure 16) A Platform and Its Facility Log Management Part (Process-Aware Drone-Equipped 3D Engine and Wireless Control Measurement Platform for Integrated Management of SOC Facilities)

(Table 1) Condition of a Rules

OTJBCD_2018_v19n6_73_t0001.png 이미지

(Table 2) Rule Configurations with an Example

OTJBCD_2018_v19n6_73_t0002.png 이미지

참고문헌

  1. Pung, William, and Andrew Woodward, "Does the use of MIMO Technology used by 802.11 n Reduce or Increase the Impact of Denial of Service Attacks?" 2010. https://doi.org/10.4225/75/57b2b2fb40ce1
  2. Beckman, David, and David Hirsch, "Hard Drive Homicide," ABA JOURNAL, 92, 62-62, 2006. www.abajournal.com/magazine/archives/2006
  3. James, Delores C., et al., "Participation of African Americans in e-Health and m-Health studies: A systematic review," Telemedicine and e-Health, 23.5, 351-364, 2017. https://doi.org/10.1089/tmj.2016.0067
  4. Shavers, Brett. Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard. Newnes, 2013.
  5. Wickramasinghe, Samanthi, and Sunesh Hettiarachchi, "Use of Computer Forensics and Its Implications," 2016.
  6. Collie, Aaron, Lucas Mak, and Shawn Nicholson, "One Stone, Two Birds: Data Assessment Framework for Digital Collection Audit and Preservation," Archiving Conference, Vol. 2011, No. 1, Society for Imaging Science and Technology, 2011. https://www.ingentaconnect.com/content/ist/ac/2011/00002011/00000001;jsessionid=767hh1go7hv1.x-ic-live-02
  7. Workbench, Compuware. "William McKnight's Information Management (Elsever/Morgan Kaufmann)."
  8. Anderson, Wells H. "New backup options to protect your work," GPSolo, 30, 53, 2013. https://heinonline.org/HOL/LandingPage?handle=hein.jo urnals/gpsolo30&div=96&id=&page=
  9. Whitt, Phillip, "Additional Software Products," Pro Freeware and Open Source Solutions for Business. Apress, Berkeley, CA, 235-241, 2015. https://doi.org/10.1007/978-1-4842-1130-4_12
  10. Choi, JongCheon, et al. "A static birthmark for MS windows applications using import address table," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013. https://doi.org/10.1109/IMIS.2013.159
  11. Grimm, Dean. "WinMerge," 2010. http://winmerge.org/?lang=en
  12. Winn, Khine Zar Ne, "Quantifying and Validation of Changeability and Extensibility for Aspect-Oriented Software," International Conference on Advances in Engineering and Technology (ICAET'2014). Singapore. 2014.
  13. Abebe, Surafel Lemma, et al., "Analyzing the evolution of the source code vocabulary," Software Maintenance and Reengineering, 2009. CSMR'09. 13th European Conference on. IEEE, 2009. https://doi.org/10.1109/CSMR.2009.61
  14. Wickramasinghe, Samanthi, and Sunesh Hettiarachchi, "Use of Computer Forensics and Its Implications," 2016.
  15. bt Yusof, Nadiah, Amirah Ismail, and Nazatul Aini Abd Majid. "Deduplication image middleware detection comparison in standalone cloud database," 2016. http://warse.org/IJACST/static/pdf/Issue/icdcb2016sp03.pdf
  16. Seleborg, Svante, "Axantum Strong Software Licensing," Retrieved at<>, Version 0.3, 6, 2004. http://www.axantum.com/AxCrypt/etc/Axantum-Strong-Licensing.pdf
  17. Perkins, Jethro. "Information Management and Technology," 2014. https://info.lse.ac.uk/staff/Services/Policies-and-procedures/Assets/Documents/infSecPol.pdf
  18. Tatli, Emin Islam. "Google reveals cryptographic secrets." Kryptowochenende 2006-Workshop uber Kryptographie Universitat Mannheim. 2006. http://th.informatik.uni-mannheim.de/people/tatli.shtml
  19. Ruengtam, Porntip, "Learning Efficiency in Theoretical Subjects of Interior Architecture by Cooperative/Collaborative Learning Technique," Procedia-Social and Behavioral Sciences, 68, 281-294, 2012. https://doi.org/10.1016/j.sbspro.2012.12.227
  20. Hargreaves, Christopher, and Howard Chivers, "A Virtualisation Based Forensic Computing Research Tool," https://www.researchgate.net/profile/Christopher_Hargreaves/publication/264543639_A_Virtualisation_Based_Forensic_Computing_Research_Tool/links/53e3b5230cf2fb74870db859/A-Virtualisation-Based-Forensic-Computing-Research-Tool.pdf
  21. Agarkhed, Jayashree, and Sumaiyya Joohi, "Smart work for college-be digital." Inventive Computation Technologies (ICICT), International Conference on., Vol. 2. IEEE, 2016. https://doi.org/10.1109/INVENTIVE.2016.7824908
  22. Andrew Tabona, "The Top 20 Free File Management Tools for Sys Admins", TechTalk, July 24, 2013
  23. Minjae Park, et al., "A Process-Aware Drone-Equipped 3D Engine and Wireless Control Measurement Platform for Integrated Management of SOC Facilities," ICACT Transactions on Advanced Communications Technology (ICACT-TACT), November 30, 2017. http://icact.org/upload/2018/0684/20180684_finalpaper.pdf