• Title/Summary/Keyword: 데이터 복제

Search Result 297, Processing Time 0.035 seconds

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

An analysis on the development of a new multicasting method for telecommunication networking (텔레커뮤니케이션 네트워크상 멀티캐스팅 신기술 개발 분석)

  • Cho, Myeong-Rai
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.5 no.3
    • /
    • pp.27-45
    • /
    • 2010
  • It is strongly believed that multicast will become one of the most promising services on internet for the next generation. Multicast service can be deployed either on network-layer or application-layer. IP multicast (network-layer multicast) is implemented by network nodes (i.e., routers) and avoids multiple copies of the same datagram on the same link. Despite the conceptual simplicity of IP multicast and its obvious benefits, it has not been widely deployed since there remain many unresolved issues. As an alternative to IP multicast, overlay multicast (application-layer multicast) implements the multicast functionality at end hosts rather than routers. This may require more overall bandwidth than IP multicast because duplicate packets travel the same physical links multiple times, but it provides an inexpensive, deployable method of providing point-to-multipoint group communication. In this paper we develop an efficient method applied greedy algorithm for solving two models of overlay multicast routing protocol that is aimed to construct MDST (Minimum Diameter Spanning Tree : minimum cost path from a source node to all its receivers) and MST (Minimum Spanning Tree : minimum total cost spanning all the members). We also simulate and analyze MDST and MST.

  • PDF

The aspect and meaning of the digital world view in the anime based on myth (신화를 소재로 한 애니메이션 <고스트 메신저>에 나타난 디지털 세계관의 양상과 의미)

  • Kim, Jin-Chul
    • Cartoon and Animation Studies
    • /
    • s.49
    • /
    • pp.299-323
    • /
    • 2017
  • Interests to cultural prototype as a material of cultural contents are getting more increasing nowadays. One of them is myth. The important thing when you are dealing with the myth as the material that how to convert prototype narratives. Today, digital culture is becoming one of the essential elements of mankind, that is a new sociocultural phenomenon and distinguishing differentiation from the past analogue era. In this regard, the combination of mythology and digital culture is effective strategies for transforming storytelling that can resonate with people who are not familiar with myths. puts the view both of this world and underworld, mythical characters, and various elements of the Grim Reaper into the story. And combines them with digital elements. sets the world that the transcendental soul exists as physically transferred data form. and reinterprets the traditional mythology world into the digitally operated world. Soul-Phone from this anime reflects the digital culture such as storage and transmission, and helps enjoying audiences accept the unfamiliar world of myth. And also It symbolically shows dystopian viewpoints through side effects can caused by digital technology development, such as the instrumentalization of human being, the risk of communication through digital media, and ego-loss caused by duplication, etc. In conclusion, forms a consensus with the audience through the transformation strategy of storytelling that converts the world of myth into the digital world. And it reflects the dystopian view and shows a differentiated world view from the narrative of myth.

Image Encryption and Decryption System using Frequency Phase Encoding and Phase Wrapping Method (주파수 위상 부호화와 위상 랩핑 방법을 이용한 영상 암호화 및 복호화 시스템)

  • Seo, Dong-Hoan;Shin, Chang-Mok;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.6
    • /
    • pp.507-513
    • /
    • 2006
  • In this paper, we propose an improved image encryption and fault-tolerance decryption method using phase wrapping and phase encoding in the frequency domain. To generate an encrypted image, an encrypting key which denotes the product of a phase-encoded virtual image, not an original image, and a random phase image is zero-padded and Fourier transformed and its real-valued data is phase-encoded. The decryption process is simply performed by performing the inverse Fourier transform for multiplication of the encrypted key with the decrypting key, made of the proposed phase wrapping method, in the output plane with a spatial filter. This process has the advantages of solving optical alignment and pixel-to-pixel mapping problems. The proposed method using the virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting from unauthorized people and also can be used as a current spatial light modulator technology by phase encoding of the real-valued data. Computer simulations show the validity of the encryption scheme and the robustness to noise of the encrypted key or the decryption key in the proposed technique.

Overlay Multicast Tree Building Algorithm for MDST and MST in Complete Network (완전 연결된 네트워크에서 MDST와 MST 목적을 갖는 오버레이 멀티캐스트 트리구현 알고리즘)

  • Cho, Myeong-Rai
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.71-89
    • /
    • 2010
  • It is strongly believed that multicast will become one of the most promising services on internet for the next generation. Multicast service can be deployed either on network-layer or application-layer. IP multicast (network-layer multicast) is implemented by network nodes (i.e., routers) and avoids multiple copies of the same datagram on the same link. Despite the conceptual simplicity of IP multicast and its obvious benefits, it has not been widely deployed since there remain many unresolved issues. As an alternative to IP multicast, overlay multicast (application-layer multicast) implements the multicast functionality at end hosts rather than routers. This may require more overall bandwidth than IP multicast because duplicate packets travel the same physical links multiple times, but it provides an inexpensive, deployable method of providing point-to-multipoint group communication. In this paper we develop an efficient method applied greedy algorithm for solving two models of overlay multicast tree building problem that is aimed to construct MDST (Minimum Diameter Spanning Tree : minimum cost path from a source node to all its receivers) and MST (Minimum Spanning Tree : minimum total cost spanning all the members). We also simulate and analyze MDST and MST.

  • PDF

Efficient Fault-Tolerant Multicast on Hypercube Multicomputer System (하이퍼 큐브 컴퓨터에서 효과적인 오류 허용 다중전송기법)

  • 명훈주;김성천
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.273-279
    • /
    • 2003
  • Hypercube multicomputers have been drawing considerable attention from many researchers due to their regular structure and short diameter. One of keys to the performance of Hypercube is the efficiency of communication among processors. Among several communication patterns, multicast is important, which is found in a variety of applications as data replication and signal processing. As the number of processors increases, the probability of occurrences of fault components also increases. So it would be desirable to design an efficient scheme that multicasts messages in the presence of faulty component. In fault-tolerant routing and multicast, there are local information based scheme, global information based scheme and limited information based scheme in terms of information. In general, limited information is easy to obtain and maintain by compressing information in a concise format. In this paper, we propose a new routing scheme and a new multicast scheme using recently proposed fully reachability information scheme and new local information scheme. The proposed multicast scheme increases multicast success possibility and reduce deroute cases. Experiments show that multicast success possibility can increase at least 15% compared to previous method.

Fabrication of complete denture using 3D printing: a case report (3D 프린팅을 이용한 양악 총의치 제작 증례)

  • Lee, Eunsu;Park, Chan;Yun, Kwidug;Lim, Hyun-Pil;Park, Sangwon
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.60 no.2
    • /
    • pp.202-210
    • /
    • 2022
  • Recently with the advance in digital dentistry, the fabrication of dentures using computer-aided design and computer-aided manufacturing (CAD-CAM) is on the rise. The denture designed through a CAD software can be produced in a 3-dimensional manufacturing process. This process includes a subtractive processing method such as milling and an additive processing method such as 3D printing and in which it can be applied efficiently in more complex structures. In this case, complete dentures were fabricated using Stereolithography (SLA)-based 3D printing to shorten the production time and interval of visits in patient with physical disabilities due to cerebral infarction. For definitive impression, the existing interim denture was digitally replicated and used as an individual tray. The definitive impression obtained with polyvinyl siloxane impression material was including information about the inclination and length of the maxillary anterior teeth, vertical dimension, and centric relation. In addition, facial scan data with interim denture was obtained so that it can be used as a reference in determination of the occlusal plane and in arrangement of artificial teeth during laboratory work. Artificial teeth were arranged through a CAD program, and a gingival festooning was performed. The definitive dentures were printed by SLA-based 3D printer using a FDA-approved liquid photocurable resin. The denture showed adequate retention, support, and stability, and results were satisfied functionally and aesthetically.

Conservative Genes among 1,309 Species of Prokaryotes (원핵생물 1,309종의 보존적 유전자)

  • Lee, Dong-Geun
    • Journal of Life Science
    • /
    • v.32 no.6
    • /
    • pp.463-467
    • /
    • 2022
  • As a result of applying the COG (Cluster of Orthologous Groups of Protein) algorithm to 1,309 species to confirm the conserved genes of prokaryotes, ribosomal protein S11 (COG0100) was identified. The numbers of conservative genes were 2, 5, 5, and 6 in 1,308, 1,307, 1,306, and 1,305 species, respectively. Twenty-nine genes were conserved in over 1,302 species, and they encoded 23 ribosomal proteins, 3 tRNA synthetases, 2 translation factors, and 1 RNA polymerase subunit. Most of them were related to protein production, suggesting the importance of protein expression in prokaryotes. The highest conservative COG was COG0048 (ribosomal protein S12) among the 29 COGs. The 29 conserved genes usually have one protein for each prokaryote. COG0090 (ribosomal protein L2) had not only the lowest conservation value but also the largest standard deviation of phylogenetic distance value. As COG0090 is not only a member of the ribosome, but also a regulator of replication and transcription, it could be inferred that prokaryotes have large variations in COG0090 to survive in various environments. This study could provide data necessary for basic science, tumor control, and development of antibacterial agents.

A Study on the Smart(智慧) Museum in China: on the case of Dunhuang Museum, The Palace Museum, China Arts and Crafts Master Museum (중국 스마트(智慧) 박물관에 관한 연구: 둔황 박물관, 고궁 박물관, 중국공예미술대사 박물관 사례를 중심으로)

  • BO KYONG KIM
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.69-74
    • /
    • 2023
  • Smart museums based on the growth of online exhibition can be seen as in line with the movement of the 4th Industrial Revolution. By combining art and technologies, they enable viewers to experience culture and art. This study examined the cases of the Dunhuang Museum, the Palace Museum, and the China Arts and Crafts Master Museum to assess or identify how China is leading by accepting the technology of the fourth industry and applying the technology. In common, Chinese smart museums are widely used for collecting enviromental data, establishing integrated digital applications, and preserving collections, services, management, and exhibitions through VR, and AR. Through the case of the Chinese Smart Museum, this study identified the online exhibition as a space that exists in another dimension rather than an image replica with excellent operational utility. Therefore, online exhibitions are the best medium to expand the space, and viewers can explorethe museum's exhibition room and engage with all the contents of the museum without visiting the museum in person. Through the online exhibition of smart museums, visitors and viewers can be transformed into more active cultural consumers and develop collective capabilities.

Raft-D: A Consensus Algorithm for Dynamic Configuration of Participant Peers (Raft-D: 참여 노드의 동적 구성을 허용하는 컨센서스 알고리즘)

  • Ha, Yeoun-Ui;Jin, Jae-Hwan;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.267-277
    • /
    • 2017
  • One of fundamental problems in developing robust distributed services is how to achieve distributed consensus agreeing some data values that should be shared among participants in a distributed service. As one of algorithms for distributed consensus, Raft is known as a simple and understandable algorithm by decomposing the distributed consensus problem into three subproblems(leader election, log replication and safety). But, the algorithm dose not mention any types of dynamic configuration of participant peers such as adding new peers to a consensus group or deleting peers from the group. In this paper, we present a new consensus algorithm named Raft-D, which supports the dynamic configuration of participant peers by extending the Raft algorithm. For this, Raft-D manages the additional information maintained by participant nodes, and provides a technique to check the connection status of the nodes belonging to the consensus group. Based on the technique, Raft-D defines conditions and states to deal with adding new peers to the consensus group or deleting peers from the group. Based on those conditions and states, Raft-D performs the dynamic configuration process for a consensus group through the log update mechanism of the Raft algorithm.