• Title/Summary/Keyword: Class File

Search Result 111, Processing Time 0.039 seconds

Implementation of MINI-PACS using the DICOM Converter on the Web (DICOM Converter를 이용한 웹상에서의 MINI-PACS 구현)

  • Ji, Youn-Sang
    • Journal of radiological science and technology
    • /
    • v.23 no.1
    • /
    • pp.103-111
    • /
    • 2000
  • In recent years, medical procedures have become more complex, while financial pressures for shortened hospital stays and increased efficiency in patient care have increased. As a result, several shortcomings of present film-based systems for managing medical images have become apparent. Maintaining film space is labor intensive and consumes valuable space. Because only single copies of radiological examinations exist, they are prone to being lost or misplaced, thereby consuming additional valuable time and expense. In this paper, MINI-PACS for image archiving, transmission, and viewing offers a solution to these problems. Proposed MINI-PACS consists of mainly four parts such as Web Module, Client-Server Module, Internal Module, Acquisition Module. In addition, MINI-PACS system includes DICOM Converter that Non-DICOM file format converts standard file format. In Client-Server Module case, Proposed system is combined both SCU(Service Class User: Client) part and SCP(Service Class Provider: Server)part therefore this system provides the high resolution image processing techniques based on windows platform. Because general PACS system is too expensive for Medium and Small hospitals to install and operate the full-PACS. Also, we constructed Web Module for database connection through the WWW.

  • PDF

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

UI4GSD: Design and Implementation of User Interface for Grid Service Development Based on Globus Toolkit 4 (UI4GSD: 글로버스 툴킷 4 기반 그리드 서비스 개발을 위한 사용자 인터페이스의 설계 및 구현)

  • Kim, Hyuk-Ho;Lee, Pil-Woo;Kim, Yang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.45-58
    • /
    • 2007
  • This paper presents UI4GSD (User Interface for Grid Service Development) for grid service developers that provides an efficient and friendly development environment based on Globus Toolkit 4, Normally, implementing grid service requires special expert knowledge for Grid as well as programming, Moreover, grid service development as well as testing of the deployed service in the Globus container takes a long Time, which makes the grid service implementation very inefficient, However, UI4GSD can automatically generate a grid service interface file, a build file, and grid service class files as well as a client class file, using the information supplied by developers through GUI. In UI4GSD, a grid service is developed easily based on typical five step processes with required input data fed at each step. As, a result, UI4GSD can provide an easy and convenient development environment thereby increasing the efficiency and convenience in developing grid services.

  • PDF

Design and Implementation of Transactional Write Buffer Cache with Storage Class Memory (트랜잭션 단위 쓰기를 보장하는 스토리지 클래스 메모리 쓰기 버퍼캐시의 설계 및 구현)

  • Kim, Young-Jin;Doh, In-Hwan;Kim, Eun-Sam;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.247-251
    • /
    • 2010
  • Using SCM in storage systems introduce new potentials for improving I/O performance and reliability. In this paper, we study the use of SCM as a buffer cache that guarantees transactional unit writes. Our proposed method can improve storage system reliability and performance at the same time and can recover the storage system immediately upon a system crash. The Proposed method is based on the LINUX JBD(Journaling Block Device), thus reliability is equivalent to JBD. In our experiments, the file system that adopts our method shows better I/O performance even while guaranteeing high reliability and shows fast file system recovery time (about 0.2 seconds).

Calculation of Dose Distribution for SBRT Patient Using Geant4 Simulation Code (Geant4 전산모사 코드를 이용한 SBRT 환자의 선량분포 계산)

  • Kang, Jeongku;Lee, Jeongok;Lee, Dong Joon
    • Progress in Medical Physics
    • /
    • v.26 no.1
    • /
    • pp.36-41
    • /
    • 2015
  • The Monte Carlo based dose calculation program for stereotactic body radiotherapy was developed in this study. The Geant4 toolkit widely used in the radiotherapy was used for this study. The photon energy spectrum of the medical linac studied in the previous research was applied for the patient dose calculations. The geometry of the radiation fields defined by multi-leaf collimators were taken into account in the PrimaryGeneratorAction class of the Geant4 code. The total of 8 fields were demonstrated in the patient dose calculations, where rotation matrix as a function of gantry angle was used for the determination of the source positions. The DicomHandler class converted the binary file format of the DICOM data containing the matrix number, pixel size, endian type, HU number, bit size, padding value and high bits order to the ASCII file format. The patient phantom was constructed using the converted ASCII file. The EGSnrc code was used to compare the calculation efficiency of the material data.

A Dynamic Service Library Reconfiguration Method of Android Platform (안드로이드 기반 서비스 라이브러리의 동적 재구성)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1145-1153
    • /
    • 2013
  • Android mobile platform copy the class files of all applications installed in android platform and keep them into one directory. But to add the service library into a platform, Android must generate a new binary image of platform and replace the platform because android refer the libraries using the memory-mapped file method in a directory. And this memory-mapped file reference method waste the storage space of mobile device because that directory include the duplicated libraries if the libraries refered by application are duplicated, Therefore a dynamic reconfiguration method on android mobile platform is needed to manage the service libraries of application executed on android platform and support the version management and function addition/modification. In this paper, we propose the platform dynamic reconfiguration method to add dynmically the service libraries on android platform.

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.

The Development of Editor for Web Authoring Tool (웹 저작도구를 위한 에디터 개발)

  • 박헌정;김치수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.27-36
    • /
    • 2002
  • The purpose of this study is to develop editor applied to vector image for the distance learning system(FVU), which enables teachers effectively to construct self-page on the screen, to reduce the size of file for teaching, and to correct many different kinds of event which was already made in the previous, The design of the editor is used UML and the editor is named VUEditor. The first page which is needed in class can be constructed by using VUEditor. The contents using VUEditor ore exported into VUAuthor through Vector-transformation. Through this procedure, the size of image file comes to be reduced, it has a low bond width. In conclusion, this VUEditor enables user to construct the first page. even without using such applied program as Image Tool and Power Point, to solve the problem of network traffic for reducing size of the file.

  • PDF

Analysis of the ROMizer of simpleRTJ Embedded Java Virtual Machine (simpleRTJ 임베디드 자바가상기계의 ROMizer 분석 연구)

  • Yang, Hee-jae
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.397-404
    • /
    • 2003
  • Dedicated-purpose embedded Java system usually takes such model that all class files are converted into a single ROM Image by the ROMizer in the host computer, and then the Java virtual machine in the embedded system executes the image. Defining the ROM Image is a very important issue for embedded system with limited memory resource and low-performance processor since the format directly influences on the memory usage and effectiveness of accessing entries in classes. In this paper we have analyzed the ROMizer and especially the format of the ROM image implemented in the simpleRTJ embedded Jana virtual machine. The analysis says that memory space can be saved up to 50% compared to the original class file and access speed exceeds up to six times with the use of the ROMizer. The result of this study will be applied to develop a more efficient ROMizer for a ROM-based embedded Java system.

Data Consistency-Control Scheme Using a Rollback-Recovery Mechanism for Storage Class Memory (스토리지 클래스 메모리를 위한 롤백-복구 방식의 데이터 일관성 유지 기법)

  • Lee, Hyun Ku;Kim, Junghoon;Kang, Dong Hyun;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.7-14
    • /
    • 2015
  • Storage Class Memory(SCM) has been considered as a next-generation storage device because it has positive advantages to be used both as a memory and storage. However, there are significant problems of data consistency in recently proposed file systems for SCM such as insufficient data consistency or excessive data consistency-control overhead. This paper proposes a novel data consistency-control scheme, which changes the write mode for log data depending on the modified data ratio in a block, using a rollback-recovery scheme instead of the Write Ahead Logging (WAL) scheme. The proposed scheme reduces the log data size and the synchronization cost for data consistency. In order to evaluate the proposed scheme, we implemented our scheme on a Linux 3.10.2-based system and measured its performance. The experimental results show that our scheme enhances the write throughput by 9 times on average when compared to the legacy data consistency control scheme.