• Title/Summary/Keyword: Deleted Data

Search Result 221, Processing Time 0.025 seconds

Linear Resource Sharing Method for Query Optimization of Sliding Window Aggregates in Multiple Continuous Queries (다중 연속질의에서 슬라이딩 윈도우 집계질의 최적화를 위한 선형 자원공유 기법)

  • Baek, Seong-Ha;You, Byeong-Seob;Cho, Sook-Kyoung;Bae, Hae-Young
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.563-577
    • /
    • 2006
  • A stream processor uses resource sharing method for efficient of limited resource in multiple continuous queries. The previous methods process aggregate queries to consist the level structure. So insert operation needs to reconstruct cost of the level structure. Also a search operation needs to search cost of aggregation information in each size of sliding windows. Therefore this paper uses linear structure for optimization of sliding window aggregations. The method comprises of making decision, generation and deletion of panes in sequence. The decision phase determines optimum pane size for holding accurate aggregate information. The generation phase stores aggregate information of data per pane from stream buffer. At the deletion phase, panes are deleted that are no longer used. The proposed method uses resources less than the method where level structures were used as data structures as it uses linear data format. The input cost of aggregate information is saved by calculating only pane size of data though numerous stream data is arrived, and the search cost of aggregate information is also saved by linear searching though those sliding window size is different each other. In experiment, the proposed method has low usage of memory and the speed of query processing is increased.

Digital Forensic Investigation of HBase (HBase에 대한 디지털 포렌식 조사 기법 연구)

  • Park, Aran;Jeong, Doowon;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.95-104
    • /
    • 2017
  • As the technology in smart device is growing and Social Network Services(SNS) are becoming more common, the data which is difficult to be processed by existing RDBMS are increasing. As a result of this, NoSQL databases are getting popular as an alternative for processing massive and unstructured data generated in real time. The demand for the technique of digital investigation of NoSQL databases is increasing as the businesses introducing NoSQL database in their system are increasing, although the technique of digital investigation of databases has been researched centered on RDMBS. New techniques of digital forensic investigation are needed as NoSQL Database has no schema to normalize and the storage method differs depending on the type of database and operation environment. Research on document-based database of NoSQL has been done but it is not applicable as itself to other types of NoSQL Database. Therefore, the way of operation and data model, grasp of operation environment, collection and analysis of artifacts and recovery technique of deleted data in HBase which is a NoSQL column-based database are presented in this paper. Also the proposed technique of digital forensic investigation to HBase is verified by an experimental scenario.

Artificial Intelligence Algorithms, Model-Based Social Data Collection and Content Exploration (소셜데이터 분석 및 인공지능 알고리즘 기반 범죄 수사 기법 연구)

  • An, Dong-Uk;Leem, Choon Seong
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.23-34
    • /
    • 2019
  • Recently, the crime that utilizes the digital platform is continuously increasing. About 140,000 cases occurred in 2015 and about 150,000 cases occurred in 2016. Therefore, it is considered that there is a limit handling those online crimes by old-fashioned investigation techniques. Investigators' manual online search and cognitive investigation methods those are broadly used today are not enough to proactively cope with rapid changing civil crimes. In addition, the characteristics of the content that is posted to unspecified users of social media makes investigations more difficult. This study suggests the site-based collection and the Open API among the content web collection methods considering the characteristics of the online media where the infringement crimes occur. Since illegal content is published and deleted quickly, and new words and alterations are generated quickly and variously, it is difficult to recognize them quickly by dictionary-based morphological analysis registered manually. In order to solve this problem, we propose a tokenizing method in the existing dictionary-based morphological analysis through WPM (Word Piece Model), which is a data preprocessing method for quick recognizing and responding to illegal contents posting online infringement crimes. In the analysis of data, the optimal precision is verified through the Vote-based ensemble method by utilizing a classification learning model based on supervised learning for the investigation of illegal contents. This study utilizes a sorting algorithm model centering on illegal multilevel business cases to proactively recognize crimes invading the public economy, and presents an empirical study to effectively deal with social data collection and content investigation.

  • PDF

Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones (스마트폰 플래시 메모리 이미지 내의 단편화된 페이지 분석 기법 및 구현)

  • Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.827-839
    • /
    • 2012
  • A cell phone is very close to the user and therefore should be considered in digital forensic investigation. Recently, the proportion of smartphone owners is increasing dramatically. Unlike the feature phone, users can utilize various mobile application in smartphone because it has high-performance operating system (e.g., Android, iOS). As acquisition and analysis of user data in smartphone are more important in digital forensic purposes, smartphone forensics has been studied actively. There are two way to do smartphone forensics. The first way is to extract user's data using the backup and debugging function of smartphones. The second way is to get root permission, and acquire the image of flash memory. And then, it is possible to reconstruct the filesystem, such as YAFFS, EXT, RFS, HFS+ and analyze it. However, this methods are not suitable to recovery and analyze deleted data from smartphones. This paper introduces analysis techniques for fragmented flash memory pages in smartphones. Especially, this paper demonstrates analysis techniques on the image that reconstruction of filesystem is impossible because the spare area of flash memory pages does not exist and the pages in unallocated area of filesystem.

The development of the critical pathway for hysterectomy patients and its effect (자궁절제술 환자의 표준진료지침(Critical pathway) 개발과 적용효과)

  • Kim, Kyung-Hee;Seo, Young-Seung;Tae, Young-Sook;Lee, Hwa-Ja;Jeon, Sung-Sook
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.6 no.1
    • /
    • pp.123-134
    • /
    • 2000
  • This study intended to analyze the effectiveness to obtain by developing the critical pathway presented as the method to improve the quality-betterment and cost effectiveness the through the continuous and consistent patient management for the hysterectomy patient and applying it to the real practice. This study was designed to develop and effect the critical pathway for hysterectomy patients in the way to be possible the intergrated in patient management. It was adopted the process of seven phase to develop a critical pathway. To analyze the application effect of the developed critical pathway, this author offered health care service applying the critical pathway to the hysterectomy patient from July. 20 to Oct. 19. 1999. The study method had been done by investigating the experimental group and control group through the questionnaire on 40 patients who had been inpatient hysterectomy. Dependent variables were measured by modified from satisfaction, and cost and length of hospital stay. The data anlyzed by frequency, x2-test, t-test. The results of this study was as follows; 1. It was decided that the vertical line of the critical pathway was made up of eight items such as monitoring/assessment, treatment, activity, medication, consult. Lab test, diet, patient teaching and horizontal line was 7days from admission to discharge. 2. After the verifying the validity of the expert group about the critical pathway, the horizontal line was amended from hospitalization to five postoperative days and taking their consensus, some contents of the horizontal line was amended and deleted. 3. There was no significant differences in the experimental group and control group in the satisfaction, and significant differences in the cost, the length of hospital stay.

  • PDF

The Classification Algorithm of Users' Emotion Using Brain-Wave (뇌파를 활용한 사용자의 감정 분류 알고리즘)

  • Lee, Hyun-Ju;Shin, Dong-Il;Shin, Dong-Kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.122-129
    • /
    • 2014
  • In this study, emotion-classification gathered from users was performed, classification-experiments were then conducted using SVM(Support Vector Machine) and K-means algorithm. Total 15 numbers of channels; CP6, Cz, FC2, T7. PO4, AF3, CP1, CP2, C3, F3, FC6, C4, Oz, T8 and F8 among 32 members of the channels measured were adapted in Brain signals which indicated obvious the classification of emotions in previous researches. To extract emotion, watching DVD and IAPS(International Affective Picture System) which is a way to stimulate with photos were applied and SAM(Self-Assessment Manikin) was used in emotion-classification to users' emotional conditions. The collected users' Brain-wave signals gathered had been pre-processing using FIR filter and artifacts(eye-blink) were then deleted by ICA(independence component Analysis) using. The data pre-processing were conveyed into frequency analysis for feature extraction through FFT. At last, the experiment was conducted suing classification algorithm; Although, K-means extracted 70% of results, SVM showed better accuracy which extracted 71.85% of results. Then, the results of previous researches adapted SVM were comparatively analyzed.

Secret Sharing based on DCT using XOR (배타적 논리합을 사용한 DCT 기반의 비밀공유)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.13-19
    • /
    • 2014
  • In general, if a secret of company is owned by a person, the secret is the most vulnerable to attack of hacking. Secret sharing is a solution to solve such a problem. To share the secret to many people not one, it is possible to restore secret when the secret is being stolen by someone. That is, secret sharing, a strong method, was proposed to keep secret information from the robbery. Until now, most secret sharing schemes were based on spatial domain. The hidden data based on spatial domain is easily deleted since a transformation of digital formats (i.e., jpeg to bmp or vise versa). In this paper, we proposed our scheme for complement to resist various attack of cover image as distributing secrets based on DCT of JPEG using exclusive-or operation. The result of experiments proved that the proposed scheme restore original secret.

A Study on the Development of an Infertility Stress Scale (불임 스트레스 척도 개발에 관한 연구)

  • 김선행;박영주;장성옥
    • Journal of Korean Academy of Nursing
    • /
    • v.25 no.1
    • /
    • pp.141-155
    • /
    • 1995
  • The objective of this study was to develop a scale to measure stress in infertile couples and to test its reliability and validity. Prior to item generation, a basic decision was made to conceptualize stress in infertile couples as including two dimensions and four subdimensions. The dimensions were, intrapersonal stress including cognitive and affective stress, and interpersonal stress including marital and social stress. Initially 95 items were generated from the inter-view data of 31 primary or secondary infertile women and from a literature review. These items were analyzed through the Index of Content Validity(CVI) and 69 items were selected which met 70% or more of the CVI. This preliminary Infertility Stress Scale were analyzed for reliability and construct validity. Item analysis and factor analysis were applied for construct validity. Forty items were selected through item analysis. This procedure was based on the inter-item correlation matrix, a corrected average inter-item correlation coefficient(.30~.70), a corrected item to total correlation coefficient (.03 or more) and information about the alpha estimate if this item was dropped from the scale. The result of the initial factor analysis including varimax rotation produced eight factors. Five items deleted because of factor complexity(indiscriminate factor loadings). The secondary factor analysis including varimax rotation produced seven factors that coincided with the conceptual framework posed for the scale developed. The seven factors were labeled as ‘meaning of children’,‘worthiness’,‘tenacious linking’,‘marital satisfaction’,‘sexual satisfaction’,‘familial adjustment’ and ‘social adjustment’. The alpha coefficient relating to internal consistency was .93 for reliability The results of this study suggest that the measurement derived from the Infertility Stress Scale is useful in assessing the stress of infertile couples.

  • PDF

Assessment of MARS Multi-dimensional Two-phase Turbulent Flow Models for the Nuclear System Analysis (발전소 계통해석을 위한 MARS 코드의 다차원 이상 난류 유동 모델 검증계산)

  • Lee S.M.;Lee U.C.;Bae S.W.;Chung B.D.
    • Journal of Energy Engineering
    • /
    • v.15 no.1 s.45
    • /
    • pp.1-7
    • /
    • 2006
  • The multi-dimensional two-phase flow models were developed for analyze the multi-dimensional behaviors or nuclear systems. To verify the simple turbulence model, The single phase mixing problem in a rectangular slab was calculated and compared with the commercial CFD code results. That result shows a good agreement with the CFD result. And the RPI Air-water experiments were simulated to assess the two-phase turbulence model in the multi-dimensional component. The first calculated distribution or void-fraction is highly dispersed and diffusive. It was revealed that the main reason is undesirable stratification force in a horizontal stratified flow regimes. Therefore the horizontally stratified flow regime is deleted because the stratified flow regime is not expected in multi-dimensional flow. With the modification of the flow regime, the predicted flow patterns and void fraction profiles are in good agreement with the measured data.

Effects of Herbal treatment for In-patients with Mild Fever: Retrospective Clinical Study

  • Lee, Sun-Ju;Han, In-Sik;Oh, Hyun-Suk;Lee, Dong-Jin;Yoon, Jeung-Won;Choi, Ga-Young;Hong, Sun-Gi;Lee, Won-Chul;Sun, Seung-Ho
    • The Journal of Korean Medicine
    • /
    • v.32 no.6
    • /
    • pp.122-130
    • /
    • 2011
  • Objectives: This study was designed to investigate the effect of herbal extract medicines for inpatients with fever symptoms in an oriental medicine hospital. Methods: Medical records of inpatients who experienced over $38^{\circ}C$ of fever from July 2010 to August 2011 has been requested with deleted personal identifiable information. The requested data were analyzed by patients' general characteristics, administrated western/herbal medicines, and changes in the body temperature of four administration groups (group 1, herbal extract medicine only; group 2, western medication(antibiotics/antipyretics) only; group 3, combination of herbal extract medicine and western medication; group 4, no medication control). The SPSS 19.0 was used for statistical analysis and p-value of less than 0.05 was regarded significant. Results: The body temperature has significantly dropped over time in the herbal extract medicine only group (p<0.001) along with the antibiotics/antipyretics only group. When both treatments were combined, stronger antipyretic effect was shown compared to the sole treatment of herbal extract medicine or antibiotics/antipyretics. Conclusion: The use of herbal extract medicines may be effective in alleviation of fever.