• Title/Summary/Keyword: Deleted Data

Search Result 219, Processing Time 0.029 seconds

A Study on Design and Implementation of Filtering System on Hurtfulness Site (유해 사이트 필터링에 관한 연구)

  • 장혜숙;강일고;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.636-639
    • /
    • 2002
  • This article is focused on the research for the system design that isolate noxious data from internet for juveniles Normally, by motivating this software which was designed to isolate noxious data, harmful data was deleted or graded But these normal process contains a lot of complexity, for example, essential continual upgrade, grading mistake, etc. So, to solve these fallacy, word-weighting process, where several harmful words which can be optained in internet site are discriminance and weighted, is utilized by using AC machine. At the result, the isolation rate of harmful site rose up to 90%, which means this process is greatly efficient.

  • PDF

Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment (비할당 영역 데이터 파편의 압축 여부 판단과 압축 해제)

  • Park, Bo-Ra;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.175-185
    • /
    • 2008
  • It is meaningful to investigate data in unallocated space because we can investigate the deleted data. However the data in unallocated space is formed to fragmented and it cannot be read by application in most cases. Especially in case of being compressed or encrypted, the data is more difficult to be read. If the fragmented data is encrypted and damaged, it is almost impossible to be read. If the fragmented data is compressed and damaged, it is very difficult to be read but we can read and interpret it sometimes. Therefore if the computer forensic investigator wants to investigate data in unallocated space, formal work of determining the data is encrypted of compressed and decompressing the damaged compressed data. In this paper, I suggest the method of analyzing data in unallocated space from a viewpoint of computer forensics.

Tracking Data through Tracking Data Server in Edge Computing (엣지 컴퓨팅 환경에서 추적 데이터 서버를 통한 데이터 추적)

  • Lim, Han-wool;Byoun, Won-jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.443-452
    • /
    • 2021
  • One of the key technologies in edge computing is that it always provides services close to the user by moving data between edge servers according to the user's movements. As such, the movement of data between edge servers is frequent. As IoT technology advances and usage areas expand, the data generated also increases, requiring technology to accurately track and process each data to properly manage the data present in the edge computing environment. Currently, cloud systems do not have data disposal technology based on tracking technology for data movement and distribution in their environment, so users cannot see where it is now, whether it is properly removed or not left in the cloud system if users request it to be deleted. In this paper, we propose a tracking data server to create and manage the movement and distribution of data for each edge server and data stored in the central cloud in an edge computing environment.

Prediction of the Future Topology of Internet Reflecting Non-monotony (비단조 변화성을 이용한 인터넷의 미래 위상 예측)

  • 조인숙;이문호
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.205-214
    • /
    • 2004
  • Internet evolves into the huge network with new nodes inserted or deleted depending on specific situations. A new model of network topology is needed in order to analyze time-varying Internet more realistically and effectively. In this study the non-monotony models are proposed which can describe topological changes of Internet such as node insertion and deletion, and can be used for predicting its future topology. Simulation is performed to analyze the topology generated by our model. Simulation results show that our proposed model conform the power law of realistic Internet better than conventional ones. The non-monotony model can be utilized for designing Internet protocols and networks with better security.

  • PDF

Estimation of Thermal Behavior for the Machine Origin of Machine Tools using GMOH Methodology (GMOH 기법에 의한 공작기계 원점의 열적거동 예측)

  • 안중용
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1997.10a
    • /
    • pp.213-218
    • /
    • 1997
  • Thermal deformation of machine origin of machine tools due to internal and external heat sources has been the most important problem to fabricate products with higher accuracy and performance. In order to solve this problem, GMDH models were constructed to estimate thermal deformation of machine origin for a vertical machining ceneter through measurement of temperature data of specific points on the machine tool. These models are nonlinear equations with high-order polynomials and implemented in a multilayered perceptron type network structure. Input variables and orders are automatically selected by correlation and optimization procedure. Sensors with small influence are deleted automatically in this algorithm. It was shown that the points of temperature measurement can be reduced without sacrificing the estimation accuracy of $\pm$5${\mu}{\textrm}{m}$. From the experimental result, it was confirmed that GMDH methodology was superior to least square models to estimate the thermal behavior of machine tools.

  • PDF

Forensic Analysis recovery Program and Effective Re-build Deleted Internet History Data (복원 프로그램 동작분석과 삭제된 인터넷 접속기록의 효율적인 복원에 관한 연구)

  • Choi, Un-Young;Lee, Hee-Jo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.52-56
    • /
    • 2008
  • 컴퓨터 시스템을 대상으로 하거나 컴퓨터 시스템을 이용하는 범행의 상당수가 PC방에서 이루어지고 있다. 그러나 불특정 다수의 네티즌들이 이용하는 PC방은 관리상의 용이 등의 이유로 대부분 하드디스크 초기화 프로그램(복원)을 사용하고 있으며, 이와 같은 PC방의 관리 환경은 수사의 직접적인 목적인 증거수집 및 복구을 통하여 실체적 진실발견에 많은 어려움을 초래하고 있다. 본 논문에서는 이와 같은 복원 프로그램의 동작원리를 분석하고, 이를 바탕으로 인터넷 접속기록의 효율적인 복원 방법에 대한 논리적인 접근법을 제시하고, 프로그램 구현을 통한 정확한 디지털 증거수집의 실접근법을 제공한다.

  • PDF

Attitude toward the Website for Apparel Shopping (Part I): Measurement Model Testing (의류 쇼핑 웹사이트 태도 형성 모델 연구 (제1보) -웹사이트 속성, 웹사이트 쇼핑가치, 웹사이트 태도 측정모형 검증-)

  • 홍희숙
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.11
    • /
    • pp.1482-1494
    • /
    • 2004
  • This study identified convergent validity and discriminant validity of measurement variables by factor analysis using Spss program and tested covariance measurement model including latent variables such as the website attributes (interactivity, search and visual information of website), shopping values(utilitarian and hedonic value) and attitude toward website by AMOS program. The data were collected from a sample of 271 internet shopper of university students(male: 82, female: 189). They visited the website for apparel shopping and, after searching a casual clothing which they wanted to buy, requested to answer the questionnaire. The results were as follows: Variables that reduce validity were deleted in the several steps of factor analysis and initial measurement model testing. Final measurement model was constructed by valid variables was accepted. This measurement model will be input for testing causal research model that can explain how attributes of the website influences on consumer attitude toward the website.

Sensitivity Analysis in Latent Root Regression

  • Shin, Jae-Kyoung;Tomoyuki Tarumi;Yutaka Tanaka
    • Communications for Statistical Applications and Methods
    • /
    • v.1 no.1
    • /
    • pp.102-111
    • /
    • 1994
  • We Propose a method of sensitivity analysis in latent root regression analysis (LRRA). For this purpose we derive the quantities ${\beta\limits^\wedge \;_{LRR}}^{(1)}$, which correspond to the theoretical influence function $I(x, y \;;\;\beta\limits^\wedge \;_{LRR})$ for the regression coefficient ${\beta\limits^\wedge}_{LRR}$ based on LRRA. We give a numerical example for illustration and also investigate numerically the relationship between the estimated values of ${\beta\limits^\wedge \;_{LRR}}^{(1)}$ with the values of the other measures called sample influence curve(SIC) based on the recomputation for the data with a single observation deleted. We also discuss the comparision among the results of LRRA, ordinary least square regression analysis (OLSRA) and ridge regression analysis(RRA).

  • PDF

Recovering Files Deleted by Data Wipe on NAND Flash Memory (NAND 플래시 메모리 상에서 데이터 와이프에 의한 삭제 파일 복구 기법)

  • Lim, Yoon-Bin;Shin, Myung-Sub;Park, Dong-Joo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06c
    • /
    • pp.77-79
    • /
    • 2011
  • 최근 플래시 메모리가 디지털 기기의 저장장치로 많이 사용되면서 범죄와 관련하여 중요 증거나 단서가 디지털 기기 내에 저장되는 경우가 많아지고 있다. 이러한 현상은 플래시 메모리에 저장된 데이터는 디지털 포렌식 수사에 도움이 될 가능성이 있기 때문에 와이핑 툴(Wiping Tool)을 사용하여 저장된 데이터를 영구 삭제하게 된다. 플래시 메모리는 덮어쓰기가 불가능하기 때문에 와이핑(Wiping) 되어도 이전 데이터가 남아있는 특성이 있다. 이전 데이터를 복구하기 위해서는 기존 하드디스크 기반의 복구기법으로는 복구하기 어렵다. 최근 연구된 플래시 메모리 복구기법은 메타정보의 의존도가 높은 문제가 있다. 그래서 기존 플래시 메모리 복구기법을 보완하여 플래시 메모리 특성을 이용한 다른 방식의 연구가 필요하다. 본 기법은 플래시 메모리에 데이터 와이프로 삭제된 파일을 검색하고, 검증 절차를 거쳐 파일을 복구하는 기법을 제안한다.

The Development of Assessment Scales for Day Care Programs (어린이집 프로그램 평가척도의 개발을 위한 예비연구)

  • Rhee, Unhai;Song, Hye Rin;Shin, Hye Young;Choi, Hye Yeong
    • Korean Journal of Child Studies
    • /
    • v.23 no.4
    • /
    • pp.199-213
    • /
    • 2002
  • This preliminary study aimed to develop 3 assessment scales for self-evaluation by day care directors and teachers. The development of major areas of evaluation and items as well as evaluation criteria for each item was based on the analysis of related research and major evaluation instruments. A panel of experts in early childhood education examined the contents. The 3 preliminary scales were administered in 87 day care centers; data were analyzed by item response distribution, item discrimination, and reliability of the scales. Items indicating low item discrimination were deleted and minor revisions were made to improve psychometric characteristics of each scale. The final version of the 3 scales is valid for use as self-evaluation instruments by day care directors and teachers.

  • PDF