• Title/Summary/Keyword: Deleted Data

Search Result 219, Processing Time 0.033 seconds

A Proposal on Data Modification Detection System using SHA-256 in Digital Forensics (디지털 포렌식을 위한 SHA-256 활용 데이터 수정 감지시스템 제안)

  • Jang, Eun-Jin;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.9-13
    • /
    • 2021
  • With the development of communication technology, various forms of digital crime are increasing, and the need for digital forensics is increasing. Moreover, if a textual document containing sensitive data is deliberately deleted or modified by a particular person, it could be important data to prove its connection to a particular person and crime through a system that checks for data modification detection. This paper proposes a data modification detection system that can analyze the hash data, file size, file creation date, file modification date, file access date, etc. of SHA-256, one of the encryption techniques, focusing on text files, to compare whether the target text file is modified or not.

A study of descriptive forms of catalogue and searching method for dissertations (학위논문의 목록기술형식 및 검색방법 고찰)

  • 조호일
    • Journal of Korean Library and Information Science Society
    • /
    • v.12
    • /
    • pp.133-160
    • /
    • 1985
  • In college or university libraries, the data of dissertations is one of the important academic information data. But traditional cataloging rules of dissertations and the method of operation is not only didn't unify but also fit to actual circumstances of library. This reason make librarians waste of time and the situation about piling up of unprocessed data don't make library services properly. In this papers, to analyze the above mentioned problems, I have investigated with questionaries about actual examples of construction methods of call number and item describing form of dissertations which is being used now in every college library in Korea. With the replied 61 questionaries which was compared with and investigated to merits and faults about library itself, I have showed revision ways. The characteristics of the revision ways are the followings. 1) Deleted informal and unmeaning descriptions and simplified describing. 2) Recommended to operating one or two kinds describing items which are only necessary. 3) Made call number specifically and then it make us easy to identify data and simultaneously call number can do its original action. 4) shelving range of data is made to colleges, years, departments, majors but in same departments, author's name is recommended by Korean alphabetical ordering. Besides, for proper and systematic management and operating of data. It must be necessary to recommend that reading systems of closed shelves type, incoming and outgoing and shelving by fulltime exclusive charged librarian, separate management of items and data are recommended.

  • PDF

A study on Customer satisfaction and Repurchase intention on Chinese Mobile service

  • SU, Shuai
    • Korean Journal of Artificial Intelligence
    • /
    • v.7 no.1
    • /
    • pp.1-4
    • /
    • 2019
  • This study to investigate Mobile service quality factors influencing on customer satisfaction and repurchase intention for the research purpose. This study collected data by a survey method for an empirical. A total of 340 replies were used for data analysis. While 340 replies were collected from Chinese users of Mobile e-commerce. Our results support previous researches to results of SPSS analysis all of the 7 hypotheses, 4 hypotheses are adopted and 3 are deleted. After an empirical analysis of this study, the academic implications are as follows. As there have not been many academic studies related to mobile commerce quality, this study can be a meaningful framework when quality factors associated with mobile commerce are being analyzed. This paper as the mobile commerce industry is very sensitive to environmental changes, academic research that can be used to cope with these changes is continuously required. Further studies should be carried out to overcome limitations that have not been analyzed by this study.

Object Oriented Design and Implementation of HMI GUI Design Tool

  • Chung Soon Bo;Sun Bok Keun;Han Kwang Rok;Kim Soo Hi
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.751-754
    • /
    • 2004
  • Nowadays a large number of PLCs are being used in automatic machines for factory automation in industry, and HMI is essential for the effective and convenient operation of PLCs. Each screen displayed in actual EMI equipment should be created, modified and deleted using a PC-based editor and it should be composed of necessary display components to express desired OUI. Based object-oriented development methodology, this study designed screen objects representing a editing screen, display components forming the UI of screens and data management objects necessary for data exchange with HIM system and, based on the objects, implemented a HMI screen editor.

  • PDF

A File/Directory Reconstruction Method of APFS Filesystem for Digital Forensics

  • Cho, Gyu-Sang;Lim, Sooyeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.8-16
    • /
    • 2022
  • In this paper, we propose a method of reconstructing the file system to obtain digital forensics information from the APFS file system when meta information that can know the structure of the file system is deleted due to partial damage to the disk. This method is to reconstruct the tree structure of the file system by only retrieving the B-tree node where file/directory information is stored. This method is not a method of constructing nodes based on structural information such as Container Superblock (NXSB) and Volume Checkpoint Superblock (APSB), and B-tree root and leaf node information. The entire disk cluster is traversed to find scattered B-tree leaf nodes and to gather all the information in the file system to build information. It is a method of reconstructing a tree structure of a file/directory based on refined essential data by removing duplicate data. We demonstrate that the proposed method is valid through the results of applying the proposed method by generating numbers of user files and directories.

Study on Decision-making and Control of Personal Data Posted on the Internet (인터넷에 올라와 있는 개인정보의 자기결정권과 통제권에 관한 연구)

  • Yoon, KyungBae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.227-232
    • /
    • 2014
  • Recent development and generalization of Internet technology contributes to the large scale of commerce and capital followed by appearance and growth of large portal sites. As a result, the personal data on the Internet not deleted for a long period of time is a new risk factor, for example, the invasion of people's privacy. In particular, exposing personal data like witch-hunts is a critical issue so that the person concerned cannot carry on with normal life. This study suggests the necessity of the right to request personal data deletion related to a person concerned on Internet sites, a method of introducing the right in Korea, and a method of improving the application.

Effects of Deletion of P, Ca, Zn, Mg, Fe, K, Mn, or Se from Mineral Premix in the Diets Containing $40\%$ Fish Meal on Growth Performance of Juvenile Korean Rockfish (Sebastes schlegeli) (어분이 $40\%$ 함유된 배합사료에 P, Ca, Zn, Mg, Fe, K, Mn과 Se 무 첨가가 조피볼락의 성장에 미치는 효과)

  • LEE Sang-Min;PARK Sung-Real;KIM Tae Jin;MEONG Jeong-In;CHANG YoungJin
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.31 no.2
    • /
    • pp.252-258
    • /
    • 1998
  • A feeding experiment was conducted to investigate the effects of deletion of P, Ca, Zn, Mg, Fe, K, Mn, or Se from mineral premix in the diets containing $40\%$ fish meal on growth performance of juvenile Korean rockfish. Three replicate groups of the fish initially averaging 5.4 g were fed the experimental diets deleted one ot each mineral (P, Ca, Zn, Mg, Fe, K, Mn, Se or all) in the mineral premix for 9 weeks. A basal diet with fish meal ($40\%$), meat meal ($9\%$), soybean meal ($5\%$), corngluten meal ($3\%$), and leather meal ($3\%$) as protein sources were included. Weight gain in fish fed diets deleted Ca, Zn, K, or Se was lower than that of control diet ( P<0.05). Daily feed intake, condition factor, hepatosomatic index and liver chemical composition were not affected by dietary mineral premixes (P>0.05). Apparent skeletal deformities were not observed in the diets deleted each mineral, The data obtained in this study indicate that each of the Ca, Zn, K, or Se should be added in the diet contained $40\%$ fish meal for normal growth of Korean rockfish.

  • PDF

Reassessment of Validity and Reliability of the Tools for Measuring Yangseng -Focused on the Elderly People in Jeonbuk Area- (양생측정도구의 타당도와 신뢰도 재검증 -전북지역 노인을 중심으로-)

  • Jung, Hae-Kyoung;Kwon, So-Hee;Kim, Ae-Jung;Wang, Myoung-Ja;Lee, Ki-Nam
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.9 no.1
    • /
    • pp.17-36
    • /
    • 2005
  • The objective of this study is to present basic data for producing tools to measure Yangseng of the elderly aged older than 65 by reassessing the validity and reliability of such tools already developed. In the present study, total 855 subjects were divided into 4 groups and given 31 question for the ultimate factor analysis of each item. The results cloud be summarized as follows: 1. In case of 'don't have sex in drunken state or right after dinner'(the 31st item of sex live yangseng). factor loading came out proportionally in 3 factors such as factor 4=0.358, factor 5=0.389 and factor 6=0.386. As they all failed to reach the general standard of 0.5 or more and even the minimum standard of 0.4 or more, the 31st item was deleted from the questionnaires. 2. From the factor analysis after exclusion of the 31st item, factor loading of the 25th item of sleep yangseng 'go to bed and get up regularly' appeared to be proportional in 2 factor(factor 4=0.393 and factor 7=0.373). Since it was shown that the 25th item could not be classified into a category but interacted with others in common and didn't satisfy the minimum standard of 0.4, it was deleted form the questionnaires, too. 3. From the factor analysis conducted after excluding the item numbers 31 and 25, factor loading of the 12th item of diet yangseng 'do not eat much' turned out to be relatively high with such values as factor 5=0.518 and factor 3=0.453. As it was, however, tied up with the factor of exercise yangseng, it was also deleted. In conclusion, 28 items after excluding the item numbers 12, 25 and 31 form 4 group showed the same results as divided into 8 factor with high grade of reliability and validity, evidencing the assumption that they can be employed practically to measure yangseng of the elderly aged 65 and oder.

  • PDF

A Query Randomizing Technique for breaking 'Filter Bubble'

  • Joo, Sangdon;Seo, Sukyung;Yoon, Youngmi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.117-123
    • /
    • 2017
  • The personalized search algorithm is a search system that analyzes the user's IP, cookies, log data, and search history to recommend the desired information. As a result, users are isolated in the information frame recommended by the algorithm. This is called 'Filter bubble' phenomenon. Most of the personalized data can be deleted or changed by the user, but data stored in the service provider's server is difficult to access. This study suggests a way to neutralize personalization by keeping on sending random query words. This is to confuse the data accumulated in the server while performing search activities with words that are not related to the user. We have analyzed the rank change of the URL while conducting the search activity with 500 random query words once using the personalized account as the experimental group. To prove the effect, we set up a new account and set it as a control. We then searched the same set of queries with these two accounts, stored the URL data, and scored the rank variation. The URLs ranked on the upper page are weighted more than the lower-ranked URLs. At the beginning of the experiment, the difference between the scores of the two accounts was insignificant. As experiments continue, the number of random query words accumulated in the server increases and results show meaningful difference.

Skew Detection for Thai Printed Document Images

  • Premchaiswad, Wichian;Duangphasuk, Surakarn
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.326-328
    • /
    • 2000
  • The paper proposes the scheme of skew detection for Thai printed document images by using linear regression algorithm. It intends to use with the Thai character recognition systems to reduce the skew detection time. This scheme begins by finding the center of gravity of a document image. This point is used as the starting point for gathering data in the scheme. The data is obtained by scanning incrementally one pixel in vertically with the width of 20-pixels. After the scanning process, if data Is different from it's neighbor more than ${\pm}$ 15 pixels, it will be considered as noise or data in other lines and will be deleted. The last step is the operation by using linear regression algorithm on these selected data and the skew angle will be obtained. The proposed method has been tested with 45 document images with different fonts, sizes and skew angles. The experiment results show that the proposed method can detect the skew angle with the error of less then one degree. The average processing time is about 19 times faster than that of the Hough Transform method.

  • PDF