• Title/Summary/Keyword: File Restoration

Search Result 23, Processing Time 0.026 seconds

A study on the Restoration of Feature Information in STEPAP224 to Solid model (STEP AP224에 표현된 특징형상 정보의 솔리드 모델 복원에 관한 연구)

  • 김야일;강무진
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.367-372
    • /
    • 2001
  • Feature restoration is that restore feature to 3D solid model using the feature information in STEP AP224. Feature is very important in CAPP, but feature information is defined very complicated in STEP AP224. This paper recommends the algorithm of extraction the feature information in physical STEP AP224file. This program import STEP AP224 file, parse the geometric and topological information, the tolerance data, and feature information line-by-line. After importation and parsing, store data into database. Feature restoration module analyze database including feature information, extract feature information, e.g. feature type, feature's parameter, etc., analyze the relationship and then restore feature to 3D solid model.

  • PDF

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

Restoration of damaged speech files using deep neural networks (심층 신경망을 활용한 손상된 음성파일 복원 자동화)

  • Heo, Hee-Soo;So, Byung-Min;Yang, IL-Ho;Yoon, Sung-Hyun;Yu, Ha-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.2
    • /
    • pp.136-143
    • /
    • 2017
  • In this paper, we propose a method for restoring damaged audio files using deep neural network. It is different from the conventional file carving based restoration. The purpose of our method is to infer lost information which can not be restored by existing techniques such as the file carving. We have devised methods that can automate the tasks which are essential for the restoring but are inappropriate for humans. As a result of this study it has been shown that it is possible to restore the damaged files, which the conventional file carving method could not, by using tasks such as speech or nonspeech decision and speech encoder recognizer using a deep neural network.

Performance Evaluation on Journaling File Systems using Iozone Tool in the Linux : Focus on read, write (리눅스에서 Iozone 도구를 이용한 저널링 파일 시스템 성능 평가 : read, write 중심으로)

  • Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.39-46
    • /
    • 2013
  • If a file system is damaged because of the unusual system close, the system performs the consistency test using fsch and it takes long time. Especially, if it is a big file system, it will take a lot of time. The journaling file system that uses journaling technique, can reduce the restoring time because it uses meta data and it may increase the chance of restoration when restoring. The goal of this paper compared performance evaluation journaling file systems focused on the reading and writing using Iozone tool which is the kernel based benchmarking tool in linux operating system. In this paper, Ex4 which is the current basic Linux file system. is 1.28x faster than XFS file system in terms of file read performance and 1.22x faster than Ext3 file system in terms of file write performance.

Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation (디지털 포렌식 조사에서 효율적인 파일 복구를 위한 레코드 파일 카빙 기법)

  • Park, Minsu;Park, Jungheum;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.93-102
    • /
    • 2013
  • These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don't contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.

Three-dimensional evaluation of the internal adaptation of single and three-unit fixed dental restoration by CAD/CAM milling system (CAD/CAM 밀링 시스템을 활용한 단일 치관과 3본 교의치의 3D 적합도 평가)

  • Kim, So-Ri;Kim, Chong-Myeong;Kim, Woong-Chul;Kim, Ji-Hwan
    • Journal of Technologic Dentistry
    • /
    • v.39 no.1
    • /
    • pp.35-42
    • /
    • 2017
  • Purpose: The purpose of this paper was to evaluate the occurrence of errors regarding adaptation by conducting a three-dimensional assessment comparing the bridge type dental restoration after the cutting process, which has multiple abutments, with a single type dental restoration. Methods: By using ten identical files obtained by scanning the master model, thirty designs were created consisting of ten maxillary right first premolars and ten maxillary right first molars with single crown abutments, along with ten bridge designs with the identical abutment. A 5-axis milling machine was used to produce the design file. The produced denture prostheses were scanned using a silicone replica for a STL file. An evaluation was conducted using 3D analysis software on the master model and each of the thirty data files. Results: The RMS value of the pre-molar (14) was $38.4{\pm}4{\mu}m$ for single and $54.7{\pm}6{\mu}m$ for bridge abutment; therefore, a statistically significant difference was observed for single and bridge designs although both shared the same abutment form (P<.05). Also, the RMS value of the molar (16) was $47.6{\pm}2{\mu}m$ and $56.6{\pm}5{\mu}m$ for the single and bridge designs, respectively, thereby presenting a statistically significant difference (P<.05). Conclusion: As a result, dental prosthesis fabricated using the single method presented better internal adaptation outcomes.

A Study of Method to Restore Deduplicated Files in Windows Server 2012 (윈도우 서버 2012에서 데이터 중복 제거 기능이 적용된 파일의 복원 방법에 관한 연구)

  • Son, Gwancheol;Han, Jaehyeok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1373-1383
    • /
    • 2017
  • Deduplication is a function to effectively manage data and improve the efficiency of storage space. When the deduplication is applied to the system, it makes it possible to efficiently use the storage space by dividing the stored file into chunks and storing only unique chunk. However, the commercial digital forensic tool do not support the file system analysis, and the original file extracted by the tool can not be executed or opened. Therefore, in this paper, we analyze the process of generating chunks of data for a Windows Server 2012 system that can apply deduplication, and the structure of the resulting file(Chunk Storage). We also analyzed the case where chunks that are not covered in the previous study are compressed. Based on these results, we propose the method to collect deduplicated data and reconstruct the original file for digital forensic investigation.

Recovery Corrupted Video Files using Time Information (시간 정보를 활용한 동영상 파일 복원 기법)

  • Na, Gihyun;Shim, Kyu-Sun;Byun, Jun-Seok;Kim, Eun-Soo;Lee, Joong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1492-1500
    • /
    • 2015
  • In recent crime scene, there is the captured crime scene video at least one. So video files recorded on storage media often provide important evidence. Criminals often attempt to destroy storage saved crime scene video. For this reason recovery of a damaged or deleted video file is important to resolve criminal cases in aspects of digital forensic. In the recent, there is a study to recover video file based on video frames, but it is very poor time efficiency when the connecting video frames. This paper proposed advanced frame-based recovery technique of a damaged video files using time information. We suggest a new connecting algorithm to connect video frames using recorded time information in front of video frame. We also evaluate performance in aspects of time and experiment result shows that proposed method improves performance.

Design and Implementation of the Linux Kernel Backdoor Intruder Tracing-Response System (리눅스 커널 백도어 침입자 추적대응시스템 설계 및 구현)

  • Jeon, Wan-Keun
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.43-50
    • /
    • 2005
  • This paper is about the method that chases the Linux kernel backdoor intruder and copes with the kernel backdoor attack. We have a limit to trace the hacker with the current log analysing method because the hacker generally removes the log file and use the forge IP information. I propose the solution to solve the problem with the DeFor system. Through the restoration of the deleted log file, analysis of it and full HDD image, promptly quick response, it is possible to trace hacker spot and reduce hacking damage.

  • PDF

Use of Intraoral Scanners for Fabricating Fixed Restoration: Clinical Tips (구강 스캐너를 사용한 고정성 보철 수복 시 고려사항)

  • Yoon, Hyung-In
    • The Journal of the Korean dental association
    • /
    • v.57 no.9
    • /
    • pp.524-528
    • /
    • 2019
  • With the advances of CAD-CAM (computer-aided design and computer-aided manufacturing) technology, the field of modern clinical dentistry has been dramatically changed. The first step in the digital workflow for tooth-supported dental prosthesis is a data acquisition with intraoral digital or conventional impression techniques. For the accuracy of intraoral digital impression data, the basic principles of conventional impression should be applied. It is necessary to obtain a good visibility with properly-dried field and well-exposed margin of the prepared abutment. Currently, the equi- or supra-gingival finish line can be recommended as an indication for intraoral digital impression. The scan data are generally exported to '.stl' file format, which has only morphological information of black and whitem while '.obj' file format can store data on color and texture.

  • PDF