• Title/Summary/Keyword: File pattern

Search Result 154, Processing Time 0.032 seconds

A Study of Multiple Compression for Malicious Code Execution and Concealment (악성코드 실행과 은닉을 위한 다중 압축 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.299-302
    • /
    • 2010
  • Recently, the malicious code is not easily detectable in the vaccine for the virus, malicious code as a compressed file by modulation pattern is the tendency to delay. Among the many antivirus engines on the market a compressed file that can be modulated by malicious code, and test whether the pattern will need to know. We cover a multi-compressed files, malicious code modulated secreted by examining patterns of test engine is being detected is through a computer simulation. Analysis of secreted activities of malicious code and infect the host file tampering with the system driver files and registry, it gets registered is analyzed. this study will contribute hidden malicious code inspection and enhance vaccine efficacy in reducing the damage caused by malicious code.

  • PDF

Development of PC Controled Automatic Cutting System (PC를 이용한 철판 자동절단시스템 개발)

  • Kim, Sang-Hun;Chung, Kyung-Ryul
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.1
    • /
    • pp.29-37
    • /
    • 1996
  • In this study, PC controlled CNC automatic cutting system is developed. Technological introduction of the control process and the computer programming has made possible not only the automatic control for cutting processing unit but also the easy-to-use graphic software that enables the cutting process. This program involves shape part drawing and amendment, pattern reading and saving, reading Autocad file, nesting process, kerf compensation, automatic cutting path generation, NC file conversion and motor control. Software is devided into 3 modules for easy work. First step enables drawing, amendment and pattern making, followed by automatic nesting and cutting path generation with kerf compensation. In the final step, drawing data is transmitted for the resulting automatic cutting processes. This software would be applicated in gas cutting and textile cutting so that it improves the productivity of cutting process.

  • PDF

A USB DLP Scheme for Preventing Loss of Internal Confidential Files (내부 기밀파일 유출 방지를 위한 USB DLP 기법)

  • Shin, Gyu Jin;Jung, Gu Hyun;Yang, Dong Min;Lee, Bong Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2333-2340
    • /
    • 2017
  • Recently industry is suffering severe losses of important internal information, and most of the leaks result from the insiders. Thus, various technological counter measures are being studied in order to protect private organization information. In this paper, among various internal information leakage path protection mechanisms, we propose a technique for preventing files which are defined as confidential from being copied or moved through USB. The implemented confidential file loss prevention system is composed of both signature insert manager and confidential file detect manager. The signature insert manager allows a system administrator to insert a special pattern specifying a classified confidential file, while the confidential file detect manager protects confidential file leakage when a user attempts to move or copy a confidential file to the USB memory. This results would be contributed to reducing the damage caused by leakage of confidential files outside of the company via USB.

Comparison of Update Performance by File System of Mobile Database SQLite3 (모바일 데이터베이스 SQLite3의 File System별 갱신 성능 비교)

  • Choi, Jin-oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1117-1122
    • /
    • 2020
  • The improving performance and utilizing application fields of mobile devices are getting bigger and wider. With this trend, applications that use database engines on mobile devices are also becoming common. Applications requiring mobile databases include mobile server databases, edge computing, fog computing, and the like. By the way, the most representative and widely used mobile database is SQLite3. In this paper, we test and compare the update performance of SQLite3 by some file systems. The update performance of the file systems in the mobile environment is an important performance factor in the limited H/W environment. The comparison file system was chosen as FAT, Ext2, and NTFS. Under the same conditions, experiments with each file system to test update performance and characteristics were processed. From the experimental results, we could analyze the advantages and disadvantages of each file system for each database update pattern.

A Study on Generation and Operation of Dynamic Pattern at Micro-stereolithography using $DMD^{TM}$ ($DMD^{TM}$를 이용한 마이크로 광 조형 시스템에서 다이나믹 패턴 생성 및 구동에 관한 연구)

  • Kim H.S.;Choi J.W.;Ha Y.M.;Kwon B.H.;Won M.H.;Lee S.H.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.06a
    • /
    • pp.1214-1218
    • /
    • 2005
  • As demands for precision parts are increased, existing methods to fabricate them such as MEMS, LIGA technology have the technical limitations like high precision, high functionality and ultra miniaturization. A micro-stereolithography technology based on $DMD^{TM}$(Digital Micromirror Device) can meet these demands. In this technology, STL file is the standard format as the same of conventional rapid prototyping system, and 3D part is fabricated by stacking layers that are sliced as 2D section from STL file. Whereas in conventional method, the resin surface is cured as scanning laser beam spot according to the section shape, but in this research, we use integral process which enables to cure the resin surface at one time. In this paper, we deal with the dynamic pattern generation and $DMD^{TM}$ operation to fabricate micro structures. Firstly, we address effective slicing method of STL file, conversion to bitmap, and dynamic pattern generation. Secondly, we suggest $DMD^{TM}$ operation and optimal support manufacturing for $DMD^{TM}$ mounting. Thirdly, we examine the problems on continuous stacking layers, and their improvements in software aspects.

  • PDF

Hybrid Buffer Replacement Scheme Considering Reference Pattern in Multimedia Storage Systems (멀티미디어 저장 시스템에서 참조 유형을 고려한 혼성 버퍼 교체 기법)

  • 류연승
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.47-56
    • /
    • 2002
  • Previous buffer cache schemes for multimedia storage systems only exploited the sequential references of multimedia files and didn't consider looping references. However, in some video applications like foreign language learning, users mark the scene as loop area and then application automatically playbacks the scene several times. In this paper, we propose a new buffer replacement scheme, called HBM(Hybrid Buffer Management), for multimedia storage systems that have both sequential and looping references. Proposed scheme assumes that application layer informs reference pattern of files to file system. Then HBM applies an appropriate replacement policy to each file. Our simulation experiments show that HBM outperforms previous buffer cache schemes such as DISTANCE and LRU.

  • PDF

A Pattern Summary System Using BLAST for Sequence Analysis

  • Choi, Han-Suk;Kim, Dong-Wook;Ryu, Tae-W.
    • Genomics & Informatics
    • /
    • v.4 no.4
    • /
    • pp.173-181
    • /
    • 2006
  • Pattern finding is one of the important tasks in a protein or DNA sequence analysis. Alignment is the widely used technique for finding patterns in sequence analysis. BLAST (Basic Local Alignment Search Tool) is one of the most popularly used tools in bio-informatics to explore available DNA or protein sequence databases. BLAST may generate a huge output for a large sequence data that contains various sequence patterns. However, BLAST does not provide a tool to summarize and analyze the patterns or matched alignments in the BLAST output file. BLAST lacks of general and robust parsing tools to extract the essential information out from its output. This paper presents a pattern summary system which is a powerful and comprehensive tool for discovering pattern structures in huge amount of sequence data in the BLAST. The pattern summary system can identify clusters of patterns, extract the cluster pattern sequences from the subject database of BLAST, and display the clusters graphically to show the distribution of clusters in the subject database.

StegoWaveK based on the Correlation Relation (Cover-data의 유사성을 고려한 StegoWaveK)

  • 김영실;김영미;김륜옥;최진용
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.155-164
    • /
    • 2002
  • A design implemented the $\delta$SAcc234bit Mask Data Insertion algorithm that can let the Mask which commercialized Wave Steganography had improved the problem that a filter ring was able to easily become and raised Capacity and extend the width that Cover-data was alternative. Also, it applied 3-Tier file encryption algorithm with a proposal in order to improve a security level of Mask. 3-Tier file encryption algorithm is the algorithm that a specific pattern improved the problem that appeared in Ciphertext according to a file. A design implemented the StegoWaveK model carried out Wave Steganography, using $\delta$SAcc234bit Mask Data Insertion algorithm and the 3-Tier file encryption algorithm that proposed in this paper.

  • PDF

An Accurate Log Object Recognition Technique

  • Jiho, Ju;Byungchul, Tak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.89-97
    • /
    • 2023
  • In this paper, we propose factors that make log analysis difficult and design technique for detecting various objects embedded in the logs which helps in the subsequent analysis. In today's IT systems, logs have become a critical source data for many advanced AI analysis techniques. Although logs contain wealth of useful information, it is difficult to directly apply techniques since logs are semi-structured by nature. The factors that interfere with log analysis are various objects such as file path, identifiers, JSON documents, etc. We have designed a BERT-based object pattern recognition algorithm for these objects and performed object identification. Object pattern recognition algorithms are based on object definition, GROK pattern, and regular expression. We find that simple pattern matchings based on known patterns and regular expressions are ineffective. The results show significantly better accuracy than using only the patterns and regular expressions. In addition, in the case of the BERT model, the accuracy of classifying objects reached as high as 99%.

Evaluation and Forecasting Model for State of Drought in the Irrigation Reservoir (관개저수지의 한발평가 및 예측모형(관개배수 \circled2))

  • 이성희;이재면;김태철
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2000.10a
    • /
    • pp.187-192
    • /
    • 2000
  • The severity of drought could be evaluated by the accumulative rainfall method, soil moisture condition method, storage ratio method, and water supply restriction intensity method, etc. The pattern of drought could be forecast with the most similar pattern of accumulative rainfall out of the file of past rainfall history. The information that how much rainfall should be expected to overcome the present drought could be obtained from the reservoir storage ratio and soil moisture condition.

  • PDF