• 제목/요약/키워드: Files

검색결과 2,036건 처리시간 0.028초

Distributed database replicator without locking base relations

  • Lee, Wookey;Kang, Sukho;Park, Jooseok
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 1996년도 추계학술대회발표논문집; 고려대학교, 서울; 26 Oct. 1996
    • /
    • pp.93-95
    • /
    • 1996
  • A replication server is considered to be one of the most effective tools to cope with the problems that may be caused by the complex data replications in distributed database systems. In the distributed environment, locking a table is inevitable and it is the main reason to coerce the system practically. This paper presents an Asynchronous Replicator Scheme (ARS) that basically utilizes the system log as files named differential files to refresh the distributed data files with complicated queries, and that it prevents (normally, huge) base tables from being locked. We take join operations as the complicated queries, not only because the join operation covers almost all the operations, but also because it is one of the most time-consuming and data intensive operations in query processings.

  • PDF

Computer Security에 관한 소고 - 사고범죄예방을 중심으로 - (A Study on Computer Security and Controls)

  • 이종철
    • 산업경영시스템학회지
    • /
    • 제4권4호
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

Enhanced resource scheduling in Grid considering overload of different attributes

  • Hao, Yongsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1071-1090
    • /
    • 2016
  • Most of scheduling methods in the Grid only consider one special attribute of the resource or one aspect of QoS (Quality of Service) of the job. In this paper, we focus on the problem that how to consider two aspects simultaneously. Based on the requirements of the jobs and the attributes of the resources, jobs are categorized into three kinds: CPU-overload, memory-overload, and bandwidth-overload jobs. One job may belong to different kinds according to different attributes. We schedule the jobs in different categories in different orders, and then propose a scheduling method-MTS (multiple attributes scheduling method) to schedule Grid resources. Based on the comparisons between our method, Min-min, ASJS (Adaptive Scoring Job Scheduling), and MRS (Multi-dimensional Scheduling) show: (1) MTS reduces the execution time more than 15% to other methods, (2) MTS improves the number of the finished jobs before the deadlines of the jobs, and (3) MTS enhances the file size of transmitted files (input files and output files) and improves the number of the instructions of the finished jobs.

파일유출 방지를 위한 저장장치 제어기법에 대한 연구 (A Study of Storage Device Control Method for File Outflow Protecting)

  • 최주호;류성열
    • 융합보안논문지
    • /
    • 제6권2호
    • /
    • pp.1-11
    • /
    • 2006
  • 클라이언트에 저장된 파일이나 도면등의 자료가 외부로 유출되는 것을 방지하기 위해서는 파일을 생성한 자신도 관리자의 허락 없이는 저장장치로 파일을 저장/복사할 수 없는 제어가 필요하다. 저장장치 제어를 위하여 저장장치를 디바이스와 드라이브로 인식할 수 있어야 하고, 저장장치의 사용을 제어하기 위한 제어값 설정과 저장프로세스를 후킹하여 파일의 저장을 제한 할 수 있는 방법을 연구한다. 이를 수행하기 위하여 파일시스템의 Win32 API함수를 후킹하여 해당드라이브에 설정된 제어값을 참조하고 파일의 저장프로세스를 제어하는 기법을 제안하였다. 제안한 기법이 제어가 설정된 저장장치에 파일을 복사/저장하면 쓰기가 금지되어 제어가 수행됨을 실험으로 확인하였다.

  • PDF

YARA 속도 개선을 위한 새로운 S/W 구조설계 (A New S/W Architecture for YARA Speed Enhancement)

  • 김창훈
    • 한국통신학회논문지
    • /
    • 제41권12호
    • /
    • pp.1858-1860
    • /
    • 2016
  • 논문에서는 YARA의 스캐닝 스레드 알고리즘을 개선하여 다수의 룰 파일 패턴 매칭을 수행할 수 있는 새로운 소프트웨어 구조를 제안한다. 제안하는 방식은 기존의 YARA에 비해 매칭을 위한 룰 파일의 메모리 적재 횟수를 감소시킨다. 따라서 제안된 구조를 적용할 경우 메모리 사용량은 룰 파일의 개수에 비례하여 증가하지만 패턴 매칭 수행에 따른 시간을 감소시킬 수 있다.

Shaping ability of Ni-Ti Rotary files in combination with GT Rotary Ni-Ti file

  • Shin, D.R.;Park, S.J.;Choi, G.W.
    • 대한치과보존학회:학술대회논문집
    • /
    • 대한치과보존학회 2001년도 추계학술대회(제116회) 및 13회 Workshop 제3회 한ㆍ일 치과보존학회 공동학술대회 초록집
    • /
    • pp.573.2-573
    • /
    • 2001
  • The objective of this study was to compare the apical shaping ability of the ProFile .04 taper, Lightspeed and HERO 642 rotary instruments and to assess the combined effect of GT Rotary files to Lightspeed and HERO 642 instruments. Forty-eight resin simulated root canal blocks divided into 4 groups with 12 canals. Forty-eight blocks were prepared by one operator with GT Rotary files using a high torque handpiece at 300 rpm. Thirty-six blocks in the three experimental groups were prepared with ProFile 04 taper file, Lightspeed file, HERO 642 file.(omitted)

  • PDF

분산 환경에서 SysLog기반의 방화벽 통합로그관리시스템 개발 (Development of the SysLog-based Integrated Log Management system for Firewalls in Distributed Network Environments)

  • 이동영;서희석;이을석
    • 디지털산업정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.39-45
    • /
    • 2011
  • Application log files contain error messages; operational data and usage information that can help manage applications and servers. Log analysis system is software that read and parse log files, extract and aggregate information in order to generate reports on the application. In currently, the importance of log files of firewalls is growing bigger and bigger for the forensics of cyber crimes and the establishment of security policy. In this paper, we designed and implemented the SILAS(SysLog-based Integrated Log mAanagement System) in distribute network environments. It help to generate reports on the the log fires of firewalls - IP and users, and statistics of application usage.

금형의 구멍가공을 위한 CAM 소프트웨어 개발 (Development of a CAM Software for Hole Machining of Dies)

  • 주상윤;이상헌
    • 산업공학
    • /
    • 제12권1호
    • /
    • pp.49-55
    • /
    • 1999
  • There are many types of holes to be machined on dies manufactured in the car industry. In this paper we introduce a CAM software developed for hole machining of press dies. The CAM software automatically generates NC files for machining holes from CAD data modeled in the CATIA system. A procedure generating NC files consists of three steps. First, the geometric information such as types of holes, hole positions, hole diameters, and hole depths is extracted from CATIA models. And then tools to be used and operation orders are standardized to establish a data base. Finally, NC files are generated by considering the machining conditions such as feedrate and rpm. It is efficient that holes with the same type and the same size should be grouped and machined by a tool to reduce the tool change time. The optimal tool path for machining the holes in a group can be determined by applying an algorithm solving the traveling salesman problem.

  • PDF

디렉토리 리스팅 취약점 및 대응책 (Vulnerability of Directory List and Countermeasures)

  • 홍성혁
    • 디지털융복합연구
    • /
    • 제12권10호
    • /
    • pp.259-264
    • /
    • 2014
  • 본 논문은 디렉토리 리스팅이란 서버 시스템의 파일을 볼 수 있는 것으로 디렉토리 리스팅의 취약점을 갖고 있는 사이트를 찾는 방법과 보완하는 방법이 무엇이 있는지 알아본다. 검색 사이트인 구글을 이용하여 디렉토리 리스팅 취약점이 있는 사이트를 찾는 법, 구글 검색에 내가 운영하는 사이트가 검색되지 않는 방법과 웹 서버의 운영자가 할 수 있는 취약점 제거 방법을 제시한다.

A Study for the Message Exchange of the EVSE Communication Controller using XML Schema Transformation

  • Un, Koaunghi;Jang, Hyuksoo;Kim, Myongsoo;Kim, Hwimin
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제2권1호
    • /
    • pp.71-81
    • /
    • 2016
  • An EVSE and the EV exchange XML formatted communication messages with each other, whose structure is described by the V2G CI schema in the ISO/IEC 15118 international standard, and the EVSE and the power grid exchange messages based on SCL file with each other, whose structure is described by SCL schema in the IEC 61850 international standard. Because XML files can be restructured by XSLT, V2G messages can be transformed to/from SCL files using XSLT. In this study, the two schemas are analyzed and compared in order for the restructuring of the two differently structured XML instances. As a result, two XSL scripts can be produced for the transformation between XML files conforming ISO/IEC 15118 V2G CI schema and IEC 61850 SCL schema respectively to avoid manual data mapping which can happen in every application development cases.