• 제목/요약/키워드: Files

검색결과 2,031건 처리시간 0.065초

Using Database of Calculus Problems in Teaching of University Level Mathematics

  • Saastamoinen, Kalle;Ketola, Jaakko
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1851-1852
    • /
    • 2005
  • We have created in our university material management environment, which uses database created by using LATEX-files, and LATEX2HTML translator and PHP language. In this paper we will define how these LATEX-files are transformed into our database. In this paper, we present work which we have done for providing the material used in the teaching of calculus to students at Lappeenranta University of Technology. This procedure can be divided into three separate steps: 1) creation of the LATEX-files, 2) implementation of these LATEX-files in 3) conversion of the base LATEX-files to the HTML-files. So far, we have stored hundreds of exercises with hints and solutions on our web server in addition to some theory that we felt is necessary for the students. In this paper we will also discuss the benefits and future of our functioning Web-environment [1].

  • PDF

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • 제12권1호
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

Buckling resistance, bending stiffness, and torsional resistance of various instruments for canal exploration and glide path preparation

  • Kwak, Sang-Won;Ha, Jung-Hong;Lee, WooCheol;Kim, Sung-Kyo;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • 제39권4호
    • /
    • pp.270-275
    • /
    • 2014
  • Objectives: This study compared the mechanical properties of various instruments for canal exploration and glide-path preparations. Materials and Methods: The buckling resistance, bending stiffness, ultimate torsional strength, and fracture angle under torsional load were compared for C+ file (CP, Dentsply Maillefer), M access K-file (MA, Dentsply Maillefer), Mani K-file (MN, Mani), and NiTiFlex K-file (NT, Dentsply Maillefer). The files of ISO size #15 and a shaft length of 25 mm were selected. For measuring buckling resistance (n = 10), the files were loaded in the axial direction of the shaft, and the maximum load was measured during the files' deflection. The files (n = 10) were fixed at 3 mm from the tip and then bent $45^{\circ}$ with respect to their long axis, while the bending force was recorded by a load cell. For measuring the torsional properties, the files (n = 10) were also fixed at 3 mm, and clockwise rotations (2 rpm) were applied to the files in a straight state. The torsional load and the distortion angle were recorded until the files succumbed to the torque. Results: The CP was shown to require the highest load to buckle and bend the files, and the NT showed the least. While MA and MN showed similar buckling resistances, MN showed higher bending stiffness than MA. The NT had the lowest bending stiffness and ultimate torsional strength (p < 0.05). Conclusions: The tested instruments showed different mechanical properties depending on the evaluated parameters. CP and NT files were revealed to be the stiffest and the most flexible instruments, respectively.

파일 은닉을 통한 파일 대상 공격 방어 기법 (A Defense Mechanism Against Attacks on Files by Hiding Files)

  • 최지원;이중희;이규호;유재관;박아란
    • 한국산업정보학회논문지
    • /
    • 제27권2호
    • /
    • pp.1-10
    • /
    • 2022
  • 기만 기술(deception technology)은 허니팟(honeypot)의 확장된 개념으로, 공격자를 기만하여 공격을 탐지, 방지, 또는 지연시키는 기술을 의미한다. 기만 기술은 네트워크 포트, 서비스, 프로세스, 시스템 콜, 데이터베이스 등에 폭넓게 적용되어 왔다. 파일을 대상으로 하는 공격에도 유사한 개념을 적용할 수 있다. 파일을 대상으로 하는 대표적인 공격으로 랜섬웨어가 있다. 랜섬웨어는 사용자의 파일을 몰래 암호화한 후 값을 지불해야 복원할 수 있게 해 주는 멀웨어의 일종이다. 또 다른 예로는 와이퍼 공격으로 시스템에 있는 모든 또는 타겟 파일을 복구 불가능하게 삭제하는 공격이다. 본 논문에서는 이러한 종류의 공격에 대응하기 위한 방법으로 파일을 은닉하는 방법을 제안한다. 파일을 은닉하는 방법은 기존의 백업이나 가상화를 통한 파일 보호 기법에 비해 디스크 용량을 추가로 소비하지 않고 성능 저하도 최소화할 수 있는 장점이 있다.

A Method of Data Hiding in a File System by Modifying Directory Information

  • Cho, Gyu-Sang
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권8호
    • /
    • pp.85-93
    • /
    • 2018
  • In this research, it is proposed that a method to hide data by modifying directory index entry information. It consists of two methods: a directory list hiding and a file contents hiding. The directory list hiding method is to avoid the list of files from appearing in the file explorer window or the command prompt window. By modifying the file names of several index entries to make them duplicated, if the duplicated files are deleted, then the only the original file is deleted, but the modified files are retained in the MFT entry intact. So, the fact that these files are hidden is not exposed. The file contents hiding is to allocate data to be hidden on an empty index record page that is not used. If many files are made in the directory, several 4KB index records are allocated. NTFS leaves the empty index records unchanged after deleting the files. By modifying the run-list of the index record with the cluster number of the file-to-hide, the contents of the file-to-hide are hidden in the index record. By applying the proposed method to the case of hiding two files, the file lists are not exposed in the file explorer and the command prompt window, and the contents of the file-to-hide are hidden in the empty index record. It is proved that the proposed method has effectiveness and validity.

만곡 근관 형성시 니켈-티타늄 파일의 만곡 유지 능력과 그에 대한 유한요소법적 분석 (ABILITY OF NICKEL-TITANIUM FILES IN MAINTAINING THE ORIGINAL CURVATURE OF A CURVED ROOT CANAL AND ITS ANALYSIS BY FINITE ELEMENT METHODS)

  • 박한수;임성삼;배광식;윤수한
    • Restorative Dentistry and Endodontics
    • /
    • 제22권1호
    • /
    • pp.220-227
    • /
    • 1997
  • The purpose of our study is to evaluate the ability of nickel-titanium(NiTi) files in maintaining the original curvature of a curved root canal during canal preparation. Curved canals on translucent resin blocks were prepared with NiTi and stainless steel files, and they were placed at the platform which can reproduce the same position. The unprepared and prepared canal forms were accurately compared by double exposure technique of photography. By finite element methods we also analyzed stress distributions of NiTi and stainless steel files in a curved canal. The results were as follows : 1. NiTi files were excellent in maintaining the original curvature of a curved canal than stainless steel files after canal preparation. 2. The results of canal preparation with these files were well verified by the analysis of stress distributions using finite element methods.

  • PDF

Detecting Android Malware Based on Analyzing Abnormal Behaviors of APK File

  • Xuan, Cho Do
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.17-22
    • /
    • 2021
  • The attack trend on end-users via mobile devices is increasing in both the danger level and the number of attacks. Especially, mobile devices using the Android operating system are being recognized as increasingly being exploited and attacked strongly. In addition, one of the recent attack methods on the Android operating system is to take advantage of Android Package Kit (APK) files. Therefore, the problem of early detecting and warning attacks on mobile devices using the Android operating system through the APK file is very necessary today. This paper proposes to use the method of analyzing abnormal behavior of APK files and use it as a basis to conclude about signs of malware attacking the Android operating system. In order to achieve this purpose, we propose 2 main tasks: i) analyzing and extracting abnormal behavior of APK files; ii) detecting malware in APK files based on behavior analysis techniques using machine learning or deep learning algorithms. The difference between our research and other related studies is that instead of focusing on analyzing and extracting typical features of APK files, we will try to analyze and enumerate all the features of the APK file as the basis for classifying malicious APK files and clean APK files.

글자체파일의 컴퓨터프로그램저작물성 판단에 대한 비판 (Comment on the Copyrightability of Font-files as Computer Program)

  • 정진근
    • 한국소프트웨어감정평가학회 논문지
    • /
    • 제15권2호
    • /
    • pp.17-24
    • /
    • 2019
  • 글자체파일의 무단 이용이 사회적으로 문제가 되고 있다. 이러한 가운데, 우리 법원은 글자체파일을 컴퓨터프로그램으로 인식한다. 글자체를 컴퓨터에서 이용할 수 있도록 디지털화한 글자체파일이 컴퓨터프로그램인가? 이러한 인식은 컴퓨터프로그램과 데이터를 구별하지 못 함으로써 발생하는 것이다. 반면, 전문가들의 인식은 글자체파일을 컴퓨터프로그램으로 인식하지 않는다. 이와 관련하여, 2014년에 INI파일이 컴퓨터프로그램이 아니며, 단지 데이터 파일에 불과하다는 판례가 있었다. 특히, CAD 파일들 역시 외형상 지시명령을 포함하고 있다는 점에서, 대법원의 태도는 컴퓨터프로그램과 데이터 간의 구별을 어렵게 할 뿐이다. 대법원의 판결은 변경될 필요가 있다. 아울러, 글자체파일을 보호하기 위한 새로운 법제도가 마련되어야 한다.

차아염소산나트륨 처리와 멸균법이 근관 치료용 파일의 부식에 미치는 영향에 관한 연구 (THE EFFECT OF NAOCL TREATMENT AND STERILIZATION PROCEDURES ON THE CORROSION OF ENDODONTIC FILES)

  • 양원경;라윤식;이영규;손호현;김미리
    • Restorative Dentistry and Endodontics
    • /
    • 제30권2호
    • /
    • pp.121-127
    • /
    • 2005
  • 근관 치료시 많이 사용되고 있는 $K-flex^{(R)}$ S-S 파일 (Maillefer, USA)과 $Profile^{(R)}$ Ni-Ti 파일 (Maillefer, USA), $K-3^{(R)}$ Ni-Ti파일 (SybronEndo, USA)의 부식 정도를 보기 위하여 총 360개의 20번 file을 1) 멸균소독 방법 (고압가열멸균소독, E-O gas 소독) ,2) 근관세척 액 ($5,25\%$ 차아염소산나트륨, 생리식염수) ,3) 멸균소독 횟수 (1, 5, 10회 ) 에 따라 36개 실험군으로 나누었다. 각각의 파일을 각 군별로 처리한 뒤, 세 명의 검사자가 광학 현미경 하에서 25배의 배율로 검사하여 0; 부식 없음, 1; 경도의 부식, 2; 중등도의 부식, 3; 심한 부식으로 점수화 하였다. 심한 부식을 보이는 파일의 표면은 SEM으로 관찰하였고 Kruskal-Wallis test (p < 0.05)를 이용하여 통계 분석 처리하여 차아염소산나트륨 접촉 여부와 멸균소독 방법의 차이에 의한 부식 정도를 평가하였다. 그 결과 고압가열멸균소독을 10회 시행한 파일은 통계적으로 유의한 차이를 보여 부식 정도가 심하였고, 1회나 5회 고압가열멸균소독을 시행한 파일과 E-O 가스로 소독한 파일들은 부식의 정도가 경미하여 통계적으로 유의하지 않았다. 차아염소산나트륨 접촉 여부와 제조사 혹은 파일 재료에 따른 유의성 있는 차이는 없었다