• Title/Summary/Keyword: K-file

Search Result 1,997, Processing Time 0.027 seconds

Design of System for Avoiding upload of Identical-file using SA Hash Algorithm (SA 해쉬 알고리즘을 이용한 중복파일 업로드 방지 시스템 설계)

  • Hwang, Sung-Min;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.81-89
    • /
    • 2014
  • In this paper, we propose SA hash algorithm to avoid upload identical files and design server system using proposed SA hash algorithm. Client to want to upload file examines the value of SA hash and if the same file is found in server system client use the existing file without upload. SA hash algorithm which is able to examine the identical-file divides original file into blocks of n bits. Original file's mod i bit and output hash value's i bit is calculated with XOR operation. It is SA hash algorithm's main routine to repeat the calculation with XOR until the end of original file. Using SA hash algorithm which is more efficient than MD5, SHA-1 and SHA-2, we can design server system to avoid uploading identical file and save storage capacity and upload-time of server system.

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

Design and Implementation of a System Call Interface for Supporting File Partial Encryption (파일 부분 암호화 지원을 위한 시스템 호출의 설계 및 구현에 관한 연구)

  • Seo, Hye-In;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.557-567
    • /
    • 2018
  • There are currently various file encryption solutions for encrypting and storing files on disk. However, the existing file encryption solutions handle encryption and decryption all at once by file or directory. In this paper, we propose a system call supporting partial encryption function of the file. The user sets the encryption information with the system call interface at a portion where encryption of the file data is desired. And then the user writes file data, the data is encrypted and stored. Also if the user sets decryption information and reads the file data, the necessary part is decrypted by applying the set information. For the proposed system call, It consists of inspection module, management module, encryption module, decryption module, and HMAC module as per required system call. And it was implemented on the Linux environment. Also the operation of implemented system call was verified on the development board, and the performance was analyzed by measuring performance speed.

THE ANALYSIS OF INITIAL APICAL FILE SIZE BEFORE AND AFTER CORONAL FLARING (Coronal flaring 전, 후 초기근관장 파일크기의 분석)

  • Hwang, Ho-Keel;Park, Chan-Ho;Bae, Seong-Chul
    • Restorative Dentistry and Endodontics
    • /
    • v.28 no.1
    • /
    • pp.64-71
    • /
    • 2003
  • The purpose of this study was to compare the initial apical file(IAF) first Ole that fits to the apex in each canal before and after early flaring to analyze if the size of file to fit to the apex would increase after flaring. Eighty anterior teeth with complete apical formation and patent foramens were selected. The samples were randomly divided into 4 groups(GG, OS, GT, PT Group) of 20 teeth each. A file was fit to the apex in each canal and that size recorded. Radicular flaring were completed using different types of instruments. After flaring a file was again fit to the apex in the same manner as before and its size recorded. The results of this study were as follows : 1. The mean diameter of IAF before flaring(file diameters in $mm{\times}10^{-2}$) was $19.81{\pm}8.32$ before and $25.94{\pm}9.21$ after(p<0.05). 2. The increase in diameter of IAF was approximately one file size for all groups. 3. Ranking of increasing diameter of IAF were GG>CT>OS>PT group. There was a statistically significant difference between before and after flaring(p<0.05). 4 Ranking of the time for flaring were GG>GT>OS>PT group. There was a statistically significant difference between GG group and other groups(p<0.05). 5. In the case without change of IAF diameter, they showed decrease in force after flaring when IAF was pulled out from root canal(p<0.05). This study suggested that early radicular flaring increases the file size that is snug at the apex, and awareness of that difference gives the clinician a better sense of canal size. Early flaring of the canal provides better apical size information and with this awareness, a better decision can be made concerning the appropriate final diameter needed for complete apical shaping.

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.

Influence of operator's experience level on lifespan of the WaveOne Primary file in extracted teeth

  • Saleh, Abdulrahman Mohammed;Tavanafar, Saeid;Vakili-Gilani, Pouyan;Al Sammerraie, Noor Jamal;Rashid, Faahim
    • Restorative Dentistry and Endodontics
    • /
    • v.38 no.4
    • /
    • pp.222-226
    • /
    • 2013
  • Objectives: The aim of this study was to assess the influence of operator experience level on the lifespan of the WaveOne Primary file (Dentsply Maillefer, Ballaigues, Switzerland) in extracted teeth. Materials and Methods: Moderately curved canals of extracted maxillary and mandibular molars were randomly distributed into 2 groups: experienced and inexperienced operators. Ten files were allocated to each group (n = 10). Each canal was prepared until the working length was reached, and the same file was used to prepare additional canals until it separated. The number of canals prepared before file separation was recorded. The fragment length of each file was measured, and the location of the fragment in the canal was determined. Data were statistically analysed using the independent 2-sample t-test. Results: The 2 operators prepared a total of 324 moderately curved canals of maxillary and mandibular molars. There was no significant intergroup difference in the mean number of canals prepared (p = 0.27). The average lifespan of the WaveOne Primary file was 17.1 and 15.3 canals, and the longest lifespan was 25 and 20 canals, when used by experienced and inexperienced operators, respectively. There were no statistically significant intergroup differences in separated fragment length and location. Conclusions: Within the limitations of this study, operator experience level appears to have no effect on the lifespan of the WaveOne Primary file in preparation of moderately curved canals. Single teeth with multiple canals can be prepared safely even by a novice operator by using a single file.

A Hiding Original App Method by Altering Android DexClassLoader Execution Flow (안드로이드 덱스클래스로더 실행흐름 변경을 통한 원본 앱 노출 방지 기법)

  • Jo, Honglae;Choi, Joontae;Ha, Dongsoo;Shin, Jinseop;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1271-1280
    • /
    • 2017
  • The android packer service using runtime execution compression technology switches to the original application using DexClassLoader. However the API interface of the DexClassLoader receives the path of the loaded DEX(Dalvik EXcutable) and the path of the compiled file. So there is a problem that the original file is exposed to the file system. Therefore, it is not safe to use the API for the packer service. In this paper, we solve this problem by changing the compile and load flow of the DexClassLoader API. Due to this changed execution flow, the complied file can be encrypted and stored in the file system or only in the memory and it can be decrypted or substituted at the time of subsequent loading to enable the original application conversion. we expected that the stability of the packer will increase beacause the proposed method does not expose the original file to the file system.

Effect of repetitive pecking at working length for glide path preparation using G-file

  • Ha, Jung-Hong;Jeon, Hyo-Jin;Abed, Rashid El;Chang, Seok-Woo;Kim, Sung-Kyo;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.40 no.2
    • /
    • pp.123-127
    • /
    • 2015
  • Objectives: Glide path preparation is recommended to reduce torsional failure of nickel-titanium (NiTi) rotary instruments and to prevent root canal transportation. This study evaluated whether the repetitive insertions of G-files to the working length maintain the apical size as well as provide sufficient lumen as a glide path for subsequent instrumentation. Materials and Methods: The G-file system (Micro-Mega) composed of G1 and G2 files for glide path preparation was used with the J-shaped, simulated resin canals. After inserting a G1 file twice, a G2 file was inserted to the working length 1, 4, 7, or 10 times for four each experimental group, respectively (n = 10). Then the canals were cleaned by copious irrigation, and lubricated with a separating gel medium. Canal replicas were made using silicone impression material, and the diameter of the replicas was measured at working length (D0) and 1 mm level (D1) under a scanning electron microscope. Data was analysed by one-way ANOVA and post-hoc tests (p = 0.05). Results: The diameter at D0 level did not show any significant difference between the 1, 2, 4, and 10 times of repetitive pecking insertions of G2 files at working length. However, 10 times of pecking motion with G2 file resulted in significantly larger canal diameter at D1 (p < 0.05). Conclusions: Under the limitations of this study, the repetitive insertion of a G2 file up to 10 times at working length created an adequate lumen for subsequent apical shaping with other rotary files bigger than International Organization for Standardization (ISO) size 20, without apical transportation at D0 level.

Design of a NAND Flash Memory File System to Improve System Boot Time

  • Park, Song-Hwa;Lee, Tae-Hoon;Chung, Ki-Dong
    • Journal of Information Processing Systems
    • /
    • v.2 no.3 s.4
    • /
    • pp.147-152
    • /
    • 2006
  • NAND flash memory-based embedded systems are becoming increasingly common. These embedded systems have to provide a fast boot time. In this paper, we have designed and proposed a flash file system for embedded systems that require fast booting. By using a Flash Image Area, which keeps the latest flash memory information such as types and status of all blocks, the file system mounting time can be reduced significantly. We have shown by experiments that our file system outperforms YAFFS and RFFS.

DJFS: Providing Highly Reliable and High-Performance File System with Small-Sized NVRAM

  • Kim, Junghoon;Lee, Minho;Song, Yongju;Eom, Young Ik
    • ETRI Journal
    • /
    • v.39 no.6
    • /
    • pp.820-831
    • /
    • 2017
  • File systems and applications try to implement their own update protocols to guarantee data consistency, which is one of the most crucial aspects of computing systems. However, we found that the storage devices are substantially under-utilized when preserving data consistency because they generate massive storage write traffic with many disk cache flush operations and force-unit-access (FUA) commands. In this paper, we present DJFS (Delta-Journaling File System) that provides both a high level of performance and data consistency for different applications. We made three technical contributions to achieve our goal. First, to remove all storage accesses with disk cache flush operations and FUA commands, DJFS uses small-sized NVRAM for a file system journal. Second, to reduce the access latency and space requirements of NVRAM, DJFS attempts to journal compress the differences in the modified blocks. Finally, to relieve explicit checkpointing overhead, DJFS aggressively reflects the checkpoint transactions to file system area in the unit of the specified region. Our evaluation on TPC-C SQLite benchmark shows that, using our novel optimization schemes, DJFS outperforms Ext4 by up to 64.2 times with only 128 MB of NVRAM.