• Title/Summary/Keyword: Log file

Search Result 160, Processing Time 0.023 seconds

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

Light weight architecture for acoustic scene classification (음향 장면 분류를 위한 경량화 모형 연구)

  • Lim, Soyoung;Kwak, Il-Youp
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.6
    • /
    • pp.979-993
    • /
    • 2021
  • Acoustic scene classification (ASC) categorizes an audio file based on the environment in which it has been recorded. This has long been studied in the detection and classification of acoustic scenes and events (DCASE). In this study, we considered the problem that ASC faces in real-world applications that the model used should have low-complexity. We compared several models that apply light-weight techniques. First, a base CNN model was proposed using log mel-spectrogram, deltas, and delta-deltas features. Second, depthwise separable convolution, linear bottleneck inverted residual block was applied to the convolutional layer, and Quantization was applied to the models to develop a low-complexity model. The model considering low-complexity was similar or slightly inferior to the performance of the base model, but the model size was significantly reduced from 503 KB to 42.76 KB.

A Comparison between Portal Dosimetry and Mobius3D Results for Patient-Specific Quality Assurance in Radiotherapy

  • Kim, Sung Yeop;Park, Jaehyeon;Park, Jae Won;Yea, Ji Woon;Oh, Se An
    • Progress in Medical Physics
    • /
    • v.32 no.4
    • /
    • pp.107-115
    • /
    • 2021
  • Purpose: The purpose of this study was to compare the clinical quality assurance results of portal dosimetry using an electronic portal imaging device, a method that is extensively used for patient-specific quality assurance, and the newly released Mobius3D for intensity-modulated radiotherapy (IMRT) and volumetric modulated arc therapy (VMAT). Methods: This retrospective study includes data from 122 patients who underwent IMRT and VMAT on the Novalis Tx and VitalBeam linear accelerators between April and June 2020. We used a paired t-test to compare portal dosimetry using an electronic portal imaging device and the average gamma passing rates of MobiusFX using log files regenerated after patient treatment. Results: The average gamma passing rates of portal dosimetry (3%/3 mm) and MobiusFX (5%/3 mm) were 99.43%±1.02% and 99.32%±1.87% in VitalBeam and 97.53%±3.34% and 96.45%±13.94% in Novalis Tx, respectively. Comparison of the gamma passing rate results of portal dosimetry (3%/3 mm) and MobiusFX (5%/3 mm as per the manufacturer's manual) does not show any statistically significant difference. Conclusions: Log file-based patient-specific quality assurance, including independent dose calculation, can be appropriately used in clinical practice as a second-check dosimetry, and it is considered comparable with primary quality assurance such as portal dosimetry.

Drone Flight Record Forensic System through DUML Packet Analysis (DUML 패킷 분석을 통한 드론 비행기록 포렌식 시스템)

  • YeoHoon Yoon;Joobeom Yun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.103-114
    • /
    • 2024
  • In a situation where drone-related crimes continue to rise, research in drone forensics becomes crucial for preventing and responding to incidents involving drones. Conducting forensic analysis on flight record files stored internally is essential for investigating illegal activities. However, analyzing flight record files generated through the exclusive DUML protocol requires a deep understanding of the protocol's structure and characteristics. Additionally, a forensic analysis tool capable of handling cryptographic payloads and analyzing various drone models is imperative. Therefore, this study presents the methods and characteristics of flight record files generated by drones. It also explains the structure of the flight record file and the features of the DUML packet. Ultimately, we conduct forensic analysis based on the presented structure of the DUML packet and propose an extension forensic analysis system that operates more universally than existing tools, performing expanded syntactic analysis.

The Efficient Merge Operation in Log Buffer-Based Flash Translation Layer for Enhanced Random Writing (임의쓰기 성능향상을 위한 로그블록 기반 FTL의 효율적인 합병연산)

  • Lee, Jun-Hyuk;Roh, Hong-Chan;Park, Sang-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.19D no.2
    • /
    • pp.161-186
    • /
    • 2012
  • Recently, the flash memory consistently increases the storage capacity while the price of the memory is being cheap. This makes the mass storage SSD(Solid State Drive) popular. The flash memory, however, has a lot of defects. In order that these defects should be complimented, it is needed to use the FTL(Flash Translation Layer) as a special layer. To operate restrictions of the hardware efficiently, the FTL that is essential to work plays a role of transferring from the logical sector number of file systems to the physical sector number of the flash memory. Especially, the poor performance is attributed to Erase-Before-Write among the flash memory's restrictions, and even if there are lots of studies based on the log block, a few problems still exists in order for the mass storage flash memory to be operated. If the FAST based on Log Block-Based Flash often is generated in the wide locality causing the random writing, the merge operation will be occur as the sectors is not used in the data block. In other words, the block thrashing which is not effective occurs and then, the flash memory's performance get worse. If the log-block makes the overwriting caused, the log-block is executed like a cache and this technique contributes to developing the flash memory performance improvement. This study for the improvement of the random writing demonstrates that the log block is operated like not only the cache but also the entire flash memory so that the merge operation and the erase operation are diminished as there are a distinct mapping table called as the offset mapping table for the operation. The new FTL is to be defined as the XAST(extensively-Associative Sector Translation). The XAST manages the offset mapping table with efficiency based on the spatial locality and temporal locality.

Monitoring System for TV Advertisement Using Watermark (워터마크를 이용한 TV방송 광고모니터링 시스템)

  • Shin, Dong-Hwan;Kim, Geung-Sun;Kim, Jong-Weon;Choi, Jong-Uk
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.15-18
    • /
    • 2004
  • In this paper, it is implemented the monitoring system for TV advertisement using video watermark. The functions of an advertisement monitoring system are automatically monitoring for the time, length, and index of the on-air advertisement, saving the log data, and reporting the monitoring result. The performance of the video watermark used in this paper is tested for TV advertisement monitoring. This test includes LAB test and field test. LAB test is done in laboratory environment and field test in actually broadcasting environment. LAB test includes PSNR, distortion measure in image, and the watermark detection rate in the various attack environment such as AD/DA(analog to digital and digital to analog) conversion, noise addition, and MPEG compression The result of LAB test is good for the TV advertisement monitoring. KOBACO and SBS are participated in the field test. The watermark detection rate is 100% in both the real-time processing and the saved file processing. The average deviation of the watermark detection time is 0.2 second, which is good because the permissible average error is 0.5 second.

  • PDF

A Scheme to Improve QoS in a Multi-Virtual-Hosting Server (다중 Virtual Hosting Server의 QoS 향상 기법에 관한 연구)

  • Ryou, Sang-Woo;Ko, Soung-Jun;Lee, Sang-Moon;Kim, Hag-Bae;Park, Jin-Bae;Jang, Whie
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.4
    • /
    • pp.303-307
    • /
    • 2002
  • Virtual hosting is a typical service to connect each directory of site and domain name. If traffic amounts may increase at one site present in the server, then it affects traffic amounts of other sites as well (including the sites which have flew requests). To overcome this problem, we suggest a simple feedback-control concept for the system by periodically monitoring the traffic and properly actuating traffic dispersions by investigating the log file. Specifically, large files are to be served in a backup server (to reduce the workload of the main server) by changing their own URL's in html format. In other words, it automatically redistributes the workload by using the URL. Furthermore, we also use the redirecting method by just adding html tags to html header. This method efficiently handles the workload and maintains the capability of the server effectively to the varying workload.

Tele-Control of Rapid Prototyping Machine System Via Internet (인터넷 기반의 원격 제어를 이용한 RP 시스템 개발)

  • 최태림;송용억;강신일
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.24-27
    • /
    • 2001
  • Nowadays, increasing demand of the customized products has led to an increased usage of rapid prototyping in the product development. However, the acquisition price of a rapid prototyping equipment is still too high that not every body can afford to buy one. To offer a wide access to the users who need physical prototypes, a connection of the rapid prototyping equipment to the Internet is a viable step. It would allow a large group of customers all over the world to use the manufacturing capability of a service provider offering this kind of manufacturing service. To realize how such an e-manufacturing concept can look like, a LOM-type 3D printer developed at KIST has been used as test site and connected to the Internet. A possible user can log on to the server of the equipment and view his STL file and start the building operation from a remote place. To see whether the operation runs properly, a CCD camera is used to transmit the actual state of operation online. The result so far proves the feasibility of rapid prototyping on the Internet as well as an order-adaptive manufacturing system via web.

  • PDF

Study on the Effective System for P2P (효율적인 P2P 시스템개발 사례)

  • Song, Eun-Ji
    • Journal of Digital Contents Society
    • /
    • v.7 no.2
    • /
    • pp.89-94
    • /
    • 2006
  • It can be said that P2P means the pattern that every linker could be both a supplier and a customer by means of the direct connection and survey with personal computers out of the concept of server and client. P2P business has been a great impact all over the world. for it came to be possible as the express internet log-on service is getting widely used and the user environment is getting better with the supply of high-tech computer. Recently the various system of P2P has been developed not as the only service of file share between the personal users but as the application of the electronic trade between the companies. This study is to suggest the most effective system that has the function of complement of P2P.

  • PDF

Algorithm for Extracting the General Web Search Path Pattern (일반적인 웹 검색 경로패턴 추출 알고리즘)

  • Jang, Min-Seok;Ha, Eun-Mi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.771-773
    • /
    • 2005
  • There have been researches about analyzing the information retrieval patterns of log file to efficiently obtain the users' information research patters in web environment. The methods frequently used in their researches is to suggest the algorithms by which the frequent one is derived from the path traversal patterns in efficient way. But one of their general problems is not to provide the proper solution in case of complex, that is, general topological patterns. Therefore this paper tries to suggest a efficient algorithm after defining the general information retrieval pattern.

  • PDF