• Title/Summary/Keyword: OLE File

Search Result 10, Processing Time 0.026 seconds

THE ANALYSIS OF INITIAL APICAL FILE SIZE BEFORE AND AFTER CORONAL FLARING (Coronal flaring 전, 후 초기근관장 파일크기의 분석)

  • Hwang, Ho-Keel;Park, Chan-Ho;Bae, Seong-Chul
    • Restorative Dentistry and Endodontics
    • /
    • v.28 no.1
    • /
    • pp.64-71
    • /
    • 2003
  • The purpose of this study was to compare the initial apical file(IAF) first Ole that fits to the apex in each canal before and after early flaring to analyze if the size of file to fit to the apex would increase after flaring. Eighty anterior teeth with complete apical formation and patent foramens were selected. The samples were randomly divided into 4 groups(GG, OS, GT, PT Group) of 20 teeth each. A file was fit to the apex in each canal and that size recorded. Radicular flaring were completed using different types of instruments. After flaring a file was again fit to the apex in the same manner as before and its size recorded. The results of this study were as follows : 1. The mean diameter of IAF before flaring(file diameters in $mm{\times}10^{-2}$) was $19.81{\pm}8.32$ before and $25.94{\pm}9.21$ after(p<0.05). 2. The increase in diameter of IAF was approximately one file size for all groups. 3. Ranking of increasing diameter of IAF were GG>CT>OS>PT group. There was a statistically significant difference between before and after flaring(p<0.05). 4 Ranking of the time for flaring were GG>GT>OS>PT group. There was a statistically significant difference between GG group and other groups(p<0.05). 5. In the case without change of IAF diameter, they showed decrease in force after flaring when IAF was pulled out from root canal(p<0.05). This study suggested that early radicular flaring increases the file size that is snug at the apex, and awareness of that difference gives the clinician a better sense of canal size. Early flaring of the canal provides better apical size information and with this awareness, a better decision can be made concerning the appropriate final diameter needed for complete apical shaping.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

A Study on OLE/COM-based GIS Data Provider Component Development Toward Application System Development (응용시스템 구축을 위한 OLE/COM 기반의 GIS 데이터 제공자 컴포넌트 시스템에 관한 연구)

  • 김민수;김광수;오병우;이기원
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.175-190
    • /
    • 1999
  • Recently , as GIS technology is rapidly improved and stabilized, there are some needs to reuse pre-developed and powerful GIS technology. GIS standardization based on components and open interfaces becomes a way to solve those reusability of previous GIS technology. This GIS standardization currently focuses on building the GIS Data Infrastructure that is being deployed globally. Especially, OpenGIS consortium which is mainly made up of international GIS leading vendors is announcing some GIS abstract specifications and implementation specifications. This study focuses on how could we design and implement the OLE/COM-based data provider component based on various DBMS or file systems, how could these data provider components be used for enterprise UIS(Urban Information Systems) and how could various formatted GIS data be shared in one system. Also some problems practically caused by an implementation process of data provider component are listed up and some solutions are given. Furthermore, design and analysis of UML(Unified Modeling Language) was reformed through the data provider component development task and this UML methodology is able to indicate a standardized model for newly developed data provider component.

  • PDF

OLE File Analysis and Malware Detection using Machine Learning

  • Choi, Hyeong Kyu;Kang, Ah Reum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.149-156
    • /
    • 2022
  • Recently, there have been many reports of document-type malicious code injecting malicious code into Microsoft Office files. Document-type malicious code is often hidden by encoding the malicious code in the document. Therefore, document-type malware can easily bypass anti-virus programs. We found that malicious code was inserted into the Visual Basic for Applications (VBA) macro, a function supported by Microsoft Office. Malicious codes such as shellcodes that run external programs and URL-related codes that download files from external URLs were identified. We selected 354 keywords repeatedly appearing in malicious Microsoft Office files and defined the number of times each keyword appears in the body of the document as a feature. We performed machine learning with SVM, naïve Bayes, logistic regression, and random forest algorithms. As a result, each algorithm showed accuracies of 0.994, 0.659, 0.995, and 0.998, respectively.

Embodiment of Windowless ActiveX Container (윈도우리스 액티브엑스 컨테이너의 구현)

  • Kim A-Hyun;Choi Sang-il;Kim Young-Su;Oh Kum-Gon;Kim Young-Dong
    • Proceedings of the KIPE Conference
    • /
    • 2004.07b
    • /
    • pp.846-850
    • /
    • 2004
  • The aim of this research is to bring fish-file that we have worked to place we want worked in flsh and to design Active container that removed window frame in web like general movie player. It being low price, Anyone using, we intend to design container which removed window frame by processing background of function.

  • PDF

Development of a File-based Moving Objects Storage Component for Efficient Storage and Retrieval of Moving Objects (이동 객체의 효율적인 저장과 검색을 위한 화일 기반 이동 객체 저장 컴포넌트의 개발)

  • 장유정;김동오;홍동숙;한기준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.118-120
    • /
    • 2004
  • 최근 무선 인터넷 인구의 증가로 인해 이동 객체의 위치 데이타를 활용하여 다양한 서비스를 제공하는 위치 기반 서비스와 텔레매틱스에 대찬 관심이 급증하고 있다 위치 기반 서비스와 텔레매틱스 분야에서 다양한 응용 서비스를 제공하기 위해서는 대용량의 위치 데이타를 빠르고 정확하게 저장하고 검색할 수 있는 이동 객체 데이타베이스 시스템이 필수적으로 요구된다. 그러나, 기존의 데이타베이스 시스템을 사용하여 대용량의 위치 데이타를 처리할 경우 트랜잭션 연산의 증가로 인하여 저장 밀 검색 성능이 저하된다 이러한 문제점을 해결하기 위해 본 논문에서는 이동 객체의 위치 데이타를 효율적으로 저장하고 검색하기 위한 화일 기반 이동 객체 저장 컴포넌트를 개발하고 성능 평가를 수행하였다. 화일 기반 이동 객체 저장 컴포넌트는 다중 연결 관리자, 단순 질의 처리기, 인덱스 관리자. 데이타 화일 관리자, 인덱스 파일 관리자, 메타데이타 관리자, 로그 관리자, OLE DB 데이타 제공자, 그리고 관리툴로 구성된다.

  • PDF

A Study on Classification and Recovery Method of Damaged Electronic Records (손상된 전자기록물 구분과 복원 방법에 관한 연구)

  • Kim, Jihun;Choi, Wonhyok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.139-147
    • /
    • 2019
  • In this paper we propose a method to distinguish damaged electronic records and an electronic record recovery method according to damage type. The proposed classification engine and recovery engine classify damaged electronic records based on the form and structure of electronic records and increase the probability of recovery according to the damaged form. Through this process, we propose a method to minimize the electronic records that are destroyed and verify them through experiments.

A Research of Anomaly Detection Method in MS Office Document (MS 오피스 문서 파일 내 비정상 요소 탐지 기법 연구)

  • Cho, Sung Hye;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.87-94
    • /
    • 2017
  • Microsoft Office is an office suite of applications developed by Microsoft. Recently users with malicious intent customize Office files as a container of the Malware because MS Office is most commonly used word processing program. To attack target system, many of malicious office files using a variety of skills and techniques like macro function, hiding shell code inside unused area, etc. And, people usually use two techniques to detect these kinds of malware. These are Signature-based detection and Sandbox. However, there is some limits to what it can afford because of the increasing complexity of malwares. Therefore, this paper propose methods to detect malicious MS office files in Computer forensics' way. We checked Macros and potential problem area with structural analysis of the MS Office file for this purpose.

The Design of Abstract Layer for Motion Capture System (모션캡처 시스템을 위한 추상레이어의 설계)

  • Lee, Hee-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.25-32
    • /
    • 2007
  • In this paper, the abstract layer for motion capture system is designed and implemented to meet the various hardware and different capturing method. The abstract layer can offer the unified programming by providing device independent API(Application Programming Interface). The device drivers of the optical system and mechanical system are emulated to verify the designed abstract layer. The optical system employs the AOA Ole while the mechanical system uses BVH file. An application program is written to call the abstract layer functions to drive both optical and mechanical drivers and receive the frame data, simulated motion data, that are displayed sequentially on the computer screen by utilizing Direct3D.

  • PDF

Screening for raw material of modified gelatin in marine animal skins caught in coastal offshore water in Korea (수식 어류껍질 젤라틴의 원료로서 연근해산 수산물껍질의 검색)

  • Cho, Soon-Yeong;Kim, Jin-Soo
    • Applied Biological Chemistry
    • /
    • v.39 no.2
    • /
    • pp.134-139
    • /
    • 1996
  • In order to effectively utilize marine animal skin wastes in marine processing manufacture, conger eel skin, file fish skin and arrow squid skin as raw material of edible gelatin were screened. Conger eel skin was the highest in the collagen content, followed by Ole fish skin and arrow squid skin, in the order named. In the fish skins, the soluble and insoluble collagens occupied $67.4%{\sim}72.3%\;and\;27.7{\sim}32.6%$, respectively, and in the arrow squid skin, 30.4ft and 69.6ft, respectively. No difference in the amino acid composition between soluble and insoluble collagens was detected. Collagen from the marine animal skin catched in coasted and offshore water in Korea consisted ${\alpha}$ chain and ${\beta}$ chain, and ${\alpha}$ chain were hetero type. The sum of proline and hydroxyproline contents in conger eel skin collagen was higher than that in the other skin collagens, while was lower than that pork skin collagen. Conger eel skin collagen exhibited a higher denaturation temperature in solution and a higher degree of proline hydroxylation, compared with skin collagen of the respective species. The physical properties such as gel strength, melting point and gelling point of conger eel skin gelatin were superior to those of file fish skin and arrow squid skin gelatins.

  • PDF