• Title/Summary/Keyword: computer files

Search Result 548, Processing Time 0.034 seconds

A Computer-Based Advisory System for Diagnosing Crops Diseases in Korea (컴퓨터를 이용한 식물병 임상진단 시스템 개발)

  • 이영희;조원대;김완규;김유학;이은종
    • Korean Journal Plant Pathology
    • /
    • v.10 no.2
    • /
    • pp.99-104
    • /
    • 1994
  • A computer-based diagnosing system for diseases of grasses, ornamental plant and fruit trees was developed using a 16 bit personal computer (Model Acer 900) and BASIC was used as a programing language. the developed advisory system was named as Korean Plant Disease Advisory System (KOPDAS). The diagraming system files were composed of a system operation file and several database files. The knowledge-base files are composed of text files, code files and implement program files. The knowledge-base of text files are composed of 79 files of grasses diseases, 122 files of ornamental plant diseases and 67 files of fruit tree diseases. The information of each text file include disease names, causal agents, diseased parts, symptoms, morphological characteristics of causal organisms and control methods for the diagnosing of crop diseases.

  • PDF

Comment on the Copyrightability of Font-files as Computer Program (글자체파일의 컴퓨터프로그램저작물성 판단에 대한 비판)

  • Jeong, Jin-Keun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.17-24
    • /
    • 2019
  • Use without permission of font files is a social problem. In the meantime, our court recognized font files as computer programs. Is the font file a computer program? This recognition arises from the inability to distinguish between computer programs and data. Expert recognition, on the other hand, does not recognize font files as computer programs. In this regard, there was a case in 2014 that INI files were not computer programs, but only data files. So, the attitude of the Supreme Court in 2001 only makes it difficult to distinguish between computer programs and data. The Supreme Court's decision needs to be changed. In addition, a new legal system should be in place to protect font files.

Organizing Computer Files for the Library Collection (컴퓨터 파일 자료의 조직)

  • 조명희
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1994.12a
    • /
    • pp.151-154
    • /
    • 1994
  • Historical background of computer files is briefly outlined. Descriptive examples of phisical area of computer files revealed in existing cataloging rules and manuals are examined and analyzed in terms of consistency identification and term standardization. An analysis of examples may provide the basis for enhancing organizing computer file.

  • PDF

Auto Configuration Module for Logstash in Elasticsearch Ecosystem

  • Ahmed, Hammad;Park, Yoosang;Choi, Jongsun;Choi, Jaeyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.39-42
    • /
    • 2018
  • Log analysis and monitoring have a significant importance in most of the systems. Log management has core importance in applications like distributed applications, cloud based applications, and applications designed for big data. These applications produce a large number of log files which contain essential information. This information can be used for log analytics to understand the relevant patterns from varying log data. However, they need some tools for the purpose of parsing, storing, and visualizing log informations. "Elasticsearch, Logstash, and Kibana"(ELK Stack) is one of the most popular analyzing tools for log management. For the ingestion of log files configuration files have a key importance, as they cover all the services needed to input, process, and output the log files. However, creating configuration files is sometimes very complicated and time consuming in many applications as it requires domain expertise and manual creation. In this paper, an auto configuration module for Logstash is proposed which aims to auto generate the configuration files for Logstash. The primary purpose of this paper is to provide a mechanism, which can be used to auto generate the configuration files for corresponding log files in less time. The proposed module aims to provide an overall efficiency in the log management system.

JarBot: Automated Java Libraries Suggestion in JAR Archives Format for a given Software Architecture

  • P. Pirapuraj;Indika Perera
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.191-197
    • /
    • 2024
  • Software reuse gives the meaning for rapid software development and the quality of the software. Most of the Java components/libraries open-source are available only in Java Archive (JAR) file format. When a software design enters into the development process, the developer needs to select necessary JAR files manually via analyzing the given software architecture and related JAR files. This paper proposes an automated approach, JarBot, to suggest all the necessary JAR files for given software architecture in the development process. All related JAR files will be downloaded from the internet based on the extracted information from the given software architecture (class diagram). Class names, method names, and attribute names will be extracted from the downloaded JAR files and matched with the information extracted from the given software architecture to identify the most relevant JAR files. For the result and evaluation of the proposed system, 05 software design was developed for 05 well-completed software project from GitHub. The proposed system suggested more than 95% of the JAR files among expected JAR files for the given 05 software design. The result indicated that the proposed system is suggesting almost all the necessary JAR files.

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

A Study on the Bibliographic Description of the Computer Files (컴퓨터파일에 대한 서지기술 연구)

  • 이명규
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.35 no.2
    • /
    • pp.187-206
    • /
    • 2001
  • This research intends to provide a basis which will lay the foundation of Cataloguing Rules for computer files by comparing the current cataloguing rules. Towards this goal, I researched both the major characteristics and various kinds of computer files. Secondly, I compared and analyzed the AACR2R and the ISBN(ER), which constitute the root and the trunk of cataloguing rules for computer no from a source of information to note area in the ISBD. This study finally examined the development process of cataloguing rules as well as the content of change in computer files.

  • PDF

Efficient Multimedia Data File Management and Retrieval Strategy on Big Data Processing System

  • Lee, Jae-Kyung;Shin, Su-Mi;Kim, Kyung-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.77-83
    • /
    • 2015
  • The storage and retrieval of multimedia data is becoming increasingly important in many application areas including record management, video(CCTV) management and Internet of Things (IoT). In these applications, the files containing multimedia that need to be stored and managed is tremendous and constantly scaling. In this paper, we propose a technique to retrieve a very large number of files, in multimedia format, using the Hadoop Framework. Our strategy is based on the management of metadata that describes the characteristic of files that are stored in Hadoop Distributed File System (HDFS). The metadata schema is represented in Hbase and looked up using SQL On Hadoop (Hive, Tajo). Both the Hbase, Hive and Tajo are part of the Hadoop Ecosystem. Preliminary experiment on multimedia data files stored in HDFS shows the viability of the proposed strategy.

A rule based file management tool for facility log files integration in disaster environments

  • Lee, Young-Geol;Lee, Younlae;Kim, Hyunah;Jang, Yeonyi;Park, Minjae
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.73-82
    • /
    • 2018
  • We often experience complex presence of files within the compute environment. It could be an end-user's desktop environment or a professional part of file management. We would like to suggest one way to manage these different cases of duplicate files. It is a rule-based file management tool, and we want to use it as a tool to consolidate facility management log files. In this paper, we will describe the rule-based file management tools and show examples of how files are managed using them. We are interested in the management of the disaster environment and would like to apply this method to the management of log data related to facilities to be considered in the event of a disaster.

A Method of Data Hiding in a File System by Modifying Directory Information

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.85-93
    • /
    • 2018
  • In this research, it is proposed that a method to hide data by modifying directory index entry information. It consists of two methods: a directory list hiding and a file contents hiding. The directory list hiding method is to avoid the list of files from appearing in the file explorer window or the command prompt window. By modifying the file names of several index entries to make them duplicated, if the duplicated files are deleted, then the only the original file is deleted, but the modified files are retained in the MFT entry intact. So, the fact that these files are hidden is not exposed. The file contents hiding is to allocate data to be hidden on an empty index record page that is not used. If many files are made in the directory, several 4KB index records are allocated. NTFS leaves the empty index records unchanged after deleting the files. By modifying the run-list of the index record with the cluster number of the file-to-hide, the contents of the file-to-hide are hidden in the index record. By applying the proposed method to the case of hiding two files, the file lists are not exposed in the file explorer and the command prompt window, and the contents of the file-to-hide are hidden in the empty index record. It is proved that the proposed method has effectiveness and validity.