• Title/Summary/Keyword: computer files

Search Result 551, Processing Time 0.028 seconds

Development of Auto Presentation System of Toolbook Using Object Auto Transition on Multimedia Authoring Tool (멀티미디어를 기반으로 하는 저작도구 툴북에서 객체 자동 변환을 이용한 자동 프리젠테이션 시스템 개발)

  • Yang, Ok-Yul;Jeong, Yeong-Sik;Lee, Yong-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1182-1195
    • /
    • 1997
  • When we present some information, we can use application programs through multinedia-based authoring tools. Especially.many programers proposed to improve its intergration time and reduce programming speed and easy to use. However, multimedia based authoring tools have not all of programming methodolgies and do not supply special functions from user's request. Therefore, we have to apply effective functions through high-level programming languages.In this paper, we propose to use small appkication prograns through linking methods, So we reduce overhead from memory loading In authoring tools, we can use MCI(media control interface) call functions for playback audio files.we development ATS(Auto Transition System) for several functions-close MCI call audio files, get object status, page-to page trancition.We evidently show that an optimal configuration of presentation obtained by ATS algorithm.

  • PDF

Study on Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (이동 Ad Hoc 망에 대한 동적 소스 라우팅 프로토콜에 관한 연구)

  • 하재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.9
    • /
    • pp.1219-1224
    • /
    • 2001
  • There can exist unidirectional links due to asymmetric property of mobile terminals or current wireless environments on practical mobile ad hoc networks. However, at present, the existing mobile ad hoc routing protocols are implemented to support only bidirectional links. Thus, in this paper, we extend the existing dynamic source routing protocol in order to implement a new routing protocol, which is fit to mobile ad hoc networks containing unidirectional links. For performance evaluation, we use combinations of mobility scenario files and connection pattern files from Carnegimelon Univ. We consider received data rate and average route discovery time as evaluation items, which are compared and evaluated for three suggested route discovery methods.

  • PDF

Development of a Computer Software System for Improving Chick Breeder (우량종계 육종을 위한 컴퓨터 소프트웨어 시스템 개발에 관한 연구)

  • 최연호;조상문;장종준
    • Korean Journal of Poultry Science
    • /
    • v.22 no.1
    • /
    • pp.15-31
    • /
    • 1995
  • This study was carried out to develop a computer software system for poultry breeding by using microcomputer(PC). Through this study, SPPB(Statistical Package for Poultry Breeding) was designed and developed, which can help poultry breeder collect and analyse the chick records. A main feature of the system was the application of user-oriented procedure, for example, choice of the flock file, selection of the family size and the desired traits. Creation of the data files and the breeding files. calculation of the elementary statistics, estimation of the heritability and the genetic and phenotypic correlation coefficients can be obtained by user's choice of the sire and dam family size. Also, it is possible to estimate the various selection indices through this system. Easiness of using this system and the flexibility of the file management could help increasing the efficiency of related practical poultry breeding jobs. Correctness and relationships between the unit programs in the system were proved through the run-test of the SPPB using sample data. Because it wasn't able to collect breeding records at the commercial breeding farm, effectiveness of the system was not proved totally. Also. it will be necessary to develop the integrated software system which make possible to computerize the general works at breeding farm and the genetic analyses of the records from chick breeders.

  • PDF

Musician Search in Time-Series Pattern Index Files using Features of Audio (오디오 특징계수를 이용한 시계열 패턴 인덱스 화일의 뮤지션 검색 기법)

  • Kim, Young-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.69-74
    • /
    • 2006
  • The recent development of multimedia content-based retrieval technologies brings great attention of musician retrieval using features of a digital audio data among music information retrieval technologies. But the indexing techniques for music databases have not been studied completely. In this paper, we present a musician retrieval technique for audio features using the space split methods in the time-series pattern index file. We use features of audio to retrieve the musician and a time-series pattern index file to search the candidate musicians. Experimental results show that the time-series pattern index file using the rotational split method is efficient for musician retrievals in the time-series pattern files.

  • PDF

Generating Object Diagrams from Java Class Files : A Practical Approach (자바 클래스 파일로부터 객체 다이어그램 얻기 : 실제적인 방법)

  • Yang, Chang-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.1-13
    • /
    • 2008
  • Gestwicki et. al. proposed the technique that detects and predicts the structure of object diagrams from class diagrams to get the improved drawing of object graphs. Their approach finds two predictable structures - recursive clusters and leaf clusters from class diagrams. Their approach is not practical to be applied to real programs, because the starting point is class diagram. In this work, we improve and implement their technique to apply to Java classes. We obtain the structure and relationships of classes and clusters extracted from class files. This information can be provided and used as a template of object graphs for Java execution visualization tools like JIVE.

  • PDF

Capturing Data from Untapped Sources using Apache Spark for Big Data Analytics (빅데이터 분석을 위해 아파치 스파크를 이용한 원시 데이터 소스에서 데이터 추출)

  • Nichie, Aaron;Koo, Heung-Seo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.7
    • /
    • pp.1277-1282
    • /
    • 2016
  • The term "Big Data" has been defined to encapsulate a broad spectrum of data sources and data formats. It is often described to be unstructured data due to its properties of variety in data formats. Even though the traditional methods of structuring data in rows and columns have been reinvented into column families, key-value or completely replaced with JSON documents in document-based databases, the fact still remains that data have to be reshaped to conform to certain structure in order to persistently store the data on disc. ETL processes are key in restructuring data. However, ETL processes incur additional processing overhead and also require that data sources are maintained in predefined formats. Consequently, data in certain formats are completely ignored because designing ETL processes to cater for all possible data formats is almost impossible. Potentially, these unconsidered data sources can provide useful insights when incorporated into big data analytics. In this project, using big data solution, Apache Spark, we tapped into other sources of data stored in their raw formats such as various text files, compressed files etc and incorporated the data with persistently stored enterprise data in MongoDB for overall data analytics using MongoDB Aggregation Framework and MapReduce. This significantly differs from the traditional ETL systems in the sense that it is compactible regardless of the data formats at source.

A graphical user interface for stand-alone and mixed-type modelling of reinforced concrete structures

  • Sadeghian, Vahid;Vecchio, Frank
    • Computers and Concrete
    • /
    • v.16 no.2
    • /
    • pp.287-309
    • /
    • 2015
  • FormWorks-Plus is a generalized public domain user-friendly preprocessor developed to facilitate the process of creating finite element models for structural analysis programs. The lack of a graphical user interface in most academic analysis programs forces users to input the structural model information into the standard text files, which is a time-consuming and error-prone process. FormWorks-Plus enables engineers to conveniently set up the finite element model in a graphical environment, eliminating the problems associated with conventional input text files and improving the user's perception of the application. In this paper, a brief overview of the FormWorks-Plus structure is presented, followed by a detailed explanation of the main features of the program. In addition, demonstration is made of the application of FormWorks-Plus in combination with VecTor programs, advanced nonlinear analysis tools for reinforced concrete structures. Finally, aspects relating to the modelling and analysis of three case studies are discussed: a reinforced concrete beam-column joint, a steel-concrete composite shear wall, and a SFRC shear panel. The unique mixed-type frame-membrane modelling procedure implemented in FormWorks-Plus can address the limitations associated with most frame type analyses.

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Timestamp Analysis of Windows File Systems by File Manipulation Operations (파일 조작에 따른 파일 시간 변화 분석)

  • Bang, Je-Wan;Yoo, Byeong-Yeong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.79-91
    • /
    • 2010
  • In digital forensics, the creation time, last modified time, and last accessed time of a file or folder are important factors that can indicate events that have affected a computer system. The form of the time information varies with the file system, depending on the user's actions such as copy, transfer, or network transport of files. Specific changes of the time information may be of considerable help in analyzing the user's actions in the computer system. This paper analyzes changes in the time information of files and folders for different operations of the NTFS and attempts to reconstruct the user's actions.