• Title/Summary/Keyword: computer files

Search Result 548, Processing Time 0.023 seconds

Similar Movie Retrieval using Low Peak Feature and Image Color (Low Peak Feature와 영상 Color를 이용한 유사 동영상 검색)

  • Chung, Myoung-Beom;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.51-58
    • /
    • 2009
  • In this paper. we propose search algorithm using Low Peak Feature of audio and image color value by which similar movies can be identified. Combing through entire video files for the purpose of recognizing and retrieving matching movies requires much time and memory space. Moreover, these methods still share a critical problem of erroneously recognizing as being different matching videos that have been altered only in resolution or converted merely with a different codec. Thus we present here a similar-video-retrieval method that relies on analysis of audio patterns, whose peak features are not greatly affected by changes in the resolution or codec used and image color values. which are used for similarity comparison. The method showed a 97.7% search success rate, given a set of 2,000 video files whose audio-bit-rate had been altered or were purposefully written in a different codec.

Class-based Proxy Server for Mobile Computers (이동 컴퓨터를 위한 클래스 기반 프락시 서버)

  • Lee, Jong-Kuk;Kim, Myung-Chul;Lee, Kyung-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.463-476
    • /
    • 2001
  • To support the mobility, mobile computers are generally equipped with lower capability than desktop PCs or workstations in terms of the size of a display, the processing power of CPU and so on. This may give a rise to limitation in mobile computers of supporting multimedia services such as World Wide Web which users would otherwise fully enjoy in desktop PCs. Approaches to reducing the limitations are distillating original multimedia data or converting them to text. Conventional proxy servers for mobile computer simply send distillated image files with the fixed size regardless of the display size of a target mobile computer. Since the cached data is kept separately for each user, they cannot be shared among users with the same display configuration and thus the proxy server could be overloaded. In this paper, we first classify various mobile computers based on their display capability in terms of display sizes and colors. We propose an enhanced proxy server called Class-based proxy that provides a mobile computer with distillated image files in proportion to its class display capacity. The proposed proxy server allows a mobile computer user to have a homepage view similar to that in PC or Workstation. Mobile computers with the same class share the cached image files, which are distillated appropriately for that class. This helps the proxy server to get higher cache hit ratio with improved efficiency and scalability.

  • PDF

Design and Implementation of The Windows Thesaurus WTPM using Filename of Semantics Clustering (파일명의 의미 클러스터링에 의한 윈도우 시소러스 WTPM 설계와 구현)

  • Kim, Man-pil;Tcha, Hong-jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.1
    • /
    • pp.73-79
    • /
    • 2009
  • Analyze semantic of files recorded in the user's computer file system based on C++ program language which pursue modularization program and object-oriented programming language. And this refers to it, it design that clustering semantic of filename with thesaurus for user convenience. WTPM makes User Write Files into Cluster with thesaurus semantic structure and reserved words. WTPM process has designed for Icon file's display Mashup structure and implemented by automation algorithm of classification.

  • PDF

Data Hiding for HTML Files Using Character Coding Table and Index Coding Table

  • Chou, Yung-Chen;Hsu, Ping-Kun;Lin, Iuon-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2913-2927
    • /
    • 2013
  • A data hiding scheme in HTML files is presented in this paper. Web pages are a very popular medium for broadcasting information and knowledge nowadays, and web pages are a good way to achieve the goal of secret message delivery because the different HTML coding codes will render the same screen in any of the popular browsers. The proposed method utilizes the HTML special space codes and sentence segmentation to conceal secret messages into a HTML file. The experimental results show that the stego HTML file generated by the proposed method is imperceptible. Also, the proposed method can conceal one more secret bit in every between-word location.

Implementation and Evaluation of Integrated Viewier for Displanning Text and TIFF Image Materials on the Internet Environments (인터넷상에서 텍스트와 TIFF 이미지 자료 디스플레이를 위한 뷰어 구현 및 평가)

  • 최흥식
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.1
    • /
    • pp.67-87
    • /
    • 2000
  • The purpose of the study is to develop an integrated viewer which can display both text and image files on the Internet environment. Up to now, most viewers for full-text databases can be displayed documents only by image or graphic viewers. The newly developed system can compress document files in commercial word processors (e.g, 한글TM, WordTM, ExceITM, PowerpointTM, HunminJungumTM, ArirangTM, CADTM), as well as conventional TIFF image file in smaller size, which were converted into DVI(DeVice Independent) file format, and display them on computer screen. IDoc Viewer was evaluated to test its performance by user group, consisting of 5 system developers, 5 librarians, and 10 end-users. IDoc Viewer has been proved to be good or excellent at 20 out of 26 check lists.

  • PDF

GPU-Accelerated Password Cracking of PDF Files

  • Kim, Keon-Woo;Lee, Sang-Su;Hong, Do-Won;Ryou, Jae-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2235-2253
    • /
    • 2011
  • Digital document file such as Adobe Acrobat or MS-Office is encrypted by its own ciphering algorithm with a user password. When this password is not known to a user or a forensic inspector, it is necessary to recover the password to open the encrypted file. Password cracking by brute-force search is a perfect approach to discover the password but a time consuming process. This paper presents a new method of speeding up password recovery on Graphic Processing Unit (GPU) using a Compute Unified Device Architecture (CUDA). PDF files are chosen as a password cracking target, and the Abode Acrobat password recovery algorithm is examined. Experimental results show that the proposed method gives high performance at low cost, with a cluster of GPU nodes significantly speeding up the password recovery by exploiting a number of computing nodes. Password cracking performance is increased linearly in proportion to the number of computing nodes and GPUs.

DEVELOPMENT OF ON-LINE DATA VISUALIZATION PROGRAM AND ITS APPLICATION (온-라인 데이터 가시화 프로그램의 개발과 그 적용)

  • Kang, S.H.;Kim, B.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.03a
    • /
    • pp.290-296
    • /
    • 2008
  • In this paper development of on-line data visualization program is described and some examples of data postprocessing are shown. The program is written in JAVA language and runs as a JAVA applet on the web browser such as Internet Explorer or Firefox. Remote users can use the program to visualize and analyze their own flow data by accessing the program server through the internet and loading data files in proper formats from their local computers. This paper describes briefly about algorithms for data visualization, structure and available functions of the program, and web sever system. The mechanism of how the JAVA applet can access and process local data files and relevant coding techniques are explained as well. Also explained is what is required for the remote users and client computers to access the program on-line. Some visualization examples performed on a local computer are illustrated by accessing the server remotely.

  • PDF

DEVELOPMENT OF ON-LINE DATA VISUALIZATION PROGRAM AND ITS APPLICATION (온-라인 데이터 가시화 프로그램의 개발과 그 적용)

  • Kang, S.H.;Kim, B.S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.290-296
    • /
    • 2008
  • In this paper development of on-line data visualization program is described and some examples of data postprocessing are shown. The program is written in JAVA language and runs as a JAVA applet on the web browser such as Internet Explorer or Firefox. Remote users can use the program to visualize and analyze their own flow data by accessing the program server through the internet and loading data files in proper formats from their local computers. This paper describes briefly about algorithms for data visualization, structure and available functions of the program, and web sever system. The mechanism of how the JAVA applet can access and process local data files and relevant coding techniques are explained as well. Also explained is what is required for the remote users and client computers to access the program on-line. Some visualization examples performed on a local computer are illustrated by accessing the server remotely.

  • PDF

Animation construction and application example by the post-processing of PIV data (PIV데이터의 post-processing에 의한 애니메이션 제작 및 적용예)

  • Kim, M.Y.;Choi, J.W.;Lee, H.;Lee, Y.H.
    • Proceedings of the KSME Conference
    • /
    • 2000.04b
    • /
    • pp.655-660
    • /
    • 2000
  • Animation technique from the PIV database is particularly emphasized to give macroscopic and quantitative description of complex flow fields. This paper shows animation construction and application example for the post-processing of PIV data. As examples, first case is a pitching airfoil immersed in tree surface water circulating tunnel. Second case is a wake of a model-ship. Third case of PIV data is a large scale surface flow field. Obtained images are processed in time sequence by PIV exclusive routines where an efficient and reliable cross correlation algorithm is included for vector identification. All. animation Jobs are implemented completely on single personal computer environment. Compressed digital images are obtained initially by Motion-JPEG board and various An files are finally obtained through graphic processes.

  • PDF

A Study On Enterprise Password Management Recommendations (대규모 조직에서의 패스워드 관리에 관한 권고 고찰)

  • Park, Jin-Sub
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF