• Title/Summary/Keyword: computer files

Search Result 548, Processing Time 0.023 seconds

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

The Creation of Dental Radiology Multimedia Electronic Textbook (멀티미디어기술을 이용한 치과방사선학 전자 교과서 제작에 관한 연구)

  • Kim Eun-Kyung;Cha Sang-Yun;Han Won-Jeong;Hong Byeong-Hee
    • Imaging Science in Dentistry
    • /
    • v.30 no.1
    • /
    • pp.55-62
    • /
    • 2000
  • Purpose: This study was performed to develop the electronic textbook (CD-rom title) about preclinical practice of oral and maxillofacial radiology, using multimedia technology with interactive environment. Materials and Methods: After comparing the three authoring methods of multimedia, i.e. programming language, multimedia authoring tool and web authoring tool, we determined the web authoring tool as an authoring method of our electronic textbook. Intel Pentium II 350 MHz IBM-compatible personal computer with 128 Megabyte RAM, Umax Powerlook flatbed scanner with transparency unit, Olympus Camedia l400L digital camera, ESS 1686 sound card, Sony 8 mm Handycam, PC Vision 97 pro capture board, Namo web editor 3.0, Photoshop 3.0, ThumbNailer, RealPlayer 7 basic and RealProducer G2 were used for creating the text document, diagram, figure, X-ray image, video and sound files. We made use of javascripts for tree menu structure, moving text bar, link button and spread list menu and image map etc. After creating all files and hyperlinking them, we burned out the CD-rom title with all of the above multimedia data, Netscape communicator and plug in program as a prototype. Results and Conclusions : We developed the dental radiology electronic textbook which has 9 chapters and consists of 155 text documents, 26 figures, 150 X-ray image files, 20 video files, 20 sound files and 50 questions with answers. We expect that this CD-rom title can be used at the intranet and internet environments and continuous updates will be performed easily.

  • PDF

The Research on the Recovery Techniques of Deleted Files in the XFS Filesystem (XFS 파일 시스템 내의 삭제된 파일 복구 기법 연구)

  • Ahn, Jae-Hyoung;Park, Jung-Heum;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.885-896
    • /
    • 2014
  • The files in computer storages can be deleted due to unexpected failures or accidents. Some malicious users often delete data by himself for anti-forensics. If deleted files are associated with crimes or important documents in business, they should be recovered and the recovery tool is necessary. The recovery methods and tools for some filesystems such as NTFS, FAT, and EXT have been developed actively. However, there has not been any researches for recovering deleted files in XFS filesystem applied to NAS or CCTV. In addition, since the current related tools are based on the traditional signature detection methods, they have low recovery rates. Therefore, this paper suggests the recovery methods for deleted files based on metadata and signature detection in XFS filesystem, and verifies the results by conducting experiment in real environment.

Methods for Investigating of Edit History about MS PowerPoint Files That Using the OOXML Formats (OOXML형식을 사용하는 MS 파워포인트 파일에 대한 편집 이력 조사 방법)

  • Youn, Ji-Hye;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.215-224
    • /
    • 2012
  • Today, individuals and businesses are a lot of paperwork through a computer. So many documents files are creating to digital type. And the digital type files are copied, moved by various media such as USB, E-mail and so on. A careful analysis of these digital materials can be tracked that occurred during the document editing work history. About these research are on the compound document file format, but has not been studied about the new OOXML format that how to analyze linkages between different document files, tracking an internal order, finding unsaved file for identify the process of creating the file. Future, the use of OOXML format digital documents will further increase, these document work history traceability in digital forensic investigation would be a big help. Therefore, this paper on the new OOXML format(has a forensic viewpoint) will show you how to track the internal order and analyze linkages between the files.

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

Block Allocation Method for Efficiently Managing Temporary Files of Hash Joins on SSDs (SSD상에서 해시조인 임시 파일의 효과적인 관리를 위한 블록 할당 방법)

  • Joontae, Kim;Sangwon, Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.429-436
    • /
    • 2022
  • Temporary files are generated when the Hash Join is performed on tables larger than the memory. During the join process, each temporary file is deleted sequentially after it completes the I/O operations. This paper reveals for that the fallocate system call and file deletion-related trim options significantly impact the hash join performance when temporary files are managed on SSDs rather than hard disks. The experiment was conducted on various commercial and research SSDs using PostgreSQL, a representative open-source database. We find that it is possible to improve the join performance up to 3 to 5 times compared to the default combination depending on whether fallocate and trim options are used for temporary files. In addition, we investigate the write amplification and trim command overhead in the SSD according to the combination of the two options for temporary files.

The Utilization of Electronic Journal Files in the Production of an Abstract Database: A case of KoreaMed System (초록 데이터베이스 구축에 있어서 학술지 전자출판 파일의 활용과 문제점: KoreaMed를 중심으로)

  • 이춘실
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.2
    • /
    • pp.13-29
    • /
    • 2001
  • The study examined the current status and the use of electronic publishing files to produce a bibliographic database. In particular . it examined the problems faced in the production of KoreaMed, an abstract database of Korean medical journals. The methodology of KoreaMed to utilize the computer files which was produced in the process of publication of a print journal is found to be very effective. It assures the accuracy of data, accelerates the input speeds, and reduces the input costs. However, such a project can not be accomplished to a satisfactory level without the cooperation of the publishers involved. It turns out that many small publishers and academic societies hardly have saved the electronic publishing files of previous issues. Besides, it is hard to maintain the right channel to receive the files continuously. The input and processing of special characters are very delicate problems. In addition, the diversity of layout and formats of journals, of the electronic publishing software used, and of the storage media, makes the utilization of the electronic publishing files a very complex process. In order to operate the KoreaMed system more efficiently by requiring the publishers to submit XML files which meets the standard of the KoreaMed, it is necessary to educate and train personnels of journal publishers for the management of electronic publishing files.

  • PDF

BDI Architecture Based on XML for Intelligent Multi-Agent Systems

  • Lee, Sang-wook;Yun, Ji-hyun;Kim, Il-kon;Hune Cho
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.511-515
    • /
    • 2001
  • Many intelligent agent systems are known to incorporate BDI architecture for cognitive reasoning. Since this architecture contains all the knowledge of world model and reasoning rule, it is very complex and difficult to handle. This paper describes a methodology to design and implement BDI architecture, BDIAXml based on XML for multi-agent systems. This XML-based BDI architecture is smaller than any other BDI architecture because it separates knowledge for reasoning from domain knowledge and enables knowledge sharing using XML technology. Knowledge for BDI mental state and reasoning is composed of specific XML files and these XML files are stored into a specific knowledge server. Most systems using BDIAxml architecture can access knowledge from this server. We apply this BDIAXml system to domain of Hospital Information System and show that this architecture performs more efficiently than other BDI architecture system in terms of knowledge sharing, system size, and ease of use.

  • PDF

Method for Finding Related Object File for a Computer Forensics in a Log Record of $LogFile of NTFS File System (NTFS 파일시스템의 $LogFile의 로그레코드에 연관된 컴퓨터 포렌식 대상 파일을 찾기 위한 방법)

  • Cho, Gyu-Sang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.1-8
    • /
    • 2012
  • The NTFS journaling file($LogFile) is used to keep the file system clean in the event of a system crash or power failure. The operation on files leaves large amounts of information in the $LogFile. Despite the importance of a journal file as a forensic evidence repository, its structure is not well documented. The researchers used reverse engineering in order to gain a better understanding of the log record structures of address parts, and utilized the address for identifying object files to gain forensic information.

ADPM 기반의 실기 수업을 위한 저작 시스템의 프로토타입 개발

  • 구정모;한병래
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.301-310
    • /
    • 2004
  • The Current 7th Curriculum for Computer Education emphasized the class of practice oriented, student oriented. But it is very hard because of many students, poor environments, insufficiency of the teaching model. So ADPM will gives our help. a ADPM based practical class using ebook synchronized with video files give a little student's wating time for answering, much student's learning efficiency, much student's voluntary learning custom, a individualized learning. And this study developed the prototype to support the ADPM. This prototype will make up for the weak points in authoring systems, which they are a wizard type program, capturing video file, synchronizing video files. And it will improve a practical class.

  • PDF