• Title/Summary/Keyword: computer files

Search Result 551, Processing Time 0.028 seconds

The Fast Editing and/or Storing Technique for Large-sized Multimedia Files with Page Sharing on NAND Flash Memory (NAND 플래시 메모리 상에서 페이지 공유를 통한 대용량 멀티미디어 파일 고속 편집저장 기법)

  • Ko, Seok-Young;Jung, Seung-Wan;Nam, Young-Jin;Seo, Dae-Wha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06b
    • /
    • pp.576-579
    • /
    • 2008
  • 본 논문은 NAND 플래시 메모리를 기반으로 한 멀티미디어 휴대 장치에서 동영상 파일을 고속으로 편집하고 동시에 필요한 저장 공간 소모를 최소화 하는 기법을 제안한다. 동영상 파일 편집 후 저장에 있어서 현재의 NAND 플래시 파일 시스템들은 편집 내용을 빈 공간에 새로 저장하기 때문에, 대용량의 파일일수록 많은 시간과 저장 공간이 소모 된다. 본 논문에서 제안하는 기법은 동영상 편집 후 파일 간에 중복되는 데이터를 새로 저장하지 않고 공유하도록 하면서 소모되는 시간과 공간을 최소화 한다. 이를 위해 파일 간 공유 되는 데이터를 관리하는 페이지 공유 맵을 설계하고 이를 이용한 동영상 고속 편집저장 기법을 제시한다.

  • PDF

Research on Memory Initialization through Using Arduino Temporary Files (아두이노 임시파일을 이용한 메모리 초기화에 관한 연구)

  • Lee, Woo-Ho;Kang, Sung-Min;Lim, Chae-Sang;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.250-251
    • /
    • 2016
  • 사물인터넷은 기존의 여러 ICT기술과 유,무선 장비의 네트워크 및 다양한 통신 기술들이 적용된 것을 의미한다. 최근 다양한 사물 인터넷에 대한 발전은 경량화, 소형화 되어가며 OSHW(Open Source HardWare)을 기반으로 점차 다양화 되었다. 이에 따라 사물인터넷 다양한 디바이스와 펌웨어, 암호학에 대한 연구는 활발하게 진행되고 있다. 하지만 특정 하드웨어의 센서 디바이스에 대한 연구는 부족하다. 본 논문에서는 OSHW 중 하나인 AVR기반의 아두이노 개발도구에 대한 임시 파일에 대해 분석하고 메모리 초기화 방법에 대해 제안한다. 또한 임시파일을 이용한 메모리 초기화 방법을 이용하여 사용자정보와 메모리 공격에 대한 데이터 유출을 방지할 수 있다.

Color Matching Method for Stitching Machine (자수로봇을 위한 컬러매칭방법)

  • 이희만;김지영;서정만
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.82-87
    • /
    • 2003
  • In this paper, the color matching algorithm is Proposed for stitching machine. The matched embroidery color threads are selected by using the proposed algorithm from a computer files which is designed on the computer or scanned from the drawings designed by an artist. The proposed algorithm finds the best matching nearest colors from the given embroidery color threads . The multiple candidates owing to have the equal distance in the CIE color space are further processed to find nearest dominant color. The color dithering method will be useful for reproducing original design with high fidelity.

  • PDF

Porting LLVM Compiler to a Custom Processor Architecture Using Synopsys Processor Designer

  • Jung, Hyungyun;Shin, Jangseop;Heo, Ingoo;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.53-56
    • /
    • 2014
  • Application specific instruction-set processor (ASIP) is a suitable design choice for system designers who seek both flexibility to handle various applications in the domain together with the performance. Successful development of an ASIP, however, requires a software development kit (SDK) to be provided along with the processor. Synopsys Processor Designer is an ASIP development tool, which takes as input a set of files written in a high-level architecture description language called LISA (Language for Instruction Set Architecture), and generates SDK as well as RTL. Recently, they have added support for the generation of LLVM compiler backend, though some manual work is required. In this paper, we introduce some details in porting LLVM compiler to a custom processor architecture in Synopsys Processor Designer.

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Priority-Based Hybrid File Storage Management System Using Logical Volume Manager (논리 볼륨 매니저를 이용한 파일 우선순위 기반의 하이브리드 저장장치 관리 시스템)

  • Choi, Hoonha;Kim, Hyeunjee;No, Jaechun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.94-102
    • /
    • 2016
  • Recently, the I/O performance of a single node is rapidly improving due to the advent of high-performance SSD. As a result, the next-generation storage platform based on SSD has received a great deal of attention and such storage platforms are increasingly adopted to commodity servers or data centers that look for the high-bandwidth computation and I/O. However, building all SSD-based storage platform may not be cost-effective because the price per storage capacity is very high as compared to that of HDD. In this paper. we propose a hybrid file management solution, called HyPLVM(Hybrid Priority Logical Volume Manager), which combines the strength of SSD with the desirable aspects of low-price, high-storage capacity HDD. HyPLVM prioritizes the files and directories to be accessed by users, in order to determine the target storage device (SSD/HDD) in which files are allocated, while mitigating the cost of building storage platforms.

Content-based Extended CAN to Support Keyword Search (키워드 검색 지원을 위한 컨텐츠 기반의 확장 CAN)

  • Park, Jung-Soo;Lee, Hyuk-ro;U, Uk-dong;Jo, In-june
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.103-109
    • /
    • 2005
  • Research about P2P system have recently a lot of attention in connection of form that pass early Centralized P2P and is Decentralized P2P. Specially, Structured P2P System of DHT base have a attention to scalability and systematic search and high search efficiency by routing. But, Structured P2P System of DHT base have problem, file can be located only their unique File IDs that although user may wish to search for files using a set descriptive keyword or do not have the exact File ID of the files. This paper propose extended-CAN mechanism that creates File ID of Contents base and use KID and CKD for commonness keyword processing to support keyword search in P2P System of DHT base.

  • PDF

An Automatic Extraction Scheme of Dependency Relations between Web Components and Web Resources in Java Web Applications (자바 웹 앱에서 웹 컴포넌트와 웹 자원의 의존 관계를 자동으로 추출하는 기법)

  • Oh, Jaewon;Lee, Seunghyun;Kim, Ah Hyoung;Ahn, Woo Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.458-470
    • /
    • 2018
  • As the requirements of web apps become complex and rapidly changing, the maintenance of web apps becomes more important. However, web apps have a problem that more often than not there is not enough documentation to understand and maintain them. Thus, their effective maintenance requires models that represent their internal behavior occurring when they dynamically generate web pages. Previous works identify web components (such as JSPs and Servlets) as participants in the behavior but not web resources (such as images, CSS files, and JavaScript files). Moreover, they do not identify dependency relations between web components and web resources. This paper dynamically analyzes Java web apps to extract such dependency relations, which are included in our graph model for page generation. Case studies using open-source web apps show the applicability of the proposed approach.

Study on Measuring Geometrical Modification of Document Image in Scanning Process (스캐닝 과정에서 발생하는 전자문서의 기하학적 변형감지에 관한 연구)

  • Oh, Dong-Yeol;Oh, Hae-Seok;Rhew, Sung-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1869-1876
    • /
    • 2009
  • Scanner which is a kind of optical devices is used to convert paper documents into document image files. The assessment of scanned document image is performed to check if there are any modification on document image files in scanning process. In assessment of scanned documents, user checks the degree of skew, noise, folded state and etc This paper proposed to how to measure geometrical modifications of document image in scanning process. In this study, we check the degree of modification in document image file by image processing and we compare the evaluation value which means the degree of modification in each items with OCR success ratio in a document image file. To analyse the correlation between OCR success ratio and the evaluation value which means the degree of modification in each items, we apply Pearson Correlation Coefficient and calculate weight value for each items to score total evaluation value of image modification degrees on a image file. The document image which has high rating score by proposed method also has high OCR success ratio.

Development of the Computer-Assisted HACCP System Program and Developing HACCP-Based Evaluation Tools of Sanitation for Institutional Foodservice Operations (단체급식의 HACCP 전산프로그램 및 위생관리 평가도구 개발)

  • 이정숙;홍희정;곽동경
    • Korean Journal of Community Nutrition
    • /
    • v.3 no.4
    • /
    • pp.655-667
    • /
    • 1998
  • The Computer-assisted Hazard Analysis and Critical Control Point(HACCP) program has been developed for a systematic implementation of HACCP principles in identifying, assessing and controlling hazards in institutional foodservics operations. The HACCP-based sanitation evaluation tool has been developed, based on the results of the computerized assisted HACCP program in 4 service sites of C contracted foodservice company, including 2 general hospitals with 650-beds, one office operation of 400 meals per day, and one factory foodservice of 1,000 meals per day. All database files and processing programs were created by using Unify Vision tool with Windows 95 of user environments. The results of this study can be summarized as follows : 1. This program consists of the pre-stage for HACCP study and the implementation stage of the HACCP system. 1) The pre-stage for HACCP study includes the selection of menu items, the development of the HACCP recipe, the construction of product flow diagrams, and printing the HACCP recipes and product flow diagrams. 2) The implementation of the HACCP system includes the identification of microbiological hazards, the determination of critical control points based on the decision tree base files. 3) The HACCP-based sanitation evaluation tool consisted of 3 dimensions of time-temperature relationship, personal hygiene, and equipment-facility sanitation. The Cronbach's alphas calculation indicated that the tool was reliable. The results showed that the focus groups rated the mean of importance in time-temperature relationship, personal hygiene, and equipment-facility sanitation as 4.57, 4.59 and 4.55 respectively. Based on the results, this HACCP-based sanitation evaluation tool was considered as an effective tool for assuring product quality. This program will assist foodservice managers to encourage a standardized approach in the HACCP study and to maintain a systematic approach for ensuring that the HACCP principles are applied correctly.

  • PDF