• 제목/요약/키워드: computer files

검색결과 549건 처리시간 0.034초

Comparison Architecture for Large Number of Genomic Sequences

  • Choi, Hae-won;Ryoo, Myung-Chun;Park, Joon-Ho
    • 정보화연구
    • /
    • 제9권1호
    • /
    • pp.11-19
    • /
    • 2012
  • Generally, a suffix tree is an efficient data structure since it reveals the detailed internal structures of given sequences within linear time. However, it is difficult to implement a suffix tree for a large number of sequences because of memory size constraints. Therefore, in order to compare multi-mega base genomic sequence sets using suffix trees, there is a need to re-construct the suffix tree algorithms. We introduce a new method for constructing a suffix tree on secondary storage of a large number of sequences. Our algorithm divides three files, in a designated sequence, into parts, storing references to the locations of edges in hash tables. To execute experiments, we used 1,300,000 sequences around 300Mbyte in EST to generate a suffix tree on disk.

인터넷 인증 및 2차 생성 파일 암호화를 이용한 소프트웨어 부정 사용 방지 기술 (Preventing Unauthorized Software Usage by Internet Authentication and Encryption of Secondary Files)

  • 박성하;채동규;김상욱
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.435-436
    • /
    • 2014
  • 소프트웨어의 불법 복제 및 인증을 거치지 않은 부정 사용 등이 큰 문제가 되고 있다. 소프트웨어 부정 사용을 막기 위해 usb 인증, 시리얼 키 인증, 서버접속을 통한 인증 등 다양한 방법들이 존재해 왔다. 그러나 이러한 기술들의 우회 방법들이 상당수 공개된 실정이다. 본 연구에서는 보다 강화된 인터넷 인증 기반의 불법 사용 방지 기술을 제안하고자 한다. 뿐만 아니라 소프트웨어를 사용해 만들어 낸 2차 창작물 또한 보호하는 방법을 제시하고자 한다.

CNN 모델의 최적 양자화를 위한 웹 서비스 플랫폼 (Web Service Platform for Optimal Quantization of CNN Models)

  • 노재원;임채민;조상영
    • 반도체디스플레이기술학회지
    • /
    • 제20권4호
    • /
    • pp.151-156
    • /
    • 2021
  • Low-end IoT devices do not have enough computation and memory resources for DNN learning and inference. Integer quantization of real-type neural network models can reduce model size, hardware computational burden, and power consumption. This paper describes the design and implementation of a web-based quantization platform for CNN deep learning accelerator chips. In the web service platform, we implemented visualization of the model through a convenient UI, analysis of each step of inference, and detailed editing of the model. Additionally, a data augmentation function and a management function of files that store models and inference intermediate results are provided. The implemented functions were verified using three YOLO models.

Trends in Mobile Ransomware and Incident Response from a Digital Forensics Perspective

  • Min-Hyuck, Ko;Pyo-Gil, Hong;Dohyun, Kim
    • Journal of information and communication convergence engineering
    • /
    • 제20권4호
    • /
    • pp.280-287
    • /
    • 2022
  • Recently, the number of mobile ransomware types has increased. Moreover, the number of cases of damage caused by mobile ransomware is increasing. Representative damage cases include encrypting files on the victim's smart device or making them unusable, causing financial losses to the victim. This study classifies ransomware apps by analyzing several representative ransomware apps to identify trends in the malicious behavior of ransomware. We present a technique for recovering from the damage, from a digital forensic perspective, using reverse engineering ransomware apps to analyze vulnerabilities in malicious functions applied with various cryptographic technologies. Our study found that ransomware applications are largely divided into three types: locker, crypto, and hybrid. In addition, we presented a method for recovering the damage caused by each type of ransomware app using an actual case. This study is expected to help minimize the damage caused by ransomware apps and respond to new ransomware apps.

모듈화된 신경회로망을 이용한 거버 문자 인식 시스템 구현 (A Character Recognition System for Gerber File through Modularized Neural Network)

  • 오혜원;박태형
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 D
    • /
    • pp.2549-2551
    • /
    • 2003
  • We propose character recognition system for Gerber files. The Gerber file is the vector-formatted drawing file for PCB manufacturing. To consider the special vector format and rotated characters, we develop segmentation and feature extraction method. The modularized neural network is then applied to the recognition algorithm. Finally, comparative simulation results are presented to verify the usefulness of the proposed method.

  • PDF

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 가을 학술발표논문집 Vol.30 No.2 (1)
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

Malware Classification using Dynamic Analysis with Deep Learning

  • Asad Amin;Muhammad Nauman Durrani;Nadeem Kafi;Fahad Samad;Abdul Aziz
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.49-62
    • /
    • 2023
  • There has been a rapid increase in the creation and alteration of new malware samples which is a huge financial risk for many organizations. There is a huge demand for improvement in classification and detection mechanisms available today, as some of the old strategies like classification using mac learning algorithms were proved to be useful but cannot perform well in the scalable auto feature extraction scenario. To overcome this there must be a mechanism to automatically analyze malware based on the automatic feature extraction process. For this purpose, the dynamic analysis of real malware executable files has been done to extract useful features like API call sequence and opcode sequence. The use of different hashing techniques has been analyzed to further generate images and convert them into image representable form which will allow us to use more advanced classification approaches to classify huge amounts of images using deep learning approaches. The use of deep learning algorithms like convolutional neural networks enables the classification of malware by converting it into images. These images when fed into the CNN after being converted into the grayscale image will perform comparatively well in case of dynamic changes in malware code as image samples will be changed by few pixels when classified based on a greyscale image. In this work, we used VGG-16 architecture of CNN for experimentation.

Efficient FPGA Implementation of AES-CCM for IEEE 1609.2 Vehicle Communications Security

  • Jeong, Chanbok;Kim, Youngmin
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제6권2호
    • /
    • pp.133-139
    • /
    • 2017
  • Vehicles have increasingly evolved and become intelligent with convergence of information and communications technologies (ICT). Vehicle communications (VC) has become one of the major necessities for intelligent vehicles. However, VC suffers from serious security problems that hinder its commercialization. Hence, the IEEE 1609 Wireless Access Vehicular Environment (WAVE) protocol defines a security service for VC. This service includes Advanced Encryption Standard-Counter with CBC-MAC (AES-CCM) for data encryption in VC. A high-speed AES-CCM crypto module is necessary, because VC requires a fast communication rate between vehicles. In this study, we propose and implement an efficient AES-CCM hardware architecture for high-speed VC. First, we propose a 32-bit substitution table (S_Box) to reduce the AES module latency. Second, we employ key box register files to save key expansion results. Third, we save the input and processed data to internal register files for secure encryption and to secure data from external attacks. Finally, we design a parallel architecture for both cipher block chaining message authentication code (CBC-MAC) and the counter module in AES-CCM to improve performance. For implementation of the field programmable gate array (FPGA) hardware, we use a Xilinx Virtex-5 FPGA chip. The entire operation of the AES-CCM module is validated by timing simulations in Xilinx ISE at a speed of 166.2 MHz.

멀티미디어 파일 동시 스트리밍 방법 (Simultaneously Streaming Method of Multimedia Files)

  • 김진영;이은상;임소희;안병구
    • 한국인터넷방송통신학회논문지
    • /
    • 제15권5호
    • /
    • pp.105-112
    • /
    • 2015
  • 본 논문에서는 멀티미디어 파일 동시 스트리밍 방법을 제안한다. 제안된 방법의 주요한 특징 기여도는 다음과 같다. 첫째, 한 동영상을 두 개 이상의 기기에서 동시에 재생함으로써 공유와 재생을 동시에 하여 사용자에게 편의를 제공한다. 둘째, 스트리밍 방식의 시스템을 둘 이상의 기기에서 동시에 하는 기술을 개발함으로써 통신과 멀티미디어 기술에 이바지 한다. 제안된 방법의 구현 및 성능평가 결과 성공적인 UDP 데이터 통신과 수신하는 쪽에서 데이터를 받음과 동시에 동영상을 효과적으로 출력 할 수 있음을 알 수 있다.

장루 관리를 위한 Web 기반 간호교육 프로그램 개발 (Development of Web-based Nursing Education Program for Ostomy Care)

  • 홍해숙
    • 가정∙방문간호학회지
    • /
    • 제10권2호
    • /
    • pp.141-147
    • /
    • 2003
  • The purpose of this study was to develop and apply a Web-based Nursing Education & Instruction Program to help the clinical nurses improving their knowledge and skills of ostomy care. This program was developed in three different steps: analysis. design. and development. The results of the study were as follows: The analysis step was designed to select the study contents for effective and easy educationthrough the analyses of specialized books. This surveyed and analyzed study contents were categorized into five different sections. Introduction. ostomy classification. ostomy management. elimination management. and life style. After that each section describes necessary information of each category. In the design step. the image files used in this program were created using Adobe Photoshop 6.0. and HTML files were designed and developed using Namo Editor 5.0. In the development step. the developed program was published into Web using FTP (File Transfer Protocol) and then finalized after trial operation for testing of real users. In addition. this Web-based Nursing Education & Instruction Program will be used as excellentand effective tool for continuous and lifelong education in nursingfield. In this study. computer-aided education program was developed for ostomy management and managed at the Web-Server (http://hshong.knu.ac.kr/ostomy) in order to help nurses real-time education in clinical field by this program.

  • PDF