• Title/Summary/Keyword: computer files

Search Result 551, Processing Time 0.019 seconds

Android Storage Access Control for Personal Information Security (개인정보를 위한 안드로이드 저장장치 접근제어)

  • You, Jae-Man;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.123-129
    • /
    • 2013
  • Android file system is vulnerable to the external access of system resources via its arbitrary access mode and need user's control for SD and UMS medias due to its open architecture. In response to the device control, there is a drawback that its controlability is valid only in the case of embedded linux kernel with VDC function. Hence the solution is to directly implement VDC through system call, with another security module for device storage than system module being added to android system. In this paper the new method of android storage access control for personal information is proposed via VDC for mount system of storage. The access method for SD and UMS were implemented using VDC and mount mechanism. This access control system has been designed to control the granted users in kernel level if files are flowed out by copying. As a result, it was proved through testing that the access control system has exactly detected the write access operation.

The Influence of Quantization Table in view of Information Hiding Techniques Modifying Coefficients in Frequency Domain (주파수 영역 계수 변경을 이용한 정보은닉기술에서의 양자화 테이블의 영향력)

  • Choi, Yong-Soo;Kim, Hyoung-Joong;Park, Chun-Myoung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.56-63
    • /
    • 2009
  • Nowdays, Most of Internet Contents delivered as a compressed file. It gives many advantages like deduction of communication bandwidth and transmission time etc. In case of JPEG Compression, Quantization is the most important procedure which accomplish the compression. In general signal processing, Quantization is the process which converts continuous analog signal to discrete digital signal. As you known already, Quantization over JPEG compression is to reduce magnitude of pixel value in spatial domain or coefficient in frequency domain. A lot of Data Hiding algorithms also developed to applicable for those compressed files. In this paper, we are going to unveil the influence of quantization table which used in the process of JPEG compression. Even thought most of algorithm modify frequency coefficients with considering image quality, they are ignoring the influence of quantization factor corresponding with the modified frequency coefficient. If existing algorithm adapt this result, they can easily evaluate their performances.

Technique for Malicious Code Detection using Stacked Convolution AutoEncoder (적층 콘볼루션 오토엔코더를 활용한 악성코드 탐지 기법)

  • Choi, Hyun-Woong;Heo, Junyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • Malicious codes cause damage to equipments while avoiding detection programs(vaccines). The reason why it is difficult to detect such these new malwares using the existing vaccines is that they use "signature-based" detection techniques. these techniques effectively detect already known malicious codes, however, they have problems about detecting new malicious codes. Therefore, most of vaccines have recognized these drawbacks and additionally make use of "heuristic" techniques. This paper proposes a technology to detecting unknown malicious code using deep learning. In addition, detecting malware skill using Supervisor Learning approach has a clear limitation. This is because, there are countless files that can be run on the devices. Thus, this paper utilizes Stacked Convolution AutoEncoder(SCAE) known as Semi-Supervisor Learning. To be specific, byte information of file was extracted, imaging was carried out, and these images were learned to model. Finally, Accuracy of 98.84% was achieved as a result of inferring unlearned malicious and non-malicious codes to the model.

Preliminary Study on Global Clipboard System (글로벌 클립보드 시스템에 대한 기초 연구)

  • Hwang, Kitae;Kwon, Heejeong;Lee, Sanghoon;Park, Doyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.223-229
    • /
    • 2017
  • This paper proposes the Global Clipboard System and presents a preliminary study on it. The clipboard is a temporary storage used to copy and paste some contents between application programs in Windows Operating System. The proposed Global Clipboard is a contents delivery system that extends the concept of the existing local clipboard to Internet. The Global Clipboard System operates in two steps. An application user can upload selected contents to the Global Clipboard by typing consecutive keys of Ctrl-C and Ctrl-Shift-C easily. And other users can download and utilize the contents from the Global Clipboard by typing Ctrl-Shift-V and Ctrl-V keys consecutively. The proposed Global Clipboard can deal almost data like simple texts, screen capture images, files, and directories. In this paper, we developed a global clipboard server, a Windows application, and an Android application. We have conducted experiments about functions of the Global Clipboard and also compared delay times between 4 applications such as e-mail, Kakao, Google Drive, and the Global Clipboard. The results of the evaluation show that the time delay spending in sending and receiving contents is shortest when the Global Clipboard is used.

Implement of MapReduce-based Big Data Processing Scheme for Reducing Big Data Processing Delay Time and Store Data (빅데이터 처리시간 감소와 저장 효율성이 향상을 위한 맵리듀스 기반 빅데이터 처리 기법 구현)

  • Lee, Hyeopgeon;Kim, Young-Woon;Kim, Ki-Young
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.13-19
    • /
    • 2018
  • MapReduce, the Hadoop's essential core technology, is most commonly used to process big data based on the Hadoop distributed file system. However, the existing MapReduce-based big data processing techniques have a feature of dividing and storing files in blocks predefined in the Hadoop distributed file system, thus wasting huge infrastructure resources. Therefore, in this paper, we propose an efficient MapReduce-based big data processing scheme. The proposed method enhances the storage efficiency of a big data infrastructure environment by converting and compressing the data to be processed into a data format in advance suitable for processing by MapReduce. In addition, the proposed method solves the problem of the data processing time delay arising from when implementing with focus on the storage efficiency.

A Study on the Improvement of Home Economics Curriculum in Middle Schools (중학교 가정과 교육과정 운영개선에 관한 연구)

  • Lee, Jeong;Kim, Kyung-Ae
    • Journal of Korean Home Economics Education Association
    • /
    • v.4 no.1
    • /
    • pp.43-55
    • /
    • 1992
  • The purpose of this reasearch is to supply the basic data to improve Home Economics curriculum. This research was intended for 190 home economics teachers who are teaching in Kwang-Ju and chun-nam. The results are summarized as follows; 1. Among the objects of Home economics, the most important objects were to make students understand the significance of family life and development of family numbers. It requires 4 or 5 hours a week to learn these objects. 2. The amount of curriculum was immense and the level of curriculum was higher than students’level. More intencifying field are in this order; sex education, propriety education, consumption life, occupation, and computer education. 3. In home economics curriculum, the main stress was laid upon the application of action and learning content was focused on the matter set in the examination. 4. Theory and practical training classes were usually in the ratio of 7:3 and 8:2 in the current school classes. Ideal training classes are in the ration of 4:6, 5:5, 6:4, which showed that much weight was given to the practical exercises. 5. In practing subject matter, students tended to practice only main subject matter. The reason was primarily due to the lacks of equipments and faccilities, the limitation of training time for enterance examination and budgetary deficit. 6. Application of resorces was in the order of files, realia, samples, hanging chart, O.H.P and V.T.R. 7. The method of evaluation was mostly composed of paper and pens and practical evaluation when the practical evaluation was carrient out, in the case of necessity the standard of evaluation was made out.

  • PDF

3D Video Simulation System Using GPS (GPS를 이용한 3D 영상 구현 시뮬레이션 시스템)

  • Kim, Han-Kil;Joo, Sang-Woong;Kim, Hun-Hee;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.855-860
    • /
    • 2014
  • Currently, aircraft and automobile simulator for training provides a variety of training by making hypothetical situation on a simulator installed on the ground currently. And the instructor maximizes the effectiveness of the training by monitoring training and instructing the required training. When trainees are boarding the aircraft or automobile. The Instructor in the ground is not able to monitoring aircraft, automobile. The assessment of the training is not easy after the end of the training. Therefore, it is difficult to provide high quality of education to the students. In this paper, simulation system is to develop the following. Collecting GPS and real-time information for aircraft, automobile $\grave{a}$implementing 3D simulation. Implementing current image of the aircraft or automobile in the screen by 3D real-time monitoring of training situation at the control center utilizing for training saving 3D video files analysis, evaluation on training after the end of the training.

Construction and Applications of the Virtual Automotive Plant for a Victual Manufacturing (가상생산기술 적용을 위한 자동차 가상플랜트 구축 및 활용)

  • No, Sang-Do;Lee, Gyo-Il;Son, Chang-Yeong;Han, Hyeong-Sang;Park, Yeong-Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.25 no.10
    • /
    • pp.1627-1635
    • /
    • 2001
  • Virtual manufacturing is a technology facilitating effective development and agile manufacturing of products via sophisticated computer models representing physical and logical schema and behavior of real manufacturing systems including manufacturing resources, environments, and products. For the successful application of this technology, a virtual plant as a well-designed and integrated environment is essential fur sharing information and engineering collaboration among diverse engineering activities. The systematic approaches and effective methods for construction and application of a virtual plant are proposed in this paper, such as a 3-D CAD modeling, cell and line simulations, databases and some information technologies. Measuring and 3-D CAD modeling technologies of many equipments, facilities and structures of the building are developed, and effective information management system managing CAD models, related files and data is implemented in WWW environments. Finally, precise simulations of unit cell lines and the whole plant are performed. For the beginning of implementing a Virtual Automotive Plant, the Virtual Plant fur the Body Shop of a Korean automotive company is constructed and implemented. We could obtain the benefit of savings in time and cost in many manufacturing preparation activities in the new car development processes.

Multiobjective Distributed Database System Design using Genetic Algorithms (유전적 알고리즘을 이용한 다목적 분산데이터베이스 설계)

  • Lee, Jae-Uk;Go, Seok-Beom;Jo, Jeong-Bok;Mitsuo Geo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2000-2007
    • /
    • 1999
  • Recently, DDS (Distributed Database System) has been often implemented on VAN (Value Added Network) as we know the amazing expansion of information network. DDS can yield significant cost and response time advantages over centrailzed systems for geographically distributed organizations. However, inappropriate design can result in high cost and poor response time. In a DDS design, the main problem is 1) how to select proper computer, and 2) how to allocate data fragment into proper nodes. This paper addresses DDS design problem of selecting the proper class of computers and the allocating data files on VAN. Also, the formulated model includes tow objectives, the operating and investment cost. GA (Genetic Algorithm) is developed to solve this mathematical formulation. A numerical experiment shows that the proposed method arrives at a good solution.

  • PDF

Real-Time File Integrity Checker for Intrusion Recovery and Response System (침입 복구 및 대응 시스템을 위한 실시간 파일 무결성 검사)

  • Jeun Sanghoon;Hur Jinyoung;Choi Jongsun;Choi Jaeyoung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.279-287
    • /
    • 2005
  • File integrity checking is the most reliable method to examine integrity and stability of system resources. It is required to examine the whole data whenever auditing system's integrity, and its process and result depends on administrator's experience and ability. Therefore the existing method is not appropriate to intrusion response and recovery systems, which require a fast response time. Moreover file integrity checking is able to collect information about the damaged resources, without information about the person who generated the action, which would be very useful for intrusion isolation. In this paper, we propose rtIntegrit, which combines system call auditing functions, it is called Syswatcher, with file integrity checking. The rtlntegrit can detect many activities on files or file system in real-time by combining with Syswatcher. The Syswatcher audit file I/O relative system call that is specified on configuration. And it can be easily cooperated with intrusion response and recovery systems since it generates assessment data in the standard IDMEF format.