• Title/Summary/Keyword: storage management

Search Result 2,631, Processing Time 0.035 seconds

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

W3C XQuery Update facility on SQL hosts (관계형 테이블을 이용한 W3C XQuery 변경 기능의 지원)

  • Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.3
    • /
    • pp.306-310
    • /
    • 2008
  • XQuery is a new recommendation for XML query. As an efforts for extending XQuery capabilities XML insertion and deletion are being studied and its standardization are going on. Initially XML databases are developed simply for XML document management. Now their functions are extending to OLTP. In this paper we are adding updating functions to XQuery processing system that is developed only for XQuery retrievals. We suggest the structure of tables, numbering schemes for hierarchical structures, and the methods for SQL translations for XQuery updates.

Stability analysis on the concrete slab of the highest concrete-faced rock-fill dam in South Korea

  • Baak, Seung-Hyung;Cho, Gye-Chun;Song, Ki-Il
    • Geomechanics and Engineering
    • /
    • v.13 no.5
    • /
    • pp.881-892
    • /
    • 2017
  • Design and management of concrete slabs in concrete-faced rock-fill dams are crucial issues for stability and overall dam safety since cracks in the concrete face induced by stress, shrinkage, and deterioration can cause severe leakage from the reservoir into the dam. Especially, the increase of dam height to a certain level to enhance the storage capacity and to improve hydraulic stability can lead to undesirable deformation behavior and stress distribution in the existing dam body and in the concrete slabs. In such conditions, simulation of a concrete slab with a numerical method should involve the use of an interface element because the behavior of the concrete slab does not follow the behavior of the dam body when the dam body settles due to the increase of dam height. However, the interfacial properties between the dam body and the concrete slab have yet to be clearly defined. In this study, construction sequence of a 125 m high CFRD in South Korea is simulated with commercial FDM software. The proper interfacial properties of the concrete slab are estimated based on a comparison to monitored vertical displacement history obtained from the concrete slab. Possibility of shear strength failure under the critical condition is investigated based on the simplified model. Results present the significance of the interfacial properties of the concrete slab.

Design and Implementation of an Unified Cursor Considering Synchronization on the Android Mobile Platform (안드로이드 플랫폼 상에서 동기화가 고려된 통합 커서의 설계 및 구현)

  • Kim, Kyung-Hwan;Ha, Jo-Ho;Won, Jong-Pil;Lee, Uee-Song;Kim, Joo-Min;Son, Jin-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.3
    • /
    • pp.190-200
    • /
    • 2011
  • Android platform provides a content provider and a cursor mechanism to access the internal SQLite engine. Content providers not only store and retrieve data but also make it accessible to applications. Applications can only share data through content provider, since there's no common storage area that Android packages can access. Cursor is an interface that provides random read-write access to the result set returned by a database query. However, this cursor possesses two major limitations. First, a cursor does not support a join clause among cursors, since the cursor can only access a single table in the content provider. Second, the cursor is not capable of creating user-customized field in the predefined content providers. In this paper, we propose the unified cursor architecture that merges several cursors into a single virtual cursor. Cursor translation look-aside buffer (TLB), column windowing mechanism and virtual data management are the three major techniques we have adopted to implement our structure. And we also propose a delayed synchronization method between an application and a proposed unified cursor. An application can create a user-customized field and sort multiple tables using a unified cursor on Android platform.

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

Panic Disorder Intelligent Health System based on IoT and Context-aware

  • Huan, Meng;Kang, Yun-Jeong;Lee, Sang-won;Choi, Dong-Oun
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.21-30
    • /
    • 2021
  • With the rapid development of artificial intelligence and big data, a lot of medical data is effectively used, and the diagnosis and analysis of diseases has entered the era of intelligence. With the increasing public health awareness, ordinary citizens have also put forward new demands for panic disorder health services. Specifically, people hope to predict the risk of panic disorder as soon as possible and grasp their own condition without leaving home. Against this backdrop, the smart health industry comes into being. In the Internet age, a lot of panic disorder health data has been accumulated, such as diagnostic records, medical record information and electronic files. At the same time, various health monitoring devices emerge one after another, enabling the collection and storage of personal daily health information at any time. How to use the above data to provide people with convenient panic disorder self-assessment services and reduce the incidence of panic disorder in China has become an urgent problem to be solved. In order to solve this problem, this research applies the context awareness to the automatic diagnosis of human diseases. While helping patients find diseases early and get treatment timely, it can effectively assist doctors in making correct diagnosis of diseases and reduce the probability of misdiagnosis and missed diagnosis.

Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility (보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현)

  • Lee Goo-Yeon;Lee Yong;Kim Hwa-Jong;Jeong Choong-Kyo;Lee Dong-Eun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

Development of a System-Independent Mobile Smart Shelter using Solar Energy (태양광 에너지를 이용한 계통 독립형 이동식 스마트 쉼터 개발)

  • Joo, Jong-Yul;Lee, Young-Jae;Park, Kyoung-Wook;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1061-1068
    • /
    • 2020
  • This paper presents a system-independent mobile smart shelter using solar energy technology that can be freely installed in various places, such as parks, countryside, event area, construction area and walking tour places where the system power are difficult to use. The proposed smart shelter is equipped with solar power generation and energy storage devices that is combined with IoT technology to collect indoor and outdoor humidity, fine dust and tourist awareness in real time. It is possible to efficiently manage energy by performing the optimal energy operation during the heat- wave, cold-wave situation and the presence of travelers and it is possible to serve as a shelter for as long as possible without system power.

Deep Learning Based Tank Aiming line Alignment System (딥러닝 기반 전차 조준선 정렬 시스템)

  • Jeong, Gyu-Been;Park, Jae-Hyo;Seok, Jong-Won
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.285-290
    • /
    • 2021
  • The existing aiming inspection use foreign-made aiming inspection equipment. However, the quantity is insufficient and the difficult to maintain. So it takes a lot of time to inspect the target. This system can reduces the time of aiming inspection and be maintained and distributed smoothly because it is a domestic product. In this paper, we develop a system that can detect targets and monitor shooting results through a target detection deep learning model. The system is capable of real-time detection of targets and has significantly increased the identification rate through several preprocessing of distant targets. In addition, a graphical user interface is configured to facilitate user camera manipulation and storage and management of training result data. Therefore the system can replace the currently used aiming inspection equipment and non-fire training.

An Economic Analysis for Establishing a Hydrogen Supply Plan in the Metropolitan Area (수도권 수소 공급 계획 수립을 위한 사전 경제성 분석)

  • PARK, HYEMIN;KIM, SUHYUN;KIM, BYUNGIN;LEE, SEUNGHUN;LEE, HYEJIN;YOO, YOUNGDON
    • Journal of Hydrogen and New Energy
    • /
    • v.33 no.3
    • /
    • pp.183-201
    • /
    • 2022
  • In this study, economic feasibility analysis was performed when various hydrogen production and transport technologies were applied to derive hydrogen supply plans by period. The cost of hydrogen may vary depending on several reasons; configuration of the entire cycle supply path from production, storage/transportation, and utilization to the cost that can be supplied to consumers. In this analysis, the hydrogen supply price according to the hydrogen supply route configuration for each period was analyzed for the transportation hydrogen demand in metropolitan area, where the demand for hydrogen is expected to be the highest due to the expansion of hydrogen supply.