• Title/Summary/Keyword: upload

Search Result 205, Processing Time 0.024 seconds

PHP File Upload implementation of infinite using a single Database Field (단일 Database Field를 이용한 PHP 무한 File Upload 구현)

  • Hwang, Ki-Hwan;Byun, Ki-Hwan;Lee, Jie-Young
    • The Journal of Information Technology
    • /
    • v.12 no.2
    • /
    • pp.49-55
    • /
    • 2009
  • Currently the Web, multiple files in the Client to upload to the server of the multi-upload method, files are stored in specific folders on the server, the file name field in DB(Database Field) stored in a way that the process has been widely utilized. Therefore, a minimum number of file upload as many file names in the Database and the Table should be created in the field, but also a variable number of files can be uploaded has no limits. In this paper we proposed the new method that files to be uploaded to the server, you can upload a limited number of files, nor due to upload files to reduce load on the database to improve the processing speed of a single field using a multi-method file uploads using PHP directly implemented

  • PDF

Research on countermeasures against malicious file upload attacks (악성 파일 업로드 공격 대응방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.53-59
    • /
    • 2020
  • Malicious file upload attacks mean that the attacker to upload or transfer files of dangerous types that can be automatically processed within the web server's environment. Uploaded file content can include exploits, malware and malicious scripts. An attacker can user malicious content to manipulate the application behavior. As a method of detecting a malicious file upload attack, it is generally used to find a file type by detecting a file extension or a signature of the file. However, this type of file type detection has the disadvantage that it can not detect files that are not encoded with a specific program, such as PHP files. Therefore, in this paper, research was conducted on how to detect and block any program by using essential commands or variable names used in the corresponding program when writing a specific program. The performance evaluation results show that it detected specific files effectively using the suggested method.

Implementation of an ASP Upload Component to Comply with RFC 1867 (RFC 1867 규격을 준수하는 ASP 업로드 컴포넌트 설계)

  • Hwang Hyun-Ju;Kang Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.3
    • /
    • pp.63-74
    • /
    • 2006
  • Recently many ASP applications have been released which enable them to accept, save and manipulate files uploaded with a web browser. The files are uploaded via an HTML POST form using RFC 1867 In particular, the file transfer via the HTTP port is getting more important because of the current Internet security issues. In this paper, we implement a form-based ASP upload component and disclose explicitly most of the main codes. That is, the open source might be helpful to develop the new ASP applications including file upload function in the future. We also show the upload time and CPU usage time of the proposed upload component and compare with the well-known commercial ones, showing the performance metrics of the proposed component are comparable to those of commercial ones.

  • PDF

Unified Programmer for AVR-Based Arduino-Compatible Boards (AVR 기반 아두이노 호환 보드를 위한 통합 프로그래머)

  • Heo, Gyeongyong;Ryu, Daewoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.96-101
    • /
    • 2021
  • Arduino is one of the open source microcontroller projects, and Arduino boards using AVR microcontrollers are commonly used. In general, AVR microcontrollers use ISP (In System Programming) upload, but in Arduino, serial upload through a bootloader is basically used, and a dedicated microcontroller is built into the board for this purpose. In order to use the ISP upload in Arduino, a dedicated upload device is required, which is not included in the Arduino board. In this paper, we propose a unified programmer that can handle ISP upload and serial upload through one dedicated microcontroller, and show that ISP and serial upload are possible using the unified programmer. In addition, the proposed unified programmer works as a USB-serial converter, supports serial communication with a computer, and it is also possible to burn the Arduino bootloader. All operations of the unified programmer can be confirmed through the experimental results.

PECAN: Peer Cache Adaptation for Peer-to-Peer Video-on-Demand Streaming

  • Kim, Jong-Tack;Bahk, Sae-Woong
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.286-295
    • /
    • 2012
  • To meet the increased demand of video-on-demand (VoD) services, peer-to-peer (P2P) mesh-based multiple video approaches have been recently proposed, where each peer is able to find a video segment interested without resort to the video server. However, they have not considered the constraint of the server's upload bandwidth and the fairness between upload and download amounts at each peer. In this paper, we propose a novel P2P VoD streaming system, named peer cache adaptation (PECAN) where each peer adjusts its cache capacity adaptively to meet the server's upload bandwidth constraint and achieve the fairness. For doing so, we first propose a new cache replacement algorithm that designs the number of caches for a segment to be proportional to its popularity. Second, we mathematically prove that if the cache capacity of a peer is proportional to its segment request rate, the fairness between upload and download amounts at each peer can be achieved. Third, we propose a method that determines each peer's cache capacity adaptively according to the constraint of the server's upload bandwidth. Against the proposed design objective, some selfish peers may not follow our protocol to increase their payoff. To detect such peers, we design a simple distributed reputation and monitoring system. Through simulations, we show that PECAN meets the server upload bandwidth constraint, and achieves the fairness well at each peer. We finally verify that the control overhead in PECAN caused by the search, reputation, and monitoring systems is very small, which is an important factor for real deployment.

The incidence of unexpected delays in uploading outside radiologic images in the transfer of patients with major trauma

  • Woo, Si Jun;Kim, Yong Oh;Kim, Hyung Il
    • Journal of Trauma and Injury
    • /
    • v.35 no.2
    • /
    • pp.92-98
    • /
    • 2022
  • Purpose: Critically ill patients are frequently transferred from one point of care to a hospital that can provide a higher level of care. To achieve optimal treatment within the targeted window of time necessary for time-sensitive cases like major trauma, rapid transportation and decision making are essential. Transferred patients have often undergone radiologic imaging at the referring hospital. Examining these outside images is paramount. Therefore, this study was conducted to estimate the upload time of outside images. Methods: This retrospective study was conducted from January to April 2020. Patients transferred from other hospitals with digitally recorded CDs or DVDs of radiologic or diagnostic images were included. When the patients were registered at the emergency department reception desk, the digital images were transmitted to our picture archiving and communication system using transmission software. The time of upload and the numbers of digital images were recorded. The time interval from patient registration to the time of upload was calculated. Results: The median number of images was 688 in the trauma team activation (TTA) group (688 in the TTA group, 281 in the non-TTA trauma group, and 176 in the nontrauma group, respectively; P<0.001). The median upload time was 10 minutes. The longest upload time was 169 minutes. The upload time was more than 20 minutes in 12 cases (19.4%). Conclusions: Patients with major trauma bring more images than patients with other diseases. Unexpected delays (>20 minutes) were noted in approximately 20% of cases. It is necessary to minimize this time.

Understanding User Motivations and Behavioral Process in Creating Video UGC: Focus on Theory of Implementation Intentions (Video UGC 제작 동기와 행위 과정에 관한 이해: 구현의도이론 (Theory of Implementation Intentions)의 적용을 중심으로)

  • Kim, Hyung-Jin;Song, Se-Min;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.125-148
    • /
    • 2009
  • UGC(User Generated Contents) is emerging as the center of e-business in the web 2.0 era. The trend reflects changing roles of users in production and consumption of contents on websites and helps us to understand new strategies of websites such as web portals and social network websites. Nowadays, we consume contents created by other non-professional users for both utilitarian (e.g., knowledge) and hedonic values (e.g., fun). Also, contents produced by ourselves (e.g., photo, video) are posted on websites so that our friends, family, and even the public can consume those contents. This means that non-professionals, who used to be passive audience in the past, are now creating contents and share their UGCs with others in the Web. Accessible media, tools, and applications have also reduced difficulty and complexity in the process of creating contents. Realizing that users create plenty of materials which are very interesting to other people, media companies (i.e., web portals and social networking websites) are adjusting their strategies and business models accordingly. Increased demand of UGC may lead to website visits which are the source of benefits from advertising. Therefore, they put more efforts into making their websites open platforms where UGCs can be created and shared among users without technical and methodological difficulties. Many websites have increasingly adopted new technologies such as RSS and openAPI. Some have even changed the structure of web pages so that UGC can be seen several times to more visitors. This mainstream of UGCs on websites indicates that acquiring more UGCs and supporting participating users have become important things to media companies. Although those companies need to understand why general users have shown increasing interest in creating and posting contents and what is important to them in the process of productions, few research results exist in this area to address these issues. Also, behavioral process in creating video UGCs has not been explored enough for the public to fully understand it. With a solid theoretical background (i.e., theory of implementation intentions), parts of our proposed research model mirror the process of user behaviors in creating video contents, which consist of intention to upload, intention to edit, edit, and upload. In addition, in order to explain how those behavioral intentions are developed, we investigated influences of antecedents from three motivational perspectives (i.e., intrinsic, editing software-oriented, and website's network effect-oriented). First, from the intrinsic motivation perspective, we studied the roles of self-expression, enjoyment, and social attention in forming intention to edit with preferred editing software or in forming intention to upload video contents to preferred websites. Second, we explored the roles of editing software for non-professionals to edit video contents, in terms of how it makes production process easier and how it is useful in the process. Finally, from the website characteristic-oriented perspective, we investigated the role of a website's network externality as an antecedent of users' intention to upload to preferred websites. The rationale is that posting UGCs on websites are basically social-oriented behaviors; thus, users prefer a website with the high level of network externality for contents uploading. This study adopted a longitudinal research design; we emailed recipients twice with different questionnaires. Guided by invitation email including a link to web survey page, respondents answered most of questions except edit and upload at the first survey. They were asked to provide information about UGC editing software they mainly used and preferred website to upload edited contents, and then asked to answer related questions. For example, before answering questions regarding network externality, they individually had to declare the name of the website to which they would be willing to upload. At the end of the first survey, we asked if they agreed to participate in the corresponding survey in a month. During twenty days, 333 complete responses were gathered in the first survey. One month later, we emailed those recipients to ask for participation in the second survey. 185 of the 333 recipients (about 56 percentages) answered in the second survey. Personalized questionnaires were provided for them to remind the names of editing software and website that they reported in the first survey. They answered the degree of editing with the software and the degree of uploading video contents to the website for the past one month. To all recipients of the two surveys, exchange tickets for books (about 5,000~10,000 Korean Won) were provided according to the frequency of participations. PLS analysis shows that user behaviors in creating video contents are well explained by the theory of implementation intentions. In fact, intention to upload significantly influences intention to edit in the process of accomplishing the goal behavior, upload. These relationships show the behavioral process that has been unclear in users' creating video contents for uploading and also highlight important roles of editing in the process. Regarding the intrinsic motivations, the results illustrated that users are likely to edit their own video contents in order to express their own intrinsic traits such as thoughts and feelings. Also, their intention to upload contents in preferred website is formed because they want to attract much attention from others through contents reflecting themselves. This result well corresponds to the roles of the website characteristic, namely, network externality. Based on the PLS results, the network effect of a website has significant influence on users' intention to upload to the preferred website. This indicates that users with social attention motivations are likely to upload their video UGCs to a website whose network size is big enough to realize their motivations easily. Finally, regarding editing software characteristic-oriented motivations, making exclusively-provided editing software more user-friendly (i.e., easy of use, usefulness) plays an important role in leading to users' intention to edit. Our research contributes to both academic scholars and professionals. For researchers, our results show that the theory of implementation intentions is well applied to the video UGC context and very useful to explain the relationship between implementation intentions and goal behaviors. With the theory, this study theoretically and empirically confirmed that editing is a different and important behavior from uploading behavior, and we tested the behavioral process of ordinary users in creating video UGCs, focusing on significant motivational factors in each step. In addition, parts of our research model are also rooted in the solid theoretical background such as the technology acceptance model and the theory of network externality to explain the effects of UGC-related motivations. For practitioners, our results suggest that media companies need to restructure their websites so that users' needs for social interaction through UGC (e.g., self-expression, social attention) are well met. Also, we emphasize strategic importance of the network size of websites in leading non-professionals to upload video contents to the websites. Those websites need to find a way to utilize the network effects for acquiring more UGCs. Finally, we suggest that some ways to improve editing software be considered as a way to increase edit behavior which is a very important process leading to UGC uploading.

Design of System for Avoiding upload of Identical-file using SA Hash Algorithm (SA 해쉬 알고리즘을 이용한 중복파일 업로드 방지 시스템 설계)

  • Hwang, Sung-Min;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.81-89
    • /
    • 2014
  • In this paper, we propose SA hash algorithm to avoid upload identical files and design server system using proposed SA hash algorithm. Client to want to upload file examines the value of SA hash and if the same file is found in server system client use the existing file without upload. SA hash algorithm which is able to examine the identical-file divides original file into blocks of n bits. Original file's mod i bit and output hash value's i bit is calculated with XOR operation. It is SA hash algorithm's main routine to repeat the calculation with XOR until the end of original file. Using SA hash algorithm which is more efficient than MD5, SHA-1 and SHA-2, we can design server system to avoid uploading identical file and save storage capacity and upload-time of server system.

A Design and Implementation of Content Management System for Integrative Medicine Diagnosis based on Mobile phones (모바일 폰 기반에서 통합의학적 진단을 위한 콘텐츠 관리 시스템 설계 및 구현)

  • Lee, Min-Sun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.253-259
    • /
    • 2011
  • In a ubiquitous society, the world is changing to the place where we can access to network anytime, anywhere, on any device. The mobile internet is leading the ubiquitous world and the most commonly used medium is a cell phone. However, it is uncomfortable to link to cafe, blog, and mini homepage. Because we have to stop wap service in order to upload the mobile contents like photos, videos, sound recordings produced by mobile phones. Also we have to re-access. So, in this paper content management system was designed and implemented which mobile users don't have to stop wap service in order to upload photos, videos, sound recordings produced by mobile phones. Also it supports upload in wap service integrative medicine diagnosis and contents can be managed by category.

Supporting Effective Open Workspaces Based on WebDAV (WebDAV 기반의 효과적인 공개 작업장 지원)

  • Park Hee-Jong;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.249-258
    • /
    • 2006
  • WebDAV is an IETF standard protocol, which is an extended version of HTTP 1.1, supporting asynchronous collaborative authoring of various contents on the web. Recently, to precisely control access to the resources on a WebDAY server, the WebDAV Access Control Protocol was published. This protocol helps developers to implement advanced server functionalities in a convenient way by providing various control methods to the resources on the WebDAV server. Based on the WebDAV access control protocol, we developed Open Workspaces, which systematically support exchanging and sharing data for general visitors. An Open Workspace can be supplied as a Download-Only Open Workspace, an Upload-Only Open Workspace, or an Upload-Download Open Workspace. Any registered user can create these workspaces without bothering the system administrator. To support the Open Workspaces, we extended the Slide WebDAV server and the DAVExplorer WebDAV client, which are being used popularly.