• Title/Summary/Keyword: Anna

Search Result 591, Processing Time 0.024 seconds

Google Play Malware Detection based on Search Rank Fraud Approach

  • Fareena, N;Yogesh, C;Selvakumar, K;Sai Ramesh, L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3723-3737
    • /
    • 2022
  • Google Play is one of the largest Android phone app markets and it contains both free and paid apps. It provides a variety of categories for every target user who has different needs and purposes. The customer's rate every product based on their experience of apps and based on the average rating the position of an app in these arch varies. Fraudulent behaviors emerge in those apps which incorporate search rank maltreatment and malware proliferation. To distinguish the fraudulent behavior, a novel framework is structured that finds and uses follows left behind by fraudsters, to identify both malware and applications exposed to the search rank fraud method. This strategy correlates survey exercises and remarkably joins identified review relations with semantic and behavioral signals produced from Google Play application information, to distinguish dubious applications. The proposed model accomplishes 90% precision in grouping gathered informational indexes of malware, fakes, and authentic apps. It finds many fraudulent applications that right now avoid Google Bouncers recognition technology. It also helped the discovery of fake reviews using the reviewer relationship amount of reviews which are forced as positive reviews for each reviewed Google play the android app.

TRUNCATED SOFTWARE RELIABILITY GROWTH MODEL

  • Prince Williams, D.R.;Vivekanandan, P.
    • Journal of applied mathematics & informatics
    • /
    • v.9 no.2
    • /
    • pp.761-769
    • /
    • 2002
  • Due to the large scale application of software systems, software reliability plays an important role in software developments. In this paper, a software reliability growth model (SRGM) is proposed. The testing time on the right is truncated in this model. The instantaneous failure rate, mean-value function, error detection rate, reliability of the software, estimation of parameters and the simple applications of this model are discussed .

A Study of the Trans-Media Storytelling in Brand Marketing (브랜드 마케팅의 트랜스 미디어 스토리텔링에 관한 연구)

  • Kim, shin youp
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.135-136
    • /
    • 2015
  • 트랜스 미디어 스토리텔링은 이용자의 적극적인 참여를 기반으로 디지털 컨버전스 시대에 새롭게 등장한 텍스트 유통 관습이자 미디어 경험 양식으로 영화, 드라마, 애니메이션 등의 콘텐츠 사업의 경우 다양한 트랜스 미디어 스토리텔링 시도가 활성화 되고 있지만 기업 브랜드의 경우 아직 기존의 OSMU의 범주를 크게 넘어서지는 못하고 있는 실정이다. 그러나 본 연구에서는 OSMU의 범주를 넘어 커뮤니케이션했던 브랜드의 트랜스 미디어 스토리텔링의 대표적 사례인 모닝케어 레이디 티안나걸스(T-ANNA Girls)의 사례를 통해 디지털 컨버전스에 적응하며 새로운 부가가치를 창출할 수 있는 브랜드 커뮤니케이션의 발전적 방안에 관해 논의코자 한다.

  • PDF

ON SANDWICH THEOREMS FOR CERTAIN SUBCLASSES OF ANALYTIC FUNCTIONS INVOLVING CARLSON-SHAFFER OPERATOR

  • Shanmugam, Tirunelveli Nellaiappan;Srikandan, Sivasubramanian;Frasin, Basem Aref;Kavitha, Seetharaman
    • Journal of the Korean Mathematical Society
    • /
    • v.45 no.3
    • /
    • pp.611-620
    • /
    • 2008
  • The purpose of this present paper is to derive some subordination and superordination results involving Carlson-Shaffer operator for certain normalized analytic functions in the open unit disk. Relevant connections of the results, which are presented in the paper, with various known results are also considered.

A New Method for Robust and Secure Image Hash Improved FJLT

  • Xiu, Anna;Kim, Hyoung-Joong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.143-146
    • /
    • 2009
  • There are some image hash methods, in the paper four image hash methods have been compared: FJLT (Fast Johnson- Lindenstrauss Transform), SVD (Singular Value Decomposition), NMF (Non-Negative Matrix Factorization), FP (Feature Point). From the compared result, FJLT method can't be used in the online. the search time is very slow because of the KNN algorithm. So FJLT method has been improved in the paper.

  • PDF

Effects and control of blast vibrations in the vicinity of the limestone quarry

  • Kumar L. Ajay
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 2003.11a
    • /
    • pp.83-87
    • /
    • 2003
  • Experimental blast studies were carried out in a limestone quarry to study the effects of blasting on structures. To have an in-depth understanding of the possible relation between parameters like vibrations, frequency and scale distance and ten trial blast were conducted. 29 monitoring stations were located in such a pattern to give a true representation of blast induced vibrations for the entire mining in this area. The vibrations were monitored in the vicinity of structures surrounding the quarry in the direction towards the village, road, railway line, office building, etc. Scale distances were determined to identify the maximum charge permissible to cause damage to structures.

  • PDF

MOORE-PENROSE INVERSE IN AN INDEFINITE INNER PRODUCT SPACE

  • KAMARAJ K.;SIVAKUMAR K. C.
    • Journal of applied mathematics & informatics
    • /
    • v.19 no.1_2
    • /
    • pp.297-310
    • /
    • 2005
  • The concept of the Moore-Penrose inverse in an indefinite inner product space is introduced. Extensions of some of the formulae in the Euclidean space to an indefinite inner product space are studied. In particular range-hermitianness is completely characterized. Equivalence of a weighted generalized inverse and the Moore-Penrose inverse is proved. Finally, methods of computing the Moore-Penrose inverse are presented.

The Development of Perceptual Image Hashing

  • Xiu, Anna;Li, Kun;Kim, Hyoung-Joong
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.364-365
    • /
    • 2011
  • In this paper, we show that methods of perceptual image hashing which have been proposed recent years. And the disadvantages of them. Perceptual robustness, security and fragility are properties what we always discuss. Then we propose some ideas which we will do the research later.

  • PDF