• Title/Summary/Keyword: Application(App)

Search Result 736, Processing Time 0.027 seconds

Snapshot-Based Offloading for Web Applications with HTML5 Canvas (HTML5 캔버스를 활용하는 웹 어플리케이션의 스냅샷 기반 연산 오프로딩)

  • Jeong, InChang;Jeong, Hyuk-Jin;Moon, Soo-Mook
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.871-877
    • /
    • 2017
  • A vast amount of research has been carried out for executing compute-intensive applications on resource-constrained mobile devices. Computation offloading is a method in which heavy computations are dynamically migrated from a mobile device to a server, exploiting the powerful hardware of the server to perform complex computations. An important issue for offloading is the complexity of reconciling the execution state of applications between the server and the client. To address this issue, snapshot-based offloading has recently been proposed, which utilizes the snapshot of a web app as the portable description of the execution state. However, for web applications using the HTML5 canvas, snapshot-based offloading does not function correctly, because the snapshot cannot capture the state of the canvas. In this paper, we propose a code generation technique to save the canvas state as part of a snapshot, so that the snapshot-based offloading can be applied to web applications using the canvas.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Design and Implementation of Verification System for Malicious URL and Modified APK File on Cloud Platform (클라우드 플랫폼을 이용한 악성 URL 및 수정된 APK 파일 검증 시스템 설계 및 구현)

  • Je, Seolah;Nguyen, Vu Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.921-928
    • /
    • 2016
  • Over the past few years, Smishing attacks such as malicious url and malicious application have been emerged as a major problem in South Korea since it caused big problems such as leakage of personal information and financial loss. Users are susceptible to Smishing attacks due to the fact that text message may contain curios content. Because of that reason, user could follow the url, download and install malicious APK file without any doubt or verification process. However currently Anti-Smishing App that adopted post-processing method is difficult to respond quickly. Users need a system that can determine whether the modification of the APK file and malicious url in real time because the Smishing can cause financial damage. This paper present the cloud-based system for verifying malicious url and malicious APK file in user device to prevent secondary damage such as smishing attacks and privacy information leakage.

A study on Improvement of BIS System using Bus congestion (버스 혼잡도를 이용한 BIS 시스템 개선방안 연구)

  • Joo, Young-Hwan;Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.211-215
    • /
    • 2016
  • In this paper, we utilize a service provided by the existing bus information system. To improve the limitations of the bus information system the information provided to the passenger using the bus. By applying the IoT sensor network system. congestion information of the bus provided to customer. Provides information in addition to the existing bus congestion information to passengers wishing to use public transport from the smartphone app with an existing information system. The bus congestion information in addition to the existing information to passengers who want to use public transport provided in the existing information system and smartphone apps. Prevent accidents that might occur due to congestion in the bus, efficient and convenient way to propose an improved bus information system for public transport. Developed a prototype system using the IOT sensor network verified the proposed method.

Study on Remote Smart Control System for Human Detection on Bed (침상의 인체감지를 위한 원격 스마트 제어 시스템에 관한 연구)

  • Park, Seung-Hwan;Sim, Woo-Jung;Jung, Jin-Taek;Kim, Young-Ser
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.63-69
    • /
    • 2017
  • This study is about the development of a smart bed control system to be able to detect the human position and body signal on bed. The main control board in the bed control system consists of the human sensing part, motor driving part and MCU. Here, to increase the credibility to check the human presence on bed, the human sensing part is combined with the human position part by membrane sensor and the body-signal detecting part of EMFI sensor. Also, remotely connecting the two detected signal to the application program of the app mode makes it possible to monitor human information on bed. In this paper, the remote function monitoring of the on-bed human information by bluetooth communication will be abe to make it applicable to the technical prevention method of the bed fall and absence accident in hospital and care facilities.

A Study on Remote Cultivation Consignment System for Hobby using LED Plant Factory (LED 식물공장을 이용한 취미용 원격 식물재배 위탁 시스템에 대한 연구)

  • Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.49-54
    • /
    • 2017
  • In this paper, we propose a system that can provide a environment for plant cultivation in connection with LED plant factories and enable users to participate in plant cultivation remotely to engage in personal hobbies. The proposed system can monitor the growth conditions of plants through various sensors and remotely adjust the cultivation environment required for plant growth through the Arduino system, so that users can feel the satisfaction of plant cultivation and harvesting as a hobby. On the other hand, we suggest a mutual benefit structure for plant factory and users by securing a certain amount of income source to factory, by paying the idle space to the individual online. This paper demonstrates the feasibility of the proposed system by making the prototype of the remote plant cultivation consignment system using the Arduino and Android application(App.), and contributes to popularize the LED plant factories and expand the business area in future.

Design of the Web-based Interest-Type Test using Occupational Card (직업카드를 이용한 웹 기반 흥미유형검사 시스템 설계)

  • Kang, Myung-A
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.3
    • /
    • pp.185-190
    • /
    • 2018
  • In the recent field of education, they open career-related curriculums either as formal curricular programs or extracurricular programs as highlighting value of career education. However, this lecture-based career education has failed to attract students' interest, and results are not satisfactory either. Since then, in order to design entertaining career education, the field has developed diverse tools and as a vocational aptitude testing tool for career development, methods that would use vocational cards were introduced. Today, schools from elementary school to middle and high schools frequently make use of the cards to conduct the vocational aptitude test and yet, as this web-based learning and smartphones are distributed, changes in the testing tool are being intensely demanded. This study aims to create and implement an application to help the vocational cards-using vocational aptitude test targeting students in elementary, middle and high schools to be actually conducted in a mobile platform.

Study for Android Smartphone's Gallery Thumbnail Forensic Analysis (안드로이드 스마트폰의 갤러리 썸네일(Thumbnail)에 대한 포렌식 분석 방법에 관한 연구)

  • Yun, Daeho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.31-42
    • /
    • 2017
  • Thumbnail, the small sized graphic file such as JPEG or GIF, serves to help the users to be recognized as a rapidly helps to make it easier recognize while browsing the large sized graphic file. Gallery application, which is installed in a later version of the 4.4.x(Kitkat) Android smartphone records the generated time of graphic file in thumbnail metadata. Thumbnail can be used to draw up the timeline of user action about user's action such as creation, modification, deletion with original graphic file analysis. Also, take advantage of the features thumbnails are stored sequentially in a single thumbcache file, even if the thumbcache is deleted, we can restore the thumbnails. This paper illustrates the feature of thumbnail created by Android OS basic gallery app and methods for utilization in digital forensics.

Network pharmacological analysis for exploration of the potential application of Hwangryunhaedok-tang for brain diseases (황련해독탕(黃連解毒湯)의 뇌질환 응용 가능성 탐색을 위한 네트워크 약리학적 분석)

  • Lee, Se-Eun;Lim, Jae-Yu;Chung, Byung-Woo;Lee, Byoungho;Lim, Jung Hwa;Cho, Suin
    • Herbal Formula Science
    • /
    • v.28 no.4
    • /
    • pp.313-325
    • /
    • 2020
  • Objectives : To explore the associated potential pathways and molecular targets of Hwangryunhaedok-tang(HHT) by the approaches of network pharmacology and bioinformatics in traditional chinese medicine(TCM). Methods : Hwangryunhaedok-tang constituent drugs(Coptidis Rhizoma, CR; Scutellariae Radix, SR; Phellodendri Cortex, PC; Gardeniae Fructus, GF) and their processing types were searched from TCM systems pharmacology(TCMSP). The databases of TCMSP, Kyoto Encyclopedia of Genes and Genomes(KEGG), MCODE and STRING were used to gather information. The network of bioactive ingredients and target gene was constructed by Cytoscape software(version 3.8). Results : A total of 94 HHT active compounds(CR, 12; SR, 35; PC, 33; GF, 14, respectively) were found, and HHT were identified by TCMSP. Applications of KEGG and MCODE analysis indicates that total of 6 bioactive ingredients in the top 10% ranking were obtained and 32 diseases of HHT were screened. The molecular pathway analysis revealed that HHT exerts cancer, inflammation and cerebrovascular diseases effects by acting on several signaling pathway. In addition, HHT found that three genes(e.g. SPIN1, TRIM25, and APP) correlate with the aforementioned diseases. Conclusions : This study showed that network pharmacology analysis is useful to elucidate the complex mechanisms of action of HHT.

A Study on the Determinants of Attitude toward and Intention to Use Mobile Shopping through Fashion Apps -Comparisons of Gender and Age Group Differences- (패션 앱을 이용한 모바일 쇼핑 태도 및 사용의도 영향요인 연구 -성별과 연령집단별 차이 비교-)

  • Sung, Heewon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.37 no.7
    • /
    • pp.1000-1014
    • /
    • 2013
  • This study identifies the determinants that influence attitude toward and the intention to use mobile shopping services through fashion applications (apps) based on the technology acceptance model. In addition, gender and age group differences were examined. Data were collected from subjects who have used smartphone fashion related apps; subsequently, a total of 327 data were analyzed. About 46% of respondents were males, with a mean age of 34.4 years that ranged from 20 to 49 years old. Multiple regression models were developed based on the research model. Perceived usefulness, perceived ease of use, perceived enjoyment, perceived risks (security risk and quality risk), fashion involvement, and fashion app attributes (product attributes and service attributes) were employed as predictors of attitudes towards mobile shopping. Attitudes towards mobile shopping and subjective norms with the aforementioned variables measured the intention to use. Attitudes towards mobile shopping were predicted by perceived enjoyment, perceived usefulness, and service attributes. Attitudes toward mobile shopping and subjective norms were the most important predictors of the intention to use. Gender differences were found in that service attributes were significant for attitudes towards mobile shopping only in the male model. Age differences were also found and perceived usefulness was the most important predictor of attitudes toward mobile shopping among those in their 20's; however, perceived enjoyment was the most important among those in their 30's and 40's. Quality risk was only significant to explain intention to use among those in their 40's. The findings of this study are useful to understand the possibility of the adoption of mobile shopping though fashion apps and provide basic insight into market segmentation.