• Title/Summary/Keyword: Computer/Internet Use

Search Result 1,594, Processing Time 0.029 seconds

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network

  • Chen, Tieming;Mao, Qingyu;Lv, Mingqi;Cheng, Hongbing;Li, Yinglong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2180-2197
    • /
    • 2019
  • With the proliferation of the Android malicious applications, malware becomes more capable of hiding or confusing its malicious intent through the use of code obfuscation, which has significantly weaken the effectiveness of the conventional defense mechanisms. Therefore, in order to effectively detect unknown malicious applications on the Android platform, we propose DroidVecDeep, an Android malware detection method using deep learning technique. First, we extract various features and rank them using Mean Decrease Impurity. Second, we transform the features into compact vectors based on word2vec. Finally, we train the classifier based on deep learning model. A comprehensive experimental study on a real sample collection was performed to compare various malware detection approaches. Experimental results demonstrate that the proposed method outperforms other Android malware detection techniques.

Strategies of Implementing Internet Logistics System in Internet Trade Environment (인터넷무역(貿易) 환경(環境)에서 인터넷 물류(物流)시스템의 구현(具現) 전략(戰略))

  • Song, Gye-Eui
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.75-102
    • /
    • 2000
  • At present, on increasing to use a computer network and internet network, Internet Trade has been rapidly created and developed in international Electronic Commerce. However, Internet Trade has not been continued to grow up without supporting by a efficient Logistics System. Because it is very important to delivery contract commodities to consumer with speedy, accurate, steady, convenient services. International Logistics System is consisted of demand forecasting, order processing, packing, labeling, shipping documentation and consumer service into three distant phases of transaction, distribution and payment. International Logistics System can be done more efficiently and effectively by using Internet Logistics System. Therefore it is very important to implementing a efficient Internet Logistics System.

  • PDF

Influence of Computer Attitude on Critical Thinking Disposition

  • Kim, Jung Ae;Kim, Ju Ok
    • International journal of advanced smart convergence
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • This study was conducted to investigate the effects of computer attitudes such as anxiety, confidence, preference, usefulness, and computer literacy on their critical thinking ability, targeting college students at unspecified university universities. The period of data collection was from January 10, 2020 to January 17, 2020. A total of 213 people participated in the study. For data analysis, SPSS 18.0 was used for frequency analysis, Pearson correlation, x2 square, and simple regression analysis. As a result of the analysis, the difference of interests under the statistical significance level among general characteristics was Gender (x2=55.7***, p<0.001), Age (x2=407.5***, p<0.001), Resident (x2=127.5***, p<0.001) Family (x2=289.4***, p<0.001). In the simple regression analysis, computer liking (t=2.102, p<0.05) and computer use ability affected Truth seeking (t=-6.319, p<0.01), computer use ability was affecting analyticity (t=-5.630, p<0.01), computer use ability was affecting systematicity (t=-2.545, p<0.05), computer use ability was affecting maturity under statistical significance (t=-2.583, p<0.05). In conclusion, this study suggests that computer liking and computer use ability affect the sub-factor components of critical thinking disposition, truth seeking, analyticity, systematicity, and maturity, therefore the emphasis of this study is to emphasize that it is desirable to use the computer as a medium of learning based on computer literacy rather than worrying about excessive computer use.

A Prediction Model for Internet Game Addiction in Adolescents: Using a Decision Tree Analysis (의사결정나무 분석기법을 이용한 청소년의 인터넷게임 중독 영향 요인 예측 모형 구축)

  • Kim, Ki-Sook;Kim, Kyung-Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.3
    • /
    • pp.378-388
    • /
    • 2010
  • Purpose: This study was designed to build a theoretical frame to provide practical help to prevent and manage adolescent internet game addiction by developing a prediction model through a comprehensive analysis of related factors. Methods: The participants were 1,318 students studying in elementary, middle, and high schools in Seoul and Gyeonggi Province, Korea. Collected data were analyzed using the SPSS program. Decision Tree Analysis using the Clementine program was applied to build an optimum and significant prediction model to predict internet game addiction related to various factors, especially parent related factors. Results: From the data analyses, the prediction model for factors related to internet game addiction presented with 5 pathways. Causative factors included gender, type of school, siblings, economic status, religion, time spent alone, gaming place, payment to Internet cafe$\acute{e}$, frequency, duration, parent's ability to use internet, occupation (mother), trust (father), expectations regarding adolescent's study (mother), supervising (both parents), rearing attitude (both parents). Conclusion: The results suggest preventive and managerial nursing programs for specific groups by path. Use of this predictive model can expand the role of school nurses, not only in counseling addicted adolescents but also, in developing and carrying out programs with parents and approaching adolescents individually through databases and computer programming.

A Study on the Development of an Interactive Web Based Resource Center for K-12 Mathematics Teachers (초.중등 수학교사를 위한 상호 작용적 웹기반 자료센터 개발 연구)

  • 김민경;노선숙
    • The Mathematical Education
    • /
    • v.39 no.1
    • /
    • pp.71-80
    • /
    • 2000
  • As the new century begins, it is clear that K-l2 education is going through a major change. The increasing power and affordability of personal computers along with wide spread use of the Internet has not only changed the landscape for communication but it has opened up new and exciting opportunities for education. One of the ways that Internet could help improve education is to act as an interactive communication link to gather the knowledge and experience of all the teachers and to serve as an open forum for discussing and exchanging innovative ideas. But developing a successful site is not an easy task since the success of the site depends on the level of participation and cooperation of teachers. In this paper, learnings derived from the development of an interactive web based resource center for K-12 mathematics teacher are described and recommendations for developing an effective site for teachers are suggested. The development of an interactive resource center for mathematics teachers showed that while interest for a web based resource is very high, the main obstacle for effective teacher participation is lack of easy accessibility of internet by teachers, and lack of computer and internet training for teachers. The technical issues regarding hardware installation, software development and cost were minimal. Accessibility will improve in time as more and more schools are connected to the internet, but this alone will not be enough. The study suggests that in order to bring together teachers on the internet more effort needs to be made in training teachers on the use of computers and the internet.

  • PDF

Distributing Network Loads in Tree-based Content Distribution System

  • Han, Seung Chul;Chung, Sungwook;Lee, Kwang-Sik;Park, Hyunmin;Shin, Minho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.22-37
    • /
    • 2013
  • Content distribution to a large number of concurrent clients stresses both server and network. While the server limitation can be circumvented by deploying server clusters, the network limitation is far less easy to cope with, due to the difficulty in measuring and balancing network load. In this paper, we use two useful network load metrics, the worst link stress (WLS) and the degree of interference (DOI), and formulate the problem as partitioning the clients into disjoint subsets subject to the server capacity constraint so that the WLS and the DOI are reduced for each session and also well balanced across the sessions. We present a network load-aware partition algorithm, which is practicable and effective in achieving the design goals. Through experiments on PlanetLab, we show that the proposed scheme has the remarkable advantages over existing schemes in reducing and balancing the network load. We expect the algorithm and performance metrics can be easily applied to various Internet applications, such as media streaming, multicast group member selection.

Estimating Resident Registration Numbers of Individuals in Korea: Revisited

  • Kim, Heeyoul;Park, Ki-Woong;Choi, Daeseon;Lee, Younho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2946-2959
    • /
    • 2018
  • Choi et al's work [1] in 2015 demonstrated that the resident registration numbers (RRNs) of individuals could be conveniently estimated through their personal information that is ordinarily disclosed in social network services. As a follow-up to the study, we introduce the status of the RRN system in Korea in terms of its use in the online environment, particularly focusing on their secure use. We demonstrate that it is still vulnerable against a straightforward attack. We establish that we can determine the RRNs of the current president Moon Jae-In and the world-class singer PSY.

Efficient and Secure Certificateless Proxy Re-Encryption

  • Liu, Ya;Wang, Hongbing;Wang, Chunlu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2254-2275
    • /
    • 2017
  • In this paper, we present an IND-CCA2 secure certificateless proxy re-encryption scheme in the random oracle model. A certificateless public key cryptography simplifies the certificate management in a traditional public key infrastructure and the built-in key escrow feature in an identity-based public key cryptography. Our scheme shares the merits of certificateless public key encryption cryptosystems and proxy re-encryption cryptosystems. Our certificateless proxy re-encryption scheme has several practical and useful properties - namely, multi-use, unidirectionality, non-interactivity, non-transitivity and so on. The security of our scheme bases on the standard bilinear Diffie-Hellman and the decisional Bilinear Diffie-Hellman assumptions.

Multi-Agent System for Fault Tolerance in Wireless Sensor Networks

  • Lee, HwaMin;Min, Se Dong;Choi, Min-Hyung;Lee, DaeWon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1321-1332
    • /
    • 2016
  • Wireless sensor networks (WSN) are self-organized networks that typically consist of thousands of low-cost, low-powered sensor nodes. The reliability and availability of WSNs can be affected by faults, including those from radio interference, battery exhaustion, hardware and software failures, communication link errors, malicious attacks, and so on. Thus, we propose a novel multi-agent fault tolerant system for wireless sensor networks. Since a major requirement of WSNs is to reduce energy consumption, we use multi-agent and mobile agent configurations to manage WSNs that provide energy-efficient services. Mobile agent architecture have inherent advantages in that they provide energy awareness, scalability, reliability, and extensibility. Our multi-agent system consists of a resource manager, a fault tolerance manager and a load balancing manager, and we also propose fault-tolerant protocols that use multi-agent and mobile agent setups.

On OFDM Subcarrier Allocation Strategies for Soft Hand-off in Cellular Systems

  • Kim, Chan-Hong;Lee, Jung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.784-793
    • /
    • 2012
  • This paper deals with subcarrier allocation strategies for soft hand-over in OFDMA-based cellular systems. Two possible subcarrier allocation methods are considered for soft hand-over. One method is to use an identical subcarrier set between the two cells participating in the hand-over. The other is to use different subcarrier sets between the two cells. As expected, the different subcarrier strategy is better in terms of diversity order and BER than the identical subcarrier strategy. It will be shown that the BER performance difference between the two strategies is more noticeable with contiguous subcarrier allocation. But the different subcarrier strategy consumes twice more frequency resources than the other, and there is a trade-off between the two strategies in terms of BER and frequency resources. By considering the trade-off, we also propose a subcarrier allocation strategy for soft hand-over.