• Title/Summary/Keyword: Computer applications

Search Result 5,209, Processing Time 0.036 seconds

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

Feature Modeling with Multi-Software Product Line of IoT Protocols

  • Abbas, Asad;Siddiqui, Isma Fara;Lee, Scott Uk-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.79-82
    • /
    • 2017
  • IoT devices are interconnected in global network with different functionalities and manage the data transfer in cloud computing. IoT devices can be used anytime, anywhere with any device with different applications and protocols. Same devices but different applications according to end user requirements such as sensors and Wi-Fi devices, reusability of these applications can enhance the development process. However, large number of variations in cloud computing make it difficult the features selection in application because of compatibility issues of devices. In this paper we have proposed multi-Software Product Lines (multi-SPLs) approach to manage the variabilities and commonalities of IoT applications and protocols. Feature modeling is used to manage the commonalities and variabilities of SPL. We proposed that multi-SPLs feature model is more appropriate for modeling of IoT applications and protocols.

  • PDF

Automatic Payload Signature Generation for Accurate Identification of Internet Applications and Application Services

  • Sija, Baraka D;Shim, Kyu-Seok;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1572-1593
    • /
    • 2018
  • The diversity and fast growth of Internet traffic volume are highly influenced by mobile and computer applications being developed. Moreover, the developed applications are too dynamic to be identified and monitored by network administrators. Several approaches have been proposed to identify network applications, however, are still not robust enough to identify modern applications. This paper proposes both, TSA (Traffic collection, Signature generation and Applications identification) system and a derived algorithm so called CSP (Contiguous Sequential Patterns) to identify applications for management and security in IP networks. The major focus of this paper is the CSP algorithm which is automated in two modules (Signature generation and Applications identification) of the proposed system. The proposed CSP algorithm generates DNA-like unique signatures capable of identifying applications and their individual services. In this paper, we show that the algorithm is suitable for generating efficient signatures to identify applications and application services in high accuracy.

Energy Use Coordinator for Multiple Personal Sensor Devices

  • Rhee, Yunseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.9-19
    • /
    • 2017
  • Useful continuous sensing applications are increasingly emerging as a new class of mobile applications. Meanwhile, open, multi-use sensor devices are newly adopted beyond smartphones, and provide huge opportunities to expand potential application categories. In this upcoming environment, uncoordinated use of sensor devices would cause severe imbalance in power consumption of devices, and thus result in early shutdown of some sensing applications depending on power-hungry devices. In this paper, we propose EnergyCordy, a novel inter-device energy use coordination system; with a system-wide holistic view, it coordinates the energy use of concurrent sensing applications over multiple sensor devices. As its key approach, we propose a relaxed sensor association; it decouples the energy use of an application from specific sensor devices leveraging multiple context inference alternatives, allowing flexible energy coordination at runtime. We demonstrated the effectiveness of EnergyCordy by developing multiple example applications over custom-designed wearable senor devices. We show that EnergyCordy effectively coordinates the power usage of concurrent sensing applications over multiple devices and prevent undesired early shutdown of applications.

Microservice Identification by Partitioning Monolithic Web Applications Based on Use-Cases

  • Si-Hyun Kim;Daeil Jung;Norhayati Mohd Ali;Abu Bakar Md Sultan;Jaewon Oh
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.268-280
    • /
    • 2023
  • Several companies have migrated their existing monolithic web applications to microservice architectures. Consequently, research on the identification of microservices from monolithic web applications has been conducted. Meanwhile, the use-case model plays a crucial role in outlining the system's functionalities at a high level of abstraction, and studies have been conducted to identify microservices by utilizing this model. However, previous studies on microservice identification utilizing use-cases did not consider the components executed in the presentation layer. Unlike existing approaches, this paper proposes a technique that considers all three layers of web applications (presentation, business logic, and data access layers). Initially, the components used in the three layers of a web application are extracted by executing all the scenarios that constitute its use-cases. Thereafter, the usage rate of each component is determined for each use-case and the component is allocated to the use-case with the highest rate. Then, each use-case is realized as a microservice. To verify the proposed approach, microservice identification is performed using open-source web applications.

Analysis of 3D Building Construction Applications in Augmented Reality

  • Khan, Humera Mehfooz;Waseemullah, Waseemullah;Bhutto, Muhammad Aslam;Khan, Shariq Mahmood;Baig, Mirza Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.340-346
    • /
    • 2022
  • Construction industry is considered as one of the oldest industries in the world since human came into being and the need of their own space is realized. All this led to make the world a space of many beautiful constructive ventures. As per the requirements of today's world, every industry is recognizing the need for use and adoption of modern as well as innovative technologies due to their benefits and timely production. Now construction industry has also started adopting the use of modern and innovative technologies during their projects but still the rate of adoption is so slow. From design to completion, construction projects take a lot to manage for which technology based solutions have continuously been proposed. These include Computer Aided Design (CAD), building information modeling (BIM) and cloud computing have been proved to be much successful until now. The construction projects are high budgeted, and direly require timely and successful completion with quality, resource and other constraints. So, the researchers observe the need of more clear and technology based communication between the construction projects and its constructors and other stakeholders is required before and during the construction to take timely precautions for expected issues. This study has analyzed the use of Augmented Reality (AR) technology adopting GammaAR, and ARki applications in construction industry. It has been found that both applications are light-weighted, upgradable, provide offline availability and collaborative environment as well as fulfil most of the requirements of the construction industry except the cost. These applications also support different screen size for better visualization and deep understanding. Both applications are analyzed, based on construction's application requirements, usability of AR and ratings of applications user collected from application's platform. The purpose of this research is to provide a detail insight of construction applications which are using AR to facilitate both the future developers and consumers.

Speculative Parallelism Characterization Profiling in General Purpose Computing Applications

  • Wang, Yaobin;An, Hong;Liu, Zhiqin;Li, Li;Yu, Liang;Zhen, Yilu
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.1
    • /
    • pp.20-28
    • /
    • 2015
  • General purpose computing applications have not yet been thoroughly explored in procedure level speculation, especially in the light-weighted profiling way. This paper proposes a light-weighted profiling mechanism to analyze speculative parallelism characterization in several classic general purpose computing applications from SPEC CPU2000 benchmark. By comparing the key performance factors in loop and procedure-level speculation, it includes new findings on the behaviors of loop and procedure-level parallelism under these applications. The experimental results are as follows. The best gzip application can only achieve a 2.4X speedup in loop level speculation, while the best mcf application can achieve almost 3.5X speedup in procedure level. It proves that our light-weighted profiling method is also effective. It is found that between the loop-level and procedure-level TLS, the latter is better on several cases, which is against the conventional perception. It is especially shown in the applications where their 'hot' procedure body is concluded as 'hot' loops.

The Impact of Computer Applications on the Improvement of Farm Household Income (정보화가 농가소들 증대에 미치는 영향)

  • Yu, Seung-Ju;Cho, Joong-Koo;Lee, Seong-Woo
    • Journal of Korean Society of Rural Planning
    • /
    • v.12 no.3 s.32
    • /
    • pp.81-95
    • /
    • 2006
  • The objective of the this study is to find a way to increase fm household income through investigating their computer applications. We utilized the 2000 Korea Agricultural Survey data and applied a Heckman Selection Model to correct a selection bias. The present study found the following results. First, determinant of income among fm households by the level of computer applications has significant statistical differences based on their choices of computer applications. Accordingly, the application of general linear regression about fm income without adjusting these choices may cause statistical fallacy. Second, it has been reported that increasing the member of household is not directly related to increasing the fm income. In case of computer-own farm household, the effect of decrease in income according to increasing in age was predicted. However, in the fm household not possessing computer, it shows negative relationship. It shows that an agricultural career of farm owner and educational attainment of all farm household members have positive relationship regardless of computer possession. The income of the farm household those main field is not agriculture is also found to be lower than that of farm household whose major earnings come from agriculture.

A Review of Concepts, Advantages and Pitfalls of Healthcare Applications in Blockchain Technology

  • Al-asmari, Aisha M.;Aloufi, Rahaf I.;Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.199-210
    • /
    • 2021
  • Recently, research in blockchain technology has grown in popularity. Most of these researches have pointed out designing and improving conceptual structures to create digital systems that are more secure, accessible, and effective. Although blockchain offers a wide range of advantages, it also has some pitfalls. This research aims to present an understanding of the properties of blockchain, the advantages, pitfalls, and applications based on blockchain technology. To achieve the goal of understanding blockchain technology concepts, a systematic literature review approach was introduced. 93 papers were chosen and reviewed in total. Therefore, this research provides a summary of recent studies that have been published in the field of blockchain. Moreover, we have created concept maps and tables that aid in a deep understanding of blockchain technology concepts and exhibit some of the blockchain applications. In blockchain-based applications, we focused on two areas, namely the Internet of Things (IoT) and healthcare.

Analysis of a Third-Party Application for Mobile Forensic Investigation

  • Ryu, Jung Hyun;Kim, Nam Yong;Kwon, Byoung Wook;Suk, Sang Ki;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.680-693
    • /
    • 2018
  • Nowadays, third-party applications form an important part of the mobile environment, and social networking applications in particular can leave a variety of user footprints compared to other applications. Digital forensics of mobile third-party applications can provide important evidence to forensics investigators. However, most mobile operating systems are now updated on a frequent basis, and developers are constantly releasing new versions of them. For these reasons, forensic investigators experience difficulties in finding the locations and meanings of data during digital investigations. Therefore, this paper presents scenario-based methods of forensic analysis for a specific third-party social networking service application on a specific mobile device. When applied to certain third-party applications, digital forensics can provide forensic investigators with useful data for the investigation process. The main purpose of the forensic analysis proposed in the present paper is to determine whether the general use of third-party applications leaves data in the mobile internal storage of mobile devices and whether such data are meaningful for forensic purposes.