• Title/Summary/Keyword: App Classification

Search Result 42, Processing Time 0.025 seconds

Context-Aware Mobile User Authentication Approach using LSTM networks (LSTM 신경망을 활용한 맥락 기반 모바일 사용자 인증 기법)

  • Nam, Sangjin;Kim, Suntae;Shin, Jung-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.11-18
    • /
    • 2020
  • This study aims to complement the poor performance of existing context-aware authentication techniques in the mobile environment. The data used are GPS, Call Detail Record(CDR) and app usage. locational classification according to GPS density was implemented in order to distinguish other people in populated areas in the processing of GPS. It also handles missing values that may occur in data collection. The authentication model consists of two long-short term memory(LSTM) and one Artificial Neural Network(ANN) that aggregates the results, which produces authentication scores. In this paper, we compare the accuracy of this technique with that of other studies. Then compare the number of authentication attempts required to detect someone else's authentication. As a result, we achieved an average 11.6% improvement in accuracy and faster detection of approximately 60% of the experimental data.

A Study on Basalization of the Classification in Mountain Ginseng and Plain Ginseng Images in Artificial Intelligence Technology for the Detection of Illegal Mountain Ginseng (불법 산양삼 검출을 위한 인공지능 기술에서의 산양삼과 인삼 이미지의 분류 기저화 연구)

  • Park, Soo-Kyoung;Na, Hojun;Kim, Ji-Hye
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.209-225
    • /
    • 2020
  • This study tried to establish a base level for the form of ginseng in order to prevent fraud in which novice consumers, who have no information on ginseng and mountain ginseng, regard ginseng as mountain ginseng. To that end, researchers designed a service design in which when a consumer takes a picture of ginseng with an APP dedicated to a smartphone, the photo is sent remotely and the determined results are sent to the consumer based on machine learning data. In order to minimize the difference between the data set in the research process and the background color, location, size, illumination, and color temperature of the mountain ginseng when consumers took pictures through their smartphones, the filming box exclusively for consumers was designed. Accordingly, the collection of mountain ginseng samples was made under the same controlled environment and setting as the designed box. This resulted in a 100% predicted probability from the CNN(VGG16) model using a sample that was about one-tenth less than widley required in machine learning.

Study on Basic Elements for Smart Content through the Market Status-quo (스마트콘텐츠 현황분석을 통한 기본요소 추출)

  • Kim, Gyoung Sun;Park, Joo Young;Kim, Yi Yeon
    • Korea Science and Art Forum
    • /
    • v.21
    • /
    • pp.31-43
    • /
    • 2015
  • Information and Communications Technology (ICT) is one of the technologies which represent the core value of the creative economy. It has served as a vehicle connecting the existing industry and corporate infrastructure, developing existing products and services and creating new products and services. In addition to the ICT, new devices including big data, mobile gadgets and wearable products are gaining a great attention sending an expectation for a new market-pioneering. Further, Internet of Things (IoT) is helping solidify the ICT-based social development connecting human-to-human, human-to-things and things-to-things. This means that the manufacturing-based hardware development needs to be achieved simultaneously with software development through convergence. The essential element the convergence between hardware and software is OS, for which world's leading companies such as Google and Apple have launched an intense development recognizing the importance of software. Against this backdrop, the status-quo of the software market has been examined for the study of the present report (Korea Evaluation Institute of Industrial Technology: Professional Design Technology Development Project). As a result, the software platform-based Google's android and Apple's iOS are dominant in the global market and late comers are trying to enter the market through various pathways by releasing web-based OS and similar OS to provide a new paradigm to the market. The present study is aimed at finding the way to utilize a smart content by which anyone can be a developer based on OS responding to such as social change, newly defining a smart content to be universally utilized and analyzing the market to deal with a rapid market change. The study method, scope and details are as follows: Literature investigation, Analysis on the app market according to a smart classification system, Trend analysis on the current content market, Identification of five common trends through comparison among the universal definition of smart content, the status-quo of application represented in the app market and content market situation. In conclusion, the smart content market is independent but is expected to develop in the form of a single organic body being connected each other. Therefore, the further classification system and development focus should be made in a way to see the area from multiple perspectives including a social point of view in terms of the existing technology, culture, business and consumers.

Machine Learning Based Automated Source, Sink Categorization for Hybrid Approach of Privacy Leak Detection (머신러닝 기반의 자동화된 소스 싱크 분류 및 하이브리드 분석을 통한 개인정보 유출 탐지 방법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.657-667
    • /
    • 2020
  • The Android framework allows apps to take full advantage of personal information through granting single permission, and does not determine whether the data being leaked is actual personal information. To solve these problems, we propose a tool with static/dynamic analysis. The tool analyzes the Source and Sink used by the target app, to provide users with information on what personal information it used. To achieve this, we extracted the Source and Sink through Control Flow Graph and make sure that it leaks the user's privacy when there is a Source-to-Sink flow. We also used the sensitive permission information provided by Google to obtain information from the sensitive API corresponding to Source and Sink. Finally, our dynamic analysis tool runs the app and hooks information from each sensitive API. In the hooked data, we got information about whether user's personal information is leaked through this app, and delivered to user. In this process, an automated Source/Sink classification model was applied to collect latest Source/Sink information, and the we categorized latest release version of Android(9.0) with 88.5% accuracy. We evaluated our tool on 2,802 APKs, and found 850 APKs that leak personal information.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

The Types of Family System and Psychological Distance in Family Perceived by Adolescent Child (청소년기 자녀가 지각한 가족체계유형과 가족내 심리적 거리)

  • 최윤실
    • Journal of Families and Better Life
    • /
    • v.11 no.1
    • /
    • pp.159-175
    • /
    • 1993
  • The purpose of this study was to find out the psychological distance through semantic app-roach perceived by adolescent child in the subtypes of 'Extrem Family' dysfunctional families by classification of Olson and his associates ' Circrumplex Model. The subjects of this research were 1072 abolescents living in Seoul. Korea The survey methods were questionnaires including FACES II and The Psychological Distance Scale. Data were analyzed by means of the statistics of frequency percentage arithematic mean standard devia-tion crosstabs and one way-anova. The major findings are as follows: 1) The levels of family cohesion family adaptibility and the psychologival distances with father mother and siblings perceived by adolescent were high. 2) The most of subject's families belonged to 'Balanced Family' in the types of family system ' Extreme Family' type showed the lowest frequency and the main subtypes of it that had the highest frequency were 'Enmeshed Chaotic Family' ' Disengaged Rigid Family' 3) While adolescents of 'Enmeshed Chaotic Family' perceived most closely with other family members. those of 'Disengated Rigid Family' most distantly totally and in evaluation potency and activity three subfactors in psychological distance. 4) There were differences of unit points in subfactors of psychological distances with other family members perceived by adolescents according to the types of family system. While the points of 'Enmeshed Chaotic Family' were the highest those of 'Disengaged Rigid Family' were the lowest. 5) While 'Enmeshed Chaotic Family' were located most closely 'Disengaged Rigid Family' were located most distantly in the mutual distances and direct distances among family concepts on semantic space.

  • PDF

Ai-Based Cataract Detection Platform Develop (인공지능 기반의 백내장 검출 플랫폼 개발)

  • Park, Doyoung;Kim, Baek-Ki
    • Journal of Platform Technology
    • /
    • v.10 no.1
    • /
    • pp.20-28
    • /
    • 2022
  • Artificial intelligence-based health data verification has become an essential element not only to help clinical research, but also to develop new treatments. Since the US Food and Drug Administration (FDA) approved the marketing of medical devices that detect mild abnormal diabetic retinopathy in adult diabetic patients using artificial intelligence in the field of medical diagnosis, tests using artificial intelligence have been increasing. In this study, an artificial intelligence model based on image classification was created using a Teachable Machine supported by Google, and a predictive model was completed through learning. This not only facilitates the early detection of cataracts among eye diseases occurring among patients with chronic diseases, but also serves as basic research for developing a digital personal health healthcare app for eye disease prevention as a healthcare program for eye health.

Analysis on the Status and Needs of Training in Assistive Technology of Pediatric Physical Therapist and Pediatric Occupational Therapist (소아물리치료사와 소아작업치료사의 보조공학 교육훈련 실태 및 요구 분석)

  • Kim, Kyoung-A;Jeong, Dong-Hoon
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.8 no.1
    • /
    • pp.99-109
    • /
    • 2013
  • PURPOSE: This study was designed to evaluate the current state of training in assistive technology(AT) for pediatric physical therapists(PPTs) and pediatric occupational therapists(POTs), in addition, investigate therapists' preferred training methods and contents. The eventual purpose was to suggest the essential fundamental factors to adapt the assistive technology in clinics. METHODS: The subject of this study were 167 therapists(98 PPTs and 69 POTs) who work at general hospitals, welfare center, facilities for the disabled, and special education school in Seoul and Gyeonggi province. Frequency analysis and Chi-squared test were used. RESULTS: Significant numbers of PPTs(66 therapists, 67.3%) and POTs(50 therapists, 72.5%) answered that they had received training in AT. More than 48% answered no training experience or low adequacy in each classification scheme for questions. The most difficulty in the training was indicated by lack of education opportunity(90 therapists, 53.9%). The most required device training was seating and position device training(43 therapists, 21.9%) for PPTs and orthosis and prosthesis device training(29 therapists, 21.0%) for POTs. In assistive technology service, PPTs needed evaluation to AT device training(69 therapists, 35.2%) and POTs needed evaluation to disabilities for AT training(41 therapists, 29.7%). Both therapists answered that the most effective training is continuous education(52 therapists, 31.1%) and college education(48 therapists, 28.7%). CONCLUSION: Our findings indicate that PPTs and POTs need more opportunities for training in AT. For effective clinical app lication of AT, there should be continuous education such as on-the-job training, mentoring program, technical manual, and college education.

Mobile App Analytics using Media Repertoire Approach (미디어 레퍼토리를 이용한 스마트폰 애플리케이션 이용 패턴 유형 분석)

  • Kwon, Sung Eun;Jang, Shu In;Hwangbo, Hyunwoo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.133-154
    • /
    • 2021
  • Today smart phone is the most common media with a vehicle called 'application'. In order to understand how media users select applications and build their repertoire, this study conducted two-step approach using big data from smart phone log for 4 weeks in November 2019, and finally classified 8 media repertoire groups. Each of the eight media repertoire groups showed differences in time spent of mobile application category compared to other groups, and also showed differences between groups in demographic distribution. In addition to the academic contribution of identifying the mobile application repertoire with large scale behavioral data, this study also has significance in proposing a two-step approach that overcomes 'outlier issue' in behavioral data by extracting prototype vectors using SOM (Sefl-Organized Map) and applying it to k-means clustering for optimization of the classification. The study is also meaningful in that it categorizes customers using e-commerce services, identifies customer structure based on behavioral data, and provides practical guides to e-commerce communities that execute appropriate services or marketing decisions for each customer group.

Design and Implementation of Sandcastle Play Guide Application using Artificial Intelligence and Augmented Reality (인공지능과 증강현실 기술을 이용한 모래성 놀이 가이드 애플리케이션 설계 및 구현)

  • Ryu, Jeeseung;Jang, Seungwoo;Mun, Yujeong;Lee, Jungjin
    • Journal of the Korea Computer Graphics Society
    • /
    • v.28 no.3
    • /
    • pp.79-89
    • /
    • 2022
  • With the popularity and the advanced graphics hardware technology of mobile devices, various mobile applications that help children with physical activities have been studied. This paper presents SandUp, a mobile application that guides the play of building sand castles using artificial intelligence and augmented reality(AR) technology. In the process of building the sandcastle, children can interactively explore the target virtual sandcastle through the smartphone display using AR technology. In addition, to help children complete the sandcastle, SandUp informs the sand shape and task required step by step and provides visual and auditory feedback while recognizing progress in real-time using the phone's camera and deep learning classification. We prototyped our SandUp app using Flutter and TensorFlow Lite. To evaluate the usability and effectiveness of the proposed SandUp, we conducted a questionnaire survey on 50 adults and a user study on 20 children aged 4~7 years. The survey results showed that SandUp effectively helps build the sandcastle with proper interactive guidance. Based on the results from the user study on children and feedback from their parents, we also derived usability issues that can be further improved and suggested future research directions.