• Title/Summary/Keyword: Computer and information application

Search Result 4,395, Processing Time 0.03 seconds

Be Aware -Application for Measuring Crowds Through Crowdsourcing Technique in Makkah Al-Mukarramh

  • Mirza, Olfat M.;Alharbi, Israa;Khayyat, Sereen;Aleidarous, Rawa;Albishri, Doaa;Alzhrani, Wejdan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.199-208
    • /
    • 2022
  • The world health organization classified the emerging coronavirus (known as Covid-19) as a pandemic after confirming the extent of spread and scale. As a matter of fact, outbreaks of similar scale or even worse have been witnessed throughout history. Thus, the development of prevention strategies exists to protect against such calamaties. One of the widely proven measures that controls the spread of any contagious diseases is social distancing. As a result, this paper will demonstrate the concept of an application "Be Aware" on enabling the implementation of this preventive measure. In particular "Be aware" evaluates the extent of congestion in public places using current time data. The proposed project will use Global Positioning System (GPS), and Application Programming Interface (API), to ensure information accuracy, and the API use Crowdsourcing to collect Real-Time Data (RTD) from the selected places. One line

Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification

  • Mona faraj Nasser alwahabi;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.41-48
    • /
    • 2024
  • Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application's integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully verified using Burrows-Abadi-Needham (BAN) logic, so it ensures all the security properties. SSPoS is threat modeled and implemented successfully.

Application Services of USN and Smart phones (USN과 스마트폰 응용 서비스)

  • Kim, Jin-Whan;Cho, Jae-Hyun;Kim, Kwang-Baek
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.39-41
    • /
    • 2012
  • USN(Ubiquitous Sensor Network) technology is going to enhance important elements in the ubiquitous society including quality of life, industry, productivity, convenience, stability and transparency. Various services using USN and smart phones have been developed and more widely used. This paper discusses various application services.

  • PDF

Oceanic organism educational application for kids using smartphone (스마트폰을 이용한 유아용 바다 생물 교육 애플리케이션)

  • Park, Changwoo;Jo, Jungpil;Seo, Jeongwoo;Kim, Nagyum;Yeo, Jimin;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.496-498
    • /
    • 2013
  • Smartphone is becoming popular from younger generation to old generation because of its convenience. Generalizing use of smartphone, it was being developed and released for education application from based on PC to smartphone. in this paper, this application was designed and developed an helpful and enjoyable application for those who very interested child education. in this paper, suggestion of the propose of education is provided on service various contetns. The children can do implement information about organism characters living in sea just selected them they want without going to sea and aquarium whenever they want. this application is implemented that children also can be relearning the organism characters by quiz that already learned them before, and developing artistic sense, creativity and imagination by coloring exercise.

  • PDF

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

Improving Fault Traceability of Web Application by Utilizing Software Revision Information and Behavior Model

  • Baek, Seungsuk;Lee, Jung-Won;Lee, Byungjeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.817-828
    • /
    • 2018
  • Modern software, especially web-based software, is broadly used in various fields. Most web applications employ design patterns, such as a model-view-controller (MVC) pattern and a factory pattern as development technology, so the application can have a good architecture to facilitate maintenance and productivity. A web application, however, may have defects and developers must fix the defects when a user submits bug reports. In this paper, we propose a novel approach to improving fault traceability in web application by using software revision information and software behavior model to reduce costs and effectively handle the software defect. We also provide a case study to show effectiveness of our approach.

CAD Viewer Application for Android (안드로이드 기반의 CAD 뷰어 어플리케이션)

  • Park, Shin-Young;Roh, Byeong-Hee;Lee, Seok-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.60-62
    • /
    • 2012
  • 산업현장에서의 일의 효율성 증진을 위한 휴대 기기의 CAD Viewer 의 개발의 필요성이 대두 되면서 안드로이드 기반의 CAD Viewer Application을 개발하였다. 본 연구에서는 안드로이드 기반의 CAD 뷰어의 개발과정과 개발 결과를 보여준다.

Comparison of Image Procesing Technique (영상처리 기술 비교)

  • Shin, Seong-Yoon;Rhee, Yang-Won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.149-150
    • /
    • 2010
  • This paper contains some simple daily used and research used complex methods, describe their theories and analysis implement results, for deeper comprehension. After that, take an actual application of car license location, elaborate the common algorithm responsibility, and meanwhile take some subtle new attempts for algorithm development.

  • PDF

A Design and Implementation of Local Festivals and Travel Information Service Application

  • Jae Hyun Ahn;Hang Ju Lee;Se Yeon Lee;Ji Won Han;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.65-71
    • /
    • 2023
  • In this paper, we design and implement the Walking Life Festival application, which is based on the Android platform and provides information about domestic travel destinations and regional festivals in South Korea. This application utilizes various sensors found in smartphones, including the Step Counter sensor, Step Detector sensor, Acceleration sensor, and GPS sensor. Additionally, it makes use of Google Map API and Public Open API to offer information about domestic travel destinations and local festivals. The application also incorporates an automatic login feature using the Shared Preference API. When storing login information in the database, it encrypts the input plaintext data using a hash algorithm. For Google Maps integration, it creates objects using the Google.maps.LatLngBounds() method and extends the location information through the extends method. Furthermore, this application contributes to the activation of the domestic tourism industry by notifying users about the timing of local festivals related to domestic travel destinations, thus increasing their opportunities to participate in these festivals.

A Simple Proposal For Ain Makkah Almukkarmah An Application Using Augmented Reality Technology

  • Taghreed Alotaibi;Laila Alkabkabi;Rana Alzahrani;Eman Almalki;Ghosson Banjar;Kholod Alshareef;Olfat M. Mirza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.115-122
    • /
    • 2023
  • Makkah Al-Mukarramah is the capital of Islamic world. It receives special attention from the Saudi government's rulers to transform it into a smart city for the benefit of millions of pilgrims. One of the 2030 vision objectives is to transform specific cities to smart ones with advanced technological facilitation, Makkah is one of these cities. The history of Makkah is not well known for some Muslims. As a result, we built the concepts of our application "Ain Makkah" to enable visitors of Makkah to know the history of Makkah by using technology. In particular "Ain Makkah" uses Augmented Reality to view the history of Al-Kaaba. A 3D model will overlay Al-Kaaba to show it in the last years. Our project will use Augmented Reality to build a 3D model to overlay Al-Kaaba. Future work will expand the number of historical landmarks of Makkah.