• 제목/요약/키워드: Computer and information application

검색결과 4,418건 처리시간 0.028초

RGB 색 보정 알고리즘을 활용한 모바일 색 보정 애플리케이션 (A Mobile Color-compensating Application using RGB Color Compensation Algorithm)

  • 곽기현;전영찬;최설인;신희정;황성수
    • 한국멀티미디어학회논문지
    • /
    • 제19권12호
    • /
    • pp.1936-1942
    • /
    • 2016
  • This paper presents a mobile color-compensating application using a RGB color compensation algorithm. The proposed application enables color vision deficiencies to differentiate images which cannot be distinguished by them. The suggested mobile application has two functions: converting images taken by camera and converting contents in the device screen. The proposed application is computationally inexpensive, since it does not require color space transformation. Simulation results show that the proposed application enables color vision deficiencies to receive information expressed by colors such as subway line maps.

Using SQLMAP to Detect SQLI Vulnerabilities

  • Almadhy, Waad;Alruwaili, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.234-240
    • /
    • 2022
  • One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun;Lee, JoonGoo;Kim, SeonWook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.74-82
    • /
    • 2014
  • Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Software Engineering에 關한 報告

  • Lee, 李基式 = -Ki-Sik
    • 정보과학회지
    • /
    • 제4권2호
    • /
    • pp.95-103
    • /
    • 1986
  • Computer는 발명되서부터 매년 응용분야가 넓어지고 있다. 현재에는 情 報處理라는 말그대로 어떠한 형태이든가의 복잡하고 다량의 情報가 存在하는 곳 에는 computer를 導入할려고 하든가, 또는 導入이 끝난 곳에서는 보다 큰 大規模 의 system으로 擴張하려고 하는 생각들을 보통 가지고 있다. 이러한 요구에 응하 여 왔던 것이 hardware, oprating system, 그리고 application software이다. 그중 hardware나 operating system은 多小 變化하여 왔지만은, 方式的으로는 application의 특성에 의한 요구에는 별로 틀린것이 없이 대개 같은 종류의 것이 쓰여왔다고 할 수 있다. 따라서 무수히 變하는 application의 複雜한 論理를 實現 하는 것은, 그 책임이 application software 개발자에 걸려있다. 그러므로 이러한 것들은 개발자(designer, programmer) 들의 개인의 기술과 努力에 달렸다고 말할 수 있다.

HTML5의 안전하지 않는 모바일 웹 어플리케이션에 대한 고찰 (A Study on Unsafe Mobile Web Application of HTML5)

  • 정훈영;서희석
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.755-758
    • /
    • 2011
  • 현재 인터넷의 최대의 관심사는 HTML5의 등장으로 인한 Web Page의 변화이다. 다양한 분야에서 영향을 미칠 것으로 최근 들어 급격히 무선 네트워크 사용률이 증가한 스마트폰에서도 Web Application이 등장하고 있다. 하지만 Web Application은 Native Application보다 소스 보안에 대해 매우 취약하며 본 연구에서는 이에 대한 분석과 보안을 위해 요구되는 HTML5 기능에 대해 언급한다.

Transfer Learning for Caladium bicolor Classification: Proof of Concept to Application Development

  • Porawat Visutsak;Xiabi Liu;Keun Ho Ryu;Naphat Bussabong;Nicha Sirikong;Preeyaphorn Intamong;Warakorn Sonnui;Siriwan Boonkerd;Jirawat Thongpiem;Maythar Poonpanit;Akarasate Homwiseswongsa;Kittipot Hirunwannapong;Chaimongkol Suksomsong;Rittikait Budrit
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권1호
    • /
    • pp.126-146
    • /
    • 2024
  • Caladium bicolor is one of the most popular plants in Thailand. The original species of Caladium bicolor was found a hundred years ago. Until now, there are more than 500 species through multiplication. The classification of Caladium bicolor can be done by using its color and shape. This study aims to develop a model to classify Caladium bicolor using a transfer learning technique. This work also presents a proof of concept, GUI design, and web application deployment using the user-design-center method. We also evaluated the performance of the following pre-trained models in this work, and the results are as follow: 87.29% for AlexNet, 90.68% for GoogleNet, 93.59% for XceptionNet, 93.22% for MobileNetV2, 89.83% for RestNet18, 88.98% for RestNet50, 97.46% for RestNet101, and 94.92% for InceptionResNetV2. This work was implemented using MATLAB R2023a.

Extension and Implementation of Iconic Stereotype for GNSS Application in the UML Class Diagram

  • Wang Bo;No, Hye-Min;Yoo, Cheol-Jung;Chang, Ok-Bae
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 봄 학술발표논문집 Vol.30 No.1 (B)
    • /
    • pp.136-138
    • /
    • 2003
  • UML cannot meet all the requirements offered in different software system for diverse application domain. GNSS (Global Navigation Satellite System) application domain is an especial environment that requires precise measurement and precision calculation of real-world geographical entities with the help of GPS (Global Position System) in both temporal and spatial factor. Therefore in the paper new extended iconic stereotypes for better modeling GNSS application in the UML Diagram are proposed, and the implementation of a program called StereotypeCreator, which is able to create iconic stereotypes used in one of the most popular visual modeling tools for software development, Rational Rose, will be also proposed.

  • PDF

Application of Topic Modeling Techniques in Arabic Content: A Systematic Review

  • Maram Alhmiyani;Huda Alhazmi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.1-12
    • /
    • 2023
  • With the rapid increase of user generated data on digital platforms, the task of categorizing and classifying theses huge data has become difficult. Topic modeling is an unsupervised machine learning technique that can be used to get a summary from a large collection of documents. Topic modeling has been widely used in English content, yet the application of topic modeling in Arabic language is limited. Therefore, the aim of this paper is to provide a systematic review of the application of topic modeling algorithms in Arabic content. Using a well-known and trusted databases including ScienceDirect, IEEE Xplore, Springer Link, and Google Scholar. Considering the publication date from 2012 to 2022, we got 60 papers. After refining the papers based on predefined criteria, we resulted in 32 papers. Our result show that unfortunately the application of topic modeling techniques in Arabic content is limited.

A Log Management Service Model based on AOP for Efficient Development of Android Applications

  • Choi, Yun-seok
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권3호
    • /
    • pp.39-45
    • /
    • 2016
  • In this paper, we propose a log management service model for efficient developments of android applications. The proposed model consists of two major parts which are the log collector and the log manager service. The log collector can capture the log information of a target application without modifications, because the collector is composed by aspect-oriented programming. The collected logs are transformed to chunk of data, and the chunk of data is sent to the log management service. The log management service is an android service component and an independent application in another process. So, the log management service can reduce the workload of logging in the target application. Through a case study, we show that the proposed log management service model can reduce the log processing time compared to other models without modifications of a target application.