Raw and subsidiary material use to product goods. In this paper, we introduce the Software Appraise for Cyber Expo System. The completion appraise is performed by investigating the contract documents and a field investigation.
Copyright infringement in Android applications is a growing problem because Android applications can be easily reverse engineered and pirated. In this paper, we propose three techniques for comparing similarity between Android applications in order to detect the theft of the applications. The proposed techniques statically analyze the Dalvik VM executable files in the Dalvik Executable (.dex) format, and measure similarity between the executable files (DEX files). The first technique decompiles DEX (VM bytecode) files into corresponding Java source codes and computes similarity between the decompiled source codes. The second technique extracts string information contained in DEX files and calculates similarity between applications based on the string information. The last technique extracts methods’ features defined DEX files and compares similarity between applications based on the features. We evaluate the performance of the proposed techniques in terms of credibility and resilience by carrying out some experiments.
The digital forensics is a procedure of criminal investigation for assure of legal ability by scientific analysis in electronic equipment. smart phone is the one of the best mobile IT devices. Evidence in digital form is the way of doing to create, reproduce, modify, remove, transport Thus, specific procedures and methods are required to achieve legal evidences. A hardware device has special processor and interface modules for it's own function under designers characteristics. An application program has it's own useful program utility and file structures. On forensics, it should be evaluated on the hardware and source code.
This paper shows how to make forensics evidence on the hardware devices as it comes illegal property in ownership.
One of the biggest factors of software projects failure is that we can’t understand, analyze, document, manage, and control the complex requirements from various stakeholders. In other words, incorrect requirements and specifications have created many problems of unclear business purpose and scope, bad business forecasting, and the problem of low quality and it is possible to cause problems of the development cost. In order to solve these problems, a clear specification of requirements should be made.
We suggest cost estimation method that utilizes successful bid difference challenges of SW business, which was determined by using a clear specification of such scope changes. First, the general business environment of SW scope modification and operational status are analyzed. Based on the results of this analysis, the key success factors of scope change management tasks and prerequisite information is derived. Finally, we suggest the cost estimation method taking advantage of the difference between successful paid bids.
Based on existing IP mobility protocols such as PMIPv6, DMM(Distributed Mobility Management) mechanism has been actively studied in and around the IETF. In DMM, data traffic is distributed in an efficient way and does not rely on a central anchor node to manage IP mobility sessions.
In this paper, the simulation models and program codes to support DMM scheme have been developed and verified by simulations under various traffic environments. The simulation results show that the developed models for DMM are useful for mobility management studies in wireless network environment.
Well-known software includes text editors, media players, image viewers, networking programs, game programs, messenger programs, etc. As software is getting more valuable, a malicious programmer illegally copies all or part of a valuable program and resells the copied one. Therefore, we need to categorize programs according to their characteristics in order to efficiently detect software theft. In this paper, we propose a technique that effectively classifies Microsoft Windows applications based on dynamic-link libraries. The proposed technique can be used to analyze suspicious programs even when their functions are not known in advance.
Document image analysis is necessary for optical character recognition (OCR) and also very useful for many other document image manipulations. In this paper, we propose a document image geometric layout analysis system which has less region segmentation and classification error than that of the commercial software and previous works. The proposed method segments the document image into small regions to the size of a character using fast connected components generation method, so that it prevents the different types of connected components from combining. We also propose new criterion for clustering the connected components and some new techniques to deal with noise and reduce computation time.
Experiment shows classification error rate of text and picture regions is decreased.