Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

Home > Explore Content > All Issues > Article List

2013, Vol.9, No.2

  • 1.

    A Study on Improvement of Software Appraisal by Copyright Infringement Case Study

    Kim, Si Yeol | 2013, 9(2) | pp.1~14 | number of Cited : 1
    Abstract PDF
    This paper analyzes those cases which made use of appraisal under Article 119 of the Copyright Act but did not cite the results of the appraisal in the judgment. Through these cases the paper will examine problems with the appraisal system and present means for improvement. There is a call for such measures due to the trend in which the scope of appraisal is beginning to exceed judicial capacity; however, the very real difficulties should not be ignored. Accordingly, the paper will for now present procedural and systematic improvements including stronger integrated appraisals and prior appraisals, that is, measures to give substance to appraisal timelines.
  • 2.

    Data Mining and Software Engineering

    Kwon, Ki Tae | 2013, 9(2) | pp.15~21 | number of Cited : 0
    Abstract PDF
    The accurate estimation of software development cost is important to a successful project in software engineering. Until recent days, the models using regression analysis based on statistical algorithm and data mining method have been proposed. However, this paper estimates the software development cost using support vector regression, a sort of new data mining technique. Also we presents the best set of optimized parameters applying immune algorithm, changing the number of generations, memory cells, and allele. The proposed IA-SVR algorithm outperforms some existed researches published in the literatures.
  • 3.

    Enhancing an Android App Filtering Scheme using an Integrity Verification Module

    Kang SeongWook , Younsik Jeong , SEONG JE CHO | 2013, 9(2) | pp.23~31 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a scheme to filter out copyrighted Android applications which are illegally distributed through online internet sites. A previous simple filtering scheme based on the hash value of a classes.dex file has a problem that the previous scheme can be bypassed by a straightforward change like modifying the hash value. To address the problem, we introduce a new module to verify the integrity of the hash value and certificate information for each Android application. The integrity verification module uses two kinds of information inside an APK file. The first information is a hash value of manifest.mf where we can determine whether the hash value is modified or not by comparing it with one initially stored a database. The second information is a certificate of cert.rsa which can be used to determine if the target file is repackaged or not. Through some experiments, we show that the proposed scheme can overcome the limitation of the previous one and evaluate performance of our scheme.
  • 4.

    Analysis for Revenue Model and Prospect of Mobile App Stores

    Eunju Lee | 2013, 9(2) | pp.33~39 | number of Cited : 1
    Abstract PDF
    With increased use of smart-phones the app stores, the distribution center of mobile contents and services, has emerged as a new power in mobile industry, becoming a new source of profit from non-hardware sales. Currently the app stores are developing rapidly centering around the two giants, the Apple and the Google, and has surfaced as the distribution center putting consumers, developers and corporate customers together. This paper looks into the evolutionary aspect of the app stores by analyzing market situations and revenue models.
  • 5.

    Traffic Transmission among Mobile Nodes in Distributed Mobility Management

    Jang-Geun Ki | 2013, 9(2) | pp.41~46 | number of Cited : 0
    Abstract PDF
    Distributed Mobility Management(DMM) mechanisms have been actively studied in and around the IETF to alleviate the problems of centralized mobility management schemes. In DMM, data traffic is distributed in an efficient way among access routers and does not depend on a central anchor node to manage IP mobility sessions. In this paper, it is suggested that the first Mobility Anchor and Access Router(MAAR) node that takes care of the mobile node must perform the IPv6 proxy neighbor discovery function when the mobile node is going out of the home network(the first attached MAAR area) and moving around in foreign networks. The suggested function is coded in the simulation program and verified by simulations under various traffic environments.
  • 6.

    Digital Forensics on the Handheld Devices

    LEE KYU TAE | 2013, 9(2) | pp.47~52 | number of Cited : 1
    Abstract PDF
    To trace and verify an illegal usage of IT technology, digital forensics are known as an usefull approach. The digital forensics is a procedure of criminal investigation for assure of legal ability by scientific analysis in electronic equipment. smart phone is the one of the best mobile IT devices. Evidence in digital form is the way of doing to create, reproduce, modify, remove, transport Thus, specific procedures and methods are required to achieve legal evidences. A hardware device has special processor and interface modules for it's own function under designers characteristics. An application program has it's own useful program utility and file structures. On forensics, it should be evaluated on the hardware and source code. This paper shows how to make forensics evidence on the hardware devices as it comes illegal property in ownership.