Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Android

Theses/Dissertations

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 53

Full-Text Articles in Computer Engineering

Minet Magnetic Indoor Localization, Michael Drake Apr 2020

Minet Magnetic Indoor Localization, Michael Drake

Honors Theses

Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization, though less popular than WiFi signal based localization, is a sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method ...


Android And Web Application For Tracking Employees, Kaival Dholakia Dec 2019

Android And Web Application For Tracking Employees, Kaival Dholakia

Electronic Theses, Projects, and Dissertations

The purpose that this tracking system serves is to keep track of the employees of the company who have the nature of their job which involves a lot of traveling to various locations on a day to day basis. It is an amalgamation of Android as well as a Web application. The employee is supposed to pass the location and image as per the terms and conditions specified to use the Android application. The web application is used by the admin department to access the information which would help them monitor the location of the employee in a timely manner ...


Android Ransomware Trends And Case Studies: A Reverse Engineering Approach, Chenliang Xu Jan 2019

Android Ransomware Trends And Case Studies: A Reverse Engineering Approach, Chenliang Xu

Graduate Theses and Dissertations

With the rapid development of science and technology, the mobile device is becoming more and more powerful. However, technology is a two-edged sword, mobile devices also bring security risks. Malware or ransomware is not just for PC, but also a big threat to mobile device security. Because of these malicious applications, the user’s mobile device may be locked, files may be encrypted, and even personal information can be exposed in danger. Therefore, more researches and analysis on currently popular ransomware are necessary. This paper is going to conclude the taxonomy of Android ransomware in terms of the types of ...


An Investigative Study On Android Verified Boot Process, Brett Weiss Jan 2019

An Investigative Study On Android Verified Boot Process, Brett Weiss

Creative Components

No abstract provided.


Android Third-Party Library Detection, Brody Concannon Jan 2019

Android Third-Party Library Detection, Brody Concannon

Creative Components

Third-party library analysis research is important to many research fields like program analysis, clone-detection, security and privacy. There are many considerations taken when developing a third-party library analysis approach. The approach must be resilient to common obfuscation techniques and be able to determine similarity between two libraries with a high level of confidence. This paper explores this research and the problems that have been solved and reviews the improvements and shortcomings within the third-party library analysis field.


Exploring Photo Privacy Protection On Smartphones, David Darling Dec 2018

Exploring Photo Privacy Protection On Smartphones, David Darling

Computer Science and Computer Engineering Undergraduate Honors Theses

The proliferation of modern smartphone camera use in the past decade has resulted in unprecedented numbers of personal photos being taken and stored on popular devices. However, it has also caused privacy concerns. These photos sometimes contain potentially harmful information if they were to be leaked such as the personally identifiable information found on ID cards or in legal documents. With current security measures on iOS and Android phones, it is possible for 3rd party apps downloaded from official app stores or other locations to access the photo libraries on these devices without user knowledge or consent. Additionally, the prevalence ...


Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla Dec 2018

Organize Events Mobile Application, Thakshak Mani Chandra Reddy Gudimetla

Electronic Theses, Projects, and Dissertations

In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to ...


Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam Jun 2018

Book-Hunt! Android Mobile Application Using Indoor Positioning Technology, Sneha Pantam

Electronic Theses, Projects, and Dissertations

Indoor Positioning System (IPS) focuses on locating objects inside

Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is designed for Libraries. It is designed specifically for John M. Pfau Library ...


Assured Android Execution Environments, Brandon P. Froberg Mar 2018

Assured Android Execution Environments, Brandon P. Froberg

Theses and Dissertations

Current cybersecurity best practices, techniques, tactics and procedures are insufficient to ensure the protection of Android systems. Software tools leveraging formal methods use mathematical means to assure both a design and implementation for a system and these methods can be used to provide security assurances. The goal of this research is to determine methods of assuring isolation when executing Android software in a contained environment. Specifically, this research demonstrates security properties relevant to Android software containers can be formally captured and validated, and that an implementation can be formally verified to satisfy a corresponding specification. A three-stage methodology called "The ...


Cru Android App, Dylan Sun Mar 2018

Cru Android App, Dylan Sun

Computer Science and Software Engineering

The Cru app is focused on connecting students and faculty to one of the many Cru ministries here in San Luis Obispo. The app is capable of connecting individuals to a specific community group and ministry teams, gathering information about upcoming Cru events and gatherings, and direct rideshare capabilities. The Cru Android App utilizes Java and other industry standard technologies to fully deliver a well-rounded user experience and to be connected with Cru. In this project, I increased Cru app’s access control abilities and updated the app overall to be ready for an alpha release.


Using Static Analysis And Dalvik Bytecode On Android Compass Applications To Detect Operational Anomalies, Arti J. Tripathi Jan 2018

Using Static Analysis And Dalvik Bytecode On Android Compass Applications To Detect Operational Anomalies, Arti J. Tripathi

Senior Projects Spring 2018

The focus of this paper is the functionality of Android applications and the detection of functional anomalies though a basic static analysis approach. The intention of this research is analyzing applications without running them and detecting how application behavior might correlate with method call patterns. We will focus on simple free compass applications because their ostensible simplicity will make high variation in methods calls an interesting phenomenon. We employ clustering algorithms and other statistical methods to isolate a particularly unusual collection of applications and then perform a qualitative analysis of these applications to discover any interesting common operational behavior or ...


Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman Jun 2017

Blend It Applications And Server, Rebecca Mckinley, Cory Mayer, Tyler Fox, Alex Bartlett, Aly Chapman

Computer Engineering

No abstract provided.


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell Jun 2017

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science and Software Engineering

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was ...


The Following Robot, Juan D. Cerda, Matthew S. Kwan, Vi M. Le Jun 2017

The Following Robot, Juan D. Cerda, Matthew S. Kwan, Vi M. Le

Computer Engineering

The objective of this project is to design, build, and test an autonomous robot with an associated Android application. The robot uses on board inertial measurement sensors (magnetometer, accelerometer, gyroscope) and coordinates itself through Bluetooth communication with the similar built­in measurement sensors on the Android phone to mimic and follow movement. The Following Robot incorporates the same basic movement functionality as a typical RC car. The robot follows the user’s phone through an application on one’s phone. This application accesses the phone’s accelerometer and gyroscope data and translates into appropriate conversions. Methods of tracking and calculating ...


Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips Jun 2017

Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips

Electrical Engineering

The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless ...


A Dynamic Taint Forensic Analysis Tool For Android Apps, Zhen Xu Jan 2017

A Dynamic Taint Forensic Analysis Tool For Android Apps, Zhen Xu

Graduate Theses and Dissertations

Mobile digital forensic faces numerous problems including a huge amount of data, growing amount of applications and usage of encryption or obfuscation. As a result, data of interest is hard to locate. The traditional method uses predefined pattern searching algorithm. Such technique can dig out much information but cannot find information embedded with normal data such as a barcode in an image or encryption. This project intends to develop a tool which facilitates the investigation process by answering what information could exist in a certain file. With the assistance, the investigator can focus on the content of some interesting files ...


Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren Jan 2017

Design And Implementation Of An Improved Android Application For Bard Shuttle Services, Chance O'Neihl Wren

Senior Projects Spring 2017

With the growing population of Bard College, the need for the college’s shuttle system continues to grow. As a result, enabling the Bard community to quickly and easily access the shuttle schedules and times, has also become more important in the daily of life of Bard College's inhabitants. Although Bard College has a mobile application for Android and iPhone mobile devices alike, there was a growing demand for a new improved shuttle application for Android mobile devices. This project seeks to improve the functionality, user friendliness, and availability of shuttle schedules to the Bard Community, in the form ...


Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu Jan 2017

Development Of An Android Based Performance Assessment System For Motivational Interviewing Training, Sowmya Pappu

Browse all Theses and Dissertations

Motivational Interviewing (MI) has been proved to be an effective Screening, Brief Intervention, and Referral to Treatment (SBIRT) technique. It is an evidence-based practice used to identify, reduce, and prevent problematic use, abuse, and dependence on alcohol and illicit drugs. It emphasizes on patient-centered counseling approach that can help resolve their ambivalence through a non-confrontational, goal-oriented style for eliciting behavior change from the patient, almost like patients talk themselves into change. This approach provokes less resistance and stimulates the progress of patients at their own pace towards deciding about planning, making and sustaining positive behavioral change. Thus, training medical professionals ...


Rocket Stats, Kyle Cornelison Dec 2016

Rocket Stats, Kyle Cornelison

Computer Science and Software Engineering

An Android application to allow Rocket League players to view their stats and track progress.


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell Dec 2016

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a ...


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according ...


Autonomous Android: Autonomous 3d Environment Mapping With Android Controlled Multicopters, Tate Glick Hawkersmith Aug 2016

Autonomous Android: Autonomous 3d Environment Mapping With Android Controlled Multicopters, Tate Glick Hawkersmith

Masters Theses

Autonomous robots are robotic platforms with a high degree of autonomy, programmed to perform various behaviors or tasks. They can either be semi-autonomous, only operable within the strict confines of their direct environment, or fully autonomous, capable of sensing and navigating their environments without any human interaction.

In this thesis, I focus on fully autonomous robotic platforms, specifically multicopters, controlled by an onboard Android-driven device, a widely available operating system for smartphones and tablets with over 1.4 billion active monthly users worldwide [Callaham 2015]. The main objective of this research is to create a plug and play solution for ...


Remind, Keith Abdulla Jun 2016

Remind, Keith Abdulla

Computer Science and Software Engineering

No abstract provided.


A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong Jun 2016

A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong

Master's Theses

Nearly two-thirds of Americans own a smart phone, and 19% of Americans rely on their smartphone for either accessing valuable information or staying connected with their friends and family across the globe [15]. Staying always-on and always-connected to the Internet is one of the most important and useful features of a smartphone. This connection is used by almost every single application on the device including web browsers, email clients, messaging applications, etc. Unfortunately, the cellular networks on our smartphones are not perfect and do not always have cellular signal. Our devices often lose Internet connection when users are on the ...


Campusbookshare, Aditya Varkhedi May 2016

Campusbookshare, Aditya Varkhedi

Computer Science and Software Engineering

Every few months, students in the US and abroad face the expensive and time consuming task of buying textbooks for the classes they are enrolled in. Despite the advent of the internet and social networking websites the ability for peer to peer textbook exchange is still limited. There are few if any dedicated websites for general purpose peer to peer textbook transfer for every university and college.

The project I have created for my Senior Project is a peer to peer solution for buying and selling textbooks on US college campuses. The underlying idea is to create an authentication system ...


Pothole Reporting System, Alissa L. Mcgill, Brian G. Simmons, Sean D. Querry, Elizabeth J. Hammell Jan 2016

Pothole Reporting System, Alissa L. Mcgill, Brian G. Simmons, Sean D. Querry, Elizabeth J. Hammell

Williams Honors College, Honors Research Projects

The purpose of this project is to create a pothole detection device that can be attached to the underside of a commercial vehicle. Potholes cost motorists around 6.4 billion dollars annually, thus demonstrating the need for a system to aid with the detection and reporting of potholes. The four systems we needed to consider for the implementation of this project were the power system, the sensing system, the data processing system, and the reporting and logging system. Power pulled from the vehicle will enable the sensors and data processing module. The data processing module will analyze the readings from ...


User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi Nov 2015

User Interface Design And Forensic Analysis For Diorama, Decision Support System For Mass Casualty Incidents, Jun Yi

Masters Theses

In this thesis we introduces the user interface design and forensic analysis tool for DIORAMA system. With an Android device, DIORAMA provides emergency personnel the ability to collect information in real time, track the resources and manage them. It allows the responders and commanders to mange multiple incidents simultaneously. This thesis also describes the implementations of commander app and responder app, as well as two different communication strategies used in DIORAMA. Several trials and simulated mass casualty incidents were conducted to test the functionalities and performance of DIORAMA system. All responders that participated in all trials were very satisfied with ...


Indoor And Outdoor Real Time Information Collection In Disaster Scenario, Dongyi Yang Nov 2015

Indoor And Outdoor Real Time Information Collection In Disaster Scenario, Dongyi Yang

Masters Theses

A disaster usually severely harms human health and property. After a disaster, great amount of information of a disaster area is needed urgently. The information not only indicates the severity of the disaster, but also is crucial for an efficient search and rescue process. In order to quickly and accurately collect real time information in a disaster scenario, a mobile platform is developed for an outdoor scenario and a localization and navigation system for responders is introduced for an indoor scenario.

The mobile platform has been integrated to the DIORAMA system. It is built with a 6-wheel robot chassis along ...


Enterprise Smart Outlet: Android Development, Aaron Koeppel Jun 2015

Enterprise Smart Outlet: Android Development, Aaron Koeppel

Computer Science and Software Engineering

This project consists of one part of a larger multidisciplinary project, Enterprise Smart Outlet. The purpose of the Enterprise Smart Outlet is to create an electrical outlet which would allow enterprise users to monitor and change their power consumption habits on a large scale. The goal of this project is to allow consumers to see their power consumption per outlet in real time, and then use that information to inform their future habits, helping them conserve electrical energy and money. The Enterprise Smart Outlet Android application provides an interface to display the real time data of all smart outlets connected ...


Nutty Adventures, Tony Hsu, Mandy Chan Jun 2015

Nutty Adventures, Tony Hsu, Mandy Chan

Computer Engineering

Nutty Adventures is an Android game. The goal is to gather acorns for day-to-day survival, upgrades, and hoarding. Ultimately, the player must have enough acorns by the time Winter comes to fulfill the squirrel’s quest: providing enough acorns for his squirrel kingdom during the barren Winter season. Throughout the days, the player has to keep track of time and monsters, which might influence player decisions.