Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Android

2016

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell Dec 2016

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a ...


Rocket Stats, Kyle Cornelison Dec 2016

Rocket Stats, Kyle Cornelison

Computer Science and Software Engineering

An Android application to allow Rocket League players to view their stats and track progress.


Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu Dec 2016

Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and ...


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo Nov 2016

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

Faculty Scholarship at Penn Law

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the ...


Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song Aug 2016

Using Ubiquitous Data To Improve Smartwatches' Context Awareness, Yuankun Song

Open Access Theses

Nowadays, more and more data is being generated by various software applications, services and smart devices every second. The data contains abundant information about people’s daily lives. This research explored the possibility of improving smartwatches’ context awareness by using common ubiquitous data. The researcher developed a prototype system consisting of an Android application and a web application, and conducted an experiment where 10 participants performed several tasks with the help of a smartwatch. The result showed a significant improvement of the smartwatch’s context awareness running the prototype application, which used ubiquitous data to automatically execute proper actions according ...


Autonomous Android: Autonomous 3d Environment Mapping With Android Controlled Multicopters, Tate Glick Hawkersmith Aug 2016

Autonomous Android: Autonomous 3d Environment Mapping With Android Controlled Multicopters, Tate Glick Hawkersmith

Masters Theses

Autonomous robots are robotic platforms with a high degree of autonomy, programmed to perform various behaviors or tasks. They can either be semi-autonomous, only operable within the strict confines of their direct environment, or fully autonomous, capable of sensing and navigating their environments without any human interaction.

In this thesis, I focus on fully autonomous robotic platforms, specifically multicopters, controlled by an onboard Android-driven device, a widely available operating system for smartphones and tablets with over 1.4 billion active monthly users worldwide [Callaham 2015]. The main objective of this research is to create a plug and play solution for ...


Significant Permission Identification For Android Malware Detection, Lichao Sun Jul 2016

Significant Permission Identification For Android Malware Detection, Lichao Sun

Computer Science and Engineering: Theses, Dissertations, and Student Research

A recent report indicates that a newly developed malicious app for Android is introduced every 11 seconds. To combat this alarming rate of malware creation, we need a scalable malware detection approach that is effective and efficient. In this thesis, we introduce SigPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Instead of analyzing all 135 Android permissions, our approach applies 3-level pruning by mining the permission data to identify only significant permissions that can be effective in distinguishing benign and malicious apps. Based on the identified significant ...


Remind, Keith Abdulla Jun 2016

Remind, Keith Abdulla

Computer Science and Software Engineering

No abstract provided.


A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong Jun 2016

A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong

Master's Theses and Project Reports

Nearly two-thirds of Americans own a smart phone, and 19% of Americans rely on their smartphone for either accessing valuable information or staying connected with their friends and family across the globe [15]. Staying always-on and always-connected to the Internet is one of the most important and useful features of a smartphone. This connection is used by almost every single application on the device including web browsers, email clients, messaging applications, etc. Unfortunately, the cellular networks on our smartphones are not perfect and do not always have cellular signal. Our devices often lose Internet connection when users are on the ...


Campusbookshare, Aditya Varkhedi May 2016

Campusbookshare, Aditya Varkhedi

Computer Science and Software Engineering

Every few months, students in the US and abroad face the expensive and time consuming task of buying textbooks for the classes they are enrolled in. Despite the advent of the internet and social networking websites the ability for peer to peer textbook exchange is still limited. There are few if any dedicated websites for general purpose peer to peer textbook transfer for every university and college.

The project I have created for my Senior Project is a peer to peer solution for buying and selling textbooks on US college campuses. The underlying idea is to create an authentication system ...


Pothole Reporting System, Alissa L. Mcgill, Brian G. Simmons, Sean D. Querry, Elizabeth J. Hammell Jan 2016

Pothole Reporting System, Alissa L. Mcgill, Brian G. Simmons, Sean D. Querry, Elizabeth J. Hammell

Williams Honors College, Honors Research Projects

The purpose of this project is to create a pothole detection device that can be attached to the underside of a commercial vehicle. Potholes cost motorists around 6.4 billion dollars annually, thus demonstrating the need for a system to aid with the detection and reporting of potholes. The four systems we needed to consider for the implementation of this project were the power system, the sensing system, the data processing system, and the reporting and logging system. Power pulled from the vehicle will enable the sensors and data processing module. The data processing module will analyze the readings from ...