Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

2019

Android

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 21 of 21

Full-Text Articles in Entire DC Network

Aplikasi Kebugaran Dan Kesehatan Berbasis Android: Bagaimana Persepsi Dan Minat Masyarakat?, Muhammad Sigit Antoni, Suharjana Suharjana Dec 2019

Aplikasi Kebugaran Dan Kesehatan Berbasis Android: Bagaimana Persepsi Dan Minat Masyarakat?, Muhammad Sigit Antoni, Suharjana Suharjana

Jurnal Keolahragaan

Teknologi ponsel pintar khususnya dengan sistem operasi android berkembang sangat pesat, termasuk dalam perkembangan aplikasi yang berbasis android. Perkembangan teknologi tersebut mencakup berbagai bidang dalam kehidupan sehari-hari, salah satunya dalam bidang olahraga kesehatan. Tujuan penelitian ini adalah untuk memberikan gambaran tentang persepsi dan minat masyarakat olahraga di Daerah Istimewa Yogyakarta terhadap aplikasi android kategori kebugaran dan kesehatan. Penelitian ini merupakan penelitian deskriptif dengan metode survei. Instrumen yang digunakan dalam penelitian ini adalah angket berbasis web. Penelitian dilakukan dengan melakukan survei terhadap para praktisi keolahragaan, akademisi di bidang olahraga kesehatan, serta masyarakat umum yang berjumlah 62 responden. Hasil penelitian menunjukkan bahwa …


Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah Dec 2019

Advanced Security Analysis For Emergent Software Platforms, Mohannad Alhanahnah

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) platforms, are perpetually sophisticated, deployed into highly dynamic environments, and facilitating interactions across heterogeneous domains. Accordingly, assessing the security thereof is a pressing need, yet requires high levels of scalability and reliability to handle the dynamism involved in such volatile ecosystems.

This dissertation seeks to enhance conventional security detection methods to cope with the emergent features of contemporary software ecosystems. In particular, it analyzes the security of Android and IoT ecosystems by developing rigorous vulnerability detection methods. A critical aspect of this work is the …


Android And Web Application For Tracking Employees, Kaival Dholakia Dec 2019

Android And Web Application For Tracking Employees, Kaival Dholakia

Electronic Theses, Projects, and Dissertations

The purpose that this tracking system serves is to keep track of the employees of the company who have the nature of their job which involves a lot of traveling to various locations on a day to day basis. It is an amalgamation of Android as well as a Web application. The employee is supposed to pass the location and image as per the terms and conditions specified to use the Android application. The web application is used by the admin department to access the information which would help them monitor the location of the employee in a timely manner. …


Comparison Of Forensic Acquisition And Analysis On An Iphone Over An Android Mobile Through Multiple Forensic Methods, Vikas Avancha Dec 2019

Comparison Of Forensic Acquisition And Analysis On An Iphone Over An Android Mobile Through Multiple Forensic Methods, Vikas Avancha

Culminating Projects in Information Assurance

Mobile phones are most widely used as mini laptops as well as personal digital devices one could have. The dependency on mobiles for every single person on every single aspect has increased day by day. Depending on the operating systems, storage capacity, user interface developed by various manufacturers, there are numerous mobile phones designed with diverse computing capabilities. Among all the distinct kinds of smart mobile devices that are available in the mobile market, iPhone became one of the most popularly used smart mobiles across the world due to its complex logical computing capabilities, striking touch interface, optimum screen resolutions. …


Pengaruh Penggunaan Media Pembelajaran Berbasis Android Terhadap Kemampuan Pemecahan Masalah Kimia, Arina Diana Fatma, Crys Fajar Partana Oct 2019

Pengaruh Penggunaan Media Pembelajaran Berbasis Android Terhadap Kemampuan Pemecahan Masalah Kimia, Arina Diana Fatma, Crys Fajar Partana

Jurnal Inovasi Pendidikan IPA

Penelitian ini bertujuan untuk menghasilkan media pembelajaran berbasis android dan mengidentifikasi peningkatan kemampuan pemecahan masalah kimia siswa. Prosedur penelitian pengembangan diadaptasi dari pengembangan ADDIE, terdiri dari lima tahap: analisis, desain, pengembangan, penerapan, dan evaluasi. Validasi produk dilakukan oleh ahli media dan ahli materi. Penilaian produk dilakukan oleh 5 guru kimia, 20 siswa untuk uji coba kelompok kecil, dan 56 siswa untuk uji coba lapangan. Evaluasi uji lapangan dilakukan untuk menentukan pengaruh media pembelajaran berbasis android terhadap kemampuan pemecahan masalah kimia. Instrumen yang digunakan dalam penelitian ini meliputi kuisioner penilaian media dan soal tes. Kuisioner penilaian diberikan kepada ahli media, ahli …


Towards Generating Transformation Rules Without Examples For Android Api Replacement, Ferdian Thung, Hong Jin Kang, Lingxiao Jiang, David Lo Oct 2019

Towards Generating Transformation Rules Without Examples For Android Api Replacement, Ferdian Thung, Hong Jin Kang, Lingxiao Jiang, David Lo

Research Collection School Of Computing and Information Systems

Deprecation of APIs in software libraries is common when library maintainers make changes to a library and will no longer support certain APIs in the future. When deprecation occurs, developers whose programs depend on the APIs need to replace the usages of the deprecated APIs sooner or later. Often times, software documentation specifies which new APIs the developers should use in place of a deprecated API. However, replacing the usages of a deprecated API remains a challenge since developers may not know exactly how to use the new APIs. The developers would first need to understand the API changes before …


Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang Jul 2019

Sensitive Behavior Analysis Of Android Applications On Unrooted Devices In The Wild, Xiaoxiao Tang

Dissertations and Theses Collection (Open Access)

Dynamic analysis is widely used in malware detection, taint analysis, vulnerability detection, and other areas for enhancing the security of Android. Compared to static analysis, dynamic analysis is immune to common code obfuscation techniques and dynamic code loading. Existing dynamic analysis techniques rely on in-lab running environment (e.g., modified systems, rooted devices, or emulators) and require automatic input generators to execute the target app. However, these techniques could be bypassed by anti-analysis techniques that allow apps to hide sensitive behavior when an in-lab environment is detected through predefined heuristics (e.g., IMEI number of the device is invalid). Meanwhile, current input …


Integrating Trustzone Protection With Communication Paths For Mobile Operating System, Kailiang Ying May 2019

Integrating Trustzone Protection With Communication Paths For Mobile Operating System, Kailiang Ying

Dissertations - ALL

Nowadays, users perform various essential activities through their smartphones, including mobile payment and financial transaction. Therefore, users’ sensitive data processed by smartphones will be at risk if underlying mobile OSes are compromised. A technology called Trusted Execution Environment (TEE) has been introduced to protect sensitive data in the event of compromised OS and hypervisor.

This dissertation points out the limitations of the current design model of mobile TEE, which has a low adoption rate among application developers and has a large size of Trusted Computing Base (TCB). It proposes a new design model for mobile TEE to increase the TEE …


An Automated Toll Collection System For Bangladesh: An Experimental Approach, Saifuddin Mahmud, Hasib Iqbal, Chandra Mondol Tusher, Alfred Shaker May 2019

An Automated Toll Collection System For Bangladesh: An Experimental Approach, Saifuddin Mahmud, Hasib Iqbal, Chandra Mondol Tusher, Alfred Shaker

36th Florida Conference on Recent Advances in Robotics

Automation has a great impact in our everyday life and making our life easy. Day by day the number of vehicles passing over the road is increasing due to which traffic jam; wastage of human effort is taking places. And our existing manual toll collection system of Bangladesh can’t handle this with limited amount of time. So, we propose an experimental approach of running a system 24 hours a day without interruption concerned with fully automated toll collection system using active RFID tags which is able to reduce human effort and time and most importantly traffic jam. In this system …


Code Reuse Between Java And Android Applications, Yoonsik Cheon, Carlos V. Chavez, Ubaldo Castro May 2019

Code Reuse Between Java And Android Applications, Yoonsik Cheon, Carlos V. Chavez, Ubaldo Castro

Departmental Technical Reports (CS)

Java and Android applications can be written in the same programming language. Thus, it is natural to ask how much code can be shared between them. In this paper, we perform a case study to measure quantitatively the amount of code that can be shared and reused for a multiplatform application running on the Java platform and the Android platform. We first configure a development environment consisting of platform-specific tools and supporting continuous integration. We then propose a general architecture for a multiplatform application under a guiding design principle of having clearly defined interfaces and employing loose coupling to accommodate …


Attacks On The Android Platform, Ranajit Singh Mehroke May 2019

Attacks On The Android Platform, Ranajit Singh Mehroke

Culminating Projects in Information Assurance

The focus of this research revolves around Android platform security, specifically Android malware attacks and defensive techniques. Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as smartphones and tablets. With the rise of device mobility in our data-driven world, Android constitutes most of the operating systems on these mobile devices playing a dominant role in today’s world. Hence, this paper analyzes attacks and the various defensive mechanisms that have been proposed to prevent those attacks.


Multiplatform Application Development For Android And Java, Yoonsik Cheon Apr 2019

Multiplatform Application Development For Android And Java, Yoonsik Cheon

Departmental Technical Reports (CS)

Software developers of today are under increasing pressure to support multiple platforms, in particular mobile platforms. However, developing a multiplatform application is difficult and challenging due to a variety of platform differences. We propose a native approach for developing a multiplatform application running on two similar but different platforms, Java and Android. We address practical software engineering concerns attributed to native multiplatform application development, from configuration of tools to software design and development process. Our approach allows one to share 37%~40% of application code between the two platforms as well as improving the quality of the application. We believe our …


Gaindroid: General Automated Incompatibility Notifier For Android Applications, Bruno Vieira Resende E Silva Apr 2019

Gaindroid: General Automated Incompatibility Notifier For Android Applications, Bruno Vieira Resende E Silva

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

With the ever-increasing popularity of mobile devices over the last decade, mobile apps and the frameworks upon which they are built frequently change. This rapid evolution leads to a confusing jumble of devices and applications utilizing differing features even within the same framework. For Android apps and devices, representing over 80% of the market share, mismatches between the version of the Android operating system installed on a device and the version of the app installed, can lead to several run-time crashes, providing a poor user experience.

This thesis presents GAINDroid, an analysis approach, backed with a classloader based program analyzer, …


The Library As Facilitator Of Public Access To Information: 21st Century Approach, Ozonuwe Opene Sunday Oos, Ohwofasa Faith Faith Off, Lateef Elizabeth Bukunola Leb Apr 2019

The Library As Facilitator Of Public Access To Information: 21st Century Approach, Ozonuwe Opene Sunday Oos, Ohwofasa Faith Faith Off, Lateef Elizabeth Bukunola Leb

Library Philosophy and Practice (e-journal)

This article describes the nature of 21st century, the new roles libraries and librarians must play to continue to facilitate public access to information in the face of 21st century where the information and communication technology products such as the web, internet, android mobile devices and social media network have changed the way we live, think, communicate, obtain and disseminate information (world 2.0).It emphasized how these products have made the world omni presence, omni information/knowledge, omin collaboration and omini access. The paper discussed the challenges21stcentaury librarians may encounter why applying the information and communication …


Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa Feb 2019

Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa

International Journal of Business and Technology

While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s safety …


Android Aplikacion: Shfrytëzimi I Baterisë Nga Aplikacionet Tjera, Shqipe Sejdiu Feb 2019

Android Aplikacion: Shfrytëzimi I Baterisë Nga Aplikacionet Tjera, Shqipe Sejdiu

Theses and Dissertations

Ky punim bazohet në njohjen e zhvillimit të sistemit operativ Android dhe në zhvillimin e një aplikacioni specifik. Tregohet se si gjatë kohës është zhvilluar sistemi operativ dhe poashtu si ka arritur t'i publikoj karakteristikat të cilat rezultuan të nevojshme për një shfrytëzues të këtij sistemi operativ, si ka arritur të jetë një ndër të parët në treg dhe se si është bërë kaq fleksibil dhe lehtë i përdorshëm. Në këtë punim tregohet se cilat ishin qëllimet e para të krijimit të Android Inc., tregohet se cili ishte misioni i tyre. Po ashtu tregohen se cilat ishin marrëveshjet më të …


Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz Jan 2019

Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz

Catholic University Journal of Law and Technology

No one is certain whether Artificial Intelligence (“AI”) will make the future a better place or make it look like an apocalyptic Hollywood blockbuster. An opinion that is emerging among experts and nation-state leaders is that the nation-states that lead in AI advancements and implementation will likely have a greater influence on and power over the world economic and national security stages. The goal of this book review is to encourage the reader to enter the conversation about the role AI will play in global society and American life because AI will influence the job market in the near future. …


An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain Jan 2019

An Empirical Study On Deterministic Collusive Attack Using Inter Component Communication In Android Applications, Tanzeer Hossain

Wayne State University Theses

Security threats using intent based inter component communication (ICC) channels in Android are under constant scrutiny of software engineering researchers. Though prior research provides empirical evidence on the existence of collusive communication channels in popular android apps, little is known about developers’willful involvement and motivation to exploit these channels.To shed light on this matter, in this paper we devised a novel methodology to deterministically identify developers’ involvement in establishing collusive inter app communication channels. We incorporate static analysis and relational database technology to discover sensitive collusive channels and domain knowledge of the Android SDK to build a model to identify …


Design And Implementation Of Applications Over Delay Tolerant Networks For Disaster And Battlefield Environment, Karthikeyan Sachidanandam Jan 2019

Design And Implementation Of Applications Over Delay Tolerant Networks For Disaster And Battlefield Environment, Karthikeyan Sachidanandam

Masters Theses

"In disaster/battlefield applications, there may not be any centralized network that provides a mechanism for different nodes to connect with each other to share important data. In such cases, we can take advantage of an opportunistic network involving a substantial number of mobile devices that can communicate with each other using Bluetooth and Google Nearby Connections API(it uses Bluetooth, Bluetooth Low Energy (BLE), and Wi-Fi hotspots) when they are close to each other. These devices referred to as nodes form a Delay Tolerant Network (DTN), also known as an opportunistic network. As suggested by its name, DTN can tolerate delays …


Building Recommendation Systems, Orion Davis Jan 2019

Building Recommendation Systems, Orion Davis

Williams Honors College, Honors Research Projects

Recommendation systems are pieces of software that suggest new items to a user. There are many moving parts to these systems including data, the actual recommendation model, processing data and finally displaying data. This project explores the role each part plays in the overall system and how to develop a recommendation system for beer from scratch. This project highlights the algorithm behind the recommendations and a user facing Android application.


Queue: A Mobile Application For Collaborative Music Playlists, Vlad Mirea Jan 2019

Queue: A Mobile Application For Collaborative Music Playlists, Vlad Mirea

Williams Honors College, Honors Research Projects

This paper focuses on the design and development of the mobile application “Queue”. Queue is an app for creating music playlists that anyone can add songs to while a host controls playback. The app connects to music streaming services such as Spotify to allow users access to their favorite songs while providing functionality not found in those services.