Academic literature on the topic 'Android device'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Android device.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Android device"

1

Rasyad, Muhammad Abdullah, Favian Dewanta, and Sri Astuti. "All-in-one computation vs computational-offloading approaches: a performance evaluation of object detection strategies on android mobile devices." JURNAL INFOTEL 13, no. 4 (2021): 216–22. http://dx.doi.org/10.20895/infotel.v13i4.700.

Full text
Abstract:
Object detection gives a computer ability to classify objects in an image or video. However, high specified devices are needed to get a good performance. To enable devices with low specifications performs better, one way is offloading the computation process from a device with a low specification to another device with better specifications. This paper investigates the performance of object detection strategies on all-in-one Android mobile phone computation versus Android mobile phone computation with computational offloading on Nvidia Jetson Nano. The experiment carries out the video surveillance from the Android mobile phone with two scenarios, all-in-one object detection computation in a single Android device and decoupled object detection computation between an Android device and an Nvidia Jetson Nano. Android applications send video input for object detection using RTSP/RTMP streaming protocol and received by Nvidia Jetson Nano which acts as an RTSP/RTMP server. Then, the output of object detection is sent back to the Android device for being displayed to the user. The results show that the android device Huawei Y7 Pro with an average FPS performance of 1.82 and an average computing speed of 552 ms significantly improves when working with the Nvidia Jetson Nano, the average FPS becomes ten and the average computing speed becomes 95 ms. It means decoupling object detection computation between an Android device and an Nvidia Jetson Nano using the system provided in this paper successfully improves the detection speed performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Amritesh Kumar, Arun Kumar Singh, and Pankaj P. Singh. "Security in Android." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 10 (2014): 3990–96. http://dx.doi.org/10.24297/ijct.v12i10.2983.

Full text
Abstract:
New technologies have always created new areas of concern for information security teams. Usually it provides time for the development of effective security controls. The rapid growth of the smartphone in market and the use of these devices for so many sensitive data have led to the emergence of security threat. A malicious user or malware on a device can create a number of risks for an organization, and so the fact that these devices are not necessarily connected does not translate to a lack of security risks. This paper will discuss why it is important to secure an Android device, what some of the potential vulnerabilities are, and security measures that can be introduced to provide a baseline of security of data on Google’s mobile OS
APA, Harvard, Vancouver, ISO, and other styles
3

Pratika, Made Toby Sathya, I. Nyoman Piarsa, and Anak Agung Ketut Agung Cahyawan Wiranatha. "Design and Build Wireless Relay with Electricity Monitoring Based on Internet of Things." Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) 10, no. 1 (2021): 34. http://dx.doi.org/10.24843/jim.2022.v10.i01.p04.

Full text
Abstract:
Electricity is a power source to run various electronic devices. Problem that often occurs is that users forget to turn off or turn on their electronic devices, then prepaid and postpaid electricity users cannot monitoring the electrical power usage of their electronic devices in realtime. The designed device to overcome these problems has a working principle like a switch, but there has relays and several sensors. Controlling electronic devices can be done by user using main switch in designed device, switch button and timer feature in Android application, then user can also monitoring the voltage, current and power in realtime on Android application. The results of several tests that have been done show that the designed device and Android applications that have been built can run well, but the current reading generated by the designed device are still not perfect, adjustments are needed so power calculation is better.
 Keywords : Android, Control, Electricity, IoT, Monitor
APA, Harvard, Vancouver, ISO, and other styles
4

Jagan, Mohan Rao Doddapaneni. "Android Devices Management through Middleware Application." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 5 (2023): 1–3. https://doi.org/10.5281/zenodo.14607828.

Full text
Abstract:
This paper discusses the role of middleware applications in managing over 700 Zebra devices used across fuel islands at Client. These devices, maintained and updated through Airwatch, facilitate key operational functions such as fuel dispensing, inventory tracking, VIN validation, and fuel ticket management. Additionally, middleware plays a pivotal role in device installation, upgrades, and reporting. The integration of middleware with Airwatch enables seamless management of devices across multiple locations, allowing for efficient device switching, user profile management, and location-specific reporting. The paper also outlines the challenges encountered in maintaining a fleet of devices, including ensuring system accuracy, device downtime, and user training, and how these were addressed to enhance operational efficiency. The discussion extends to the business value delivered through these technological enhancements, focusing on increased operational efficiency, reduced manual intervention, and cost savings.
APA, Harvard, Vancouver, ISO, and other styles
5

Jagadeesh, Duggirala. "Identifying Mobile Devices on Android Platform." International Journal of Leading Research Publication 2, no. 3 (2021): 1–6. https://doi.org/10.5281/zenodo.14982490.

Full text
Abstract:
The need for unique mobile device identification on the Android platform is paramount for many applications, including user authentication, device tracking, fraud prevention, analytics, and personalization. However, due to privacy concerns, security requirements, and platform restrictions, obtaining a reliable and persistent device identifier has become more complex over the years. This paper explores various methods available on Android devices to identify unique mobile devices, from traditional hardware-based identifiers like IMEI to modern software-based techniques such as Advertising IDs and Google Firebase Instance IDs. It examines each approach's strengths, limitations, and practical use cases, helping developers make informed choices while balancing privacy and functionality.
APA, Harvard, Vancouver, ISO, and other styles
6

Afifah, Nurul, and Deris Stiawan. "The Implementation of Deep Neural Networks Algorithm for Malware Classification." Computer Engineering and Applications Journal 8, no. 3 (2019): 189–202. http://dx.doi.org/10.18495/comengapp.v8i3.294.

Full text
Abstract:
Malware is very dangerous while attacked a device system. The device that can be attacked by malware is a Mobile Phone such an Android. Antivirus in the Android device is able to detect malware that has existed but antivirus has not been able to detect new malware that attacks an Android device. In this issue, malware detection techniques are needed that can grouping the files between malware or non-malware (benign) to improve the security system of Android devices. Deep Learning is the proposed method for solving problems in malware detection techniques. Deep Learning algorithm such as Deep Neural Network has succeeded in resolving the malware problem by producing an accuracy rate of 99.42%, precision level 99% and recall 99.4%.
APA, Harvard, Vancouver, ISO, and other styles
7

Kale, Prof Madhuri. "Mobile Tracking System Using SMTP Protocol." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 4006–10. http://dx.doi.org/10.22214/ijraset.2024.62532.

Full text
Abstract:
Abstract: The objective of this project is to enhance mobile security through a robust Android application capable of tracking, locking, and recovering lost or stolen mobile devices. Utilizing the capabilities of Android devices, the system offers real-time tracking, remote locking, device wiping, and geo fencing features. It supports Android OS and allows users to control their devices remotely via SMS commands or through a web-based dashboard using their account credentials. Users can track the location of their device, remotely lock it, and even manipulate the camera to capture images of the possessor. The rising incidence of mobile device theft, which often results in unauthorized access and personal data breaches, underscores the importance of this sophisticated Mobile Tracking System (MTS). This system addresses these security concerns by providing comprehensive functionalities that enhance user safety and device recovery.
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Hyungchan, Yeonghun Shin, Sungbum Kim, Wooyeon Jo, Minju Kim, and Taeshik Shon. "Digital Forensic Analysis to Improve User Privacy on Android." Sensors 22, no. 11 (2022): 3971. http://dx.doi.org/10.3390/s22113971.

Full text
Abstract:
The Android platform accounts for 85% of the global smartphone operating-system market share, and recently, it has also been installed on Internet-of-Things (IoT) devices such as wearable devices and vehicles. These Android-based devices store various personal information such as user IDs, addresses, and payment information and device usage data when providing convenient functions to users. Insufficient security for the management and deletion of data stored in the device can lead to various cyber security threats such as personal information leakage and identity theft. Therefore, research on the protection of personal information stored in the device is very important. However, there is a limitation that the current research for protection of personal information on the existing Android platform was only conducted on Android platform 6 or lower. In this paper, we analyze the deleted data remaining on the device and the possibility of recovery to improve user privacy for smartphones using Android platforms 9 and 10. The deleted data analysis is performed based on three data deletion scenarios: data deletion using the app’s own function, data deletion using the system app’s data and cache deletion function, and uninstallation of installed apps. It demonstrates the potential user privacy problems that can occur when using Android platforms 9 and 10 due to the leakage of recovered data. It also highlights the need for improving the security of personal user information by erasing the traces of deleted data that remain in the journal area and directory entry area of the filesystem used in Android platforms 9 and 10.
APA, Harvard, Vancouver, ISO, and other styles
9

He, Gaofeng, Bingfeng Xu, Lu Zhang, and Haiting Zhu. "On-Device Detection of Repackaged Android Malware via Traffic Clustering." Security and Communication Networks 2020 (May 31, 2020): 1–19. http://dx.doi.org/10.1155/2020/8630748.

Full text
Abstract:
Malware has become a significant problem on the Android platform. To defend against Android malware, researchers have proposed several on-device detection methods. Typically, these on-device detection methods are composed of two steps: (i) extracting the apps’ behavior features from the mobile devices and (ii) sending the extracted features to remote servers (such as a cloud platform) for analysis. By monitoring the behaviors of the apps that are running on mobile devices, available methods can detect suspicious applications (simply, apps) accurately. However, mobile devices are typically resource limited. The feature extraction and massive data transmission might consume substantial power and CPU resources; thus, the performance of mobile devices will be degraded. To address this issue, we propose a novel method for detecting Android malware by clustering apps’ traffic at the edge computing nodes. First, a new integrated architecture of the cloud, edge, and mobile devices for Android malware detection is presented. Then, for repackaged Android malware, the network traffic content and statistics are extracted at the edge as detection features. Finally, in the cloud, similarities between apps are calculated, and the similarity values are automatically clustered to separate the original apps and the malware. The experimental results demonstrate that the proposed method can detect repackaged Android malware with high precision and with a minimal impact on the performance of mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
10

Adeniji, Kehinde A., Nazmat T. Surajudeen-Bakinde, Olusegun O. Omitola, and Adedayo Ajibade. "Validation of android-based mobile application for retrieving network signal level." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 296–304. https://doi.org/10.11591/ijeecs.v21.i1.pp296-304.

Full text
Abstract:
In recent years, the evolvement of mobile devices which perform sophisticated functions have been on the rise. Mobile applications which solved engineering challenges are now available due to the high computational capabilities, large random access memory and storage location of the mobile devices. An Android application called signal detect, which measures network signal strength value from 2G-4G received on an android mobile device has been developed using android app development environment called Android studio. Validation becomes necessary because different readings were obtained on smartphones with different specifications. Two validation techniques were used to validate the data obtained. To know the efficiency of the application; a field strength meter was used to compare the readings received on the mobile device with the meter. It was observed that there is a time lag on the received values of the mobile device to the field strength meter. Therefore, a moving average technique was used to correlate the two data which increased the correlation coefficient to about 0.85.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Android device"

1

Arora, Sushant. "INDOOR SURVEILLANCE ON ANDROID DEVICE OVER WiFi." Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1375110881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bertier, Clément. "Quantification in Device-to-Device Networks : from Link Estimation to Graph Utility." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS250.

Full text
Abstract:
Les communications d'appareil à appareil (D2D) sont utiles dans plusieurs domaines, e.g. le déléstage mobile, car elles ne coûtent qu’une fraction du prix d’une communication cellulaire. Dans cette thèse, nous soutenons que la compréhension de l'utilité potentielle derrière les communications directes est la clé pour quantifier les réseaux de contact. Tout d'abord, nous considérons le problème de l'estimation de l'importance d'un nœud dans de grandes topologies dynamiques. Nous proposons une approche nouvelle pour estimer les centralités à partir d'une base de données préétablie, où l'estimation est basée sur les coordonnées géographiques du nœud au lieu de l'identifiant du nœud. Deuxièmement, nous quantifions la valeur des liens directs grâce à une campagne de mesure expérimentale via Android. Nous proposons un modèle pour estimer la limite supérieure du débit D2D en fonction de la distance entre les appareils. Troisièmement, nous étudions les différences entre la quantification traditionnelle d'un contact et notre modèle. Entre autres résultats, nous révélons que lorsque l'on considère un débit adaptatif en fonction de la distance entre deux appareils, l'échange de données longue distance représente plus de 50% du total des données échangées dans l'ensemble du réseau. Nous proposons un outil pour extraire le volume de données obtenues à partir de traces mobilité<br>Device-to-device (D2D) communications are valuable in several domains, such as data offloading and diffusion, as their cost is only a fraction of what regular cellular communication would have. In this thesis, we argue that understanding the potential utility behind direct communications is key to quantifying the realization of contact networks. We tackle related questions from two distinct, yet complementary contributions. Firstly, we consider the problem of estimating the importance of a node in large dynamic topologies. We propose a novel approach to estimate centralities based on a pre-established database, where the estimation is based on the geographical coordinates of the node instead of the identifier of the node. Doing so enables us to estimate the centrality of a node for a fraction of the computational cost. Secondly, we quantify the value of direct links through an experimental measurement campaign. Using an Android tool of our making, we derived a model to obtain an estimate of the upper-bound of D2D throughput based on the distance between the devices. Thirdly, we investigate the differences between the traditional quantification of a contact and the model extracted from our measurements campaigns. Among other results, we reveal that when considering an adaptive throughput according to the distance between two devices, the long-distance data-exchange makes up more than 50% of the total data exchanged in the entire network. We propose a tool to extract from mobility datasets the volume of data obtained, based on specific contact quantification strategies
APA, Harvard, Vancouver, ISO, and other styles
3

Andersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.

Full text
Abstract:
In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server.
APA, Harvard, Vancouver, ISO, and other styles
4

Antonacci, Antonello. "Porting monitor di rete per gestione interfacce su device android." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/6183/.

Full text
Abstract:
Il lavoro svolto in questa tesi consiste nell'effettuare il porting del Monitor di rete da Linux ad Android,facente parte di un sistema più complesso conosciuto come ABPS. Il ruolo del monitor è quello di configurare dinamicamente tutte le interfacce di rete disponibili sul dispositivo sul quale lavora,in modo da essere connessi sempre alla miglior rete conosciuta,ad esempio al miglior Access Point nel caso del interfaccia wireless.
APA, Harvard, Vancouver, ISO, and other styles
5

Baylan, Ömer. "Extending Lego Mindstorms NXT Functionality Using Internet-Connected Android Device." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-22660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Landi, Maicol. "Comunicazione device-to-device attraverso tecnologia WiFi-Direct: una valutazione sperimentale." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8967/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brunnerby, Erik. "Android Machine Interface : Integrating anAndroid Mobile Device into an Industrial Control System." Thesis, Linköpings universitet, Programvara och system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-126952.

Full text
Abstract:
The interaction between humans and industrial machinery have long been dominated by purpose-built hardware made to withstand the tough environment of the factory floor. Advances in hardware and software in the recent decade has made mobile and powerful devices common place, which has prompted this study to evaluate an Android tablet as an interface to control and monitor industrial machinery. This has been done through the implementation of an application used to control a braiding machine. Using this application as a proof of concept and a practical assessment, the study has concluded that an Android device is feasible to use to control and monitor industrial machinery. The study has also evaluated the network performance and security through testing, where it has compared the transport layer protocols TCP and UDP as well as the use of encryption for this implementation.
APA, Harvard, Vancouver, ISO, and other styles
8

Karhánek, Martin. "Identifikace obličeje na platformě Android." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237046.

Full text
Abstract:
This work describes ways to use a person identification based on faces on mobile devices with Android platform. A reader is introduced into a structure of this system and a way to create applications for it. Besides, there are also methods usable to the face identification. Some of these methods (used in an implementation) are described in more detail. This work also contains a description of model AAM (Active Appearance Model) for implementing in mobile devices and evaluation of used algorithms results.
APA, Harvard, Vancouver, ISO, and other styles
9

Sghedoni, Andrea. "Progettazione ed implementazione di un sistema Smart Parking basato su comunicazione Device-To-Device." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/12909/.

Full text
Abstract:
I sistemi di Smart Parking si preoccupano di favorire l'attività di parcheggio nelle grandi città. L'obiettivo di questa tesi riguarda l'implementazione di un'applicazione mobile in grado di fornire all'utente la probabilità di trovare parcheggio in determinate zone della città. La propagazione delle informazioni tra gli utenti avviene in maniera decentralizzata, tramite il paradigma Device-To-Device.
APA, Harvard, Vancouver, ISO, and other styles
10

Allesandro, Brittany. "Creating, Writing, and Reading NETCDF Files on a Mobile Device." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/honors_theses/6.

Full text
Abstract:
The purpose of this research was to master several unfamiliar concepts and bring them together in one cohesive project. DroidCDF is an application for the Android operating system to create, write data to, and read data from netCDF format files. DroidCDF uses Unidata’s NetCDF Java Library and can write files in netCDF-3 format but read from any netCDF format files. As mobile devices become more powerful and commonplace, DroidCDF provides a convenient tool for researchers. An incremental methodology was applied; the application was built from a rough workflow to eventually a robust and fully functional program. The produced files are fully portable and can be used as the input for other applications. The application has been tested with several large netCDF files with varying conventions and has handled each one remarkably well. Upon submission of this thesis, DroidCDF will be released onto the open market.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Android device"

1

Moreb, Mohammed. Practical Forensic Analysis of Artifacts on iOS and Android Devices. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8026-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sheusi, James C. Programming business applications for the Android® tablet. Course Technology, Cengage Learning, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rohit, Tamma, and Mahalik Heather, eds. Practical mobile forensics: Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide. Packt Pub., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Developing Android on Android: Automate Your Device with Scripts and Tasks. Pragmatic Bookshelf, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Android for beginners: All you need to get started with your Android device. Imagine Publishing Ltd, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bolton, Mason. How to Build a Stable Android Device Manager for Android TV Boxes: Build an Android Manager to CONTROL Your Android TV Box. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Westlake, Hannah. Android Tips, Tricks, Apps and Hacks: The Independent Guide to Mastering Your Android Device. Unknown Publisher, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Android for Beginners (All you need to get started with your Android device, volume 1). imagine publishing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hacking Android: Ethical Hacking,Android Hacker, Phone Hacking,Learn All about Android to Modify and Protect Your Device Against Security Threats. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Persad, Floy. Productive Android Apps : How to Get the Most Out of Your Android Device: Useful Tips and Tricks. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Android device"

1

Nolan, Godfrey, Onur Cinar, and David Truxall. "Device Testing." In Android Best Practices. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5858-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Komatineni, Satya, and Dave MacLean. "JSON for On-Device Persistence." In Expert Android. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-4951-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Smith, Dave, and Jeff Friesen. "Interacting with Device Hardware and Media." In Android Recipes. Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4615-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Dave. "Interacting with Device Hardware and Media." In Android Recipes. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0475-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Smith, Dave, and Jeff Friesen. "Interacting with Device Hardware and Media." In Android Recipes. Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3414-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Dave, and Jeff Friesen. "Interacting with Device Hardware and Media." In Android Recipes. Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6323-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Dave, and Erik Hellman. "Interacting with Device Hardware and Media." In Android Recipes. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2259-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gunasekera, Sheran. "Rooting Your Android Device." In Android Apps Security. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Easttom, Chuck. "Android Forensics." In An In-Depth Guide to Mobile Device Forensics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003118718-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Allen, Grant. "Exploring Device Capabilities with Calls." In Android for Absolute Beginners. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6646-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Android device"

1

Bagawan, Sohail, and Nagaraja G S. "Develop an On - Device LLM Android Application." In 2024 8th International Conference on Computational System and Information Technology for Sustainable Solutions (CSITSS). IEEE, 2024. https://doi.org/10.1109/csitss64042.2024.10816785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Junfeng, Kevin Li, Yifei Chen, Lili Wei, and Yepang Liu. "Demystifying Device-Specific Compatibility Issues in Android Apps." In 2024 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2024. https://doi.org/10.1109/icsme58944.2024.00054.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dastrup, Carston, and Sayeed Sajal. "Using Android to Showcase Arduino as a Powerful IOT Device." In 2025 Intermountain Engineering, Technology and Computing (IETC). IEEE, 2025. https://doi.org/10.1109/ietc64455.2025.11039376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mitzlaff, Paul, Robert Niznik, Redwan Alqasemi, and Rajiv Dubey. "Universal Android-Based Kit for Wireless Control of Wheelchairs." In ASME 2014 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/imece2014-39425.

Full text
Abstract:
The use of apps on hand-held devices has the potential to offer advancements in controlling many devices with an intuitive user interface, including power wheelchair control. Many powered wheelchair users require special adaptations to their control interface in order to drive the chair. This paper presents the development and testing of an Android based control system for a powered wheelchair. The control system utilizes the Android device’s sensors to control the wheelchair. The device can be attached to various parts of the user’s body which the user can move to control the wheelchair. The accelerometers in the device are used to drive the chair using Bluetooth technology connected to the wheelchair’s control system. Subject testing was performed with the user holding the Android device in their hand while they performed a variety of structured tasks. These series of tasks were duplicated while the Android device was attached to their hat and again when strapped to the upper left arm. The results from the collected data on specific metrics were compared against similar data when the wheelchair is controlled using a standard wheelchair joystick.
APA, Harvard, Vancouver, ISO, and other styles
5

Pepić, Selver, Marija Mojsilović, and Muzafer SaračevićMuzafer Saračević. "Android game development." In 9th International Scientific Conference Technics and Informatics in Education. University of Kragujevac, Faculty of Technical Sciences Čačak, 2022. http://dx.doi.org/10.46793/tie22.088p.

Full text
Abstract:
Mobile devices that are today at the global level with the largest usage rates are precisely those devices that are based on the Android OS platform. The work was based on the description of the created project, that is, the android game. Android games are the areas that are most represented in the IT development world, that is, the world of the mobile development application. Here, the focus is on that part of the application software, which is an integral part of the entire android package. The android system itself provides the opportunity as an open platform programming application solutions and install them on a mobile device. Through the work, its content and code in the form of scripts will be explained.
APA, Harvard, Vancouver, ISO, and other styles
6

Siddiq, Fahmi, Surya Michrandi Nasution, and Fairuz Azmi. "Prototype of Kleptocharger for Android device." In 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC). IEEE, 2016. http://dx.doi.org/10.1109/iccerec.2016.7814957.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Konečnik, Jan, and Vojko Matko. "Remote Monitoring Device Using Android Application." In 36. mednarodna konferenca o razvoju organizacijskih znanosti, Portorož, Slovenija / 36th International Conference on Organizational Science Development, Portorož, Slovenia. Univerzitetna založba Univerze v Mariboru / University of Maribor Press, 2017. http://dx.doi.org/10.18690/978-961-286-020-2.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shruthi, K., and P. S. Chinmayi. "Android Device or a Privacy Compromise?" In 2019 International Carnahan Conference on Security Technology (ICCST). IEEE, 2019. http://dx.doi.org/10.1109/ccst.2019.8888411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brucal, S. G. E., G. K. D. Clamor, L. A. O. Pasiliao, J. P. F. Soriano, and L. P. M. Varilla. "Portable electrocardiogram device using Android smartphone." In 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). IEEE, 2016. http://dx.doi.org/10.1109/embc.2016.7590751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vasilaras, Alexandros, Donatos Dosis, Michael Kotsis, and Panagiotis Rizomiliotis. "Android Device Incident Response: Viber Analysis." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850300.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Android device"

1

Yu, Ken F. Rooting an Android Device. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ada622506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jovel, Felipe, David Bruno, David Doria, Jonathan Fletcher, and Tamim Sookoor. Mobile Ad-Hoc Networking on Android Devices. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada598838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ward, Andrew, Anthony Falls, and Craig Rutland. Development of smartphone-based semi-prepared runway operations (SPRO) models and methods. Engineer Research and Development Center (U.S.), 2021. http://dx.doi.org/10.21079/11681/42500.

Full text
Abstract:
The U.S. Army Engineer Research and Development Center (ERDC) has developed a method for predicting surface friction response by use of ground vehicles equipped with deceleration-based measurement devices. Specifically, the ERDC has developed models and measurement methods between the Findlay Irvine Mk2 GripTester and a variety of deceleration measurement devices: Bowmonk AFM2 Mk3, Xsens MTi-G-710, two Android smartphones, and two iOS smartphones. These models show positive correlation between ground vehicle deceleration and fixed-slip surface continuous surface friction measurement. This effort extends prior work conducted by the U.S. Army ERDC in developing highly correlative models between the Findlay Irvine Mk2 GripTester and actual C-17 braking deceleration, measured via the runway condition rating (RCR) system. The models and measurement methods detailed here are of considerable use to semi-prepared airfield managers around the world needing to measure safe landing conditions following inclement weather. This work provides the tools necessary for airfield managers to quantify safe landing conditions for C-17 aircraft by using easily obtainable equipment and simple test standards.
APA, Harvard, Vancouver, ISO, and other styles
4

Kiv, Arnold E., Vladyslav V. Bilous, Dmytro M. Bodnenko, Dmytro V. Horbatovskyi, Oksana S. Lytvyn, and Volodymyr V. Proshkin. The development and use of mobile app AR Physics in physics teaching at the university. [б. в.], 2021. http://dx.doi.org/10.31812/123456789/4629.

Full text
Abstract:
This paper outlines the importance of using Augmented Reality (AR) in physics education at the university as a valuable tool for visualization and increasing the attention and motivation of students to study, solving educational problems related to future professional activities, improving the interaction of teachers and students. Provided an analysis of the types of AR technology and software for developing AR apps. The sequences of actions for developing the mobile application AR Physics in the study of topics: “Direct electronic current”, “Fundamentals of the theory of electronic circuits”. The software tools for mobile application development (Android Studio, SDK, NDK, Google Sceneform, 3Ds MAX, Core Animation, Asset Media Recorder, Ashampoo Music Studio, Google Translate Plugin) are described. The bank of 3D models of elements of electrical circuits (sources of current, consumers, measuring devices, conductors) is created. Because of the students’ and teachers’ surveys, the advantages and disadvantages of using AR in the teaching process are discussed. Mann-Whitney U-test proved the effectiveness of the use of AR for laboratory works in physics by students majoring in “Mathematics”, “Computer Science”, and “Cybersecurity”.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!