To see the other types of publications on this topic, follow the link: Android device.

Journal articles on the topic 'Android device'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Android device.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rasyad, Muhammad Abdullah, Favian Dewanta, and Sri Astuti. "All-in-one computation vs computational-offloading approaches: a performance evaluation of object detection strategies on android mobile devices." JURNAL INFOTEL 13, no. 4 (2021): 216–22. http://dx.doi.org/10.20895/infotel.v13i4.700.

Full text
Abstract:
Object detection gives a computer ability to classify objects in an image or video. However, high specified devices are needed to get a good performance. To enable devices with low specifications performs better, one way is offloading the computation process from a device with a low specification to another device with better specifications. This paper investigates the performance of object detection strategies on all-in-one Android mobile phone computation versus Android mobile phone computation with computational offloading on Nvidia Jetson Nano. The experiment carries out the video surveill
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Amritesh Kumar, Arun Kumar Singh, and Pankaj P. Singh. "Security in Android." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 10 (2014): 3990–96. http://dx.doi.org/10.24297/ijct.v12i10.2983.

Full text
Abstract:
New technologies have always created new areas of concern for information security teams. Usually it provides time for the development of effective security controls. The rapid growth of the smartphone in market and the use of these devices for so many sensitive data have led to the emergence of security threat. A malicious user or malware on a device can create a number of risks for an organization, and so the fact that these devices are not necessarily connected does not translate to a lack of security risks. This paper will discuss why it is important to secure an Android device, what some
APA, Harvard, Vancouver, ISO, and other styles
3

Pratika, Made Toby Sathya, I. Nyoman Piarsa, and Anak Agung Ketut Agung Cahyawan Wiranatha. "Design and Build Wireless Relay with Electricity Monitoring Based on Internet of Things." Jurnal Ilmiah Merpati (Menara Penelitian Akademika Teknologi Informasi) 10, no. 1 (2021): 34. http://dx.doi.org/10.24843/jim.2022.v10.i01.p04.

Full text
Abstract:
Electricity is a power source to run various electronic devices. Problem that often occurs is that users forget to turn off or turn on their electronic devices, then prepaid and postpaid electricity users cannot monitoring the electrical power usage of their electronic devices in realtime. The designed device to overcome these problems has a working principle like a switch, but there has relays and several sensors. Controlling electronic devices can be done by user using main switch in designed device, switch button and timer feature in Android application, then user can also monitoring the vo
APA, Harvard, Vancouver, ISO, and other styles
4

Jagan, Mohan Rao Doddapaneni. "Android Devices Management through Middleware Application." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 5 (2023): 1–3. https://doi.org/10.5281/zenodo.14607828.

Full text
Abstract:
This paper discusses the role of middleware applications in managing over 700 Zebra devices used across fuel islands at Client. These devices, maintained and updated through Airwatch, facilitate key operational functions such as fuel dispensing, inventory tracking, VIN validation, and fuel ticket management. Additionally, middleware plays a pivotal role in device installation, upgrades, and reporting. The integration of middleware with Airwatch enables seamless management of devices across multiple locations, allowing for efficient device switching, user profile management, and location-specif
APA, Harvard, Vancouver, ISO, and other styles
5

Jagadeesh, Duggirala. "Identifying Mobile Devices on Android Platform." International Journal of Leading Research Publication 2, no. 3 (2021): 1–6. https://doi.org/10.5281/zenodo.14982490.

Full text
Abstract:
The need for unique mobile device identification on the Android platform is paramount for many applications, including user authentication, device tracking, fraud prevention, analytics, and personalization. However, due to privacy concerns, security requirements, and platform restrictions, obtaining a reliable and persistent device identifier has become more complex over the years. This paper explores various methods available on Android devices to identify unique mobile devices, from traditional hardware-based identifiers like IMEI to modern software-based techniques such as Advertising IDs a
APA, Harvard, Vancouver, ISO, and other styles
6

Afifah, Nurul, and Deris Stiawan. "The Implementation of Deep Neural Networks Algorithm for Malware Classification." Computer Engineering and Applications Journal 8, no. 3 (2019): 189–202. http://dx.doi.org/10.18495/comengapp.v8i3.294.

Full text
Abstract:
Malware is very dangerous while attacked a device system. The device that can be attacked by malware is a Mobile Phone such an Android. Antivirus in the Android device is able to detect malware that has existed but antivirus has not been able to detect new malware that attacks an Android device. In this issue, malware detection techniques are needed that can grouping the files between malware or non-malware (benign) to improve the security system of Android devices. Deep Learning is the proposed method for solving problems in malware detection techniques. Deep Learning algorithm such as Deep N
APA, Harvard, Vancouver, ISO, and other styles
7

Kale, Prof Madhuri. "Mobile Tracking System Using SMTP Protocol." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 4006–10. http://dx.doi.org/10.22214/ijraset.2024.62532.

Full text
Abstract:
Abstract: The objective of this project is to enhance mobile security through a robust Android application capable of tracking, locking, and recovering lost or stolen mobile devices. Utilizing the capabilities of Android devices, the system offers real-time tracking, remote locking, device wiping, and geo fencing features. It supports Android OS and allows users to control their devices remotely via SMS commands or through a web-based dashboard using their account credentials. Users can track the location of their device, remotely lock it, and even manipulate the camera to capture images of th
APA, Harvard, Vancouver, ISO, and other styles
8

Kim, Hyungchan, Yeonghun Shin, Sungbum Kim, Wooyeon Jo, Minju Kim, and Taeshik Shon. "Digital Forensic Analysis to Improve User Privacy on Android." Sensors 22, no. 11 (2022): 3971. http://dx.doi.org/10.3390/s22113971.

Full text
Abstract:
The Android platform accounts for 85% of the global smartphone operating-system market share, and recently, it has also been installed on Internet-of-Things (IoT) devices such as wearable devices and vehicles. These Android-based devices store various personal information such as user IDs, addresses, and payment information and device usage data when providing convenient functions to users. Insufficient security for the management and deletion of data stored in the device can lead to various cyber security threats such as personal information leakage and identity theft. Therefore, research on
APA, Harvard, Vancouver, ISO, and other styles
9

He, Gaofeng, Bingfeng Xu, Lu Zhang, and Haiting Zhu. "On-Device Detection of Repackaged Android Malware via Traffic Clustering." Security and Communication Networks 2020 (May 31, 2020): 1–19. http://dx.doi.org/10.1155/2020/8630748.

Full text
Abstract:
Malware has become a significant problem on the Android platform. To defend against Android malware, researchers have proposed several on-device detection methods. Typically, these on-device detection methods are composed of two steps: (i) extracting the apps’ behavior features from the mobile devices and (ii) sending the extracted features to remote servers (such as a cloud platform) for analysis. By monitoring the behaviors of the apps that are running on mobile devices, available methods can detect suspicious applications (simply, apps) accurately. However, mobile devices are typically reso
APA, Harvard, Vancouver, ISO, and other styles
10

Adeniji, Kehinde A., Nazmat T. Surajudeen-Bakinde, Olusegun O. Omitola, and Adedayo Ajibade. "Validation of android-based mobile application for retrieving network signal level." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 296–304. https://doi.org/10.11591/ijeecs.v21.i1.pp296-304.

Full text
Abstract:
In recent years, the evolvement of mobile devices which perform sophisticated functions have been on the rise. Mobile applications which solved engineering challenges are now available due to the high computational capabilities, large random access memory and storage location of the mobile devices. An Android application called signal detect, which measures network signal strength value from 2G-4G received on an android mobile device has been developed using android app development environment called Android studio. Validation becomes necessary because different readings were obtained on smart
APA, Harvard, Vancouver, ISO, and other styles
11

Srivastava, Himanshu, and Shashikala Tapaswi. "Logical acquisition and analysis of data from android mobile devices." Information & Computer Security 23, no. 5 (2015): 450–75. http://dx.doi.org/10.1108/ics-02-2014-0013.

Full text
Abstract:
Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information l
APA, Harvard, Vancouver, ISO, and other styles
12

Nargude, Miss Nikita, Miss Srushti Shambhushetti, Miss Shreya Kagale, Miss Prajakta Parit, and Prof Mahesh J. Kanase. "Scan For Notes." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1166–70. http://dx.doi.org/10.22214/ijraset.2022.42357.

Full text
Abstract:
Abstract: QR code (abbreviated from Quick Response Code ) is the trademark for a type of matrix bar code first designed for the automotive industry. Today the QR code is widely used in all industries. In our paper we present an implementation of an Android device using libraries is and combined algorithms in order to be able to scan any QR code fast accurate and easy. The devices that we targeted for our application are the Google Glasses and an Android operated phone. The implementation for each of the devices was slight different, but the core algorithms and libraries were the same. Keywords
APA, Harvard, Vancouver, ISO, and other styles
13

Muttaqin, Hidayatul, Ita Arfyanti, and Wahyuni. "Android Based Heart Rate Detection Tools with Arduino Nano." TEPIAN 2, no. 1 (2021): 1–6. http://dx.doi.org/10.51967/tepian.v2i1.337.

Full text
Abstract:
Android-based Heart Rate Detector Using an Android-Based Fingerprint Using Arduino Nano at Midwife Dwi Inggrini's Maternity Clinic with the hope of helping and simplifying the medical team in checking the heart rate of pregnant women without having to carry devices that are not portable, improving services and errors due to blackouts PLN electricity. The software development method used is the prototype method which includes data collection, design, prototyping, the testing phase by conducting Black Box and White Box testing. To access this tool the user must first connect the bluetooth androi
APA, Harvard, Vancouver, ISO, and other styles
14

Dyade, Prof A. M., Mr Atharv Davale, Mr Rushikesh Waghule, Mr Digvijay Shinde, Mr Amrut Virdhe, and Mr Abhijeet Surshetwar. "PC Controller using Android Device." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3525–28. http://dx.doi.org/10.22214/ijraset.2024.60668.

Full text
Abstract:
Abstract: From some years there has been a significant evolution in mobile or smartphone computing and communication devices like mobile phones, media players and many more. This project e is proposed to be able to perform most of the actions a normal computer keyboard and mouse can accomplish. Wireless presentation controller ensures good freedom of movement. but, most of such devices do not allow user full operation on the computer, like running the program, moving or closing an application window, etc This project proposed the design and implementation of converting smartphones into compute
APA, Harvard, Vancouver, ISO, and other styles
15

A. Adeniji, Kehinde, Nazmat T. Surajudeen-Bakinde, Olusegun O. Omitola, and Adedayo Ajibade. "Validation of android-based mobile application for retrieving network signal level." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 1 (2021): 296. http://dx.doi.org/10.11591/ijeecs.v21.i1.pp296-304.

Full text
Abstract:
<p><span>In recent years, the evolvement of mobile devices which perform sophisticated functions have been on the rise. Mobile applications which solved engineering challenges are now available due to the high computational capabilities, large random access memory and storage location of the mobile devices. An Android application called signal detect, which measures network signal strength value from 2G-4G received on an android mobile device has been developed using android app development environment called Android studio. Validation becomes necessary because different readings w
APA, Harvard, Vancouver, ISO, and other styles
16

Varga, Jozef, and Marek Sukop. "Simple Algorithm for Patterns Recognition." Applied Mechanics and Materials 844 (July 2016): 75–78. http://dx.doi.org/10.4028/www.scientific.net/amm.844.75.

Full text
Abstract:
This article describes algorithm for patterns recognition of application for dual arm robot, android device and camera system. As first was create android application for getting information from computer via Bluetooth. Computer is using for image processing from external camera and then send image of dice to android devices and show on screen score of dice.
APA, Harvard, Vancouver, ISO, and other styles
17

Gheorghe, A. C., and M. I. Matei. "Dc Motor Control System Through Android Application Using Arduino Nano." Scientific Bulletin of Electrical Engineering Faculty 21, no. 1 (2021): 31–34. http://dx.doi.org/10.2478/sbeef-2021-0007.

Full text
Abstract:
Abstract The study aims for the development of a control system for D.C motors through an application made for Android mobile devices. The D.C motors are represented by a robot model car and the control application communicates with the system via Bluetooth technology. The Android mobile device user must install an application on his mobile device, then, the user must turn on the Bluetooth communication on the mobile device. The user can use various commands to control the robot model car such as front, back, stop, left, right. These commands are sent from the Android mobile device to the Blue
APA, Harvard, Vancouver, ISO, and other styles
18

Pratama, Rizki Priya. "Remote PC Wake-On Design Manufacture in Mujahidin Mosque at Candi Mendut." MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering 3, no. 3 (2021): 113–26. http://dx.doi.org/10.46574/motivection.v3i3.97.

Full text
Abstract:
There are several methods to turn on a PC from other places, one of which is WOL (wake-on lan). This method requires modem configuration to enable WOL and port forwarding features. However, if it is not possible, there is one method offered by the researcher. The method is creating a system that functions to turn on the PC via the MQTT protocol. This system consists of electronic devices and android applications. Both can be connected to the internet network. The function of this device is to connect the PWRBTN and GND pins for 0.3 seconds. While the android application "Remote wake-on PC Masj
APA, Harvard, Vancouver, ISO, and other styles
19

Tung, Shu Chu, Wu Jeng Li, Kuang Chyi Lee, and Jui Chang Lin. "Environment Supervisory Control of Computer Room Based on Android Device." Applied Mechanics and Materials 418 (September 2013): 124–27. http://dx.doi.org/10.4028/www.scientific.net/amm.418.124.

Full text
Abstract:
This research designs environment supervisory control system of computer room which consists of multiple Android environment controllers and one supervisory control server. An Android environment controller is a controller based on Android device. The controller contains an Android device, a Wi-Fi wireless access point, a switch hut (or NAT) and three data acquisition modules. The Android device enters TCP/IP LAN through the Wi-Fi access point. The data acquisition modules with TCP/IP interface are plugged into the LAN, and read/written by the Android device with Modbus TCP/IP protocol. Contro
APA, Harvard, Vancouver, ISO, and other styles
20

Sunita, M. Kumbhar Prof. Z.M Shaikh. "GROUP POLICY BASED AUTHENTICATION ON INCOMING CALLS FOR ANDROID SMARTPHONES." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 7 (2016): 205–9. https://doi.org/10.5281/zenodo.56946.

Full text
Abstract:
The numbers of Smartphone users increasing day by day. Hence, there is need to propose advanced Group Policy based Authentication for incoming calls for Android phone. Android platform provides a variety of functions that support the programming of face recognition, as in image processing. Group policy based authentication scheme increases the security which restricts the access of incoming call form un-authorized user. To solve problems, related to face recognition should be applied in the practical and flexible devices like android device. In the display interface, android application is ver
APA, Harvard, Vancouver, ISO, and other styles
21

Isachenko, Olha V. "Logical methods of forensic expertise of Android devices." Informatics. Culture. Technology 1, no. 1 (2024): 233–38. http://dx.doi.org/10.15276/ict.01.2024.35.

Full text
Abstract:
Mobile devices are now so ubiquitous that they have revolutionized the way we do most of our activities. As a result, the mobile device is now a huge repository of confidential and personal information about its owner. This has led to the development of mobile forensics, which focuses on the recovery and investigation of mobile data. The purpose of the diagnostic process is to retrieve and recover any information from a mobile device without changing the data on the device. Over the years, digital forensics has expanded with the rapid growth of mobile devices. There are different branches of d
APA, Harvard, Vancouver, ISO, and other styles
22

Böttger, Leon, Alexander Matern, Dennis Arndt, and Matthias Hollick. "Okay Google, Where’s My Tracker? Security, Privacy, and Performance Evaluation of Google's Find My Device Network." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 605–19. https://doi.org/10.56553/popets-2025-0147.

Full text
Abstract:
In April 2024, Google launched the Find My Device Network (FMDN), an Offline-Finding Network (OFN) that allows lost Bluetooth devices, such as trackers or headphones, to be located using billions of Android devices as finders. Similarly to Apple's Find My network, it is activated by default on all modern Android devices. Google promises end-to-end encryption for all location updates and claims to protect the privacy of finder devices as well as owners of lost devices and trackers. Although Android is open-source, FMDN is part of Google Play Services and is only partially publicly specified. We
APA, Harvard, Vancouver, ISO, and other styles
23

R., Atul. "Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device." International Journal on Recent and Innovation Trends in Computing and Communication 3, no. 1 (2015): 175–80. http://dx.doi.org/10.17762/ijritcc2321-8169.150137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Soujanya, Reddy Annapareddy. "Optimizing Android Device Testing with Automation Frameworks." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 10, no. 4 (2024): 1–7. https://doi.org/10.5281/zenodo.14540907.

Full text
Abstract:
The exponential growth of mobile applications has introduced new challenges in ensuring quality across the diverse ecosystem of Android devices. The fragmentation of hardware and software configurations demands robust and efficient testing methodologies. This paper investigates the optimization of Android device testing through the use of an advanced automation framework called Appium. By leveraging these frameworks, testing processes can achieve enhanced efficiency, scalability, and reliability. A case study is presented to illustrate the practical application of automation in testing an e-co
APA, Harvard, Vancouver, ISO, and other styles
25

Jamadade,, Shriyanka, Rajashekar J. S., and Shilpa Saraguru. "Porting Android Oreo onto Imx6 Processor based Media Accelerated Graphics Innovation Kit with driving an SD card." International Journal of Advance Research and Innovation 7, no. 2 (2019): 86–91. http://dx.doi.org/10.51976/ijari.721914.

Full text
Abstract:
Nowadays for the embedded devices use of android operating system has become current emerging trend in the market. The most widely used embedded device in industries which built with android OS is mobile phone. The advantage of using android OS compared to other OS is that, it is an open source and responds quickly to functional changes. It is becoming default OS for devices which requires the multimedia support. Porting of android onto ARM processor based platform is very necessary in order to bring the effectiveness of ARM and capability of android onto a product. The proposed work is to por
APA, Harvard, Vancouver, ISO, and other styles
26

Siddiqui, Ahmad Talha, Shoeb Ahad Siddiqui, and Mohammad Ibrahim. "AFDroid: Anti-Forensics Device To Protect Android System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 9, no. 3 (2013): 1134–38. http://dx.doi.org/10.24297/ijct.v9i3.3339.

Full text
Abstract:
Mobile devices are among the most common new technologies of the year, gaining even more spread over and success in the day-to-day life of wide range of people. Unfortunately, while the number of mobile devices are used in crime activities is spreading and growing all over the world, the capability to perform the forensics analysis of such devices is limited both by technological and methodological problems. In this paper, we focus on anti forensics techniques applied to mobile device. Furthermore we observe the effectiveness of techniques.Â
APA, Harvard, Vancouver, ISO, and other styles
27

Nilay, Ganatra, and Patel Rachana. "GOOGLE CLOUD MESSAGING (GCM): A LIGHT WEIGHT COMMUNICATION MECHANISM BETWEEN CLIENT AND SERVER ON ANDROID PLATFORM." International Journal of Information Sciences and Techniques (IJIST) 6, no. 2 (2016): 69–79. https://doi.org/10.5121/ijist.2016.6208.

Full text
Abstract:
In This Paper, We Examine the push Messaging Service Google Cloud Messaging (Gcm) for Android Platform. Android Platform Traditionally Keep Data Synchronization Between Android Device And Server-Side Using Method of Pulling. Each Android Device has to Poll Server for Updated Data, Which Leads to Unnecessary Network Traffic and Wastage of Mobile Phone Battery. In Order to Overcome This Weakness, Data Pushing Service, Gcm Was Introduced. Push, Describes a Style of Internet-Based Communication Where the Request for a Given Transaction Is Initiated By The Publisher or Central Server. Push Messagin
APA, Harvard, Vancouver, ISO, and other styles
28

Nilay, Ganatra, and Patel Rachana. "GOOGLE CLOUD MESSAGING (GCM): A LIGHT WEIGHT COMMUNICATION MECHANISM BETWEEN CLIENT AND SERVER ON ANDROID PLATFORM." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (2016): 69–79. https://doi.org/10.5281/zenodo.7475900.

Full text
Abstract:
In This Paper, We Examine the push Messaging Service Google Cloud Messaging (Gcm) for Android Platform. Android Platform Traditionally Keep Data Synchronization Between Android Device And Server-Side Using Method of Pulling. Each Android Device has to Poll Server for Updated Data, Which Leads to Unnecessary Network Traffic and Wastage of Mobile Phone Battery. In Order to Overcome This Weakness, Data Pushing Service, Gcm Was Introduced. Push, Describes a Style of Internet-Based Communication Where the Request for a Given Transaction Is Initiated By The Publisher or Central Server. Push Messagin
APA, Harvard, Vancouver, ISO, and other styles
29

Yeom, Cheolmin, and Yoojae Won. "Vulnerability Evaluation Method through Correlation Analysis of Android Applications." Sustainability 11, no. 23 (2019): 6637. http://dx.doi.org/10.3390/su11236637.

Full text
Abstract:
Due to people in companies use mobile devices to access corporate data, attackers targeting corporate data use vulnerabilities in mobile devices. Most vulnerabilities in applications are caused by the carelessness of developers, and confused deputy attacks and data leak attacks using inter-application vulnerabilities are possible. These vulnerabilities are difficult to find through the single-application diagnostic tool that is currently being studied. This paper proposes a process to automate the decompilation of all the applications on a user’s mobile device and a mechanism to find inter-app
APA, Harvard, Vancouver, ISO, and other styles
30

Rahman, Fadil, Myson Myson, and Fadli Eka Yandra. "Rancang Bangun Buka Tutup Pintu Otomatis dengan Menggunakan Arduno UNO / MEGA 2560." Journal of Electrical Power Control and Automation (JEPCA) 2, no. 1 (2020): 6. http://dx.doi.org/10.33087/jepca.v2i1.23.

Full text
Abstract:
The Arduino Board has been widely used as a prototyping device for both educational, research and commercial purposes. The ability of Arduino boards to be connected with electronic devices or gadgets such as Android operating system devices is getting more attention among researchers. By utilizing the various capabilities possessed by most Android operating system devices on the market today, the Arduino board will certainly have extraordinary intelligence. Some of the ways that Android devices can communicate with Arduino are via a Bluetooth shield, Wi-Fi shield, and also by serial communicat
APA, Harvard, Vancouver, ISO, and other styles
31

Patel, Aayush. "Android Function Generator." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (2021): 2170–73. http://dx.doi.org/10.22214/ijraset.2021.39585.

Full text
Abstract:
Abstract: The paper focuses on an application that can be developed on android, Android is a multipurpose operating system based on Linux for mobile devices such as smartphones and tablet computers, it contains several versions such as donot, ice-cream sandwich, KitKat, pie, etc. Function generator is a device used to generate a wide range of standardized electrical pulses such as sine wave, square wave and sawtooth wave whose frequency ranges from 0.1Hz to 11,000 Hz .In this paper we aim to review how this function generator can be developed using an android mobile application. The mobile pho
APA, Harvard, Vancouver, ISO, and other styles
32

Amit, Gupta, and Balabhadrapatruni Chandrakanth. "Strategic Implementation of an In-House Device Lab for Comprehensive Android Application Testing." Journal of Scientific and Engineering Research 8, no. 6 (2021): 162–71. https://doi.org/10.5281/zenodo.12792641.

Full text
Abstract:
The rapid proliferation of Android devices necessitates comprehensive testing to ensure application compatibility and performance. Given the diversity of hardware configurations, screen sizes, and operating system versions, the challenge of ensuring seamless user experiences across all devices has become increasingly complex. This paper explores the strategic implementation of an in-house device lab for Android application testing, providing detailed insights into planning, hardware and software requirements, setup, and maintenance. The scope of this study encompasses a thorough comparative an
APA, Harvard, Vancouver, ISO, and other styles
33

Novelan, Muhammad Syahputra. "Perancangan Alat Simulasi Sistem Kendali Lampu Rumah Menggunakan Aplikasi Android." ALGORITMA : JURNAL ILMU KOMPUTER DAN INFORMATIKA 3, no. 2 (2019): 1. http://dx.doi.org/10.30829/algoritma.v3i2.6434.

Full text
Abstract:
<p><em>Smartphones with the Android operating system are increasingly available in the market at increasingly affordable prices. The Android operating system itself is an open source operating system that can be modified according to needs. In this research, the aim is to design and implement a home lighting control system that activates and deactivates via a smartphone using Bluetooth and makes Android a multifunctional cellular device, in addition to a communication device but also as a device that is communicated to control a hardware device. Based on the results of tests conduc
APA, Harvard, Vancouver, ISO, and other styles
34

Pargaonkar, Shubhangi, Diksha Jawalkar, Reshma Chate, Shivani Sangle, M. D. Umale, and S. S. Awate. "Safe Driving Using Android Based Device." International Journal of Engineering Trends and Technology 18, no. 3 (2014): 151–54. http://dx.doi.org/10.14445/22315381/ijett-v18p229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Jagan, Mohan Rao Doddapaneni. "Hand Held Devices 8" To 4.7" Screen Compatibility on Android Applications." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 11, no. 4 (2023): 1–3. https://doi.org/10.5281/zenodo.14593300.

Full text
Abstract:
The integration of handheld Zebra devices into fuel dispensing applications presents unique challenges when ensuring cross-device compatibility. This paper addresses the issue faced by field supervisors who, due to ergonomic concerns, shifted from using 8-inch Zebra devices to 4.7-inch devices, resulting in screen rendering issues and functionality discrepancies in the fuel dispensing application. The business need to adapt the application for both device sizes led to a comprehensive solution that involved redesigning and testing the application for compatibility across the two device types. A
APA, Harvard, Vancouver, ISO, and other styles
36

McVearry, Kenneth A. "DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield." Military Medicine 188, Supplement_6 (2023): 192–98. http://dx.doi.org/10.1093/milmed/usad084.

Full text
Abstract:
ABSTRACT Introduction Apps that support telemedicine on the battlefield typically run on classified devices and transmit information over classified networks, whereas the medical data the apps create and transmit are unclassified. Current systems treat these data as classified, so a cross-domain solution is required to transfer the data back to an unclassified domain, which adds delays and costs to the process of transmitting critical data needed to treat injured warfighters. To address this gap, ATC-NY developed DroidChamber, which is a software-based Android system that enables multilevel se
APA, Harvard, Vancouver, ISO, and other styles
37

Suharyadi, Heri, Dian Ahkam Sani, and Mohammad Zoqi Sarwani. "Implementation of Virtual Reality in Game Platformer." Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi 5, no. 1 (2020): 32–38. http://dx.doi.org/10.25139/inform.v5i1.2327.

Full text
Abstract:
The realization of virtual reality is implemented on an application in the form of a game that will load the genre of platform games, where the genre of this game is highly respected by lovers of games on the Android platform. The hardware used to create virtual reality in this platformer game is an android device that has a gyroscope sensor, virtual reality cardboard, and computer devices. The software uses unity, blender, and Microsoft visual studio as a code editor. The making of this virtual reality game using the gyroscope sensor as full control of character movements that serve to minimi
APA, Harvard, Vancouver, ISO, and other styles
38

D’laila Rumy, Krishella Naomi, I. Gusti Ngurah Anom Cahyadi Putra, and I. Ketut Gede Suhartana. "Android, Alkitab APLIKASI ALKITAB SAAT TEDUH PADA MOBILE DEVICE BERBASIS ANDROID." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 12, no. 2 (2023): 443. http://dx.doi.org/10.24843/jlk.2023.v12.i02.p23.

Full text
Abstract:
ABSTRAK 
 Seiring dengan perkembangan teknologi, penggunaan perangkat mobile sebagai pendamping dalam melakukan aktivitas sehari-hari sudah sangat memudahkan umat manusia. Penelitian ini bertujuan untuk merancang aplikasi Alkitab berbasis android, aplikasi ini bertujuan agar membuat pengguna lebih mudah mengakses Alkitab di perangkat smartphone. Di dalam aplikasi Alkitab ini terdiri dari bab-bab yang apabila di sentuh dengan jari, akan memuat keseluruhan isi bab yang ingin di baca. Hal ini di karenakan beberapa ponsel sudah memiliki fungsi dan kemampuan lebih dari sekedar fungsi dasar. An
APA, Harvard, Vancouver, ISO, and other styles
39

Hu, Hong Xin, and Ming Cui. "Development Scheme of Mobile Campus Information Integration Platform Based on Android." Applied Mechanics and Materials 347-350 (August 2013): 2769–72. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2769.

Full text
Abstract:
This paper reports on the design of software based on Android operating system, which enables smart phone, tablet PC and other devices to communicate with WEB server through the network. The WEB server then sends the data got from connection with school shared database to Android client device in JSON way. Data synchronization is made on a regular basis between campus education administration systems, students and faculty systems, scientific research systems, library system and the shared database. Thus campus information inquiry and interaction can be achieved by mobile devices such as Androi
APA, Harvard, Vancouver, ISO, and other styles
40

Eshwar, Erukulla. "Object Tracking Devices using Android Application." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 2164–68. http://dx.doi.org/10.22214/ijraset.2021.35574.

Full text
Abstract:
Millions of smart devices are mushrooming in this digital environment to meet the difficulties posed by innovations and technological advancements in ubiquitous computing. All of these smart gadgets are exposed to everyday objects that are linked to the Internet. Web of Things is a term that defines how various objects are connected to the Internet and communicate with one another using web standards. The emergence of omnipresent systems makes human beings' jobs easier. People were able to live lavish existence in the most comfortable environment because of these inventions. Finally, everyone
APA, Harvard, Vancouver, ISO, and other styles
41

Amit Bohra, Karan, Palvinder Singh,. "Access Android Device Using The FatRat and Metasploit." International Journal on Recent and Innovation Trends in Computing and Communication 9, no. 5 (2021): 40–47. http://dx.doi.org/10.17762/ijritcc.v9i5.5481.

Full text
Abstract:
At present, smartphones are widely used for both business and personal purposes. As we all know that android is the popular mobile operating system. Like Windows operating system vulnerability the android has also vulnerability. And on the basis of these vulnerabilities, an attacker can obtain a user’s privacy data. But one possible way to avoid accessing of system and network i.e. penetration testing
 This paper describes penetration testing, Kali Linux tools such as Metasploit and TheFatRat. These tools have proved to be effective in Android exploitation. For example, by using TheFatRat
APA, Harvard, Vancouver, ISO, and other styles
42

Krzysztoń, Mateusz, Bartosz Bok, Marcin Lew, and Andrzej Sikora. "Lightweight On-Device Detection of Android Malware Based on the Koodous Platform and Machine Learning." Sensors 22, no. 17 (2022): 6562. http://dx.doi.org/10.3390/s22176562.

Full text
Abstract:
Currently, Android is the most popular operating system among mobile devices. However, as the number of devices with the Android operating system increases, so does the danger of using them. This is especially important as smartphones increasingly authenticate critical activities(e-banking, e-identity). BotSense Mobile is a tool already integrated with some critical applications (e-banking, e-identity) to increase user safety. In this paper, we focus on the novel functionality of BotSense Mobile: the detection of malware applications on a user device. In addition to the standard blacklist appr
APA, Harvard, Vancouver, ISO, and other styles
43

G., Naveen Balaji, Saravanan K., Poorani R., Reka Raj R., and Vishnu Priya T. "Advanced Security System using PIC through Bluetooth." International Journal of Trend in Scientific Research and Development 1, no. 5 (2018): 675–85. https://doi.org/10.31142/ijtsrd2350.

Full text
Abstract:
The objective of our project is to develop an Exploiting Bluetooth on Android mobile devices for home appliances control appliances control application. Mobile deviceshave been integrated into our everyday life consequently, home automation is becoming increasingly prominent features on mobile devices .We have developed a security system that interfaces with an android mobile devices.The mobile device will be communicate through Bluetooth by the shortest way. The mobile application can be loaded onto any compatible device, and once loaded, interface with the appliances easily .commands to ON,O
APA, Harvard, Vancouver, ISO, and other styles
44

Isachenko, Olha V. "Using the Termux mobile application for forensic expertise of Android devices." Informatics. Culture. Technology 1, no. 1 (2024): 239–44. http://dx.doi.org/10.15276/ict.01.2024.36.

Full text
Abstract:
Mobile device logical data extraction methods extract the data present on the device by interacting with the operating system and accessing the file system. These methods are important because they provide valuable data, work on most devices, and are easy to use. Again the concept of rooting comes into play when extracting data. Boolean methods don't actually require root access to extract data. However, having root access on the device allows you to access all the files present on the device. This means that some data can be extracted on a non-rooted device, while root access will unlock the
APA, Harvard, Vancouver, ISO, and other styles
45

Rachman, Natriya Faisal, and Arief Darmawan. "Design of Automatic Detection System for Railway Facility Maintenance." Jurnal Perkeretaapian Indonesia 2, no. 2 (2018): 120–26. http://dx.doi.org/10.37367/jpi.v2i2.19.

Full text
Abstract:
The use of android now not only acts as a means of communication for the community, but also very active role in the dissemination of information quickly and easily. With the current situation which is very practical, in this study, the design of a motorcycle safety history database was designed using android-based QRcode method. Because previously the executor still used the check list sheet, with the design of the Android-based barcode method, the executor did not need to see the data in the archive or add data through the check list sheet. The design of the andoid-based money order motor ma
APA, Harvard, Vancouver, ISO, and other styles
46

Hidayat, Hidayat, and Boni Al Amin. "Perancangan dan Implementasi Iqra Braille Elektronik Berbasis Mikrokontroler dan Android." Komputika : Jurnal Sistem Komputer 6, no. 2 (2019): 83–91. http://dx.doi.org/10.34010/komputika.v6i2.1744.

Full text
Abstract:
Braille codes are letters that are known by blind people to be able to obtain information through books including the Qur'an. The availability of media to learn to read the Qur'an in Braille code for blind people is very limited. In addition, the availability of teachers of the Koran for the blind is very limited because not many people can see normally who understands the Qur'anic letters in Braille code, so it is necessary to design and implement an Iqra Electronic Braille device to facilitate the reading process. the Qur'an in Braille code for blind people. One of the Koran learning methods
APA, Harvard, Vancouver, ISO, and other styles
47

Sulistiyowati, Indah, and Miftachur Rifki Antoni. "Automatic Steering System on The Prototype Electric Car UMSIDA." JEECS (Journal of Electrical Engineering and Computer Sciences) 1, no. 2 (2016): 139–45. http://dx.doi.org/10.54732/jeecs.v1i2.176.

Full text
Abstract:
Currently the electronic device can not be separated from human life, especially is the gadget. Gadgets in daily activities is almost inseparable from our grasp, from children to adults. Many devices are now directly connected with android smartphone. Hence the idea to do some research occurred android smartphone is connected to a steering system of the car. In this case study is used as a prototype electric car UMSIDA. Here we create an electronic circuit that we put on the car steering system, which by using blutooth connection connects to an android smartphone that we use. As for the electr
APA, Harvard, Vancouver, ISO, and other styles
48

Selvin, Pradeep Kumar S. "Password Based Remote Controlled Door Opening Using Android Application." INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 4, no. 4 (2016): 634–38. https://doi.org/10.5281/zenodo.233832.

Full text
Abstract:
The main objective of this paper is to unlock a hotel room door by using an android application using a password entered through the android application device. Opening and closing of hotel room door involves using of smart card. The opening and closing of hotel room door is achieved by using an android application. The owner can connect android application device to the system through Wi-Fi, which in turn is connected to a microcontroller controlled door that can open/close the door by entering the password. Remote operation is achieved by any smart-phone/Tablet, with Android OS, upon a GUI (
APA, Harvard, Vancouver, ISO, and other styles
49

Chebanyuk, Olena, and Anton Yukhymenko. "Approach to Prevent of Spoken Information Leakage through Gyroscope and Accelerometer Sensors in Mobile Devices with Android Operation System." Information Theories and Applications 28, no. 3 (2021): 219–32. http://dx.doi.org/10.54521/ijita28-03-p02.

Full text
Abstract:
Paper considers questions of the statistics analysis of the usage of mobile devices. The threat of spoken information leakage through gyroscope and accelerometer sensor in mobile device is considered. The approach for analyzing and evaluating threat level of audio information leakage from mobile device with installed android operation system is proposed.
APA, Harvard, Vancouver, ISO, and other styles
50

Agrawal, Vinayak, and Shashikala Tapaswi. "Forensic analysis of Google Allo messenger on Android platform." Information & Computer Security 27, no. 1 (2019): 62–80. http://dx.doi.org/10.1108/ics-03-2017-0011.

Full text
Abstract:
Purpose The purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!