scholarly journals Android Application Development

Author(s):  
Ritu Sharma

Technology is being used and improved by human beings over a long period of time now and Smartphones is one of them. Smart Phones contain touch screen, built in keyboard, high resolution camera, front side camera for video conferencing, etc. They are used for making and receiving calls, sending and receiving messages, accessing the Internet, digital media, incorporating audio/video recording etc. Different smart phones have different operating systems and mobile applications are developed for each operating system in smart phones, tablet or mobile phones, in order to serve the needs of the user. These apps are either preinstalled or downloadable from online app market that can do almost everything. Apps make a mobile be like a portable computer having multi core processors, gigabytes of memory and a real operating system. Originally mobile apps were made available for only calling, messaging and informational purposes like calendar, weather forecast, e- mail, etc. With improvement in technology and increase in user demands, developers started making apps for other purposes like games, banking, video chats etc. Some apps are also used to present data in the same format as on a computer website and also allow you to download content that you can use when there is no Internet. There are many apps available in market today for different Operating Systems in which Android is having the maximum market share these days.

Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Reza Rawassizadeh ◽  
Amin Anjomshoaa ◽  
A Min Tjoa

There are many mobile applications currently available on the market, which have been developed specifically for smart phones. The operating system of these smart phones is flexible enough to facilitate the high level application development. Similar to other pervasive devices, mobile phones suffer from limited amount of resources. These resources vary from the power (battery) consumption to the network bandwidth consumption. In this research the mobile resources are identified and classified. Furthermore, a monitoring approach to measure resource utilization is proposed. This monitoring tool generates traces about the resource usage which is followed by a benchmarking model which studies monitoring traces and enables users to extract qualitative information about the application from quantitative trace of resource usage.


2018 ◽  
Vol 7 (4.5) ◽  
pp. 5
Author(s):  
Mehta Niket ◽  
Dutta Suparna

Electronic Media is no more a buzz word now. Almost every educated and semi-educated person all over the world is a part of digital media and access information electronically. Affordable smart phones, electronic gadgets and telecommunication services have made communication fast and multimedia-rich containing text, images, audio-video and animation messages. In this 21st century, digital media has given a democratic opportunity to all of us to become a broadcaster. People discuss online about issues of considerable importance and as well as trivial matters. This online platform has brought out many changes in personality and thoughts of its users and especially of the coming generation. Sharing confidential information and being accessible 24X7 has brought out changes in behavior and manner- ism of new generation. New generation has become more expressive and communicate more than earlier generation. They are connected to more and diverse set of people all at once and every time. Communication which is always based on emotions has changed in current scenario which is the theme of this paper.  


Author(s):  
Rajesh Keshavrao Deshmukh ◽  
Shilpa Markandey ◽  
Pooja Sahu

The Android is mobile platform. It is an open source and free operating system application, by Google it is developed and maintained. It was designed essentially for touch screen mobile devices, such as and tablet, computers, smart phones, watch television, cars etc. Android is one of the most widely used mobile OS. Android is a not only operating system but also key applications and middleware. Android is an open source operating system. It is developed by the open handset Alliance, led by Google, and other companies. Those are used to android studio 2.2.3 version and development the mobile application.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2019 ◽  
Vol 16 (9) ◽  
pp. 3854-3859
Author(s):  
Keith Vassallo ◽  
Lalit Garg ◽  
Vijay Prakash ◽  
K. Ramesh

This paper reviews the existing technologies for the development of cross-platform applications. Both Server-side as well as client-side applications for web, desktop and mobile devices are considered which mainly consists of smart phones and tablets. Further, based on the review process and research issues a web-based development approach is recommended for the development of truly cross-platform applications across devices and operating systems.


2015 ◽  
Vol 1 (1) ◽  
Author(s):  
Varsha Dubey

The android operating system is basically an operating system for mobiles and is rapidly gaining market share, with dozens of smart phones and tablets either released or set to be released. It is mobile operating system that uses a modified version of the Linux kernel 2.6. Google developed Android as part of the Open Handset Alliance, a group of more than 30 mobile and technology companies working to open up the mobile handset environment. Android’s development kit supports many of the standard packages used by Jetty, due to that fact and Jetty’s modularity and lightweight foot print, it was possible to port Jetty to it so that it will be able to run on the Android platform.


Author(s):  
Shankar Chaudhary

Despite being in nascent stage m-commerce is gaining momentum in India. The explosive growth of smart-phone users has made India much loved business destination for whole world. Indian internet user is becoming the second largest in the world next to China surpassing US, which throws open plenty of e-commerce opportunities, not only for Indian players, offshore players as well. Mobile commerce is likely to overtake e-commerce in the next few years, spurred by the continued uptrend in online shopping and increasing use of mobile apps.The optimism comes from the fact that people accessing the Internet through their mobiles had jumped 33 per cent in 2014 to 173 million and is expected to grow 21 per cent year-on-year till 2019 to touch 457 million. e-Commerce brands are eyeing on the mobile app segment by developing user-friendly and secure mobile apps offering a risk-free and easy shopping experience to its users. Budget 4G smart phones coupled with affordable plans, can very well drive 4G growth in India.


2013 ◽  
Vol 4 (2) ◽  
Author(s):  
Rudolf Maresch

Durch den digitalen Medienwandel ist der Begriff der Öffentlichkeit problematisch geworden. Die Debatte fokussiert sich zumeist auf die Frage, ob die sogenannte bürgerliche Öffentlichkeit durch das Internet im Niedergang begriffen ist oder eine Intensivierung und Pluralisierung erfährt. Rudolf Maresch zeichnet die berühmte Untersuchung der Kategorie durch Jürgen Habermas nach und zieht den von ihm konstatierten Strukturwandel der Öffentlichkeit in Zweifel. Dagegen verweist er auf die gouvernementalen und medialen Prozesse, die jede Form von Kommunikation immer schon gesteuert haben. Öffentlichkeit sei daher ein Epiphänomen nicht allein des Zeitungswesens, sondern der bereits vorgängig ergangenen postalischen Herstellung einer allgemeinen Adressierbarkeit von Subjekten. Heute sei Öffentlichkeit innerhalb der auf Novitäts- und Erregungskriterien abstellenden Massenmedien ein mit anderen Angeboten konkurrierendes Konzept. Mercedes Bunz konstatiert ebenfalls eine Ausweitung und Pluralisierung von Öffentlichkeit durch den digitalen Medienwandel, sieht aber die entscheidenden Fragen in der Konzeption und Verteilung von Evaluationswissen und Evaluationsmacht. Nicht mehr die sogenannten Menschen, sondern Algorithmen entscheiden über die Verbreitung und Bewertung von Nachrichten. Diese sind in der Öffentlichkeit – die sie allererst erzeugen – weitgehend verborgen. Einig sind sich die Autoren darin, dass es zu einer Pluralisierung von Öffentlichkeiten gekommen ist, während der Öffentlichkeitsbegriff von Habermas auf eine singuläre Öffentlichkeit abstellt. </br></br>Due to the transformation of digital media, the notion of “publicity” has become problematic. In most cases, the debate is focused on the question whether the internet causes a decline of so-called civic publicity or rather intensifies and pluralizes it. Rudolf Maresch outlines Jürgen Habermas's famous study of this category and challenges his claim concerning its “structural transformation,” referring to the governmental and medial processes which have always already controlled every form of communication. Publicity, he claims, is an epiphenomenon not only of print media, but of a general addressability of subjects, that has been produced previously by postal services. Today, he concludes, publicity is a concept that competes with other offers of mass media, which are all based on criteria of novelty and excitement. Mercedes Bunz also notes the expansion and pluralization of the public sphere due to the change of digital media, but sees the crucial issues in the design and distribution of knowledge and power by evaluation. So-called human beings no longer decide on the dissemination and evaluation of information, but algorithms, which are for the most part concealed from the public sphere that they produce in the first place. Both authors agree that a pluralization of public sphere(s) has taken place, while Habermas's notion of publicity refers to a single public sphere.


2017 ◽  
Vol 2 (2) ◽  
pp. 31-35
Author(s):  
Akshada Abnave ◽  
Charulata Banait ◽  
Mrunalini Chopade ◽  
Supriya Godalkar ◽  
Soudamini Pawar ◽  
...  

M-learning or mobile learning is defined as learning through mobile apps, social interactions and online educational hubs via Internet or network using personal mobile devices such as tablets and smart phones. However, in such open environment examination security is most challenging task as students can exchange mobile devices or also can exchange information through network during examination. This paper aims to design secure examination management system for m- learning and provide appropriate mechanism for anti- impersonation to ensure examination security. The users are authenticated through OTP. To prevent students from exchanging mobile devices during examination, system re-authenticates students automatically through face recognition at random time without interrupting the test. The system also provides external click management i.e. prevent students from accessing online sites and already downloaded files during examination.


Sign in / Sign up

Export Citation Format

Share Document