scholarly journals Analysis of selected operating systems in mobile devices

2018 ◽  
Vol 19 (6) ◽  
pp. 649-654
Author(s):  
Tomasz Perzyński ◽  
Daniel Pietruszczak ◽  
Gracjan Ziółek

The paper presents a comparative analysis of selected operating systems in mobile devices, using smartphones: iPhone 6s and Samsung models from the Galaxy series. The study used freeware applications. It allowed to analysis and compare the devices parameters in users environment.

Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Web 2.0 applications are becoming ubiquitous applications (i.e., applications that can be accessed by anyone, anywhere, anytime, using any device). A key element of these ubiquitous applications is mobile devices. In fact, the involvement of mobile devices such as smartphones and tablet computers in the development of Web 2.0 applications has resulted in a new kind of Rich Internet Application (RIA) that can run on a variety of devices starting from the same code base, and it is known as multi-device RIA. The term multi-device RIA embraces not only mobile applications but also other kinds of out-of-browser applications such as cross-platform desktop applications as well as the traditional cross-browser Web applications. This chapter formalizes the concept of multi-device RIA, and then it presents an overview of the capabilities of several multi-device development frameworks. This review is finally summarized in a comparative analysis.


Author(s):  
Lei Chen ◽  
Shaoen Wu ◽  
Yiming Ji ◽  
Ming Yang

Mobile and handheld devices are becoming an integral part of people’s work, life and entertainment. These lightweight pocket-sized devices offer great mobility, acceptable computation power and friendly user interfaces. As people are making business transactions and managing their online bank accounts via handheld devices, they are concerned with the security level that mobile devices and systems provide. In this chapter we will discuss whether these devices, equipped with very limited computation power compared to full-sized computers, can make equivalent security services available to users. We focus on the security designs and technologies of hardware, operating systems and applications for mobile and handheld devices.


2015 ◽  
pp. 2068-2076
Author(s):  
James R. Stachowiak

Computer-based Assistive Technology (AT) has had a powerful effect on people with disabilities in the areas of reading, writing, communicating, and accessing information. One of the roadblocks for use has always been the expense of AT. Advancements in computing and mobile technology, however, are making some technology more readily available, accessible, and cost effective for people with disabilities. Computer operating systems, for example, now contain features to magnify screens for reading and in the entering of text. The mobile movement of smartphones, e-readers, and tablets has also been changing the way people with disabilities access information. The capabilities of these devices combined with the immediate availability, affordability, and ease of use, has been making the world more accessible for people with disabilities, and with mobile devices increasingly becoming a necessity for most, this trend is anticipated to only continue.


Author(s):  
A . Flores ◽  
M. Polo Usaola

Pervasive computing (PvC) environments should support the continuity of users’ daily tasks across dynamic changes of operative contexts. Pervasive or ubiquitous computing implies computation becoming part of the environment. Many different protocols and operating systems, as well as a variety of heterogeneous computing devices, are interrelated to allow accessing information anywhere, anytime in a secure manner (Weiser, 1991; Singh, Puradkar, & Lee, 2005; Ranganathan & Campbell, 2003).According to the initial considerations by Weiser (1991), a PvC environment should provide the feeling of an enhanced natural human environment, which makes the computers themselves vanish into the background. Such a disappearance should be fundamentally a consequence not of technology but of human psychology, since whenever people learn something sufficiently well, they cease to be aware of it. This means that the user’s relationship to computation changes to an implicit human-computer interaction. Instead of thinking in terms of doing explicit tasks “on the computer”—creating documents, sending e-mail, and so on—on PvC environments individuals may behave as they normally do: moving around, using objects, seeing and talking to each other. The environment is in charge of facilitating these actions, and individuals may come to expect certain services which allow the feeling of “continuity” on their daily tasks (Wang & Garlan, 2000).Users should be allowed to change their computational tasks between different operative contexts, and this could imply the use of many mobile devices that help moving around into the environment. As a result, the underlying resources to run the required applications may change from wide memory space, disk capacity, and computational power, to lower magnitudes. Such situations could make a required service or application inappropriate in the new context, with a likely necessity of supplying a proper adjustment. However, users should not perceive the surrounding environment as something that constraints their working/living activities. There should be a continuous provision of proper services or applications. Hence the environment must be provided with a mechanism for dynamic applications suitability (Flores & Polo, 2006).


2016 ◽  
Vol 44 (1) ◽  
pp. 48-60 ◽  
Author(s):  
Mary K. Van Ullen ◽  
Jane Kessler

Purpose – The purpose of this paper is to evaluate the accuracy and functionality of a selection of basic Android and iOS apps for mobile devices designed to generate bibliographic citations. Design/methodology/approach – A number of inexpensive or free apps were installed on several different tablets and phones. Book citations in MLA and APA format were generated and evaluated for accuracy. Findings – Results show that the majority of the apps tested produced unacceptably inaccurate citations, and many had limited functionality. The best of the apps tested was EasyBib. Research limitations/implications – There are infinite combinations of operating systems, apps, citation styles, material types and devices. Testing for this study was limited to uncomplicated apps likely to appeal to undergraduate students. It did not include more sophisticated apps for managing reference libraries. The study investigated how well several Android and iOS apps installed on mobile devices functioned to generate MLA and APA citations for print books. Practical/implications – As the role of mobile technology in education continues to grow, librarians need to remain aware of solutions that can help students manage their research. Librarians have an opportunity to provide feedback to developers by reviewing and rating apps. Originality/value – Undergraduate students face challenges in learning to appropriately acknowledge materials they have consulted in their research and writing. Librarians can play an important role in helping students select the most appropriate tools to make citing sources easier and more accurate.


Sign in / Sign up

Export Citation Format

Share Document