scholarly journals Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android

2020 ◽  
Vol 7 (3) ◽  
pp. 376
Author(s):  
Raden Bagus Dimas Putra ◽  
Eko Setia Budi ◽  
Abdul Rahman Kadafi

Android is one of the largest mobile operating system platforms today. Amid the ever-increasing needs of users, Android programmers are still lacking to meet the current market needs. One of the problems that causes this is the difficulty of creating an internal database, so many people give up to learn to make Android applications. Android's internal database is hard to create because the entire data structure on that database should be built with the query executed in the created program code. Some of the common internal databases currently used are SQLiTe and Room. Both databases are quite difficult to learn where SQLite should build everything from scratch while Room should study the structure and systematics of of the library. Therefore, in this article, the author proposes library and template named "Relational Database Library and Template" which will be referred to as RBDLiTe which can create an internal database for Android applications easily which will also be compared with SQLiTe and Room in its use.

The chapter presents the concept of innovation and the evolution of this term in the sciences of organization and management. Innovation is a particularly important element of modern management as it contributes to creating value for the company and strengthening its market position. Regardless of the industry, every modern organization should be open to new developments; it is an expectation expressed by the recipients of products and services. The market needs to improve existing solutions and develop new products on an annual basis. Innovation is defined as the process of translating an idea or invention into a good or service that creates value for which customers will pay. By observing the actions of the most powerful organizations, it can be observed that novelties form an integral part of their business activity models. Every two years, Microsoft presents to its customers an updated version of their popular operating system, fashion houses design new clothing collections for specific dates, and Disney regularly introduces new blockbusters for the next generations of viewers. Regardless of whether an organization is global or local, the need for innovation is becoming increasingly commonplace.


2010 ◽  
Vol 121-122 ◽  
pp. 849-853
Author(s):  
Xiao Mao Wu ◽  
Hui Ming Guo ◽  
Yong Quan Yu

In this paper, we analyze the data structure of design of matter-element model from the level of software design, combined with the features of the common used data structure and matter-element model in Extenics, finally propose a new data structure model, which adapt to computation, reasoning and transformation using matter-element model.


2012 ◽  
Vol 49 (No. 6) ◽  
pp. 278-283
Author(s):  
M. Vosejpková

The Common Agricultural Policy (CAP) is of the character of a highly protective policy of the EU Member States. It includes a number of measures distorting the market directly and influences the farmers’ incomes depending on their production. There have been two reforms of the CAP so far and the third one is prepared with intention to come into force from 2006; it is called Mid-Term Review (MTR). This reform is concentrated on keeping and increasing consumers’ credibility and shifting to more competitive agriculture more orientated on market needs. The main Reform proposals include horizontal issues, i.e. Decoupling, Modulation/Degressivity, Cross-compliance, Farm Advisory System, IASC, Rural Development, and market issues concern dairy, cereals, rye, durum wheat, dried fodder, potato starch, seeds, nuts, rice, set-aside, carbon credit, beef. Besides the above mentioned goals, it is necessary to ensure conditions for rural development together with demands on environmental protection and improvement, so-called second pillar of the CAP. The attempt of cross-sectional summary and analysis of the MTR impacts for the EU was made in the article based on results of six studies performed by universities and DG AGRI in Brussels.


2013 ◽  
Vol 373-375 ◽  
pp. 1587-1590
Author(s):  
Bo Qu

This paper describes the design and implementation of tiny TTY for an ARM based multi-process mono-kernel, including overview of TTY, and implementation of the TTY routines such as data structure of TTY, TTY input, TTY read, TTY write, TTY waiting and TTY signal setting. A demo example is also provided at the final of the paper to show the effect. The mono-kernel is developed by the author of this paper on Linux with GNU tool chain from scratch, for which the tiny TTY is designed. Based on this mono-kernel, other components can be added such as file system, network management, etc. to form a more powerful embedded operating system.


2018 ◽  
Vol 26 (4) ◽  
pp. 127-136
Author(s):  
В. И. Усиченко ◽  
Д. В. Заврайский

The expediency of two-level optimisation of a program code for calculation Legendre polinomials of high orders is shown. The conclusion about efficacy of optimisation is made on the basis of timekeeping by operating system means. This paper is a second part of article [8].


2021 ◽  
Vol 297 (3) ◽  
pp. 39-45
Author(s):  
N. PRAVORSKA ◽  
О. BARMAC ◽  
D. MEDZATIY ◽  
T. SHESTAKEVYCH ◽  
◽  
...  

To avoid malfunctions of the developed software caused by errors, even when developed by professionals, a number of automated tools are used, which allow to evaluate the software code. A variety of detectors are commonly used to detect errors that occur due to duplicate blocks of executable code. The importance of developing such detectors is that the product is not dependent on the programming language and has a simple algorithm for finding cloned blocks of code. The approach of the language-independent repetition detector is based on a method based on the use of the clone index. It is a global data structure that resembles a typical inverted index. This approach is based on the text, ie the method becomes the basis for research independent of language. In recent years, additional methods have become increasingly popular, which analyze the source and executable code at a smaller level, and there are attempts to avoid unnecessary recalculations, by transferring information between versions. Reviewing the research presented in the works of scientists dealing with this problem, it was decided to propose an approach to improve methods for detecting repetitions and redundancy of program code based on language-independent incremental repetition detector (MNIDP). Most additional research is based on tree-like and graphical methods, ie they are strictly dependent on the programming language. The solution in the MNIDP campaign is to take the text as a basis, ie the method becomes the basis for research independent of language. This technique is not strictly language-independent, but due to the fact that the tokenization stage will be included, with the help of minor adjustments the desired result has been achieved. This provides a detailed analysis of the internal composition (namely, elements) of the detector and explanations of the work at different stages of the detection process.


Author(s):  
Chen Zheng Looi ◽  
Danny Wee Kiat Ng

In the past decades, the service robot industry had risen rapidly. The office assistant robot is one type of service robot used to assist officers in an office environment. For the robot to navigate autonomously in the office, navigation algorithms and motion planners were implemented on these robots. Robot Operating System (ROS) is one of the common platforms to develop these robots. The parameters applied to the motion planners will affect the performance of the Robot. In this study, the global planners, A* and Dijkstra algorithm and local planners, Dynamic Window Approach (DWA) and Time Elastic Band (TEB) algorithms were implemented and tested on a robot in simulation and a real environment. Results from the experiments were used to evaluate and compare the performance of the robot with different planners and parameters. Based on the results obtained, the global planners, A* and Dijkstra algorithm both can achieve the required performance for this application whereas TEB outperforms DWA as the local planner due to its feasibility in avoiding dynamic obstacles in the experiments conducted.


Author(s):  
Kashif Ali Dahri ◽  
Muhammad Saleem Vighio ◽  
Baqar Ali Zardari

The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share, the Android operating system has become a prime target for malware developers. When an Android phone is injected with a malware, it may result in compromising the privacy of the user by stealing sensitive and private information like contacts, ids, passwords, photos, call records, and so on. Compared to any other Android-based application category, games are the most preferred zone for attackers, due to the high interest of users in game applications. When an end user downloads a game, which is injected with malicious code, user data is infected without bringing in the knowledge of the user. Though, there still are not sufficient protection mechanisms or guidelines stated for end user against Android malware, this study offers a novel approach to detect Android malware in order to ensure the safe usage of Android applications. The advantage of this approach is its ability to utilize Android manifest files for the detection of malware. The availability of manifest file in every Android application makes this approach applicable to all Android applications. It can also be considered as a lightweight method for malware detection, and its efficiency is experimentally confirmed by testing and comparing the results of 50 Android games samples. Experiments are carried out using the Android Package Kit (APK) tools, and based on the experiments, different kinds of malware identification and prevention guidelines have been proposed for the safe and secure usage of the Android operating system.


Author(s):  
Detlef Neuenhaus ◽  
Christian Kammel ◽  
Urs Joachim Geßler ◽  
Gerhard Sedlacek

Abstract In case of contact between two colliding bodies various force interactions in the contact area occur. Therefore, the virtual power for contact zones has to comprise impulse or contact in normal direction and friction in tangential direction of the common plane depending on the way of relative movement. Within this paper a sophisticated algorithm for the description of the virtual power in contact zones is presented. Hence, the implementation of this algorithm to the MEPHISTO (Multibody systems with ElasticPlastic HInges and changeable STructure Organization) multibody program code is successfully proved in the particular case of vehicle impact on a safety barrier system.


Sign in / Sign up

Export Citation Format

Share Document