scholarly journals A Novel Method For Android Version Updates To Avoid Fragmentation

Android is the most widely used operating system worldwide, running on over seventy percent of the entire smartphone market. However, Android OS suffers from a big problem, known as fragmentation, that causes many complications both on the user side and the development side. Various solutions are currently live to eliminate these complications in the near future, but there is currently no direct solution for the same. A project was developed with the name SENSE IT ALL - DEVICE TEST to help counter and minimise these complications caused due to fragmentation on the platform. Sense It All is an Android application, built using the native Android SDK, that provides diagnostic tests to the deviceincorporated sensors, features, trending technologies, internal system, and other tools, to help a naive user, or a sophisticated user, to understand, reduce, and even eliminated the consequential complications due to fragmentation.

Author(s):  
Maaz Sirkhot ◽  
Ekta Sirwani ◽  
Aishwarya Kourani ◽  
Akshit Batheja ◽  
Kajal Jethanand Jewani

In this technological world, smartphones can be considered as one of the most far-reaching inventions. It plays a vital role in connecting people socially. The number of mobile users using an Android based smartphone has increased rapidly since last few years resulting in organizations, cyber cell departments, government authorities feeling the need to monitor the activities on certain targeted devices in order to maintain proper functionality of their respective jobs. Also with the advent of smartphones, Android became one of the most popular and widely used Operating System. Its highlighting features are that it is user friendly, smartly designed, flexible, highly customizable and supports latest technologies like IoT. One of the features that makes it exclusive is that it is based on Linux and is Open Source for all the developers. This is the reason why our project Mackdroid is an Android based application that collects data from the remote device, stores it and displays on a PHP based web page. It is primarily a monitoring service that analyzes the contents and distributes it in various categories like Call Logs, Chats, Key logs, etc. Our project aims at developing an Android application that can be used to track, monitor, store and grab data from the device and store it on a server which can be accessed by the handler of the application.


1994 ◽  
Vol 59 (1) ◽  
pp. 1-74 ◽  
Author(s):  
Pavel Kočovský

This review summarizes the main topics of our research and covers the period of the last 15 years. The prime interest is focused on various ways of controlling the regio- and stereoselectivity of selected organic reactions, in particular electrophilic additions, cleavage of cyclopropane rings, and allylic substitutions by means of neighboring groups and/or transition and non-transition metals. In the first part, the factors governing the course of electrophilic additions are assessed, culminating in the formulation of selection rules for the reactivity of cyclohexene systems, and in a concise synthesis of the natural cardioactive drug, strophanthidin. These studies also contribute to a better understanding of the mechanisms of electrophilic additions. The second part describes recent developments in the stereo- and regiocontrolled cleavage of cyclopropane rings by non-transition metals (Tl and Hg), and the reactivity and transmetalation (with Pd) of the primary products. This methodology has resulted in novel routes to unique polycyclic structures, and will have synthetic applications in the near future. Evidence for the stereospecific "corner" cleavage of the cyclopropane ring has been provided for the first time for Tl and later for Hg. The third part deals with transition metal-catalyzed allylic substitution. Evidence for a new "syn" mechanism for the formation of the intermediate (π-allyl)palladium complex has been provided, which runs counter to the generally accepted "anti" mechanism. A novel method for a Pd-catalyzed allylic oxidation has been developed and employed in the synthesis of natural sesquiterpenes. The increasing importance of transition and non-transition metals for synthetic organic chemistry is demonstrated by their unique reactivity in a number of the papers included in this review.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 1030
Author(s):  
A Lashya Pravallika ◽  
B Bhargavi ◽  
Ch Harshit ◽  
Dr K. V. D. Kiran

Currently, In the mobile operating system Android is trending in the whole world.Though the designers of Android are working much on the security there are few attacks on the messaging framework which are really dangerous. In this paper we also present these attacks. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks,Also we discuss here the main features and vulnerabilities of Android OS that allow the development and infection by SMS malware.If the SMS is considered as the normal, then it does not take any action and it send to the end user after the delay expires. To deal with this type of issues,we proposed a method where the end user behaviour can be adjusted to prevent the totally malicious SMS.  


2021 ◽  
Vol 2 (3) ◽  
pp. 382-389
Author(s):  
Rian Yussandi

Android is a mobile device on the operating system for mobile phones based on Linux, android provides an open platform for developers to create applications. Android-based application developers make applications so that they can be useful for the community ranging from game genre applications, education, entertainment and simulation applications that are very likely to be created and run on this android operating system. Simulation is the process of designing a matemastis or logical model of a real system, conducting experiments on models using computers to describe, explain and predict system behavior. For a simulation application company can be used as a medium of product promotion, while for smartphone users can help to channel the existing imagination into a real picture. The application of simulation applications many functions, one example of its application to two-wheeled motor vehicles. By utilizing android application and the growth of vehicle users that lead to the hobby of modification, it can be utilized by creating an android-based coloring simulation application to help modifiers and modification lovers in order to channel their imagination and make it easier to design colors as desired. Without having to bother using design software that requires special skills


2020 ◽  
Vol 4 (2) ◽  
pp. 72-78
Author(s):  
Salman Muntaqo Aprilian ◽  
Faaris Mujaahid ◽  
Ramadoni Syahputra ◽  
Karisma Trinanda Putra ◽  
Widyasmoro Widyasmoro

Reliability of distribution networks is a factor that greatly affects customers as consumers of electricity. Analyzing and calculating the reliability of distribution networks are determined by the reliability index including SAIFI, SAIDI, CAIDI, and ASAI. On the other hand, smartphone technology is growing rapidly with a variety of applications to help simplify and accelerate human work in several fields of work. This paper delivers the design of an Android-phone-based analytic tool for distribution system reliability index measurement by developing it on Android application software. This application is named KALINDA, stands for Kalkulator Indeks Keandalan (Reliability Index Calculator), and created by using Android Studio IDE. We compare the data result between KALINDA calculations and manual calculations. The results obtained from the KALINDA application are declared to be valid accurate.


2021 ◽  
Vol 19 ◽  
Author(s):  
Kazimierz Gąsiorowski ◽  
Jadwiga Barbara Brokos ◽  
Marta Sochocka ◽  
Michał Ochnik ◽  
Justyna Chojdak-Łukasiewicz ◽  
...  

: Recent findings have improved our understanding of the multifactorial nature of AD. While in early, asymptomatic stages of AD, increased amyloid-β synthesis and tau hyperphosphorylation play a key role, in the later stages of the disease, numerous dysfunctions of homeostatic mechanisms in neurons, glial cells and cerebrovascular endothelium determine the rate of progression of clinical symptoms. The main driving forces of advanced neurodegeneration include: increased inflammatory reactions in neurons and glial cells, oxidative stress, deficiencies in neurotrophic growth and regenerative capacity of neurons, brain insulin resistance with disturbed metabolism in neurons, or reduction of the activity of the Wnt-β catenin pathway which should integrate the homeostatic mechanisms of brain tissue. In order to more effectively inhibit the progress of neurodegeneration, one should use combination therapies consisting of drugs that rectify several of the above-mentioned dysfunctions. It should be noted that many of widely-used drugs from various pharmacological groups, "in addition" to the main therapeutic indications, also have a beneficial effect on neurodegeneration and may be introduced into clinical practice in combination therapy of AD. There is a real hope that complex treatment will effectively inhibit the progression of AD and turn it into a slowly progressing chronic disease. Moreover as the mechanisms of bidirectional communication between the brain and microbiota are better understood, it is expected that these pathways will be harnessed to provide novel method to enhance health and treat AD.


Author(s):  
Peter Marks

This chapter deals with of recent novels and films that project forward into the near future, suggesting where surveillance might be heading. In Kim Stanley Robinson’s 2312, surveillance is figured into a future world of interplanetary environmentalism, in protecting planets and helping to monitor the ‘rewilding’ of an environmentally devastated Earth. Neill Blomkamp’s film Elysium fashions another Earth under environmental stress, patrolled by stringent surveillance operatives and systems that also screen the put-upon inhabitants from the eponymous eutopian space station literally and metaphorically above them. The film concentrates on the utopian urges of that population in their endeavour to overcome oppressive monitoring and receive medical treatment reserved for those on Elysium. Dave Eggers conjures up an apparently eutopian hi-tech company, The Circle, in his novel of the same name, representing how new technologies manipulate data and images for economic, social and political control. Spike Jonze’s film Her explores the relationship between surveillance and intimacy through the interaction between a human and an operating system. As with Eggers’ The Circle, Her investigates how data confuses definitions of identities as it allows for the fusion of surveillance and intimacy. These novels and films suggest some of the ways in which new forms of surveillance promise or threaten to fashion the worlds of the future. As with all such texts, they suggest options and present narratives and characters that enable readers and viewers to think and act so that the future approximates the eutopian rather than the dystopian.


2007 ◽  
Vol 30 (6) ◽  
pp. 495-500 ◽  
Author(s):  
T. Asano ◽  
R. Takazawa ◽  
M. Yamato ◽  
K. Kihara ◽  
T. Okano

Transplantation of mesothelial cells is used to repair peritoneum that is damaged by surgery, peritonitis, and peritoneal dialysis. The largest obstacle for clinical application of mesothelial cell transplantation is the lack of a reliable source of mesothelial cells. So far, they are isolated from omentum, mesentery, parietal wall and ascites. Procedures used to obtain mesothelial cells from the omentum or mesentery are invasive, however, especially in pre-operative situations. Sufficient amounts of ascites for aspiration can not be obtained under physiological conditions. We have developed a novel method of isolating mesothelial cells from the tunica vaginalis. The tunica vaginalis originates from the peritoneum and descends into the scrotum along with the testis during fetal development. This region provides a source of mesothelial cells that is convenient to approach and free from abdominal complications. Transplantation of autologous mesothelial cells that were isolated from tunica vaginalis was effective in preventing post-operative adhesions. In this review, we summarize mesothelial cell transplantation trials and describe the method of isolating mesothelial cells form the tunica vaginalis. Mesothelial cell transplantation might be widely accepted for clinical use in the near future.


Compiler ◽  
2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Haruno Sajati ◽  
Dwi Nughraheny ◽  
Nova Adi Suwarso

Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat.Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat. Keywords : OCR Fingerprint, Fingerprint recognition, Minutiae based matching, Fingerprint image processing.


Author(s):  
Mahmut Tokmak ◽  
Ecir Uğur Küçüksille ◽  
Utku Köse

In today's world that called technology age, smartphones have become indispensable for users in many areas such as internet usage, social media usage, bank transactions, e-mail, as well as communication. The Android operating system is the most popular operating system that used with a rate of 85.4% in smartphones and tablets. Such a popular and widely used platform has become the target of malware. Malicious software can cause both material and moral damages to users. In this study, malwares that targeting smart phones were detected by using static, dynamic and hybrid analysis methods. In the static analysis, feature extraction was made in 9 different categories. These attributes are categorized under the titles of requested permissions, intents, Android components, Android application calls, used permissions, unused permissions, suspicious Android application calls, system commands, internet addresses. The obtained features were subjected to dimension reduction with principal component analysis and used as input to the deep neural network model. With the established model, 99.38% accuracy rate, 99.36% F1 score, 99.32% precision and 99.39% sensitivity values were obtained in the test data set. In the dynamic analysis part of the study, applications were run on a virtual smartphone, and Android application calls with strategic importance were obtained by hooking. The method called hybrid analysis was applied by combining the dynamically obtained features with the static features belonging to the same applications. With the established model, 96.94% accuracy rate, 96.78% F1 score, 96.99% precision and 96.59% sensitivity values were obtained in the test data set.


Sign in / Sign up

Export Citation Format

Share Document