scholarly journals DEVELOPING A CLIENT-SERVER APPLICATION FOR SELECTING AN EMPLOYEE ON THE ANDROID PLATFORM

2020 ◽  
Vol 71 (3) ◽  
pp. 268-271
Author(s):  
N. Uzakbayev ◽  
◽  
М. Yerekesheva ◽  

Android is a relatively new operating system that has become very popular in the mobile device market in a short time. Operating system developers must adhere to the following basic requirements: the new platform must be based on open standards, which will reduce development costs and provide mobile application developers with access to all system functions to create applications. One of the main advantages of the Android platform is its transparency. The Android operating system is open source and free. This allows users to access the source code and understand how application properties and functions are implemented. This article describes the software, structure, functionality, and scope of the client-server application for personnel selection created on the Android platform.

2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Bambang Kelana Simpony

Abstract - Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions setting do not need to be done one by one manually. Because in a computer network course there are many collection of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and send reports to the Sender process execution. While Sender function to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network. Keywords: Registry, Winsock API, TCP/IP, Socket, Protocol, Networking Abstrak - Pengaturan hak akses di suatu komputer sangat diperlukan. Hal ini merupakan salah satu upaya agar konfigurasi sistem tidak mudah dirubah atau diganti pengaturannya oleh pengguna. Dengan adanya jaringan komputer, tentunya pengaturan hak akses tidak perlu dilakukan satu-satu secara manual. Karena dalam suatu jaringan komputer pastinya terdapat banyak kumpulan komputer yang saling terhubung. Sehingga pengaturan hak akses bisa menggunakan sistem aplikasi client-server agar pembatasan hak akses bisa dilakukan dengan efektif. Sebagai implementasi aplikasi client-server dapat dibuat dengan menggunakan bahasa pemrograman Visual Basic 6.0. Bahasa ini sudah bisa mengakses socket pada sistem operasi Windows yang diberi nama Winsock API yang sudah mendukung protokol TCP/IP. Protokol ini banyak dipakai karena kehandalannya dalam pemrograman aplikasi client-server. Aplikasi ini terbagi menjadi dua aplikasi utama, yaitu client dengan nama program Receiver dan Server dengan nama program Sender. Receiver berfungsi menerima instruksi pembatasan hak akses dari Sender dan mengirimkan laporan hasil proses eksekusinya ke Sender. Sedangkan Sender berfungsi untuk mengirim instruksi pembatasan hak akses melalui Registry ke Receiver. Dan setelah di uji, aplikasi ini dapat memblok fitur-fitur penting yang ada di sistem operasi Windows. Sehingga diharapkan dengan adanya aplikasi ini dapat membantu dalam pengaturan hak akses di suatu jaringan komputer. Kata Kunci : Registry, Winsock API, TCP/IP, Soket, Protokol, Jaringan


2018 ◽  
Vol 1 (2) ◽  
pp. 1
Author(s):  
Dwi Wijonarko ◽  
Rizal Fathoni Aji

Mobile application development was growing very rapidly along the increase of mobile devices and technology. One of the problems faced is the different platforms operating system on the market, it is make more difficult development process and requires a lot of cost. An application must be built at least 2 (two) types according to the current popular operating system (Android and iOS) in order to be able to get large application users.Hybrid Application is an application development model that combines native application approach and web application to be a mobile application. It can be converted into more than one mobile operating system platform later. The advantages of hybrid applications is the rapid development process because one source code can run on more than one mobile operating system, while the disadvantage is it use more of resources than the application built with the original language of the operating system platform used.Adobe Phonegap (Phonegap) and React Native are two frameworks that can be used to build mobile hybrid applications. In this study will be compared in terms of development and application results that run on Android devices from each framework by using case studies Aplikasi Jadwal dan Nilai pada Politeknik Kota Malang.


2018 ◽  
Vol 15 (1) ◽  
pp. 112-119
Author(s):  
L. A. Korneva ◽  
P. B. Khorev

When creating software systems developers need to choose the most effective design solutions, which may make frameworks, created by other developers. Such a framework can be used as a basis for new applications. Not all available client-server application developers frameworks give due regard to the safety of such applications. So there is a need to develop a framework to create a secure client-server application. To create such a framework in the Java programming language is selected. This article provides a set of components that are required to create a framework of information security-oriented Web applications.


Repositor ◽  
2020 ◽  
Vol 2 (8) ◽  
Author(s):  
Septian Heri Alfiansyah ◽  
Dharma Surya Pradana ◽  
Evi Dwi Wahyuni

AbstrakAplikasi pemesanan lapangan futsal Champion Malang merupakan sebuah sistem informasi melalui platform android yang digunakan user atau costumer futsal champion untuk melakukan pemesanan lapangan secara online tanpa harus menelepon karyawan lapangan, ataupun mendatangi lokasi setiap cabang champion futsal, dimana aplikasi ini dapat membantu user untuk melihat dan menentukan jadwal sewa yang nantinya akan dipesan mulai dari lapangan, tanggal pesan, jam pesan,  hingga durasi pemakaian lapangan yang disajikan melalui tampilan platform android, guna memudahkan proses penyewaan lapangan sehingga dapat meningkatkan produktifitas layanan jasa penyewaan pada cabang futsal Champion Malang. Dalam penelitian ini penulis merancang dan membangun aplikasi android pemesanan lapangan futsal pada champion futsal Malang  menggunakan metode Waterfall melalui 5 (lima)  tahapan yaitu requirement analysis, design, implementasi, testing dan, maintenance, aplikasi ini dibangun menggunakan Apache Cordova  sehingga memungkinkan pengembang aplikasi mobile  untuk mengakses fungsi perangkat asli (native)  seperti kamera atau accelerometer dengan  menggunakan teknologi web standar seperti HTML5, CSS3, dan JavaScript untuk pengembangan cross- platform.Abstract Application of Champion Malang futsal field rental is an information system that is android based platform used by users or customer futsal champions to order fields via online without having to call field employees or visit the location of each futsal champion branch. This application can help users to see and determine desired schedule; they are the field itself, date of exertion, time of order, to the duration of field usage that is presented through the display of the Android platform, the further function is to facilitate the field leasing process so it can increase the productivity of rental services at Champion Malang futsal. In this study, the researcher designed and built an android application ordering futsal courts at Malang futsal champion using the Waterfall method through 5 (five) stages; they are requirement analysis, design, implementation, testing and maintenance, this application was built using Apache Cordova to enable mobile application developers to access native device functions such as a camera or accelerometer with using standard web technologies such as HTML5, CSS3, and JavaScript for cross-platform development.


2020 ◽  
Vol 1 (2) ◽  
pp. 172-177
Author(s):  
Adrian Sean Bein ◽  
Alexander Williams

Permissions setting on a computer is necessary. This is an effort that is not easy to change the system configuration or settings changed by the user. With a network of computers, of course, permissions settings do not need to be done one by one manually. Because in a computer network course there are many collections of computers connected together. Permissions setting so that the system can use the client-server applications that access restrictions can be done effectively. As the implementation of client-server applications can be created using Visual Basic 6.0. This language has been able to access the socket on the Windows operating system, named Winsock API that supports TCP / IP. This protocol is widely used because of the reliability of client-server application programming. The application is divided into two main applications, namely the client and server program name with the name of the Receiver Sender program. Receiver function receives instructions restriction of access rights Sender and sends reports to the Sender process execution. While Sender functions to send instructions restrictions permissions via the Registry to the Receiver. And after the test, the application can block important features available in the Windows operating system. So it is expected that these applications can help in permissions setting on a computer network.


Author(s):  
Nezer Jacob Zaidenberg ◽  
Raz Ben Yehuda ◽  
Roee Shimon Leon

Many scenarios such as DRM, payments, and homeland security require a trusted and verified trusted execution environment (TEE) on ARM. In most cases such TEE should be available in source code mode. The vendor cannot conduct code review and ensure that the operating system is trustworthy unless source code is available. Android and other rich execution environments (REEs) support various TEE implementations. Each TEE implementation has its own unique way of deploying trusted applications and features. Most TEEs in ARM can be started at TrustZone™ or Hyp (Hypervisor) mode. Choosing a proper TEE operating system can be a problem for trusted application developers and hardware vendors. This article discuss the hypervisor vs. TrustZone™ implementation dilemma. Furthermore, the article surveys multiple ARM TrustZone™ TEE solutions and ARM virtualization solutions that are available today with source code. This article allows IoT vendors and SoC manufacturer to select a suitable TEE for their platform needs based on their criteria.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Sanggeun Song ◽  
Bongjoon Kim ◽  
Sangjun Lee

Due to recent indiscriminate attacks of ransomware, damage cases including encryption of users’ important files are constantly increasing. The existing vaccine systems are vulnerable to attacks of new pattern ransomware because they can only detect the ransomware of existing patterns. More effective technique is required to prevent modified ransomware. In this paper, an effective method is proposed to prevent the attacks of modified ransomware on Android platform. The proposed technique specifies and intensively monitors processes and specific file directories using statistical methods based on Processor usage, Memory usage, and I/O rates so that the process with abnormal behaviors can be detected. If the process running a suspicious ransomware is detected, the proposed system will stop the process and take steps to confirm the deletion of programs associated with the process from users. The information of suspected and exceptional processes confirmed by users is stored in a database. The proposed technique can detect ransomware even if you do not save its patterns. Its speed of detection is very fast because it can be implemented in Android source code instead of mobile application. In addition, it can effectively determine modified patterns of ransomware and provide protection with minimum damage.


2020 ◽  
Vol 16 ◽  
pp. 293-299
Author(s):  
Michał Jankowski ◽  
Maria Skublewska-Paszkowska

Mobile applications for the Android platform can be implemented using Java or C#. The article presents a comparison of the time performance of these languages when sending various text, image and video files in a mobile application. The tests were carried out using two mobile applications with identical functionalities. Based on the collected data, the server application calculated statistics, such as, for example, the time required to send 1MB of data depending on the file type and size. Based on the results obtained, it was proved that in the case of data transfer via a wireless network, an application written in Java is characterized by greater time efficiency than an analogous application written in C#.


Sign in / Sign up

Export Citation Format

Share Document