android operating system
Recently Published Documents


TOTAL DOCUMENTS

299
(FIVE YEARS 122)

H-INDEX

8
(FIVE YEARS 1)

2022 ◽  
Vol 2 (2) ◽  
pp. 104-111
Author(s):  
Ahmad Fatoni ◽  
Muhamamd Zainuddin

Indonesia is one of the countries with the largest population in the world. Nearly 85% of Indonesia's population  is Muslim. One of the problems faced by the majority of the Indonesian population, especially those who are  Muslim, is the problem of the distribution of inheritance rights. Many Muslims no longer use the inheritance distribution system according to Islamic Shari'a due to the lack of heirs and lack of knowledge about the distribution of inheritance rights according to Islam so that inheritance issues are often a trigger for disputes that lead to flattening family relations. On the other hand, currently the technology that is developing rapidly is Android technology. Almost everyone has an Android-based mobile phone. Android itself is an operating system that runs on smartphones and adjusts specifications from low-end to high-end classes. Almost all vendors are currently developing their products with the Android operating system because the demand is increasing sharply. Based on the problems and conditions above, an expert system application for the distribution of inheritance based on Islamic law based on Android was made with the forward chaining method, which can help solve the problems faced by the community above


2022 ◽  
Vol 6 (2) ◽  
pp. 39-43
Author(s):  
Darius Andana Haris ◽  
Jeanny Pragantha ◽  
Carmello Fabrian Husen

“Full Metal Parabellum” is a three-dimensional rail shooter game for smartphone with an Android Operating System. This game was created using Unity 3D game engine for Android platform. In this game, player will have to defeat all enemies in every stages. Player can move the in-game camera and aim by moving the smartphone around. This game is tested by black box testing, alpha testing, and beta testing with a survey distributed to 30 respondents. The survey shows that Full Metal Parabellum is a fun game that easy to play, and the gyroscope feature that was implemented in this game is working as planned.


2021 ◽  
Vol 4 (4) ◽  
pp. 118-122
Author(s):  
Tan Kooi Lim ◽  
Ahmad Zumali Mohammad ◽  
Mohd Noor Bin Ismail

This Basic Arduino Learning Kit in Robotics is developed to help someone who wants to learn the basic concepts of Arduino and its operation in the field of robotics which is becoming increasingly important in our daily lives. In this learning kit, it provides three practical works that allow students to deepen their knowledge of the Arduino Uno microcontroller in robotics step by step. In Practical Work 1, students are exposed to the experiment of lighting three LED lights with pattern of running lights and flashing lights. In Practical Work 2, students are exposed to measurement work using ultrasonic detector and displaying its reading on a computer screen and on the screen of a mobile phone with the Android operating system via a Bluetooth module. In Practical Work 3, students are shown how to build a three -wheeled prototype robot and how to control the robot using a mobile phone with the Android operating system. The effectiveness of this learning kit has been tested in a learning workshop on 21 Pre-Diploma students of the Session of June 2020 Polytechnic of Sultan Mizan Zainal Abidin and has shown very encouraging feedback.


Author(s):  
Mahmut Tokmak ◽  
Ecir Uğur Küçüksille ◽  
Utku Köse

In today's world that called technology age, smartphones have become indispensable for users in many areas such as internet usage, social media usage, bank transactions, e-mail, as well as communication. The Android operating system is the most popular operating system that used with a rate of 85.4% in smartphones and tablets. Such a popular and widely used platform has become the target of malware. Malicious software can cause both material and moral damages to users. In this study, malwares that targeting smart phones were detected by using static, dynamic and hybrid analysis methods. In the static analysis, feature extraction was made in 9 different categories. These attributes are categorized under the titles of requested permissions, intents, Android components, Android application calls, used permissions, unused permissions, suspicious Android application calls, system commands, internet addresses. The obtained features were subjected to dimension reduction with principal component analysis and used as input to the deep neural network model. With the established model, 99.38% accuracy rate, 99.36% F1 score, 99.32% precision and 99.39% sensitivity values were obtained in the test data set. In the dynamic analysis part of the study, applications were run on a virtual smartphone, and Android application calls with strategic importance were obtained by hooking. The method called hybrid analysis was applied by combining the dynamically obtained features with the static features belonging to the same applications. With the established model, 96.94% accuracy rate, 96.78% F1 score, 96.99% precision and 96.59% sensitivity values were obtained in the test data set.


2021 ◽  
Vol 4 (6) ◽  
pp. 425-439
Author(s):  
Sukri Sukri ◽  
Ramadhan Putra ◽  
Wita Yulianti

The number of motorized vehicles continues to increase, this will be directly proportional to the number of people who experience motorcycle damage when driving on the highway, such as leaking tires or burst tires. For motorists who do not know the surrounding area when a motorcycle tire is damaged, of course it will be difficult to find the nearest tire patch. In this study, an Android application will be developed to map and find the location of motorcycle tire patches in Bukit Raya District. This application will provide location-based services to users. With this application, users will get information in the form of a map showing the location of the nearest tire patch. Based on the test results, the tire patch location mapping application that was built is able to display the locations of the tire patches along with information on the travel route from the user's location to the nearest selected tire patch location. This application was developed on the Android operating system because Android provides an open platform for developers to create their own applications and Android is one of the operating systems that are widely used by smartphones that are growing rapidly now. This application is expected to help users who want to find the location of the tire patch along with information from the tire patch and the closest route to the tire patch location so that it is more efficient in terms of time


2021 ◽  
Vol 6 (2) ◽  
pp. 83-89
Author(s):  
Valerii Bielik ◽  
◽  
Yuriy Morozov ◽  
Mykola Morozov

The cyber-physical systems take the major part of any system that help users to interact with environment processes. Cyber-physical systems are intelligent systems, which include networks of physical and computing components that interact on internal level. The basis for the development of various models of cyber-physical systems are the using of measuring instruments and their software. Measuring instruments are necessary to control technological parameters processes and the environment. The purpose was to investigate the features of interaction with sensors, to identify the most useful of them in use, to classify types and describe their capabilities for future use in developing of cyber-physical systems. The relevance of the choice of this topic is that mobile and cyber-physical systems occupy a significant place in modern life. The systems that help the user to simplify daily tasks are of maximum benefit. These tasks can be attributed to the tasks of the environment as they exist and are performed in it. Especially cyber-physical systems that interact with the environment have the ability to solve such problems. Sensors act as a tool of interaction, the so-called bridge between the environment and the program. Sensors collect and provide information for further processing and use in solving problems.


2021 ◽  
Vol 50 (4) ◽  
pp. 786-807
Author(s):  
Alen Salkanovic ◽  
Sandi Ljubic ◽  
Ljubisa Stankovic ◽  
Jonatan Lerga

This paper evaluates the performances of numerous encryption algorithms on mobile devices running the Android operating system. The primary objective of our research was to measure and compare the relative performances of tested algorithm implementations (Data Encryption Standard (DES), 3DES, Advanced Encryption Standard (AES), ChaCha20, Blowfish, and Rivest Cipher 4 (RC4)) on the Android platform. The algorithms were compared in terms of CPU utilization by measuring the time required to encrypt and decrypt variable size text files. Besides evaluating the six common symmetric encryption ciphers, a comparison has been conducted for several Password-Based Encryption (PBE) algorithms. Diverse cipher transformations were evaluated for each algorithm by utilizing various feedback modes and padding schemes. Two smartphone devices were used for testing, with different versions of the Android operating system and hardware specifications. The summarized performance outcomes for various cipher transformations are presented to demonstrate the effectiveness of each algorithm.


Author(s):  
Valentyna Fastovets

Problem. The subject of the study is an interactive mobile application in Java. To perform this work, the following tasks were set: analysis of programming environments and languages of development;  analysis of methods for developing the logic and interface of the mobile application; development of an interactive mobile application in Java. Goal. The aim of the work is to develop a mobile application for learning a foreign language for the Android operating system, whose interface and logic will be modern, user-friendly and accessible to users. Methodology. The general concept of a mobile application for learning a foreign language is as follows: learning a foreign language offline, versatile learning (words, grammar), the presence of a motivational unit, simple design. The object of research is the process of building an interactive mobile application in Java for the Android operating system. In the course of the work, a study of programming languages and environments for the development of mobile applications was conducted. Programming languages such as: Java, C ++, C # were considered. Programming environments such as Android Studio, NetBeans and Eclipse were also analyzed. As a result, the Java programming language and Android Studio programming environment were chosen for the development of the mobile application. Two types of markup were selected: LinearLayout; ConstraintLayout. Results. The mobile application for learning a foreign language for the Android operating system was developed in Android Studio in two programming languages: Java (logic) and XML (interface). The aim to provide the application with modern interface and logic, to make it user-friendly and accessible to users was completed. Originality. Contribution has been made to the field of using smartphones for learning foreign languages. The sphere of using smartphones has been expanded with the use of all modern trends to the creation of mobile applications for learning foreign languages. Practicalvalue. Considering that the number of potential users will only increase in the nearest future, the developed mobile application for learning a foreign language is an ideal platform for educating those who want to develop and learn foreign languages for themselves, as well as for work, communication and travel.


2021 ◽  
Vol 10 (6) ◽  
pp. 3444-3451
Author(s):  
Mufadhol Mufadhol ◽  
Budi Hartono ◽  
Sulartopo Sulartopo ◽  
Maya Utami Dewi ◽  
Danang Danang ◽  
...  

At this time, the Covid-19 pandemic has not been finished so all activities and expenditure of funds must be economical. On the each building will be required electricity resources as a means for lighting the room. Reduced activities carried out outside the room make people carry out activities indoors, this results in a significant increase in electricity consumption for lighting. PT. PLN as the provider in Indonesia of electricity services for the community experiences a shortage of electricity resources and most of the electricity resources are used for lighting purposes. Indonesia as a developing country has a very large of population growth, so it requires many buildings as a place to live or a place of business and other activities. This paper will be discussion how a smartphone with an Android operating system can be used to determining the lighting requirements using the Ionic Framework and Rule Based Expert Systems. Using this application system, so electricity to lighting can be optimal and not too wasteful, which in turn can save on the use of electrical energy resources and can save of the cost.


2021 ◽  
Author(s):  
Χρήστος-Γιάσερ Λύβας

Η πλατφόρμα Android αποτελεί το κυρίαρχο λειτουργικό σύστημα για κινητές και IoT συσκευές. Η ευρεία διάδοση του οφείλεται στην ελευθερία χρήσης που δίνετε στους κατασκευαστές κινητών συσκευών (Original Equipment Manufacturers - OEMs) να το χρησιμοποιούν ως το κύριο λειτουργικό σύστημα για τις συσκευές τους. Αφενός μεν, το μοντέλο ασφαλείας του Android προστατεύει τους χρήστες από τις απειλές των συμβατικών λειτουργικών συστημάτων όπως macOS, Windows, Linux, κλπ. Αφετέρου δε, στο Android εμφανίζονται αδυναμίες εξαιτίας των ιδιαιτεροτήτων της αρχιτεκτονικής του. Η παρούσα διδακτορική διατριβή επικεντρώνεται στο λειτουργικό σύστημα Android, τους μηχανισμούς ασφάλειας του, τις απειλές του, τα τρωτά σημεία του, και την αποτροπή σειράς επιθέσεων σε αυτό. Αρχικά διερευνάται το μοντέλο ελέγχου αδειών (permission model) του λειτουργικού συστήματος για τον περιορισμό της πρόσβασης σε ευαίσθητους πόρους από εφαρμογές και τη "σχέση" του με τις μεθόδους API (Application Programming Interface) του Android framework για την κατασκευή των συσχετίσεων αδειών (permissions) και των μεθόδων του framework. Η συσχέτιση μεταξύ μιας μεθόδου API του Android framework και ενός permission μπορεί να βρεθεί μέσω του documentation των μεθόδων του συστήματος Android. Ωστόσο, όχι μόνο το documentation μπορεί τυχαία να στερείται πληροφοριών αλλά και το Android διαθέτει undocumented και private μεθόδους API. Το αποτέλεσμα της ανάλυσης ήταν το Dypermin, ένα εργαλείο ικανό να συσχετίσει μεθόδους API και permissions χωρίς να απαιτείται τροποποίηση του υποκείμενου λειτουργικού συστήματος. Για να επιτευχθεί αυτό, το Dypermin αξιοποιεί τις εξαιρέσεις ασφαλείας (runtime Java security exceprtions) κατά τη διάρκεια εκτέλεσης μεθόδων του Android Framework και τη τεχνική reflection της γλώσσας προγραμματισμού Java για την προσπέλαση οποιασδήποτε προστατευμένης (private) μεθόδου API του Android Framework. Επιπλέον, το Dypermin, σε αντίθεση με άλλες σχετικές μεθόδους, βασίζεται σε πληροφορίες κατά τους χρόνους εκτέλεσης των μεθόδων API του Android framework, πράγμα που σημαίνει ότι δεν δημιουργεί ψευδώς θετικές (false positives) συσχετίσεις. Το Dypermin αξιολογήθηκε σε διαφορετικές εκδόσεις Android και τα αποτελέσματα του συγκρίθηκαν με αντίστοιχα αποτελέσματα άλλων προτεινόμενων μεθόδων για την ανάδειξη της αποτελεσματικότητα του για οποιαδήποτε έκδοση του συστήματος. Παράλληλα εξετάζονται οι επιθέσεις activity, και task hijacking στο λειτουργικό σύστημα Android που μπορούν να έχουν μεγάλο αντίκτυπο για τους χρήστες, καθώς κακόβουλες εφαρμογές που εκμεταλλεύονται τέτοιες αδυναμίες μπορούν να τους εξαπατήσουν και να αποκτήσουν πρόσβαση σε ευαίσθητα δεδομένα τους και λογαριασμούς τους. Αναμφίβολα, αυτές οι απειλές έχουν μεγάλη σημασία και για τη διεξοδική μελέτη τους, δημιουργήθηκε το εργαλείο Anactijax, ικανό να εντοπίσει συγκεκριμένες διαμορφώσεις στις οποίες μπορεί να είναι ευάλωτη μια εφαρμογή. Επιπλέον, προτάθηκε ένας μηχανισμός αποτροπής σε επίπεδο λειτουργικού συστήματος με όνομα TaskAuth που ελέγχει και περιορίζει την πρόσβαση των εφαρμογών σε activities. Το TaskAuth λειτουργεί με διαφάνεια τόσο για τους χρήστες όσο και για τους προγραμματιστές καθώς αξιοποιεί τις ενσωματωμένες υπογραφές που φέρουν οι εφαρμογές Android. Η αποτελεσματικότητα του TaskAuth αξιολογήθηκε σε σχέση με διάφορες ευάλωτες διαμορφώσεις που ανέδειξε το Anactijax και τα αποτελέσματα έδειξαν ότι η εφαρμογή της προτεινόμενης λύσης δεν επηρεάζει τη διαχείριση των tasks του Android ούτε επιβαρύνει τους χρόνους εκτέλεσης των εφαρμογών. Τέλος, εξετάζονται οι απειλές intent redirection and intent hijacking στο σύστημα Android. Αυτές οι απειλές μπορούν να επηρεάσουν την εμπιστευτικότητα και την ακεραιότητα των δεδομένων των χρηστών, καθώς κακόβουλες εφαρμογές που εκμεταλλεύονται τέτοιες ευπάθειες σε άλλες εφαρμογές μπορούν να εξαπατήσουν τους χρήστες και να αποκτήσουν πρόσβαση ή να παραποιήσουν τα δεδομένα τους. Έτσι, μελετήθηκαν διεξοδικά οι απειλές intent redirection and intent hijacking και για την αποτροπή τους προτάθηκε ένας μηχανισμός προστασίας των χρηστών σε επίπεδο λειτουργικού συστήματος με όνομα IntentAuth που δίνει τη δυνατότητα στους χρήστες να καθορίζουν δυναμικές πολιτικές στα σύνολα των εφαρμογών που επιτρέπουν να αλληλοεπιδρούν μεταξύ τους. Επιπλέον, βάσει του μοντέλου εμπιστοσύνης που ο κάθε χρήστης καθορίζει για τις εγκατεστημένες εφαρμογές του, ο μηχανισμός IntentAuth μπορεί να κρυπτογραφήσει τα μεταδιδόμενα δεδομένα της διαδιεργασιακής επικοινωνίας του συστήματος μεταξύ εφαρμογών με implicit intents χωρίς επιβάρυνση του χρόνου εκτέλεσης.


Sign in / Sign up

Export Citation Format

Share Document