The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile applications are usually developed in a native way, using languages and APIs specific for a given platform, hindering the portability. As an alternative, web technologies as JavaScript and PHP have been employed enabling a same implementation to be executed in different mobile platforms without any recompilation or recoding process. This paper compares the efficiency of Android applications...
This paper introduces a fitness data management system based on the Android platform for the strength fitness equipment, which can display, storage and mange fitness data. The server for this system is Tomcat and the mobile terminal's operating system is Android. App installed on the terminal interact with the database through HTTP transport protocol, which enable the visual management for fitness...
It is well known that the fragmentation of Android ecosystem has caused severe compatibility issues. Therefore, for Android apps, cross-platform testing (the apps must be tested on a multitude of devices and operating system versions) is particularly important to assure their quality. Although lots of cross-platform testing techniques have been proposed, there are still some limitations: 1) it is...
With the development of technology, smart phones and tablets had begun to integrate into the people's working, in order to protect the development of enterprisesmobile device management has become an essential part of the enterprise. This study designs and implements an enterprise mobile device management system that based on AOSP (Android Open Source Project) and SELinux, by analyzing the control...
Middleboxes are pervasive in today's Internet as they are deployed for an increasing number of reasons. An example is the network address translation (NAT), one of the first task to be performed to cope with the lack of IPv4 addresses. Recently the landscape for NATs has become even more crowded, especially in mobile networks, mainly due to the impossibility of IPv6 to be a large-scale solution to...
Our work presents a methodology and a tool to optimize Android applications using mobile computation offloading techniques. Our demo provides a study about the compatibility of being offloaded of Android methods and a methodology to autonomously classify Android methods based on their functions.
Mobile code offloading is a relatively well known proposal for enhancing the capabilities of mobile platforms by migrating resource intensive tasks to resource rich surrogates hosted in the cloud. Yet, most of the research in the area has been focused on theoretical gains achieved through custom OS versions in ideal scenarios. This paper presents MobiCOP, a new code offloading platform that seeks...
Privacy in mobile apps is a fundamental aspect to be considered, particularly with regard to meeting end user expectations. Due to the rigidities of the Android permission model, desirable trade-offs are not allowed. End users are confined into a secondary role, having the only option of choosing between either privacy or functionalities. This work proposes a user-centric approach to the flexible...
The consumption of banking applications are more and popular on Android devices but it is not secure. To make secure on those confidential application such as banking, business application and personal data, password is provided to enhance privacy. Nowadays those passwords are easily usurped by hackers through shoulder side attacks or observing videos. To overcome from this inconveniences of accessing...
Monitoring based Mobile applications have been developed as the improvement of portable figuring and correspondence innovations. Mobile computing technologies enable the mobile users to make, get to, process, store and impart data without being obliged to a solitary area. The availability of Mobile computing technologies and smart phones gives new possibilities for a continuous monitoring of Aqua...
Large-scale deployments of IoT devices are subject to energy and performance issues. Fortunately, offloading is a promising technique to enhance those aspects. However, several problems still remain open regarding cloud deployment and provisioning. In this paper, we address the problem of provisioning offloading as a service in large-scale IoT deployments. We design and develop an AutoScaler, an essential...
Android inherited its core security from the Linux operating system where applications run with different unique system identities. Another level of security based on “permission” model is present in Android, for controlling the accessibility of resources and operations that a given process can execute. Applications with no explicit permission request should not be able to influence the user experience...
Traditionally, when someone needs to find a boarding house or other room rental, he/she will contact the boarding house's manager via telephone and go to the place directly. This activity takes time and effort. To make it easier, android application is developed to optimize the process. Chat feature and push notification are important features of the application to enable users to get additional and...
One of the primary concerns that the developers of mobile banking applications should strive to is to ensure the security of user information originating from any of these applications. However, implementing even basic security features, like performing encryption on user data or using HTTPS while connection establishment, on such mobile applications, is often found to be absent either due to the...
Modern mobile communication technology had solved many problems for business and individuals. Modern open source android applications are featured individually. The integration of such applications will be essential for team managers or seniors. Many trials of integration do exist such as TripIt, Gist, TouchDown and iSolve, as an example. In this paper we introduced an integrated third party application...
In this paper, the development of a driver deployment and communication system for a food delivery service company is discussed. The client company seeks to improve its infrastructure by implementing new system over its existing system that utilizes traditional communication methods. By using various cloud-based server technologies, we were able to deliver a system that fulfilled all the requirements...
Push notification is a mechanism that allows individuals to receive updated information quickly. Push notification delivery needs to be effectived and has to be paid attention to time zone differences between countries in order to generate time-appropriate notifications. This push notification system was developed using distributed event-based system approach. The research methodology consists of...
Botnets have fully integrated and adapted in mobile devices. Security of mobile devices are not designed to detect threats such as botnets. This allows botnets to infect devices and go unnoticed. In this paper we propose an enhanced botnet detection technique called “Logdog” for mobile devices using log analysis. Our approach relies on analyzing logs of mobile devices to find evidence of botnet activities...
In the latest years, we observed an exponential growth of the market of the mobile devices. In this scenario, it assumes a particular relevance the rate at which mobile devices are replaced. According to the International Telecommunicaton Union in fact, smart-phone owners replace their device every 20 months, on average. The side effect of this trend is to deal with the disposal of an increasing amount...
HTML5 mobile apps are subject to code injection attacks in which malicious code can be injected through various channels and then executed. This paper presents an environment for scanning potential code injection vulnerabilities in HTML5 Android apps. Our environment performs a black-box test that injects traceable HTML tags into an app running on a hardware device or an emulator through internal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.