• Title/Summary/Keyword: Android application

Search Result 795, Processing Time 0.04 seconds

Implementation of Korean TTS Service on Android OS (안드로이드 OS 기반 한국어 TTS 서비스의 설계 및 구현)

  • Kim, Tae-Guon;Kim, Bong-Wan;Choi, Dae-Lim;Lee, Yong-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2012
  • Though Android-based smart phones are being released in Korea, Korean TTS engine is not built on them and Google has not announced service or software developer's kit related to Korean TTS officially. Thus, application developers who want to include Korean TTS capability in their application have difficulties. In this paper, we design and implement Android OS-based Korean TTS system and service. For speed, text preprocessing and synthesis libraries are implemented using Android NDK. By using Java's thread mechanism and the AudioTrack class, the response time of TTS is minimized. For the test of implemented service, an application that reads incoming SMS is developed. The test shows that synthesized speech are generated in real-time for random sentences. By using the implemented Korean TTS service, Android application developers can transmit information easily through voice. Korean TTS service proposed and implemented in this paper overcomes shortcomings of the existing restrictive synthesis methods and provides the benefit for application developers and users.

Development of A Pilot Android Application for Location-based Mobile Agricultural Information System (위치기반 모바일 농업정보시스템 구축을 위한 안드로이드 애플리케이션 시험 개발)

  • Kim, Sang Min;Jang, Min-Won
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.4
    • /
    • pp.277-284
    • /
    • 2014
  • Recently the use of smart phones and mobile devices is increasing rapidly, data search and retrieval in the mobile environments are generalized. There are only few mobile applications available in the area of agriculture while huge amount of new applications are developed and uploaded. The purpose of this study was to develop the android based mobile application for providing agricultural infrastructure and disaster information. The mobile application was designed through the database establishment and management system, server management system, and mobile application development. The database is composed of weather data, agricultural infrastructure data, and agricultural disaster data. By developing the mobile application which provides agricultural infrastructure information, it is expected to improve the accessibility to agricultural information and mitigate the agricultural disaster damages.

A Study on the Security Vulnerability for Android Operating System (안드로이드 운영체제의 보안 취약점에 관한 연구)

  • Cho, Hee-Hoon;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.224-226
    • /
    • 2015
  • Recently, Android-based mobile devices has increased. Thus increasing market share of the Android operating system. However, in the case of the Android operating system, it has the relatively large number of security vulnerabilities Unlike other closed operating systems. Most Android application requires the identity of the mobile device or over-authorization approval. This information can be a security threat. In addition, in the event of a security problem because obtaining the user's consent during the installation of the application is the user responsible. If these problems persist, loss of reliability of the user operating system, as well as to feel a resistance when using an Android application. In this paper, we investigate a security vulnerability in the Android operating system, and proposed countermeasures.

  • PDF

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.

Solutions for Adjusting SELinux To Android-Powered Devices (안드로이드 응용 단말기를 위한 SELinux 환경설정 방법)

  • Vu, Anh-Duy;Han, Jea-Il;Kim, Young-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.565-568
    • /
    • 2011
  • Google Android framework consists of an operating system and software platform for mobile devices. Using a general-purpose Linux operating system in mobile device has some advantages but also security risks. Security-Enhanced Linux (SELinux) is a kernel-based protection approach which can help to reduce potential damage from successful attacks. However, there are some challenges to integrate SELinux in Android. In this research, we do a study on how to do the integration and find out four challenges. The first one is that the Android file system (yaff2) does not support security namespace for extended attribute (xattr) which is required by SELinux. The second one is that it's difficult to apply SELinux policy to Dalvik process on which an Android application runs on. The third one is that Android lacks methods, tools and libraries to interact with SELinux. The last one is how to update the SELinux policy automatically when installing or removing an application. In this paper, we propose solutions for the above limitations that make the SELinux more adaptive and suitable for Android framework.

  • PDF

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

Development of Educational Application for Physical Computing using Android Smartphone (안드로이드 스마트폰을 활용한 피지컬 컴퓨팅을 위한 교육용 앱의 개발)

  • Kim, Tae-Woo;Chun, Seok-Ju
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.6
    • /
    • pp.639-649
    • /
    • 2018
  • Physical computing, a concrete operational activity using tools, can help children to understand principles of computer science by observing interactions between a computer and the real world directly. This study aims to design and develop an android application to utilize students' smart phones as a tool of physical computing education. The application includes one class designed to collect data using android smart phone sensors and another designed to transfer the data to a computer which students can use to learn programming. The physical computing application can be used to help students understand the principles of computer science more easily in schools not equipped with physical computing tools.

Development of an authoring tool for Android applications without programming (프로그래밍이 없는 Android application 제작 툴 개발)

  • Park, Ju-Yeon;Park, Yi-Keun;Park, Seong-Mo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.137-140
    • /
    • 2012
  • 본 논문에서는 소프트웨어 제작 경험이 없는 사용자들이 쉽게 application을 만들고 이를 스마트폰에 설치해 사용할 수 있도록 하는 Android 기반의 application 제작 툴을 개발하였다. 개발된 툴을 이용하여 전화번호부, 사진첩, 100일 기념 application을 제작했고 스마트폰에서 동작을 확인하였다. 본 논문에서 개발된 툴을 이용하면 사용자는 프로그래밍 없이도 화면 구성 및 여러 동작을 구현해내고 스마트폰에 부착되어 있는 센서들을 활용하는 application 을 쉽게 제작할 수 있다.

  • PDF

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.