• Title/Summary/Keyword: Android based Application

Search Result 474, Processing Time 0.026 seconds

Implementation of multi-touching and application based touch interface using Infrared (적외선을 이용한 멀티 터치와 터치 인터페이스의 구현)

  • Yoo, Ki-Sun;Hong, Rok-Ji;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.928-934
    • /
    • 2010
  • In this paper, the method introduce for touching signals and run the application on the multi touch environment using infrared light. When the user touches the screen, the infrared camera make a movie the light and the light which made through image processing communicate from TUIO(Tangble User Interface Object) protocol to Application. this Program is using the delivery informations which are occurred the event to Application. The Application which use the touch can exchange the Andoroid Phone between Mobile picture supervision Application also this equipment introduces about the musical entertainment Application which play a music many users at the same time.

Implementation of GUI Flow Designer based on Android Platform (안드로이드 기반의 GUI 플로우 디자이너 구현)

  • Jo, Chung Gi;Youn, Hee Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.235-237
    • /
    • 2015
  • 본 논문에서는 안드로이드 애플리케이션 개발을 효과적으로 지원 할 수 있는 GUI Flow Designer for Android(GuiFA) 도구를 구현한다. GuiFA는 안드로이드 프로그램을 구성하는 액티비티들의 흐름을 한 눈에 파악 할 수 있는 기능을 제공할 뿐만 아니라 그것들의 흐름을 구현하는 소스코드를 생성해준다. 이러한 GuiFA의 기능을 사용하여 액티비티들의 흐름을 한 화면에 시각화시켜 효과적인 개발이 가능하고 생성된 코드를 이용하여 효율적으로 애플리케이션을 구현할 할 수 있다.

  • PDF

Development of Obesity Management Application Based on Android -Focused on BMI and Calculate Momentum- (안드로이드 기반 비만 관리 애플리케이션 개발 -BMI 및 운동량 산출을 중심으로-)

  • Song, Kyung-Chul;Hyun, Dong-Lim;Kim, Eun-Kil;Kim, Jong-Hoon
    • 한국정보교육학회:학술대회논문집
    • /
    • 2011.01a
    • /
    • pp.265-270
    • /
    • 2011
  • This paper is the study about application development for management obesity and personal health matters systematically based on Android smart phone system. Growing obesity problem for students organized by the lack of a device or program to manage at home has been favored as a serious problem. Currently developed smart phones has come into wide use by portable features and many applications. And to support populations of these features smart phones will be available for obesity management in your home without any equipment using. Accordingly, this paper is the study about application development for management obesity for growing students at home based on the latest smart phone platform Android.

  • PDF

Application Authentication via Various Distributors (안드로이드 로컬 마켓 인증 방안)

  • Han, Kyu-Suk;Shon, Tae-Shik
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.235-238
    • /
    • 2012
  • Google Android provides market based application distribution to provide ease use of application services. While openness of Android allows various ways of application distribution, including installation of unsigned application. such openness also invokes critical threats such as the spread of malwares and the illegal distribution of applications. In order to prevent such threats, several distributors use on-line authentication techniques by using mobile subscriber's information. However such methods also have limits that even legal users cannot use their purchased application in situations. Therefore, in this paper, we discuss such problems and provide some ideas of authentication method that allow users to use their purchased application when users change their status.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

An analysis of vulnerability and the method to secure on Android SNS applications from alteration of the code segments (안드로이드 기반 SNS 어플리케이션의 코드 변조를 통한 취약점 분석 및 보안 기법 연구)

  • Lee, Sang Ho;Ju, Da Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.213-221
    • /
    • 2013
  • According to the rapid growth of the number of SNS(Social Networking Service) applications based on Android OS, the importance of its security is also raised. Especially, many applications using KaKaoTalk platform has been released in these days, and these are top ranked in the relative markets. However, security issues on SNS applications have not been resolved clearly. Therefore, it is crucial to provide means to cope with the security threats posed by code-segment modification in the development stage of Android OS based SNS applications. In this paper, we analyze the security threats by modifying SNS application code segments and suggest effective security techniques.

Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism (안드로이드 권한과 브로드캐스트 인텐트 매커니즘의 사용 현황 및 보안 취약성 분석)

  • Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1145-1157
    • /
    • 2012
  • Google Android employs a security model based on application permissions to control accesses to system resources and components of other applications from a potentially malicious program. But, this model has security vulnerabilities due to lack of user comprehension and excessive permission requests by 3rd party applications. Broadcast intent message is widely used as a primary means of communication among internal application components. However, this mechanism has also potential security problems because it has no security policy related with it. In this paper, we first present security breach scenarios caused by inappropriate use of application permissions and broadcast intent messages. We then analyze and compare usage patterns of application permissions and broadcast intent message for popular applications on Android market and malwares, respectively. The analysis results show that there exists a characteristic set for application permissions and broadcast intent receiver that are requested by typical malwares. Based on the results, we propose a scheme to detect applications that are suspected as malicious and notify the result to users at installation time.

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.

A Study on the Application Method of GOF Design Pattern for Optimizing Android Devices (안드로이드 디바이스 최적화를 위한 GOF 디자인 패턴적용 방법에 대한 연구)

  • Jung, Woo-Cheol;Jeon, Mun-Seok;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.89-97
    • /
    • 2017
  • Recent Internet of Things(IoT), and in addition to wearable PC, such as software development methodologies based on a variety of object-oriented design and design patterns of GoF(Gang of Four) with OOP(Object-Oriented Programming) intended for portable devices. However, incorrect application design specification is that the higher the importance of the optimization of the program on the device because it can cause problems such as decreased operating speed, increase the memory occupancy and battery usage. In this paper, we propose an optimized design pattern based on the method of application, such as Android (Android) OS Strategy Pattern, State Pattern, Observer pattern. Test results show that the proposed scheme selection patterns can be selected to optimize the design pattern in the device that specification.

A User-Centric Response Time Analyzer for Improving User Experience of Android Applications (스마트폰 응용 프로그램의 사용자 경험 향상을 위한 사용자 중심 반응 시간 분석 도구)

  • Song, Wook;Sung, Nosub;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.5
    • /
    • pp.379-386
    • /
    • 2015
  • We propose a novel user-perceived performance optimization framework for the Android platform that takes advantage of the user-centric response time analysis. To this end, we propose a new definition of response time, which we call the user-centric response time, as a metric for the quality of user-perceived performance of the smartphone application. In this paper, we describe the design and implementation of an on-line user-centric response time analyzer for Android-based smartphones, which provides smartphone application developers with valuable insight for user-perceived performance optimization. We implemented the user-centric response time analyzer on the Android platform, version 4.0.4 (ICS) running on a Galaxy Nexus smartphone. From our experimental results, the proposed user-centric response time analyzer accurately estimates user-centric response times with an accuracy of 92.0% compared to manually measured times with less than 1% performance penalty. In order to evaluate the efficiency of the proposed framework, we were able to reduce the user-centric response time of the target application by up to 16.4% based on the evaluation results by the proposed framework.