976 resultados para Mahjong, Multiplayer, Mobile, Android, Java


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile devices can enhance undergraduate research projects and students’ research capabilities. The use of mobile devices such as tablet computers will not automatically make undergraduates better researchers, but their use should make investigations, writing, and publishing more effective and may even save students time. We have explored some of the possibilities of using “tablets” and “smartphones” to aid the research and inquiry process in geography and bioscience fieldwork. We provide two case studies as illustration of how students working in small research groups use mobile devices to gather and analyze primary data in field-based inquiry. Since April 2010, Apple’s iPad has changed the way people behave in the digital world and how they access their music, watch videos, or read their email much as the entrepreneurs Steve Jobs and Jonathan Ive intended. Now with “apps” and “the cloud” and the ubiquitous references to them appearing in the press and on TV, academics’ use of tablets is also having an impact on education and research. In our discussion we will refer to use of smartphones such as the iPhone, iPod, and Android devices under the term “tablet”. Android and Microsoft devices may not offer the same facilities as the iPad/iphone, but many app producers now provide versions for several operating systems. Smartphones are becoming more affordable and ubiquitous (Melhuish and Falloon 2010), but a recent study of undergraduate students (Woodcock et al. 2012, 1) found that many students who own smartphones are “largely unaware of their potential to support learning”. Importantly, however, students were found to be “interested in and open to the potential as they become familiar with the possibilities” (Woodcock et al. 2012). Smartphones and iPads could be better utilized than laptops when conducting research in the field because of their portability (Welsh and France 2012). It is imperative for faculty to provide their students with opportunities to discover and employ the potential uses of mobile devices in their learning. However, it is not only the convenience of the iPad or tablet devices or smartphones we wish to promote, but also a way of thinking and behaving digitally. We essentially suggest that making a tablet the center of research increases the connections between related research activities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tack vare bättre och bättre förutsättningar för utveckling av mobila applikationer, samt utbredning av internetbaserade tjänster, presenteras här ett underlag inför val av mobil utvecklingsplattform. De undersökta plattformarna är Android och Iphone på grund av deras växande utbredning på smartphonemarknaden. Studien presenterar förutsättningar för att utveckla webbtjänst-understödda applikationer för intern distribuering. Ett visuellt tilltalande användargränssnitt är också i fokus för den typen av applikation studien riktar sig mot.Vi har kommit fram till att Android är lättare att lära sig om man kommer ifrån en Java- eller .Netmiljö samt lättare att distribuera. Iphone har däremot bättre stöd för att utveckla grafiskt tilltalande applikationer. Båda plattformarna har dock bristfälligt stöd för kommunikation via webbtjänster. Detta resultat uppnåddes genom litteraturstudier, samt en fallstudie där vi utvecklade applikationer med fokus på just webbtjänstkommunikation, intern distribuering samt ett tilltalande användargränssnitt.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Att kunna gör en effektiv undersökning av det flyktiga minnet är något som blir viktigare ochviktigare i IT-forensiska utredningar. Dels under Linux och Windows baserade PC installationermen också för mobila enheter i form av Android och enheter baserade andra mobila opperativsy-stem.Android använder sig av en modifierad Linux-kärna var modifikationer är för att anpassa kärnantill de speciella krav som gäller för ett mobilt operativsystem. Dessa modifikationer innefattardels meddelandehantering mellan processer men även ändringar till hur internminnet hanteras ochövervakas.Då dessa två kärnor är så pass nära besläktade kan samma grundläggande principer användas föratt dumpa och undersöka minne. Dumpningen sker via en kärn-modul vilket i den här rapportenutgörs av en programvara vid namn LiME vilken kan hantera bägge kärnorna.Analys av minnet kräver att verktygen som används har en förståelse för minneslayouten i fråga.Beroende på vilken metod verktyget använder så kan det även behövas information om olika sym-boler. Verktyget som används i det här examensarbetet heter Volatility och klarar på papperet avatt extrahera all den information som behövs för att kunna göra en korrekt undersökning.Arbetet avsåg att vidareutveckla existerande metoder för analys av det flyktiga minnet på Linux-baserade maskiner (PC) och inbyggda system(Android). Problem uppstod då undersökning avflyktigt minne på Android och satta mål kunde inte uppnås fullt ut. Det visade sig att minnesanalysriktat emot PC-plattformen är både enklare och smidigare än vad det är mot Android.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Det mobila operativsystemet Android är idag ett ganska dominerande operativsystem på den mobila marknaden dels på grund av sin öppenhet men också på grund av att tillgängligheten är stor i och med både billiga och dyra telefoner finns att tillgå. Men idag har Android inget fördefinierat designmönster vilket leder till att varje utvecklare får bestämma själv vad som ska användas, vilket ibland kan leda till onödigt komplex kod i applikationerna som sen blir svårtestad och svårhanterlig. Detta arbete ämnar jämföra två designmönster, Passive Model View Controller (PMVC) och Model View View-Model (MVVM), för att se vilket designmönster som blir minst komplext med hjälp av att räkna fram mätvärden med hjälp av Cyclomatic Complexity Number (CCN). Studien är gjord utifrån arbetssättet Design & Creation och ämnar bidra med: kunskap om vilket mönster man bör välja, samt om CCN kan peka ut vilka delar i en applikation som kommer att ta mer eller mindre lång tid att testa. Under studiens gång tog vi även fram skillnader på om man anväder sig av den så kallade Single Responsibilyt Principle (SRP) eller inte. Detta för att se om separerade vyer gör någon skillnad i applikationernas komplexitet. I slutändan så visar studien på att komplexiteten i små applikationer är väldigt likvärdig, men att man även på små applikationer kan se skillnad på hur komplex koden är men också att kodkomplexitet på metodnivå kan ge riktlinjer för testfall.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since its establishment, the Android applications market has been infected by a proliferation of malicious applications. Recent studies show that rogue developers are injecting malware into legitimate market applications which are then installed on open source sites for consumer uptake. Often, applications are infected several times. In this paper, we investigate the behavior of malicious Android applications, we present a simple and effective way to safely execute and analyze them. As part of this analysis, we use the Android application sandbox Droidbox to generate behavioral graphs for each sample and these provide the basis of the development of patterns to aid in identifying it. As a result, we are able to determine if family names have been correctly assigned by current anti-virus vendors. Our results indicate that the traditional anti-virus mechanisms are not able to correctly identify malicious Android applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the past decade there has been massive growth of data on the internet. Many people rely on XML based RSS feeds to receive updates from websites. In this paper, we propose a method for managing the RSS feeds from various news websites. A web service is developed to deliver filtered news items from RSS feeds to a mobile client. Each news item is indexed, subsequently, the indexes are used for filtering news items. Indexing is done in two steps. First, classical text categorization algorithms are used to assign a category to each news item, second, geoparsing is used to assign geolocation data to each news item. An android application is developed to access filtered news items by consuming the proposed web service. A prototype is implemented using Rapid miner 5.0 as the data mining tool and SVM as the classification algorithm. Geoparsing and geocoding web services, and Android API are used to implement location-based access to news items. Experimental results prove that the proposed approach is effective and saves a significant amount of information overload processing time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent investigations have determined that many Android applications in both official and non-official online markets expose details of the user's mobile phone without user consent. In this paper, for the first time in the research literature, we provide a full investigation of why such applications leak, how they leak and where the data is leaked to. In order to achieve this, we employ a combination of static and dynamic analysis based on examination of Java classes and application behaviour for a data set of 123 samples, all pre-determined as being free from malicious software. Despite the fact that anti-virus vendor software did not flag any of these samples as malware, approximately 10% of them are shown to leak data about the mobile phone to a third-party; applications from the official market appear to be just as susceptible to such leaks as applications from the non-official markets.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Android is a new generation of an open operating system directed at mobile devices that are carried every day. The openness of this architecture is leading to new applications and opportunities including a host of multimedia services, new interfaces and browsers, multitasking including support for wireless local, personal and wide area networking services. Security with mobility and wireless connectivity thus becomes even more important with all these exciting developments. Vital security issues such as leakage of private information, file stealing and spambots abound in networks in practice and Android networks continue to be subject to these same families of vulnerabilities. This paper provides a demonstration of such vulnerabilities in spite of the best efforts of designers and implementers. In particular it describes examples of data leakage and file stealing (address books, contact lists, SMS messages, pictures) as well as demonstrating how Android devices can create spambots. © 2013 IEEE.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent studies have determined that many Android applications in both official and non-official online markets expose details of the users' smartphones without user consent. In this paper, we explain why such applications leak, how they leak and where the data is leaked to. In order to achieve this, we combine static and dynamic analysis to examine Java classes and application behaviour for a set of popular, clean applications from the Finance and Games categories. We observed that all the applications in our data set which leaked information (10%) had third-party advertising libraries embedded in their respective Java packages.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

 Mobile platform security solution has become especially important for mobile computing paradigms, due to the fact that increasing amounts of private and sensitive information are being stored on the smartphones' on-device memory or MicroSD/SD cards. This paper aims to consider a comparative approach to the security aspects of the current smartphone systems, including: iOS, Android, BlackBerry (QNX), and Windows Phone.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

BACKGROUND: Low iron intake can lead to iron deficiency, which can result in impaired health and iron-deficiency anemia. A mobile phone app, combining successful dietary strategies to increase bioavailable iron with strategies for behavior change, such as goal setting, monitoring, feedback, and resources for knowledge acquisition, was developed with the aim to increase bioavailable iron intake in premenopausal women.

OBJECTIVE: To evaluate the content, usability, and acceptability of a mobile phone app designed to improve intake of bioavailable dietary iron.

METHODS: Women aged 18-50 years with an Android mobile phone were invited to participate. Over a 2-week period women were asked to interact with the app. Following this period, semistructured focus groups with participants were conducted. Focus groups were audio recorded and analyzed via an inductive open-coding method using the qualitative analysis software NVivo 10. Themes were identified and frequency of code occurrence was calculated.

RESULTS: Four focus groups (n=26) were conducted (age range 19-36 years, mean 24.7, SD 5.2). Two themes about the app's functionality were identified (frequency of occurrence in brackets): interface and design (134) and usability (86). Four themes about the app's components were identified: goal tracker (121), facts (78), photo diary (40), and games (46). A number of suggestions to improve the interface and design of the app were provided and will inform the ongoing development of the app.

CONCLUSIONS: This research indicates that participants are interested in iron and their health and are willing to use an app utilizing behavior change strategies to increase intake of bioavailable iron. The inclusion of information about the link between diet and health, monitoring and tracking of the achievement of dietary goals, and weekly reviews of goals were also seen as valuable components of the app and should be considered in mobile health apps aimed at adult women.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A low-cost system to generate, control and detect electrochemiluminescence using a mobile smartphone is described. A simple tone-detection integrated circuit is used to switch power sourced from the phone's Universal Serial Bus (USB) 'On-The-Go' (OTG) port, using audible tone pulses played over the device's audio jack. We have successfully applied this approach to smartphones from different manufacturers and with different operating system versions. ECL calibrations of a common luminophore, tris(2,2′-bipyridine)ruthenium(II) ([Ru(bpy)3]2+), with 2-(dibutylamino)ethanol (DBAE) as a co-reactant, showed no significant difference in light intensities when an electrochemical cell was controlled by a mobile phone in this manner, compared to the same calibration generated using a conventional potentiostat. Combining this novel approach to control the applied potential with the measurement of the emitted light through the smart phone camera (using an in-house built Android app), we explored the ECL properties of a water-soluble iridium(III) complex that emits in the blue region of the spectrum. The iridium(III) complex exhibited superior co-reactant ECL intensities and limits of detection to that of the conventional [Ru(bpy)3]2+ luminophore.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mobile virtualization has emerged fairly recently and is considered a valuable way to mitigate security risks on Android devices. However, major challenges in mobile virtualization include runtime, hardware, resource overhead, and compatibility. In this paper, we propose a lightweight Android virtualization solution named Condroid, which is based on container technology. Condroid utilizes resource isolation based on namespaces feature and resource control based on cgroups feature. By leveraging them, Condroid can host multiple independent Android virtual machines on a single kernel to support mutilple Android containers. Furthermore, our implementation presents both a system service sharing mechanism to reduce memory utilization and a filesystem sharing mechanism to reduce storage usage. The evaluation results on Google Nexus 5 demonstrate that Condroid is feasible in terms of runtime, hardware resource overhead, and compatibility. Therefore, we find that Condroid has a higher performance than other virtualization solutions.