• Title/Summary/Keyword: Android applications

Search Result 418, Processing Time 0.028 seconds

Dynamic Memory Management Technique for Stably Running Applications on Android Based Smartphone (안드로이드 기반 스마트폰 환경에서 응용프로그램의 안정적인 구동을 위한 동적 메모리 관리 기법)

  • Park, Seong-Jun;Kim, Kang-Seok;Kim, Jai-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.505-508
    • /
    • 2013
  • 스마트폰 응용 프로그램의 메모리 관리는 응용 프로그램의 속도와 안정성 측면에서 중요하게 다루어진다. 응용 프로그램에서 다루는 요소 중 이미지는 메모리 사용량의 많은 부분을 차지하며, 메모리의 여유 공간 내에서 이미지가 사용될 수 있도록 관리되어야 한다. 그러나 이미지의 해상도가 커지거나 다루게 되는 이미지의 개수가 늘어날 수록 이미지 객체의 관리의 어려움도 늘어나게 된다. 이미지 객체가 메모리 공간이 부족한 시점에서 메모리에 적재될 경우 응용 프로그램은 성능이 저하되거나 강제 종료될 수 있어 응용 프로그램의 사용성과 안정성이 낮아지게 된다. 본 논문에서는 안드로이드의 응용 프로그램에서 사용되는 이미지가 메모리의 많은 공간을 차지할 때, 안정적인 응용 프로그램 구동 환경을 제공해주는 동적 메모리 관리 기법을 적용하여 OOM(Out of Memory) 오류가 발생하는 문제를 해결하고자 한다.

Intent based Component Interaction Testing for Android Applications (안드로이드 어플리케이션의 인텐트 기반 컴포넌트 상호작용 테스팅 기법)

  • Baek, Tae-San;Lee, Woo Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.955-957
    • /
    • 2013
  • 안드로이드의 인텐트를 이용하여 주소록 어플리케이션에서 이메일 어플리케이션을 실행시킬 수 있다. 또한 어플리케이션 동작 중 배터리 부족 경고 또는 충전 케이블이 연결됨과 같은 시스템에서 브로드캐스트를 발생시킨다. 다른 어플리케이션의 컴포넌트를 실행시키고 시스템의 브로드캐스트를 처리하는 모든 것이 컴포넌트들 간의 상호작용이다. 컴포넌트들 간의 상호작용이 올바르게 이루어지지 않을 경우 다른 어플리케이션이 시작되거나, 보안상의 문제점 등이 발생할 수 있다. 본 논문에서는 위와 같은 문제점을 발견하기 위해 인텐트 기반의 안드로이드 상호작용 테스트를 위한 테스트 시나리오를 설계하는 기법에 대한 연구이다. 어플리케이션 내부의 컴포넌트 상호작용에 사용되는 명시적 인텐트와 다른 어플리케이션 또는 시스템의 컴포넌트들과의 상호작용에 사용되는 암시적 인텐트를 함께 고려하여 인텐트 목록을 생성하고 컴포넌트 상호작용 테스팅에 사용할 테스트 시나리오를 생성한다.

Lightweight CNN based Meter Digit Recognition

  • Sharma, Akshay Kumar;Kim, Kyung Ki
    • Journal of Sensor Science and Technology
    • /
    • v.30 no.1
    • /
    • pp.15-19
    • /
    • 2021
  • Image processing is one of the major techniques that are used for computer vision. Nowadays, researchers are using machine learning and deep learning for the aforementioned task. In recent years, digit recognition tasks, i.e., automatic meter recognition approach using electric or water meters, have been studied several times. However, two major issues arise when we talk about previous studies: first, the use of the deep learning technique, which includes a large number of parameters that increase the computational cost and consume more power; and second, recent studies are limited to the detection of digits and not storing or providing detected digits to a database or mobile applications. This paper proposes a system that can detect the digital number of meter readings using a lightweight deep neural network (DNN) for low power consumption and send those digits to an Android mobile application in real-time to store them and make life easy. The proposed lightweight DNN is computationally inexpensive and exhibits accuracy similar to those of conventional DNNs.

Security Vulnerabilities in Android Applications (안드로이드 어플리케이션 보안 취약점에 관한 연구)

  • Han, Chan-Kyu;Kang, Seong-Yong;Jang, Hak-Beom;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.854-857
    • /
    • 2011
  • 최근 안드로이드가 오픈 소스 및 오픈 서비스를 기반으로 출시되었으나, 성장률에 비하여 보안성이 검증된 사례가 미미하여, 보안대책 마련이 시급한 실정이다. 따라서 본 논문에서는 안드로이드보안 아키텍쳐 및 안드로이드 어플리케이션 보안에 관하여 연구하였다. 또한 안드로이드 프레임워크 상에서 개인정보(단말의 위치정보 및 외부 계정정보)가 유출되는 보안 취약점을 실험연구를 통해 발견하였고, 이에 대한 보안대책을 제안하여, 안전한 스마트폰 환경을 제공하고자 한다.

The Study of Android applications Black Market Analysis (안드로이드 애플리케이션 블랙마켓 조사 및 연구)

  • Lee, YongSub;Jo, Tae-Nam;Seo, Seung-Hyeon;Moon, NamMee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1106-1107
    • /
    • 2011
  • 개방형 플랫폼이라는 안드로이드의 특성을 이용해 블랙마켓 애플리케이션이 급격히 활성화 되어 불법 애플리케이션이 유통 되고 있다. 불법 애플리케이션의 유통은 마켓의 수익 구조가 파괴되어 개발자들의 개발 의지를 저하시켜 마켓의 활성화를 저해하는 요인이 되며 악성코드 배포의 경로가 된다. 이에 본 논문에서는 스마트폰 애플리케이션을 공식적으로 유통하는 안드로이드 마켓과 비공식적으로 유통하는 블랙마켓 "Blackmart Alpha"의 월별 애플리케이션 등록건수를 비교 분석해 불법 애플리케이션 유통의 현황을 파악하였다. 이는 향후 애플리케이션의 불법적 접근을 사전에 대응하는 방법과 함께 불법적으로 변형된 애플리케이션을 검증할 수 있는 방법 위한 것이다.

Retail-Store Type Digital Signage Solution Development And Usability Test Using Android Mini PC (안드로이드 미니PC를 이용한 Retail-Store형 디지털사이니지 솔루션 개발 및 사용성 테스트)

  • Lim, Jungtaek;Shin, Dong-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.29-44
    • /
    • 2015
  • Digital Signage, a way of advertising or delivering information to viewers through digital displays, has expanded from being just an advertising channel in public places. Recently, it has become widely prevalent in restaurants and retail stores. Despite its wide expansion, digital signage is limited to specific usages and services and the devices it uses are also quite expensive. This study introduces a stick-type digital signage product that operates on Android OS, which addresses all the weaknesses of digital signage with much more reasonable pricing and stable operation. For stability, performance tests were executed on the hardware and applications. The results for hardware performance were extremely promising, as each scenario's maximum performance results, measured by Load Runner programs, reached target indexes. Also, as a result of the usability test, all participants, including non-digital signage system users (novices), were able to easily learn all the tasks. As a result of user satisfaction survey, positive responses were exhibited for ease of learning and usability (LEU), helpfulness and problem solving capabilities (HPSC), affective aspect and multimedia properties (AAMP), commands and minimal memory load (CMML), and control and efficiency (CE).

Evaluation of Smart-phone Applications for Young Children and Analysis of Differences according to Review Scores (유아용 스마트폰 애플리케이션 평가 및 리뷰점수에 따른 차이분석)

  • Koo, Heejeong
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.228-236
    • /
    • 2020
  • As of March 2020, this study divided the applications for young children installed on Android-based smart-phones in Korea into top and bottom groups according to review scores, and selected 30 applications each, conducted content analysis and application evaluation, and looked at differences between groups. Through this, by providing objective information on the smart-phone application for young children, it is intended to help parents and early childhood education professionals select high-quality applications, and to present ideas and directions for developing applications suitable for development to application developers. As a result of application content analysis, only data presentation type, simulation type, and game type were found in all the top and bottom groups as for the application type. There was a difference in order. In the case of app purchase cost, the top group in the review score was evenly distributed from the low price to the high price of 100,000 won or more, while the bottom group had few high-priced applications. On the other hand, as a result of application evaluation, a significant difference was found in the entire evaluation score, including all functional elements and all content elements, between the top and bottom groups of the review score. In the case of detailed sub-factors, significant differences were shown in all factors except 'technicality' of functional elements.

Practical Architectural Patterns and Guidelines for Designing Complex Mobile Applications (복잡도가 높은 모바일 어플리케이션 설계를 위한 아키텍처 패턴과 적용지침)

  • Jang, Jeong-Ran;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.63-80
    • /
    • 2012
  • Mobile devices with Android OS and iOS have been emerged as mobile computing devices where various software applications are deployed. Furthermore, they are anticipated to be used not only for traditional personal computing but also for enterprise computing. However, such mobile devices have their intrinsic characteristics such as limited resources and flexible network capabilities, which are not revealed in traditional computers. Hence, there is high demand for methods to develop mobile applications with reflecting their intrinsic characteristics. Since those characteristics belong to non-functional requirements, they should be reflected in architecture design while designing mobile applications. To design architecture, the architecture drivers that are architecture non-functional requirements are decided from mobile application characteristics. Conventional architecture design methods do not consider those characteristics so that the methods cannot be straightforwardly applied to mobile applications. In this paper, to efficiently develop mobile applications reflecting those characteristics, we propose a set of architecture patterns and define a guideline to apply those patterns. First, we define the characteristics of mobile applications distinguished and derive architectural drivers from them. Then, we propose architecture patterns in terms of static and dynamic views and define an architectural guideline to apply the patterns to designing architecture for mobile application. And, we perform case studies to verify the applicability of proposed patterns. Finally, we assess the proposed architecture patterns by proving how the patterns can fulfill identified architecture drivers and by comparing our approach with previous works.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.

Development of a WebDAV-based Smartphone Collaborative Application (웹데브 기반의 스마트폰 협업 어플리케이션 개발)

  • Lee, Hong-Chang;Kim, Bo-Hyeon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.680-690
    • /
    • 2011
  • To support asynchronous collaboration among remote users, collaborative applications provide collaboration services and environment through virtual workspaces. In general, collaborative applications support collaboration based on desktop-based personal computers, using the features such as resource sharing or asynchronous communication among users. Unfortunately, since those applications mainly run on personal computers, they do not easily support collaborative works in various places. In this paper, we describe the development of smartphone collaborative application which provides effective collaboration facilities like resource sharing through various types of workspaces or group communication, communicating with a WebDAV-based collaboration server. The developed application provides users with high accessibility through multi-touch/touch-slide based user-interfaces in mobile environment. To support effective communication with a collaboration server, we also present a WebDAV-based collaboration library using a collaboration protocol designed to analyze easily the responses from the collaboration server.