• Title/Summary/Keyword: android application

Search Result 797, Processing Time 0.029 seconds

Development of Smartphone Game Application using Android (Android를 이용한 스마트폰 게임 어플리케이션)

  • Kim, Kyungha;Lee, Aeri;Choi, Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.376-377
    • /
    • 2013
  • 스마트폰이 도입된지 불과 몇 년만에 모바일 컴퓨팅은 이제 생활과 밀접한 다양한 콘텐츠를 소비하고 공유할 수 있는 공간이자 도구가 되었다. 이제 우리의 일상은 스마트 폰의 어플리케이션이나 SNS 등을 이용해 보다 합리적인 정보 탐색을 위하여 얻고자 하는 정보를 검색하고 실시간으로 공유한다. 최근 선호하는 스마트폰 어플리케이션은 오락, 유틸리티, 소셜 네트워크의 비중이 크다. 본 논문에서는 이러한 스마트 폰의 흐름에 발 맞춰, Android기반 게임 애플리케이션을 구현하고자 한다. 본 애플리케이션은 컴퓨터에서만 즐길 수 있던 게임에서 벗어나 보다 접근성이 편리한 스마트폰에서 실행할 수 있을 뿐 아니라 커뮤니케이션 인프라(별점 주기, 랭킹)와 item shop 기능을 제공한다. 본 연구에서는 더블버퍼링, 각종 센서, Surface View 등을 활용하여 스마트폰 게임 애플리케이션을 제작한다.

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF

Stack Allocation-based Memory Performance Improvement Technique on Android 2.3 Dalvik Virtual Machine (안드로이드 2.3 달빅 가상머신에서 스택 할당 기법을 통한 메모리 성능 향상 기법)

  • Lim, Yeong-Kyu;Kim, Cheong-Ghil;Kim, Shin-Dug
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.551-557
    • /
    • 2011
  • In this paper, we propose a stack allocation technique of Android Java objects in order to reduce the number of garbage collection which is one of major reason on Android performance degradation when running applications. The proposed technique is to allocate Java objects into stack rather than heap memory. To do so, stacked objects could escape the garbage collection process. We experiment the proposed technique in the latest Android 2.3 version. For the simulation, we take advantage of the well known Java benchmark, Caffeinemark, and our own. The result shows the performance degradation of Dalvik Virtual Machine execution time caused by the stack allocation of Java objects is very slight and the proposed method considerably reduces the frequency of garbage collection. This will increase application performance and give better user interfaces to Android phone users.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

Arduino hardware and Android ADK software combination (아두이노 하드웨어와 안드로이드 ADK 소프트웨어의 결합)

  • Lee, Sung-jin;Choi, Chul-kil;Lee, Kyung-mu;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.336-339
    • /
    • 2013
  • Arduino is for design based on open source prototyping platform, artist, designer, hobby activists, etc, i has been designed for all those who are interested in the environment construct. Arduino adventage you can easily create applications hardware, without deep knowledge about the hardware. Configuration of arduino using AVR microcontroller ATmage 168, software to action arduino using arduino program, MATLAB, Processing. Arduino is open source base, you can hardware production directly and using shield additionally, the arduino can be combined. Android AKD is open source. You can create android smart phone application. By the way compatible and can be used android ADK add arduino Manifast. Using arduino program, arduino bread-board design on hardware., create button click, connection with each other. In this paper, sortware was used for arduino program and android ADK, hardware was used for arduino MegaADK board, After making one accessory using the software and hardware verification.

  • PDF

Lane Detection System Development based on Android using Optimized Accumulator Cells (Accumulator cells를 최적화한 안드로이드 기반의 차선 검출 시스템 개발)

  • Tsogtbaatar, Erdenetuya;Jang, Young-Min;Cho, Jae-Hyun;Cho, Sang-Bock
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.126-136
    • /
    • 2014
  • In the Advanced Driver Assistance Systems (ADAS) of smart vehicle and Intelligent Transportation System (ITS) for to detect the boundary of lane is being studied a lot of Hough Transform. This method detects correctly recognition the lane. But recognition rate can fall due to detecting straight lines outside of the lane. In order to solve this problems, this paper proposed an algorithm to recognize the lane boundaries and the accumulator cells in Hough space. Based on proposed algorithm, we develop application for Android was developed by H/W verification. Users of smart phone devices could use lane detection and lane departure warning systems for driver's safety whenever and wherever. Software verification using the OpenCV showed efficiency recognition correct rate of 93.8% and hardware real-time verification for an application development in the Android phone showed recognition correct rate of 70%.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

Implementation of Android-Based Mobile Messenger with Security Function Using Specific AP (특정 AP를 이용한 안드로이드 기반 모바일 보안 메신저 구현)

  • Kim, Ji-Hyung;Lee, Choong-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.3
    • /
    • pp.102-107
    • /
    • 2015
  • Personal information leakage is one of the great recent issues, which can be caused by hacking or censorship when a messenger program is used between user groups in Android-based smartphones, In order to solve these problems, companies generally apply complex security procedures inside the messenger, but which degrade the efficiency of work. This paper proposes a method which can improve work efficiency and strengthen security by allowing only the clients that can access a particular AP, and implementing a closed messenger group. The proposed method is validated by implementing on the Android-based smartphones.

A Design and Implementation of the Lift Safety Inspection System using Android Smart Phone (안드로이드기반 스마트폰을 이용한 승강기 안전진단 시스템 설계 및 구현)

  • Choi, Sung-Hyun;Kim, Jong-Soo;Kim, Tai-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.113-118
    • /
    • 2012
  • This thesis suggests how to design and implement an Android smart phone application which can perform self check or safety inspection of lifts effectively. The safety checks of lifts go in the way that inspectors check the lifts' conditions generally and record manually following a form at the moment. This thesis analyses lift maintenance industry and introduces how to design a system to proceed effective self check using a smart phone with Android OS. By using a smart phone to check lifts, we can have advantages to improve the quality of self check and maintain careers establishing information database about safety items.