Redfang: A High-Level Bluetooth Library for Building Distributed Android Applications

Author(s):  
Diego Ordonez Camacho

The most serious threats to the current mobile internet are Android Malware. In this paper, we proposed a static analysis model that does not need to understand the source code of the android applications. The main idea is as most of the malware variants are created using automatic tools. Also, there are special fingerprint features for each malware family. According to decompiling the android APK, we mapped the Opcodes, sensitive API packages, and high-level risky API functions into three channels of an RGB image respectively. Then we used the deep learning technique convolutional neural network to identify Android application as benign or as malware. Finally, the proposed model succeeds to detect the entire 200 android applications (100 benign applications and 100 malware applications) with an accuracy of over 99% as shown in experimental results.


Author(s):  
Mohamad Jaber ◽  
Yliès Falcone ◽  
Kinan Dak-Al-Bab ◽  
John Abou-Jaoudeh ◽  
Mostafa El-Katerji

2020 ◽  
Vol 4 (3) ◽  
pp. 693
Author(s):  
Ilham Fahrul Rozi ◽  
Dolly Virgian Shaka Yudha Sakti ◽  
Safitri Juanita ◽  
Muhammad Anif

Safety deposit box areusually used to protect valuables stuff from fire and theft using analog or digital keys or a combination of both. This research makes android based electronic lock application for safety deposit box to automate safe opening and closing keys with the help of a microcontroller using Bluetooth. The Workflow of these application is an Android application will activate Bluetooth on the cell phone and send input to the arduino network microcontroller to activate the Solenoid door lock so that it can open or lock safely. The purpose of this research is to design and build an Android application for electronic keys in a safety deposit box so that it has a high level of security and has a history (log) feature to find out the user's application activities. The system development life cycle that will be used to build this application is the Waterfall method. This application will be built using Java programming language with the Basic4Android editor, the database is stored using SQLite. The conclusion of this research is that after testing concluded that the integration of network microcontrollers such as Solenoid door locks, ATmega 328, Bluetooth HC-05 and testing Android applications as electronic keys into the application security system in safety deposit box has high security, simulation tools in safety deposit box can respond which is good for users when performing commands from Android via Bluetooth in less than 5 meters, the security system has high security because it has an authentication and LOG feature to find out the user's last activity (in and out)


Author(s):  
Hanan Elazhary ◽  
Alaa Althubyani ◽  
Lina Ahmed ◽  
Bayan Alharbi Alharbi ◽  
Norah Alzahrani ◽  
...  

<p class="0abstract">Building context-aware mobile applications is one of the most ambitious areas of research. Such applications can change their behavior according to context or perform specific tasks in specific contexts. Regardless of the application, all context-aware mobile applications share the need to retrieve and process context information. This paper presents a Context Management tool for the Android platform (ACM). ACM allows easy access to internal on-board mobile sensors and hardware features extracting corresponding raw data. Raw context is processed into higher-level more human-readable context that is provided seamlessly to the mobile applications. Different methods are used for this purpose including fuzzy classifiers. Since different mobiles have different sensors and hardware features, ACM can adapt to the mobile device by deactivating access to unavailable ones. Information regarding the available sensors and hardware features and their specifications can also be queried. Additionally, applications can request notifications regarding context change or specific context values. In addition to providing developers with supporting classes and methods, ACM is accompanied by an application that allows developers to examine its functionality and capabilities before using it. The application can be also used to examine the readings of the different sensors in different situations and thus calibrate them as needed. Additionally, it can be used to modify and personalize default interpretations of raw context values to high-level ones. ACM has been tested empirically and the results show extreme interest of context-aware mobile application developers in its promising capabilities and that it is conducive to facilitating, speeding up and triggering development of many more of such applications.</p>


2021 ◽  
Vol 26 (1) ◽  
pp. 1-11
Author(s):  
Awais Qasim ◽  
Adeel Munawar ◽  
Jawad Hassan ◽  
Adnan Khalid

Abstract Energy efficiency in mobile computing is really an important issue these days. Owing to the popularity and prevalence of Android operating system among the people, a great number of Android smartphone applications have been developed and proliferated by the software developers. While developing these applications, developers have to keep energy consumption factor in mind, as the efficiency of an application is largely affected by it. Thus, designers and programmers endeavour to choose the best designing approaches to develop energy-efficient applications. It is imperative to assist the programmers in choosing appropriate techniques and strategies to manage power consumption. In the present research, we have investigated the effect of Android application design on its energy utilisation. For this purpose, we have practically implemented design patterns on two Android applications and evaluated their energy consumption before and after implementing these patterns. We have modelled the high-level design of these two Android applications by using software design patterns in such a way as to abate their energy requirement. We have also checked how the quality, maintainability, and efficiency of code are affected by these design patterns. The outcomes of the research can facilitate programmers to utilise these details while developing energy efficient solutions.


Author(s):  
David P. Bazett-Jones ◽  
Mark L. Brown

A multisubunit RNA polymerase enzyme is ultimately responsible for transcription initiation and elongation of RNA, but recognition of the proper start site by the enzyme is regulated by general, temporal and gene-specific trans-factors interacting at promoter and enhancer DNA sequences. To understand the molecular mechanisms which precisely regulate the transcription initiation event, it is crucial to elucidate the structure of the transcription factor/DNA complexes involved. Electron spectroscopic imaging (ESI) provides the opportunity to visualize individual DNA molecules. Enhancement of DNA contrast with ESI is accomplished by imaging with electrons that have interacted with inner shell electrons of phosphorus in the DNA backbone. Phosphorus detection at this intermediately high level of resolution (≈lnm) permits selective imaging of the DNA, to determine whether the protein factors compact, bend or wrap the DNA. Simultaneously, mass analysis and phosphorus content can be measured quantitatively, using adjacent DNA or tobacco mosaic virus (TMV) as mass and phosphorus standards. These two parameters provide stoichiometric information relating the ratios of protein:DNA content.


Author(s):  
J. S. Wall

The forte of the Scanning transmission Electron Microscope (STEM) is high resolution imaging with high contrast on thin specimens, as demonstrated by visualization of single heavy atoms. of equal importance for biology is the efficient utilization of all available signals, permitting low dose imaging of unstained single molecules such as DNA.Our work at Brookhaven has concentrated on: 1) design and construction of instruments optimized for a narrow range of biological applications and 2) use of such instruments in a very active user/collaborator program. Therefore our program is highly interactive with a strong emphasis on producing results which are interpretable with a high level of confidence.The major challenge we face at the moment is specimen preparation. The resolution of the STEM is better than 2.5 A, but measurements of resolution vs. dose level off at a resolution of 20 A at a dose of 10 el/A2 on a well-behaved biological specimen such as TMV (tobacco mosaic virus). To track down this problem we are examining all aspects of specimen preparation: purification of biological material, deposition on the thin film substrate, washing, fast freezing and freeze drying. As we attempt to improve our equipment/technique, we use image analysis of TMV internal controls included in all STEM samples as a monitor sensitive enough to detect even a few percent improvement. For delicate specimens, carbon films can be very harsh-leading to disruption of the sample. Therefore we are developing conducting polymer films as alternative substrates, as described elsewhere in these Proceedings. For specimen preparation studies, we have identified (from our user/collaborator program ) a variety of “canary” specimens, each uniquely sensitive to one particular aspect of sample preparation, so we can attempt to separate the variables involved.


2020 ◽  
Vol 29 (4) ◽  
pp. 738-761
Author(s):  
Tess K. Koerner ◽  
Melissa A. Papesh ◽  
Frederick J. Gallun

Purpose A questionnaire survey was conducted to collect information from clinical audiologists about rehabilitation options for adult patients who report significant auditory difficulties despite having normal or near-normal hearing sensitivity. This work aimed to provide more information about what audiologists are currently doing in the clinic to manage auditory difficulties in this patient population and their views on the efficacy of recommended rehabilitation methods. Method A questionnaire survey containing multiple-choice and open-ended questions was developed and disseminated online. Invitations to participate were delivered via e-mail listservs and through business cards provided at annual audiology conferences. All responses were anonymous at the time of data collection. Results Responses were collected from 209 participants. The majority of participants reported seeing at least one normal-hearing patient per month who reported significant communication difficulties. However, few respondents indicated that their location had specific protocols for the treatment of these patients. Counseling was reported as the most frequent rehabilitation method, but results revealed that audiologists across various work settings are also successfully starting to fit patients with mild-gain hearing aids. Responses indicated that patient compliance with computer-based auditory training methods was regarded as low, with patients generally preferring device-based rehabilitation options. Conclusions Results from this questionnaire survey strongly suggest that audiologists frequently see normal-hearing patients who report auditory difficulties, but that few clinicians are equipped with established protocols for diagnosis and management. While many feel that mild-gain hearing aids provide considerable benefit for these patients, very little research has been conducted to date to support the use of hearing aids or other rehabilitation options for this unique patient population. This study reveals the critical need for additional research to establish evidence-based practice guidelines that will empower clinicians to provide a high level of clinical care and effective rehabilitation strategies to these patients.


2006 ◽  
Vol 175 (4S) ◽  
pp. 260-260
Author(s):  
Rile Li ◽  
Hong Dai ◽  
Thomas M. Wheeler ◽  
Anna Frolov ◽  
Gustavo Ayala

Sign in / Sign up

Export Citation Format

Share Document