Analysis and Evaluation of the Android Best Practices Impact on the Efficiency of Mobile Applications

Author(s):  
Aline Rodrigues Tonini ◽  
Leonardo Matthis Fischer ◽  
Julio Carlos Balzano de Mattos ◽  
Lisane Brisolara de Brisolara
2020 ◽  
Vol 1 (1) ◽  
pp. 663-672
Author(s):  
Bakhtiar Rusandi Sinaga ◽  
Kinanto Prabu Werdana ◽  
Dicky Irwanto ◽  
Noor Hanafi

ABSTRAK Salah satu penyebab kecelakaan pertambangan adalah kondisi tidak aman dan tindakan tidak aman dari pekerja pekerja tambang. cara efektif dalam mengelola bahaya tersebut adalah dengan melaporkan bahaya tersebut. Saat ini pelaporan bahaya tersebut diwajibkan kepada seluruh pengawas operasional, sayangnya hasil dari aktifitas tersebut belum terdokumentasi dengan baik karena proses masukan masih dilakukan secara manual sehingga perlu waktu yang tidak sedikit dan hasilnya belum efektif untuk memberikan rekomendasi perbaikan terhadap bahaya tersebut. Selain itu media untuk melakukan kegiatan tersebut menggunakan kertas, terkadang pengawas operasional kesulitan mendapatkan form ketika berada di lapangan sehingga menyulitkan pembuktian dokumentasi dalam menemukan kondisi tidak aman dan tindakan tidak aman. Berdasarkan permasalahan tersebut maka dibuat system dan aplikasi dalam memudahkan proses dokumentasi dalam bentuk aplikasi mobile yang dapat di akses dalam kondisi offline/online,dimanapun, kapanpun melalui mobile phone dan database yang direkam dapat digunakan sebagai acuan dalam analisa dan evaluasi data untuk pengendalian pencegahan kecelakaan. Analisa dari aplikasi tersebut terbukti meningkatkan jumlah pelaporan kondisi tidak aman dan tindakan tidak aman hingga 15% dari pelaporan menggunakan formulir. berdasarkan pelaporan bahaya tersebut, kita dapat mengetahui tempat-tempat kritis yang sering ditemukan adanya penyimpangan sehingga pada area tersebut lebih prioritas dalam pengendalian bahaya dan resiko yang timbul. Lebih dari itu aplikasi ini juga linier dengan misi perusahaan dalam pengelolaan lingkungan karena pengurangan pemakaian kertas menjadi digital. Berdasarkan hasil kajian diatas implementasi aplikasi I-Safe dapat meningkatkan kepedulian pekerja tambang mengenai keselamatan kerja dan database yang direkam dapat digunakan sebagai dasar pengambilan keputusan yang valid. Hal ini sejalan sebagai salah satu bentuk penerapan pengelolaan keselamatan pertambangan Indonesia dalam menghadapi era industri 4.0 mengenai digitalisasi, keselamatan dan pertambangan. Kata Kunci : aplikasi, I-Safe, database, evaluasi, keselamatan             ABSTRACT One of the causes of mining accidents is unsafe conditions and unsafe actions from mining workers. an effective way to manage the hazard is to report the hazard. Currently the hazard reporting is required for all operational supervisors, unfortunately the results of these activities have not been well documented because the input process is still done manually so that it takes a lot of time and the results have not been effective to provide recommendations for improvement of the hazard. In addition to the media to carry out these activities using paper, sometimes operational supervisors have difficulty getting forms while in the field, making it difficult to prove documentation in finding unsafe conditions and unsafe actions. Based on these problems, systems and applications are made to facilitate the process of documentation in the form of mobile applications that can be accessed in an offline / online condition, anywhere, anytime through a mobile phone and a recorded database can be used as a reference in the analysis and evaluation of data for accident prevention control. Analysis of the application has been proven to increase the number of reporting unsafe conditions and unsafe actions to 15% of reporting using forms. Based on the reporting of hazards, we can find out critical places that are often found irregularities so that the area is more priority in controlling hazards and risks that arise. Moreover, this application is also linear with the company's mission in environmental management because of the reduction in the use of paper to become digital. Based on the results of the study above the implementation of the I-Safe application can increase the concern of mine workers regarding work safety and the recorded database can be used as a basis for valid decision making. This is in line as one form of the implementation of Indonesian mining safety management in the face of the industrial era 4.0 regarding digitalization, safety and mining. Keywords: application, I-Safe, database, evaluation, safety  


Author(s):  
Fernando Almeida ◽  
José Augusto Monteiro

The design of web and mobile applications is one of the most challenging fields of the current information technology landscape. Increasingly, companies intend to have a strong presence in the information society, which allows them to advertise their products, services, make online business, interact with customers, among others. However, the development and design of web and mobile solutions have numerous challenges and best practices that should be known and applied. In this chapter, the authors adopt a qualitative methodology based on multiple case studies that allow them to identify a total of six challenges and best practices that are later confronted and compared with the recent findings on the coverage of the topic.


Author(s):  
Ekaterina Zavyalova ◽  
Nina Pogadaeva

In Russia, digitalization of the state and municipal spheres remains a task to be resolved. The present research objective was to assess the current level of digitalization of state and municipal services in the Kemerovo region in order to develop some recommendations. The author analyzed foreign experience and compared the digital situation in the Kemerovo region with that in other constituent entities of the Russian Federation. The low level of local digitalization results from the low level of information and communication infrastructure, "patchwork automation", lack of qualified personnel, financial problems, etc. The following measures can improve the situation: more active feedback from citizens, analysis of best practices, participation in pilot government projects, increasing the availability and convenience of electronic services via mobile applications and gamification, etc.


Queue ◽  
2021 ◽  
Vol 19 (2) ◽  
pp. 45-64
Author(s):  
Ramya Srinivasan ◽  
Ajay Chander

This article provides an organization of various kinds of biases that can occur in the AI pipeline starting from dataset creation and problem formulation to data analysis and evaluation. It highlights the challenges associated with the design of bias-mitigation strategies, and it outlines some best practices suggested by researchers. Finally, a set of guidelines is presented that could aid ML developers in identifying potential sources of bias, as well as avoiding the introduction of unwanted biases. The work is meant to serve as an educational resource for ML developers in handling and addressing issues related to bias in AI systems.


Author(s):  
Ana Cristina Antunes ◽  
Camila Silva

This chapter covers the guidelines developers should follow when creating mobile applications to support visually impaired people in their use of public transports. Technology has evolved in a remarkable fashion, mobile applications being the perfect example of a resource that has been solving problems for a vast array of users, including visually impaired people. These apps hold tremendous potential seeing as they present an accessible, multi-functioned, and cost-effective solution to the mobility issues impacting visually impaired people. In order to identify the best practices in the development of these apps, one should focus on the particularities, limitations, and concerns of visually impaired people regarding their mobility, orientation, and navigation on public transports. It's equally important to understand the existing technology and how these users interact with it, so that we can optimize the user experience, the accessibility, and usability in future endeavors.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Paweł Weichbroth ◽  
Łukasz Łysik

Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable threats and established best practices in the domain of mobile security. Afterwards, this outcome was put forward for consideration by mobile application users (n = 167) via a survey instrument. To this end, the results show high awareness of the threats and their countermeasures in the domain of mobile applications. While recognizing the risks associated with physical and social factors, the majority of respondents declared the use of built-in methods to mitigate the negative impact of malicious software and social-engineering scams. The study results contribute to the theory on mobile security through the identification and exploration of a variety of issues, regarding both threats and best practices. Besides this, this bulk of up-to-date knowledge has practical value which reflects in its applicability at both the individual and enterprise level. Moreover, at this point, we argue that understanding the factors affecting users’ intentions and motivations to accept and use particular technologies is crucial to leverage the security of mobile applications. Therefore, future work will cover identifying and modeling users’ perceptions of the security and usability of mobile applications.


Sign in / Sign up

Export Citation Format

Share Document