Monday, June 1, 2020

Permission Management Method in Android



Permission Management Method in Android

The Android-based IoT(Internet of Things) platform just like the existing Android provides an environment that makes it easy to utilize Google’s infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user’s consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions. Code Shoppy
Android-based IoT platform The Android-based IoT platform named “Android-Things” was first unveiled by Google. It is the first platform dedicated to IoT devices. “Android-Things” is an upgraded version of the existing Google’s Internet platform, Brillo. Unlike the C/C++ language used in Brilo, it enables Android developers to easily develop IoT products [2, 3] by using existing Android development tools such as Android Studio, JAVA language, Android SDK in the same way. In addition, the hardware of “Android-Things” includes Intel Edison, Pico NXP, Raspberry Pi 3, etc. Each hardware is equipped with SOC (System On Chip), RAM, and wireless communication devices. “Android-Things” basically supports various sample code examples such as Doorbell and Bluetooth Audio, making it easier for developers to access. 2.2. AndroidManifes.xml file The AndroidManifest.xml file of an application used in the Android-based IoT platform environment has a similar structure to that in the conventional Android smartphone. The AndroidManifest.xml file contains information on the application including <activity>, <Intent-filter>, and <uses-permission> [4-6]. This paper analyzes permissions of the versions of before and after application the update by analyzing the AnadroidManifest.xml file. The following shows the structure of the AndroidManifest.xml file for a sample application provided for the use in the Android-based IoT platform environment. 2.3. Android permission protection level Android applications must register their permissions in the AndroidManifest.xml file to gain access to the information on the Android device and obtain the user’s consent to the use of permissions. The permission protection level for registered permissions can be specified by the developer. It is classified into Normal, Dangerous, Signature, and Signature Or System. our permission protection levels and its definition [4, 7, 8].

Permission Management Method in Android
When an application is updated in the Android-based IoT platform environment, it does not require the user’s consent to permissions to be added due to the nature of most IoT devices unlike Android smartphone, which might lead to various security threats. In addition, security threats on Android smartphone can occur in applications in the Android-based IoT platform because it, in similar way to the existing Android, provides certain functions and accesses the device information through permissions. This paper comparatively analyzed permissions before and after the application update by examining the AndroidManifest.xml file in the application when it was updated in the Android-based IoT platform environment. The analysis results show that the same permissions before and after the update, deleted and newly added permissions after the update were identified. We should be able to respond to security threats that may arise after the application update through the information on permissions that are identified and exist in many malicious applications that have previously been studied. In the future, we will build a real-time automatic permission analysis service when an application is updated in the Android-based IoT platform environment by carrying out research on a real-time permission change monitoring system based on the permission management method implemented in this paper.
https://codeshoppy.com/shop/product/online-shopping-app/

Wednesday, March 11, 2020

Developing Mobile E-commerce using android




I.INTRODUCTION
Online shopping provides an easier means of purchasing product and gets them through physical delivery. Current local online shopping in Malaysia involves both product and services. They are mostly seen in a hotel business, flight ticket, apparel, take-out food and many more. There are much skepticism on ordering groceries online. This has to do with its value and price. Groceries belong to the categories of essential commodities product. Groceries are normally found in store or it can be described as a retail store that sells mostly food and other essential food items. These are mostly found in a cities ranging from large grocery stores, medium grocery stores to small groceries. The only thing that is common to them is the food stock products that they provide with other product other than food, such as clothing or household items. In most cases they are called supermarkets. They mostly comprise of several stock items. Their target is to provide the most essential product that are needed by people on day-to-day activities. Some of this store also includes a pharmacy and an electronics section. Other grocery stores, especially the large ones, are centerpieces of a larger complex that includes other facilities, such as gas stations, which will often operate under the store's name. This setup is especially common in the United Kingdom, with major chains such as Tesco and Sainsbury's having many locations operating under this format. The impact of intercultural competence on reliability on service quality and customer satisfaction in grocery retail industry in Malaysia has been discussed in Ihtiyar et al. [1]. This has to do with dissatisfaction on face-to-face groceries retails. There are many issues involves. Mobile device provide an opportunity of transaction between customers and the producers. Introducing grocery shopping system on mobile platform would make the market flexible and enhance the mobile services. A preliminary interview performed in this study suggests that local Malaysian citizens like groceries shopping and it was found that 69 percent of the locals go shopping for groceries at least once a week. While the remaining 29 percent prefer to go shopping at the markets close to their homes and very few prefer to go shopping at malls for a more variety of goods. When it comes to groceries business, both the customers and the business owners are cautious of their transactions, the fact still remains considering the prices and varieties. On the other hand, intervention promoted intentions and actual purchasing of sustainable groceries [2]. In order to ensure the sustainability of mobile groceries business, a lot of business standard has to be in place, because grocery business competition arises naturally due to high travel costs and the perishable nature of groceries appears to impart horizontal differentiation between firms [3]. Considering the issues and challenges of groceries business, this research is aimed to tackle the groceries purchasing process. This research introduces a mobile grocery shopping system targeting Malaysians within metropolitan Kuala Lumpur in Malaysia in order to provide easier means of buying and selling of groceries by Malaysians. The systems will run on mobile platform in order to enhance the flexibility of the business. Among some previous system is the one propose by Joo et al. [4] which is agent based system. The agents gather grocery information from several store server agents and compare it with user's preferences of groceries and stores. The rest of this paper is organized as follows: section 2 provides a review of literature and background of the related work on groceries and groceries businesses. Section 3describes the proposed system development process in detail. It also discusses the generic software development process and how it applies to the proposed system. Section 4 provides the result of the work, finally section 5 presents the conclusion.

https://codeshoppy.com/shop/product/


III.ANALYSIS AND DESIGN
A.Requirement analysis Requirement analysis of the entire tools, features, software and hardware were undertaken at this step. The software required for the development of the proposed system are Java for Android application, with Eclipse IDE, Google APP inventor, and other API libraries. For the development of the web based system, MySQL and XAMPP is used. Additional software used for the completion of the development includes photo and image editing tools. The major feature of the system dwells on the benefit for both customer and retailer; the key feature is aimed at reducing transaction time between the customers and the retailers, in terms of purchasing groceries. This will ensure speedy business and enable customers to have more leisure time by minimizing the time they require to shop for groceries. This is expected to be achieved through the interface and interaction design. B.Use case analysis Extreme programming suggests that the development begins with planning of the project management; followed by the planning of the design phase, which might includes the pilot testing or simulation of the system development prior to real development and the creation of system images and icons. The coding phase is the actual system development where the design. Figure 1 below shows the administrator’s use case diagram. This is normally the case when it comes to generic software development process. The uses case of the system is intended to show the flow from administrator to the users. The administrator uses case provide a direct interaction with login page, viewing users personal information, updating inventories and promotions, viewing order details and a login out page. Figure 1: Use Case diagram of administrator system Figure 2 shows is the Use Case diagram of user or client. In this diagram the customer can register, login to the application, view the inventory in the application, view promotion, update information, make purchases of the product they want and clear his/his cart. The users registered in the system, will be tracked and their can update their personal information as time goes on. 3131
Figure 2: Use Case diagram of user system C.Business logic analysis The business logic provides the ease at which data flows throughout the system. This is explained in the class diagram presented in Figure 3. The database design portrays how the database would interact throughout the flow of request and response. When customers purchased products, the order will be stored in the order table. Order table is related to the order item table which consists of order id, product id and quantity. Order and order item tables will contribute to the purchase history which is receipt table. Product table gives the customer the information of product id, name, price, code and category so it will be easy for them to make purchase. There are five tables in the whole system. There are the databases used in the application. When customers registered, the data will be saved on the customer table. Order table contains order information from the customers. Order item table stores data for quantity purchased by the customers. When the transaction has been done, all the history of purchased products will be stored in the receipt table also with the delivery date. Product table stores the information of products in the inventory. When users log in they will use the system to browse or purchase items. Once a purchase has been made, the system will then forward the purchase details to the merchant. The merchant will then give out the orders to the delivery department and the items purchased will directly sent to the user registered address : Database Design 



Monday, January 13, 2020

Student Attendance Management System with Bluetooth Low Energy Beacon and Android Devices

Student Attendance Management System with Bluetooth Low Energy Beacon and Android Devices

The student’s ID card with a built-in IC chip has beenused for identifying the student electronically for variouspurposes including registration of attendance in the class-room. In Ibaraki University, for example, a software productnamedIC card de syussekichosa[1] has been prepared totake attendance by a PC connected to a card reader. Byscanning the student’s ID card over the reader, the student’sinformation is registered into a file in the PC so that heis marked present. The problem with this system is that itconsumes much time as each student has to do the samestep over and over again until all the students are registered.We can reduce the time for attendance registration ifwe use multiple devices in parallel to take attendance ofstudents. It is our idea to use the students own smartphonesof which majority has the Android operating system. Inorder not to allow students to send attendance from outsidethe classroom, we employ a beacon device compliant withthe bluetooth low energy specifications (referred to as BLEbeacon) to transmit a magic number to the Android deviceswithin the classroom. Requesting the magic number to besent together with the student ID, we can let only thestudents in the classroom to send registration and can detercheating students.

Android Projects Titles

ehealth Care Management

PG LOCATOR For Searching PG Hostel Or Rental Houses

Child Safety App

elib : Libarary Management System Mobile App

Leakage Detection And Risk Assessment On Privacy For Android Applications: Lrpandroid

Ediagnostic Lab Online Reporting Android App

Anomaly Detection Approach Against Shilling Attacks In E-Com Site Using The Dynamic Time Interval Segmentation Technique

emedicine Prescription - Recommendation Android App

Veterinary Care for animal medical solution based Mobile Application

An Android based Mobile Application for Career Guidance

EGG Production Management System Based Android App

Friday, January 10, 2020

WMSD Risk Reduction Among Grocery Shoppers

WMSDRisk Reduction Among Grocery Shoppers

Code Shoppy Android PHP Projects
Abstract - This study created an ergonomically designed double basket shopping cart with a purpose of reducing Work-Related Musculoskeletal Disorders (WMSD) risks to grocery shoppers and clerks. This study proved that the present design of the double basket shopping cart provides pain and discomfort to the grocery shoppers and clerks which can lead to WMSD. It also showed that incorporating ergonomic features on the proposed design of the double basket shopping cart reduce the pain and discomfort to the grocery shoppers and clerks. The study was conducted in Rey-Sal Grocery Store in Cabuyao, Laguna. Code Shoppy Rapid Entire Body Assessment (REBA), NIOSH, Nordic Questionnaire, and surveys were used to determine the pain and discomfort that the grocery shoppers and clerks feel. Statistical Package for the Social Sciences (SPSS) was used to help in the regression analysis of the researchers. Anthropometry was used in the designing the proposed design, to develop the optimal dimensions of the double basket shopping cart for the comfort of the users. 
The proposed design of the double basket shopping cart effectively reduced the pain level and the discomfort of the grocery shoppers and clerks. It eliminates the need for lifting motions of the grocery shoppers due to the new design. The methods that were used were essential in reducing the risk of WMSD to grocery shoppers and clerks. Cost-benefit analysis and Failure Mode and Effect Analysis were also executed to evaluate the proposed double basket shopping cart design financially, its reliability, durability and performance. Keywords - Ergonomics, double basket shopping cart, work-related musculoskeletal disorder, grocery store.

METHODOLOGY 
In order to fulfill the objectives of the study, a pre-test and post-test study has been conducted as a requirement. The study required two types of respondents: grocery clerks and grocery shoppers. Sample size was computed with the use of Slovin’s formula, error tolerance was set to 10%. The sample size was used for gathering surveys, REBA, NIOSH, Nordic Questionnaire, and anthropometric measurements which are needed to assess the current design of the double basket shopping cart. Rapid Entire Body Assessment (REBA) was used in order to determine the risk level of the specific activities done by the grocery clerks and grocery shoppers while using the present design of the double basket shopping cart. NIOSH lifting equation was used to assess the lifting motions done by the grocery shoppers and to compute for the maximum load that can be lifted during the shopping process. While the Nordic questionnaire was used to assesses the pain that the respondent feels on different parts of their body. The pre-test also included conducting of pre-test surveys and gathering of anthropometric measurements of the respondents. 
Anthropometry was used in establishing the optimal dimensions of the proposed double basket shopping cart, 5th, 50th, and 95thpercentiles were considered. The obtained preliminary data was used and analyzed through the use of Statistical Package for the Socials and Sciences (SPSS). The software was a primary tool to test the normality of the anthropometric data and to determine the correlation between two distinct variables. 
The correlation of the gathered data was determined with the use of four tests: Binomial Logistic Regression of one dependent and five independent variables, Spearman’s Rho Coefficient of nominal and scale data, Kendall’s Tau Correlation of nominal and ordinal data, and Phi Coefficient of two nominal data. Binomial Logistic Regression was used to test whether the body parts of the grocery shoppers and clerks can be affected by the characteristics of the double basket shopping cart which are, comfortability, handle height, wheel design, maneuverability, and the height of the base of the double basket shopping cart. Spearman’s Rho Coefficient was used to correlate the pain felt by the respondents with their age, weight of goods they buy, and height. Kendall’s Tau Correlation of nominal and ordinal data was used to correlate the pain felt by the respondents with the characteristics of the double basket shopping cart. Phi Coefficient of two nominal data was used to correlate the pain felt by the respondents with their gender. The post study used the same number of sample size and same set of clerks were assessed for the post study. 
The post study includes the post survey, post REBA, post Nordic Questionnaire, which tested the usage of the proposed double basket shopping cart during the shopping process, stacking process and nesting process. The post study did not require another NIOSH lifting equation due to the proposed design that eliminated the need for lifting motions. The weighted mean average was also used to determine the significant change with the respondents regarding the present and proposed design. A cost-benefit analysis was used to compare the monetary values of the present and proposed design with the non-monetary benefits that each design gives. The Failure Mode and Effects Analysis were used to assess the potential failures in using the proposed double basket shopping as well as what risk should be prioritized.