Essays about: "Android systems"
Showing result 1 - 5 of 148 essays containing the words Android systems.
-
1. Android Malware Detection Using Machine Learning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE
-
2. Control system and simplified timesynchronization for heterogenous IoT systems with medium time requirements
University essay from KTH/Hälsoinformatik och logistikAbstract : The company QTPIE conducts research on drivers and their unconscious reactions when driving. To help, they use smart devices that today must be individually handled at the start and end of a run, and have individually set timestamps, which can lead to differences between the units when data is entered and collation of the units' data after a run. READ MORE
-
3. An Integrated Room Booking and Access Control System for Public Spaces
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Public spaces, especially educational institutions like universities, encounter challenges with their room booking and access control systems. These challenges commonly manifest as overlapping bookings and unauthorized entry. The latter issue, unauthorized access, specifically stems from inadequate integration between the respective systems. READ MORE
-
4. Android Runtime Shader Performance Analysis
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : RuntimeShader is newly introduced into Android API from Android 13 (API level 33). The class can be used to build fragment shaders with Android Graphics Shading Language (AGSL), a shading language. READ MORE
-
5. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE