IEEE 2019 / 20 - Android Projects with Web Hosting

IEEE 2020: A Hybrid Detection Method for Android Malware
Abstract: With the increasing market share of Android devices, malicious applications are developing and spreading rapidly. So it is imperative to improve the detection accuracy of Android malware. In this paper, we propose a hybrid detection method that performs dynamic detection on the results of static detection. The proposed method extracts the static features and dynamic features of the application, which can better detect the maliciousness of the Android application. Furthermore, we present experimental results of three ensemble methods in the dynamic detection, and choose the XGBoost algorithm with the optimum performance. Finally, we show that our method achieves a detection accuracy of 94.6%, which is higher than 85.3% of the static detection and 94.1% of the dynamic detection.

IEEE 2020: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Abstract: Mobile and web application security, particularly the areas of data privacy, has raised much concerns from the public in recent years. Most applications, or apps for short, are installed without disclosing full information to users and clearly stating what the application has access to, which often raises concern when users become aware of unnecessary information being collected. Unfortunately, most users have little to no technical expertise in regards to what permissions should be turned on and can only rely on their intuition and past experiences to make relatively uninformed decisions. To solve this problem, we developed DroidNet, which is a crowd-sourced Android recommendation tool and framework. DroidNet alleviates privacy concerns and presents users with high confidence permission control recommendations based on the decision from expert users who are using the same apps. This paper explains the general framework, principles, and model behind DroidNet while also providing an experimental setup design which shows the effectiveness and necessity for such a tool.


 
IEEE 2020: Bluetooth Low Energy-based Smart Home Android Solution
Abstract: The concepts of smart home and Internet of  Things (IoT) are becoming reality. Although the basic principles of this new communication paradigm are well defined, yet the practice lacks knowledge of the difficulties related to its practical realization and usage. This paper aims at highlighting some hands-on problems and solutions when implementing a simple and yet very comprehensive and easy to use smart-home solution. Our design is based on Bluetooth Low Energy (BLE) communication with the peripheral devices and an Android central hub for coordination. The proposed solution gains the advantages provided by the Google Firebase Cloud Messaging (FCM), in order to provide geographical flexibility for the client’s application and networking. The paper provides testing results related to the development and verification of the smart home solution. 
Click for more details 



IEEE 2020: Development of Smart Home System Controlled by Android Application 
Abstract: This paper presents a low-cost smart home system with an efficient system. The hardware consists of NodeMCU Arduino, PIR sensor, temperature sensor, light dependent resistor and a motion sensor in IP Camera. The software includes ArduinoIDE and MIT app inventor II for Android mobile phones. The system developed based on Android user Interface for controlling a smart home. The NETPIE platform, which is a network of IoT, is used for interfacing between a user and a smart home. This system consists of lighting system, fan and security system. The notification is through LINE Notify app. The system includes two control systems; manual and automatic. From the results, it is shown that the control system is well performance while it is developed just low-cost devices. 
Click for more details 


IEEE 2018: TripImputor: Real-Time Imputing Taxi Trip Purpose Leveraging Multi-Sourced Urban Data
Abstract: Travel behavior understanding is a long-standing and critically important topic in the area of smart cities.Big volumes of various GPS-based travel data can be easily collected, among which the taxi GPS trajectory data is a typical example. However, in GPS trajectory data, there is usually little information on travelers’ activities, thereby they can only support limited applications. Quite a few studies have been focused on enriching the semantic meaning for raw data, such as travel mode/purpose inferring. Unfortunately, trip purpose imputation receives relatively less attention and requires no realtime response. To narrow the gap, we propose a probabilistic two-phase framework named TripImputor, for making the realtime taxi trip purpose imputation and recommending services to passengers at their dropoff points. Specifically, in the first phase, we propose a two-stage clustering algorithm to identify candidate activity areas (CAAs) in the urban space. Then, we extract fine granularity spatial and temporal patterns of human behaviors inside the CAAs from foursquare check-in data to approximate the priori probability for each activity, and compute the posterior probabilities (i.e., infer the trip purposes) using Bayes’ theorem. In the second phase, we take a sophisticated procedure that clusters historical drop off points and matches the drop off clusters and CAAs to immerse the real-time response. 

Click for more details 

IEEE 2018: Android Based Advanced Attendance Vigilance System Using Wireless Network with Fusion of Bio-metric Fingerprint Authentication

Abstract: In this digital era, different organizations have started taking attendance using biometric fingerprint authentication. This will keep the track of employee’s attendance but the question arises if the employee is fully present at his/her workplace after giving attendance. In this modern era of digitalization, it is seen that after giving attendance a huge number of employees escape away from their workplace and do their personal job in the office time. This paper focuses on a smart attendance system where an android device will be used as a smart ID card. A mobile application is developed in Java to ensure the attendance of an individual employee using bio-metric fingerprint authentication. In addition, the entire working place will be a Wi-Fi zone. So, the connection or disconnection of the android device (Smart ID card) to the router will determine whether an employee is present in the working place or not. A counter will be there into the system to count the total amount of time an employee spends in the working place.

Click for more details 

IEEE 2018: Web Services for Mobile Devices from One Server
Abstract: Mobile devices used for communication between people only for speaking people in the past but today one of the most personal kind devices in the cloud environment [1]. The environment is expanding day by day via accessibility connecting internet with devices. The device can be any kind of device if it has the ability working with web. The transaction should be with sending and receiving messages [2]. Mobile devices can connect the cloud also [3]. This article aims answering the question “Is cloud environment server its system equally for any kind of mobile devices which has different operation system?”, throttling mechanism for mobile world which has the devices with multiple cores and push services for mobile devices. In this paper, will be discussed two mobile operations, which are Windows Phone and Android because of comparison of open source and secret sauce. Push services, the use of different protocols in the same environment with the resulting differences and message level security issues are another issue discussed in the paper.

IEEE 2018: Privacy-Preserving Context-Aware Friend Discovery Based on Mobile Sensing
Abstract: With the advancement of smart phones, wearable devices and communication technologies, it becomes very convenient to obtain various types of data through mobile sensing, where data can be sensed via embedded sensors, stored, processed, and transmitted to anywhere. Mobile sensing has been studied extensively in both academy and industry, and has been applied in many novel applications in the past few years, such as environment and traffic monitoring and mobile health. In  this work, we propose a new application scenario called contextaware friend discovery based on mobile sensing, where contextual attributes such as location, weather and temperature are utilized to enhance the existing friend discovery schemes. However, data privacy becomes a major concern for consumers to accept this application. To address this issue, we further propose a privacypreserving context-aware friend discovery scheme, where a user’s sensitive data is well protected. Security analysis shows the correctness and privacy guarantee of the proposed scheme.
IEEE 2018: NFC-based mobile application design restaurant ordering system APP
Abstract: As smartphones grow rapidly and wireless communication technology develops maturely, mobile applications of all sorts keep emerging. At present, the wireless communication technology that smart phones incorporate most often is Near Field Communication, NFC, which is applied to hand phones with built-in NFC with which users make payment, read messages, and close-range device matching, for example. Restaurants have given away coupons to customers after consumption or accumulate points for exchange of other discounts or gifts using member cards, so as to attract customers to come back again; however, it is not unusual that consumers forget to come to restaurants without their cards or even have lost them. In this regard, this study will design a Restaurant system App, with which the consumers will browse on the mobile devices the discounts, information on meals and other services, and will integrate member bonus and coupons as well as number call service into the App by means of data transmission with NFC technique.
IEEE 2018: Providing Security for NFC-Based Payment Systems Using a Management Authentication Server
Abstract: Recent models of mobile phones have been designed to offer many services such as mobile e-commerce, e-ticketing, e-payment, among many other services. Of a particular importance nowadays is the NFC-enabled mobiles in which the NFC technology allowed the integration of services from various applications into one single mobile. However, the EMV protocol, which is currently used to provide the required security for NFC-based payment systems, has two serious vulnerabilities between user payment devices and the merchants’ point of sales which could lead to obvious risks for users. These two security vulnerabilities must be treated to secure NFC-based mobile payment transactions. In this paper a protocol is proposed to improve the security of EMV by adding a new security layer. The security provided by the protocol to EMV has been verified against major security attacks.
IEEE 2018: Defining the Functional Requirements for the NFC Based Medication Administration and Clinical Communication System
Abstract: Failure to confirm the ‘five rights’ of medication administration, verify contraindications, and effectively communicate with healthcare professionals are three major causes of bedside medication administration (BMA). These causes can be addressed by developing an efficient system integrated with wireless technology such as Near Field Communication (NFC). The long-term purpose of this research is to design a sufficient NFC-based system to overcome the major causes of BMA errors. Before we can design the system, we must first determine its functional requirements. Therefore, in this paper, we used theoretical and practical sources to form a clear picture of the BMA procedure. We identified the essential methods used in nursing practice to ensure safe BMA, and their limitation. Accordingly, we drew an initial technical concept of the system functions that will help us design the system.

Click for more details 


IEEE 2018: Cloud-based Web Application with NFC for Employee Attendance Management System
Abstract: Efficient employee attendance management leads any organizations to increase overall corporate performance and accomplish specific goals. Accurate employee attendance records are importantly used to control working discipline and increase worker’s productivity. Manual attendance-time checking makes increasingly the expense of time-consuming and paper work of the companies. Human actions i.e. mistake at work, and fraudulent time keeping are additional hidden expenses which affect the productivity of the organization. Variation of the attendance policies set up in different companies make more complicated in evaluation of employee working hours. Hence, automated timeattendance management system is the key operational variables for enhancing the performance, and profitability. The attendance management system captures time-attendance data and serves the management of the employee working hour records. However, some existing time attendance systems have limitations in terms of identification speed, cost of system devices, real-time attendance monitoring, and flexibility of database storage size. In this paper, we introduce a cloud-based employee attendance management system using NFC technology. The proposed application provides several important operations such as captured attendance records using NFC, automatic time calculation, leave and overtime checking, working hours evaluation, real-time updated information access, and generating reports. The proposed system also offers online portal which allows multiple company user accounts, requires no special software to install, and provides more flexible data storage. The evaluation of user satisfaction shows that our proposed system is practically used and satisfied.

IEEE 2017: A Classroom Scheduling Service for Smart Classes
Abstract: During past decades, the classroom scheduling problem has posed significant challenges to educational programmers and teaching secretaries. In order to alleviate the burden of the programmers, this paper presents Smart Class, which allows the programmers to solve this problem using web services. By introducing service-oriented architecture (SOA), Smart Class is able to provide classroom scheduling services with back-stage design space exploration and greedy algorithms. Furthermore, the Smart Class architecture can be dynamically coupled to different scheduling algorithms to fit in specific demands. A typical case study demonstrates that Smart Class provides a new efficient paradigm to the traditional classroom scheduling problem, which could achieve high flexibility by software services reuse and ease the burden of educational programmers. Evaluation results on efficiency, overheads and scheduling performance demonstrate the Smart Class has lower scheduling overheads with higher efficiency.Read More
Click for more details 



IEEE 2017: GeoMoB – A Geo Location based browser for secured Mobile Banking

Abstract: With banks reaching its users via mobile banking, it is becoming one of the essential features that are demanded by almost every Smartphone user. Mobile banking via a mobile browser is similar to internet banking. Browsing-based threats for smart phones are just the same as those for personal computers, elevating the need to focus on mobile security. Among the several authentication schemes, geo location authentication is gaining importance as it is found most suitable for mobile devices. In this paper, GeoMoB, a dedicated secure mobile browser for mobile banking that makes use of multifactor authentication is designed and developed. GeoMoB features a geo location based authentication scheme which ensures security of mobile transactions based on the user location. In addition to the existing two factor authentication scheme using user ID, password and OTP, the mobile number and geo location is used to authenticate the user. The geo location intimates the banks location from where the transaction is going to be performed thus helping banks to ensure secure transactions. The geo location of the user is acquired through the network provider and hence the need for using GSM is eliminated. The multifactor authentication used in GeoMoB ensures security while performing mobile transaction and prevents users from various attacks.Read More



IEEE 2017:Child Safety Wearable Device

Abstract: This paper discusses the concept of a smart wearable device for little children. The major advantage of this wearable over other wearable is that it can be used in any cell phone and doesn't necessarily require an expensive smart phone and not a very tech savvy individual to operate. The purpose of this device is to help parents locate their children with ease. At the moment there are many wearable’s in the market which help track the daily activity of children and also help find the child using Wi-Fi and Bluetooth services present on the device. But Wi-Fi and Bluetooth appear to be an unreliable medium of communication between the parent and child. Therefore, the focus of this paper is to have an SMS text enabled communication medium between the child's wearable and the parent as the environment for GSM mobile communication is almost present everywhere. The parent can send a text with specific keywords such as "LOCATION" "TEMPERA TURE" "UV" "SOS" "BUZZ", etc., the wearable device will reply back with a text containing the real time accurate location of the child which upon tapping will provide directions to the child's location on Google maps app and will also provide the surrounding temperature, UV radiation index so that the parents can keep track if the temperature or UV radiation is not suitable for the child. The Prime motivation behind this project is that we know how important technology is in our lives but it can sometimes can't be trusted, and we always need to have a secondary measure at hand. The secondary measure used in this project is the people present in the surrounding of the child who could instantly react for the Child’s safety till the parents arrives or they could contact the parents and help locate them. The secondary measure implemented was using a bright SOS Light and distress alarm buzzer present on the wearable device which when activated by the parents via SMS text should display the SOS signal brightly and sound an alarm which a bystander can easily spot as a sign of distress.

Read More



IEEE 2017: Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System

Abstract: The convergence of Internet of Things (IoT), cloud computing and wireless body-area networks (WBANs) has greatly promoted the industrialization of e-/m-healthcare (electronic-/mobile-healthcare). However, the further flourishing of e-/m-Healthcare still faces many challenges including information security and privacy preservation. To address these problems, a healthcare system (HES) framework is designed that collects medical data from WBANs, transmits them through an extensive wireless sensor network infrastructure and finally publishes them into wireless personal area networks (WPANs) via a gateway. Furthermore, HES involves the GSRM (Groups of Send-Receive Model) scheme to realize key distribution and secure data transmission, the HEBM (Homomorphic Encryption Based on Matrix) scheme to ensure privacy and an expert system able to analyze the scrambled medical data and feed back the results automatically.

Read More



IEEE 2017: A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

Abstract: With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are substantial studies that have been conducted to improve the cloud security. However, most of them are not applicable for mobile cloud since mobile devices only have limited computing resources and power. Solutions with low computational overhead are in great need for mobile cloud applications. In this paper, we propose a lightweight data sharing scheme (LDSS) for mobile cloud computing. It adopts CP-ABE, an access control technology used in normal cloud environment, but changes the structure of access control tree to make it suitable for mobile cloud environments. LDSS moves a large portion of the computational intensive access control tree transformation in CP-ABE from mobile devices to external proxy servers. Furthermore, to reduce the user revocation cost, it introduces attribute description fields to implement lazy-revocation, which is a thorny issue in program based CP-ABE systems. The experimental results show that LDSS can effectively reduce the overhead on the mobile device side when users are sharing data in mobile cloud environments.

Read More




IEEE 2017:Privacy-Preserving Location-Proximity for Mobile Apps

Abstract: Location Based Services (LBS) have seen alarming privacy breaches in recent years. While there has been much recent progress by the research community on developing privacy-enhancing mechanisms for LBS, their evaluation has been often focused on the privacy guarantees, while the question of whether these mechanisms can be adopted by practical LBS applications has received limited attention. This paper studies the applicability of Privacy-Preserving Location Proximity (PPLP) protocols in the setting of mobile apps. We categorize popular location social apps and analyze the tradeoffs of privacy and functionality with respect to PPLP enhancements. To investigate the practical performance trade-offs, we present an in-depth case study of an Android application that implements Inner Circle, a state-of-the-art protocol for privacy preserving location proximity. This study indicates that the performance of the privacy-preserving application for coarsegrained precision is comparable to real applications with the same feature set.

Read More


IEEE 2017:Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications

Abstract: Authenticated key exchange (AKE) is one of the most important applications in applied cryptography, where a user interacts with a server to set up a session key where pre-registered information (aka. authentication factor), such as a password or biometrics, of the user is stored. While single-factor AKE is widely used in practice, higher security concerns call for multi-factor AKE (MFAKE) schemes, e.g. combining both passwords and biometrics simultaneously. However, in some casually designed schemes, security is even weakened in the sense that leakage of one authentication factor will defeat the whole MFAKE protocol. Furthermore, an inevitable by-product arise that the usability of the protocol often drop greatly. To summarize, the existing multi-factor protocols did not provide enough security and efficiency simultaneously. In this paper, we make one step ahead by proposing a very efficient MFAKE protocol. We define the security model and give the according security analysis. We also implement our protocol on a smart phone and a cloud server. The theoretic comparisons and the experimental results show that our scheme achieves both security and usability.

Read More



IEEE 2017:My Privacy My Decision: Control of Photo Sharing on Online Social Networks

Abstract: Photo sharing is an attractive feature which popularizes Online Social Networks (OSNs). Unfortunately, it may leak users’ privacy if they are allowed to post, comment, and tag a photo freely. In this paper, we attempt to address this issue and study the scenario when a user shares a photo containing individuals other than himself/herself (termed co-photo for short). To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual in a photo be aware of the posting activity and participate in the decision making on the photo posting. For this purpose, we need an efficient facial recognition (FR) system that can recognize everyone in the photo. However, more demanding privacy setting may limit the number of the photos publicly available to train the FR system. To deal with this dilemma, our mechanism attempts to utilize users’ private photos to design a personalized FR system specifically trained to differentiate possible photo co-owners without leaking their privacy. We also develop a distributed consensus based method to reduce the computational complexity and protect the private training set. We show that our system is superior to other possible approaches in terms of recognition ratio and efficiency. Our mechanism is implemented as a proof of concept Android application on Facebook’s platform.

Read More



IEEE 2017: IoT based Home Security through Digital Image Processing Algorithms

Abstract- This paper gives an outline for automatic system to control and secure the home, based on digital image processing with the help of Internet of Things (IoT). The system consists of a sensor, digital camera, database in the fog and the mobile phone. Sensors are placed in the frame of the door which alerts camera, to capture an image who intends to enter the house, then sends the image to the database or dataset that is stored in the fog. Image analysis is performed to detect and recognize and match the image with the stored dataset of the authenticated people or pets. If the image captured does not match with the dataset then an alert message is send to the owner of the house. The image processing algorithms are considered for the processing spatial and time complexity of the image captured to cross check with the dataset stored in the fog.

Read More


IEEE 2017: ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes

Abstract- Smartphones have been widely used with a vast array of sensitive and private information stored on these devices. To secure such information from being leaked, user authentication schemes are necessary. Current password/pattern-based user authentication schemes are vulnerable to shoulder surfing attacks and smudge attacks. In contrast, stroke/gait-based schemes are secure but inconvenient for users to input. In this paper, we propose ShakeIn, a handy user authentication scheme for secure unlocking of a smartphone by simply shaking the phone. With embedded motion sensors, ShakeIn can effectively capture the unique and reliable biometrical features of users about how they shake. In this way, even if an attacker sees a user shaking his/her phone, the attacker can hardly reproduce the same behaviour. Furthermore, by allowing users to customize the way how they shake the phone, ShakeIn endows users with the maximum operation flexibility. We implement ShakeIn and conduct both intensive trace-driven simulations and real experiments on 20 volunteers with about 530; 555 shaking samples collected over multiple months. The results show that ShakeIn achieves an average equal error rate of 1:2% with a small number of shakes using only 35 training samples even in the presence of shoulder-surfing attack.

Read More




IEEE 2016: Dummy-Based User Location Anonymization Under Real-World Constraints
IEEE 2016  Android Application 


Abstract According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services (LBSs) have been launched. Since location information may reveal private information, preserving location privacy has become a significant issue. Previous studies proposed methods to preserve a users' privacy; however, most of them do not take physical constraints into consideration. In this paper, we focus on such constraints and propose a location privacy preservation method that can be applicable to a real environment. In particular, our method anonymizes the user's location by generating dummies which we simulate to behave like real human. It also considers traceability of the user's locations to quickly recover from an accidental reveal of the user's location. We conduct an experiment using five users' real GPS trajectories and compared our method with previous studies. The results show that our method ensures to anonymize the user's location within a pre-determined range. It also avoids fixing the relative positions of the user and dummies, which may give a hint for an LBS provider to identify the real user. In addition, we conducted a user experiment with 22 participants to evaluate the robustness of our method against humans. We asked participants to observe movements of a user and dummies and try to and the real user. As a result, we conformed that our method can anonymize the users' locations even against human's observation.

 IEEE 2016: STAMP: Enabling Privacy-Preserving        Location Proofs for Mobile Users
  IEEE 2016  Android Application 

Abstract— Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations. In this paper, we present the Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. A semi-trusted Certification Authority is used to distribute cryptographic keys as well as guard users against collusion by a light-weight entropy-based trust evaluation approach. Our prototype implementation on the Android platform shows thatSTAMP is low-cost in terms of computational and storage resources. Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy.



IEEE 2016: PRISM: Privacy-aware Interest Sharing and Matching in Mobile Social Networks
IEEE 2016  Android Application

     Abstract—In a profile matchmaking application of mobile social networks, users need to reveal their interests to each other in order to find the common interests. A malicious user may harm a user by knowing his personal information. Therefore, mutual interests need to be found in a privacy preserving manner. In this paper, we propose an efficient privacy protection and interests sharing protocol referred to as PRivacy-aware Interest Sharing and Matching (PRISM). PRISM enables users to discover mutual interests without revealing their interests. Unlike existing approaches, PRISM does not require revealing the interests to a trusted server. Moreover, the protocol considers attacking scenarios that have not been addressed previously and provides an efficient solution. The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM against both passive and active attacks. Through implementation, we also present a detailed analysis of the performance of PRISM and compare it with existing approaches. The results show the effectiveness of PRISM without any significant performance degradation. 
                            

     
IEEE 2016:  SBVLC: Secure Barcode-Based Visible Light Communication for Smartphone
IEEE 2016  Android Application


     Abstract— 2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption—almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC—a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and contact less payment. SBVLC is evaluated through extensive experiments on both Android and iOS smartphones.  


IEEE 2015:  Context-Aware Mobile Cloud Computing and Its Challenges
IEEE 2015  Android Application


Abstract: Cloud computing is gaining popularity due to virtually unlimited resources, low capital cost, ease of adoption, flexible resource provisioning, and high scalability. Considering these benefits, researchers envision the usage of cloud computing for mobile devices to overcome the ever-increasing computational and energy demands of smartphone applications. However, this requires specialized context-ware application development models that can facilitate the development of cloud-enabled applications capable of making context-aware computation offloading decisions. This article provides an overview of mobile cloud computing technology, focusing on its context-awareness aspects and challenges.




IEEE 2015: Mobile attendance using Near Field     Communication and One-Time     Password
IEEE 2015  Android Application

Abstract: This paper introduces a Near Field Communication (NFC) supported College M-Attendance system for University Students. Near Field Communication (NFC) is one of the latest technologies in radiocommunications and being a subset of RFID technology, it is growing at an enormous pace. NFC technology provides the fastest way to communicate between two devices and it happens within a fraction of a second. It has several applications in Mobile Communications and transactions. An NFC-supported College M-Attendance system for University Students is discussed as one potential use of this technology. The proposed framework replaces manual roll calls and hence, making it resilient to forgery. It gives parents and professors information about the students' attendance. The marking ofattendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. This paper discusses NFC as a technology that is more secure and convenient than the prevalent technology of Bluetooth, and also elaborates on the proposed framework of the M-Attendance system that makes use of this advantage that NFC has over other technologies.



IEEE 2014:  NFC based applications for visually impaired people - A review
IEEE 2014  Android Application


Abstract: Recent technological developments provide technical assistance that enables supporting people with visual disabilities in their everyday tasks and improve their quality of life. Considering that about 90% of the world visually impaired people live in developing countries, particularly in the local context, in Saudi Arabia, there is a lack of assistive tools and adapted environment supporting people with visual disabilities. To overcome this problem, a wide variety of relatively inexpensive applications adapt Near Field Communications (NFC) tagging technology in the development of assistive tools for people with visual disabilities. In this article, we will systematically review the current adaptation of NFC technology for visually disabled people and introduce NFC practical applications to help them overcome challenging tasks that they may encounter every day.









No comments:

Post a Comment

IEEE 2023: WEB SECURITY OR CYBER CRIME

  IEEE 2023:   Machine Learning and Software-Defined Networking to Detect DDoS Attacks in IOT Networks Abstract:   In an era marked by the r...