Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT <p>This Journal involves the basic principles of Android and IOS Applications and Testing where iOS (originally iPhone OS) is a mobile operating system created and developed by Apple Inc. and distributed exclusively for Apple hardware and Android is a mobile operating system (OS) based on the Linux kernel and currently developed by Google.</p> <ul> <li>Characteristics of Android</li> <li>Characteristics of IOS</li> <li>Mobile Operating System</li> <li>Linux Kernel</li> <li>Google Play</li> <li>Open Source Programming</li> <li>Open Source Libraries Unit Testing</li> <li>Acceptance Testing</li> <li>Linux</li> <li>Unix</li> </ul> en-US Sun, 10 Jan 2016 00:00:00 +0530 OJS 3.3.0.8 http://blogs.law.harvard.edu/tech/rss 60 Study of OwnCloud Replication of Mobile Information on ownCloud http://matjournals.co.in/index.php/JoAAT/article/view/7336 <p>Main aim of this paper is to produce info on ownCloud. Several staff use cloud primarily based services to share sensitive company knowledge with one another, vendors, customers and partners. They synchronize knowledge to their personal devices and residential compute rs in a trial to try to to their jobs quickly and with efficiency. Replication is that the method of making and managing duplicate version of info. It not solely copies the info; however, additi onally synchronize the set of duplicates in order that changes created in one replica area unit created in different info.</p> Snehal S. Choudhari, Payal R. Chandre Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7336 Sat, 20 Feb 2016 00:00:00 +0530 An Introduction to Mobile Computing: A Growth for Security http://matjournals.co.in/index.php/JoAAT/article/view/7311 <p>As too many people fancy the disparate services brought by mobile computing, it is conformist a worldwide verge in today’s world. At an equivalent time, securing mobile computing has been paid continuous increasing attention. During this article, the safety problems in mobile computing setting square measure mentioned. This paper helps to research the safety risks confronted by mobile computing and gift the present security mechanisms.</p> G Selva Priya, R Aswini, T Primya, V Suresh, P Anitha Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7311 Tue, 03 Sep 2024 00:00:00 +0530 Role of Honeypot in Computer Security http://matjournals.co.in/index.php/JoAAT/article/view/7333 <p>A honeypot could be a deception entice, designed to tempt an offender into trying to compromise the data systems in a corporation. If deployed properly, a honeypot will function an early-warning and advanced security police investigation tool, minimizing the risks from attacks on that systems and networks. Additionally, it offers valuable insight into potential system loopholes. Information assortment is that the major task of network forensics and honeypots are utilized in network forensics to gather helpful information. Honeypot is an exciting new technology with huge potential for security communities. This paper would first provide a temporary introduction to honeypots the categories and its uses, their importance in network security.</p> Rohini Degaonkar, Savita Khatode Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7333 Thu, 18 Aug 2016 00:00:00 +0530 Review on Steganography-An Art of Hiding Data http://matjournals.co.in/index.php/JoAAT/article/view/7329 <p>Steganography is that the art of coated or hidden writing. The aim of steganography is covert communication-to hide the existence of a message from a third party. This paper is meant as a high-level technical introduction to steganography for those unacquainted the sector. It is directed at rhetorical laptop examiners WHO would like a sensible understanding of steganography while not delving into the arithmetic, though references square measure provided to a number of the continuing analysis for the one who wants or desires further detail. Though this paper, provides a historical context for steganography, the stress is on digital applications, that specialize in activity info in on-line image or audio files. Samples of code tools that use steganography to cover knowledge inside alternative files similarly as code to notice such hidden files will be bestowed.</p> Ashwini S. Jadhav Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7329 Wed, 13 Jul 2016 00:00:00 +0530 A Detailed Review on Cybercrime and Cyber Security http://matjournals.co.in/index.php/JoAAT/article/view/7323 <p>Cybercrime is changing into ever additional serious. Findings from the 2002 Computer Crime associate in nursing Security Survey show an upward trend that demonstrates a necessity for a timely review of existing approaches to fighting this new development within the modern era. During this paper, we have a tendency to outline differing types of crime and review previous analysis and current standing of fighting crime in several countries that deem legal, structure, and technological approaches. We have a tendency to specialize in a case study of fighting crime in India and discuss issues featured. Finally, we have a tendency to propose many recommendations to advance the work of fighting crime.</p> Sonali P. Gadhari, Pooja S. Jadhav Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7323 Fri, 20 May 2016 00:00:00 +0530 NoSQL Storage Systems – A Review http://matjournals.co.in/index.php/JoAAT/article/view/7314 <p>NoSQL systems have fully grown in quality for storing massive information as a result of these systems supply high convenience, i.e., operations with high output and low latency. However, information in these systems square measure handled these days in ad-hoc ways that. We have a tendency to gift Wasef, a system that treats information in a very NoSQL information system, as excellent voters. Information might embrace data such as: operational history for an information table (e.g., columns), placement data for ranges of keys, and operational logs for information things (key-value pairs). Wasef permits the NoSQL system to store and question this information with efficiency. We have a tendency to integrate Wasef into Apache Cassandra, one among the foremost widespread key-value stores.</p> Anika Gupta Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7314 Wed, 26 Oct 2016 00:00:00 +0530 Study and Survey of Social Networking and Facebook http://matjournals.co.in/index.php/JoAAT/article/view/7334 <p>Online social networking provides the user with the facilities love sharing, organizing and finding content and contacts. The utility and speedy development of those sites offers rise to review the characteristics and also the utilization of on-line social networks on giant scale. Understanding and analysis of social networking is incredibly vital to boost this system and to style new applications for on-line social networks. This text presents a user’s study and analysis of social networks love Facebook.</p> Pooja M. Chavan, Tejaswini V. Daware Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7334 Tue, 30 Aug 2016 00:00:00 +0530 Robot Control using Android Smartphone http://matjournals.co.in/index.php/JoAAT/article/view/7330 <p>An open-source platform Android has been widely used in smart phones. Android has complete software package consisting of an operating system, middle ware layer and core applications. Android application, Smart phones are becoming each time more powerful and equipped with several accessories that are useful for robots. The purpose of our project is to provide powerful computational android platforms with simpler robot’s hardware architecture. This project describes how to control a robot using mobile through Bluetooth communication, some features about Bluetooth technology, components of the mobile and robot. For project we developed two android applications, in that first application sends instruction to the other application which is placed in another smart phone on robot. We are developing the remote buttons in the second android app by which we can control the robot motion, direction with them and also use mobiles basic features like camera, video. We use Bluetooth communication to interface controller and android. We derived simple solutions to provide a framework for building robots with very low cost but with high computation and sensing capabilities provided by the smart phone that is used as a control device.</p> Dipak Gonde, Sumedh Jadhav, Mandar Lokhande Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7330 Sat, 23 Jan 2016 00:00:00 +0530 Review on Android Application – An E-Notice Application http://matjournals.co.in/index.php/JoAAT/article/view/7326 <p>E-Notice App helps you access on-line notices on your phone. It is a web board maker, wherever, a gaggle of individuals will simply communicate with one another by protruding virtual notes. These notes will have text, images. The board has perpetually been the place wherever staff/students gathers to urge their latest unharness of company news. E-Notice brings the board to a virtual location wherever staff/students cannot solely browse notices, however, in real time react and answer them-from their own desks! With this electronic notice and announcement system, notification could also be sent out notifying workers that a brand new notice has been denote, wherever, workers might apprehend if it issues him directly. During this approach, E-Notice Application additionally is a listing for all workers within the directory. This eliminates the requirement to stay a separate listing that is tough to keep up thanks to the speedy movement of workers.</p> Veena Deolankar, Pooja Ukarde Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7326 Thu, 23 Jun 2016 00:00:00 +0530 A Review on Steganography – Hidden Information http://matjournals.co.in/index.php/JoAAT/article/view/7317 <p>Steganography is that the art of and science of writing hidden messages in such the simplest way that nobody, except for sender and supposed recipient suspects the existence of message. Many alternative carrier file formats is used, however, digital pictures are the foremost common one. For concealing secret data in pictures, there exists an outsized sort of steganography techniques some are a lot of complicated than others and every one of them have various sturdy and weak points. Steganography is thought of as data importing. Each recipient and sender should skills to rewrite the hidden message. This can be done by exploitation key. Totally different applications could need absolute physical property of the key data. This project report intends to provide an outline of image steganography, its uses and techniques. It additionally tries to spot the wants of an honest steganography algorithmic program and shortly reflects on that steganographic techniques are a lot of appropriate that applications. Steganography is that the observe of concealing non-public or sensitive data inside one thing that seems to be nothing resolute the standard. Steganography is commonly confused with cryptanalysis as a result of the two is similar within the manner that they each are will not to defend necessary data. The distinction between two is that steganography involves activity data, therefore, it seems that no data is hidden the least bit. If an individual or persons views the item that the data is hidden inside he or she is going to have not any concept that there is any hidden information, thus the person would not conceive to decipher the knowledge. What Steganography primarily will is exploit human perception, human senses do not seem to be trained to seem for files that have data inside them, though this software package is on the market which will do what is known as Steganography. The foremost common use of steganography is to cover a file within another file. Steganography tools for activity data includes any kind of data file and image files and, therefore, the path wherever the user desires to avoid wasting image and extruded file.</p> Susmita Thombre, Apurva Mohite Copyright (c) 2024 Journal of Android and IOS Applications and Testing http://matjournals.co.in/index.php/JoAAT/article/view/7317 Tue, 29 Nov 2016 00:00:00 +0530