Ground Moving Target Detection and Imaging Usinga Virtual Multichannel Scheme in HRWS Mode

Garbage Management System Project

Ground Moving Target Detection and Imaging Usinga Virtual Multichannel Scheme in HRWS Mode

Along-track multichannel synthetic aperture radaris usually used to achieve ground moving target detection andimaging. Nevertheless, there is a design dilemma between azimuthhigh resolution and wide swath (HRWS). To solve this problemin HRWS mode, we introduce a virtual multichannel (VMC)scheme. For each virtual channel, the low real pulse repetitionfrequency (PRF) improves the ability of resolving range ambiguityfor wide-swath, and the high virtual PRF improves the capabilityof resolving Doppler ambiguity for azimuth high resolution. Formultiple virtual channels, strong ground clutter is eliminated bythe joint VMC processing. Furthermore, a detailed signal modelof a moving target in the virtual channel is given, and the specialfalse-peak effect in the azimuthal image is analyzed. Moreover, wepropose a novel ground moving target processing method basedon the VMC scheme and the clutter suppression interferometry(CSI) technique, which is called VMC-CSI. https://codeshoppy.com/shop/product/location-based-garbage-management-system-for-smart-city/ The integration ofdetection, location, velocity estimation, and imaging for groundmoving targets can be achieved. Accounting for the unresolvedmain peak and false peak for a moving target, in the VMC-CSImethod, we adopt a two-step scheme to estimate the radial velocityand along-track velocity, namely, rough estimation and precise es-timation. Meanwhile, considering the same interferometric phasesof the main peak and the false peak, we use false peaks first for therobustness of initial azimuth location estimation and remove falsepeaks afterward. Numerical simulations are provided for testingthe effect of the false peak and the effectiveness of VMC-CSI

Garbage Management System Project

Concept of VMCFig. 1(a) shows an along-track three-element SAR array,used for ground moving target indication (GMTI), where PRFdenotes the real PRF of the SAR system. The middle ele-ment indicates a multiplexing element used for transmittingand receiving. In a T/R snapshot, three spatial samples areformed, in which the numbering of “11,” “12,” and “13” denoteround-trip signification from the first transmitting element tothe first receiving element, the second receiving element, andthe third receiving element, respectively. Note that the loca-tion of the spatial sample can be approximately taken as anequivalent phase center that is positioned midway between theseparate transmitting and receiving elements [27], [39], andit is defined as the location of the virtual element. Hence,we can obtain three data channels in multiple T/R snapshots.Fig. 1(b) shows an MPC-SAR array for the purpose of HRWSstatic-scene imaging. Similarly, in a T/R snapshot, it receivesthree spatial samples. However, they are jointly processed, anda virtual channel is reconstructed for the MPC-SAR system.To simultaneously achieve GMTI and static-scene imaging in HRWS mode, VMC can be divided in a manner shown inFig. 1(c). The numbering of “21,” “22,” and “23” denotesround-trip signification from the second transmitting elementto the first receiving element,the second receiving element,and the third receiving element, respectively. The low realPRF ensures no range ambiguity in wide swath. Moreover, ineach virtual channel, temporal sampling is replaced with spatial sampling, and this overcomes the contradiction between wideswath and high azimuthal resolution. In addition, the unitedprocessing among the VMCs can realize detection and imagingfor the ground moving target in HRWS mode. It is noticed thatalthough a MIMO-SAR array in Fig. 1(c) is used to illustratethe VMC concept, the VMC can also be reconstructed by theexisting along-track multichannel SAR array at the price ofmore receiving elements.

First, the three virtual channels are gen-erated as shown in Fig. 1(c). Then, the strong ground clutteris suppressed by the displaced phase center antenna (DPCA)technique. Second, the interferometric phase information of thetwo cancelation channels after clutter suppression is extractedand used to estimate the initial location of the moving target. Code Shoppy In theory, the real main peak and the false peaks have thesame interferometric phase. Therefore, the mean of multipleinterferometric phases can be used to improve the locationprecision. Third, Doppler centroids corresponding to the realmain peak and false peaks are taken as candidates to betested. Together with the initial location information, a set ofradial velocity is obtained. Then, the phase error compensationfunction is constructed. The image entropy or image contrastis taken as the criterion, and the 2-D real velocity is unitedestimated. Finally, the multiple estimated parameters of thetarget are used to compensate for the error signal and constructthe azimuthal matched filter of the moving target. Eventually,this accomplishes the focused image.

A Food Wastage Reduction Mobile Application

Food Wastage Reduction Management Android App

A Food Wastage Reduction Mobile Application

Food Wastage Reduction Management Android App

According to [5], food waste is a significant issue around the world. It is predicted through a survey that more than 58 percent of food that people produce for consumption is wasted every day. Whereas, more than 60 percent of people in the third world countries are dying in malnutrition without proper food for a living. Therefore, the technologically developed countries are emphasizing more on this issue.

https://codeshoppy.com/shop/product/a-food-wastage-reduction-mobile-application/

Therefore, that less food can be wasted and can be distributed to the needy people. According to [6] in the age of modern era, where we are developed through artificial intelligence, people are more dependent on the smartphone. There are various applications, which are developed to control the huge wastage of food, and it provides the opportunity to send that extra food to the people who need it. There are multiple applications, which control food waste. The most useful food waste application for android and apple are discussed below:

A.Food waste application of Singapore (11th Hour) Tan Jun Yuan who is a food stall hawker from Singapore felt very bad noticing that people waste so much food in every year. He saw many vendors with leftover foods in a day. The quantity was 10 to 15 bowl of pork ribs served including other foods that he served the customers per day. He also saw that more than 35 percent of food he made every day was left as extra. Therefore, he created the application named 11Th Hour. This application provides the left and unused foods at the half of their original price before the restaurants are closed. After the creation of this application, there were almost 20000 downloads of this application [7].

B.Food waste reduction application from Netherlands (NoFoodWasted) August de Vocht, a citizen of Netherlands developed this application to reduce the amount of food waste. This application makes collaboration with the supermarket so that people can be aware of the foods that will be expired very soon. According to [8], it helps the users to upload their grocery items, which will expire soon so that people who are in need of food can buy them at a reduced price and use them. It helps to stop the wastage of excessive foods. More than 20000 people have found this application useful, and it has reduced the amount of food wastage in the Netherlands.

C.An application to control food waste by UK and Ireland (FoodCloud) This application has been declared as one of the useful food wastage application in the United Kingdom as well as Ireland. This application notifies the supermarkets about their surplus food so that the charitable societies can collect them and reduce the chances of food wastage. This application works as an intermediate that provides the type of foods and arranges the pick-up for the charities. It also collects and stores the food so that the charitable societies can collect the food according to their requirements. According to [9] more than 1200 business hubs and 3000 charitable societies work under this application to provide excess foods to the homeless people.

D.Food wastage Reduction Application from Africa (Cheetah) Some researchers from the University of Twente have developed this application to reduce the number of food wastages in Africa. It is seen that various fruits and vegetables lose their ability to be consumed due to poor road circumstances, less refrigeration in Africa. This application is created to gather those food items before they get rotten and distribute it to the needy malnutrition people of Africa. Dutch Ministry of Foreign Affairs helped the researchers in the development of this application. Mostly, farmers, the food transporters use this application, and it also helped them to reduce the chances of food bribing in Africa. It is expected that the public version of this application will be released within May, next year [10].

E.Indian Food Wastage Reduction Application (No Food Waste) No Food waste is an application from India that allows the restaurants, food stalls and parties to inform about their excessive leftover foods so that needy people can collect them for their usage. This application collects those foods and distributes those among the homeless people, slum dwellers and orphanages as well as nursing homes. Code Shoppy According to [11], the users can also notify them by showing hunger points, and they will distribute the foods to there. The only requirement is they take foods only if it is prepared two hours before. These applications have changed the use of artificial intelligence by providing food to the needy people. It is considered one of the best uses of software development. However, food wastage is still a bad habit. According to [12], people need to be more careful while preparing or ordering food because many people around the world do not get to eat. Food wastage reduction has decreased a lot due to the usage of this application, but people need to be more sensitive and careful so that a better world can be created where no food is wasted.

REAL-TIME VEHICLE DETECTION AND TRACKING USING DEEP NEURAL NETWORKS

On Road Vehicle Breakdown Assistance Finder Project

REAL-TIME VEHICLE DETECTION AND TRACKING USING DEEP NEURAL NETWORKS

Dynamic vehicle detection and tracking can provide essential data to solve the problem of road planning and traffic management. A method for real-time vehicle detection and tracking using deep neural networks is proposed in this paper and a complete network architecture is presented. Using our model, you can obtain vehicle candidates, vehicle probabilities, and their coordinates in real-time. The proposed model is trained on the PASCAL VOC 2007 and 2012 image set and tested on ImageNet dataset. By a carefully design, the detection speed of our model is fast enough to process streaming video. Experimental results show that proposed model is a real-time, accurate vehicle detector, making it ideal for computer vision application.

Introduction                                   

In today’s society, more and more vehicles are taking to the highways every year, which makes a push to monitor and control the traffic more efficiently. The real-time vehicle detection and tracing is essential for intelligent road routing, road traffic control, road planning and so on. Therefore, it is important to know the road traffic density real time, especially in mega cities for signal control and effective traffic management. For a long time, several approaches[1,2] in the literature have been proposed to resolve the problem of various moving vehicles; Nevertheless, the aim of real-time fully-automatic detection of vehicle is far from being attained as it needs improvement in detection and tracking for accurate prediction with faster processing speed. Zheng et al. use brake lights detection through color segmentation method to generate vehicle candidates and verify them through a rule-based clustering approach. A tracking-by-detection scheme based on Harris-SIFT feature matching is then used to learn the template of the detected vehicle on line, localize and track the corresponding vehicle in live video [2]. It is a good measure to extract vehicle areas, however, it needs a relatively ideal background. Wei Wang et al. have presented a method of multi-vehicle tracking and counting using a fisheye camera based on simple feature points tracking, grouping and association. They integrates low level feature-point based tracking and higher level “identity appearance” and motion based real-time association [1]. However, the average processing time of it is around 750ms, which is not fast enough to achieve the real-time processing. System based Convolutional Neural Networks (CNN) can provide the solution of many contemporary problems in vehicle detection and tracing. CNN currently outperform other techniques by a large margin in computer vision problems such as classification [3] and detection [4]. The training procedure of CNN automatically learn the weights of the filters, so that they are able to extract visual concepts from raw image content. Using the knowledge obtained through the analysis of the training set containing labelled vehicle and non-vehicle examples, vehicle can be identified in given images. In general, Convolutional Neural Networks show more promising results. In this paper, we propose a method of real-time vehicles detection and tracking using Convolutional Neural Networks. We present a network architecture, which create multiple vehicle candidates and predict vehicle probabilities in one evaluation. Our architecture uses features from the entire image to create vehicle candidates. Firstly, we use convolutional layers of the system to extract features from the raw image. Secondly, we use four kinds of inception modules. Thirdly, we add Spatial Pyramid Pooling (SPP) layer between convolutional layers and fully connected layers, which is able to resize any images into fixed size. Lastly, the fully connected layers predict the probability and coordinates of vehicles.

https://codeshoppy.com/shop/product/on-road-vehicle-breakdown-assistance-app/

Generation of the community structure of kernel

Generation of the community structure of kernel

As typical software system, kernel of Android OS could have a community structure. There are two main approaches to analyze the community structure: one is based on code repositories and the other is based on topology analysis. The community structure analysis based on code repositories is generated by developers. For instance, there are several folders in directory of kernel source code: arch, drivers, documentation, init, kernel and so on, while different folders represent different features. This approach to analyze community structure is convenient for operation. Meanwhile, classification by developers may not reflect essence of interaction between communities if the code repositories designed improperly. The community structure analysis based on topology analysis is more complicated, however, it can steadily help researchers comprehend the community structure. We use Louvain algorithm [14] based on modularity to analyze the community structure of android OS kernel.

Focus on the mesoscopic level of network structure, a network can be divided into different clusters by utilizing the modularity as a metric [15]. Modularity defined as follows: (3) Where ijA is the adjacency matrix of the network, iijjkA= is the degree of iv, ic is the community ivbelongs to, and 12ijijmA=is the total number of edges. According to this algorithm, We eventually reveal the kernel’s community structure with 242 components to build a community-interaction network code shoppy

To analyze the interaction of the communities in kernel, we model the network of community-interaction, whose nodes and edges are communities and the interactions between communities respectively. In the function-call network, 457 nodes which can form 162 communities are not connected to maximal connected subgroup, i.e. the communities built by those 457 nodes cannot interact to the communities in maximal connected subgroup so that we only analyze 80 communities which have interactions. The weights of edges are the total call times between two communities. We finally get a directed-weighted community-interaction network which can be visualized in Fig.3. The diameter of a node reflects the quantity of functions contained in this community. The nodes of darker color have a higher degree than those of light color. In addition, the weight of the edges is measured by the number of function-calls between different communities which is in proportion to the width of links. The network features are shown in TABLE 2. Strength iS is an indicator to measure the information-exchange strength of the node iv[16]

The topological structure of function-call network in the kernel of Android OS has been analyzed in global scale. We conduct the community analysis to abstract the network and establish of the community-interaction network revealing the function interaction in the large scale. To understand the network reliability, the percolation theory is applied to analyze both function-call level and community-interaction networks. In this way we can identify the critical nodes and communities. This finding may help the system design and reliability testing to understand the different role of function in the viewpoint of the whole software system https://codeshoppy.com/php-projects-titles-topics.html

The efficient implementation of the Android kerne

The efficient implementation of the Android kerne

The rapid development of mobile intelligentterminal, an increasing number of mobile phones operating systems also came into being. Android system has becomeone of the most popular device operating systems, whichprolongs its attention. Considering the legal requirementin communication security, the Android kernel encryptionmechanism for analysis and summary of the Android kernelbased on the China standard cryptographic algorithm securitytransformation. By adding the China standard cryptographicalgorithm SM2/SM3/SM4 in the AOSP (Android Open SourceProject) to replace the encryption algorithm in the Android 7.0system, provides confidentiality and integrity protection, andimproves the system’s encryption performance. And promotethe application of domestic password algorithm. codeshoppy

In recent years, with the rapid development of mobileInternet, mobile terminal intelligent devices have becomepopular, people use intelligent mobile terminal to obtain news information, social activities, entertainment shopping.Gradually, the intelligent mobile terminal has replaced thePC as an indispensable part of human life, work, and study. In many mobile phone operating system, The Androidoperating system [1] based on Linux, founded by GooglesOpen Handset Alliance, is one of the hottest device op-erating system. And its open source and easy to operatethe characteristics, which has been attracting much attentionof the equipment manufacturer and consumers of electronicproducts.With the popularity of Android devices, Android’s opensource feature as the risk brought about also threatens thesecurity of the Android platform, Personal information oftheir phones have become the most anxious for the user. An-droid system itself has provided a complete set of encryptionsystem, that is, the use of traditional encryption algorithmfor sensitive data within the system and application soft-ware signature and encryption to enhance system security.With the hardware processing speed and decryption meanscontinue to improve, the traditional encryption algorithm isfacing a serious challenge, Such as the confidentiality ofthe RSA algorithm with the increase of the key length,it does necessary to increase the key length in order toimprove the security of the data, This will reduce the speedof the algorithm. Traditional encryption algorithm is notonly been further studied, also its been attacked. There isa cracked security risks, in which it makes the personalinformation stored in the Android system and sensitive datafaced a serious threat. Cryptography algorithm, especiallythe encryption algorithm is the core of information security,so in a high security environment, we should use a betterperformance of the password algorithm. In recent years, Chi-na has also made great progress in cryptographic algorithms,The Chinese cryptography professor has cracked the world’stwo major cryptographic algorithms MD5 [2] and SHA-1[3]. National Commercial Cryptography Administrationhas also announced SM2 algorithm, SM3 algorithm, andSM4 algorithm.

In recent years, with the rapid development of mobileInternet, mobile terminal intelligent devices have becomepopular, people use intelligent mobile terminal to obtainnews information, social activities, entertainment shopping.Gradually, the intelligent mobile terminal has replaced thePC as an indispensable part of human life, work, andstudy. In many mobile phone operating system, The Androidoperating system [1] based on Linux, founded by GooglesOpen Handset Alliance, is one of the hottest device op-erating system. And its open source and easy to operatethe characteristics, which has been attracting much attentionof the equipment manufacturer and consumers of electronicproducts.With the popularity of Android devices, Android’s opensource feature as the risk brought about also threatens thesecurity of the Android platform, Personal information oftheir phones have become the most anxious for the user. An-droid system itself has provided a complete set of encryptionsystem, that is, the use of traditional encryption algorithmfor sensitive data within the system and application soft-ware signature and encryption to enhance system security.With the hardware processing speed and decryption meanscontinue to improve, the traditional encryption algorithm isfacing a serious challenge, Such as the confidentiality ofthe RSA algorithm with the increase of the key length,it does necessary to increase the key length in order toimprove the security of the data, This will reduce the speedof the algorithm. Traditional encryption algorithm is notonly been further studied, also its been attacked. There isa cracked security risks, in which it makes the personalinformation stored in the Android system and sensitive datafaced a serious threat. Cryptography algorithm, especiallythe encryption algorithm is the core of information security,so in a high security environment, we should use a betterperformance of the password algorithm. In recent years, Chi-na has also made great progress in cryptographic algorithms,The Chinese cryptography professor has cracked the world’stwo major cryptographic algorithms MD5 [2] and SHA-1[3]. National Commercial Cryptography Administrationhas also announced SM2 algorithm, SM3 algorithm, andSM4 algorithm.

 The efficient implementation of the Android kerne

SM4 algorithm is a block cipher algorithm, the packetlength is 128 bits, the key length is 128 bits [14]. Both theencryption algorithm and the key expansion algorithm arebased on 32 wheel nonlinear iterative structure. The decryp-tion algorithm is the same as the encryption algorithm, butthe order of the round key is opposite.

https://codeshoppy.com/android-app-ideas-for-students-college-project.html

Braille Diet :Dictionary Application for the Blind on Android Smartphone

Braille Diet : Dictionary Application for the Blind on Android Smartphone

Braille is the way the blind and the visually impaired read and write. Since the dictionaries which are suitable for the visually impaired are still scarce, we propose Braille Dict as a helpful application for the blind and the visually impaired to get the highest benefit in studying English and improve their quality of life. Braille Dict is an Android application on the smartphone which allows the blind and the visually impaired input English words via a Braille keyboard on the screen. Unlike other approaches, new effective method of inputting six-dot Braille is used to remarkably fasten the performance. Then, the word will be searched from the database and translated into Thai. Importantly, this application will speak all texts for user mainly by using a Text-to-Speech engine which would significantly provide a convenience to the visually impaired. codeshoppy

Braille Dict is the application runs on smartphones supporting Android platform. It converts Braille input to English letter and shows list of words which are relevant to the input word by retrieving from dictionary database. Importantly, the application uses Text-to-Speech engine to read the meaning of the selected word in Thai language. Braille Dict would provide a comfortable way for the blind to use a dictionary and help them minimize the time for searching the meaning of words from English to Thai. Other than that, this application would not only help users improve their English skills but also help them start learning the Braille alphabet as well. Normally, the blind need to use Braille in reading and writing because they cannot see. Braille is a system of touch reading and writing in which raised dots represent the letters of the alphabet and numbers, as well as music notes and symbols [1]. It is mainly used by those with impaired vision; however, normal vision people can read Braille as well. There are many reasons for this, especially for those with the blind or visually impaired person in their household. Generally speaking, the dictionary becomes an important media in learning English in today’s world. However, there is no suitable dictionary for the blind which they could use easily and conveniently like sighted people have. This is considered as a worrisome issue that should not be neglected.

The application for the blind on smartphone is not only an easy way but also effective to help the blind and the visually impaired in education. It will turn a regular smartphone into a powerful tool for the blind. This technology allows people with disabilities to gain more independence. In recent years, many smartphone applications for blind people have appeared, but it is not answer all their needs. Therefore, we aims to develop the dictionary application with Braille keyboard for the visually impaired on the smartphone to support them in education.

In the previous time, the visually impaired need to rely on the normal vision to look up the vocabulary from dictionary. A sound dictionary then was created; however, it still requires the cooperation of volunteers to help reading the script [2]. Nevertheless, there are many problems, for example, the program confused and was unable to read an original file which the reader needed to create new script, or the program had an error in reading an original correctly. As the emerging of the technologies begins, the smartphone has occurred. In addition, for the blind, smartphones also include screen reading technology which will speak the content presented on screen [3]. Since then, many dictionary applications have been built on smartphones together with text-to-speech function mainly for the visually impaired. However, the visually impaired still have to use normal keyboard like normal people which are difficult to use non-visually. Moreover, there are also many dictionary programs on computer. Nevertheless, it is not comfortable for the visually impaired, even if it has additional devices connected with the computer and the smartphone such as Braille keyboard, a specialist input device that allows the user to type and enter text or instructions for the computer in Braille [4]. All in all, it is difficult to carry and also needs additional cost for the equipment.

  Braille Diet  : Dictionary Application for the Blind on Android Smartphone

Android Operating System is an operating system based on the Linux kernel, and designed primarily for touchscreen mobile devices such as smartphones and tablet computers. For software development, Android provides Android SDK (Software Develop Kit). The developers used SDK to create the application. SDK contains an emulator that helps simulate the android application onto PCs. 2) Editor • Eclipse is an open-source community that provides a common use interface for working with tools. A simple mention of Eclipse usually refers to Eclipse SDK, which contains the Eclipse Platform, Java development tool, and Plug-in Development Environment. It is written mostly in Java. 3) Database Management System (DBMS) • SQLite is embedded into every Android device. Using SQLite in Android does not require a setup procedure or administration of the database. SQLite can read and write directly to ordinary disk. 4) Programming and Scripting Tools • Android Software Development Kit (SDK) is a set of development tools which helps developers to create application on the Android platform. The Android SDK consists of required libraries, debugger, an emulator, relevant documentation for the Android application program interfaces (APIs), sample source code, and tutorial for Android OS. • Java is an object-oriented programming language which is the main language to develop an Android application. • Extensible Markup Language (XML) defInes a set of rules for encoding documents in a format both of human-readable and machine-readable. XML helps designing the user interface layouts and the elementswhich contain on the screen. 5) Components • LEXiTRON database is the database of vocabulary from NECTEC which is used in Braille Dict application.

https://codeshoppy.com/android-app-ideas-for-students-college-project.html

Resource Reloading for Android

Resource Reloading for Android

JRebel.Android has two components – agent running on an Android device and service running on the host (developer’s machine). The primary responsibility of the service component is to watch for changes in the classes and resources directories. Upon finding changes to files the service component prepares them for later reloads by transforming the bytecode according to JRebel’s inner workings and sends them to the agent, telling the agent to perform a reload task. Whenever the agent component receives the files from the service component, it triggers the runtime reloading operation, thus making the offline changes that were picked up by the service component active on the device. The tool is designed with ease of use in mind, so the only required input parameter for the service is the root directory of an Android project. Given this directory the service component automatically locates the Android manifest file, class and resource directories as well as any external libraries and project dependencies. Typically one of two build systems are used when developing Android applications, that being Ant orGradle. JRebel.Android supports both layouts, and there is even support for some custom project layouts built-in. The first time the service component is started for a given target Android project, it utilizes the Android Debug Bridge (ADB), [3] connection to install the agent as part of the existing Android application. For all subsequent runs, having an ADB connection available is optional. The only requirement thereafter is that the agent is either reachable by ADB or through the network somehow. Again, this is a clear sign of the ease-of-use design principle taken for JRebel.Android, given that it is not always be desirable to test Android applications on physical devices using cables, if the nature of the application requires the user to e.g. move around, or rotate the device a lot. Every time the service component starts up it transforms the bytecode of all classes, prepares resources and sends them to the agent now installed on the device. Upon receiving the preprocessed files the agent component restarts the underlying application now using the reload-enabled files. In order to make reload operations fast, the service component only processes changed files, meaning that the files sent to the agent component for reloads are small. For carrying out class reloading two main features are required – instrumenting the classes, thus preparing them for later reloads as described above and dynamically loading new classes into the runtime. As mentioned earlier, Android defines a custom bytecode format so the runtime neither has java.lang.instrument package, that on standard JDKs can be used to hook into the class loading process, nor can it hot-swap method bodies during a remote debugging session. In general, in order to run an Android application with a set of changed class files (contained within one or more DEX files), there are two options to consider. The first option would be to instrument the classes, then trigger the normal build sequence that prepares the full APK file and install onto the device. The second option is to utilize Android’s Instrumentation API replacing the application’s class loader on startup. With a custom classloader at hand it is possible to load classes from anywhere, including the changed DEX file(s). Hence, this approach benefits from the fact that the original APK file can be used, only the classes need to be replaced behind the scenes by the custom classloader. JRebel.Android uses the latter approach. This ensures that the same class loader is responsible for loading both the initial (transformed) classes and classes added later by reload operations. One additional benefit is the ability to quickly disable JRebel.Android simplyby restarting the application without Instrumentation in order to compare the behavior with and without our tool enabled. When classes are changed JRebel.Android collects the classes and tracks them inside a reload change set. This is done to allow atomic reloading of multiple classes, by flipping a single field inside the correspondent runtime representation of the reload change set. For this to work all reloadable classes must have a synthetically generated field that can hold a reload change set object. For every change set we invoke the DX tool to convert the changed class files into a DEX file. This task is always performed on the service side, since the assumption is that usually the hardware on the host machine is superior. CodeShoppy

 Resource Reloading for Android

Porting the JRebel standard core to Android has some major challenges. For example, the service component has to know the full class path up front to enable processing of all classes before they are sent to the device. Also, given the fact that system classes in general cannot be altered before loading, means that all of the hooks for handling reflection, serialization, dynamic proxies, hiding JRebel artifacts from the stacktrace to name a few, cannot be installed. For this reason JRebel.Android instead injects client-side hooks to method calls to specific methods within system classes, enabling enhanced behavior. This is quite effective, but works only when called from application classes and the set of libraries, for which the service component must also locate each one for installing the said client-side hooks. In the past decade more advanced class reloading capabilities have been proposed and to a large extent adopted by the Java community. Leading the pack currently is the commercial redeployment tool JRebel [8], which were recently enhanced with the capabilities brought in by the technology developed for Javeleon, [6]. DCEVM constitutes a completely different approach to class reloading in Java in the sense that it operates at the JVM-level enhancing the current HotSwap mechanism to allow arbitrary changes to code at runtime. Unfortunately, it does not work on all JVM’s and moreover requires the user to patch the JDK installation. In addition, DCEVM has no support for the Android platform whatsoever. To the best of our knowledge the only tool that does have some class reloading support for Android is InstaReloader, [7]. It supports adding/removing method, fields and classes, but it does not support changes to constructors as JRebel.Android does. Also, the Reflection API is not properly supported meaning that synthetically added members will show up in n this paper we have presented a tool for reloading classes and resources on the Android platform. With this tool developers writing apps can benefit from a close to zero build time and immediate feedback of changes made, without the need to go through a painful scenario of rebuilding and restarting the entire app. One major area of focus has been ease of use, which manifests in a number of ways, including the minimized requirements for setup. We have shown that it works on two sample applications one of which is quite large, and that the productivity gained by not having to restart is significant. Please make sure to watch the accompanying video of the tool in action.

https://codeshoppy.com/php-projects-titles-topics.html

Runtime Class for Android

Runtime Class for Android

Developers writing Android applications suffer from a dreadful redeploy time every time they need to test changes to the source code. While runtime class reloading systems are widely used for the underlying programming language, Java, there is currently no support for reloading code on the Android platform. This paper presents a new tool, JRebel.Android that enables automatic runtime class- and resource reloading capabilities for Android. The target of this paper is the Android developer as well as the researcher for which dynamic updating capabilities on mobile devices can serve as a basic building block within areas such as runtime maintenance or self-adaptive systems. JRebel.Android is able to reload classes in much less than 1 second, saving more than 91% of the total redeploy time for small apps, more than 95% for medium size apps, and even more for larger apps.

An acknowledged bottleneck in software development is the redeploy time, that being the total time to reflect code changes into a suitable test scenario. Some programming languages like PHP or JavaScript, by nature, does not suffer from long redeploy times, while others like Java or C# do. In this paper we focus on the Android Platform, [2] for which Java is the programming language utilized. Having inherited static typing from Java leaves Android platform developers without ability to perform class reloading to reflect code changes immediately while developing. While for the standard Java platform, developers can change method bodies of already defined classes, there is currently no such capability on the Android platform. Although, there are some well-adopted approaches for reloading classes in Java, such as, JRebel, [8] Spring Loaded, [1] and DCEVM, [11] (more details on related work in section V), supporting class reloading on the Android platform is further troubled by the fact that applications need to be packaged in a special archive (APK file) where standard Java classes have been transformed to a special register-based bytecode format called DEX. Hence, there is no direct link from a compiled class to its correspondent runtime class definition representation.CodeShoppy

In this paper we present a tool that allows seamless and immediate class reloading on the Android platform. Not only can classes be reloaded, but also changes to resources defined in XML-files etc. are reflected immediately on the running devices. The class reloading engine is based on the traditional JRebel core, with almost full class redefinition capabilities, including adding/removing fields, methods and constructors, making changes to public interface methods as well as changing static field values. The only changes that cannot be performed at the Java language level are changes to the ‘extends’- and the ‘implements’ clauses, rendering the tool able to perform almost any kind of change to the code. Section II will dig into the architectural overview of the tool and describe how the tool works and how it should be operated by developers using it. Section III will present a small proof-of-concept example around two sample apps, which is also showcased in the accompanying video of this tool demonstration paper. In section IV we evaluate the performance of the tool comparing the redeploy time with and without the tool. Section V discusses the most relevant related work, while section VI concludes the paper

 Runtime Class for Android

JRebel.Android has two components – agent running on an Android device and service running on the host (developer’s machine). The primary responsibility of the service component is to watch for changes in the classes and resources directories. Upon finding changes to files the service component prepares them for later reloads by transforming the bytecode according to JRebel’s inner workings and sends them to the agent, telling the agent to perform a reload task. Whenever the agent component receives the files from the service component, it triggers the runtime reloading operation, thus making the offline changes that were picked up by the service component active on the device. The tool is designed with ease of use in mind, so the only required input parameter for the service is the root directory of an Android project. Given this directory the service component automatically locates the Android manifest file, class and resource directories as well as any external libraries and project dependencies. Typically one of two build systems are used when developing Android applications, that being Ant or Gradle. JRebel.Android supports both layouts, and there is even support for some custom project layouts built-in. The first time the service component is started for a given target Android project, it utilizes the Android Debug Bridge (ADB), [3] connection to install the agent as part of the existing Android application. For all subsequent runs, having an ADB connection available is optional. The only requirement thereafter is that the agent is either reachable by ADB or through the network somehow. Again, this is a clear sign of the ease-of-use design principle taken for JRebel.Android, given that it is not always be desirable to test Android applications on physical devices using cables, if the nature of the application requires the user to e.g. move around, or rotate the device a lot. Every time the service component starts up it transforms the bytecode of all classes, prepares resources and sends them to the agent now installed on the device. Upon receiving the preprocessed files the agent component restarts the underlying application now using the reload-enabled files. In order to make reload operations fast, the service component only processes changed files, meaning that the files sent to the agent component for reloads are small.

https://codeshoppy.com/android-app-ideas-for-students-college-project.html

Permission Management Method andUpdate in Android

Permission Management Method and Update in Android

The Android-based IoT(Internet of Things) platform just like the existing Android provides an environment that makes it easy to utilize Google’s infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user’s consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions.

The Android-based IoT platform was first unveiled to the public as the developer preview version on December 13, 2016. The Android-based IoT platform provides the technology to develop applications that run on IoT devices based on the Android operating system. It makes it easy to develop applications while leveraging existing Android development tools, Android APIs and Google infrastructure services. Applications that run on the Android-based IoT platform have much in common with those that run on existing Android-based Smartphone. Both applications running on the IoT device and smartphone register permissions to provide users with certain functions. If an application is used differently from its original purpose or asks additional permissions rather than using given permissions to provide certain functions for the user, it can perform malicious activities such as collecting excessive information or leaking personal information [1]. For example, if an IoT device that provides temperature and humidity registered permissions such as location information, camera, package .CodeShoppy

Android-based IoT platform The Android-based IoT platform named “Android-Things” was first unveiled by Google. It is the first platform dedicated to IoT devices. “Android-Things” is an upgraded version of the existing Google’s Internet platform, Brillo. Unlike the C/C++ language used in Brilo, it enables Android developers to easily develop IoT products [2, 3] by using existing Android development tools such as Android Studio, JAVA language, Android SDK in the same way. In addition, the hardware of “Android-Things” includes Intel Edison, Pico NXP, Raspberry Pi 3, etc. Each hardware is equipped with SOC (System On Chip), RAM, and wireless communication devices. “Android-Things” basically supports various sample code examples such as Doorbell and Bluetooth Audio, making it easier for developers to access. 2.2. AndroidManifes.xml file The AndroidManifest.xml file of an application used in the Android-based IoT platform environment has a similar structure to that in the conventional Android smartphone. The AndroidManifest.xml file contains information on the application including <activity>, <Intent-filter>, and <uses-permission> [4-6]. This paper analyzes permissions of the versions of before and after application the update by analyzing the AnadroidManifest.xml file.

Permission Management Method and Update in Android

Permission management method for before and after applications the update 3.1. Analysis flowchart for change of permissions before and after the update The first step in the analysis sequence to compare permissions before and after the application update is to find the AndroidManifest.xml file and then perform ananalysis on the file. The persmissions used by before and after an application the update are first identified based on the analyzed information. After this, the same, deleted, and added permissions in the versions of before and after application the update are checked through the identified information. Figure 2 below shows an analysis flow chart to analyze the permission differences before and after the updatePermission analysis for before and after application the update consists of four steps. The detailed analysis process is as follows. a.Input of the application information before and after the update -Input two versions of the application to analyze before and after application the update. b.Search of the AndroidManifest.xml -Search for the AndroidManifest.xml file to analyze permissions for both versions of the application. During this process, find each AndroidManifest.xml file for before and after application the update c.Check the permissions used by before and after application the update -Analyze the AndroidManifest.xml file found in step 2 to check and list permissions used in before and after application the update d.Identify permission differences for before and after application the update -Based on the analyzed information above, the same, deleted, and added permissions during the update process are identified. Based on the permission information identified through the analysis, respond to security threats such as indiscriminate data collection and data leakage by recognizing them in advance that may occur in Android-based IoT devices.

https://codeshoppy.com/android-app-ideas-for-students-college-project.html

Method for Before and After Applications the Update in Android

Method for Before and After Applications the Update in Android

The Android-based IoT platform was first unveiled to the public as the developer preview version on December 13, 2016. The Android-based IoT platform provides the technology to develop applications that run on IoT devices based on the Android operating system. It makes it easy to develop applications while leveraging existing Android development tools, Android APIs and Google infrastructure services. Applications that run on the Android-based IoT platform have much in common with those that run on existing Android-based Smartphone. Both applications running on the IoT device and smartphone register permissions to provide users with certain functions. If an application is used differently from its original purpose or asks additional permissions rather than using given permissions to provide certain functions for the user, it can perform malicious activities such as collecting excessive information or leaking personal information [1]. For example, if an IoT device that provides temperature and humidity registered permissions such as location information, camera, package installation and deletion, etc., it would perform functions different from the original purpose through the newly registered permissions. This paper collects permission lists for the versions of an application running on the Android-based IoT platform before and after the update. It aims to respond to future security threats by identifying the same, deleted, and added permission information compared to the update based on the collected permission lists. The structure of this paper is as follows. Section 2 discusses the Android-based IoT platform, the AndroidManifest.xml file, and the Android permission protection level. Section 3 performs permission analysis on the application to identify permission differences before and after the update. Finally, section 4 concludes this study of android.codeshoppy

Android permission protection level Android applications must register their permissions in the AndroidManifest.xml file to gain access to the information on the Android device and obtain the user’s consent to the use of permissions. The permission protection level for registered permissions can be specified by the developer. It is classified into Normal, Dangerous, Signature, and SignatureOrSystem. Table 1 below lists the four permission protection levels and its definition [4, 7, 8]

recognizing them in advance that may occur in Android-based IoT devices. 3.2. Source code for permission analysis before and after the update Python version 3.5.3 is used to analyze the permissions of the application used in the Android-based IoT platform environment. Search the AndroidManifest.xml file inside the application based on both of the application input information. Analyze both AndroidManifest.xml files to identify the same and changed permissions before and after the update. The content of the source code is explained as follows Table 2.a.Line 01~02: -The variable pwd1 and pwd2 contain the top-level directory name for analyzing both versions of the application. b.Line 04~12: -Find the AndroidManifest.xml file in the application using the variable pwd1 and pwd2. Generally, the AndroidManifest.xml file is in “/app/src/main/” but sometimes it is not. Therefore, do not always search the same path but search all paths inside the application to find the AndroidManifest.xml file. If the AndroidManifest.xml file is found, open the AndroidManifest.xml file in read mode using the update_before and update_after variable to analyze the information in the AndroidManifest.xml file. c.Line 14~19: -Check the phrase “android.permission” by reading a file line by line. In case permissions are provided by Android, the phrase basically starts with “android.permission”. When this phrase is found, include the permission before and after the update in the update_before and update_after list respectively and identify the deleted or added permissions based on the list information. The identified permissions are kept sorted for the ease of use later.

  Method for Before and After Applications the Update in Android

When the analysis of two versions of the application is completed, the same permissions before and after the update are first printed out on screen. Next, the deleted and newly added permissions after the update are printed out in order. Figure 2 shows the results of analyzing the permissions of before and after application the update. Permissions from [1] through [3] in Figure 2 show the same permissions that exist in both versions of before and after application the update. [4] through [6] indicate permissions that existed in the version of before application the update but were deleted after the update. [7] – [14] shows newly added permissions that did not exist in the version of before application the update but were added in the update process. The permissions that have been deleted or added after the update can be identified through the analysisIoT devices can carry out malicious activities such as collecting personal information indiscriminately or leaking personal information when permissions not related to performing certain functions are added during the update process. To prevent IoT devices from performing such malicious activities, there is a need to analyze threats that may arise from permissions to be added during the application update. Information on permissions that exist in many applications that perform malicious activities has been continuously analyzed through many researches. Table 3 below shows the list of permissions that exist in the malicious applications that have been previously studied [4, 5, 9, 10]. It is sorted in the order most used of permission in the malicious application. Restrictions on the use of permissions in the process of analyzing security threats should be considered since there may be restrictions on using permissions according to IoT devices. Based on the previously researched permission information and the results analyzed in section 3.3, it is necessary to respond to security threats in advance by analyzing them that may occur due to added permissions while updating an application. For example, if an IoT device that provides temperature or humidity asks permissions to control the location information .

https://codeshoppy.com/php-projects-titles-topics.html

Update in Android-based IoT Platform Environment

Update in Android-based IoT Platform Environment

The Android-based IoT(Internet of Things) platform just like the existing Android provides an environment that makes it easy to utilize Google’s infrastructure services including development tools and APIs through which it helps to control the sensors of IoT devices. Applications running on the Android-based IoT platform are often UI free and are used without the user’s consent to registered permissions. It is difficult to respond to the misuse of permissions as well as to check them when they are registered indiscriminately while updating applications. This paper analyzes the versions of before and after an application the update running on the Android-based IoT platform and the collected permission lists. It aims to identify the same permissions before and after the update, and deleted and newly added permissions after the update were identified, and thereby respond to security threats that can arise from the permissions that is not needed for IoT devices to perform certain functions. Codeshoppy

The Android-based IoT platform was first unveiled to the public as the developer preview version on December 13, 2016. The Android-based IoT platform provides the technology to develop applications that run on IoT devices based on the Android operating system. It makes it easy to develop applications while leveraging existing Android development tools, Android APIs and Google infrastructure services. Applications that run on the Android-based IoT platform have much in common with those that run on existing Android-based Smartphone. Both applications running on the IoT device and smartphone register permissions to provide users with certain functions. If an application is used differently from its original purpose or asks additional permissions rather than using given permissions to provide certain functions for the user, it can perform malicious activities such as collecting excessive information or leaking personal information [1]. For example, if an IoT device that provides temperature and humidity registered permissions such as location information, camera, packagenstallation and deletion, etc., it would perform functions different from the original purpose through the newly registered permissions. This paper collects permission lists for the versions of an application running on the Android-based IoT platform before and after the update. It aims to respond to future security threats by identifying the same, deleted, and added permission information compared to the update based on the collected permission lists. The structure of this paper is as follows. Section 2 discusses the Android-based IoT platform, the AndroidManifest.xml file, and the Android permission protection level. Section 3 performs permission analysis on the application to identify permission differences before and after the update. Finally, section 4 concludes this study.

 Update in Android-based IoT Platform Environment

Android-based IoT platform The Android-based IoT platform named “Android-Things” was first unveiled by Google. It is the first platform dedicated to IoT devices. “Android-Things” is an upgraded version of the existing Google’s Internet platform, Brillo. Unlike the C/C++ language used in Brilo, it enables Android developers to easily develop IoT products [2, 3] by using existing Android development tools such as Android Studio, JAVA language, Android SDK in the same way. In addition, the hardware of “Android-Things” includes Intel Edison, Pico NXP, Raspberry Pi 3, etc. Each hardware is equipped with SOC (System On Chip), RAM, and wireless communication devices. “Android-Things” basically supports various sample code examples such as Doorbell and Bluetooth Audio, making it easier for developers to access. 2.2. AndroidManifes.xml file The AndroidManifest.xml file of an application used in the Android-based IoT platform environment has a similar structure to that in the conventional Android smartphone. The AndroidManifest.xml file contains information on the application including <activity>, <Intent-filter>, and <uses-permission> [4-6]. This paper analyzes permissions of the versions of before and after application the update by analyzing the AnadroidManifest.xml file. The followingable 1 shows the structure of the AndroidManifest.xml file for a sample application provided for the use in the Android-based IoT platform environment

https://codeshoppy.com/android-app-ideas-for-students-college-project.html

Teleoperated by an Open Source Android Application

Teleoperated by an Open Source Android Application

Humanoid RobotThe Humanoid Robot we opted was NAO [14] fromAldebaran Robotics. Aldebaran Robotics is a French-basedcompany, gain popularity in 2004 with a new novel projectknown as NAO. NAO is running OpenNAO OS which is aGNU/Linux distribution based on Gentoo. It supports bothwired IEEE 802.3 and wireless IEEE 802.11 a/b/g/n connec-tion. With a lithium battery inside, has autonomy up to 90minutes (active use). NAO is equipped with two ultrasonicsensors (or sonars) which allow it to estimate the distanceto obstacles in its environment. Also, two identical videocameras are located in the forehead which they provide anup to 1280×960 resolution at 30 frames per second. As aresult, NAO can be a highly effective platform for teleroboticswhen its user tries to start an interaction with people or objectsnearby the robot.A user of our system can manipulate the robot using anAndroid smartphone by observing the surroundings of it froma video feed played on the smartphone display. We createsoftware that is executed on NAO in form of Python and Bashshell scripts files that are necessary for the complete set ofour programmed activities. In our embedded software, we usean ever ended loop that polls the bridge web server everyone second to receive the next command for execution. Afterthe successful execution of the specified command, the robotacknowledges it to the web server in order to be removedfrom the execution queue of the web server. This feedbackmechanism is crucial for the correct execution of the activitiesand ensures that there are not lost events. The communicationbetween the robot and the bridge server is performed by adecimal arithmetic protocol that we have developed in-house.DAndroid ApplicationTo control the humanoid robot we have developed anandroid application. The user has full control of the robot likemove forward, turn left etc. Except of these simple commands,our system has the capacity of speech to text, text to speech,video and audio streaming. With these new features, we havecreated a new way of communication between a blind user anda speech-impaired user. The humanoid robot is the key to thatcommunication by speaking out loud the messages users wantto tell or inputted via text respectively. Except of this new wayof communication, our system can be used for safety purposes.For instance, a father can watch what his child is doing whenhe is not at home.In the first screen of the application there is a button whichis used for the connection between the application and theserver. Also, the user can change the configuration settings bypressing the settings button.The main screen of the application is shown on Figure2. It consists of multiple action buttons which are used tocontrol the NAO. Every time the user presses a functionalitythe Android device sends an HTTP POST request to the bridgeserver and the server appends this to an activity queue. Everytime the humanoid robot polls for a new activity the web servertransmits the activity on the top of the queue. Also, on top ofthe screen, is being displayed video or pictures that are beingtaken by NAO.Our application also has two unique features. Text to speechand speech to text capabilities. In Figure 3 our humanoid robotis giving a voice to people with speech disabilities.The Android application was created in Android Studio.The main programming languages that were used in orderto be created successfully are Java and XML. The minimumSDK for the android application is API 16: Android 4.1(Jelly Bean). Some of the most important libraries we usedare Apache library which was used for the HTTP requestsbetween the android device and the web server, Picasso librarywhich was used to load images from web URLs, AudioFormat,AudioRecord, MediaRecorder that were utilized for the WAVrecording. CodeShoppy

 Teleoperated by an Open Source AndroidApplication

To evaluate the efficiency of our implementation, we arereferring a number of metrics that we have gathered. Specifi-cally, we used our application from the Polytechnic Universityof Catalonia in Barcelona, Spain, in order to remotely controlour Humanoid Robot that was located in Kozani, Greece. Theaverage time it took until the request was made by the mobileand get a response from the server was 0.233 sec. Also, Theaverage time it took for the Audio Streaming was 0.369 secand 0.686 for the Video Streaming. This was measured usinga performance metric function of our android application fromthe time it posted the command to be executed until the time itreceived the successful reply message. Except from Barcelona,we also tested our application from University of Thessaly inVolos, Greece, in order to compare the results. The averagetime it took until the request is made by the mobile and get aresponse from the server was 0.16 sec. Also, the average timeit took for Audio Streaming was 0.347 sec and 0.505 for theVideo Streaming. As we notice, the small differences betweenthe delays from Spain and Greece mean that the application isable to run from all around the world without any considerabledelays.To decide which User Interface (UI) to implement on ourAndroid Application, we surveyed more than 50 people toask them about the user experience that they had over threedifferent User Interfaces that we have created. The age rangeswere: under 18, 18-25, 26-40, 41-55 and 55+. We wanted theapplication to be easy to use from all of the above ages. Theresults of the statistical analysis were that the majority of theusers preferred the minimalist version of the proposed UI’s.Taking into account this survey we ended up with the aboveapplicationInternet of Robotic Things allows robots or robotic systemsto connect and share all under a hood of a sophisticatedarchitectural framework. Our paper proposes an open sourceandroid application for controlling a humanoid robot. Ourapplication has accomplished so much more than any of itspredecessors. The user can view what the robot is seeingthrough the Android application and can also move it. Ad-ditionally, our system can deliver real-time audio through ourapplication. With the use of text to speech and speech to text,our humanoid robot is giving a voice to people with speechdisabilities. In the future, we plan to enhance the system byinserting more functionalities such as face recognition and AI

https://codeshoppy.com/php-projects-titles-topics.html

An Internet of Things Humanoid Robot

An Internet of Things Humanoid Robot

The Internet of Things (IoT) is a system of in-terrelated computing devices, mechanical and digital machines,objects, animals or people that are provided with unique identi-fiers and the ability to transfer data over a network withoutrequiring human-to-human interaction. Nowadays the use ofIoT in industrial robots is very popular contrary to humanoidrobots. There have been a few attempts that combine IoT withhumanoid robots but they have limited features. This paperproposes a novel open source platform Android application forcontrolling a humanoid robot, with more features than otherresearch projects, in remote areas either behind NAT (NetworkAddress Translation) or without it. The user can view whatthe robot is seeing through the Android application and canalso move it. Additionally, our system has the ability to deliverreal-time audio through our application. We envision that ourproposed system is not only an attractive solution for manytelerobotic applications but also an extensive educational toolin special needs education CodeShoppy

The IoT [1] allows objects to be sensed or controlledremotely across existing network infrastructure, creating op-portunities for more direct integration of the physical worldinto computer-based systems and resulting in improved effi-ciency, accuracy and economic benefit in addition to reducedhuman intervention. A thing, in the Internet of Things, can beanything: a person with a heart monitor implant, an automobilethat has built-in sensors to alert the driver when tire pressureis low or any other natural or man-made object that canbe assigned an IP address and provided with the ability totransfer data over a network and many more. According toIDC, worldwide market of internet of things is going to growup around $1.7 trillion up to 2020 [2]. Current research isleading the robotics field to use the internet thus giving birthto the new term Internet of Robotics. The Internet of RoboticThings (IoRT) [3] is a concept first introduced by Dan Kara atABI Research, which talks about augmenting the existing Iowith active sensorization thereby, opening the doors to novelbusiness ideas, at the intersection of both IoT and Robotics.The appearance of a robot is one of the key factors that helpthis to be recognized as a human-like entity [4]. A humanoidrobot is a machine with its overall appearance based on thatof the human body. In general humanoid robots have a torsowith a head, two arms and two legs, although some formsof humanoid robots may model only part of the body, forexample, from the waist up. Some humanoid robots may alsohave a ’face’, with ’eyes’ and ’mouth’. Humanoid robotsare being developed to perform human tasks like personalassistance, where they should be able to assist the sick andelderly, and dirty or hazardous jobs. Regular jobs, like being areceptionist or a worker of an automotive manufacturing lineare also suitable for humanoids. In essence, since they canuse tools and operate equipment and vehicles designed for thehuman form, humanoids could theoretically perform any task ahuman being can, so long as they have the proper software andcareful programming. However, the complexity of doing so isimmense. Also, Humanoid robots can naturally be regardedas learning companions. For instance, two robots visited achildrens elementary school in Japan for two weeks, with thepurpose of teaching children English, with mesmerizing results[5]. Studies show also that the humanoid robots have thepotential to help autistic children learn and express emotions,for nonverbal children with autism can help in engaging themto start a conversation and even express feeling using bodylanguage [6].In contrast with other authors, we have developed an open-source1project which gives a user the ability to control ahumanoid robot remotely, using an android application withan android phone even in restricted internal networks usingNAT (Network Address Translation). Additionally into ourapplication, we have injected video streaming, audio streamingand also text to speech and speech to text services

 An Internet of Things Humanoid Robot

The Humanoid Robot we opted was NAO [14] fromAldebaran Robotics. Aldebaran Robotics is a French-basedcompany, gain popularity in 2004 with a new novel projectknown as NAO. NAO is running OpenNAO OS which is aGNU/Linux distribution based on Gentoo. It supports bothwired IEEE 802.3 and wireless IEEE 802.11 a/b/g/n connec-tion. With a lithium battery inside, has autonomy up to 90minutes (active use). NAO is equipped with two ultrasonicsensors (or sonars) which allow it to estimate the distanceto obstacles in its environment. Also, two identical videocameras are located in the forehead which they provide anup to 1280×960 resolution at 30 frames per second. As aresult, NAO can be a highly effective platform for teleroboticswhen its user tries to start an interaction with people or objectsnearby the robot.A user of our system can manipulate the robot using anAndroid smartphone by observing the surroundings of it froma video feed played on the smartphone display. We createsoftware that is executed on NAO in form of Python and Bashshell scripts files that are necessary for the complete set ofour programmed activities. In our embedded software, we usean ever ended loop that polls the bridge web server everyone second to receive the next command for execution. Afterthe successful execution of the specified command, the robotacknowledges it to the web server in order to be removedfrom the execution queue of the web server.

https://codeshoppy.com/php-projects-titles-topics.html

Senior Citizens with Senior Citizens with Self-Care Android Application

Senior Citizens with Senior Citizens with Self-Care Android Application

The oHealth system architecture as shown in Fig. 1 has five main actors. The first actor is senior citizens with hypertension who can use oHealth by connecting with Wi-Fi or a mobile Internet data in Android device. The second actor is the administrator who maintains the database on Azure SQL Database cloud server. The third actor is doctor, assistant, and family members who receive history data and blood pressure analysis report of senior citizens. The fourth actor is BP5 device which can measure blood pressure. The last actor is azure machine learning which gets all the collected data and analyze hypertension levels for the user. The oHealth application requires the user to register as a member by providing their personal information and log-in. The application offers six main features. The first feature is user profile, which keeps senior’s information. The second feature is measure blood pressure, which measures blood pressure by connecting blood pressure device. The third feature is knowledge, which gives knowledge about hypertension, food, exercise, and medicine. The fourth feature is treatment, which records food dairy, medicine intake, and exercise for using in hypertension analysis and treatment. The fifth feature is reminder, which uses to set reminder to measure blood pressure and take medicines in each day. The last feature is analysis, which analyzes hypertension levels with azure machine learning system by using Multiclass Logistic Regression algorithm [20] to create a predictive model and shows the result to the user. The analysis results and history data can be shared to doctors, assistant, or family members. IV.USER INTERFACEUser interface design of oHealth is based on senior citizens support in mind, according to the principles of a good system design [17]. oHealth design concepts consist of 4 principles, which are use minimalist design to prevent cognitive overload, provide large icons that are easy to interpret and interaction, avoid the use of irrelevant information on the screen, provide maximize contrast and avoid use of bright colors.

The purpose of evaluation is to measure the user satisfaction toward oHealth. The details of the evaluation method are described into three steps. Firstly, introduce and provide essential information to users to comprehend the concepts of oHealth. Secondly, demonstrate the application to them step-by-step. Finally, let the users test the application and ask them to answer aquestionnaire. The questionnaire consists of questions asking about their personal information and key aspects of the application including easy to use and understand, attractiveness and interest, user interface and design, benefits and advantages, adapt to use in daily life. 25 participants in the age of 60 to 70 years were volunteers to use oHealth. Number of male participants (36%) are less than female (64%). They reply questions concerning to the usage of oHealth as shown in Fig. 14. 23participants (or 92%) thought that oHealth is easy to use and not complicate. 21 participants (or 84%) agreed that oHealth is easy to use in daily life especially the measurement because it is always available, so users can use any time and 21 participants (or 84%) judged that oHealth has a simple design and suitable for users. CodeShoppy

Senior Citizens with Senior Citizens with Self-Care Android Application

Our research project intends to introduce the concept of self-care for senior citizens with hypertension by developing an android application that users can prevent, evaluate and treat hypertension. oHealth let users know their blood pressure, exercise hour and sodium intake in each day, medicine intake, hypertension levels and learned to aware or adopt the healthy life style. oHealth could support users to treat hypertension in an appropriate way and measure blood pressureanywhere and anytime especially at home to get the accurately outcome. Moreover, it can give more knowledge about hypertension to users. In thefuture work, to be more useful, oHealth should be extended to connect to other medical devices such as heart rate monitor, glucose monitor, weighing scale and pedometer.

https://codeshoppy.com/android-app-ideas-for-students-college-project.html

Android Application for Senior Citizens

Android Application for Senior Citizens

Currently, most of senior citizens in the worldhave hypertension and the number of patients tend to increase every year because senior citizens do not know how to take care of themselves. They do not know how often and when the best time to measure blood pressure. In order to guide senior citizens with hypertension to take care of themselves, oHealth, a self-care android application, was proposed. By using oHealth application connected with blood pressure device, senior citizens can measure and monitor their blood pressure daily at home anytime. In each day, they can also record about medicines and food intake and exercise for treatment. All records are kept in azure SQL database. Moreover, this application also provides user interface design that is suit for senior citizens. oHealth application has six main functions which are manage profile, measure blood pressure, provide knowledge, record treatment, provide reminders, and perform data analysis by using multiclass logistic regression method in azure machine learning. The ultimate goal of oHealth application is to assist senior citizens to prevent, evaluate, and treat hypertension, and to help them control medicine, food, and exercise to treat hypertension in an appropriate way. CodeShoppy

At present, the number of senior citizens in the world tends to increase every year. As reported by the World Bank the number of senior citizens in the world is around 0.5 billion people or 8.2% and around 74.3% of them have hypertension [1]. In the same way, the number of Thai senior citizens tends to increase. According to the National Statistical Office, the number of senior citizens in Thailand is around 10 million people or 14.9% [2]. The number of senior citizens shows that Thailand’s society will become a senior’s society soon. From the information of Thai Health Promotion Foundation, senior citizens in Thailand is around 4.1 million people or 41.0% who have high blood pressure or hypertension [3]. High blood pressure is the most common risk factor to other diseases such as stroke, kidney disease, paralysis, and so on. Therefore, high blood pressure is a very important disease that needs to be treated. Nowadays, there are many medical devices that can use to monitor people health in ever day life such as heart rate monitor, glucose monitor, blood pressure monitor, pedometer and weighing scale. Blood pressure monitors are also now available to use anywhere. Accordingly, senioritizens can use these devices to measure blood pressure at home.The hypertension patient should measure the blood pressure and take care oneself at home that is the best way to measure blood pressure [4] [5]. Moreover, most of people do not know the factors that impact the value of blood pressure such as body mass index (BMI), eating too much sodium, eating too less potassium, alcohol addiction, smoking, lack of physical activities, stress and taking the medicine according to the doctor. Thus, they should know more the basic knowledge of hypertension. In 2016, smartphone owner in Thailand is about 24 million people and about 2.5% of them are senior citizens [6]. Recently, Thai people are increasingly interested in self-care but most user interface of self-care applications are not friendly for senior citizens e.g. small text, small button [7]. The main objective of this research work is to design and develop a self-care android application for senior citizens with hypertension to guide, track and treat hypertension and to reduce the risk of having other incurrent diseases. Hence, this oHealth application will be a useful tool for senior citizens with hypertension to take care of themselves.

  Android Application for Senior Citizens

senior Citizens The definition of senior citizens from the United Nations is people who are more than 60 years of age. The senior citizen can separate into 4 types which are the young – old (60 to 69 years old), the middle-aged old (70 to 79 years old), the old-old (80 to 90 years of age), and the very old-old (90 to 99 years old). At present, the number of senior citizens in Thailand tends to increase every year. When seniors get older, health problems occur with them in many ways[1]. B.High blood pressure (Hypertension) Normally, blood pressure when the heart pump blood (systolic) is below 120 mmHg and blood pressure when the heart relaxed (diastolic) is below 80 mmHg. Blood pressure can be changed over time, especially when people sleep, wake up, exercise, stress, or exited. But it will be back to normal blood pressure when people finish their activities. If people finish their activities, but the blood pressure still higher than 120/80 mmHg. This means people can have high blood pressure (Hypertension) [8]. High blood pressure can divide into three levels, which are prehypertension (120-139/80-89 mmHg), high blood pressure stage 1 (140-159/90-99 mmHg), and stage 2 (more than 160/100 mmHg) [4]. There are two types of high blood pressure, which consist of primary and secondary high blood pressure. More than 90% of hypertension patients have primary high blood pressure. It is the most common type that occurs in people. And another 10% have secondary high blood pressure. There are many causes, factors and treatmentsof primary and secondary high blood pressure as summarized in Table 1 [8] [9] [10].xisting applications Six interesting applications related to senior citizens with hypertension and oHealth application were explored. Table 2 displays feature comparison of the six applications with oHealth including iHealth[11], Omron [12], Qardio [13], Health Check Up For Free [14], Blood Pressure [15], and Smart health [16]. https://codeshoppy.com/android-app-ideas-for-students-college-project.html