GPS Tracker Application in Manufacturing Companies Based on Android

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

application of upfc based on svpwm for power quality improvement

در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...

15 صفحه اول

Energy-Efficient GPS-Based Positioning in the Android Operating System

We present our ongoing collaborative work on EnDroid, an energy-efficient GPS-based positioning system for the Android Operating System. EnDroid is based on the EnTracked positioning system, developed at the University of Aarhus, Denmark. We describe the current prototypical state of our implementation and present our experiences and conclusions from preliminarily evaluating EnDroid on the Goog...

متن کامل

Logistics Costing in Manufacturing Companies

The methods of operative cost calculation and controlling are often used to improve production costing in the manufacturing industry. The basic idea of such approaches is that direct costs (e.g. used materials) are allocated to profit objects (products) directly while indirect costs are collected in so called cost objects (e.g. business units, manufacturing sites, service centers) first. The al...

متن کامل

Detection of Malware on Android based on Application Features

Threat of mobile malware is increasing day by day. Since Android is the most popular and maximum sold mobile phone, there is an increasing threat of malware on Android based mobile device. The different antimalware products available in market can detect the malware in its original form. But they cannot detect the malware after applying some form of obfuscation or transformation to the malware....

متن کامل

On the Effectiveness of Code-Reuse-Based Android Application Obfuscation

Attackers use reverse engineering techniques to gain detailed understanding of executable for malicious purposes, such as re-packaging an Android app to inject malicious code or advertising components. To make reverse engineering more difficult, researchers have proposed various code obfuscation techniques to conceal purposes or logic of code segments. One interesting idea of code obfuscation i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering Research and Advanced Technology

سال: 2019

ISSN: 2454-6135

DOI: 10.31695/ijerat.2019.3395