Simulation and Development of Android App For Tracking Missing Person
Abstract
Keywords
Full Text:
PDFReferences
P. Stirparo, I.N. Fovino and I. Kounelis, "Data-in-use leakages from Android memory - Test and analysis Wireless and Mobile Computing", Networking and Communications (WiMob) 2013 IEEE 9th International Conference, vol. 7-9, pp. 701-708, 2013.
L.L. de Melo and S.D. Zorzo, "PUPDroid - Personalized user privacy mechanics for android Systems Man and Cybernetics (SMC)", 2012 IEEE International Conference, vol. 14-17, pp. 1479-1484, 2012.
Stirparo Pasquale, Fovino Igor Nai, Taddeo Marco and Kounelis Ioannis, "In-memory credentials robbery on android phones Internet Security (WorldCIS)", World Congress, vol. 88, no. 93, pp. 9-12, 2013.
Lunden Ingrid, March 2014
Gordon E. Moore, "Cramming more components onto integrated circuits", Electronics Magazine, pp. 11-11, 2006.
E. Burnette, From Hello Android the Pragmatic Programmers, April 2014.
R. Meier, From Professional Android 2 Application Development, Wiley, April 2010.
Converse PE (1968) Time budgets. In: Sills D (ed.) International Encyclopedia of the Social Sciences. New York: Macmillan, pp. 42–47.
Dayan D and Katz E (1992) Media Events: The Live Broadcasting of History. Cambridge, MA: Harvard University Press.
De Grazia S (1962) Of Time, Work, and Leisure. New York: Twentieth Century Fund.
Dimmick J, Chen Y and Li Z (2004) Competition between the Internet and traditional news media: The gratification-opportunities niche dimension. Journal of Media Economics 17(1): 19–33.
Dimmick J and Albarran AB (1994) The role of gratification opportunities in determining media preference. Mass Communication Review 21: 223–235.
Dillman DA (2007) Mail and Internet Surveys: The Tailored Design Method, 2nd ed. Hoboken, NJ: Wiley
Velu, A. (2019). The spread of big data science throughout the globe. International Journal of Sustainable Development in Computing Science, 1(1), 11-20. Retrieved from https://ijsdcs.com/index.php/ijsdcs/article/view/6
Velu, A. (2019). A Stable Pre-processing Method for the Handwritten Recognition System. International Journal of Machine Learning for Sustainable Development, 1(1), 21-30. Retrieved from https://ijsdcs.com/index.php/IJMLSD/article/view/60
Whig, P. (2019). Exploration of Viral Diseases mortality risk using machine learning. International Journal of Machine Learning for Sustainable Development, 1(1), 11-20. Retrieved from https://ijsdcs.com/index.php/IJMLSD/article/view/53
Whig, P. (2019). A Novel Multi-Center and Threshold Ternary Pattern. International Journal of Machine Learning for Sustainable Development, 1(2), 1-10. Retrieved from https://ijsdcs.com/index.php/IJMLSD/article/view/54
A Velu, P Whig (2021 ) Protect Personal Privacy And Wasting Time Using Nlp: A Comparative Approach Using Ai, Vivekananda Journal of Research, 10 , 42-52
Velu, A. (2021). Influence of business intelligence and analytics on business value. International Engineering Journal For Research & Development, 6(1), 9-19.
Y Khera, P Whig, A Velu (2021), efficient effective and secured electronic billing system using AI, Vivekananda Journal of Research, 10 , 53-60
]Velu, A., & Whig, P. (2021). Impact of Covid Vaccination on the Globe using data analytics. International Journal of Sustainable Development in Computing Science, 3(2), 1-10. Retrieved from https://ijsdcs.com/index.php/ijsdcs/article/view/11
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 International Journal of Sustainable Development in Computing Science
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
A Double-Blind Peer Reviewed Journal