Android Application Development For Textile Industry
Android Application Development For Textile Industry
1, March 2019 11
Abstract--- The main motivation for the application describes to develop Android applications by allowing script
development for textile industries is fashion cycles are languages has important significance for shedding the
developing faster than ever. The current world is enclosed development difficulty etc. The paper first discusses the
with a large number of digital visual information. Sample architecture of SUA. Experimental results show that Android
approval is the utmost importance of export house. The focal services for multiple scripts is provided by SUA, suitable for
point of this application is the merchant can upload the Android application development. And then it introduces the
sample and its features that can be viewed by the user. development environment of android apps on SUA.
Firebase database is an online database storage management While in comparisons with Java, using scripts to develop
system it is used to store all the information instead of MySQL
Android apps is simple and also with higher efficiency. The
database. Apart from that, the merchants have a separate scripts with powerful android functions is provided by SlAA,
page where they can view the details of the sample and where which can realize rich feature Android apps by script
they get it from. There are two categories one is fabric and
interpreters and SlAA, they have enough vitality.
another one is a garment. The user can buy the sample from
their choice of category. The paper also discusses the user and Hewei Yu, Yangyu Hu, Yang Gao, Juan Xu, Miao
merchant activities in the application. Zhang; describes the growth of mobile application in
impulsive manner, more and more threats which is migrated
Keywords--- e-Commerce, Encryption, Merchant
from old PC platform to mobile device. Mobile Internet
Authentication, Android Application Development. platform, especially in the Android platform, which is
becoming a hotbed of the suspicious application. The focus in
I. INTRODUCTION AND SCOPE the field of information security is the security monitoring of
large applications in application store.
T HE business exchange or business that includes the
change of data over the internet is known as Electronic
Commerce or eCommerce. The clients in online business were
The study of topics like defence of malicious application
and security detection is badly needed. The paper introduces a
allowed electronically for dealing products and progress with method which can be applied to deal with massive Android
no boundary of time or distance. The selling and purchasing of application data. When facing the security detection tasks with
goods and services through wireless handheld gadgets, for large-scale application, extract the feature application of
example, tablets and mobiles is known as Mobile Commerce. application to the database and file system in advance by
It is generally known as the next generation e-Commerce. In parallel processing, thus to build the local attributes index of
Online shopping the clients were allowed to directly purchase application, to ensure the security detection engine by
services or goods from a merchant over the internet. Online extracting the need of APK file information and application
shopping has two types of process, feature directly instead of serial unpacking each APK file.
1. Business-to-Business (B2B) Nan Zhao, Minghu Wu, Jingjing Chen; describes the
2. Business-to-Consumer (B2C) purpose of grasping and mastering the course of speech signal
The buyers were allowed to create a list of items to be processing, a novel AEPS is proposed in the paper.
purchased in the shopping cart system. During the time of In graphical user interface he institutional platform is
logout, the total sum is calculated, including handling and presented in a strongly manoeuvrable and highly intuitive
shipping charges along with the associated taxes as applicable. manner. The characteristics of strong affordability, high
Textile industry application pertains to one process i.e.- portability and easy adaptability for popularization and
Business-to-Business because the samples are brought by the application extension are available. Through an adequate
company or by the person in bulk quantity. intuitive visual information, user interface and extensive
hands-on experiences, it greatly allows to facilitate students in
II. LITERATURE SURVEY interactive, authentic and creative learning. The result shows
Yiliang Xing, Yun Pei, HuajunLei, YDongfang Chu; that the proposed platform not only promotes the student’s
practical ability and learning interest but also consolidates
their impression and understanding of theoretical concepts.
M.S. Kavya, PG Scholar, Department of CSE, K.S.Rangasamy College of
Technology, Tiruchengode. E-mail: kavyasakthivel253@gmail.com Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay
Dr.B.G. Geetha, Professor, Head of the Department, Department of CSE, Ganmoor, Manoj Singh Gaur, Mauro Conti
K.S.Rangasamy College of Technology, Tiruchengode. Muttukrishnan Rajarajan; describes smart phones have
J.M. Gokul Raaja, COE, MACS Info Solutions, India Private Limited.
DOI:10.9756/BIJSESC.9006 been penetrating due to its availability in the day to day
ISSN 2277-5099 | © 2019 Bonfring
Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 12
ACKNOWLEDGEMENT
We acknowledge DST-File No.368. DST-FIST
(SR/FIST/College-235/2014 dated 21-11-2014) for financial
support and DBT-STAR-College-Scheme ref. no:
BT/HRD/11/09/2018 for providing infrastructure support.
REFERENCES
[1] A. Vitor Monte, M. Favero De Amorim, A. Ricardo Abed Grégio, G.
Barroso Junquera and P. Lício De Geus, Identifying Android malware
using dynamically obtained features, Journal of Computer Virology and
Hacking Techniques, Vol. 11, No. 1, Pp. 9-17, 2015.
[2] C. Jing, C. Wang, Z. Zhao, K. Chen, R. Du and G. Ahn, “Uncovering
the face of android ransomware: Characterization and real-time
detection”, IEEE Transactions on Information Forensics and Security,
Vol. 13, No. 5, Pp. 1286-1300, 2018.
[3] A. Borate and D. Sharma and K. Bhapkar, “Android-Based Fuzzy
Inference System to Control the Fan Speed”, Journal of Harmonized
Research in Engineering, Pp. 69-74, 2017.