You are on page 1of 4

Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No.

1, March 2019 11

Android Application Development for Textile


Industry
M.S. Kavya, Dr.B.G. Geetha, J.M. Gokul Raaja

Abstract--- The main motivation for the application describes to develop Android applications by allowing script
development for textile industries is fashion cycles are languages has important significance for shedding the
developing faster than ever. The current world is enclosed development difficulty etc. The paper first discusses the
with a large number of digital visual information. Sample architecture of SUA. Experimental results show that Android
approval is the utmost importance of export house. The focal services for multiple scripts is provided by SUA, suitable for
point of this application is the merchant can upload the Android application development. And then it introduces the
sample and its features that can be viewed by the user. development environment of android apps on SUA.
Firebase database is an online database storage management While in comparisons with Java, using scripts to develop
system it is used to store all the information instead of MySQL
Android apps is simple and also with higher efficiency. The
database. Apart from that, the merchants have a separate scripts with powerful android functions is provided by SlAA,
page where they can view the details of the sample and where which can realize rich feature Android apps by script
they get it from. There are two categories one is fabric and
interpreters and SlAA, they have enough vitality.
another one is a garment. The user can buy the sample from
their choice of category. The paper also discusses the user and Hewei Yu, Yangyu Hu, Yang Gao, Juan Xu, Miao
merchant activities in the application. Zhang; describes the growth of mobile application in
impulsive manner, more and more threats which is migrated
Keywords--- e-Commerce, Encryption, Merchant
from old PC platform to mobile device. Mobile Internet
Authentication, Android Application Development. platform, especially in the Android platform, which is
becoming a hotbed of the suspicious application. The focus in
I. INTRODUCTION AND SCOPE the field of information security is the security monitoring of
large applications in application store.
T HE business exchange or business that includes the
change of data over the internet is known as Electronic
Commerce or eCommerce. The clients in online business were
The study of topics like defence of malicious application
and security detection is badly needed. The paper introduces a
allowed electronically for dealing products and progress with method which can be applied to deal with massive Android
no boundary of time or distance. The selling and purchasing of application data. When facing the security detection tasks with
goods and services through wireless handheld gadgets, for large-scale application, extract the feature application of
example, tablets and mobiles is known as Mobile Commerce. application to the database and file system in advance by
It is generally known as the next generation e-Commerce. In parallel processing, thus to build the local attributes index of
Online shopping the clients were allowed to directly purchase application, to ensure the security detection engine by
services or goods from a merchant over the internet. Online extracting the need of APK file information and application
shopping has two types of process, feature directly instead of serial unpacking each APK file.
1. Business-to-Business (B2B) Nan Zhao, Minghu Wu, Jingjing Chen; describes the
2. Business-to-Consumer (B2C) purpose of grasping and mastering the course of speech signal
The buyers were allowed to create a list of items to be processing, a novel AEPS is proposed in the paper.
purchased in the shopping cart system. During the time of In graphical user interface he institutional platform is
logout, the total sum is calculated, including handling and presented in a strongly manoeuvrable and highly intuitive
shipping charges along with the associated taxes as applicable. manner. The characteristics of strong affordability, high
Textile industry application pertains to one process i.e.- portability and easy adaptability for popularization and
Business-to-Business because the samples are brought by the application extension are available. Through an adequate
company or by the person in bulk quantity. intuitive visual information, user interface and extensive
hands-on experiences, it greatly allows to facilitate students in
II. LITERATURE SURVEY interactive, authentic and creative learning. The result shows
Yiliang Xing, Yun Pei, HuajunLei, YDongfang Chu; that the proposed platform not only promotes the student’s
practical ability and learning interest but also consolidates
their impression and understanding of theoretical concepts.
M.S. Kavya, PG Scholar, Department of CSE, K.S.Rangasamy College of
Technology, Tiruchengode. E-mail: kavyasakthivel253@gmail.com Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay
Dr.B.G. Geetha, Professor, Head of the Department, Department of CSE, Ganmoor, Manoj Singh Gaur, Mauro Conti
K.S.Rangasamy College of Technology, Tiruchengode. Muttukrishnan Rajarajan; describes smart phones have
J.M. Gokul Raaja, COE, MACS Info Solutions, India Private Limited.
DOI:10.9756/BIJSESC.9006 been penetrating due to its availability in the day to day
ISSN 2277-5099 | © 2019 Bonfring
Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 12

activities like Internet, games, office applications, vehicle help


using location-based services apart from conventional services
like SMSs, voice calls and multime disservices.
The academic researchers and anti-malware companies
commercially have realized that the conventional signature-
based and static analysis methods are not a safe one. The
prevalent secrecy techniques such as environment aware
approaches code transformation encryption are capable of
generating variants of known malware. The trouble to the use
of anomaly, behaviour and dynamic analysis based methods.
Against the advanced techniques the solo approaches are not
effective, heterogeneous contrast approaches can be used in
tandem for effective suspicious error detection. The key mut
be known by the user to decrypt the file.
Wen-Pinn Fang, Sheng-Hsuan Lu, Ming-Hao Liu,
Ting-Hung Lai, Shan-Chun Hung, Yin-Feng Huang;
describes the use of the mobile phones. Many people
download the applications from the App Store. Even though
there are many choices in the existing APP Store, still it is not
meeting the requirements of some users. They specially need a
design for their own requirement. To meet this situation, there
are so many tools to develop an app for them. But there are
some tools which can be used only with strict training. Some
user-friendly design tools are introduced, for example, App
Fig. 1: Authentication Page
Inventor, Google Block yare some of them. Those tools are
different from traditional programming tools, such as write
VB code by Visual Studio, Java code by eclipse. By means of
drag and drop users can describe their logic. But, it is not easy
for some people to write their logic complete.
The proposed system also provides an easiest way to
develop and deploy their application to their mobile phone
with just in one click.
Aswini C, Jithin KC, Hasna A, Arun S, Dharanya K M,
Nitha T M; describes about the facilities of applying online
applications to village office using easy village application.
There are some facilities exist for online applications but they
are limited with direct verification and number of certificates
is needed. In easy village application the certificate will be
given to the corresponding customer through online after the
verification process The customer can download certificates
through the easy village application. Easy village application
has two parts. One part for admin and the another one is for a
customer. In the admin side the processing of things and
application related to one-time registration that can be viewed.
The customer part is only responsible for sending the
application with required documents and receiving the
certificates.

III. SYSTEM DEMONSTRATION


A model is proposed to implement an android application
for the textile industry. The simple experiment is processed Fig. 2: Account Creation Page for New User
with different modules and each has its own activity. B. Merchant Authentication and Merchant Panel
A. Login and Account Creation The merchant can use their registered phone number and
The authentication is shown in Fig.1.The first page of the password in order to login into the app. Merchant
app has two buttons one is for an existing user and another is authentication is shown in Fig.3.
for the new user to create their account. The account creation
for the new user is shown in Fig.2.
ISSN 2277-5099 | © 2019 Bonfring
Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 13

Fig. 5: Adding Product


In Fig.5 the product adding a page the merchant has to add
details of the product once they enter the parameters and click
Fig. 3: Merchant Authentication add product button it will get stored in the database.
In merchant panel here is a separate category for each item C. User Panel and User Settings
they are going to add and it is shown in Fig.4. Each category
has its own parameters in order to add the product into the In the user panel, the items added by the admin will be
database is shown in Fig.5. viewed by the user with their features and it is shown in Fig.6.

Fig. 6: User Panel


The user can also change their setting by uploading a new
profile and changing their mobile number and it is shown in
Fig.7.
Fig. 4: Category of Products

ISSN 2277-5099 | © 2019 Bonfring


Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 1, March 2019 14
[4] A. Anshul, S.K. Peddoju, V. Chouhan and A. Chaudhary, “Poster:
Hybrid Android Malware Detection by Combining Supervised and
Unsupervised Learning”, In Proceedings of the 24th Annual
International Conference on Mobile Computing and Networking, Pp.
798-800, 2018.
[5] C. Aswini, K.C. Jithin, H. An and S. Arun, “Easy village: Providing
online certificate's”, In International Conference on Trends in
Electronics and Informatics (ICEI), Pp. 78-81, 2017.
[6] X. Chang, E.P. Xing, Y. Yang and Y.L. Yu, Semantic pooling for
complex event analysis in untrimmed videos, IEEE Trans Pattern Anal
Mach Intell., Pp. 1617–1632, 2017.
[7] X. Chang and Y. Yang, Semisupervised feature analysis by mining
correlations among multiple tasks”, IEEE Transaction Neural
Networking Learning System, Vol. 28, No. 10, Pp. 2294-2305, 2017.
[8] S.Y. Choi and J.K. Park, Studying security weaknesses of Android
system, International Journal of Security and Its Applications, Vol. 9,
Pp. 7–12, 2015.
[9] S. Dan, J. Liu, X. Wang and W. Wang, Detecting Android Locker-
Ransomware on Chinese Social Networks, IEEE Access, Vol. 7, Pp.
20381-20393, 2019.
[10] T. Jiang, B. Ma, Z. You and H. Zhu, “HEMD: a highly efficient
random forest-based malware detection framework for Android”, Neural
Comput & Applic., Vol. 30, 2018.
[11] S. Karthick, and S. Binu, “Android security issues and solutions”,
International Conference on Innovative Mechanisms for Industry
Applications (ICIMIA), Pp. 686-689, 2017.
[12] W. Wei, Y. Li, X. Wang, J. Liu and X. Zhang, “Detecting Android
malicious apps and categorizing benign apps with ensemble of
classifiers”, Future generation computer systems, Vol. 78, Pp. 987-994,
2018.
Fig. 7: User Settings

IV. CONCLUSION AND FUTURE WORK


The need for android application development for the
textile industry has become a vital one. By using the
application the merchant can upload their samples at any time
and at anywhere. The merchants will also know about the
buyers and the database is maintained and pertains to the
merchant. Fabric, as well as garments both, plays a vital role
in the textile industry and their need is also gradually
increasing day by day. By using the Android application it
becomes easily available to everyone and it increases the rate
of trade. Both buyer and merchant get benefit by using the
android application. The user can add their item to cart and
buy the product through online payment. The merchant can
get the notifications about the orders placed and their
transactions.

ACKNOWLEDGEMENT
We acknowledge DST-File No.368. DST-FIST
(SR/FIST/College-235/2014 dated 21-11-2014) for financial
support and DBT-STAR-College-Scheme ref. no:
BT/HRD/11/09/2018 for providing infrastructure support.

REFERENCES
[1] A. Vitor Monte, M. Favero De Amorim, A. Ricardo Abed Grégio, G.
Barroso Junquera and P. Lício De Geus, Identifying Android malware
using dynamically obtained features, Journal of Computer Virology and
Hacking Techniques, Vol. 11, No. 1, Pp. 9-17, 2015.
[2] C. Jing, C. Wang, Z. Zhao, K. Chen, R. Du and G. Ahn, “Uncovering
the face of android ransomware: Characterization and real-time
detection”, IEEE Transactions on Information Forensics and Security,
Vol. 13, No. 5, Pp. 1286-1300, 2018.
[3] A. Borate and D. Sharma and K. Bhapkar, “Android-Based Fuzzy
Inference System to Control the Fan Speed”, Journal of Harmonized
Research in Engineering, Pp. 69-74, 2017.

ISSN 2277-5099 | © 2019 Bonfring

You might also like