0% found this document useful (0 votes)
47 views7 pages

Data Recovery Solutions for Education

Uploaded by

mohammed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views7 pages

Data Recovery Solutions for Education

Uploaded by

mohammed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,

DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

Software Solutions for Recovery of the Lost Data from Mobile Phones,
Tablets and Computers, Used in the Educational Process

ANTOANELA NAAJI MARIUS POPESCU MONICA CIOBANU


Department of Economical and Department of Economical and Department of Economical and
Technical Sciences Technical Sciences Technical Sciences
“Vasile Goldis” Western University “Vasile Goldis” Western University “Vasile Goldis” Western University
Arad, ROMANIA Arad, ROMANIA Arad, ROMANIA
[Link]@[Link] [Link]@[Link] cmmciobanu@[Link]

Abstract—It is already known that during the pandemic the educational process took place most of the time online or at most
in a hybrid format. Within these activities, there are situations in which, in addition to the online teaching, it is necessary to
conduct and store courses, homework or other teaching materials on various types of devices (phones, tablets or computers).
When they are disconnected incorrectly or become corrupt, errors occur, and the information may no longer be accessed. In
the case of the Windows operating system if the disconnection of the PCs is performed by the users in an erroneous way, after
reconnecting the storage devices, they still have access to the data. In the case of the Linux operating system if the
disconnection is not the professional one, most of the time there are chances that at reconnection, the data that was saved on
that storage device cannot be any longer accessed. The current paper presents two methods for recovering the lost
information: one for the educational data recovery, and one for recovering contacts, which are often important in the
communication process. These methods involve techniques for saving educational information/contacts from destroyed,
corrupt or inaccessible storage devices when they cannot be used normally. A first application, proposed for PCs, uses the
Master File Table and tries to retrieve information, by using an algorithm implemented in the C++ language, with multiple
advantages over the algorithms found in similar applications. The second software application is developed for the Android
platform and it was created to make a backup to the contacts from the smartphone and save them in a text (.txt) file. The
software applications presented in the paper are useful especially for those who own computers and phones from older
generations.
Keywords—data recovery, exhaustive algorithms, user-friendly interface, connectivity, efficiency, flexibility
Received: August 4, 2020. Revised: January 2, 2021. Accepted: March 4, 2021. Published: March 15, 2021.

platforms can be grouped into 4 major categories: databases


1. Introduction (SQL Server, Oracle, Postgre SQL, SQL Server Compact,
SQLite), programming languages (C #, C ++, Java, Android,
Pupils, students (course attendees) and teachers can now
Objective-C, iOS, T-SQL), development platforms (Visual
communicate with anyone from anywhere and anytime,
Studio, Windows Azure, Eclipse, Xcode) and frameworks
using free applications such as Skype, Zoom, Adservio,
(.NET ([Link], [Link] MVC, Win Forms, Compact
Google Classroom and others. Thus, conversations are held
Framework), Bootstrap/jQuery/Telerik, Android
in the educational process, similar to face-to-face
Framework, Cocoa Touch Frameworks).
conversations. In the case of online classes, the only people
The challenge of using mobile devices and technologies
who can get a link from the online class are the students
to turn online learning into an everyday educational process
who participate based on the invitation received from the
is not at all recognized as learning. However, in pandemic
teacher in private, in the messaging within the platform. The
conditions this is necessary. When accidentally deleting a
accounts of the students and teachers are secured by
file or a folder, it is recommended not to copy or move files
username, password, two-step authentication, data set by
to that device until a data recovery program is used. Thus,
each school/faculty when creating the account. Moreover,
the chances to recover the data increase. Some data can be
understanding society and culture is important when
retrieved by using free applications available online, but this
designing and developing IT technologies, especially in the
does not apply to anything and under any conditions. The
educational field [1, 2]. Therefore, IT technologies are
most common data recovery situations occur due to deletion
becoming ubiquitous in the educational process, and can
when the operating system is destroyed. If files are lost due
have a major impact on learning. Learning will be directed
to an error, there are methods to recover data that was
more and more towards the outside of the classroom, a case
accidentally deleted or due to certain system errors. For
that can positively influence the way of collaboration of
example, this can be done with a free program that can
those involved in the educational process. M-learning
recover data or files from a hard drive.
(mobile learning) is defined as a dynamic learning
Such software are: EasyRecovery, EASEUS Data
environment which use mobile technologies, especially in
Recovery/EASEUS Partition Recovery, Ontrack
the field of education [3, 4, 5, 6].
EasyRecovery Professional, GetDataBack and Recuva,
There are different programming environments for
programs that can help us solve these problems [7].
mobile technologies, which are chosen depending on the
The aforementioned programs are recommended, but
target customers, the platform and the used terminal, the
each of them is recommended for certain types of files. Data
utility, etc. Programming environments, constituted as
recovery was done until recently only by software

E-ISSN: 2224-3410 47 Volume 18, 2021


WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,
DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

specialists, but with Recuva free or other programs, data 2. Platforms, Applications and
recovery can be done also by less experienced users. Data
recovery is not done as a copy/paste from one partition to Backup Techniques
another but takes more time and depends on the amount of For the Unix platform the most used application is
information that need to be recovered. extundelete [12], which recovers the data stored on the
Also, transfer rates (read/write) cannot be compared device (declared as ext3 or ext4 format) corrupted (the
between an HDD on SATA and an external one on USB. operating system does not boot) or when the user
Using such programs, we can recover data that was deleted accidentally deleted critical files. The types of ext3 and ext4
from a partition of an HDD, if the HDD has not been partitions are the most common on such an operating system.
formatted and no new information has been overwritten over Third extended filesystem (ext3) is a “journaled” type of
the original ones. file. The limit of an ext3 partition is 32TB when the size of a
How data is stored on the storage device differs from block is 8 KB. There are 3 levels of journaling implemented
one operating system to another. For example, the Apple in ext3 (journal, ordered and writeback).
systems use their own file system. In case of losing the Fourth extended filesystem (ext4) was developed to make
improvements to the ext3 file type, while maintaining
entire database with phone numbers, there are 3 ways to
compatibility with its predecessor. The limit of an ext4
back up the phonebook: paid back-up (at a specialized
partition has been extended to 1 EB, and the size of a file is
store), free back-up (on PCs, by synchronization) and 16 TB. Extundelete can recover the content of a node (uses
internet backup. For backup on the PC there are specific concepts from the ext3grep program, which proved to be a
modes for each phone, through their software [8, 9]. successful data recovery code for ext3 and ext4 partition
Usually, the smartphone sync software is on a CD, if not on types) by searching the logged system file for an old save of
the manufacturer's website. Internet backup is one of the that node.
least used, although it is among the safest. If the laptop is Using this information, it determines the location of the
backed up, there is a possibility of losing the data if: both file within the file system and saves the data corresponding
the smartphone and the laptop are stolen, or both devices are to that node in the recovery file. The recovery is possible by
damaged, because of an accident, calamities, etc. There are the fact that the application associates the node number with
services that work if the internet is active and offer free the name of the deleted file in a directory, given that this
backup to the phonebook, which lasts very little. The service information is left behind after deleting the file. This rule no
only works if the internet is active on the mobile. Another longer applies when a storage device is formatted and each
online service offers a social media system in addition to the byte is overwritten with zeros, but such formatting is done
synchronization system, respectively [10], a place to for high-security files [13].
synchronize calendars, contacts, microblog archive, RSS If the formatting was not overwritten, then extundelete
(Received Signal Strength) and other communication will try to associate for a match of node number and file
systems, more or less important. It is recommended to use name in older copies that are still saved in the log. The
all these options to save the phone contacts, by extundelete interface is made using the Qt for Linux
framework [14]. In order to have access to modify partitions,
synchronizing with an online database, with personal
the run must be done under full rights - administrator (root).
computer, or at a specialized store. This will keep your In Romania, the Windows platform is more common on
information safe, even if the phone is lost, infected, or personal computers (PCs) than on the Unix platform. New
contacts are accidentally deleted. If all the variants Technology Fille System (NTFS) is a file system for the
described above are backed up, then the chances of losing Windows operating system with many improvements over
something from the agenda tend to zero. All the backup the previous FAT (File Alocation Table) file systems. The
methods and applications described above do not need root features of the NTFS are:
to apply them [11]. - NTFS Log is a log file system that, using a log file
During the COVID-19 pandemic, the educational ($LogFile), keeps information about changes, as in a log,
process (in Romania) often took place online. In this before making final changes to the operating system.
activity, in addition to online teaching, it is necessary to Thus, the file system will not be corrupted in case of power
carry out and store courses, homework or other teaching failure or operating system failure; the internal structure is
materials. However, not all attendees (pupils and students) not altered by changes such as defragmentation or changes
have high-performance devices (phones, tablets or in the structure of the indexes in the file table and a
computers) equipped with updated software, which allow consistent structure is maintained for possible rollbacks in
them to recover data and contacts in the case that the cases of corruption.
operating system is destroyed, and the data/contacts are - Update sequence journal (USN) constantly maintains
permanently deleted. In this context, the following sections information about changes to files or folders, as well as their
present two software applications, developed for the devices attributes.
which run older versions of operating systems, to make it - Encrypting File System (EFS) allows data to be
possible to recover lost data and contacts when the (older encrypted transparently for the user.
manufacturing) devices have been corrupted or when the - Volume Shadow Copy (VSC) keeps historical file data
user accidentally deleted files/contacts. on the NTFS partition, by copying old files and files that
have recently been replaced into a shadow copy; thus, it is
allowed to restore old files in case of user request, as well as
to create backups of applications.

E-ISSN: 2224-3410 48 Volume 18, 2021


WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,
DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

- Master File Table (MFT) contains metadata about all development tools included in the JDK (Java Development
files, folders and metafiles from [Link] (contains data Kit).
about file name, location, size and permissions on the file). - Eclipse IDE, the use of an IDE-type visual
The files are compressed into pieces of 16 clusters with a development environment is not required, but it is
size of 4 kB. The advantage of compressing files is in the recommended.
case of duplicate data. - Android SDK Starter Package are two distributions for
The most common HDD defects are: the Starter package. If the tablet/PC operating system is
- The logical fault is characterized by partition failures, Windows 7 and the installer distribution has been chosen, an
file system damage, accidental formatting or deletion. As error may occur on Windows because the installer does not
logical defects that require data recovery from the HDD we detect the Java JDK.
can mention: accidental deletion of a file, folder or an entire - Android SDK Manager: Android SDK Components
partition, corruption of the file system due to a virus, must also be installed, which include various development
accidental formatting of a partition, bad sectors that cause tools, documentation, Android platforms, external libraries,
the operating system to crash. USB driver for Windows and application examples.
- The electrical defect is characterized by a failure in the - Android Development Toolkit (ADT) Plugin, for
electrical board of the hard drive and occurs due to current Eclipse.
fluctuations or improper disconnection. The simplest technique to make a backup in Android,
- Firmware defect, when the firmware area of the hard which requires root rights on your smartphone, consists in
disk represents information that allows the initialization and using the Titanium Backup application on Google Play.
access of data on the surface of the hard drive. This Because not everyone wants to root the Android, they resort
information is on the surface of platters. to other more sophisticated variants, which require the
- Mechanical defect due to physical shocks, voltage Android SDK, respectively, the Android Debug Bridge
fluctuations, prolonged use and manufacturing problems. command. Backing up everything on the smartphone, after it
When an HDD makes repetitive sounds, there is a high has been confirmed in advance, involves using the adb
chance that it will have a mechanical problem. backup-apk-shared-all-f C:\User\NAME\[Link]
Mobile technologies (mobile phones/smartphones) are command, in which case all the apps installed on the
defined as those portable and lightweight technological smartphone, all the settings and all the contents of the SD
devices that can connect to the internet either through data (Secure Digital) card will be saved in the destination
cables or wireless connections [15]. provided by the command. The created safety backup can be
Nowadays, more and more pupils and students have at later restored on any Android using the adb restore
least one smartphone of newer or older generation, being C:\User\NAME\[Link] command. This backup
aware of the opportunities and facilities it offers in technique is not easy at all and there is no application that
education. However, there are many people who do not works for smartphones from different manufacturers.
know how to save contacts from the phonebook to Google, Because of this, in 90% of cases, the backup is created by
how to save applications, photos, etc. Smartphones are like Google in the cloud.
PCs, endowed with an operating system, and therefore In iOS, we can perform an alternative backup: either in
various operating errors can occur. There are situations iCloud or using a laptop/computer. Thus, the steps followed
when the smartphone is changed, lost or stolen, in which in iCloud are: store backups (usually in up to 2 TB of
case everything needs to be saved somewhere or a backup storage space), encrypt, then create and use the backups in
made on the card, in the PC or in the cloud. If the backup is any location via Wi-Fi connection. When using computers:
already done or is done before resetting the smartphone to backups are stored on your Mac/PC (the storage capacity
factory defaults, it is very easy to restore the backups after depends on the available space on your computer),
the reset. encryption (by default, the encryption is disabled), and
The Android platform [16] is an open-source platform for backups are created and used on your Mac or PC.
developing and running mobile applications, developed by
Google and the Open Handset Alliance. Originally created
for mobile phones, Android has become a major application
3. Development of Algorithms
platform for a wide range of mobile devices. It is a Linux-
based platform, portable on a wide range of mobile 3.1 Application for PCs and tablets
platforms, optimized for devices with low power Before any recovery, two completely different situations
consumption and low virtual memory, it supports Java are considered, in which there is or may not be a chance to
applications run by a Dalvik virtual machine, has recover files from a hard drive. When that storage
multimedia support for vector graphics, high level of environment no longer makes a sound when connected to
application security, component-based application power, the ability to ever access information from it tends to
architecture, SQLite-based data storage solutions, etc. zero. Another case is when the PC no longer starts, the
Android has become one of the major mobile platforms, operating system no longer loads or the partitions on a hard
along with Windows Mobile, Symbian, iPhone and J2ME disk are so defective that it requires formatting. The idea is
(Java Mobile Edition). To create software applications, that if some files no longer exist or can no longer be copied
platforms and applications are required [17], such as: and the operating system displays surprising errors, we need
- Java Development Kit, version depending on the age of an external hard drive or a USB stick to recover them.
the smartphone. Any version starting with JDK 6.0 is We must take into account that we can never recover
recommended, as Eclipse and the Android SDK need data from a defective hard drive on the same defective hard

E-ISSN: 2224-3410 49 Volume 18, 2021


WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,
DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

drive. Also, the entire operation becomes more complicated structure with information about each partition, drivepacket
if the respective information has been overwritten with new and a class of virtual methods, to update the graphical
ones. There is an amalgam of utilities on Windows that can interface. When a new element is found that changes the
be used for the purpose of recovering files. In cases of major graphical interface, it is transmitted by calling a function in
emergency, or when there is a risk of overwriting the the interface. Information about the found partitions is sent
searched files, a Data Recovery program is installed, and using a drivepacket structure, which is stored in the
with a USB stick with Ubuntu Live the data can be graphical interface for later use, and the partition name. It
recovered. also sends information about the files found on the partition,
Utilities like TestDisk, PhotoRec or Foremost are only such as: file index (file number used for display only), file
found on Linux, and their mode of operation is so efficient name, file properties, whether or not it has been deleted, and
that if it does not recover what it is looking for, it is almost the number of occupied clusters.
certain that there is no other chance. The basic interface is designed on purely virtual methods
Even if the device is old, there is an increased level of from IrecuperareDateManager. The flowchart containing
compatibility with a wide variety of operating systems and the steps for developing the algorithm is presented in Fig. 1.
devices. If we are using a computer that is a few years old,
then we are talking about file systems such as NTFS, m_hDrive is initialized, which contains the handel to the
partition and which returns the fact that the operation was
FAT32 or exFAT. NTFS has a major compatibility issue
completed successfully.
with something other than Windows. A log of changes to
the contents of an NTFS storage medium helps to recover
files in the event of a power failure or some stability issues
The variables are initialized for the number of sectors, the
with Windows. FAT32 is perfect for ensuring compatibility, data structure is populated with all the partitions, the list of
as long as there are slim chances for files larger than 4GB. partitions is browseed and the graphical interface updated.
exFAT exceeds the 4GB limit but will not be compatible
with anything other than a PC. NTFS is the best, the most
modern and with the widest variety of options for ensuring The deleted files are scanned, receiving as a parameter a data
security, unfortunately it is not suitable anytime and structure of the drivepacket type, which contains information
anywhere, but especially in the case of hardware. about the partition that has to be scanned.
The file system on the computer has a volume table,
which contains, among other things, an entry for each file on
the hard disk, with the address of the location where the file Buffers for the file name, which is an observation buffer
is stored. When the file is deleted, some information in the whether or not the file has been deleted.
table is removed to make way for free space. The physical
data remains stored on the hard drive until it is rewritten by The deleted files are restored, so, the content of the received
file as a parameter are read, the file properties are taken and a
adding new files. Typically, specialized data recovery
new file is created with the same content, the same
applications use this table for data recovery. If the data information and the file is written to the path received as a
about the deleted file on the volume table is intact, then it parameter.
will contain a pointer to the deleted file. A read of the table
followed by a search of the address in the table can lead to Fig.1 Basic interface development algorithm.
the recovery of the file when it has not been rewritten with
other information. If the file information was rewritten with Step I. An object of IcalbackInterface type is registered,
information from another file, then the application scans all which is kept as a private variable, so that it can be used to
the blocks on the hard drive and assigns the information in update the graphical interface. The received parameter,
the table to the found files. being of the pointer type, is checked if it is valid and the
If such a file is found it means that the file has not yet error code is returned, for a possible message from the
been deleted. If it does not find any file with correspondence graphical interface. The hard disk is scanned for partitions,
in the table, then the file is marked as deleted, finally it can and then the file that contains information about the
be recovered. The most important step in data recovery is partitions on the hard disk is accessed, and the handel of the
not to use the storage device after losing the file, before file is kept in hDrive. When it encounters a problem, the
using the data recovery program. Simply copying a file can error code is returned. Information is read from the partition
rewrite data to the location of the old file and lose the file. file and the information in it is stored.
Using these principles, the developed application uses the Step II. The graphical interface is populated with
MFT table of the files and tries to recover them. All the api information about the found partition, by using the callback
functions, as well as the interface that exports it, are written function, with the partition name and the data structure, with
in C++. The functions used are compiled and exported to a information about the partition.
file with the dll extension. Step III. If the handle in the MFT table is invalid, the
information file is read and the handel is retained, and if the
file failed to open, an error code is returned. The handel is
set to the MFT table and the start sector is set to scan the
1. Application management interface files. An object of type CNTFSDrive is initialized, and if the
The link file, present in both the graphical interface and initialization failed, an error is returned. The list of possible
in the dll, contains the functions called for the application file addresses is browsed.
and is IRecuperareDateManager.h. It contains a data

E-ISSN: 2224-3410 50 Volume 18, 2021


WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,
DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

Step IV. From the NTFS object the information needed When a graphical interface object changes its status, another
to populate the file name are read, by filling in the graphical object is announced.
CNTFSDrive::ST_FILEINFO stFInfo structure, which The graphical object emits a signal, it is connected in
contains information about the files. If the operation failed, another graphical object to a slot, and when it receives the
the error code is returned, the file properties buffer is signal, it executes the slot. Any graphical object must be
initialized, and the properties are added to the string. It is inherited from Qobject. The implemented class defines 2
verified if the file has been deleted or not and the methods of updating the graphical interface, which are
information is kept in the property buffer. The graphical called from the dll that contains the api. Thus,
interface is updated with the new information and the used typedefIrecuperareDate*(*CreateRecuperareDate)(void),
buffers are cleaned. This file scanning process can be time defines a function pointer that returns a pointer to the class
consuming, and it may also consume a lot of resources. of IRecuperareDate and it does not receive parameters,
Step V. The file is restored to the desired location. having only the role of exporting an object of type
Memory is freed by deleting buffers and closing handels to IRecuperareDate from the dll. Also, typedef void
the file. The dll export functions create and destroy "n" (*DestroyRecuperareDate)(IRecuperareDate*mydllObject),
objects of IrecuperareDate type. Both the class that defines a function pointer that does not return any value and
manages the metadata about each file on the hard disk receives as a parameter a pointer to the IrecuperareDate
(Fig.2) and the NTFS management (Fig.3), is performed by class, which has the role of destroying an object loaded from
respecting certain algorithmic steps. the dll. Since the signals and slots receive a complex data
type as a parameter, it must be defined. The data type sent
A handle to the hard disk is stored as protected parameters, from the dll by api is a defined data structure and must be
which contains the buffer with information from the metadata, recorded so that the object knows the type of variable sent
the size of the MFT, the current position in the table, the by the signal and captured by the slot. When one of the two
number of bits per cluster and the start position. methods is called, a signal is emitted containing the
information that must be updated in the graphical interface.
The signals are defined as calls of signals type.
The data from the hard disk are read and saved it in the The graphical interface is created using the Qt Creator
chData buffer, as well as the length of the buffer in dwLen framework, which is a multiplatform tool (can be used for
development on any operating system and uses C++). The
main interface is a QmainWindow object and is the main
Se extrag atributele fişierelor de pe tabela MFT, care sunt window of the application [18]. The graphical interface is
salvate în bufer-ul primit ca parametru puchData, cât şi created by defining the methods, the view objects used, the
lungimea bufer-ului în dwDataLen. variables kept in the objects and the slots.
A Qmap is used to retain the partition data structure,
which maps a certain value after a certain index. In this
The details of the file to be recovered and the handel are set to case, a pointer to the drivepacket structure is kept for the
the hard disk. partition name. The connection of the signals and slots is
done in the constructor of the MainWindowView object.
The signals emitted by the m_pCallback object to the
The MFT table is extracted from the hard disk, the contents view object, for the update of the view with new
being saved in the puchMFTBuffer buffer.
information. The signal is emitted when the scan button is

disabled so that the user cannot click. The initialization of
Fig. 2 MFT Management.
the graphical interface involves loading the dll with the
functionality part, after which the functions of creating and
A structure is created that stores file information, the file destroying the IRecuperareDate object type, are loaded. The
details are retrieved, and stored it in the stFileInfo structure. object is initialized, the callback is registered, and the
partitions get scanned. String DriveName information and
also a drivepacket data structure containing partition
The file is read, its buffer is kept in puchFileData, as well as information, are received. The data structure is mapped to
the size of the buffer, and the handel is set to the hard disk, and the partition name index for later use. A field is created in
then the boot sector is set and the bit size per sector. the TreeView from the graphical interface, that contains the
text of the partition name and the graphical interface is
updated with the new value. Information is received of type
The CNTFSDrive object is initialized. int Pos, position in the list, thing that is visible only in the
list of items: string containing the file name found as
Fig. 3 NTFS Management. deleted, string containing the list of file properties, string
indicating whether the file was deleted and an int containing
The graphical interface is made using the Qt framework,
the number of occupied clusters.
which is a friendly, multi-platform, intuitive and easy to use
Beforehand, the list is cleared of previous items, so as
for users. Creating objects is simple, by drag and drop, thus
not to duplicate the information.
increasing the efficiency in obtaining complex graphical
Thus, the graphical interface is updated with the new
interfaces. For the implementation of the callback interface,
values. When the Restore file button is pressed, a file
necessary for updating the graphical interface, Qt is used.
browser window opens, from which you choose the location

E-ISSN: 2224-3410 51 Volume 18, 2021


WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,
DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

where you want to restore the deleted file, as well as the


possibility to save the file under another name. When
changing a character in search, the list of files is cleaned
and updated with the values that contain the text in the
search. Scan functions can run for a long time, depending
on the size of the partition. Therefore, they are run on a
different thread. For the default constructor of the object,
the thread priority is set to idle. To be able to capture
signals in the view object type, the pointer is moved to
IrecuperareDate on the execution thread (the pointer to the
callback interface and the partition table). To execute the
thread, the function of scanning the deleted files is
launched.
2. Results of the application
The application must be started with high rights by the
administrator, to have access to the data that is necessary to
run. When the application is started, the graphical interface Fig. 5 Interface for file restoring.
loads the dll that contains the data recovery api. The
partition list is queried and displayed (Fig. 4). On the left
side of the interface is a TreeView object, which contains the
list of partitions, and on the right, a ListView object, which
contains the list of files on the selected partition. Below the 3.2 Application for the mobile phones
partition list there is a start scan button for the partition Depending on the degree of damage, the recovery of the
(start scan), and below the file list there is a button to contacts can be done even entirely. The degree of physical
recover the selected file. Pressing the start scan button starts destruction of the card/phone storage will also dictate the
the scanning function and the list of deleted files is updated. difficulty of recovering the contacts contained. Also, there
At this point, a file will be selected from the list, and it can are cases where recovery can be done safely from home, and
be restored to wherever it is to be added to the hard disk
(Fig. 5). The search bar can be used for the easy access to
the searched file.

cases where the hard drive has defective components that


need to be replaced or it is severely damaged and it can no
Fig. 4 Main interface: file selection
longer be used under normal conditions (in which case a
possible data recovery is done only by a specialized
company).
In the first phase, the input/output elements belonging to
Java are loaded/imported, meaning the part of data writing
and reading, ArrayList, the tables and other parameters with
commands such as import [Link].
Also, through commands like import
[Link], items for Android need
to be imported, such as for the communication from external
sources, importing contacts, database, filters, buttons, etc.
Then, it is easier to write to an SD card [19].
The 3 tabs of the application are Contacts, Export and
Share. The contact list is queried and displayed (Fig. 6).
Fig. 6 Main interface: contact list.

E-ISSN: 2224-3410 52 Volume 18, 2021


WSEAS TRANSACTIONS on ADVANCES in ENGINEERING EDUCATION Antoanela Naaji,
DOI: 10.37394/232010.2021.18.5 Marius Popescu, Monica Ciobanu

In the Share tab it is possible to send an e-mail with the contacts from the address book and on the SIM card, as well
desired contact and it is asked to enter the recipient, subject as in the creation of a backup file for the contacts saved in
and message (Fig. 7). the phonebook and on the SIM card.
References
[1] S.S. Demtsura, “Innovative methods, forms and technologies in the
field of education” (Métodos, formas y tecnologías innovadoras en el
campo de la educación), in Revista Espacios, Vol. 41 (46), Art.13,
2020, pp. 144-153.
[2] S.V. Pogorelaya and V.V. Solovyova, “Application of innovative
technologies in the educational process: multimedia presentations”. In
Forum of young scientists, No. 5-2 (21), 2018, pp.1152-1155.
[3] W.O. Aparicio-Gómez, C.A. Aparicio-Gómez and J.F. Hernández
Niño, “El aprendizaje móvil (m-learning) como herramienta
formativa para la empresa”, in Revista Internacional de Pedagogia e
Innovacion Educativa,Vol.1(1), 2021, pp.69-102.
[4] P. Tamilarasan, S. Karthick and C.G. Anupama, “Mobile learning
challenges and capabilities”, in International Journal of Recent
Technology and Engineering, 8(3), 2019, pp. 5358–5361,
[Link]
[5] A. Checko, H.L. Christiansen, Y. Yan, L. Scolari, G. Kardaras, M.S.
Fig. 7 Interface: restore contacts. Berger and L. Dittmann, “Cloud RAN for Mobile Networks - a
Technology Overview”, in IEEE Communications Surveys &
Tutorials, Vol. 17(1), 2014, pp.405 – 426.
[6] L. Sri Istiyowati and P. Prati, “Mobile learning readiness in higher
eduction based on the theory of planned behavior”, in International
4. Conclusions Journal of Recent Technology and Engineering, 8(1C2), 2019,
The problem of recovering data from compromised pp.831–836.
information media is real and current, given the fact that [7] K.A/P. Angamutu, N.A. Abd Rahman and N.N. Ain Nik Suki, “A
Customized Data Recovery Tool”, in Journal of Physics: Conference
most participants to the online educational process do not Series 1712, 2020, pp.1-9,
have newly manufactured devices. [Link]
In case of accidental deletion, on such devices, the data 6596/1712/1/012019/pdf
recovery programs presented in the introductory paragraph [8] H. Maryam, Q. Javaid, M.A. Shah and M. Kamran, “A Survey on
Smartphones Systems for Emergency Management”, in International
may be used, but they do not guarantee 100% the solution to Journal of Advanced Computer Science and Applications, Vol. 7, No.
the problem, as the content of the deleted files is not 6, 2016, pp.301-311.
immediately removed from the storage device. In this case [9] N. Castell, M. Kobernus, H.Y. Liu, P. Schneider, W. Lahoz, A.J.
only the reference is removed from the folder system, and Berre and J. Noll, “Mobile technologies and services for
the space occupied by it is given for later reuse (being environmental monitoring: The Citi-Sense-MOB approach”, in Urban
Climate, 2014, pp.1-14.
marked as empty space). For this reason, the data cannot
[10] A. Gholoobi and S. Stavrou, “RSS based localization using a new
always be recovered and rewritten. The exhaustive WKNN approach”, in 7th International Conference on Computational
algorithm developed in the paper removes this disadvantage. Intelligence, Communication Systems and Networks, 2015, pp.27-30.
The proposed application for PCs was tested on storage [11] S.J. Yang, J.H. Choi, K.B. Kim and T. Chang, “New acquisition
units such as external SerialATA (SATA), PATA, method based on firmware update protocols for Android
connected via USB, eSATA, connected to the Personal smartphones”, in Digital Investigation, Vol.14, 2015 pp.568-576.
Computer with Windows 7 and solves the problem of data [12] N. Reddy, “Practical Cyber Forensics”, in Linux Forensics, Springer,
2019, pp.69-100.
recovery by software completion of the most common
[13] *** QT Reference Documentation, Retrieved from
algorithm used in similar applications. The application is [Link] accessed February
implemented in the C++ language and can also run on 2018.
IDE/IDE-SATA hard disks with adapter. [14] *** QT Developer Network, [Link]
Also, the knowhow for Linux partitions (ext2, ext3, ext4 5.0/[Link], accessed February 2018.
etc.) was incorporated. [15] R.K. Konoth, Victor van der Veen and H. Bos, “How Anywhere
Computing Just Killed Your Phone-Based Two-Factor
Data recovery, using the developed application, has a Authentication”, in Financial Cryptography and Data Security,
much higher success rate if after the loss/deletion of certain 2017, pp.405-421.
files the storage space of that device is not overwritten [16] *** Developer Android, Available:
(something else copied on the respective space sequence). [Link]
By using the application to recover contacts, there is no [Link], accessed June 2020.
risk of losing a number of a contact person (colleague, [17] D.P. Agrawal and Q.A. Zeng, Introduction to Wireless and Mobile
Systems, Cengage Learning, Boston, 2014.
teacher, secretary, etc.). If one or all contacts have been
[18] A.C. Craiovan, “Data recovery application”, graduation thesis,
deleted by mistake, or are lost, then they can be restored by UVVG Arad (not published), 2013.
a single click. [19] F. Drig, “Android software for backup the contacts”, Student paper -
The characteristics of the second developed application, UVVG, Arad (not published), 2017.
compared to similar applications, consist in the cumulative
realization of the restoration operations of all the deleted Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the Creative
Commons Attribution License 4.0
[Link]

E-ISSN: 2224-3410 53 Volume 18, 2021

You might also like