Search this site
Embedded Files
ARRAK
  • About
  • Gallery
  • Portfolio
    • Skills
    • Education
    • Experiences
    • R&D
      • Interests
      • Coding
        • Repositories
      • Projects
        • Repositories
        • Miscellaneous
          • AI/ML
          • Web Applications
          • Android Applications
          • Desktop Applications
          • Arduino Projects
          • Audio Engineering
      • Thesis
        • BSc
        • MSc
        • PhD
      • Publications
        • Repositories
        • Miscellaneous
      • Reviewer (R&D)
        • Springer Nature
    • Accomplishments
    • Compulsory Extracurricular Activities
      • Repositories
      • Miscellaneous
    • News/Events
  • Blog
    • LFoC
      • Palindrome Number
      • Perfect Number
      • Factorial Using Recursion and Loop
      • GCD and LCM
      • Prime Number
      • Prime Factors
      • Fibonacci series using recursion
      • Binary to Decimal
      • Decimal to Binary
      • nCr
      • Pattern Matching
      • Pattern Matching simple pattern
      • Number Pattern
      • Pascal Number Pattern
      • Armstrong Number
      • Swapping without using third variable
      • Reverse Array
      • Insert an element in an array
      • Remove element from array
      • Merge two arrays
      • Print a string using a loop
      • Reverse a string
      • Word Count
    • OotFC
      • 22
      • ssiidan
      • taskinsoso13
      • hi
    • Cyber Security
      • New VPN Attack Demonstrated Against Palo Alto Networks, SonicWall Products
      • Top 10 Cybersecurity Trends to Expect in 2025
      • City Bank data breach: Client financial statements sold on underground foru
      • Hacked Chrome extensions put 2.6 million users at risk of data leak
      • Study Guide
    • Frameworks&ITFirms
      • Viva
        • Angular
        • .Net
          • Notions
          • GSA
          • VS
          • PBS
    • ARRAKPPSEASL - R&D
      • Assessing Customer Churn Using Machine Learning
      • Customer Analytics: Preparing Data for Modeling
      • From Data to Dollars - Predicting Insurance Charges
      • Detecting Cybersecurity Threats using Deep Learning
      • Modern cybersecurity defense
      • OPCA: Taxonomy, Mechanisms, and Case Studies of Prominent Cyber Threats in
      • COMCD - A Comprehensive Overview of Modern Cybersecurity Defenses: From Mal
      • A Flexible and Scalable Role-Based Authorization System for .NET Applicatio
      • A Toolkit for Flexible and Scalable Fuzzy Record Linkage
      • Adherence App
      • CEFFRL
      • DIABWSwS
      • Bowl Sound Analysis
      • Cross-Platform Lost Finder
      • ML-ASPA
      • ABWSwS
      • Medication Alert
    • ARRAKPP CI
      • MCQ
        • Combined Bank - Sonali & Janata Bank
        • Copy of Combined Bank - Sonali & Janata Bank
      • Written
        • IBBL
        • BB
        • SB/JB
        • UB
        • CB
        • BcB
        • C5B
        • BTV
        • CCB
        • DESCO
      • Subjective
        • Data Structure & Algorithm
          • Data Structures
          • Complexity
          • Array
          • Linked List
          • Stack
          • Queue
          • Tree
          • Binary Tree
          • Binary Search Tree
          • Searching
          • Balanced Tree
          • Searching Traversals
          • Sorting Algorithm
          • Algorithm
        • OOP
          • Concepts
          • Constructor Overloading
          • Destructor
          • Inheritance
          • Polymorphism: Method Overloading
          • Polymorphism: Method Overriding
          • Abstract Class
          • Abstraction: Interface
          • Encapsulation
        • Database
          • Query
        • Data Comm. & Networking
          • OSI Model
          • Private IP Address
    • ARRAKPP BCS
      • Preliminary
        • English Language
        • English Literature
        • General Science
        • Intelligence Quotient (IQ)
    • ARRAKPP ISSB
      • ISSB v1
      • ISSB v2
      • ISSB v3
      • CAPITALS
      • BANGLADESH ARMY
      • BANGLADESH NAVY
      • WAT
    • ARRAPP Deen-e-Islam
      • দোআ
        • দৈনন্দিন
        • বিবিধ
  • Contact
ARRAK

<<< Improving Medication Adherence through a User-Centered Android Application: A Development and Usability Study

Abstract:

This study details the development and features of a patient-centric Android application designed to enhance medication adherence through a robust and user-friendly alert system. Recognizing the common challenge patients face in remembering medication schedules, this application provides timely, customizable alarms with visual cues, such as medication images, to minimize errors. The system also allows for detailed medication descriptions, including dosage and administration instructions (e.g., before or after a meal). Employing an incremental development methodology with Java and XML in the Android Studio IDE, the application was built to be an economical and time-saving solution that does not necessitate additional hardware. Key features include a highly navigable user interface and a notification system designed to support diverse patient literacy levels. This work presents a practical digital health tool to address the critical issue of medication non-adherence, with the potential for broad applicability in various healthcare settings.

#LostFinderRevolution #CrossPlatformLocator #MLAcousticTracking #EfficientRecoveryTech #VersatileLostItemTracker #AcousticSignalFinder #SeamlessMLTracking #EnhancedLocationRecovery #AdvancedLostItemSystem #AdaptableAcousticLocator #AbdurRahimRatulAliKhan

>>>

LinkLinkLinkLinkGitHubLinkLinkLinkedIn
YouTubeInstagramFacebook

Contact 

Email: abdurrahimratulalikhan [at] gmail [dot] com Dhaka, Bangladesh 
© 2025  ARRAK  |  All Rights Reserved  |  Terms  |  Privacy & Cookies Policy
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse