SlideShare a Scribd company logo
1 of 18
Download to read offline
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
ADRIT SOLUTIONS
Ph: 7676768124 ; 9886878569 Email: adritsolutions@gmail.com
ANDROID APPLICATIONS IEEE TITLES - 2016-17
1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World
Constraints
Abstract: According to the growth of mobile devices equipped with a GPS receiver, a
variety of location-based services (LBSs) have been launched. Since location
information may reveal private information, preserving location privacy has become a
significant issue. Previous studies proposed methods to preserve a users' privacy;
however, most of them do not take physical constraints into consideration. In this
paper, we focus on such constraints and propose a location privacy preservation
method that can be applicable to a real environment. In particular, our method
anonymizes the user's location by generating dummies which we simulate to behave
like real human. It also considers traceability of the user's locations to quickly recover
from an accidental reveal of the user's location. We conduct an experiment using five
users' real GPS trajectories and compared our method with previous studies. The
results show that our method ensures to anonymize the user's location within a pre-
determined range. It also avoids fixing the relative positions of the user and dummies,
which may give a hint for an LBS provider to identify the real user. In addition, we
conducted a user experiment with 22 participants to evaluate the robustness of our
method against humans. We asked participants to observe movements of a user and
dummies and try to and the real user. As a result, we conformed that our method can
anonymize the users' locations even against human's observation.
2. IEEE 2016: SBVLC: Secure Barcode-Based Visible Light Communication for
Smartphones
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: 2D barcodes have enjoyed a significant penetration rate in mobile
applications. This is largely due to the extremely low barrier to adoption—almost every
camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC
technology, 2D barcodes have been increasingly used for security-sensitive mobile
applications including mobile payments and personal identification. However, the
security of barcode-based communication in mobile applications has not been
systematically studied. Due to the visual nature, 2D barcodes are subject to
eavesdropping when they are displayed on the smartphone screens. On the other hand,
the fundamental design principles of 2D barcodes make it difficult to add security
features. In this paper, we propose SBVLC—a secure system for barcode-based visible
light communication (VLC) between smartphones. We formally analyze the security of
SBVLC based on geometric models and propose physical security enhancement
mechanisms for barcode communication by manipulating screen view angles and
leveraging user-induced motions. We then develop three secure data exchange schemes
that encode information in barcode streams. These schemes are useful in many
security-sensitive mobile applications including private information sharing, secure
device pairing, and contactless payment. SBVLC is evaluated through extensive
experiments on both Android and iOS smartphones.
3. IEEE 2016: Mobile attendance using Near Field Communication and One-Time
Password
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: This paper introduces a Near Field Communication (NFC) supported College
M-Attendance system for University Students. Near Field Communication (NFC)
is one of the latest technologies in radio communications and being a subset of RFID
technology, it is growing at an enormous pace. NFC technology provides the fastest way
to communicate between two devices and it happens within a fraction of a second. It
has several applications in Mobile Communications and transactions. An NFC-
supported College M-Attendance system for University Students is discussed
as one potential use of this technology. The proposed framework replaces manual roll
calls and hence, making it resilient to forgery. It gives parents and professors
information about the students' attendance. The marking of attendance is quick,
unsupervised, and makes use of a One Time Password (OTP) to enhance the security of
the system and takes away the possibility of proxy attendance. This paper discusses
NFC as a technology that is more secure and convenient than the prevalent technology
of Bluetooth, and also elaborates on the proposed framework of the M-
Attendance system that makes use of this advantage that NFC has over other
technologies.
4. IEEE 2016: Context-Aware Mobile Cloud Computing and Its Challenges
Abstract: Cloud computing is gaining popularity due to virtually unlimited resources,
low capital cost, ease of adoption, flexible resource provisioning, and high scalability.
Considering these benefits, researchers envision the usage
of cloud computing for mobile devices to overcome the ever-increasing computational
and energy demands of smartphone applications. However, this requires specialized
context-ware application development models that can facilitate the development
of cloud-enabled applications capable of making context-aware computation offloading
decisions. This article provides an overview of mobile cloud computing technology,
focusing on its context-awareness aspects and challenges.
5. IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile
Users
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Location-based services are quickly becoming immensely popular. In
addition to services based on users' current location, many potential services rely
on users' location history, or their spatial-temporal provenance. Malicious users may lie
about their spatial-temporal provenance without a carefully designed security system
for users to prove their past locations. In this paper, we present the Spatial-Temporal
provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-
hoc mobile users generating location proofs for each other in a distributed setting.
However, it can easily accommodate trusted mobile users and wireless access
points. STAMP ensures the integrity and non-transferability of the location proofs and
protects users' privacy. A semi-trusted Certification Authority is used to distribute
cryptographic keys as well as guard users against collusion by a light-weight entropy-
based trust evaluation approach. Our prototype implementation on the Android
platform shows that STAMP is low-cost in terms of computational and storage
resources. Extensive simulation experiments show that our entropy-based trust model
is able to achieve high collusion detection accuracy.
6. IEEE 2016: PRISM: PRivacy-aware Interest Sharing and Matching in Mobile
Social Networks
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: In a profile matchmaking application of mobile social networks, users need to
reveal their interests to each other in order to find the common interests. A malicious
user may harm a user by knowing his personal information. Therefore, mutual interests
need to be found in a privacy preserving manner. In this paper, we propose an efficient
privacy protection and interests sharing protocol referred to as PRivacy-aware Interest
Sharing and Matching (PRISM). PRISM enables users to discover mutual interests
without revealing their interests. Unlike existing approaches, PRISM does not require
revealing the interests to a trusted server. Moreover, the protocol considers attacking
scenarios that have not been addressed previously and provides an efficient solution.
The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also
proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM
against both passive and active attacks. Through implementation, we also present a
detailed analysis of the performance of PRISM and compare it with existing approaches.
The results show the effectiveness of PRISM without any significant performance
degradation.
7. IEEE 2015: Just-in-Time Code Offloading for Wearable Computing
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Wearable computing becomes an emerging computing paradigm for various
recently developed wearable devices, such as Google Glass and the Samsung Galaxy
Smart watch, which have significantly changed our daily life with new functions. To
magnify the applications on wearable devices with limited computational capability,
storage, and battery capacity, in this paper, we propose a novel three-layer architecture
consisting of wearable devices, mobile devices, and a remote cloud for code offloading.
In particular, we offload a portion of computation tasks from wearable devices to local
mobile devices or remote cloud such that even applications with a heavy computation
load can still be upheld on wearable devices. Furthermore, considering the special
characteristics and the requirements of wearable devices, we investigate
a code offloading strategy with a novel just-in-time objective, i.e., maximizing the
number of tasks that should be executed on wearable devices with guaranteed delay
requirements. Because of the NP-hardness of this problem as we prove, we propose a
fast heuristic algorithm based on the genetic algorithm to solve it. Finally, extensive
simulations are conducted to show that our proposed algorithm significantly
outperforms the other three offloading strategies.
8. IEEE 2015: Energy Cost Models of Smartphones for Task Offloading to the
Cloud
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Task offloading from smartphones to the cloud is a promising
strategy to enhance the computing capability of smartphones and prolong their battery
life. However, task offloading introduces a communication cost for those devices.
Therefore, the consideration of the communication cost is crucial for the effectiveness
of task offloading. To make task offloading beneficial, one of the challenges
is to estimate the energy consumed in communication activities of task offloading.
Accurate energy estimation models will enable these devices to make the right
decisions as to whether or not to perform task offloading, based on the energy cost of
the communication activities. Simply put, if the offloading process consumes
less energy than processing the task on the device itself, then the task is offloaded
to the cloud. To design an energy-aware offloading strategy, we
develop energy models of the WLAN, third-generation, and fourth-generation interfaces
of smartphones. These models make smartphone scapable of accurately estimating
the energy cost of task offloading. We validate the models by conducting an extensive
set of experiments on five smartphones from different vendors. The experimental
results show that our estimation models accurately estimate
the energy required to offload tasks.
9. IEEE 2015: Context-Based Access Control Systems for Mobile Devices
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Mobile Android applications often have access to sensitive data and
resources on the user device. Misuse of this data by malicious applications may result in
privacy breaches and sensitive data leakage. An example would be a malicious
application surreptitiously recording a confidential business conversation. The problem
arises from the fact that Android users do not have control over the application
capabilities once the applications have been granted the requested privileges upon
installation. In many cases, however, whether an application may get a privilege
depends on the specific user context and thus we need a context-
based access control mechanism by which privileges can be dynamically granted or
revoked to applications based on the specific context of the user. In this paper we
propose such an access control mechanism. Our implementation
of context differentiates between closely located sub-areas within the same location.
We have modified the Android operating system so that context-
based access control restrictions can be specified and enforced. We have performed
several experiments to assess the efficiency of our access control mechanism and the
accuracy of context detection.
10. IEEE 2015: Avatar: Mobile Distributed Computing in the Cloud
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Avatar is a system that leverages cloud resources to support fast, scalable,
reliable, and energy efficient distributed computing over mobile devices. An avatar is a
per-user software entity in the cloud that runs apps on behalf of the
user's mobile devices. The avatars are instantiated as virtual machines in the cloud that
run the same operating system with the mobile devices. In this way, avatars provide
resource isolation and execute unmodified app components, which simplifies
technology adoption. Avatar apps execute over distributed and synchronized
(mobile device, avatar) pairs to achieve a global goal. The three main challenges that
must be overcome by the Avatar system are: creating a high-level programming model
and a middleware that enable effective execution of distributed applications on a
combination of mobile devices and avatars, re-designing the cloud architecture and
protocols to support billions of mobile users and mobile apps with very different
characteristics from the current cloud work loads, and explore new approaches that
balance privacy guarantees with app efficiency/usability. We have built a
basic Avatar prototype on Android devices and Android x86 virtual machines. An
application that searches for a lost child by analyzing the photos taken by people at a
crowded public event runs on top of this prototype.
11.IEEE 2015: Developing an efficient digital image watermarking for
smartphones
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: In recent years, Smartphone usage has been increasing rapidly to the point
where it surpassed all other electronic devices. Multimedia sharing and Image/Video
capturing are amongst the most utilized functionalities of smartphones. Smartphones
and Internet availability made the capture, transmission and storage of digital data very
easy and convenient. The simplicity, connectivity, and strong capabilities of such
devices make it very hard to protect the privacy and Intellectual Property (IP) of digital
multimedia. While all types of digital multimedia are at risk, digital images are severely
affected. Editing and converting digital images can be done quite easily, and hence
protecting them becomes even harder. Digital image watermarking is a technique used
to authenticate and protect the IP of digital images. In this paper we propose
an efficient and flexible digital watermarking system that runs on Android devices. The
system uses RAW images (a feature of the most recent Android software, called
Lollipop) to embed a watermark at an early stage before any modification and
conversion of the image. The system incorporates public-key cryptography for
increased protection. A simple and robust water marking technique is utilized for
efficiency. Other watermarking techniques are offered for flexibility. Finally, the system
uses the inherent features of the Android operating system to run in parallel and be
available to other applications.
12.IEEE 2015: Sesame: a secure and convenient mobile solution for passwords
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Passwords are the main and most common method of remote authentication.
However, they have their own frustrating challenges. Users tend to
forget passwords that are chosen to be hard to guess .Password managers are an
approach to keeping our passwords safe. However, they mainly rely on one
master password to secure all of our passwords. If this master password is
compromised then all other passwords can be recovered. In this work, we
introduce Sesame: a secure yet convenient mobile-based, voice-
activated password manager. It combines all different methods of user authentication
to create a more robust digital vault for personal data. Each password is encrypted with
a new fresh key on the user's mobile device for maximum security. The keys are stored
in our servers in a protected format. The user has the option of backing up the
encrypted passwords in any cloud service. To view a password, the user only needs to
utter the name of a web service, and speaker and speech recognition are applied for
authentication. Only the key for that service is sent to the mobile application and the
password is decrypted and displayed. The biggest advantage of Sesame is that the user
need not assume any trust to neither our servers nor any cloud storage. Also, there is no
need to enter a master password every time since speaker recognition is used.
However, as an alternative to voice, users can view their passwords using a
master password in case voice is not available. We provide a brief analysis of the
security of our solution that has been implemented on Android platform and freely
available on Google Play. Sesame is an ideal and
practical solution for mobile password managers.
13.IEEE 2014: NFC based applications for visually impaired people - A review
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Recent technological developments provide technical assistance that enables
supporting people with visual disabilities in their everyday tasks and improve their
quality of life. Considering that about 90% of the world visually impaired people live in
developing countries, particularly in the local context, in Saudi Arabia, there is a lack of
assistive tools and adapted environment supporting people with visual disabilities. To
overcome this problem, a wide variety of relatively inexpensive applications adapt Near
Field Communications (NFC) tagging technology in the development of assistive tools
for people with visual disabilities. In this article, we will systematically review the
current adaptation of NFC technology for visually disabled people and
introduce NFC practical applications to help them overcome challenging tasks that they
may encounter every day.
14.IEEE 2014: NFC based secure mobile healthcare system
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: With the recent increase in usage of mobile devices especially in developing
countries, they can be used for an efficient healthcare management. In this work, we
have proposed a novel architecture for improving healthcare system with the help of
Android based mobile devices with NFC [1] and Bluetooth interfaces, smartcard
technology on tamper resistant secure element (SE) for storing credentials and
secure data, and a Health Secure service on a hybrid cloud for security and health
record management. The main contribution of this paper is proposal of applications for
i) Secure Medical Tags for reducing medical errors and ii) Secure Health card for storing
Electronic Health Record (EHR) based on Secure NFC Tags, mobile device
using NFC P2P Mode or Card Emulation Mode. We have also briefly mentioned a basic
security framework requirement for the applications. Since NFC NDEF format is prone
to security attacks [2], we have utilized low level APIs on Android based mobile devices,
to securely access NFC tags such as MIFARE Classic tags with NFC-A (ISO 1443-3A)
properties. Simple touch of NFC enabled mobile devices can benefit both the patient as
well as the medical doctors by providing a robust and secure health flow. It can also
provide portability of devices and usability for health management in emergency
situation, overpopulated hospitals and remote locations.
15.IEEE 2014: Anti-theft application for android based devices
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: This paper presents a technique to improve anti-
theft for android based mobile phones by using different services like MMS instead of
SMS. As the use of smartphones, tablets, phablets based on android operating system is
increasing, many scenarios related with anti-theft have already been proposed and
many software based on anti-theft have also been developed, but most of these
software are not freely available and it's difficult to identify the thief by using these
software's e.g. GPS Tracking. We put forward a new scheme, which enhances the
present scenario, based on new technologies like Multimedia Messages. The scenario
proposed in this work is totally dependent on the hardware of your smartphone like
camera (front & back) and support for multimedia messages. Once this software is
installed, it will work in the background, stores the current SIM number in a variable
and keeps checking continuously for SIM change, whenever SIM gets changed from
mobile, it will take snapshots and record a video in the background i.e., without taking
user permission and then it will send an MMS, and number of snap shots, to an alternate
mobile number and an email id, which was provided during installation. The enviable
advantage of this software is that it is very easy to configure and it keeps running in the
background without interrupting the user. To some extent it helps the owner to identify
the thief.
16.IEEE 2014: Privacy-Preserving Optimal Meeting Location Determination on
Mobile Devices
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Equipped with state-of-the-art smartphones and mobile devices, today's
highly interconnected urban population is increasingly dependent on these gadgets to
organize and plan their daily lives. These applications often rely on current (or
preferred) locations of individual users or a group of users to provide the desired
service, which jeopardizes their privacy; users do not necessarily want to reveal their
current (or preferred) locations to the service provider or to other, possibly untrusted,
users. In this paper, we propose privacy-preserving algorithms for determining
an optimal meeting location for a group of users. We perform a
thorough privacy evaluation by formally quantifying privacy-loss of the proposed
approaches. In order to study the performance of our algorithms in a real deployment,
we implement and test their execution efficiency on Nokia smartphones. By means of a
targeted user-study, we attempt to get an insight into the privacy-awareness of users
in location-based services and the usability of the proposed solutions.
17. IEEE 2014: How Long to Wait? Predicting Bus Arrival Time With Mobile Phone
Based Participatory Sensing
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: The bus arrival time is primary information to most city transport travelers.
Excessively long waiting time at bus stops often discourages the travelers and makes
them reluctant to take buses. In this paper, we present a bus arrival time prediction
system based on bus passengers' participatory sensing. With
commodity mobile phones, the bus passengers' surrounding environmental context is
effectively collected and utilized to estimate the bus traveling routes
and predict bus arrival time at various bus stops. The proposed system solely relies on
the collaborative effort of the participating users and is independent from
the bus operating companies, so it can be easily adopted to support universal bus
service systems without requesting support from particular bus operating companies.
Instead of referring to GPS-enabled location information, we resort to more generally
available and energy efficient sensing resources, including cell tower signals, movement
statuses, audio recordings, etc., which bring less burden to the participatory party and
encourage their participation. We develop a prototype system with different types of
Android-based mobile phones and comprehensively experiment with the NTU campus
shuttle buses as well as Singapore public buses over a 7-week period. The evaluation
results suggest that the proposed system achieves outstanding prediction accuracy
compared with those bus operator initiated and GPS supported solutions. We further
adopt our system and conduct quick trial experiments with London bus system for 4
days, which suggests the easy deployment of our system and promising system
performance across cities. At the same time, the proposed solution is more generally
available and energy friendly.
18.IEEE 2013: SPOC: A Secure and Privacy-Preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: With the pervasiveness of smart phones and the advance of wireless body
sensor networks (BSNs),mobile Healthcare (m-Healthcare), which extends the
operation of Healthcare provider into a pervasive environment for better health
monitoring, has attracted considerable interest recently. However, the flourish of m-
Healthcare still faces many challenges including information security and privacy
preservation. In this paper, we propose a secure and privacy-
preserving opportunistic computingframework, called SPOC, for m-
Healthcare emergency. With SPOC, smart phone resources including computing power
and energy can be opportunistically gathered to process the computing-intensive
personal health information (PHI) during m-Healthcare emergency with
minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the
high reliability of PHI process and transmission in m-Healthcare emergency, we
introduce an efficient user-centric privacy access control in SPOC framework, which is
based on an attribute-based access control and a new privacy-preserving scalar product
computation (PPSPC) technique, and allows a medical user to decide who can
participate in the opportunistic computing to assist in processing his overwhelming PHI
data. Detailed security analysis shows that the proposed SPOC framework can
efficiently achieve user-centric privacy access control in m-Healthcare emergency. In
addition, performance evaluations via extensive simulations demonstrate the SPOC's
effectiveness in term of providing high-reliable-PHI process and transmission while
minimizing the privacy disclosure during m-Healthcare emergency.
19.IEEE 2013: Wireless sensor networks using Android Virtual Devices and Near
Field Communication peer-to-peer emulation
Contact Us: #42/5, 1st
Floor, 18th
Cross, 21st
Main, Vijayanagar, Bangalore-40
Land Mark: Near Maruthi Mandir ; www.adritsolutions.com
Abstract: Several new Android smartphones support Near Field Communication (NFC).
The Android SDK provides an NFC API that can be used to develop NFC applications
that conduct peer-to-peer (P2P) data exchange. The Android emulator does not support
P2P communication between instances of the Android Virtual Device (AVD). In
addition to this constraint, P2P experimentation on actual smartphones is difficult
due to limited NFC support. To fill the gap created by this minimal support, we propose
the Java Mail NFC API (JNFC). JNFC uses the Java Mail API to emulate the functionality of
the Android NFC P2P API. To evaluate the performance of JNFC, we created the
DroidWSN Wireless Sensor Network (WSN) model and implemented it as
an Android application. We design and conduct an experiment for our DroidWSN
model to measure the execution time of our Android application WSN on AVDs. We
compare our simulation results against those from a similar experiment that measured
the execution time of a WSN composed of Sun SPOT wireless devices. While the
execution time of our DroidWSN model is slower, we assert that our design is more
simple and flexible than that of our comparison study. We conclude that this benefit and
the factors of JNFC cost (it is open source), the quality and quantity
of Android smartphone sensors, and imminent Android smartphone support for NFC
P2P, combine to make JNFC and the Android AVD a platform for NFC and WSN research.
Our study also emphasizes the need for Google to create Android NFC P2P
and sensor emulation APIs.

More Related Content

What's hot

Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsQian JIN
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics123seminarsonly
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 
IoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspectiveIoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspectiveSamuel Dratwa
 
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...Irissolution
 
Internet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_KumarInternet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_Kumarpradeep kumar
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
IoT (Internet of Things) Smart City Architecture
IoT (Internet of Things) Smart City ArchitectureIoT (Internet of Things) Smart City Architecture
IoT (Internet of Things) Smart City ArchitectureAlex G. Lee, Ph.D. Esq. CLP
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applicationstheijes
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 

What's hot (20)

Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
IoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspectiveIoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspective
 
Iot m2m
Iot m2mIot m2m
Iot m2m
 
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
 
Internet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_KumarInternet of things by Mr.Pradeep_Kumar
Internet of things by Mr.Pradeep_Kumar
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
IoT (Internet of Things) Smart City Architecture
IoT (Internet of Things) Smart City ArchitectureIoT (Internet of Things) Smart City Architecture
IoT (Internet of Things) Smart City Architecture
 
Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
A Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and ApplicationsA Survey on Mobile Commerce Security Issues and Applications
A Survey on Mobile Commerce Security Issues and Applications
 
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESTHE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGES
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 

Viewers also liked

20150705 Ma. Dolor Y. Escarpe CV
20150705 Ma. Dolor Y. Escarpe CV20150705 Ma. Dolor Y. Escarpe CV
20150705 Ma. Dolor Y. Escarpe CVMa.Dolor Escarpe
 
여기요 App ppt 2016.11 법인 설립
여기요 App ppt 2016.11 법인 설립여기요 App ppt 2016.11 법인 설립
여기요 App ppt 2016.11 법인 설립park jun hee
 
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B Singh
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B SinghEDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B Singh
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B SinghEduexcellence
 
Identidad Universitaria UAS
Identidad Universitaria UASIdentidad Universitaria UAS
Identidad Universitaria UASAlberto Castro
 
Penurunan Permukaan Tanah MPKT B
Penurunan Permukaan Tanah MPKT BPenurunan Permukaan Tanah MPKT B
Penurunan Permukaan Tanah MPKT BShafira Rahmani
 
PROFESIONES Y OFICIOS
PROFESIONES Y OFICIOSPROFESIONES Y OFICIOS
PROFESIONES Y OFICIOSmabe84
 
Enfoque del curriculo de Educación Inicial
Enfoque del curriculo de Educación InicialEnfoque del curriculo de Educación Inicial
Enfoque del curriculo de Educación Inicialskatiuska
 
Habilidades socio-emocionales
Habilidades socio-emocionales Habilidades socio-emocionales
Habilidades socio-emocionales dguzmannovillo_94
 
Cl 2 tanggung jawab kita sebagai manajer alam hg 5
Cl 2 tanggung jawab kita sebagai manajer alam hg 5Cl 2 tanggung jawab kita sebagai manajer alam hg 5
Cl 2 tanggung jawab kita sebagai manajer alam hg 5Syamsu Rijal Efendi
 
Hubungan antar manusia
Hubungan antar manusiaHubungan antar manusia
Hubungan antar manusiaanoovee
 
사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi
사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi
사물인터넷(IoT)와 연결의 진화-최형욱 Hugh ChoiHugh Choi 최형욱
 
Global pcb industry report, 2015 2020
Global pcb industry report, 2015 2020Global pcb industry report, 2015 2020
Global pcb industry report, 2015 2020ResearchInChina
 
Membangun Jejaring Kerja Efektif
Membangun Jejaring Kerja EfektifMembangun Jejaring Kerja Efektif
Membangun Jejaring Kerja EfektifTri Widodo W. UTOMO
 

Viewers also liked (15)

20150705 Ma. Dolor Y. Escarpe CV
20150705 Ma. Dolor Y. Escarpe CV20150705 Ma. Dolor Y. Escarpe CV
20150705 Ma. Dolor Y. Escarpe CV
 
여기요 App ppt 2016.11 법인 설립
여기요 App ppt 2016.11 법인 설립여기요 App ppt 2016.11 법인 설립
여기요 App ppt 2016.11 법인 설립
 
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B Singh
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B SinghEDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B Singh
EDUCARNIVAL 2016 at IIT DELHI - Presentation by Dr B Singh
 
Identidad Universitaria UAS
Identidad Universitaria UASIdentidad Universitaria UAS
Identidad Universitaria UAS
 
Penurunan Permukaan Tanah MPKT B
Penurunan Permukaan Tanah MPKT BPenurunan Permukaan Tanah MPKT B
Penurunan Permukaan Tanah MPKT B
 
Pola hubungan
Pola hubunganPola hubungan
Pola hubungan
 
PROFESIONES Y OFICIOS
PROFESIONES Y OFICIOSPROFESIONES Y OFICIOS
PROFESIONES Y OFICIOS
 
Enfoque del curriculo de Educación Inicial
Enfoque del curriculo de Educación InicialEnfoque del curriculo de Educación Inicial
Enfoque del curriculo de Educación Inicial
 
Habilidades socio-emocionales
Habilidades socio-emocionales Habilidades socio-emocionales
Habilidades socio-emocionales
 
Cl 2 tanggung jawab kita sebagai manajer alam hg 5
Cl 2 tanggung jawab kita sebagai manajer alam hg 5Cl 2 tanggung jawab kita sebagai manajer alam hg 5
Cl 2 tanggung jawab kita sebagai manajer alam hg 5
 
Hubungan antar manusia
Hubungan antar manusiaHubungan antar manusia
Hubungan antar manusia
 
사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi
사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi
사물인터넷(IoT)와 연결의 진화-최형욱 Hugh Choi
 
Dislalia
DislaliaDislalia
Dislalia
 
Global pcb industry report, 2015 2020
Global pcb industry report, 2015 2020Global pcb industry report, 2015 2020
Global pcb industry report, 2015 2020
 
Membangun Jejaring Kerja Efektif
Membangun Jejaring Kerja EfektifMembangun Jejaring Kerja Efektif
Membangun Jejaring Kerja Efektif
 

Similar to Android titles adrit solutions

Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsVijay Karan
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsVijay Karan
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...pharmaindexing
 
seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxPrasannaKumarpanda2
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET Journal
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection BotIRJET Journal
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...John Britto
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...AM Publications
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...IJECEIAES
 

Similar to Android titles adrit solutions (20)

Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
 
seminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptxseminarpptfogcomp-170420185314.pptx
seminarpptfogcomp-170420185314.pptx
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Object Detection Bot
Object Detection BotObject Detection Bot
Object Detection Bot
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
A PRIVACY PROTECTION SCHEME TO TRANSMIT MEDICAL DATA FROM WEARABLE DEVICES TO...
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
I018145157
I018145157I018145157
I018145157
 
Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...Biometric Identification and Authentication Providence using Fingerprint for ...
Biometric Identification and Authentication Providence using Fingerprint for ...
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

Android titles adrit solutions

  • 1. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com ADRIT SOLUTIONS Ph: 7676768124 ; 9886878569 Email: adritsolutions@gmail.com ANDROID APPLICATIONS IEEE TITLES - 2016-17 1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World Constraints Abstract: According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services (LBSs) have been launched. Since location information may reveal private information, preserving location privacy has become a significant issue. Previous studies proposed methods to preserve a users' privacy; however, most of them do not take physical constraints into consideration. In this paper, we focus on such constraints and propose a location privacy preservation method that can be applicable to a real environment. In particular, our method anonymizes the user's location by generating dummies which we simulate to behave like real human. It also considers traceability of the user's locations to quickly recover from an accidental reveal of the user's location. We conduct an experiment using five users' real GPS trajectories and compared our method with previous studies. The results show that our method ensures to anonymize the user's location within a pre- determined range. It also avoids fixing the relative positions of the user and dummies, which may give a hint for an LBS provider to identify the real user. In addition, we conducted a user experiment with 22 participants to evaluate the robustness of our method against humans. We asked participants to observe movements of a user and dummies and try to and the real user. As a result, we conformed that our method can anonymize the users' locations even against human's observation. 2. IEEE 2016: SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones
  • 2. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: 2D barcodes have enjoyed a significant penetration rate in mobile applications. This is largely due to the extremely low barrier to adoption—almost every camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive mobile applications including mobile payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. Due to the visual nature, 2D barcodes are subject to eavesdropping when they are displayed on the smartphone screens. On the other hand, the fundamental design principles of 2D barcodes make it difficult to add security features. In this paper, we propose SBVLC—a secure system for barcode-based visible light communication (VLC) between smartphones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop three secure data exchange schemes that encode information in barcode streams. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and contactless payment. SBVLC is evaluated through extensive experiments on both Android and iOS smartphones. 3. IEEE 2016: Mobile attendance using Near Field Communication and One-Time Password
  • 3. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: This paper introduces a Near Field Communication (NFC) supported College M-Attendance system for University Students. Near Field Communication (NFC) is one of the latest technologies in radio communications and being a subset of RFID technology, it is growing at an enormous pace. NFC technology provides the fastest way to communicate between two devices and it happens within a fraction of a second. It has several applications in Mobile Communications and transactions. An NFC- supported College M-Attendance system for University Students is discussed as one potential use of this technology. The proposed framework replaces manual roll calls and hence, making it resilient to forgery. It gives parents and professors information about the students' attendance. The marking of attendance is quick, unsupervised, and makes use of a One Time Password (OTP) to enhance the security of the system and takes away the possibility of proxy attendance. This paper discusses NFC as a technology that is more secure and convenient than the prevalent technology of Bluetooth, and also elaborates on the proposed framework of the M- Attendance system that makes use of this advantage that NFC has over other technologies. 4. IEEE 2016: Context-Aware Mobile Cloud Computing and Its Challenges Abstract: Cloud computing is gaining popularity due to virtually unlimited resources, low capital cost, ease of adoption, flexible resource provisioning, and high scalability. Considering these benefits, researchers envision the usage of cloud computing for mobile devices to overcome the ever-increasing computational and energy demands of smartphone applications. However, this requires specialized context-ware application development models that can facilitate the development of cloud-enabled applications capable of making context-aware computation offloading decisions. This article provides an overview of mobile cloud computing technology, focusing on its context-awareness aspects and challenges. 5. IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
  • 4. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Location-based services are quickly becoming immensely popular. In addition to services based on users' current location, many potential services rely on users' location history, or their spatial-temporal provenance. Malicious users may lie about their spatial-temporal provenance without a carefully designed security system for users to prove their past locations. In this paper, we present the Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad- hoc mobile users generating location proofs for each other in a distributed setting. However, it can easily accommodate trusted mobile users and wireless access points. STAMP ensures the integrity and non-transferability of the location proofs and protects users' privacy. A semi-trusted Certification Authority is used to distribute cryptographic keys as well as guard users against collusion by a light-weight entropy- based trust evaluation approach. Our prototype implementation on the Android platform shows that STAMP is low-cost in terms of computational and storage resources. Extensive simulation experiments show that our entropy-based trust model is able to achieve high collusion detection accuracy. 6. IEEE 2016: PRISM: PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
  • 5. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: In a profile matchmaking application of mobile social networks, users need to reveal their interests to each other in order to find the common interests. A malicious user may harm a user by knowing his personal information. Therefore, mutual interests need to be found in a privacy preserving manner. In this paper, we propose an efficient privacy protection and interests sharing protocol referred to as PRivacy-aware Interest Sharing and Matching (PRISM). PRISM enables users to discover mutual interests without revealing their interests. Unlike existing approaches, PRISM does not require revealing the interests to a trusted server. Moreover, the protocol considers attacking scenarios that have not been addressed previously and provides an efficient solution. The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM against both passive and active attacks. Through implementation, we also present a detailed analysis of the performance of PRISM and compare it with existing approaches. The results show the effectiveness of PRISM without any significant performance degradation. 7. IEEE 2015: Just-in-Time Code Offloading for Wearable Computing
  • 6. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Wearable computing becomes an emerging computing paradigm for various recently developed wearable devices, such as Google Glass and the Samsung Galaxy Smart watch, which have significantly changed our daily life with new functions. To magnify the applications on wearable devices with limited computational capability, storage, and battery capacity, in this paper, we propose a novel three-layer architecture consisting of wearable devices, mobile devices, and a remote cloud for code offloading. In particular, we offload a portion of computation tasks from wearable devices to local mobile devices or remote cloud such that even applications with a heavy computation load can still be upheld on wearable devices. Furthermore, considering the special characteristics and the requirements of wearable devices, we investigate a code offloading strategy with a novel just-in-time objective, i.e., maximizing the number of tasks that should be executed on wearable devices with guaranteed delay requirements. Because of the NP-hardness of this problem as we prove, we propose a fast heuristic algorithm based on the genetic algorithm to solve it. Finally, extensive simulations are conducted to show that our proposed algorithm significantly outperforms the other three offloading strategies. 8. IEEE 2015: Energy Cost Models of Smartphones for Task Offloading to the Cloud
  • 7. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Task offloading from smartphones to the cloud is a promising strategy to enhance the computing capability of smartphones and prolong their battery life. However, task offloading introduces a communication cost for those devices. Therefore, the consideration of the communication cost is crucial for the effectiveness of task offloading. To make task offloading beneficial, one of the challenges is to estimate the energy consumed in communication activities of task offloading. Accurate energy estimation models will enable these devices to make the right decisions as to whether or not to perform task offloading, based on the energy cost of the communication activities. Simply put, if the offloading process consumes less energy than processing the task on the device itself, then the task is offloaded to the cloud. To design an energy-aware offloading strategy, we develop energy models of the WLAN, third-generation, and fourth-generation interfaces of smartphones. These models make smartphone scapable of accurately estimating the energy cost of task offloading. We validate the models by conducting an extensive set of experiments on five smartphones from different vendors. The experimental results show that our estimation models accurately estimate the energy required to offload tasks. 9. IEEE 2015: Context-Based Access Control Systems for Mobile Devices
  • 8. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context- based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an access control mechanism. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the Android operating system so that context- based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection. 10. IEEE 2015: Avatar: Mobile Distributed Computing in the Cloud
  • 9. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Avatar is a system that leverages cloud resources to support fast, scalable, reliable, and energy efficient distributed computing over mobile devices. An avatar is a per-user software entity in the cloud that runs apps on behalf of the user's mobile devices. The avatars are instantiated as virtual machines in the cloud that run the same operating system with the mobile devices. In this way, avatars provide resource isolation and execute unmodified app components, which simplifies technology adoption. Avatar apps execute over distributed and synchronized (mobile device, avatar) pairs to achieve a global goal. The three main challenges that must be overcome by the Avatar system are: creating a high-level programming model and a middleware that enable effective execution of distributed applications on a combination of mobile devices and avatars, re-designing the cloud architecture and protocols to support billions of mobile users and mobile apps with very different characteristics from the current cloud work loads, and explore new approaches that balance privacy guarantees with app efficiency/usability. We have built a basic Avatar prototype on Android devices and Android x86 virtual machines. An application that searches for a lost child by analyzing the photos taken by people at a crowded public event runs on top of this prototype. 11.IEEE 2015: Developing an efficient digital image watermarking for smartphones
  • 10. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: In recent years, Smartphone usage has been increasing rapidly to the point where it surpassed all other electronic devices. Multimedia sharing and Image/Video capturing are amongst the most utilized functionalities of smartphones. Smartphones and Internet availability made the capture, transmission and storage of digital data very easy and convenient. The simplicity, connectivity, and strong capabilities of such devices make it very hard to protect the privacy and Intellectual Property (IP) of digital multimedia. While all types of digital multimedia are at risk, digital images are severely affected. Editing and converting digital images can be done quite easily, and hence protecting them becomes even harder. Digital image watermarking is a technique used to authenticate and protect the IP of digital images. In this paper we propose an efficient and flexible digital watermarking system that runs on Android devices. The system uses RAW images (a feature of the most recent Android software, called Lollipop) to embed a watermark at an early stage before any modification and conversion of the image. The system incorporates public-key cryptography for increased protection. A simple and robust water marking technique is utilized for efficiency. Other watermarking techniques are offered for flexibility. Finally, the system uses the inherent features of the Android operating system to run in parallel and be available to other applications. 12.IEEE 2015: Sesame: a secure and convenient mobile solution for passwords
  • 11. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Passwords are the main and most common method of remote authentication. However, they have their own frustrating challenges. Users tend to forget passwords that are chosen to be hard to guess .Password managers are an approach to keeping our passwords safe. However, they mainly rely on one master password to secure all of our passwords. If this master password is compromised then all other passwords can be recovered. In this work, we introduce Sesame: a secure yet convenient mobile-based, voice- activated password manager. It combines all different methods of user authentication to create a more robust digital vault for personal data. Each password is encrypted with a new fresh key on the user's mobile device for maximum security. The keys are stored in our servers in a protected format. The user has the option of backing up the encrypted passwords in any cloud service. To view a password, the user only needs to utter the name of a web service, and speaker and speech recognition are applied for authentication. Only the key for that service is sent to the mobile application and the password is decrypted and displayed. The biggest advantage of Sesame is that the user need not assume any trust to neither our servers nor any cloud storage. Also, there is no need to enter a master password every time since speaker recognition is used. However, as an alternative to voice, users can view their passwords using a master password in case voice is not available. We provide a brief analysis of the security of our solution that has been implemented on Android platform and freely available on Google Play. Sesame is an ideal and practical solution for mobile password managers. 13.IEEE 2014: NFC based applications for visually impaired people - A review
  • 12. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Recent technological developments provide technical assistance that enables supporting people with visual disabilities in their everyday tasks and improve their quality of life. Considering that about 90% of the world visually impaired people live in developing countries, particularly in the local context, in Saudi Arabia, there is a lack of assistive tools and adapted environment supporting people with visual disabilities. To overcome this problem, a wide variety of relatively inexpensive applications adapt Near Field Communications (NFC) tagging technology in the development of assistive tools for people with visual disabilities. In this article, we will systematically review the current adaptation of NFC technology for visually disabled people and introduce NFC practical applications to help them overcome challenging tasks that they may encounter every day. 14.IEEE 2014: NFC based secure mobile healthcare system
  • 13. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: With the recent increase in usage of mobile devices especially in developing countries, they can be used for an efficient healthcare management. In this work, we have proposed a novel architecture for improving healthcare system with the help of Android based mobile devices with NFC [1] and Bluetooth interfaces, smartcard technology on tamper resistant secure element (SE) for storing credentials and secure data, and a Health Secure service on a hybrid cloud for security and health record management. The main contribution of this paper is proposal of applications for i) Secure Medical Tags for reducing medical errors and ii) Secure Health card for storing Electronic Health Record (EHR) based on Secure NFC Tags, mobile device using NFC P2P Mode or Card Emulation Mode. We have also briefly mentioned a basic security framework requirement for the applications. Since NFC NDEF format is prone to security attacks [2], we have utilized low level APIs on Android based mobile devices, to securely access NFC tags such as MIFARE Classic tags with NFC-A (ISO 1443-3A) properties. Simple touch of NFC enabled mobile devices can benefit both the patient as well as the medical doctors by providing a robust and secure health flow. It can also provide portability of devices and usability for health management in emergency situation, overpopulated hospitals and remote locations. 15.IEEE 2014: Anti-theft application for android based devices
  • 14. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: This paper presents a technique to improve anti- theft for android based mobile phones by using different services like MMS instead of SMS. As the use of smartphones, tablets, phablets based on android operating system is increasing, many scenarios related with anti-theft have already been proposed and many software based on anti-theft have also been developed, but most of these software are not freely available and it's difficult to identify the thief by using these software's e.g. GPS Tracking. We put forward a new scheme, which enhances the present scenario, based on new technologies like Multimedia Messages. The scenario proposed in this work is totally dependent on the hardware of your smartphone like camera (front & back) and support for multimedia messages. Once this software is installed, it will work in the background, stores the current SIM number in a variable and keeps checking continuously for SIM change, whenever SIM gets changed from mobile, it will take snapshots and record a video in the background i.e., without taking user permission and then it will send an MMS, and number of snap shots, to an alternate mobile number and an email id, which was provided during installation. The enviable advantage of this software is that it is very easy to configure and it keeps running in the background without interrupting the user. To some extent it helps the owner to identify the thief. 16.IEEE 2014: Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
  • 15. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current (or preferred) locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to reveal their current (or preferred) locations to the service provider or to other, possibly untrusted, users. In this paper, we propose privacy-preserving algorithms for determining an optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifying privacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment, we implement and test their execution efficiency on Nokia smartphones. By means of a targeted user-study, we attempt to get an insight into the privacy-awareness of users in location-based services and the usability of the proposed solutions. 17. IEEE 2014: How Long to Wait? Predicting Bus Arrival Time With Mobile Phone Based Participatory Sensing
  • 16. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: The bus arrival time is primary information to most city transport travelers. Excessively long waiting time at bus stops often discourages the travelers and makes them reluctant to take buses. In this paper, we present a bus arrival time prediction system based on bus passengers' participatory sensing. With commodity mobile phones, the bus passengers' surrounding environmental context is effectively collected and utilized to estimate the bus traveling routes and predict bus arrival time at various bus stops. The proposed system solely relies on the collaborative effort of the participating users and is independent from the bus operating companies, so it can be easily adopted to support universal bus service systems without requesting support from particular bus operating companies. Instead of referring to GPS-enabled location information, we resort to more generally available and energy efficient sensing resources, including cell tower signals, movement statuses, audio recordings, etc., which bring less burden to the participatory party and encourage their participation. We develop a prototype system with different types of Android-based mobile phones and comprehensively experiment with the NTU campus shuttle buses as well as Singapore public buses over a 7-week period. The evaluation results suggest that the proposed system achieves outstanding prediction accuracy compared with those bus operator initiated and GPS supported solutions. We further adopt our system and conduct quick trial experiments with London bus system for 4 days, which suggests the easy deployment of our system and promising system performance across cities. At the same time, the proposed solution is more generally available and energy friendly. 18.IEEE 2013: SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
  • 17. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs),mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m- Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy- preserving opportunistic computingframework, called SPOC, for m- Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient user-centric privacy access control in SPOC framework, which is based on an attribute-based access control and a new privacy-preserving scalar product computation (PPSPC) technique, and allows a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis shows that the proposed SPOC framework can efficiently achieve user-centric privacy access control in m-Healthcare emergency. In addition, performance evaluations via extensive simulations demonstrate the SPOC's effectiveness in term of providing high-reliable-PHI process and transmission while minimizing the privacy disclosure during m-Healthcare emergency. 19.IEEE 2013: Wireless sensor networks using Android Virtual Devices and Near Field Communication peer-to-peer emulation
  • 18. Contact Us: #42/5, 1st Floor, 18th Cross, 21st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com Abstract: Several new Android smartphones support Near Field Communication (NFC). The Android SDK provides an NFC API that can be used to develop NFC applications that conduct peer-to-peer (P2P) data exchange. The Android emulator does not support P2P communication between instances of the Android Virtual Device (AVD). In addition to this constraint, P2P experimentation on actual smartphones is difficult due to limited NFC support. To fill the gap created by this minimal support, we propose the Java Mail NFC API (JNFC). JNFC uses the Java Mail API to emulate the functionality of the Android NFC P2P API. To evaluate the performance of JNFC, we created the DroidWSN Wireless Sensor Network (WSN) model and implemented it as an Android application. We design and conduct an experiment for our DroidWSN model to measure the execution time of our Android application WSN on AVDs. We compare our simulation results against those from a similar experiment that measured the execution time of a WSN composed of Sun SPOT wireless devices. While the execution time of our DroidWSN model is slower, we assert that our design is more simple and flexible than that of our comparison study. We conclude that this benefit and the factors of JNFC cost (it is open source), the quality and quantity of Android smartphone sensors, and imminent Android smartphone support for NFC P2P, combine to make JNFC and the Android AVD a platform for NFC and WSN research. Our study also emphasizes the need for Google to create Android NFC P2P and sensor emulation APIs.