SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1832
Abstract—Environmental pollution nowadays is a major
aspect to be considered. Pollution has to be avoided and
there are several ways to control it. In this paper, we propose
an innovative software application, via which a user can
send an alert text message and location details to the
garbage/waste management department in the campus and
also post the same details on the dedicated web server. This
information essentially helps the respective department to
take care of garbage present in the campus.
Key words: Android, 3G, GPS, Location Manager
I. INTRODUCTION
Open Handset Alliance (OHA) led by Google, Inc
developed Android and it is an open mobile platform. It has
several layers: the Linux kernel, native libraries, the Dalvik
virtual machine (VM), and an application framework. Basic
operating system services and hardware abstraction for the
upper software stacks is provided by Linux Kernel layer.
Miscellaneous functionalities of web browsing, multimedia
data processing, database access, and GPS reception
optimized for a resource-limited hardware environment are
supported by native libraries. The Dalvik VM is Register
based and it runs Java code with low memory demand.
Component-based programming framework is provided by
Android at the top of the layers so that users can easily build
their own applications.
A new and reusable application building blocks
(example: activity); broadcast intent receiver, service, and
content provider etc are used to build android applications.
After an application is written, it is deployed as .apk file
(Android package file). .apk file contains codes, resources,
and a special XML file called the Android Manifest file.
This contains basic information about an application such as
the package name, component descriptions, and permission
declarations. Garbage managing system adopts a mobile cell
phone network. Based on the experiences and findings of
the field experiments, a new managing system is proposed
here. This system is Adaptive for mobility of user and it is
Low cost. This proposed system adopts 3G communication
function to collects user’s location using GPS (Global
positioning system).
In addition Android AsyncTask methodology can
be used to upload images to remote web server on android.
Telephony manager for identifying the information about
the Android mobile terminal which each user holds and the
server which stores user’s information is utilized in this
system. The Collected information in this system contains
the position and time information of android mobile
terminal. When the user calls the garbage managing
department, information is sent as SMS and the same is
posted on server with location details. With this system it is
possible for garbage managing department to Track the and
clear the waste from that location.
II. ANDROID ARCHITECTURE
Android is a software stack for mobile devices with an
operating system, middleware and key applications. Its SDK
provides tools and APIs necessary to begin developing
applications on the Android platform using the Java
programming language.
APPLICATIONS
APPLICATION FRAMEWORK
LIBRARIES
ANDROID
RUNTIME
LINUX-KERNEL
Fig. 1: Android Architecture
Android relies on Linux version 2.6 for core system
services. The kernel also acts as an abstraction layer
between the hardware and the rest of the software stack.
Every Android application runs in its own process, with its
own instance of the Dalvik Virtual machine.
The VM is register-based, and runs classes
compiled by a Java language complier that have transformed
into the .dex format by the included “dx” tool. Android uses
SQLite which is a powerful relational database engine
available to all applications. Rich development environment
includes a device emulator, tools for debugging, memory
and performance profiling, and a plugin for the Eclipse IDE.
III. EXISTING SYSTEM AND ITS DRAWBACKS
In the existing system the individual makes a call and
verbally gives information about the amount of garbage and
about the location. The department executives may not
know the user’s current location .There is a high probability
of data and loss of resources when the authorized person
fails to find the location.
IV. PROPOSED SYSTEM
Different functions have been implemented for the new
generation managing system. Android mobile terminal is
connected to high speed 3G network for effective data
transfer. Monitoring can be made at a very high speed
without any distortion in the network. Global Positioning
System, shortly known as GPS System, is the system that
enables you to know the location of the victim. It consists of
minuscule chip which is attached to the object to be tracked.
This chip will give out signals which are tracked by the
satellite which sends data to the earth giving the exact
location of the user. GPS tracking has come to be accepted
on a global scale. Due to the usage of 3G network the data is
retrieved and stored in the server at a very high speed. When
the user calls Garbage Management department, this
software starts its execution in the backend as a service. It
sends message in SMS format to the department informing
about the garbage presence along with location (latitude and
longitude) values. This information is also posted on
Garbage Management using Android Smartphone
Shivu Gururaj1
S.K Pushpa2
Vishaka Yadav3
Dr. Rajasimha A Makaram4
1
Research Scholar 2
Associate Professor 3
Assistant Professor 4
H. O. D.
2, 4
Dept. of ISE 3
Dept. of CSE
1
O.F.S.S., Bangalore 2, 3, 4
BMSIT, Bangalore, Karnataka
1
shivu.g.raj@gmail.com
Garbage Management Using Android Smartphone
(IJSRD/Vol. 1/Issue 9/2013/0037)
All rights reserved by www.ijsrd.com 1833
dedicated web server. This helps the department to keep a
track of all the garbage data, location details and also eases
the accessibility at any point of time.
A. Features of the Proposed System:
The garbage managing committee can easily get the
accurate information. It also brings the current location of
garbage located. It is possible to track the exact position
with the help of Google Maps; i.e with latitude and
longitude values it is possible to locate any position. In
future images can be uploaded using AsyncTask
methodology.
Fig. 2: Image posting architecture
V. ANALYSIS
As we are using Android as an illustrative example, we
begin by describing several attack vectors possible on that
platform. In the course of paper, we demonstrate how the
security architecture addresses the security problems. First,
let’s briefly explain the basic Android security concepts.
A. Android Security
Android is a Linux platform for mobile phones with a Java
middleware on top of the OS. Android applications are
usually Java-based, although native code can also be
accessed through the Native Development Kit (NDK).
Android has two parts of security enforcement. First,
applications run as Linux users and thus are separated from
each other. A security hole in one application does not affect
other applications. However, there is also a concept of inter-
process communication (IPC) between different
applications, or between the Android components of the
applications such as activities and services. The Java-based
Android middleware implements a reference monitor to
mediate access to application components based upon
permission labels defined for the component to be accessed.
Any application requires an appropriate permission label
before it can access a component. A number of features
further refine Android’s security model. One example is the
concept of shared user IDs, i.e., different applications can
share the same user ID if they are signed by the same
developer certificate. Another refinement is protected APIs:
Several security-critical system resources can be accessed
directly rather than using components. WS-Security (Web
Services Security, short WSS) is a flexible and feature-rich
extension to SOAP to apply security to web services. It is a
member of the WS family of web service specifications and
was published by OASIS. This protocol specifies how
integrity and confidentiality can be enforced on messages
and allows the communication of various security token
formats, such as SAML, Kerberos, and X.509. Its main
focus is the use of XML Signature and XML Encryption to
provide end-to-end security.
B. SOAP
SOAP originally defined as Simple Object Access Protocol.
It is a protocol specification for exchanging structured
information in the implementation of Web Services in
computer networks. It relies on Extensible Mark-up
Language (XML) for its message format, and usually relies
on other Application Layer protocols, most notably
Hypertext Transfer Protocol (HTTP) and Simple Mail
Transfer Protocol (SMTP), for message negotiation and
transmission. SOAP can form the foundation layer of web
services protocol stack, providing a basic messaging
framework upon which web services can be built.
VI. IMPLEMENTATION
A. Hardware and Software:
The Android mobile terminal is Google Dev Phone 1 and 2.
The operating system for the terminal is Android 2.3(Ginger
bread). We develop mobile ad hoc network software using
Java programming language and SDK for Android 2.3.
B. Implementation functions:
So far, we have implemented communication software to
construct a 3G network by GPS for this system. We took
care of security in communication between each pair of
mobile terminals using WS-Security. When a mobile
terminal communicates with another mobile terminal, it is
necessary to establish pairing of such two mobile terminals
before their communication occurs. When the user mobile
terminal calls a garbage management department, an alert
message is sent to the same phone and using 3G network
messages are posted on the remote server for later access.
VII. RESULTS
This new generation garbage management is software for
phone. When the user makes a call to garbage managing
department, the software starts executing loop wise. Once
there is an outgoing call, the function “phone State Listener”
determines if the call made to that number. Once satisfied,
the loop executes to send the alert messages with location
details. Flow chart of the software execution is shown in
figure 2.
The following snapshots in the figure 4 show the
software execution on an actual android phone with toast
messages. Toast message is a notification which ensures the
successful execution of respective loops. In the snapshot
garbage managing committee/BMSIT is the department to
which the user has called to inform.
Garbage Management Using Android Smartphone
(IJSRD/Vol. 1/Issue 9/2013/0037)
All rights reserved by www.ijsrd.com 1834
Fig 3: Flowchart of software execution
1) Toast message “222Local Call-+919620253161”
indicates that the function phone State Listener has
identified the number for further execution.
2) Toast message “message sending” indicates that the
message and location details (latitude and longitude) are
sent to department.
3) Toast message “posted 222-” ensures that the
information has been posted on to the web server.
Fig. 4: Snapshots of Execution
VIII. CONCLUSION
Considering the environment pollution, in this paper, we
have implemented the new generation garbage management
system and system features to meet the requirements. Using
this system it is possible for the user to inform the respective
department. More importantly it is not necessary for the
department to receive the call, the user just has to press the
call button and the software starts its execution. Using
telephony manager technique, the proposed new generation
garbage management system can adapt to various mobility
of user by adjusting network.
REFERENCES
[1] http://developer.android.com/
[2] http://market.android .com
[3] http://codegoogle.com/android/add_ons/google-
apis/maps-api-signup.html
[4] Google maps: <maps.google.co.in/>
http://maps.google.co.ion/intl/en/help/maps/streetvie
w http://en.wikipedia.org/wiki/google maps
[5] http://www.androidzoom.com/android
applications/india+maps.
[6] http://en.wikipedia.org/wiki/android_market
[7] http://android_codesexampleblogspot.in/2011/03
/make-phone-call-using android-code-in.html
[8] http://androidworkz.com/2011/02/04custom-menu-
bar-tabs-how-to-hook-the-menu-button-to-drawhide-
a-acustom-tab-bar.
[9] http://code.google.com/p/android-ui-utils.
[10] http://mobiforge.com/developing/story/using-google-
maps-android.
[11] Mr.I.Earnest Paul, Mrs. Swathi pusuluri, “Hospital
Information Service on Android Mobile Devices
“International Journal of Engineering Research and
Technology, ISSN:2278-0181,Vol.1 Issue 3, may
2012.

More Related Content

What's hot

Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
IRJET- Survey on Virtual Assistants
IRJET-  	  Survey on Virtual AssistantsIRJET-  	  Survey on Virtual Assistants
IRJET- Survey on Virtual AssistantsIRJET Journal
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...IJORCS
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Self-employed
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET Journal
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 

What's hot (18)

Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
IRJET- Survey on Virtual Assistants
IRJET-  	  Survey on Virtual AssistantsIRJET-  	  Survey on Virtual Assistants
IRJET- Survey on Virtual Assistants
 
vijay
vijayvijay
vijay
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...A Data Hiding Techniques Based on Length of English Text using DES and Attack...
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
 
395 401
395 401395 401
395 401
 
Sparsh 22 oct
Sparsh 22 octSparsh 22 oct
Sparsh 22 oct
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]
 
Guru_poster
Guru_posterGuru_poster
Guru_poster
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 

Viewers also liked

Viewers also liked (6)

e-WASTE
e-WASTEe-WASTE
e-WASTE
 
E Waste And Management
E Waste And ManagementE Waste And Management
E Waste And Management
 
Waste Management
Waste ManagementWaste Management
Waste Management
 
Waste Management
Waste ManagementWaste Management
Waste Management
 
E waste management
E waste managementE waste management
E waste management
 
Solid waste management ppt
Solid waste management pptSolid waste management ppt
Solid waste management ppt
 

Similar to Garbage Management using Android Smartphone

Android 1-intro n architecture
Android 1-intro n architectureAndroid 1-intro n architecture
Android 1-intro n architectureDilip Singh
 
Google android white paper
Google android white paperGoogle android white paper
Google android white paperSravan Reddy
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsijmnct
 
Know all about android development
Know all about android developmentKnow all about android development
Know all about android developmentDeepika Chaudhary
 
Android studio feature
Android studio featureAndroid studio feature
Android studio featurexvier3453
 
THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...
THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...
THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...Ibrahim Özgön
 
01 what is android
01 what is android01 what is android
01 what is androidC.o. Nieto
 
Mobile application security
Mobile application securityMobile application security
Mobile application securityShubhneet Goel
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, androidJehad2012
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
Optimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAOptimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAVivek Raj Agarwal
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to AndroidJindal Gohil
 

Similar to Garbage Management using Android Smartphone (20)

Android
AndroidAndroid
Android
 
Android 1-intro n architecture
Android 1-intro n architectureAndroid 1-intro n architecture
Android 1-intro n architecture
 
Google android white paper
Google android white paperGoogle android white paper
Google android white paper
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android apps
 
Know all about android development
Know all about android developmentKnow all about android development
Know all about android development
 
Android studio feature
Android studio featureAndroid studio feature
Android studio feature
 
THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...
THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...
THE DESIGN IN MOBILE AND WEB PLATFORM OF THE LOCATION IDENTIFICATION APPLICAT...
 
01 what is android
01 what is android01 what is android
01 what is android
 
Mobile application security
Mobile application securityMobile application security
Mobile application security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, android
 
Cc4201519521
Cc4201519521Cc4201519521
Cc4201519521
 
Android security
Android securityAndroid security
Android security
 
Android security
Android securityAndroid security
Android security
 
Android architecture
Android architectureAndroid architecture
Android architecture
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Optimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAOptimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CA
 
Android Introduction by Kajal
Android Introduction by KajalAndroid Introduction by Kajal
Android Introduction by Kajal
 
safe journey
safe journeysafe journey
safe journey
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Android
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Garbage Management using Android Smartphone

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1832 Abstract—Environmental pollution nowadays is a major aspect to be considered. Pollution has to be avoided and there are several ways to control it. In this paper, we propose an innovative software application, via which a user can send an alert text message and location details to the garbage/waste management department in the campus and also post the same details on the dedicated web server. This information essentially helps the respective department to take care of garbage present in the campus. Key words: Android, 3G, GPS, Location Manager I. INTRODUCTION Open Handset Alliance (OHA) led by Google, Inc developed Android and it is an open mobile platform. It has several layers: the Linux kernel, native libraries, the Dalvik virtual machine (VM), and an application framework. Basic operating system services and hardware abstraction for the upper software stacks is provided by Linux Kernel layer. Miscellaneous functionalities of web browsing, multimedia data processing, database access, and GPS reception optimized for a resource-limited hardware environment are supported by native libraries. The Dalvik VM is Register based and it runs Java code with low memory demand. Component-based programming framework is provided by Android at the top of the layers so that users can easily build their own applications. A new and reusable application building blocks (example: activity); broadcast intent receiver, service, and content provider etc are used to build android applications. After an application is written, it is deployed as .apk file (Android package file). .apk file contains codes, resources, and a special XML file called the Android Manifest file. This contains basic information about an application such as the package name, component descriptions, and permission declarations. Garbage managing system adopts a mobile cell phone network. Based on the experiences and findings of the field experiments, a new managing system is proposed here. This system is Adaptive for mobility of user and it is Low cost. This proposed system adopts 3G communication function to collects user’s location using GPS (Global positioning system). In addition Android AsyncTask methodology can be used to upload images to remote web server on android. Telephony manager for identifying the information about the Android mobile terminal which each user holds and the server which stores user’s information is utilized in this system. The Collected information in this system contains the position and time information of android mobile terminal. When the user calls the garbage managing department, information is sent as SMS and the same is posted on server with location details. With this system it is possible for garbage managing department to Track the and clear the waste from that location. II. ANDROID ARCHITECTURE Android is a software stack for mobile devices with an operating system, middleware and key applications. Its SDK provides tools and APIs necessary to begin developing applications on the Android platform using the Java programming language. APPLICATIONS APPLICATION FRAMEWORK LIBRARIES ANDROID RUNTIME LINUX-KERNEL Fig. 1: Android Architecture Android relies on Linux version 2.6 for core system services. The kernel also acts as an abstraction layer between the hardware and the rest of the software stack. Every Android application runs in its own process, with its own instance of the Dalvik Virtual machine. The VM is register-based, and runs classes compiled by a Java language complier that have transformed into the .dex format by the included “dx” tool. Android uses SQLite which is a powerful relational database engine available to all applications. Rich development environment includes a device emulator, tools for debugging, memory and performance profiling, and a plugin for the Eclipse IDE. III. EXISTING SYSTEM AND ITS DRAWBACKS In the existing system the individual makes a call and verbally gives information about the amount of garbage and about the location. The department executives may not know the user’s current location .There is a high probability of data and loss of resources when the authorized person fails to find the location. IV. PROPOSED SYSTEM Different functions have been implemented for the new generation managing system. Android mobile terminal is connected to high speed 3G network for effective data transfer. Monitoring can be made at a very high speed without any distortion in the network. Global Positioning System, shortly known as GPS System, is the system that enables you to know the location of the victim. It consists of minuscule chip which is attached to the object to be tracked. This chip will give out signals which are tracked by the satellite which sends data to the earth giving the exact location of the user. GPS tracking has come to be accepted on a global scale. Due to the usage of 3G network the data is retrieved and stored in the server at a very high speed. When the user calls Garbage Management department, this software starts its execution in the backend as a service. It sends message in SMS format to the department informing about the garbage presence along with location (latitude and longitude) values. This information is also posted on Garbage Management using Android Smartphone Shivu Gururaj1 S.K Pushpa2 Vishaka Yadav3 Dr. Rajasimha A Makaram4 1 Research Scholar 2 Associate Professor 3 Assistant Professor 4 H. O. D. 2, 4 Dept. of ISE 3 Dept. of CSE 1 O.F.S.S., Bangalore 2, 3, 4 BMSIT, Bangalore, Karnataka 1 shivu.g.raj@gmail.com
  • 2. Garbage Management Using Android Smartphone (IJSRD/Vol. 1/Issue 9/2013/0037) All rights reserved by www.ijsrd.com 1833 dedicated web server. This helps the department to keep a track of all the garbage data, location details and also eases the accessibility at any point of time. A. Features of the Proposed System: The garbage managing committee can easily get the accurate information. It also brings the current location of garbage located. It is possible to track the exact position with the help of Google Maps; i.e with latitude and longitude values it is possible to locate any position. In future images can be uploaded using AsyncTask methodology. Fig. 2: Image posting architecture V. ANALYSIS As we are using Android as an illustrative example, we begin by describing several attack vectors possible on that platform. In the course of paper, we demonstrate how the security architecture addresses the security problems. First, let’s briefly explain the basic Android security concepts. A. Android Security Android is a Linux platform for mobile phones with a Java middleware on top of the OS. Android applications are usually Java-based, although native code can also be accessed through the Native Development Kit (NDK). Android has two parts of security enforcement. First, applications run as Linux users and thus are separated from each other. A security hole in one application does not affect other applications. However, there is also a concept of inter- process communication (IPC) between different applications, or between the Android components of the applications such as activities and services. The Java-based Android middleware implements a reference monitor to mediate access to application components based upon permission labels defined for the component to be accessed. Any application requires an appropriate permission label before it can access a component. A number of features further refine Android’s security model. One example is the concept of shared user IDs, i.e., different applications can share the same user ID if they are signed by the same developer certificate. Another refinement is protected APIs: Several security-critical system resources can be accessed directly rather than using components. WS-Security (Web Services Security, short WSS) is a flexible and feature-rich extension to SOAP to apply security to web services. It is a member of the WS family of web service specifications and was published by OASIS. This protocol specifies how integrity and confidentiality can be enforced on messages and allows the communication of various security token formats, such as SAML, Kerberos, and X.509. Its main focus is the use of XML Signature and XML Encryption to provide end-to-end security. B. SOAP SOAP originally defined as Simple Object Access Protocol. It is a protocol specification for exchanging structured information in the implementation of Web Services in computer networks. It relies on Extensible Mark-up Language (XML) for its message format, and usually relies on other Application Layer protocols, most notably Hypertext Transfer Protocol (HTTP) and Simple Mail Transfer Protocol (SMTP), for message negotiation and transmission. SOAP can form the foundation layer of web services protocol stack, providing a basic messaging framework upon which web services can be built. VI. IMPLEMENTATION A. Hardware and Software: The Android mobile terminal is Google Dev Phone 1 and 2. The operating system for the terminal is Android 2.3(Ginger bread). We develop mobile ad hoc network software using Java programming language and SDK for Android 2.3. B. Implementation functions: So far, we have implemented communication software to construct a 3G network by GPS for this system. We took care of security in communication between each pair of mobile terminals using WS-Security. When a mobile terminal communicates with another mobile terminal, it is necessary to establish pairing of such two mobile terminals before their communication occurs. When the user mobile terminal calls a garbage management department, an alert message is sent to the same phone and using 3G network messages are posted on the remote server for later access. VII. RESULTS This new generation garbage management is software for phone. When the user makes a call to garbage managing department, the software starts executing loop wise. Once there is an outgoing call, the function “phone State Listener” determines if the call made to that number. Once satisfied, the loop executes to send the alert messages with location details. Flow chart of the software execution is shown in figure 2. The following snapshots in the figure 4 show the software execution on an actual android phone with toast messages. Toast message is a notification which ensures the successful execution of respective loops. In the snapshot garbage managing committee/BMSIT is the department to which the user has called to inform.
  • 3. Garbage Management Using Android Smartphone (IJSRD/Vol. 1/Issue 9/2013/0037) All rights reserved by www.ijsrd.com 1834 Fig 3: Flowchart of software execution 1) Toast message “222Local Call-+919620253161” indicates that the function phone State Listener has identified the number for further execution. 2) Toast message “message sending” indicates that the message and location details (latitude and longitude) are sent to department. 3) Toast message “posted 222-” ensures that the information has been posted on to the web server. Fig. 4: Snapshots of Execution VIII. CONCLUSION Considering the environment pollution, in this paper, we have implemented the new generation garbage management system and system features to meet the requirements. Using this system it is possible for the user to inform the respective department. More importantly it is not necessary for the department to receive the call, the user just has to press the call button and the software starts its execution. Using telephony manager technique, the proposed new generation garbage management system can adapt to various mobility of user by adjusting network. REFERENCES [1] http://developer.android.com/ [2] http://market.android .com [3] http://codegoogle.com/android/add_ons/google- apis/maps-api-signup.html [4] Google maps: <maps.google.co.in/> http://maps.google.co.ion/intl/en/help/maps/streetvie w http://en.wikipedia.org/wiki/google maps [5] http://www.androidzoom.com/android applications/india+maps. [6] http://en.wikipedia.org/wiki/android_market [7] http://android_codesexampleblogspot.in/2011/03 /make-phone-call-using android-code-in.html [8] http://androidworkz.com/2011/02/04custom-menu- bar-tabs-how-to-hook-the-menu-button-to-drawhide- a-acustom-tab-bar. [9] http://code.google.com/p/android-ui-utils. [10] http://mobiforge.com/developing/story/using-google- maps-android. [11] Mr.I.Earnest Paul, Mrs. Swathi pusuluri, “Hospital Information Service on Android Mobile Devices “International Journal of Engineering Research and Technology, ISSN:2278-0181,Vol.1 Issue 3, may 2012.