SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1494
Improving Employee Tracking and Monitoring System Using Advanced
Mechanism
Ashish Hole1, Tejas Bhandare2, Akshay Devkate3, Rutuja Deore4
1,2,3,4 Dept. of Computer Engineering, SKNCOE, Vadgaon, Pune-41
-----------------------------------------------------------------------***------------------------------------------------------------------------
Abstract-- Smartphones are proving very essential and
effective tools for increasing the storage capacity and
computational power. They allow end users to perform
several tasks and keeps them updated to the point. Our
proposed system “Improving Employee Tracking and
Monitoring System using Advanced Mechanism” allows to
monitor the employee’s cell phones provided by
organization. Activities such as incoming calls, outgoing
calls, missed calls, SMS history, web history, data usage,
unauthorized call lists and websites are stored on
centralized server. Manager can see and monitor all the
history by logging into centralized sever. Employee’s current
location can also be tracked by Manager through GPS. If an
employee is going outside the company premises then
manager can get alert message in SMS format. Employee’s
behavior is calculated by using number of unapproved calls
and exceeding data usage (good/bad/average/loyal). The
device provided to the employee should be android based.
The Manager can have any device. This system is very
helpful for Manager as it can find out the activities done by
employee.
Keywords: Android, GPS, Emlpoyee’s behavior.
I. INTRODUCTION
Android is operating system which supports large
number of applications in Smartphone. Android is an open
source. It allows developers to develop applications and
sale them in android market. Android operating system
proves to be powerful and most popular operating system
which makes life more comfortable and advanced for
users. Android is a mobile operating system developed by
Open Handset Alliance. Some of the features and
specifications of Android are: 1. Application framework
which enables replacement and reuse of component, 2.
Dalvik Virtual Machine: It is optimized for mobile device, 3.
Optimized Graphics: It is powered by a custom 2D graphics
library; 3D graphics based on the OpenGL ES 1.0
specification, 4. Integrated browser: It is based on the open
source web kit engine, 5. SQLite, 6. Media Support, 7. GSM
Technology, 8. Camera, GPS, compass, 9. Bluetooth,
EDGE,3G,WiFi.
Android system is based on Linux version 2.6 which
provide services like memory management, security,
network stack, driver model and process management.
Android provide SDK for development of different new
application. Android consists of four layers: 1. Linux
Kernel, 2. Libraries, a. Android Runtime, 3. Application
framework, 4. Applications.
Linux kernel is the basic layer which consists of
hardware driver which are essential for controlling and
communicating with hardware. Libraries are the next layer
which consist native libraries. Native libraries includes
surface manager, media framework, SQLite, Webkit,
OpenGL. Android runtime consist two main parts: Dalvik
Virtual Machine, Core java libraries. DVM is like a JVM
which is developed by Dan Bornstein of Google which is
used for executing application. DVM requires ‘.dex’ files
which is built from .class file at the time of compilation. D
VM allows multiple instances of virtual Machine
simultaneously which also provide security, isolation,
threading and memory management. Core java libraries
provides most of the functionalities defined in javaSE
libraries .Applications are the top layer in android
architecture where our application are gone fit.
Android consists of four main components: Service,
Activity, Content Provider, Broadcast Receiver. Services
include background process. Activity consists of GUI
screen. Content provider has database like content DB,
Bookmark DB, message DB. Broadcast receiver contains all
the information about call logs. Employee monitoring
system provides tracking of employee’s cell phone which is
in Wi-Fi.
A. Abbreviations and Acronyms
GPS- Global Positioning System, XML-Extended Markup
Language
B. Literature Survey
1) “New safety support System for children on school
route using mobile ad-hoc network” (year-2011) .This
paper was published by authors AtsushIto, Yoshaiaki
kukuda, Tomoyuki Ohta. This paper was based on domains
like mobile ad-hoc network which also lacks in Android
terminal connected in wireless LAN dynamic paring of
mobile terminal is mandatory. 2) “Track your Buddies”
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1495
(year-2013) This paper was published by authors Anjor
Jadhav, Savita Kharj, etc. The published paper has some
disadvantages like, tracking is done by fixing tags in
different location for identifying the exact position of an
buddy i.e, a friend via .Mobile. 3) ”Secure Mobile Business
Information on processing”. This paper was published by
the authors Kuntze Rieke ,Diederich, Sethmann, Mustafa,
Detken. In theyear2010. This paper is refer by us to
achieve the goal of overcoming the possibility of data loss
during the message transfer. 4. Android based remote
monitoring system (year-2012). As this paper was
published on the existing technology like 2G and 3G
network which were inefficient to handle the data
properly. This paper is taken into the base papers to
achieve the goal of data transfer without any loss of data
packets. 4 )”SAR operation based on call log and location
details using GPS and Android Smartphone”.(year-2011)
this paper does not avail the services to trace the history of
data usage of web and unauthorized calls.
C. Existing System
In existing system, mobile terminal is connected to 3G
network. Identification of the employee location is done by
fixing tags in different location. There is a communication
link to management server which is managed by 3G
network and is costly than WiFi network. In the existing
system tracking of outgoing, incoming calls and SMS is
done. Calculating employee behavior is not feasible.
D. Drawback of existing system
The Manager is not able to trace out the activities of
Employee like unauthorized call history, unauthorized web
history and unauthorized list in the mobile. The Manager
can’t get the information about Employee’s behavior. Also
alert messages are not received on Manager’s phone or
device.
E. Proposed System
In this system Managers can monitor their Employee’s
office cell phone by implementing some functions for
employee monitoring. All call logs like incoming and
outgoing calls, SMS, texts and multimedia messages can be
seen by Manager. Manager can also interrupt to monitor
their employee through GPS (i.e. Global Positioning
System). The Manager can access history of where the
employee have been and set up alerts if their employee is
going outside the organization area. Android terminal is
basically connected to WiFi network for data transfer
between two mobile terminals easily and effectively.
Tracking can be made easily without any distortion. Data is
stored and retrieved at high speed because of Wifi
network. This system has Android based cell phones for
software to be run. Employee should have Android based
cell phone while the Manager can have any mobile device,
as they are only going to receive SMS alerts. The alerts are
stored in the centralized server like call logs and
multimedia messages and the timely updates of their
employee’s location. Managers can login into centralized
server and view details of their Employee’s mobile usage
whenever needed. Employee’s behavior is calculated by
Manager using k-means clustering algorithm. AES
encryption algorithm is used to send messages securely to
mobile terminals.
F. Features of the proposed system
All day to day activities like SMS,MMS, calls, data usage,
unauthorized call/website list of Employee is tracked by
Manager. Location details are also known of Employee. If
the Employee crosses some specified area then alert
message will be sent to Manager’s mobile in a SMS format.
Manager may later login and view the details of a
particular employee by logging into the centralized server
and calculate the behavior of employee based on that.
G. Architecture of proposed system
Fig a. Architecture of Proposed System
Call Logs:
Call logs should show the details of the incoming and
outgoing calls and history from employee’s phone like
date, time and phone number. So Employee should not use
their company cell phone for personal use. If they call
unapproved number from employee list, it will be logged
onto to server and recorded.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1496
Message History:
Manager should get multimedia messages with date and
time along with message history from employee cell phone
like text messages (inbox/draft/sent).
Web Browser History:
The module should show the web browser history of an
employee and store web details on server. Server database
has list of authorized sites stored.
Data Usage:
Data usage statistics should be shown in the terms of MBs
of data. Manager can easily keep watch on data usage of
employee’s cell phone.
Unauthorized call/website list:
Manager should maintain the list of unauthorized websites
and that websites should not be accessed byemployee.
Managers can disapprove the international calls for the
employee.
Tracking by GPS:
Employee location details can be retrived by using GPS. If
employee goes outside the specified zone then notification
is sent to managers.
Employee Behavior:
With K-means algorithm employee’s behavior is
calculated. Firstly number of unapproved calls, exceeding
data usage is calculated for each employee and then K-
means algorithm is applied on these parameters to
calculate mean of different clusters. Each cluster indicates
different employee behavior i.e. good/loyal/average/bad.
Basic block diagram:
Fig b. Block diagram
H. Requirements
A. Hardware and Software
Operating system needed for terminal is Android (any
version). Server side system will be Windows 07 based.
Client side will be an android phone having SDK 2.3 or
above. Software using will be SDK for Android, JDK 7,
Eclipse and Tomcat.
I. Algorithms
We are using two algorithms, one for calculating the
behavior of Employee’s and another for encryption to
encrypt message sent by one terminal to another terminal.
A. AES Encryption Algorithm :
AES is based on a design principle known as a
substitution-permutation network, and is fast in both
software and hardware. Unlike its predecessor DES, AES
does not use a Feistel network. AES is a variant of Rijndael
which has a fixed block size of 128 bits, and a key size of
128, 192, or 256 bits. By contrast, the Rijndael
specification per se is specified with block and key sizes
that may be any multiple of 32 bits, both with a minimum
of 128 and a maximum of 256 bits. AES operates on a 4×4
column-major order matrix of bytes, termed the state,
although some versions of Rijndael have a larger block size
and have additional columns in the state. Most AES
calculations are done in a special finite field. The key size
used for an AES cipher specifies the number of repetitions
of transformation.
B. K-Means Clustering Algorithm:
k-means clustering is a method of vector quantization,
originally from signal processing, that is popular for
cluster analysis in data mining. k-means clustering aims to
partition n observations into k clusters in which each
observation belongs to the cluster with the nearest mean,
serving as a prototype of the cluster. This results in a
partitioning of the data space into Voronoi cells.
Given a set of observations (x1, x2, …, xn), where each
observation is a d-dimensional real vector, k-means
clustering aims to partition the n observations into k sets
(k ≤ n) S = {S1, S2, …, Sk} so as to minimize the within-
cluster sum of squares (WCSS):
Where μi is the mean of points in Si.
Monitoring by Admin
Employee 1 Employee 2
Employee 3 Employee 4
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1497
II. CONCLUSION
Using this system it is possible to track all the
activities of employee’s cell phone which is provided by
particular organization and it is also possible to know
manager behavior of employee’s according to their cell
phone activities like Incoming and Outgoing call history,
SMS history, Web history, Data usages. It is also possible to
track employee’s current location.
III. REFERENCES
[1] Kuntze, Rieke, Diederich, Sethmann, Sohr,
Mustafa,Detken “Secure Mobile Business Information
Processing “2010 IEEE/IFIP 8th International
Conference on, 11-13 Dec. 2010.
[2] Heming Pang, Linying Jiang, Liu Yang, Kun
Yue,“Research of android smart phone surveillance
system“Computer Design and Applications (ICCDA),
2010 International Conference on” 25-27 June
2010V2-373 - V2-376.
[3] Melkonyan, Yalamanchili, Akopian, Chen, “Integrity
monitoring and Thresholding-based WLAN indoor
positioning algorithm for mobile devices” System of
Systems Engineering (SOSE), 2011 6th International
Conference on 27-30 June 2011 191 – 196.
[4] Hyun Jung La; Soo Dong Kim“A service-based
approach to developing Android Mobile Internet
Device (MID) applications” Service-Oriented
Computing and Applications (SOCA), 2009 IEEE
International Conference February 2010.
[5] yagi, Vivek; Pandya, A.S.; Agarwal, Ankur; Alhalabi,
Bassem “Validation of Object Recognition Framework
on Android Mobile Platform” High-Assurance Systems
Engineering (HASE), 2011 IEEE 13th International
Symposium pages: 313 – 316, Nov. 2011 ___Mori, Y.;
Kojima, H.; Kohno, E.; Inoue, S.; Ohta, T.; Kakuda, Y.; Ito
“A Self-Configurable New Generation Children
Tracking System Based on Mobile Ad Hoc Networks
Consisting of Android Mobile Terminals“ Autonomous
Decentralized Systems (ISADS), 2011 10th
International Symposium Pages: 339 - 342 , March
2011.
[6] Multiple SIMs -- A Framework Based on Software
Restructuring Approach “Communications and Mobile
Computing (CMC), 2011 Third International
Conference Pages: 178 - 181 , June 2011.
[7] "MOSES: Supporting and Enforcing Security Profiles
on Smart phones" YuryZhauniarovich, Giovanni
Russello, Mauro Conti,Bruno Crispo, and
EarlenceFernandes, IEEE transactions on dependable
and secure computing,2014.
[8] R.Anand, G.Arunkumar, S.Murthy,” Mitter -bitter
monitoring system using android
smartphone’s”,2012 IEEE.
[9] Atsushi Ito, Yoshiaki Kakuda, TomoyukiOhta and
Shinji Inoue, “New safety support system for
children on school routes using mobile ad hoc
networks,” IEICE Transactions on Communications,
vol.E94-B, no.1, 2011, to appear.

More Related Content

What's hot

A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time andijcseit
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Employee record for admin application using android smartphone
Employee record for admin application using android smartphoneEmployee record for admin application using android smartphone
Employee record for admin application using android smartphoneIRJET Journal
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes csandit
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
Cobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukharyCobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukharyConference Papers
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep LearningIRJET Journal
 
A unified dashboard for collaborative robot management system
A unified dashboard for collaborative robot management systemA unified dashboard for collaborative robot management system
A unified dashboard for collaborative robot management systemConference Papers
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 

What's hot (16)

A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time and
 
20120130406025
2012013040602520120130406025
20120130406025
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...IRJET -  	  Detection of False Data Injection Attacks using K-Means Clusterin...
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Employee record for admin application using android smartphone
Employee record for admin application using android smartphoneEmployee record for admin application using android smartphone
Employee record for admin application using android smartphone
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
 
Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes Security Analysis of Mobile Authentication Using QR-Codes
Security Analysis of Mobile Authentication Using QR-Codes
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
Cobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukharyCobot fleet management system using cloud and edge computing bukhary
Cobot fleet management system using cloud and edge computing bukhary
 
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET-  	  Fish Recognition and Detection Based on Deep LearningIRJET-  	  Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
 
A unified dashboard for collaborative robot management system
A unified dashboard for collaborative robot management systemA unified dashboard for collaborative robot management system
A unified dashboard for collaborative robot management system
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 

Similar to IRJET- Improving Employee Tracking and Monitoring System using Advanced Mechanism

Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidIRJET Journal
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management SystemIRJET Journal
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...IJECEIAES
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET Journal
 
Human Resource Management using Phone Gap
Human Resource Management using Phone GapHuman Resource Management using Phone Gap
Human Resource Management using Phone GapIRJET Journal
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart ShopsIOSR Journals
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart DepartmentIRJET Journal
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceIRJET Journal
 
IRJET- Displaying Data of Smart Phone using Firebase
IRJET- Displaying Data of Smart Phone using FirebaseIRJET- Displaying Data of Smart Phone using Firebase
IRJET- Displaying Data of Smart Phone using FirebaseIRJET Journal
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Review on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationReview on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationIRJET Journal
 

Similar to IRJET- Improving Employee Tracking and Monitoring System using Advanced Mechanism (20)

Employee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And AndroidEmployee Monitoring And Management System Using GPS And Android
Employee Monitoring And Management System Using GPS And Android
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
IRJET - Android Application Service Call Management System
IRJET  -  	  Android Application Service Call Management SystemIRJET  -  	  Android Application Service Call Management System
IRJET - Android Application Service Call Management System
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 
Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...Software engineering based fault tolerance model for information system in pl...
Software engineering based fault tolerance model for information system in pl...
 
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET- Improve Client Performance in Client Server Mobile Computing System us...
IRJET- Improve Client Performance in Client Server Mobile Computing System us...
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple Users
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
 
Human Resource Management using Phone Gap
Human Resource Management using Phone GapHuman Resource Management using Phone Gap
Human Resource Management using Phone Gap
 
Smart Data Server for Smart Shops
Smart Data Server for Smart ShopsSmart Data Server for Smart Shops
Smart Data Server for Smart Shops
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Android Based Smart Department
Android Based Smart DepartmentAndroid Based Smart Department
Android Based Smart Department
 
Java project titles
Java project titlesJava project titles
Java project titles
 
Forensic Tool for Android Mobile Device
Forensic Tool for Android Mobile DeviceForensic Tool for Android Mobile Device
Forensic Tool for Android Mobile Device
 
IRJET- Displaying Data of Smart Phone using Firebase
IRJET- Displaying Data of Smart Phone using FirebaseIRJET- Displaying Data of Smart Phone using Firebase
IRJET- Displaying Data of Smart Phone using Firebase
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Review on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial ApplicationReview on Smart Manufacturing Based on IoT: An Industrial Application
Review on Smart Manufacturing Based on IoT: An Industrial Application
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IRJET- Improving Employee Tracking and Monitoring System using Advanced Mechanism

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1494 Improving Employee Tracking and Monitoring System Using Advanced Mechanism Ashish Hole1, Tejas Bhandare2, Akshay Devkate3, Rutuja Deore4 1,2,3,4 Dept. of Computer Engineering, SKNCOE, Vadgaon, Pune-41 -----------------------------------------------------------------------***------------------------------------------------------------------------ Abstract-- Smartphones are proving very essential and effective tools for increasing the storage capacity and computational power. They allow end users to perform several tasks and keeps them updated to the point. Our proposed system “Improving Employee Tracking and Monitoring System using Advanced Mechanism” allows to monitor the employee’s cell phones provided by organization. Activities such as incoming calls, outgoing calls, missed calls, SMS history, web history, data usage, unauthorized call lists and websites are stored on centralized server. Manager can see and monitor all the history by logging into centralized sever. Employee’s current location can also be tracked by Manager through GPS. If an employee is going outside the company premises then manager can get alert message in SMS format. Employee’s behavior is calculated by using number of unapproved calls and exceeding data usage (good/bad/average/loyal). The device provided to the employee should be android based. The Manager can have any device. This system is very helpful for Manager as it can find out the activities done by employee. Keywords: Android, GPS, Emlpoyee’s behavior. I. INTRODUCTION Android is operating system which supports large number of applications in Smartphone. Android is an open source. It allows developers to develop applications and sale them in android market. Android operating system proves to be powerful and most popular operating system which makes life more comfortable and advanced for users. Android is a mobile operating system developed by Open Handset Alliance. Some of the features and specifications of Android are: 1. Application framework which enables replacement and reuse of component, 2. Dalvik Virtual Machine: It is optimized for mobile device, 3. Optimized Graphics: It is powered by a custom 2D graphics library; 3D graphics based on the OpenGL ES 1.0 specification, 4. Integrated browser: It is based on the open source web kit engine, 5. SQLite, 6. Media Support, 7. GSM Technology, 8. Camera, GPS, compass, 9. Bluetooth, EDGE,3G,WiFi. Android system is based on Linux version 2.6 which provide services like memory management, security, network stack, driver model and process management. Android provide SDK for development of different new application. Android consists of four layers: 1. Linux Kernel, 2. Libraries, a. Android Runtime, 3. Application framework, 4. Applications. Linux kernel is the basic layer which consists of hardware driver which are essential for controlling and communicating with hardware. Libraries are the next layer which consist native libraries. Native libraries includes surface manager, media framework, SQLite, Webkit, OpenGL. Android runtime consist two main parts: Dalvik Virtual Machine, Core java libraries. DVM is like a JVM which is developed by Dan Bornstein of Google which is used for executing application. DVM requires ‘.dex’ files which is built from .class file at the time of compilation. D VM allows multiple instances of virtual Machine simultaneously which also provide security, isolation, threading and memory management. Core java libraries provides most of the functionalities defined in javaSE libraries .Applications are the top layer in android architecture where our application are gone fit. Android consists of four main components: Service, Activity, Content Provider, Broadcast Receiver. Services include background process. Activity consists of GUI screen. Content provider has database like content DB, Bookmark DB, message DB. Broadcast receiver contains all the information about call logs. Employee monitoring system provides tracking of employee’s cell phone which is in Wi-Fi. A. Abbreviations and Acronyms GPS- Global Positioning System, XML-Extended Markup Language B. Literature Survey 1) “New safety support System for children on school route using mobile ad-hoc network” (year-2011) .This paper was published by authors AtsushIto, Yoshaiaki kukuda, Tomoyuki Ohta. This paper was based on domains like mobile ad-hoc network which also lacks in Android terminal connected in wireless LAN dynamic paring of mobile terminal is mandatory. 2) “Track your Buddies”
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1495 (year-2013) This paper was published by authors Anjor Jadhav, Savita Kharj, etc. The published paper has some disadvantages like, tracking is done by fixing tags in different location for identifying the exact position of an buddy i.e, a friend via .Mobile. 3) ”Secure Mobile Business Information on processing”. This paper was published by the authors Kuntze Rieke ,Diederich, Sethmann, Mustafa, Detken. In theyear2010. This paper is refer by us to achieve the goal of overcoming the possibility of data loss during the message transfer. 4. Android based remote monitoring system (year-2012). As this paper was published on the existing technology like 2G and 3G network which were inefficient to handle the data properly. This paper is taken into the base papers to achieve the goal of data transfer without any loss of data packets. 4 )”SAR operation based on call log and location details using GPS and Android Smartphone”.(year-2011) this paper does not avail the services to trace the history of data usage of web and unauthorized calls. C. Existing System In existing system, mobile terminal is connected to 3G network. Identification of the employee location is done by fixing tags in different location. There is a communication link to management server which is managed by 3G network and is costly than WiFi network. In the existing system tracking of outgoing, incoming calls and SMS is done. Calculating employee behavior is not feasible. D. Drawback of existing system The Manager is not able to trace out the activities of Employee like unauthorized call history, unauthorized web history and unauthorized list in the mobile. The Manager can’t get the information about Employee’s behavior. Also alert messages are not received on Manager’s phone or device. E. Proposed System In this system Managers can monitor their Employee’s office cell phone by implementing some functions for employee monitoring. All call logs like incoming and outgoing calls, SMS, texts and multimedia messages can be seen by Manager. Manager can also interrupt to monitor their employee through GPS (i.e. Global Positioning System). The Manager can access history of where the employee have been and set up alerts if their employee is going outside the organization area. Android terminal is basically connected to WiFi network for data transfer between two mobile terminals easily and effectively. Tracking can be made easily without any distortion. Data is stored and retrieved at high speed because of Wifi network. This system has Android based cell phones for software to be run. Employee should have Android based cell phone while the Manager can have any mobile device, as they are only going to receive SMS alerts. The alerts are stored in the centralized server like call logs and multimedia messages and the timely updates of their employee’s location. Managers can login into centralized server and view details of their Employee’s mobile usage whenever needed. Employee’s behavior is calculated by Manager using k-means clustering algorithm. AES encryption algorithm is used to send messages securely to mobile terminals. F. Features of the proposed system All day to day activities like SMS,MMS, calls, data usage, unauthorized call/website list of Employee is tracked by Manager. Location details are also known of Employee. If the Employee crosses some specified area then alert message will be sent to Manager’s mobile in a SMS format. Manager may later login and view the details of a particular employee by logging into the centralized server and calculate the behavior of employee based on that. G. Architecture of proposed system Fig a. Architecture of Proposed System Call Logs: Call logs should show the details of the incoming and outgoing calls and history from employee’s phone like date, time and phone number. So Employee should not use their company cell phone for personal use. If they call unapproved number from employee list, it will be logged onto to server and recorded.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1496 Message History: Manager should get multimedia messages with date and time along with message history from employee cell phone like text messages (inbox/draft/sent). Web Browser History: The module should show the web browser history of an employee and store web details on server. Server database has list of authorized sites stored. Data Usage: Data usage statistics should be shown in the terms of MBs of data. Manager can easily keep watch on data usage of employee’s cell phone. Unauthorized call/website list: Manager should maintain the list of unauthorized websites and that websites should not be accessed byemployee. Managers can disapprove the international calls for the employee. Tracking by GPS: Employee location details can be retrived by using GPS. If employee goes outside the specified zone then notification is sent to managers. Employee Behavior: With K-means algorithm employee’s behavior is calculated. Firstly number of unapproved calls, exceeding data usage is calculated for each employee and then K- means algorithm is applied on these parameters to calculate mean of different clusters. Each cluster indicates different employee behavior i.e. good/loyal/average/bad. Basic block diagram: Fig b. Block diagram H. Requirements A. Hardware and Software Operating system needed for terminal is Android (any version). Server side system will be Windows 07 based. Client side will be an android phone having SDK 2.3 or above. Software using will be SDK for Android, JDK 7, Eclipse and Tomcat. I. Algorithms We are using two algorithms, one for calculating the behavior of Employee’s and another for encryption to encrypt message sent by one terminal to another terminal. A. AES Encryption Algorithm : AES is based on a design principle known as a substitution-permutation network, and is fast in both software and hardware. Unlike its predecessor DES, AES does not use a Feistel network. AES is a variant of Rijndael which has a fixed block size of 128 bits, and a key size of 128, 192, or 256 bits. By contrast, the Rijndael specification per se is specified with block and key sizes that may be any multiple of 32 bits, both with a minimum of 128 and a maximum of 256 bits. AES operates on a 4×4 column-major order matrix of bytes, termed the state, although some versions of Rijndael have a larger block size and have additional columns in the state. Most AES calculations are done in a special finite field. The key size used for an AES cipher specifies the number of repetitions of transformation. B. K-Means Clustering Algorithm: k-means clustering is a method of vector quantization, originally from signal processing, that is popular for cluster analysis in data mining. k-means clustering aims to partition n observations into k clusters in which each observation belongs to the cluster with the nearest mean, serving as a prototype of the cluster. This results in a partitioning of the data space into Voronoi cells. Given a set of observations (x1, x2, …, xn), where each observation is a d-dimensional real vector, k-means clustering aims to partition the n observations into k sets (k ≤ n) S = {S1, S2, …, Sk} so as to minimize the within- cluster sum of squares (WCSS): Where μi is the mean of points in Si. Monitoring by Admin Employee 1 Employee 2 Employee 3 Employee 4
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1497 II. CONCLUSION Using this system it is possible to track all the activities of employee’s cell phone which is provided by particular organization and it is also possible to know manager behavior of employee’s according to their cell phone activities like Incoming and Outgoing call history, SMS history, Web history, Data usages. It is also possible to track employee’s current location. III. REFERENCES [1] Kuntze, Rieke, Diederich, Sethmann, Sohr, Mustafa,Detken “Secure Mobile Business Information Processing “2010 IEEE/IFIP 8th International Conference on, 11-13 Dec. 2010. [2] Heming Pang, Linying Jiang, Liu Yang, Kun Yue,“Research of android smart phone surveillance system“Computer Design and Applications (ICCDA), 2010 International Conference on” 25-27 June 2010V2-373 - V2-376. [3] Melkonyan, Yalamanchili, Akopian, Chen, “Integrity monitoring and Thresholding-based WLAN indoor positioning algorithm for mobile devices” System of Systems Engineering (SOSE), 2011 6th International Conference on 27-30 June 2011 191 – 196. [4] Hyun Jung La; Soo Dong Kim“A service-based approach to developing Android Mobile Internet Device (MID) applications” Service-Oriented Computing and Applications (SOCA), 2009 IEEE International Conference February 2010. [5] yagi, Vivek; Pandya, A.S.; Agarwal, Ankur; Alhalabi, Bassem “Validation of Object Recognition Framework on Android Mobile Platform” High-Assurance Systems Engineering (HASE), 2011 IEEE 13th International Symposium pages: 313 – 316, Nov. 2011 ___Mori, Y.; Kojima, H.; Kohno, E.; Inoue, S.; Ohta, T.; Kakuda, Y.; Ito “A Self-Configurable New Generation Children Tracking System Based on Mobile Ad Hoc Networks Consisting of Android Mobile Terminals“ Autonomous Decentralized Systems (ISADS), 2011 10th International Symposium Pages: 339 - 342 , March 2011. [6] Multiple SIMs -- A Framework Based on Software Restructuring Approach “Communications and Mobile Computing (CMC), 2011 Third International Conference Pages: 178 - 181 , June 2011. [7] "MOSES: Supporting and Enforcing Security Profiles on Smart phones" YuryZhauniarovich, Giovanni Russello, Mauro Conti,Bruno Crispo, and EarlenceFernandes, IEEE transactions on dependable and secure computing,2014. [8] R.Anand, G.Arunkumar, S.Murthy,” Mitter -bitter monitoring system using android smartphone’s”,2012 IEEE. [9] Atsushi Ito, Yoshiaki Kakuda, TomoyukiOhta and Shinji Inoue, “New safety support system for children on school routes using mobile ad hoc networks,” IEICE Transactions on Communications, vol.E94-B, no.1, 2011, to appear.