ILocate comes with the set of features to locate your lost or misplaced android mobile. User may find his mobile by turning off the silent mode by sending simple code as a text message to make his mobile ring.
User may also locate his device on map by requesting the mobile’s current location through sending a simple preconfigured code as text message from another trusted device to user’s mobile. In response user will get a link as a text message on a trusted device which will show user’s mobile’s current location on map.
User can choose specific numbers to receive the command from by maintaining a list called – ‘Whitelist’.
Mobile development in age of Internet of Things and programming Apple WatchJanusz Chudzynski
Explore differences between mobile development platforms and learn about tools and resources that can be used to create mobile applications. In the second part of the presentation you will learn what’s the role of mobile devices in Internet of Things, see a demo of the Apple Watch and importance of a iBeacon, one of the hottest technologies of 2014.
Best Presentation on AiOne Call Blocker Android Application as Summer Trainin...Aakash Goyal
No more Unwanted Calls! AiOne Call Blocker is the most effective call-blocking app
Fully-featured Call Blocker, Blacklist app and Whitelist app. Easily block anyone from calling you.
Block unwanted calls either from unsaved contacts, saved contacts or from the blacklist list.
No more annoying, disturbing and unwanted phone calls.
Blocker is the most effective call-blocking app for Android, blocking unwanted calls, and letting you control your privacy and security. AiOne Call Blocker is constantly working in the background, to block unwanted calls.
Your privacy is guaranteed.
This is a 100%-FREE application.
Key Features:
- Block unwanted and spam calls
- Blocked calls don't ring! Send calls to voicemail, or hang up on the caller.
- Personal Blacklist - Add any phone number or group
- Personal Whitelist - Add any phone number or group
- Block private & unknown callers
- Privacy modes - Contacts Only, Block All Calls, Block only contacts from Blacklist, Whitelist support
- All Android OS versions from 1.6 to 5.0 are supported.
- Light App - Very small memory and very low battery consumption
Tested on devices:
- Samsung Galaxy S3
- Samsung Galaxy S2
- Samsung Galaxy Ace
- Samsung Galaxy Fit
- Sony XPERIA Arc
- HTC Tattoo
-Moto G
-Micromax A106
Mobile development in age of Internet of Things and programming Apple WatchJanusz Chudzynski
Explore differences between mobile development platforms and learn about tools and resources that can be used to create mobile applications. In the second part of the presentation you will learn what’s the role of mobile devices in Internet of Things, see a demo of the Apple Watch and importance of a iBeacon, one of the hottest technologies of 2014.
Best Presentation on AiOne Call Blocker Android Application as Summer Trainin...Aakash Goyal
No more Unwanted Calls! AiOne Call Blocker is the most effective call-blocking app
Fully-featured Call Blocker, Blacklist app and Whitelist app. Easily block anyone from calling you.
Block unwanted calls either from unsaved contacts, saved contacts or from the blacklist list.
No more annoying, disturbing and unwanted phone calls.
Blocker is the most effective call-blocking app for Android, blocking unwanted calls, and letting you control your privacy and security. AiOne Call Blocker is constantly working in the background, to block unwanted calls.
Your privacy is guaranteed.
This is a 100%-FREE application.
Key Features:
- Block unwanted and spam calls
- Blocked calls don't ring! Send calls to voicemail, or hang up on the caller.
- Personal Blacklist - Add any phone number or group
- Personal Whitelist - Add any phone number or group
- Block private & unknown callers
- Privacy modes - Contacts Only, Block All Calls, Block only contacts from Blacklist, Whitelist support
- All Android OS versions from 1.6 to 5.0 are supported.
- Light App - Very small memory and very low battery consumption
Tested on devices:
- Samsung Galaxy S3
- Samsung Galaxy S2
- Samsung Galaxy Ace
- Samsung Galaxy Fit
- Sony XPERIA Arc
- HTC Tattoo
-Moto G
-Micromax A106
This is basically android app presentation on Bluetooth chat which i made for my academic purpose after that i think it is interesting and will be beneficial for others so i uploaded here. Please like my presentation if you r satisfied..... and give me your reviews.....
A report on SOS App For Android platform,AN ANDROID APPLICATION FOR EMERGENCIES/The aim of the project is to develop an Android application that lets its users to send notifications in case of an emergency or a panic situation. The users can send multiple text messages and emails on the press of a single button. The phone numbers, email ids and the contents of the text and email messages can be set from within the application. The text messages and emails sent, along with the content, also have the last known location of the user. This is very helpful in tracking the whereabouts of the person. The user can also call 911 directly from within the application, if the nature of the situation demands it.
plant disease recognition method is proposed based on plant images abstractBhadra Gowdra
In this we presents a survey on methods that use digital image processing techniques to detect, quantify and classify plant diseases from digital images in the visible spectrum. Although disease symptoms can manifest in any part of the plant, only methods that explore visible symptoms in leaves and stems were considered. In this, a plant disease recognition method is proposed based on plant images. Based on the diseases the required treatments which include pesticides and methods to treat it.
As the power of modern computers grows alongside our understanding of the human brain, we move ever closer to making some pretty spectacular science fiction into reality. Imagine transmitting signals directly to someone's brain that would allow them to see, hear or feel specific sensory inputs. Consider the potential to manipulate computers or machinery with nothing more than a thought. It isn't about convenience, for severely disabled people, development of a brain-computer interface (BCI) could be the most important technological breakthrough in decades.
A Brain-computer interface, sometimes called a direct neural interface or a brain-machine interface, is a direct communication pathway between a brain and an external device. It is the ultimate in development of human-computer interfaces or HCI. BCIs being the recent development in HCI there are many realms to be explored. After experimentation three types of BCIs have been developed namely Invasive BCIs, Partially-invasive BCIs, Non-invasive BCIs.
Currently there are no proper managed system which can give all the information’s easily at one place, if a person wants to know about the current event happening around him, then he have to use a pc to search related information and there are no proper website exists which provides all the information at the same place, then if he gets the event location even though he have to suffer a lot to reach that place, in the stadium after taking the seat if the person wants to eat something or order something he need to go to the food court nearby him which again need a lot of time in the searching process in the main time they may miss a lot of stuff in the show . This is what the existing unmanaged system look like.
The Fun and Food application can manage all those things in a very good and efficient way, The application is very powerful and efficient that it can locate user’s required position and track all the nearby fun and food zones currently available, if user selects any zone the app will automatically provide the minimum detail about the zone i.e., minimum cost, entry fee such kind of detail are being displayed in the app. We will get the zones on the base of location which will be a viewed in a list which contains the entire fun and food zones at that particular location.
Analysis of historical movie data by BHADRABhadra Gowdra
Recommendation system provides the facility to understand a person's taste and find new, desirable content for them automatically based on the pattern between their likes and rating of different items. In this paper, we have proposed a recommendation system for the large amount of data available on the web in the form of ratings, reviews, opinions, complaints, remarks, feedback, and comments about any item (product, event, individual and services) using Hadoop Framework.
As the power of modern computers grows alongside our understanding of the human brain, we move ever closer to making some pretty spectacular science fiction into reality. Imagine transmitting signals directly to someone's brain that would allow them to see, hear or feel specific sensory inputs. Consider the potential to manipulate computers or machinery with nothing more than a thought. It isn't about convenience, for severely disabled people, development of a brain-computer interface (BCI) could be the most important technological breakthrough in decades.
A Brain-computer interface, sometimes called a direct neural interface or a brain-machine interface, is a direct communication pathway between a brain and an external device. It is the ultimate in development of human-computer interfaces or HCI. BCIs being the recent development in HCI there are many realms to be explored. After experimentation three types of BCIs have been developed namely Invasive BCIs, Partially-invasive BCIs, Non-invasive BCIs.
5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.
An initial chip design by Qualcomm in October 2016, the Snapdragon X50 5G modem, supports operations in the 28 GHz band, also known as millimetre wave (mmW) spectrum. With 800 MHz bandwidth support, it is designed to support peak download speeds of up to 35.46 gigabits per second.
5G planning aims at higher capacity than current 4G, allowing a higher density of mobile broadband users, and supporting device-to-device, ultra reliable, and massive machine communications.
5G research and development also aims at lower latency than 4G equipment and lower battery consumption, for better implementation of the Internet of things
INTERNET OF THINGS
. The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
A GSM Jammer or cell phone jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled.
Communication jamming devices were first developed and used by military. Where tactical commanders use RF communications to exercise control of their forces, an enemy has interest in those communications. This interest comes from the fundamental area of denying the successful transport of the information from the sender to the receiver.
Nowadays the mobile jammer devices or cell phone jammer software are becoming civilian products rather than electronic warfare devices, since with the increasing number of the mobile phone users the need to disable mobile phones in specific places where the ringing of cell phone would be disruptive has increased. These places include worship places, university lecture rooms, libraries, concert halls, meeting rooms, and other places where silence is appreciated
Worldranking universities final documentationBhadra Gowdra
With the upcoming data deluge of semantic data, the fast growth of ontology bases has brought significant challenges in performing efficient and scalable reasoning. Traditional centralized reasoning methods are not sufficient to process large ontologies. Distributed searching methods are thus required to improve the scalability and performance of inferences. This paper proposes an incremental and distributed inference method for large-scale ontologies by using Map reduce, which realizes high-performance reasoning and runtime searching, especially for incremental knowledge base. By constructing transfer inference forest and effective assertion triples, the storage is largely reduced and the search process is simplified and accelerated. We propose an incremental and distributed inference method (IDIM) for large-scale RDF datasets via Map reduce. The choice of Map reduce is motivated by the fact that it can limit data exchange and alleviate load balancing problems by dynamically scheduling jobs on computing nodes. In order to store the incremental RDF triples more efficiently, we present two novel concepts, i.e., transfer inference forest (TIF) and effective assertion triples (EAT). Their use can largely reduce the storage and simplify the reasoning process. Based on TIF/EAT, we need not compute and store RDF closure, and the reasoning time so significantly decreases that a user’s online query can be answered timely, which is more efficient than existing methods to our best knowledge. More importantly, the update of TIF/EAT needs only minimum computation since the relationship between new triples and existing ones is fully used, which is not found in the existing literature. In order to store the incremental RDF triples more efficiently, we present two novel concepts, transfer inference forest and effective assertion triples. Their use can largely reduce the storage and simplify the searching process.
This is basically android app presentation on Bluetooth chat which i made for my academic purpose after that i think it is interesting and will be beneficial for others so i uploaded here. Please like my presentation if you r satisfied..... and give me your reviews.....
A report on SOS App For Android platform,AN ANDROID APPLICATION FOR EMERGENCIES/The aim of the project is to develop an Android application that lets its users to send notifications in case of an emergency or a panic situation. The users can send multiple text messages and emails on the press of a single button. The phone numbers, email ids and the contents of the text and email messages can be set from within the application. The text messages and emails sent, along with the content, also have the last known location of the user. This is very helpful in tracking the whereabouts of the person. The user can also call 911 directly from within the application, if the nature of the situation demands it.
plant disease recognition method is proposed based on plant images abstractBhadra Gowdra
In this we presents a survey on methods that use digital image processing techniques to detect, quantify and classify plant diseases from digital images in the visible spectrum. Although disease symptoms can manifest in any part of the plant, only methods that explore visible symptoms in leaves and stems were considered. In this, a plant disease recognition method is proposed based on plant images. Based on the diseases the required treatments which include pesticides and methods to treat it.
As the power of modern computers grows alongside our understanding of the human brain, we move ever closer to making some pretty spectacular science fiction into reality. Imagine transmitting signals directly to someone's brain that would allow them to see, hear or feel specific sensory inputs. Consider the potential to manipulate computers or machinery with nothing more than a thought. It isn't about convenience, for severely disabled people, development of a brain-computer interface (BCI) could be the most important technological breakthrough in decades.
A Brain-computer interface, sometimes called a direct neural interface or a brain-machine interface, is a direct communication pathway between a brain and an external device. It is the ultimate in development of human-computer interfaces or HCI. BCIs being the recent development in HCI there are many realms to be explored. After experimentation three types of BCIs have been developed namely Invasive BCIs, Partially-invasive BCIs, Non-invasive BCIs.
Currently there are no proper managed system which can give all the information’s easily at one place, if a person wants to know about the current event happening around him, then he have to use a pc to search related information and there are no proper website exists which provides all the information at the same place, then if he gets the event location even though he have to suffer a lot to reach that place, in the stadium after taking the seat if the person wants to eat something or order something he need to go to the food court nearby him which again need a lot of time in the searching process in the main time they may miss a lot of stuff in the show . This is what the existing unmanaged system look like.
The Fun and Food application can manage all those things in a very good and efficient way, The application is very powerful and efficient that it can locate user’s required position and track all the nearby fun and food zones currently available, if user selects any zone the app will automatically provide the minimum detail about the zone i.e., minimum cost, entry fee such kind of detail are being displayed in the app. We will get the zones on the base of location which will be a viewed in a list which contains the entire fun and food zones at that particular location.
Analysis of historical movie data by BHADRABhadra Gowdra
Recommendation system provides the facility to understand a person's taste and find new, desirable content for them automatically based on the pattern between their likes and rating of different items. In this paper, we have proposed a recommendation system for the large amount of data available on the web in the form of ratings, reviews, opinions, complaints, remarks, feedback, and comments about any item (product, event, individual and services) using Hadoop Framework.
As the power of modern computers grows alongside our understanding of the human brain, we move ever closer to making some pretty spectacular science fiction into reality. Imagine transmitting signals directly to someone's brain that would allow them to see, hear or feel specific sensory inputs. Consider the potential to manipulate computers or machinery with nothing more than a thought. It isn't about convenience, for severely disabled people, development of a brain-computer interface (BCI) could be the most important technological breakthrough in decades.
A Brain-computer interface, sometimes called a direct neural interface or a brain-machine interface, is a direct communication pathway between a brain and an external device. It is the ultimate in development of human-computer interfaces or HCI. BCIs being the recent development in HCI there are many realms to be explored. After experimentation three types of BCIs have been developed namely Invasive BCIs, Partially-invasive BCIs, Non-invasive BCIs.
5th generation mobile networks or 5th generation wireless systems, abbreviated 5G, are the proposed next telecommunications standards beyond the current 4G/IMT-Advanced standards.
An initial chip design by Qualcomm in October 2016, the Snapdragon X50 5G modem, supports operations in the 28 GHz band, also known as millimetre wave (mmW) spectrum. With 800 MHz bandwidth support, it is designed to support peak download speeds of up to 35.46 gigabits per second.
5G planning aims at higher capacity than current 4G, allowing a higher density of mobile broadband users, and supporting device-to-device, ultra reliable, and massive machine communications.
5G research and development also aims at lower latency than 4G equipment and lower battery consumption, for better implementation of the Internet of things
INTERNET OF THINGS
. The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction
A GSM Jammer or cell phone jammer is a device that transmit signal on the same frequency at which the GSM system operates, the jamming success when the mobile phones in the area where the jammer is located are disabled.
Communication jamming devices were first developed and used by military. Where tactical commanders use RF communications to exercise control of their forces, an enemy has interest in those communications. This interest comes from the fundamental area of denying the successful transport of the information from the sender to the receiver.
Nowadays the mobile jammer devices or cell phone jammer software are becoming civilian products rather than electronic warfare devices, since with the increasing number of the mobile phone users the need to disable mobile phones in specific places where the ringing of cell phone would be disruptive has increased. These places include worship places, university lecture rooms, libraries, concert halls, meeting rooms, and other places where silence is appreciated
Worldranking universities final documentationBhadra Gowdra
With the upcoming data deluge of semantic data, the fast growth of ontology bases has brought significant challenges in performing efficient and scalable reasoning. Traditional centralized reasoning methods are not sufficient to process large ontologies. Distributed searching methods are thus required to improve the scalability and performance of inferences. This paper proposes an incremental and distributed inference method for large-scale ontologies by using Map reduce, which realizes high-performance reasoning and runtime searching, especially for incremental knowledge base. By constructing transfer inference forest and effective assertion triples, the storage is largely reduced and the search process is simplified and accelerated. We propose an incremental and distributed inference method (IDIM) for large-scale RDF datasets via Map reduce. The choice of Map reduce is motivated by the fact that it can limit data exchange and alleviate load balancing problems by dynamically scheduling jobs on computing nodes. In order to store the incremental RDF triples more efficiently, we present two novel concepts, i.e., transfer inference forest (TIF) and effective assertion triples (EAT). Their use can largely reduce the storage and simplify the reasoning process. Based on TIF/EAT, we need not compute and store RDF closure, and the reasoning time so significantly decreases that a user’s online query can be answered timely, which is more efficient than existing methods to our best knowledge. More importantly, the update of TIF/EAT needs only minimum computation since the relationship between new triples and existing ones is fully used, which is not found in the existing literature. In order to store the incremental RDF triples more efficiently, we present two novel concepts, transfer inference forest and effective assertion triples. Their use can largely reduce the storage and simplify the searching process.
Right now, in most of the countries, inside the people ’s wallet, they probably have a the
couple of credit cards, an identification card, automatic machine teller cards (ATM card), and maybe a few other plastic cards. Without realizing it, these plastic cards havebecome a very important part of their life. Although smart card technology improves security and convenient but it is not used in a wide range in Middle East countries.
User acceptance is vital for further development of any fresh technology and smart card technology as well. One of the factors that can effect on the acceptance of smart card technology is users’ awareness. The goal of this study is to present a general overview of smart card technology and identify the smart card’s benefits, features and characteristics and moreover, the level of users’ knowledge and awareness about smart card technology will be evaluated. In order to achieve this goal, a survey was conducted among the international students of University Technology Malaysia to measure their awareness of smart technology
Location Tracking of Android Device Based on SMS.iCreateWorld
If an android user wants to know the location of Android device then user has to send SMS to designated device. So that he can locate device either by making it ring or gets actual location of device using GPS or network provider.
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
The project based on mobile application which functions on an Android operating system. The objective of this which
enable the user to locate the mobile phone in a silent mode to General mode when it is misplaced as well as if it is lost and wipe the
data from the device. To create an account the user needs to provide his /her mobile number, a password and 4 trustworthy numbers
this completes the registration process. The application, which is still in a deactivation mode, will operate only when the phone is
misplaced and the user sends the set password/ pass code from one of the 4 trustworthy numbers to one’s own mobile number. This
will change the profile of the misplaced phone i.e. switch it from the silent mode to the sound mode. It will also send an
acknowledgement to the trustworthy number from which the user has sent the message. Furthermore, it will also provide the location
with and also if mobile is lost then we can take back up from another mobile by using same application, we can also wipe the data
remotely by sending the message.
Remote Phone Access is the eventual remote control tool for the Android Smartphones event access. The events like application actions such as your phone may unlock when you are away and remove the stor-age drive card on your Smartphone or making Blue-tooth on for sending the any kind of personal data from your Smartphone etc. Trust event logger will give you the information of all these actions of what happened and when. To perform all these operations manually, it takes more time to access the device information and also the physical presence of user is needed. To overcome these problems we represent an application called “Trust Event Logger”.
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone
use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as
well as provides options to access a smartphone through other smartphone or a normal mobile via Short
Message Service. This model provides option to track and secure the mobile by locking it. It also provides
facilities to receive the incoming call and sms information to the remotely connected device and enables the
remote user to control the mobile through SMS. The proposed model is validated by the prototype
implementation in Android platform. Various tests are conducted in the implementation and the results are
discussed.
Mobile Security Using Android: Locate Your DroidIJERA Editor
For the past several decades, designers have processed security for a wide variety of applications from mobiles to automatic machines. Losing a smart phone can be an especially bad thing, since they are so expensive, and carry so much information. This application needs to be installed before. With this application user has the choice to launch phone tracking and finding cell phone by sending SMS requests to their lost phone and even getting the locations of the phones that are lost. Moreover this application also provides the facility of Simcard locking if the Simcard is changed and the privacy question is not answered along with blocking of all the incoming calls. Even if your cell is on the silent mode with this application you can change the mode of ringing in the phone and can then locate it if it is lost near to you. This application also provides the features of Simcard swap protection, ring alert.
It prevents accident and alert nearest police station or hospital and it also controls the incoming calls and outgoing calls based on speed of the vehicle.
Android note manager application for people with visual impairmentijmnct
With the outburst of smart-phones today, the market is exploding with various mobile applications. This
paper proposes an application using which visually impaired people can type a note in Grade 1 Braille and
save it in the external memory of their smart-phone. The application also shows intelligence by activating
reminders and/or calling certain contacts based on the content in the notes.
A case study of malware detection and removal in android appsijmnct
With the proliferation of smart phone users, android malware variants is increasing in terms of numbers
and amount of new victim android apps. The traditional malware detection focuses on repackage,
obfuscate and/or other transformable executable code from malicious apps. This paper presented a case
study on existing android malware detection through a sequence of steps and well developed encoding SMS
message. Our result has demonstrated a solid testify of our approach in the effectiveness of malware
detection and removal.
Backgrounded on Rococo Software including three product areas:
- Java/Bluetooth and JSR82
- Bluetooth in the Browser with BONDI / WAC / JIL
- Social Proximity Framework : LocalSocial
The project which we are doing is about “COLLEGE PHONE BOOK”. It is about storing the information or details of each individual student studying in their respective departments, which displays the name of the student, phone number(s) of the each individual student. This will be a very useful concept as it will give the college management or the department head to know the complete information of the student studying in that department. This project is based on the database in which we can store and retrieve all the information regarding students and what all we require.
Database is a structured format. So if we store in the database, we can retrieve that particular information by giving a command directly. There is no process for installing database for mobile-phone applications. Whenever the database is needed, then only the database is created through coding. Here we have the feasibility to give input, change the data and to delete it if we are not in need of it anymore, with the following option in the first screen – COLLEGE PHONEBOOK.
Parent communication register android applicationBhadra Gowdra
In this new era of Science and Technology, computer is one of the most important components in our life. Works can be done in a better way by the help of computer.
The Main aim of our project is to automate the attendance in the form of Android Mobile Application. Our intention is to establish a good communication between Student Mentor and parent.We have seen over the years that the process of manual attendance is being carried out across almost all educational institutions. The process is not only time consuming but also sometimes yield inefficient results in the false marking and calculation of attendance. We need not maintain pen and paper based attendance registers. Following this thought, we have proposed a Parent communication register android application APP by which we notify parents via SMS OR a call Notification system which is implemented on Android mobile application.This Android application will give the students attendance information and SMS notification feature whereby every parent will be periodically notified regarding his/her child attendance. Our system primarily focuses on building an efficient and user friendly Android mobile application. The application will be installed on the Mentor phone which runs android OS. It intends to provide an interface to the professor who will require a user id and password to carry out the task. Apart from that, the application would support strong user authentication and quick transmission of data.
PURPOSE OF THIS PROJECT:
This project is mainly used to decrease the time constrain to find all fun and food zones near to the user location.The main advantage of this application is the user can view all the fun and food zones at one place,now we have so many websites and applications which gives information only about food or fun individually.To overcome this disadvantage we developed an application which gives all the details about both fun and food zones based on user specified location so we Entitled this project as ‘FUN AND FOOD’ it is used to provide all fun and food zones near to location specified by the user.The user can view minimum details of nearest fun and food zones and user can also view the details of respective fun and food service provider.
Imagine a vitamin pill-sized camera that could travel through your body taking pictures, helping diagnose a problem which doctor previously would have found only through surgery.
Imagine a vitamin pill-sized camera that could travel through your body taking pictures, helping diagnose a problem which doctor previously would have found only through surgery.
3. ABSTRACT
ILocate comes with the set of features to locate your lost or
misplaced android mobile. User may find his mobile by turning off
the silent mode by sending simple code as a text message to make
his mobile ring.
User may also locate his device on map by requesting the mobile’s
current location through sending a simple preconfigured code as
text message from another trusted device to user’s mobile. In
response user will get a link as a text message on a trusted device
which will show user’s mobile’s current location on map.
User can choose specific numbers to receive the command from
by maintaining a list called – ‘Whitelist’
3
4. Requirements
Software:
Android Platform v2.1 and later
Development tools:
Android SDK: includes all power features of java adding to it
more specific APIs for android development.
Eclipse IDE 3.7: IDE, with ADT (Android Development Tools)
plug-in, provides features specific to develop,
debug and deploy the Android Apps.
SQLite: A database engine helps to create self-contained,
cross-platform databases for Gadgets.
4
10. FUTURE EXTENSION
We have included very basic features that required for application to work.
Some advancement in futures may possible for better features and better
user experience.
Dynamic entries for contacts & fetching contacts from mobile instead of
manual typing:
This version of iLocate has fixed number of allowable contact numbers for
White list and SIM change list. Advance controls may be used to add or
remove text fields as per user’s need. Also application may allow user to
fetch contact from People list itself and selecting accordingly.
Connecting using internet
Application may be extended to make a use of internet to allow the device
to be located through another device by trusted users (already registered
with application) and to track movements of user’s device.
10
11. CONCLUSION
The App Security for lost or misplaced device – ilocate has been
successfully completed. The goal of the system is achieved and
problems are solved. The project is developed in the manner which is
user friendly and required help is provided at different levels.
The primary goal is to provide security for the lost or misplaced
devices. It tracks the mobiles which are misplaced or lost. A simple
text message from a friend’s mobile will make users mobile to ring
(even if it is on Silent mode) if phone is misplaced within reachable
range. When a user lose his mobile a simple text message from
friend’s mobile will help user to receive his phone’s GPS location .
11
12. REFERENCES
Learning Android, Building Applications for the Android
Market by Marko Gargenta, O'Reilly Media
Android Developer’s official site
http://developer.android.com
Google
http://www.google.co.in/
Stack Overflow
http://stackoverflow.com/
& many other blogs, web materials, youtube, etc…
12