SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 2, February 2013
All Rights Reserved © 2013 IJARCET
342
Abstract— This paper discusses about the software which is
developed for the Android mobile devices for widely used in the
Business fields as well as our day to day life activities. In this era
of paperless offices and digital documents, you'd think the paper
and ink fax machine might finally be ready to retire. But faxing
is still an essential part of doing business for certain types of
documents (legal contracts, for example) and certain industries,
such as public relations. Although there are some similar
technologies developed for document faxing, there is main issue
of security. By using this software we will fax the document
through mobicloud using Android. There is not an issue of third
party involved as like internet faxing, so security can achieved
easily. For providing security we are using RSA algorithm for
encryption and decryption. This paper discusses the proposed
system, overview of the design, the various modules of the
system and its implementation.
Index Terms - Faxing, Mobicloud, Security, Encryption,
Decryption.
I. INTRODUCTION
What can't you do with a cell phone these days? The latest
models allow you to take pictures, record movies, watch TV,
play music, browse the Internet, send e-mails and even make
the occasional phone call. But what if you want to use your
cell phone's multimedia technology for more than just
entertainment? What if you actually need to get some work
done? No problem. With a simple camera phone and some
new software, you can turn any mobile phone into a scanner,
fax machine and copier. Camera phones are everywhere.
According to 2007 statistics,
79 percent of cell phones sold in the United States had a
built-in digital camera An estimated 1 billion camera phones
are in use around the world .Some cell phone manufacturers
have already released megapixel camera phones and there are
rumors about a 10-megapixel model hitting the shelves any
day now. Scanning and faxing from a cell phone works
through the same technology as internet faxing. A document,
in this case a digital photograph, is e-mailed to an Internet fax
service that converts the digital photo into fax data. The fax
service then sends the fax to the recipient over a phone line.
The cool thing about these new cell phone "scan
and fax" services is that they can optimize and compress
camera phone images into clear, readable PDF documents.
Using special imaging algorithms, the cell phone scanning
software can take a photo of an open book with shadows in the
crease and curved pages and turn it into a at image with
uniform background color and sharp text. The software also
simplies the image, getting rid of unnecessary digital noise to
make the smaller and easier to send over a cellular data
network. Next implementation is that we can send the
document via cloud to the destination. This is same like
mobile faxing except we are using mobicloud technology in
this system.
At the same time when mobile becoming so
popular, cloud computing [2] is also becoming popular.
Through the development of cloud computing, service
providers no longer need to worry about resource
management. Resources are managed by cloud providers, and
service providers can use resources depending on their
demands. In addition, users can access data and services
anytime and anywhere. This lets users share data more easily
than before. Users can access the same data in the same way
from any device.In our application we are using hybrid
application of Mobile and cloud computing known as
Mobicloud[3].
Literature Survey:
Recent Market shows that document faxing activity is very
important in our day to day life. There are many ways through
we can fax the document from source to destination. As this
all have some advantages also has certain disadvantages
related to them. We can fax the document using Fax machine,
Internet and mobile phones.
A. Using Fax machine:
This is a very traditional type of document fax. In this type
of system whenever a sender wants to send some documents
to the destination he should have paper and fax machine.
Using his fax machine he can send a document and receiver
will receive the same with his side fax machine.
At one time, fax machines were a very common way to
send documents from one location to another. Fax machines
are still used today but are not considered as reliable as other
options that are available. To send a fax, both the sender and
the receiver must have access to fax machines. If access is not
available, there are stores--such as Kinko's, Office Depot and
Staples--that allow you to fax documents from the store for a
fee.
Advantages:-
1.You only need a fax and a telephone line to be able to fax.
2.It does not cost you more than a normal phone cost per
minute.
3. Sometimes it is important to receive a document as
quickly as possible. Fax machines are a great option if it is a
paper that cannot easily be sent through email.
DOCUMENT FAXING THROUGH
MOBICLOUD USING ANDROID
Swapnali Gharat , Prajakta Rajput, Jayashree Patil, Snehal Sonavane
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 2, February 2013
343
4. One of the key advantages of fax machines is that they
provide an instant hard copy of a document. This removes the
chance that an email attachment can be deleted or an online
correspondence erased in the case of a hard drive failure or
computer crash. For businesses that keep paper copies of
official correspondence, fax machines speed up the process
by removing the need to receive an email and then print it later
for filing. Instead, everything happens at once.
Disadvantages:-
1. The receiving party should have a fax.
2. The receiving party should have a physical paper.
3. Needs a telephone line.
4. You don't have to worry about just your own fax machine
when you are faxing a document. You must be concerned
about the availability of the fax machine of the person to
whom you are faxing a document. To avoid possible
problems with paper jams or a lack of ink in the fax
machine, another person must be able to confirm receipt of
the fax and that it printed correctly.[6]
B.Using Internet:
With Internet faxing, any document that can be attached to
an email can be faxed to an analog fax machine. That includes
Microsoft Word documents, PDF and scanned images.
Internet faxing is a hosted service, meaning you don't need to
buy and install fax servers, modems and special software.
Instead, you subscribe to a third-party Internet faxing service
that converts e-mails to faxes and faxes to e-mails for you.
Here's how you send a fax using Internet faxing:
1.Your subscription Internet-fax service assigns you a
toll-free or regular fax number.
2. The sender dials that number and then sends the fax from
a regular fax machine.
3. The subscription service receives the fax, converts the
data into an e-mail attachment and sends it to your e-mail
address.
4. To read the fax, you simply open the attachment. Since
e-mail is the only application required to send and receive
Internet faxes, faxes also can be sent from a handheld
device[5].
Advantages:-
1.There are no busy signals to contend with since there is
no dialing to be done.
2.You dont have to tie up your phone line in order to send a
fax.
Disadvantages:-
1.You will have to have a scanner in order to fax a hard
copy document.
C .Using Mobile Phone:
Scanning and faxing from a cell phone works through the
same technology as Internet technology. A document, in this
case a digital photograph, is e-mailed to an Internet fax
service that converts the digital photo into fax data. The fax
service then sends the fax to the recipient over a phone line.
Advantages:-
1.In this case you need not have a scanner.
2.You need not have a fax machine.
Disadvantages:-
1.As third party involves there is issue of security.
II.PROPOSED SYSTEM
Our system allows a smart phone user to capture virtually
any type of document whether an expense receipt, an
insurance claim , driving license etc, and deliver it to needed
destination via cloud. It is operating as a kind of mobile fax
.As we are using mobile as well as cloud for this purpose we
can call this system as faxing using mobicloud.
Steps involved in Proposed System:-
1.Sender will Capture an image/ document using Camera.
2.Encrypt the document.
3.Upload/Push encrypted data on to cloud.
4.Receiver will connect to cloud
5.Retrieve the document/data.
6.Decrypt the document.
7.Get original
Basic Structure:
Fig 1.System Overview
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 2, February 2013
All Rights Reserved © 2013 IJARCET
344
III.MODULER DESIGN
Our proposed system is divided into four distinct modules
described as follows:
1.User authentication: Initially, when the user runs the
application for the first time, a login screen will be displayed
that will prompt the user to enter the username and password
required for authentication if he is already signed member
otherwise asked for new user sign in.Only when the user
enters the correct username and password, a “success”
message will be displayed and the user will get authenticated
and directed to the next screen.
2. Search User:-Whenever any sender want to send some
data to receiver he will search that receiver to ensure that
receiver is authenticated user. In Search user application will
show only that much users who are authenticated. And you
have to select receiver from them.
3. Select File:-When user get authenticated and select
receiver he will prompt to select file which he/she want to
send to particular user.
4. Key Management:-This is one important module of our
application. As we are using RSA for encryption and
decryption we are using public as well as private keys. So in
this module management of this keys are carried out.
5. Encrypt File:-In this module we are encrypting the Data
or file which you want to send before uploading on cloud. We
are performing encryption using RSA .This will be carried out
at sender side only.
6. Transmit File:- After encryption encrypted data will be
uploaded on cloud.
7. Transmit Key:-After transmitting key sender will send
one private key to receiver for performing decryption at
receiver side via SMS.
8. Retrieve File:-After getting notification receiver will
retrieve the encrypted data from cloud.
9. Decrypt data:-Using private key receiver will decrypt
the data and get original data.
IV. TECHNICAL REQUIREMENTS
Software requirements of our system are:
1. Windows XP/ Windows 7 Operating System
2. Android mobile Operating System
3. Eclipse IDE
4. NetBeans
As far as the hardware requirements are concerned, the
User would require an Android OS based Smartphone.
V. IMPLEMENTATION
For implementing this application we are using softwares
like Netbeans , eclipse, ADT and java .We have done all GUI
Using Netbeans and Eclipse and all programming has been
done in Java. Our proposed system is divided into four
distinct modules described as follows:
A. User Authentication
The user authentication module on the client side involved
the development of a login screen in the application. For this
purpose, standard Graphical User Interface (GUI) that
consists of buttons and textboxes were developed. The button
is also associated with an action that sends the input
parameters in the textboxes to the remote database via a web
service.
1.Sign In:
Sign In is an activity in which user authentication carries
out by a system. When application starts after welcome screen
you will see the screen as in fig.2.
This screen asks you about your username and passwords.
If you are registered user then you can provide your username
and password but if you are not registered then you can
register yourself using sign up.
Fig. 2.Sign In Screen
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 2, February 2013
345
2.Sign Up:
If user is not registered he can register using sign up.
Sign up is best option for new users to get registered. You
have to fill your all information as shown in fig 3. Like your
Name, address, username and password etc. Then
application will store his/her new username and passwords
in the database and he /she becomes registered user.
After sign up whenever user want to
login the application he can login with this username and
password which are provided during sign up.
Fig 3.Sign Up Screen
B. Main Menu
After authentication User will provided with main menu
screen. This will show what menus sender can use. As you can
see in fig 4. there are various menus provided for user like
search user, select file , key management etc.
Fig 4.Main Menu Screen
C.Search User:
There are many users those are registered for the
application.
As you can see in the fig.5 this module is used to select
receiver from authenticated users based on name or user Id.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, Issue 2, February 2013
All Rights Reserved © 2013 IJARCET
346
Fig 5.Search User Screen
Also we have implemented modules like send file, encrypt
file etc. For sending file we have provided three ways. They
are as follows:
a. Insecure transmission:
In this type of transmission there is no security provided for
data transmission.
b. Secure Transmission:
In this type of transmission we will encrypt the data using
RSA[4] and then send it on cloud.
c. Ultrasecure Transmission:
In this type of transmission we are encrypting the server
key using RSA[4] then the output of RSA will encrypt with
DES and this password will send to receiver.
VI. FUTURE SCOPE
In future our system can be used in applications like
government documents can be signed by a third party
authenticator in order to provide e documents like bonafide
etc.
VII. CONCLUSION
In this paper, an Android based mobile application for
Document Faxing through mobicloud is presented. As we all
know that now a days faxing is very important activity so
there are many ways to do that but all existing system have
some limitations. So to overcome all the limitations of
existing system we are proposing a new system for document
faxing Using MOBICLOUD. This application offers
reliability, time savings and easy transfer of data with
security. Also we are trying to contribute our efforts to save
trees as we are not using any paper for faxing.
REFERENCES
[1] Macro Andre Guerra, Claudia Mariline Francisco,
RuiNeves Madeira, “Portable Lab: Implementation of Mobile
remote laboratory for Android platform”, an IEEE paper
Portugal.
[2] Michael Armbrust, Armando Fox, Rean Griffith,
Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho
Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei
Zaharia, Above the clouds: A Berkeley view of cloud
computing, Technical Report UCB/EECS-2009-28, EECS
Department, U.C. Berkeley,2009.
[3] Ashwin Manjunatha, Ajith Ranabahu, Amit Sheth and
Krishnaprasad Thirunarayan” MobiCloud - Making Clouds
Reachable: A Toolkit for Easy and Efficient Development of
Customized Cloud Mobile Hybrid Application” Ohio Centre
of Excellence in Knowledge-Enabled Computing (Kno.e.sis)
Wright State University, Dayton, Ohio 45435.
[4] Sachin Mahajan , Santhosh Easo “Performance
Evolution of RSA and New Cryptosystem” International
Journal of Emerging Technology and Advanced Engineering
(ISSN 2250-2459, Volume 2, Issue 3, March 2012).
[5] Dave Roos ,“How Internet Faxing Works”,
http://home.howstuffworks.com
[6] Alan Kirk, “Advantages and Disadvantages of Using a
Fax ” , http://ehosw.com.

More Related Content

What's hot

Synopsis
SynopsisSynopsis
SynopsisKak Yong
 
Distributed systems
Distributed systemsDistributed systems
Distributed systemssree kanth
 
IRJET - Voice based E-Mail for Visually Challenged
IRJET -  	  Voice based E-Mail for Visually ChallengedIRJET -  	  Voice based E-Mail for Visually Challenged
IRJET - Voice based E-Mail for Visually ChallengedIRJET Journal
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...vivatechijri
 
Ict topic 3
Ict topic 3Ict topic 3
Ict topic 3kwongliik
 
The internet and online services
The internet and online servicesThe internet and online services
The internet and online servicesSmritiGurung4
 
Introduction to Mail Management System
Introduction to Mail Management System Introduction to Mail Management System
Introduction to Mail Management System IJERA Editor
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
Networking technology
Networking technologyNetworking technology
Networking technologySmritiGurung4
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsIRJET Journal
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020Dr. MAMTA BANSAL
 

What's hot (18)

2.2 working practices
2.2 working practices2.2 working practices
2.2 working practices
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 
Synopsis
SynopsisSynopsis
Synopsis
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
[IJET-V1I6P2] Authors:Imran khan , Asst. Prof K.Suresh , Asst.Prof Miss Ranja...
 
IRJET - Voice based E-Mail for Visually Challenged
IRJET -  	  Voice based E-Mail for Visually ChallengedIRJET -  	  Voice based E-Mail for Visually Challenged
IRJET - Voice based E-Mail for Visually Challenged
 
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
A Comparative Study of Different File Sharing Applications and Wi-Fi Direct T...
 
Ict topic 3
Ict topic 3Ict topic 3
Ict topic 3
 
The internet and online services
The internet and online servicesThe internet and online services
The internet and online services
 
Introduction to Mail Management System
Introduction to Mail Management System Introduction to Mail Management System
Introduction to Mail Management System
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
Networking technology
Networking technologyNetworking technology
Networking technology
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding The Internet & WWW - Basic Understanding
The Internet & WWW - Basic Understanding
 
Fcn assignment ( second mold )
Fcn assignment ( second mold )Fcn assignment ( second mold )
Fcn assignment ( second mold )
 

Viewers also liked

Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Sacos Plasticos
Sacos PlasticosSacos Plasticos
Sacos Plasticoscamfh
 
Filezilla Tutorial
Filezilla TutorialFilezilla Tutorial
Filezilla TutorialEloisa Careaga
 
é”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽč
é”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽčé”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽč
é”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽč信漉 朘
 
Tashfeen Zahid-PDUs
Tashfeen Zahid-PDUsTashfeen Zahid-PDUs
Tashfeen Zahid-PDUstazm4u
 
Lkp securities derivativies daily report
Lkp securities derivativies daily reportLkp securities derivativies daily report
Lkp securities derivativies daily reportLKP Securities Ltd.
 
Magfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiMagfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiPaarief Udin
 
Anitya nor azizah xii ipa 2
Anitya nor azizah xii ipa 2Anitya nor azizah xii ipa 2
Anitya nor azizah xii ipa 2Paarief Udin
 
FCCity Datasheet backup
FCCity Datasheet backupFCCity Datasheet backup
FCCity Datasheet backupAlex Bonte
 
Ordinanza chiusura serale attivitĂ  piazza Dante Viareggio
Ordinanza chiusura serale attivitĂ  piazza Dante ViareggioOrdinanza chiusura serale attivitĂ  piazza Dante Viareggio
Ordinanza chiusura serale attivitĂ  piazza Dante Viareggioredazionevt
 
Introduction Ajilon Technology
Introduction Ajilon TechnologyIntroduction Ajilon Technology
Introduction Ajilon TechnologyAjilon Nederland
 
Presentacion grafeno
Presentacion grafenoPresentacion grafeno
Presentacion grafenoestudiante10000
 

Viewers also liked (18)

Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
1762 1765
1762 17651762 1765
1762 1765
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
1873 1878
1873 18781873 1878
1873 1878
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
2
22
2
 
Sacos Plasticos
Sacos PlasticosSacos Plasticos
Sacos Plasticos
 
Filezilla Tutorial
Filezilla TutorialFilezilla Tutorial
Filezilla Tutorial
 
é”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽč
é”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽčé”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽč
é”è·ŻćČž-èż”é„‰çš„è™Ÿè§’Ié˜żçŸŽæ—ć‚łç”±ć»ș築重ć»șèšˆćŠƒä»‹çŽč
 
Tashfeen Zahid-PDUs
Tashfeen Zahid-PDUsTashfeen Zahid-PDUs
Tashfeen Zahid-PDUs
 
Lkp securities derivativies daily report
Lkp securities derivativies daily reportLkp securities derivativies daily report
Lkp securities derivativies daily report
 
Magfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiMagfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasi
 
Anitya nor azizah xii ipa 2
Anitya nor azizah xii ipa 2Anitya nor azizah xii ipa 2
Anitya nor azizah xii ipa 2
 
FCCity Datasheet backup
FCCity Datasheet backupFCCity Datasheet backup
FCCity Datasheet backup
 
Ordinanza chiusura serale attivitĂ  piazza Dante Viareggio
Ordinanza chiusura serale attivitĂ  piazza Dante ViareggioOrdinanza chiusura serale attivitĂ  piazza Dante Viareggio
Ordinanza chiusura serale attivitĂ  piazza Dante Viareggio
 
Introduction Ajilon Technology
Introduction Ajilon TechnologyIntroduction Ajilon Technology
Introduction Ajilon Technology
 
CorazĂłn
CorazĂłnCorazĂłn
CorazĂłn
 
Presentacion grafeno
Presentacion grafenoPresentacion grafeno
Presentacion grafeno
 

Similar to Ijarcet vol-2-issue-2-342-346

computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe. ShohanaakterKakon
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Ensuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEnsuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
 
Effective Printing Text using Bluetooth Technology from Android Application
Effective Printing Text using Bluetooth Technology from Android ApplicationEffective Printing Text using Bluetooth Technology from Android Application
Effective Printing Text using Bluetooth Technology from Android Applicationijtsrd
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
instant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fiinstant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fiINFOGAIN PUBLICATION
 
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneSecured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneIRJET Journal
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxGaytriDhingra1
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile ComputingSara Alvarez
 
Iaetsd wireless printer fastener using raspberry pi
Iaetsd wireless printer fastener using raspberry piIaetsd wireless printer fastener using raspberry pi
Iaetsd wireless printer fastener using raspberry piIaetsd Iaetsd
 
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsYogeshIJTSRD
 
Widipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directWidipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
 
AndriodMobileComputingAssignment
AndriodMobileComputingAssignmentAndriodMobileComputingAssignment
AndriodMobileComputingAssignmentRebecca Patient
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database foreSAT Publishing House
 

Similar to Ijarcet vol-2-issue-2-342-346 (20)

computer network technology in modern universe.
computer network technology in modern universe.        computer network technology in modern universe.
computer network technology in modern universe.
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Ensuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert SystemEnsuring Security in Emergency through SMS Alert System
Ensuring Security in Emergency through SMS Alert System
 
Effective Printing Text using Bluetooth Technology from Android Application
Effective Printing Text using Bluetooth Technology from Android ApplicationEffective Printing Text using Bluetooth Technology from Android Application
Effective Printing Text using Bluetooth Technology from Android Application
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
instant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fiinstant message transfer between two smart phones using wi fi
instant message transfer between two smart phones using wi fi
 
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneSecured Way Of Offloading Mobile Cloud Process For Smart Phone
Secured Way Of Offloading Mobile Cloud Process For Smart Phone
 
WNA.pdf
WNA.pdfWNA.pdf
WNA.pdf
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Iaetsd wireless printer fastener using raspberry pi
Iaetsd wireless printer fastener using raspberry piIaetsd wireless printer fastener using raspberry pi
Iaetsd wireless printer fastener using raspberry pi
 
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless SolutionsWireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
 
Widipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directWidipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte direct
 
AndriodMobileComputingAssignment
AndriodMobileComputingAssignmentAndriodMobileComputingAssignment
AndriodMobileComputingAssignment
 
Dynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database forDynamic interaction of mobile device and database for
Dynamic interaction of mobile device and database for
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 
Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097Volume 2-issue-6-2095-2097
Volume 2-issue-6-2095-2097
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Ijarcet vol-2-issue-2-342-346

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013 All Rights Reserved © 2013 IJARCET 342 Abstract— This paper discusses about the software which is developed for the Android mobile devices for widely used in the Business fields as well as our day to day life activities. In this era of paperless offices and digital documents, you'd think the paper and ink fax machine might finally be ready to retire. But faxing is still an essential part of doing business for certain types of documents (legal contracts, for example) and certain industries, such as public relations. Although there are some similar technologies developed for document faxing, there is main issue of security. By using this software we will fax the document through mobicloud using Android. There is not an issue of third party involved as like internet faxing, so security can achieved easily. For providing security we are using RSA algorithm for encryption and decryption. This paper discusses the proposed system, overview of the design, the various modules of the system and its implementation. Index Terms - Faxing, Mobicloud, Security, Encryption, Decryption. I. INTRODUCTION What can't you do with a cell phone these days? The latest models allow you to take pictures, record movies, watch TV, play music, browse the Internet, send e-mails and even make the occasional phone call. But what if you want to use your cell phone's multimedia technology for more than just entertainment? What if you actually need to get some work done? No problem. With a simple camera phone and some new software, you can turn any mobile phone into a scanner, fax machine and copier. Camera phones are everywhere. According to 2007 statistics, 79 percent of cell phones sold in the United States had a built-in digital camera An estimated 1 billion camera phones are in use around the world .Some cell phone manufacturers have already released megapixel camera phones and there are rumors about a 10-megapixel model hitting the shelves any day now. Scanning and faxing from a cell phone works through the same technology as internet faxing. A document, in this case a digital photograph, is e-mailed to an Internet fax service that converts the digital photo into fax data. The fax service then sends the fax to the recipient over a phone line. The cool thing about these new cell phone "scan and fax" services is that they can optimize and compress camera phone images into clear, readable PDF documents. Using special imaging algorithms, the cell phone scanning software can take a photo of an open book with shadows in the crease and curved pages and turn it into a at image with uniform background color and sharp text. The software also simplies the image, getting rid of unnecessary digital noise to make the smaller and easier to send over a cellular data network. Next implementation is that we can send the document via cloud to the destination. This is same like mobile faxing except we are using mobicloud technology in this system. At the same time when mobile becoming so popular, cloud computing [2] is also becoming popular. Through the development of cloud computing, service providers no longer need to worry about resource management. Resources are managed by cloud providers, and service providers can use resources depending on their demands. In addition, users can access data and services anytime and anywhere. This lets users share data more easily than before. Users can access the same data in the same way from any device.In our application we are using hybrid application of Mobile and cloud computing known as Mobicloud[3]. Literature Survey: Recent Market shows that document faxing activity is very important in our day to day life. There are many ways through we can fax the document from source to destination. As this all have some advantages also has certain disadvantages related to them. We can fax the document using Fax machine, Internet and mobile phones. A. Using Fax machine: This is a very traditional type of document fax. In this type of system whenever a sender wants to send some documents to the destination he should have paper and fax machine. Using his fax machine he can send a document and receiver will receive the same with his side fax machine. At one time, fax machines were a very common way to send documents from one location to another. Fax machines are still used today but are not considered as reliable as other options that are available. To send a fax, both the sender and the receiver must have access to fax machines. If access is not available, there are stores--such as Kinko's, Office Depot and Staples--that allow you to fax documents from the store for a fee. Advantages:- 1.You only need a fax and a telephone line to be able to fax. 2.It does not cost you more than a normal phone cost per minute. 3. Sometimes it is important to receive a document as quickly as possible. Fax machines are a great option if it is a paper that cannot easily be sent through email. DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID Swapnali Gharat , Prajakta Rajput, Jayashree Patil, Snehal Sonavane
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013 343 4. One of the key advantages of fax machines is that they provide an instant hard copy of a document. This removes the chance that an email attachment can be deleted or an online correspondence erased in the case of a hard drive failure or computer crash. For businesses that keep paper copies of official correspondence, fax machines speed up the process by removing the need to receive an email and then print it later for filing. Instead, everything happens at once. Disadvantages:- 1. The receiving party should have a fax. 2. The receiving party should have a physical paper. 3. Needs a telephone line. 4. You don't have to worry about just your own fax machine when you are faxing a document. You must be concerned about the availability of the fax machine of the person to whom you are faxing a document. To avoid possible problems with paper jams or a lack of ink in the fax machine, another person must be able to confirm receipt of the fax and that it printed correctly.[6] B.Using Internet: With Internet faxing, any document that can be attached to an email can be faxed to an analog fax machine. That includes Microsoft Word documents, PDF and scanned images. Internet faxing is a hosted service, meaning you don't need to buy and install fax servers, modems and special software. Instead, you subscribe to a third-party Internet faxing service that converts e-mails to faxes and faxes to e-mails for you. Here's how you send a fax using Internet faxing: 1.Your subscription Internet-fax service assigns you a toll-free or regular fax number. 2. The sender dials that number and then sends the fax from a regular fax machine. 3. The subscription service receives the fax, converts the data into an e-mail attachment and sends it to your e-mail address. 4. To read the fax, you simply open the attachment. Since e-mail is the only application required to send and receive Internet faxes, faxes also can be sent from a handheld device[5]. Advantages:- 1.There are no busy signals to contend with since there is no dialing to be done. 2.You dont have to tie up your phone line in order to send a fax. Disadvantages:- 1.You will have to have a scanner in order to fax a hard copy document. C .Using Mobile Phone: Scanning and faxing from a cell phone works through the same technology as Internet technology. A document, in this case a digital photograph, is e-mailed to an Internet fax service that converts the digital photo into fax data. The fax service then sends the fax to the recipient over a phone line. Advantages:- 1.In this case you need not have a scanner. 2.You need not have a fax machine. Disadvantages:- 1.As third party involves there is issue of security. II.PROPOSED SYSTEM Our system allows a smart phone user to capture virtually any type of document whether an expense receipt, an insurance claim , driving license etc, and deliver it to needed destination via cloud. It is operating as a kind of mobile fax .As we are using mobile as well as cloud for this purpose we can call this system as faxing using mobicloud. Steps involved in Proposed System:- 1.Sender will Capture an image/ document using Camera. 2.Encrypt the document. 3.Upload/Push encrypted data on to cloud. 4.Receiver will connect to cloud 5.Retrieve the document/data. 6.Decrypt the document. 7.Get original Basic Structure: Fig 1.System Overview
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013 All Rights Reserved © 2013 IJARCET 344 III.MODULER DESIGN Our proposed system is divided into four distinct modules described as follows: 1.User authentication: Initially, when the user runs the application for the first time, a login screen will be displayed that will prompt the user to enter the username and password required for authentication if he is already signed member otherwise asked for new user sign in.Only when the user enters the correct username and password, a “success” message will be displayed and the user will get authenticated and directed to the next screen. 2. Search User:-Whenever any sender want to send some data to receiver he will search that receiver to ensure that receiver is authenticated user. In Search user application will show only that much users who are authenticated. And you have to select receiver from them. 3. Select File:-When user get authenticated and select receiver he will prompt to select file which he/she want to send to particular user. 4. Key Management:-This is one important module of our application. As we are using RSA for encryption and decryption we are using public as well as private keys. So in this module management of this keys are carried out. 5. Encrypt File:-In this module we are encrypting the Data or file which you want to send before uploading on cloud. We are performing encryption using RSA .This will be carried out at sender side only. 6. Transmit File:- After encryption encrypted data will be uploaded on cloud. 7. Transmit Key:-After transmitting key sender will send one private key to receiver for performing decryption at receiver side via SMS. 8. Retrieve File:-After getting notification receiver will retrieve the encrypted data from cloud. 9. Decrypt data:-Using private key receiver will decrypt the data and get original data. IV. TECHNICAL REQUIREMENTS Software requirements of our system are: 1. Windows XP/ Windows 7 Operating System 2. Android mobile Operating System 3. Eclipse IDE 4. NetBeans As far as the hardware requirements are concerned, the User would require an Android OS based Smartphone. V. IMPLEMENTATION For implementing this application we are using softwares like Netbeans , eclipse, ADT and java .We have done all GUI Using Netbeans and Eclipse and all programming has been done in Java. Our proposed system is divided into four distinct modules described as follows: A. User Authentication The user authentication module on the client side involved the development of a login screen in the application. For this purpose, standard Graphical User Interface (GUI) that consists of buttons and textboxes were developed. The button is also associated with an action that sends the input parameters in the textboxes to the remote database via a web service. 1.Sign In: Sign In is an activity in which user authentication carries out by a system. When application starts after welcome screen you will see the screen as in fig.2. This screen asks you about your username and passwords. If you are registered user then you can provide your username and password but if you are not registered then you can register yourself using sign up. Fig. 2.Sign In Screen
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013 345 2.Sign Up: If user is not registered he can register using sign up. Sign up is best option for new users to get registered. You have to fill your all information as shown in fig 3. Like your Name, address, username and password etc. Then application will store his/her new username and passwords in the database and he /she becomes registered user. After sign up whenever user want to login the application he can login with this username and password which are provided during sign up. Fig 3.Sign Up Screen B. Main Menu After authentication User will provided with main menu screen. This will show what menus sender can use. As you can see in fig 4. there are various menus provided for user like search user, select file , key management etc. Fig 4.Main Menu Screen C.Search User: There are many users those are registered for the application. As you can see in the fig.5 this module is used to select receiver from authenticated users based on name or user Id.
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 2, February 2013 All Rights Reserved © 2013 IJARCET 346 Fig 5.Search User Screen Also we have implemented modules like send file, encrypt file etc. For sending file we have provided three ways. They are as follows: a. Insecure transmission: In this type of transmission there is no security provided for data transmission. b. Secure Transmission: In this type of transmission we will encrypt the data using RSA[4] and then send it on cloud. c. Ultrasecure Transmission: In this type of transmission we are encrypting the server key using RSA[4] then the output of RSA will encrypt with DES and this password will send to receiver. VI. FUTURE SCOPE In future our system can be used in applications like government documents can be signed by a third party authenticator in order to provide e documents like bonafide etc. VII. CONCLUSION In this paper, an Android based mobile application for Document Faxing through mobicloud is presented. As we all know that now a days faxing is very important activity so there are many ways to do that but all existing system have some limitations. So to overcome all the limitations of existing system we are proposing a new system for document faxing Using MOBICLOUD. This application offers reliability, time savings and easy transfer of data with security. Also we are trying to contribute our efforts to save trees as we are not using any paper for faxing. REFERENCES [1] Macro Andre Guerra, Claudia Mariline Francisco, RuiNeves Madeira, “Portable Lab: Implementation of Mobile remote laboratory for Android platform”, an IEEE paper Portugal. [2] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia, Above the clouds: A Berkeley view of cloud computing, Technical Report UCB/EECS-2009-28, EECS Department, U.C. Berkeley,2009. [3] Ashwin Manjunatha, Ajith Ranabahu, Amit Sheth and Krishnaprasad Thirunarayan” MobiCloud - Making Clouds Reachable: A Toolkit for Easy and Efficient Development of Customized Cloud Mobile Hybrid Application” Ohio Centre of Excellence in Knowledge-Enabled Computing (Kno.e.sis) Wright State University, Dayton, Ohio 45435. [4] Sachin Mahajan , Santhosh Easo “Performance Evolution of RSA and New Cryptosystem” International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 2, Issue 3, March 2012). [5] Dave Roos ,“How Internet Faxing Works”, http://home.howstuffworks.com [6] Alan Kirk, “Advantages and Disadvantages of Using a Fax ” , http://ehosw.com.