This document summarizes an Android application that allows users to track and secure their devices remotely using SMS messages. The application would allow users to change device settings like volume or wipe data by sending an SMS with their personalized PIN code and the action to be performed. It discusses the need for such an application given many users' willingness to pay large sums to retrieve stolen devices and data. The proposed application would not require an internet connection, increasing its usefulness. It describes the system's design with modules for registration, message reading, and action performance based on verified PIN codes.
Women’s security is a critical issue in today’s world and its very much needed for every
individual to be acting over such an issue. This paper describes a “GPS and GSM based vehicle
tracking and women employee security system” that provides the combination of GPS device
and specialized software to track the vehicle’s location as well as provide alerts and messages
with an emergency button trigger. Now a days due to recently happened cases such as rape by
drivers or colleagues, burglary etc., employee security, especially women employee security has
become the foremost priority of the companies. System uses the Global Positioning System
technology to find out the location of vehicle. The information of vehicle position provided by
the device can be viewed on Google maps using Internet or specialized software. The IT
companies are looking forward to the security problem and require a system that will efficiently
evaluate the problem of women employees security working in nightshifts. This paper focuses on
the proposed model that can be used to deal with the problem of security issue of women
employees using GPS and GSM based vehicle tracking.
Mobile Security Using Android: Locate Your DroidIJERA Editor
For the past several decades, designers have processed security for a wide variety of applications from mobiles to automatic machines. Losing a smart phone can be an especially bad thing, since they are so expensive, and carry so much information. This application needs to be installed before. With this application user has the choice to launch phone tracking and finding cell phone by sending SMS requests to their lost phone and even getting the locations of the phones that are lost. Moreover this application also provides the facility of Simcard locking if the Simcard is changed and the privacy question is not answered along with blocking of all the incoming calls. Even if your cell is on the silent mode with this application you can change the mode of ringing in the phone and can then locate it if it is lost near to you. This application also provides the features of Simcard swap protection, ring alert.
Wireless home automation networks comprise wireless embedded sensors and actuators that enable monitoring and control
applications for home user comfort and efficient home management. This article surveys the main current and emerging solutions
that are suitable for WHANs , including ZigBee, Z-Wave, INSTEON, Wavenis, and IP-based technology. In the EXISTING
SYSTEM, Control of Door is achieved using ZigBee, IR (Infrared sensor), Wi-Fi or by GSM (GLOBAL SYSTEM MOBILE
MANAGEMENT). In the PROPOSED SYSTEM, Same is achieved using Easiest way without touching any sensors.
MODIFICATION of the Project is our implementation, Authenticated users will register to the House Server with set of Questions
and relevant Answer to it along with the Standard PIN Numbers for authentication. Android Application is deployed to verify all
these User will have sent a Voice command for PIN number. IR sensor is deployed to detect Human, If a new user enters to the
home IR is initiated and Camera picks a snap and emails to the all the members in the house. If anyone knows the person then he could share the PIN number and Session Key so that Door can be opened.
Nowadays the smart phones are equipped with touch based screens, enabling the user to interact in an easier and
efficient way, compared to standard buttons. However, such screens require visual navigation, apparently different
to access for the visually impaired.One of the technologies which aid the blind person to call in android mobile is
Virtual Reality. Even though virtual reality is employed to carry out operations the blind person attention is one of
the most important parameter. If the user commits any mistake to use the application it leads to a wrong call. So, in
this paper we suggest technology to reduce the burdens of a blind person “Haptic Technology”. Haptic is the
science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic
concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch
and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed. Further we explained the storage and retrieval of haptic data while working with
haptic devices.
Technology has reshaped the way we interact with the world and access information
with the advent of smartphones. Accordingly, the needs we have and the solutions for our
needs have also changed along with the evolving technology. One of the most affected
matters from technology is communication. With the various options and capabilities,
instant messaging applications have been started to use for communication purpose
which is one of the biggest needs of human being. We can send text messages, video
messages, voice recordings and share locations using these applications. Even further,
we no longer need cell phone calls by GSM operators, and instead prefer these
applications for instant calls, as well as sharing private information with these
applications, not only for personal daily life, also for business need. On the other hand,
these applications bring risks with many benefits. One of them is privacy. We do not want
that these applications can store our personal data as its user. How do our best practices
keep our data? Do they give the necessary attention for privacy? Another fact is that these
applications can be used by criminals to communicate and execute a secret plan. If a
criminal gets caught, what can be obtained as evidence from these messaging
applications? This time we need to know what can be extracted from the mobile device.
This research focuses on forensics analysis of the instant messaging applications on the
Android platform
Women’s security is a critical issue in today’s world and its very much needed for every
individual to be acting over such an issue. This paper describes a “GPS and GSM based vehicle
tracking and women employee security system” that provides the combination of GPS device
and specialized software to track the vehicle’s location as well as provide alerts and messages
with an emergency button trigger. Now a days due to recently happened cases such as rape by
drivers or colleagues, burglary etc., employee security, especially women employee security has
become the foremost priority of the companies. System uses the Global Positioning System
technology to find out the location of vehicle. The information of vehicle position provided by
the device can be viewed on Google maps using Internet or specialized software. The IT
companies are looking forward to the security problem and require a system that will efficiently
evaluate the problem of women employees security working in nightshifts. This paper focuses on
the proposed model that can be used to deal with the problem of security issue of women
employees using GPS and GSM based vehicle tracking.
Mobile Security Using Android: Locate Your DroidIJERA Editor
For the past several decades, designers have processed security for a wide variety of applications from mobiles to automatic machines. Losing a smart phone can be an especially bad thing, since they are so expensive, and carry so much information. This application needs to be installed before. With this application user has the choice to launch phone tracking and finding cell phone by sending SMS requests to their lost phone and even getting the locations of the phones that are lost. Moreover this application also provides the facility of Simcard locking if the Simcard is changed and the privacy question is not answered along with blocking of all the incoming calls. Even if your cell is on the silent mode with this application you can change the mode of ringing in the phone and can then locate it if it is lost near to you. This application also provides the features of Simcard swap protection, ring alert.
Wireless home automation networks comprise wireless embedded sensors and actuators that enable monitoring and control
applications for home user comfort and efficient home management. This article surveys the main current and emerging solutions
that are suitable for WHANs , including ZigBee, Z-Wave, INSTEON, Wavenis, and IP-based technology. In the EXISTING
SYSTEM, Control of Door is achieved using ZigBee, IR (Infrared sensor), Wi-Fi or by GSM (GLOBAL SYSTEM MOBILE
MANAGEMENT). In the PROPOSED SYSTEM, Same is achieved using Easiest way without touching any sensors.
MODIFICATION of the Project is our implementation, Authenticated users will register to the House Server with set of Questions
and relevant Answer to it along with the Standard PIN Numbers for authentication. Android Application is deployed to verify all
these User will have sent a Voice command for PIN number. IR sensor is deployed to detect Human, If a new user enters to the
home IR is initiated and Camera picks a snap and emails to the all the members in the house. If anyone knows the person then he could share the PIN number and Session Key so that Door can be opened.
Nowadays the smart phones are equipped with touch based screens, enabling the user to interact in an easier and
efficient way, compared to standard buttons. However, such screens require visual navigation, apparently different
to access for the visually impaired.One of the technologies which aid the blind person to call in android mobile is
Virtual Reality. Even though virtual reality is employed to carry out operations the blind person attention is one of
the most important parameter. If the user commits any mistake to use the application it leads to a wrong call. So, in
this paper we suggest technology to reduce the burdens of a blind person “Haptic Technology”. Haptic is the
science of applying tactile sensation to human interaction with computers. In our paper we have discussed the basic
concepts behind haptic along with the haptic devices and how these devices are interacted to produce sense of touch
and force feedback mechanisms. Also the implementation of this mechanism by means of haptic rendering and
contact detection were discussed. Further we explained the storage and retrieval of haptic data while working with
haptic devices.
Technology has reshaped the way we interact with the world and access information
with the advent of smartphones. Accordingly, the needs we have and the solutions for our
needs have also changed along with the evolving technology. One of the most affected
matters from technology is communication. With the various options and capabilities,
instant messaging applications have been started to use for communication purpose
which is one of the biggest needs of human being. We can send text messages, video
messages, voice recordings and share locations using these applications. Even further,
we no longer need cell phone calls by GSM operators, and instead prefer these
applications for instant calls, as well as sharing private information with these
applications, not only for personal daily life, also for business need. On the other hand,
these applications bring risks with many benefits. One of them is privacy. We do not want
that these applications can store our personal data as its user. How do our best practices
keep our data? Do they give the necessary attention for privacy? Another fact is that these
applications can be used by criminals to communicate and execute a secret plan. If a
criminal gets caught, what can be obtained as evidence from these messaging
applications? This time we need to know what can be extracted from the mobile device.
This research focuses on forensics analysis of the instant messaging applications on the
Android platform
Online Bus pass generation is useful for user who are facing problems with the current manual work of bus pass
registration and renewal. The user need to register by submitting their details through online .The administrator will
verify the user details and if they are satisfied they will approve bus pass. The pass will be generated and send to
userid. The user can login with their user idno and password and then renewal can be performed
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
In this engaged life, people tend to forget
scheduling their meetings and events that are very
important in their day to day life. They wish to have
someone who keeps on prompting them to lineup the work
and to make sure that they accomplished the scheduled
task on time. The solution to this problem is proposed
through an Android Application named “Nudge” using
artificial intelligence. This application is built using
Android Studio IDE 3.3 released by the Google. The
application is used to trigger alarms based on locations,
where the user can set a reminder to a location and select a
range within which the alarm should be triggered. Once
the user move into that range, the alarm goes on. This
application is also used to set reminders based on the mails
the user receives. Suppose, if a user receives a mail
containing any schedule for a meeting or an event, this
application will automatically set a reminder to that
particular event in the OS calendar. This application also
includes facility to directly set a reminder to the OS
calendar.
Keywords-Location, reminder, alarm, calendar, gmail, date
Industrial automation is very much popular now- a days as it improves profitability, safety and reliability. In
industrial automation control, a wide number of process variables such as, temperature, stream, pressure,
distance, and fluid levels can be detected all the while. By implementing Raspberry Pi and Embedded web
server technology and utilizing local networking standards, industrial parameters can be controlled and
checked distantly. It reduces designing expenses regarding manual arrangements of all involved gadgets. In
this project, a system is created which will monitor automatically the industrial applications, the temperature,
humidity, gas leakages.Camera is utilized for identifying and alerting from undesirable activities or
unauthorized persons including in surrounded region of industry. In the proposed system raspberry pi is
utilized as controller and server, python language is utilized to run the prototype. The Raspberry pi
communicates with the Embedded Web Server. When the information is associated with the web server, it will
store and give the information at required time. PuTTY software are utilized for checking and controlling the
industrial parameters.
An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
Nolong.in: an android based incident notification application with push notif...IJECEIAES
In driving, the most important thing to be considered is safety. The incident problem can happen anytime and anywhere without anyone knowing it before, especially in Cikarang where the level of incident is quite high. It is very important for the public community to act and respond quickly at the time on and around the occurring incident. Nolong.in application is an exact solution because it can send real time notifications to its users. This response is meant to assist individuals who have been using Nolong.in to help other users who need urgent help when the time of incident in order to prevent unwanted situations. In this research, push notification method has been implemented by using Firebase Cloud Messaging (FCM). The result of the research is the notification click ratio is 90.91% and the click time is 1 minute and 27 seconds. Based on the questionnaires’ results given to the community conclude that Nolong.in application is very beneficial for Gojek Cikarang community's safety.
Accessing remote android mobile contentseSAT Journals
not only used for calling purpose. Today all mobile Users are using
android phone and can store images, videos, files, contacts etc. Mobile phones now a day are not only for calling purpose but also
for important work like banking, corporate, education etc. In case, if user forgets mobile at home and wants some important data
from it remotely from one place to another place. For this there are several android applications available for smart phones today
that can help one to get it. This paper is presenting an android app for the same “Accessing Remote Android Mobile Contents”.
This app will take user requirement as input and retrieve it. This application requires internet connection first, if it is connected it
will open login prompt. In which user has to provide unique user id and password which is decided during installation of app.
Once the user is validated by remote mobile phone, user will see a menu on his/her screen. User has to select menu option form
that and send it to remote phone. User will receive data (contacts) from remote mobile.
Keywords: Android, Remote Mobile, Local Mobile, Eclipse.
Remote Phone Access is the eventual remote control tool for the Android Smartphones event access. The events like application actions such as your phone may unlock when you are away and remove the stor-age drive card on your Smartphone or making Blue-tooth on for sending the any kind of personal data from your Smartphone etc. Trust event logger will give you the information of all these actions of what happened and when. To perform all these operations manually, it takes more time to access the device information and also the physical presence of user is needed. To overcome these problems we represent an application called “Trust Event Logger”.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
Online Bus pass generation is useful for user who are facing problems with the current manual work of bus pass
registration and renewal. The user need to register by submitting their details through online .The administrator will
verify the user details and if they are satisfied they will approve bus pass. The pass will be generated and send to
userid. The user can login with their user idno and password and then renewal can be performed
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
In this engaged life, people tend to forget
scheduling their meetings and events that are very
important in their day to day life. They wish to have
someone who keeps on prompting them to lineup the work
and to make sure that they accomplished the scheduled
task on time. The solution to this problem is proposed
through an Android Application named “Nudge” using
artificial intelligence. This application is built using
Android Studio IDE 3.3 released by the Google. The
application is used to trigger alarms based on locations,
where the user can set a reminder to a location and select a
range within which the alarm should be triggered. Once
the user move into that range, the alarm goes on. This
application is also used to set reminders based on the mails
the user receives. Suppose, if a user receives a mail
containing any schedule for a meeting or an event, this
application will automatically set a reminder to that
particular event in the OS calendar. This application also
includes facility to directly set a reminder to the OS
calendar.
Keywords-Location, reminder, alarm, calendar, gmail, date
Industrial automation is very much popular now- a days as it improves profitability, safety and reliability. In
industrial automation control, a wide number of process variables such as, temperature, stream, pressure,
distance, and fluid levels can be detected all the while. By implementing Raspberry Pi and Embedded web
server technology and utilizing local networking standards, industrial parameters can be controlled and
checked distantly. It reduces designing expenses regarding manual arrangements of all involved gadgets. In
this project, a system is created which will monitor automatically the industrial applications, the temperature,
humidity, gas leakages.Camera is utilized for identifying and alerting from undesirable activities or
unauthorized persons including in surrounded region of industry. In the proposed system raspberry pi is
utilized as controller and server, python language is utilized to run the prototype. The Raspberry pi
communicates with the Embedded Web Server. When the information is associated with the web server, it will
store and give the information at required time. PuTTY software are utilized for checking and controlling the
industrial parameters.
An electronic Medical record (EHR) is a of a computerized version of a patient's paper record. Our reality
has been drastically changed by advanced innovation like – PDAs, tablets, and web-empowered gadgets
have changed our day to day lives and the manner in which we impart. Medication is a data rich enterprise.
EHR incorporate the clinical and treatment chronicles of patients, an EHR framework is worked to go past
standard clinical information gathered in a supplier's office and can be a more extensive perspective on a
patient's consideration. Electronic Health Record (EHR) frameworks face issues with respect toinformation
security, honesty and the board. We could execute blockchain innovation to change the EHR frameworks
and could be an answer of these issues. The main goal of our proposed structure is to implement and
execute blockchain innovation for EHR and furthermore to give secure capacity of electronic records by
characterizing granular access rules for the clients of the proposed framework. Thus this structure furnishes
the EHR framework with the advantages of having a versatile, secure and necessary integral chain-based
arrangement
Nolong.in: an android based incident notification application with push notif...IJECEIAES
In driving, the most important thing to be considered is safety. The incident problem can happen anytime and anywhere without anyone knowing it before, especially in Cikarang where the level of incident is quite high. It is very important for the public community to act and respond quickly at the time on and around the occurring incident. Nolong.in application is an exact solution because it can send real time notifications to its users. This response is meant to assist individuals who have been using Nolong.in to help other users who need urgent help when the time of incident in order to prevent unwanted situations. In this research, push notification method has been implemented by using Firebase Cloud Messaging (FCM). The result of the research is the notification click ratio is 90.91% and the click time is 1 minute and 27 seconds. Based on the questionnaires’ results given to the community conclude that Nolong.in application is very beneficial for Gojek Cikarang community's safety.
Accessing remote android mobile contentseSAT Journals
not only used for calling purpose. Today all mobile Users are using
android phone and can store images, videos, files, contacts etc. Mobile phones now a day are not only for calling purpose but also
for important work like banking, corporate, education etc. In case, if user forgets mobile at home and wants some important data
from it remotely from one place to another place. For this there are several android applications available for smart phones today
that can help one to get it. This paper is presenting an android app for the same “Accessing Remote Android Mobile Contents”.
This app will take user requirement as input and retrieve it. This application requires internet connection first, if it is connected it
will open login prompt. In which user has to provide unique user id and password which is decided during installation of app.
Once the user is validated by remote mobile phone, user will see a menu on his/her screen. User has to select menu option form
that and send it to remote phone. User will receive data (contacts) from remote mobile.
Keywords: Android, Remote Mobile, Local Mobile, Eclipse.
Remote Phone Access is the eventual remote control tool for the Android Smartphones event access. The events like application actions such as your phone may unlock when you are away and remove the stor-age drive card on your Smartphone or making Blue-tooth on for sending the any kind of personal data from your Smartphone etc. Trust event logger will give you the information of all these actions of what happened and when. To perform all these operations manually, it takes more time to access the device information and also the physical presence of user is needed. To overcome these problems we represent an application called “Trust Event Logger”.
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
Abstract This paper presents a platform for sharing device oriented mobile information via a local private cloud. The android application helps the user to fetch the device oriented information like missed call history, messages, battery status and GPS. Our system contains a website which helps the user to track all the required information through his personal account. Thus our system helps in making it easier to support new cloud services as output, and our android application helps in setting various triggers to push the device oriented information into the cloud. Keywords: List Android, Device oriented information, Cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
Location sharing and automatic message sender Android ApplicationKavita Sharma
This is the project report of Android Application(Location sharing and Automatic message sender). This report will help users who wants to develop any location based android application.
Abstract: We are making one android application for our college. This application gives the complete details about the college like Admission procedure, various departments’ information etc. In that special job hunting section we are going to provide a new job opening in every one hour duration. The best advantage of these application will be messaging system that we are going to provide in the application. Every student will receive an SMS every hour about the job opening. If teacher wants send any kind of message any group of student, they can directly send the SMS notification to all the students with our messaging system. These help the student of college to be updated always and also attract all students to get admission in our college.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
The project based on mobile application which functions on an Android operating system. The objective of this which
enable the user to locate the mobile phone in a silent mode to General mode when it is misplaced as well as if it is lost and wipe the
data from the device. To create an account the user needs to provide his /her mobile number, a password and 4 trustworthy numbers
this completes the registration process. The application, which is still in a deactivation mode, will operate only when the phone is
misplaced and the user sends the set password/ pass code from one of the 4 trustworthy numbers to one’s own mobile number. This
will change the profile of the misplaced phone i.e. switch it from the silent mode to the sound mode. It will also send an
acknowledgement to the trustworthy number from which the user has sent the message. Furthermore, it will also provide the location
with and also if mobile is lost then we can take back up from another mobile by using same application, we can also wipe the data
remotely by sending the message.
Importance of Programming Language in Day to Day Lifeijtsrd
Because so many people have mobile devices today, there is an increased focus on developing mobile applications. Since there is a high demand for excellent mobile apps, they must be checked. Some businesses experience consumer and financial losses as a result of subpar mobile applications. Due to their variety and complexity, testing mobile apps is the most challenging assignment a variety of operating systems. Although there are emulators and simulators available, they can only test the operating system and not the mobile devices basic functions. Three of the most well known open source mobile app testing frameworks Appium, Robotium, and Solendroid will be discussed in this article. The benefits and drawbacks of these tools, as well as their compatibility with various systems, are listed here. The testing framework that is used will rely on the complexity and use of mobile applications. Madhuri Ratanlal Bohare | Sonal Santosh Harmalkar "Importance of Programming Language in Day to Day Life" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57547.pdf Paper URL: https://www.ijtsrd.com.com/computer-science/programming-language/57547/importance-of-programming-language-in-day-to-day-life/madhuri-ratanlal-bohare
Nowadays, Android is the newest mobile device Operating System OS , which is the more popular in mobile device field than any other mobile OS such as i Phone OS, Windows mobile OS and so on. This has been designed to the best first step toward the exciting new open source mobile development. The format of this paper is such that it will take through Android application development. Android applications are developed in Java, especially android studio software and run on the Windows OS. In this paper, the user will be understand about the creation of college information system software such as the java programming coding, Android SDK management and android studio after learning of this application programming coding. This software will be absolutely useful for students and teachers in educational fields because it is included the college information that show in detail. Win Win Maw | Cho Cho Myint | San San Lwin ""College Information System using Android"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22774.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/22774/college-information-system-using-android/win-win-maw
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers