SlideShare a Scribd company logo
“24-HOURS TRACKING SYSTEM IN MOBILES“
A
Project Submission
By
N.SAHITHI (13091D2502)
MASTER OF TECHNOLOGY
SOFTWARE ENGINEERING
Under the guidance of
Mr. P.RAJENDRA PRASAD(P.h.d),
Associate Professor
RAJEEV GANDHI INSTITUTE OF TECHNOLOGY
CONTENTS
 Abstract
 Existing System
 Proposed System
 Hardware & Software Requirements
 Modules
 Conclusion
 References
ABSTRACT
 24hrs Tracking is new application which can
track all the calls and messages and save them
in database.
 It is likely designed to store all the data in a
dedicated database where the data is retrieved
from inbuilt mobile database to database where
we can save the data.
 The principle used for this tracking of data is
designed through an operating system called
ANDROID technology.
EXISTING SYSTEM
 At present in all ANDROID mobile
applications there is only a limited call log
memory and can be erased with in short span
of time.
 This technology cannot hold the call log
history for longer times and it can store limited
data.
 By this an individual cannot be able to save the
call log history and retrieve it after few days.
PROPOSED SYSTEM
 It provides full fledged extended unlimited
memory to save the call log history.
 we can save the history for longer times and
can retrieve when needed without any
problems.
ADVANTAGES
 This software is used to help the people to store
their important call log lists permanently.
 It is also used for parents to track the activities
done by their children.
HARDWARE REQUIREMENTS:
 Processor : Intel Pentium-IV and above
 Hard disk : 80GB Min.
 RAM : 512MB Min.& Above
 Others :If any applicable
SOFTWARE REQUIREMENTS:
 Front End : Java
 Backend : SQL
 Operating System : Windows-XP
 Frame work : Android
MODULES
 User Authentication
 Storing Details in the Database
 Supportable Devices
USER AUTHENTICATION
 All the data is stored in database which we can
retrieve any time by giving particular date in
the dialog box.
 If any call log or messages exists the database
shows the data in the screen or else it shows
there is no data exists in the database on that
day.
 So we can move on to other date check
another one in the data base.
STORING DETAILS IN THE DATABASE
 You can able to store all the data in the
database and u can retrieve whenever u
needed.
 The users may think it is an important
application because it is the one application
which is giving the importance to the data
which important to people who may to tracks
their data and stores automatically in the
database.
SUPPORTABLE DEVICES
 Android is a Linux-based operating system for
mobile devices such as smart phones and tablet
computers.
 It is developed by the Open Handset
Alliance, led by Google, and other
companies.
 Android supports connectivity technologies
including GSM, CDMA, Bluetooth, Wi-Fi etc.
ANDROID BASED SMART PHONE
USECASE DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
MESSAGES SELECTION ON A PARTICULAR DATE
SELECTING A SPECIFIC DATE
CHOOSE MESSAGES OR CALLOG
DISPLAY MESSAGE CONTENT
CALLOG SELECTION
DISPLAYING CALLOG CONTENT
CONCLUSION
 This application is useful for tracking daily
messages and incoming calls into database
and we can see whenever we want
messages and incoming calls on particular
date.
REFERENCES
 www.developers.android.com
 www.androidtools.com
 www.stackoverflow.com
Mobile App to Store Call Log

More Related Content

What's hot

Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
Ganeshdev Chavhan
 
Spyware Adware
Spyware AdwareSpyware Adware
spyware
spyware spyware
spyware
maaza mohammed
 
Spy Software
Spy SoftwareSpy Software
Spy Software
spyindia01
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Vikas Patel
 
Spyware
SpywareSpyware

What's hot (8)

Spyware and key loggers
Spyware and key loggersSpyware and key loggers
Spyware and key loggers
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
spyware
spyware spyware
spyware
 
Spy Software
Spy SoftwareSpy Software
Spy Software
 
Spyware
SpywareSpyware
Spyware
 
acTAUR
acTAURacTAUR
acTAUR
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Spyware
SpywareSpyware
Spyware
 

Similar to Mobile App to Store Call Log

Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
ijsrd.com
 
Android
AndroidAndroid
Android
aktash12
 
From Mobile to MongoDB: Store your app's data using Realm
From Mobile to MongoDB: Store your app's data using RealmFrom Mobile to MongoDB: Store your app's data using Realm
From Mobile to MongoDB: Store your app's data using Realm
Diego Freniche Brito
 
Google android white paper
Google android white paperGoogle android white paper
Google android white paperSravan Reddy
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
OWASP
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Editor IJCATR
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
Santhosh Kumar
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, androidJehad2012
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
chennaijp
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
JPINFOTECH JAYAPRAKASH
 
Android studio feature
Android studio featureAndroid studio feature
Android studio feature
xvier3453
 
Know all about android development
Know all about android developmentKnow all about android development
Know all about android development
Deepika Chaudhary
 
Implementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine onImplementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine on
eSAT Publishing House
 
Introduction to Android Development Part 1
Introduction to Android Development Part 1Introduction to Android Development Part 1
Introduction to Android Development Part 1
Kainda Kiniel Daka
 
Mobile Android and Network
Mobile Android and NetworkMobile Android and Network
Mobile Android and NetworkPadma Sankar
 
Android ak
Android akAndroid ak
Android ak
88130359
 
Android
AndroidAndroid
Optimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAOptimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CA
Vivek Raj Agarwal
 
Accident detection
Accident detection Accident detection
Accident detection
Samana Rao
 

Similar to Mobile App to Store Call Log (20)

Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
 
Android
AndroidAndroid
Android
 
From Mobile to MongoDB: Store your app's data using Realm
From Mobile to MongoDB: Store your app's data using RealmFrom Mobile to MongoDB: Store your app's data using Realm
From Mobile to MongoDB: Store your app's data using Realm
 
Google android white paper
Google android white paperGoogle android white paper
Google android white paper
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
Android– forensics and security testing
Android– forensics and security testingAndroid– forensics and security testing
Android– forensics and security testing
 
Ch1 hello, android
Ch1 hello, androidCh1 hello, android
Ch1 hello, android
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Android studio feature
Android studio featureAndroid studio feature
Android studio feature
 
Know all about android development
Know all about android developmentKnow all about android development
Know all about android development
 
Implementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine onImplementation of sql server based on sqlite engine on
Implementation of sql server based on sqlite engine on
 
Introduction to Android Development Part 1
Introduction to Android Development Part 1Introduction to Android Development Part 1
Introduction to Android Development Part 1
 
Android my
Android myAndroid my
Android my
 
Mobile Android and Network
Mobile Android and NetworkMobile Android and Network
Mobile Android and Network
 
Android ak
Android akAndroid ak
Android ak
 
Android
AndroidAndroid
Android
 
Optimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CAOptimization Of Storage Management In Android - S3CA
Optimization Of Storage Management In Android - S3CA
 
Accident detection
Accident detection Accident detection
Accident detection
 

More from Mphasis

SMAC
SMACSMAC
SMAC
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Automation
AutomationAutomation
Automation
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
Io t 22
Io t 22Io t 22
Io t 22
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
SMAC
SMACSMAC
SMAC
Mphasis
 
IoT
IoTIoT
IoT
Mphasis
 
Automation
AutomationAutomation
Automation
Mphasis
 

More from Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Mobile App to Store Call Log

  • 1. “24-HOURS TRACKING SYSTEM IN MOBILES“ A Project Submission By N.SAHITHI (13091D2502) MASTER OF TECHNOLOGY SOFTWARE ENGINEERING Under the guidance of Mr. P.RAJENDRA PRASAD(P.h.d), Associate Professor RAJEEV GANDHI INSTITUTE OF TECHNOLOGY
  • 2. CONTENTS  Abstract  Existing System  Proposed System  Hardware & Software Requirements  Modules  Conclusion  References
  • 3. ABSTRACT  24hrs Tracking is new application which can track all the calls and messages and save them in database.  It is likely designed to store all the data in a dedicated database where the data is retrieved from inbuilt mobile database to database where we can save the data.  The principle used for this tracking of data is designed through an operating system called ANDROID technology.
  • 4. EXISTING SYSTEM  At present in all ANDROID mobile applications there is only a limited call log memory and can be erased with in short span of time.  This technology cannot hold the call log history for longer times and it can store limited data.  By this an individual cannot be able to save the call log history and retrieve it after few days.
  • 5. PROPOSED SYSTEM  It provides full fledged extended unlimited memory to save the call log history.  we can save the history for longer times and can retrieve when needed without any problems.
  • 6. ADVANTAGES  This software is used to help the people to store their important call log lists permanently.  It is also used for parents to track the activities done by their children.
  • 7. HARDWARE REQUIREMENTS:  Processor : Intel Pentium-IV and above  Hard disk : 80GB Min.  RAM : 512MB Min.& Above  Others :If any applicable SOFTWARE REQUIREMENTS:  Front End : Java  Backend : SQL  Operating System : Windows-XP  Frame work : Android
  • 8. MODULES  User Authentication  Storing Details in the Database  Supportable Devices
  • 9. USER AUTHENTICATION  All the data is stored in database which we can retrieve any time by giving particular date in the dialog box.  If any call log or messages exists the database shows the data in the screen or else it shows there is no data exists in the database on that day.  So we can move on to other date check another one in the data base.
  • 10. STORING DETAILS IN THE DATABASE  You can able to store all the data in the database and u can retrieve whenever u needed.  The users may think it is an important application because it is the one application which is giving the importance to the data which important to people who may to tracks their data and stores automatically in the database.
  • 11. SUPPORTABLE DEVICES  Android is a Linux-based operating system for mobile devices such as smart phones and tablet computers.  It is developed by the Open Handset Alliance, led by Google, and other companies.  Android supports connectivity technologies including GSM, CDMA, Bluetooth, Wi-Fi etc.
  • 16. MESSAGES SELECTION ON A PARTICULAR DATE
  • 22. CONCLUSION  This application is useful for tracking daily messages and incoming calls into database and we can see whenever we want messages and incoming calls on particular date.