SlideShare a Scribd company logo
Presented by
Chaitanya Lakshmi V (1GA10EC022)
Divya B N (1GA10EC026)
Geetha P (1GA10EC027)
Geethanjali M N (1GA10EC028)
Under the guidance of
Dr. H.S.Manjunatha reddy
INDEX
 INTRODUCTION
 PROBLEM DEFINITION
 DATA FLOW DIAGRAM
 SEQUENCE OF APPLICATION
 ALGORITHM
 RESULT AND ANALYSIS
 CONCLUSION
 FUTURE ENHANCEMENT
 REFERENCES
INTRODUCTION
 ANDROID
operating system, middleware, key applications.
 FEATURES
 Application framework
 DVM
 Integrated browser
 Optimized graphics
 Handset layouts
ANDROID ARCHITECTURE
PROBLEM DEFINITION
 Android mobile
 Mobile lost
 Data lost
 Misuse of data
DESCRIPTION OF APPLICATION
 Access phone by SMS
 Backup of data
 Wipe of data
 Sound
 Stop
DATA FLOW DIAGRAM
PREFERENCES
AND
SETTINGS
SIM
CHANGE
? SI
TRUE
FALSE
SEND SMS
IDLE
USER
FIG2.1 : Block diagram for the sim check
SMS LISTENER
BACKUP
DATA
WIPE DATA
PLAY THEFT
AUDIO
OBTAINS
LOCATION
SEND EMAIL
FORM
CONTACT
FILE
TELEPHONY
MANAGER
BACKUP
WIPE
SOUND
LOCATE
Fig 2.2 : Block diagram for the sms controller
SEQUENCE IN WHICH APPLICATION
RUNS
1. Finding IMSI number of the current sim.
2. Matches with the previous IMSI number.
3. Configuring with application.
4. Updating the sms receiver number
5. Updating the email-id.
6. If sim is changed, send message to the receiver’s number.
7. Sms communication/ remote communication.
8. SMS “backup” – data sent to the mail.
9. SMS “sound” – voice alarm starts.
10. SMS “wipe” – data deletes from memory card.
11. SMS “stop”- voice alarm stops.
12. SMS “loc” – connecting with GPS, obtain latitude and longitude
values and plot on the map.
ALGORITHM
 Class LBSgeocoding activity
Step 1. Declare phone number variable as static string.
Step 2. Initialize MINIMUM_DISTANCE_CHANGE
&MINIMUM_TIME_BETWEEN_DISTANCE as private under public
class.
Step 3. Declare Location_manager as Protected.
Step 4. Call the function simcheck boolean type
Step 5. Check for the new incoming messages using bundle class.
Step 6. If there is a new message, pdus class contains message details.
Step 7. The length of the obtain message is assigned to msgs variable.
Step 8. Read the message using for loop,
Step 9. The incoming number and messages are stored in the string variable incomingno
Step 10. A recorded voice which is saved as R.raw.voice is assigned to
MediaPlayermp
Step 11. msgs which is in byte datatype is converted to string & saved as string
body variable.
Step 12. Condition check
Step 13. If the body contains “sound”, the recorded voice starts ringing for 5 times.
Step 14. If the body contains “stop”, the recorded voice stops ringing.
Step 15. If the body contains “Backup” it jumps to MailsenderActivity class.
Step 16. If the body contains “wipe” it jumps to wipesms class.
Step 17. If the body contains “locate” it jumps to showcurrentlocation class.
Step 18. In wipesms class we have two modules, wipesms( ) & contactwipe( )
 Public class wipesms:
Step 1. Key word uri parse is used, this specifies the path which contains the files
to be deleted.
Step 2. The messages to be deleted is obtained in the contentresolver variable
using function get.contentresolver.
Step 3. Again uri parse is used to specify the conversation path and path of the
each thread to be deleted.
 Public class ContactWipe:
Step 1. Variable cursor is used to move the first contact by using column index
function.
Step 2. Uri.appended specifies the path of the contacts.
Step 3. Using cr.delete the first contact is deleted, and this is repeated till the last
contact is deleted.
 Sim change check of Boolean type:
Step 1. The telephony services to be provided are assigned to a variable mtelephonymgr.
Step 2. Using the services, a function get.simserialnumber obtains the IMEI number and
assigns to the current sim.
Step 3. Condition check:
 Message: same sim using
 Else message: sim changed.
 Public class ShowCurrentLocation
Step 1. A predefined class locationmanager.GPS is called, this switches on the
GPS of the mobile.
Step 2. Condition check:
 If location
 Obtain latitude and longitude values in the specified format
 Else nothing
Step 3. Using these values, the Lbsgeocodingactivity traces the location and sends
the message.
 Public class MyLocationListener
Step 1. Updates the location for every 3000 milli seconds.
 Public class MailSender Activity
Step 1. Passes parameter to the Gmailsender which is an in built class.
Step 2. Contacts saved in .Vcf extention.
Step 3. Complete .Vcf file is saved in the contactsBU floder.
Step 4. ContactsBU along with .Vcf is again saved in the Vfile variable.
Step 5. Call Vcard string function
Step 6. Shared preferences is a function to obtain the number and mail id which is
saved in the application.
Step 7. Specify the mail id in the variable email.
Step 8. Function sender.sendmail sends the Vfile folder to the mail id
Step 9. Contacts to be moved in the sequence is done by a function getvcardstring.
Step 10. First contacts is moved and cursor increments and this repeats till the last
contacts.
Fig: screen shots during execution.
RESULTS AND ANALYSIS
Fig : screen shots in the mobile
Fig: Screen shots of the messages
ADVANTAGES AND DISADVANTAGES
Advantages
•Application is more reliable.
•The system provides a better solution to decrease false detection among people.
•The cost of the application is reduced by the marketers to make it avilable for many users.
•There is no need of training required for the users
•The confidential data can be taken backup.
•Fast and easy development.
Disadvantages
• Android mobiles are costly.
• The application does not work when there is no network.
• The social contact may not respond.
• Application doesn’t support for all mobiles except android.
CONCLUSION
 This application is used when the mobile is lost.
 We can avoid misuse of the data in the mobile and can also take backup of the
data that is required to us.
 Tracking is also made easy by getting the latitude and longitude values
indicating the location of the mobile.
 An audio is been set for easy identification of the lost mobile
FUTURE ENHANCEMENT
 The application can be enhanced in two different ways
 Without network coverage.
 Should support on other OS.
REFERENCES
 [1] Chung. C.-C., Wang. S.-C., Huang. C. Y., and Lin. C.-M, “Mobile theft
control using android”, Computational and Information Sciences
(ICCIS), 2011 International Conference ,Vol.14,issue.4,pp.20-29,2004.
 [2] Piyare. R. and Tazil. M, “Luxus sms controller”, Information Society
(i-Society), 2012 International Conference,Vol.22,isssue.7,PP.73-
88,2001.
 [3] Gao.Yongqing , Zhou.Chunlai , Shang.Dan, “A Smart Phone Anti-
theft Solution Based on Locking Card of Mobile Phone”, Computational
and Information Sciences (ICCIS), 2011 International Conference,
Vol.11,issue.22,pp.111-122,2008.
 [4] Sadagopan. V.K. ; Rajendran U. “Anti theft control system design
using embedded system”,Vehicular Electronics and Safety (ICVES), 2011
IEEE International Conference,Vol.35,issue.14,pp.60-65,june 2011.
 [5] Al-Ali, A.R. and AL-Rousan. M, “Design & Development of a GSM
Based Vehicle Theft Control System”, Advanced Computer Control,
2009. ICACC '09. International Conference, vol. 40, issue 1, pp. 28-34,
1994.
THANK YOU

More Related Content

Similar to project presentation.pptx

Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
Rahul kulshrestha
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
TELKOMNIKA JOURNAL
 
Scaling mobile dev teams
Scaling mobile dev teams Scaling mobile dev teams
Scaling mobile dev teams
Priyank Gupta
 
Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
ijsrd.com
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET Journal
 
Remote Data Acquisition from Android Mobile
Remote Data Acquisition from Android MobileRemote Data Acquisition from Android Mobile
Remote Data Acquisition from Android Mobile
IRJET Journal
 
Sound Profile Switching
Sound Profile SwitchingSound Profile Switching
Sound Profile Switching
IRJET Journal
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance Service
IRJET Journal
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
TELKOMNIKA JOURNAL
 
Flutter-Dart project || Hotel Management System
Flutter-Dart project || Hotel Management SystemFlutter-Dart project || Hotel Management System
Flutter-Dart project || Hotel Management System
Jiangxi University of Science and Technology (江西理工大学)
 
Mobile based social encyclopedia
Mobile based social encyclopediaMobile based social encyclopedia
Mobile based social encyclopedia
University of Lahore
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
IRJET Journal
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
Alexander Decker
 
Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
IRJET Journal
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
IJCSEIT Journal
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
IOSRJVSP
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
Ńirjhor Ánjum
 

Similar to project presentation.pptx (20)

Pppppppppttttttttttttttttttttt
PpppppppptttttttttttttttttttttPppppppppttttttttttttttttttttt
Pppppppppttttttttttttttttttttt
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 
Scaling mobile dev teams
Scaling mobile dev teams Scaling mobile dev teams
Scaling mobile dev teams
 
Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
Remote Data Acquisition from Android Mobile
Remote Data Acquisition from Android MobileRemote Data Acquisition from Android Mobile
Remote Data Acquisition from Android Mobile
 
Sound Profile Switching
Sound Profile SwitchingSound Profile Switching
Sound Profile Switching
 
Advancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance ServiceAdvancement in Android Authentication System Using Direct Significance Service
Advancement in Android Authentication System Using Direct Significance Service
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
Flutter-Dart project || Hotel Management System
Flutter-Dart project || Hotel Management SystemFlutter-Dart project || Hotel Management System
Flutter-Dart project || Hotel Management System
 
Mobile based social encyclopedia
Mobile based social encyclopediaMobile based social encyclopedia
Mobile based social encyclopedia
 
REPORTOF MEMS2
REPORTOF MEMS2REPORTOF MEMS2
REPORTOF MEMS2
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
 
Multi agent based network monitoring and management using jade
Multi agent based network monitoring and management using jadeMulti agent based network monitoring and management using jade
Multi agent based network monitoring and management using jade
 
Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
Android
AndroidAndroid
Android
 

Recently uploaded

Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
LukeRoyak
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
vencislavkaaa
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
pxyhy
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
AlessandroMartins454470
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
Ghh
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
ssuser3e63fc
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
ideatoipo
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
yuhofha
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
Pushpendra Kumar
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
thomasaolson2000
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
yuhofha
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
23211a7274
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
ragingokie
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
alexthomas971
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
PaviBangera
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
andreakaterasco
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
Ghh
 
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
taqyed
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
mmorales2173
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
yuhofha
 

Recently uploaded (20)

Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
一比一原版(UVic毕业证)维多利亚大学毕业证如何办理
 
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdfRECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
RECOGNITION AWARD 13 - TO ALESSANDRO MARTINS.pdf
 
lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789lab.123456789123456789123456789123456789
lab.123456789123456789123456789123456789
 
The Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdfThe Impact of Artificial Intelligence on Modern Society.pdf
The Impact of Artificial Intelligence on Modern Society.pdf
 
How to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and BusinessHow to Master LinkedIn for Career and Business
How to Master LinkedIn for Career and Business
 
一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理一比一原版(YU毕业证)约克大学毕业证如何办理
一比一原版(YU毕业证)约克大学毕业证如何办理
 
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdfDOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
DOC-20240602-WA0001..pdf DOC-20240602-WA0001..pdf
 
Brand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio IBrand Identity For A Sportscaster Project and Portfolio I
Brand Identity For A Sportscaster Project and Portfolio I
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaaInteractive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
Interactive Dictionary AIDS-B.pptx aaaaaaaaaaaaaaaaaaaaaaaaaa
 
Personal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignmentPersonal Brand exploration KE.pdf for assignment
Personal Brand exploration KE.pdf for assignment
 
Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.Personal Brand Exploration Comedy Jxnelle.
Personal Brand Exploration Comedy Jxnelle.
 
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.'Guidance and counselling- role of Psychologist in Guidance and Counselling.
'Guidance and counselling- role of Psychologist in Guidance and Counselling.
 
Andrea Kate Portfolio Presentation.pdf
Andrea Kate  Portfolio  Presentation.pdfAndrea Kate  Portfolio  Presentation.pdf
Andrea Kate Portfolio Presentation.pdf
 
labb123456789123456789123456789123456789
labb123456789123456789123456789123456789labb123456789123456789123456789123456789
labb123456789123456789123456789123456789
 
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
一比一原版(U-Barcelona毕业证)巴塞罗那大学毕业证成绩单如何办理
 
Full Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptxFull Sail_Morales_Michael_SMM_2024-05.pptx
Full Sail_Morales_Michael_SMM_2024-05.pptx
 
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
一比一原版(TMU毕业证)多伦多都会大学毕业证如何办理
 

project presentation.pptx

  • 1. Presented by Chaitanya Lakshmi V (1GA10EC022) Divya B N (1GA10EC026) Geetha P (1GA10EC027) Geethanjali M N (1GA10EC028) Under the guidance of Dr. H.S.Manjunatha reddy
  • 2. INDEX  INTRODUCTION  PROBLEM DEFINITION  DATA FLOW DIAGRAM  SEQUENCE OF APPLICATION  ALGORITHM  RESULT AND ANALYSIS  CONCLUSION  FUTURE ENHANCEMENT  REFERENCES
  • 3. INTRODUCTION  ANDROID operating system, middleware, key applications.  FEATURES  Application framework  DVM  Integrated browser  Optimized graphics  Handset layouts
  • 5. PROBLEM DEFINITION  Android mobile  Mobile lost  Data lost  Misuse of data
  • 6. DESCRIPTION OF APPLICATION  Access phone by SMS  Backup of data  Wipe of data  Sound  Stop
  • 7. DATA FLOW DIAGRAM PREFERENCES AND SETTINGS SIM CHANGE ? SI TRUE FALSE SEND SMS IDLE USER FIG2.1 : Block diagram for the sim check
  • 8. SMS LISTENER BACKUP DATA WIPE DATA PLAY THEFT AUDIO OBTAINS LOCATION SEND EMAIL FORM CONTACT FILE TELEPHONY MANAGER BACKUP WIPE SOUND LOCATE Fig 2.2 : Block diagram for the sms controller
  • 9. SEQUENCE IN WHICH APPLICATION RUNS 1. Finding IMSI number of the current sim. 2. Matches with the previous IMSI number. 3. Configuring with application. 4. Updating the sms receiver number 5. Updating the email-id. 6. If sim is changed, send message to the receiver’s number. 7. Sms communication/ remote communication. 8. SMS “backup” – data sent to the mail. 9. SMS “sound” – voice alarm starts. 10. SMS “wipe” – data deletes from memory card. 11. SMS “stop”- voice alarm stops. 12. SMS “loc” – connecting with GPS, obtain latitude and longitude values and plot on the map.
  • 10. ALGORITHM  Class LBSgeocoding activity Step 1. Declare phone number variable as static string. Step 2. Initialize MINIMUM_DISTANCE_CHANGE &MINIMUM_TIME_BETWEEN_DISTANCE as private under public class. Step 3. Declare Location_manager as Protected. Step 4. Call the function simcheck boolean type Step 5. Check for the new incoming messages using bundle class. Step 6. If there is a new message, pdus class contains message details. Step 7. The length of the obtain message is assigned to msgs variable. Step 8. Read the message using for loop, Step 9. The incoming number and messages are stored in the string variable incomingno Step 10. A recorded voice which is saved as R.raw.voice is assigned to MediaPlayermp Step 11. msgs which is in byte datatype is converted to string & saved as string body variable.
  • 11. Step 12. Condition check Step 13. If the body contains “sound”, the recorded voice starts ringing for 5 times. Step 14. If the body contains “stop”, the recorded voice stops ringing. Step 15. If the body contains “Backup” it jumps to MailsenderActivity class. Step 16. If the body contains “wipe” it jumps to wipesms class. Step 17. If the body contains “locate” it jumps to showcurrentlocation class. Step 18. In wipesms class we have two modules, wipesms( ) & contactwipe( )  Public class wipesms: Step 1. Key word uri parse is used, this specifies the path which contains the files to be deleted. Step 2. The messages to be deleted is obtained in the contentresolver variable using function get.contentresolver. Step 3. Again uri parse is used to specify the conversation path and path of the each thread to be deleted.  Public class ContactWipe: Step 1. Variable cursor is used to move the first contact by using column index function. Step 2. Uri.appended specifies the path of the contacts. Step 3. Using cr.delete the first contact is deleted, and this is repeated till the last contact is deleted.
  • 12.  Sim change check of Boolean type: Step 1. The telephony services to be provided are assigned to a variable mtelephonymgr. Step 2. Using the services, a function get.simserialnumber obtains the IMEI number and assigns to the current sim. Step 3. Condition check:  Message: same sim using  Else message: sim changed.  Public class ShowCurrentLocation Step 1. A predefined class locationmanager.GPS is called, this switches on the GPS of the mobile. Step 2. Condition check:  If location  Obtain latitude and longitude values in the specified format  Else nothing Step 3. Using these values, the Lbsgeocodingactivity traces the location and sends the message.
  • 13.  Public class MyLocationListener Step 1. Updates the location for every 3000 milli seconds.  Public class MailSender Activity Step 1. Passes parameter to the Gmailsender which is an in built class. Step 2. Contacts saved in .Vcf extention. Step 3. Complete .Vcf file is saved in the contactsBU floder. Step 4. ContactsBU along with .Vcf is again saved in the Vfile variable. Step 5. Call Vcard string function Step 6. Shared preferences is a function to obtain the number and mail id which is saved in the application. Step 7. Specify the mail id in the variable email. Step 8. Function sender.sendmail sends the Vfile folder to the mail id Step 9. Contacts to be moved in the sequence is done by a function getvcardstring. Step 10. First contacts is moved and cursor increments and this repeats till the last contacts.
  • 14. Fig: screen shots during execution. RESULTS AND ANALYSIS
  • 15. Fig : screen shots in the mobile
  • 16. Fig: Screen shots of the messages
  • 17. ADVANTAGES AND DISADVANTAGES Advantages •Application is more reliable. •The system provides a better solution to decrease false detection among people. •The cost of the application is reduced by the marketers to make it avilable for many users. •There is no need of training required for the users •The confidential data can be taken backup. •Fast and easy development. Disadvantages • Android mobiles are costly. • The application does not work when there is no network. • The social contact may not respond. • Application doesn’t support for all mobiles except android.
  • 18. CONCLUSION  This application is used when the mobile is lost.  We can avoid misuse of the data in the mobile and can also take backup of the data that is required to us.  Tracking is also made easy by getting the latitude and longitude values indicating the location of the mobile.  An audio is been set for easy identification of the lost mobile
  • 19. FUTURE ENHANCEMENT  The application can be enhanced in two different ways  Without network coverage.  Should support on other OS.
  • 20. REFERENCES  [1] Chung. C.-C., Wang. S.-C., Huang. C. Y., and Lin. C.-M, “Mobile theft control using android”, Computational and Information Sciences (ICCIS), 2011 International Conference ,Vol.14,issue.4,pp.20-29,2004.  [2] Piyare. R. and Tazil. M, “Luxus sms controller”, Information Society (i-Society), 2012 International Conference,Vol.22,isssue.7,PP.73- 88,2001.  [3] Gao.Yongqing , Zhou.Chunlai , Shang.Dan, “A Smart Phone Anti- theft Solution Based on Locking Card of Mobile Phone”, Computational and Information Sciences (ICCIS), 2011 International Conference, Vol.11,issue.22,pp.111-122,2008.  [4] Sadagopan. V.K. ; Rajendran U. “Anti theft control system design using embedded system”,Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference,Vol.35,issue.14,pp.60-65,june 2011.  [5] Al-Ali, A.R. and AL-Rousan. M, “Design & Development of a GSM Based Vehicle Theft Control System”, Advanced Computer Control, 2009. ICACC '09. International Conference, vol. 40, issue 1, pp. 28-34, 1994.