SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 333
SMART COLOR LOCKING SYSTEM FOR ANDROID SMARTPHONES
USERS
Kajale Bhushan M1
, Jambhale Prajakta S2
, Bairagi Ketan A3
, Randhir Sagar S4
1
Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India
2
Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India
3
Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India
4
Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India
Guided By:
Prof. Durugkar S. R., Professor of Computer Engineering, SND College of Engineering Yeola, SPPU, Maharashtra, India.
Abstract
In this proposed system we are going to implement a new way authentication system for android smartphones. As we
know that the each and every person are move around android smartphones instead of PC's, Laptops because of its
friendly access as well as structure it anywhere with light weight. The user are store his personal database or data to
a smartphone where the data more secure for users point of view then the need arises to provide much or high level
security for our smartphone and because of this we are going to introduced a new technique or new way of android
Smartphone authentication system.
Key Words: - Android, Smartphone’s, Screen lock, Authentication.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The user are rapidly moving to a smartphones for matching
the technology. In that the smartphone users the android
user are more because of its friendly nature and open source
nature which will help the user to build or work on any
application is more effectively. In previous day the launcher
gives or provides security for applications. The launcher pro
etc they provide a convenience but not good security the
home launcher currently in market but they will not use
authentication method in Android OS but they need to
provide Authentication for security and the convenience
[1,2,3] in this scenario we will analyze the authentication &
security lock screen problem or launcher & suggest a new
upgraded system for Android smartphones.
2. LITERATURE SURVEY:
Now a days the smartphone users are increasing in huge
manner most of android users. They will perform all the
activity or regular work with respect to his android
smartphone. We can say the desktop or laptop will replace
with smartphones but the smartphone user will look on his
security concern so the need arises how to gives security for
his data. Now a day most of the launcher provides security
for android smartphone but this is not much enough to
provide security for smartphone so we will go to provide
A smart colour authentication system for high level security
for users database or data. For developing proposed system
we will look some related papers are as follow :
 In [1] Slide locking system: In this locking system the
Android and IOS provide a “touch–horizontal slide”
with respect to screen. It does not provide as much
security level and other security applications.
 In [2] Glass locking system: In this locking system the
system based on Android and is provided on Samsung
smartphones. It perform the activity like as Slide Lock
can be dragged in all directions.
 In [3] Keypad locking system: In this locking system
required a four-digit password, so it provides key space
from 0 to 9999.
 In [4] Pattern locking system: In this locking system the
system is depend on users interaction. The system
describes the user authentication is based on nine dots
which will provided by the system. It is based on
attaching one point with respect to other points to make a
password. Accordingly, it provides approximately one
million (= 9P4 + 9P5 + 9P6 + 9P7 + 9P8 + 9!) of key
space. However, if users enter an easy pattern for
convenience, there is weak security power, in this system
the week password also be generated and it is acceptable.
 In [5] Finger scanning system: In this locking system
Atrix smartphone, made by Motorola, supplies a finger
scanning system, which provides both good convenience
and better security. This processes on the screen and low
speed are the main problems in this system.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 334
3. PROPOSED SYSTEM:
In our proposed system our efforts to detect or prevent the
users secure data from third party user. This system is
shown in figure. Re-touching the node is allowed and when
the node is touched it changes its colour up to 7 times so the
user will provide much higher input for his android
smartphone. we allowed user to set any random password
and check where the password is much enough to provide
security or not if it is enough for security concern then save
it and send to the users mail for users point of view to access
it for next use or if the password is not much secure then it
will give a week password message and wait for user input
until they will enter a strong password. In the System, the
Guest mode activity will introduced to give permission for
user to access limited data when the locking system will
apply on your smartphones.
Fig: Android Smartlock Architecture.
In system consist of mainly two parts first will used to set
the smartphone password and second will used to perform
activity for unlock smartphone in that the following parts
perform a main role for completing the activity.
4. SET SCREEN LOCK:
In this locking system when we are going to start or use this
system that time it is necessary to enter the data in proper
manner which will used to define a security for your mobile
or your smartphone. This is a way where we are going to
provide security field in step wise manner. As we know that
the each and every field are affect on security issue. The
steps are first when we start this security app in our mobile
as smartphone the very first use of that software will ask a
security field as follow select password this field are going
to set a password in any style or sequence. Next step is
depend on the first field which is conform password this
field ask user where the entered data is correct or not for
password saving. After the user conformation the app will
store the database to SQLite And switch to next field which
is for Enter Mobile number this field is used for
confirmation of mobile number to give user extra security.
After mobile number conformation the app will show you a
next window which is ask user for his email detail which use
for when user will forget the entered password then this
field will gives the users entered password. Which is present
when user is enter the first time password pattern that time
the app will match user input and send to the users mail
because of this the password will gives to the user. when the
user entered all his detail in each window the last window
will come which is ask user to save the data when user click
on that the all entered data will save and the data will send
to the SQLite database.
5. UNLOCK SMARTPHONE:
The unlock smartphone activity will occur when we want to
try this activity after installing in our phone with proper
setup. When we set this app for security purpose when we
want to unlock screen that time we need to press unlock key
when we press the unlock key the screen display will on and
shows one window which will describe our app security.
This window will contain Enter password this field is used
to allow user for enter the password which user will already
set when the installation is begin. When the user will enter
the password the app will check that entered data into the
SQLite database The SQLite database hold the already
entered password and match that data to entered data when
he match the data it will generate
two field first is the entered data from user is either
acceptable or not if yes then it will tell system the data is
correct and the app will unlock system else the user entered
detail or password is incorrect then switch to the reference
field flow work for user. The guest login feature will also
introduces phone that time user will just shake his
smartphone and user will enter in guest login. The user will
access those data which user will allow using.
6. FLOW OF PROPOSED SYSTEM:
The first condition when user starts to achieve the security
level high for that the user will need to install that app in his
smartphone. After completion of installation of app they will
run this app. The application will start it will ask user select
pattern, conform password, enter mobile number, enter
email address, save information the user will enter a
appropriate data and save all the data with proper manner.
When user will save that data THEY entered password will
send to USER’S mail which will used to remember the
password lifetime for users point of view. After entering the
database it will assign this app as a security app for his
smartphone. When user will start or use that app for his
security app then user will give one window which will ask
user for enter the password then user must enter the
appropriate pattern which user already set at the time of save
the setting.
When USERS ENTER the password the next step is to
recognize users entered password in this step the users
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 335
Author
’s
Photo
Author
’s
Photo
entered data will match existing database which will present
in SQLite database.
In matching the password the two steps or stages are
OCCURRING first is the pattern is correct then unlock the
system and second is the password is incorrect and app will
show a reference flow work to user. The next stage is guest
login when the user will not going to unlock the screen that
time we will going to provide a extra facility guest login
when user will shake the phone that time the users
smartphone will automatically login to a guest user and user
will access those data which user allow for guest user.
7. ALGORITHMIC STRATEGIES TO BE USED
FOR PROPOSED SYSTEM:
 Install app
 Enter appropriate database
 Save the database
 Data will store in SQLite database
 Set screen lock
 Ask for password
 Enter appropriate password
 Match password to SQLite database
 If password is correct unlock screen
 If not gives reference flow work for user3.
CONCLUSIONS
The Proposed system will overcome the existing system
bugs or errors with respect to current working home
launchers’ screen lock system and different improving
security applications which is increasing day by day in
market to provide security for Android smartphones. When
we implement this system the user security need is achieved
most effectively, we are going to improve the user’s
authentication and security level. Android is introduce in
tablets and other digital equipment that will require a much
security. The use of our improved security system ensures
security of secure database.
REFERENCES
[1]. DAI-Labor, “Malicious Software for Smartphones,”
Technical Report, 2008.
[2]. Ken Dunham, “Mobile Malware Attacks and
Defence,” SYNGRESS 2009, 2009.
[3]. Android Security Overview, Android open source
project.
[4]. Design and Implementation of Improved
Authentication System for Android Smartphone
Users, 2012.
BIOGRAPHIES
Kajale Bhushan M.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik
Jambhale Prajakta S.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik
Bairagi Ketan A.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik
Randhir Sagar S.
Computer Department
SND College of Engineering & Research
Center. Yeola Dist. : Nashik.

More Related Content

What's hot

IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
Accessing remote android mobile contents
Accessing remote android mobile contentsAccessing remote android mobile contents
Accessing remote android mobile contentseSAT Journals
 
IRJET - Voice based E-Mail for Visually Challenged
IRJET -  	  Voice based E-Mail for Visually ChallengedIRJET -  	  Voice based E-Mail for Visually Challenged
IRJET - Voice based E-Mail for Visually ChallengedIRJET Journal
 
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKSREMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKSijcsit
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authoritieseSAT Publishing House
 
IRJET- Real-time Eye Tracking for Password Authentication
IRJET- Real-time Eye Tracking for Password AuthenticationIRJET- Real-time Eye Tracking for Password Authentication
IRJET- Real-time Eye Tracking for Password AuthenticationIRJET Journal
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 
IRJET- E-Governance Via Online and Offline Server
IRJET- E-Governance Via Online and Offline ServerIRJET- E-Governance Via Online and Offline Server
IRJET- E-Governance Via Online and Offline ServerIRJET Journal
 

What's hot (16)

IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
april201629
april201629april201629
april201629
 
Accessing remote android mobile contents
Accessing remote android mobile contentsAccessing remote android mobile contents
Accessing remote android mobile contents
 
IRJET - Voice based E-Mail for Visually Challenged
IRJET -  	  Voice based E-Mail for Visually ChallengedIRJET -  	  Voice based E-Mail for Visually Challenged
IRJET - Voice based E-Mail for Visually Challenged
 
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKSREMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
REMOTE CONTROL FOR SMART CLASSROOM WITH BLUETOOTH NETWORKS
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
IOT based Industrial Automation using Raspberry Pi
IOT based Industrial Automation using  Raspberry PiIOT based Industrial Automation using  Raspberry Pi
IOT based Industrial Automation using Raspberry Pi
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Hazard object reporting to respective authorities
Hazard object reporting to respective authoritiesHazard object reporting to respective authorities
Hazard object reporting to respective authorities
 
IRJET- Real-time Eye Tracking for Password Authentication
IRJET- Real-time Eye Tracking for Password AuthenticationIRJET- Real-time Eye Tracking for Password Authentication
IRJET- Real-time Eye Tracking for Password Authentication
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 
IRJET- E-Governance Via Online and Offline Server
IRJET- E-Governance Via Online and Offline ServerIRJET- E-Governance Via Online and Offline Server
IRJET- E-Governance Via Online and Offline Server
 
journal
journaljournal
journal
 

Viewers also liked

Internet Security
Internet SecurityInternet Security
Internet SecurityAvnish Jain
 
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATIONCOLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATIONJournal For Research
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User AuthenticationSarthak Gupta
 
Password Cracking
Password Cracking Password Cracking
Password Cracking Sina Manavi
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayShah Sheikh
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW Neha Tyagi
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 

Viewers also liked (13)

Internet Security
Internet SecurityInternet Security
Internet Security
 
Atm Presentationgp2
Atm Presentationgp2Atm Presentationgp2
Atm Presentationgp2
 
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATIONCOLOUR LOCK SYSTEM FOR USER AUTHENTICATION
COLOUR LOCK SYSTEM FOR USER AUTHENTICATION
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Graphical User Authentication
Graphical User AuthenticationGraphical User Authentication
Graphical User Authentication
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Silent sound technology NEW
Silent sound technology NEW Silent sound technology NEW
Silent sound technology NEW
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Smart color locking system for android smartphones users

Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityKamal Spring
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Passwordijtsrd
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationIRJET Journal
 
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder SurfingIRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder SurfingIRJET Journal
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET Journal
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET Journal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...IJECEIAES
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET Journal
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websitesMike Taylor
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET Journal
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell SystemIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docxCMARIX TechnoLabs
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on smsiCreateWorld
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 

Similar to Smart color locking system for android smartphones users (20)

Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
IRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder SurfingIRJET- Graphical Password to Avoid Shoulder Surfing
IRJET- Graphical Password to Avoid Shoulder Surfing
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple Users
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
 
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
IRJET- 2 FAUS: Two Factor Authentication using Smartwatch and Google Cloud Me...
 
IRJET - Smart Doorbell System
 IRJET - Smart Doorbell System IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docx
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on sms
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

Smart color locking system for android smartphones users

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 333 SMART COLOR LOCKING SYSTEM FOR ANDROID SMARTPHONES USERS Kajale Bhushan M1 , Jambhale Prajakta S2 , Bairagi Ketan A3 , Randhir Sagar S4 1 Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India 2 Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India 3 Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India 4 Student, Computer Engineering , SND College of Engineering, Yeola, SPPU, Maharashtra, India Guided By: Prof. Durugkar S. R., Professor of Computer Engineering, SND College of Engineering Yeola, SPPU, Maharashtra, India. Abstract In this proposed system we are going to implement a new way authentication system for android smartphones. As we know that the each and every person are move around android smartphones instead of PC's, Laptops because of its friendly access as well as structure it anywhere with light weight. The user are store his personal database or data to a smartphone where the data more secure for users point of view then the need arises to provide much or high level security for our smartphone and because of this we are going to introduced a new technique or new way of android Smartphone authentication system. Key Words: - Android, Smartphone’s, Screen lock, Authentication. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The user are rapidly moving to a smartphones for matching the technology. In that the smartphone users the android user are more because of its friendly nature and open source nature which will help the user to build or work on any application is more effectively. In previous day the launcher gives or provides security for applications. The launcher pro etc they provide a convenience but not good security the home launcher currently in market but they will not use authentication method in Android OS but they need to provide Authentication for security and the convenience [1,2,3] in this scenario we will analyze the authentication & security lock screen problem or launcher & suggest a new upgraded system for Android smartphones. 2. LITERATURE SURVEY: Now a days the smartphone users are increasing in huge manner most of android users. They will perform all the activity or regular work with respect to his android smartphone. We can say the desktop or laptop will replace with smartphones but the smartphone user will look on his security concern so the need arises how to gives security for his data. Now a day most of the launcher provides security for android smartphone but this is not much enough to provide security for smartphone so we will go to provide A smart colour authentication system for high level security for users database or data. For developing proposed system we will look some related papers are as follow :  In [1] Slide locking system: In this locking system the Android and IOS provide a “touch–horizontal slide” with respect to screen. It does not provide as much security level and other security applications.  In [2] Glass locking system: In this locking system the system based on Android and is provided on Samsung smartphones. It perform the activity like as Slide Lock can be dragged in all directions.  In [3] Keypad locking system: In this locking system required a four-digit password, so it provides key space from 0 to 9999.  In [4] Pattern locking system: In this locking system the system is depend on users interaction. The system describes the user authentication is based on nine dots which will provided by the system. It is based on attaching one point with respect to other points to make a password. Accordingly, it provides approximately one million (= 9P4 + 9P5 + 9P6 + 9P7 + 9P8 + 9!) of key space. However, if users enter an easy pattern for convenience, there is weak security power, in this system the week password also be generated and it is acceptable.  In [5] Finger scanning system: In this locking system Atrix smartphone, made by Motorola, supplies a finger scanning system, which provides both good convenience and better security. This processes on the screen and low speed are the main problems in this system.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 334 3. PROPOSED SYSTEM: In our proposed system our efforts to detect or prevent the users secure data from third party user. This system is shown in figure. Re-touching the node is allowed and when the node is touched it changes its colour up to 7 times so the user will provide much higher input for his android smartphone. we allowed user to set any random password and check where the password is much enough to provide security or not if it is enough for security concern then save it and send to the users mail for users point of view to access it for next use or if the password is not much secure then it will give a week password message and wait for user input until they will enter a strong password. In the System, the Guest mode activity will introduced to give permission for user to access limited data when the locking system will apply on your smartphones. Fig: Android Smartlock Architecture. In system consist of mainly two parts first will used to set the smartphone password and second will used to perform activity for unlock smartphone in that the following parts perform a main role for completing the activity. 4. SET SCREEN LOCK: In this locking system when we are going to start or use this system that time it is necessary to enter the data in proper manner which will used to define a security for your mobile or your smartphone. This is a way where we are going to provide security field in step wise manner. As we know that the each and every field are affect on security issue. The steps are first when we start this security app in our mobile as smartphone the very first use of that software will ask a security field as follow select password this field are going to set a password in any style or sequence. Next step is depend on the first field which is conform password this field ask user where the entered data is correct or not for password saving. After the user conformation the app will store the database to SQLite And switch to next field which is for Enter Mobile number this field is used for confirmation of mobile number to give user extra security. After mobile number conformation the app will show you a next window which is ask user for his email detail which use for when user will forget the entered password then this field will gives the users entered password. Which is present when user is enter the first time password pattern that time the app will match user input and send to the users mail because of this the password will gives to the user. when the user entered all his detail in each window the last window will come which is ask user to save the data when user click on that the all entered data will save and the data will send to the SQLite database. 5. UNLOCK SMARTPHONE: The unlock smartphone activity will occur when we want to try this activity after installing in our phone with proper setup. When we set this app for security purpose when we want to unlock screen that time we need to press unlock key when we press the unlock key the screen display will on and shows one window which will describe our app security. This window will contain Enter password this field is used to allow user for enter the password which user will already set when the installation is begin. When the user will enter the password the app will check that entered data into the SQLite database The SQLite database hold the already entered password and match that data to entered data when he match the data it will generate two field first is the entered data from user is either acceptable or not if yes then it will tell system the data is correct and the app will unlock system else the user entered detail or password is incorrect then switch to the reference field flow work for user. The guest login feature will also introduces phone that time user will just shake his smartphone and user will enter in guest login. The user will access those data which user will allow using. 6. FLOW OF PROPOSED SYSTEM: The first condition when user starts to achieve the security level high for that the user will need to install that app in his smartphone. After completion of installation of app they will run this app. The application will start it will ask user select pattern, conform password, enter mobile number, enter email address, save information the user will enter a appropriate data and save all the data with proper manner. When user will save that data THEY entered password will send to USER’S mail which will used to remember the password lifetime for users point of view. After entering the database it will assign this app as a security app for his smartphone. When user will start or use that app for his security app then user will give one window which will ask user for enter the password then user must enter the appropriate pattern which user already set at the time of save the setting. When USERS ENTER the password the next step is to recognize users entered password in this step the users
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________________ Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 335 Author ’s Photo Author ’s Photo entered data will match existing database which will present in SQLite database. In matching the password the two steps or stages are OCCURRING first is the pattern is correct then unlock the system and second is the password is incorrect and app will show a reference flow work to user. The next stage is guest login when the user will not going to unlock the screen that time we will going to provide a extra facility guest login when user will shake the phone that time the users smartphone will automatically login to a guest user and user will access those data which user allow for guest user. 7. ALGORITHMIC STRATEGIES TO BE USED FOR PROPOSED SYSTEM:  Install app  Enter appropriate database  Save the database  Data will store in SQLite database  Set screen lock  Ask for password  Enter appropriate password  Match password to SQLite database  If password is correct unlock screen  If not gives reference flow work for user3. CONCLUSIONS The Proposed system will overcome the existing system bugs or errors with respect to current working home launchers’ screen lock system and different improving security applications which is increasing day by day in market to provide security for Android smartphones. When we implement this system the user security need is achieved most effectively, we are going to improve the user’s authentication and security level. Android is introduce in tablets and other digital equipment that will require a much security. The use of our improved security system ensures security of secure database. REFERENCES [1]. DAI-Labor, “Malicious Software for Smartphones,” Technical Report, 2008. [2]. Ken Dunham, “Mobile Malware Attacks and Defence,” SYNGRESS 2009, 2009. [3]. Android Security Overview, Android open source project. [4]. Design and Implementation of Improved Authentication System for Android Smartphone Users, 2012. BIOGRAPHIES Kajale Bhushan M. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik Jambhale Prajakta S. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik Bairagi Ketan A. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik Randhir Sagar S. Computer Department SND College of Engineering & Research Center. Yeola Dist. : Nashik.