info@itechprosolutions.in | +91 9790176891

ANDROID Projects

Category Archives

WIG Weather Index Guide

ABSTRACT:

Our project is on “WIG: Weather Index Guide”. This is an application that you activate before you might get into an emergency situation (i.e. before walking alone through a hot tunnel). Then you have to press a button (or a     finger on the screen…) and as soon as you lift the finger from that button/screen, the device show the temperature details and risk level

When your Android mobile is locked with the default pattern, it is easier to open and an emergency call. In the Android OS, we can create shortcuts to emergency numbers as well as take it a step further with the Maps app. Using Google maps we can see the present location where we are and send it in the form of a message. The main scope of the “WIG: Weather Index Guide” app is to instruct and as warn about the present temperature location where ever we are.

DOWNLOAD


VNC Architecture Based Remote Desktop Access through Android Mobile Phones  

 

ABSTRACT:

In this paper, we will enlist the process to access the desktops of remote computer systems with the use of a android based cellular phone. This process will be carried out using Virtual Network Computing based architecture. A user will be able to access and manipulate the desktops of remote computers through a VNC viewer that will be provided on the user’s cell-phone. Conditions that must be followed are that a VNC server must be installed on the person’s computer which will be monitored and it must be connected to a Wi-Fi network. The user can access and manipulate the desktop within the Wi-Fi range irrespective of various platforms like windows, mac or linux. The image of the desktop is compressed before it is transmitted to the cellular phone. There are several functions provided so as to ease the viewing on cell-phones. There is shortcut function that can be used to quickly access the frequently used area. Current key assignments can be viewed using guidance function. A user can view two areas simultaneously using a twin view function. The prototype is already implemented using java and tested on a java based cellular phone.

DOWNLOAD


User preference based Mobile search engine

ABSTRACT:

We propose a personalized mobile search engine, PMSE, that captures the users’ preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users’ locations (positioned by GPS) are used to supplement the location concepts in PMSE. The user preferences are organized in an ontology-based, multi-facet user profile, which are used to adapt a personalized ranking function for rank adaptation of future search results. To characterize the diversity of the concepts associated with a query and their relevances to the users need, four entropies are introduced to balance the weights between the content and location facets. Based on the client-server model, we also present a detailed architecture and design for implementation of PMSE. In our design, the client collects and stores locally the click-through data to protect privacy, whereas heavy tasks such as concept extraction, training and re-ranking are performed at the PMSE server. Moreover, we address the privacy issue by restricting the information in the user profile exposed to the PMSE server with two privacy parameters. We prototype PMSE on the Google Android platform. Experimental results show that PMSE significantly improves the precision comparing to the baseline.

DOWNLOAD


Twitsper: Tweeting Privately

ABSTRACT:

While OSNs today provide some form of privacy controls to protect a user’s shared content from other users, these controls are not sufficiently expressive to provide fine grained protection. In this article, we introduce Twitsper, to support fine-grained control over who sees a user’s messages. Twitsper provides privacy controls to the users of Twitter today without relying on Twitter to make changes. This is because it is a wrapper around Twitter that enables private group communication while preserving Twitter’s commercial interests. It preserves privacy both from the Twitsper server as well as from undesired Twitsper users.

DOWNLOAD


The Application Protector for Mobile Manual Security

ABSTRACT:

 Advanced Phone lock is an integrated locker service which allows you to lock any application from your smart phone. Nobody can use the locked applications without to know the password. You can lock any important application which stores sensitive data for you like credit card numbers financial data, passwords, images, sms messages or anything else important for you. The service is also able to lock the phone and keypad. When the phone is locked, you or somebody else have to enter the password in order to unlock and continue to use the phone as normally. The same password is used for any lock/unlock action in order to have an easy use. The AppLock Protect your installed applications using a password or pattern. It is smart App Protector will protect your installed applications using a password or pattern. It is essential app for all android users. Password protect your phone’s personal data. App Lock is one of the best among similar application lock apps, simple and intuitive UI, tons of features, smallest app size, least battery usage, best performance.

DOWNLOAD


Text to speech in android

ABSTRACT:

Text to Speech Conversion is the artificial production of human speech. A computer system used for this purpose is called a speech synthesizer, and can be implemented in software or hardware. In this project we use our Android Mobile for Text to Speech. A text-to-speech (TTS) system converts normal language text into speech. Our proposed Text to speech convertor can be used for any domains, the storage of entire words or sentences allows for high-quality output. The quality of a speech synthesizer is judged by its similarity to the human voice and by its ability to be understood. Our proposed intelligible text-to-speech program allows people with visual impairments or reading disabilities to listen to written works on a mobile.

DOWNLOAD


Speech to Text

ABSTRACT:

Ever wish you could just speak your thoughts into a document instead of writing or typing them? Doing so may be easier than you think. Speech-to-text technology has been around for decades in one form or another. It was made popular by technology companies such as IBM, the Department of Defense, and medical offices. Over the last few years it has become increasingly more popular with the general public and much more accurate at deciphering what we are saying. This has positively impacted everyone from commuters wanting to dial a number without looking at the keypad to individuals with disabilities needing to send an SMS.

DOWNLOAD


QuickPro: An advanced m-learning system

ABSTRACT:

This paper sets out to provide a preliminary guidance on developing mobile language learning applications, with consideration for using multimedia. A set of initial findings are presented from a small-scale pilot learner study, along with other considerations from findings in the literature. These preliminary guidelines could be further developed in later iterations to provide an overall framework for developing and evaluating other multimedia elements in mobile language learning applications and possibly also other mobile learning applications that use multimedia extensively (e.g. musical learning).

DOWNLOAD


Restaurant Table Order Management System

ABSTRACT:

The concept of restaurant table order management system, since it is android application, I will keep everything as simple as possible. The project consists in an Android application that can be used by employees in a restaurant to handle the clients, their orders and can help them easily find free tables or place orders. This application, created mainly for proof of proper user-mobile interaction. The restaurant menu is organized by categories (appetizers, soups, salads, entrees, sides and drinks) of menu items. Each menu item has a name (e.g., fried rice), price and associated recipe. A recipe for a menu item has a chef, preparation instruction sand associated ingredients. The ingredients are identified by their ingredient id and the quantity of the ingredient needed to prepare a particular recipe, the unit of measure and a name.

“Restaurant Table Management System (RTMS)” is android application to restaurant management. This system wake to provide service facility to restaurant and also to the customer. The services that are provided is food ordering and reservation table management by the customer through the system , customer information management and waiter information management, menu information management and report. Main objective build the system this is to provide ordering and reservation service to the customer. With this system, ordering and reservation management will become easier and systematic to replace traditional system

DOWNLOAD


Route Navigation through Global Positioning System

ABSTRACT:

 Mobile ROUTE tracker application finds location & navigates you to the nearest Place or ROUTE. Get turn-by-turn directions to the nearest Place or ROUTE. The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites. It is maintained by the United States government and is freely accessible by anyone with a GPS receiver. Get directions to the nearest Place or ROUTE by using GPS is easy to identifies and can navigates to nearest ROUTE.  A GPS receiver calculates its position by precisely timing the signals sent by GPS satellites high above the Earth. Each satellite continually transmits messages that include. The receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites’ locations are used with the possible aid of trilateration, depending on which algorithm is used, to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included. Many GPS units show derived information such as direction and speed, calculated from position changes.

DOWNLOAD


Safety Alarm by Using GPS in Android

ABSTRACT:

The proposed idea of this Application Safety Alarm by using GPS in Android  helps to frequent travelers at various places, this application helps to find the particular location on which they are currently stand and also introduce of saving the current location data details. The location information is saved for every second and its stored in the database. This is because, if the person is lost or not found, then using the stored location information, the person can be easily identified.  Here we also present options for emergency system. In current system, alarms are set for particular time. Many times there are situations where the alarm/reminder is based on your current location and not based on time. The Mobile application installed on the mobile can give a alarm based on a particular location.

DOWNLOAD


Software Version Self Update For Android Mobile Applications

ABSTRACT:

 To make sure that you’re protected by the latest security updates, automatically updates whenever it detects that a new version of it is available. The update process happens in the background and doesn’t require any action on your part. It is risky to upgrade a live version without testing the upgrade process first. So before upgrading the live version you need to set up a test version which is as close as possible to the configuration of your live version, then test the upgrade on that. When you are happy with the process you can apply it to the live version (having taken a fresh backup of the live site first, of course).

The Version Notes will outline any version-specific changes that may need to be made. If you’re updating from a previous version, you might need to sync your file upload directories for files to work properly. If you use a local version of the documentation, replace your copy with the latest from our Download Area.

DOWNLOAD


Quantitative and Qualitative Mobile Data collection

ABSTRACT:

 Data collection is a term used to describe a process of preparing and collecting data, for example, as part of a process improvement or similar project. Data Collection is an important aspect of any type of research study. Inaccurate data collection can impact the results of a study and ultimately lead to invalid results. A method of gathering and calculating data given the appropriate app to support those data gathering needs. With the availability of an mobile for many of us the search began to find an app that lends to easier, meaningful and more efficient electronic data collection. Measuring time and frequency has never been so easy. To count how often an event is occurring, simply press the button when the event is observed. To time how long an event is occurring, simply hold the button down while it is happening or lock it in place for hands-free recording.

 

Mobile data collection forms save valuable time. Imagine conducting a mobile survey without the delays of printing and shipping paper forms. You do not need to worry about paper forms being lost or damaged in transit. With mobile data collection software you do not need to reenter data into a computer because its digital to start with. So there are no reporting delays. so you do not need to worry about the time required to set up and maintain servers.

 

Take a picture, then annotate it. Collect action video of an event. Record audio questions. Collect a GPS coordinate, then display it on a map. Scan barcodes to save time, increase accuracy, and reduce fraud. Send ad-hoc and pre-scheduled dispatch forms and work order forms out to your mobile workers. Our mobile data collection software allows you to do all of this with no need for software programmers or IT support staff.

 

Imagine using your mobile data collection software to instantly take a picture, then sketch on top of it to illustrate something of interest; or to scan the barcodes of materials being delivered to a job site. Imagine recording audio notes and video clips and embedding them right in your electronic mobile data collection forms; or using the GPS to precisely record a location. Think about the increased speed and accuracy of reporting.

DOWNLOAD


ABSTRACT:

 Increase employee productivity and control mobile costs by making mobile devices to operate from a secure, enterprise, managed platform. Give your workforce conferencing experiences that are compelling, productive, and cost-effective. Deliver content-rich, customer-centric experiences to help create the foundation for positive customer service and build a stronger business. Deliver consistent communication services to all of your employees in their workspaces with this full suite of solutions and endpoints. Drive productivity and accelerate team performance. Find the right person and communicate using any medium, anywhere, from any device. Connect, communicate, and collaborate directly from your desktop with rich multimedia Cisco Unified Communications services.

Mobile Organizational communication is a subfield of the larger discipline of communication studies. Organizational communication, as a field, is the consideration, analysis, and criticism of the role of communication in organizational contexts. Mobile Organizations are mechanical things, in which the parts (including employees functioning in defined roles) are interchangeable. What works in one organization will work in another similar organization. Individual differences can be minimized or even eliminated with careful management techniques. Mobile Organizations function as a container within which communication takes place. Any differences in form or function of communication between that occurring in an organization and in another setting can be identified and studied as factors affecting the communicative activity.

Planning in organizations and public policy is both the organizational process of creating and maintaining a plan; and the psychological process of thinking about the activities required to create a desired goal on some scale. As such, it is a fundamental property of intelligent behavior. This thought process is essential to the creation and refinement of a plan, or integration of it with other plans, that is, it combines forecasting of developments with the preparation of scenarios of how to react to them in mobile. An important, albeit often ignored aspect of planning, is the relationship it holds with forecasting. Forecasting can be described as predicting what the future will look like, whereas planning predicts what the future should look like.

DOWNLOAD


Online Student Attendance Management System using Android

ABSTRACT:

We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The process is not only time consuming but also sometimes inefficient resulting in the false marking of attendance. Today, we need not maintain pen and paper based attendance registers. Following this thought, we have proposed an attendance monitoring system based on the concept of web services which is implementedas an Android mobile application that communicates with the database residing on a remote server. The mobile application would require connecting to the database using either General Packet Radio Service (GPRS) or WiFi technology. This paper discusses the proposed system, overview of the design, the various modules of the system and its implementation.

DOWNLOAD


Portable learning language system

 ABSTRACT:

 The rate of Literacy is an important indicator of a society’s overall human development. The population of India, as in most other developing countries is concentrated in the rural areas. However, the rural areas of India are often at a disadvantage within the Indian Education System. An educational system called EduPad, to reduce the rural adult illiteracy using advancements in technology is proposed here. Such a system can be used to make up for lack of qualified personnel and adequate infrastructure in rural India. The device proposed here is an interactive Tablet, which is capable of teaching multiple languages. We propose to develop interactive educational software which can run on the tablet. The software helps the user to learn to write as well as spell the alphabets. Initially the software teaches alphabets and then moves onto words and sentences.

DOWNLOAD


NEAREST ATM MOBILE NAVIGATION THROUGH GLOBAL POSITIONING SYSTEM

ABSTRACT:

 Mobile ATM tracker application finds location & navigates you to the nearest Bank or ATM. Get turn-by-turn directions to the nearest Bank or ATM. The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites. It is maintained by the United States government and is freely accessible by anyone with a GPS receiver.

Get directions to the nearest Bank or ATM by using GPS is easy to identifies and can navigates to nearest ATM.  A GPS receiver calculates its position by precisely timing the signals sent by GPS satellites high above the Earth. Each satellite continually transmits messages that include. The receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites’ locations are used with the possible aid of trilateration, depending on which algorithm is used, to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included. Many GPS units show derived information such as direction and speed, calculated from position changes.

DOWNLOAD


Multi User Mobile Bluetooth Two Way Text Chat

ABSTRACT:

Bluetooth chatting is an innovative approach to the mobile world. This application shows use of Bluetooth in terms of chatting. Means persons can chat via Bluetooth. The main midlet has just a list which has two values server and client. By selecting one of these two values, the corresponding instance is created. Midlet is used to initialize the connection. It does following thing at here. First, it starts the application and search the Bluetooth device. It sends the signal to the server class. Second, it can run, pause and stop the application. Third, it shows alert using setAlert function on every changing. Server class goes active when it go signal from the midlet class. It sends the hello world string with the string to the other devices. Client class works to respond the other Bluetooth device server.

Bluechat is a bluetooth messaging. Bluechat allows you to see other Bluechat users around, ping anyone of them, and create either private chat sessions or public messaging rooms via Bluetooth. This application allows two Android devices to carry out two-way text chat over Bluetooth. Start the application from the first screen; go to My Profile and set nickname, age, gender and hobbies. This is an optional step to provide additional information to other chat buddies. Next, select ‘Look for Friends’ option which attempts to discover other users in the area. Detected user-profiles are listed as selectable boxes. While a profile is selected, Options menu can be used to view profile details, initiate a file transfer or to refresh list of detected friends.

DOWNLOAD

 


Mobile Phone Based Drunk Driving Detection

ABSTRACT:

Drunk driving, or officially driving under the Influence (DUI) of alcohol, is a major cause of traffic accidents throughout the world. In this, we propose a highly efficient system aimed at early detection and alert of dangerous vehicle maneuvers typically related to drunk driving. The entire solution requires only a mobile phone placed in vehicle and with accelerometer sensor. A program installed on the mobile phone computes accelerations based on sensor readings, and compares them with typical drunk driving patterns extracted from real driving tests. Once any evidence of drunk driving is present, the mobile phone will automatically alert the driver or sends a message to predefined number in application for help well before accident actually happens.

DOWNLOAD


Mobile Geo Data Collection Security for Client Site

ABSTRACT:

 Data Collection utility application is for collecting Location Related Data for Manned Security Mobile Application. Initially the data related to the Site/Location where Security Officers and Team Leaders will go for Patrolling and Tours needs to be collected. Once the data is collected, it should be synchronized with Control Center, so that it can be used later for Tours/Patrolling.

When the user selects the Client id,  the other fields such as the Building/House/Plot number, Exact Location, Road will be retrieved from Control Center & automatically filled. The user can edit these fields and can input other information if needed. After providing the above information, the user should click on Get Geo Location button to retrieve the current location of the Client Site. Get Geo Location button will capture the current location of the client on the map. The user can use the Add Image to add Image of the client location. The user can change/remove the image by clicking on Remove button and add the image again. The user can click on Start Fencing button to get the perimeter fencing points. Data displayed showing the No of points covered, Latitude, Longitude & Accuracy. The user should click on ‘Start Fencing’ to proceed.

A GPS receiver calculates its position by precisely timing the signals sent by GPS satellites high above the Earth. A satellite’s position and pseudorange define a sphere, centered on the satellite, with radius equal to the pseudorange. The position of the receiver is somewhere on the surface of this sphere. Thus with four satellites, the indicated position of the GPS receiver is at or near the intersection of the surfaces of four spheres. In the ideal case of no errors, the GPS receiver would be at a precise intersection of the four surfaces. A GPS receiver calculates its position by precisely timing the signals sent by GPS satellites high above the Earth. Each satellite continually transmits messages that include. The receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite.

DOWNLOAD


Mobile Computing Optimal Uplink Query Processing

ABSTRACT:

Many mobile applications retrieve content from remote servers via user generated queries. Processing these queries is often needed before the desired content can be identified. Processing the request on the mobile devices can quickly sap the limited battery resources. Conversely, processing user-queries at remote servers can have slow response times due communication latency incurred during transmission of the potentially large query. We evaluate a network-assisted mobile computing scenario where mid-network nodes with “leasing” capabilities are deployed by a service provider. Leasing computation power can reduce battery usage on the mobile devices and improve response times. However, borrowing processing power from mid-network nodes comes at a leasing cost which must be accounted for when making the decision of where processing should occur. We study the tradeoff between battery usage, processing and transmission latency, and mid-network leasing. We use the dynamic programming framework to solve for the optimal processing policies that suggest the amount of processing to be done at each mid-network node in order to minimize the processing and communication latency and processing costs. Through numerical studies, we examine the properties of the optimal processing policy and the core tradeoffs in such systems.

DOWNLOAD


Meetup: Secure encounter based Social Networking

ABSTRACT:

Encounter-based social networks and encounter-based systems link users who share a location at the same time, as opposed to the traditional social network paradigm of linking users who have an offline friendship. This new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. We show that it is vulnerable to several attacks, including impersonation, collusion, and privacy breaching, even though it was designed specifically for security. Mindful of the possible pitfalls, we construct a flexible framework for secure encounter-based social networks, which can be used to construct networks that offer different security, privacy, and availability guarantees. We describe two example constructions derived from this framework, and consider each in terms of the ideal requirements. Some of our new designs fulfill more requirements in terms of system security, reliability, and privacy than previous work. We also evaluate real-world performance of one of our designs by implementing a proof-of-concept iPhone application called Meet Up. Experiments highlight the potential of our system and hint at the deployability of our designs on a large scale.

DOWNLOAD


Location based Spatial Queries in Mobile Environments

ABSTRACT:

With the popularity of location-based services and the abundant usage of smart phones and GPS-enabled devices, the necessity of outsourcing spatial data has grown rapidly over the past few years. Meanwhile, the fast a rising trend of cloud storage and cloud computing services has provided a flexible and cost-effective platform for hosting data from businesses and individuals, further enabling many location-based applications. Nevertheless, in this database outsourcing paradigm, the authentication of the query results at the client remains a challenging problem. In this paper, we focus on the Outsourced Spatial Database (OSDB) model and propose an efficient scheme, called VN-Auth, which allows a client to verify the correctness and completeness of the result set. Our approach is based on neighborhood information derived from the Voronoi diagram of the underlying spatial data set and can handle fundamental spatial query types, such as k nearest neighbor and range queries, as well as more advanced query types like reverse k nearest neighbor, aggregate nearest neighbor, and spatial skyline. We evaluated VN-Auth based on real-world data sets using mobile devices (Google Droid smart phones with Android OS) as query clients. Compared to the current state-of-the-art approaches (i.e., methods based on Merkle Hash Trees), our experiments show that VN-Auth produces significantly smaller verification objects and is more computationally efficient, especially for queries with low selectivity.

DOWNLOAD


Location Based Early Disaster Warning and Evacuation System on Mobile Phones  

 

ABSTRACT:

This paper describes the development and implementation of a location based service for disaster evacuation routes. Based on the position of the mobile phone the system provides a real-time calculation for an escape route out of the hazard zone. A smartphone application visualizes the route on a map. Nowadays, disaster hazard zones are well known and determined with complex simulation models. Evacuation routes in such hazard zones are mostly sign posted along roads and visualized in evacuation plans. People who are inside a disaster hazard zone have to make themselves familiar with the evacuation plans and have to find their own way out of the zone. The developed concept shows the possibility of a location based service to determine an escape route and visualize the result on a map. In addition, the route is the shortest possible way out of the zone. The concept is implemented for a test area. The developed prototype consists of three tier architecture. The mobile Android application (client) determines the position of the smartphone and is responsible for the visualization of the result. A calculation program on the server side calculates the shortest route out of the hazard zone. The necessary data for this calculation come from a spatial data base which is the third component in this architecture. The whole system allows the user to calculate an escape route out of the hazard zone at the touch of a button. Implemented in an existing disaster warning application it would be a life-saving service.

DOWNLOAD


iTeeth Dental Hub on Android

ABSTRACT:

Most of the people doing their daily work on computer with the help of online. But nowadays Smart phones gaining more attention over computers, if people want to know about anything their search starts from smart phones, People giving more attention to their health. Teeth is one of the most important body part. Because we daily care about teeth, we brush the teeth at least twice a day, if any disease affect our teeth, we can’t do anything, can’t concentrate to anything and can’t sleep. So people search the best dental clinic to their nearby places for the treatment, so we developed an Android application called iTeeth, it gives the best dental clinic rated by other user.  In this app Administrator enter the clinic available in the particular city or region. The clinic details are Name, address, city, and chief doctor and working hours of the clinic. Admin can manage the clinic details like adding new dental clinic, editing already added clinic and delete the clinic which are closed. User registers with this app and can search through the dental clinics available in a particular city and can view the entire details of that clinic. Then they can consult with their friends and family about the facilities available in the clinic. In this app user can rate the dental clinics, and also view rating already given to that particular clinic by other user. So this application is very useful for the user to view the details and facilities of the clinics without going outside or contact any other person. In this application we also added some tips for basic dental care. So user can read the tips to maintain their dental health and can also suggest their friends and family.

DOWNLOAD


iShopping: Nearest Shopping Location Identifier

ABSTRACT:

iShopping: Nearest Shopping Location Identifier is a Android project based on Mobile Commerce Explorer. Due to a wide range of potential applications, research on mobile commerce has received a lot of interests from both of the industry and academia. Among them, one of the active topic areas is the mining and prediction of users’ mobile commerce behaviors such as their movements and purchase transactions. In this paper, we propose a novel framework, called Mobile Commerce Explorer (MCE), for mining and prediction of mobile users’ movements and purchase transactions under the context of mobile commerce. The MCE framework consists of three major components: 1) Similarity Inference Model (SIM) for measuring the similarities among stores and items, which are two basic mobile commerce entities considered in this paper; 2) Personal Mobile Commerce Pattern Mine (PMCP-Mine) algorithm for efficient discovery of mobile users’ Personal Mobile Commerce Patterns (PMCPs); and 3) Mobile Commerce Behavior Predictor (MCBP) for prediction of possible mobile user behaviors. To our best knowledge, this is the first work that facilitates mining and prediction of mobile users’ commerce behaviors in order to recommend stores and items previously unknown to a user. We perform an extensive experimental evaluation by simulation and show that our proposals produce excellent results.

DOWNLOAD


iRecommend User Ranking based Recommendation System

 

ABSTRACT:

With the explosive emergence of vertical search domains, applying the broad-based ranking model directly to different domains is no longer desirable due to domain differences, while building a unique ranking model for each domain is both laborious for labeling data and time consuming for training models. In this paper, we address these difficulties by proposing a regularization-based algorithm called ranking adaptation SVM (RA-SVM), through which we can adapt an existing ranking model to a new domain, so that the amount of labeled data and the training cost is reduced while the performance is still guaranteed. Our algorithm only requires the prediction from the existing ranking models, rather than their internal representations or the data from auxiliary domains. In addition, we assume that documents similar in the domain-specific feature space should have consistent rankings, and add some constraints to control the margin and slack variables of RA-SVM adaptively. Finally, ranking adaptability measurement is proposed to quantitatively estimate if an existing ranking model can be adapted to a new domain. Experiments performed over Letor and two large scale data sets crawled from a commercial search engine demonstrate the applicabilities of the proposed ranking adaptation algorithms and the ranking adaptability measurement.

DOWNLOAD


iRail: Railway Reservation Using Android App

ABSTRACT:

Due to drastic changes in the technology the reservations are done using Mobile phone. In this project we develop railway reservation system using Android phone. The online reservation system is basically derived from the GDS (global distribution system) also known as CRS (computer reservation system). The online reservation  System has its database centrally located which is accessed through an Application Programming Interface (API).With the invent of online reservation system the traveler  and the railway got the freedom to book a seat anywhere at anytime at their convenience. The traveler can book a ticket at a click or touch in mobile by saving the time and money for the travelling. It has also become a hassle free transaction for both the railway and the traveler. The online reservation system involves three main actors the database, online operator and a database scheduler. The database scheduler updates the database, the online operator accepts and confirms the booking and updates the database.

DOWNLOAD


imed: Self diagnosis system for disease treatment

ABSTRACT:

The Machine Learning field has gained its thrust in almost any domain of research and just recently has become a reliable tool in the medical domain. The experiential domain of automatic learning is used in tasks such as medical decision support, medical imaging, protein-protein interaction, extraction of medical knowledge, and for overall patient management care. ML is envisioned as a tool by which computer-based systems can be integrated in the healthcare field in order to get a better, well-organized medical care. It describes a ML-based methodology for building an application that is capable of identifying and disseminating healthcare information. It extracts sentences from published medical papers that mention diseases and treatments, and identifies semantic relations that exist between diseases and treatments. Our evaluation results for these tasks show that the proposed methodology obtains reliable outcomes that could be integrated in an application to be used in the medical care domain. The potential value of this paper stands in the ML settings that we propose and in the fact that we outperform previous results on the same data set.

DOWNLOAD


ihealth: Patient health record system

ABSTRACT:

Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi-trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute based encryption (ABE) techniques to encrypt each patient’s PHR file. Different from previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi-authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability and efficiency of our proposed scheme.

DOWNLOAD


iFlat: Flat Rating Model Using Android

ABSTRACT:

Peoples are working for getting money, but most of them investing some money and earning more money without doing any hard work. Many people investing money in the Stock market, gold properties, when they think about investing in property, their first choice is Flats or/and apartments. From above mentioned instruments for investing like gold and stock market, we get the profit when selling it, but in flats we can rend the flat, so we can earn the money for every month and also we own that flat. Whenever we can sell it, nowadays many people buying and selling flats and apartments, but they don’t clearly tell the exact facilities available in that flat. So we created an application called iFlat. In this app Administrator enter the Flats available in the particular city or region. The Flat details are Name, address, city, and facilities available in that flat. Admin can manage the flat details like adding new flats, editing already added flats and delete the flats which are sold to the user. User registers with this app and can search through the flats available in a particular city and can view the entire details of particular flat. Then they can consult with their friends and family about the facilities available in the flat. In this app user can rate the flats, and also view rating already given to that particular flat from other user. So this application is very useful for the user to view the details and facilities of the flats without going outside or contact any intermediate person called broker. Here we can minimize the cost of expenditure and the commission for the broker. In this app we can directly getting the other user feedback for the flats, so there is no cheating of any broker or seller.

DOWNLOAD


ibus: Chennai MTC bus info system

ABSTRACT:

Buses are the most widely used in transit technology today because bus networks are easily accessible and cheaper than other kinds of public transportation. Proper Schedule of bus service is a main issue in the reliability of bus operation. To achieve this, we developed a project called iBus for Android Smartphone. In fact, static structure and the real operation of bus scheduling have some difference with each other, due to some cases, such as traffic congestion and the accumulation of delays of buses missions. User can track any bus running in under Metropolitan Transport Corporation ltd, Chennai. The bussed are tracked by their unique identified numbers called bus numbers, or giving the Stage covering by the bus.iBUS Chennai , the app works in a both dynamic ways online and offline.

DOWNLOAD


FTP 4 ANDROID

ABSTRACT

In this project we propose FTP 4 ANDROID, a new app to store the days in FTP servers. Nowadays it is common practice to handle any type of file with the personal computer. The introduction of mobile devices in modern life opened the doors to the possibility to do that ubiquitously. Unfortunately, the storage capacity of these devices is limited. Hence it may be useful to have the possibility to store the files on the web and retrieve them at anytime and anywhere. To satisfy this need, FTP4 Android can be used. FTP storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centers, and people who require their data to be hosted buy or lease storage capacity from them. The data center operators, in the background, virtualizes the resources according to the requirements of the customer and expose them as storage pools, which the customers can themselves use to store files or data objects. Physically, the resource may span across multiple servers. The safety of the files depends upon the hosting websites.

DOWNLOAD


Friend Mapper and Open GPS Tracker System

ABSTRACT:

In current system, in order to find out the location of friends, user need to call and ask friend about his where about. The proposed system will help user to find out friends locations as well as the distance from user’s location. The proposed system will also allow user to see all friends on Google map as well. The application “Friend Locator on Mobiles” solves all these problems. It offers below services 1. Allows user to select friend for his location updates. 2. Uploads user’s current location at specific frequency. 3. Get friends current location 4. Shows friends location on Google Map. 5. Shows distance in kilometers for friends away from user.

DOWNLOAD


FREE VOICE CALLING IN WIFI CAMPUS NETWORK USING ANDROID

ABSTRACT:

The purpose of this research is to design and implement a telephony program that uses WIFI in p2p (Peer-to-Peer) or WLAN (Wireless Local Area Network) as a means of communication between mobile phones at no cost. The system will allow users to search for other individuals within WIFI range and to establish free p2p voice connections, or to establish virtual connection through Access Points (AP), as well as giving the option to user to use GSM in the case of no WIFI connectivity is available. The system will use a novel algorithm to convert mobile number into IP address and use it as a mean for contacting other mobile over p2p or AP using WIFI technology. The software will use a correlation between current address books available in mobile phones to convert phone numbers into IP addresses. The system will allow user to make voice conversation. The first step of this research and development is to resolve the technical issue regarding mapping of the mobile user’s phone number to a unique IP address in order to avoid IP collision, centralized control, and user configuration. In addition, voice call will be supported using WIFI to allow mobile phones to communicate free of cost to each other through p2p or through AP.

DOWNLOAD


EXTENDED MOBILE CAPTCHA IMPLEMENTATION

ABSTRACT:

 A CAPTCHA is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. The process usually involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are assumed to be unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. Thus, it is sometimes described as a reverse Turing test, because it is administered by a machine and targeted at a human, in contrast to the standard Turing test that is typically administered by a human and targeted at a machine. A common type of CAPTCHA requires the user to type letters or digits from a distorted image that appears on the screen.Most interactive sites today are run by databases and become quickly clogged and sluggish when a database table exceeds capabilities the operating server can handle.

Standard CAPTCHA mechanisms don’t work well on the mobile web. The goal of the Mobile CAPTCHA project is to embrace the limitations of mobile platforms to create a usable CAPTCHA mechanism that is also secure against bots. It is comparatively harder to automate data submission within native apps. This is due to the fact that you cannot just write an automated script to discover <form> elements within the source code. We followed the IDEO’s Brainstorming rules to come up with several potential designs for a mobile-friendly CAPTCHA mechanism, including arranging image fragments, shaking the phone in different patterns, a “Wheel of Fortune” interface, and a social network face recognition.We observed users performing tasks where one of the steps was solving a CAPTCHA on a mobile phone, like signing up for a Gmail account or purchasing event tickets on ticketmaster.com. We came up with three design sketches based on these results.The design used for our video prototype combines two existing image-recognition CAPTCHA mechanisms into a mobile form factor. First, users need to identify images from a specific category, then they need to trace an outline of the image on their touchscreen.

DOWNLOAD


SELF DIAGNOSING WITH IDENTIFYING DISEASE TREATMENT WITH ONLINE DOCTOR PRECAUTIONARIES

ABSTRACT

The Machine Learning (ML) field has gained its momentum in almost any domain of research and just recently has become a reliable tool in the medical domain. The empirical domain of automatic learning is used in tasks such as medical decision support, medical imaging, protein-protein interaction, extraction of medical knowledge, and for overall patient management care.

ML is envisioned as a tool by which computer-based systems can be integrated in the healthcare field in order to get a better, more efficient medical care. This paper describes a ML-based methodology for building an application that is capable of identifying and disseminating healthcare information.

DOWNLOAD


Enhancing Driving through Driving Assistance System Android Application

ABSTRACT

This paper presents a smart driving direction system leveraging the intelligence of experienced drivers. In this system, GPS-equipped taxis are employed as mobile sensors probing the traffic rhythm of a city and taxi drivers’ intelligence in choosing driving directions in the physical world. We propose a time-dependent landmark graph to model the dynamic traffic pattern as well as the intelligence of experienced drivers so as to provide a user with the practically fastest route to a given destination at a given departure time. Then, a Variance-Entropy-Based Clustering approach is devised to estimate the distribution of travel time between two landmarks in different time slots. Based on this graph, we design a two-stage routing algorithm to compute the practically fastest and customized route for end users. We build our system based on a real-world trajectory data set generated by over 33,000 taxis in a period of three months, and evaluate the system by conducting both synthetic experiments and in-the-field evaluations. As a result, 60-70 percent of the routes suggested by our method are faster than the competing methods, and 20 percent of the routes share the same results. On average, 50 percent of our routes are at least 20 percent faster than the competing approaches.

DOWNLOAD


EXTENDED MOBILE CAPTCHA IMPLEMENTATION

ABSTRACT:

 A CAPTCHA is a type of challenge-response test used in computing as an attempt to ensure that the response is generated by a person. The process usually involves one computer (a server) asking a user to complete a simple test which the computer is able to generate and grade. Because other computers are assumed to be unable to solve the CAPTCHA, any user entering a correct solution is presumed to be human. Thus, it is sometimes described as a reverse Turing test, because it is administered by a machine and targeted at a human, in contrast to the standard Turing test that is typically administered by a human and targeted at a machine. A common type of CAPTCHA requires the user to type letters or digits from a distorted image that appears on the screen.Most interactive sites today are run by databases and become quickly clogged and sluggish when a database table exceeds capabilities the operating server can handle. Standard CAPTCHA mechanisms don’t work well on the mobile web. The goal of the Mobile CAPTCHA project is to embrace the limitations of mobile platforms to create a usable CAPTCHA mechanism that is also secure against bots. It is comparatively harder to automate data submission within native apps. This is due to the fact that you cannot just write an automated script to discover <form> elements within the source code. We followed the IDEO’s Brainstorming rules to come up with several potential designs for a mobile-friendly CAPTCHA mechanism, including arranging image fragments, shaking the phone in different patterns, a “Wheel of Fortune” interface, and a social network face recognition.We observed users performing tasks where one of the steps was solving a CAPTCHA on a mobile phone, like signing up for a Gmail account or purchasing event tickets on ticketmaster.com. We came up with three design sketches based on these results.  The design used for our video prototype combines two existing image-recognition CAPTCHA mechanisms into a mobile form factor. First, users need to identify images from a specific category, then they need to trace an outline of the image on their touchscreen.

DOWNLOAD


Emergency Alert System using Android Text Message Service

ABSTRACT:

Cellular text messaging services are increasingly being relied upon to disseminate critical information during emergencies. Accordingly, a wide range of organizations including colleges and universities now partner with third-party providers that promise to improve physical security by rapidly delivering such messages. Unfortunately, these products do not work as advertised due to limitations of cellular infrastructure and therefore provide a false sense of security to their users. In this paper, we perform the first extensive investigation and characterization of the limitations of an Emergency Alert System (EAS) using text messages as a security incident response mechanism. We show emergency alert systems built on text messaging not only can meet the 10 minute delivery requirement mandated by the WARN Act, but also potentially cause other voice and SMS traffic to be blocked at rates upward of 80 percent. We then show that our results are representative of reality by comparing them to a number of documented but not previously understood failures. Finally, we analyze a targeted messaging mechanism as a means of efficiently using currently deployed infrastructure and third-party EAS. In so doing, we demonstrate that this increasingly deployed security infrastructure does not achieve its stated requirements for large populations.

DOWNLOAD


Page 1 of 212
RECENT PAPERS