Android Real Time Mobile Applications
Abstract— The main
aim of this project is to assist the Android Mobile phone users to reach the
destination in new city easily. When we are going to the new city it is
difficult to find the path from one place to another place even though we
travelled many times in that route. So this application will help the user to
record the route and show the route to the user when they need it. The user has
to start this application and press the record button to memories the path,
then this system will track the location of the user using GPS and the
co-ordinates are stored in database, this process will continue until the user press the stop button.
In this we can able to store more than one route.
Abstract— The main
idea of this application is to maintain all the details of ATM, Restaurant,
Hospitals, Malls, etc in mobile phone database along with their GPS
co-ordinates category wise. Whenever the user want to know the nearest location
of ATM or Hospital, he has to run this application and select the category,
once the category is selected this application will find the current location
of the mobile based on the GPS facility and search the corresponding nearest
location based on the GPS co-ordinates stored in the database and list the top
10 nearest items.
Abstract— The aim
of this project is to assist users to reject calls from unwanted callers. This
is achieved through two methods. The first is to maintain a “black list” which
contains the unwanted or banned callers. When the user is busy, he activates
the black list so that unwanted calls are automatically rejected. The second
method is based on a learning algorithm designed for the phone. If the user
rejects a particular user’s calls for five times, the user is automatically
added to the black list and further calls will be automatically rejected or
busy tone is sent. The application automatically learns the users that are to
be added to black list by using the learning algorithm.
Abstract—Textual passwords are the most
common method used for authentication. But textual passwords are vulnerable to
eves dropping, dictionary attacks, social engineering and shoulder surfing.
Graphical passwords are introduced as alternative techniques to textual
passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To
address this problem, text can be combined with images or colors to generate
session passwords for authentication. Session passwords can be used only once
and every time a new password is generated. These methods are suitable for
Personal Digital Assistants
Abstract— To
develop a system which will send a face image from Android Mobile to We? Server
where web server has a application which will maintain the criminal face images
and details, Once the web server receives the Face Image as input and compare
the Face Image with Criminal Face database and retrieve the matching face.
Abstract— To
develop a advanced Notice Board system where the registered members can able to
post their content and which can able to see by all the user in this world
through their Android Mobile phone.
Abstract— An Idea
behind this system to help blind people to recognize what currency they are
having in their hand. This is a mobile based application, which is going to be
installed on the mobile of the blinds, in turn it help them to recognize the
currency in their hand.
No comments:
Post a Comment