ABSTRACT: Wearable processing turns into a rising registering worldview for different as of late created wearable gadgets, for example, Google glass and Samsung Galaxy Smartwatch, that have essentially changed our every day existence with new capacities. To amplify the applications on wearable gadgets with constrained computational ability, stockpiling, and battery limit, in this project, we propose a novel […]
ANDROID PROJECTS
Energy Cost Models of Smartphones for Task Offloading to the Cloud
ABSTRACT: Task offloading from cell phones to the cloud is a promising system to upgrade the processing ability of cell phones what’s more, draw out their battery life. In any case, assignment offloading presents a correspondence cost for those gadgets. In this way, thought of the correspondence cost is critical for the adequacy of errand offloading. To […]
PRISM: PRivacy-aware Interest Sharing and Matching in Mobile Social Networks
ABSTRACT: In a profile matchmaking use of portable informal organizations, clients need to uncover their interests to one another keeping in mind the end goal to locate the basic interests. A noxious client may hurt a client by knowing his own data. In this way, shared interests should be found in a security safeguarding way. In this paper, we […]
STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
ABSTRACT: Area based administrations are rapidly ending up massively famous. Notwithstanding administrations in view of clients’ present area, numerous potential administrations depend on clients’ area history, or their spatial-fleeting provenance. Malignant clients may lie about their spatial-worldly provenance without a painstakingly planned security framework for clients to demonstrate their past areas. In this paper, we present the Spatial-Temporal provenance […]
Context-Aware Mobile Cloud Computing and Its Challenges
ABSTRACT: Distributed computing is picking up notoriety because of practically boundless assets, low capital cost, simplicity of appropriation, adaptable asset provisioning, and high versatility. Thinking about these advantages, specialists imagine the use of distributed computing for cell phones to defeat the ever increasing computational and vitality requests of advanced mobile phone applications. Be that as it may, this […]
Mobile attendance using Near Field Communication and One-Time Password
ABSTRACT: This paper presents a Near Field Communication (NFC) bolstered Organization M-Attendance framework for Company Employees. Close Field Correspondence (NFC) is one of the most recent advancements in radio interchanges furthermore, being a subset of RFID innovation, it is developing at a colossal pace. NFC innovation gives the quickest method to impart between two gadgets and it occurs inside a […]
Dummy-Based User Location Anonymization Under Real-World Constraints
ABSTRACT: Area based applications use the situating abilities of a cell phone to decide the present area of a client, and modify inquiry results to incorporate neighboring purposes of interests. Be that as it may, area learning is regularly seen as individual data. As per the development of cell phones outfitted with a GPS collector, a assortment of area based […]
Privacy and Secure Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
ABSTRACT: The intermingling of Internet of Things (IoT), distributed computing and remote body-zone systems (WBANs) has incredibly advanced the industrialization of e-/mhealthcare (electronic-/portable medicinal services). In any case, the further thriving of e-/m-Healthcare still faces numerous difficulties including data security and security safeguarding. To address these issues, a human care system (HES) system is planned that gathers restorative information […]
ZapDroid: Managing Infrequently Used Applications on Smartphones
ABSTRACT: Client reviews have demonstrated that an ordinary client has over a hundred applications on her advanced mobile phone, however quits utilizing a large number of them. We lead a client concentrate to recognize such unused applications, which we call zombies, and show by means of analyses that zombie applications devour noteworthy assets on a client’s advanced mobile […]
Searching Trajectories by Regions of Interest
ABSTRACT: With the expanding accessibility of moving-protest following information, direction seek is progressively essential. We propose and examine a novel question compose named direction seek by locales of intrigue (TSR inquiry). Given a contention set of directions, a TSR question takes an arrangement of districts of enthusiasm as a parameter and returns the direction in […]