IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 404-407

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

Survey on Physical and Data Safety for Cellular Technology Using WSN Prasad Sangpal1, Sumit Surwase, Sunil Dongare3 and Trupti Raskar4 1

Student, Pune University, Computer Department, K J College Of Engineering and Management Research Pune, Maharashtra, India [email protected]

2

Student, Pune University, Computer Department, K J College Of Engineering and Management Research Pune, Maharashtra, India [email protected]

3

Student, Pune University, Computer Department, K J College Of Engineering and Management Research Pune, Maharashtra, India [email protected]

4

Student, Pune University, Computer Department, K J College Of Engineering and Management Research Pune, Maharashtra, India [email protected]

Abstract This paper presents ‘Physical and data safety of the cellular technology’ giving protection to device when it is dropped. That is the physical safety of cellular technology. But right now we are providing this physical safety by attaching separate hardware device. For that we are using inbuilt motion sensor technology in the smartphone. Then, if it is determined that the gadget has been dropped, gives the signal to our device using Bluetooth. It will guard our cellular device that is smartphone. Now consider a worst case, if cell phone is not is not protected when it is dropped at that time important data in that phone such as call history, messages, to-do’s, notes, calendars, etc. may vanish. For that we have one more solution that is the data safety of that smartphone. For this we are going to use cloud computing. The most important thing we are using in this is GPS. The data is synchronized with the clouds by the change of the location. Pushing device oriented information with cloud is nothing but Data Safety. As explained above we are clubbing the two separate things in cellular technology that is physical safety using in built motion sensor technology and data safety using cloud computing. Keywords: WSN, Smartphone, GPS, Security, Safety

1. Introduction Use of the smartphone is increasing rapidly. Now a days smartphone become cheaper; still much smartphones are greater than 10k. For ordinary man this amount is not small. In case by mistake if the smartphone is dropped from his/her hand then it may get cracked or damaged. And repairing it takes high cost as well as some times it cannot be repaired. Thus the entire amount paid for it gets wasted. It is a big loss to ordinary people. For this we are providing physical safety to smartphone to protect smartphone from cracking while it is dropped.

Prasad Sangpal

, IJRIT

404

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 404-407

And if the dropped smartphone is not protected then the next part that is the data part that is the important data in the smartphone like call history, SMS logs, text files, are stored on cloud. Although smartphone is cracked while dropping, the data in that smartphone can be retrieved, and so no data loss will occur. As we are using cloud services, the data on the cloud can be retrieved from anywhere; only authentication is needed to access the data. Important marked data like text files, call history and SMS logs can be accessed from anywhere. This is major advantage of our system. We are providing one more facility in this system that the data on the smartphone like text files, call history, SMS logs will be stored on the basis of GPS. Here we are using the GPS based data storage by using cloud services. Whenever user changes location that will be notified because of the GPS and the data will be stored on the cloud every time and that data also can be retrieved from anywhere. In the world there are two kind of people rich businessman and some ordinary people who have the amount 10k is also big. For the rich businessman or the rich people loosing or cracking of expensive smartphone is not as much loss to them. They have the only important thing that is the data in it and we are providing the data safety to smartphone by using GPS technology with the cloud services as well as data is saved while the smartphone is dropped. And thus important part to them that is data is safe. For example a big businessman forgotten his or her smartphone anywhere or if it stolen then also he/she can retrieve the data just by authenticating user name and password that means the important data is safe. Now consider the another category of people i.e. ordinary or poor people who has 10k amount is also more and cracking of the smartphone which they have purchased by giving huge amount more than 10k is big loss. For them we are providing physical safety to the smartphone because of this his/her trip repairing or taking new smartphone or repairing it is prevented. 2.

PREVIOUS SYSTEM

A traditional airbag in cars is deployed upon impact, cushioning the passengers' heads as they are thrust forward. The phone system hopes to use similar techniques to prevent damage to the mobile upon inevitable impact. When you get a smartphone you need to be very protective of it. These phones are sturdy, but these products are nothing like the analog phones from many years ago. People could drop some of the older phones many times and continue to use their phones. Many people can drop there smartphone once and they are making a trip to the store for a new one. Here are four quick tips to help people avoid cracking their new smart phone.Take the phone off vibrate; So many people love to put their phones on vibrate and leave it that way. That is not a good idea. Sometimes people get the benefit of catching the phone before it vibrates off a counter top. Most people do not. You may never drop the phone out of your hand. You may be the most careful person in the world. None of this will matter if your vibrating phone falls off the counter though. A great fall, depending on the area of the house, could lead to a great crack. Stop letting friends use it; it’s sad to say, but the reality is that no one is going to take care of your phone like you. Friends are great people to hang out with and tell your deepest darkest secrets to. With this being said, they are not the best people to get access to your cell phone. Friends are less likely to be as careful as you with the phone. They may be doing all the things that you are trying to avoid doing to prevent cracking the phone. It’s so easy for other people to let the phone slip when they are out of your site. A cracked phone can ruin a friendship quickly. It’s sort of like handing the keys over to a friend that has a bad driving record. The fact that they are using your phone is a sign of possible negligence. Avoid talking in the car; many people talk in the car on their phones. They get off the phone and throw it down in their lap. They get out of the car and the phone falls out with them. Don’t make this mistake.Get a ugly case; it’s true, most phone cases that are really good are not very appeasing to the eye. There are all types of cool phone cases on the market with designs and nice patterns. Everyone loves those. It would only make sense for you to join the crowd and buy one of these. After all, you don’t want to be a misfit. This is what your mind may be leading you to do. What you have to do is ask around. You will probably find lots of your friends that are quite disgruntled with the crappy – but stylish – covers that failed to protect their phones.

Prasad Sangpal

, IJRIT

405

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 404-407

3.

PROPOSED SYSTEM

For the physical safety we are using the motion sensor technology which is already built in the smartphone like accelerometer. As the anything/matter moving in the world and if it is viewed in the graph form that means it changes the X-Y-Z co-ordinates. Accelerometer measures that co-ordinates and we are using already in built accelerometer in the smartphone. Whenever smartphone is dropped that means it changes it’s co-ordinates rapidly. We are measuring these co-ordinates and sending the signal to our device. Measuring the co-ordinates means subtraction of smartphone’s current co-ordinates and new co-ordinates. This difference gives how fast smartphone is moving. We have already set a default value we call it as threshold value. Whenever measured difference crosses threshold value that means the smartphone is dropping. As soon as it detects it is dropped the signal is passed to airbag unit via Bluetooth and the airbag will be blown before it deployed on the ground and simultaneously the important data on the smartphone is sent on the cloud because of this we get physical and data safety of the smartphone. Physical safety means it is protected from the cracking while it is dropped and the data safety means data is also safe on the cloud. As well as we are doing one more thing that the important data like call history, SMS logs, and important marked file uploading on the cloud using GPS technology. I.e. whenever user changes location the data is uploaded on the cloud. One more additional thing is that the manual uploading the important data. i.e. we are providing a button to it and user can also manual upload the data. We have added add_location button to set the location manually.

4. Air-Bags An airbag is a vehicle safety device. It is an occupant restraint system consisting of a flexible fabric envelope or cushion designed to inflate rapidly during an automobile collision. Its purpose is to cushion occupants during a crash and provide protection to their bodies when they strike interior objects such as the steering wheel or a window. Modern vehicles may contain multiple airbag modules in various side and frontal locations of the passenger seating positions, and sensors may deploy one or more airbags in an impact zone at variable rates based on the type, angle and severity of impact; the airbag is designed to only inflate in moderate to severe frontal crashes. Airbags are normally designed with the intention of supplementing the protection of an occupant who is correctly restrained with a seatbelt. Most designs are inflated through pyrotechnic means and can only be operated once. Newer side-impact airbag modules consist of compressed air cylinders that are triggered in the event of a side impact vehicle impact. The first commercial designs were introduced in passenger automobiles during the 1970s with limited success. Broad commercial adoption of airbags occurred in many markets during the late 1980s and early 1990s with a driver airbag, and a front passenger airbag as well on some cars; and many modern vehicles now include four or more units.

3. Conclusion Data Safety of physical data can be achieved using Air-bags. Using the given system its easy to prevent data loss from the smartphone. By using data safety, users can now access data anytime and anywhere regardless the situation of data source device. Our system provides viable solutions for physical safety of the cellular technology.

Acknowledgment First and foremost, we would like to thank my guide, Prof. Deepak C. Mehetre, for his guidance and support. We will forever remain grateful for the constant support and guidance extended by guide, in making this paper. Through our many discussions, he helped us to form and solidify ideas. The invaluable discussions we had with him, the penetrating questions he has put to us and the constant Prasad Sangpal

, IJRIT

406

IJRIT International Journal of Research in Information Technology, Volume 2, Issue 5, May 2014, Pg: 404-407

motivation, has all led to the development of this project. We are also thankful to our family members for encouragement and support.

References 1. 2. 3. 4. 5. 6. 7. 8. 9.

10. 11. 12. 13. 14.

Ebert, Christof; Jones, Capers (2009-04-01). "Embedded Software: Facts, Figures, and Future". IEEE Computer Society Press. Retrieved 2010-09-15. "Gyroscope" by Sándor Kabai, Wolfram Demonstrations Project. Discover magazine 20 things you didn't know about tunnels (Number 8). Einstein, Albert (1920). "20". Relativity: The Special and General Theory. New York: Henry Holt. p. 168. ISBN 1-58734-092-5. Penrose, Roger (2005) [2004]. "17.4 The Principle of Equivalence". The Road to Reality. New York: Knopf. pp. 393–394. ISBN 0-470-08578-9. Doscher, James. "Accelerometer Design and Applications". Analog Devices. Archived from the original on 13 December 2008. Retrieved 2008-12-23. "Solenoid". Online Etymology Dictionary. "Parcours pédagogique — Ampère et l'histoire de l'électricité". CNRS. Retrieved July 31, 2012. Mariana Carroll, Paula Kotzé, Alta van der Merwe (2012). "Securing Virtual and Cloud Environments". In I. Ivanov et al. Cloud Computing and Services Science, Service Science: Research and Innovations in the Service Economy. Springer Science+Business Media. doi:10.1007/978-1-4614-2326-3. "The NIST Definition of Cloud Computing". National Institute of Standards and Technology. Retrieved 24 July 2011. "What is Cloud Computing?". Amazon Web Services. 2013-3-19. Retrieved 2013-3-20. "Baburajan, Rajani, "The Rising Cloud Storage Market Opportunity Strengthens Vendors," infoTECH, August 24, 2011". It.tmcnet.com. 2011-08-24. Retrieved 2011-12-02. Oestreich, Ken, (2010-11-15). "Converged Infrastructure". CTO Forum. Thectoforum.com. Retrieved 2011-12-02. Strachey, Christopher (June 1959). "Time Sharing in Large Fast Computers". Proceedings of the International Conference on Information processing, UNESCO. paper B.2.19: 336–341.

Prasad Sangpal

, IJRIT

407

Survey on Physical and Data Safety for Cellular ...

Here we are using the GPS based data storage by using cloud services. ... products are nothing like the analog phones from many years ago. People could drop ...

40KB Sizes 1 Downloads 201 Views

Recommend Documents

Survey on Data Clustering - IJRIT
common technique for statistical data analysis used in many fields, including machine ... The clustering process may result in different partitioning of a data set, ...

Survey on Data Clustering - IJRIT
Data clustering aims to organize a collection of data items into clusters, such that ... common technique for statistical data analysis used in many fields, including ...

Guideline on efficacy and target animal safety data requirements for ...
Dec 8, 2016 - General requirements for applications for minor uses or minor species .. 6. 6. .... to stimulate the development of new veterinary medicines for minor species and ... The general aim of this guideline is to define acceptable data ...

Guideline on efficacy and target animal safety data requirements for ...
Dec 8, 2016 - opportunities to reduce data requirements for veterinary medicines intended ... there is now a legal obligation to use alternatives to animal tests if .... information relating to use in that species may can be .... sense of security'.

Guideline on efficacy and target animal safety data requirements for ...
Dec 8, 2016 - little flexibility in the application of the guideline and the proposed ... option to support the development of, for example, effective antimicrobials ...

Integrating Wireless LAN and Cellular Data for the ...
of an SMG and a VSA server at proper locations on the intranet .... current location are encrypted and encapsulated. The SMG ..... Princeton University. He is a ...

Integrating Wireless LAN and Cellular Data for the ...
face card for the mobile laptop or PDA that users can install. No existing ..... alive after they close the laptop in one loca- tion and open it in a new one. .... Page 9 ...

Survey on clustering of uncertain data urvey on ...
This paper mainly discuses on different models of uncertain data and feasible methods for .... More specifically, for each object oi, we define a minimum bounding .... The advances in data collection and data storage have led to the need for ...

Proteomics: quantitative and physical mapping of cellular proteins
the study of global changes in protein expression, and cell-map proteomics, the systematic study of ... cal limitations outlined below, the field of proteomics.

A Survey on Brain Tumour Detection Using Data Mining Algorithm
Abstract — MRI image segmentation is one of the fundamental issues of digital image, in this paper, we shall discuss various techniques for brain tumor detection and shall elaborate and compare all of them. There will be some mathematical morpholog

A Survey on Data Stream Clustering Algorithms
The storage, querying, processing and mining of such data sets are highly .... problems, a novel approach to manipulate the heterogeneous data stream ...

Inference on Inequality from Complex Survey Data
testing economic inequality when the data come from stratified and clustered ..... and its estimate are cadlag (continuous from the right with limit on the left), ...

Material Safety Data Sheet
Material Safety Data Sheet. Date of issue. 06/21/11. Product name. BIO FRESH. Product code. 6819. Supersedes 07/29/08. Product use. Deodorizer.

A Short Survey on P2P Data Indexing - Semantic Scholar
Department of Computer Science and Engineering. Fudan University .... mines the bound of hops of a lookup operation, and the degree which determines the ...

Inference on Inequality from Complex Survey Data 9
data from the complexly designed Indian National Sample Survey. Next, we .... these distributions to complex sample design, we make our procedures ...... Ideally, one should consult the sample design document to see what variables are the.

A Short Survey on P2P Data Indexing - Semantic Scholar
Department of Computer Science and Engineering. Fudan University ... existing schemes fall into two categories: the over-DHT index- ing paradigm, which as a ...

Material Safety Data Sheet
Mar 8, 2010 - CAS Number Content (weight%) ... Hold eyelids open to facilitate rinsing. ... Avoid all sources of ignition: heat, sparks, or open flame. STORAGE.

Material Safety Data Sheet
Mar 8, 2010 - Safety data sheet ... Substance/preparation and company identification. 24 Hour .... Consult local fire marshal for storage requirements.

On designing next generation MAC for cellular networks using the ...
the capabilities of the cellular network by creating and instantiating MAC services. ... which orchestrates services and functions, and (iii) interfaces that allow the ...

On designing next generation MAC for cellular networks using the ...
and protocol efficiency based on open-source design tools. The architecture ... systems, namely Application Optimization Support (AOPS). For each service, we ...

Overview of comments received on 'Guideline on safety and residue ...
Dec 8, 2016 - and residue data requirements for veterinary medicinal products intended ..... considered necessary that a fully validated analytical method is ...

Overview of comments received on 'Guideline on safety and residue ...
Dec 8, 2016 - Comment: Scientific advice is free of charge in some cases for MUMS products if requested by SME's. This facility should be added in relation ...

6.Standards for on-Board Telematics Systems for Vehicles (Safety ...
Page 1 of 7. Supply Chain Management Journal. 44 Issue 2/2010. Standards for on-Board Telematics Systems for Vehicles. (Safety and Security). Angel Ciprian CORMOŞ. Alexandru MIRCEA. POLITEHNICA University of Bucharest. Abstract. Road Transport and T

safety data sheet
according to 67/548/EEC or Regulation (EC) No 1907/2006 (REACH). .... Safety, health and environmental regulations/legislation specific for the substance or ...