Student Information tracking System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
An Android application provides interaction between people. In this paper, basically focus on the student activity. Now a day’s students are fad on their cell phones to chatting, internet surfing, calling, etc. during the lectures. So this application may help college to spy on their students. The application tracks student activities like call logs, location, surfing information from their cell phones. The current location trace by using GPS system to keep track over them, get information and keep surveillance on them. Such activities would be sending in the form of text message.
Authors and Affiliations
Ms. Ankita Nagdeve, Ms. Twinkle Borkar, Prof. Ms. Vaishali Sarangpure
Pattern Matching and Analysis of Vehicle Number Plate’s Recognition System Using Template Matching
A pattern is any arrangement of objects or entities. The term "arrangement" is used here to indicate that a pattern is by definition non-random and at least potentially describable. All theories imply some pattern, but...
Distributed Hybrid Book Recommendation System
Many e-commerce Websites are using recommendation systems to provide relevant suggestions to their customers. Every situation can’t be solved by same solution. Therefore , in this paper we are providing distributed hybr...
To improve cp and cpk of keystone angle and Axial height in piston ring on Katoka ks grinder
In present generation, agile manufacturing machine and their automation becoming more complex. The manufacturing company changes their production system over year. Competition has increase dramatically. Customer focus p...
Electric Commuter Bike
Increasing demand for non-polluting mechanized transportation has revived the interest in the use of electric power for personal transportation and also reduced reliance on automobiles. Electric bike is a low cost alter...
A Review on Novel SAT KAMAN protocol to prevent DOS attacks in MANET
The Kerberos assisted authentication protocol is the efficient protocol that have been used for this identity validation. Kaman is the extension of Kerberos protocol with the use of Kaman nodes in the ad hoc network are...