SlideShare una empresa de Scribd logo
1 de 32
LOST MOBILE TRACKING SYSTEM Under the Guidance of Mr. SRINIVAS M.Tech Senior lecturer,Dept of CSE Project Team members  GURUPRASAD T V 		4MK07CS018 SANDESH  SHETTY	            4MK07CS041 SHUBHA               		4MK07CS047 VANDITHA K		4MK07CS054 5/17/2011 1 LMTS
ABSTRACT ,[object Object]
In case a person loses his mobile he becomes totally handicapped due to his inability to get in touch with his contacts.
Though we can get a new SIM card with same number but the precious handset and the valuable contact number and data stored is permanently lost.
With the cutting edge technology it is possible to trace the lost handset. This “Lost Mobile Tracking System” is mainly designed for tracking the lost mobile phone.5/17/2011 2 LMTS
PROBLEM STATEMENT ,[object Object]
Here we are presenting a nice way to track the lost cell phone using GSM technology.
Lost Mobile Tracking System is a very powerful and efficient way for people to recover their mobile once they have lost it.
This application gives an idea to how GSM locates cell phones in the world and how this information can be used by owners to find their lost cell phone.5/17/2011 3 LMTS
PROJECT OVERVIEW ,[object Object]
 Here we retrieve the location string and contacts details by sending a SMS to the lost cell in a particular format.
Anytime our lost cell gets an incoming call / outgoing call, we get an alert to our cell along with the number
Contacts details of the new SIM card such that we can trace who it is by calling his / her friends
When SIM card replaced, you get to see the IMEI number of your set, details of the new SIM inserted along with the location string5/17/2011 4 LMTS
DESIGN Sending SMS for location Any mobile used for sending SMS Symbian OS based mobile phone where this  Application is running Sending location string  Sending SMS for contact list  Sending contact list Sending incoming/outgoing no. Sending IMSI & IMEI of New SIM  5/17/2011 5 LMTS
DATA FLOW DIAGRAM 5/17/2011 6 LMTS store
Implementation details: This application contains four modules, ,[object Object]
Call registry
Contact details
Insert new SIM card5/17/2011 7 LMTS
[object Object],This  module is used for fetching the location string / the tower that transmits signals to the lost cell. We retrieve the location string by sending one SMS to the lost cell in a particular format. The mobile will reply by sending the Location String. The DFD of location string as follows. 5/17/2011 LMTS 8
5/17/2011 LMTS 9 Mobile(Server) Mobile(Client) On the mobile Create a message(LOC1) 4   Messaging Load the SIS file into the mobile(server) and start the application 1 Installation Install & start the project Send Send this message to destination mobile where the application is running 5   Send Message Then the application will start listening to all the incoming messages 2 Process Check for message Search for msg If the incoming message contains LOC1 then it will fetch location string of mobile phone and send to destination mobile 3 Searching D1 LOC1 Store
[object Object],	This module helps us to give the information about the incoming and outgoing calls. Anytime our lost cell gets an incoming call / outgoing call, we get an alert to our cell along with the number. If there is any incoming or outgoing call it will track that call and send that number to predefined number. The DFD of call registry as follows. 5/17/2011 LMTS 10
5/17/2011 LMTS 11 Mobile(Server) Mobile(Client) On the mobile Load the SIS file into the mobile(server) and start the application 1 Installation Get the incoming and outgoing numbers 4   Receive the message Install & start the project Then the application will start listening to all the incoming & outgoing calls 2 Process Send the message If there is any incoming or outgoing call then it will fetch that no. and send it to destination mobile 3 Process
[object Object],	This module helps us to get the contact details of the lost cell. We retrieve the contact details by sending one SMS to the lost cell in a particular pre-defined format. The application will reply by sending a message which contains all details of the contacts whichever we wanted. 5/17/2011 LMTS 12
5/17/2011 LMTS 13 Mobile(Server) Mobile(Client) On the mobile Create a message(HAI) 4   Messaging Load the SIS file into the mobile(server) and start the application 1 Installation Install & start the project Send Send this message to destination mobile where the application is running 5   Send Message Then the application will start listening to all the incoming messages 2 Process Check for message Search for msg If the incoming message contains HAI then it will fetch contact list of  sim and send it to destination mobile Searching 3 D1 HAI Store
[object Object],This module helps us to get the information about changed SIM card. When SIM card replaced, the application will automatically send the IMEI number of lost cell, details of the new SIM inserted i.e. IMSI number along with the location string. The DFD of insert new sim card as follows. 5/17/2011 LMTS 14
5/17/2011 LMTS 15 Mobile(Server) Mobile(Client) On the mobile Load the SIS file into the mobile(server) and start the application 1 Installation Get the information of new sim card 4   Receive the message Install & start the project Then the application will start listening to all the incoming messages and calls 2 Process Send the message If the person will change sim then it will fetch all the information about new sim and send it to destination mobile 3 Process
TESTING ,[object Object]
Testing is a process of technical investigation, performed on behalf of stakeholders, that is intended to reveal quality-related information about the product with respect to the context in which it is intended to operate.5/17/2011 16 LMTS
White box and black box testing 		White box and black box testing are terms used to describe the point of view a test engineer takes when designing test cases. Black box being an external view of the test object and white box being an internal view. System testing 		In system testing the software is integrated to the overall product and tested to show that all requirements are met. In this step the software is tested to weather it meets the requirements to work as a network simulator. 5/17/2011 LMTS 17
Usability testing 		Usability testing is a technique used to evaluate a product by testing it on users. Usability testing focuses on measuring a human-made product's capacity to meet its intended purpose.  Load testing 		Load testing is performed to determine a system’s behavior under both normal and anticipated peak load conditions Performance testing 		Performance Testing covers a broad range of engineering or functional evaluations where a product or system is not specified by detailed component specifications rather, emphasis is on the final measurable performance characteristics. 5/17/2011 LMTS 18

Más contenido relacionado

Destacado

Android Project report on City Tourist Location based services (Shuja ul hassan)
Android Project report on City Tourist Location based services (Shuja ul hassan)Android Project report on City Tourist Location based services (Shuja ul hassan)
Android Project report on City Tourist Location based services (Shuja ul hassan)Shuja Hassan
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationKavita Sharma
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkKrishna Ghanva
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on smsiCreateWorld
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategymrmwood
 
Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)Priyanka Kapoor
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
 
Location based reminder
Location based reminderLocation based reminder
Location based reminderjunnubabu
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuitMoin Aman
 
Restaurant billing application
Restaurant billing applicationRestaurant billing application
Restaurant billing applicationch samaram
 
Application of coordinate system and vectors in the real life
Application of coordinate system and vectors in the real lifeApplication of coordinate system and vectors in the real life
Application of coordinate system and vectors in the real lifeАлиакбар Рахимов
 
Project report on gsm based digital notice board
Project report on gsm based digital notice boardProject report on gsm based digital notice board
Project report on gsm based digital notice boardmanish katara
 
Sample project abstract
Sample project abstractSample project abstract
Sample project abstractklezeh
 

Destacado (18)

Final_report
Final_reportFinal_report
Final_report
 
android report
android reportandroid report
android report
 
Android Project report on City Tourist Location based services (Shuja ul hassan)
Android Project report on City Tourist Location based services (Shuja ul hassan)Android Project report on City Tourist Location based services (Shuja ul hassan)
Android Project report on City Tourist Location based services (Shuja ul hassan)
 
Room rental system
Room rental systemRoom rental system
Room rental system
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
 
Tracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication networkTracking and positioning of mobile in telecommunication network
Tracking and positioning of mobile in telecommunication network
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on sms
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)Report on e-Notice App (An Android Application)
Report on e-Notice App (An Android Application)
 
Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)Final Year Project Report on Self Tacit Zone (Location Based Android App)
Final Year Project Report on Self Tacit Zone (Location Based Android App)
 
Location based reminder
Location based reminderLocation based reminder
Location based reminder
 
Project report of Cell phone detector circuit
Project report of Cell phone detector circuitProject report of Cell phone detector circuit
Project report of Cell phone detector circuit
 
Restaurant billing application
Restaurant billing applicationRestaurant billing application
Restaurant billing application
 
Application of coordinate system and vectors in the real life
Application of coordinate system and vectors in the real lifeApplication of coordinate system and vectors in the real life
Application of coordinate system and vectors in the real life
 
Project report on gsm based digital notice board
Project report on gsm based digital notice boardProject report on gsm based digital notice board
Project report on gsm based digital notice board
 
Abstract
AbstractAbstract
Abstract
 
Sample project abstract
Sample project abstractSample project abstract
Sample project abstract
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 

Similar a Mobile tracking sysytem using call registry

A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloningAnkur Kumar
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSPY24
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking ApplicationIRJET Journal
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemUniversitas Pembangunan Panca Budi
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
DTMF based Home Automation System
DTMF based Home Automation SystemDTMF based Home Automation System
DTMF based Home Automation SystemDaksh Raj Chopra
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTAnisha Mangalappilly
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperMousselmal Tarik
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaStudent
 
Telecom Case studies
Telecom Case studiesTelecom Case studies
Telecom Case studiesShreya De
 

Similar a Mobile tracking sysytem using call registry (20)

A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
Clonning
ClonningClonning
Clonning
 
callmagic pro spyphone software.pdf
callmagic pro spyphone software.pdfcallmagic pro spyphone software.pdf
callmagic pro spyphone software.pdf
 
Mobile Phone and SIM card cloning
Mobile Phone and SIM card cloningMobile Phone and SIM card cloning
Mobile Phone and SIM card cloning
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking Application
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating System
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
En Route Product Note
En Route Product NoteEn Route Product Note
En Route Product Note
 
DTMF based Home Automation System
DTMF based Home Automation SystemDTMF based Home Automation System
DTMF based Home Automation System
 
EENA 2021 - Advanced Mobile Location (3/3)
EENA 2021 - Advanced Mobile Location (3/3)EENA 2021 - Advanced Mobile Location (3/3)
EENA 2021 - Advanced Mobile Location (3/3)
 
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENTMOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
MOBILE CLONING- HOW TO PREVENT CELLPHONE CLONING IN CDMA ENVIRONMENT
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
Final jyo ppt
Final jyo pptFinal jyo ppt
Final jyo ppt
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Telecom Case studies
Telecom Case studiesTelecom Case studies
Telecom Case studies
 

Último

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Mobile tracking sysytem using call registry

  • 1. LOST MOBILE TRACKING SYSTEM Under the Guidance of Mr. SRINIVAS M.Tech Senior lecturer,Dept of CSE Project Team members GURUPRASAD T V 4MK07CS018 SANDESH SHETTY 4MK07CS041 SHUBHA 4MK07CS047 VANDITHA K 4MK07CS054 5/17/2011 1 LMTS
  • 2.
  • 3. In case a person loses his mobile he becomes totally handicapped due to his inability to get in touch with his contacts.
  • 4. Though we can get a new SIM card with same number but the precious handset and the valuable contact number and data stored is permanently lost.
  • 5. With the cutting edge technology it is possible to trace the lost handset. This “Lost Mobile Tracking System” is mainly designed for tracking the lost mobile phone.5/17/2011 2 LMTS
  • 6.
  • 7. Here we are presenting a nice way to track the lost cell phone using GSM technology.
  • 8. Lost Mobile Tracking System is a very powerful and efficient way for people to recover their mobile once they have lost it.
  • 9. This application gives an idea to how GSM locates cell phones in the world and how this information can be used by owners to find their lost cell phone.5/17/2011 3 LMTS
  • 10.
  • 11. Here we retrieve the location string and contacts details by sending a SMS to the lost cell in a particular format.
  • 12. Anytime our lost cell gets an incoming call / outgoing call, we get an alert to our cell along with the number
  • 13. Contacts details of the new SIM card such that we can trace who it is by calling his / her friends
  • 14. When SIM card replaced, you get to see the IMEI number of your set, details of the new SIM inserted along with the location string5/17/2011 4 LMTS
  • 15. DESIGN Sending SMS for location Any mobile used for sending SMS Symbian OS based mobile phone where this Application is running Sending location string Sending SMS for contact list Sending contact list Sending incoming/outgoing no. Sending IMSI & IMEI of New SIM 5/17/2011 5 LMTS
  • 16. DATA FLOW DIAGRAM 5/17/2011 6 LMTS store
  • 17.
  • 20. Insert new SIM card5/17/2011 7 LMTS
  • 21.
  • 22. 5/17/2011 LMTS 9 Mobile(Server) Mobile(Client) On the mobile Create a message(LOC1) 4 Messaging Load the SIS file into the mobile(server) and start the application 1 Installation Install & start the project Send Send this message to destination mobile where the application is running 5 Send Message Then the application will start listening to all the incoming messages 2 Process Check for message Search for msg If the incoming message contains LOC1 then it will fetch location string of mobile phone and send to destination mobile 3 Searching D1 LOC1 Store
  • 23.
  • 24. 5/17/2011 LMTS 11 Mobile(Server) Mobile(Client) On the mobile Load the SIS file into the mobile(server) and start the application 1 Installation Get the incoming and outgoing numbers 4 Receive the message Install & start the project Then the application will start listening to all the incoming & outgoing calls 2 Process Send the message If there is any incoming or outgoing call then it will fetch that no. and send it to destination mobile 3 Process
  • 25.
  • 26. 5/17/2011 LMTS 13 Mobile(Server) Mobile(Client) On the mobile Create a message(HAI) 4 Messaging Load the SIS file into the mobile(server) and start the application 1 Installation Install & start the project Send Send this message to destination mobile where the application is running 5 Send Message Then the application will start listening to all the incoming messages 2 Process Check for message Search for msg If the incoming message contains HAI then it will fetch contact list of sim and send it to destination mobile Searching 3 D1 HAI Store
  • 27.
  • 28. 5/17/2011 LMTS 15 Mobile(Server) Mobile(Client) On the mobile Load the SIS file into the mobile(server) and start the application 1 Installation Get the information of new sim card 4 Receive the message Install & start the project Then the application will start listening to all the incoming messages and calls 2 Process Send the message If the person will change sim then it will fetch all the information about new sim and send it to destination mobile 3 Process
  • 29.
  • 30. Testing is a process of technical investigation, performed on behalf of stakeholders, that is intended to reveal quality-related information about the product with respect to the context in which it is intended to operate.5/17/2011 16 LMTS
  • 31. White box and black box testing White box and black box testing are terms used to describe the point of view a test engineer takes when designing test cases. Black box being an external view of the test object and white box being an internal view. System testing In system testing the software is integrated to the overall product and tested to show that all requirements are met. In this step the software is tested to weather it meets the requirements to work as a network simulator. 5/17/2011 LMTS 17
  • 32. Usability testing Usability testing is a technique used to evaluate a product by testing it on users. Usability testing focuses on measuring a human-made product's capacity to meet its intended purpose. Load testing Load testing is performed to determine a system’s behavior under both normal and anticipated peak load conditions Performance testing Performance Testing covers a broad range of engineering or functional evaluations where a product or system is not specified by detailed component specifications rather, emphasis is on the final measurable performance characteristics. 5/17/2011 LMTS 18
  • 33. Testing details: Test case 1: To retrieve the location of the lost mobile Objectives: To fetch the location of the lost mobile and to receive the input message to fulfill the mentioned task. Test Case Description: To send a message in predefined format to the lost cell to fetch the current location of the lost cell from another mobile. Desired Output: The input message should be taken successfully. The lost cell should reply with a message containing the location string to a predefined number. Actual Output: The predefined number receives a message containing the location string. 5/17/2011 19 LMTS
  • 34. Test Case 2: Call Registry Objectives: To get an alert to our cell when the lost cell gets either incoming or outgoing call. Test Case Description: If the lost cell gets an incoming call or outgoing call, the application will track that call and send the number to the predefined number.  Desired Output: The predefined number should receive an alert message containing phone number when the lost cell gets an incoming and outgoing call.  Actual output: The predefined number receives the alert message. 5/17/2011 20 LMTS
  • 35. Test case 3: Contact Details: Objectives: To fetch the contact details from the lost cell by sending a message in predefined format. Test Case Description: We send a message in the predefined format to our lost cell to get the contact details from the lost cell. The application will reply with a message containing contact details to a predefined number. Desired Output: The input should be taken successfully. The lost cell should reply with the message containing contact details to the predefined number. Actual Output: The predefined number receives the message containing the contact details. 5/17/2011 21 LMTS
  • 36. Test Case 4: Change of SIM Objective: To receive the Information of the new SIM card when the old SIM is replaced Test Case Description: When SIM card is replaced, the application should automatically send the IMEI number of lost cell, details of the new SIM inserted i.e. IMSI number along with the location string to the predefined number. Desired Output: The application should send the information of new SIM card to the predefined number when the SIM is replaced in the lost cell. Actual Output: The predefined number receives the message containing all information about the changed SIM. 5/17/2011 22 LMTS
  • 37. RESULTS Snap shots: a) SIS files have been transferred b) Installing EzBoot file 5/17/2011 23 LMTS
  • 38. Snapshots: 5/17/2011 c)Installing LMTS file d)Installing in progress LMTS 24
  • 39. Snapshots: 5/17/2011 LMTS 25 e)Mobile tracker installed f)Application running in hidden mode
  • 40. 5/17/2011 LMTS 26 Snapshots: g)Sending predefined string to fetch the location string.   h)Message has been received and location string has been fetched and returned.   i)Message containing the location string
  • 41. Snapshots: j) Arrow mark indicating incoming k) Incoming number number has been fetched and received returned 5/17/2011 LMTS 27
  • 42. Snapshots: l) Arrow mark indicating outgoing k) Outgoing number number has been fetched and received returned 5/17/2011 LMTS 28
  • 43. 5/17/2011 LMTS 29 Snapshots: p) Message containing contact details o) Message received and fetching contact details. n) Sending message to fetch the contact details
  • 44. 5/17/2011 LMTS 30 Snapshots: r) Message containing information about the new SIM card q) Insert new SIM card
  • 45.
  • 46. It traces the location string, contact details, and call registry of the lost cell phone.
  • 47. In addition to that even if the SIM card has been replaced, all its details will be retrieved.
  • 48. Allows us to get the lost cell without knowing the IMEI number of the lost cell.5/17/2011 31 LMTS
  • 49. 5/17/2011 LMTS 32 Thank you