Sie sind auf Seite 1von 13

Android Application for Call Taxi

Abstract of "Android Application for Call Taxi" Project

This project addresses the study of the recently launched Google Android platform, and its
online application marketplace, called the Android Market. The project examines the paths to
success for third-party developers building applications for Android by comparing them with
application development for the Apple iPhone. In addition, the project also includes a study of
the Android business ecosystem. Research on related topics shows that mobile ecosystem
benefits third-party developers and those application vendors play a critical role in contributing
to the success of Android.
The main goal of this project is to develop an accessible and comprehensive Eclipse structure
application, can potentially assist individuals to book a taxi from a phone and for the company to
maintain a database for booking and sending driver details.
Existing system as Call Taxi Wiki, which is a system exists in the market for one year, the
existing system helps user to find the nearest taxi around in a particular city. The system all
allows full internet access. However, the number of cities in the whole world is huge; database
cant store all the cities names.
Methodologies are the process of analyzing the principles or procedure of a progressive Call taxi

Main Modules



Transaction Status




Sign up:
This is the first step what user to do. In this module, user wants to create an account in database,
to call taxi from system. The registration processes are done by any person non-violating the
database privacy rules. The registration will be permitted by call taxi system administrator. After
the registration process completed user can get the authentication code and machine generated
user id, by using this only user can login to the call system.
Driver and Customer Login:

In this module user want to register the personal details in the call taxi company database and get
the authentication processes to go forward.
User booking and cancel booking:.
In this module authorized drivers can book a taxi from the call taxi system. Here also shows all
the details about the driver who also registered in the system. And the system admin give the
personal details to the particular driver only after the matching process is done. Now the
matching process is done by the admin. After getting the user details, driver can wait the user
confirms the booking.
Confirm booking:
In this process, user will get the information about the distance, time and required fees from the
system, then booking can be confirmed or cancelled in the above module.
Transaction status:
This is a module in which only admin can access, all registrations got permitted by this module.
Booking request by users and drivers information also can be viewed in this module, such as the
admin will arrange available driver to serve the particular request.

Call Taxi System is used to maintain the user database in the format. It also very easy to retrieve
the accurate data from a database, here all the information about the user are maintained securely
and also here we achieve the confidentiality for the datas stored in the database. Concerning the
actual execution of the database update, once the system has verified that the Booking be safely
inserted to the database the data can be easily accessed and be used for further purposes and also
the transactions can be done both the ways. Its applied by retrieving information from the

database and storing through the android application.

Future Enhancements
Devising private update techniques to database systems that support notions of anonymity
different than k-anonymity.
Dealing with the case of malicious parties by the introduction of an un-trusted, no colluding
third party.
Implementing a real-world database system.
Improving the efficiency of an application, in terms of number of transactions exchanged
and in terms of their sizes, as well.

Highlights of the Project

A system which can be used for user to login to connect a database is proposed. The user can just
login to the system over internet, and book the taxi from location to location. With the help of the
proposed system, user can book taxi without making phone call, which takes time to wait to call
in. In the proposed system, checking the data that are entered in the databases does not violate
privacy, and performs such verification without seeing any sensitive data of an individual. Under
this approach, the entire tuple has to be revealed to the party managing the database server, thus
violating the privacy of the user. Another possibility would be to make available the entire
database to the user so that the user can verify himself if the insertion of his/her data violates
his/her own privacy. This approach however, requires making available the entire database to the
user thus violating data confidentiality. Once this anonymized record is stored in the research
database, the non anonymized version of the record is removed from the system of the facility.
Thus, the research database used by the researchers is anonymous.

System Specification
The hardware and software requirements for the development phase of our project are:
Software Requirements :
FRONT END : Eclipse with Android plug
Hardware Requirements :











Aadhaar Plus

Aadhaar Plus Project is mainly based on the RFID technology. In this project we used Radio Frequency Identification
technology (RFID); we have an RFID card which is issued to each and every citizen with a unique identification number in it. This
card will be used as a unique identification and will be used in various aspects which have been described in the following Report.
Now before going to the details of the Project we should first know about the RFID technology. Radio frequency identification
(RFID) technology has been widely adopted in access control system. The control modules are developed based on embedded
systems. Embedded systems are becoming increasingly common due to the fast deployment of advanced microcontrollers offering
high processing speeds at an affordable price and allowing for simple and reliable use of Open Source software. The presented
system uses a microcontroller with a standard Ethernet interface, to validate users presenting an RFID Card.
The user credentials are validated locally or in a central database. Authorized users are given access to reserved areas. By using a
powerful database, very flexible and complex high level administration and management functions can be implemented. As we all
know about the Indian governments AADHAAR a unique identification Project which is being prepared by INFOSYS
TECHNOLOGIES. This Project is a higher or we can say a modified version of the AADHAAR card. This card will be unique for
every citizen in India. Its basically a Radio Frequency Identicifaction card, through which the particular details of a person will be















Driving Licence

The module will have all the necessary details of the passport, like all the issued VISA, Address, Name, Identification, and
Photograph. The module consists of VISA history, date of issue and expiry details. AADHAR PLUS card will act as Passport, and
we will not have to take the passport separately. The headache of carrying a passport booklet will be solved and just this card can
be used in various purposes. In National Information Centre (NIC) the database size will be reduced so it will be easier to maintain,
update and make changes. There will be only one database for passport and other modules. So it will reduce the size of database
and resource can be used properly and more structured manner. The traditional passport is issued to citizens of India for the
purpose of international travel. They act as proof of Indian nationality. The Consular Passport & Visa (CPV) Division of the
Ministry of External Affairs, functioning as the central passport organisation, is responsible for issuance of Indian passports to all
eligible Indian citizens.
Passports are issued from 37 locations across the country and 162 Indian missions abroad Types of traditional passports are
Regular passport (Deep Blue/Black cover) - Issued for ordinary travel, such as vacations and business trips (36 or 60 pages)
Diplomatic passport (Maroon cover) - Issued to Indian diplomats, top ranking government officials and diplomatic couriers.
Official passport (White cover) - Issued to individuals representing the Indian government on official business
In addition, select passport offices in India as well as overseas missions are authorised to issue Regular Indo-Bangladesh passports
and Indo-Sri Lankan passports, to Indian nationals resident in West Bengal, the North Eastern States, Tamil Nadu and Pondicherry.
These two passports permit travel to Bangladesh and Sri Lanka only and are not valid for travel to other foreign countries
In our project we dont have any such types. We have only one card which will work for all type of passports. This project not only
deals with passport but many other domains which are given below. In this particular domain of passport we mainly deal with the
issue of VISA and the other important fields of passport. The another important drawback on the traditional passport is that when
the pages get over in the passport we have to go for renewal of new one but in this AADHAR PLUS passport system we dont
have to issue a new one as there is no pages involved in this card, there is no chance of getting over with the pages for visa. There
is unlimited storage of visa. It will help overcome another important drawback of traditional passport system. The first RFID
passports ("E-passport") were issued by Malaysia in 1998. In addition to information also contained on the visual data page of the
passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits from the country.

It generally includes automating the car-parking payment facility where the RFID card will first check for the available balance in
the card (RFID acts as a Smart card) and will deduct the parking charges from the available amount thus reducing the risk of
escaping. And it will also reduce the problem of tender exchanges in the parking fee gates and also reduce the problem of carrying

Baltimore/Washington International Thurgood Marshall Airport also strives to make parking less painful. The airport installed a
smart parking system for its hourly and daily garages, which combine to offer 13 200 parking spaces. Sensors embedded in each
parking space at BWI detect whether the space is occupied, with that information fed into a central parking management system.
As drivers approach BWI on their way to departing flights, they see signs showing the availability of parking at the airports
garages. As a passenger enters a garage, signs indicate the total number of parking spaces available and the number on each level
[6]. At the levels, there are additional signs that tell the passenger how many spaces are available per row. A light over each space
indicates whether it is available: green for open, red for occupied. BWI was the first airport in the country to use smart parking
technology, says Jonathan Dean, spokesman for the Maryland Aviation Administration. The technology came to BWI after
Marylands transportation secretary saw it in use while on a trip to Europe.


It explains that the RFID reader will be connected to the microcontroller with the help of UART and the UART is also connected
to the PC/ LAPTOP and the PC or Laptop will execute the software part and show the forms and in that part only we can use the
different modules and can entry the data and keep the updates and in this was the project work out.


diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart. A
sequence diagram shows object interactions arranged in time sequence. It depicts the objects and classes involved in the scenario
and the sequence of messages exchanged between the objects needed to carry out the functionality of the scenario. Sequence
diagrams typically are associated with use case realizations in the Logical View of the system under development. A sequence
diagram shows, as parallel vertical lines (lifelines), different processes or objects that live simultaneously, and, as horizontal
arrows, the messages exchanged between them, in the order in which they occur. This allows the specification of simple runtime
scenarios in a graphical manner.
An organization's technical staff can find sequence diagrams useful in documenting how a future system should behave. During the
design phase, architects and developers can use the diagram to force out the system's object interactions, thus fleshing out overall
system design. One of the primary uses of sequence diagrams is in the transition from requirements expressed as use cases to the
next and more formal level of refinement. Use cases are often refined into one or more sequence diagrams. In addition to their use

in designing new systems, sequence diagrams can be used to document how objects in an existing (call it "legacy") system
currently interact. This documentation is very useful when transitioning a system to another person or organization
The sequence diagram of this card shows how the AADHAR PLUS card works and the steps involved in it. The user is first
checked for authorization and if the authorization is correct then only the access will be provided to the user. This authorization is
done with the help of a password. This password will be separate for each and every user. In case of Medical Details, this
authorization is not required. As in case of an emergency it will not be possible for any user to provide authentication. Thus this
module does not need authentication at all. But the other modules will need authentication as for the security reasons. So that the
passport and driving license details are safe and there is no unauthorized or illegal use of those details and in case of smart parking
also for keeping our e cash safe we have the password facility so that in case of lost card or theft, there should not be any misuse of
the card and so this will help to keep the details safe and secured. The given sequence diagram explains in what sequence and the
way the card works, authentication and other processes.


The above shown diagram is a working model. It shows how the RFID SCANNER reads the RFID TAG/CARD and the signal is
given to the PC and the modules will be shown. The computer displays four modules which are shown in above diagram and in the
right hand side a demo is shown, when we click in the Hospital button it will display another form which will be like the above
given demo which will have all the necessary hospital details and all. The same way it will work for each and every module.


The figure shows the hardware design of the AADHAR PLUS kit. The designed kit consists of all the hardware requirements for
this project. It contains the RFID Reader, Microcontroller 8051 along with the filters. In the right hand side we have step down
transformer which converts 120v to12v. It also shows a buzzer which will produce a sound when the card comes near the coil or
the scanner. This sound comes out only when the card comes within the range of the reader. Thus the card is read by the RFID

The AADHAR PLUS project has been documented to bring a substantial difference in the Indian Government, by helping them
introducing the AADHAR PLUS.
Our current objectives are to
To make the procedure for applying for passport and driving licence easy and quick.
In case of emergency/ accident this card will help to get the details about the patient and his medical history.
This card will also improve the classical parking system by making the parking charges payment automated which will make the

process faster and problems related to exchanges will be solved.

This card will help the traffic police/department to easily check the validity and other related issues of a driving licence.
Only Administrator can make the changes in the Database.
It will also act as identity card which will also have the permanent address and other required information in it.

Share on linkedinShare on reddit0

New CSE Projects : Database Synchronization, Data Mining For Credit Card Application Processing, Data Leakage
Detection, Channel Diversity in Wireless Mesh Network, Blog Mining and Emotion Argumentation,Automatic Alert Alarming For
Security Systems, Automated Parking System using RFID Technology, Aadhaar Plus

<< Back to CSE Projects

Accessing a Network Using Secure Mobile


Abstract of "Accessing a Network Using Secure Mobile Communications" Project

In recent years, the emergence of mobile phones has made their appearance in the cyberspace.
These smart phones can be used for normal telephonic purposes like making a call or sending
text messages etc, and advanced purposes like checking e-mails, chatting online using any IMs,
playing games with interactive GUIs, cloud services, etc. Thus security plays a vital role in
todays mobile world. In this project, a method is proposed to overcome certain disadvantages
faced by symmetric algorithms during key exchange in the internet using a simple call blocker
application that synchronizes user data with the users account in the server. There are security
issues like sniffing of data while accessing information through open channel. Proper security
measures can help to deal with the common security threats faced by mobile phone users such as
data protection, privacy, application and personal information security. Cryptographic techniques
play an important role in protecting communication links and data, since access to data can be
limited to those who hold the proper key. This project discusses a method to securely access
information in a network by an android mobile application using AES cryptographic technique.
The project also describes a new key sharing algorithm, based on symmetric key management
for faster and efficient encryption of data that is suitable for use in a mobile device.
The rapid growth of portable electronic devices with limited power and memory has opened a
vast area of mobile computing and challenges for implementing security in such devices which
are always connected to the internet. Smart phones that are powered by either Android OS, iOS,
Web OS, Bada OS, BlackBerry OS or Windows Phone OS are examples of portable electronic
devices that are becoming an integral part of everyday life. Android is a software stack for
mobile devices that includes an operating system, middleware and key applications. The Android
SDK provides the tools and APIs necessary to develop applications on the Android platform
using the Java programming language. The main building blocks of Android platform are device
hardware, operating system and application runtime. The Android application sandbox isolates
data and code execution on a per-application basis. Android application frameworks use robust
implementations of common security functionality such as cryptography, permissions and secure

Application framework enabling reuse and replacement of components Dalvik virtual
machine optimized for mobile devices
Integrated browser based on the open source WebKit engine
Optimized graphics powered by a custom 2D graphics library; 3D graphics based on the
OpenGL ES 1.0 specification (hardware acceleration optional)
SQLite for structured data storage

Media support for common audio, video and still image formats (MPEG4, H.264, MP3,
GSM Telephony hardware dependent
Bluetooth, 3G, EDGE, WiFi hardware dependent
Camera, GPS, compass and accelerometer hardware dependent
Rich development environment including a device emulator, tools for debugging, memory
and performance profiling, and a plug-in for the Eclipse IDE

Android System Architecture

Fig 1.1 represents the Android system architecture.

Cryptographic Algorithms
Security is very important aspect of computer systems. In our daily life we use computer systems
because we believe that the systems are secure. Cryptography is what makes the computer
systems secure. Cryptography is a branch of mathematics science. The first publications about

cryptography were published long time ago and are almost as old as first mathematical
publication. The first known cipher called Caesar cipher was used by Julius Caesar who lived 50
years before Christ (50 B.C.), but according to Menezes, van Oorschot, Vanstone (2001) limited
cryptography has been used by Egyptians 4000 years ago. Since that time cryptography, mainly
driven by military demand, became much more robust and in the 20th century, where first cipher
machines were introduced during Second World War and later when computers and asymmetric
algorithms came into play cryptography has become topic of many publications every year.
Many encryption algorithms are widely available and used in information security. They can be
categorized into symmetric (private) and asymmetric (public) key encryption. In Symmetric keys
encryption or secret key encryption, only one key is used to encrypt and decrypt data. The key
should be distributed before transmission between entities. Key plays an important role. If weak
key is used in algorithm then everyone may decrypt the data. Strength of Symmetric key
encryption depends on the size of key used. For the same algorithm, encryption using longer key
is harder to break than the one done using smaller key. Some examples of such algorithms are
RC2, DES, 3DES, AES, etc.
Asymmetric key encryption or public key encryption is used to solve the problem of key
distribution. In Asymmetric keys, two keys are used; private and public keys. Public key is used
for encryption and private key is used for decryption (E.g. RSA and Digital Signatures). Because
users tend to use two key: public key, which is known to public and private key which is known
only to the user. There is no need for distributing them prior to transmission. However, public
key encryption is based on mathematical functions, computationally intensive.

Highlights of the Project

This project involves design of a secure call blocker application which employs AES technique.
The traditional non secure data communications are eliminated in this approach. In addition to
the call blocking facility, the blacklists of every user is stored securely in online server totally
free of cost. Irrespective of the received call phone numbers, the application works by blocking
unwanted calls. The result from our performance analysis suggests that AES symmetric
encryption along with the newly implemented key sharing algorithm is a better secure method
than the available RSA and ECC techniques. Since the users blacklisted are stored on the online
server, it can also be accessed by the web client page where the user can modify the blacklist and
the changes are retrieved automatically by the mobile client.

System Specification
The hardware and software requirements for the development phase of our project are:
Software Requirements :
OS: Windows 7 (64 bit) or any Linux distro (64 bit)
Android OS: Froyo v2.2 (minimum)

Database: SQLite for Android

WAMP for testing the web server locally
Hardware Requirements :
Mobile Processor: ARM 11 @ 528 MHz (minimum)
Notebook Processor: Intel Core i5-2410M @ 2.30 GHz
Data connectivity: WiFi or 3G
Web server: Any web server or cloud that is hosted online in the internet and is up all the time

Share on linkedinShare on reddit14