Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
With the increasing number of smartphone penetration, smartphone data that make smartphone smarter, became a
top research area, at that position are a good deal of event data which we can use to see coming manners or detect
anomalies. The confidentiality confession caused by stolen or lost phones becomes an progressively more difficult
problem that cannot be stroke aside. And then here we will use machine learning algorithms to secure our smart
phone.
Keywords:- MI, Smart Phone
and Samsun use a different means to control this matter.
I. INTRODUCTION They offer a remote permission about transfer the
phone’s location or set to rights factory setting to erase
Today, with the on the increase Internet, smartphones all data in that phone.
have become more and more usable. It can be theoretical
Nevertheless, all those solutions are not well-informed.
to create videos, submit pictures, contact with friends
They all need phone’s vendor to react when they find
and so on. Moreover, online expense cannot be feasible
their phone to be slipped. It will generally require a long
without smart phones. If your telephone is misplaced or
time until they understand it. We offer a machine
stolen, the nightmare will soon commence. You will care
learning solution which makes phone itself to detect
around your property damage and personal privacy
stolen status. Foremost of all, we estimate users’
disclosure. With increasing global existence of
behavior by applying the data picked up by mobile
smartphones, crimes of stealing phones have also been a
phone detectors. Later applying the rule mining approach
vast problem. In the United States, there are 113 phone
to abstract users’ movement behavior, make a mass-
being lost or ripped off every moment. Granting to the
produced example to find anomalies. In one case we
U.S. Federal information technology order, at that place
have the model, we also abstract patterns from test data
are nearly one third of robbery with smartphones
and present scores for these figures, normally within one
involved. In 2012, 1.6 million Americans lost about 30
hour. Therefore, compare the scores to find anomalies.
billion dollars because of smartphone crime. Shockingly,
3 million Americans became victims because of it in
II. ALGORITHMS
2013.
LogR models the data points using the standard logistic III. SCREEN SHORTS
function, which is an S- shaped curve also called as
sigmoid curve and is fed by the equation.
c) RANDOM FOREST
V. CONCLUSION
Fig 4: RANDOMALGORITHM
As Android smartphone is the cheaper smartphone than
IV. DESCRIPTION any other smartphone with easy use in the world, the use
of android phone is increasing rapidly. Day by day its
popularity is growing so fast. The mobile phone users
The latest smartphones endow with lots of capability are now much dependent on android phone because of
like personal computers and in accumulation it offers its versatile functionalities. They can store a lot of data,
unlike forms of appliance which are in employment to and private documents. But rate of lost or theft of mobile
store heaps of data in an organized sample Because phone is also increasing. If the phone is lost or stolen by
smart phones are getting smaller in size day-to-day, someone, it will be very tender for the mobile phone
there is a lot of chance to drop it somewhere and also user. We need to save our data secure. So using this
anyone can steal it without your knowledge. It takes techniques we can secure our data. Our application will
tons of secret documents, data and personal information further be developed and improved. Currently this
which will be in peril. Thus it is important to discover application is available for android based mobile phones.
the thief, all the existing applications could not be able
However, in future a network based technique can be
to identify the thief, it is solely capable of locating the
embedded with the developed to get back our important
device.
data
In this application, we introduce a novel scenario
of anti-theft by breaking an application which is REFERENCES
capable to identify the thief. Imagine that somebody
has got hold of your phone, maybe a thief, at present
this application operates as follows: [1] Reto Meier, Professional Android 2
At one time this application gets installed on Application Development, 2nd edition Wiley
your Android mobile device, it will store your Publishing Inc., 2010.
email id, alternate mobile number, and SIM [2] J.F. DiMarziio, Android a programmer’s Guide,
unique identity number in the phone memory
1st edition, McGraw- Hill Companies, 2008.
and continue playing in the ground by using the
services. [3] Claudio Maia, Lu´Õs Nogueira, Lu´Õs Miguel
Pinho, “Evaluating Android OS for
Then it will continue checking for SIM number, Embedded Real-Time Systems”, CISTER
once a user/thief changes the SIM, it will detect Research Centre, Porto,
that SIM is changed by comparing new SIM Portugal,
unique numbers with stored one and send the http://www.utdallas.edu/~cxl137330/courses/fall1
sign to begin services.
3/RTS/papers/4a.pdf
Immediately as before long as signal is received, [4] Google Developer,
services are getting initiated in the background http://developer.android.com, last accessed on
which will start making video recording from Sep 20, 2013.
front camera if present, otherwise from back
camera (at least one camera is necessary) and [5] Ed Burnette, Hello, Android: Introducing
also take 2-3 snapshots, which are stored in the Google's Mobile Development Platform, 3rd
SD card. edition, Pragmatic Bookshelf, 2010.
Now at one time these services get finished it
[6] https://android.googlesource.com/, last accessed
will broadcast a signal to another service, where on Aug 06, 2013.
[7] Chandra, Ankur, Shashank Jain, and
Mohammed Abdul Qadeer. "GPS Locator: An Conference on, vol. 2, pp. 218-222. IEEE,
Application for Location Tracking and Sharing 2009.
Using GPS for Java Enabled Handhelds." In [16] Qadeer, Mohammed A., Rehan Ahmad, Mohd
Computational Intelligence and Communication Siddique Khan, and Tauseef Ahmad. "Real
Networks (CICN), 2011 International time video streaming over heterogeneous
Conference on, pp. 406-410. IEEE, 2011. networks." InAdvanced Communication
[8] Kumar, Sandeep, Mohammed Abdul Qadeer, Technology, 2009. ICACT 2009. 11th
and Archana Gupta. "Location based services International Conference on, vol. 2, pp. 1117-
using android." In IMSAA’09: Proceedings of 1122. IEEE, 2009.
the 3rd IEEE International Conference on [17] Habeeb, Ahmad Ali, Mohammed A. Qadeer,
Internet Multimedia Services Architecture and and Shamshir Ahmad. "Voice communication
Applications, pp. 335-339. 2009. over GGSN/SGSN." In Advanced
[9] Imran, Ale, Mohammed A. Qadeer, and M. Communication Technology, 2009. ICACT
Khan. "Asterisk VoIP private branch 2009. 11th International Conference on, vol. 1,
exchange." In Multimedia, Signal Processing pp. 682-687. IEEE, 2009.
and Communication Technologies, 2009. [18] Imran, Ale, and Mohammed A. Qadeer.
IMPACT'09. International, pp. 217-220. IEEE, "Conferencing, paging, voice mailing via
2009. Asterisk EPBX." In Computer Engineering and
[10] Qadeer, Mohammed Abdul, Ankur Chandra, Technology, 2009. ICCET'09. International
and Shashank Jain. "Design and Implementation Conference on, vol. 1, pp. 186-190. IEEE,
of Location Awareness and Sharing System 2009.
using GPS and 3G/GPRS." (2012): 125-140. [19] Qadeer, Mohammed A., Robin Kasana, and
[11] Chandra, Ankur, Shashank Jain, and Sarvat Sayeed. "Encrypted voice calls with ip
Mohammed Abdul Qadeer. "Implementation of enabled wireless phones over gsm/cdma/wifi
location awareness and sharing system based on networks." In Computer Engineering and
GPS and GPRS using J2ME, PHP and Technology, 2009. ICCET'09. International
MYSQL." In Computer Research and Conference on, vol. 2, pp. 218-222. IEEE,
Development (ICCRD), 2011 3rd International 2009.
Conference on, vol. 1, pp. 216-220. IEEE, 2011. [20] Shahid, Mohammad, and Mohammed A.
[12] Qadeer, Mohammed A., Nadeem Akhtar, Qadeer. "Novel scheme for securing
Shalini Govil, and Anuja Varshney. "A Novel passwords." In Digital Ecosystems and
Scheme for Mobile Payment Using RFID- Technologies, 2009. DEST'09. 3rd IEEE
Enabled Smart SIMcard." In Future Computer International Conference on, pp. 223-227.
and Communication, 2009. ICFCC 2009. IEEE, 2009.
International Conference on, pp. 339-343. [21] Qadeer, Mohammed Abdul, Kanika Shah, and
IEEE, 2009. Utkarsh Goel. "Voice- Video Communication
[13] Salim, Mohammad, M. Sana Akhtar, and on Mobile Phones and PCs' Using Asterisk
Mohammed A. Qadeer. "Data Retrieval and EPBX." InCommunication Systems and
Security Using Lightweight Directory Access Network Technologies (CSNT), 2012
Protocol." InKnowledge Discovery and Data International Conference on, pp. 534-538.
Mining, 2009. WKDD 2009. Second IEEE, 2012.
International Workshop on, pp. 685-688. [22] Ansari, Abdullah Mohammad, Md Nehal, and
IEEE, 2009. Mohammed Abdul Qadeer. "SIP-based
[14] Habeeb, Ahmad Ali, and Mohammed Abdul Interactive Voice Response System using
Qadeer. "Interference evaluation and MS FreeSwitch EPBX." InWireless and Optical
controlled Handoff Technique for Communications Networks (WOCN), 2013
FemtoCell." In Internet, 2009. AH-ICI 2009. Tenth International Conference on, pp. 1-5.
First Asian Himalayas International IEEE, 2013.
Conference on, pp. 1-5. IEEE, 2009. [23] Gupta, Priyanka, Neha Agrawal, and
[15] Qadeer, Mohammed A., Robin Kasana, and Mohammed Abdul Qadeer. "GSM and PSTN
Sarvat Sayeed. "Encrypted voice calls with ip gateway for asterisk EPBX." In Wireless and
enabled wireless phones over gsm/cdma/wifi Optical Communications Networks (WOCN),
networks." In Computer Engineering and 2013 Tenth International Conference on, pp. 1-
Technology, 2009. ICCET'09. International 5. IEEE, 2013.