CFP last date
20 December 2024
Reseach Article

Find Out Pen Drive Location with the Help of Mobile GPS

by Suhas Machhindra Gaikwad, Rahul Joshi, Shishir Machhindra Gaikwad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 2
Year of Publication: 2016
Authors: Suhas Machhindra Gaikwad, Rahul Joshi, Shishir Machhindra Gaikwad
10.5120/ijca2016908322

Suhas Machhindra Gaikwad, Rahul Joshi, Shishir Machhindra Gaikwad . Find Out Pen Drive Location with the Help of Mobile GPS. International Journal of Computer Applications. 135, 2 ( February 2016), 14-18. DOI=10.5120/ijca2016908322

@article{ 10.5120/ijca2016908322,
author = { Suhas Machhindra Gaikwad, Rahul Joshi, Shishir Machhindra Gaikwad },
title = { Find Out Pen Drive Location with the Help of Mobile GPS },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 2 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number2/24020-2016908322/ },
doi = { 10.5120/ijca2016908322 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:34:40.075120+05:30
%A Suhas Machhindra Gaikwad
%A Rahul Joshi
%A Shishir Machhindra Gaikwad
%T Find Out Pen Drive Location with the Help of Mobile GPS
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 2
%P 14-18
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Paper will give a systematic idea of finding out pen drive location with the help of mobile GPS. It will require a circuit-containing sensor will give position in terms of latitude and longitude. Now place Barcode on the pen drive so that pen drive will have certain number is used to identify that pen drive. Barcode placed on that pen drive is read using the mobile camera act as Barcode scanner here onwards role of GPS will take place as pen drive have latitude and longitude with pen drive id numbers from Barcode is known then add the Barcode functionality in the GPS so that the GPS will read barcode store numbers and will get the latitude and longitude.

References
  1. Diana Berbecaru Politecnico di Torino, Dip. di Automatica e Informatica Corso Duca degli Abruzzi “19th International Euro micro Conference on Parallel, Distributed and Network-Based Processing” , 2011, DOI 10.1109/PDP.2011.32,pp. 141-145
  2. R.J. Hulsebosch, M.S. Bargh, G. Lenzini, P.W.G Ebben, and S.M. Iacob, “Context Sensitive Adaptive Authentication”, Proc. of EuroSSC 2007, LNCS 4793, pp. 93-109.
  3. J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung, “Fourth Factor Authentication: Somebody You Know”, Proc. of ACM CCS 2006, pp. 168- 178
  4. H. Zheng, J. Kwak, K. Son, W. Lee, S. Kim, and D. Won, “Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments”, Proc. of ICCSA 2006, LNCS 3981, pp. 954-963.
  5. B. Schneier, “Two-Factor Authentication: Too Little, Too Late”, Communications of ACM, Vol. 48, No. 4, Apr. 2005, 136.
  6. M. Alexander, “Keeping Online Banking Safe: Why Banks Need Geolocation and Other New Techniques Right Now”. http://www.bankersonline.com/security/safebanking.html, May 2005.
  7. Federal Financial Institutions Examination Council, “Authentication in Internet Banking Environment”, http://www.ffiec.gov/press/pr101205.htm, Oct. 2005.
  8. E. Toye, R. Sharp, A. Madhayapeddy, and D. Scott, “Using Smart Phones to Access Site-Specific Services”, IEEE Pervasive Computing, Springer- Verlag, Vol. 4, Issue 2, pp. 60-66, 2005.
  9. K. Nichols Randall and Panos C. Lekkas, “Wireless security: models, threats, and solutions”, Tata McGraw Hill, 2006.
  10. F. Dominici, D. Mazzocchi, P. Mulassano, M. Spelat, G. Boiero, P. Lovisolo, “NAV/COM Hybrid Architecture for Innovative Location Based Payment Systems”, Proc of CCNC 2009, pp. 1-5.
  11. D.E. Denning and P.F. MacDoran, “Location- based authentication: grounding cyberspace for better security”, Computer Fraud & Security, Vol. 1996, Issue 2, Feb. 1996, pp. 12-16.
  12. A.I. Gonz ́alez-Tablas Ferreres, B. Ramos Alvarez, and A.R. Garnacho, “Guaranteeing the Authenticity of Location Information”, IEEE Pervasive Computing, Vol. 7, Issue 3, July-Sept. 2008, pp. 72-80.
  13. M.G. Kuhn, “An Asymmetric Security Mechanism for Navigation Signals”, Proc. of Sixth Int’l Workshop Information Hiding (IH) 2004, LNCS 3200, pp. 239-252.
  14. D. Qiu, “Security Analysis of Geoencryption: A Case Study Using Loran”, Proc. of ION GNSS 2007, Texas, USA, Sept. 2007, pp. 1146- 1154.
  15. S. M. Gaikwad, R. R. Joshi, and Mulay, P., "Cluster Mapping with the help of New Extended MCF Algorithm and MCF Algorithm to Recommend an Ice Cream to the Diabetic Patient," METHODOLOGY, vol. 1, p. 7.
  16. S. M. Gaikwad, R. R. Joshi, Mulay, P. (2015). Analytical Network Process (ANP) to Recommend an Ice Cream to a Diabetic Patient. IJCA Online 121 (12), 49-52.
  17. S. M. Gaikwad, R. R. Joshi, and Mulay, P., "System Dynamics Modeling for Analyzing Recovery Rate of Diabetic Patients by Mapping Sugar Content in Ice Cream and Sugar Intake for the Day," in Proceedings of the Second International Conference on Computer and Communication Technologies, ed: Springer India, 2016, pp. 743-749.
  18. S. M. Gaikwad, Mulay, P., and R. R. Joshi, " Mapping with the help of new Proposed Algorithm and Modified Cluster Formation Algorithm to recommend an Ice Cream to the Diabetic Patient based on Sugar Contain in it," International Journal of Students' Research in Technology & Management, vol. 3, pp. 410-412, 2015.
  19. Suhas Gaikwad: Cohort Intelligence and Genetic Algorithm along with AHP to recommend an Ice Cream to a Diabetic Patient. Lecture Notes In Computer Science, 12/2015: chapter Cohort Intelligence and Genetic Algorithm along with AHP to recommend an Ice Cream to a Diabetic Patient: pages 1-9; SEMCCO 2015.
  20. Suhas Gaikwad: Cohort Intelligence and Genetic Algorithm along with Modified Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic Patient. Advances in Intelligent Systems and Computing, 03/2016: chapter Cohort Intelligence and Genetic Algorithm along with Modified Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic Patient: pages 1-8; ICDECT. ISBN: ISSN: 2194-5357
  21. S. M. Gaikwad, R. R. Joshi, Mulay, P., "Attribute visualization and cluster mapping with the help of new proposed algorithm and modified cluster formation algorithm to recommend an ice cream to the diabetic patient based on sugar contain in it," vol. 10, pp. 1-6, 2015.
  22. S. M. Gaikwad, "Cluster mapping with the help of new proposed algorithm and MCF algorithm to recommend an ice cream to the diabetic Patient," International Journal of Applied Engineering Research, vol. 10, pp. 21259- 21266, 2015.
  23. S. M. Gaikwad, R. R. Joshi, Mulay, P. "Modified Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic Patient," pp. 1-6, 2015.
  24. Gaikwad, S. M., Mulay, P., & Joshi, R. R. (2015). Analytical Hierarchy Process to Recommend an Ice Cream to a Diabetic Patient Based on Sugar Content in it. Procedia Computer Science, 50, 64-72.
  25. M. Spelat and F. Margary, “GAL-PMI Project: Global Navigation Satellite Systems to Support Mobility and Security”, Proc. of Space Applications Days 2008, Toulouse (France), 22-25 April 2008, pp. 608- 612.
Index Terms

Computer Science
Information Sciences

Keywords

Barcode reader sensor circuit Mobile GPS