Open Access Open Access  Restricted Access Subscription or Fee Access

Digital Book Wield Smart App

Prachi K Shah, Shivani Acharya, Ritu Kariya, Hemangee Ravalji, Apexa Rathod

Abstract


Digital Book Means Computer/Laptop. The system is developed to control Digital Book’s keyboard by Android device using Arduino. As all are familiar with both Android device and Digital Book like PC, Laptop etc., there are various limited options available to use when Android device is not connected to the Digital Book in order to access it at their Workstations. Connecting Android device to Digital Book by Arduino which is connected to Bluetooth HC-05, so Android device work as remote interface. This involves designing a new application that enables the user to connect their workstation remotely by using the Arduino and Bluetooth Technology. Once the application is installed, Digital Book users will likely be successfully able to connect with their workstation and control it via Android device’s application.

Cite this Article

Prachi Shah, Shivani Acharya, Ritu Kariya et al. Digital Book Wield Smart App. Journal of Mobile Computing, Communications & Mobile Networks. 2018; 5(3): 6–10p.



Keywords


Remotely Accessible, Computer, Laptop, Arduino Uno, Bluetooth HC-05, ASCII value Comparison, Virtual Key Event Generation

Full Text:

PDF

References


Karan Sandeep Bhandari, Vishnu Baliram Mandole, Akash Dattatray Munde, Sachin B. Takmare. Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser. Int J Comput Sci Info Tech Res. January - March 2015; 3(1): 369–373p.

Lushin Barde, Neha Dhole, Pragati Waghmare, Swati Suryawanshi. Controlling PC/Laptop via Android Phone (Android Remote Control). Int J Eng Res Technol (IJERT). January – 2014; 3(1).

Lingyan Bi, Weining Wang, Haobin Zhong, Wenxuan Liu. Design and Application of Remote-Control System Using Mobile Phone with JNI Interface. The 2008 International Conference of Embedded Software and Systems Symposia (ICESS2008). 2008; 416–419p.

Michael Spreitzenbarth. Tools and processes for Forensic Analyses of smartphones and Mobile Malware, 6. GI FG SIDAR Graduierten-Workshop Ueber Reaktive Sicherheit (SPRING). March 22th 2011.

Xinfang Lee, Chunghuang Yang, Shihjen Chen, Jainshing Wu. Design and Implementation of Forensic System in Android Smart Phone. The 5th Joint Workshop on Information Security, 2009.

Enck W, Ongtang M. McDaniel, P. Understanding Android Security & Privacy. IEEE, Jan.-Feb. 2009; 7(1): 50–57p.

Richardson T, Staford-Fraser Q, Wood K, Hooper A. Virtual networking computing, IEEE Internet Computing. 1998; 2(1): 33–38p.

Ron Olexa. Implementing 802.11, 802.16, and 802.20NWireless Networks: Planning, Troubleshooting, and Operations, Newnes, (July 30, 2004).

Jon Edney, William A. Arbaugh. Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison Wesley; 1 edition, (15 July 2003).

Thomas Maufer. A Field Guide to Wireless LANS for Administrators and Users, Prentice Hall; 1 edition, (October 27, 2003).

Android. Available at: http://www.android.com, Retrieved March 1st, 2011.

Gonzalez Villan, Josep Jorba Esteve, Remote Control of Mobile Devices in Android Platform Angel, 2013.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/