Friday, November 20, 2020

Enhancing the performance of android applications devlopments - CodeShoppy

 Enhancing the performance of android applications devlopments - CodeShoppy

Paralleling source code is the most common approach to optimize the performance of Android applications on multi-core processors. However, the problem of selecting a good parallel structure and its parameter tube is still a challenge. This paper proposes the performance optimization method based on selecting the best parallel configuration including the parallel structure and corresponding parameter tube. Native C/C++ code of an Android application is analyzed to find parallel structures using OpenMP framework and parameter tubes of each parallel structure. The evaluation function is built to evaluate the performance of an Android application under parallel configuration. This function is implemented in an optimization program to select the best parallel configuration of the Android application.
 
Development of mobile applications brings new challenges in possibilities for their adjustment to actual context of a user and a device. Our long-term goal is to design and implement amobile client which can dynamically adapt to the surrounding conditions and requirements of the user . The operability is desired to remain even in situations when the Internet connection is lost (e.g. during natural disasters) and the mobile device should work offline
 

 
 
Such client is called an m-client - an application running at the mobile device which is implemented as a client with variable thickness. It is able to reconfigure itself on demand in a way that its business logic gets new functions (without the necessity to restart the application or to manually install a new module). The m-client is able to communicate with the remote server and can also become a local server itself. This approach enables miscellaneous service delivery to modern mobile devices . Arms10 - Android

 
Related work on dynamic loading mainly focuses on protection of intellectual property based on copy-protection. Jeong et al. show a solution that splits apllication into two parts; Incomplete Main Application and Separate Essential Class (SEC), while SEC is loaded dynamicaly and encrypted on per-user basis in order to avoid copying. Tsai et al. proposes similar solution. In contrast to this work our approach to dynamic modules loading is focused on downloading additional (optional) application modules without interaction with user and employes existing mechanisms in the Android platform for this special task  
 

 

A method to improve application launch performance in Android devices - CodeShoppy

 A method to improve application launch performance in Android devices - CodeShoppy

Even after the introduction of Android Runtime (ART) in the latest release of Android Lollipop, Android Operating System still struggles in areas such as application launch time, especially during sluggish or memory crunch situations. When a new application is launched in a sluggish condition, low memory killer (LMK) gets initiated in order to free some memory by killing the already running applications. The current LMK approach kills application based on how recently it was used. This approach does not consider various other user scenarios such as how frequently the application was launched or how important that application is to user. In our proposed solution, we aim to improve user experience by reducing or removing the delay at memory crunch situations with efficient use of LMK.
 
Market share for android smartphones have been increasing exponentially day by day. With this increase in numbers of phones sold every year, even the demands for a better quality of the android phones are increasing in the competitive market. To meet the high expectations of users, companies are putting good amount of efforts in the improvement of hardware as well as software. While smartphone hardware market is already saturating to an extent, there is a lot of scope for improvement on software design on top of Google’s stock Android for better user experience.
 

 
 
As far as user experience is concerned, application launch time is one of the most important performance parameter for any smartphone device. In general, due to the usage of many applications, a good amount of RAM gets consumed resulting in phone sluggishness. This sluggishness is very much visible to the user especially when a particular application, which user wanted to re-use, is already killed by LMK. In our proposed solution, we intend to provide a better user experience by improving LMK’s algorithm based on user’s usage of various applications. Thereby, enhance user experience by decreasing application launch time of favorite applications Android PHP Projects - Students Projects

 
Android operating system has an in-built task killer, called low memory killer (LMK). The LMK keeps an eye on the real time RAM usage of all applications. Whenever excess of RAM is consumed, the LMK starts killing applications to free-upsome memory . For the killing of applications, LMK has defined some set of priorities through oom_adj value. This oom_adj is set by android kernel for each process on the Android system. It ranges from -17 at the highest to +15 at the lowest. Therefore, in memory crunch situation, LMK is called and it starts killing applications from the lowest oom_adj i.e. oom_adj value of +15. For this paper, we target only the cached applications that range from +9 to +15. As important applications and services have higher priority than cached applications, so we need not worry about them.   
 
 

 

Thursday, November 19, 2020

Ecom Application For Online Shopping - CodeShoppy

 Ecom Application For Online Shopping - CodeShoppy

Abstract

An E Com App is a portal which allows merchants in developing counters to advertise and sell their goods. This would permit rural communities to make their wares available to the rest of the world.

The objective of this project is to create a portal which would allow product information to be updated securely using a mobile device and will allow users to buy goods form the merchant. The main concern is given to the user  to explore their talents and to enhance our traditional Indian culture. Ecom Application For Online Shopping

In future the internet become whole and soul to the business fields, each and every trades are going to be done through it so this portal may helpful to the user as a business person in this running world.


 

Quality Function Deployment (QFD) is a well-known concept that has proved its applicability in several domains to enhance quality of designing and manufacturing products while reducing design time and cost. The main idea behind QFD is to listen to customers' requirements and translate these needs into design characteristics. In this paper, we provide an analytical approach of the use of QFD in the domain of Web services. Specifically, we are looking on Web service description which is the main artifact that is used to describe Web service quality characteristics and then retrieve those Web services.

Module Description:

Register Login Module:-

In login module the customer and merchants can login to the application if they already created their account and signed in.

View Product:    

User enters this system view the product via direct and search option.

Add to cart:

       Users select their product and book the product

My Order:

User can see their own order details.

Upload product details:

Merchants can upload their product details like Name, Description, Image, Quantity, Quality

 https://codeshoppy.com/

99 PHP Project  Topics Titles Ideas : 2019 2020 MCA - CodeShoppy

Get Location

 

99 PHP Project Topics Titles Ideas : 2019 2020 MCA - CodeShoppy

 99 PHP Project  Topics Titles Ideas : 2019 2020 MCA - CodeShoppy

The development of the web technologies and the increasing of available services have introduced the issue of the selection of the most appropriate service among a set of candidate web services. First of all, the services offering a given functionality are discovered. Then, the service section process assists users in choosing the services that better meets their preferences. These preferences are generally, expressed as potentially objective functions often conflicting. Most of existing works trying to select the best web services are based either on a single evaluation criterion or, at best, on the use of an aggregation function like weighted sum of several quantitative evaluation criteria, or the use of the Pareto optimality notion. The work presented here addresses these shortcomings by introducing a new optimality notion based on two tests: (i) concordance and (ii) discordance tests. It presents an efficient algorithm to select only the best services using the introduced optimality notion. Moreover, the proposed algorithm exhibits encouraging results as supported by a series of experiments.
 




 
 
Android & PHP

Smart cities integrate multiple mobile or web solutions to build a comfortable human habitation. One of these solutions is to provide an environmentally friendly, efficient and effective garbage management system. The current garbage collection system includes routine garbage trucks doing rounds daily or weekly, which not only doesn’t cover every zone of the city but is a completely inefficient use of government resources. This paper proposes a cost-effective mobile or web based system for the government to utilize available resources to efficiently manage the overwhelming amounts of garbage collected each day, while also providing a better solution for the inconvenience of garbage disposal for the citizens. Garbage Management System Project This is done by a network of smart bins which integrates cloud-based techniques to monitor and analyze data collected to provide predictive routes generated through algorithms for garbage trucks. An android or web app is developed for the workforce and the citizens, which primarily provides the generated routes for the workforce and finds the nearest available smart bin for citizens.

The concept of abstract services has been widely adopted in service computing to specify the functionality of certain types of Web services. It significantly benefits key service management tasks, such as service discovery and composition, as these tasks can be first applied to a small number of abstract services and then mapped to the large scale actual services. However, how to generate abstract services is non-trivial. Current approaches either assume the existence of abstract services or adopt a manual process that demands intensive human intervention. We propose a novel approach to fully automate the generation of abstract services from a service community that consists of a set of functionally similar services.

https://codeshoppy.com/ 

99 PHP Project Topics Titles Ideas : 2019 2020 MCA - CodeShoppy

Get Location

 

 

Thursday, October 8, 2020

Online Shopping for Android, PHP, Dotnet & Django Python Projects - CodeShoppy

 Online Shopping for Android, PHP, Dotnet & Django Python Projects - CodeShoppy

 

websites are not only be accessed by computers with a large screen. They were mostly accessed via mobile devices such as tablets and smartphones that relatively have smaller screen size. Almost every website has their different style and visual appearance concerning content and information delivery. Even though they were visually looked different, they were mostly designed and developed by using one of one column, two columns, or three columns layout. The way to properly deliver content and information on a smaller screen size becomes a challenging matter. Responsive Web Design approach allows a single web page to be differently visualized based on the screen size of the accessing device. Such layout changing may affect the amount of information to be displayed on the screen, hence affecting the effectiveness and efficiency of information delivery in a web page. This study compares the effectiveness and efficiency of a web page that is being displayed on a computer screen, tablet, and smartphones. How the implementation of Materials Design Guidelines and User-Centered Design approaches in the design process may affect the effectiveness and efficiency of content and information delivery of a web page on smaller screens were also evaluated and presented. This research shows that User Centered Design and Material Design Guidelines improve the effectiveness and efficiency of content delivery on both tablet and smartphone. Materials Design Guidelines provide better usability improvement than User Centered Design approach for the smartphone screen regarding content delivery efficiency for web pages designed in three columns layout.
 

 
 
 The UCD approach focuses on systems development being driven by the user’s requirements instead of technical requirements. Design should depend on measures of how well the product has been used by highlighting user’s interaction and by making use of an iterative prototyping development process. When the methodology is applied to the user as the center of application; the users must be identified and analyzed by the user modeling. A user model has to be an integral part of any interactive system. A user model is different from both the actual knowledge possessed by a user and knowledge employed by system designers .
 
There are several modeling techniques: user roles, user segments, extreme characters , personas, etc. User roles and user segments are not particularly useful for developing user scenarios and for accommodating different users in a single project. Extreme characters is not a method that makes possible the characterization of real system users. By comparison, personas is  a better modeling method based on the identification of characters who typify the system end user 
 
Persona can clear the process which includes determining the functions and content of software and determining their priority. Persona plays an immeasurable role to make decision in advance. When determining the qualitative features and functionalities, persona can be used in brainstorming, to determine the priorities, to guide site structure, content and design. In brainstorming, discuss all the possible features, functionality and content based on the persona's goals, views and behaviors. Through brainstorming, get a list of user functional requirements. By grading the each potential function with persona, it’s very easy to get scientific evaluation results that will be used to sort the all functions by their priority.
 
 

 

Tuesday, September 22, 2020

Asp Dotne C# Project Ideas Titles 2020 - codeshoppy

 Asp Dotne C# Project Ideas Titles 2020 - codeshoppy

The design of Web page should be Internet-user-oriented. The key factor of a successful Web page design lies in that the designer can find out counterparts of products in the real world. Another important factor of a successful-designed web page is that the designer can represent the products by a combination of harmonious and inducing colors, images and characters. The pluralistic society nowadays brings about individual aesthetic need. A unique and individualized emotional design of a web page can impress Internet users deeply, initiate Internet users to click promptly and contribute to the establishment of social image and mutual communication service via a website. This thesis mainly deals with color emotion, image emotion and character sign emotion in Web page design. Through a typical example of a Web page design in a Web site, the aesthetics and application of visual signs of a web page is discussed. The emotional design of colors, images, and character signs of a web page are studied. Click Here
 
Previous study showed that visual and layout are two important influencing factors on web page design Customers may stay or leave those web sites depend on the first impression with the appearance on the web page. Existing work has been performed to study some features of web page format and location appearance on the screen. studied the location occurrence of e-commerce web sites component but did not perform to the other features, nor identify the good design in the e-commerce web sites. .  only identified the general web site pattern but did not consider the good design pattern in e-commerce web sites.  illustrated that high aesthetic treatment in the web sites will present a professional look and feel appropriate for organization. considered web page segmentation to five blocks for improving search engine techniques. Their results showed better performance when using web page segmentation compare with un-segmentation.  implemented VIPS algorithm for segmentation web page by using Dom tree technique and visual format in the web page. Dom tree is initially introduced for representation HTML object rather than semantic or visual meaning. adopted VIPS algorithm for extraction of the product information of e-commerce web sites.
 

 
 
In this section, we organize the web page format before performing classification algorithms. Two steps are used for our preparation. The first step is web page segmentation for dividing the main page into five blocks  According to web page segmentation , we can divide the main web page into five blocks: top, bottom, left, right and center as . Hence, we can investigate area relationship of each block within web page. Apart from dividing web page, we consider the important location which is related to e-commerce web sites for using  location description. In fact, there are various designs for different e-commerce Web sites. The previous study showed the attracting components on the appropriate location  such as main navigation on the top or left, “about us” navigation on the bottom and advertising on the right or top center of the screen. We analyze and synthesize them to the web template. We also identify each area portions of navigation bar, product index, customer service bar, content, news and advertisement. Read More
 

 

99 Android Project Topics Titles Ideas : Buy Android App Source Code - codeshoppy

 99 Android Project Topics Titles Ideas : Buy Android App Source Code - codeshoppy

User-Centered Design is a user-centric approach that focuses on user's needs, behaviors, wants, and limitations in the software development process lifecycle. When end users were involved in the design process, they will help to reduce the lag in information system's usability by focusing on making a product that fit user needs rather than forcing users to change their behavior to accommodate the product . Material Design Guidelines (MDG) is a design language developed by Google in 2014 that provides best practices on how to put user perception and high level of accessibility into a mobile UI design. MDG allows a user to experience a unified experience across different platforms and devices regardless the screen size of all devices in the hope that users will get a better engagement, better UI/UX and cost-effective with the products . Both UCD and MDG offer a better user experience in using a product, hence making a product quality better.
 
The quality of a product can be measured by its effectiveness and efficiency . The effectiveness of a product is one variable that determines the success of a product . In assessing software product usability, its effectiveness and efficiency of use need to be measured. This research will try to describe how a web page layout transformation on a responsive web page may affect its usability. This study will also try to explain how UCD and MDG will improve the effectiveness and efficiency of content delivery of a web page when it comes to a tablet or smartphone screens. Click Here
 

 
 
Responsive Web Design (RWD) is taking HTML5 and CSS3 web technologies into account in building a responsive web page or front-end layout. Responsive web design uses three main ingredients, i.e., a fluid and flexible grid-based layout, flexible images and media, and a module from CSS3: media queries [1]. Fluid layout assigns relative units to the page elements instead of absolute units like pixels or points. In RWD, the design of a web page can respond to user's needs by adapting it to the constraints of the browser window or device that renders it. Therefore, RWD ensures a web page screen-layout, texts, images, navigation elements, video players, and other UI elements will re-adjust themselves.
 
mages, videos, and other media types need to be scalable, changing their size as the size of the viewport changes. One quick way to make media scalable is by using an element's max-width property with a value of 100% or specifies the width of the content area as percentages of its viewport [8]. By doing so, when the viewport gets smaller any media will also be scaled down following its container width. Media queries make possible to switch between different style sheets based on the features of the device in which the webpage is rendered, mainly the width of the screen.  MoreDetails 
 
 
 
  

Monday, June 1, 2020

A Survey on Women Safety Device Using IoT

A Survey on Women Safety Device Using IoT

Women Safety And Security App

A Survey on Women Safety Device Using IoT

ln the present day scenes women safety isconsidered to be the major problem in both urbanand rur al areas. I t is quite difficult to change themind-set o f the entire society, but we can provideseveral security devices f or the women who are facingsexual harassment, acid attacks, molestation, etc. Forproviding the security, various smart devices andapplications were developed. Many smart devicesand applications are also available in the market; but,it doesn’t provide an effective solution. Experts fromvarious field discovered women’s safety device whichworks in both manually and automatically. Thisarticle examines various women safety relatedtechniques. The drawbacks and opportunities inwomen’s safety devices are also discussed.
https://codeshoppy.com/shop/product/women-security-app/
Women Safety And Security App
Internet o f things (IoT) is influenced with human life in both knowingly as well as unknowingly. With a help of internet every machine is controlled, which makes the people life easier. Nowadays girls were not permitted to move freely in the streets where they abused by strangers. Parents are distressing about their safety which has become the first barrier to send t hei r daughters outside. Gradually the women harassment have been rises. Safety is the most required power for everybody in today’s world in current generation. In our Country, even though there is an economic development, but still there are many crimes happens against women. I n general 86% o f working ladies in India, facing an obstacle which is greater in Delhi, Mumbai, Hyderabad, Kolkata,Chennai and Pune, comparatively to other places. Technology is the finest way to achieve their security. With the help of IOT we can control and access the machines and things whi ch are connected to the internet even the distances are too long. Code Shoppy Without the human-human and computer- human interaction, we can send and receive information. B u t the harassments, rape, acid attack are not reduced still.In order to make them safe, a smart device are developed. Women safety device is specially designed f o r women in case o f dangerous and emergency situation. The women safety devices should be very simple, easy to carry and that should be integrated with several functionalities. The smart phones usage has been drastically increased in the world. There are several mobile applications and smart devices are developed by the government and people in order to help the women when they are in the trouble. Even though, they developed various devices and applications the rate o f the sexual offenses has not been decreased. The women safety devices or application should be combined with a several features which are used in day today life and real emergency cases
I n a country, Sexual offense happens against to the women and children. According to National Crime Records Bureau , New Delhi;1. In 2011, over 42968 the criminal assault to women has increased to 84746 cases in 2016.2. Around 309 acid attack cases are produced in the year 2014.3. I n 2011, 24206 rape cases have been enlarged to 38947 cases i n 20164. According to this statistics, around 92 women’ s are raped every day i n IndiaThe mobile application and smart devices are produced in the women safety are:A. NotificationNishant Bhardwaj et al., [1] proposed A Women Safety Device which gives the basic idea of Suraksha which provides a warning to the police by giving an instant location when distressed v ic ti m takes place. So the incident could be prevented.As same as Nandita Viswanath et al., [2] in this article, a small and low cost device is developed. This device is clipped to the footwear and i t is triggered automatically when the tapping occurs behind the other foot four times. The tapping sound is detected by the light blue bean which is aurdino microcontroll er. Then, the message is send to the four contact list through the Bluetooth. Naive Basye classifier is used to analyses the walking and tapping data. By this technique, accuracy is measured. This device is only useful for a trained data.Similarly D. G. Monisha et al., [3] Proposed a system which contain a location tracking mechanism, i t works i f the suffered person press a single click it sends a SoS message with current location to pre-set contact o f every 2 minutes, i f the person clicks a button double times then i t records and sends SOS message and also i t cal ls to the pre-set contact numbers when the person pressed a button for a long time.Likewise Dhruv Chand et al., [4] proposed a WoS application is developed. In this application it requires some basic information about the user and the emergency contact list. When the person feel some crisis happens against to them, a not if icati on is send to the enlisted contacts b y shaking their phone consecutively 40 times (i.e. upto 8 seconds) or pressing the panic button which is present in the screen B. Location TrackingVallidevi Krishnamurthy et al., [5] proposed a work with a women safety application. The mobile application is developed with a help of object- oriented manner. When women are in travel form one place to another, she has to activate the continuous global position system GPS. The GPS continuously tracks their respective location. In the case o f the danger when she doesn’ t mark herself safe in particular duration then the SMS alert is send to the registered contact.Similarly Dantu Sai Prashanth et al., [6] In this article an application is developed with unique features and all the existing features has been integrated to make efficient software which is useful for women safety. This application consists o f dynamic GPS tracking system and i t also includes spy-camera which is useful to record the incident .Initially it requires login details and the user has to update their information from time to time. In this, user has to be registered to a firebase database wh00ich is used f o r user login authentication which keeps application more secure. When the user is moving from one place to another a GPS tracking system is switched on and thus the live location is also viewed. I t also offers various functionalities like first aid information, toll free call which is inbuilt. Through dynamic GPS tracking system the enlisted contacts users who all use the same application can view the user’ s location.Likewise Sankalp Mehta et al., [7] proposed an application. This application gets activated by shaking the phone .Then the location is identified by GPS and the location is shared to the emergency contacts. It also provides calling facility, whenever the guardian phone is in silent mode. Thus i t provides a calling and message facility to protect them from the incident.C. Sensors usedPiyush Kumar Verma et al., [8] In This the proposed system deals with a device which is used for women to protect them from dangerous person while they are moving out in night and f o r an independent women also i t is useful. I t consists o f buzzer, pulse sensor and switch. When the switch is pressed, the device sends a current locati on o f the women to all the registered contacts and i t also monitors the pulse rate o f a women. I f the pulse reading is abnormal, then SMS is sends to a hospital .Thus, the device is used to protect themselves from a danger and i t is small in size.Similarly Muskan et al., [9] Describes the women safety device which senses the human body temperature and heartbeat pattern. The normal heartbeat and the body temperature are stored in the cloud. When the human heart beat rate and the temperature are changed, i t denotes that they are in the trouble Here they use a machine learning algorithm to collect the data. The collected data is compared with the data which are already stored in the cloud, when change occurs current locati on o f the women is sent with the help o f Zigbee mesh network. I t is defined as sending o f message without the internet access, as zigbee mesh network sends a data with the help of multiple hop distance.As same as the above work Kal pana seel amet al., [10] The articles portrays about the safe and secured electronic framework for women or children which involves an Arduino controller and sensors, the several sensors used in this system are temperature, flex sensors, MEMS accelerometer, pulse rate sensor and sound sensor. The gadget detects body parameters like heartbeat rate, changes i n temperature, movement o f v i c t i m by flex sensor by flex sensor and MEMS accelerometer and the voice o f the injured individual is detected by sound sensor and the locati on is send to the registered contactsD. Video capturingMohamad Zikriya et al., [11] Gadget is used in the project. I t is used to capture the image of the culprit who makes a distrust motion to the independent women, children. Thus the captured image is sent to the registered email ID. By using the captured image we can able to find the distrusted person.Similarly, Jismi Thomas et al., [12] Proposed the system with a security devices called T o U C H M E N o T . This portable device is attached to the clothing. This device consists o f button which is integrated with two modules. The first module contains a camera which records the short videos to capture the assailant. The second module is used to send the current locati on to the f a mily or friends.Likewise Pragna B R et al., [13] a device is developed. I t consists o f a four button (i.e. red, green, yellow, blue) .Each button represents one functionalities to protect the person who is in danger. Red is used for triggering alarm, blue is used to sending messages, green is used to record audios and yellow is used to detect hidden cameras. Thus by pressing the various colour buttons the women can be protected for that instant.
From the above table II, different techniques are proposed to safeguard the women; those techniques had their own drawbacks;• It is quite impossible to use a mobile phone during an emergency situation.• The literature depicts that there are auto detection women safety device based on parameters such as voice recognition, temperature heart beat rate are exists, still these system may have a chance o f failure due to women abnormal health condition.• Though the location is shared to the faraway people it proceeds time to reach the spots.



Sunday, April 19, 2020

Automatic Billing System using Li-Fi Module

Supermarket Billing System App

Automatic Billing System using Li-Fi Module

We use Li-Fi Transceivers placed at both trimmings of the corridor and on the cart to assemble material on the appearance/exit status of the cart and the bay certification. Moreover the locating of these Li-Fi Trans- earphones on the shop cart and on the pathways will be crucial to the correct working of shop cart. Further, as Li-Fi equipment works on line of eyesight, it is main to ensure that there is no obstruction in the entry or exit of each aisle. All the product material is stored in a folder at a central server with the location data IP. We will record the ID, appellation and the price of the product. Li-FI transceivers are used to inimitably ascertain products.
https://codeshoppy.com/shop/product/supermarket-billing-system-mobile-application/
Supermarket Billing System App
PIC is a family of modified Harvard construction complete by computer chip technology, derived from the PIC1650 originally developed by General Instrument’s microelectronics division. The name PIC firstly was referred to bordering boundary controller. It can store upto 35 instruction set and can only recognize hex values. Primary images of PIC had read-only memory (ROM) or field-programmable EPROM for program storage, some with facility for removing memory. All current models convention Flash memory for program storage, and newer models permit the PIC to reprogram itself. Sequencer memory and data. Data recall is 8-bit, 16-bit and in up-to-date models. 32-bit wide. Program plans vary in bit-count by family of PIC, and may be 12, 14, 16, or 24 bits long. The directions set also varies by model, with more firm chips tally advices for digital signal giving out occupations. The hardware capabilities of PIC devices range from 8-pin DIP chips up to 100 pin SMD[2-3] chips, with disconnected I/O pins, ADC and DAC elements and public services ports such as UART, 12C, CAN, and even USB. Low-power and high-speed dissimilarities exist for countless sorts. The producer materials supercomputer software for progress known as MPLAB, assemblers and C/C++ compilers, and program hardware under the MPLAB and PICK it series. Third party and some open-source tools are also available. Some parts have in-circuit software design capability; low-cost expansion computer operator are accessible as well has high-production computer operator. PIC devices are popular with both industrial developers and hobbyists due to their low cost, wide availability, large user base, widespread assembly of application notes, and availability of low cost or free advance tools, sequential programming, and re-programmable Flash-memory ability. Click Here
Li-Fi stands for Light-Fidelity. Li-Fi expertise, proposed by the German physicist—Harald Haas, provides program of datathrough brightness by transfer data complete an LED light bulb that diverges in power sooner than the hominoid eye can follow. This paper efforts on evolving a Li-Fi based system and studies its act with respect to prevailing technology. Wi-Fi is great for general wireless coverage within buildings, although Li-Fi is ideal for high stupidity wireless data reporting in restricted area and for sacking receiver prying issues. Li-Fi runs improved bandwidth, efficiency, proximit and safety than Wi-Fi and has now realized blisteringly high quickness in the lab. By leveraging the low cost nature of LEDs and lighting units there are many occasions to deed this midway, from public internet access done street lamps to auto-piloted cars that interconnect through their headlights. Haas visualizes future where data for laptops, smart earphones, and tablets will be communicated through the light in a room.