<p>Technology has its wide range of applications in every field potentially even on the Mobile technology. One of the technologies which accomplish the blind person in android mobile is Virtual Reality. In spite of virtual reality is engaged to effectuate the operations, the blind person attention is one of the most important statistics. Although mobile devices include operative features available for amaurotic users, the user interface of the greater part of the mobile apps is designed for sighted people. If they carry out any mistakes to use the apps it may lead to a wrong call. So, one may think of a technology that diminishes the anxiety of a blind person for using apps. The proposed system converts the text into audio for giving the directions to the blind person about the gestures inferred. For such conversion a technique called speech synthesizer is used. Assorted innovative tools are used in mobile phones. Blind people need to confide in normal person for creating and updating a contact. Our project incorporates the gestures from the blind people and confirms the gestures through voice. Gesture conversion is accomplished by using haptic technology. An amaurotic person can create a new contact and they can invoke the contact by using this voice confirmation. During calling if there is multiple contact list, caller setting are initialized and ask the preference from the blind people, progress the voice call.</p>
Cloud computing is a progressive figuring worldview, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Different plans taking into account the Ciphertext Policy attribute based encryption have been proposed to secure the storage in cloud. Nonetheless, most work spotlights on the information substance security and the access control, while less consideration is paid to the benefit control and the identity security. In this paper focused on better access control permissions for each file based on the attribute of user. Attributes are efficiently utilized for encrypting the valuable data.
Now a day’s users of Online Social Network have been increased by the Internet usage. As huge number of online social Network users, it becomes more and more interactive and privacy becomes a matter of increasing concern. To solve this problem, graph structure, Proposed Algorithm, Encryption Algorithm used, which excludes the users which combine the information of the status of privacy users. By using these methods, the experiment can be done which helps to show how the server works in between the sender and receiver and to receive their information without knowing third parties. And it would be easier by using graph that shows it can be efficiently helps the users to improve their privacy disclosure. Keywords: Graph theory, social network, Privacy, Data Encryption, end to end encryption, Encryption Algorithm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.