Вы находитесь на странице: 1из 59

1

Introduction

1.1 1.2 1.3 1.4 1.5 1.6

Project Introduction Problem Definition Aim Objective Assumptions Overview

International Institute of Professional Studies,DAVV,Indore

Page

Introduction

1.1 Project Introduction The function of this product is to enable its users to communicate with each others with the help of a blue-tooth enabled mobile device via text messages. It does this by just using the blue-tooth of any Java enabled mobile device. Since blue-tooth operations does not require any kind of cost associated with it therefore this product is totally free to use and does not have any kind of operating cost associated with it. It gives facility to interact two or more peoples with the help of most widely used communication device i.e. Mobile Phone. It can be used for personal chatting as well as in organizations. It is a simple mobile application, very friendly operation and anyone can easily use this application without the need of any kind of training he or she must only have the knowledge to operate the mobile phone. 1.2 Problem Definition In general, people used to communicate with each other with the help of short message service(SMS). Everybody uses the simple text message application which is provided by the Service provider of the network. This operation of sending sms involves cost and everyone have to pay for it. Even in the small places or offices sms are used. In our project we have tried to give them a platform which involves no cost at all and text messages can be send and received text messages with the help of their mobile phones in the blue-tooth range. 1.3 Aim The aim of this project is to create a mobile application which facilitates sharing of textual information. This sharing does not involve any cost since it uses the blue-tooth for functioning and application will be a user friendly and available on the mobile phones of its users. 1.4 Objectives To provide its users facility to exchange textual information with the help of mobile phones. Help people to communicate with each other in a short distance at no cost at all. To use the blue-tooth of the mobile phone for sending and receiving text messages Providing group interaction among people. Any person or organization can use it for free.

International Institute of Professional Studies,DAVV,Indore

Page

1.5 Assumptions The mobile phone is Java enabled i.e it supports Java applications. The mobile phone on which the application will run have blue-tooth. User is familiar with English language. User is having the basic knowledge of how a mobile phone operates. User knows the work of blue-tooth.

1.6 Overview Chapter 2 of this report contains an analysis of feasibility of the project, focusing mainly on technical, economic and behavioral feasibilities. Chapter 3 deals with the planning part of the project, giving information on how we went about designing this project Chapter 4 is a detailed analysis of the system, listing the flaws in the current system, the proposed systems benefits use case diagrams etc. Chapter 5 focuses on the design aspect of the project, giving the logical, physical conceptual and user interface design details. Chapter 6 of this report is about implementation, testing and coding Chapter 7 contains prospects for future enhancements

International Institute of Professional Studies,DAVV,Indore

Page

2
Feasibility Study

2.1 Feasibility Analysis 2.2 Economic Feasibility 2.3 Technical Feasibility 2.3.1 Development Risk 2.3.2 Resource ability 2.3.3 Technology 2.4 Behavioral Feasibility

International Institute of Professional Studies,DAVV,Indore

Page

Feasibility Study
2.1 Feasibility Analysis A feasibility study is an evaluation of a proposal designed to determine the difficulty in carrying out a designated task. Generally, a feasibility study precedes technical development and project implementation. In other words, a feasibility study is an evaluation or analysis of the potential impact of a proposed project. The feasibility study is done to find whether the system is beneficial to user and organization or not. The feasibility study is carried out to select the best system that meets performance requirements. The feasibility study includes the investigation of the information needs of the end user and objectives, constraints, basic resource requirement and cost benefits . The main and prime objective of feasibility study is not to solve the problem but to acquire a sense of its scope. Based on this the feasibility of the proposed system can be evaluated in terms of following major categories. 2.2 Economic Feasibility Economic feasibility is generally the bottom line consideration for most of the systems. Economic justifications includes a broad range of concerns that include cost benefit analysis, long term corporate income strategies, impact on other profit centers or products, cost of resources needed for the development etc. This system will surely increase the profit of the user as it will work on the resources already available with the user. The proposed BTalk system is economically feasible because The system requires no operation cost. The system will provide faster and efficient communication between users. The system will have very interactive and easy to use GUI interface and requires no user training. The system does not require any additional hardware or software support. 2.3 Technical Feasibility Technical feasibility is one of the most difficult areas to assess at this time of systems engineering. If right assumptions are made anything might seem possible. The considerations that are normally associated with technical feasibility include: 2.3.1 Development Risk:

International Institute of Professional Studies,DAVV,Indore

Page

Can the system element be designed so that necessary function and performance are achieved within the constraints uncovered during the analysis of the present system? The new system proposes to bring significant changes to the present system to make it more efficient. The new system proposed is a completely automated system and it meets all the constraints requirements and performance requirements identified for the system to become successful. 2.3.2 Resource availability: Are skilled staffs available for the development of the new proposed system? Are any other necessary resources available to build the system? The participants working should not be highly skilled. Most of the common people have mobile phones which have blue-tooth and supports Java applications they know very well how to operate it. With this knowledge one can easily use this system. Therefore the resources are easily available for the system. 2.3.3 Technology: Has the relevant technology progressed to a state that will support the system? Technology in the form of different works done in the related field is already available with the commercial world and has been already successively used in many areas. Therefore, there is no need of any special technology to be developed. The new system is fully capable of meeting the performance, reliability, maintainability and predictability requirements. Since Java enablement and blue-tooth are very common in mobile phones.

2.4 Behavioral Feasibility People are inherently resistant to change and computers have been to facilitate change. An estimate should be made of how strong a reaction a user is likely to have toward the development of a computerized system. It is common knowledge that computer installations have something to do with turnover, transfers, retaining and changes in employee job status. Therefore, it is understandable that the introduction of a candidate system requires special effort to educate, sell and train the staff on new ways of conducting business. Since it is a simple application that requires general knowledge of how to operate the mobile phone and if a user uses blue-tooth for transferring files he can easily use this system so this system is behavioraly feasible.

International Institute of Professional Studies,DAVV,Indore

Page

3
Project Planning

3.1 Project Scope 3.2 Development Plan 3.3 Team Structure 3.4 Project Deliverables 3.5 Analysis time line chart 3.6 Resource Management 3.7 Risk Analysis

International Institute of Professional Studies,DAVV,Indore

Page

Project Planning
3.1 Project Scope This software will allow users to chat with others without spending a single penny. It can be implemented in an mall or organization to interact with all the people. It can also be implemented in companies to help spread notice to its employees. 3.2 Development Plan 3.3 Team Structure The team size was of four members who participated equally in the phases of information gathering, problem analysis, interviews, preparation of documents and the coding phase. 3.4 Project Deliverables

System requirement specification Project report Soft copy of project with complete source code.

International Institute of Professional Studies,DAVV,Indore

Page

3.5 Analysis Time Line Chart (Gantt Chart) Task Study Month1 Month 2 Month 3

Modeling

Architecture Design

Coding

Implementation

Testing

3.6 Resource Management The resource management is the use of resource which are available to develop the system and how they are managed to perform different tasks. The software technologies used are J2ME JABWT Netbeans 6.9.1 Sun Wireless Toolkit 2.5.2 3.7 Risk Analysis Here we define risk as 'the perceived extent of possible loss'. Different people will have different views of the impact of a particular risk what may be a small risk for one person may destroy the livelihood of someone else. One way of putting figures to risk is to calculate a value for it as:

International Institute of Professional Studies,DAVV,Indore

Page

risk = probability of event x cost of event Doing this allows you to compare risks objectively. We use this approach formally in decision making with Decision Trees. Risk analysis is crucial to good software project management and yet many projects are undertaken with no specific consideration or risk. Risk analysis is actually a series of risk management steps that enable us to attack risk: Risk identification Risk assessment Risk prioritization Risk management strategies Risk resolution Risk monitoring Risks are potential problems that might affect the successful completion of a software project. Risks involve uncertainty and potential losses. Risk analysis and management is intended to help a software team understand and manage uncertainty during the development process. The important thing is to remember that things can go wrong and to make plans to minimize their impact when they do. The work product is called a Risk Mitigation, Monitoring, and Management Plan (RMMM). Project risk assessing questions - Have top software and customer managers formally committed to support the project? - Are end-users enthusiastically committed to the project? - Are requirements fully understood by developers and customers? - Were customers fully involved in requirements definition? - Do end-users have realistic expectations? - Is project scope stable? - Does software team have the right skill set? - Are project requirements stable? - Does the project team have experience with technology to be implemented? - Is the number of people on project team adequate to do the job? - Do all stakeholders agree on the importance of the project the requirements for the systems being built? Risk identification Product-specific risks - the project plan and software statement of scope are examined to identify any special characteristics of the product that may threaten the project plan Generic risks - are potential threats to every software product (product size, business impact, customer characteristics, process definition, development environment, technology to be built, staff size and experience) Risk projection - Establish a scale that reflects the perceived likelihood of each risk - Delineate the consequences of the risk
International Institute of Professional Studies,DAVV,Indore Page

10

- Estimate the impact of the risk on the project and product - Note the overall accuracy of the risk projection to avoid misunderstandings Risk migration, monitoring and management All of the risk analysis activities presented to this point have single goal to assist the project team in developing the strategy for dealing with risk - Risk mitigation: Risk mitigation includes proactive planning for risk avoidance - Risk monitoring: Risk monitoring assessing means whether predicted risks occur or not, ensuring risk aversion steps are being properly applied, collect information for future risk analysis, attempt to determine which risks caused which problems - Risk management and contingency planning: Risk management and contingency planning includes actions to be taken in the event that mitigation steps have failed and the risk has become

International Institute of Professional Studies,DAVV,Indore

Page

11

4
System Analysis

4.1 Essential Model 4.1.1: Statement of purpose 4.2 Current Scenario 4.3 Drawback of the Current System 4.4 The Proposed System 4.5 Hardware and Software requirements

International Institute of Professional Studies,DAVV,Indore

Page

12

System Analysis
4.1 Essential Model 4.1.1: Statement of purpose The purpose to develop this system is to make communication between people easy and at negligible cost. 4.2 Current Scenario Currently there is no such software available in market which allows people to interact with each other for no cost. There are systems like SMS, VOIP, online chatting, etc. but none of these is free of cost. 4.3 Drawback of the Current System Current system is very costly. SMS system require to pay some cost for each SMS. VOIP and online chatting are very costly as the data charges applied by the operator are high. There is no such medium through which users can interact with each other for free. 4.4 The Proposed System The proposed system will enable users to chat with others free of cost. The chatting can be between 2 people and can also be between a group of people.

4.5 Hard ware and Software requirements 4.5.1 Hardware Requirements A mobile device with following: Bluetooth Hardware Keypad Color display 4.5.2 Software Requirements 1. Java enabled OS 2. Bluetooth CLDC 2.1 3. MIDP 1.1 4. J2ME support.
International Institute of Professional Studies,DAVV,Indore Page

13

5
Design

5.1

Conceptual Design 5.1.1 Objectives

5.2

Logical Design 5.2.1 Use Case Diagram 5.2.2 Use Case Description

5.3 Front-End 5.4 User Interface Design

International Institute of Professional Studies,DAVV,Indore

Page

14

Design

5.1 Conceptual Design 5.1.1..........................................................................................................Objectives The objective of this product's design is to be very user friendly. It looks like a simple yet powerful most widely used mobile application. 5.2 Logical Design 5.2.1 Use Case Diagrams For Server -

International Institute of Professional Studies,DAVV,Indore

Page

15

For Client -

5.2.2 Server

Use Case Description -

Select Server User choses to operate the product as server. Send Message to all clients The user after becoming server can send messages to all the clients active at that particular time. Exit The user can directly exit the application from the chat screen. Information The user can view information about the product. Help - The user can view help about how the product works. 16

International Institute of Professional Studies,DAVV,Indore

Page

Exit The user can exit the application from the menu. Client Select Client User choses to operate the product as client. Send Message to server The user after becoming client can send messages to the server if there is any server active at that time. Exit The user can directly exit the application from the chat screen. Information The user can view information about the product. Help - The user can view help about how the product works. Exit The user can exit the application from the menu.

International Institute of Professional Studies,DAVV,Indore

Page

17

5.3 Front End The Classes Of Front End are designed as

5.4 User Interface Design


International Institute of Professional Studies,DAVV,Indore Page

18

Initial -

Splash Screen International Institute of Professional Studies,DAVV,Indore Page

19

Menu International Institute of Professional Studies,DAVV,Indore Page

20

Select Client International Institute of Professional Studies,DAVV,Indore Page

21

Bluetooth Request International Institute of Professional Studies,DAVV,Indore Page

22

Waiting for Server International Institute of Professional Studies,DAVV,Indore Page

23

Select Server Bluetooth Request -

International Institute of Professional Studies,DAVV,Indore

Page

24

Chat Window International Institute of Professional Studies,DAVV,Indore Page

25

Server types Message International Institute of Professional Studies,DAVV,Indore Page

26

Client Receives Message -

International Institute of Professional Studies,DAVV,Indore

Page

27

Client types Message International Institute of Professional Studies,DAVV,Indore Page

28

Server Receives Message International Institute of Professional Studies,DAVV,Indore Page

29

Exit -

International Institute of Professional Studies,DAVV,Indore

Page

30

International Institute of Professional Studies,DAVV,Indore

Page

31

Implementation and Coding

6.1 6.2

Objective Coding

Implementation and Coding


International Institute of Professional Studies,DAVV,Indore Page

32

6.1 Objectives The main objective of this phase is to implement the system completely (front end) , write code accordingly and test for the system to confirm that system meets the specified requirements or not. 6.2 Coding BluetoothAdapter.java -

package chat;

public class BluetoothAdapter {

public void onCompleteSearch() {

public void onConnect() {

public void onDisconnect() {

public void onRecieve(String data) {

BluetoothClient.java -

International Institute of Professional Studies,DAVV,Indore

Page

33

package chat;

import java.io.IOException;

import java.io.InputStream;

import java.io.OutputStream;

import javax.bluetooth.DiscoveryAgent;

import javax.bluetooth.LocalDevice;

import javax.microedition.io.Connector;

import javax.microedition.io.StreamConnection;

import javax.microedition.io.StreamConnectionNotifier;

public class BluetoothClient implements Runnable {

private static String eof = "EOF\r\n";

public LocalDevice local_device;

private DiscoveryAgent disc_agent;

private String service_UUID;

private String player_name;

International Institute of Professional Studies,DAVV,Indore

Page

34

private String url;

private StreamConnectionNotifier notifier;

private StreamConnection conn;

private static int DELAY = 100;

private int log_level;

public boolean active;

private BluetoothAdapter adapter;

private OutputStream os = null;

private InputStream is = null;

private boolean connected = false;

private String data = " ";

public BluetoothClient() {

try {

local_device = LocalDevice.getLocalDevice();

disc_agent = local_device.getDiscoveryAgent();

local_device.setDiscoverable( DiscoveryAgent.LIAC );

International Institute of Professional Studies,DAVV,Indore

Page

35

service_UUID = "00000000000010008000006057028C19";

player_name = local_device.getFriendlyName();

url = "btspp://localhost:" + service_UUID + ";name="+player_name;

active = true;

adapter = null;

} catch (Exception e) {

public void run() {

try {

notifier = (StreamConnectionNotifier) Connector.open( url );

while (active) {

try {

if (!connected) {

International Institute of Professional Studies,DAVV,Indore

Page

36

openConnection();

proses(conn);

Thread.sleep(DELAY);

} catch (Exception e) {

openConnection();

continue;

} catch (Exception e) {

e.printStackTrace();

private void openConnection() {

try {

International Institute of Professional Studies,DAVV,Indore

Page

37

connected = false;

conn = (StreamConnection) notifier.acceptAndOpen();

os = conn.openOutputStream();

is = conn.openInputStream();

connected = true;

if (adapter != null) {

adapter.onConnect();

} catch (IOException ex) {

ex.printStackTrace();

public void send(String data) {

this.data = data;

International Institute of Professional Studies,DAVV,Indore

Page

38

private void write(String data) {

try {

if (connected) {

os.write(data.getBytes());

os.write(eof.getBytes());

os.flush();

} catch (Exception e) {

connected = false;

e.printStackTrace();

private String read() {

StringBuffer buffer = new StringBuffer("");

International Institute of Professional Studies,DAVV,Indore

Page

39

try {

if (connected) {

int x = 0;

while (x != -1) {

x = is.read();

if (x != -1) {

buffer.append((char) x);

if (buffer.toString().endsWith(eof)) {

buffer.delete(buffer.length()-eof.length(), buffer.length());

break;

} catch (Exception e) {

connected = false;

International Institute of Professional Studies,DAVV,Indore

Page

40

e.printStackTrace();

return buffer.toString();

private void proses(StreamConnection conn) {

write(data);

String respon = read().trim();

if (adapter != null && !respon.trim().equals("")) {

adapter.onRecieve(respon);

data = " ";

public void setListener(BluetoothAdapter adapter) {

this.adapter = adapter;

International Institute of Professional Studies,DAVV,Indore

Page

41

public String getName() {

return local_device.getFriendlyName();

public String getId() {

return local_device.getBluetoothAddress();

BluetoothServer.java package chat;

import java.io.IOException;

import java.io.InputStream;

import java.io.OutputStream;

import java.util.Enumeration;

import java.util.Vector;

International Institute of Professional Studies,DAVV,Indore

Page

42

import javax.bluetooth.DataElement;

import javax.bluetooth.DeviceClass;

import javax.bluetooth.DiscoveryAgent;

import javax.bluetooth.DiscoveryListener;

import javax.bluetooth.LocalDevice;

import javax.bluetooth.RemoteDevice;

import javax.bluetooth.ServiceRecord;

import javax.bluetooth.UUID;

import javax.microedition.io.Connector;

import javax.microedition.io.StreamConnection;

public class BluetoothServer implements Runnable {

private static String eof = "EOF\r\n";

private static int DELAY = 100;

public LocalDevice local_device;

private DiscoveryAgent disc_agent;

International Institute of Professional Studies,DAVV,Indore

Page

43

private InquiryListener inq_listener;

private String[] urls;

private UUID[] u;

private Enumeration devices;

private StreamConnection[] conns;

private OutputStream[] oss;

private InputStream[] iss;

private boolean[] connecteds;

private int device_count;

public boolean active;

private Vector pesans = new Vector();

private String pesan = "";

private BluetoothAdapter adapter;

private int log_level;

public BluetoothServer() {

active = true;

International Institute of Professional Studies,DAVV,Indore

Page

44

public void run() {

try {

local_device = LocalDevice.getLocalDevice();

disc_agent = local_device.getDiscoveryAgent();

local_device.setDiscoverable( DiscoveryAgent.NOT_DISCOVERABLE );

inq_listener = new InquiryListener();

synchronized(inq_listener) {

disc_agent.startInquiry(DiscoveryAgent.LIAC, inq_listener);

inq_listener.wait();

u = new UUID[1];

u[0] = new UUID( "00000000000010008000006057028C19", false );

int[] attrbs = {0x0100};

devices = inq_listener.cached_devices.elements();

ServiceListener serv_listener = new ServiceListener();

International Institute of Professional Studies,DAVV,Indore

Page

45

while(devices.hasMoreElements()) {

synchronized( serv_listener ) {

disc_agent.searchServices( attrbs, u, (RemoteDevice) devices.nextElement(), serv_listener );

serv_listener.wait();

device_count = serv_listener.FoundServiceRecords.size();

conns = new StreamConnection[device_count];

urls = new String[device_count];

oss = new OutputStream[device_count];

iss = new InputStream[device_count];

connecteds = new boolean[device_count];

for( int i = 0; i < device_count; i++ ) {

urls[i] = ((ServiceRecord) serv_listener.FoundServiceRecords.elementAt( i )).getConnectionURL( 0, false );

connecteds[i] = false;

International Institute of Professional Studies,DAVV,Indore

Page

46

//System.out.println("[Server] --> Searching finish found "+device_count+" device");

if (adapter != null) {

adapter.onCompleteSearch();

while (active) {

try {

pesan = " ";

if (pesans.size() > 0) {

pesan = (String) pesans.elementAt(0);

for( int i = 0; i < device_count; i++ ) {

if (!connecteds[i]) {

connect(i);

proses(i, pesan);

International Institute of Professional Studies,DAVV,Indore

Page

47

if (pesans.size() > 0) {

pesans.removeElementAt(0);

Thread.sleep(DELAY);

} catch (Exception e) {

continue;

} catch (Exception e) {

e.printStackTrace();

private void connect(int index) {

try {

International Institute of Professional Studies,DAVV,Indore

Page

48

connecteds[index] = false;

//System.out.println("[Server] --> Connecting...");

conns[index] = (StreamConnection) Connector.open(urls[index]);

oss[index] = conns[index].openOutputStream();

iss[index] = conns[index].openInputStream();

//System.out.println("[Server] --> Connected");

if (adapter != null) {

adapter.onConnect();

connecteds[index] = true;

} catch (IOException ex) {

ex.printStackTrace();

public void write(int index, String data) {

International Institute of Professional Studies,DAVV,Indore

Page

49

try {

if (connecteds[index]) {

//System.out.println("[Server] --> Sending...");

//System.out.println("[Data] --> "+data);

oss[index].write(data.getBytes());

oss[index].write(eof.getBytes());

oss[index].flush();

//System.out.println("[Server] --> Sending finish");

} catch (Exception e) {

connecteds[index] = false;

e.printStackTrace();

public String read(int index) {

International Institute of Professional Studies,DAVV,Indore

Page

50

StringBuffer buffer = new StringBuffer("");

try {

if (connecteds[index]) {

//System.out.println("[Server] --> Reading...");

int x = 0;

while (x != -1) {

x = iss[index].read();

if (x != -1) {

buffer.append((char) x);

if (buffer.toString().endsWith(eof)) {

buffer.delete(buffer.length()-eof.length(), buffer.length());

break;

//System.out.println("[Data] --> "+buffer.toString());

International Institute of Professional Studies,DAVV,Indore

Page

51

//System.out.println("[Server] --> Reading finish...");

} catch (Exception e) {

connecteds[index] = false;

e.printStackTrace();

return buffer.toString();

public void proses(int index, String pesan) {

write(index, pesan);

String respon = read(index).trim();

if (adapter != null && !respon.trim().equals("")) {

adapter.onRecieve(respon);

International Institute of Professional Studies,DAVV,Indore

Page

52

public void send(String pesan) {

pesans.addElement(pesan);

public void setListener(BluetoothAdapter adapter) {

this.adapter = adapter;

public String getName() {

return local_device.getFriendlyName();

public String getId() {

return local_device.getBluetoothAddress();

private class InquiryListener implements DiscoveryListener {

International Institute of Professional Studies,DAVV,Indore

Page

53

public Vector cached_devices;

public InquiryListener() {

cached_devices = new Vector();

public void deviceDiscovered(RemoteDevice btDevice, DeviceClass cod) {

int major = cod.getMajorDeviceClass();

if( major == 0x0200 ) {

if(!cached_devices.contains(btDevice)) {

cached_devices.addElement( btDevice );

public void inquiryCompleted(int discType) {

synchronized(this) {

this.notify();

International Institute of Professional Studies,DAVV,Indore

Page

54

public void servicesDiscovered(int transID, ServiceRecord[] servRecord) {

public void serviceSearchCompleted(int transID, int respCode) {

private class ServiceListener implements DiscoveryListener {

private Vector FoundServiceRecords;

public ServiceListener() {

FoundServiceRecords = new Vector();

public void servicesDiscovered(int transID, ServiceRecord[] servRecord) {

DataElement sn;

FoundServiceRecords.addElement( servRecord[0] );

International Institute of Professional Studies,DAVV,Indore

Page

55

public void serviceSearchCompleted(int transID, int respCode) {

synchronized(this) {

this.notify();

public void deviceDiscovered(RemoteDevice btDevice, DeviceClass cod) {

public void inquiryCompleted(int discType) {

Chat.java package chat;

import javax.microedition.midlet.*; import javax.microedition.lcdui.*;

public class Chat extends MIDlet {

International Institute of Professional Studies,DAVV,Indore

Page

56

public TFrmSplash frmSplash; public TFrmMenu frmMenu; public TFrmTutup frmTutup; public TFrmBantuan frmBantuan; public TFrmInformasi frmInformasi; public TFrmServer frmServer; public TFrmServerMessage frmServerMessage; public TFrmServerMessageSend frmServerMessageSend;

public TFrmClient frmClient; public TFrmClientMessage frmClientMessage; public TFrmClientMessageSend frmClientMessageSend;

public BluetoothServer server; public BluetoothClient client; public Display display; public void startApp() { display = Display.getDisplay(this); frmSplash = new TFrmSplash(this); frmMenu = new TFrmMenu(this); frmTutup = new TFrmTutup(this); frmBantuan = new TFrmBantuan(this); frmInformasi = new TFrmInformasi(this); frmServer = new TFrmServer(this); frmServerMessage = new TFrmServerMessage(this); frmServerMessageSend = new TFrmServerMessageSend(this); frmClient = new TFrmClient(this); frmClientMessage = new TFrmClientMessage(this); frmClientMessageSend= new TFrmClientMessageSend(this); frmSplash.show(); }

International Institute of Professional Studies,DAVV,Indore

Page

57

public void pauseApp() { }

public void destroyApp(boolean unconditional) { notifyDestroyed(); }

public void sleep(long delay) { try { Thread.sleep(delay); } catch (Exception e) { } } }

7
Future Enhancements

Video Chat service can be added so that users can interact with each other personally. SMS can be added so that user can directly send messages without quitting the application. Data transfer module can be added so that the user can send files without quitting the application Video Chat service can be added so that users can talk with each other personally. Internet access can be granted so that VPN can be established and chat will be possible with other users using this application in any other part of world. Customizable color scheme or skins.

International Institute of Professional Studies,DAVV,Indore

Page

58

International Institute of Professional Studies,DAVV,Indore

Page

59

Вам также может понравиться