SlideShare a Scribd company logo
1 of 3
Download to read offline
ACEEE Int. J. on Communication, Vol. 01, No. 03, Dec 2010 
 



       Resource Identification Using Mobile Queries
                                              S. R. Balasundaram1 , A. Saravanan2
                                             1
                                             Assistant Professor, 2Research Scholar
                                                        1
                                                         blsundar@nitt.edu
                                           1,2
                                              Department of Computer Applications
                                    National Institute of Technology,Tiruchirappalli ,India.
                                                    2
                                                      saro_manj@yahoo.com


Abstract - Location based mobile services (LBS) are budding              distress being experienced during the journey, which is
significantly along with development of GPS-enabled mobile               often a time consuming process.
phones, smart phones and PDAs. Mobile users may submit the                  The current location of the mobile user will not help to
query to the server for knowing about nearest resources such             provide the proper index for identifying the nearest required
as fuel stations, hospitals, ATM centers etc to get the services.
In this scenario, identifying locations of resources is highly
                                                                         resources from the database. Most of the location based
significant. This paper focuses on query management in                   applications have considered only the current location as
mobile environments to locate the most appropriate location of           the index to get the details from the database. The results
the required services.                                                   based on this index may not be an accurate one, because of
                                                                         the user’s mobility. Hence, prediction mechanism is needed
Index Terms -      Mobility, GPS mechanisms, Location based              for finding the future location of the mobile user, which
services, Mobile data, Query management.                                 would be used to define a proper index for identifying the
                                                                         resources from the database.
                      I. INTRODUCTION
   With recent advances in wireless technologies and
communications, mobile services are becoming an
important part in day to day human life. The mobile
environment consists of mobile users with information
appliances (mobile devices) such as smart phones, cell
phones or Personal Digital Assistants (PDA) that will be
communicating and interacting with each other. Mobile
technologies are extensively involved in real life activities
and they allow users to have anytime, anywhere access to
information and applications[1,2].
   Locations play a vital role in mobile applications to
provide the required details for users. For example, when a
mobile user wants to find a shopping mall, he is not
concerned with shopping mall that are far away from his                                      Figure 1. User on Mobility
current location, rather he wants to choose one from several
shopping malls that are nearer to his current location. In this                       II. MOBILE DATA MANAGEMENT
case, the application should get the user’s current location
details for further processing.An essential part of location-               Managing data in mobile environments is the most
based application is locating the user’s current location.               significant issues in mobile applications. Mobile data
Global Positioning System (GPS) is a widely used                         management deals with both local and global data in turn
technology for this purpose. With the advances in GPS                    handling various activities such as data access, caching,
mechanisms, wireless technologies and the growing                        query processing, location addressing, replication etc [4].
popularity of mobile devices, the need for location-based                Various aspects of managing data have been dealt by
services is gaining considerable attention[3].                           researchers in different situations. Many have proposed
   Finding the nearest resources from the current                        location aware mechanisms for exploiting data from the
location/area of a mobile user during his/her journey, will              fixed locations to manage data for convenience [5]. Hae
be a challenging one if the traveling area is long. It is                Don Chon, Divyakant Agrawal and Amr El Abbadi have
important to identify the resource (like fuel station) as near           developed a location-based application, NAPA (Nearest
as possible to the needy people (mobile users) during their              Available Parking Lot Application), that assists users to
journey (Figure 1). This would reduce the amount of                      find a nearest parking space on campus[6].
                                                                            Lauri Aalto, Nicklas Gothlin, Jani Korhonen and Timo
                                                                         Ojala have focused on delivering permission-based
                                                                    25
© 2010 ACEEE
DOI: 01.IJCOM.01.03.550
                                                                
ACEEE Int. J. on Communication, Vol. 01, No. 03, Dec 2010 
 


location-aware mobile advertisements to mobile phones                    Assuming that, a mobile user is traveling on a straight
using Bluetooth positioning and Wireless Application                  path at constant speed, the past and current locations of the
Protocol(WAP) Push[7]. J. Hwang, H. Kang, and K. Li                   mobile users obtained through GPS mechanism, and the
have proposed a similarity measure for spatio-temporal                future location (xn+1,yn+1) can be predicted using the
trajectories of vehicles. Similar trajectories are required to        following formulae:
traverse the same points of interest(POIs)[8]. Ebtisam Amar
and Selma Boumerdassi have proposed a location service                Current and past positions are : (xn,yn) and (xn-1,yn-1).
called Predictive-Hierarchical Location Service (PHLS) that
uses a hierarchy of regions to achieve scalability, and               Distance of traveling from past to current position
predicts the requested location by utilizing previous                                  |pc| = √ ( xn - xn-1)2 + (yn - yn-1)2
location information[9].                                              Future position of xn+1 = xn + |pc|                    (1)
                                                                      and yn+1 = yn + |pc|.                                  (2)
  A. Location Management
                                                                         Fig. 2 represents the movement of the mobile users
   Mobile devices, by their very nature, can be operated              noticed at locations L1 and L2. The future location Lp can
from      a    dynamic       location.  Anytime–anywhere              be calculated and the nearest available resources (based on
communication and transmission of data uplifts the                    that location) will be identified.
potentialities and advantages of mobile/wireless                         The methodology for finding the most appropriate
technologies. A location-aware or location-based service is           location of the resource(s) is given in the following
highly significant in mobile environments which is driven             procedure.
by location information.Location dependent data depends
on the geographical location. The answer to queries over                Algorithm
location dependent data depends on the locations of the data
and the place of query initiated.                                     Procedure getResource( )

                III. LOCATION PREDICTIONS                             Begin
   A number of methods for predicting locations have been             Let L1,L2….Lp be locations.
discussed by many [10,11]. Most of the applications use the           Let Li is the query initiated location.
mobile data, i.e. current location, for predicting the future         //Traveler sends request to server
location for taking any decision.                                     Let Lp is the calculated location
   In this paper, the significance of the mobile data                 //Server calculates the future location of traveler
combined with the locations of resources kept in database is          //and checks the locations of required Resources
discussed, where the minimum distant resource location is              Let Resource_Location be the set of locations identified
to be identified. It should be noted that straightforward use         closer to Lp.
of indexing is not feasible due to the continuous change of            If more than one location exists with the required
the locations of the mobile users.                                     resources then
                                                                              Begin
  A. Global Positioning System                                                 d = min { distance(Lp,Resource_Location) };
   Let us consider the location data obtained from GPS i.e.                    Select the resource at distance d;
latitude and longitude values, the distance calculation will                  End;
be done between future location of mobile users and                   End.
resources.                                                            ________________________________________ 

                                                                                     IV. RESOURCE GEO-DATABASE
                                                                         Here, the resources that are taken for consideration
                                                                      specifically belong to the service centers such as ICICI
                                                                      ATM, HP fuel stations, Shopping malls and star rated
                                                                      restaurants. These details are stored in a database with their
                                                                      location name, latitude and longitude values (Table1).




           Figure 2. Mobile Users with Available Resources



                                                                 26
© 2010 ACEEE
DOI: 01.IJCOM.01.03.550
                                                              
ACEEE Int. J. on Communication, Vol. 01, No. 03, Dec 2010 
 

                  Table 1. Resource_Geo_Database
                    Latitude and Longitude                                  SELECT Resources,Location,min(Diff)
      Location
       Name
                 Lat -     ‘x2’   Long - ‘y2’       Resources               FROM Resource_Geo_Database
                     value           value                                  WHERE Diff IN
    Trichy       10.80834       78.70197        Fuel Station                ( SELECT (sqrt(pow(x2-x1)+pow(y2-y1))) AS Diff
                                                Fuel Station,                 FROM Resource_Geo_Database
    Samayapura   10.92389       78.743553
                                                Restaurant
                                                                              WHERE Resources = ‘Restaurant’ )
                                                Fuel Station,
    Siruganoor   10.99889       78.793327
                                                ATM center                                            //‘Restaurant’: User data
                                                Fuel Station, ATM
    Perambalur   11.23611       78.86358        center,                                             CONCLUSION
                                                Shopping Mall
    Viluppuram   11.95717       79.47946        Shopping Mall                Providing information to the needy people who are
                                                                          required the resources, during travel whose required
    Tindivanam   12.53579       79.08817        ATM center                resource(s) can be identified at the minimum distance is the
    Chengalpet   12.70024       79.98234
                                                Fuel Station,             major concern of this work. The significance of mobile
                                                Restaurant                technologies with the help of mobile devices and the
                                                ATM center,               location data management are discussed in this paper. The
    Tambaram     12.93152       80.1259         Shopping Mall
                                                Restaurant                mobile data supports to retrieve the location of nearest
                                                                          resources in time and cost effective way.
    Chennai      13.06397       80.24311        Fuel Station

                                                Fuel Station,
                                                                                                     REFERENCES
    Tanjore      10.79556       79.137718
                                                Restaurant                [1] Vasilis Koudounas and Omar Iqbal, “Mobile Computing : Past,
    Kumbakona    10.96462       79.39074        Shopping Mall                  Present         And        Future,”        retrieved       from
                                                                               http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/vk5/report.
    Mayavaram    11.10501       79.65095        ATM center                     html.
                                                                          [2] Sandeep Jain, “Introduction to Mobile Computing : The way the
                                                Fuel Station,                  world        is     changing!,”              retrieved     from
    Thiruvarur   10.77287       79.63952
                                                Restaurant                     http://www.acm.org/crossroads/xrds7-2/intro72.html
                                                ATM center,               [3] Khondker Shajadul Hasan, Mashiur Rahman, Abul L. Haque, M
    Karur        10.95883       78.08597        Shopping Mall,                 Abdur Rahman, Tanzil Rahman and M Mahbubur Rasheed,
                                                Restaurant                     “Cost Effective GPS-GPRS Based Object Tracking System,”
                                                                               Proceedings of the International MultiConference of Engineers
    Namakkal     11.24438       78.17361        Fuel Station                   and Computer Scientists, Vol I, IMECS 2009, March 18 - 20,
                                                                               Hong Kong.
                                                Fuel Station,             [4] Vijay Kumar, Mobile Database Systems, John Wiley & Sons,Inc.
    Salem        11.67273       78.16049
                                                Restaurant                     Publication, 2006.
                                                                          [5] Uwe Kubach and Kurt Rothermel, “Estimating the Benefit of
                                                Fuel Station,                  Location-Awareness      for    Mobile     Data       Management
    Dharmapuri   12.12781       78.16245
                                                ATM center                     Mechanisms,” Pervasive 2002, LNCS 2414, pp. 225–238,
                                                                               Springer-Verlag Berlin Heidelberg, 2002.
  A. Finding Nearest Resources                                            [6] Hae Don Chon, Divyakant Agrawal and Amr El Abbadi,
   When there are more than one resource available to the                      “NAPA :Nearest Available Parking lot Application,” IEEE
                                                                               Proceedings of the 18th International Conference on Data
predicted location, choosing the nearest resource is one of                    Engineering, 2002.
the major features of this work. In the context of providing              [7] Lauri Aalto, Nicklas Göthlin, Jani Korhonen and Timo Ojala, “
minimum distant resource to the mobile user, the system                        Bluetooth and WAP Push Based Location-Aware Mobile
involves the following distance calculation.                                   Advertising System,” MobiSys’04, June 6–9, Boston,
   After submitting the query to the server, the predicted                     Massachusetts, USA, 2004.
                                                                          [8] J. Hwang, H. Kang and K. Li, “Spatio-temporal Similarity
location of a mobile user can be calculated by the equations
                                                                               Analysis Between Trajectories on Road Networks,” In Proc. of
1 and 2.                                                                       the International Workshop on Conceptual Modeling for
                Diff = sqrt(pow(x2-x1)+pow(y2-y1))                             Geographic Information Systems, pp. 280–289, 2005.
                                                                          [9] Ebtisam Amar and Selma Boumerdassi, “Enhancing Location
   Here, Diff is the distance between two coordinates                          Services with Prediction,” IWCMC’09(ACM), June 21–24,
(lat1,long1) and (lat2, long2).                                                Leipzig, Germany, 2009.
   Where (x1,y1) = Predicted location of mobile user                      [10] George Liu and Gerald Maguire Jr, “A Class of Mobile Motion
      and (x2,y2) = Location of resources (Specified as                        Prediction Algorithms for Wireless Mobile Computing and
                     ‘latitude’ and ‘longitude’ in the                         Communications,” Mobile Networks and Applications1, pp.113-
                      Table 1)                                                 121, A J.C. Baltzer AG Science Publishers, 1996.
                                                                          [11] Liu.T, Bahl. P and Chlamtac. I, “A Hierarchical Position-
   B. Query                                                                    Prediction Algorithm for Efficient Management of Resources in
   The nearest location of the resources can be retrieved by                   Cellular Networks,” Proceedings of the IEEE GLOBECOM’97,
the following SQL query:                                                       Phoenix, Arizona, 1997.
                                                                     27
© 2010 ACEEE
DOI: 01.IJCOM.01.03.550
                                                                  

More Related Content

What's hot

A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringeSAT Journals
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
 
Intelligent interaction for smart work [
Intelligent interaction for smart work [Intelligent interaction for smart work [
Intelligent interaction for smart work [ijcsa
 
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemConceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
 

What's hot (6)

A survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clusteringA survey on hiding user privacy in location based services through clustering
A survey on hiding user privacy in location based services through clustering
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
Bn24427436
Bn24427436Bn24427436
Bn24427436
 
E0341021025
E0341021025E0341021025
E0341021025
 
Intelligent interaction for smart work [
Intelligent interaction for smart work [Intelligent interaction for smart work [
Intelligent interaction for smart work [
 
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemConceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room System
 

Viewers also liked

KidzFrame: Supporting Awareness in the Daycare
KidzFrame: Supporting Awareness in the DaycareKidzFrame: Supporting Awareness in the Daycare
KidzFrame: Supporting Awareness in the DaycareIDES Editor
 
Improvement of Random Forest Classifier through Localization of Persian Handw...
Improvement of Random Forest Classifier through Localization of Persian Handw...Improvement of Random Forest Classifier through Localization of Persian Handw...
Improvement of Random Forest Classifier through Localization of Persian Handw...IDES Editor
 
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...IDES Editor
 
Identification of Reactive Power Reserve in Transmission Network
Identification of Reactive Power Reserve in Transmission NetworkIdentification of Reactive Power Reserve in Transmission Network
Identification of Reactive Power Reserve in Transmission NetworkIDES Editor
 
A New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC ConverterA New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC ConverterIDES Editor
 
Development of Dual Frequency Alternator Technology Based Power Source For Mi...
Development of Dual Frequency Alternator Technology Based Power Source For Mi...Development of Dual Frequency Alternator Technology Based Power Source For Mi...
Development of Dual Frequency Alternator Technology Based Power Source For Mi...IDES Editor
 
Specification-based Verification of Incomplete Programs
Specification-based Verification of Incomplete ProgramsSpecification-based Verification of Incomplete Programs
Specification-based Verification of Incomplete ProgramsIDES Editor
 
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...IDES Editor
 
ANN Based PID Controlled Brushless DC drive System
ANN Based PID Controlled Brushless DC drive SystemANN Based PID Controlled Brushless DC drive System
ANN Based PID Controlled Brushless DC drive SystemIDES Editor
 

Viewers also liked (9)

KidzFrame: Supporting Awareness in the Daycare
KidzFrame: Supporting Awareness in the DaycareKidzFrame: Supporting Awareness in the Daycare
KidzFrame: Supporting Awareness in the Daycare
 
Improvement of Random Forest Classifier through Localization of Persian Handw...
Improvement of Random Forest Classifier through Localization of Persian Handw...Improvement of Random Forest Classifier through Localization of Persian Handw...
Improvement of Random Forest Classifier through Localization of Persian Handw...
 
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...
 
Identification of Reactive Power Reserve in Transmission Network
Identification of Reactive Power Reserve in Transmission NetworkIdentification of Reactive Power Reserve in Transmission Network
Identification of Reactive Power Reserve in Transmission Network
 
A New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC ConverterA New Soft-Switched Resonant DC-DC Converter
A New Soft-Switched Resonant DC-DC Converter
 
Development of Dual Frequency Alternator Technology Based Power Source For Mi...
Development of Dual Frequency Alternator Technology Based Power Source For Mi...Development of Dual Frequency Alternator Technology Based Power Source For Mi...
Development of Dual Frequency Alternator Technology Based Power Source For Mi...
 
Specification-based Verification of Incomplete Programs
Specification-based Verification of Incomplete ProgramsSpecification-based Verification of Incomplete Programs
Specification-based Verification of Incomplete Programs
 
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...
 
ANN Based PID Controlled Brushless DC drive System
ANN Based PID Controlled Brushless DC drive SystemANN Based PID Controlled Brushless DC drive System
ANN Based PID Controlled Brushless DC drive System
 

Similar to Resource Identification Using Mobile Queries

Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningIDES Editor
 
Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification IRJET Journal
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Location based-services-using-android-mobile-operating-system-copyright-ijaet
Location based-services-using-android-mobile-operating-system-copyright-ijaetLocation based-services-using-android-mobile-operating-system-copyright-ijaet
Location based-services-using-android-mobile-operating-system-copyright-ijaetBala Subramanyam
 
a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments marwaeng
 
Mobile Location Indexing Based On Synthetic Moving Objects
Mobile Location Indexing Based On Synthetic Moving ObjectsMobile Location Indexing Based On Synthetic Moving Objects
Mobile Location Indexing Based On Synthetic Moving ObjectsIJECEIAES
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...IJMTST Journal
 
Vertical fragmentation of location information to enable location privacy in ...
Vertical fragmentation of location information to enable location privacy in ...Vertical fragmentation of location information to enable location privacy in ...
Vertical fragmentation of location information to enable location privacy in ...IJASAJournal1
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesIOSR Journals
 
Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery inambitlick
 
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...sipij
 
Application Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information SystemsApplication Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information Systemsijasa
 

Similar to Resource Identification Using Mobile Queries (20)

Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
 
Data Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity MiningData Management In Cellular Networks Using Activity Mining
Data Management In Cellular Networks Using Activity Mining
 
Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification Location Based Services, Change in Profile and Notification
Location Based Services, Change in Profile and Notification
 
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...
 
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...
 
Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...Prototyping the Future Potentials of Location Based Services in the Realm of ...
Prototyping the Future Potentials of Location Based Services in the Realm of ...
 
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...Vertical Fragmentation of Location Information to Enable Location Privacy in ...
Vertical Fragmentation of Location Information to Enable Location Privacy in ...
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Location based-services-using-android-mobile-operating-system-copyright-ijaet
Location based-services-using-android-mobile-operating-system-copyright-ijaetLocation based-services-using-android-mobile-operating-system-copyright-ijaet
Location based-services-using-android-mobile-operating-system-copyright-ijaet
 
azd document
azd documentazd document
azd document
 
a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments a data mining approach for location production in mobile environments
a data mining approach for location production in mobile environments
 
Mobile Location Indexing Based On Synthetic Moving Objects
Mobile Location Indexing Based On Synthetic Moving ObjectsMobile Location Indexing Based On Synthetic Moving Objects
Mobile Location Indexing Based On Synthetic Moving Objects
 
Location dependent query processing
Location dependent query processingLocation dependent query processing
Location dependent query processing
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
 
Vertical fragmentation of location information to enable location privacy in ...
Vertical fragmentation of location information to enable location privacy in ...Vertical fragmentation of location information to enable location privacy in ...
Vertical fragmentation of location information to enable location privacy in ...
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization Techniques
 
Mobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google MapsMobile Device Application to locate an Interest Point using Google Maps
Mobile Device Application to locate an Interest Point using Google Maps
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...
 
Application Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information SystemsApplication Of Android Enabled Mobile Device For Personal Information Systems
Application Of Android Enabled Mobile Device For Personal Information Systems
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Resource Identification Using Mobile Queries

  • 1. ACEEE Int. J. on Communication, Vol. 01, No. 03, Dec 2010    Resource Identification Using Mobile Queries S. R. Balasundaram1 , A. Saravanan2 1 Assistant Professor, 2Research Scholar 1 blsundar@nitt.edu 1,2 Department of Computer Applications National Institute of Technology,Tiruchirappalli ,India. 2 saro_manj@yahoo.com Abstract - Location based mobile services (LBS) are budding distress being experienced during the journey, which is significantly along with development of GPS-enabled mobile often a time consuming process. phones, smart phones and PDAs. Mobile users may submit the The current location of the mobile user will not help to query to the server for knowing about nearest resources such provide the proper index for identifying the nearest required as fuel stations, hospitals, ATM centers etc to get the services. In this scenario, identifying locations of resources is highly resources from the database. Most of the location based significant. This paper focuses on query management in applications have considered only the current location as mobile environments to locate the most appropriate location of the index to get the details from the database. The results the required services. based on this index may not be an accurate one, because of the user’s mobility. Hence, prediction mechanism is needed Index Terms - Mobility, GPS mechanisms, Location based for finding the future location of the mobile user, which services, Mobile data, Query management. would be used to define a proper index for identifying the resources from the database. I. INTRODUCTION With recent advances in wireless technologies and communications, mobile services are becoming an important part in day to day human life. The mobile environment consists of mobile users with information appliances (mobile devices) such as smart phones, cell phones or Personal Digital Assistants (PDA) that will be communicating and interacting with each other. Mobile technologies are extensively involved in real life activities and they allow users to have anytime, anywhere access to information and applications[1,2]. Locations play a vital role in mobile applications to provide the required details for users. For example, when a mobile user wants to find a shopping mall, he is not concerned with shopping mall that are far away from his Figure 1. User on Mobility current location, rather he wants to choose one from several shopping malls that are nearer to his current location. In this II. MOBILE DATA MANAGEMENT case, the application should get the user’s current location details for further processing.An essential part of location- Managing data in mobile environments is the most based application is locating the user’s current location. significant issues in mobile applications. Mobile data Global Positioning System (GPS) is a widely used management deals with both local and global data in turn technology for this purpose. With the advances in GPS handling various activities such as data access, caching, mechanisms, wireless technologies and the growing query processing, location addressing, replication etc [4]. popularity of mobile devices, the need for location-based Various aspects of managing data have been dealt by services is gaining considerable attention[3]. researchers in different situations. Many have proposed Finding the nearest resources from the current location aware mechanisms for exploiting data from the location/area of a mobile user during his/her journey, will fixed locations to manage data for convenience [5]. Hae be a challenging one if the traveling area is long. It is Don Chon, Divyakant Agrawal and Amr El Abbadi have important to identify the resource (like fuel station) as near developed a location-based application, NAPA (Nearest as possible to the needy people (mobile users) during their Available Parking Lot Application), that assists users to journey (Figure 1). This would reduce the amount of find a nearest parking space on campus[6]. Lauri Aalto, Nicklas Gothlin, Jani Korhonen and Timo Ojala have focused on delivering permission-based 25 © 2010 ACEEE DOI: 01.IJCOM.01.03.550    
  • 2. ACEEE Int. J. on Communication, Vol. 01, No. 03, Dec 2010    location-aware mobile advertisements to mobile phones Assuming that, a mobile user is traveling on a straight using Bluetooth positioning and Wireless Application path at constant speed, the past and current locations of the Protocol(WAP) Push[7]. J. Hwang, H. Kang, and K. Li mobile users obtained through GPS mechanism, and the have proposed a similarity measure for spatio-temporal future location (xn+1,yn+1) can be predicted using the trajectories of vehicles. Similar trajectories are required to following formulae: traverse the same points of interest(POIs)[8]. Ebtisam Amar and Selma Boumerdassi have proposed a location service Current and past positions are : (xn,yn) and (xn-1,yn-1). called Predictive-Hierarchical Location Service (PHLS) that uses a hierarchy of regions to achieve scalability, and Distance of traveling from past to current position predicts the requested location by utilizing previous |pc| = √ ( xn - xn-1)2 + (yn - yn-1)2 location information[9]. Future position of xn+1 = xn + |pc| (1) and yn+1 = yn + |pc|. (2) A. Location Management Fig. 2 represents the movement of the mobile users Mobile devices, by their very nature, can be operated noticed at locations L1 and L2. The future location Lp can from a dynamic location. Anytime–anywhere be calculated and the nearest available resources (based on communication and transmission of data uplifts the that location) will be identified. potentialities and advantages of mobile/wireless The methodology for finding the most appropriate technologies. A location-aware or location-based service is location of the resource(s) is given in the following highly significant in mobile environments which is driven procedure. by location information.Location dependent data depends on the geographical location. The answer to queries over Algorithm location dependent data depends on the locations of the data and the place of query initiated. Procedure getResource( ) III. LOCATION PREDICTIONS Begin A number of methods for predicting locations have been Let L1,L2….Lp be locations. discussed by many [10,11]. Most of the applications use the Let Li is the query initiated location. mobile data, i.e. current location, for predicting the future //Traveler sends request to server location for taking any decision. Let Lp is the calculated location In this paper, the significance of the mobile data //Server calculates the future location of traveler combined with the locations of resources kept in database is //and checks the locations of required Resources discussed, where the minimum distant resource location is Let Resource_Location be the set of locations identified to be identified. It should be noted that straightforward use closer to Lp. of indexing is not feasible due to the continuous change of If more than one location exists with the required the locations of the mobile users. resources then Begin A. Global Positioning System d = min { distance(Lp,Resource_Location) }; Let us consider the location data obtained from GPS i.e. Select the resource at distance d; latitude and longitude values, the distance calculation will End; be done between future location of mobile users and End. resources. ________________________________________  IV. RESOURCE GEO-DATABASE Here, the resources that are taken for consideration specifically belong to the service centers such as ICICI ATM, HP fuel stations, Shopping malls and star rated restaurants. These details are stored in a database with their location name, latitude and longitude values (Table1). Figure 2. Mobile Users with Available Resources 26 © 2010 ACEEE DOI: 01.IJCOM.01.03.550    
  • 3. ACEEE Int. J. on Communication, Vol. 01, No. 03, Dec 2010    Table 1. Resource_Geo_Database Latitude and Longitude SELECT Resources,Location,min(Diff) Location Name Lat - ‘x2’ Long - ‘y2’ Resources FROM Resource_Geo_Database value value WHERE Diff IN Trichy 10.80834 78.70197 Fuel Station ( SELECT (sqrt(pow(x2-x1)+pow(y2-y1))) AS Diff Fuel Station, FROM Resource_Geo_Database Samayapura 10.92389 78.743553 Restaurant WHERE Resources = ‘Restaurant’ ) Fuel Station, Siruganoor 10.99889 78.793327 ATM center //‘Restaurant’: User data Fuel Station, ATM Perambalur 11.23611 78.86358 center, CONCLUSION Shopping Mall Viluppuram 11.95717 79.47946 Shopping Mall Providing information to the needy people who are required the resources, during travel whose required Tindivanam 12.53579 79.08817 ATM center resource(s) can be identified at the minimum distance is the Chengalpet 12.70024 79.98234 Fuel Station, major concern of this work. The significance of mobile Restaurant technologies with the help of mobile devices and the ATM center, location data management are discussed in this paper. The Tambaram 12.93152 80.1259 Shopping Mall Restaurant mobile data supports to retrieve the location of nearest resources in time and cost effective way. Chennai 13.06397 80.24311 Fuel Station Fuel Station, REFERENCES Tanjore 10.79556 79.137718 Restaurant [1] Vasilis Koudounas and Omar Iqbal, “Mobile Computing : Past, Kumbakona 10.96462 79.39074 Shopping Mall Present And Future,” retrieved from http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/vk5/report. Mayavaram 11.10501 79.65095 ATM center html. [2] Sandeep Jain, “Introduction to Mobile Computing : The way the Fuel Station, world is changing!,” retrieved from Thiruvarur 10.77287 79.63952 Restaurant http://www.acm.org/crossroads/xrds7-2/intro72.html ATM center, [3] Khondker Shajadul Hasan, Mashiur Rahman, Abul L. Haque, M Karur 10.95883 78.08597 Shopping Mall, Abdur Rahman, Tanzil Rahman and M Mahbubur Rasheed, Restaurant “Cost Effective GPS-GPRS Based Object Tracking System,” Proceedings of the International MultiConference of Engineers Namakkal 11.24438 78.17361 Fuel Station and Computer Scientists, Vol I, IMECS 2009, March 18 - 20, Hong Kong. Fuel Station, [4] Vijay Kumar, Mobile Database Systems, John Wiley & Sons,Inc. Salem 11.67273 78.16049 Restaurant Publication, 2006. [5] Uwe Kubach and Kurt Rothermel, “Estimating the Benefit of Fuel Station, Location-Awareness for Mobile Data Management Dharmapuri 12.12781 78.16245 ATM center Mechanisms,” Pervasive 2002, LNCS 2414, pp. 225–238, Springer-Verlag Berlin Heidelberg, 2002. A. Finding Nearest Resources [6] Hae Don Chon, Divyakant Agrawal and Amr El Abbadi, When there are more than one resource available to the “NAPA :Nearest Available Parking lot Application,” IEEE Proceedings of the 18th International Conference on Data predicted location, choosing the nearest resource is one of Engineering, 2002. the major features of this work. In the context of providing [7] Lauri Aalto, Nicklas Göthlin, Jani Korhonen and Timo Ojala, “ minimum distant resource to the mobile user, the system Bluetooth and WAP Push Based Location-Aware Mobile involves the following distance calculation. Advertising System,” MobiSys’04, June 6–9, Boston, After submitting the query to the server, the predicted Massachusetts, USA, 2004. [8] J. Hwang, H. Kang and K. Li, “Spatio-temporal Similarity location of a mobile user can be calculated by the equations Analysis Between Trajectories on Road Networks,” In Proc. of 1 and 2. the International Workshop on Conceptual Modeling for Diff = sqrt(pow(x2-x1)+pow(y2-y1)) Geographic Information Systems, pp. 280–289, 2005. [9] Ebtisam Amar and Selma Boumerdassi, “Enhancing Location Here, Diff is the distance between two coordinates Services with Prediction,” IWCMC’09(ACM), June 21–24, (lat1,long1) and (lat2, long2). Leipzig, Germany, 2009. Where (x1,y1) = Predicted location of mobile user [10] George Liu and Gerald Maguire Jr, “A Class of Mobile Motion and (x2,y2) = Location of resources (Specified as Prediction Algorithms for Wireless Mobile Computing and ‘latitude’ and ‘longitude’ in the Communications,” Mobile Networks and Applications1, pp.113- Table 1) 121, A J.C. Baltzer AG Science Publishers, 1996. [11] Liu.T, Bahl. P and Chlamtac. I, “A Hierarchical Position- B. Query Prediction Algorithm for Efficient Management of Resources in The nearest location of the resources can be retrieved by Cellular Networks,” Proceedings of the IEEE GLOBECOM’97, the following SQL query: Phoenix, Arizona, 1997. 27 © 2010 ACEEE DOI: 01.IJCOM.01.03.550