A location and diversity-aware news feed system for mobile usersLeMeniz Infotech
A location and diversity-aware news feed system for mobile users
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...csandit
Multiply Sectioned Bayesian Network (MSBN) provides
a model for probabilistic reasoning in
multi-agent systems. The exact inference is costly
and difficult to be applied in the context of
MSBNs as the size of problem domain becomes larger
and complex. So the approximate
techniques are used as an alternative in such cases
. Recently, for reasoning in MSBNs, LJF-
based Local Adaptive Importance Sampler (LLAIS) has
been developed for approximate
reasoning in MSBNs. However, the prototype of LLAIS
is tested only on Alarm Network (37
nodes). But further testing on larger networks has
not been reported yet, so the scalability and
reliability of algorithm remains questionable. Henc
e, we tested LLAIS on three large networks
(treated as local JTs) namely Hailfinder (56 nodes)
, Win95pts (76 nodes) and PathFinder(109
nodes). From the experiments done, it is seen that
LLAIS without parameters tuned shows good
convergence for Hailfinder and Win95pts but not for
Pathfinder network. Further when these
parameters are tuned the algorithm shows considerab
le improvement in its accuracy and
convergence for all the three networks tested.
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Applying of bulk_sms_system_to_enhance_educationaldavidmoro13
While SMS (Short Message Service), a text messaging service, elicits the appeal of instantaneous communication by using mobile technology to send a text message to anyone anytime and anywhere, bulk SMS system has expanded that capability of SMS by implementing the ability to easily send multiple SMS messages to intended recipients with reliability.
A location and diversity-aware news feed system for mobile usersLeMeniz Infotech
A location and diversity-aware news feed system for mobile users
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in M...csandit
Multiply Sectioned Bayesian Network (MSBN) provides
a model for probabilistic reasoning in
multi-agent systems. The exact inference is costly
and difficult to be applied in the context of
MSBNs as the size of problem domain becomes larger
and complex. So the approximate
techniques are used as an alternative in such cases
. Recently, for reasoning in MSBNs, LJF-
based Local Adaptive Importance Sampler (LLAIS) has
been developed for approximate
reasoning in MSBNs. However, the prototype of LLAIS
is tested only on Alarm Network (37
nodes). But further testing on larger networks has
not been reported yet, so the scalability and
reliability of algorithm remains questionable. Henc
e, we tested LLAIS on three large networks
(treated as local JTs) namely Hailfinder (56 nodes)
, Win95pts (76 nodes) and PathFinder(109
nodes). From the experiments done, it is seen that
LLAIS without parameters tuned shows good
convergence for Hailfinder and Win95pts but not for
Pathfinder network. Further when these
parameters are tuned the algorithm shows considerab
le improvement in its accuracy and
convergence for all the three networks tested.
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Applying of bulk_sms_system_to_enhance_educationaldavidmoro13
While SMS (Short Message Service), a text messaging service, elicits the appeal of instantaneous communication by using mobile technology to send a text message to anyone anytime and anywhere, bulk SMS system has expanded that capability of SMS by implementing the ability to easily send multiple SMS messages to intended recipients with reliability.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
Channel utilization network_selection_wcnc_v1 (1) hswong kdwongHui-Shin Wong
This is part of the Master of Science (MSc) collaboration with the Massachusetts Institute of Technology (MIT) in year 2005. Attached is part of my Master of Science Thesis: "Policies For Cellular-WLAN Integration" by having a simulator which I had coded using C# and the analytical data and graphs with my simulation results and conclusion. Dr. Daniel Wong KS was my supervisor.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
The goal of this project is to provide a location-based alarm system through which users can broadcast their last known
position in emergency situations. The system will be able to send an SMS or an e-mail containing the user’s location coordinates
to the already registered mobile numbers using GCM service. The location information is obtained using GPS
technology and real-time location is shown on the receiver’s application using Google Maps API. In situations where GPS is
not available, the system tracks location using LBS technology
.Keywords: GPS,GCM,LBS Android.
In recent times, the definition of internet of things has evolved to great extent and it means different things
to different people. However the basic idea of Internet of Things remains the same which is use of information and
communication Technologies(ICT’s) as well as Internet to provide efficient services to the mankind for their
optimum benefits. While implementing the Internet of Things itself is complex due to large of devices various link
layer technologies and services that are involved in such systems. In this paper, we specifically implement an urban
Internet of Things system which primarily gives an emphasis on smart educational institute which aims at
exploiting advanced communication technologies to support for administration of the institute and for the new
visitor who find it difficult to find their way around the institute. This paper thereby provides a comprehensive
survey of various technologies such as Android , Java, protocols and architecture for using Internet of Things in
Smart Institute. Furthermore ,this system will provide an overlook of the institute via the administration office
,playground and canteens. The user of the system will also get an static image map to roam around the institute.
Lastly the system will provide technical solutions and best practice guidelines for finding the way around the
institute and also help a new visitor in reaching his desired location.
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
A Tracking System using Location Prediction and Dynamic Threshold for Minimising Message Delivery
Ettaboina Sharanya DR.M.Nagaratna (Ph.D)
M.Tech (Information Technology) Assistant professor, Dept of CSE
JNTUCEH, Hyderabad. JNTUCEH, Hyderabad
Abstract: Cellular text electronic messaging services area unit progressively being relied upon to broadcast crucial data throughout emergencies. Accordingly, a good vary of organizations together with faculties and universities currently partner with third-party suppliers that promise to improve physical security by apace delivering such messages. Sadly, these products don't work as publicised because of limitations of cellular infrastructure and thus give a false sense of security to their users. During this paper, we have a tendency to perform the primary extensive investigation associate degreed characterization of the restrictions of an Emergency Alert System (EAS) mistreatment text messages as a security incident response mechanism. we have a tendency to show emergency alert systems designed on text electronic messaging not solely will meet the ten minute delivery requirement mandated by the WARN Act, however conjointly doubtless cause different voice and SMS traffic to be blocked at rates upward of 80 percent. We have a tendency to then show that our results area unit representative of reality by scrutiny them to variety of documented however not previously understood failures. Finally, we have a tendency to analyze a targeted electronic messaging mechanism as a way of with efficiency mistreatment presently deployed infrastructure and third-party EAS. In thus doing, we have a tendency to demonstrate that this progressively deployed security infrastructure will not deliver the goods its expressed needs for giant populations.
Keywords: emergency alert system, sms, EAS
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
FORWARDING OF MULTIPLE MESSAGES TO MULTIPLE DESTINATIONS BY USING MOBILE AGENTS ijdpsjournal
Today in this competitive world where everybody depends on the mobile technology run with the need of possessing mobiles and enjoying the facilities of ease to send messages to their near and dear ones. People need to perform their tasks for informing, contacting and keeping an up to date of whatever is
going around them. One such facility in our mobiles is forwarding of messages to people for fun or for awareness or when we want more number of people to know about something. The proposal is forwarding multiple messages to multiple destinations at the same time. The mobiles have the facility to forward a single message to multiple destinations. The messages can be forwarded using the push approach and the Mobile Agent Client and Mobile Agent Server. Since a mobile agent has certain properties which supports multiple message forwarding but affects the reliability certainly, mobile
agents for sub servers can be a substitute as well. Messages will be selected in an order and the recipients’ numbers are be added. Once the sender toggles the option of ‘send’, the multiple messages selected must be sent to the recipients in the order they are selected to send. It can either be based on the
messages like one by one message must first be sent to the recipients thus all the messages selected reaches the recipient 1 then all the messages will be sent to the next recipient 2 and so on or message 1 is sent to all the recipients and message 2 is sent to all the recipients and so on. Gateways in Mobile Agent
Server can be used for the store and forward technique. If the network is busy and any message is not received by any of the recipient then the Mobile Agent Server will locate the address from the MA Client and establish connectivity again and then forwards the message.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
Channel utilization network_selection_wcnc_v1 (1) hswong kdwongHui-Shin Wong
This is part of the Master of Science (MSc) collaboration with the Massachusetts Institute of Technology (MIT) in year 2005. Attached is part of my Master of Science Thesis: "Policies For Cellular-WLAN Integration" by having a simulator which I had coded using C# and the analytical data and graphs with my simulation results and conclusion. Dr. Daniel Wong KS was my supervisor.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
The goal of this project is to provide a location-based alarm system through which users can broadcast their last known
position in emergency situations. The system will be able to send an SMS or an e-mail containing the user’s location coordinates
to the already registered mobile numbers using GCM service. The location information is obtained using GPS
technology and real-time location is shown on the receiver’s application using Google Maps API. In situations where GPS is
not available, the system tracks location using LBS technology
.Keywords: GPS,GCM,LBS Android.
In recent times, the definition of internet of things has evolved to great extent and it means different things
to different people. However the basic idea of Internet of Things remains the same which is use of information and
communication Technologies(ICT’s) as well as Internet to provide efficient services to the mankind for their
optimum benefits. While implementing the Internet of Things itself is complex due to large of devices various link
layer technologies and services that are involved in such systems. In this paper, we specifically implement an urban
Internet of Things system which primarily gives an emphasis on smart educational institute which aims at
exploiting advanced communication technologies to support for administration of the institute and for the new
visitor who find it difficult to find their way around the institute. This paper thereby provides a comprehensive
survey of various technologies such as Android , Java, protocols and architecture for using Internet of Things in
Smart Institute. Furthermore ,this system will provide an overlook of the institute via the administration office
,playground and canteens. The user of the system will also get an static image map to roam around the institute.
Lastly the system will provide technical solutions and best practice guidelines for finding the way around the
institute and also help a new visitor in reaching his desired location.
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
A Tracking System using Location Prediction and Dynamic Threshold for Minimising Message Delivery
Ettaboina Sharanya DR.M.Nagaratna (Ph.D)
M.Tech (Information Technology) Assistant professor, Dept of CSE
JNTUCEH, Hyderabad. JNTUCEH, Hyderabad
Abstract: Cellular text electronic messaging services area unit progressively being relied upon to broadcast crucial data throughout emergencies. Accordingly, a good vary of organizations together with faculties and universities currently partner with third-party suppliers that promise to improve physical security by apace delivering such messages. Sadly, these products don't work as publicised because of limitations of cellular infrastructure and thus give a false sense of security to their users. During this paper, we have a tendency to perform the primary extensive investigation associate degreed characterization of the restrictions of an Emergency Alert System (EAS) mistreatment text messages as a security incident response mechanism. we have a tendency to show emergency alert systems designed on text electronic messaging not solely will meet the ten minute delivery requirement mandated by the WARN Act, however conjointly doubtless cause different voice and SMS traffic to be blocked at rates upward of 80 percent. We have a tendency to then show that our results area unit representative of reality by scrutiny them to variety of documented however not previously understood failures. Finally, we have a tendency to analyze a targeted electronic messaging mechanism as a way of with efficiency mistreatment presently deployed infrastructure and third-party EAS. In thus doing, we have a tendency to demonstrate that this progressively deployed security infrastructure will not deliver the goods its expressed needs for giant populations.
Keywords: emergency alert system, sms, EAS
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
FORWARDING OF MULTIPLE MESSAGES TO MULTIPLE DESTINATIONS BY USING MOBILE AGENTS ijdpsjournal
Today in this competitive world where everybody depends on the mobile technology run with the need of possessing mobiles and enjoying the facilities of ease to send messages to their near and dear ones. People need to perform their tasks for informing, contacting and keeping an up to date of whatever is
going around them. One such facility in our mobiles is forwarding of messages to people for fun or for awareness or when we want more number of people to know about something. The proposal is forwarding multiple messages to multiple destinations at the same time. The mobiles have the facility to forward a single message to multiple destinations. The messages can be forwarded using the push approach and the Mobile Agent Client and Mobile Agent Server. Since a mobile agent has certain properties which supports multiple message forwarding but affects the reliability certainly, mobile
agents for sub servers can be a substitute as well. Messages will be selected in an order and the recipients’ numbers are be added. Once the sender toggles the option of ‘send’, the multiple messages selected must be sent to the recipients in the order they are selected to send. It can either be based on the
messages like one by one message must first be sent to the recipients thus all the messages selected reaches the recipient 1 then all the messages will be sent to the next recipient 2 and so on or message 1 is sent to all the recipients and message 2 is sent to all the recipients and so on. Gateways in Mobile Agent
Server can be used for the store and forward technique. If the network is busy and any message is not received by any of the recipient then the Mobile Agent Server will locate the address from the MA Client and establish connectivity again and then forwards the message.
Efficient processing of spatial range queries on wireless broadcast streamsijdms
With advances in wireless networks and hand-held computing devices equipped with location sensing
capability (e.g., PDAs, laptops, and smart phones), a large number of location based services (LBSs) have
been successfully deployed. In LBSs, wireless broadcast is an efficient method to support the large number
of users. In wireless broadcast environment, existing research proposed to support range queries search,
may tune into unnecessary indexes or data object. This paper addresses the problem of processing range
queries on wireless broadcast streams. In order to support range queries efficiently, we propose a novel
indexing scheme called Distributed Space-Partitioning Index (DSPI). DSPI consists of hierarchical grids
that provide mobile clients with the global view as well as the local view of the broadcast data. The
algorithm for processing range queries based on DSPI is also proposed. Simulation experiments
demonstrate DSPI is superior to the existing index schemes.
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Similar to A location and diversity-aware news feed system for mobile (20)
A location and diversity-aware news feed system for mobile
1. MobiFeed: A Location-Aware News Feed System for
Mobile Users∗
Wenjian Xu
Department of Computer
Science
City University of Hong Kong
Hong Kong
wenjianxu2@cityu.edu.hk
Chi-Yin Chow
Department of Computer
Science
City University of Hong Kong
Hong Kong
chiychow@cityu.edu.hk
Man Lung Yiu
Department of Computing
Hong Kong Polytechnic
University
Hong Kong
csmlyiu@comp.polyu.edu.hk
Qing Li
Department of Computer
Science
City University of Hong Kong
Hong Kong
itqli@cityu.edu.hk
Chung Keung Poon
Department of Computer
Science
City University of Hong Kong
Hong Kong
csckpoon@cityu.edu.hk
ABSTRACT
A location-aware news feed system enables mobile users to
share geo-tagged user-generated messages, e.g., a user can
receive nearby messages that are the most relevant to her.
In this paper, we present MobiFeed that is a framework de-
signed for scheduling news feeds for mobile users. Mob-
iFeed consists of three key functions, location prediction,
relevance measure, and news feed scheduler. The location
prediction function is designed to predict a mobile user’s lo-
cations based on an existing path prediction algorithm. The
relevance measure function is implemented by combining the
vector space model with non-spatial and spatial factors to
determine the relevance of a message to a user. The news
feed scheduler works with the other two functions to gener-
ate news feeds for a mobile user at her current and predicted
locations with the best overall quality. To ensure that Mob-
iFeed can scale up to a larger number of messages, we design
a heuristic news feed scheduler.
Categories and Subject Descriptors
H.2.4 [Database Management]: Systems—Query pro-
cessing; H.2.8 [Database Management]: Database Ap-
plications—Spatial databases and GIS
General Terms
Algorithms, Design, Performance
∗
The work described in this paper was partially supported
by grants from City University of Hong Kong (Project No.
7200216, 7002686 and 7002722).
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
ACM SIGSPATIAL GIS ’12, November 6-9, 2012. Redondo Beach, CA,
USA
Copyright (c) 2012 ACM ISBN 978-1-4503-1691-0/12/11 ...$15.00.
Keywords
Location-aware social networks, news feed, mobile comput-
ing, online scheduling
1. INTRODUCTION
A news feed is a common functionality of existing location-
aware social network systems. It enables mobile users to
post geo-tagged messages and receive nearby user-generated
messages, e.g., “Alice can receive 4 messages that are the
most relevant to her among the messages within 1 km from
her location every 10 seconds”. Since a location-aware social
network system usually possesses a huge number of mes-
sages, there are many messages in a querying user’s vicinity.
Coupled with user mobility, a key challenge for the location-
aware news feed system is how to efficiently schedule the k
most relevant messages for a user and display them on the
user’s mobile device. Although location-aware news feed and
social network systems have attracted a lot of attention from
different research communities, none of these applications
has focused on how to schedule news feeds for mobile users.
The state-of-the-art research prototype of a location-aware
news feed system is GeoFeed [2]. In contrast to GeoFeed,
MobiFeed focuses on challenges in providing location-aware
news feeds for mobile users. We design a location-aware
news feed scheduler that works with our location prediction
and message relevance measure functions to provide news
feeds for mobile users.
In this paper, we present MobiFeed that is a location-
aware news feed framework designed for social network sys-
tems to schedule news feeds for mobile users. Figure 1 de-
picts an application scenario. A MobiFeed user, Alice, can
generate a message and tag a point (e.g., m1), a spatial ex-
tent (e.g., m14 is associated with a circular spatial area),
or a venue (e.g., m6 and m7 are spatially associated with
restaurant R1) as its geo-location. Alice can also issue a
location-aware news feed query to retrieve the k most rel-
evant messages within her specified range distance D from
her location. MobiFeed consists of three key functions: loca-
tion prediction, relevance measure, and news feed scheduler.
Given a user u’s location u.location at the current time t0,
2. Shopping Mall S1 (m2, m3, m4, m5)
1.xxx
2.xxx
3.xxx
4.xxx
Alice at time t0 Hotel H2 (m12, m13)
Restaurant R1 (m6, m7)
Hotel H1 (m8, m9, m10, m11)
m1 with a
location
point m14 with a
spatial extent
D
A predicted
location for
Alice at
time
t2=t0+2×td
A predicted location for Alice at time t1=t0+td
Figure 1: Location-aware news feed scheduling.
u’s required minimum message display time td, u’s speci-
fied range distance D, u’s requested number of messages
per news feed, and a look-ahead steps n, the location pre-
diction function estimates n future locations for u at times
t1 = t0 + td, t2 = t0 + 2 × td, . . . , and tn = t0 + n × td, the
relevance measure function calculates the relevance score of
each candidate message with a geo-location intersecting any
u’s query region (i.e., a circular area centered at u.location
or a predicted location with a radius D), and the news feed
scheduler generates news feeds from the candidate messages
for u’s query regions at t0, t1, . . . , tn with the best total rel-
evance score.
2. SYSTEM OVERVIEW
Figure 2 depicts an overview of the MobiFeed framework.
MobiFeed stores geo-tagged user-generated messages in a
database. It interacts with the location prediction and rel-
evance measure functions to select a collection of messages
from the database as a news feed for a mobile user at a
particular location.
Geo-tagged messages. A geo-tagged user-generated
message is defined as a tuple (MessageID, SenderID, Con-
tent, Timestamp, Spatial), where MessageID and SenderID
are the message identifier and its sender’s identifier, respec-
tively. Content is the message content. Timestamp is the
message submission time, and Spatial specifies the message’s
spatial extent. As depicted in Figure 1, the spatial extent of
a message can be a point location (e.g., m1), a user-specified
spatial region (e.g., m14), or the spatial region of a venue
(e.g., the spatial extent of m2 is the shopping mall S1).
System users. A mobile user u at location u.location
equipped with a GPS-enabled mobile device is able to
(a) post a new message with a spatial extent, and (b) receive
at most u.k messages within u’s specified range distance u.D
(i.e., the query region of a news feed) at a particular time
as a news feed. MobiFeed computes a news feed for u by
Geo-tagged
Messages
Query
News Feed
1.xxx
2.xxx
3.xxx
4.xxx
Mobile User
Location-Aware News
Feed Scheduler
Location
Prediction
Relevance
Measure
Server
Figure 2: MobiFeed framework.
selecting messages based on their relevance to u and u’s
movement. Each selected message must be displayed on u’s
mobile device without any interruption for at least u’s spec-
ified minimum display time u.td. u reports its location to
the system at every time period u.tu. After receiving u’s lo-
cation update, a news feed is computed for u. In MobiFeed,
we set u.tu = u.td. If u.tu < u.td, newly selected messages
cannot be displayed until previously selected messages have
been displayed for u.td. On the other hand, if u.tu > u.td,
the system may not be able to provide an accurate news feed
for u as it does not know u’s exact location. Altogether, u.k,
u.D and u.td constitute u’s preferences for MobiFeed.
Quality measure. Given a user ui and a message mj,
the relevance measure function returns a relevance score
relevanceScore(ui, mj). Without loss of generality, we as-
sume the relevance score is between zero and one. In infor-
mation retrieval, query-relevance ranking algorithms usually
display a document that is more relevant to a user’s query
at a higher position in a result list [1]. To this end, Mob-
iFeed supports different weights for different slots in a news
feed result list, i.e., a higher weight is given to a message
displayed at a higher slot because it would be easier to draw
a user’s attention. In this paper, we use a simple weighting
scheme. Given a result list with k slots, the weight of the
first slot is k, the weight of the second slot is k − 1, and
so on. In general, the weight of a message mj at the top
j-th slot (1 ≤ j ≤ k) is displayWeight(j, k) = k − (j − 1).
Thus, the relevance score of a news feed fi with k messages
m1, m2, . . . , mk displayed at the j-th position in a result list
for a user ui is calculated as:
relevanceScore(fi) =
k∑
j=1
relevanceScore(ui, mj)
× displayWeight(j, k). (1)
Problem definition. Figure 3 depicts an example of
location-aware news feed scheduling, where a user u sends
a query with her location to MobiFeed at the current
time t0. The location prediction function predicts u’s lo-
cation at each of the next two (i.e., n = 2) minimum dis-
play times td, i.e., t1 = t0 + td and t2 = t0 + 2 × td.
There are totally 11 candidate messages for the three news
feeds at the times t0, t1, and t2. m4 and m5 are tagged
with a spatial region and a point location, respectively.
{m1, m2, m3}, {m6, m7, m8, m9}, and {m10, m11} are asso-
ciated with venues A, B, and C (represented by rectangles),
respectively. The lifetime of each message with its relevance
score for u at t0, t1, and t2 is shown on a timeline chart.
Note that the lifetime of m5 is broken from t1 to t2; how-
ever, most existing scheduling algorithms assume tasks with
a continuous lifetime. Our scheduling problem can be for-
mulated as follows: Given a user u’s location-aware news
feed query and a look-ahead step n, MobiFeed predicts u’s
locations at each of the next n minimum display times, and
schedules at most k messages for the news feed at each loca-
tion (i.e., one reported and n predicted locations), such that
the total relevance score of the generated news feeds is max-
imized. Since our problem focuses on online scheduling, it
requires efficient query processing.
3. LOCATION PREDICTION AND MES-
SAGE RELEVANCE MEASURE
3. User u
at time t0
u at
t1=t0+td
m5
m4
{m1, m2, m3}
{m6, m7, m8, m9}
{m10, m11}
Venue C
Venue A
Venue B
u at
t2=t0+2×td
MessageCategories
Message content
relevance to u
m1 Restaurant 0.6
m2 Restaurant 0.6
m3 Restaurant 0.1
m4 Stadium 0.2
m5 Stadium 0.9
m6 Shopping 0.2
m7 Shopping 0.4
m8 Shopping 0.6
m9 Shopping 0.6
m10 Museum 0.35
m11 Museum 0.25
Table I. Non-spatial information
Time Message
Normalized
distance to u
t0
Venue A 0.55
Venue C 0.75
m5 0.15
t1
Venue A 0.75
m4 0.6
t2
Venue A 0.1
Venue B 0.4
Table II. Spatial information
t0 t1 t2 t3Time
m1
m2
m3
m4
m5
m6
m7
m8
m9
m10
m11
Arrival time
Deadline
0.35
0.35
0.1
0.15
0.53
0.3
0.4
0.5
0.5
0.68
0.68
0.43
0.4
0.58
0.58
0.33
0.53
0.55
0.5
m4 0.1
m5 0.15
The relevance score of m11 to
u relevanceScore(u, m11) at t0
Figure 3: Location-aware news feed scheduling (w = 0.5).
In this section, we present the details of the location pre-
diction and relevance measure functions in MobiFeed.
3.1 Location Prediction
The location prediction function can use any existing lo-
cation prediction algorithm if it can predict a user’s location
at a specified future time in a road network. We here de-
scribe how to incorporate the path prediction algorithm [4]
into MobiFeed. Given a user u’s current location, u’s his-
torical trajectories, the road map, and a future time t, the
path prediction algorithm estimates u’s location at t. Let
G = (V, E) be a graph model of a road network, where E
is a set of road segments and V is a set of intersections of
road segments that are represented by circles and lines, re-
spectively. The algorithm performs two steps to predict u’s
direction and speed.
Step 1. Direction prediction. When a user u is mov-
ing on an edge ei, this step predicts which adjacent edge
ej of ei u will go based on u’s historical trajectory set
Tu. This step has three ways to predict a user’s path [4].
(1) Given two edges ei and ej incident to a vertex v, the
transition probability of u turning from ei to ej is defined as
P(ei, v, ej) =
τ(Tu,ei→ej )
∑
ek
τ(Tu,ei→ek)
, where τ(Tu, ei → ej) is the
number of trajectories in Tu that turn from ei to ej and ek
is an adjacent edge of ei incident to v. For each adjacent
edge ej of ei incident to v, this step calculates P(ei, v, ej)
and predicts that u will turn to ej with the largest proba-
bility. (b) However, if τ(Tu, ei → ej) is empty, the notion
of reverse mobility statistics P(ei, v, ej) =
τ(Tu,ej →ei)
∑
ek
τ(Tu,ek→ei)
is
used. (c) In case that both τ(Tu, ei → ej) and τ(Tu, ej → ei)
are empty, we select the adjacent edge of ei incident to v
with the smallest deviation angle from u’s current travel
direction, which is derived from u’s initial location at the
query time and current location.
Step 2. Speed prediction. This step estimates u’s
travel speed S(e) on an edge e. The basic idea is to compute
S(e) by the average historical travel speeds of e from u’s
Tu [4]. If e does not exist in Tu, we use a heuristic method
that computes S(e) = A(e) × α, where A(e) is the speed
limit of e and α is a system parameter.
In MobiFeed, after we find that u moving on an edge ei
will enter an edge ej at t′
from a vertex vs and stay at ej at t.
Let (xs, ys) denote the location of vs and (xe, ye) denote the
the location of the other vertex of ej. The predicted location
of u at t is calculated as (λ1×xe+λ2×xs
λ1+λ2
, λ1×ye+λ2×ys
λ1+λ2
), where
λ1 = (t − t′
) × S(ej) and λ2 = L(ej) − λ1 (where L(ej) is
the length of ej).
3.2 Message Relevance Measure
MobiFeed only requires the relevance measure function to
return a score to indicate the relevance of a message mj to a
user ui, i.e., relevanceScore(ui, mj). We present three rele-
vance measure methods, and then describe how to combine
them to implement the relevance measure function.
Message categories. We group messages into categories
based on their geo-tagged locations or keywords. For exam-
ple, in FourSquare, each message can be categorized by its
one or more associated venues, e.g., restaurant, stadium, and
museum. We maintain a user-category matrix where each
entry cij is the ratio of the number of a user ui’s messages
associated with the category cj to the total number of ui’s
messages. For example, if ui has issued two messages, i.e.,
m1 with categories“restaurant”and“stadium”, and m2 with
category “stadium”, the ratios of “restaurant” and “stadium”
are 1
2
and 1, respectively. cij indicates the relevance of a
message category cj to a user ui, i.e., categoryScore(ui, cj).
Message contents. We treat a message as a document
and use an existing information retrieval technique to mea-
sure its relevance to a particular user. We here consider the
vector space model, where each message mj is considered
as a vector of weighted terms, mj.V = ⟨wj1, wj2, . . . , wj|T |⟩,
where T is the term set. In general, a term Tk ∈ T should
be weighted higher for mj if Tk occurs more frequently in
mj but rarely in other messages in the message set M.
The weight can be computed by the well-known TF × IDF
scheme: wjk = tfjk · log |M|
dfk
, where tfjk is the term fre-
quency of Tk in mj and dfk is the document frequency of
Tk in M. To incorporate the vector space model into Mob-
iFeed, we maintain a query vector for each user based on her
submitted messages. Given a querying user ui with a query
vector ui.V and a message mj, we use the cosine similarity
to compute contentScore(ui, mj) =
∑|T |
k=1
wik·wjk
√
∑|T |
k=1
w2
ik
·
√
∑|T |
k=1
w2
jk
.
Distance. The relevance of a message mj to a user ui
can be measured by their distance, i.e., Dist(ui, mj). If mj
is associated with a spatial extent or a venue, Dist(ui, mj)
returns the minimum distance between ui and the spatial
extent or venue of mj. To accommodate the difference in
the value ranges of Dist(ui, mj) and other relevance mea-
sures, we normalize Dist(ui, mj) to be from zero to one, i.e.,
4. NDist(ui, mj) = 1 −
Dist(ui,mj )
u.D
, where u.D is the query
range distance of a news feed.
Relevance measure function. We employ two-level
and linear combinations to integrate the aforementioned
three methods into the relevance measure function. At the
first level, we select a querying user ui’s top-δ categories us-
ing categoryScore(ui, cj), where δ is a parameter to control
the number of categories, and filter out candidate messages
that do not belong to any top-δ categories. At the second
level, we measure the relevance of each candidate message
mj to ui using a linear combination of contentScore(ui, mj)
and NDist(ui, mj) [3] as:
relevanceScore(ui, mj) =contentScore(ui, mj) × (1 − w)
+ NDist(ui, mj) × w, (2)
where 0 ≤ w ≤ 1 and w is a parameter that gives a weight
for the importance of the distance factor with respect to the
message content score.
4. LOCATION-AWARE NEWS FEED
SCHEDULER
In this section, we present a n-look-ahead location-aware
news feed scheduling algorithm for MobiFeed, where n is
a system parameter to control the number of locations pre-
dicted for a mobile user. In general, n should be larger, if the
location prediction algorithm can provide more accurate lo-
cations, and thus, different values of n would be assigned to
different users and areas in a road network (e.g., P(ei, v, ej)
should be larger than a certain threshold). Since our on-
line scheduling algorithm has to be efficient and scalable, we
design a heuristic scheduling algorithm for MobiFeed.
Data structure. In MobiFeed, a spatial grid structure
is used to index all geo-tagged messages. Given a user u’s
query, a range query is issued to the grid index to retrieve
the geo-tagged messages, which are not generated by u, as-
sociated with a location point, a spatial extent, or a venue
region intersecting the query region.
Algorithm. After a mobile user u issues a location-aware
news feed query to MobiFeed, MobiFeed calls the location
prediction function to return n future locations for u. Its
scheduler then finds a set of candidate messages for each of
n + 1 locations and calls the relevance measure function to
filter out all candidate messages that do not belong to any
top-δ categories and determine the relevance of each remain-
ing candidate message to u. The scheduler finally returns
a news feed for each location such that the total relevance
score is maximized. Our heuristic scheduling algorithm con-
sists of two main steps.
Step 1. Candidate message step. Given u’s query at
time t0, the location prediction function predicts n locations
for u at times t1, t2, . . ., tn, where ti = t0 +u.td ×i and u.td
is u’s specified message minimum display time. For each of
n+1 locations, a range query with a circular region centered
at the location with a radius of u.D is issued to retrieve the
messages intersecting the query region as a set of candidate
messages CandidateMsgi (0 ≤ i ≤ n). Then, the relevance
measure function filters out all messages that do not belong
to any top δ categories from each CandidateMsgi. For each
remaining candidate message m, a relevance score for m, i.e.,
relevanceScore(u, m), is calculated to indicate the relevance
of m to u. Finally, the messages in each CandidateMsgi are
sorted by their relevance score in non-increasing order. To
break ties, precedence will be given to a message with a more
recent post time.
Step 2. Online scheduling step. As depicted in the
running example (see Figure 3), some candidate messages
are included in multiple sets of candidate messages. For ex-
ample, m1 is included in CandidateMsg0, CandidateMsg1
and CandidateMsg2, so m1 can be scheduled to one of
these query regions or none. This step aims at schedul-
ing at most k × (n + 1) candidate messages to the n + 1
query regions such that the total relevance score of these
query regions is maximized. The input of this step is
n + 1 sets of sorted candidate messages for n + 1 query re-
gions. For each query region qi, we calculate a score for its
candidate message mj with the highest relevance score by
relevanceScore(u, mj)×displayWeight(j, k) (see Equation 1),
where u is the querying user and k is the highest available
position in qi’s result list. The message with the highest
score, denoted as BestMsg, is selected. BestMsg is assigned
to the query region giving the highest score, and it is no
longer a candidate message for any query region. To break
a tie, BestMsg is assigned to the query region where the first
message in its candidate message set has the smallest rele-
vance score. The reason is that other query regions have a
higher chance to put a message with a larger relevance score
to the same slot in the result list. Candidate messages are
repeatedly selected to appropriate query regions until each
query region has k messages or its candidate message set
becomes empty. Whenever k messages have been assigned
to a query region, its corresponding candidate message set
is discarded. The computed n + 1 news feeds are sent to u.
u’s mobile device immediately displays the first news feed,
i.e., the query region at t0, and then displays each of the
remaining news feeds one by one for every td.
5. CONCLUSION
We presented MobiFeed that is a location-aware news feed
framework designed for scheduling news feeds for mobile
users. We described the three key functions of MobiFeed,
namely, location prediction, relevance measure, and news
feed scheduler. The location prediction function is designed
to estimate a user’s location based on the path prediction
algorithm. The relevance measure function is implemented
by integrating non-spatial and spatial factors into the vector
space model to measure the relevance of a message to a user.
We designed a heuristic news feed scheduler that works with
the other two functions to generate news feeds for a user at
her current and look-ahead locations.
6. REFERENCES
[1] R. A. Baeza-Yates and B. A. Ribeiro-Neto. Modern
Information Retrieval. ACM Press/Addison-Wesley,
1999.
[2] J. Bao, M. F. Mokbel, and C.-Y. Chow. GeoFeed: A
location-aware news feed system. In IEEE ICDE, 2012.
[3] C.-Y. Chow, J. Bao, and M. F. Mokbel. Towards
location-based social networking services. In ACM
SIGSPATIAL LBSN, 2010.
[4] H. Jeung, M. L. Yiu, X. Zhou, and C. S. Jensen. Path
prediction and predictive range querying in road
network databases. VLDB Journal, 19(4):585–602,
2010.