In this paper, we present a novel approach for broadcasting information based on a Bluetooth Low Energy
(BLE) ibeacon technology. We propose a dynamic method that uses a combination of Wi-Fi and BLE
technology where every technology plays a part in a user discovery and broadcasting process. In such
system, a specific ibeacon device broadcasts the information when a user is in proximity. Using
experiments, we conduct a scenario where the system discovers users, disseminates information, and later
we use collected data to examine the system performance and capability. The results show that our
proposed approach has a promising potential to become a powerful tool in the discovery and broadcasting
concept that can be easily implemented and used in business environments.
PoLTE has developed Positioning over LTE (PoLTE) Macro, a solution that leverages existing LTE infrastructure to accurately locate devices indoors and outdoors using a single cell tower. PoLTE Macro uses signals transmitted by user devices to determine their location within 6 meters, providing a significant improvement over previous single tower methods that could only locate devices within kilometers. This allows mobile network operators to offer new location-based services and monetize their network infrastructure without additional equipment investments.
The document summarizes a technical seminar report on Apple iBeacon technology presented by D. Madhavi. It discusses how Apple created iBeacons using Bluetooth low-energy technology to allow companies to interact with customers using their smart devices within close proximity. Locally placed beacons can send messages to phones if the user has the company's app installed and Bluetooth turned on. The report also covers how beacons work, their battery life, compatible devices, applications, advantages and disadvantages of using beacon technology.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions.
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMuharam Cahyadi
This paper proposes renewing the mobile provisioning system for Passive Optical Networks (PON) in line with the development of the Internet of Things ecosystem. The proposed system uses an Android application on a smartphone with an RFID scanner as a client to automate the provisioning process. This allows provisioning times to be reduced by half compared to the previous manual system and reduces operational costs. The system architecture includes registration, database, billing and RADIUS servers that communicate via open APIs to provision new customers onto the PON network automatically.
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
This document presents a study on identifying and classifying Internet of Things (IoT) devices based on their network traffic characteristics using machine learning algorithms. The study involved collecting network traffic data from 28 different IoT devices over a period of 6 months. Statistical attributes like port numbers, domain names, and cipher suites were extracted from the traffic to analyze characteristics. A support vector machine (SVM) classifier was developed and shown to identify specific IoT devices with over 99% accuracy based on their network activity attributes. The study aims to help network operators monitor and manage IoT devices on their networks.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
PoLTE has developed Positioning over LTE (PoLTE) Macro, a solution that leverages existing LTE infrastructure to accurately locate devices indoors and outdoors using a single cell tower. PoLTE Macro uses signals transmitted by user devices to determine their location within 6 meters, providing a significant improvement over previous single tower methods that could only locate devices within kilometers. This allows mobile network operators to offer new location-based services and monetize their network infrastructure without additional equipment investments.
The document summarizes a technical seminar report on Apple iBeacon technology presented by D. Madhavi. It discusses how Apple created iBeacons using Bluetooth low-energy technology to allow companies to interact with customers using their smart devices within close proximity. Locally placed beacons can send messages to phones if the user has the company's app installed and Bluetooth turned on. The report also covers how beacons work, their battery life, compatible devices, applications, advantages and disadvantages of using beacon technology.
Ijeee 16-19-digital media hidden data extractingKumar Goud
Abstract— Magnetic Resonance Imaging (MRI) brain tumor image classification is a difficult task due to the variance and complexity of tumors. This paper presents an efficient techniques for the classification of the magnetic resonance brain images. In this work we are taking MR images as input; MRI which is directed into internal cavity of brain and gives the complete image of the brain. The proposed technique consists of two stages.In the first stage, discrete wavelet transform is used for dimensionality reduction and feature extraction.In the second stage, classification is performed using the probabilistic neural network. The classifier have been used to classify real MR images as benign (non-cancerous) and Malignant (cancerous). Probabilistic neural network (PNN) with image and data processing technique is employed to implement an automated brain tumor classification. The use of artificial intelligent technique has shown great potential in this field.
Index Terms— Brain tumors, Feature extraction,Classification, MRI, Probabilistic neural network, Dimensionality reduction, Discrete wavelet transform.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions.
Mobile Provisioning Enterprise Network PON-Revisi-Final - EnglishMuharam Cahyadi
This paper proposes renewing the mobile provisioning system for Passive Optical Networks (PON) in line with the development of the Internet of Things ecosystem. The proposed system uses an Android application on a smartphone with an RFID scanner as a client to automate the provisioning process. This allows provisioning times to be reduced by half compared to the previous manual system and reduces operational costs. The system architecture includes registration, database, billing and RADIUS servers that communicate via open APIs to provision new customers onto the PON network automatically.
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
This document presents a study on identifying and classifying Internet of Things (IoT) devices based on their network traffic characteristics using machine learning algorithms. The study involved collecting network traffic data from 28 different IoT devices over a period of 6 months. Statistical attributes like port numbers, domain names, and cipher suites were extracted from the traffic to analyze characteristics. A support vector machine (SVM) classifier was developed and shown to identify specific IoT devices with over 99% accuracy based on their network activity attributes. The study aims to help network operators monitor and manage IoT devices on their networks.
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
Nowadays, the frequency of abduction is increasing significantly. Information technology provide
many social media which is causing the leaked of personal information where abductor can find out the
information. Using social media, people can share location, life event, and anything related about their life
event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking
device is developed, but the response is too late. Because, the family or relative of the victims will notice
that abduction had happen after the victim is lost. According to the problem, this research will focus on
develop the personal tracking device which trigger by the victims who own the phone based on android
and web application. Whenever the abduction happens, the victim just need to click the button and the
system will send a message to the relatives and family in their contact also trigger the notification to the
local security. Software development life cycle that will be used is scrum which is divided into several
processes like backlog, sprints, scrum meetings, and demos. The result of this research is android
application for user and web application for managing application.
This document provides an overview of the requirements for developing a mobile application called "Free Park" to help disabled users locate parking spaces. The application will allow users to view available parking locations, prices, and reserve spaces for a chosen duration. It will connect to a SQLite database to store user data and parking information. The application will be created in Java using Android SDK and will integrate with Google Maps and the Liverpool government website for additional parking details. Security measures like WPA2 encryption will also be implemented once the basic application functionality is established. The goal is to create a user-friendly mobile solution to help disabled individuals more easily find and reserve accessible parking spots.
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
The document discusses Casambi's Bluetooth Low Energy (BLE)-based smart lighting technology. It begins by explaining that BLE is a new technology compared to Classic Bluetooth, and was designed for low-power Internet of Things applications. Casambi's technology uses BLE and creates a self-healing, self-organizing wireless mesh network to control lighting fixtures. It allows for over-the-air firmware and configuration updates. The technology can control existing lights and integrates with LED drivers, bulbs, and modules.
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...Vladimir Kulyukin
This document describes a cloud computing framework that uses image recognition and remote assistance to help blind individuals identify products while grocery shopping. A blind person takes a photo of a product with their smartphone, which is sent to a cloud server for image matching. The top 5 matches are then sent to a sighted assistant for verification. If a match is incorrect, the assistant provides the right name either by voice or text. The system was tested in the lab and a supermarket, showing it can help blind people identify products independently with help from remote sighted assistants.
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
The document summarizes the key features and capabilities of the Mobile Phone Examiner Plus (MPE+) mobile forensics software. MPE+ allows extraction of data from over 10,000 mobile devices, including physical and logical extraction of Android and iOS devices. It provides faster extraction than competitors and can extract more user data, including supporting unlimited devices through custom python scripts. MPE+ helps investigators manage growing caseloads and supports changing mobile technologies and obscure Chinese devices through updates and add-ons.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it
becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile
phones or devices. Since a mobile phone has small screen, low computing power, small storage capacity
etc, the present paper proposes an ECC-based mobile-PKI that overcomes these limitations and supports
various mobile-based applications, because the use of ECC significantly reduces the computation cost,
message size and transmission overhead over RSA based PKI as 160-bit key-size in ECC provides
comparable security with 1024-bit key in RSA. Also the proposed method includes a Mobile Home Agent
(MHA) per user and a Registration Authority (RA) that further minimize the major work/processing loads
of mobile phone and Certificate Authority (CA), respectively. This paper addresses a secure
implementation of the proposed M-PKI, whose security analysis against different attacks shows that all
attacks are protected. Finally, a comparative study of the M-PKI with the existing PKI is done, which gives
satisfactory performance.
IRJET- Clean India Mission: Beacon TechnologyIRJET Journal
This document discusses using beacon technology to enhance the effectiveness of India's Clean India Mission campaign. Beacons use Bluetooth Low Energy to detect nearby mobile devices and transmit notifications. The document proposes installing beacons to provide regular status updates on cleanliness efforts, direct people to garbage disposal locations, and conduct surveys to assess cleanliness levels. Beacons could also transmit weather reports, traffic information, and help coordinate clean-up drives in specific areas on a set schedule. Integrating this proximity sensing technology has the potential to greatly increase public awareness of environmental issues and participation in cleanliness initiatives.
This document discusses using Bluetooth technology to monitor and control home appliances via the internet. It proposes a system where a user can monitor and operate appliances from anywhere through a mobile phone or computer connected to the internet. The system would involve Bluetooth or ZigBee devices connected to appliances at home transmitting data to an embedded web server connected to the internet, allowing remote access and control through a web browser. It provides diagrams of the system structure and steps to connect a Bluetooth device to the internet for remote monitoring and control of appliances.
Direct Internet Offload is a method for carriers to divert mobile data traffic away from their cellular networks and onto Wi-Fi networks to reduce congestion and costs. It allows carriers to bypass visibility of subscribers on their core networks. Carriers can implement Direct Internet Offload by building out their own carrier Wi-Fi networks or partnering with Wi-Fi aggregators. Doing it through their own Wi-Fi networks allows carriers to retain more control over the user experience and potentially generate revenue from Wi-Fi access over time. Greenpacket's solutions help carriers implement Direct Internet Offload in a secure and seamless way for subscribers without changing how they use their devices.
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Mahbubul Alam
This document discusses machine-to-machine (M2M) communication and provides forecasts for the growth of connected devices. It predicts there will be over 20 billion devices connected to the internet by 2020, with more M2M devices shipped each year than PCs, phones, tablets and other devices combined. The document also presents end-to-end M2M architectures including connectivity through mobile and cloud networks to M2M gateways and devices.
As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
The document describes a proposed Wi-Fi calling system called Wi-Call that allows voice and data communication between Wi-Fi enabled devices on a local area network (LAN) without using an internet or cellular connection. It works by converting voice signals to IP packets and transmitting them over the LAN. The system uses a web application to register users and map their IP addresses so calls can be routed properly within the dynamic IP environment of a LAN. It aims to reduce communication costs for organizations by providing free calling and data transmission within the LAN.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
This document proposes a new framework for secure mobile commerce (m-commerce) that combines double layer encryption, steganography, and secure XML messages transferred between a mobile terminal and server. The framework is based on J2ME/MIDP and aims to provide strong security and invisibility while maintaining high operating efficiency and compatibility with many mobile terminals. It encrypts data using an elliptic curve cryptography algorithm and hides the encrypted information in images using random least significant bit steganography before transmitting between devices.
Flexible Technologies for Smart CampusKamal Spring
The article considers an example of the
advertisement network based on the BLE 4.0, and its facilities for
creating the infrastructure for a Smart Campus, where dynamic
information is provided for the target audience. The authors
provide an analysis of the characteristics and experimental
implementation of this system. Moreover, the practical usage of a
popular vendor and the needed back-end to provide dynamic
usages of the network, both in appearance and content is
described. In the paper different wireless technologies are
compared in regards to their main feature and field of
application. In general the characteristics of a Blue Tooth Low
Energy, BLE, are highlighted. This is elaborated upon in the
Smart Campus example. The Smart Campus is an indoor
wireless network to deliver location and user based dynamic
information to the different visitors, teacher or students of a
university campus, both for day-to-day use as for specific events.
To keep the system interesting and to augment ease-of-use for all
kind of users and content providers, a dedicated content
management system is developed within the Smart Campus case.
The complete system consists of a set of beacons, an application
on a smartphone, a database with the related CMS. All is
developed in an international cooperation between different
universities.
Beacon Technology White Paper - April 2016Craig Van Pelt
The document discusses beacon technology and its applications, both current and potential. It begins by explaining that beacons are small Bluetooth devices that can be placed indoors or outdoors to send signals to nearby smartphones. Currently, retailers commonly use beacons to send customers targeted offers and information. The document then discusses how other industries like sports and museums are implementing beacons. It explores several ways beacons could be used in corporate real estate settings, such as tracking occupancy, sending targeted messages to visitors, and improving the tenant experience. Challenges to adoption like privacy and compatibility issues are also addressed.
Introduction
Beacons are small wireless devices that broadcast signals using Bluetooth Low Energy (BLE), or Bluetooth SMART technology. Mobile apps on compatible devices are able to listen for signals from beacons placed in the physical world and then trigger an experience via the app.
Beacon enabled apps are notified when the device enters or exits the range of a beacon, and are also able to monitor the distance from the beacon as it changes, often referred to as 'ranging'.
Bluetooth Low Energy
BLE or Bluetooth Smart is an intelligent and power friendly version of Bluetooth wireless technology and exchanges data over short distances using radio transmissions. The power of BLE is in its ability to work with an app on a smartphone, tablet or any other compatible mobile device.
The Beacon System
The Beacon system from Apple can be broken down into two parts:
• A piece of hardware – the “Beacon”, which constantly broadcasts a Bluetooth Low Energy signal. This transmits a unique identifier (UUID) and two further identifiers; major and minor (unsigned 16 bit integer values), which can be used to identify the beacon.
• Application Programmable Interface (API) - An API to search for beacons with a certain UUID and optionally a specific major and minor value. iBeacon adds the possibility for the developer to subscribe to beacons like you would subscribe to geolocations. This enables the app to get notifications (whether the app is currently running or not) when the user gets within range of a specific beacon.
Importance
• High degree of accuracy
• Low impact on battery life
• Low cost of entry
• No Internet connection required
Security
Some of the most common beacon security myths:
• Beacons are transmitting personal data:
Beacons don’t transmit any personal data. In fact, beacons don’t receive any data at all.
• Beacons are tracking my location:
Beacons can’t track your location. The only thing they can do is let your mobile device know that you’re nearby.
Compatibility
Beacons work with both Android and iOS. They were initially introduced in iOS7 and are compatible with every Android version > 4.3
This puts beacon functionality in 300 million + devices.
Conclusion
Beacons transmit a low energy signal from a device with a radius of 0-50 meters to broadcast static pieces of data within short distances.
In a nutshell, our basic requirements for an operational beacon are:
1. Beacon enabled mobile app
2. Network of deployed beacons
3. Bluetooth switched on and relevant permissions
Without a doubt, the Beacon is a useful convergence device that can be given a shot at, which is for sure a revolution in technology
Get to know Beacons Understanding and Online & Offline IntegrationJohn Andric
With the fast-paced technological advancements, one needs to keep up-to-date with the latest innovations and trending topics. Like Beacons, a majority of IT professionals lack the proper understanding of this concept. With this white paper, you will be able to know Beacons and even the differences between online as well as offline integration.
This document provides an overview of the requirements for developing a mobile application called "Free Park" to help disabled users locate parking spaces. The application will allow users to view available parking locations, prices, and reserve spaces for a chosen duration. It will connect to a SQLite database to store user data and parking information. The application will be created in Java using Android SDK and will integrate with Google Maps and the Liverpool government website for additional parking details. Security measures like WPA2 encryption will also be implemented once the basic application functionality is established. The goal is to create a user-friendly mobile solution to help disabled individuals more easily find and reserve accessible parking spots.
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
The document discusses Casambi's Bluetooth Low Energy (BLE)-based smart lighting technology. It begins by explaining that BLE is a new technology compared to Classic Bluetooth, and was designed for low-power Internet of Things applications. Casambi's technology uses BLE and creates a self-healing, self-organizing wireless mesh network to control lighting fixtures. It allows for over-the-air firmware and configuration updates. The technology can control existing lights and integrates with LED drivers, bulbs, and modules.
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...Vladimir Kulyukin
This document describes a cloud computing framework that uses image recognition and remote assistance to help blind individuals identify products while grocery shopping. A blind person takes a photo of a product with their smartphone, which is sent to a cloud server for image matching. The top 5 matches are then sent to a sighted assistant for verification. If a match is incorrect, the assistant provides the right name either by voice or text. The system was tested in the lab and a supermarket, showing it can help blind people identify products independently with help from remote sighted assistants.
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
is SDN (Software Defined Networking) the next big thing in Network Security, or another headache and potential skills gap for the next generation of business networks?
The document summarizes the key features and capabilities of the Mobile Phone Examiner Plus (MPE+) mobile forensics software. MPE+ allows extraction of data from over 10,000 mobile devices, including physical and logical extraction of Android and iOS devices. It provides faster extraction than competitors and can extract more user data, including supporting unlimited devices through custom python scripts. MPE+ helps investigators manage growing caseloads and supports changing mobile technologies and obscure Chinese devices through updates and add-ons.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it
becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile
phones or devices. Since a mobile phone has small screen, low computing power, small storage capacity
etc, the present paper proposes an ECC-based mobile-PKI that overcomes these limitations and supports
various mobile-based applications, because the use of ECC significantly reduces the computation cost,
message size and transmission overhead over RSA based PKI as 160-bit key-size in ECC provides
comparable security with 1024-bit key in RSA. Also the proposed method includes a Mobile Home Agent
(MHA) per user and a Registration Authority (RA) that further minimize the major work/processing loads
of mobile phone and Certificate Authority (CA), respectively. This paper addresses a secure
implementation of the proposed M-PKI, whose security analysis against different attacks shows that all
attacks are protected. Finally, a comparative study of the M-PKI with the existing PKI is done, which gives
satisfactory performance.
IRJET- Clean India Mission: Beacon TechnologyIRJET Journal
This document discusses using beacon technology to enhance the effectiveness of India's Clean India Mission campaign. Beacons use Bluetooth Low Energy to detect nearby mobile devices and transmit notifications. The document proposes installing beacons to provide regular status updates on cleanliness efforts, direct people to garbage disposal locations, and conduct surveys to assess cleanliness levels. Beacons could also transmit weather reports, traffic information, and help coordinate clean-up drives in specific areas on a set schedule. Integrating this proximity sensing technology has the potential to greatly increase public awareness of environmental issues and participation in cleanliness initiatives.
This document discusses using Bluetooth technology to monitor and control home appliances via the internet. It proposes a system where a user can monitor and operate appliances from anywhere through a mobile phone or computer connected to the internet. The system would involve Bluetooth or ZigBee devices connected to appliances at home transmitting data to an embedded web server connected to the internet, allowing remote access and control through a web browser. It provides diagrams of the system structure and steps to connect a Bluetooth device to the internet for remote monitoring and control of appliances.
Direct Internet Offload is a method for carriers to divert mobile data traffic away from their cellular networks and onto Wi-Fi networks to reduce congestion and costs. It allows carriers to bypass visibility of subscribers on their core networks. Carriers can implement Direct Internet Offload by building out their own carrier Wi-Fi networks or partnering with Wi-Fi aggregators. Doing it through their own Wi-Fi networks allows carriers to retain more control over the user experience and potentially generate revenue from Wi-Fi access over time. Greenpacket's solutions help carriers implement Direct Internet Offload in a secure and seamless way for subscribers without changing how they use their devices.
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Mahbubul Alam
This document discusses machine-to-machine (M2M) communication and provides forecasts for the growth of connected devices. It predicts there will be over 20 billion devices connected to the internet by 2020, with more M2M devices shipped each year than PCs, phones, tablets and other devices combined. The document also presents end-to-end M2M architectures including connectivity through mobile and cloud networks to M2M gateways and devices.
As network size continues to grow exponentially, there has been a proportionate increase in the number of nodes in the corresponding network. With the advent of Internet of things (IOT), it is assumed that many more devices will be connected to the existing network infrastructure. As a result, monitoring is expected to get more complex for administrators as networks tend to become more heterogeneous. Moreover, the addressing for IOTs would be more complex given the scale at which devices will be added to the network and hence monitoring is bound to become an uphill task due to management of larger range of addresses. This paper will throw light on what kind of monitoring mechanisms can be deployed in internet of things (IOTs) and their overall effectiveness.
The document describes a proposed Wi-Fi calling system called Wi-Call that allows voice and data communication between Wi-Fi enabled devices on a local area network (LAN) without using an internet or cellular connection. It works by converting voice signals to IP packets and transmitting them over the LAN. The system uses a web application to register users and map their IP addresses so calls can be routed properly within the dynamic IP environment of a LAN. It aims to reduce communication costs for organizations by providing free calling and data transmission within the LAN.
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
This document proposes a new framework for secure mobile commerce (m-commerce) that combines double layer encryption, steganography, and secure XML messages transferred between a mobile terminal and server. The framework is based on J2ME/MIDP and aims to provide strong security and invisibility while maintaining high operating efficiency and compatibility with many mobile terminals. It encrypts data using an elliptic curve cryptography algorithm and hides the encrypted information in images using random least significant bit steganography before transmitting between devices.
Flexible Technologies for Smart CampusKamal Spring
The article considers an example of the
advertisement network based on the BLE 4.0, and its facilities for
creating the infrastructure for a Smart Campus, where dynamic
information is provided for the target audience. The authors
provide an analysis of the characteristics and experimental
implementation of this system. Moreover, the practical usage of a
popular vendor and the needed back-end to provide dynamic
usages of the network, both in appearance and content is
described. In the paper different wireless technologies are
compared in regards to their main feature and field of
application. In general the characteristics of a Blue Tooth Low
Energy, BLE, are highlighted. This is elaborated upon in the
Smart Campus example. The Smart Campus is an indoor
wireless network to deliver location and user based dynamic
information to the different visitors, teacher or students of a
university campus, both for day-to-day use as for specific events.
To keep the system interesting and to augment ease-of-use for all
kind of users and content providers, a dedicated content
management system is developed within the Smart Campus case.
The complete system consists of a set of beacons, an application
on a smartphone, a database with the related CMS. All is
developed in an international cooperation between different
universities.
Beacon Technology White Paper - April 2016Craig Van Pelt
The document discusses beacon technology and its applications, both current and potential. It begins by explaining that beacons are small Bluetooth devices that can be placed indoors or outdoors to send signals to nearby smartphones. Currently, retailers commonly use beacons to send customers targeted offers and information. The document then discusses how other industries like sports and museums are implementing beacons. It explores several ways beacons could be used in corporate real estate settings, such as tracking occupancy, sending targeted messages to visitors, and improving the tenant experience. Challenges to adoption like privacy and compatibility issues are also addressed.
Introduction
Beacons are small wireless devices that broadcast signals using Bluetooth Low Energy (BLE), or Bluetooth SMART technology. Mobile apps on compatible devices are able to listen for signals from beacons placed in the physical world and then trigger an experience via the app.
Beacon enabled apps are notified when the device enters or exits the range of a beacon, and are also able to monitor the distance from the beacon as it changes, often referred to as 'ranging'.
Bluetooth Low Energy
BLE or Bluetooth Smart is an intelligent and power friendly version of Bluetooth wireless technology and exchanges data over short distances using radio transmissions. The power of BLE is in its ability to work with an app on a smartphone, tablet or any other compatible mobile device.
The Beacon System
The Beacon system from Apple can be broken down into two parts:
• A piece of hardware – the “Beacon”, which constantly broadcasts a Bluetooth Low Energy signal. This transmits a unique identifier (UUID) and two further identifiers; major and minor (unsigned 16 bit integer values), which can be used to identify the beacon.
• Application Programmable Interface (API) - An API to search for beacons with a certain UUID and optionally a specific major and minor value. iBeacon adds the possibility for the developer to subscribe to beacons like you would subscribe to geolocations. This enables the app to get notifications (whether the app is currently running or not) when the user gets within range of a specific beacon.
Importance
• High degree of accuracy
• Low impact on battery life
• Low cost of entry
• No Internet connection required
Security
Some of the most common beacon security myths:
• Beacons are transmitting personal data:
Beacons don’t transmit any personal data. In fact, beacons don’t receive any data at all.
• Beacons are tracking my location:
Beacons can’t track your location. The only thing they can do is let your mobile device know that you’re nearby.
Compatibility
Beacons work with both Android and iOS. They were initially introduced in iOS7 and are compatible with every Android version > 4.3
This puts beacon functionality in 300 million + devices.
Conclusion
Beacons transmit a low energy signal from a device with a radius of 0-50 meters to broadcast static pieces of data within short distances.
In a nutshell, our basic requirements for an operational beacon are:
1. Beacon enabled mobile app
2. Network of deployed beacons
3. Bluetooth switched on and relevant permissions
Without a doubt, the Beacon is a useful convergence device that can be given a shot at, which is for sure a revolution in technology
Get to know Beacons Understanding and Online & Offline IntegrationJohn Andric
With the fast-paced technological advancements, one needs to keep up-to-date with the latest innovations and trending topics. Like Beacons, a majority of IT professionals lack the proper understanding of this concept. With this white paper, you will be able to know Beacons and even the differences between online as well as offline integration.
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
This work explores the possibility of transferring data between mobile devices that are nearby each other without the need of pairing, authentication, superuser access and Internet connectivity. Such technology can be used for emergency broadcast, traffic congestion avoidance, IoT, smart city, social and dating systems and games. Except Bluetooth Low Energy technology, there is no other protocol or technology available that allows pairing-free data transfer without Internet connectivity. Bluetooth Low Energy is capable of doing so but at a relatively short range. Using Wi-Fi Direct's Service Broadcast and Discovery, a simple yet novel method is developed which allows for seamless long range (Wi-Fi range) data transfer without Internet connectivity.
The design details of FATS-mumble can be found in the paper (http://www.comp.nus.edu.sg/~bhojan/papers/mumble15.pdf) published in ACM Mobicom 2015 SmartObjects. Please use it for all the references of this mumble project.
The project is open sourced (Github Link): https://github.com/FatsGW/FATS-Mumble.
Demo: http://youtu.be/ACmNYLd2NlI
Providing location based information advertising for existingAvelin Huo
This document proposes and describes a Bluetooth-based location-aware advertising system for mobile phones. It discusses using Bluetooth beacons placed throughout an area like a supermarket to broadcast targeted ads and coupons to nearby phones. The system would track which phones view which ads to improve targeting without requiring any app installation. Two case studies are presented: distributing supermarket deals and providing an audio tour guide at a historic site by transmitting information and points of interest to visitors based on their Bluetooth location. The system aims to allow convenient, instant opt-in access to location-based information and ads through Bluetooth without changes to users' phones.
The document discusses privacy issues in participatory sensing and proposes a privacy-enhanced participatory sensing infrastructure called PEPSI. Participatory sensing allows mobile users to share sensor data, but existing systems do not provide adequate privacy protections. PEPSI uses cryptographic tools to allow query/report matching by a service provider while guaranteeing privacy for mobile nodes and query submitters. It aims to provide provable privacy by design and defines clear privacy properties.
IRJET- A Survey on Systems using Beacon TechnologyIRJET Journal
This document summarizes several papers on indoor positioning systems using beacon technology. It discusses how beacons can be used to deliver customized notifications and advertisements to users based on their indoor location. Some key points discussed include:
1) Beacons send out Bluetooth signals that can be detected by smartphones to determine a user's location within a building. This allows targeted content like deals to be pushed to users' phones.
2) Various positioning algorithms like nearest beacon, weighted beacon pairs, and particle filtering can be used to calculate a user's location from beacon signal strength.
3) Beacon technology provides advantages over GPS for indoor use as it has better accuracy, lower costs, and less power
BLE Beacon with Data Accumulation FunctionalityIJCNCJournal
This research looks into the implementation and utilization of BLE beacons with data accumulation functionality. BLE applications are typically divided into two categories: one that broadcasts a fixed value for each device, and the other that identifies contact with a particular user by scanning the data broadcasted in its surroundings. The proposed framework, however, follows a different approach where each beacon scans for data broadcasted in the area, then changes state based on the scan result, and finally, broadcasts data based on the new state. This can be regarded as an extension of the BLE mesh standard, which enables data flooding through repeated scanning and broadcasting. The paper also explores two practical use cases of the technology: detecting and announcing congestion around devices, and a stamp rally application.
BLE Beacon with Data Accumulation FunctionalityIJCNCJournal
This document proposes a framework for Bluetooth Low Energy (BLE) beacons that can accumulate and broadcast data based on their state. It discusses implementing state transitions in the beacons through scanning, storing the state internally, and updating it with test-and-set operations. It then explores two use cases for this framework: detecting congestion levels around beacons and implementing a stamp rally application where beacons provide clues based on their state. The document evaluates different methods for making BLE beacons stateful and realizes the proposed framework on IoT devices.
Functional requirements of intelligent object frameworkijscai
Intelligent Object Framework (IOF) is a new communication standard over a wireless network supporting
existing multiple sets of architectural solutions. The Framework consists of a framework design that
enables devices of different platforms to communicate by a common data exchange model via a device
management controller. This paper provides a descriptive analysis of functional requirements for the IOF.
The purpose of the proposed system is to provide a platform independent device (Intelligent Object)
management by utilization of set components. The functional requirements focus on deriving primary
functionality of server and client applications by description of required inputs, behaviours and outputs.
1. The document discusses the concept of developing a mobile application for an educational portal to enable e-learning through wireless devices. It aims to allow students to access study materials, take tests, and view evaluation results on their mobile devices.
2. The proposed system would generate analysis of student performance both individually and in groups to help assess learning and share knowledge among peers.
3. The model could be implemented as a massive open online course (MOOC) across multiple institutions to provide interactive study forums and networking opportunities for students.
The document describes a connected mailbox prototype that uses sensors and cloud technology to provide instant mail notification. Sensors attached to mailboxes detect when mail is delivered and send the data to a Raspberry Pi. The Pi then sends the sensor data to the IBM Cloud using MQTT protocol. If motion is detected, notifications are sent via email and text message to recipients. The system aims to make the mailing process smarter and more efficient by eliminating delays in notification.
This document discusses Internet of Things (IoT) technologies including iBeacons. It provides an overview of IoT, describing how connected devices can range from simple sensors to more advanced devices. iBeacons use Bluetooth Low Energy to allow devices to detect proximity to beacons. Example use cases for iBeacons include retail, education, and healthcare. The document then describes a project to use iBeacons and a mobile app to track patient and nurse locations and activity to improve healthcare quality.
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologySilabs products
Silicon Labs designs and delivers easy-to-use, innovative Bluetooth SoCs, modules and software for sports and fitness, consumer electronics, beacons and smart home applications.Our Bluetooth SoCs and modules utilize the same user friendly software and developments tools providing outstanding developer experience, fast time to market and migration path from modules to SoC.
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologyPallavi Das
This document provides an overview of Bluetooth beacons, including:
- Beacons use Bluetooth low energy technology to broadcast an identifier to nearby smartphones to enable proximity-aware applications.
- There are two common usage models: beacons placed in fixed locations, and beacons attached to movable objects monitored by fixed nodes.
- Example applications include retail personalized offers, secure payments, indoor navigation, and asset tracking.
- While not an official Bluetooth standard, common beacon pseudo-standards like iBeacon and Eddystone structure their data payloads for compatibility.
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologyPallavi Das
Silicon Labs designs and delivers easy-to-use, innovative Bluetooth SoCs, modules and software for sports and fitness, consumer electronics, beacons and smart home applications.Our Bluetooth SoCs and modules utilize the same user friendly software and developments tools providing outstanding developer experience, fast time to market and migration path from modules to SoC.
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologyPallavi Das
Silicon Labs designs and delivers easy-to-use, innovative Bluetooth SoCs, modules and software for sports and fitness, consumer electronics, beacons and smart home applications.Our Bluetooth SoCs and modules utilize the same user friendly software and developments tools providing outstanding developer experience, fast time to market and migration path from modules to SoC.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
Abstract Long term evolution direct, plus its features of device-to-device networking and proximate discovery, are new and emerging
technologies able to come out of the shadow to render a whole new perspective at mobile payments. In this work, we propose a
new mobile payment system using long term evolution direct and its features. A sensitive mobile payment system would require
high security requirements in order to be trusted by the users and the businesses. These requirements are taken into account in
our proposed system design and solutions to security considerations are provided. The system’s security and usability features are
designed for implementation from physical to application layer to address the identified issues. Within the scope of this work, we
provided the conceptual design solutions to allow the system to be as solid and secure as possible while they are convenient
enough not to degrade user’s experience when using the system.
Keywords: LTE Direct, Mobile Payment, Internet of Things, Device-To-Device Networking
Similar to ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS (20)
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
DOI : 10.5121/ijasuc.2018.9101 1
ANALYSING THE POTENTIAL OF BLE TO SUPPORT
DYNAMIC BROADCASTING SCENARIOS
Miran Borić1
Ana Fernández Vilas2
and Rebeca P. Díaz Redondo3
123
Information & Computing Lab., AtlantTIC Research Centre,
School of Telecommunications Engineering,
University of Vigo, 36210, Vigo(Spain)
ABSTRACT
In this paper, we present a novel approach for broadcasting information based on a Bluetooth Low Energy
(BLE) ibeacon technology. We propose a dynamic method that uses a combination of Wi-Fi and BLE
technology where every technology plays a part in a user discovery and broadcasting process. In such
system, a specific ibeacon device broadcasts the information when a user is in proximity. Using
experiments, we conduct a scenario where the system discovers users, disseminates information, and later
we use collected data to examine the system performance and capability. The results show that our
proposed approach has a promising potential to become a powerful tool in the discovery and broadcasting
concept that can be easily implemented and used in business environments.
KEYWORDS
Bluetooth Low Energy, Broadcasting, ibeacons, Internet of Things, Experiments
1. INTRODUCTION
The main characteristics of a smart environments is their adaptability and awareness of their
surroundings. Such adaptable ability provides the Internet of Things concept by its linking the
virtual with the physical world. This whole process presents a challenge since the smart
environment is heterogeneous and supported by many different technologies[1][2]. One of these
technologies on the rise is a BLE beacon, which found a place in many aspects of human needs
and living. Such technique enables smartphones, tablets, and different wearables to perform a
particular kind of action when near a beacon. Nowadays, many companies are involved in the
beacon production[3][4]. However, the price is controlling the beacon solution, especially if it
supports some enhanced capabilities. Also, many companies with the hardware part include their
application solution. That is to say; the application often comes incombination with the hardware
they offer. Because of that, beacons are not usually capable of analysing the surrounding around
them (user discovery) without some previously installed app on a user’s smartphone[5].
This paper presents a fully customized solution for user discovery and dynamic beacon
information broadcasting according to the discovered user. In our case, a single beacon device is
capable of supporting a dynamic broadcasting by predefining user profiles through the use of
some background intelligence. Therefore, without any extra equipment, a single beacon device
can serve different profiles at the same moment. Also, the possibility of monitoring user’s
movements, without any additional proprietary app installation, gives us an opportunity to gather
more information about the space analytics and user behaviour.
This solution can be used in any message dissemination environment and integrated into the
existing infrastructure with minimum investments. In our case, we have tested it as an indoor
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
2
solution for broadcasting faculty information to students, faculty visitors, and faculty personnel.
We verify the system through the experiment in a particular period and obtain the data. Later, by
analysing the data, we extract and examine the results by giving a better insight of system
performance and system usage. Furthermore, we investigate the capability of the system to
receive interactions during the experiment period and how these interactions can show different
activities in the area.
We divide this paper into several sections. Section 2 gives the related work and what motivated us
for this paper. In section 3 we give the system explanation and the architecture. Section 4 deals
with pilot experiment and shows us all the details regarding the experimented. The last part draws
the conclusions, current and future work.
2. RELATED WORK
In [6]authors offered a crowd sensing solution where users receive a corresponding information
by wearing a Bluetooth bracelet, which connects to their smartphones. Furthermore, specific
bracelets connect to the beacon devices placed along the experiment area. Also, a dedicated
server controls all the beacon devices and that way it manages a user-bracelet-beacon
interaction.However, in our case, the interaction is almost similar but without Bluetooth bracelets.
Our system makes a direct connection between beacon advertising device and a user's
smartphone, which eases the whole process.
The most significant influence and motivator of our work is a commercial solution offered by
Cisco Systems, Inc. called Cisco Connected Mobile Experience (CMX)[7]. This product presents
a solution that uses location intelligence gathered from the Wi-Fi network to help companies of
all various industries monetize their network by engaging with their clients and optimizing
marketing operations. It offers to businesses a unique way to communicate with and to better
understand their customers while improving customer experience and their venue. CMX system
can automatically detect the presence and engage their customers on their site and with tailored
messages. Based on a user’s position and by using his smart mobile device, the system can
deliver different content. Ranging from informational updated, indoor maps or any user relevant
information this location data also increases the efficiency by understanding new versus repeat
customers.
Besides being a powerful mobile solution the price can be its disadvantage. Not all organizations
are ready to invest in such solution. Implementing it usually requires a Cisco proprietary devices
and its core, e.g., Cisco 3365 Mobility Services Engine. In our case, we offer an inexpensive
system installed on a Raspberry Pi device that can discover users and distribute them the
corresponding information to improve organizational and operational efficiency. Also, it can
understand a user pattern, send different data to identified users, etc.
3. ARCHITECTURE OVERVIEW
The reason we choose BLE beacon technology is the fact that presents a lightweight protocol that
does not ask for prior connection between two devices that need to share some data. BLE beacon-
enabled device broadcasts the signal to anyone who is configured to listen. In case of the Wi-Fi
direct and classic Bluetooth, they ask for secure pairing to unknown devices[8]. Furthermore, if
we want to connect multiple clients to Wi-Fi network, devices also require a specific data routing
protocol that is self-organized[9].A beacon represents a BLE class, and sometimes it is called a
BLE flavor. It became popular thanks to its Bluetooth low power capability to stay active for
years and it is powered only by coin cell battery[10]. Among many beacon solutions[11], for our
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
system implementation, we use the Apple version (i
our pilot project. The technology is
transmit-only technology built for
configuration into the beacon device.
understandable, ibeacon, while advertising packets, it is doing nothing more than saying to
everyone around that it is present and identified by three numerical identifiers: Universal Unique
Identifier (UUID), Major number and Minor number. Comb
representa specific information, and by advertising this combined identifier, it can trigger a
particular action on a device that reads it. What is interesting
part, usually installed on a user’s phone.Such app
with the action that starts after discovering the
a user’s phone is the primary product throughout the whole
to show some information regarding advertised products in the
else more complicated.
We implement and test the solution at the Faculty of Engineering and Telecommunications
Vigo in Spain. We divide its infrastructure into two main parts, which are the front
part) and the back-end (Wi-Fi part). The front
sending multiple user info advertisements, while the back
through the Faculty Wi-Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single
user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing
area contains several Raspberry Pi
Module on a single Raspberry Pi device is responsible for the user discovery process and is
continually scanning for new MAC addresses over a BLE protocol. When the beacon device
discovers a user, it learns a user's device MAC address and saves it to the ibeacon database.
For this process, we are using two technologies. First, a user is discovered through the BLE
protocol and sent to the database by using a Wi
an input for a specific user, it associates the user with a beacon configuration advertisement
(UUID, Major and Minor combination) and again through the Wi
configuration advertisement to the beacon device. From that point, a
protocol to deliver configuration advertisements to a specific discovered user. User's smartphone
reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover,
ibeacon database saves all the user's in
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
system implementation, we use the Apple version (ibeacon), which we found most suitable
The technology is pretty much straightforward to explain. It
only technology built for broadcasting data, where receiving option demands additional
device. However, the protocol itself is transmit-only. P
, while advertising packets, it is doing nothing more than saying to
everyone around that it is present and identified by three numerical identifiers: Universal Unique
Identifier (UUID), Major number and Minor number. Combining these three numbers we can
specific information, and by advertising this combined identifier, it can trigger a
particular action on a device that reads it. What is interesting about the ibeacon is the application
’s phone.Such app can read the ibeacon identifier and associate it
with the action that starts after discovering the beacon. In this manner, an application function on
phone is the primary product throughout the whole beacon process, whether it is designed
to show some information regarding advertised products in the beacon proximity or something
Figure 1. System architecture
We implement and test the solution at the Faculty of Engineering and Telecommunications
Vigo in Spain. We divide its infrastructure into two main parts, which are the front
Fi part). The front-end is taking care of the user discovery and
sending multiple user info advertisements, while the back-end connects all the beacon devices
Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single
user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing
area contains several Raspberry Pi beacon configured devices places along the Faculty area. BLE
Module on a single Raspberry Pi device is responsible for the user discovery process and is
continually scanning for new MAC addresses over a BLE protocol. When the beacon device
, it learns a user's device MAC address and saves it to the ibeacon database.
For this process, we are using two technologies. First, a user is discovered through the BLE
protocol and sent to the database by using a Wi-Fi protocol. Later, when ibeacon data
an input for a specific user, it associates the user with a beacon configuration advertisement
(UUID, Major and Minor combination) and again through the Wi-Fi protocol sends a
configuration advertisement to the beacon device. From that point, a beacon device uses BLE
protocol to deliver configuration advertisements to a specific discovered user. User's smartphone
reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover,
ibeacon database saves all the user's input records, and it is updated every time a user enters the
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
3
), which we found most suitable for
straightforward to explain. It represents a
, where receiving option demands additional
only. Put it more
, while advertising packets, it is doing nothing more than saying to
everyone around that it is present and identified by three numerical identifiers: Universal Unique
ining these three numbers we can
specific information, and by advertising this combined identifier, it can trigger a
is the application
identifier and associate it
. In this manner, an application function on
r it is designed
proximity or something
We implement and test the solution at the Faculty of Engineering and Telecommunications of
Vigo in Spain. We divide its infrastructure into two main parts, which are the front-end (BLE
end is taking care of the user discovery and
cts all the beacon devices
Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single
user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing
beacon configured devices places along the Faculty area. BLE
Module on a single Raspberry Pi device is responsible for the user discovery process and is
continually scanning for new MAC addresses over a BLE protocol. When the beacon device
, it learns a user's device MAC address and saves it to the ibeacon database.
For this process, we are using two technologies. First, a user is discovered through the BLE
Fi protocol. Later, when ibeacon database saves
an input for a specific user, it associates the user with a beacon configuration advertisement
Fi protocol sends a
beacon device uses BLE
protocol to deliver configuration advertisements to a specific discovered user. User's smartphone
reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover,
put records, and it is updated every time a user enters the
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
4
area. It does this by keeping track of a user's beacon entrance timestamps. User discovery process
is customizable and configured according to the needs of the organization. In our case, a single
beacon device works in a discovery mode for five seconds, and after one second it restarts again.
We have to mention that when a beacon device discovers a particular user’s device, it
immediately makes a connection to the ibeacon database and saves the user’s MAC address as the
database input. It also saves the timestamp of the user’s entrance to the broadcasting (beaconing)
area.
Along the Faculty area, several beacon advertisers were implemented and continuously served
users while entering and exiting the Faculty area. For beacon devices, as already mentioned, we
use a Raspberry Pi hardware devices[12]. The reason why we choose Raspberry Pi over many
others, ready to implement commercial solutions, is the fact that they lack in customization
abilities, where Raspberry is Linux based[13], and it is open to customization. Hardware part
consists of few components. The primary element is a Raspberry Pi 3, and it represents a beacon
device, but the ibeacon database as well.Every beacon device has two pieces of Bluetooth CSR1
4.0 USB2
dongles and one Wi-Fi USB dongle installed on its chassis. The reason why we need
two BLE dongles is that of discovery and advertising process. Beacon device is continuously
scanning the beacon area on one BLE dongle why the other has a function of the advertising
process. Wi-Fi dongle connects the beacon to the internal Faculty infrastructure, and that way
communicates with the ibeacon database. For the ibeacon database, we use Raspberry Pi 3 model
B with MySQL version 5.5 but any computer that supports MySQL installation will serve the
purpose.
4. PILOT EXPERIMENT
Faculty as a building presents a complex environment, where we had to take care of the BLE
coverage, which reduces if the signal encounters an obstacle (walls, doors, inventory, etc.). After
positioning all the beacon devices and making sure that we conceived a full coverage, we
connected them all through the Faculty Wi-Fi infrastructure. The main idea was also to build a
system and satisfy the broadcasting coverage area by using a minimum number of devices. In our
case, we conceived it with 13 devices.We evaluate the performance of the proposed system by
collecting and extracting real-time data. We experiment on the premises of the Faculty and in 27
days, from 05/05/2017 to 31/05/2017, when the Faculty as an institution was in its usual working
routine process (professors dealing with students, students attending classes, exams, studying in
the Faculty library, etc.). After collecting and extracting all the data from the ibeacon database,
we discovered that the total number of inputs in the database was 70,046. This info also means
that the interactions of all the identified users and the system were the same as the number of
database inputs previously mentioned. By interaction, we express discovery and broadcasting
process altogether. Also, a total number of discovered and served users during the experiment
period was 120. It is important to mention that no influence on users was done, regarding their
smart devices and activating the BLE protocol, whatsoever.
Next, we examine a basic system usage from several points of view and divide it by days and
hours. Usage tells us at what specific time was the system involved in a message dissemination
process, as well as in the user discovery process. From Fig. 2 we can see that the peak time of
system usage was 15th of May with 8,884 total interactions. Some predictions regarding such
system behavior could be that the number of Faculty visitors was the same, but not all users had
BLE protocol activated on their phones. However, taking into account that the exam period at the
Faculty started on 15th of May, we can conclude that starting from that day, a Faculty was less
1
Cambridge Silicon Radio
2
Universal Serial Bus
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
crowded place than before. The reason for this is because not all students were taking the exams,
and by that, they were not present like in the time wh
2). More in-depth inspection of user system usage will give us a better insight of the day with the
high user interactions.
Figure 3. System usage
If we dive a little bit more into this specific date (15th of May), we see that the total number of
users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into
user interaction. More specifically, two users, named Liss
in system interaction, comparing to
of the most active user and its behavior during the experiment. It is important to mention that
every user identification, in our case
the sake of user's anonymity. In a real
unique device MAC address, as well as user's device
wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight,
we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the
Faculty as the institution had usual working hours convent
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
crowded place than before. The reason for this is because not all students were taking the exams,
and by that, they were not present like in the time when they were attending their classes (see Fig.
depth inspection of user system usage will give us a better insight of the day with the
Figure 2. System usage per days
Figure 3. System usage – 15th
of May
If we dive a little bit more into this specific date (15th of May), we see that the total number of
users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into
interaction. More specifically, two users, named Lissa and Suzan, were pretty much involved
in system interaction, comparing to the others. In the following part, we will give a closer insight
of the most active user and its behavior during the experiment. It is important to mention that
ation, in our case a user’s device MAC address, we changed for username, for
the sake of user's anonymity. In a real-world scenario, every username presents a specific and
unique device MAC address, as well as user's device identification (phone name
wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight,
we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the
Faculty as the institution had usual working hours conventional to the world's working hours. We
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
5
crowded place than before. The reason for this is because not all students were taking the exams,
en they were attending their classes (see Fig.
depth inspection of user system usage will give us a better insight of the day with the
If we dive a little bit more into this specific date (15th of May), we see that the total number of
users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into every
a and Suzan, were pretty much involved
others. In the following part, we will give a closer insight
of the most active user and its behavior during the experiment. It is important to mention that
MAC address, we changed for username, for
world scenario, every username presents a specific and
identification (phone name). Next, we
wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight,
we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the
ional to the world's working hours. We
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
can see when the day goes down
of around 850 interactions per hour until the next morning at about 8 AM. This information tells
us that the users used system resources also during non
during night time is the fact that Faculty has employees who leave their electronic equipment
(device's BLE protocol) in active mode. In the following paragraphs, we examine more closel
involved users in this system usage process.
Figure 5. User Lissa interactions with the system
The user that we examined was user Lissa. This user had the most number of interactions with the
system (20,476) during the experiment period of 27 days. From Figure 5 we notice that user was
active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even
during night time when the Faculty does not operate for the public. This behavior
8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of
May when user's device was mostly active during night period (see Fig. 5). This why we had
deviation on these days (see Fig. 2).
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
down, in the same manner, the system usage slowly drops to the point
of around 850 interactions per hour until the next morning at about 8 AM. This information tells
stem resources also during non-working hours. Why users use the system
during night time is the fact that Faculty has employees who leave their electronic equipment
(device's BLE protocol) in active mode. In the following paragraphs, we examine more closel
involved users in this system usage process.
Figure 4. System usage per hour
Figure 5. User Lissa interactions with the system
The user that we examined was user Lissa. This user had the most number of interactions with the
during the experiment period of 27 days. From Figure 5 we notice that user was
active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even
during night time when the Faculty does not operate for the public. This behavior
8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of
May when user's device was mostly active during night period (see Fig. 5). This why we had
on on these days (see Fig. 2). During different periods of time the user was acting
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
6
, in the same manner, the system usage slowly drops to the point
of around 850 interactions per hour until the next morning at about 8 AM. This information tells
working hours. Why users use the system
during night time is the fact that Faculty has employees who leave their electronic equipment
(device's BLE protocol) in active mode. In the following paragraphs, we examine more closely
The user that we examined was user Lissa. This user had the most number of interactions with the
during the experiment period of 27 days. From Figure 5 we notice that user was
active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even
we notice on
8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of
May when user's device was mostly active during night period (see Fig. 5). This why we had
periods of time the user was acting
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
7
according to the behavior of other scanned users, either not present in the area (out of the
Faculty), or either present but with inactive BLE protocol on his device.
5. CONCLUSIONS
This paper proposes an innovative solution for broadcasting information using BLE beacons.
Field experiment shows how the system behavesto discover users and to broadcastthe information
to them. However, to correctly receive the information, a userhas to install the app that can
process a beacon signal. The results gave a closer look into system performance while users
interact with the system. The developed system is flexible and can be incorporated easily into
already built infrastructure, not ruining its scalability. The proposed system also presents an
inexpensive alternative to the Cisco CMX solution, previously mentioned in the related work
section.
Currently, the solution can offer a user profile categorization by applying a predefined user
interest taxonomy to the system and in that way using fewer devices to advertise different data to
users found in beacon proximity. That is to say, a single beacon device in our solution can operate
in a mode where it associates with different advertisements and in the same moment can
broadcast multiple information to nearby smart devices. Categorization process demands to
predetermine the users in the ibeacon database by creating separate profiles for specific user.
However, even if we do so, we have to assign them to the discovered users. That way, the system
can identify them the next time they enter the beaconing area. This process asks for applying
different methods for identifying users and predefining their profiles. We are currently working
on a method where we try to categorize the users by analysing their movements along the
building area and learning their behaviour. This way, we want to combine the dynamic
broadcasting solution with the user and space analytics.
This approach enables to obtain users’ movement around a specific area and, consequently, it
might support discovering patterns of users’ behaviour. Previously mentioned motivates as to
develop and experiment more in the area of BLE beacon message dissemination. We plan to
continue our work on this concept and combine our broadcasting system with space monitoring
where extracting data of discovered users from beacon devices can help us to understand the
surrounding behaviour, and to improve the efficiency and the logistics in the particular building.
Furthermore, this approach has some numerous cases where it can be applied, such as social
network, where people can search for other people around them and get some extra knowledge
about the others. Also, by accessing the real-time statistic, beacons can be used to recognize
different hotspots and send alerts to whom it may concern about locations that are overcrowded
and a subject to security flaws.
ACKNOWLEDGEMENT
This work is funded by: the EU Regional Development Fund, and the Galician Government under
agreement for funding the (AtlantTIC); the Spanish Ministry of Economy and Competitiveness
(TEC2014-54335-C4-3-R); and the EU Commission under the Erasmus Mundus Green-Tech-WB
project (551984-EM-1-2014-1-ES-ERA MUNDUS-EMA21).Thanks to the Communications
Department of the ATIC (UVIGO) for its collaboration in the pilot deployment
REFERENCES
[1] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,”
IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, Feb. 2014.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
[2] “Bluetooth Low Energy for Use with MEM Sensors by Clinton Francis Hughes
Available: https://pdfsecret.com/download/bluetooth
clinton-francis-hughes-a-thesis-
2017].
[3] “Estimote.” [Online]. Available: http://estimote.com/. [Accessed: 28
[4] “Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28
[5] Shahriar, Shaffat, “Location based content delivery solution using iBeacon,” Umeå University, Faculty
of Science and Technology, Department of Computing Science.
[6] Chieh-Ming Chang, Li Szu-Chuang, and Huang Yennun, “Crowdsensing traces visualization in
bluetooth beacon-based sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA
2016 Posters Artic. No 5.
[7] “Cisco Mobility Express -
https://www.cisco.com/c/en/us/solutions/enterprise
[Accessed: 28-Nov-2017].
[8] S.Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi
Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY,
USA, 2011, pp. 37–42.
[9] D. J. Dubois, Y. Bando, K. Watanabe, and H. Holtzman, “Lightweight Self
of Opportunistic Infrastructure-
Self-Adaptive and Self-Organizing Sy
[10] N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,
pp. 222–225, Jan. 2014.
[11] “Google Eddystone vs. Apple iBeacon: Big Clash Between Tiny Bluetooth Beacons
Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google
eddystone-vs-apple-ibeacon-big
[12] E. Upton and G. Halfacree, Raspberry Pi User Guide. John
[13] M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor
Ed. John Wiley & Sons, Inc., 2007, pp. 78
Authors
Miran Borić
Erasmus Mundus Green-Tech-WB Ph.D. student since September 2015 at
University of Vigo (Spain). I obtained the diploma in “Multisensor Intrusion
Detection System” from the Faculty of Informational Technologies,
University of “Džemal Bijedić” Mostar, Bosnia & Herzegovina. I have
previous work experience as a Network specialist and System administrator at
UniCredit Group Bank Mostar and Faculty of Informati
Mostar. I am also an active Cisco Certified Network Academy instructor at
Cisco Local Academy Mostar since 2010. My area of interest includes Smart
network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Rout
and Quality of Service in computers networks.
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
“Bluetooth Low Energy for Use with MEM Sensors by Clinton Francis Hughes A Thesis.” [Online].
https://pdfsecret.com/download/bluetooth-low-energy-for-use-with-mem-sensors
-presented-in-_59f70296d64ab20a751134a4_pdf. [Accessed: 28
“Estimote.” [Online]. Available: http://estimote.com/. [Accessed: 28-Nov-2017].
“Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28
“Location based content delivery solution using iBeacon,” Umeå University, Faculty
of Science and Technology, Department of Computing Science.
Chuang, and Huang Yennun, “Crowdsensing traces visualization in
sed sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA
Cisco Mobility Express Solution,” Cisco. [Online]. Available:
https://www.cisco.com/c/en/us/solutions/enterprise-networks/mobility-express/mobility-
Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi-Opp: Ad-hoc-less Opportunistic
Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY,
D. J. Dubois, Y. Bando, K. Watanabe, and H. Holtzman, “Lightweight Self-organizing Reconfiguration
-mode WiFi Networks,” in 2013 IEEE 7th International Conference on
Organizing Systems, 2013, pp. 247–256.
N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,
“Google Eddystone vs. Apple iBeacon: Big Clash Between Tiny Bluetooth Beacons : Business Tec
Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google
big-clash-between-tiny-bluetooth-beacons.htm. [Accessed: 28
E. Upton and G. Halfacree, Raspberry Pi User Guide. John Wiley & Sons, 2014.
M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor
Ed. John Wiley & Sons, Inc., 2007, pp. 78–90.
WB Ph.D. student since September 2015 at
University of Vigo (Spain). I obtained the diploma in “Multisensor Intrusion
on System” from the Faculty of Informational Technologies,
ć” Mostar, Bosnia & Herzegovina. I have
previous work experience as a Network specialist and System administrator at
UniCredit Group Bank Mostar and Faculty of Informational Technologies
Mostar. I am also an active Cisco Certified Network Academy instructor at
Cisco Local Academy Mostar since 2010. My area of interest includes Smart
network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Rout
and Quality of Service in computers networks.
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
8
A Thesis.” [Online].
sensors-by-
pdf. [Accessed: 28-Nov-
“Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28-Nov-2017].
“Location based content delivery solution using iBeacon,” Umeå University, Faculty
Chuang, and Huang Yennun, “Crowdsensing traces visualization in
sed sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA
Cisco Mobility Express Solution,” Cisco. [Online]. Available:
solution.html.
less Opportunistic
Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY,
organizing Reconfiguration
mode WiFi Networks,” in 2013 IEEE 7th International Conference on
N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,
: Business Tech :
Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google-
beacons.htm. [Accessed: 28-Nov-2017].
M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor-in-Chief,
network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Routing protocols
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
9
Ana Fernández Vilas
I am Associate Professor at the Department of Telematics Engineering of
the University of Vigo and researcher in the Information & Computing
Laboratory (AtlantTIC Research Center). I received my PhD in Computer
Science from the University of Vigo in 2002. My research activity at I&C
lab focuses on Semantic-Social Intelligence & data mining. I look for
applying both to Ubiquitous Computing and Sensor Web; urban planning
& learning analytics. Also, I am involved in several mobility &
cooperation projects with North African countries & Western Balkans
Rebeca P. Díaz Redondo
Rebeca P. Díaz Redondo is an Associate Professor at the Department of
Telematics Engineering of the University of Vigo and researcher in the
Information & Computing Laboratory (AtlantTIC Research Center). She
received her PhD in Telecommunications Engineering from the same
university. She currently works on applying social mining and data
analysis techniques to characterize the behavior of users and communities
to design solutions in learning, smart cities and business areas. She is
currently involved in the scientific and technical activities of several
national and European research & educative projects. Besides, she is
involved in several mobility & cooperation projects with North African
countries & Western Balkans.