This document summarizes a research paper on developing a location-based tracking application for Android. It describes the application called "Route Tracker" which allows users to track their movement and route on a map. The summary discusses the technologies used to develop the application such as Android classes for maps, locations and overlays. It also analyzes the complexity of classes used and constraints of deploying location-based services. The conclusion states that implementing location-based services requires integrating Android APIs with external APIs like Google Maps.
The goal of this project is to provide a location-based alarm system through which users can broadcast their last known
position in emergency situations. The system will be able to send an SMS or an e-mail containing the user’s location coordinates
to the already registered mobile numbers using GCM service. The location information is obtained using GPS
technology and real-time location is shown on the receiver’s application using Google Maps API. In situations where GPS is
not available, the system tracks location using LBS technology
.Keywords: GPS,GCM,LBS Android.
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Augmented Reality AR is the technology that overlaps virtual objects onto real world objects. It has three main features the combination of the real world and the virtual world, real time interaction, and 3D registration. The algorithms used to produce graphical images and other sensor based inputs on real world objects uses the camera of your device. The shortest route and graphics information in 3D is not notified in normal maps. To avoid such problems we have developed a 3D virtual environment that gives graphics and contains more information about a particular place. This project is done by using the “UNITY†application, the engine can be used to create three dimensional, two dimensional which helps to view all these graphics and routes in a 3D view. R. Mohana Priya | Subash. R | Yogesh. R | Vignesh. M | Gopi. V "Augmented Reality Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30220.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30220/augmented-reality-map/r-mohana-priya
The goal of this project is to provide a location-based alarm system through which users can broadcast their last known
position in emergency situations. The system will be able to send an SMS or an e-mail containing the user’s location coordinates
to the already registered mobile numbers using GCM service. The location information is obtained using GPS
technology and real-time location is shown on the receiver’s application using Google Maps API. In situations where GPS is
not available, the system tracks location using LBS technology
.Keywords: GPS,GCM,LBS Android.
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Augmented Reality AR is the technology that overlaps virtual objects onto real world objects. It has three main features the combination of the real world and the virtual world, real time interaction, and 3D registration. The algorithms used to produce graphical images and other sensor based inputs on real world objects uses the camera of your device. The shortest route and graphics information in 3D is not notified in normal maps. To avoid such problems we have developed a 3D virtual environment that gives graphics and contains more information about a particular place. This project is done by using the “UNITY†application, the engine can be used to create three dimensional, two dimensional which helps to view all these graphics and routes in a 3D view. R. Mohana Priya | Subash. R | Yogesh. R | Vignesh. M | Gopi. V "Augmented Reality Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30220.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30220/augmented-reality-map/r-mohana-priya
Geo location based augmented reality applicationeSAT Journals
Abstract As the inception of mobile app development began, various applications of Augmented Reality that was once only restricted under the avenue of personal computers extended its domain to mobile applications and currently is used in the wide fields of gaming, education, navigation and so on. The exceptional data processing abilities which is possessed by smartphones in concert with its various services such as Global Positioning System (GPS), wireless networks, and compass have authorized Augmented Reality to find a very fruitful proposition in the wide spectrum of navigation based apps. The objective of the proposed work is to structure and design Geo based Augmented Reality application using GART toolkit. The paper initiates with explaining the various components used in a Geo AR app, exploring and explaining the various structure and features of the app and providing a spotlight on the deficiencies and future scope of the targeted developed app [1]. Keywords: Augmented Reality, Global Positioning System, Wireless Network, GART, Geo AR app
GPS (Global Positioning System) technology is widely known for its ability to track down devices in real time. Combined with mobile phones, it has become a very powerful tool with a great potential for future development of mobile GPS applications. The Interactive ZooOz Guide was a final year industry project
carried out by seven students from three separate courses to tackle a project that involves upgrading the Melbourne Zoo’s mapping system through the use of GPS technology. The aim of the project is to explore the potential capability of using GPS in the Zoo environment. The proposed system uses a PDA device
with a GPS receiver that tracks users’ location in real time as they are touring around the Zoo. In this paper, an insight into GPS technology is briefly reviewed and the design and implementation of “Interactive ZooOZ Guide” is described. Then GUI (Graphical User Interface) is presented in detail.
Finally conclusion is drawn from the “proof of concept” prototype.
IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICSaswin tbbc
Location based intelligent mobile organizer
Our Project Guidance Methods
We are following Waterfall Methodology for Project development and condition and it has been strictly followed by each guiding staffs and we have better knowledge in this field and updated with new innovative technologies. Our past students have found project work at our centers as a reliable, efficient, inexpensive and a fruitful learning experience. We provide Students about their project at various stages of their project through regular classes and also through detailed technical documentation that we provide in digital format.
Softroniics head the group of companies forwarding technical project guidance assistance by counting the creative levels exhibited and innovations offered by the team while delivering their services. Technical training obtainable at Softroniics often finds its sturdy capability of having immense experience in the sector they play; competitors remain far behind as satisfied students are the strongest strength of marketing as well as expansion of team Softroniics.
for more details..... contact us..........
softroniics
calicut || palakkad || coimbatore
9037061113 , 9037291113
www.softroniics.in
Java based project ideas from softroniics
1. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113 1. Aero Shuttle 2. Almanac Ascertain 3. Appositeness Intendance 4. Baccalaureate Gateway 5. Barristerial Atrium 6. Belligerent Tackle Hire Classification 7. Bistro Stipulation 8. Blemish Ascertainers 9. Bureaucrat Defended Entity 10. Cartel Communique 11. Cast Your Referendum 12. Clodhopper's Pal 13. Communal Contact_Abstract 14. Confrontation Reconnoiter 15. Convertible Leaflet Governance Explication 16. Digital Placard
2. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113 17. Disburse Mobile Scheme 18. Disposition Prospectus 19. e-Acquirements 20. E-Chain Communicator 21. E-Conscription 22. Electorate Conspiracy 23. Endowment Fathom 24. Enormous Employment 25. First-Rate Sanatorium 26. Grime Dissolution Scheme 27. Haulable Overhaul 28. Infobahn Vendue 29. Inure-Avocation Unit 30. Menage Swop 31. Misdemeanor Abjurer 32. Mobility Bill Defrayment
3. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113 33. Mortgage Scheme 34. Online Allegation 35. Online Burgeons Exposition 36. Online Dodge-ABS 37. Online Fretfulness 38. Online Itemization Structure 39. Online Nuptial 40. Online Symphony 41. Online Women Kibitzer 42. Ostentatious Storehouse Structure 43. Panchayathi Financial Aid 44. Paraquat Stockpile 45. Pragmatic Academy 46. Reckoning Inquisitor 47. Relevance to Scattered Precinct 48. Rescue Squad Overhaul Contributor
4. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113
Android application to locate and track mobile phones(aaltm) an implementati...eSAT Journals
Abstract
With the advancement of technology and modern science, people are expecting information about the location of any object for
tracking purposes. GPS is a system which has been implemented and is accessible without any restriction. Having the facility of
GPS, we need a GPS device to calculate the location from the information taken from GPS. This paper presents a study on
Location Based Services and is directed on locating and tracking of Android devices. In this implementation I am using Global
Positioning System (GPS) and Web Services, and android smart phone device since Android devices have a built-in feature of
GPS service. Some latest demanding tools and technology used for this implementation are Java, AVD, WAMP etc.
Keywords: Location Based Services; Global Positioning System (GPS); location; path
Abstract In today’s world time management is a big task. There could be the possibility that we may forget to do some important and urgent jobs which could results in a negative way for us. Also we have a trend of using smart phones supporting different tools and applications which could make our life simple. Today devices and phones run on many different types of operating systems such as IOS, Android etc. The proposed study is based on android based devices such as smart phones and tablets running on the Android operating system, since Android is designed to be an open source OS it gives a wide opportunity to any developer to develop and try different applications on such devices. In the proposed system we will discuss about the application which provides the service of automatic profile changing based on the user’s location from one to other (e.g. from normal to work mode or vice versa). It uses internet connection and GPS services to learn about the user’s current location and accordingly it updates the profile. Keywords—LBS, anroid OS, profile, GPS.
Location Provider with Privacy Using Localized Server and GPS Editor IJCATR
Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S Server which are susceptible to attacks and misuse as these data’s are not usually have any significant security so these data’s can be sold or misused by some other parties. We try to eliminate the problem as well as provided added functionality to the conventional maps by providing a customizable map which has the added functionality of offline use mode in addition to the online mode
This Presentation will give u information about Android :
1. Geocoding and Location Based Services Maps Finding Current Location Using Geocoder to get the current address of the user Plotting the current location on map
In current lifestyle people tend to waste a lot of time in doing unnecessary activities like watching movies, playing video games, window shopping, etc. Many a times they are not aware of the cumulative time they spend wastefully. They can use their time constructively if they were informed about it through a mobile app. In our project we aim to develop an app which helps in monitoring the amount of time spent in such activities at various locations and inform the user about the same through visual display on Google maps. This app displays the summary of the locations visited during the day along with timestamps for better analyzing of data.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
More Related Content
Similar to International Journal of Engineering Research and Development
Geo location based augmented reality applicationeSAT Journals
Abstract As the inception of mobile app development began, various applications of Augmented Reality that was once only restricted under the avenue of personal computers extended its domain to mobile applications and currently is used in the wide fields of gaming, education, navigation and so on. The exceptional data processing abilities which is possessed by smartphones in concert with its various services such as Global Positioning System (GPS), wireless networks, and compass have authorized Augmented Reality to find a very fruitful proposition in the wide spectrum of navigation based apps. The objective of the proposed work is to structure and design Geo based Augmented Reality application using GART toolkit. The paper initiates with explaining the various components used in a Geo AR app, exploring and explaining the various structure and features of the app and providing a spotlight on the deficiencies and future scope of the targeted developed app [1]. Keywords: Augmented Reality, Global Positioning System, Wireless Network, GART, Geo AR app
GPS (Global Positioning System) technology is widely known for its ability to track down devices in real time. Combined with mobile phones, it has become a very powerful tool with a great potential for future development of mobile GPS applications. The Interactive ZooOz Guide was a final year industry project
carried out by seven students from three separate courses to tackle a project that involves upgrading the Melbourne Zoo’s mapping system through the use of GPS technology. The aim of the project is to explore the potential capability of using GPS in the Zoo environment. The proposed system uses a PDA device
with a GPS receiver that tracks users’ location in real time as they are touring around the Zoo. In this paper, an insight into GPS technology is briefly reviewed and the design and implementation of “Interactive ZooOZ Guide” is described. Then GUI (Graphical User Interface) is presented in detail.
Finally conclusion is drawn from the “proof of concept” prototype.
IEEE PROJECT TOPICS & ABSTRACTS BY SOFTRONIICSaswin tbbc
Location based intelligent mobile organizer
Our Project Guidance Methods
We are following Waterfall Methodology for Project development and condition and it has been strictly followed by each guiding staffs and we have better knowledge in this field and updated with new innovative technologies. Our past students have found project work at our centers as a reliable, efficient, inexpensive and a fruitful learning experience. We provide Students about their project at various stages of their project through regular classes and also through detailed technical documentation that we provide in digital format.
Softroniics head the group of companies forwarding technical project guidance assistance by counting the creative levels exhibited and innovations offered by the team while delivering their services. Technical training obtainable at Softroniics often finds its sturdy capability of having immense experience in the sector they play; competitors remain far behind as satisfied students are the strongest strength of marketing as well as expansion of team Softroniics.
for more details..... contact us..........
softroniics
calicut || palakkad || coimbatore
9037061113 , 9037291113
www.softroniics.in
Java based project ideas from softroniics
1. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113 1. Aero Shuttle 2. Almanac Ascertain 3. Appositeness Intendance 4. Baccalaureate Gateway 5. Barristerial Atrium 6. Belligerent Tackle Hire Classification 7. Bistro Stipulation 8. Blemish Ascertainers 9. Bureaucrat Defended Entity 10. Cartel Communique 11. Cast Your Referendum 12. Clodhopper's Pal 13. Communal Contact_Abstract 14. Confrontation Reconnoiter 15. Convertible Leaflet Governance Explication 16. Digital Placard
2. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113 17. Disburse Mobile Scheme 18. Disposition Prospectus 19. e-Acquirements 20. E-Chain Communicator 21. E-Conscription 22. Electorate Conspiracy 23. Endowment Fathom 24. Enormous Employment 25. First-Rate Sanatorium 26. Grime Dissolution Scheme 27. Haulable Overhaul 28. Infobahn Vendue 29. Inure-Avocation Unit 30. Menage Swop 31. Misdemeanor Abjurer 32. Mobility Bill Defrayment
3. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113 33. Mortgage Scheme 34. Online Allegation 35. Online Burgeons Exposition 36. Online Dodge-ABS 37. Online Fretfulness 38. Online Itemization Structure 39. Online Nuptial 40. Online Symphony 41. Online Women Kibitzer 42. Ostentatious Storehouse Structure 43. Panchayathi Financial Aid 44. Paraquat Stockpile 45. Pragmatic Academy 46. Reckoning Inquisitor 47. Relevance to Scattered Precinct 48. Rescue Squad Overhaul Contributor
4. www.softroniics.in CALICUT || PALAKKAD Call: 9037291113
Android application to locate and track mobile phones(aaltm) an implementati...eSAT Journals
Abstract
With the advancement of technology and modern science, people are expecting information about the location of any object for
tracking purposes. GPS is a system which has been implemented and is accessible without any restriction. Having the facility of
GPS, we need a GPS device to calculate the location from the information taken from GPS. This paper presents a study on
Location Based Services and is directed on locating and tracking of Android devices. In this implementation I am using Global
Positioning System (GPS) and Web Services, and android smart phone device since Android devices have a built-in feature of
GPS service. Some latest demanding tools and technology used for this implementation are Java, AVD, WAMP etc.
Keywords: Location Based Services; Global Positioning System (GPS); location; path
Abstract In today’s world time management is a big task. There could be the possibility that we may forget to do some important and urgent jobs which could results in a negative way for us. Also we have a trend of using smart phones supporting different tools and applications which could make our life simple. Today devices and phones run on many different types of operating systems such as IOS, Android etc. The proposed study is based on android based devices such as smart phones and tablets running on the Android operating system, since Android is designed to be an open source OS it gives a wide opportunity to any developer to develop and try different applications on such devices. In the proposed system we will discuss about the application which provides the service of automatic profile changing based on the user’s location from one to other (e.g. from normal to work mode or vice versa). It uses internet connection and GPS services to learn about the user’s current location and accordingly it updates the profile. Keywords—LBS, anroid OS, profile, GPS.
Location Provider with Privacy Using Localized Server and GPS Editor IJCATR
Maps are an essential part of any handheld device and use constantly used for navigation and other resources by application for providing location based data which can be used for customized examination outcomes, however these data are conservatively stowed on a L.B.S Server which are susceptible to attacks and misuse as these data’s are not usually have any significant security so these data’s can be sold or misused by some other parties. We try to eliminate the problem as well as provided added functionality to the conventional maps by providing a customizable map which has the added functionality of offline use mode in addition to the online mode
This Presentation will give u information about Android :
1. Geocoding and Location Based Services Maps Finding Current Location Using Geocoder to get the current address of the user Plotting the current location on map
In current lifestyle people tend to waste a lot of time in doing unnecessary activities like watching movies, playing video games, window shopping, etc. Many a times they are not aware of the cumulative time they spend wastefully. They can use their time constructively if they were informed about it through a mobile app. In our project we aim to develop an app which helps in monitoring the amount of time spent in such activities at various locations and inform the user about the same through visual display on Google maps. This app displays the summary of the locations visited during the day along with timestamps for better analyzing of data.
Similar to International Journal of Engineering Research and Development (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
International Journal of Engineering Research and Development
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 9, Issue 12 (February 2014), PP. 05-12
5
Location Based Tracking
Sabyasachi Patra1
, Karishma Velisetty2
, Prathamesh Patel3
1
Mukesh Patel school of Technology and Management, Computer science, Mumbai, India
2
Mukesh Patel school of Technology and Management, Computer science, Mumbai, India
3
Mukesh Patel school of Technology and Management, Computer science, Mumbai, India
Abstract: - This paper delves into a canopy of details as well as the intricate ones w.r.t Android Location Based
services and route tracking. In this paper we present to you our ‘Route Tracker’ application. As the user travels
with an Android device, our Route Tracker application monitors the user’s location and bearing, visually
displaying a route on a map. The user touches the ‘Start Tracking’ toggle button to begin tracking a route. The
map shifts as the user moves, keeping the users current location centred on the screen. The route is basically a
red line with black dots appearing every 10 data points received by the application. The view can be changed
from ‘Street Map’ to ‘Satellite map’ as the user needs. As the user touches ‘Stop Tracking’ the app displays a
dialog containing the total distance travelled (in KMs and Miles) and the average speed (in KPH and MPH)
over the entire route.
Keywords:- Android, LBS, GPS, Google Maps, location based services, Route Tracking
I. INTRODUCTION
Nowadays, mobility is the most important criteria for a person/profession as such. Location based
information help to find a find the accurate information at the right time and place. LBS in mobile phones help
to visit places with complete information. With the help of wireless communication and location positioning
technologies, location based services is emerging in the mobile domain.
LBS have two major actions, viz. obtaining the location of user and utilizing this information to
provide a service
Fig. 1: LBS Architecture
LBS Categories:
Triggered LBS services (push services)
User-requested LBS services (pull services)
In a triggered (push) LBS service, the location of user's mobile device is retrieved when a condition set
in advance and is fulfilled and in a user-requested (pull) LBS service. The user decides whether and when to
retrieve the location of his/her mobile device and use it in the service [1][2][3].
2. Location Based Tracking
6
Fig. 2: LBS service models
Fig. 3: Architecture model
Applications of LBS:
1. Public safety or emergency services
2. Consumer services
3. Enterprise services
LBS Components:
• LBS Middleware
This wraps access to Core LBS Features (Location Tracking, GIS Provider and Location Collection Services) to
provide a consistent interface to LBS applications.
• Location Tracking
This component stores the location trace of individual users. This represents a fundamental
Component in next-generation LBS as it contains the data that allows a user’s route to be determined and
potentially predicted.
• GIS Provider
This component provides geospatial functionality for many LBSs including map information, map visualization
and directory services. Google Maps with its API can be considered a GIS provider.
• Location Collection Service
This component performs location collection to get a latitude and longitude for a specific user.
• Location Manager
Location Manager Class of android is present to manage all other components needed to establish a LBS system.
• Location Manager
Location Manager Class of android is present to manage all other components needed to establish a LBS system
[1][4][6].
3. Location Based Tracking
7
II. DEPLOYMENT
Obtaining the Google Map API keys:
To create a full-fledged application using Google Maps API, the developer will have to obtain a unique
API key from Google. Before this, Google requests a fingerprint that uniquely identifies your development
computer. It is basically the MD5 fingerprint of the Signing certificate.
The value of the String resource named ‘google_maps_api_key’ in the string.xml file holds the unique key value.
Steps:
1. Install and configure the Google Play services SDK
2. Add the Google Play services version to your app's manifest
3. Get an Android certificate and the Google Maps API key
4. Display your app's certificate information
5. Create an API project in the Google APIs Console
6. Obtain a Google Maps API key
7. Add the API key to your application [7].
Fig. 4: Satellite and Map Views
Sending GPS data to an AVD with GPX files:
This enables testing the app without having an actual android device (through the AVD Emulator in
Eclipse) to track. A file which contains GPS data/routes must be used in order to fulfil this. The data must be in
GPS Exchange Format (.gpx extension).
The following steps need to be performed:
1. Once the app is up on the AVD, select Window -> Open Perspective -> DDMS to switch perspectives
2. Select your AVD in the devices
3. Click the GPX tab under the Emulator control tab (on the top panel)
4. Click the LOAD GPX button and select your file
5. Select your file and press the PLAY button to
6. Send the GPS data to the AVD and START
III. TECHNOLOGIES USED
This section presents the technologies that we used in our Route Tracker App
AndroidManifest.xml features:
1) Google Maps API is a non-standard API, and hence the library’s name must be mentioned in the app’s
manifest with a uses-library element nested in the application-element.
2) Since most of our display is maps, we need to hide the title bar by using a standard Android theme. The
attribute android: theme needs to be tweaked in the activity element
3) The complete list of permissions required when the user installs the app on the mobile device. If these
permissions are not granted the app will not be installed.
4. Location Based Tracking
8
Class Toggle Button:
This basically (package android. Widget) maintains an on-off state. Initially displays the text START
TRACKING (On state). After the user selects it and presses it again, it toggles back to the off state – STOP
TRACKING.
Fig. 5(a): App Home Page (Start Tracking) Fig. 5(b) The Route tracking starts
Fig. 5(c): Display of Speed and distance covered
Classes Map Activity, Map View and Overlay:
1) The package com.google.android.maps contains the classes that we need to interact with the Google
Map API. Our main class is a subclass of MapActivity – an activity that manages a MapView for
displaying the maps obtained.
2) To display data on a map view Overlay class is used.
3) GeoPoints class is used to translate GPS data into points that can be used to re-centre the map based on
the user’s location and to draw the route
Location Data:
1) Package android. Location contains the classes and interfaces for acquiring and using location data.
5. Location Based Tracking
9
2) Location Manager: Access to device’s location and services. Depending on the device various location
providers may be supported.
3) A Location Provider can deliver requested updates to a Location Listener.
4) For receiving GPS data for tracking, we implement GpsStatus.Listener interface.
Programmatically determining the Device’s Display Size:
Class Display (package android. View) provides access to the device’s screen dimensions. We use these
dimensions to help scale the maps as we rotate them to match the user’s current bearing [4][7][8].
IV. ALGORITHM
1. START
2. RouteTracker subclass of MapActivity (RouteTracker.java -> Main class)
a. Override the method onCreate by FrameLayout, MapView and mapController classes.
Bearing Frame Layout = new Bearing Frame Layout(this,
getResources().getString(R.string.google_maps_api_key));FrameLayout main Layout
=(FrameLayout)findViewById(R.id.mainLayout);mainLayout.addView(bearingFrameLayout, 0);
b. Overriding Activity methods onStart and onStop
c. Location Listener call to Method updateLocation if (location != null && gpsFix) // location not null;
have GPS fix
{
// add the given Location to the route
routeOverlay.addPoint(location);
// if there is a previous location
if (previousLocation != null)
{
// add to the total distanceTraveled
distanceTraveled location.distanceTo(previousLocation);
} // end if
// get the latitude and longitude
Double latitude = location.getLatitude() * 1E6;
Double longitude = location.getLongitude() * 1E6;
// create GeoPoint representing the given Locations
d. Anonymous Inner Class LocationListener to respond to LocationManager Events
e. Anonymous Inner Class That implements GpsStatus.Listener to respond to GpsStatus Events
3. BearingFrameLayout subclass of FrameLayout
a. Method getChildLayoutparams to return LayoutParams object
b. Constructor class
mapView = new MapView(context, apiKey); // create new MapView
mapView.setClickable(true); // allow user interactions with the map
mapView.setEnabled(true); // enables the MapView to generate events
mapView.setSatellite(false); // display map image
// set MapView's layout mapView.setLayoutParams(getChildLayoutParams());
addView(mapView); // add MapView to this layout
c. Overriding View method DispatchDraw
4. RouteOverlay subclass of Overlay
a. Constructor
pathPaint = new Paint();
pathPaint.setAntiAlias(true);
pathPaint.setColor(Color.RED);
locations = new ArrayList<Location>(); // initialize points
positionPaint = new Paint();
positionPaint.setAntiAlias(true);
positionPaint.setStyle(Paint.Style.FILL);
6. Location Based Tracking
10
b. Overriding Overlay Method Draw reset the Overlay for tracking a new route
Draw this Overlay on top of the given Map View for each Location convert Location to Geo Point if
(previous != null) get Geo Point convert Geo Point add new point end if move to next location end else END
V. APPLICATION METRIC ANALYSIS
In this section we have basically done a complexity analysis of the algorithms/classes implemented for
getting the application up and running. We have tested the application on various parameters and presented the
results below, class wise.
Table I: Class Complexity Analysis (a)
Metric Total Mean Std. Dev.
Cyclomatic Complexity 1.2 0.4
BearingFrameLayout.java 1.2 0.4
- Dispatch Draw 2
- get Child Layout Params 1
- Bearing Frame layout 1
- Set Bearing 1
- Get Mapview 1
Number of parameters 0.8 0.748
Nested Block Depth 1.2 0.4
Depth of Inheritance Tree 4 0
Weighted methods per Class 6 6 0
Lack of Cohesion methods 0.75
Number of attributes 3 3 0
Number of methods 5 5 0
Number of classes 1
Table II: Class Complexity Analysis (b)
Metric Total Mean Std. Dev.
Cylcometric Complexity 1.615 0.923
RouteTracker.java 1.714 1.161
- Update Location 4
- On Option Item Selected 3
- On Create 1
- On Start 1
- on Stop 1
- is Route Displayed 1
- on Create Option Menu 1
- on Location Changed 2
- on Provider Disabled 1
- on Provider Enabled 1
- On status Changed 1
- On Gps Status Changed 2
- On Checked Changed 2
Number of Parameters 1 0.784
Nested Block Depth 13.08 0.606
Depth of Inheritance 2.25 2.165
Weighted Methods per Class 21 5.35 4.085
Lack of Cohesion of Methods 0.228 0.394
Number of attributes 14 3.5 6.062
Number of Static Attributes 3 0.75 1.299
Number of Methods 13 3.35 2.487
Number of Classes 4
Total Lines of Code 209
7. Location Based Tracking
11
Table III: Class Complexity Analysis (c)
VI. DEPLOYMENT CONSTRAINTS
1. Technology Constraints
For LBS to be operational on a large scale, mapping under the geographical information system (GIS)
needs to be more comprehensive than it is today. This raises significant challenges for improving the breadth and
the depth of the existing coverage of GIS. The most important factor in enabling the growth of LBS is wide
availability of cheap GPS enabled handsets. GPS enabled handsets are being manufactured now days. The issue
of cost remains to be tackled, since these phones are still all high-end units.
2. Infrastructure Constraints
One of the main problems is the lack of spread of the wireless network into the countryside. In
developing country like India, the wireless technology is in very nascent stage. In metro cities and areas, the
problem of network congestion is also an important issue. The percentage of service operators not meeting the
congestion rate benchmarks has risen substantially.
3. Market failure
One of the main constraints to the provision of value added services, in general, and LBS in particular, is
the market structure of the mobile industry and the failure to unleash the forces of competition. A key essential
need for LBS provision needs cross-network connections to be seamless, and the current practices go against a
cooperative attitude for LBS provision.
VII. CONCLUSION
In this paper we basically delved into the details of what Location based services actually are, their
architecture and why it is important for the generation of today. We also developed a basic support application
‘Route Tracker’ implementing LBS, Google Maps and Route Tracking. This application basically deals with
enabling the users to track their movements and get them displayed as a line. Developing the app required the use
of many internal as well as external technologies. Various classes from packages such as ‘com.google.android’
and ‘android. Location’ were used. Location management classes and display classes were used for
communication and display. The complexity of every implemented class is a good indication of the development
efforts. All in all, implementation of LBS for mobile involves an interesting combination of basic native Android
development as well as the working and integration of external Google API’s.
VIII. FUTURE WORK
1. Photo Tagging:
LBS can be used to tag the photos clicked from camera and can be showed on the map on
the location where they were clicked.
2. GPS device:
Extending the application with some distance algorithms like Dijikstra shortest path and
including more parameters like speed, distance, it can used for as a GPS.
Metric Total Mean Std. Dev.
Cyclometric Complexity 1.75 1.299
RouteOverlay.java
- Draw 4
- Route Overlay 1
- Add Point 1
- Reset 1
Number of Parameters 1 1.225
Nested Block Depth 1.5 0.866
Depth Of Inheritance Tree 2
Weighted methods per Class 7 7
Lack of Cohesion of Methods 0.583
Number of Attributes 4 4
Number of Methods 4 4
Number of classes 1
Total lines of code 77
8. Location Based Tracking
12
ACKNOWLEDGMENT
This research paper is made possible through the help and support from many people, and in essence, all sentient
beings. Especially, please allow me to dedicate my acknowledgment of gratitude towards our college Librarian
Mr. Pradip Das and his team. I would like to thank Mr. Anand Gawadekar of the NMIMS IEEE Committee due
to which we could get all requested references seamlessly without any trouble.
Finally, a sincere thanks to our college and Computer Science department for allowing us to enter the
field of research in our so important final year of B.Tech.
REFERENCES
[1]. Xianhua Shu, Zhenjun Du, Rong Chen,” Research on Mobile Location Service Design Based on
Android” Dalian, China
[2]. D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal 21, 1
(2003),20_27
[3]. Schwinger, W., Grin, C., Prll1, B., and Retschitzegger, W. A light-weight framework for location-based
services. In Lecture Notes in Computer Science (Berlin, 2005), Springer, pp. 206_210
[4]. Zeimpekis, V., Giaglis, G., and Lekakos, G. A taxonomy of indoor and outdoor positioning techniques
for mobile location services. SIGecom Exch. 3, 4 (2003), 19_27
[5]. Wei Duan ; Jianzhang Ma ; Chenhui Wang,”The research of Android System architecture and
application programming”, Harbin, 24-26 Dec. 2011, Computer Science and Network Technology
(ICCSNT), 2011 International Conference on (Volume:2)
[6]. John, N. ; Udayakumar, S. ; Gupta, R,” Generic framework for mobile application development”, Cisco
Syst. India (P) Ltd., Bangalore, India, 4-6 Nov. 2011
[7]. Android.http://en.wikipedia.orglwiki/Andr oid[EB/OL]. 2009.1 O
[8]. Web 2.0 Summit 2009: Evan Williams and John Battelle "A Conversation with Evan Williams",
O'Reilly Media, October 21, 2009