This document describes a location-based tracking system that uses SMS and GPS to minimize the number of SMS transmissions while maintaining location tracking accuracy. It proposes a method called Location-Based Delivery (LBD) that combines SMS and GPS. LBD uses location prediction based on speed and bearing to estimate future location, and only sends SMS updates if the actual location differs from the predicted location by more than a dynamic threshold. This threshold is adjusted based on speed to maintain accuracy while reducing SMS messages. Simulations show LBD significantly lowers SMS transmissions compared to other methods while keeping location accuracy within acceptable ranges.
Location Fingerprinting is a very familiar Wi-Fi positioning method, which determines a device by retrieving the information recorded containing the location fingerprint. These methods deploy the signal strength (RSS) to predict the coordinate. There are feedbacks for using the absolute RSS either the absolute RSS in a time interval may not be representable of the IEEE 802.11 signal, as the signal may fluctuate or a manual error prone calibration is needed across different mobile platform. The main target is to propose the use of Fourier descriptors in LF. We convert the IEEE 802.11b Wi-Fi signal into a Fourier domain. Then, the Fourier descriptors are used to predict the location by applying the K-Nearest Neighbor algorithm. The results show that the effectiveness of LF methods based on Fourier descriptors lead to substantially more accurate and robust localization.
A Comparative Study on Profile Based Location Management for Personal Communi...IJERA Editor
Location of the mobile user is registered to the two databases for call tracking and those registration processes basis much network traffic. By this speed of Call delivery reduced and location updating cost improved. In this paper, the first method a new meek location management by registering Representative VLR of group of certain VLRs regionally and broadcasting for searching a mobile user, so called rVLR-B.This The representative VLR of several VLRs and register mobile users’ location. When set up the call path between mobile users, the VLR of the caller inquiries callee’s rVLR for searching the location of callee instead of demanding to VLR of callee. And then rVLR broadcast the callee’s location to all VLR of the region simultaneously. Location registration is only performed when a mobile user visits a new rVLR network area from present area. Using the rVLR-B, the cost of maintaining location of mobile users was abridged. The second technique for reducing the costs during the location tracking and location update is proposed. Taking the regular movement pattern of the users it produces the block and the user registers with the HLR only after crossing the block instead of crossing the single cell. The block register (BR) is introduced between the block and the HLR in two level systems to preserve the blocks, thus creates three level architecture. In this architecture some signaling cost values between the MSC-BR, BRHLR and BR-BR are maintained to get the better enactment. By the rVLR-B and BR the performance of speed of call delivery improved and location updation will be diminished. Keywords: Home Location Register, Visitor Location Register, Mobile Switching Center, Base Station, Block Register, Mobile Station, r-VLR- Representative VLR
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
Location Fingerprinting is a very familiar Wi-Fi positioning method, which determines a device by retrieving the information recorded containing the location fingerprint. These methods deploy the signal strength (RSS) to predict the coordinate. There are feedbacks for using the absolute RSS either the absolute RSS in a time interval may not be representable of the IEEE 802.11 signal, as the signal may fluctuate or a manual error prone calibration is needed across different mobile platform. The main target is to propose the use of Fourier descriptors in LF. We convert the IEEE 802.11b Wi-Fi signal into a Fourier domain. Then, the Fourier descriptors are used to predict the location by applying the K-Nearest Neighbor algorithm. The results show that the effectiveness of LF methods based on Fourier descriptors lead to substantially more accurate and robust localization.
A Comparative Study on Profile Based Location Management for Personal Communi...IJERA Editor
Location of the mobile user is registered to the two databases for call tracking and those registration processes basis much network traffic. By this speed of Call delivery reduced and location updating cost improved. In this paper, the first method a new meek location management by registering Representative VLR of group of certain VLRs regionally and broadcasting for searching a mobile user, so called rVLR-B.This The representative VLR of several VLRs and register mobile users’ location. When set up the call path between mobile users, the VLR of the caller inquiries callee’s rVLR for searching the location of callee instead of demanding to VLR of callee. And then rVLR broadcast the callee’s location to all VLR of the region simultaneously. Location registration is only performed when a mobile user visits a new rVLR network area from present area. Using the rVLR-B, the cost of maintaining location of mobile users was abridged. The second technique for reducing the costs during the location tracking and location update is proposed. Taking the regular movement pattern of the users it produces the block and the user registers with the HLR only after crossing the block instead of crossing the single cell. The block register (BR) is introduced between the block and the HLR in two level systems to preserve the blocks, thus creates three level architecture. In this architecture some signaling cost values between the MSC-BR, BRHLR and BR-BR are maintained to get the better enactment. By the rVLR-B and BR the performance of speed of call delivery improved and location updation will be diminished. Keywords: Home Location Register, Visitor Location Register, Mobile Switching Center, Base Station, Block Register, Mobile Station, r-VLR- Representative VLR
Understanding Vehicular Ad-hoc Networks and Use of Greedy Routing Protocolijsrd.com
Vehicular Ad Hoc Networks (VANET) belong to a subclass of Mobile ad hoc networks . VANET provides a distinguished approach for Intelligent Transport System (ITS). VANET has become an active area of research and development since it has tremendous potential to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. In this paper we discuss the characteristics and architecture of VANET. Further we provide an overview of Greedy Perimeter Stateless Routing Protocol. Efficient routing protocols are essential for smart ITS.
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
It has been a big concern for many people and government to reduce the amount of road accident specially in Malaysia since it could be a big threat to this country. Malaysian government has spent millions of money in order to reduce the number of accident occurrence through several modes of campaign. Unfortunately, from years to years the number keeps increasing. The lack of a comprehensive accident recording and analysis system in Malaysia can be effective in these kinds of problems. By making use of IRAS (Intelligent Road Accident System), the police would be control and manage whole accident events as a real-time monitoring system. This system exploits WiMAX and GPRS communications to connect to the server for transfer the specific data to the data center. This system can be used for a comprehensive intelligent GIS-based solution for accident analysis and management. The system is developed based on object and aspect oriented software design such as .NET technology.
A NOVEL AND COST EFFECTIVE APPROACH TO PUBLIC VEHICLE TRACKING SYSTEMijujournal
There are lots of efforts being made by public transport corporations to improve public vehicle occupancy
by requesting the public to use public transport over other modes of transportation. It can be noted that if
the passenger knows with high confidence that the bus is going to come, he/she will definitely wait rather
than opting for other modes of transport. Efficient information can therefore help the users to choose faster
and more easier connections which saves their time. Trends in wireless technology like Global System for
Mobile communication (GSM) and Radio Frequency Identification (RFID) have resulted in easier and
faster communication. This paper presents a vehicle tracking system by integrating both of the above
mentioned technologies. The central server uses geographic information system (GIS) to track vehicles to
display the position information on the electronic map. This paper suggests a new cost-effective way for
tracking a vehicle in public transport domain and compares proposed technique to some of the methods
advised previously for tracking public vehicles.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Novel based Approach Schema for Processing Vehicle Tracking System through GP...ijtsrd
In recent years many systems are approached to track the vehicles in order to find out movement of any equipped vehicle from any location at any time. This paper implements formalised schema to develop a tracking system that is much cost effective that available in the market. Various technologies utilised are GPS Global Positioning System module to get geographic coordinates at regular time intervals. The GSM GPRS Global System Positioning General Packet Radio Service module is used to transmit and update the vehicle location to a database. The Google Maps API is used to display the vehicle position on the map in the Smartphone application. The tracking system here helps to identify the location of the college bus through our smart phone when a SMS Short Message Service is sent to a personal number thus indicating the bus location via SMS. By incorporating a GPS and GSM modem the location of the device by sending a SMS to the number specified. No external server or internet connection is used in knowing the location at user end which in return reduces the cost. We can also use this technology to reduce our time whenever we are waiting for buses by knowing their location on our mobile phones. If vehicle has been stolen then also we can track our vehicles. Sermakani. A. M | Veena. T | Julia Faith. S "Novel based Approach Schema for Processing Vehicle Tracking System through GPS SMS Gateways" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd20205.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/20205/novel-based-approach-schema-for-processing-vehicle-tracking-system-through-gps-sms-gateways/sermakani-a-m
-> Explanation of various techniques for Localization like Triangulation and Proximity Based Techniques. (OTDOA/ AOA/ GSM Fingerprinting/Hybrid technologies, etc.)
-> Working of GPS and its drawbacks.
-> AGPS- working and advantages.
-> E911 call processing in AGPS.
->Location Based Services in 4G
This ppt is about Automatic Vehicle Locator (AVL),which is a means of determining the geographic location of a vehicle and transmitting this info to a point where it can be stored & used with certain software and database applications.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
More Related Content
Similar to Location Based Tracking System for Emergency Services
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
It has been a big concern for many people and government to reduce the amount of road accident specially in Malaysia since it could be a big threat to this country. Malaysian government has spent millions of money in order to reduce the number of accident occurrence through several modes of campaign. Unfortunately, from years to years the number keeps increasing. The lack of a comprehensive accident recording and analysis system in Malaysia can be effective in these kinds of problems. By making use of IRAS (Intelligent Road Accident System), the police would be control and manage whole accident events as a real-time monitoring system. This system exploits WiMAX and GPRS communications to connect to the server for transfer the specific data to the data center. This system can be used for a comprehensive intelligent GIS-based solution for accident analysis and management. The system is developed based on object and aspect oriented software design such as .NET technology.
A NOVEL AND COST EFFECTIVE APPROACH TO PUBLIC VEHICLE TRACKING SYSTEMijujournal
There are lots of efforts being made by public transport corporations to improve public vehicle occupancy
by requesting the public to use public transport over other modes of transportation. It can be noted that if
the passenger knows with high confidence that the bus is going to come, he/she will definitely wait rather
than opting for other modes of transport. Efficient information can therefore help the users to choose faster
and more easier connections which saves their time. Trends in wireless technology like Global System for
Mobile communication (GSM) and Radio Frequency Identification (RFID) have resulted in easier and
faster communication. This paper presents a vehicle tracking system by integrating both of the above
mentioned technologies. The central server uses geographic information system (GIS) to track vehicles to
display the position information on the electronic map. This paper suggests a new cost-effective way for
tracking a vehicle in public transport domain and compares proposed technique to some of the methods
advised previously for tracking public vehicles.
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Novel based Approach Schema for Processing Vehicle Tracking System through GP...ijtsrd
In recent years many systems are approached to track the vehicles in order to find out movement of any equipped vehicle from any location at any time. This paper implements formalised schema to develop a tracking system that is much cost effective that available in the market. Various technologies utilised are GPS Global Positioning System module to get geographic coordinates at regular time intervals. The GSM GPRS Global System Positioning General Packet Radio Service module is used to transmit and update the vehicle location to a database. The Google Maps API is used to display the vehicle position on the map in the Smartphone application. The tracking system here helps to identify the location of the college bus through our smart phone when a SMS Short Message Service is sent to a personal number thus indicating the bus location via SMS. By incorporating a GPS and GSM modem the location of the device by sending a SMS to the number specified. No external server or internet connection is used in knowing the location at user end which in return reduces the cost. We can also use this technology to reduce our time whenever we are waiting for buses by knowing their location on our mobile phones. If vehicle has been stolen then also we can track our vehicles. Sermakani. A. M | Veena. T | Julia Faith. S "Novel based Approach Schema for Processing Vehicle Tracking System through GPS SMS Gateways" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd20205.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/20205/novel-based-approach-schema-for-processing-vehicle-tracking-system-through-gps-sms-gateways/sermakani-a-m
-> Explanation of various techniques for Localization like Triangulation and Proximity Based Techniques. (OTDOA/ AOA/ GSM Fingerprinting/Hybrid technologies, etc.)
-> Working of GPS and its drawbacks.
-> AGPS- working and advantages.
-> E911 call processing in AGPS.
->Location Based Services in 4G
This ppt is about Automatic Vehicle Locator (AVL),which is a means of determining the geographic location of a vehicle and transmitting this info to a point where it can be stored & used with certain software and database applications.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Location Based Tracking System for Emergency Services
1. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 836 - 838, 2014, ISSN:- 2319–8656
www.ijcat.com 836
Location Based Tracking System for Emergency
Services
T. Swathi
Aurora’s Technological and Reaserch Institute
Uppal, Hyderabad
India
B.S. Malleswari
Aurora’s Technological and Research Institute
Uppal, Hyderabad
India.
Abstract Transmitting the geo-location information of a target via wireless networks is effective when both the target and the
tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is
unable to access Wi-Fi, it is impossible to perform location tracking. Therefore, SMS is a relatively more reliable and flexible
solution because of its widespread use. In this system, a device is equipped with a global system for mobile communications
(GSM) modem and a GPS unit. It transmits short messages containing its GPS coordinates to the server at 30-s intervals.
Although transmitting the geo-location information of a target via wireless networks is effective when both the target and the
tracker are within Wi-Fi coverage area, the 802.11 wireless networks are not always accessible. When the target or the tracker is
unable to access Wi-Fi, it is impossible to perform location tracking. In this System, a novel method called location-based
delivery (LBD), which combines the short message service (SMS) and global position system (GPS). LBD reduces the number of
short message transmissions while maintaining the location tracking accuracy within the acceptable range. The proposed
approach, LBD, consists of three primary features: Short message format, location prediction, and dynamic threshold. The
defined short message format is proprietary.
Key Words: Short Message Service (SMS), Location Tracking, Mobile Phones, Prediction Algorithms, Global Positioning
System (GPS).
1. INTRODUCTION
Location based tracking and handling the devices is based
on the global position system (GPS) is common in the
growing world, and therefore, several location tracking
applications have been developed, including continuous
location based transport, system or vehicle based intelligent
transport, monitoring vehicles, tracking elders, children’s
and women employees for their safety reasons or to prevent
them from the being lost. The GPS is mainly used to obtain
geographical location of the object (e.g., a transmitter
devices or mobile devices). However, most of the above-
citedworks used either an 802.11 wireless network or the
short messageservice (SMS) to transmit the location
information of a targetto a tracker. Real time tracking
system is majorly used for care management applications
for
children and mentally challenged people; the main aim of
the system is to transfer the location and position of the
objective to the mobile device to a central GPS application
server through the 802.11 wireless networks. This
application allows the server to simultaneously monitor
multiple targets (e.g., elders or children), this is in line with
Lee et al.Further, Choi et al. assumed that the location
information of a targets transmitted through wireless
networks. Their work focused on proposing a geolocation
update scheme to decrease the update. Frequency. Lita et
al. proposed an automobile localization system by using
SMS.The proposed system, which is interconnectedwith the
car alarm system, transmits alerts to theowner’s mobile
phone in the event of a car theft (e.g., activationof the car
alarm, starting of the engine) or provides informationfor
monitoring adolescent drivers (e.g., exceeding the
speedlimit or leaving a specific area). Hameed et al.
proposed a carmonitoring and tracking system that uses
both SMS and GPSto prevent car theft. Anderson et al.
proposed a transportationinformation system . In this
system, a hardware device called Star Box, which is
equipped with a global system for mobile communications
(GSM) modem and a GPS unit, is installed in a vehicle to
track the vehicle’s location. Star Box transmits short
messages containing its GPS coordinates to the server at30-
s intervals. The users can send short messages to the server
to determine the expected arrival time of buses at their
locations. Although transmitting the geolocation
information of a targetvia wireless networks is effective
when both the target and the tracker are within Wi-Fi
coverage area, the 802.11 wireless networksare not always
accessible. When the target or the trackeris unable to access
Wi-Fi, it is impossible to perform locationtracking.
Therefore, SMS is a relatively more reliable and
flexiblesolution because of its widespread use (i.e., well-
structuredworldwide) [6], [8]. However, SMS is a user-pay
service.
The objective of this study is to minimize the transmission
cost ofa tracking system by minimizing the number of SMS
transmissionswhile maintaining the location tracking
accuracy.
In this paper, a novel method called location-based delivery
(LBD), which combines SMS and GPS, is proposed, and
further, a realistic system to perform precise location
trackingis developed. LBD mainly applies the following
two proposedtechniques: Location prediction and dynamic
threshold. Locationprediction is performed by using the
current location, movingspeed, and bearing of the target to
predict its next location.When the distance between the
predicted location and theactual location exceeds a certain
2. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 836 - 838, 2014, ISSN:- 2319–8656
www.ijcat.com 837
threshold, the target transmitsa shortmessage to the tracker
to update its current location. Thedynamic threshold
maintains the location tracking accuracy andnumber of
short messages on the basis of the moving speed ofthe
target.The simulations performed to test the performance of
LBD show that compared with other related works; the
proposed LBD minimizes the number of short message
transmissions while maintaining the location prediction
accuracy within the acceptable range.
Figure-1 Overview of location based
tracking.
2. SHORT MESSAGE SERVICE
SMS is a text messaging service component of phone, web,
or mobile communication systems, using standardized
communications protocols that allow the exchange of short
text messages between fixed line or mobile phone
devices. SMS text messaging is the most widely used data
application in the world, with 3.6 billion active users, or
78% of all mobile phone subscribers. A short message is
transmitted from the mobile station (MS) to the GSM base
station (BTS) through a wireless link and is received in the
backbone network of the service provider. The mobile
switch center (MSC), home location register (HLR), and
visitor location register (VLR) determine the appropriate
short message service center (SMSC), which processes the
message by applying the “store and forward” mechanism.
The term SMS is used as a synonym for all types of short
text messaging as well as the user activity itself in many
parts of the world. SMS is also being used as a form of
direct marketing known as SMS marketing. SMS as used
on modern handsets originated from radio telegraphy in
radio memo pagers using standardized phone protocols and
later defined as part of the GSM (Global System for Mobile
Positioning) series of standards in 1985 as a means of
sending messages of up to 160 characters, to and from
GSM mobile handsets. Since then, support for the service
has expanded to include other mobile technologies such as
ANSI CDMA networks and digital AMPs, as well as
satellite and landline networks. Most SMS messages are
mobile-to-mobile text messages though the standard
supports other types of broadcast messaging as well.
3. LOCATION BASED DELIVERY
Location based services (LBS) a novel class of computer
application, which combines the short message services
(SMS) and global position system (GPS). As such LBS is
an informative service and number of uses in social
networking today as an entertainment service, which is
accessible with mobile devices through the mobile network
and which uses information on the geographical position of
the mobile device.
Figure-2 Structure of the LBD systeem.
The proposed approach, LBD, consists of three
primary features: Shortmessage format, location prediction,
and dynamic threshold. The defined short message format
is proprietary. Location prediction isperformed by using the
current location, moving speed, and bearing of the target to
predict its next location. When the distance between the
predicted location and the actual location exceeds a certain
threshold, the target transmits a short message to the
trackerto update its current location. The threshold is
dynamically adjusted to maintain the location tracking
accuracy and the numberof short messages on the basis of
themoving speed of the target. It satisfactorily maintains
the location tracking accuracy with relatively fewer
messages.The threshold is dynamically adjusted to
maintain the location tracking accuracy.
4. CONCLUSION:
In this System, a novel method called location-based
delivery (LBD), which combines the short message service
(SMS) and global position system (GPS). LBD reduces the
number of short message transmissions while maintaining
the location tracking accuracy within the acceptable range.
The proposed approach, LBD, consists of three primary
features: Short message format, location prediction, and
dynamic threshold. The defined short message format is
proprietary. Location prediction is performed by using the
current location, moving speed, and bearing of the target to
predict its next location. When the distance between the
predicted location and the actual location exceeds a certain
threshold, the target transmits a short message to the
trackerto update its current location. The threshold is
dynamically adjusted to maintain the location tracking
accuracy and the number of short messages on the basis of
the moving speed of the target.
3. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 836 - 838, 2014, ISSN:- 2319–8656
www.ijcat.com 838
5. REFERENCES
[1] H. H. Lee, I. K. Park, and K. S. Hong, “Design and
implementation ofa mobile devices-based real-time
location tracking,” in Proc. UBICOMM, 2008, pp. 178–
183.
[2] Z. Tian, J. Yang, and J. Zhang, “Location-based
services applied to aelectric wheelchair based on the GPS
and GSM networks,” in Proc. ISA,2009, pp. 1–4.
[3] I. Lita, I. B. Cioc, and D. A. Visan, “A new approach of
automobile localizationsystem using GPS and GSM/GPRS
transmission,” in Proc. ISSE,2006, pp. 115–119.
[4] P. Perugu, “An innovative method using GPS tracking,
WINS technologiesfor border security and tracking of
vehicles,” in Proc. RSTSCC, 2010, pp. 130–133.
[5] S. A. Hameed, O. Khalifa, M. Ershad, F. Zahudi, B.
Sheyaa, and W.Asender, “Car monitoring, alerting, and
tracking model: Enhancementwith mobility and database
facilities,” in Proc. ICCCE, 2010, pp. 1–5.
[6] R. E. Anderson, A. Poon, C. Lustig, W. Brunette, G.
Borriello, and B. E.Kolko, “Building a transportation
information system using only GPS andbasic SMS
infrastructure,” in Proc. ICTD, 2009, pp. 233–242.
[7] W. J. Choi and S. Tekinay, “Location-based services for
next-generationwireless mobile networks,” in Proc. IEEE
VTC, 2003, pp. 1988–1992.
[8] R. E. Anderson, W. Brunette, E. Johnson, C. Lustig, A.
Poon, C. Putnam,
O. Salihbaeva, B. E. Kolko, and G. Borrielllo,
“Experiences with atransportation information system that
uses only GPS and SMS,” in Proc.ICTD, 2010.
[9] A. Civilis, C. S. Jensen, and S. Pakalnis, “Techniques
for efficient roadnetwork-based tracking of moving
objects,” IEEE Trans. Knowl.DataEng., vol. 17, no. 5, pp.
698–712, 2005.
[10] M. Zahaby, P. Gaonjur, and S. Farajian, “Location
tracking in GPS usingKalman filter through SMS,” in Proc.
IEEE EUROCON, 2009, pp. 1707–1711.
[11] A. Civilis, C. S. Jensen, J. Nenortaite, and S. Pakalnis,
“Efficient trackingof moving objects with precision
guarantees,” in Proc. MOBIQUITOUS,2004, pp. 164–173.
[12] Y. Y. Xiao, H. Zhang, and H. Y. Wang, “Location
prediction for trackingmoving objects based on grey
theory,” in Proc. FSKD, 2007, pp. 390–394.
[13] P. H. Tseng, K. T. Feng, Y. C. Lin, and C. L. Chen,
“Wireless locationtracking algorithms for environments
with insufficient signal sources,”IEEE Trans. Mobile
Comput., vol. 8, no. 12, pp. 1676–1689, 2009.
[14] R. Bajaj, S. L. Ranaweera, and D. P. Agrawal, “GPS:
Location-trackingtechnology,” Computer, vol. 35, no. 4,
pp. 92–94, 2002.
[15] Movable Type Scripts. (2012 June).[Online].
Available: http://www.mova
ble-type.co.uk/scripts/latlong.html