SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 11, November 2014)
1
A Tracking System using Location Prediction and
Dynamic Threshold for Minimising Message
Delivery
Ettaboina Sharanya DR.M.Nagaratna (Ph.D)
M.Tech (Information Technology) Assistant professor, Dept of CSE
JNTUCEH, Hyderabad. JNTUCEH, Hyderabad
Abstract: Cellular text electronic messaging services area unit
progressively being relied upon to broadcast crucial data
throughout emergencies. Accordingly, a good vary of
organizations together with faculties and universities currently
partner with third-party suppliers that promise to improve
physical security by apace delivering such messages. Sadly, these
products don't work as publicised because of limitations of
cellular infrastructure and thus give a false sense of security to
their users. During this paper, we have a tendency to perform the
primary extensive investigation associate degreed
characterization of the restrictions of an Emergency Alert System
(EAS) mistreatment text messages as a security incident response
mechanism. we have a tendency to show emergency alert systems
designed on text electronic messaging not solely will meet the ten
minute delivery requirement mandated by the WARN Act,
however conjointly doubtless cause different voice and SMS
traffic to be blocked at rates upward of 80 percent. We have a
tendency to then show that our results area unit representative of
reality by scrutiny them to variety of documented however not
previously understood failures. Finally, we have a tendency to
analyze a targeted electronic messaging mechanism as a way of
with efficiency mistreatment presently deployed infrastructure
and third-party EAS. In thus doing, we have a tendency to
demonstrate that this progressively deployed security
infrastructure will not deliver the goods its expressed needs for
giant populations.
Keywords: emergency alert system, sms, EAS
1. INTRODUCTION
TEXT messaging allows individuals to transmit short,
alphanumeric communications for a wide variety of
applications. Whether to coordinate meetings catch up on
gossip, offer reminders of an event or even vote for a
contestant on a television game show, this discreet form of
communication is now the dominant service offered by
cellular networks. In fact, in the United States alone, over
accordingly, SMS messaging is now viewed by many as a
reliable method of communication when all other means
appear unavailable. In response to this perception, a number of
companies offer SMS-based emergency messaging services.
Touted as able to deliver critical information colleges,
universities, and even municipalities hoping to coordinate and
protect the physical security of the general public have spent
tens of millions of dollars to install such systems.
Unfortunately, these products will not work as advertised and
provide a false sense of security to their users while many of
the applications of this service can be considered noncritical,
the use of text messaging during emergency events has proven
to be far more utilitarian.
In this paper, we explore the limitations of third-
party Emergency Alert Systems (EAS). In particular, we show
that because of the currently deployed cellular infrastructure,
such systems will not be able to deliver a high volume of
emergency messages in a short period of time. This identifies
a key failure in a critical security incident response and
recovery mechanism and demonstrates its inability to properly
function during the security events for which it was ostensibly
designed.
2. SENDING A MESSAGE
There are a number of ways in which text messages can be
injected into a GSM or CDMA network. While most users are
only familiar with sending a text message from their phone,
known as Mobile Originated SMS (MO-SMS), service
providers offer an expanding set of interfaces through which
messages can be sent. From the Internet, for instance, it is
possible to send text messages to mobile devices through a
number of web pages, e-mail, and even instant messaging
software. Third parties can also access the network using so-
called SMS Aggregators. These servers, which can be
connected directly to the phone network or communicate via
the Internet, are typically used to send “bulk” or large
quantities of text messages. Aggregators typically inject
messages on behalf of other companies and charge their
clients for the service. Finally, most providers have
established relationships between each other to allow for
messages sent from one network to be delivered in the other.
After entering a provider’s network, messages are sent to the
Short Messaging Service Center (SMSC). SMSCs perform
operations similar to e-mail handling servers in the Internet,
and store and forward messages to their appropriate
destinations. Because messages can be injected into the
network from so many external sources, SMSCs typically
perform aggressive spam filtering on all incoming messages.
All messages passing this filtering are then converted and
copied into the necessary SMS message format and encoding
and then placed into a queue to be forwarded to their final
destination.
International Journal of Ethics in Engineering & Management Education
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 11, November 2014)
2
3. FINDING A DEVICE
Delivering messages in a cellular network is a much greater
challenge than in the traditional Internet. Chief in this
difficulty is that users in a cellular network tend to be mobile,
so it is not possible to assume that users will be located where
we last found them. Moreover, the information about a user’s
specific location is typically limited. For instance, if a mobile
device is not currently exchanging messages with a base
station, the network may only know a client’s location at a
very coarse level (i.e., the mobile device may be known to be
in a specific city, but no finer grained location information
would be known). Accordingly, the SMSC needs to first find
the general location for a message’s intended client before
anything else can be done.
4. PROPOSED WORK
Client: The mobile requests its location from the positioning
system periodically and sends it through the communication
network to the server, (Who are near in accident).A location
based service is an information service that can be accessed
using the mobile device through the mobile network and
utilizes the ability to make use of geographical positions of the
mobile device. The user can request the location of an accident
place.
GPS: Every time the mobile phone updates the user location
in the server, it requests the location of the user from the GPS.
The GPS determines the longitude and the latitude
(geographical) and sends them to the mobile phone.
Server: The server receives users alert message after receiving
the message, the server side that is Traffic Monitoring Centre
(TMC) check the what type of message it is any emergency
,after checking make to find an corresponding location of the
accident place through GPS, and after founding the location to
make an call to the corresponding service.
GSM and Database: The database contains all users
subscribed in the service with their receiving message,
(received message will stored in database) after receiving the
message, we are finding the location of the corresponding
accident location.GSM modem is a specialized type of modem
which accepts a SIM card, and operates over a subscription to
a mobile operator, just like a mobile phone. From the mobile
operator perspective, a GSM modem looks just like a mobile
phone. Importing the comm Driver and connecting the Modem
to the PC with serial port.
Fig 1: GSM modem
5. CONCLUSION
Cellular networks are more and more turning into the first
means of communication throughout emergencies. Riding the
widely control perception that text electronic messaging could
be a reliable method of quickly distributing messages, an
oversized range of colleges, universities, and municipalities
have spent tens of millions of bucks to deploy third-party EAS
over cellular systems. However, this security incident response
and recovery mechanism merely doesn't work as publicised.
Through modelling, a series of experiments and corroborating
evidence from real-world tests, we've shown that these
networks cannot meet the ten minute alert goal mandated by
the general public EAS charter and therefore the WARN Act.
Moreover, we've incontestable that the additional text
messaging traffic generated by third-party EAS can cause
congestion within the network and will probably block upward
of eighty of traditional requests, probably including calls
between emergency responders or the general public to 9-1-1
services. Consequently, it's vital that legislators, technologists,
and therefore the general public perceive the fundamental
limitations of this mechanism to safeguard physical security
and public safety which future solutions are totally evaluated
before deployed.
6. FUTURE WORK
In future we can add acknowledgement to the current
application. By using this we can get the status of our message
like whether it is delivered or not. If it is delivered we can get
an acknowledgement like message delivered longitude and
latitude values are generated successfully.
REFERENCES
[1] H. H. Lee, I. K. Park, and K. S. Hong, “Design and implementation of
a mobile devices-based real-time location tracking,” in Proc.
UBICOMM, 2008, pp. 178–183.
[2] Z. Tian, J. Yang, and J. Zhang, “Location-based services applied to an
electric wheelchair based on the GPS and GSM networks,” in Proc.
ISA,2009, pp. 1–4.
[3] I. Lita, I. B. Cioc, and D. A. Visan, “A new approach of automobile
localization system using GPS and GSM/GPRS transmission,” in Proc.
ISSE, 2006, pp. 115–119.
[4] P. Perugu, “An innovative method using GPS tracking, WINS
technologies for border security and tracking of vehicles,” in Proc.
RSTSCC, 2010, pp. 130–133.
[5] S. A. Hameed, O. Khalifa, M. Ershad, F. Zahudi, B. Sheyaa, and W.
Asender, “Car monitoring, alerting, and tracking model: Enhancement
with mobility and database facilities,” in Proc. ICCCE, 2010, pp. 1–5.
[6] R. E. Anderson, A. Poon, C. Lustig, W. Brunette, G. Borriello, and B.
E. Kolko, “Building a transportation information system using only
GPS and basic SMS infrastructure,” in Proc. ICTD, 2009, pp. 233–242.
[7] W. J. Choi and S. Tekinay, “Location-based services for next-
generation wireless mobile networks,” in Proc. IEEE VTC, 2003, pp.
1988–1992.
[8] R. E. Anderson, W. Brunette, E. Johnson, C. Lustig, A. Poon, C.
Putnam, O. Salihbaeva, B. E. Kolko, and G. Borrielllo, “Experiences
with a transportation information system that uses only GPS and SMS,”
in Proc. ICTD, 2010.
[9] A. Civilis, C. S. Jensen, and S. Pakalnis, “Techniques for efficient
roadnetwork- based tracking of moving objects,” IEEE Trans. Knowl.
Data Eng., vol. 17, no. 5, pp. 698–712, 2005.

More Related Content

What's hot

SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETijgca
 
Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...
Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...
Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...Yi-Hsueh Tsai
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...IJERA Editor
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...IJECEIAES
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Timely Emergency Notification Systems
Timely Emergency Notification SystemsTimely Emergency Notification Systems
Timely Emergency Notification Systemsmonacofamily
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
 
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446IJRAT
 
Comparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile GenerationsComparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile Generationsijtsrd
 

What's hot (18)

SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANETSCRUTINY OF BROADCASTING PROTOCOLS IN VANET
SCRUTINY OF BROADCASTING PROTOCOLS IN VANET
 
Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...
Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...
Proximity-based Service Beyond 4G Network: Peer-aware discovery and communica...
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...
 
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
Design Approach for Vehicle To Vehicle (V2V) Dissemination of Messages in Veh...
 
Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...Error rate detection due to primary user emulation attack in cognitive radio ...
Error rate detection due to primary user emulation attack in cognitive radio ...
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Timely Emergency Notification Systems
Timely Emergency Notification SystemsTimely Emergency Notification Systems
Timely Emergency Notification Systems
 
267 272
267 272267 272
267 272
 
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...
 
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsDepiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous Systems
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
Comparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile GenerationsComparative Study on Mobile Switching Center of Mobile Generations
Comparative Study on Mobile Switching Center of Mobile Generations
 

Viewers also liked

Gv icrtedc 04
Gv icrtedc 04Gv icrtedc 04
Gv icrtedc 04IJEEE
 
Control analysis of a high frequency resonant inverter for induction cooking ...
Control analysis of a high frequency resonant inverter for induction cooking ...Control analysis of a high frequency resonant inverter for induction cooking ...
Control analysis of a high frequency resonant inverter for induction cooking ...eSAT Journals
 
Li fi (light fidelity) – the changing scenario of wireless communication
Li fi (light fidelity) – the changing scenario of wireless communicationLi fi (light fidelity) – the changing scenario of wireless communication
Li fi (light fidelity) – the changing scenario of wireless communicationeSAT Journals
 
A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...eSAT Journals
 
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...IJEEE
 
Mobile Phone Handset Radiation Effect on Brainwave Signal using EEG: A Review
Mobile Phone Handset Radiation  Effect on Brainwave Signal using EEG:  A Review Mobile Phone Handset Radiation  Effect on Brainwave Signal using EEG:  A Review
Mobile Phone Handset Radiation Effect on Brainwave Signal using EEG: A Review IJEEE
 
Battery charging using thermoelectric generation module in automobiles
Battery charging using thermoelectric generation module in automobilesBattery charging using thermoelectric generation module in automobiles
Battery charging using thermoelectric generation module in automobileseSAT Journals
 
Portable device for women security
Portable device for women securityPortable device for women security
Portable device for women securityeSAT Journals
 
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Speed Control of PMBLDC Motor using LPC 2148 – A Practical Approach
Speed Control of PMBLDC Motor using  LPC 2148 – A Practical Approach  Speed Control of PMBLDC Motor using  LPC 2148 – A Practical Approach
Speed Control of PMBLDC Motor using LPC 2148 – A Practical Approach IJEEE
 
A LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATOR
A LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATORA LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATOR
A LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATORIJEEE
 
Analysis of rc framed structures with central and partial openings in masonry...
Analysis of rc framed structures with central and partial openings in masonry...Analysis of rc framed structures with central and partial openings in masonry...
Analysis of rc framed structures with central and partial openings in masonry...eSAT Journals
 
I0503 01 6670
I0503 01 6670I0503 01 6670
I0503 01 6670IJMER
 
Women security application
Women security applicationWomen security application
Women security applicationAkshay Surve
 
Wireless sensor network system for inclination measurement using spirit level
Wireless sensor network system for inclination measurement using spirit levelWireless sensor network system for inclination measurement using spirit level
Wireless sensor network system for inclination measurement using spirit levelIJMER
 
Comparative analysis of improved high performance direct power control of thr...
Comparative analysis of improved high performance direct power control of thr...Comparative analysis of improved high performance direct power control of thr...
Comparative analysis of improved high performance direct power control of thr...eSAT Journals
 

Viewers also liked (18)

Gv icrtedc 04
Gv icrtedc 04Gv icrtedc 04
Gv icrtedc 04
 
Control analysis of a high frequency resonant inverter for induction cooking ...
Control analysis of a high frequency resonant inverter for induction cooking ...Control analysis of a high frequency resonant inverter for induction cooking ...
Control analysis of a high frequency resonant inverter for induction cooking ...
 
Li fi (light fidelity) – the changing scenario of wireless communication
Li fi (light fidelity) – the changing scenario of wireless communicationLi fi (light fidelity) – the changing scenario of wireless communication
Li fi (light fidelity) – the changing scenario of wireless communication
 
A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...A hybrid approach for ipfc location and parameters optimization for congestio...
A hybrid approach for ipfc location and parameters optimization for congestio...
 
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
PERFORMANCE EVALUATION OF BER FOR AWGN, AWGN MULTIPATH AND RAYLEIGH FADING CH...
 
Mobile Phone Handset Radiation Effect on Brainwave Signal using EEG: A Review
Mobile Phone Handset Radiation  Effect on Brainwave Signal using EEG:  A Review Mobile Phone Handset Radiation  Effect on Brainwave Signal using EEG:  A Review
Mobile Phone Handset Radiation Effect on Brainwave Signal using EEG: A Review
 
Id62
Id62Id62
Id62
 
Battery charging using thermoelectric generation module in automobiles
Battery charging using thermoelectric generation module in automobilesBattery charging using thermoelectric generation module in automobiles
Battery charging using thermoelectric generation module in automobiles
 
Portable device for women security
Portable device for women securityPortable device for women security
Portable device for women security
 
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
Speed Control of PMBLDC Motor using LPC 2148 – A Practical Approach
Speed Control of PMBLDC Motor using  LPC 2148 – A Practical Approach  Speed Control of PMBLDC Motor using  LPC 2148 – A Practical Approach
Speed Control of PMBLDC Motor using LPC 2148 – A Practical Approach
 
A LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATOR
A LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATORA LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATOR
A LOW POWER, LOW PHASE NOISE CMOS LC OSCILLATOR
 
Analysis of rc framed structures with central and partial openings in masonry...
Analysis of rc framed structures with central and partial openings in masonry...Analysis of rc framed structures with central and partial openings in masonry...
Analysis of rc framed structures with central and partial openings in masonry...
 
I0503 01 6670
I0503 01 6670I0503 01 6670
I0503 01 6670
 
Women security application
Women security applicationWomen security application
Women security application
 
Id136
Id136Id136
Id136
 
Wireless sensor network system for inclination measurement using spirit level
Wireless sensor network system for inclination measurement using spirit levelWireless sensor network system for inclination measurement using spirit level
Wireless sensor network system for inclination measurement using spirit level
 
Comparative analysis of improved high performance direct power control of thr...
Comparative analysis of improved high performance direct power control of thr...Comparative analysis of improved high performance direct power control of thr...
Comparative analysis of improved high performance direct power control of thr...
 

Similar to Ijeee 1-2-a tracking system using location prediction and dynamic threshold for minimising message delivery

Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM SecurityAnkit Mulani
 
This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...Michelle Love
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingEditor IJCATR
 
Sms based event notification system
  Sms based event notification system  Sms based event notification system
Sms based event notification systemAlexander Decker
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
 
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...cscpconf
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and HashingPallavi Agarwal
 
Picture Exchange Communication System
Picture Exchange Communication SystemPicture Exchange Communication System
Picture Exchange Communication SystemAshley Thomas
 
Cz3210711074
Cz3210711074Cz3210711074
Cz3210711074IJMER
 
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...pharmaindexing
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysisidescitation
 

Similar to Ijeee 1-2-a tracking system using location prediction and dynamic threshold for minimising message delivery (20)

Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
Wireless Communication - GSM Security
Wireless Communication - GSM SecurityWireless Communication - GSM Security
Wireless Communication - GSM Security
 
This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...
 
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMSLITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Vehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic RoutingVehicular Messaging In IOT Using Epidemic Routing
Vehicular Messaging In IOT Using Epidemic Routing
 
Sms based event notification system
  Sms based event notification system  Sms based event notification system
Sms based event notification system
 
Fb34942946
Fb34942946Fb34942946
Fb34942946
 
Mim
MimMim
Mim
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...
 
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
 
VANET: Trust and Hashing
VANET: Trust and HashingVANET: Trust and Hashing
VANET: Trust and Hashing
 
Sub1590
Sub1590Sub1590
Sub1590
 
Picture Exchange Communication System
Picture Exchange Communication SystemPicture Exchange Communication System
Picture Exchange Communication System
 
P47
P47P47
P47
 
Cz3210711074
Cz3210711074Cz3210711074
Cz3210711074
 
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
A STRATEGY FOR DEFENDING PACKETS AGAINST RECOGNIZED INTERNAL JAMMERS IN WIREL...
 
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An AnalysisChallenging Issues in VANET Network and its Routing Algorithms-An Analysis
Challenging Issues in VANET Network and its Routing Algorithms-An Analysis
 

More from Kumar Goud

Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkKumar Goud
 
Ijeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesIjeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesKumar Goud
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
 
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsIjeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsKumar Goud
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingKumar Goud
 
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Kumar Goud
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Kumar Goud
 
layout impact of resolution enhancement in design for manufacturing dfm- in ...
layout impact of resolution enhancement in design for manufacturing  dfm- in ...layout impact of resolution enhancement in design for manufacturing  dfm- in ...
layout impact of resolution enhancement in design for manufacturing dfm- in ...Kumar Goud
 
a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...Kumar Goud
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...Kumar Goud
 
transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...Kumar Goud
 
go green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiago green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiaKumar Goud
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...Kumar Goud
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureKumar Goud
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...Kumar Goud
 
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...Kumar Goud
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationKumar Goud
 

More from Kumar Goud (20)

Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
 
Ijeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesIjeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission lines
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsIjeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
 
layout impact of resolution enhancement in design for manufacturing dfm- in ...
layout impact of resolution enhancement in design for manufacturing  dfm- in ...layout impact of resolution enhancement in design for manufacturing  dfm- in ...
layout impact of resolution enhancement in design for manufacturing dfm- in ...
 
a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
 
transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...
 
go green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiago green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in india
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
 
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Ijeee 1-2-a tracking system using location prediction and dynamic threshold for minimising message delivery

  • 1. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 11, November 2014) 1 A Tracking System using Location Prediction and Dynamic Threshold for Minimising Message Delivery Ettaboina Sharanya DR.M.Nagaratna (Ph.D) M.Tech (Information Technology) Assistant professor, Dept of CSE JNTUCEH, Hyderabad. JNTUCEH, Hyderabad Abstract: Cellular text electronic messaging services area unit progressively being relied upon to broadcast crucial data throughout emergencies. Accordingly, a good vary of organizations together with faculties and universities currently partner with third-party suppliers that promise to improve physical security by apace delivering such messages. Sadly, these products don't work as publicised because of limitations of cellular infrastructure and thus give a false sense of security to their users. During this paper, we have a tendency to perform the primary extensive investigation associate degreed characterization of the restrictions of an Emergency Alert System (EAS) mistreatment text messages as a security incident response mechanism. we have a tendency to show emergency alert systems designed on text electronic messaging not solely will meet the ten minute delivery requirement mandated by the WARN Act, however conjointly doubtless cause different voice and SMS traffic to be blocked at rates upward of 80 percent. We have a tendency to then show that our results area unit representative of reality by scrutiny them to variety of documented however not previously understood failures. Finally, we have a tendency to analyze a targeted electronic messaging mechanism as a way of with efficiency mistreatment presently deployed infrastructure and third-party EAS. In thus doing, we have a tendency to demonstrate that this progressively deployed security infrastructure will not deliver the goods its expressed needs for giant populations. Keywords: emergency alert system, sms, EAS 1. INTRODUCTION TEXT messaging allows individuals to transmit short, alphanumeric communications for a wide variety of applications. Whether to coordinate meetings catch up on gossip, offer reminders of an event or even vote for a contestant on a television game show, this discreet form of communication is now the dominant service offered by cellular networks. In fact, in the United States alone, over accordingly, SMS messaging is now viewed by many as a reliable method of communication when all other means appear unavailable. In response to this perception, a number of companies offer SMS-based emergency messaging services. Touted as able to deliver critical information colleges, universities, and even municipalities hoping to coordinate and protect the physical security of the general public have spent tens of millions of dollars to install such systems. Unfortunately, these products will not work as advertised and provide a false sense of security to their users while many of the applications of this service can be considered noncritical, the use of text messaging during emergency events has proven to be far more utilitarian. In this paper, we explore the limitations of third- party Emergency Alert Systems (EAS). In particular, we show that because of the currently deployed cellular infrastructure, such systems will not be able to deliver a high volume of emergency messages in a short period of time. This identifies a key failure in a critical security incident response and recovery mechanism and demonstrates its inability to properly function during the security events for which it was ostensibly designed. 2. SENDING A MESSAGE There are a number of ways in which text messages can be injected into a GSM or CDMA network. While most users are only familiar with sending a text message from their phone, known as Mobile Originated SMS (MO-SMS), service providers offer an expanding set of interfaces through which messages can be sent. From the Internet, for instance, it is possible to send text messages to mobile devices through a number of web pages, e-mail, and even instant messaging software. Third parties can also access the network using so- called SMS Aggregators. These servers, which can be connected directly to the phone network or communicate via the Internet, are typically used to send “bulk” or large quantities of text messages. Aggregators typically inject messages on behalf of other companies and charge their clients for the service. Finally, most providers have established relationships between each other to allow for messages sent from one network to be delivered in the other. After entering a provider’s network, messages are sent to the Short Messaging Service Center (SMSC). SMSCs perform operations similar to e-mail handling servers in the Internet, and store and forward messages to their appropriate destinations. Because messages can be injected into the network from so many external sources, SMSCs typically perform aggressive spam filtering on all incoming messages. All messages passing this filtering are then converted and copied into the necessary SMS message format and encoding and then placed into a queue to be forwarded to their final destination.
  • 2. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 11, November 2014) 2 3. FINDING A DEVICE Delivering messages in a cellular network is a much greater challenge than in the traditional Internet. Chief in this difficulty is that users in a cellular network tend to be mobile, so it is not possible to assume that users will be located where we last found them. Moreover, the information about a user’s specific location is typically limited. For instance, if a mobile device is not currently exchanging messages with a base station, the network may only know a client’s location at a very coarse level (i.e., the mobile device may be known to be in a specific city, but no finer grained location information would be known). Accordingly, the SMSC needs to first find the general location for a message’s intended client before anything else can be done. 4. PROPOSED WORK Client: The mobile requests its location from the positioning system periodically and sends it through the communication network to the server, (Who are near in accident).A location based service is an information service that can be accessed using the mobile device through the mobile network and utilizes the ability to make use of geographical positions of the mobile device. The user can request the location of an accident place. GPS: Every time the mobile phone updates the user location in the server, it requests the location of the user from the GPS. The GPS determines the longitude and the latitude (geographical) and sends them to the mobile phone. Server: The server receives users alert message after receiving the message, the server side that is Traffic Monitoring Centre (TMC) check the what type of message it is any emergency ,after checking make to find an corresponding location of the accident place through GPS, and after founding the location to make an call to the corresponding service. GSM and Database: The database contains all users subscribed in the service with their receiving message, (received message will stored in database) after receiving the message, we are finding the location of the corresponding accident location.GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. Importing the comm Driver and connecting the Modem to the PC with serial port. Fig 1: GSM modem 5. CONCLUSION Cellular networks are more and more turning into the first means of communication throughout emergencies. Riding the widely control perception that text electronic messaging could be a reliable method of quickly distributing messages, an oversized range of colleges, universities, and municipalities have spent tens of millions of bucks to deploy third-party EAS over cellular systems. However, this security incident response and recovery mechanism merely doesn't work as publicised. Through modelling, a series of experiments and corroborating evidence from real-world tests, we've shown that these networks cannot meet the ten minute alert goal mandated by the general public EAS charter and therefore the WARN Act. Moreover, we've incontestable that the additional text messaging traffic generated by third-party EAS can cause congestion within the network and will probably block upward of eighty of traditional requests, probably including calls between emergency responders or the general public to 9-1-1 services. Consequently, it's vital that legislators, technologists, and therefore the general public perceive the fundamental limitations of this mechanism to safeguard physical security and public safety which future solutions are totally evaluated before deployed. 6. FUTURE WORK In future we can add acknowledgement to the current application. By using this we can get the status of our message like whether it is delivered or not. If it is delivered we can get an acknowledgement like message delivered longitude and latitude values are generated successfully. REFERENCES [1] H. H. Lee, I. K. Park, and K. S. Hong, “Design and implementation of a mobile devices-based real-time location tracking,” in Proc. UBICOMM, 2008, pp. 178–183. [2] Z. Tian, J. Yang, and J. Zhang, “Location-based services applied to an electric wheelchair based on the GPS and GSM networks,” in Proc. ISA,2009, pp. 1–4. [3] I. Lita, I. B. Cioc, and D. A. Visan, “A new approach of automobile localization system using GPS and GSM/GPRS transmission,” in Proc. ISSE, 2006, pp. 115–119. [4] P. Perugu, “An innovative method using GPS tracking, WINS technologies for border security and tracking of vehicles,” in Proc. RSTSCC, 2010, pp. 130–133. [5] S. A. Hameed, O. Khalifa, M. Ershad, F. Zahudi, B. Sheyaa, and W. Asender, “Car monitoring, alerting, and tracking model: Enhancement with mobility and database facilities,” in Proc. ICCCE, 2010, pp. 1–5. [6] R. E. Anderson, A. Poon, C. Lustig, W. Brunette, G. Borriello, and B. E. Kolko, “Building a transportation information system using only GPS and basic SMS infrastructure,” in Proc. ICTD, 2009, pp. 233–242. [7] W. J. Choi and S. Tekinay, “Location-based services for next- generation wireless mobile networks,” in Proc. IEEE VTC, 2003, pp. 1988–1992. [8] R. E. Anderson, W. Brunette, E. Johnson, C. Lustig, A. Poon, C. Putnam, O. Salihbaeva, B. E. Kolko, and G. Borrielllo, “Experiences with a transportation information system that uses only GPS and SMS,” in Proc. ICTD, 2010. [9] A. Civilis, C. S. Jensen, and S. Pakalnis, “Techniques for efficient roadnetwork- based tracking of moving objects,” IEEE Trans. Knowl. Data Eng., vol. 17, no. 5, pp. 698–712, 2005.