This document summarizes a research paper that designed and implemented a location-based mobile application to provide local information to users. The application allows users to select the type, amount, and region of local information they want to view based on their current or specified location. The application was implemented with secure coding techniques to protect user information and system resources from attacks. Key features included categorizing local information, setting display preferences, and separating server and client modules for increased security.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
Abstract In today’s world time management is a big task. There could be the possibility that we may forget to do some important and urgent jobs which could results in a negative way for us. Also we have a trend of using smart phones supporting different tools and applications which could make our life simple. Today devices and phones run on many different types of operating systems such as IOS, Android etc. The proposed study is based on android based devices such as smart phones and tablets running on the Android operating system, since Android is designed to be an open source OS it gives a wide opportunity to any developer to develop and try different applications on such devices. In the proposed system we will discuss about the application which provides the service of automatic profile changing based on the user’s location from one to other (e.g. from normal to work mode or vice versa). It uses internet connection and GPS services to learn about the user’s current location and accordingly it updates the profile. Keywords—LBS, anroid OS, profile, GPS.
A Review: Machine vision and its ApplicationsIOSR Journals
Abstract:The machine vision has been used in the industrial machine designing by using the intelligent character recognition. Due to its increased use, it makes the significant contribution to ensure the competitiveness in modern development. The state of art in machine vision inspection and a critical overview of applications in various industries are presented in this paper. In its restricted sense it is also known as the computer vision or the robot vision. This paper gives the overview of Machine Vision Technology in the first section, followed by various industrial application and thefuture trends in Machine Vision. Keywords:CCD- charged coupled devices, Fruit harvesting system, HIS- Hue Saturation Intensity, Image analysis, Image enhancement, Image feature extraction, Image feature classification processing, Intelligent Vehicle tracking , Isodiscriminationn Contour, Machine Vision
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
Abstract In today’s world time management is a big task. There could be the possibility that we may forget to do some important and urgent jobs which could results in a negative way for us. Also we have a trend of using smart phones supporting different tools and applications which could make our life simple. Today devices and phones run on many different types of operating systems such as IOS, Android etc. The proposed study is based on android based devices such as smart phones and tablets running on the Android operating system, since Android is designed to be an open source OS it gives a wide opportunity to any developer to develop and try different applications on such devices. In the proposed system we will discuss about the application which provides the service of automatic profile changing based on the user’s location from one to other (e.g. from normal to work mode or vice versa). It uses internet connection and GPS services to learn about the user’s current location and accordingly it updates the profile. Keywords—LBS, anroid OS, profile, GPS.
A Review: Machine vision and its ApplicationsIOSR Journals
Abstract:The machine vision has been used in the industrial machine designing by using the intelligent character recognition. Due to its increased use, it makes the significant contribution to ensure the competitiveness in modern development. The state of art in machine vision inspection and a critical overview of applications in various industries are presented in this paper. In its restricted sense it is also known as the computer vision or the robot vision. This paper gives the overview of Machine Vision Technology in the first section, followed by various industrial application and thefuture trends in Machine Vision. Keywords:CCD- charged coupled devices, Fruit harvesting system, HIS- Hue Saturation Intensity, Image analysis, Image enhancement, Image feature extraction, Image feature classification processing, Intelligent Vehicle tracking , Isodiscriminationn Contour, Machine Vision
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
Blackberry Messenger is one of the popularly used instant messaging applications on Android with user’s amount that increase significantly each year. The increase off Blackberry Messenger users might lead to application misuse, such as for commiting digital crimes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Therefore, a research on current forensic tool’s performance in order to handle digital crime cases involving Android smartphones and Blackberry Messenger in particular need to be done. This research focuses on evaluating and comparing three forensic tools to obtain digital evidence from Blackberry Messenger on Android smartphones using parameter from National Institute of Standard Technology and Blackberry Messenger’s acquired digital evidences. The result shows that from comparative analysis conducted, Andriller gives 25% performance value, Oxygen Forensic Suite gives 100% performance value, and Autopsy 4.1.1 gives 0% performance value. Related to National Institute of Standard Technology parameter criterias, Andriller has performance value of 47.61%. Oxygen Forensic Suite has performance value of 61.90%. Autopsy 4.1.1 has performance value of 9.52%.
An Android Application on AITR Management and Bus Tracking SystemYogeshIJTSRD
An ARMA is an Android based app that tracks a variety of student activities such as online E Book availability, real time bus monitoring, Covid 19 case information, Note alerts, college feedback, and events. The app accurately pinpoints the current position using the GPS feature, which is available on most smart phones today. The bus driver will update the bus location on the server, and students will then use GPS to locate the bus on a map. As a college information system, this software can be used. For a given client or member of staff. It is based on the firebase online database system. ARMA uses Firebase Authentication to provide secure Login Signup features for various modules. Arshi Sheikh | Priyanshu Dhameniya "An Android Application on AITR Management and Bus -Tracking System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39914.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39914/an-android-application-on-aitr-management-and-bus-tracking-system/arshi-sheikh
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...CSCJournals
The transportation challenges experienced in major cities as a result of influx of people in search of greener pastures is increasing on a daily basis. This results in an increase in the number of cars plying and competing for driving space on narrow roads. Many drivers violate traffic laws as a result of this and how to prosecute them without chasing them remains an issue to be addressed. Therefore, this research presents a model that can be used to solve this challenge using machine learning algorithms. The model consists of recognition modules such as image acquisition, Gaussian blur, localization of car plate, character segmentation and optical character recognition of car plate. K-NN Algorithm was used for training licensed plate font type spanning A-Z and 0-9 while the speed tracking module used a camera which is automatically self-initiated to track the speed of any moving object within its range of focus. The performance of the model was evaluated using metrics such as recognition accuracy, positive prediction value, negative prediction value, specificity and sensitivity. A tracking accuracy of 82% was achieved.
Banking managment
Bug Tracking
Chat-Server-system
College Information System
CourierInformationSystem
CYBER_SHOPPING
Data Centric Knowledge Management System
Distributed Cycle Minimization Protocol
E-COMMERCE Mechanism
Finance Managment
Global intractive solutins
Health Center System
IntranetChatting
MobileService management
NetConferening
online order processing system with AJAX enabled
OnLineExam process
web based Manufacturing
WEBREPORTING PROCESS
Andhra Pradesh State Finance Corporation (APSFC)
Classifieds
Customer Relationship Management for AIRLINE Industry
DataMart Management Software
E Procurement System
e-Classifieds
Ecommerce shopping cart
Elearn
Employee Resource Info sys
ENTERPRISE REOURCE PLANNING MANAGEMENT
e-Shopping
E-TRANSACTION_Totalproj
EWheelz
EzeeMail system
foresty management system
Fuji Distribution
global communication
GLOBAL COMMUNICATION MEDIA
Google map-wc
GovtSchemes-wc
human resource management system
Info ware Services
Insurance
Intranet Mailing System
Intrusion Detection System over Abnormal Internet Sequence
Lending Tree
Master and Science Research Center
Matrimony.com
MediTracker
MingleSpot
net-banking
On-line java compiler with security editor
ONLINE_EXAMS_POJECT
OnlineBanking
OnlineLibrary
PayRoll
Pharmacy system
product service management system
Project online music application
project status info system
project status information system
Resource out Sourcing
ResourcePlanner
SecuredNetAuction
ShoutBox
smartcard
SpeedAge
Status Information System
StockAnalyzer
stores management system
TelecomConnectionSystem-wc
Univesity Admission System
Web-Based Library
Smart Card: A study of new invention on bus fare in Dhaka cityMd. Abdul Munem
Technology is developing day to day. So we have to be familiar with technology. Digital payment system
is one of them. Our government will launch a pilot project for transportation under 22 buses on 42 routes.
It will be better if the smart card will included in that project. In the term paper I have focused the problems
we faced on public transport.
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a
behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show
that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly
detection in mobile devices.
Taking into consideration the drivers’ state might be a serious challenge for designing new advanced driver
assistance systems. During this paper we present a driver assistance system strongly coupled to the user. Driver
Assistance by Augmented Reality for Intelligent Automotive is an augmented reality interface informed by a several
sensors. Communicating the presence of pedestrians or bicyclists to vehicle drivers may end up in safer interactions
with these vulnerable road users. Advanced knowledge about the presence of these users on the roadway is
particularly important when their presence isn't expected or when these users are out of range of the advanced safety
systems that are becoming a daily feature in vehicles today. For example, having advanced knowledge of a pedestrian
walking along a rural roadway is important to increasing driver awareness through in-vehicle warning messages that
provide an augmented version of the roadway ahead. Voice recognition system through an android platform adds
some good flavour during this project. The strategy of voice recognition through this platform is achieved by
converting the input voice signal into text of string and subsequently it's transmitted to embedded system which
contains an arduino atmega328 microcontroller through Bluetooth as a technique of serial communication between an
android application and a control system. The received text string on an arduino is also displayed on the AR Glass. As
connected vehicles start to enter the market, it's conceivable that when the vehicle sensors detect a pedestrian on a
rural roadway, the pedestrian presence is also communicated to vehicles upstream of the pedestrian location that
haven't reached the destination. This paper presents a survey of studies related to perception and cognitive attention
of drivers when this information is presented on Augmented Reality
A mobile application which can save time, effort and money by giving technical video explanation based on the recognized image for learners. The collected video information contains all the detailed explanation of the scanned image done by the user. This application groups Augmented reality , 3d objects , sound , video , AI for image recognition into an easy and compact application for the benefit of the every learner. This web application is built C#, UNITY, VUFORIA with the help of Vuforia server connected by asserts. This mobile application serves as an easier way to access details and documentaries related to recognized object. It includes an automatic AR Camera and image target along with the video player which makes it easier for recognizing the image and to learn. The database is done with Vuforia cloud database. The UI provides an excellent user friendly environment that makes the communication more interactive.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
The Android application is widely used in all
sectors. In our application it helps to track the
location of the bus. By waiting near the bus stop
for a long time this application helps to reduce the
waiting time of the students using Google map. The
arrival time of a bus is calculated based upon the
pickup point and the starting time of a bus in the
shuttle routes. Providing the accurate bus timing
will be helpful for all the students, staff to catch the
bus at the right time. In a college bus driver is
assigned with a mobile phone where we can use to
track the current location of the bus. Notification
will be sending to the students and parents once
the bus is nearby pick up point and drop point by
using Geo-fencing. Quick Response code is used to
track the attendance of the student whether they
boarded the bus at the pickup point. Common
alert message will be sent to students, staffs and
faculty about the holidays or any crucial
information.
Geo-fencing, Google map, GPS
(Global Positioning System)
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
Smartphone usage has reached its peak. There has be
en a tremendous growth in the number of people
migrating from PCs to smart phones. Numerous scenar
ios such as loss of a phone, phone theft etc., can
lead to unauthorized use of one’s own smartphone. T
his raises the concern for securing personal and
private data. This project proposes a light weight
two level user identification scheme to recognize a
nd
authenticate the mobile phone based on the device h
olding and usage patterns. To validate the proposed
scheme, an application is created which takes a ges
ture input characterized by time of swiping the scr
een,
finger pressure, phone movements and location of sw
ipe on the screen through X and Y co-ordinate. A
threshold based matching scheme performs classifica
tion to find the true owner. Results show that the
scheme was able to achieve 90% true positives and 1
0% false positives with a 0.5% of battery usage.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
Abstract: - Data Mining is a process used to extract the usable data from a larger set of any raw data. It involves
analyzing data patterns in large batches of data using one or more software. R is a programming language for the
purpose of statistical computations and data analysis. The R language is widely used by the data miners and
statisticians on high dimensional pattern extraction. R is freely available under the GNU General Public Licenses
and the source code is written in FORTAN, C and R.It is a GNU project. The pre-compiled binary versions are
freely available for various flavours of operating system. R is basically command line interface (CLI) and various
GUI interfaces are also available now a day. In this articlefocuses the concept of R like; getting data into and out of
R and packages related to data mining and data visualization.
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
Blackberry Messenger is one of the popularly used instant messaging applications on Android with user’s amount that increase significantly each year. The increase off Blackberry Messenger users might lead to application misuse, such as for commiting digital crimes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Therefore, a research on current forensic tool’s performance in order to handle digital crime cases involving Android smartphones and Blackberry Messenger in particular need to be done. This research focuses on evaluating and comparing three forensic tools to obtain digital evidence from Blackberry Messenger on Android smartphones using parameter from National Institute of Standard Technology and Blackberry Messenger’s acquired digital evidences. The result shows that from comparative analysis conducted, Andriller gives 25% performance value, Oxygen Forensic Suite gives 100% performance value, and Autopsy 4.1.1 gives 0% performance value. Related to National Institute of Standard Technology parameter criterias, Andriller has performance value of 47.61%. Oxygen Forensic Suite has performance value of 61.90%. Autopsy 4.1.1 has performance value of 9.52%.
An Android Application on AITR Management and Bus Tracking SystemYogeshIJTSRD
An ARMA is an Android based app that tracks a variety of student activities such as online E Book availability, real time bus monitoring, Covid 19 case information, Note alerts, college feedback, and events. The app accurately pinpoints the current position using the GPS feature, which is available on most smart phones today. The bus driver will update the bus location on the server, and students will then use GPS to locate the bus on a map. As a college information system, this software can be used. For a given client or member of staff. It is based on the firebase online database system. ARMA uses Firebase Authentication to provide secure Login Signup features for various modules. Arshi Sheikh | Priyanshu Dhameniya "An Android Application on AITR Management and Bus -Tracking System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39914.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39914/an-android-application-on-aitr-management-and-bus-tracking-system/arshi-sheikh
A Model for Car Plate Recognition & Speed Tracking (CPR-STS) using Machine Le...CSCJournals
The transportation challenges experienced in major cities as a result of influx of people in search of greener pastures is increasing on a daily basis. This results in an increase in the number of cars plying and competing for driving space on narrow roads. Many drivers violate traffic laws as a result of this and how to prosecute them without chasing them remains an issue to be addressed. Therefore, this research presents a model that can be used to solve this challenge using machine learning algorithms. The model consists of recognition modules such as image acquisition, Gaussian blur, localization of car plate, character segmentation and optical character recognition of car plate. K-NN Algorithm was used for training licensed plate font type spanning A-Z and 0-9 while the speed tracking module used a camera which is automatically self-initiated to track the speed of any moving object within its range of focus. The performance of the model was evaluated using metrics such as recognition accuracy, positive prediction value, negative prediction value, specificity and sensitivity. A tracking accuracy of 82% was achieved.
Banking managment
Bug Tracking
Chat-Server-system
College Information System
CourierInformationSystem
CYBER_SHOPPING
Data Centric Knowledge Management System
Distributed Cycle Minimization Protocol
E-COMMERCE Mechanism
Finance Managment
Global intractive solutins
Health Center System
IntranetChatting
MobileService management
NetConferening
online order processing system with AJAX enabled
OnLineExam process
web based Manufacturing
WEBREPORTING PROCESS
Andhra Pradesh State Finance Corporation (APSFC)
Classifieds
Customer Relationship Management for AIRLINE Industry
DataMart Management Software
E Procurement System
e-Classifieds
Ecommerce shopping cart
Elearn
Employee Resource Info sys
ENTERPRISE REOURCE PLANNING MANAGEMENT
e-Shopping
E-TRANSACTION_Totalproj
EWheelz
EzeeMail system
foresty management system
Fuji Distribution
global communication
GLOBAL COMMUNICATION MEDIA
Google map-wc
GovtSchemes-wc
human resource management system
Info ware Services
Insurance
Intranet Mailing System
Intrusion Detection System over Abnormal Internet Sequence
Lending Tree
Master and Science Research Center
Matrimony.com
MediTracker
MingleSpot
net-banking
On-line java compiler with security editor
ONLINE_EXAMS_POJECT
OnlineBanking
OnlineLibrary
PayRoll
Pharmacy system
product service management system
Project online music application
project status info system
project status information system
Resource out Sourcing
ResourcePlanner
SecuredNetAuction
ShoutBox
smartcard
SpeedAge
Status Information System
StockAnalyzer
stores management system
TelecomConnectionSystem-wc
Univesity Admission System
Web-Based Library
Smart Card: A study of new invention on bus fare in Dhaka cityMd. Abdul Munem
Technology is developing day to day. So we have to be familiar with technology. Digital payment system
is one of them. Our government will launch a pilot project for transportation under 22 buses on 42 routes.
It will be better if the smart card will included in that project. In the term paper I have focused the problems
we faced on public transport.
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a
behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show
that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly
detection in mobile devices.
Taking into consideration the drivers’ state might be a serious challenge for designing new advanced driver
assistance systems. During this paper we present a driver assistance system strongly coupled to the user. Driver
Assistance by Augmented Reality for Intelligent Automotive is an augmented reality interface informed by a several
sensors. Communicating the presence of pedestrians or bicyclists to vehicle drivers may end up in safer interactions
with these vulnerable road users. Advanced knowledge about the presence of these users on the roadway is
particularly important when their presence isn't expected or when these users are out of range of the advanced safety
systems that are becoming a daily feature in vehicles today. For example, having advanced knowledge of a pedestrian
walking along a rural roadway is important to increasing driver awareness through in-vehicle warning messages that
provide an augmented version of the roadway ahead. Voice recognition system through an android platform adds
some good flavour during this project. The strategy of voice recognition through this platform is achieved by
converting the input voice signal into text of string and subsequently it's transmitted to embedded system which
contains an arduino atmega328 microcontroller through Bluetooth as a technique of serial communication between an
android application and a control system. The received text string on an arduino is also displayed on the AR Glass. As
connected vehicles start to enter the market, it's conceivable that when the vehicle sensors detect a pedestrian on a
rural roadway, the pedestrian presence is also communicated to vehicles upstream of the pedestrian location that
haven't reached the destination. This paper presents a survey of studies related to perception and cognitive attention
of drivers when this information is presented on Augmented Reality
A mobile application which can save time, effort and money by giving technical video explanation based on the recognized image for learners. The collected video information contains all the detailed explanation of the scanned image done by the user. This application groups Augmented reality , 3d objects , sound , video , AI for image recognition into an easy and compact application for the benefit of the every learner. This web application is built C#, UNITY, VUFORIA with the help of Vuforia server connected by asserts. This mobile application serves as an easier way to access details and documentaries related to recognized object. It includes an automatic AR Camera and image target along with the video player which makes it easier for recognizing the image and to learn. The database is done with Vuforia cloud database. The UI provides an excellent user friendly environment that makes the communication more interactive.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
The Android application is widely used in all
sectors. In our application it helps to track the
location of the bus. By waiting near the bus stop
for a long time this application helps to reduce the
waiting time of the students using Google map. The
arrival time of a bus is calculated based upon the
pickup point and the starting time of a bus in the
shuttle routes. Providing the accurate bus timing
will be helpful for all the students, staff to catch the
bus at the right time. In a college bus driver is
assigned with a mobile phone where we can use to
track the current location of the bus. Notification
will be sending to the students and parents once
the bus is nearby pick up point and drop point by
using Geo-fencing. Quick Response code is used to
track the attendance of the student whether they
boarded the bus at the pickup point. Common
alert message will be sent to students, staffs and
faculty about the holidays or any crucial
information.
Geo-fencing, Google map, GPS
(Global Positioning System)
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES IJCI JOURNAL
Smartphone usage has reached its peak. There has be
en a tremendous growth in the number of people
migrating from PCs to smart phones. Numerous scenar
ios such as loss of a phone, phone theft etc., can
lead to unauthorized use of one’s own smartphone. T
his raises the concern for securing personal and
private data. This project proposes a light weight
two level user identification scheme to recognize a
nd
authenticate the mobile phone based on the device h
olding and usage patterns. To validate the proposed
scheme, an application is created which takes a ges
ture input characterized by time of swiping the scr
een,
finger pressure, phone movements and location of sw
ipe on the screen through X and Y co-ordinate. A
threshold based matching scheme performs classifica
tion to find the true owner. Results show that the
scheme was able to achieve 90% true positives and 1
0% false positives with a 0.5% of battery usage.
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their community
network to automate processes for humans and makes their lives easier. The paper presents the future
challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards , intelligent
analysis and actions , security), business ( investment , modest revenue model etc. ), societal (changing
demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws, regulations,
procedures, policies etc. ). A section also discusses the various myths that might hamper the progress of
IOT, security of data being the most critical factor of all. An optimistic approach to people in adopting the
unfolding changes brought by IOT will also help in its growth.
Abstract: - Data Mining is a process used to extract the usable data from a larger set of any raw data. It involves
analyzing data patterns in large batches of data using one or more software. R is a programming language for the
purpose of statistical computations and data analysis. The R language is widely used by the data miners and
statisticians on high dimensional pattern extraction. R is freely available under the GNU General Public Licenses
and the source code is written in FORTAN, C and R.It is a GNU project. The pre-compiled binary versions are
freely available for various flavours of operating system. R is basically command line interface (CLI) and various
GUI interfaces are also available now a day. In this articlefocuses the concept of R like; getting data into and out of
R and packages related to data mining and data visualization.
IOSR Journal of Pharmacy and Biological Sciences(IOSR-JPBS) is an open access international journal that provides rapid publication (within a month) of articles in all areas of Pharmacy and Biological Science. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Pharmacy and Biological Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
Location-based service is a service mechanism that generates geographical location information. This service will certainly
give much benefit as there are many people who would like to find public facilities quickly and easily. The needs to know the
existence of public facilities quickly and easily is of great demands in the society. Based on the above problems, it is necessary to
develop an application that can get any access to the geographical location in mobile phones. Information from this application is
expected to help searching for such public facilities. This Searching for interest point information was read using the Location API in
Xcode IOS 4.2. The resulting information was displayed on the application of the iPhone. From the test results, the information of the
position was influenced by the availability of the information service provider, carrier signal strength, and mobile phone capabilities.
Geo location based augmented reality applicationeSAT Journals
Abstract As the inception of mobile app development began, various applications of Augmented Reality that was once only restricted under the avenue of personal computers extended its domain to mobile applications and currently is used in the wide fields of gaming, education, navigation and so on. The exceptional data processing abilities which is possessed by smartphones in concert with its various services such as Global Positioning System (GPS), wireless networks, and compass have authorized Augmented Reality to find a very fruitful proposition in the wide spectrum of navigation based apps. The objective of the proposed work is to structure and design Geo based Augmented Reality application using GART toolkit. The paper initiates with explaining the various components used in a Geo AR app, exploring and explaining the various structure and features of the app and providing a spotlight on the deficiencies and future scope of the targeted developed app [1]. Keywords: Augmented Reality, Global Positioning System, Wireless Network, GART, Geo AR app
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
In today’s developing world various technologies are coming up, which aims in reducing the user’s work by providing specific results which is made possible by keeping track of the various activities performed by the user throughout the entire time. Context aware computing is one of the emerging fields that help in the process of providing accurate and specific results. Context aware computing refers to a general class of mobile systems that has the ability to sense the physical environment in which the user is currently in and adapt their behavior accordingly. Context awareness is a property of mobile devices that is defined in compliment to location awareness. Systems that use context aware computing provide the user’s preference based on the various environmental factors like location, time and other conditions. Researchers have been working on this domain for about a decade and various applications were developed for the purpose of demonstrating the capability of the context-aware systems, until recently this technology has been put in heavy use since nowadays whichever applications are made by companies for end-users have a requirement of providing more accurate and specific results. Recently context-aware systems combined with pervasive computing, which means always connected and available, are a growing trend which are applied on devices. The dependence on internet for providing results, introduces various complexities because in some places the extent of the internet is limited. Therefore the context aware technology should be made to work offline using the power of smart devices like smartphones which is owned by the majority of the world. In this way the technology can be provided on to various smart devices which would result in a much more enriched user experience.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
M1803028995
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. II (May-Jun. 2016), PP 89-95
www.iosrjournals.org
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 89 | Page
Design and Implementation of Location-Based Application of
Secure Coding Providing Local Information
Yangwon Lim1
, Jinyoung Jung2
, Hankyu Lim(corresponding author)3
1
(Auto Industrial co., Korea)
,2,3
(Multimedia Engineering Department, Andong National University, Korea)
Abstract: The development of information technologies (IT) has made it easier to produce and process
information. In particular, the development of smartphones has enabled anyone to easily access and use
processed information. These technologies are used not only online, but also by connecting with offline services.
In recent years, services that provide real-time travel information, which are connected with offline services,
have become popular. In addition, security should be maintained not only for information provided by the
server, but also for the protection of user information. The Secure Coding technique is very important and it
should be considered in developing the applications. This paper made use of a location-based service to design
a new method of providing local information to users so they can view information more selectively by
designating the size of the region from which the information comes, as well as the amount of such information.
Keywords: Location Based Service, Local Information, Smartphone App , Secure Coding.
I. Introduction
THE Internet has evolved into a new paradigm based on Web 2.0. In the past, users were only allowed
to view information on the Internet. However, Web 2.0 has enabled them to create information on their own and
share it easily [1]. As users produce and share information together, the Internet environment has shifted toward
the participation of users [2]. As users of smart devices have become more experienced, they can now install
applications they want more easily than on PCs [3]. Moreover, as smart devices contain cameras, GPS
technology, and sensors, such as acceleration sensors, diverse applications that make use of these tools are
simultaneously developed and distributed. Among these applications, the growth in the use of living-oriented
applications that provide information about food, tourism, traffic, etc. using location-based service (LBS)
applications is especially remarkable [4]. In this paper, an LBS application is introduced that provides local
information, including tourism, culture, traffic, etc., in real time based on location information about the user in
motion. Differing from previous applications, the proposed LBS application provides users with only
information that is relevant to their current location. Moreover, users are provided with only desired information
by setting the information type and size (amount) themselves. Servers and client applications have been
designed and implemented to protect their communications and resources from external attacks.
II. Existing App Using LBS
Most applications launched these days provide information in a region of a certain size. Contents are
rearranged according to an individual’s location. Therefore, those applications provide not only information on
the contents themselves, but also location-based information including metadata for those contents [5].
Moreover, although they provide information based on location, they usually generate information regarding a
single field. Therefore, users must install a number of applications to obtain the desired information. Figure 1
(left) below shows a food information application and it shows there exists a large amount of information in an
area of a certain size. Figure 1 (right) shows a bartering service application for a used goods market. It has a
disadvantage in that users who want diverse information about different regions must install multiple
applications at the same time. Moreover, the size of the field serviced in a metropolitan area should be different
from those of small and medium-sized cities. With the progression of recent studies on the relationship between
location-based users, not only the user’s current location and information on the respective region, but also the
relationship between users in the respective region are emerging as important factors [6].
2. Design and Implementation of Location-based Application of Secure Coding providing Local..
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 90 | Page
Fig. 1 Location based Application
A. Tour API
Tour API is an open API that provides users with tourism information and it is distributed by the Korea
Tourism Organization [7]. Tour API supports nine languages, including Korean, English, Chinese, etc., and a
user issued a developer key can request data from Tour API along with a certain type of URL to retrieve tourism
data. There are two types of data provisions, i.e., XML and JSON, and the developer can make use of data
through the parsing procedure [8]. It provides information about tourism, food, cultural facilities,
accommodations, etc. and it was used when searching and analyzing information about tourism, food, and
cultural facilities in this paper.
B. Secure Coding
Secure coding is a static analysis technique. Unlike dynamic analyses, it does not have software
executed. It rather finds vulnerable areas from the viewpoint of security, including the use of logics lowering
quality and vulnerable functions in source codes, and the absence of the verification of input values. While
secure coding is applied to specific algorithms, it also includes a security mechanism for images themselves [9].
In recent years, security guidelines have been suggested to help develop safe codes against external attacks
when designing and implementing mobile applications [10]. For software code that does not consider secure
coding, the following methods are used to detect errors: path-sensitive analysis, flow-sensitive analysis, value
analysis, inter-file analysis, field-sensitive analysis, context-sensitive analysis, pointer analysis, and loop
invariants inference. The Ministry of Public Administration and Security in Korean Government classified
vulnerability of the Android-Java programs into input data verification and representation, API exploit, security
features, time and status, error handling, and code quality and encapsulation. Security features can cause many
problems if the use of them is not considered very carefully. The following items should be considered in
security features: authentication, access control, confidentiality, encryption, and rights management [11].
In particular, when mobile applications are developed, weak points that can emerge due to the use of
vulnerable APIs should be minimized. In addition, as mobile applications are the systems in which server
communications frequently occur, they require the proper handling of vulnerabilities in the verification of input
data, security functions, and encapsulation.
III. Design Of Local Information Using Lbs
The LBS application suggested in this paper to provide local information was designed with eight
category menus, including local community, comprehensive local information, tourism information, local food,
recruitment, amenities, cultural facilities, and weather, where the user can select the information they want to
view. The menu and setting structures are defined in Figure 2 below, so the location and the amount of
information can be controlled.
3. Design and Implementation of Location-based Application of Secure Coding providing Local..
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 91 | Page
Fig. 2 Location based Service Menu and Setup Menu
When the application is first launched, it provides only the previously set information about the current
location by retrieving the current location’s GPS coordinates. However, if the user wants to learn about
information in another region beforehand, it is designed so he/she can select the region in the settings. Figure 3
and 4 below shows the UI, where a user chooses local information to view information about a certain region.
As previous location-based applications show information within a certain distance from the user’s current
location, large amounts of information are generated in metropolitan areas, and it is possible the application
cannot find information in small and medium-sized cities. The application suggested in this paper designates the
amount of displayed information and shows only 10 pieces (default value) of information that are most relevant
to the current location. Moreover, for more information, the application allows the user to set the amount of
displayed information so he/she can search the desired information more easily without becoming confused.
Fig. 3 UI : Selecting Local Information – Select Area(1)
Fig. 4 UI : Selecting Local Information - Select Area(2)
4. Design and Implementation of Location-based Application of Secure Coding providing Local..
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 92 | Page
Figure 5 below shows a module structure that locates the user and provides information about the
relevant location. The analysis module has a function of recalling only the required information from storage to
send to users by capturing the information about the relevant location and checking the amount of generated
information
Fig. 5 Module Structure
As this shows, the user-to-user module was designed to consist of the server that stores resources and
the application that makes the user’s access more convenient. Figure 6 is the basic conceptual map that exhibits
the server and the sharing of information among users. A user can share local information and his/her current
location with the other users in similar locations to his/her current location.
Fig. 6 Basic Diagram of User Community
IV. Implementation
This study proposed a location-based regional travel information system. Its server was configured
based on PHP and MySQL. The client application was configured using HTML5 in the WebView format.
Figure 7 shows the architecture of the location-based regional travel information system that consists of the
server and the client. The server was configured to provide data in the Web service format to facilitate access to
it for management. The map data, which generate the network’s heavy traffic due to massive amounts of
information, were designed to enable the transmission of information using only metadata for simultaneous
processing on the server and the client. In addition, the server was designed to be operable through the separate
configuration of MAP, TOUR, Server PUSH, and CHAT API to process huge volumes of resources by phase.
The client application was processed to enable the retrieval of the server’s information using open APIs such as
Tour API and MAP API via a GPS module. The stored addresses, local codes, user information, local
information, etc. were stored in privatized storage. The application was implemented to provide information
regarding a user’s current location and region using this storage information. Moreover, requests for resources
were minimized by requesting data based on server and URL/JSON type. The majority of information was
stored in privatized storage to ensure a prompt response to the user’s request is possible. In doing so, the level of
security can be increased through minimal data processing between the server and the client. Moreover, within
the server, individualized storage areas, resources, and APIs were separately designed, and thus the security of
personal information and system resources could be maintained.
5. Design and Implementation of Location-based Application of Secure Coding providing Local..
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 93 | Page
Fig. 7 Architecture of Location based Local Tourist Information System
C. Local Information Update Method
The user’s location information was divided into automated location information based on the current
location and virtual location information according to the user’s own setting. As mentioned earlier, this refers to
not only information on the current location, but also virtual location information that allows the retrieval of
information on the other locations. It was composed of a module that revises the user’s location, which is
implemented when the location revision icon of the action bar on the main screen is touched after initial launch.
It retrieves a coordinate by selecting the optimal provider from methods using GPS or base station according to
the device settings. The relevant coordinate is converted to an address using the MAP API service and the
address is subsequently provided to the user, followed by a series of storing processes that keep coordinate
values, addresses, and local codes necessary for other services inside the app. The user registration process that
pops up at the initial running stores the ID and nickname of the Android device in the server. Even after
reinstalling after deletion, it remembers the previous nickname using the Android device’s ID. Figure 8 below
shows the location setting execution screen.
Fig. 8 Location Setup Screen
When the user information is renewed, an alarm service is provided that enables the user to reset
his/her location by agreeing to activation of the service. This alarm service can be set in the environment setting
menu. In addition, as shown in Figure 9, a user can receive detailed information on a specific location using
virtual location information according to the size set by the user. The user can also utilize information on the
respective region, and its travel distance and local community in the virtual location.
6. Design and Implementation of Location-based Application of Secure Coding providing Local..
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 94 | Page
Fig. 9 Local Information providing Virtual Location
D. Tour API Module
This module provides information about local food, tourism, and cultural facilities to users of Tour
API. When selecting a function, each menu completes different URLs to request of Tour API, so requests
regarding food, tourism, and culture can be processed on a single module. The processing of each URL in this
manner helps operate system resources and personal information separately, thereby maintaining the security of
system resources. Tour API is available in two types: XML and JSON. Because the JSON type has a
comparative advantage in speed in the case of small-sized data processing, data processing was designed and
implemented following JSON in this paper. The JSON object was objectified through the parsing process and
stored in an array list to be used. Figure 10 below shows the screen where the information is being provided
using Tour API based on the current location. The location information set by the user is used to provide a list of
restaurants including information and images starting from the nearest restaurant. Clicking on “detailed view”
delivers information about a particular restaurant and its accurate location.
Fig. 10 Local Information
E. Secure Coding for Location-Based Application
The server and the client application are required to maintain different forms of security codes to
protect information between the server and the application. This study configured security codes for the security
of user information, communications between system resources, and contents within the application. Figure 11
presents security codes for the application that provides local information.
Fig. 11 Security Codes for Local Information
7. Design and Implementation of Location-based Application of Secure Coding providing Local..
DOI: 10.9790/7388-1803028995 www.iosrjournals.org 95 | Page
This study was designed and implemented based on the verifications of input data, which cover the
omission of the verification of program input values or inappropriate verifications, and the incorrect designation
of data formats. The study also intended to include proper security functions for the control of access to the
server, encoding, and the management of information rights. Moreover, it aimed to minimize the user’s data
leakage by encapsulating important data among the resources operated by the server or independent
functionality.
V. Conclusion
LBS applications should be able to change adaptively according to the surrounding environment of the
user’s current location. However, previous LBS applications were inconvenient, as they were unable to provide
information by designating a certain category or a certain distance by retrieving GPS coordinates, such as
several meters away. The service application suggested in this paper was designed and implemented by
supplementing these shortcomings and made it possible for users to choose selectively what information they
want to receive by category so users can be provided with information more accurately and conveniently. In
addition, the study designed and implemented the system that can protect resources from external attacks
through the control of access and the encapsulation of server resources and APIs for the security of the mobile
application in which server communications frequently occur. To respond to technological developments and
users’ tastes, LBS applications should be able to show intellectually only information users want to see. With its
active location setting and information provision abilities, we expect the LBS application suggested in this paper
can contribute to the development and offering of diverse applications with decent usability in the future. Secure
coding is essential for developing these applications. The developer should follow secure coding guidelines and
examples of violations. Recent social network services (SNSs) also offer mobile services, rather than personal
computer (PC) services, that can provide location-based services as a priority. In the future, these mobile
services are likely to provide location-based services that use the user’s present location as well as the user’s
scope of movement. Based on the results of this study, a future study will focus on the encapsulation of modules
and the control of access for the security of location-based information services through the analysis of location
information about the user’s scope of movement and pattern analysis of other users’ movements in similar
locations.
Acknowledgements
This work was supported by a grant from 2016 Research Funds of Andong National University.
A corresponding author is professor Hankyu Lim(hklim@andong.ac.kr).
References
[1] O’REILLY, T., “What Is Web2.0 : Design Patterns and Business Models for the Next Generation of Software”,
COMMUNICATIONS and STRATEGIES vol.65, 1st quarter 2007.
[2] MITSUTERU NAKAMURA, YASUHIRO OMIYA, KAZUKI KATAGISHI , “A Secure Coding for Function-Approximated
Images”, 12th WSEAS International Conference on COMMUNICATIONS, Heraklion, Greece, July 23-25, pp.416-420, 2008
[3] http://blogs.wsj.com/korearealtime/2014/12/12/smartphone-usage-overtakes-pcs-in-south-korea/?mod=WSJBlog&mod=koreart
[4] http://play.google.com/
[5] Yangwon Lim, JunYeong Kim, Daejun Lim, SeungJae Lee, Hankyu Lim, “A Study of Social Network Content for Effective
Content Displays-Centering on Travel Information Content-“, ICFICE 2014,
[6] Chun-Der Chen, Rouh-Yun Yu, Chia-Huei Ho, Chin-Tsai Lin, “Customer Value Influences on Relationship Quality and
Subsequent Behavioral Intentions: An Empirical Study of Location-Based Service Platforms”, Mathematics and Computers in
Contemporary Science, pp.78-83, 2013.
[7] http://api.visitkorea.or.kr/
[8] Crockford, Douglas. "The application/json media type for javascript object notation (json)." (2006).
[9] Nakamura, M., Omiya, Y., Katagishi, K., Morooka, Y., Toraichi, K., & Murakami, H. (2008, July). A secure coding for function-
approximated images. In WSEAS International Conference. Proceedings. Mathematics and Computers in Science and
Engineering (No. 12). World Scientific and Engineering Academy and Society, 2008.
[10] Hopkins, Paul. "Secure Systems Development and Secure Coding."Engineering & Technology Reference 1.1 (2014).
[11] Hyeonpyo Hong, Hankyu Lim, Application of Smart Device Usage Control adopting Secure Coding for Hacking Protection,
International Journal of Internet and Web Application, 2015