Mobile phone has become one of the essential plugins of our society. The basic definition of mobile phone from its first breath till day has been evolved into an application which provides you the services of your demand via appropriate servers. This paper also talks about a similar service; the idea is to create a social bridge between experts of different crafts and normal persons via GSM network and internet; so that they can communicate with each other when required. Client will send his query to
our server, this server will multicast the query to the cabinet of experts of related category, the replies of the experts either from GSM network or Website will be then unicast to the client. All the queries and responses will be saved in a centralized Database server.
1) The document proposes a portable smart data server for small businesses that eliminates the need for internet infrastructure, hosting, website maintenance, and costly hardware. It uses an Android smartphone to function as the data server.
2) The system design involves using a smartphone's SQLite database to store data and a broadcast receiver to detect incoming requests via SMS. The business logic is invoked to process requests and send replies.
3) An implementation was created on an Android phone to demonstrate serving over 1000 requests with no errors and caching frequent queries. Comparisons show it requires low cost, space and power compared to traditional data servers.
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
Short Message Services are increasingly being relied upon to disseminate critical information during emergencies. In recent
days accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to
inform the service centre for instant help to save life of the people. Sending the nearest emergency service and/or police officers
needed for reporting the accident can be quite tedious. The idea of this work is to reduce the time required by the emergency
personnel to reach the accident area. This can be done if the information about an accident reaches the emergency services in time and
accurately. The project eliminates any communication between the victim and the personnel which leads to confusion. This is done by
finding the accurate position of the location by making use of the GPS services available in cell phones when the victim sends a
message to the emergency number(such as 108). The project aims at reducing the severe loss due to injury and fatality rate in accidents
to a great extent.
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)ijcncs
This document proposes a neural network web-based human resource management system (NNWBHRMSM) to address issues with traditional manual HR processes. It discusses how current HR activities like recruitment, selection, and placement are typically done manually through paper files. The proposed system would allow applicants to submit resumes and other application materials online through a web interface. It would use a neural network to automatically match applicants to open jobs based on their qualifications. This system aims to streamline HR processes, reduce costs, and prevent issues like applications getting lost that occur with traditional manual methods. It concludes that the system could improve efficiency and help organizations find the right professionals for jobs.
The document proposes a portable and economic smart generic data server for small scale businesses. The server is implemented on an Android smartphone and uses its SQLite database, broadcast receivers, and messaging capabilities. This allows small businesses to provide customer data access without needing internet infrastructure. The system was tested to handle over 1,000 data requests with no errors. It provides a low-cost alternative to traditional servers for small businesses.
This document discusses fuzzing SMS implementations on smartphones to find vulnerabilities. It presents techniques for injecting SMS messages locally into iPhones, Android, and Windows Mobile devices without using the carrier network. The authors used the Sulley fuzzing framework to generate fuzzed SMS messages and monitor the phone software under stress. Their fuzzing found security issues that could crash or reboot devices or prevent further SMS reception.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
A prototype framework_for_high_performance_push_noDavidNereekshan
This document describes a prototype framework for sending high volumes of push notifications. It discusses the architectural design of the framework, which includes 6 main modules: a REST interface, service layer, database, message producers, message consumers, and queue manager. The document then outlines 13 performance test scenarios run on the framework and discusses the results and conclusions.
This document describes an internship report submitted by Pradip Sapkota to fulfill the requirements for a Bachelor's degree in Computer Science from Tribhuvan University in Nepal. The internship was conducted at Lumbini Net Pvt Ltd from April to July 2015 under the supervision of Mr. Binod Kumar Adhikari. During the internship, Pradip assisted with tasks like wireless network configuration, router setup, and other activities to support Lumbini Net's internet service offerings. The report documents the work done and lessons learned from the experience.
1) The document proposes a portable smart data server for small businesses that eliminates the need for internet infrastructure, hosting, website maintenance, and costly hardware. It uses an Android smartphone to function as the data server.
2) The system design involves using a smartphone's SQLite database to store data and a broadcast receiver to detect incoming requests via SMS. The business logic is invoked to process requests and send replies.
3) An implementation was created on an Android phone to demonstrate serving over 1000 requests with no errors and caching frequent queries. Comparisons show it requires low cost, space and power compared to traditional data servers.
Ensuring Security in Emergency through SMS Alert SystemEditor IJCATR
Short Message Services are increasingly being relied upon to disseminate critical information during emergencies. In recent
days accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to
inform the service centre for instant help to save life of the people. Sending the nearest emergency service and/or police officers
needed for reporting the accident can be quite tedious. The idea of this work is to reduce the time required by the emergency
personnel to reach the accident area. This can be done if the information about an accident reaches the emergency services in time and
accurately. The project eliminates any communication between the victim and the personnel which leads to confusion. This is done by
finding the accurate position of the location by making use of the GPS services available in cell phones when the victim sends a
message to the emergency number(such as 108). The project aims at reducing the severe loss due to injury and fatality rate in accidents
to a great extent.
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)ijcncs
This document proposes a neural network web-based human resource management system (NNWBHRMSM) to address issues with traditional manual HR processes. It discusses how current HR activities like recruitment, selection, and placement are typically done manually through paper files. The proposed system would allow applicants to submit resumes and other application materials online through a web interface. It would use a neural network to automatically match applicants to open jobs based on their qualifications. This system aims to streamline HR processes, reduce costs, and prevent issues like applications getting lost that occur with traditional manual methods. It concludes that the system could improve efficiency and help organizations find the right professionals for jobs.
The document proposes a portable and economic smart generic data server for small scale businesses. The server is implemented on an Android smartphone and uses its SQLite database, broadcast receivers, and messaging capabilities. This allows small businesses to provide customer data access without needing internet infrastructure. The system was tested to handle over 1,000 data requests with no errors. It provides a low-cost alternative to traditional servers for small businesses.
This document discusses fuzzing SMS implementations on smartphones to find vulnerabilities. It presents techniques for injecting SMS messages locally into iPhones, Android, and Windows Mobile devices without using the carrier network. The authors used the Sulley fuzzing framework to generate fuzzed SMS messages and monitor the phone software under stress. Their fuzzing found security issues that could crash or reboot devices or prevent further SMS reception.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
A prototype framework_for_high_performance_push_noDavidNereekshan
This document describes a prototype framework for sending high volumes of push notifications. It discusses the architectural design of the framework, which includes 6 main modules: a REST interface, service layer, database, message producers, message consumers, and queue manager. The document then outlines 13 performance test scenarios run on the framework and discusses the results and conclusions.
This document describes an internship report submitted by Pradip Sapkota to fulfill the requirements for a Bachelor's degree in Computer Science from Tribhuvan University in Nepal. The internship was conducted at Lumbini Net Pvt Ltd from April to July 2015 under the supervision of Mr. Binod Kumar Adhikari. During the internship, Pradip assisted with tasks like wireless network configuration, router setup, and other activities to support Lumbini Net's internet service offerings. The report documents the work done and lessons learned from the experience.
Analyzing and Surveying Trust In Cloud Computing Environmentiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
This document proposes an adaptive authentication method that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of the user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process and provides examples of how penalties would be applied based on the identified source type.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
This document presents two novel peer selection algorithms, DBaT-B and DBaT-N, for peer-to-peer content sharing over mobile cellular networks. DBaT-B selects peers to satisfy the requesting peer's minimum downlink bandwidth requirement, while balancing traffic load across cells. DBaT-N selects a specified number of peers such that the total uplink bandwidth exceeds the requester's downlink limit, again balancing loads. Both algorithms first choose the least busy cell and then select peers based on uplink bandwidth and service ability to meet the requester's needs while improving load balancing performance compared to traditional algorithms.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
This document proposes a system called the "Multi Bank Family Card" which allows multiple users to access their bank accounts from different banks using a single ATM card. The system uses RFID technology, integrates user accounts onto a single card along with unique PIN numbers for each account. It also monitors user behavior during cash withdrawals using a Hidden Markov Model and implements a formula-based authentication for security. The system aims to make ATM transactions more convenient by allowing users to withdraw cash from any linked account with different banks using only one card.
The document summarizes a minor project report on developing an online estate management system. It includes an acknowledgment section thanking those who helped with the project. It then provides details on the objectives and scope of the project such as creating an online system for a construction company to advertise and manage property listings, provide payment options for customers, and generate reports. It also includes sections on the theoretical background, system analysis, design, feasibility study, and information gathering process.
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Review of authentication techniques for wireless networks & maneteSAT Journals
Abstract Mobile ad hoc network (MANET) is the most popular area of research nowadays due to its tremendous applications (military battlefield, commercial sectors, disaster areas, collaborative work etc). MANET is self organized network where all nodes are mobile in nature and may act as router as well as host because of its autonomous nature. In such a versatile environment, security of the network becomes a major issue. However, due to dynamic topology of the network and mobility of the nodes, it is very hard to achieve security goals such as confidentiality, authentication, integrity, non repudiation and availability. Among all these security goals, authentication is probably the most complex and important issue in MANET. Before communication, we should know to whom exactly we are talking, and then there is a question of protecting the data by means of cryptography. Authentication deals with identity of sender/receiver which is very important and required aspect for MANET where there is no central administration present in the network. In the present work, the issues related to the authentication in MANET, various techniques of authentication used in Traditional Wireless Network, Cellular Networks and especially in MANET along with their applicability and limitations have been discussed, which need to be addressed carefully before real time application of MANET Key Words: MANET, Authentication, Traditional Wireless Network (TWN), Threshold Cryptography, Certificate Authority.
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
Adaption of the new technology is a prerequisite for the business's survival and to meet the quality standard. The public address system is widely used in all areas of living; it helps the host speaker to easily disperse the desired messages. This study aimed to develop a wireless digital broadcasting with voice alarm and text-to-speech (TTS) feature that can wirelessly transmit audio signals from the main campus to its satellite campus over long distances. Also, the prototype has a TTS feature that can offer high-quality and stable speech. The main campus is the Colegio de San Antonio de Padua (CSAP) located at Guinsay, Danao City Cebu, Philippines with a satellite campus at Barangay Suba, Danao City, with a distance of not less than four kilometers and not greater than five kilometers from the main campus. The researcher used the descriptive developmental method of research as the systematic study of designing, developing, and evaluating programs that must meet the criteria of internal consistency and effectiveness. The rapid prototyping model was used during the system development while the criteria in McCall’s Factor Model were used to test the system according to its usability, applicability, and efficiency.
The document proposes a service operator-aware trust scheme (SOTS) for resource matchmaking across multiple clouds. SOTS evaluates trust of cloud resources based on multi-dimensional service operators, unlike traditional trust schemes. It models trust evaluation as multi-attribute decision making and develops an adaptive approach based on information entropy theory. This allows the broker to efficiently provide the most trusted resources to users.
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPERcscpconf
The veracity and secrecy of medical information which is transacted over the Internet
is vulnerable to attack. But the transaction of such details is mandatory in order to avail the
luxury of medical services anywhere, anytime. Especially in a web service enabled system for
hospital management, it becomes necessary to address these security issues. It is mandatory that
the services guarantee message delivery to software applications, with a chosen level of quality
of service (QoS). This paper presents a VDM++ based specification for modelling a security
framework for web services with non repudiation to ensure that a party in a dispute cannot
repudiate, or refute the validity of a statement or contract and it is ensured that the transaction
happens in a reliable manner. This model presents the procedure and technical options to have a
secure communication over Internet with web services. Based on the model the Medi - Helper is
developed to use the technologies of WS-Security, WS-Reliability and WS-Policy, WSRN in
order to create encrypted messages so that the Patient’s medical records are not tampered with
when relayed over Internet, and are sent in a reliable manner. In addition to authentication,
integrity, confidentiality, as proposed in this paper security framework for healthcare based web
services is equipped with non repudiation which is not inclusive in many existing frameworks.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET - SMS based Data Retreival SystemIRJET Journal
This document describes an SMS-based data retrieval system developed by Aakash Malvankar, Ajinkya Bhagat, Anas Ansari, and Surekha Khot. The system allows a user to send an SMS command to retrieve data, such as contacts, from an Android device located elsewhere. It verifies a security PIN before returning the requested data via SMS. The system was created using Android Studio and can retrieve user profiles, contacts, location information, and call logs from Android devices through SMS commands, providing access to data without an internet connection.
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
This document discusses third-party emergency alert systems that send SMS messages and their security limitations. It proposes a system where when an accident occurs, a software on the mobile phone of the affected person would automatically send a message without them having to type it. This message would be received by a service center using a GSM modem which could then identify the accident location using the mobile number and tower location. The appropriate emergency services like police and fire department would be informed to reduce response times. The document also discusses related work on denial of service attacks, SMS network architecture and address filtering.
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
This document discusses techniques to improve performance in client-server mobile computing systems, specifically focusing on caching techniques. It provides background on mobile computing and discusses challenges like low bandwidth and unstable wireless links. Caching is introduced as an effective technique to improve performance by reducing latency and bandwidth usage. The document reviews different caching strategies and replacement techniques, and discusses factors like cache size, hit rate, and consistency that impact caching performance. The goal is to study caching and other techniques to identify promising methods for optimizing mobile application performance.
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
This document discusses using mobile agents in distributed multimedia database systems. It proposes a model that uses mobile agents to facilitate the storage and retrieval of multimedia data from distributed databases. The key points are:
1) Mobile agents can travel to the host where data is physically stored, which is useful for distributed multimedia databases that contain large binary objects.
2) The proposed model integrates mobile agent technology with database services like transaction handling and security.
3) It uses different agents (client, server, query, and database agents) to dispatch requests and queries to retrieve multimedia data from across distributed databases more efficiently than traditional client-server models.
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
The document summarizes an intelligent GIS-based road accident analysis and real-time monitoring system that uses WiMAX/GPRS. It discusses the motivation and need for such a system to better analyze accidents and identify accident-prone locations. It then describes the system architecture, which utilizes telegeoinformatics to enable interoperability across different components. It also discusses strategies for adapting the system to different client devices. Finally, it outlines the use of terminal-centric and network-centric positioning methods like A-GPS and CGI-TA for location services and monitoring within an open, IP-based telecommunications network.
IRJET- Review on the Simple Text Messages ClassificationIRJET Journal
This document reviews a proposed mobile application called MojoText - Text Messenger that aims to add extra functionality to simple text messaging. The key features of the proposed application include categorizing messages by personal, social, transactional or user-defined categories with color codes, searching messages by customized date, scheduling text delivery, hiding personal messages, and reminders. The document discusses the system architecture and algorithms that could be used for message categorization, including stopword removal, pattern matching, and decision trees. It concludes that the proposed application could provide convenience by allowing users to classify and organize text messages to prevent important messages from getting lost.
Analyzing and Surveying Trust In Cloud Computing Environmentiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
This document proposes an adaptive authentication method that determines login penalties based on multiple input sources. It describes adding an IP address checker module to the existing Trust Engine component of the Mi-UAP authentication platform. The IP address checker would identify the source type of the user's IP address and apply the appropriate penalty, such as requiring additional authentication methods or blocking the user, depending on factors like whether the IP is on a blacklist database. The document outlines the process and provides examples of how penalties would be applied based on the identified source type.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
This document presents two novel peer selection algorithms, DBaT-B and DBaT-N, for peer-to-peer content sharing over mobile cellular networks. DBaT-B selects peers to satisfy the requesting peer's minimum downlink bandwidth requirement, while balancing traffic load across cells. DBaT-N selects a specified number of peers such that the total uplink bandwidth exceeds the requester's downlink limit, again balancing loads. Both algorithms first choose the least busy cell and then select peers based on uplink bandwidth and service ability to meet the requester's needs while improving load balancing performance compared to traditional algorithms.
Cyber DoS attack-based security simulator for VANET IJECEIAES
At the late years, researches focused on the cyber denial of service (DoS) attacks in the vehicle ad hoc networks (VANETS). This is due to high importance of ensuring the save receiving of information in terms of vehicle to vehicle (V2V), vehicle to infrastructure (V2I) and Vehicle to Road side unit (V2R). In this paper, a cyber-security system is proposed to detect and block the DoS attacks in VANET. In addition, a simulator for VENAT based on lightweight authentication and key exchange is presented to simulate the network performance and attacks. The proposed system consists of three phases: registration, authentication as well as communications and DoS attack detection. These phases improve the system ability to detect the attacks in efficient way. Each phase working is based in a proposed related algorithm under the guidance of lightweight protocol. In order to test the proposed system, a prototype is considered includes six cars and we adopt police cars due to high importance of exchanged information. Different case studies have been considered to evaluate the proposed system and the obtained results show a high efficiency of performance in terms of information exchange and attack detection.
Routing and Security Issues for Trust Based Framework in Mobile Ad Hoc Networksiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...IRJET Journal
This document proposes a system called the "Multi Bank Family Card" which allows multiple users to access their bank accounts from different banks using a single ATM card. The system uses RFID technology, integrates user accounts onto a single card along with unique PIN numbers for each account. It also monitors user behavior during cash withdrawals using a Hidden Markov Model and implements a formula-based authentication for security. The system aims to make ATM transactions more convenient by allowing users to withdraw cash from any linked account with different banks using only one card.
The document summarizes a minor project report on developing an online estate management system. It includes an acknowledgment section thanking those who helped with the project. It then provides details on the objectives and scope of the project such as creating an online system for a construction company to advertise and manage property listings, provide payment options for customers, and generate reports. It also includes sections on the theoretical background, system analysis, design, feasibility study, and information gathering process.
This document discusses a PhD thesis on economic mobile network management. It focuses on quality of service (QoS), quality of experience (QoE), and mean opinion score (MOS) in the context of mobile video streaming, particularly YouTube traffic. The thesis will examine how mobile carriers can improve QoS and QoE for subscribers through network improvements, caching proxy servers, and managing data limits. Measuring user satisfaction with YouTube streaming will provide insight into effective network management strategies.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Review of authentication techniques for wireless networks & maneteSAT Journals
Abstract Mobile ad hoc network (MANET) is the most popular area of research nowadays due to its tremendous applications (military battlefield, commercial sectors, disaster areas, collaborative work etc). MANET is self organized network where all nodes are mobile in nature and may act as router as well as host because of its autonomous nature. In such a versatile environment, security of the network becomes a major issue. However, due to dynamic topology of the network and mobility of the nodes, it is very hard to achieve security goals such as confidentiality, authentication, integrity, non repudiation and availability. Among all these security goals, authentication is probably the most complex and important issue in MANET. Before communication, we should know to whom exactly we are talking, and then there is a question of protecting the data by means of cryptography. Authentication deals with identity of sender/receiver which is very important and required aspect for MANET where there is no central administration present in the network. In the present work, the issues related to the authentication in MANET, various techniques of authentication used in Traditional Wireless Network, Cellular Networks and especially in MANET along with their applicability and limitations have been discussed, which need to be addressed carefully before real time application of MANET Key Words: MANET, Authentication, Traditional Wireless Network (TWN), Threshold Cryptography, Certificate Authority.
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...Mark John Lado, MIT
Adaption of the new technology is a prerequisite for the business's survival and to meet the quality standard. The public address system is widely used in all areas of living; it helps the host speaker to easily disperse the desired messages. This study aimed to develop a wireless digital broadcasting with voice alarm and text-to-speech (TTS) feature that can wirelessly transmit audio signals from the main campus to its satellite campus over long distances. Also, the prototype has a TTS feature that can offer high-quality and stable speech. The main campus is the Colegio de San Antonio de Padua (CSAP) located at Guinsay, Danao City Cebu, Philippines with a satellite campus at Barangay Suba, Danao City, with a distance of not less than four kilometers and not greater than five kilometers from the main campus. The researcher used the descriptive developmental method of research as the systematic study of designing, developing, and evaluating programs that must meet the criteria of internal consistency and effectiveness. The rapid prototyping model was used during the system development while the criteria in McCall’s Factor Model were used to test the system according to its usability, applicability, and efficiency.
The document proposes a service operator-aware trust scheme (SOTS) for resource matchmaking across multiple clouds. SOTS evaluates trust of cloud resources based on multi-dimensional service operators, unlike traditional trust schemes. It models trust evaluation as multi-attribute decision making and develops an adaptive approach based on information entropy theory. This allows the broker to efficiently provide the most trusted resources to users.
WEB SERVICE BASED RELIABLE - SHELTERED MEDI HELPERcscpconf
The veracity and secrecy of medical information which is transacted over the Internet
is vulnerable to attack. But the transaction of such details is mandatory in order to avail the
luxury of medical services anywhere, anytime. Especially in a web service enabled system for
hospital management, it becomes necessary to address these security issues. It is mandatory that
the services guarantee message delivery to software applications, with a chosen level of quality
of service (QoS). This paper presents a VDM++ based specification for modelling a security
framework for web services with non repudiation to ensure that a party in a dispute cannot
repudiate, or refute the validity of a statement or contract and it is ensured that the transaction
happens in a reliable manner. This model presents the procedure and technical options to have a
secure communication over Internet with web services. Based on the model the Medi - Helper is
developed to use the technologies of WS-Security, WS-Reliability and WS-Policy, WSRN in
order to create encrypted messages so that the Patient’s medical records are not tampered with
when relayed over Internet, and are sent in a reliable manner. In addition to authentication,
integrity, confidentiality, as proposed in this paper security framework for healthcare based web
services is equipped with non repudiation which is not inclusive in many existing frameworks.
Improvement from proof of concept into the production environment cater for...Conference Papers
This document discusses improvements made to the Trust Engine component of an authentication platform to improve performance and scalability. The Proof of Concept system was found to not meet scalability requirements due to the database architecture requiring multiple connections to retrieve and update user data. The improvements included consolidating configuration data, combining user tables, updating the process to perform analysis in memory without database connections, limiting stored login records, and changing to a JSON data format. Performance testing showed the new system completed processes on average 99% faster.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET - SMS based Data Retreival SystemIRJET Journal
This document describes an SMS-based data retrieval system developed by Aakash Malvankar, Ajinkya Bhagat, Anas Ansari, and Surekha Khot. The system allows a user to send an SMS command to retrieve data, such as contacts, from an Android device located elsewhere. It verifies a security PIN before returning the requested data via SMS. The system was created using Android Studio and can retrieve user profiles, contacts, location information, and call logs from Android devices through SMS commands, providing access to data without an internet connection.
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
This document discusses third-party emergency alert systems that send SMS messages and their security limitations. It proposes a system where when an accident occurs, a software on the mobile phone of the affected person would automatically send a message without them having to type it. This message would be received by a service center using a GSM modem which could then identify the accident location using the mobile number and tower location. The appropriate emergency services like police and fire department would be informed to reduce response times. The document also discusses related work on denial of service attacks, SMS network architecture and address filtering.
IRJET- Improve Client Performance in Client Server Mobile Computing System us...IRJET Journal
This document discusses techniques to improve performance in client-server mobile computing systems, specifically focusing on caching techniques. It provides background on mobile computing and discusses challenges like low bandwidth and unstable wireless links. Caching is introduced as an effective technique to improve performance by reducing latency and bandwidth usage. The document reviews different caching strategies and replacement techniques, and discusses factors like cache size, hit rate, and consistency that impact caching performance. The goal is to study caching and other techniques to identify promising methods for optimizing mobile application performance.
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
This document discusses using mobile agents in distributed multimedia database systems. It proposes a model that uses mobile agents to facilitate the storage and retrieval of multimedia data from distributed databases. The key points are:
1) Mobile agents can travel to the host where data is physically stored, which is useful for distributed multimedia databases that contain large binary objects.
2) The proposed model integrates mobile agent technology with database services like transaction handling and security.
3) It uses different agents (client, server, query, and database agents) to dispatch requests and queries to retrieve multimedia data from across distributed databases more efficiently than traditional client-server models.
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
The document summarizes an intelligent GIS-based road accident analysis and real-time monitoring system that uses WiMAX/GPRS. It discusses the motivation and need for such a system to better analyze accidents and identify accident-prone locations. It then describes the system architecture, which utilizes telegeoinformatics to enable interoperability across different components. It also discusses strategies for adapting the system to different client devices. Finally, it outlines the use of terminal-centric and network-centric positioning methods like A-GPS and CGI-TA for location services and monitoring within an open, IP-based telecommunications network.
IRJET- Review on the Simple Text Messages ClassificationIRJET Journal
This document reviews a proposed mobile application called MojoText - Text Messenger that aims to add extra functionality to simple text messaging. The key features of the proposed application include categorizing messages by personal, social, transactional or user-defined categories with color codes, searching messages by customized date, scheduling text delivery, hiding personal messages, and reminders. The document discusses the system architecture and algorithms that could be used for message categorization, including stopword removal, pattern matching, and decision trees. It concludes that the proposed application could provide convenience by allowing users to classify and organize text messages to prevent important messages from getting lost.
Smart Real Time Patient Reception Management SystemIRJET Journal
This document describes a smart real-time patient reception management system that uses telecommunication technologies to improve efficiency. The system allows patients to schedule appointments via SMS from anywhere. When a patient sends an SMS, the server verifies the information and sends a confirmation message with the appointment time. It then relays the information to a microcontroller connected to an LED display board in the hospital reception area. The system aims to reduce the time wasted in traditional manual appointment systems and allow patients to schedule from a distance. It uses a GSM module to send and receive SMS messages connected to a microcontroller, server, and LED display for outputs. The hardware and software designs are described along with the components and flow.
This document describes the design and implementation of a home automation system using machine-to-machine (M2M) communication over a GSM cellular network. It discusses the components of an M2M system including the machine/device being monitored or controlled, a microcontroller, and a GSM module. It provides details on using SMS, DTMF, and GPRS for M2M communication and presents a flowchart algorithm for implementing an M2M system using a PC and GSM module. Experimental testing is done to verify the system by controlling a lamp and variable fan speed remotely.
Multi agent based network monitoring and management using jadeAlexander Decker
This academic article discusses a multi-agent based network monitoring and management system using JADE. It proposes using multiple sensor agents that monitor nodes in the network and report any issues to a central monitoring agent. This allows distributed monitoring of a large network to identify problems like excess traffic. The system was implemented using JADE agents with sensor agents collecting IP/MAC addresses and monitoring traffic on nodes in an academic network. This provides a more scalable approach than centralized SNMP for a large, heterogeneous network.
This document describes an SMS-based mobile technology project that allows users to remotely access data from their mobile phone via text messages. The proposed system allows users to retrieve contact information from their address book or view unread SMS messages by sending text commands from another phone. It uses SMS and GSM technology to communicate between a mobile phone and a computer program. The system was designed and developed using Android and Eclipse and demonstrates how SMS can be used for remote querying and retrieval of mobile phone data. It provides a simple way to access important contact or message information from another device when a user's primary mobile phone is unavailable. The project aims to simplify accessing contact numbers or messages in urgent situations without having physical access to the original device.
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
This document proposes an employee tracking and monitoring system using Android smartphones. It allows managers to monitor employee call logs, messages, browsing history, location via GPS, and data usage on a centralized server. If an employee leaves a specified area, an alert message is sent to the manager. The system calculates employee behavior - good, bad, average or loyal - using a k-means clustering algorithm based on unauthorized calls and data usage. It uses AES encryption to securely transmit data between devices over a WiFi network. The system aims to give managers better oversight of how employees use company-provided phones.
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...ijngnjournal
IP Multimedia Subsystem (IMS) is considered to be one of the important features in Mobile Next Generation Networks (MNGN). It adds value to the mobile services and applications by integrating mobile network resources, such as location, billing and authentication. This is achieved by enabling a third party access to network resources. In previous work [1] we have presented a testbed to be used as platform for testing mobile application prior to actual deployment. We have chosen a novel IMS based MObile Mass EXamination (MOMEX) system to showcase the benefit of designing an IMS based mobile application. We identify two aspects essential to of the application namely security threats and delay analysis. In this paper we identify MOMEX security threats and suggest strategies to mitigate system vulnerabilities. We then
evaluate the performance of MOMEX system in terms of delay and security threats and vulnerabilities. The results presented show system performance limitation and tradeoffs.
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...josephjonse
In Vehicular Ad hoc Networks (VANETs) the mobility of the nodes is the main concern. This mobility of nodes makes the route unstable and unreliable for the information exchange and communication between two nodes in the network. To enhance the performance and throughput of the VANETs, routes between nodes must be reliable and stable. In this paper, we study the significance of path duration and link duration in Vehicular Ad hoc Networks (VANETs). Because of this mobility, connectivity graphs changes very frequently and it affects the performance of VANETs. Therefore, path duration can be used to predict the behaviour of the mobile nodes in the network. Estimation of the path duration in VANETs can be a key factor to improve the performance of the routing protocol. Estimation of path duration is a challenging task to perform as it depends on many parameters including node density, transmission range, numbers of hops, and velocity of nodes. This paper will provide a comprehensive study for estimating the path duration in VANETs.
IRJET-A Generic Framework for Accessing Location Based Information by Androi...IRJET Journal
This document presents a framework for delivering location-based information and services to users through a single mobile application on Android devices. The framework includes:
1) A mobile application that determines the user's location and displays available nearby services from a database.
2) An application engine that handles requests from the mobile app and retrieves appropriate data and services based on XML specifications.
3) XML specifications that define the format for data exchange and describe the available functions, databases, and data tables for each service.
4) A database that stores the location-based services and corresponding data.
The framework allows a single application to provide multiple contextual services to users based on their detected location. This reduces the need for
The document discusses the development of a tool to optimize radio network performance for a GSM operator. It will display key performance indicators (KPIs) like call handover success rate, call drop rate, and SDCCH traffic over time using charts. The tool will have a front end GUI and back end for processing raw KPI data from the network. It will also compare KPIs to PTA standards to ensure standards compliance.
IRJET - A Review on Analysis of Location Management in Mobile ComputingIRJET Journal
This document reviews location management in mobile computing. It discusses various location management schemes including location updates and location queries. Static update strategies like location areas and reporting cells are described, as well as dynamic update strategies that account for user mobility and call frequency. Key components of location management systems are outlined, including base stations, base station controllers, cells, handoffs, home location registers, and location areas. Issues in location management like location registration, paging, and call delivery are also summarized. The document provides an overview of the important area of location management for tracking user locations in mobile networks.
Intelligent GIS-Based Road Accident Analysis and Real-Time Monitoring Automat...CSCJournals
This document summarizes an intelligent road accident analysis and monitoring system that uses GIS, WiMAX/GPRS, and location-based services. The system aims to help reduce road accidents by allowing real-time accident reporting and response. It collects accident data using mobile devices and transfers it to a database via wireless networks. The data is then analyzed using statistical reports, decision making tools, and smart diagnosis to identify accident patterns and recommend safety solutions. The system is intended to help police respond faster to accidents and notify other emergency services.
This document summarizes the design of a wireless remote water meter system using GPRS technology. Key aspects include:
1) The system allows for low-cost, accurate remote water metering that can function in complex environments.
2) It uses a S3C2440 chip to detect water usage, store the data, and regularly send it via text message through GPRS to a monitoring center.
3) The system architecture includes a flow sensor, signal processing unit, data storage, and wireless communication module to transfer water usage data remotely for validation and analysis.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Mobile based social encyclopedia
1. International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 10, October - 2013
Mobile Based Social Encyclopedia
Salman Rashid
University of Lahore
NabeelHaider
University of Lahore
Abstract
Keyword: MBSE (Mobile Based Social
Encyclopedia), AS (Application Server), DBS
(Database Server), GSME1 (GSM Engine 1),
GSME2 (GSM Engine 2), WS (Web Server), QoS
(Quality of Service)
1. Introduction
it’s difficult to see the mayor for his issues. If we
deploy this system for government then common
man can text his issues to this system and mayor
can see them using web interface and educate
himself about the problems of a common man. So
MBSE can play a vital role in the development of
social connectivity towards positive directions.
2. Existing System
GSM has been a great device for connectivity.
So it has been used in different applications like
Home Automation[4][12], Street Light Monitoring
& Control System, Gas Leakage Detection System,
E-Notification
Boards
and
Rail
Road
Transportation Safety etc. The applications of
health care [3] using GSM have also been
developed like GSM based Alert System [9] for
Outpatient Adherence; GSM based Health
Monitoring System;Mobile-Phone Based Patient
ComplianceSystem for Chronic Illness Care. All
these systems are more likely a GSM based
monitoring [3] of the patient while MBSE is like a
prescribing expert with different fields of expertise.
Different encyclopaedias are also available for
gathering information they provide bulk of
information related to any heading but they don’t
answer the listener for the specific question he is
asking. Reader has to filter out the information of
his demand from that bulk of information while this
system will provide the specific information of his
demand [7].
IJE
RT
Mobile phone has become one of the essential plugins of our society. The basic definition of mobile
phone from its first breath till day has been evolved
into an application which provides you the services
of your demand via appropriate servers. This paper
also talks about a similar service; the idea is to
create a social bridge between experts of different
crafts and normal persons via GSM network and
internet; so that they can communicate with each
other when required. Client will send his query to
our server, this server will multicast the query to
the cabinet of experts of related category, the
replies of the experts either from GSM network or
Website will be then unicast to the client. All the
queries and responses will be saved in a
centralized Database server.
MustansarIqbal
University of Lahore
In this age of internet and palmtops when world
has become global village MBSE will play its part
as social encyclopaedia. It’ll increase the social
connectivity between persons having questions and
experts having answers. With the help of GSM [1]
and AS, we have developed such system which can
help you in two important ways.
First important way is information interchange
indifferent categories. For example if you have
some immediate medical issue and you can’t see
doctor at the moment all you need to do is to send a
message to MBSE in medical category and within
seconds you’ll receive the response from practical
experts of medical field. Similarly different
categories like Electrical, Mechanical, Civil,
History, Literature, Current Affairs, Education
counselling and many others [6] can be added to
educate the people about different questions they
might have.
Second important application of MBSE is
reduction of communication gap between normal
person and higher level management [7]. For
example in the current scenario of government it is
3. What is MBSE…?
It is a mobile based encyclopedia with the real life
experts as their source of information. If you have a
problem and a mobile phone then all you need to
do is to type your problem and send it to MBSE,
it’ll multicast the problem to the cabinet of the
experts of the related category, the responses will
be then unicasted [8] to you.
very difficult for the mayor of the city to listen to
every man’s problem and for each common man
IJERTV2IS100942
www.ijert.org
2614
2. International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 10, October - 2013
Expert
5. Application Server
Application Serveris the heart of MBSE. It controls
and compiles all the data among other components
of the MBSE.
User
GSM
GSM
Engine1
5.1. GSME Connector
Internet
GSM
Engine2
Web Server
Application
Server
Database
Server
Figure 1: Project Define Diagram
IJE
RT
The main components of the MBSE are shown in
figure 1; Two GSMEs are used to maintain the
quality of service. GSME1 will be listening for the
queries from clients [5] via GSM network
moreover it’ll reply to the clients for their queries.
GSME2 will connect experts to the AS via GSM
network. AS is the heart of the MBSE, it is the
open source server developed on RHEL to control
and compile the data coming from the GSM
network and Internet. The responsibilities of AS
are, to save the queries and replies [11] into the
DBS, AS will retrieve the list of experts from the
DBS and multicast the queries to the team of
experts. By keeping in mind the sensitivity of some
specific categories like Medical a priority queue is
maintained in the AS which is controlled by a
scheduler to provide the in time service to each
client. MySQL is used as DBS to save the record of
the queries, replies, experts and clients. WS is
developed for the experts if they want to reply via
internet, this response will be received by a listener
in the AS and then AS will perform further tasks
upon that specific query.
The very first component in the AS is the
GSME Connector. It has two parts, first one is in
hardware form and other one is in software form. In
hardware GSME uses TTL at its serial port. To
interface the hardware board of GSME we have to
made a serial port translator which translate the
voltage level of GSME and serial port of the
computer into each other so that communication
could be possible between GSME and Computer. It
is developed by using MAX232 IC. The secondary
part of the GSME is a serial port driver which will
configure the serial port to provide communication
between GSME and AS. The main duties of this
driver will be to initialize the GSMEs, connect
them to the network and then start listening. To
configure the serial port in linux we have to
configure fcntl (to manipulate file descriptor of
serial port) and termios (for configuring the setting
of serial port like baud rate, flow control etc).
5.2. Temporary Buffer
As the request receives from the client it is stored
in the initial queue which is named as temporary
buffer. After that GSMEs will go back to the
listening state. Format checker which is a threaded
process will pick the request from the temporary
buffer and check if the request is receive in the
proper format or not. If it is in the proper format
then a confirmation will be sent back to the client
[10] about the reception of the request. The format
of the Request is to insert the category then comma
and then state the query;
4. GSME
GSME are those devices which will connect the
MBSE to the end user and information sources
(experts) via GSM network [2]. To maintain the
quality of service we have established two GSMEs,
one will take care of all the transfer of information
between MBSE and clients and other will take care
of all the transfer of information between MBSE
and experts. With the increase in traffic we can
increase the number of GSMEs to further improve
the QoS.
IJERTV2IS100942
Figure 2: Received Query from Client
5.3 Priority Queue
Some categories are very sensitive and need
immediate response from the server like Medical.
For example if the health of a person is critical and
he needs immediate medical attention; one of his
www.ijert.org
2615
3. International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 10, October - 2013
friends ask about the first aids procedure from the
expert while they are on their way towards hospital
to stabilize the patient then we’ll have to facilitate
him on our first priority. But we can’t put ultimate
focus upon selective categories because other
clients would feel the kind of departed. So to
handle this problem with the limited resources we
have developed a priority queue which will fetch
the requests from the Temporary Buffer and fill in
the priority Queue. It is implemented using the data
structure of circular linked list. There is a smart
scheduler which will get Ni number of requests
from the priority queue where i is the tag of priority
and Ni are number of requests from the priority i in
each cycle. Ni is calculated by the formula: Ni
𝑃𝑖
=
where Pi is the priority of
100 ∗ (𝑥1+𝑥2+𝑥3+⋯+𝑥𝑛 )
the category i and xi is the number of requests for
the category i.
IJE
RT
Figure 4: Multicast Request to Experts
5.4Response from Expert
Each expert has two ways to respond to a request.
First one is to use the mobile phone and other is via
Internet.
Figure 3: Priority Queue
After the maintaining of the queue smart scheduler
will pass the request into the next process which
will save the request into the database and generate
a file number which will be unique ID of the
request. This ID is duly beneficial; it enables the
system to differentiate responses to each request
and maintains the privacy of client. Then it’ll make
the query for the experts which have following
format:
5.4.1 Response from Expert via GSM
If he has compatible mobile phone then he can
install our app. When he’ll open the app, a list of
requests will be shown to him. He’ll select the
request and write the reply. This reply will be then
encapsulated into the header [10] which is like;
::Request_ID,Reply::
::File_Number,Problem::
Then AS will retrieve the list of the experts of that
category and multi cast the request to the experts
via GSME2.
Figure 5: Encapsulation of Reply
If expert doesn’t have compatible mobile then he’ll
have to personally write the reply into header
IJERTV2IS100942
www.ijert.org
2616
4. International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 10, October - 2013
format. This request will be then received by AS
via GSME2. AS will initiate a process which will
first confirm the mobile number of the expert first,
if the number doesn’t belong to the expert of the
respective category then he’ll reply back that you
are not authorized to post this reply. Else if reply is
from authorized expert of the respective category
then it’ll be stored into the database and unicast to
the client in following format;
::Q: <Question of the client>. A: <Answer from the
expert>. E: <ExpertName>. DOQ: <Date of
Query>. DOR: <Date of Reply>. ::
Figure 7: Web View for Expert
IJE
RT
Expert will click the request and write the reply.
This reply will be then encapsulated and sent to the
AS. Here we have developed a client server [8]
scenario to handle the reply. A server is developed
in C which is acting as a listener and its client is
developed in php. When expert will post reply it’ll
initiate a client which will establish a connection
with listener over TCP and send reply to it. This
listener will initiate the reply process which is same
as reply via GSM except the authentication process.
Figure 6: Reply from Expert via GSM
5.4.2Response from Expert via Internet
The other way for expert to reply is via internet.
WS is developed on apache, first expert will log on
to web server via username and password. Then a
list of queries will be displayed on the page.
Figure 8: Reply from Expert via Web
6. Conclusion
MBSE is a versatile service which can facilitate
each type of query from each type of client. It
IJERTV2IS100942
www.ijert.org
2617
5. International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 2 Issue 10, October - 2013
handles the queries based upon their defined
priority ratio. In this way we can educate people
just with the help of a text message. Moreover this
service can reduce the communication gap between
the higher authorities and common person which
can lead towards a compatible society.
7. References
IJE
RT
[1] H.Huang, H. Bainand S. Zhu, “A GreenhouseRemote
Monitoring System Based on GSM,” in Proc. of IEEE
International Conference on information management,
pp. 357-360, 2011.
[2] A. Jain, D. kumar and J. Kedia, “Design
anddevelopment
of
GSM
based
energy
Meter,”International Journal of Computer Application,
vol. 47, no. 12, June 2012.
[3] T. Murugan, A. Periasamy and S. Muruganand,
“Embedded Based Industrial temperature monitoring
system using GSM,”International Journal of computer
application, vol. 58, no. 19, Nov. 2012.
[4] Alkar, A.Z. ;Gecim, H.S. ; Guney, M.“Web Based
ZigBee Enabled Home Automation System” NetworkBased Information Systems (NBiS), 13th International
Conference on Network-Based Information Systems , pp.
290 – 296, Sept. 2010.
[5] TakakoNonaka, Masato Shimano, YutaUesugi,and
Tomohiro. “Embedded Server and Client System for
Home Appliances on RealTime Operating Systems.”
IEEE, 2010
[6] Richard OpioOcaya and Steven RwabonaKatashaya;
“A Low-cost Embedded Web-Server for an Institutional
e-Learning Strategy,” 3rd International Conference on
Electronics Computer Technology, pp. 59 -63, April
2011.
[7] A.Shilpa, “Design of Online Embedded Web Server
for Data Acquisition System” International Journal of
Computer Trends and Technology (IJCTT), vol. 4,
pp.3266-3270,Sep 2013.
[8] Kamran Ahsan, NadeemMahmood, and Adnan
Nadeem, “Information Handing with Mobile Client using
Web Services: a Disconnected Approach”, Columbia
International Publishing Journal of Advanced Internet of
Things, December 2012.
[9] Soyoung Hwang and Donghui Yu, “Remote
Monitoring and Controlling System Based on
ZigBeeNetworks“,International Journal of Software
Engineering and Its Applications Vol. 6,No.3,July, 2012.
[10] Ali ZiyaAlkar and UmitBuhur, "An Internet Based
Wireless Home Automation System for Multifunctional
Devices", IEEE Transactions on Consumer Electronics,
Vol. 51, No. 4, pp. 1169-1174, November 2005.
[11] Nunes, R.J.C., “A Web-based approach to the
specification and programming of home automation
systems”,ElectrotechnicalConference,MELECON,
volume: 2, Page: 693 – 696, 2004.
[12]
BarisYuksekkaya,
A.
AlperKayalar,
M.
BilgehanTosun, M. KaanOzcan, and Ali ZiyaAlkar "A
GSM, Internet and Speech Controlled Wireless
Interactive
Home
Automation
System"
IEEE
Transactions on Consumer Electronics, vol.52,No. 3, pp.
837-843, 2006.
IJERTV2IS100942
www.ijert.org
2618