Location based mobile services (LBS) are budding
significantly along with development of GPS-enabled mobile
phones, smart phones and PDAs. Mobile users may submit the
query to the server for knowing about nearest resources such
as fuel stations, hospitals, ATM centers etc to get the services.
In this scenario, identifying locations of resources is highly
significant. This paper focuses on query management in
mobile environments to locate the most appropriate location of
the required services.
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
In this paper we introduce an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format. We have also developed an adapted version of the system including conference-specific context-types such as the timetable of the presentations and indoor-location detection using Bluetooth beacons. One goal for the demonstrator is to explore the practical use of context abstractions in a conference setup and synthesize interesting insight based on the usage patterns during the event.
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
In this paper, we investigate the usage of context-based awareness cues in informal information sharing, especially in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesVille Antila
People use smartphones in daily activities for accessing and storing information in various situations. In this paper, we present a work in progress for detecting and automating some of these activities. To explore the possible patterns we developed an experimental application to detect daily tasks used by smartphones and analyzed it to provide suggestions for “routines”. We conducted a two-week user study with 10 users to evaluate the approach. During the study the application logged the usage patterns, sent information to the server where it was analysed and clustered. The participants could also automate their smartphone tasks using the analysed data. The findings suggest that people would be willing to automatize tasks given that the approach gives flexibility and expressiveness without too much information overload. Future work includes refining the algorithms based on the gathered real-life data and modifying the interaction design to approach the challenges found with the initial study.
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook and Twitter status updates. The application was used by 12 persons during a two-week user trial using their own devices and Facebook accounts. The results indicate that user-defined abstractions of context items were often preferred over more accurate indicators due to privacy concerns or discomfort in sharing. We also found out that using shared context from friends in vicinity needs careful design to overcome the extended privacy implications.
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesVille Antila
Presentation of an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
This poster introduces an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format.
ContextCapture: Using Context-based Awareness Cues to Create Narrative Events...Ville Antila
In this paper we introduce an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format. We have also developed an adapted version of the system including conference-specific context-types such as the timetable of the presentations and indoor-location detection using Bluetooth beacons. One goal for the demonstrator is to explore the practical use of context abstractions in a conference setup and synthesize interesting insight based on the usage patterns during the event.
ContextCapture: Exploring the Usage of Context-based Awareness Cues in Inform...Ville Antila
In this paper, we investigate the usage of context-based awareness cues in informal information sharing, especially in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
RoutineMaker: Towards End-User Automation of Daily Routines Using SmartphonesVille Antila
People use smartphones in daily activities for accessing and storing information in various situations. In this paper, we present a work in progress for detecting and automating some of these activities. To explore the possible patterns we developed an experimental application to detect daily tasks used by smartphones and analyzed it to provide suggestions for “routines”. We conducted a two-week user study with 10 users to evaluate the approach. During the study the application logged the usage patterns, sent information to the server where it was analysed and clustered. The participants could also automate their smartphone tasks using the analysed data. The findings suggest that people would be willing to automatize tasks given that the approach gives flexibility and expressiveness without too much information overload. Future work includes refining the algorithms based on the gathered real-life data and modifying the interaction design to approach the challenges found with the initial study.
Understanding the Privacy Implications of Using Context-based Awareness Cues ...Ville Antila
Information from the physical world is increasingly being digitalized and shared in social networks. We share our locations, tag photos and add different kinds of informal awareness cues about the physical world to our online communities. In this paper, we investigate the privacy implications of shared context cues in social networking services. We present an experimental mobile application, which allows users to add different descriptions of context information to their Facebook and Twitter status updates. The application was used by 12 persons during a two-week user trial using their own devices and Facebook accounts. The results indicate that user-defined abstractions of context items were often preferred over more accurate indicators due to privacy concerns or discomfort in sharing. We also found out that using shared context from friends in vicinity needs careful design to overcome the extended privacy implications.
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesVille Antila
Presentation of an experimental mobile application, which allows users to add different descriptions of context information to their Facebook status updates. The meaningfulness and the usage of different context descriptions were evaluated in a two-week user trial. The results show that the most frequently used awareness cues in the test setting were location, surroundings, friends and activity. The results also indicate that user-defined semantic abstractions of context items (e.g. “home”, “work”) were often more informative and useful than more accurate indicators (e.g. the address or the name of the place). We also found out that using shared context from friends in vicinity (e.g. identifying the people around) needs careful design to overcome the extended privacy implications.
This poster introduces an experimental application to demonstrate the usage of context-based awareness cues in status updates, especially in SNS’s (Social Networking Services). The presented application allows users to add different descriptions of context information to their Twitter messages and Facebook status updates in a narrative format.
A survey on hiding user privacy in location based services through clusteringeSAT Journals
Abstract Smartphone’s are being more and more popular as the technology being evolve. The Smartphone’s are capable of providing the location aware services like GPS. They share all the location information with the central location server. When user submit any query then these query also carries some personal information of the user. This query and information is then submitted to the LGS server. At the LBS server this information is not much confidential. Someone can use this information to make user panic. To overcome this we are proposing the new collaborative approach to hide user’s personal data from the LBS server. Our approach does not lead to make changes in the architecture of the LBS server. And we are also not going to use the third party server. Here we are going to use the other user’s device to search other users query so that other user can be get hide from the LBS server. Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
This document discusses using GIS software to identify the shortest and most economical route for a national highway alignment between Palani and Erode in Tamil Nadu, India. It considers factors like land use, geology, land value, and soil type by assigning weights and ranks to each theme. The themes are then overlaid in GIS to identify the most suitable highway alignment area. Conventional manual methods for route selection were difficult, time-consuming, and expensive compared to the proposed GIS-based approach.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A lot of sources are available to every side of human environment. These sources are genuinely provided by
nature to us. The utilization of these available sources again and again results in “re-source” for us. The
interaction among multiple resources increases the level of availability for maximum possible duration to
the environment. The involvement of both (natural & artificial) intelligence create interaction environment
which works every time and everywhere. The quality work done bounded with time for impactful effect is
known as “smart work”. The theme and framework are required for creating an environment for smart
work. In this article we propose a theorem for theme declaration which is based on suggested lemma. The
theme declaration is measured in probabilistic terms. To perform work in smart fashion we require the
appropriate proportion of both intelligence (natural and human) and their interaction. We have also cited
three varied examples discussing the relevance of intelligent interaction for smart work.
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
Due to the exponential growth of wireless network based miniaturized device and
sensors, the dream of context aware ubiquitous computing world is becoming realistic. In this
ubiquitous world of context aware applications the users can get the information and share the
information elsewhere instantaneously. Context aware meeting room is one of the interesting context
aware systems where in the meeting of a given set of users will be organized as per the situation of
users. In this paper we present the conceptual design and development of service recommendation
system for prototypical context aware meeting room using Fuzzy Rules .The proposed
recommendation system for context aware meeting room recommends the services by considering
the users contextual parameters like role, priority and environmental conditions. The fuzzy rule is
constructed using history database and knowledge base of the meeting.
KidzFrame: Supporting Awareness in the DaycareIDES Editor
KidzFrame is an innovative system that connects
working parents with their children at daycare centers. This
paper reports the findings of three focus groups and a twoweek
long field study of the system. As conclusions of our
study we offer six guidelines that are of direct salience for
designers of pervasive computing services wanting to address
the communication needs of daycare centers, parents and their
children.
Improvement of Random Forest Classifier through Localization of Persian Handw...IDES Editor
The random forest (RF) classifier is an ensemble
classifier derived from decision tree idea. However the parallel
operations of several classifiers along with use of randomness
in sample and feature selection has made the random forest a
very strong classifier with accuracy rates comparable to most
of currently used classifiers. Although, the use of random
forest on handwritten digits has been considered before, in
this paper RF is applied in recognizing Persian handwritten
characters. Trying to improve the recognition rate, we suggest
converting the structure of decision trees from a binary tree
to a multi branch tree. The improvement gained this way
proves the applicability of the idea.
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...IDES Editor
We show a generic describing method of hardware
including a memory access controller in a C-based high-level
synthesis technology (Handel-C). In this method, a prefetching
mechanism to improve the performance by hiding memory
access latency can be systematically described in C language.
We demonstrate that the proposed method is very simple and
easy through a case study. The experimental result shows
that although the proposed method introduces a little hardware
overhead, it can improve the performance significantly.
Identification of Reactive Power Reserve in Transmission NetworkIDES Editor
This document summarizes a method for identifying critical voltage control areas (VCAs) in transmission networks. It describes operational difficulties that occurred in the Polish transmission network due to insufficient reactive power reserves. The method clusters contingencies based on bus participation factors from modal analysis. It then identifies the buses and generators that form each VCA. Reactive power reserve requirements are then established for the generators controlling each VCA to ensure voltage stability under all conditions.
A New Soft-Switched Resonant DC-DC ConverterIDES Editor
This paper presents a new soft-switched resonant dcdc
converter using a passive snubber circuit. The proposed
converter uses a new zero voltage and zero current switching
(ZVZCS) strategies to get ZVZCS function. Besides operating
at constant frequency, all semiconductor devices operate at
soft-switching without additional voltage and current stresses.
In order to validate the proposed converter, computer
simulations and experimental results were conducted. The
paper indicates the effective converter operation region of the
soft-switching action and its efficiency improvement results
on the basis of experimental evaluations using laboratory
prototype.
Development of Dual Frequency Alternator Technology Based Power Source For Mi...IDES Editor
This paper presents a Dual frequency alternator,
which generates power output at 50Hz and 400Hz. In weapon
system applications 50Hz and 400Hz power is required to meet
the requirement of different loads which operate at different
frequencies simultaneously. To cater power supply to these
loads either separate generators are required to be used or
50Hz and 400Hz power is obtained by solid-state conversion
using power converters. These separate power sources
increases the logistics, space requirement, maintenance,
repairs and overhauls. To overcome these difficulties special
kind of machine called Dual Frequency Alternator has been
designed to give power outputs of 50Hz and 400Hz frequencies
simultaneously with a single prime mover (Engine). In this
paper design, development and performance evaluation of the
Dual frequency output alternator along with integrated power
supply system is discussed. Experimental results are also
presented that demonstrate the high performance of Dual
frequency output Alternator technology for future Power
generation system.
Specification-based Verification of Incomplete ProgramsIDES Editor
Recently, formal methods like model checking or
theorem proving have been considered efficient tools for
software verification. However, when practically applied, those
techniques suffer high complexity cost. Combining static
analysis with dynamic checking to deal with this problem has
been becoming an emerging trend, which results in the
introduction of concolic testing technique and its variations.
However, the analysis-based verification techniques always
assume the availability of full source code of the verified
program, which does not always hold in real life contexts. In
this paper, we propose an approach to tackle this problem,
where our contributed ideas are (i) combining function
specification with control flow analysis to deal with sourcemissing
function; (ii) generating self-complete programs from
incomplete programs by means of concrete execution, thus
making them fully verifiable by model checking; and (iii)
developing a constraint-based test-case generation technique
to significantly reduce the complexity. Our solution has been
proved viable when successfully deployed for checking
programming work of students.
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...IDES Editor
This document describes a proposed system for using solar-powered high voltage discharge plasma to remove NOx from diesel engine exhaust. It includes:
1) A boost converter that boosts the voltage from a 12V solar-powered battery to 24V, and an automobile ignition coil that generates high voltage pulses using flyback topology.
2) A comparison of discharge plasma and plasma-adsorbent processes for NOx removal at different gas flow rates, using activated alumina as the adsorbent.
3) The design and fabrication of the high voltage pulse source, including the boost converter, ignition coil driver circuit, and generation of high voltage pulses up to 18kV from the 24V input.
ANN Based PID Controlled Brushless DC drive SystemIDES Editor
Brushless (BLDC) DC motors find many industrial
applications such as process control, robotics, automation,
aerospace etc. Wider usage of this system has demanded an
optimum position control for high efficiency, accuracy and
reliability. Hence for the effective position control, estimation
of dynamic load parameters i.e. moment of inertia and friction
coefficient is necessary. This paper incorporates the estimation
of mechanical parameters such as moment of inertia and
friction coefficient of BLDC motor and load at various load
settings by using simple procedure. To achieve the optimum
position control, PID controller is employed and tuned using
PARR method. ANN training is used for obtaining the
mechanical and PID controller parameters at different load
settings. Closed loop position control system of the BLDC
drive system is created using SIMULINK. Simulation results
of this system are obtained at different load settings. It is
evident from the results that the position control system
responds to the desired position with minimum rise time,
settling time and peak overshoot.
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
These days people prefer to use portable and wireless devices such as laptops, mobile phones, They are connected through satellites. As user moves from one point to other, task of updating stored information becomes difficult. Provision of Location based services to users, faces some challenges like limited bandwidth and limited client power. To optimize data accessibility and to minimize access cost, we can store frequently accessed data item in cache of client. So small size of cache is introduced in mobile devices. Data fetched from server is stored on cache. So requested data from user is provided from cache and not from remote server. Question arises that which data should be kept in the cache? Performance of cache majorly depends on the cache replacement policies which select data suitable for eviction from cache. This paper presents use of Hidden Markov Models(HMMs) for prediction of user‟s future location. Then data item irrelevant to this predicted location is fetched out from the cache. The proposed approach clusters location histories according to their location characteristics and also it considers each user‟s previous actions. This results in producing high packet delivery ratio and minimum delay.
Data Management In Cellular Networks Using Activity MiningIDES Editor
In the recent technology advances, an increasing
number of users are accessing various information systems
via wireless communication. The majority users in a mobile
environment are moving and accessing wireless services for
the activities they are currently unavailable inside. We
propose the idea of complex activity for characterizing the
continuously changing complex behavior patterns of mobile
users. For the purpose of data management, a complex activity
is copy as a sequence of location movement, service requests,
the coincidence of location and service, or the interleaving of
all above. An activity may be composed of sub activities.
Different activities may exhibit dependencies that affect user
behaviors. We argue that the complex activity concept provides
a more specific, rich, and detail description of user behavioral
patterns which are very useful for data management in mobile
environments. Correct exploration of user activities has the
possible of providing much higher quality and personalized
services to individual user at the right place on the right time.
We, therefore, propose new methods for complex activity
mining, incremental maintenance, online detection and
proactive data management based on user activities. In
particular, we develop pre-fetching and pushing techniques
with cost sensitive control to make easy analytical data
allocation. First round implementation and simulation results
shows that the proposed framework and techniques can
significantly increase local availability, conserve execution
cost, reduce response time, and improve cache utilization.
Location Based Services, Change in Profile and Notification IRJET Journal
This document discusses a proposed location-based services application for Android devices. It would allow automatic profile changing, weather detection, and message sending based on the user's location. The application would use GPS and internet access to determine the user's location. It describes how location-based services work and the typical components involved, including mobile devices, applications, communication networks, positioning systems like GPS, and backend servers. The proposed application aims to provide these location-based functions for Android smartphones in a simple, automatic way.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
This document proposes a framework to improve the processing of spatio-temporal queries for global positioning systems. The framework employs a new indexing algorithm built on SQL Server 2008 that avoids the overhead of R-Tree indexing. It utilizes dynamic materialized views and an adaptive safe region to reduce communication costs and update loads. Caching is used to enhance performance. The notification engine processes concurrent queries using publish/subscribe to group similar queries. Experiments showed the framework outperformed R-Tree indexing.
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
This document discusses prototyping future potentials of location-based services in e-governance. It begins by defining ubiquitous computing, context-aware applications, and location-based services. It then outlines two classes of LBS - pull, where users actively request location-based data, and push, where networks proactively provide information to users. The document also describes the key components of an LBS communication model, including user devices, communication networks, positioning systems, application servers, and data servers. Lastly, it discusses challenges with incorporating location and context into existing governance models.
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
The aim of the development of Pervasive computing was to simplify our lives by integrating
communication technologies into real life. Location aware computing which is evolved from pervasive
computing performs services which are dependent on the location of the user or his communication
device. The advancements in this area have led to major revolutions in various application areas,
especially mass advertisements. It has long been evident that privacy of personal information, in this
case location of the user, is rather a touchy subject with most people. This paper explores the Location
Privacy issue in location aware computing. Vertical fragmentation of the stored location information of
users has been proposed as an effective solution for this issue.
A survey on hiding user privacy in location based services through clusteringeSAT Journals
Abstract Smartphone’s are being more and more popular as the technology being evolve. The Smartphone’s are capable of providing the location aware services like GPS. They share all the location information with the central location server. When user submit any query then these query also carries some personal information of the user. This query and information is then submitted to the LGS server. At the LBS server this information is not much confidential. Someone can use this information to make user panic. To overcome this we are proposing the new collaborative approach to hide user’s personal data from the LBS server. Our approach does not lead to make changes in the architecture of the LBS server. And we are also not going to use the third party server. Here we are going to use the other user’s device to search other users query so that other user can be get hide from the LBS server. Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
The wide development of mobile applications provides a considerable amount of data of all types (images, texts, sounds, videos, etc.). In this sense, Mobile Context-aware Recommender Systems (MCRS) suggest the user suitable information depending on her/his situation and interests. Two key questions have to be considered 1) how to recommend the user information that follows his/her interests evolution? 2) how to model the user’s situation and its related interests? To the best of our knowledge, no existing work proposing a MCRS tries to answer both questions as we do. This paper describes an ongoing work on the implementation of a MCRS based on the hybrid-ε-greedy algorithm we propose, which combines the standard ε-greedy algorithm and both content-based filtering and case-based reasoning techniques.
This document discusses using GIS software to identify the shortest and most economical route for a national highway alignment between Palani and Erode in Tamil Nadu, India. It considers factors like land use, geology, land value, and soil type by assigning weights and ranks to each theme. The themes are then overlaid in GIS to identify the most suitable highway alignment area. Conventional manual methods for route selection were difficult, time-consuming, and expensive compared to the proposed GIS-based approach.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A lot of sources are available to every side of human environment. These sources are genuinely provided by
nature to us. The utilization of these available sources again and again results in “re-source” for us. The
interaction among multiple resources increases the level of availability for maximum possible duration to
the environment. The involvement of both (natural & artificial) intelligence create interaction environment
which works every time and everywhere. The quality work done bounded with time for impactful effect is
known as “smart work”. The theme and framework are required for creating an environment for smart
work. In this article we propose a theorem for theme declaration which is based on suggested lemma. The
theme declaration is measured in probabilistic terms. To perform work in smart fashion we require the
appropriate proportion of both intelligence (natural and human) and their interaction. We have also cited
three varied examples discussing the relevance of intelligent interaction for smart work.
Conceptual Design of Fuzzy Rule Based Context Aware Meeting Room SystemEditor IJMTER
Due to the exponential growth of wireless network based miniaturized device and
sensors, the dream of context aware ubiquitous computing world is becoming realistic. In this
ubiquitous world of context aware applications the users can get the information and share the
information elsewhere instantaneously. Context aware meeting room is one of the interesting context
aware systems where in the meeting of a given set of users will be organized as per the situation of
users. In this paper we present the conceptual design and development of service recommendation
system for prototypical context aware meeting room using Fuzzy Rules .The proposed
recommendation system for context aware meeting room recommends the services by considering
the users contextual parameters like role, priority and environmental conditions. The fuzzy rule is
constructed using history database and knowledge base of the meeting.
KidzFrame: Supporting Awareness in the DaycareIDES Editor
KidzFrame is an innovative system that connects
working parents with their children at daycare centers. This
paper reports the findings of three focus groups and a twoweek
long field study of the system. As conclusions of our
study we offer six guidelines that are of direct salience for
designers of pervasive computing services wanting to address
the communication needs of daycare centers, parents and their
children.
Improvement of Random Forest Classifier through Localization of Persian Handw...IDES Editor
The random forest (RF) classifier is an ensemble
classifier derived from decision tree idea. However the parallel
operations of several classifiers along with use of randomness
in sample and feature selection has made the random forest a
very strong classifier with accuracy rates comparable to most
of currently used classifiers. Although, the use of random
forest on handwritten digits has been considered before, in
this paper RF is applied in recognizing Persian handwritten
characters. Trying to improve the recognition rate, we suggest
converting the structure of decision trees from a binary tree
to a multi branch tree. The improvement gained this way
proves the applicability of the idea.
A Generic Describing Method of Memory Latency Hiding in a High-level Synthesi...IDES Editor
We show a generic describing method of hardware
including a memory access controller in a C-based high-level
synthesis technology (Handel-C). In this method, a prefetching
mechanism to improve the performance by hiding memory
access latency can be systematically described in C language.
We demonstrate that the proposed method is very simple and
easy through a case study. The experimental result shows
that although the proposed method introduces a little hardware
overhead, it can improve the performance significantly.
Identification of Reactive Power Reserve in Transmission NetworkIDES Editor
This document summarizes a method for identifying critical voltage control areas (VCAs) in transmission networks. It describes operational difficulties that occurred in the Polish transmission network due to insufficient reactive power reserves. The method clusters contingencies based on bus participation factors from modal analysis. It then identifies the buses and generators that form each VCA. Reactive power reserve requirements are then established for the generators controlling each VCA to ensure voltage stability under all conditions.
A New Soft-Switched Resonant DC-DC ConverterIDES Editor
This paper presents a new soft-switched resonant dcdc
converter using a passive snubber circuit. The proposed
converter uses a new zero voltage and zero current switching
(ZVZCS) strategies to get ZVZCS function. Besides operating
at constant frequency, all semiconductor devices operate at
soft-switching without additional voltage and current stresses.
In order to validate the proposed converter, computer
simulations and experimental results were conducted. The
paper indicates the effective converter operation region of the
soft-switching action and its efficiency improvement results
on the basis of experimental evaluations using laboratory
prototype.
Development of Dual Frequency Alternator Technology Based Power Source For Mi...IDES Editor
This paper presents a Dual frequency alternator,
which generates power output at 50Hz and 400Hz. In weapon
system applications 50Hz and 400Hz power is required to meet
the requirement of different loads which operate at different
frequencies simultaneously. To cater power supply to these
loads either separate generators are required to be used or
50Hz and 400Hz power is obtained by solid-state conversion
using power converters. These separate power sources
increases the logistics, space requirement, maintenance,
repairs and overhauls. To overcome these difficulties special
kind of machine called Dual Frequency Alternator has been
designed to give power outputs of 50Hz and 400Hz frequencies
simultaneously with a single prime mover (Engine). In this
paper design, development and performance evaluation of the
Dual frequency output alternator along with integrated power
supply system is discussed. Experimental results are also
presented that demonstrate the high performance of Dual
frequency output Alternator technology for future Power
generation system.
Specification-based Verification of Incomplete ProgramsIDES Editor
Recently, formal methods like model checking or
theorem proving have been considered efficient tools for
software verification. However, when practically applied, those
techniques suffer high complexity cost. Combining static
analysis with dynamic checking to deal with this problem has
been becoming an emerging trend, which results in the
introduction of concolic testing technique and its variations.
However, the analysis-based verification techniques always
assume the availability of full source code of the verified
program, which does not always hold in real life contexts. In
this paper, we propose an approach to tackle this problem,
where our contributed ideas are (i) combining function
specification with control flow analysis to deal with sourcemissing
function; (ii) generating self-complete programs from
incomplete programs by means of concrete execution, thus
making them fully verifiable by model checking; and (iii)
developing a constraint-based test-case generation technique
to significantly reduce the complexity. Our solution has been
proved viable when successfully deployed for checking
programming work of students.
Application of Solar Powered High Voltage Discharge Plasma for NOX Removal in...IDES Editor
This document describes a proposed system for using solar-powered high voltage discharge plasma to remove NOx from diesel engine exhaust. It includes:
1) A boost converter that boosts the voltage from a 12V solar-powered battery to 24V, and an automobile ignition coil that generates high voltage pulses using flyback topology.
2) A comparison of discharge plasma and plasma-adsorbent processes for NOx removal at different gas flow rates, using activated alumina as the adsorbent.
3) The design and fabrication of the high voltage pulse source, including the boost converter, ignition coil driver circuit, and generation of high voltage pulses up to 18kV from the 24V input.
ANN Based PID Controlled Brushless DC drive SystemIDES Editor
Brushless (BLDC) DC motors find many industrial
applications such as process control, robotics, automation,
aerospace etc. Wider usage of this system has demanded an
optimum position control for high efficiency, accuracy and
reliability. Hence for the effective position control, estimation
of dynamic load parameters i.e. moment of inertia and friction
coefficient is necessary. This paper incorporates the estimation
of mechanical parameters such as moment of inertia and
friction coefficient of BLDC motor and load at various load
settings by using simple procedure. To achieve the optimum
position control, PID controller is employed and tuned using
PARR method. ANN training is used for obtaining the
mechanical and PID controller parameters at different load
settings. Closed loop position control system of the BLDC
drive system is created using SIMULINK. Simulation results
of this system are obtained at different load settings. It is
evident from the results that the position control system
responds to the desired position with minimum rise time,
settling time and peak overshoot.
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
These days people prefer to use portable and wireless devices such as laptops, mobile phones, They are connected through satellites. As user moves from one point to other, task of updating stored information becomes difficult. Provision of Location based services to users, faces some challenges like limited bandwidth and limited client power. To optimize data accessibility and to minimize access cost, we can store frequently accessed data item in cache of client. So small size of cache is introduced in mobile devices. Data fetched from server is stored on cache. So requested data from user is provided from cache and not from remote server. Question arises that which data should be kept in the cache? Performance of cache majorly depends on the cache replacement policies which select data suitable for eviction from cache. This paper presents use of Hidden Markov Models(HMMs) for prediction of user‟s future location. Then data item irrelevant to this predicted location is fetched out from the cache. The proposed approach clusters location histories according to their location characteristics and also it considers each user‟s previous actions. This results in producing high packet delivery ratio and minimum delay.
Data Management In Cellular Networks Using Activity MiningIDES Editor
In the recent technology advances, an increasing
number of users are accessing various information systems
via wireless communication. The majority users in a mobile
environment are moving and accessing wireless services for
the activities they are currently unavailable inside. We
propose the idea of complex activity for characterizing the
continuously changing complex behavior patterns of mobile
users. For the purpose of data management, a complex activity
is copy as a sequence of location movement, service requests,
the coincidence of location and service, or the interleaving of
all above. An activity may be composed of sub activities.
Different activities may exhibit dependencies that affect user
behaviors. We argue that the complex activity concept provides
a more specific, rich, and detail description of user behavioral
patterns which are very useful for data management in mobile
environments. Correct exploration of user activities has the
possible of providing much higher quality and personalized
services to individual user at the right place on the right time.
We, therefore, propose new methods for complex activity
mining, incremental maintenance, online detection and
proactive data management based on user activities. In
particular, we develop pre-fetching and pushing techniques
with cost sensitive control to make easy analytical data
allocation. First round implementation and simulation results
shows that the proposed framework and techniques can
significantly increase local availability, conserve execution
cost, reduce response time, and improve cache utilization.
Location Based Services, Change in Profile and Notification IRJET Journal
This document discusses a proposed location-based services application for Android devices. It would allow automatic profile changing, weather detection, and message sending based on the user's location. The application would use GPS and internet access to determine the user's location. It describes how location-based services work and the typical components involved, including mobile devices, applications, communication networks, positioning systems like GPS, and backend servers. The proposed application aims to provide these location-based functions for Android smartphones in a simple, automatic way.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
This document proposes a framework to improve the processing of spatio-temporal queries for global positioning systems. The framework employs a new indexing algorithm built on SQL Server 2008 that avoids the overhead of R-Tree indexing. It utilizes dynamic materialized views and an adaptive safe region to reduce communication costs and update loads. Caching is used to enhance performance. The notification engine processes concurrent queries using publish/subscribe to group similar queries. Experiments showed the framework outperformed R-Tree indexing.
Prototyping the Future Potentials of Location Based Services in the Realm of ...IOSR Journals
This document discusses prototyping future potentials of location-based services in e-governance. It begins by defining ubiquitous computing, context-aware applications, and location-based services. It then outlines two classes of LBS - pull, where users actively request location-based data, and push, where networks proactively provide information to users. The document also describes the key components of an LBS communication model, including user devices, communication networks, positioning systems, application servers, and data servers. Lastly, it discusses challenges with incorporating location and context into existing governance models.
Vertical Fragmentation of Location Information to Enable Location Privacy in ...ijasa
The aim of the development of Pervasive computing was to simplify our lives by integrating
communication technologies into real life. Location aware computing which is evolved from pervasive
computing performs services which are dependent on the location of the user or his communication
device. The advancements in this area have led to major revolutions in various application areas,
especially mass advertisements. It has long been evident that privacy of personal information, in this
case location of the user, is rather a touchy subject with most people. This paper explores the Location
Privacy issue in location aware computing. Vertical fragmentation of the stored location information of
users has been proposed as an effective solution for this issue.
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
This document proposes a privacy-supportive architecture for location-based services that allows users to make informed decisions about location privacy without significantly affecting service quality. The key aspects are:
1) Users first submit queries with generalized locations and receive a "service similarity profile" showing how results may vary across locations.
2) Users can then select a noisy location based on their privacy preferences while observing how it impacts results.
3) An example local search application is described to demonstrate how result set boundaries with no change can be identified, allowing large default privacy regions. Testing found users can add significant location noise while still getting accurate results.
This document discusses location based services (LBS) using the Android mobile operating system. It describes the components of an LBS system including mobile devices, applications, communication networks, positioning technologies, and service servers. It also discusses how LBS works on Android, including using the LocationManager class to obtain location from GPS or network providers, and Google Maps API to display maps. Potential applications of LBS are mentioned like navigation, advertising, and tracking family/friends. Advantages of building LBS on Android include its open source nature and ability to access device hardware, while limitations include lack of support from major companies.
This document proposes a user-centric approach called MobiCrowd to improve location privacy in location-based services. MobiCrowd allows mobile users to collaborate by storing each other's location information and responding to queries, hiding users from the location server unless no collaborative peers have the requested information. An epidemic model is developed to analyze how parameters like query rates and data lifetime affect privacy. Results show MobiCrowd hides a high fraction of queries, significantly enhancing privacy, and implementation shows it is lightweight with negligible collaboration costs.
a data mining approach for location production in mobile environments marwaeng
The document proposes a three-phase algorithm for predicting the next location of mobile users. In the first phase, mobility patterns are mined from historical user trajectory data. In the second phase, mobility rules are extracted from these patterns. In the third phase, predictions are made by matching mobility rules to a user's current trajectory. The algorithm aims to overcome limitations of prior work by discovering regular patterns in user movements and distinguishing between random and regular movements. A simulation evaluation found the proposed method achieved more accurate predictions than other methods.
Mobile Location Indexing Based On Synthetic Moving ObjectsIJECEIAES
Today, the number of researches based on the data they move known as mobile objects indexing came out from the traditional static one. There are some indexing approaches to handle the complicated moving positions. One of the suitable ideas is pre-ordering these objects before building index structure. In this paper, a structure, a presorted-nearest index tree algorithm is proposed that allowed maintaining, updating, and range querying mobile objects within the desired period. Besides, it gives the advantage of an index structure to easy data access and fast query along with the retrieving nearest locations from a location point in the index structure. A synthetic mobile position dataset is also proposed for performance evaluation so that it is free from location privacy and confidentiality. The detail experimental results are discussed together with the performance evaluation of KDtree-based index structure. Both approaches are similarly efficient in range searching. However, the proposed approach is especially much more save time for the nearest neighbor search within a range than KD tree-based calculation.
Location dependent query processing involves processing queries that relate to a user's location. The location can be determined using different methods like GPS, cell ID, etc. Location dependent data is data whose value depends on the location it relates to, like local restaurants or events. Location dependent queries ask for information related to a location, but may not explicitly state the location. The location needs to be determined first before the query can be processed. Once the user's location is known, the query becomes location-aware.
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...IJMTST Journal
Due to the large increasing use of Location Based Services (LBS), which require personal data of the user to provide the continuous service, protecting the privacy of these data has become a challenge. An approach to preserving a privacy is through anonymity, by hiding the identity and user location data of the mobile device from the service provider(third party) or from any unauthorized party who has access at the user’s request .Considering the challenge mentioned, in this paper gives a classification according to the Architecture, approaches and techniques used in previous works, and presents a survey of solutions to provide anonymity in LBS including the open issues or possible improvements to current solutions. All of this, in order to provide guidelines for choosing the best solution approach to a specific scenery in which anonymity is required.
Vertical fragmentation of location information to enable location privacy in ...IJASAJournal1
The aim of the development of Pervasive computing was to simplify our lives by integrating communication technologies into real life. Location aware computing which is evolved from pervasive computing performs services which are dependent on the location of the user or his communication device. The advancements in this area have led to major revolutions in various application areas, especially mass advertisements. It has long been evident that privacy of personal information, in this case location of the user, is rather a touchy subject with most people. This paper explores the Location Privacy issue in location aware computing. Vertical fragmentation of the stored location information of users has been proposed as an effective solution for this issue.
A Survey of Indoor Localization TechniquesIOSR Journals
This document provides a survey of indoor localization techniques. It begins by explaining that GPS cannot be used indoors due to lack of line of sight with satellites. It then classifies indoor localization techniques based on enabling technologies like radio frequency, ultrasound, wireless sensor networks, and smartphones. The document compares various techniques based on parameters like cost, accuracy, and provides a table comparing the results. It surveys localization techniques for applications like healthcare, asset tracking, and navigation indoors.
Mobile Device Application to locate an Interest Point using Google MapsEditor IJCATR
Location-based service is a service mechanism that generates geographical location information. This service will certainly
give much benefit as there are many people who would like to find public facilities quickly and easily. The needs to know the
existence of public facilities quickly and easily is of great demands in the society. Based on the above problems, it is necessary to
develop an application that can get any access to the geographical location in mobile phones. Information from this application is
expected to help searching for such public facilities. This Searching for interest point information was read using the Location API in
Xcode IOS 4.2. The resulting information was displayed on the application of the iPhone. From the test results, the information of the
position was influenced by the availability of the information service provider, carrier signal strength, and mobile phone capabilities.
This document discusses techniques for delivering location-based content to mobile users with minimal delay in delay-sensitive pervasive applications. It proposes using a semi-Markov process to model user movement, exploiting the fact that multiple users may want the same content to use broadcast dissemination, and allowing mobile nodes to cache and share locally relevant content with other nodes to reduce load on servers and access points. The paper analyzes sources of delay and integrates these techniques to provide improved location-oriented content delivery strategies.
Ubiquitous Positioning: A Taxonomy for Location Determination on Mobile Navig...sipij
This document proposes a taxonomy for classifying different methods of ubiquitous positioning systems that can be used for location determination on mobile navigation systems. It identifies five key factors - scale, output, measurements, roles, and estimation method. For each factor, it outlines different options and provides examples from previous research. The taxonomy is intended to help researchers better understand the design options for ubiquitous positioning systems and to scope future research areas. It covers positioning methods based on radio frequency, vision, and GPS and categorizes them according to factors like the type of measurements used, system architecture, and algorithms for estimating location.
Application Of Android Enabled Mobile Device For Personal Information Systemsijasa
The document describes a proposed personal mobile information system (PMIS) developed on the Android platform. The PMIS would provide location-based services like GPS-enabled proximity alerts and a rating system for points of interest. It would also plot routes from a user's location to points of interest, alerting users of any crime incidents along the way based on police data. The system has two types of users: general users who can rate and find points of interest, and police users who can log crime events and update safety ratings to inform alerts for general users. The goal is to create a personalized mobile information system that enhances user safety during navigation.
Similar to Resource Identification Using Mobile Queries (20)
Power System State Estimation - A ReviewIDES Editor
This document provides a review of power system state estimation techniques. It discusses both static and dynamic state estimation algorithms. For static state estimation, it covers weighted least squares, decoupled, and robust estimation methods. Weighted least squares is commonly used but can have numerical instability issues. Decoupled state estimation approximates the gain matrix for faster computation. Robust estimation uses M-estimators and other techniques to handle outliers and bad data. Dynamic state estimation applies Kalman filtering, leapfrog algorithms, and other methods to continuously monitor system states over time.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
This document summarizes a research paper that proposes using artificial intelligence techniques and FACTS controllers for reactive power planning in real-time power transmission systems. The paper formulates the reactive power planning problem and incorporates flexible AC transmission system (FACTS) devices like static VAR compensators (SVC), thyristor controlled series capacitors (TCSC), and unified power flow controllers (UPFC). Evolutionary algorithms like evolutionary programming (EP) and differential evolution (DE) are applied to find the optimal locations and settings of the FACTS controllers to minimize losses and costs. Simulation results on IEEE 30-bus and 72-bus Indian test systems show that UPFC performs best in reducing losses compared to SVC and TCSC.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.