The aim of the development of Pervasive computing was to simplify our lives by integrating
communication technologies into real life. Location aware computing which is evolved from pervasive
computing performs services which are dependent on the location of the user or his communication
device. The advancements in this area have led to major revolutions in various application areas,
especially mass advertisements. It has long been evident that privacy of personal information, in this
case location of the user, is rather a touchy subject with most people. This paper explores the Location
Privacy issue in location aware computing. Vertical fragmentation of the stored location information of
users has been proposed as an effective solution for this issue.
Real time hand gesture recognition system for dynamic applicationsijujournal
Virtual environments have always been considered as a means for more visceral and efficient human computer interaction by a diversified range of applications. The spectrum of applications includes analysis of complex scientific data, medical training, military simulation, phobia therapy and virtual prototyping. Evolution of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are not sufficient for the still widening spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy, constraining and uncomfortable to use. Due to the limitation of these devices the useable command set based diligences is also limited. Direct use of hands as an input device is an innovative method for providing natural Human Computer Interaction which has its inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems. Conceiving a future era of human-computer interaction with the implementations of 3D application where the user may be able to move and rotate objects simply by moving and rotating his hand - all without help of any input device. The research effort centralizes on the efforts of implementing an application that employs computer vision algorithms and gesture recognition techniques which in turn results in developing a low cost interface device for interacting with objects in virtual environment using hand gestures. The prototype architecture of the application comprises of a central computational module that applies the camshift technique for tracking of hands and its gestures. Haar like technique has been utilized as a classifier that is creditworthy for locating hand position and classifying gesture. The patterning of gestures has been done for recognition by mapping the number of defects that is formed in the hand with the assigned gestures. The virtual objects are produced using Open GL library. This hand gesture recognition technique aims to substitute the use of mouse for interaction with the virtual objects. This will be useful to promote controlling applications like virtual games, browsing images etc in virtual environment using hand gestures.
Real time hand gesture recognition system for dynamic applicationsijujournal
Virtual environments have always been considered as a means for more visceral and efficient human computer interaction by a diversified range of applications. The spectrum of applications includes analysis of complex scientific data, medical training, military simulation, phobia therapy and virtual prototyping.
Evolution of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are
not sufficient for the still widening spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy, constraining and uncomfortable to use. Due to the limitation of these devices the useable command set based diligences is also limited. Direct use of hands as an input device is an
innovative method for providing natural Human Computer Interaction which has its inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia-supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems. Conceiving a future era of human-computer
interaction with the implementations of 3D application where the user may be able to move and rotate objects simply by moving and rotating his hand - all without help of any input device.
Machine Learning approach for Assisting Visually ImpairedIJTET Journal
Abstract- India has the largest blind population in the world. The complex Indian environment makes it difficult for the people to navigate using the present technology. In-order to navigate effectively a wearable computing system should learn the environment by itself, thus providing enough information for making visually impaired adapt to the environment. The traditional learning algorithm requires the entire percept sequence to learn. This paper will propose algorithms for learning from various sensory inputs with selected percept sequence; analyze what feature and data should be considered for real time learning and how they can be applied for autonomous navigation for blind, what are the problem parameters to be considered for the blind navigation/protection, tools and how it can be used on other application.
Real time hand gesture recognition system for dynamic applicationsijujournal
Virtual environments have always been considered as a means for more visceral and efficient human computer interaction by a diversified range of applications. The spectrum of applications includes analysis of complex scientific data, medical training, military simulation, phobia therapy and virtual prototyping. Evolution of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are not sufficient for the still widening spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy, constraining and uncomfortable to use. Due to the limitation of these devices the useable command set based diligences is also limited. Direct use of hands as an input device is an innovative method for providing natural Human Computer Interaction which has its inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems. Conceiving a future era of human-computer interaction with the implementations of 3D application where the user may be able to move and rotate objects simply by moving and rotating his hand - all without help of any input device. The research effort centralizes on the efforts of implementing an application that employs computer vision algorithms and gesture recognition techniques which in turn results in developing a low cost interface device for interacting with objects in virtual environment using hand gestures. The prototype architecture of the application comprises of a central computational module that applies the camshift technique for tracking of hands and its gestures. Haar like technique has been utilized as a classifier that is creditworthy for locating hand position and classifying gesture. The patterning of gestures has been done for recognition by mapping the number of defects that is formed in the hand with the assigned gestures. The virtual objects are produced using Open GL library. This hand gesture recognition technique aims to substitute the use of mouse for interaction with the virtual objects. This will be useful to promote controlling applications like virtual games, browsing images etc in virtual environment using hand gestures.
Real time hand gesture recognition system for dynamic applicationsijujournal
Virtual environments have always been considered as a means for more visceral and efficient human computer interaction by a diversified range of applications. The spectrum of applications includes analysis of complex scientific data, medical training, military simulation, phobia therapy and virtual prototyping.
Evolution of ubiquitous computing, current user interaction approaches with keyboard, mouse and pen are
not sufficient for the still widening spectrum of Human computer interaction. Gloves and sensor based trackers are unwieldy, constraining and uncomfortable to use. Due to the limitation of these devices the useable command set based diligences is also limited. Direct use of hands as an input device is an
innovative method for providing natural Human Computer Interaction which has its inheritance from textbased interfaces through 2D graphical-based interfaces, multimedia-supported interfaces, to full-fledged multi-participant Virtual Environment (VE) systems. Conceiving a future era of human-computer
interaction with the implementations of 3D application where the user may be able to move and rotate objects simply by moving and rotating his hand - all without help of any input device.
Machine Learning approach for Assisting Visually ImpairedIJTET Journal
Abstract- India has the largest blind population in the world. The complex Indian environment makes it difficult for the people to navigate using the present technology. In-order to navigate effectively a wearable computing system should learn the environment by itself, thus providing enough information for making visually impaired adapt to the environment. The traditional learning algorithm requires the entire percept sequence to learn. This paper will propose algorithms for learning from various sensory inputs with selected percept sequence; analyze what feature and data should be considered for real time learning and how they can be applied for autonomous navigation for blind, what are the problem parameters to be considered for the blind navigation/protection, tools and how it can be used on other application.
The paper presents a methodology for detecting a virtual passive pointer. The passive pointer or device does not have any active energy source within it (as opposed to a laser pointer) and thus cannot easily be detected or identified. The modeling and simulation task is carried out by generating high resolution color images of a pointer viewing via two digital cameras with a popular three-dimensional (3D) computer graphics and animation program, Studio 3D Max by Discreet. These images are then retrieved for analysis into a Microsoft’s Visual C++ program developed based on the theory of image triangulation. The program outputs a precise coordinates of the pointer in the 3D space in addition to it’s projection on a view screen located in a large display/presentation room. The computational results of the pointer projection are compared with the known locations specified by the Studio 3D Max for different simulated configurations. High pointing accuracy is achieved: a pointer kept 30 feet away correctly hits the target location within a few inches. Thus this technology can be used in presenter-audience applications.
Real Time Facial Emotion Recognition using Kinect V2 Sensoriosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
Augmented reality (AR) is a technology which provides real time integration of digital content with the
information available in real world. Augmented reality enables direct access to implicit information
attached with context in real time. Augmented reality enhances our perception of real world by enriching
what we see, feel, and hear in the real environment. This paper gives comparative study of various
augmented reality software development kits (SDK’s) available to create augmented reality apps. The
paper describes how augmented reality is different from virtual reality; working of augmented reality
system and different types of tracking used in AR.
A survey on hiding user privacy in location based services through clusteringeSAT Journals
Abstract Smartphone’s are being more and more popular as the technology being evolve. The Smartphone’s are capable of providing the location aware services like GPS. They share all the location information with the central location server. When user submit any query then these query also carries some personal information of the user. This query and information is then submitted to the LGS server. At the LBS server this information is not much confidential. Someone can use this information to make user panic. To overcome this we are proposing the new collaborative approach to hide user’s personal data from the LBS server. Our approach does not lead to make changes in the architecture of the LBS server. And we are also not going to use the third party server. Here we are going to use the other user’s device to search other users query so that other user can be get hide from the LBS server. Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models
Human Computer Interaction Based HEMD Using Hand GestureIJAEMSJORNAL
Hand gesture based Human-Computer-Interaction (HCI) is one of the most normal and spontaneous ways to communicate between people and apparatus to present a hand gesture recognition system with Webcam, Operates robustly in unrestrained environment and is insensible to hand variations and distortions. This classification consists of two major modules, that is, hand detection and gesture recognition. Diverse from conventional vision-based hand gesture recognition methods that use color-markers for hand detection, this system uses both the depth and color information from Webcam to detect the hand shape, which ensures the sturdiness in disorderly environments. Assurance its heftiness to input variations or the distortions caused by the low resolution of webcam, to apply a novel shape distance metric called Handle Earth Mover's Distance (HEMD) for hand gesture recognition. Consequently, in this paper concept operates accurately and efficiently. The intend of this paper is to expand robust and resourceful hand segmentation algorithm where three algorithms for hand segmentation using different color spaces with required thresholds have were utilized. Hand tracking and segmentation algorithm is found to be most resourceful to handle the challenge of apparition based organization such as skin dye detection. Noise may hold, for a moment, in the segmented image due to lively background. Tracking algorithm was developed and applied on the segmented hand contour for elimination of unnecessary background noise
Design of Image Projection Using Combined Approach for TrackingIJMER
Over the years the techniques and methods that have been used to interact with the
computers have evolved significantly. From the primitive use of punch cards to the latest touch screen
panels we can see the vast improvement in interaction with the system. There are many new ways of
projection and interaction technologies that can reshape our perception and interaction
methodologies. Also projection technology is very useful for creating various geometric displays. In
earlier generations, the projector technology was used for projecting images and videos on single
screen, using large and bulky setup. To overcome the earlier limitations we are designing “Wireless
Image Projection Tracking”, which is a system that uses IR (Infrared) technology to track the body in
the IR range and uses their movements for image orientation and manipulations like zoom, tilt/rotate,
and scale. We are presenting a method of mapping IR light source position and orientation to an
image. By using this system we can also track single and multiple IR light source positions and also it
can be used effectively to see the image projection in 3D view. Extension in this technology can further
be useful for future tracking capabilities to implement the touch screen feature for commercial
applications.
Emotion-oriented computing: Possible uses and applicationsAndré Valdestilhas
This article discusses the concepts of using digital television affective computing and computer vision.
The proposal involves the union of some techniques such as capturing facial expressions through a video
camera, use of accelerometers in ball and touch holograms to work a certain level of interactivity with the
viewer. Some uses of the proposal in question are described, such as control of the hearing, background
content, among others. This article reveals numerous benefits that can be addressed with the use of
matters presented which can be applied in a broad context, such as for the blind in video games, among
others
Hand Gesture Recognition System for Human-Computer Interaction with Web-Camijsrd.com
This paper represents a comparative study of exiting hand gesture recognition systems and gives the new approach for the gesture recognition which is easy cheaper and alternative of input devices like mouse with static and dynamic hand gestures, for interactive computer applications. Despite the increase in the attention of such systems there are still certain limitations in literature. Most applications require different constraints like having distinct lightning conditions, usage of a specific camera, making the user wear a multi-coloured glove or need lots of training data. The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). This interface is simple enough to be run using an ordinary webcam and requires little training.
Understanding User Intentions in Pervasive Computing EnvironmentKarthikeyan V
The challenge for pervasive system developers here is to detect the user intention so as to remove any ambiguity in the user’s expression of a pervasive action. Understanding user intentions can be achieved by detecting the user status and the environment status. The attention data and context data thus obtained can be connected to give us the intention data. The user intention data can be helpful in enabling PCE to provide pro-active and situation-specific user support.
Mouse Simulation Using Two Coloured Tapes ijistjournal
In this paper, we present a novel approach for Human Computer Interaction (HCI) where, we control cursor movement using a real-time camera. Current methods involve changing mouse parts such as adding more buttons or changing the position of the tracking ball. Instead, our method is to use a camera and computer vision technology, such as image segmentation and gesture recognition, to control mouse tasks (left and right clicking, double-clicking, and scrolling) and we show how it can perform everything as current mouse devices can.
The software will be developed in JAVA language. Recognition and pose estimation in this system are user independent and robust as we will be using colour tapes on our finger to perform actions. The software can be used as an intuitive input interface to applications that require multi-dimensional control e.g. computer games etc.
Gesture recognition using artificial neural network,a technology for identify...NidhinRaj Saikripa
This paper contains a technology for identifying any type of body motions commonly originating from hand and face using artificial neural network.This include identifying sign language also.This technology is for speech impaired individuals.
// I have shared a presentation in this topic
The paper presents a methodology for detecting a virtual passive pointer. The passive pointer or device does not have any active energy source within it (as opposed to a laser pointer) and thus cannot easily be detected or identified. The modeling and simulation task is carried out by generating high resolution color images of a pointer viewing via two digital cameras with a popular three-dimensional (3D) computer graphics and animation program, Studio 3D Max by Discreet. These images are then retrieved for analysis into a Microsoft’s Visual C++ program developed based on the theory of image triangulation. The program outputs a precise coordinates of the pointer in the 3D space in addition to it’s projection on a view screen located in a large display/presentation room. The computational results of the pointer projection are compared with the known locations specified by the Studio 3D Max for different simulated configurations. High pointing accuracy is achieved: a pointer kept 30 feet away correctly hits the target location within a few inches. Thus this technology can be used in presenter-audience applications.
Real Time Facial Emotion Recognition using Kinect V2 Sensoriosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
Augmented reality (AR) is a technology which provides real time integration of digital content with the
information available in real world. Augmented reality enables direct access to implicit information
attached with context in real time. Augmented reality enhances our perception of real world by enriching
what we see, feel, and hear in the real environment. This paper gives comparative study of various
augmented reality software development kits (SDK’s) available to create augmented reality apps. The
paper describes how augmented reality is different from virtual reality; working of augmented reality
system and different types of tracking used in AR.
A survey on hiding user privacy in location based services through clusteringeSAT Journals
Abstract Smartphone’s are being more and more popular as the technology being evolve. The Smartphone’s are capable of providing the location aware services like GPS. They share all the location information with the central location server. When user submit any query then these query also carries some personal information of the user. This query and information is then submitted to the LGS server. At the LBS server this information is not much confidential. Someone can use this information to make user panic. To overcome this we are proposing the new collaborative approach to hide user’s personal data from the LBS server. Our approach does not lead to make changes in the architecture of the LBS server. And we are also not going to use the third party server. Here we are going to use the other user’s device to search other users query so that other user can be get hide from the LBS server. Keywords: Mobile networks, location-based services, location privacy, Bayesian inference attacks, epidemic models
Human Computer Interaction Based HEMD Using Hand GestureIJAEMSJORNAL
Hand gesture based Human-Computer-Interaction (HCI) is one of the most normal and spontaneous ways to communicate between people and apparatus to present a hand gesture recognition system with Webcam, Operates robustly in unrestrained environment and is insensible to hand variations and distortions. This classification consists of two major modules, that is, hand detection and gesture recognition. Diverse from conventional vision-based hand gesture recognition methods that use color-markers for hand detection, this system uses both the depth and color information from Webcam to detect the hand shape, which ensures the sturdiness in disorderly environments. Assurance its heftiness to input variations or the distortions caused by the low resolution of webcam, to apply a novel shape distance metric called Handle Earth Mover's Distance (HEMD) for hand gesture recognition. Consequently, in this paper concept operates accurately and efficiently. The intend of this paper is to expand robust and resourceful hand segmentation algorithm where three algorithms for hand segmentation using different color spaces with required thresholds have were utilized. Hand tracking and segmentation algorithm is found to be most resourceful to handle the challenge of apparition based organization such as skin dye detection. Noise may hold, for a moment, in the segmented image due to lively background. Tracking algorithm was developed and applied on the segmented hand contour for elimination of unnecessary background noise
Design of Image Projection Using Combined Approach for TrackingIJMER
Over the years the techniques and methods that have been used to interact with the
computers have evolved significantly. From the primitive use of punch cards to the latest touch screen
panels we can see the vast improvement in interaction with the system. There are many new ways of
projection and interaction technologies that can reshape our perception and interaction
methodologies. Also projection technology is very useful for creating various geometric displays. In
earlier generations, the projector technology was used for projecting images and videos on single
screen, using large and bulky setup. To overcome the earlier limitations we are designing “Wireless
Image Projection Tracking”, which is a system that uses IR (Infrared) technology to track the body in
the IR range and uses their movements for image orientation and manipulations like zoom, tilt/rotate,
and scale. We are presenting a method of mapping IR light source position and orientation to an
image. By using this system we can also track single and multiple IR light source positions and also it
can be used effectively to see the image projection in 3D view. Extension in this technology can further
be useful for future tracking capabilities to implement the touch screen feature for commercial
applications.
Emotion-oriented computing: Possible uses and applicationsAndré Valdestilhas
This article discusses the concepts of using digital television affective computing and computer vision.
The proposal involves the union of some techniques such as capturing facial expressions through a video
camera, use of accelerometers in ball and touch holograms to work a certain level of interactivity with the
viewer. Some uses of the proposal in question are described, such as control of the hearing, background
content, among others. This article reveals numerous benefits that can be addressed with the use of
matters presented which can be applied in a broad context, such as for the blind in video games, among
others
Hand Gesture Recognition System for Human-Computer Interaction with Web-Camijsrd.com
This paper represents a comparative study of exiting hand gesture recognition systems and gives the new approach for the gesture recognition which is easy cheaper and alternative of input devices like mouse with static and dynamic hand gestures, for interactive computer applications. Despite the increase in the attention of such systems there are still certain limitations in literature. Most applications require different constraints like having distinct lightning conditions, usage of a specific camera, making the user wear a multi-coloured glove or need lots of training data. The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). This interface is simple enough to be run using an ordinary webcam and requires little training.
Understanding User Intentions in Pervasive Computing EnvironmentKarthikeyan V
The challenge for pervasive system developers here is to detect the user intention so as to remove any ambiguity in the user’s expression of a pervasive action. Understanding user intentions can be achieved by detecting the user status and the environment status. The attention data and context data thus obtained can be connected to give us the intention data. The user intention data can be helpful in enabling PCE to provide pro-active and situation-specific user support.
Mouse Simulation Using Two Coloured Tapes ijistjournal
In this paper, we present a novel approach for Human Computer Interaction (HCI) where, we control cursor movement using a real-time camera. Current methods involve changing mouse parts such as adding more buttons or changing the position of the tracking ball. Instead, our method is to use a camera and computer vision technology, such as image segmentation and gesture recognition, to control mouse tasks (left and right clicking, double-clicking, and scrolling) and we show how it can perform everything as current mouse devices can.
The software will be developed in JAVA language. Recognition and pose estimation in this system are user independent and robust as we will be using colour tapes on our finger to perform actions. The software can be used as an intuitive input interface to applications that require multi-dimensional control e.g. computer games etc.
Gesture recognition using artificial neural network,a technology for identify...NidhinRaj Saikripa
This paper contains a technology for identifying any type of body motions commonly originating from hand and face using artificial neural network.This include identifying sign language also.This technology is for speech impaired individuals.
// I have shared a presentation in this topic
Pervasive computing also known as Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. Eg:laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses.
•It is also termed as ambient intelligence, Ubiquitous computing ,everyware,physical computing, the Internet of Things, haptic computing, and 'things that think’.
Vertical fragmentation of location information to enable location privacy in ...IJASAJournal1
The aim of the development of Pervasive computing was to simplify our lives by integrating communication technologies into real life. Location aware computing which is evolved from pervasive computing performs services which are dependent on the location of the user or his communication device. The advancements in this area have led to major revolutions in various application areas, especially mass advertisements. It has long been evident that privacy of personal information, in this case location of the user, is rather a touchy subject with most people. This paper explores the Location Privacy issue in location aware computing. Vertical fragmentation of the stored location information of users has been proposed as an effective solution for this issue.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
User Controlled Privacy in Participatory SensingIDES Editor
Most of the sensor network applications in military
and civilian use are surreptitious. If these are used for the
benefit of society in addition to the individual needs a new set
of applications can be developed. This paper describes
infrastructure monitoring based on collaboration between
sensor networks. The solution provides a reputation based
hybrid network where collaborative trust is established based
on referrals (opinions). Depending on the trust, the
information is exchanged between one entity and another with
different authorization levels. The outcome of the paper is
collaborative data collection with privacy levels controlled by
individual users.
Resource Identification Using Mobile QueriesIDES Editor
Location based mobile services (LBS) are budding
significantly along with development of GPS-enabled mobile
phones, smart phones and PDAs. Mobile users may submit the
query to the server for knowing about nearest resources such
as fuel stations, hospitals, ATM centers etc to get the services.
In this scenario, identifying locations of resources is highly
significant. This paper focuses on query management in
mobile environments to locate the most appropriate location of
the required services.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The goal of this project is to provide a location-based alarm system through which users can broadcast their last known
position in emergency situations. The system will be able to send an SMS or an e-mail containing the user’s location coordinates
to the already registered mobile numbers using GCM service. The location information is obtained using GPS
technology and real-time location is shown on the receiver’s application using Google Maps API. In situations where GPS is
not available, the system tracks location using LBS technology
.Keywords: GPS,GCM,LBS Android.
Privacy Preservation And Data Security In Location Based ServicesEditorJST
In this paper, a solution for privacy preservation and data security is presented. Privacy over the internet can be defined as the ability to decide what information one discloses or withholds about a person over the internet, who can access such information and for what reason a person’s information may or may not be accessed. The problem is stated as follows: (i) a client needs to inquire a database which contains some authorized and sensitive data and does not want to disclose himself to the server because of privacy concerns (ii) the owner of the database i.e the server, does not want to simply give out its data to all users. The server needs to have some control over its information, since the information is its asset. In this paper, a two stage approach is proposed to achieve secure solution for both user and the server. The first step is accomplished using Oblivious Transfer and second step is accomplished using Data Retrieval phase. And, a security model has been devised, which includes encryption and hashing algorithm for providing data security.
Ambient intelligence is an emerging discipline that brings intelligence to our everyday environments and makes those environments sensitive to us. Ambient intelligence (AmI) research builds upon advances in sensors and sensor networks, pervasive computing, and artificial intelligence.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual
socialization has positively influenced social bonding among social media users irrespective of one’s
location in the connected global village. Human user and social bot user are the two types of social media
users. While human users personally operate their social media accounts, social bot users are developed
software that manages a social media account for the human user called the botmaster. This botmaster in
most cases are hackers with bad intention of attacking social media users through various attacking mode
using social bots. The aim of this research work is to design an intelligent framework that will prevent
attacks through social bots on social media network platforms.
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSijasa
A significant portion of communication devices employs microstrip antennas because of their compact size,
low profile, and ability to conform to both planar and non-planar surfaces. To achieve this, we present a
miniature inset-fed rectangular patch antenna using partial ground plane for Ku band applications. The
proposed antenna design used an operating frequency of 15.5 GHz, a FR4 substrate with a dielectric
constant of 4.3, and a thickness of 1.4 mm. It is fed by a 50 Ω inset feedline. Computer simulation
technology (CST) software is used to design, simulate, and analyze. The simulation yields the antenna
performance parameters, including return loss (S11), bandwidth, VSWR, gain, directivity, and radiation
efficiency. The simulation findings revealed that the proposed antenna resonated at 15.5 GHz, with a
return loss of -22.312 dB, a bandwidth of 2.73 GHz (2730 MHz), VSWR of 1.17, a gain of 3.843 dBi, a
directivity of 5.926 dBi, and an antenna efficiency of -2.083 dB (61.901%).
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...ijasa
We, as normal people, have access to a potent communication tool, which is sound. Although we can continuously gather, analyse, and interpret sounds thanks to our sense of hearing, it can be challenging for people with hearing impairment to perceive their surroundings through sound. Also known as PWHI (People with Hearing Impairment). Auditory/phonic impairment is one of the most prevailing sensory deficits in humans at present. Fortunately, there is room to apply a solution to this issue, given the development of technology. Our project involves capturing ambient sounds from the user’s surroundings and notifying the user through a mobile application using IoT and Deep Learning. Its architecture offers sound recognition using a tool, such as a microphone, to capture sounds from the user's surroundings. These sounds are identified and categorized as ambient sounds, like a doorbell, baby cry, and dog barking; as well as emergency-related sounds, such as alarms, sirens, et
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...ijasa
In Lewis and Clark High School’s Key Club, meetings are always held in a crowded classroom. The
system of event sign-up is inefficient and hinders members from joining events. This has led to students
becoming discouraged from joining Key Club and often resulted in a lack of volunteers for important
events. The club needed a more efficient way of connecting volunteers with volunteering opportunities. To
solve this problem, we developed a VolunteerMatch Mobile application using Dart and Flutter framework
for Key Club to use. The next steps will be to add a volunteer event recommendation and matching feature,
utilizing the results from the research on machine learning models and algorithms in this paper.
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMijasa
We have Developed an IoT-based real-time solar power monitoring system in this paper. It seeks an opensource IoT solution that can collect real-time data and continuously monitor the power output and environmental conditions of a photovoltaic panel.The Objective of this work is to continuously monitor the status of various parameters associated with solar systems through sensors without visiting manually, saving time and ensures efficient power output from PV panels while monitoring for faulty solar panels, weather conditionsand other such issues that affect solar effectiveness.Manually, the user must use a multimeter to determine what value of measurement of the system is appropriate for appliance consumers, which is difficult for the larger System. But the Solar Energy Monitoring system is designed to make it easier for users to use the solar system.This system is comprised of a microcontroller (Node MCU), a PV panel, sensors (INA219 Current Module, Digital Temperature Sensor, LDR), a Battery Charger Module, and a battery. The data from the PV panels and other appliances are sent to the cloud (Thingspeak) via the internet using IoT technology and a Wi-Fi module (NodeMCU). It also allows users in remote areas to monitor the parameters of the solar power plant using connected devices. The user can view the current, previous, and average parameters of the solar PV system, such as voltage, current, temperature, and light intensity using a Graphical User Interface. This will facilitate fault detection and maintenance of the solar power plant easier and saves time.
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...ijasa
This paper presents the development of a sensor based smart irrigation system with the capabilities of remote monitoring and controlling of water usage in the agriculture field using Internet of Things (IoT). With the employment of IoT in irrigation system, all agricultural information can be viewed and controlled at the user's fingertips. The system consists of a microcontroller (Node MCU), sensors (soil moisture, DHT11), and irrigation of a water pump with a decision-making system. Sensors are linked to a Wi-Fi module (Node MCU) and are interdependent to provide increased sensitivity to the irrigation system. The data obtained will be uploaded to the cloud (ThingSpeak) and presented in the form of graphs accessible via the website. A web page is used to control the water pump for irrigation purposes. This paper is managed to meet all of its aims to help farmers in terms of time, project cost, labor, water consumption, power consumption, and reliability by implementing the IoT-based smart irrigation system.
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEME...ijasa
Digital modulation increases information capacity, data security, and system availability while maintaining high communication quality. As a result, digital modulation techniques are in higher demand than analog modulation techniques due to their ability to transmit larger amounts of data. Amplitude Shift Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), Differential Phase Shift Keying (DPSK), and Quadrature Amplitude Modulation (QAM) are critical components of current communications systems development, particularly for broadband wireless communications. In this paper, the comparison of bit error rate performance of different modulation schemes (BPSK, QPSK, and16-QAM) and various equalization techniques such as constant modulus algorithm (CMA) and maximum likelihood sequence estimate (MLSE) for the AWGN and Rayleigh fading channels is analyzed using Simulink. BPSK outperforms QPSK and 16-QAM when compared to the other two digital modulation schemes. Among the three digital modulation schemes, BPSK is showing better performance as compared to QPSK and 16- QAM
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
Wireless communications are among the rapidly growing fields in our current life and have a massive effect on every aspect of our everyday life. In this paper, the performance of the various digital modulation techniques (BPSK, DPSK, QPSK, and QAM) based wireless communication system on the audio signal transmission through the additive Gaussian Noise (AWGN) channel is assessed on the basis of bit error rate (BER) as a function of the signal-to-noise ratio (SNR). Based on the results of this study, BPSK modulation outperforms the DPSK, QPSK, and QAM modulation strategies in the MIMO MC-CDMA VBlast based wireless communication system. The digital modulation of QPSK shows the worst performance in audio signal transmission especially in comparison to other digital modulations. It is clear from the current simulation study based on MATLAB that the V-Blast encoded 4×4 MIMO MC-CDMA wireless system with minimum mean square error (MMSE) signal detection and 1⁄2-rated convolution and cyclic redundancy check (CRC) channel encoding strategies show good performance utilizing BPSK digital modulation in audio signal transmission
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
The International Journal of Ambient Systems and Applications (IJASA) ijasa
The International Journal of Ambient Systems and applications is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of ambient Systems. The journal focuses on all technical and practical aspects of ambient Systems, networks, technologies and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced ambient Systems and establishing new collaborations in these areas.Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in ambient Systems.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEijasa
Maintaining a good irrigation system is a necessity in today’s water scarcity environment. This paper describes a new approach for automated Smart Irrigation (SIR) system in agricultural management. Using
various types of sensors in the crop field area, temperature and moisture value of the soil is monitored.Based on the sensed data, SIR will automatically decide about the necessary action for irrigation and also notifies the user. The system will also focus on the reduction of energy consumption by the sensors during communication.
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security.
Network is collection of nodes that interconnect with each other for exchange the Information. This
information is required for that node is kept confidentially. Attacker in network computer captures this
information that is confidential and misuse the network. Hence security is one of the major issues. There
are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed
denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to
target node. DDoS or DoS is an attempt to make network resource or the machine is unavailable to its
intended user. Many ideas are developed for avoiding the DDoS or DoS. DDoS happen in two ways
naturally or it may due to some botnets .Various schemes are developed defense against to this attack.
Main idea of this paper is present basis of DDoS attack. DDoS attack types, DDoS attack components,
survey on different mechanism to prevent DDoS
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.
The World Wide Web is booming and radically vibrant due to the well established standards and widely accountable framework which guarantees the interoperability at various levels of the application and the society as a whole. So far, the web has been functioning at the random rate on the basis of the human intervention and some manual processing but the next generation web which the researchers called semantic web, edging for automatic processing and machine-level understanding. The well set notion, Semantic Web would be turn possible if only there exists the further levels of interoperability prevails among the applications and networks. In achieving this interoperability and greater functionality among the applications, the W3C standardization has already released the well defined standards such as RDF/RDF Schema and OWL. Using XML as a tool for semantic interoperability has not achieved anything effective and failed to bring the interconnection at the larger level. This leads to the further inclusion of inference layer at the top of the web architecture and its paves the way for proposing the common design for encoding the ontology representation languages in the data models such as RDF/RDFS. In this research article, we have given the clear implication of semantic web research roots and its ontological background process which may help to augment the sheer understanding of named entities in the web.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of
two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using
Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial
conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive
to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if
there is a very slight difference between their initial conditions. All these features make chaotic system as
good alternatives for session key generation. In the proposed CSCT few parameters ( , b , r , x1 ,y2 and z2 )
are being exchanged between sender and receiver. Some of the parameter which takes major roles to form
the session key does not get transmitted via public channel, sender keeps these parameters secret. This way
of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like
sniffing, spoofing or phishing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Leading Change strategies and insights for effective change management pdf 1.pdf
Vertical Fragmentation of Location Information to Enable Location Privacy in Pervasive Computing
1. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
Vertical Fragmentation of Location Information
to Enable Location Privacy in Pervasive
Computing
Jeeva Susan Jacob1 and Preetha K.G2
1
Rajagiri School of Engineering and Technology, Rajagiri Valley, Cochin, India
jeevasj27@gmail.com
2
Rajagiri School of Engineering and Technology, Rajagiri Valley, Cochin, India
preetha_kg@rajagiritech.ac.in
Abstract.
The aim of the development of Pervasive computing was to simplify our lives by integrating
communication technologies into real life. Location aware computing which is evolved from pervasive
computing performs services which are dependent on the location of the user or his communication
device. The advancements in this area have led to major revolutions in various application areas,
especially mass advertisements. It has long been evident that privacy of personal information, in this
case location of the user, is rather a touchy subject with most people. This paper explores the Location
Privacy issue in location aware computing. Vertical fragmentation of the stored location information of
users has been proposed as an effective solution for this issue.
Keywords: Pervasive Computing, Location Aware Computing, Location Privacy, Privacy
issues, Vertical Fragmentation, Ubiquitous Computing.
1 Introduction
Pervasive computing techniques integrate three converging areas namely computing,
communications and user interfaces to simplify the lives of users. This is accomplished with
the assistance of a handheld user device like a smartphone. It imparts the reverse concept of
Virtual Reality; to create a real life situation virtually using computing technologies. Pervasive
computing enables the notion of anytime anywhere computing practically possible.
Communication with diverse daily use devices can be done in most situations with the help of
smartphones, sensors and the transceiver devices installed in them.
As an example, consider a situation where you are walking on a road. Your pervasive device,
mostly a smartphone, tracks your location and senses other parameters related to your
movement. If you have an accident and you faint, your phone can sense that your location is
not compatible with the travelling plan you made. In addition to that, the sensors in the device
can sense your heartbeat, blood pressure, body temperature and so on. So if you are hurt the
device can alert the device in the nearest hospital or ambulance communication system all by
itself. Thus valuable time is saved during accidents. Figure 1 shows this example case in detail.
11
2. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
Fig. 1. Example for Pervasive Computing Application
Recent advances in technology have paved the way from pervasive computing by enhancing
existing technical methods towards ubiquitous computing. Ubiquitous computing is more
advanced form of pervasive computing where communication does not require a mediator
communication
device like smartphones. Any objects which have transceiver devices integrated in it can
object
communicate with each other. Consider the previous instance of accident itself. Bear in mind
that now you were travelling in a car and you had an accident. Here your car contacts the
nd
ambulance directly through the transceiver devices installed in them, thus utilizing pervasive
computing. Figure 2 shows the previous example in a ubiquitous environment.
Fig. 2. Block Diagram of Location Aware Computing
12
3. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
Notice that in this case we are utilizing one of the significant application areas of pervasive
computing; ie, Location aware computing. Location aware computing comprises of systems
which percepts the location information of the users and changes their behavior or perform
and
specific functions according to the instructions preprogrammed. In the example described, the
location information of the user or the car enabled providing speedy and adequate medical
attention to the injured user.
Location information describes a user’s location over a specific period of time. They can be
ation
collected through the following methods.
• Locating Systems
They detect the location of a device or find out the devices existing in a particular
location. It provides the answer to the question: “What is the location of a particular
pervasive device?”
• Location Systems
They detect identification of the device and then determine the location information. It
provides the answer to the question: “What pervasive devices exist in a particular region or
ist
location?”
Location aware computing consists of location sensing through the implementation of various
sensing techniques, processing the location information as per location dependent or location
aware queries and then provide them to advanced applications which execute functions based
e
on this processed data. Figure 3 shows the functioning of Location aware computing.
Fig. 3. Block Diagram of Location Aware Computing
Location information can be collected using the methods of proximity location sensing or
methods
triangulation. Proximity location sensing determines the nearest known location of a device or a
famous site located in the proximity of the pervasive device. In the case of the triangulation
location sensing, some geometrical methods based on displacement and angles are utilized for
rical
location determination. The main methods used are lateration and angulation.
13
4. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
Lateration senses the location of a user by performing calculations based on displacements with
a known object. Angulation is a similar method to sense location based on the calculation of
ngulation
angles existing between lines of visions with known objects nearby. Another method for
location sensing which utilizes nonmathematical steps is the scene analysis method. Here the
location can be sensed by comparing and analyzing it with the locations of other prominent
objects in the scene observed. These location sensing methods are shown in figure 4.
Fig. 4. Classification of Location Sensing Techniques
L
2 Location Privacy: Armament for Pervasive Computing
The major applications of location aware computing include location based advertising,
instantaneous medical services, independent travels, resource discovery, network route
selection and the like. The reduction in prices of location sensing hardware and the rise in the
widespread use of personal handheld devices are opening up new opportunities in the domain
of location aware computing.
One of the major challenges in location aware computing is ensuring privacy by the protection
of location information of users. Privacy can be a sensitive issue when it comes to the majority
of people. People insist on maintaining the right to determine who should be acquainted with
what amount of information about them. Misusing location information can lead to major
location
trouble to people. Exposure of the location information about some public figures might even
be a threat to their lives.
Disclosing the location of a person can also lead to fraudulent attacks or spam attacks. Who
will be responsible if someone changes the value of a coordinate in our location information to
frame us for a crime we have not committed? Who would be okay with being under the
limelight for each and every second of our lives? Users might always have the feeling of being
feeling
exposed or constantly being tracked by alien eyes. This is because location information can
uniquely identify us, just like our genetic profile. Figure 5 shows the bad effects of revealing
the precise location of an individual.
14
5. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
Fig. 5. User being tracked with respect to the location
Major location privacy attacks comprises of impersonation attacks, spam attacks and constant
tracking of user’s whereabouts. Laws have been passed in various countries to preserve the
right of people to take decisions on the usage of data regarding their whereabouts by the
isions
government or other communication service providers. But these do not cover the location
tracking of users and using this location information for various applications. Effective
methods need to be developed for ensuring location privacy in pervasive computing.
o
3 Related Work
Numerous methods have been proposed by researchers around the world in this field. Privacy
Sensitive Information Diluting Mechanism (PSIUM) [17] ensures privacy in the user location
data collected by service providers by sending multiple location information messages along
with service requests. Device can select the accurate information from these, but the service
providers cannot. Use of mix nodes [1] reorders the packet flow thus confusing attackers since
ket
these packets appear to be independent of each other.
LocServ [1] acts as a middleware layer between location sensing devices and location
dependent applications. It gives the control of location information to corresponding users.
corresponding
Thus it prevents transfer of location information to other third party agencies which may query
the server for location data of users. Another technique is Mist [1], which is specially designed
to provide location privacy for users in pervasive computing environments. The GeoPriv [18]
pervasive
model integrates location based services with location privacy preservation measures for
effective implementation of location based applications. This is designed for applications
dealing with surveying, mapping, tracking and so on.
ng,
Majority of these proposals are for preventing privacy attacks by tracking the traffic flow
through these systems. In this paper, a proposal for preserving privacy of location information
15
6. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
of users by preventing attacks on the servers using fragmentation techniques is discussed. Third
party attacks and tracking attacks on the information storage base in the location servers can
thus be prevented by this method.
4 Fragmentation: A Database Trait for Preeminent Storage
Fragmentation is a technique commonly used in database management systems to classify data
belonging to a single database and store them properly. Usually it is done in the case of
distributed systems, where systems distributed among geographically distant regions share
resources and applications. Fragmentation and replication of databases is done to ensure
durability and redundancy of significant data in distributed systems. These are mainly of the
types: horizontal fragmentation and vertical fragmentation.
Horizontal fragmentation is done based on the rows or tuples of the database. This is done to
separate tuples or records belonging to a single database into parts. This may happen when
storage of data need to be divided into separate sections or to retrieve some tuples belonging to
a particular category which complies with some constraint. Reconstruction of the original
database is much easier in this case. Each horizontal fragment with tuples can simply be joined
together or can be joined in the order of their primary key.
Fig. 6. Horizontal Fragmentation of Database
Vertical fragmentation is done based on different attributes of a database. Each fragment is
separated based on a particular attribute related to the tuples. On each fragment a unique key
field is attached so that queries can be executed without rejoining these fragments. In most
cases the primary key of the database is replicated in each fragment.
Figure 7 shows the vertical fragmentation of a database where each fragment has the primary
key field, PK, to interlink them as and when required. By using this method we can fragment
the data regarding the users stored in location servers. This separates the location information
from the user’s personal information. Thus an attack on the data storage cannot effectively
16
7. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
reveal a particular user’s location. A malicious attacker may never be able to connect the user
with the corresponding location information when the details of the user lies in separate
fragments of storage.
Fig. 7. Vertical fragmentation of Database with PK as the primary key field
5 Vertical Fragmentation on Location Information
Info
Location information of users is usually maintained in the location servers using Location Area
Identity (LAI). This uniquely identifies the location area (LA) of a particular user at a particular
instant of time.
Fig.8. Vertical Fields of Loc
Location Area Identity (LAI)
This information is stored in the Visitor Location Register (VLR) of the communication
network infrastructure used by the user’s smartphone or handheld device. LAI comprises of
Mobile Country Code (MCC) which identifies the country, Mobile Network Code (MNC)
country,
which identifies the mobile network used and the Location Area Code (LAC) which identifies
unique locations.
When a communication or some other service is requested by the user, the location server
tracks the current location of the user through the handheld device and then provides the
17
8. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
suitable service. Thus on querying the database which stores the user’s profile with personal as
well as location information the user can be tracked without much difficulty. So, in order to
prevent attacks on these databases, vertical fragmentation can be applied fragmenting the
vent
personal information and location information into separate modules of storage.
The values for the unique key field to be added to each of these fragments need to be car
carefully
calculated. Here the Subscriber Identity Module (SIM) (19-20 digits), International Mobile
(19 20
Equipment identity (IMEI) (15 or 17 digits), MCC (3 digits) and MNC (2 digits) values are
considered. These are mathematically combined and a fixed length hash value is generated
hash
using a suitable hash function. These values will vary for each user and thus the new key value
generated will also be unique.
A key field with unique key values thus calculated is added to each of the database fragments
containing personal information and location information respectively. When a service request
rsonal
is sent by the user, the server can calculate the unique key field value and then combine the
required records of the fragments to form the original record with both personal and location
information. The request is then processed based on the information gathered and the requested
service can be provided as per the user’s eligibility for receiving that service.
Figure 9 shows the vertical fragmentation of location server databases. In the case of an attack
databases.
on the server, the attacker cannot identify which tuple in the location information fragment
corresponds to the particular entry in the personal information fragment. Also fake requests can
be identified since imposter would not be able to fake location information since SIM and IMEI
numbers are both considered here. In order to ensure more security to the method the hash
function used can be changed periodically.
Fig.9. Vertical Fragmentation to ensure Location Privacy
18
9. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
Thus, this method ensures privacy to the users by preventing attacks on the location server
databases by third party or malicious agencies. Since this method separates the location
information from the personal information any outsider who intends to attack finds a whole
load of data with no connection to one another. Unfortunately, it cannot prevent the misuse of
location information by the service provider itself, since all the values considered are known to
it.
6 Future Enhancements
Although the proposed method can ensure privacy of location information from external
attacks, measures need to be adapted to prevent misuse of it by the service provider network.
Privacy Laws may prevent it up to a limit, but effective techniques are required. One method
would be to provide only an approximate value for the location information instead of the
accurate coordinates of the location.
Future work also involves research on methods for preventing other kinds of privacy attacks.
Since enhanced pervasive computing or ubiquitous computing techniques does not depend on
handheld user devices, other hardware independent measures need to be developed.
Advancements in hardware technology and communication standards can accelerate the
transformation from Pervasive computing to Ubiquitous computing.
7 Conclusion
As Anthony Burgess says, “To be left alone is the most precious thing one can ask of the
modern world”. In a world which is evolving into a global apartment building from a global
village, ensuring location privacy is a crucial fight against the peeping toms of the
communication world. Measures from the world governments, like the Location Privacy
Protection Bill (2011) which forces Google and Apple to get user’s permission before location
information is tracked, reassure the public that all is not lost yet.
This paper discusses the issue of Location Privacy of users in Pervasive computing
environments. Vertical Fragmentation technique has been proposed as a solution for the attacks
on Location Servers and theft of location information. Its effectiveness in preventing third party
attacks and fake users have been analyzed theoretically. Even though internal attacks cannot be
prevented, it ensures location privacy for the users of a reliable service provider.
References
1. Pankaj Bhaskar, Sheikh I Ahamed, Privacy in Pervasive Computing and Open Issues, Second
International Conference on Availability, Reliability and Security (ARES07), April 2007.
2. Nilothpal Talukder, Sheikh I Ahamed, How much Room before you Rely: Balancing Privacy control
and Fidelity in the Location-based Pervasive Applications, Nineth International Conference on
Mobile Data Management Workshops, April 2008.
3. Sebastian Fischmeister, Guido Menkhaus, Alexander Stumpfl, Location-Detection Strategies in
Pervasive Computing Environments, Proceedings of the First International Conference on Pervasive
Computing and Communications (PerCom03), March 2003.
4. A. Michael Berman, Sue M. Lewis, Anthony Conto, Location-Aware Computing, in page
http://net.educause.edu/ir/library/pdf/DEC0803.pdf, November 2008.
5. Young Jae Kim, Location Aware Computing, in TermPapers page
http://crystal.uta.edu/˜kumar/cse6392/termpapers/Young Paper.pdf , November 2002.
6. Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati,
Location Privacy in Pervasive Computing, in page http://spdp.dti.unimi.it/papers/CL 2008 2.pdf,
November 2008.
19
10. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
7. Matt Duckham, Lars Kulik, Location Privacy and Location-aware Computing, in Papers page
http://www.geosensor.net/papers/duckham06.IGIS.pdf, December 2005.
8. Mike Hazas, Andy Ward, A High Performance Privacy-Oriented Location System, Proceedings of
the First IEEE International Conference on Pervasive Computing and Communications
(PerCom’03), 2003.
9. Denise Anthony, David Kotz, Tristan Henderson, Privacy in Location-Aware Computing
Environments, Published by the IEEE Computer Society, IEEE 2007.
10. Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati, An
Obfuscation-based Approach for Protecting Location Privacy, IEEE TRANSACTIONS ON
DEPEDABLE AND SECURE COMPUTING, 2009.
11. A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. PERVASIVE computing,
IEEE CS and IEEE Communications Society, (1):46–55, 2003.
12. Patterson, C.A.; Muntz, R.R.; Pancake, C.M.; Challenges in location-aware computing, Pervasive
Computing, IEEE, June 2003
13. Lin Yao; Chi Lin; Xiangwei Kong; Feng Xia; Guowei Wu;, A Clustering-Based Location Privacy
Protection Scheme for Pervasive Computing, Green Computing and Communications (GreenCom),
2010 IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing
(CPSCom), March 2011.
14. Reddy, Y.V., Pervasive Computing: Implications, Opportunities and Challenges for the Society,
Pervasive Computing and Applications, 2006 1st International Symposium on, January 2007.
15. Jacobsson, M.; Niemegeers, I., Privacy and anonymity in personal networks, Pervasive Computing
and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International
Conference on, March 2005.
16. Myles, G.; Friday, A.; Davies, N., Preserving privacy in environments with location-based
applications, Pervasive Computing, IEEE, April 2004.
17. Cheng, H.S.; Zhang, D.; Tan, J.G., Protection of privacy in pervasive computing environments,
Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on,
May 2005.
18. John Morris; Jon Peterson; Who's Watching You Now?, Security & Privacy, IEEE, February 2007.
19. Konings, B.; Schaub, F., Territorial privacy in ubiquitous computing , Wireless On-Demand
Network Systems and Services (WONS), 2011 Eighth International Conference on, February 2011.
20. Schlott, S.; Kargl, F.; Weber, M., Short paper: Random IDs for preserving location privacy, Security
and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005. First
International Conference on, March 2006.
21. Prof.Yenumula Venkataramana Reddy ,” Pervasive Computing: Implications, Opportunities and
Challenges for the Society” 1st International Symposium on Pervasive Computing and
Applications,2006.
22. Bosheng Zhou, Alan Marshall, Tsung-Han Lee, “Wireless Security Issues in Pervasive
Computing”,Fourth International Conference on Genetic and Evolutionary Computing (ICGEC),
2010.
23. M. Gruteser, J. Bredin, and D. Grunwald. “Path privacy in location-aware computing”, In Proc. of
the Second International Conference on Mobile Systems, Application and Services (MobiSys2004),
Boston, Massachussetts, USA, June 2004.
24. S. Patil and J. Lai, “Who Gets to Know What When: Configuring Privacy Permissions in an
Awareness Application,” Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 05),
ACM Press, 2005, pp. 101–110.
25. B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and
algorithms. IEEE Transactions on Mobile Computing, 7(1):1–18, January 2008.
20
11. International Journal of Ambient Systems and Applications (IJASA) Vol.1, No.1, March 2013
26. B. Ho and M. Gruteser. Protecting location privacy through path confusion. In Proc. of
IEEE/CreateNet SecureComm 2005, Athens, Greece, September 2005.
27. M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In Proc. of
UBICOMP 2002, Goteborg, Sweden, September-October 2002.
28. R. Kui, L. Wenjing, “Privacy enhanced access control in pervasive computing environments”, 2nd
International Conference on Broadband Networks, Oct 2005, pp. 384-393.
29. M. R. Stytz, “Protecting Personal Privacy: Hauling Down the Jolly Roger”, Security & Privacy
Magazine, IEEE, Volume 3, Issue 4, July-Aug 2005, pp. 72-74
30. A. R. Jacobs, G. D. Abowd, “A Framework for comparing perspectives on privacy and pervasive
technologies”, Pervasive Computing, IEEE, Volume 2, Issue4, Oct-Dec 2003, pp. 78-84.
31. R. K. Thomas, R. Sandhu, “Models, protocols, and architectures for secure pervasive computing:
challenges and research directions”, Proceedings of the Second IEEE Annual Conference on
Pervasive Computing and Communications Workshops, 14-17 March 2004, pp. 164-168.
32. Z. Feng, M. W. Mutka, L. M. Ni, “A Private, Secure, and User-Centric Information Exposure Model
for Service Discovery Protocols”, IEEE Transactions on Mobile Computing, Volume 5, Issue 4,
July-Aug. 2006, pp. 418-429.
33. M. Tentori, J. Favela, M. D. Rodriguez, V. M. Gonzalez, “Supporting Quality of Privacy (QoP) in
Pervasive Computing”, Sixth Mexican International Conference on Computer Science, 26-30 Sept.
2005, pp. 58-67.
34. M. Decker. Location privacy-an overview. In ICMB ’08: Proceedings of the 2008 7th International
Conference on Mobile Business, pages 221–230, Washington, DC, USA, 2008. IEEE Computer
Society.
35. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-
monitoring systems. IEEE Pervasive Computing, 5(4):38–46, 2006.
36. K. Nahrstedt, D. Xu, D. Wichadakul, and B. Li. QoS-aware middleware for ubiquitous and
heterogeneous environments. IEEE Communications Magazine, pages 140–148, November 2001.
37. A.R. Beresford and F. Stajano. Mix zones: User privacy in location aware services. In Proc. of IEEE
PERCOMW 2004, Orlando, FL, USA, March 2004.
Authors
Ms. Jeeva Susan Jacob
M.Tech scholar at Rajagiri School of Engineering and Technology, Cochin,
India. Completed B.Tech Degree from Mahatma Gandhi University, Kerala
India. Research areas of interest include Mobile Computing, Pervasive
Computing, Green Computing, Computer Networks and Wireless
Communication.
Ms. Preetha K.G.
Assistant Professor at Rajagiri School of Engineering and Technology, Cochin,
India. Currently pursuing research in Mobile Adhoc Networks. Research areas
of interest include Mobile Computing, Adhoc Networks, Computer Networks,
and Wireless Communication.
21