Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones

Size: px
Start display at page:

Download "Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones"

Transcription

1 Abstract Geo-localization and Location-aware Opportunistic Communication for Mobile Phones by Kuldeep Yadav Department of Computer Science Indraprastha Institute of Information Technology, New Delhi Date: Approved: Dr. Vinayak Naik, Supervisor Dr. Pushpendra Singh, Co-supervisor Dr. Amarjeet Singh, Co-supervisor Prof. Murat Demirbas (SUNY Buffalo) Prof. Romit Roy Choudhury (UIUC) Prof. Sudip Mishra (IIT Kharagpur) An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science

2 in the Graduate School of Indraprastha Institute of Information Technology, New Delhi 2014 iv

3 Copyright 2014 by Kuldeep Yadav All rights reserved except the rights granted by the Creative Commons Attribution-Noncommercial Licence

4 Abstract Location-based mobile applications are steadily gaining popularity across the world. These applications require information about user s current location to access different kind of services. However, location-based applications have diverse set of requirements, some of them require location information intermittently such as local search, whereas other applications require continuous access to location information i.e. ones which need to infer high level information such as places and routes. Additionally, localization accuracy requirements are different across various locationbased services. For instance, navigation applications require high level of accuracy ( 10 meters) whereas sharing location with online social networks may suffice with an accuracy of hundreds of meters. There are mainly three different localization approaches which are used to estimate current user location using a mobile phone, i.e. Global Positioning System (GPS), WiFi-based, and GSM-based. These three different approaches differ in terms of localization accuracy, availability, and energy consumption. GPS and WiFi-based approaches provide fine grained localization accuracy but there are many phones, which do not have GPS and WiFi sensors (i.e. feature phones). It is predicted that for the at least next five years, over 50% of the phones will not have GPS. Apart from limited availability, GPS and WiFi-based approaches result in high energy consumption specially for the services which require continuous tracking of location information. Further, many cities in the world do not have a large scale Wi-Fi infrastructure, which is a sole requirement for all vi

5 WiFi-based approaches. GSM-based approaches (Cell ID-based) work on both feature phones as well as smartphones and energy-efficient as compared to GPS/WiFi. However, they require access to a comprehensive database of Cell IDs created using war-driving. Such a database either does not exist or have limited coverage in developing countries. In this thesis, we make the following contributions to enable energy-efficient geolocalization and location-aware communication on mobile phones: (1) We propose a novel Cell Broadcast (CBS) based localization system, which removes the necessity of war-driving or building a Cell ID database for GSM-based localization. Evaluation using self-collected real world traces show that the proposed approach provide good accuracy (nearly meters), which is sufficient for enabling many locationbased services on feature phones. We have developed several location-aware applications using CBS-based approach and combined it with existing techniques such as Cell ID and GPS for improving localization availability while minimizing energy consumption on smartphones. (2) We propose PlaceMap, a system to discover places and routes visited by mobile users based on only Cell ID information. Our system employs a novel graph-based clustering algorithm, which handles challenges such as fluctuating among Cell IDs on same place and segregate Cell IDs according to physical places. To provide better accuracy in place discovery, we design algorithm that uses an initial training of WiFi/GPS data to learn places and later use Cell ID data only. Our evaluations on two large scale mobility dataset collected in India and Switzerland show that PlaceMap can correctly discover nearly 80% of places as compared to baseline (GPS/WiFi). (3) We build and evaluate designs of two Cloud-enabled mobile systems, which facilitate opportunistic communication among co-located phones. These system are designed specifically for bandwidth constrained settings. One of them, MobiShare uses the Cloud for scalable content search and an encounter prediction framework to predict encounter time between content source vii

6 and requestor based on their mobility history. Second system, Unity finds social groups, who have similar interests and have frequent encounters to enable collaborative download of mutually interested content from the Internet. (4) We discover aggregated mobility and place visiting patterns of people in developing countries using one CDR (Call Detail Records) dataset collected in Ivory Coast and two finegrained location information datasets collected in India and Switzerland. We have compared these mobility patterns with existing studies for developed countries (US and Switzerland) and found several differences. One of the difference is that people in developing countries are less likely to travel long distance on weekends as compared to developed countries. With the fast evolution of hardware and software technologies for mobile phones, there has been a large gap created between capabilities of feature phones and smartphones. This thesis tries to fill that gap and provide practical and promising solutions to enable location-based services on both feature phones and smartphones using low energy location interfaces. viii

Identifying and Managing Places of Human Interest

Identifying and Managing Places of Human Interest Identifying and Managing Places of Human Interest 3 3.1 Introduction As the reliance of location on mobile applications getting increased, some of them require continuous tracking of location to infer

More information

Unity: Collaborative Downloading Content Using Co-located Socially Connected Peers

Unity: Collaborative Downloading Content Using Co-located Socially Connected Peers Unity: Collaborative Downloading Content Using Co-located Socially Connected Peers Prateek Jassal, Kuldeep Yadav, Abhishek Kumar, Vinayak Naik, Vishesh Narwal, Amarjeet Singh, Indraprastha Institute of

More information

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT

ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,dipika23nimbokar@gmail.com 2 Assistant Prof,

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Exploring Big Data in Social Networks

Exploring Big Data in Social Networks Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about

More information

Efficient Processing for Big Data Streams and their Context in Distributed Cyber Physical Systems

Efficient Processing for Big Data Streams and their Context in Distributed Cyber Physical Systems Efficient Processing for Big Data Streams and their Context in Distributed Cyber Physical Systems Department of Computer Science and Engineering Chalmers University of Technology & Gothenburg University

More information

Business Opportunities beyond Ultrabroadband: Proximity Services and LTE direct

Business Opportunities beyond Ultrabroadband: Proximity Services and LTE direct Business Opportunities beyond Ultrabroadband: Proximity Services and LTE direct Agenda LTE Direct: concept; Service Logic; Use Cases and Scenario Value Proposition: Domestic market; Tetra Vs LTE Direct;

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

GSM Based Operating of Embedded System Cloud Computing, Mobile Application Development and Artificial Intelligence Based System

GSM Based Operating of Embedded System Cloud Computing, Mobile Application Development and Artificial Intelligence Based System Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 15 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Recommendation Tool Using Collaborative Filtering

Recommendation Tool Using Collaborative Filtering Recommendation Tool Using Collaborative Filtering Aditya Mandhare 1, Soniya Nemade 2, M.Kiruthika 3 Student, Computer Engineering Department, FCRIT, Vashi, India 1 Student, Computer Engineering Department,

More information

GeoManitoba Spatial Data Infrastructure Update. Presented by: Jim Aberdeen Shawn Cruise

GeoManitoba Spatial Data Infrastructure Update. Presented by: Jim Aberdeen Shawn Cruise GeoManitoba Spatial Data Infrastructure Update Presented by: Jim Aberdeen Shawn Cruise Organization Overview Manitoba Innovation Energy and Mines Business Transformation and Technology (BTT) Application

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

Statistical Challenges with Big Data in Management Science

Statistical Challenges with Big Data in Management Science Statistical Challenges with Big Data in Management Science Arnab Kumar Laha Indian Institute of Management Ahmedabad Analytics vs Reporting Competitive Advantage Reporting Prescriptive Analytics (Decision

More information

PERFORMANCE EVALUATION OF MUTUAL FUND SEGMENTS IN INDIA. With Special Reference to Sectoral Funds. Estelar THESIS SUMMARY

PERFORMANCE EVALUATION OF MUTUAL FUND SEGMENTS IN INDIA. With Special Reference to Sectoral Funds. Estelar THESIS SUMMARY PERFORMANCE EVALUATION OF MUTUAL FUND SEGMENTS IN INDIA With Special Reference to Sectoral Funds THESIS SUMMARY SUBMITTED TO KUMAUN UNIVERSITY, NAINITAL In partial fulfillment of the requirements for the

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Preface. Book Origin and Overview

Preface. Book Origin and Overview Preface The field of wireless sensor networks continues to evolve and grow in both practical and research domains. More and more wireless sensor networks are being used to gather information in real life

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Review of Project: Dated: 24 th September 2012. Name of Project: Creating Digital Learning Environment for Design in India ( e-kalpa )

Review of Project: Dated: 24 th September 2012. Name of Project: Creating Digital Learning Environment for Design in India ( e-kalpa ) Review of Project: Dated: 24 th September 2012 Name of Project: Creating Digital Learning Environment for Design in India ( e-kalpa ) Control Number: POO06060910120 PRSG member present for Review: Prof.

More information

EnLoc: Energy-Efficient Localization for Mobile Phones

EnLoc: Energy-Efficient Localization for Mobile Phones EnLoc: Energy-Efficient Localization for Mobile Phones Ionut Constandache (Duke), Shravan Gaonkar (UIUC), Matt Sayler (Duke), Romit Roy Choudhury (Duke), Landon Cox (Duke) Abstract A growing number of

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 MOTIVATION OF RESEARCH Multicore processors have two or more execution cores (processors) implemented on a single chip having their own set of execution and architectural recourses.

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 10, October 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Study of Cloud

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

Nomadic Positioning Services for a Mobile Services Platform

Nomadic Positioning Services for a Mobile Services Platform Nomadic Positioning s for a Mobile Platform E.A.M. Schoot Uiterkamp Thesis for a Master of Science degree in Telematics from the University of Twente, Enschede, The Netherlands, 26 August 2005 Nomadic

More information

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-4 E-ISSN: 2347-2693 MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature Neelam Salia

More information

Indoor Triangulation System. Tracking wireless devices accurately. Whitepaper

Indoor Triangulation System. Tracking wireless devices accurately. Whitepaper Indoor Triangulation System Tracking wireless devices accurately Whitepaper 2 Navizon, the company that pioneered geopositioning for smart phone users with its Navizon One system, has come up with another

More information

Bruhati Technologies. About us. ISO 9001:2008 certified. Technology fit for Business

Bruhati Technologies. About us. ISO 9001:2008 certified. Technology fit for Business Bruhati Technologies ISO 9001:2008 certified Technology fit for Business About us 1 Strong, agile and adaptive Leadership Geared up technologies for and fast moving long lasting With sound understanding

More information

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理

CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學. Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 CITY UNIVERSITY OF HONG KONG 香 港 城 市 大 學 Self-Organizing Map: Visualization and Data Handling 自 組 織 神 經 網 絡 : 可 視 化 和 數 據 處 理 Submitted to Department of Electronic Engineering 電 子 工 程 學 系 in Partial Fulfillment

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk

More information

NetView 360 Product Description

NetView 360 Product Description NetView 360 Product Description Heterogeneous network (HetNet) planning is a specialized process that should not be thought of as adaptation of the traditional macro cell planning process. The new approach

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

Improving Energy Efficiency of Location Sensing On Mobile Phone Using Machine Learning Techniques

Improving Energy Efficiency of Location Sensing On Mobile Phone Using Machine Learning Techniques Improving Energy Efficiency of Location Sensing On Mobile Phone Using Machine Learning Techniques D.A.Parthiban 1, J.SenthilMurugan 2 Final Year MCA Student, VelTech HighTech Engineering College, Chennai,

More information

Big Data Analytics in Mobile Environments

Big Data Analytics in Mobile Environments 1 Big Data Analytics in Mobile Environments 熊 辉 教 授 罗 格 斯 - 新 泽 西 州 立 大 学 2012-10-2 Rutgers, the State University of New Jersey Why big data: historical view? Productivity versus Complexity (interrelatedness,

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Top and Bottom Margins are 1 inch. Dissertation Title in Initial Capitals and Small Letters (Single-space the title if more than one line)

Top and Bottom Margins are 1 inch. Dissertation Title in Initial Capitals and Small Letters (Single-space the title if more than one line) Left Margin 1.25 inches Right Margin 1.25 inches Top and Bottom Margins are 1 inch Dissertation Title in Initial Capitals and Small Letters (Single-space the title if more than one line) By Your Name Degree

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Resource Cost Prediction and Comparison System for Cloud Consumers to achieve Cost Effective Uses

Resource Cost Prediction and Comparison System for Cloud Consumers to achieve Cost Effective Uses International Journal of Scientific and Research Publications, Volume 4, Issue 12, December 2014 1 Resource Cost Prediction and Comparison System for Consumers to achieve Cost Effective Uses Aditi Irkal,

More information

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise

CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise CLOUD ANALYTICS: Empowering the Army Intelligence Core Analytic Enterprise 5 APR 2011 1 2005... Advanced Analytics Harnessing Data for the Warfighter I2E GIG Brigade Combat Team Data Silos DCGS LandWarNet

More information

ECHO: Recreating Network Traffic Maps for Datacenters with Tens of Thousands of Servers

ECHO: Recreating Network Traffic Maps for Datacenters with Tens of Thousands of Servers ECHO: Recreating Network Traffic Maps for Datacenters with Tens of Thousands of Servers Christina Delimitrou 1, Sriram Sankar 2, Aman Kansal 3, Christos Kozyrakis 1 1 Stanford University 2 Microsoft 3

More information

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015

Global Soft Solutions JAVA IEEE PROJECT TITLES - 2015 Global Soft Solutions No : 6, III Floor Chitra Complex Chatram Bus Stand Trichy 620 002 www.globalsoftsolutions.in Email : gsstrichy@gmail.com Ph : 0431 4544308 / Cell : 94431 22110 JAVA IEEE PROJECT TITLES

More information

CONNECTING DATA WITH BUSINESS

CONNECTING DATA WITH BUSINESS CONNECTING DATA WITH BUSINESS Big Data and Data Science consulting Business Value through Data Knowledge Synergic Partners is a specialized Big Data, Data Science and Data Engineering consultancy firm

More information

Industrial IOT Gateway Family Datasheet

Industrial IOT Gateway Family Datasheet Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and

More information

Automated Real Time In-Store Retail Marketing Using Beacon

Automated Real Time In-Store Retail Marketing Using Beacon International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-04, Issue-02 E-ISSN: 2347-2693 Automated Real Time In-Store Retail Marketing Using Beacon Jigar Kothari 1*,

More information

WAN OPTIMIZATIONS IN VEHICULAR NETWORKING. Lorenzo Di Gregorio 1 Danica Gajic 1 Christian Liß 1 Andreas Foglar 1 Francisco Vázquez-Gallego 2

WAN OPTIMIZATIONS IN VEHICULAR NETWORKING. Lorenzo Di Gregorio 1 Danica Gajic 1 Christian Liß 1 Andreas Foglar 1 Francisco Vázquez-Gallego 2 OPTIMIZATIONS IN VEHICULAR NETWORKING Lorenzo Di Gregorio 1 Danica Gajic 1 Christian Liß 1 Andreas Foglar 1 Francisco 2 1 InnoRoute GmbH 2 Centre Tecnològic de Telecomunicacions de Catalunya Wireless Congress,

More information

CSci 8980 Mobile Cloud Computing. MCC Overview

CSci 8980 Mobile Cloud Computing. MCC Overview CSci 8980 Mobile Cloud Computing MCC Overview Papers Students can do: 1 long paper or 2 short papers Extra credit: add another By 8am tomorrow, I will randomly assign papers unless I hear from you Protocol:

More information

A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps

A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps

More information

Choosing the Best Mobile Backend

Choosing the Best Mobile Backend MOBILE APP DEVELOPER S GUIDE blog.kii.com Choosing the Best Mobile Backend A brief guide to selecting a trustworthy Mobile Backend as a Service (MBaaS). www.kii.com Share this e-book YOU RE A MOBILE APP

More information

Comparison of K-means and Backpropagation Data Mining Algorithms

Comparison of K-means and Backpropagation Data Mining Algorithms Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and

More information

Connecting library content using data mining and text analytics on structured and unstructured data

Connecting library content using data mining and text analytics on structured and unstructured data Submitted on: May 5, 2013 Connecting library content using data mining and text analytics on structured and unstructured data Chee Kiam Lim Technology and Innovation, National Library Board, Singapore.

More information

Data Mining for Data Cloud and Compute Cloud

Data Mining for Data Cloud and Compute Cloud Data Mining for Data Cloud and Compute Cloud Prof. Uzma Ali 1, Prof. Punam Khandar 2 Assistant Professor, Dept. Of Computer Application, SRCOEM, Nagpur, India 1 Assistant Professor, Dept. Of Computer Application,

More information

Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform

Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform Dinesh Manandhar, Seiya Kawaguchi, Hideyuki Torimoto GNSS Technologies Inc., Japan

More information

The Evolution of CDMA Mobile Device Testing

The Evolution of CDMA Mobile Device Testing The Evolution of CDMA Mobile Device CDMA2000 India Workshop, New Delhi Surya Patar Munda 23 February 2005 The Evolution Five years ago, CDMA mobile devices were primarily voice terminals was limited to

More information

House Committee on the Judiciary. Subcommittee on the Constitution, Civil Rights, and Civil Liberties

House Committee on the Judiciary. Subcommittee on the Constitution, Civil Rights, and Civil Liberties House Committee on the Judiciary Subcommittee on the Constitution, Civil Rights, and Civil Liberties Hearing on ECPA Reform and the Revolution in Location Based Technologies and Services Testimony of Professor

More information

Upload Your Culminating Project to The Repository at St. Cloud State University

Upload Your Culminating Project to The Repository at St. Cloud State University Upload Your Culminating Project to The Repository at St. Cloud State University There are two parts to uploading your culminating project (starred paper, thesis, or dissertation) to The Repository at St.

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining

JAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and

More information

1.1 OVERVIEW OF THE DOCUMENT 1.2 BACKGROUND TO THE PROJECT

1.1 OVERVIEW OF THE DOCUMENT 1.2 BACKGROUND TO THE PROJECT CHAPTER 1 INTRODUCTION 1.1 OVERVIEW OF THE DOCUMENT This project thesis examines the task of learning to develop a cost-effective vehicle movement tracking system for companies to track their vehicles.

More information

Simplify security management in the cloud

Simplify security management in the cloud Simplify security management in the cloud IBM Endpoint Manager and IBM SmartCloud offerings provide complete cloud protection Highlights Ensure security of new cloud services by employing scalable, optimized

More information

Cisco Stadiumvision Mobile Software Development Kit

Cisco Stadiumvision Mobile Software Development Kit Data Sheet Cisco Stadiumvision Mobile Software Development Kit Cisco Systems introduces Cisco StadiumVision Mobile Software Development Kit 1.2 Introduction to Cisco StadiumVision Mobile The Cisco StadiumVision

More information

Where is... How do I get to...

Where is... How do I get to... Big Data, Fast Data, Spatial Data Making Sense of Location Data in a Smart City Hans Viehmann Product Manager EMEA ORACLE Corporation August 19, 2015 Copyright 2014, Oracle and/or its affiliates. All rights

More information

Public Sector Solutions

Public Sector Solutions Public Sector Solutions The New Jersey DOT Command Center uses INRIX real-time data and analytics to monitor congestion and deploy resources proactively to manage traffic flow and inform travelers. INRIX

More information

Caiipa: Automated Large-scale Mobile App Testing through Contextual Fuzzing

Caiipa: Automated Large-scale Mobile App Testing through Contextual Fuzzing Caiipa: Automated Large-scale Mobile App Testing through ual Fuzzing Chieh-Jan Mike Liang (MSR); Nicholas D. Lane (MSR); Niels Brouwers (Delft); Li Zhang (USTC); Borje F. Karlsson (MSR); Hao Liu (Tsinghua);

More information

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications

Opportunistic Ad Hoc Networking: the Case for Car to Car Communications 1 Opportunistic Ad Hoc Networking: the Case for Car to Car Communications Mobiquitous 2005 Mario Gerla Computer Science Dept UCLA What is an opportunistic ad hoc net? A wireless ad hoc extension of the

More information

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

More information

Wednesday, January 15, 14. Secure and Private Service Discovery over Low Energy Bluetooth

Wednesday, January 15, 14. Secure and Private Service Discovery over Low Energy Bluetooth Secure and Private Service Discovery over Low Energy Bluetooth Square Register Hardware credit card reader Developed for businesses Android and ios app Square Wallet Android and ios app Works with Square

More information

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU! SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile

esarinformation Systems Simplifying your Technology Mobile Applications Development Profile esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and

More information

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South

More information

Location Based Services for Enterprise

Location Based Services for Enterprise Location Based Services for Enterprise Introduction WHITEPAPER Location Based Services (LBS) have been making foray into enterprise applications, thanks to the rise in smartphone ownership and the phenomenal

More information

How To Backup From Your Computer To Your Phone Or Tablet Or Computer

How To Backup From Your Computer To Your Phone Or Tablet Or Computer MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise

More information

Implementation of College Network Scenario Module by Using CCNA

Implementation of College Network Scenario Module by Using CCNA Implementation of College Network Scenario Module by Using CCNA Jitender Singh 1, Anshu Rani 2 1 Scholar, Computer Science & Engineering, RPSGOI Mohindergarh, India 2 Scholar, Computer Science & Engineering,

More information

YOUR CANADIAN CONNECTION

YOUR CANADIAN CONNECTION YOUR CANADIAN CONNECTION Rogers Carrier Services offers domestic and international wholesale partners a broad range of innovative telecommunications services featuring the performance, scalability and

More information

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile

More information

Crowdsourcing mobile networks from experiment

Crowdsourcing mobile networks from experiment Crowdsourcing mobile networks from the experiment Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Networks and Data Mining, Session

More information

Cloud Platform: the Intelligent Infrastructure Approach

Cloud Platform: the Intelligent Infrastructure Approach Technology Cloud Platform: the Intelligent Infrastructure Approach Valerio Romano Communications, Media, High Tech Cloud Global Lead Cloud Confex at Gitex Technology Week Dubai, 21 October 2013 It s time

More information

A Review of Data Mining Techniques

A Review of Data Mining Techniques Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

How To Handle Big Data With A Data Scientist

How To Handle Big Data With A Data Scientist III Big Data Technologies Today, new technologies make it possible to realize value from Big Data. Big data technologies can replace highly customized, expensive legacy systems with a standard solution

More information

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets

28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise

More information

Cloud Management: Knowing is Half The Battle

Cloud Management: Knowing is Half The Battle Cloud Management: Knowing is Half The Battle Raouf BOUTABA David R. Cheriton School of Computer Science University of Waterloo Joint work with Qi Zhang, Faten Zhani (University of Waterloo) and Joseph

More information

Network Intelligence Driven Cloud Services for a Sustainable Connected World. Fahim Kawsar Internet of Things Research Bell Labs @raswak

Network Intelligence Driven Cloud Services for a Sustainable Connected World. Fahim Kawsar Internet of Things Research Bell Labs @raswak Network Intelligence Driven Cloud Services for a Sustainable Connected World Fahim Kawsar Internet of Things Research Bell Labs @raswak MORE DEVELOPED COUNTRIES 2013: 1.2 Billion 2050: 1.3 Billion WORLD

More information

A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors

A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors A Comparative Study of Different Log Analyzer Tools to Analyze User Behaviors S. Bhuvaneswari P.G Student, Department of CSE, A.V.C College of Engineering, Mayiladuthurai, TN, India. bhuvanacse8@gmail.com

More information

Properties and Tracking of Movements

Properties and Tracking of Movements Second Conference of Junior Researchers in Civil Engineering 6 Properties and Tracking of Movements Zoltan Koppanyi BME Department of Photogrammetry and Geoinformatics, e-mail: zoltan.koppanyi@fmt.bme.hu

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

A Case Study on User Safety and Privacy Protection

A Case Study on User Safety and Privacy Protection 國 立 中 正 大 學 通 訊 工 程 學 系 碩 士 班 碩 士 論 文 A Novel Time-Obfuscated Algorithm for Trajectory Privacy 指 導 教 授 : 黃 仁 竑 博 士 研 究 生 : 鐘 浩 維 中 華 民 國 一 百 零 一 年 七 月 ABSTRACT Location-based services (LBS) which bring

More information

Implementing Cloud Data Security by Encryption using Rijndael Algorithm

Implementing Cloud Data Security by Encryption using Rijndael Algorithm Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation

Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation Tap Unexplored Markets Using Segmentation The Advantages of Real-Time Dynamic Segmentation What is Segmentation and How Does it Apply to Website Traffic? Market segmentation, the practice of breaking down

More information

ENERGY CONSERVATION: SMART METERS AND BIG DATA ANALYTICS TO THE RESCUE. A White Paper May 2014

ENERGY CONSERVATION: SMART METERS AND BIG DATA ANALYTICS TO THE RESCUE. A White Paper May 2014 Big Data Analytics in Energy ENERGY CONSERVATION: SMART METERS AND BIG DATA ANALYTICS TO THE RESCUE A White Paper May 2014 Energy Consumption Patterns There has been a dramatic rise in the average cost

More information

Evaluating Impact of Storage on Smartphone Energy Efficiency

Evaluating Impact of Storage on Smartphone Energy Efficiency Evaluating Impact of Storage on Smartphone Energy Efficiency David T. Nguyen College of William and Mary Williamsburg, VA 23185, USA dnguyen@cs.wm.edu Abstract We present an experimental study of how storage

More information

Taming Big Data. 1010data ACCELERATES INSIGHT

Taming Big Data. 1010data ACCELERATES INSIGHT Taming Big Data 1010data ACCELERATES INSIGHT Lightning-fast and transparent, 1010data analytics gives you instant access to all your data, without technical expertise or expensive infrastructure. TAMING

More information

AppSymphony White Paper

AppSymphony White Paper AppSymphony White Paper Secure Self-Service Analytics for Curated Digital Collections Introduction Optensity, Inc. offers a self-service analytic app composition platform, AppSymphony, which enables data

More information

Data Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep. Neil Raden Hired Brains Research, LLC

Data Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep. Neil Raden Hired Brains Research, LLC Data Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep Neil Raden Hired Brains Research, LLC Traditionally, the job of gathering and integrating data for analytics fell on data warehouses.

More information

Sample Exam Foundation Level Syllabus. Mobile Tester

Sample Exam Foundation Level Syllabus. Mobile Tester Sample Exam Foundation Level Syllabus Mobile Tester September 2015 American Software Testing Qualifications Board Sample Exam Foundation Level Syllabus Mobile Tester 1. What types of testing are particularly

More information

Real-Time Vehicle Tracking System [RKI-1660]

Real-Time Vehicle Tracking System [RKI-1660] Real-Time Vehicle Tracking System [RKI-1660] User Manual Robokits India info@robokits.co.in http://www.robokitsworld.com Page 1 Robokits India has partnered with Vehicleonmap.com to bring a Real-Time Vehicle

More information

Why Migrate to the Cisco Unified Wireless Network?

Why Migrate to the Cisco Unified Wireless Network? Why Migrate to the Cisco Unified Wireless Network? Cisco is encouraging our customers to migrate to the Cisco Unified Wireless Network. This paper reviews the advantages of and reasons for migrating to

More information

Forced Low latency Handoff in Mobile Cellular Data Networks

Forced Low latency Handoff in Mobile Cellular Data Networks Forced Low latency Handoff in Mobile Cellular Data Networks N. Moayedian, Faramarz Hendessi Department of Electrical and Computer Engineering Isfahan University of Technology, Isfahan, IRAN Hendessi@cc.iut.ac.ir

More information