AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING
|
|
|
- Adele Roberts
- 10 years ago
- Views:
Transcription
1 I J I T E ISSN: (1-2), 2012, pp AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of Computer Science and Engineering, Dr.M.G.R University, Maduravoyal, Chennai , India 2 Department of Information Technology, Kings Engineering College, Irrungattukottai, Sriperumbudur , India 3 Department of Computer Science and Engineering, Anna University, Trichy, India s: [email protected], [email protected], [email protected] Abstract: This paper proposes the complete information agent system in the cloud computing environment based on a location tracking mechanism using GPS techniques on Android platform. This information agent system is collaborated with a related activity diagram to telecast the exact location the user procures in the cloud computing environment. The ontology which is being supported with the ubiquitous information agent system and its related activity diagram in cloud computing environments has been proposed. The construction of an activity diagram of cloud computing for extensively and seamlessly entering related web information agent systems through modern mobile equipment s in ubiquitous environments is under our investigation. User makes the query to the main server, in which Cloud Computing Process is executed. This system provides an enhanced experience and is feasible to the user. Keywords: Ubiquitous Computing; Information Agent systems; GPS; Cloud Computing. INTRODUCTION The Information agent systems are software products for assisting the users to reach their goal of information retrieval in accordance to the need. So far however, maximum of Web information agent systems are closely knitted to the traditional information equipment s that cannot directly apply to the modern mobile equipment s. This study exactly focused on how to construct a ubiquitous interface agent with the mobile equipment s in an ubiquitous environments for the location tracking using the GPS (Global positioning System). Ubiquitous computing is a post-desktop model of human computer interaction in which information processing has been thoroughly integrated into every day activity of human life. Cloud computing is also integrated into this technique where the cloud is used as an Infrastructure as a Service which is based on developing and utilization of computer technology. Furthermore, the construction of an activity diagram of cloud computing for extensively and seamlessly entering related web information agent systems through modern mobile equipment s in ubiquitous environments is under our investigation. This paper provides the advantages of simpler accessibility and an enhanced experience to the users. II. TECHNIQUES FOR DEVELOPING THE SYSTEM (A) Culture Culture can also be said as Ontology and it s a theory in philosophy which primarily aims to explore the knowledge and characteristics of real objects. A complete semantic model can be determined in sharing and reusing the characteristics, thus the ontology plays a vital role in the information system [10]. (B) Ubiquitous Computing Ubiquitous computing (ubicomp) is a postdesktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. More formally Ubiquitous computing is defined as machines that fit the human
2 64 Anwar Basha H, Samuel Geoffrey Lawrence and Indumathi K environment instead of forcing humans to enter theirs. Computers will exist in our lives as hidden, popularized, and in ubiquitous ways. Many examples of applications in previous studies [1, 3, 4, 6, and 7] showcase the use of the ubiquitous computing. A future enhancement is always possible in the ubiquitous environment for software system applications. This an influential and significant study related to web information systems. (C) Cloud Computing Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a metered service over a network. Cloud computing providers deliver applications via the internet, which are accessed from web browsers and desktop and mobile apps, while the business software and data are stored on servers at a remote location. Google opposed the concept of cloud computing that also start the huge business opportunity of cloud computing, including IaaS (Infrastructure as a Service), PaaS (Platform as a Service), and SaaS (Software as a Service). In this paper, Cloud Computing is used as Infrastructure as a Service (IAAS), where the entire server is managed with the Location Information in its database. (D) Android Location Based Services Application - GPS Location The Global Positioning System (GPS) is a spacebased satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth, where there is an unobstructed line of sight to four or more GPS satellites. The advances in technology and new demands on the existing system have now led to efforts to modernize the GPS system and implement the next generation of GPS III satellites and Next Generation Operational Control System (OCX). With the incorporation of GPS (Global Positioning System) devices in Smartphone s, Location Based Services (LBS) have become pretty hot the past few years [2]. Bluetooth wireless technology is a short-range radio standard that provides new opportunities for wireless devices. A Bluetooth device can support one or more profiles. The four basic profiles are the Generic Access Profile (GAP), the Serial Port Profile (SPP), the Service Discovery Application Profile (SDAP), and the Generic Object Exchange Profile (GOEP) [8]. Android employed the specific Java defined by Google to write programs. When the developers used the Google Map, they need to go through the MD5 code to get API key from the Google authority [5]. Figure 1: MD5 Code and API Key Registering for a Maps API Key is simple, free, and has two parts: A. Registering the MD5 fingerprint of the certificate that you will use to sign your application. The Maps registration service then provides you a Maps API Key that is associated with your application s signer certificate. B. Adding a reference to the Maps API Key in each Map View, whether declared in XML or instantiated directly from code. You can use the same Maps API Key for any Map View in any Android application, provided that the application is signed with the certificate whose fingerprint you registered with the service. Because Map View gives you access to Google Maps data, you need to register with the Google Maps service and agree to the applicable Terms of Service before your Map View will be able to obtain data from Google Maps. This will apply
3 An Information Agent System for Cloud Computing based Location Tracking 65 whether you are developing your application on the emulator or preparing your application for deployment to mobile devices. III. ARCHITECTURE OF THE UBIQUITOUS INFORMATION AGENT SYSTEM Figure 2 illustrates the architecture of ubiquitous information agent system to satisfy the basic requirements of seamless information services in ubiquitous computing, whose related interaction diagrams contain the following actions: OntoIAS actively provides related local information according to the current position information, the system transforms the specific information requirements entered by users and then triggers OntoIAS to return query information, users directly query OntoIAS to provide commonly used hot information, etc. server to determine the GPS information. Without registering a user cannot access the clocking agent. For registered users should give his details such as his name, address, age, sex, etc., once a user register his details he can get useful information from the clocking server. Each user will identify by a unique username and password. Once the registration is being done the clocking server has to move onto the next step of security. Figure 3. The activity diagrams give a detailed explanation of the agent information system and its functioning. (B) User Authentication and Query Process This step is carried out to provide a level of security by determining whether a user is an authenticated user or not. If a client want to arise a query first he should be authenticated by the server for this the user has to login by the user Figure 2: Architecture of Ubiquitous Information Agent System When users key in specific information queries, the system divides the user queries into three types of commands for fast processing, including Query, Simple Command, and Conditional Command. We modified FURRL (Formalized User Request Representation Language) [5] to design a CURRL to represent the above user commands [11]. IV. AGENT SYSTEM MODULES (A) Android Mobile User Registration In the Location base query system the user has to register to get the connection with the cloud Figure 3: Activity Diagram for the Information Agent System
4 66 Anwar Basha H, Samuel Geoffrey Lawrence and Indumathi K name and password that was registered in the earlier step, This will provide the user with a query to the server. This query will go the clocking agent and the clocking agent will send the query to the Cloud server. (C) User Location Identification The clocking agent will provide the user location and then it will help in determining whether the user is moving towards a location or moving outwards from the location. The current location obtained using the GPS from the mobile user. The mobile user will be provided with the GPS for getting the longitude & latitude values. These values are obtained via satellite link communication. So once the user sends the query to the Clocking Agent, the Clocking agent will get the exact location of the user via GPS values of the user. (D) Safe Region Manipulation Whenever a clocking agent receives a query from the client it will check the query and find the safe region for the client. Safe region is calculated from the exact user location. First we have to fetch the direction of the user. If the direction of the user is towards forward then the clocking agent will calculate the safe region with respect to the main location. For example whenever a user sends a request from Mount Road and the user is moving towards Anna Square, then the Safe region is Anna Square, if the user is moving in the opposite direction then the clocking agent will specify the safe region as Egmore. After finding the safe region the clocking agent will send the request to the Cloud server. The Cloud server will send the result to the safe region and the clocking agent will receives the result from the Cloud server which will then determine the nearest location from the result and forward the location to the client. (E) Query Request to the Cloud Server The Clocking agent manipulates the Safe region for the client and the forwards the query to the Cloud server. The Cloud server checks the query and retrieves the results according to the safe region and then sends the result to the clocking agent. If the user has requested for ATM Bank around Mount Road, first the query is sent to the Clocking Agent. Clocking agent will manipulate the safe region as Anna Square, and then the query is forwarded to the Cloud Server. (F) Retrieval of Results I According To Safe Region and Ontology Clocking agent will send the query to the Cloud server. The Cloud server manipulates the user query and it will send the results to the clocking server based on the Area and Ontology. The main Cloud will retrieve the results with respect to the nearest place of the user as well as the Ontology Process. Ontology is the study of relativities. Using Ontology Cloud Server can get relevant information s and that information is also retrieved back to the user. If the query for Bank from the Anna Square as safe Region, then the Cloud Server will find the nearest bank as well as the relative ATM with respect to Anna Square. (G) Finding the Nearest Location After getting the query result from the Cloud server, the clocking server will filter the results in accordance to the user exact location. The flow of the information agent system is being shown in the above diagram. The Cloud server will retrieve the bank information or ATM whichever is nearest to the user in accordance to Anna Square to the clocking agent. But the clocking agent knows the user who is present at Mount Road, so the clocking agent will apply KNN (K Nearest Neighbor) Query Algorithm to fetch the nearest ATM or bank in accordance to Mount road. The nearest neighbor algorithm has some strong consistency results. As the amount of data approaches infinity, the algorithm is guaranteed to yield an error rate no worse than twice the Bayes error rate. [9]. So user will be receiving the exact information, as well as providing the requested user s Location Privacy is still maintained, hence the Cloud server will update in its table as the query is from Anna Square not from Mount Road. By this way we ensure Privacy in the user s location. The above block diagram shows the flow of the process in which the nearest location can be determined. At a glance the execution of the ubiquitous information agent system in accordance with the
5 An Information Agent System for Cloud Computing based Location Tracking 67 GPS techniques and related activity diagrams in cloud computing environments are explained with the Android simulator and detailed as following: 1. At the Client end the user will starts the GPS, and then the system can start executing the functions that are required to determine the user authentication. 2. The connecting technology which is used to configure with the system starts the transmitted program and sends the related information of the earlier step in the CURRL format to the cloud computing provider OntoIAS for finishing the pre-process of the cloud computing, including internal message processing with related recording and statistical processes, corresponding decision making. Figure 4: Block Diagram of Locating the Nearest Location At the cloud end the OntoIAS actively retrieves the corresponding local, specific, or hot information with their descriptions related to that position information. And then the system starts the received program. Finally, it communicates the query results to the client end through a series start of Request- Response manner in the Client-Server mode. V. ADVANTAGES OF THE PROPOSED SYSTEM 1. More simpler accessibility. 2. It will provide an enhanced experience. 3. Decision making can be done at a faster rate VI. CONCLUSION In this paper, the ontology which is being supported with the ubiquitous information agent system and its related activity diagram in cloud computing environments has been proposed. User makes the query to the main server, in which Cloud Computing Process is executed. Here in this paper, Cloud Computing is used as Infrastructure as a Service (IAAS), where the entire server is managed with the Location Information in its database. As the user makes the query along with his GPS values to find out the Exact Location to the main server, the main server maps the query with its database along with the Location, and then only the results are retrieved back to the user. Ontology is also implemented in this Project for the Relative Key word Search. Assuming User makes a query for Bank, and then the Main Server will retrieve the nearest Location of the Banks as well as some ATMs also. All our Previous will retrieve only the exactly matched Keyword search from the database. But in our System, we also retrieve Closely Associated Keywords which is called as Ontology Process. We are implementing this in the Android Platform using GPS for Location Finding and Cloud Computing for IAAS Data Process and Ontology for Effective Data Retrieval. There will be everlasting research in the future for the cloud computing techniques such as corresponding experimental verification, continuously improving the performance efficiency, expanding database of ontology and its related linking interface. References [1] Y. C. Chang, Clandestine Service Discovery Protocols for Pervasive Computing, Master Thesis, Dept. of Computer Science and Information Engineering,
6 68 Anwar Basha H, Samuel Geoffrey Lawrence and Indumathi K National Cheng Kung University, Tainan, Taiwan, [2] Garmin Corporation, GPS Guide for Beginners, Garmin International, Inc., KS, USA, [3] W.Y. Li, An example of Java Programming in a Semantic Grid-Based Ubiquitous Learning Environment, Master Thesis, Dept. of Management Information Systems,Chun Yuan Christian University, Taoyuan, Taiwan, [4] B. S. Liang, Ubiquitous Messaging and Presence Service, Master Thesis, Dept. of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, Taiwan, [5] C. Y. Lin, Position and Google Map, Department of Information Science and applications, Asia University, TaiChung, Taiwan, Available at asia.edu.tw/~lincyu/android/chapter9.pdf, 2010 (visited on Mar. 31, 2010). [6] K. Partridge and P. Golle, On Using Existing Time- Use Study Data for Ubiquitous Computing Applications, Proc. of 10th International Conference on Ubiquitous Computing, Seoul, South Korea, [7] D. Smetters, D. Balfanz; G. Durfee; T.Smith; and K.H. Lee, Instant Matchmaking: Simple, Secure Virtual Extensions to Ubiquitous Computing Environments, Proc. of Eighth International Conference on Ubiquitous Computing, Orange County, California, USA, [8] T. J. Thompson, P. J. Kline, and C. B. Kumar, Bluetooth Application Programming with The Java APIs, Morgan Kaufmann Publishers, Burlington, MA, USA, [9] Cover T. M., Hart P. E. (1967), Nearest Neighbor Pattern Classification. IEEE Transactions on Information Theory 13 (1): doi: /tit [10] S. Y. Yang, C. W. Wu, and C. S. Ho, Using Rule Mining and Behavior Prediction Techniques in Web Information Query Processing, Proc.of the 6 th Conference on Artificial Intelligence and Applications, Kaohsiung, Taiwan, 2001, pp [11] S. Y. Yang, K. W. Wu, C. M. Ni, Y. T. Lin, and P. S. Kao, An Ontology- Supported Ubiquitous Interface Agent System for Cloud Computing Example on Bluetooth Wireless Technique with Java, Proc. of 2010 Conference on Information Technology and Applications in Outlying Islands, Kaohsiung, Taiwan, 2010, pp. 79.
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
Key words: GPS, Geocoder, WWO Server, Google Server, Android, RAM, Mobile Equipment, OS.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Weather Monitoring
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
An Android Application for Tracking College Bus Using Google Map
An Android Application for Tracking College Bus Using Google Map S. Priya 1, B. Prabhavathi 2, P. Shanmuga Priya 3, B. Shanthini 4 1,2, 3 UG Scholar, 4 Head of the Department Department of Information
Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis
Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis K.S.Pandiyan, Dr.S.Sivakumar Research scholar, Professor, Department of Geology, Anna University, Chennai Abstract
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Android based Secured Vehicle Key Finder System
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri
A new Design Approach for Developing Electronic Health Record Application on Android
A new Design Approach for Developing Electronic Health Record Application on Android H. Sarojadevi 1,, Pallavi Munihanumaiah 2,B.A.Mohan 1,S.Ramya 1 and M. Sushma 1 1 Department of CSE, Nitte Meenakshi
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1
, pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and
A Cost Effective GPS-GPRS Based Women Tracking System and Women Safety Application using Android Mobile
A Cost Effective GPS-GPRS Based Women Tracking System and Women Safety Application using Android Mobile Devendra Thorat, Kalpesh Dhumal, Aniket Sadaphule, Vikas Arade B.E Computer Engineering, Navsahyadri
A Survey of Cloud Based Health Care System
A Survey of Cloud Based Health Care System Chandrani Ray Chowdhury Assistant Professor, Dept. of MCA, SDET-Brainware Group of Institution, Barasat, West Bengal, India ABSTRACT: Cloud communicating is an
Tracking Anomalies in Vehicle Movements using Mobile GIS
Tracking Anomalies in Vehicle Movements using Mobile GIS M.Saravanan Ericsson Research India Ericsson India Global Services Pvt.Ltd. Chennai, India Abstract--- Detecting fraud activities and anomalies
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology
A Mobile Application for Bus Information System and Location Tracking using Client-Server Technology Yasha Sardey 1, Pranoti Deshmukh 2, Pooja Mandlik 3, Saurabh Shelar 4, Minal Nerkar 5 1,2,3,4,5 AISSMS
The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator
Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014
Real Time Wireless based Train Tracking, Track Identification and Collision avoidance System for Railway Sectors 1 R. Immanuel Rajkumar, 2 Dr.P. E. Sankaranarayanan, and 3 Dr.G.Sundari 1 Research Scholar,
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations
Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations R.S.S.Vishnu Priya, P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao Dept. of CSE, KLCE Vaddeswaram,
CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016
VEHICLE TRACKING SYSTEM WITH ANDROID APP SUPPORT ABSTRACT M. Sudhakar Professor Dept of ECE CMR College of Engineering & Technology Kandlakoya, Medchal Rd, Hyderabad e-mail: [email protected] K.Kalyani PG
How To Improve Cloud Computing With An Ontology System For An Optimal Decision Making
International Journal of Computational Engineering Research Vol, 04 Issue, 1 An Ontology System for Ability Optimization & Enhancement in Cloud Broker Pradeep Kumar M.Sc. Computer Science (AI) Central
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
Software as a Service (SaaS) for Management information system using multiple tenants
Software as a Service (SaaS) for Management information system using multiple tenants Rachana Desale, Purva Kolhatkar, Anju More, Piyush Katira, Vishal Kokane Prof.S.M.Jaybhaye (Department of Information
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Pakhtunkhwa, Pakistan Email: 1 [email protected]
VFAST Transitions on Software Engineering http://www.vfast.org/index.php/xxx@ 2015 ISSN(e): 2309-3978, ISSN(p) 2411-6246 Volume 7, Number 02, July-August, 2015 pp. 12-17 A RESEARCH ON MOBILE APPLICATIONS
Fast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
Rapid Application Development
Rapid Application Development Chapter 7: Development RAD with CASE tool: App Inventor And Cloud computing Technology Cr: appinventor.org Dr.Orawit Thinnukool College of Arts, Media and Technology, Chiang
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and
Thin@ System Architecture V3.2. Last Update: August 2015
Thin@ System Architecture V3.2 Last Update: August 2015 Introduction http://www.thinetsolution.com Welcome to Thin@ System Architecture manual! Modern business applications are available to end users as
Hosted Video in Cloud Computing
Hosted Video in Cloud Computing Future of IP Surveillance Juber Chu CEO, ACTi Corporation May, 2010 1 Agenda What is cloud computing? Market Trend ACTi s Strategy Case Study Why ACTi 2 Cloud! 3 Application
MANAGEMENT SYSTEM FOR A FLEET OF VEHICLES BASED ON GPS. João André Correia Telo de Oliveira
MANAGEMENT SYSTEM FOR A FLEET OF VEHICLES BASED ON GPS João André Correia Telo de Oliveira Author Affiliation(s) Instituto Superior Técnico, University of Lisbon, Portugal ABSTRACT This dissertation was
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India [email protected]
IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
Using Cloud Computing Technology to Develop a Emergency. Care System on Android
Using Cloud Computing Technology to Develop a Emergency Care System on Android Steven K.C. Lo 1 Chi-Ming Chung 2 Chien-Yuan Hunag 3 1 Department of Information Management, Jinwen University of Science
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.707 A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 Vehicle Tracking System with Smartphone Integration S Om Prakash, R Karthikaeyan 7 Abstract Need for reliable management
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Keywords LBS, Continuous Query, Range Query, Google API s, GPS.
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Android Based Continuous
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service
, pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
RealTime Implementation of RTOS based Vehicle Tracking System
BIOSCIENCES BIOTECHNOLOGY RESEARCH ASIA, April 2015. Vol. 12(1), 237-241 RealTime Implementation of RTOS based Vehicle Tracking System A. Venkataraman 1 and P. Chitra 2 1 Master of Engineering, Embedded
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance of
Mobile Cloud Computing In Business
Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES
MULTI-DIMENSIONAL PASSWORD GENERATION TECHNIQUE FOR ACCESSING CLOUD SERVICES Dinesha H A 1 and Dr.V.K Agrawal 2 1 Assistant Professor, Department of ISE & CORI, PES Institute of Technology, Bangalore,
An Ontology-enhanced Cloud Service Discovery System
An Ontology-enhanced Cloud Service Discovery System Taekgyeong Han and Kwang Mong Sim* Abstract This paper presents a Cloud service discovery system (CSDS) that aims to support the Cloud users in finding
Mobile Cloud Computing: Academic Services for Palestinian Higher Education Institutions (MCCAS)
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volume 3 Issue 1 ǁ Jan. 2015 ǁ PP.22-27 Mobile Cloud Computing: Academic Services
SRJIS/BIMONTHLY/AVINASH PARIHAR, DEEPALI CHORGHE, DHANASHREE BICHKULE & POOJA KUMBHAR (1671-1676) CTI INTEGRATION USING SALESFORCE.
CTI INTEGRATION USING SALESFORCE.COM CRM Avinash Parihar 1, Deepali Chorage 2, Dhanshri Bichkule 3 & Pooja Kumbhar 4 Dept. Of Computer, NESGOI, Pune, Maharashtra, India Abstract Customers want to call
A Secure Authenticate Framework for Cloud Computing Environment
A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure
An Android Enabled Mobile Cloud Framework for Development of Electronic Healthcare Monitoring System using VPN Connection
ISSN: 2321-7782 (Online) Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com An Android
Implementing Mobile Thin client Architecture For Enterprise Application
Research Paper Implementing Mobile Thin client Architecture For Enterprise Paper ID IJIFR/ V2/ E1/ 037 Page No 131-136 Subject Area Information Technology Key Words JQuery Mobile, JQuery Ajax, REST, JSON
4D Deployment Options for Wide Area Networks
4D Deployment Options for Wide Area Networks By Jason T. Slack, Technical Support Engineer, 4D Inc. Technical Note 07-32 Abstract 4 th Dimension is a highly flexible tool for creating and deploying powerful
An Intelligent Approach for Data Fortification in Cloud Computing
An Intelligent Approach for Data Fortification in Cloud Computing Supriya Mandhare 1, Prof. A. K. Sen 2, Asso. Prof. Rajkumar Shende 3 1,3 Department of Computer Engineering, St. Francis Institute of Technology,
VIRTUALIZED WEB DESKTOP Towards a Faster Web Cloud Operating System
VIRTUALIZED WEB DESKTOP Towards a Faster Web Cloud Operating System Bittu Daimary* [email protected] Mahesh Chettri* [email protected] Abstract All Operating Systems provide interface to users
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Cloud Self Service Mobile Business Intelligence MAKE INFORMED DECISIONS WITH BIG DATA ANALYTICS, CLOUD BI, & SELF SERVICE MOBILITY OPTIONS
Cloud Self Service Mobile Business Intelligence MAKE INFORMED DECISIONS WITH BIG DATA ANALYTICS, CLOUD BI, & SELF SERVICE MOBILITY OPTIONS VISUALIZE DATA, DISCOVER TRENDS, SHARE FINDINGS Analysis extracts
Application Architectures
Software Engineering Application Architectures Based on Software Engineering, 7 th Edition by Ian Sommerville Objectives To explain the organization of two fundamental models of business systems - batch
VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved
Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India [email protected] ABSTRACT In this paper, we describe the design and
Low Cost SMS based Vehicle Tracking System using Android
Low Cost SMS based Vehicle Tracking System using Android 1. Mr. Pawale S. R., Mr. M. M. Bokare 2, Dr. V. M. Thakare 3,, Dr. Mrs. Sadhana Chidrawar 4 1 M.E. Student 2 Assistance Professor 3 Professor 4
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
A Study of Infrastructure Clouds
A Study of Infrastructure Clouds Pothamsetty Nagaraju 1, K.R.R.M.Rao 2 1 Pursuing M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur., Affiliated to JNTUK,
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Secure Cloud Computing through IT Auditing
Secure Cloud Computing through IT Auditing 75 Navita Agarwal Department of CSIT Moradabad Institute of Technology, Moradabad, U.P., INDIA Email: [email protected] ABSTRACT In this paper we discuss the
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Mobile Cloud Computing Security Considerations
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications
Smart Home System Using Android Application
Smart Home System Using Android Application Karlapudi Siva Krishna Mr. Md Mohiddin Dr. M. Narendra Kumar, Dr. S. Sreenatha Reddy Student (M. Tech) Embedded Sys Asst. Prof, ECE Prof & Vice-Principal Prof
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,
INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 INCREASING THE CLOUD PERFORMANCE WITH LOCAL AUTHENTICATION Sanjay Razdan Department of Computer Science and Eng. Mewar
