1 International Journal of Distributed Sensor Networks Volume 2015, Article ID , 13 pages Research Article A Tracking System Supporting Large-Scale Users Based on GPS and G-Sensor Jun Zeng, 1 Minbo Li, 1,2 and Yuanfeng Cai 1 1 Software School, Fudan University, Shanghai , China 2 Shanghai Key Laboratory of Data Science, Fudan University, Shanghai , China Correspondence should be addressed to Minbo Li; Received 2 December 2014; Revised 13 March 2015; Accepted 25 March 2015 Academic Editor: Melike Erol-Kantarci Copyright 2015 Jun Zeng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. As the need for tracking objects in our daily life is increasing, how to take advantage of widely used technologies and devices to meet everyone s need is becoming a burning issue. To achieve this aim, a tracking system supporting large-scale users based on GPS and G-sensors (TSSLSU) is designed to track items by obtaining various pieces information of the item s states and analyzing various conditions. In this system, a microprocessor with Global Positioning System (GPS) modules embedded in target sends data in real-time through General Packet Radio Service (GPRS) and Global System for Mobile Communication (GSM), and an inner G- sensor can fetch real-time state information, such as acceleration and vibration signals. The system designed a protocol to encapsulate and send these data to servers and also adopted distributed architecture, including backend server cluster, cache queue cluster, database cluster, and web server cluster. This specific architecture provides a better performance when large-scale users visit concurrently. In particular, there are alarm mechanisms to inform the user of any illegal cases through smart phone application and power-saving mechanism for embedded terminal by changing the frequency of sending s. At any time, user can locate it and query the carrier s previous path by web page or phone application. 1. Introduction As the Chinese economy grows rapidly, the number of vehicles, including but not limited to cars and electric bicycles, rises greatly. Sometimes, locating these vehicles became an important function for peripheral product of vehicle . Meanwhile, issues about improper care for the elderly and loss of children have been exposed frequently these years . As a result, people are getting more concerned about the security of the kids, the old men, vehicles, and pets, which creates huge market prospects for tracking technology. Till now, various tracking systems have been developed, while the result is far from satisfaction. Some GSM-based tracking devices send location information through text to the phone of the binding user, while such data is not direct enough for users to understand . With the prevailing smart phones, much more can be done to facilitate tracking objects. IDC (Internet Data Center) released its mobile phone forecast recently, predicting that total sales of the smart phones will reach 1.2 billion units before the end of the year, a 23.1 percent increase over 2013 . Based on this premise, we fully take advantage of ubiquitous smart phones and sensor network, to design a sensor-based tracking system, which can support large-scale users and big data storage, with the alarm mechanism. In our system, terminals send location information, which is gathered through GPS module , to the server cluster periodically. For the purpose of saving energy, the time gap between two s can adjust to the condition of carrier automatically, by preset parameters. As to the speed of the carrier, if the speed of the carrier increases to some particular point, the frequency decreases and vice versa. Besides, G- sensor and some necessary parameters are used to monitor the state of the carrier to hit the mark of illegal cases and alarm conditions. For this system, the terminal may send one to server cluster every fifteen seconds in normal condition with the aid of GPS sensor; for large-scale users, like 100,000 users concurrently, the data received by server cluster in one single day is big. This system settles this problem as well. To meet the big data challenge, cache queue is adopted to cache
2 2 International Journal of Distributed Sensor Networks the data before inserting into database, in which database sharding technology is utilized to distribute the data into varioustablesaccordingtotime.inaddition,g-sensorisused to monitor the condition of the carrier, such as whether the target has gone out the electronic fence or the target has some unexpected movements. Taking advantage of the GPS and G- sensor, this system can be used to monitor the kids or the elder, as well as being used to locate and track vehicles when stolen. Moreover, web page and smart phone application can be used to locate the carrier and look over its historic path. Compared to other existing systems, we develop a mechanism to change the frequency of sending and thus weareabletosaveenergywhichisakeyfactorinsensor reliability, as well as decreasing the network traffic. Besides, innovative application level protocol is designed to ensure the reliability of network transmission. In this paper, for convenience, vehicle is the experimental carrier, and in the following sections, vehicle is used as an example to discuss the design and implementation of the system. The rest of this paper is organized as follows. Section 2 presents related literature reviews on current tracking system and technology. Section 3 describes the designation and implementation details of tracking system based GPS and G- sensor. Section 4 illustrates the method for large-scale users access, big data process, storage, and query. In Section 5, result is presented to show that how the system is implemented and the performance for high concurrent pressure. Finally, Section 6 accounts for conclusion and future work. 2. Previous Systems Recently,withtherapidincreaseindemandofsecurity,various tracking technologies have been developed. Considerable research works focused on locating and tracking. Ganesh et al.  developed an antitheft tracking system using only GSM technology, which would be the cheapest source of vehicle tracking antitheft system. The terminal in vehicle can send location of the nearest base station to owner s mobile phone via text. This approach is cost-effective; however, the locating accuracy is disappointing and the latitude and longitude information is not straight enough for users to understand. Liu et al.  designed a tracking system based on Internet of Things, which is controlled by an RFID module. When the vehicle is stolen inside which the vibration sensor mounted will be triggered, and GSM module will send the location information to the owner s mobile phone. Compared to the previous systems, this is a great improvement, but it is still not enough. Lee et al.  proposed a simple vehicle tracking system based on smartphone using GPS, GSM, and GPRS technology. The system provides vehicles a microcontroller to monitor their geographic locations and speed. Then the owner can know his vehicle s location in real-time using Google maps and determine the distance and time for the vehicle to arrive at a given destination. But the terminal in this system costs a lot, which only provides some simple functions. There were also some other similar vehicle systems proposed with antitheft or tracking functions ,butmostof the monitored objects were cars with high moving speed. For ordinary vehicles, however, the cost of such tracking system is unfortunately high. This might prevent customers from purchasing these services and terminals since their high price is one of the main selling disadvantages. In this paper, a more reliable tracking system supporting large-scale users is proposed. The ubiquitous tracking system provides the most commonly used functions for vehicles. Compared with systems proposed by Lee et al. and Liu et al., the TSSLSU can not only monitor the vehicle s real-time location and obtain the information of driving route, but also interact with the vehicle by changing the parameters of the embedded terminal and protect it via sending warning s. Furthermore, the interactive platforms of the system are smartphone and web platform, both of which are easily achievable for vehicle owners. There is another difference between TSSLSU and other systems. Baidu map is used in this system, since it is the most widely used and more accurate map in China, whereas in most other countries, Google map is more popular. Before displaying path information in map, this coordinate information obtained from GPS satellites has to be treated by a serial of special processes rather than being used directly. This paper is to present the architecture of tracking system supporting great concurrency based on the sensors of GPS and G-sensor. With regard to the embedded terminals access and applications access, concurrent access and contagious distribution have been considered and utilized. For frequent data uploading and writing, database cluster and data cache queues are also employed. 3. System Design and Architecture Details The prime purpose of TSSLSU is to locate vehicle and monitor it by tracking its geographic locations. The tracking terminal embedded in vehicle is able to forward information, including speed, defensive state, and geographical coordinates to the backend server clusters, which then process these data and monitor the vehicle s unusual situations. The tracking terminal acquires geographic coordinates from GPS satellites along with some other information. It then sends these data via various s to the backend server cluster, such as locations, states, and speed and some other information. At set intervals, a heartbeat is also sent to the backend server cluster to keep in touch with servers. Once the backend server cluster receives a normal, it writes these data into queues, whose SQL data wait in line to be written into the database of job nodes. After a specific time interval, the database of job nodes synchronizes with the database of backup. User can log into the web or smartphone application using the terminal s unique ID and password, monitor the previous and real-time travel paths in Baidu map, and send instructions to terminal. User will receive real-time warning s of various pieces of information, such as over speed, suspected stolen, off-side, or moved, via the smartphone application. Furthermore, instructions can also be sent to web servers to change parameters of embedded terminal.
3 International Journal of Distributed Sensor Networks 3 TSSLSU Terminal Backend server cluster Web server cluster Application Receive GPS data Parse Process path data Send command Send Write data into DB Read data from DB Receive Send ACK Process business Transfer command Geo fence Locate carrier Display path 5 Push alarm Figure 3: Embedded terminal. (1) GPS antenna. (2) GPS receiver. (3) GSM antenna. (4) SIM card slot. (5) Backup battery. Figure 1: Functional architecture of TSSLSU Figure 2: Embedded terminal. (1) MCU and GSM/GPRS module. (2) GPS module. (3) G-sensor module. The functional architecture of TSSLSU is showed in Figure 1. The details of the design and implementation of TSSLSU are elaborated in the following four parts Embedded Terminal. The embedded terminal is composed of three modules, which is GPRS/GSM module, GPS module, and gravity sensor (G-sensor) module, as shown in Figure 2. The main chip based on the 32-bit ARM73J-STM RISC processor is MT6260A  produced by MediaTek in Taiwan. MT6260A is the microprogrammed control unit of the embedded terminal and integrated single-ended SAW-less RF transceiver for multiband GSM cellular system. Also it supports GPRS modem. Another chip named MT3336  on the mainboard functions as GPS. This chip contains a CMOS RF down conversion circuitry, combined with digital baseband signal processing. This combination delivers excellent receiving performance with extreme sensitivity and a very low timeto-first-fix. The third module, BMA222E (F), perceives the changes of acceleration and vibration. BMA222E is a triaxial, lowg acceleration sensor with digital output for consumer applications, allowing measurements of acceleration in three perpendicular axes. This module offers a variable VDDIO Figure 4: A completed embedded terminal. voltage range from 1.2 V to 3.6 V and can be programmed to optimize functionality, performance, and power consumption in customer specific applications. For the final application of the terminal device, a SIM card needs to be inserted into the embedded terminal. GPS antenna receives GPS signals and processes the data in GPS module. The MCU schedules the data and uploads the encapsulated s to background servers by GSM antenna. The structure is showed in Figure 3. There are about 300 mah power in the fully charged backup battery. Under normal conditions, the embedded terminal connects to other devices and gets charged by the host device, and if the embedded terminal disconnects with the host device, it gets power directly from the backup battery and changes into sleep mode with low energy consumption. In Figure 4, it shows a completed embedded terminal, whose size is 84 mm as length, 52.6 mm as width, and 15.4 mm as height.
4 4 International Journal of Distributed Sensor Networks Action Type number Function Heartbeat 2 State 3 Locate 4 Parameter set 6 Setup defense 8 Illegal shake 11 Cross border 14 Table 1: Some detailed s format. Message is sent from terminal to server, to keep the links connected. Report the location information each period of time. Server sends it to terminal to ask for location information. Change the parameter for terminal in long distance. Set up defense for terminal to guard against theft. Terminal reports the alarm of illegal shaking after the vehicle is illegally moving. Terminal reports alert after moving 300 m, when it sets up defenses. Terminal format [Time, T + num, ISMI, longitude, latitude,other,status] [Time, T + num, mark] [Time, T + num, ISMI, mark, status] Server format [Time, S + num,,] [Time, S + num, locate times, interval] [Time, S + num, ISMI, mold, mark] [Time, S + num] Status: mark 6 kinds of states for the vehicle, including whether the vehicle is parking or not, the vehicle sets up defenses or not (1 is yes and 0 is no), the signal strength of GSM (0 9), the number of GPS satellites (0 9), the main power source is moved or not, and the available power of standby battery, such as , each bit replaces appropriate state. Mark, mold: mean different parameters in protocol Message Protocol. The formats of the most used s transferred between terminal and servers are shown in (1), (2),and(3): [Time, Type + num, ISMI, longitude, latitude, other, status], [Time, Type + num, ISMI, mold, mark], (2) [Time, Type + num, ISMI, mark, status], (3) where [ and ] are the start and end of a, respectively, and, is the separator. The format of Time is YYYY-MM-DD HH:MM:SS. Type includes T and S, where T means the sent by terminals and S by servers. num shows the different classes of type and ISMI is the unique serial number of terminals. To realize the tracking system and reduce the redundancy, there are over 20 kinds of functionality types. For different functions, there are some differences for protocol format in detail. The protocol format may contain different parameters according to the defined class. Some parameters may be null, but the, has to be retained in a complete and valid. In (1), (2), and(3), it shows the comprehensive types of protocol. For (1), it is the protocol type for collection s, like heartbeat, state, locate, parameter query, address, and query. For (2), it is the format for fortification s, such as set parameter, restart terminal, set up defense, and rescind defense. As for (3), it is the format for warn, like illegal shake, power off, cross the border, over speed, and low battery. Some parameters may have completely different meanings in each type of format, (1) such as in state, the other information means realtime speed, while in illegal shake, the other information means cell-id information. These s encoded in ASCII are sent with TCP (Transmission Control Protocol) as the transport protocol and GPRS (General Packet Radio Service) network for the data transmission in the network layer. Some detailed information of the format is shown in Table 1. In TSSLSU, the size of a encapsulated into a data package should not be larger than 1024 bytes, so that the package can be efficiently transferred by GPRS. In particular, the transfer protocol can guarantee the reliability for every transferred. For a package transferred from terminal to servers, the time is when the terminal starts to send a. Then the servers have to reply to a to inform that the servers have indeed received the. And the time for the reply is the same as the previous sending time, so that the terminal could remove the sent by matching the time. For example, the terminal sends a state to servers with [ :00:00, T2, ,,,,]. If the servers receive it, they will reply to a with [ :00:00, S2,,]. After the terminal receives the reply, the incipient of type T2 will be removed. However, if the reply is not received after a long time, such as 1 minute, the terminal will send the same again. This process, as illustrated in Figure 5, ensures the integrity of data. For this system, the protocol is specially designed basedonrealscenarios.incomparisonwithprevioussystems,suchasleeetal.andliuetal. strackingsystems, the protocol mechanism can guarantee the arrival for every in the highest degree. When a terminal sends a to servers, while the servers stop, the will be sent several times to try to get to the servers. By contrast, the may be missed in other tracking systems.
5 International Journal of Distributed Sensor Networks 5 Terminal Servers Application No Get GPS absolute coordinates Connect to server Send No Valid authentication Yes Yes Get and process Return ACK Connect to server Get offset and insert into offset database Get region for absolute coordinates Is it in the offset database Yes Add offsets to absolute coordinates Get commands and execute Process commands Send commands Send remote commands Get ACK No Request to CSBSM to get relative coordinates Figure 6: Coordinates conversion. Send ACK Forward ACK Figure 5: Reliable transport protocol Path Display. After logging in with username and password in web or smartphone application, the user can query his vehicle s daily path in Baidu map with HTTP (Hyper Text Transport Protocol) request. The Baidu map API severed by Baidu Map servers can automatically display map and respondtouser sgestureslikedragandclick. However, before displaying the final Baidu map, preparation jobs need to be done. At the beginning of the system, GPS geographic coordinates will be received. However, because of China s law, final map cannot be obtained based on these geographic coordinates. So for a request sent from user, there are several steps to be processed to prepare for the final data of map coordinates. (1) Acquire the accuracy of the absolute coordinates. (2) Get region information based on the absolute coordinates. (3) Query from the offset database. (4) If the offset is in the database, the final coordinate is the summation of latitude, longitude, and the corresponding offset. (5) If the offset is not in the database, obtain the final coordinates after converting coordinates through the interfaces from China s State Bureau of Surveying and Mapping (CSBSM). Acquire offset information basedonthefinalcoordinatesandstoreitintooffset database. Each original coordinate obtained from GPS satellites has to go through all the steps above. With the latter part in step 5, query efficiency will be promoted for next same region coordinates and the offset database will be more complete, as well. In Figure 6, it shows the flow for coordinates conversion. The user sends a request to web server, which in return acquires a set of processed coordinates based on the user s and their vehicle s unique information. Then, in the smartphone or web application, the tracking route and some other information will be displayed in Baidu map Alarm Mechanism. Because some vehicles can be stolen or resold easily, in TSSLSU, special functions, such as illegal shake, cross border, setup defense, are designed to achieve the aim of alarm mechanism and antitheft. First, the system provides several categories of vehicles statuses, such as whether the vehicle is parking or whether the vehicle sets up defense. If the vehicle s status shows that it is parking and in defense mode, but the G-sensor senses that the vehicle is moving, a warning will be sent to the owner s smartphone immediately. Another monitor function, geo-fence, is to limit the vehicle s activity to a defined range. In other words, the owner can set a virtual geographic boundary for their vehicle. Once the vehicle crosses this boundary, a warning will be sent to the owner s smartphone as well. In this way, owner can interact with terminal and choose border with owner s actual demand. Finally, if the vehicles were stolen, the embedded terminal with standby battery would exchange data with servers and application.thesedatacanbeusedtotrackandlocatethe stolen vehicle s position. 4. Large-Scale Data Storage and Query The concept of large-scale distributed storage system was taken into consideration when this system was first designed. To break the bottleneck of storage schema in traditional database, cache queue cluster is used before inserting data
6 6 International Journal of Distributed Sensor Networks into database. Also, to improve the performance of the whole system with large amount of users visiting concurrently, the read and write splitting models have been adopted. Furthermore, two cache layers are added to cache web pages and hot data separately. Sections 4.1, 4.2, 4.3, and 4.4 discuss the details of interaction when processing large-scale accesses, data storage, and user query Terminals Access Servers. Embedded terminals connect to the server cluster, which accepts and processes data of s by using socket connection. After processing data,theinformationneedstobestoredintothedatabase. Because of the large amount of terminals and high uploading frequency, the number of concurrent accesses is very huge. To solve this problem in TSSLSU, a LVS (Linux Virtual Server) layer has been added between the embedded terminal group and the server cluster. LVS plays the role of the load balancing . It receives numerous requests, which come from terminals, with a virtual IP and maps these requests to idle servers . Servers analyze and process these data. In the end, processed data waits to be written into the database of job nodes that the cache queue is on. After the data has been written into database successfully, the server will send the terminal an acknowledge (ACK) to inform that the has been handled Data Process. In TSSLSU, each valid embedded terminal needs to connect to the server cluster and sends s at least every fifteen seconds. In addition, as the user can change the frequency of sending s, the number of s might increase as well. Every day, there would be more than 5760 s sent by just one terminal. Assume that 100,000 users will visit the system at the same time; then there would be more than billion s per day that need to be successfully written into the database. In this case, if a single, nocachetraditionaldatabaseisused,therewouldbereadand write bottlenecks due to the large-scale data . However, in thissystem,thecachequeuesanddatabaseserverclusterare adopted. (i) Because of the limitation of the database writing performance, cache queues play a vital part of conserving data that have not been written into database. The queues keep and process these data sequentially with the principle of First in First out (FIFO). (ii) The database server cluster is divided into one control node and several database groups. Every database group includes one job node and one backup node. The control node keeps the metadata information of job nodes data tables and records . The control node regularly schedules job nodes to synchronize their operation log to the corresponding backup nodes to achieve consistency of data in different database nodes. Job nodes send heartbeat including metadata to control node at regular intervals. As separating reading and writing improves performance, the job nodes are only responsible for records writing while backup nodes only handles records reading . The server processes the data stored in cache queue one by one, and each data in the queue head is calculated according to (4) with the key of terminal serial number (ISMI). After data s hashvalue is determined, the queue head data is removed from the cache queue: hashvalue = (hash (ISMI) %N), (4) where N is the number of job nodes. ISMI is terminal s serial number, which is unique. Figure 7 shows the process how servers visit control node to identify the job node position and then visit job node to write data. The specific steps are shown as follows. (1) Cache Queue server sends the calculated hashvalue to the control node. (2) The control node looks up the metadata table to identify the corresponding job node according to the hashvalue. (3) The control node returns the location information of the corresponding job node to the Cache Queue server, which sends the query information. (4) Cache Queue acquires the location of job node and sends request to the job node to insert data. BymatchingthecalculatedhashValuebasedon(4) in the control node, the corresponding job node that stores the data will be located Database Sharding. With 100,000 users, the database will have billion data to insert per day in conservative estimate. Facing such big volume data, the database group gets bigger rapidly over time. Based on this condition, the CRUD (Create, Retrieve, Update, Delete) operations on the database are much more time-consuming. In addition, the resources of each server, such as CPU, disk, memory, and IO, are limited; thus, the server may meet great challenge in daily usewhenencounteringgrowingdata. To strengthen the scalability and robustness of the system, database sharding technique is adopted in every job node of the database group to facilitate data operation according to the requirements and design of the system. In previous sections, the design of the nodes and data storage method are presented, that is, to distribute the data in different job node which is determined by the ISMI value. Based on the premise that the user only queries the information of his device in some specific day in the path representation function, job nodes are split into multiple tables measured by weeks. The backup nodes are handled similarly as the job nodes. As shown in Figure 8. Throughtakinguseofdatabasesharding,everyshardwill maintain the most common used data. In this way, data in every node and table can be operated, managed, and backed up easily. Furthermore, higher read operation speed and concurrency can be realized User Access Web Servers. For 100,000 embedded terminals, there would be over 100,000 smartphone application
7 International Journal of Distributed Sensor Networks 7 ID 1 hashvalue Job node ID Job node 1 Backup ID Backup N Job node N Backup N 2 OpenFire server cluster 1 3 Control node 4 4 DB group 1 DB group 2 DB group N Backup 1 Job node 1 Backup 2 Job node 2 Backup N Job node N Figure 7: Process of writing data. Job node N Time < w w < time <2w 2 w < time <3w Figure 8: Database sharding for job nodes. users or web users. The owner of a carrier can track it with a smartphone application or web page in PC. Furthermore, commands that control the embedded terminal can be sent by phone application as well. The smartphone application sends a request to the web server, and then the request would be processed by the master control node. Once received, the requests would be distributed into different web servers for load balancing purpose. Twomainfunctionsofthecontrolnodeareillustratedin Figure 9. (i) Control node holds the metadata information of web server cluster and this information would be updated periodically.. (ii) Control node is responsible for the distribution of abundant requests from users. For large amount of concurrent queries from users, control node splits concurrent requests by load balancing. In order to improve performance, especially reducing network traffic, a page caching server is added between load balancing server and web server cluster . When a new request is issued, the page caching server will be checked first to confirm if there exists the result page for the request, instead of requesting to the web server directly. If there is no result page in page caching server, the web server will be visited. Because the memory of servers is limited, only important pages or frequently visited pages should be stored in the memory. In addition, users may visit plenty of different pages in a short time. Some algorithms like LRU (Least Recently Used) cannot ensure that the pages in the memory are the most popular pages . Here the LIRS (Low Inter-reference Recency Set) algorithm is used to filter cached pages . This algorithm divides pages into two levels: the first level and the secondary level. The first level holds a list for each page. If one page have not been read or written for a while, the reference in the list of the page would be removed. Pages that have been accessed more than twice in a short time will be set into the secondary cache. The way to access the web application database for web servers is similar to that between servers and embedded terminals. The difference lies in the page caching server for
8 8 International Journal of Distributed Sensor Networks Response Request Control node DB cluster Host 1 Host 2 Cache node Cache node Web cluster Web server 1 Web server 2 Web server N Figure 9: Architecture of web servers. holding hot data . For the selection of hot data, a counter of the data will be stored to record the number of visited times. Every time user requests the data, the number of the data s counters will add one. Only top n will be considered as hot data. 5. Implementation and Experiment 5.1. Implementation. In TSSLSU, the mainly development platform is JAVA2 Enterprise Edition (J2EE). Database MySQL 5.5 is used for database cluster. The server is Apache JMeter 2.11 combined with Tomcat 7.0 and JDK Smartphone application is based on the Android For embedded terminal, compiled language is C programming language. The backend of the system consists of server cluster which deals with connection requests, cache queue cluster which caches the to be inserted into the database, and web server cluster which responds to query requests; all of thethreepartsareimplementedinjava.figure 10 shows the implemented architecture of TSSLSU. In this paper, a Google smartphone Nexus 4 is used to show the developed phone application and the web application. For either kind of application, the user needs a unique name, which is the phone number or terminal ID and a password to login in. Location and tracking path can be seen in the Baidu map. In the meanwhile, instructions and commands to change parameters of the embedded terminal could be sent by these applications. There are three parts to show how the system is implemented. The terminal transfers encapsulated to backend servers, received and analyzed by the servers. Then, necessary information will wait in line to be written into the database of job nodes. In Table 2, the park and antitheft columns show
9 International Journal of Distributed Sensor Networks 9 HTTP Internet Web/phone application GPS satellites GPRS HTTP GPS coordinates TCP/IP Web server 1 Web server N GPRS HTTP Web server cluster LVS Read Cache queue cluster Carrier and GPS terminal Server 1. Server N sql n sql 2 sql 1 Cache queue 1... sql n sql 2 sql 1 Cache queue N Write Job node Database cluster Backup Backend server cluster Figure 10: Implemented architecture of TSSLSU. the states of the vehicle about whether it is parking, setting up defense, respectively, in which 1 represents yes and 0 stands for no, and the energy column shows the power resource, in which 1 presents the terminal is powered by carrier and 0 stands for by backup battery. gsm and gps show the signal strength of GSM and the number of connected GPS satellites (0 9). From Table 2, the time interval for each of a certain terminal is about 10 seconds. If the time interval parameter is changed by the user or the speed of the vehicle changes,thetimeintervalwouldbechangedaswell. The owner can bind his vehicle through serial number with his mobile phone; furthermore, owner can locate the accurate position of his vehicle. Also, previous travel path can be seen as well. Parameters of the terminal can be changed and several kinds of alarm s can be examined. Figure 11(a) shows the previous travel path and Figure 11(b) shows alarm s from the smartphone application. In web application, these functions are similar to the functions in smartphone application. User also needs unique nameandpasswordtologinintothewebsite.thentheuser can do same operations in phone.figure 12(a) shows the realtime location for a user s vehicle and Figure 12(b) shows the trip path in Baidu map. After finalizing the development and deployment of hardware and software, this system has been used in one city of Shandong province. Through cooperating with China Unicom Corp, the owner only has to pay RMB 10 Yuan per month for service charge Experiment and Discussion. In order to verify the feasibility of the system facing big data challenge, pressure tests for such models including vehicle list, real-time monitoring, tracking playback, and remote command, are carried out. Testshavealsobeenmadetoensuretheusabilityandsecurity of the following functions, such as locating, instruction control, and path representation. We checked and evaluated the load capacity of the system in a simulated environment. Basedonthestatisticsofthroughputandresponsiveness of the system under various concurrent conditions, the maximum concurrent capacity in expected data volume can be determined. To evaluate the reliability of the system, experiments are carried out to test how long the system will work normally under certain load pressure. JMeter is adopted to simulate thousands of users to make requests concurrently. Inthepressuretest,alltheclientsandserversareinthe same LAN. The clients are five PC with 4 G memory and dual-core CPU, and the server cluster is running in an IBM 7915R02 server with 8 G memory and quad-core CPU. Each client PC runs apache-jmeter-2.11 to simulate thousands of
10 10 International Journal of Distributed Sensor Networks Table 2: A certain terminal s information. id Time imsi Longitude Latitude Speed Park Antitheft gps gsm Energy Backup baidulng baidulat :31: V 4.2 V :31: V 4.2 V :31: V 4.2 V :31: V 4.2 V :32: V 4.2 V :32: V 4.2 V :32: V 4.2 V :32: V 4.2 V :32: V 4.2 V :32: V 4.2 V :33: V 4.2 V :42: V 4.2 V :42: V 4.2 V
11 International Journal of Distributed Sensor Networks 11 (a) (b) Figure 11: Smartphone application: (a) tracking the path and (b) alarm s. (a) (b) Figure 12: Web application: (a) locating of the device and (b) tracking the path. concurrent requests, and the server cluster runs ServerAgent2.2.1 to respond to the requests. In this test, each client simulates 2000 valid users to log in to the system and then send 2000 requests to insert condition s. The GUI in the server shows the realtime processing speed and condition. Meanwhile, JMeter in the client side helps to monitor the performance of the server over time, including the changing usage rate and processing speed of CPU, memory, disk, and network, with the transaction controller for TCP sampler. Through such tests, statistics of the concurrent capacity can be obtained, which can be used to further determine the bottleneck of the system. Running multiple tests on all five servers, we select one testing result from each sever randomly and show them in Table 3. The test column reflects the specific server. The table records the performance of the servers in the test in which 2000 concurrent requests are processed, including the average responding time. The median column depicts the responding time of 1000 concurrent requests, while the 90% line column shows the responding time of 90% of full load, which is 1800 concurrent requests. The responding time Table 3: Aggregate report data for experiments. Test t1 t2 t3 t4 t5 Average Median % line Min Max in the table is measured by millisecond. It can be seen from the table that the amplitude of variation is low, while the average column and max column in row three and row five change greater compared to the other rows which may be due to the slight performance disparity of the client PCs. In general, the experiment data is reasonable. From Table 3 and Figure 14, a conclusion can be drawn that five clients send total of 10,000 requests concurrently (each of the five sends 2000 requests), and the server is able to respond in time without system crash or service response failure.
12 12 International Journal of Distributed Sensor Networks Performance metrics Performance metrics :00:00 00:00:18 00:00:37 00:00:55 00:01:14 00:01:33 00:01:51 00:02:10 00:02:28 00:02:47 00:03:06 00:00:00 00:00:18 00:00:37 00:00:56 00:01:14 00:01:33 00:01:52 00:02:10 00:02:29 00:02:48 00:03:07 Elapsed time (granularity: 2 s) Elapsed time (granularity: 2 s) CPU disks I/O ( 10) (a) (b) Performance metrics :00:00 00:00:15 00:00:30 00:00:45 00:01:00 00:01:16 00:01:31 00:01:46 00:02:01 00:02:16 00:02:32 Elapsed time (granularity: 1 s) memory (c) Figure 13: Server performance (a) CPU, (b) disks I/O, and (c) memory. Response time Average Median 90%_line Performance Test number Min Max Figure 14: Chart for aggregate reports. In addition, Figure 13 consists of three parts naming (a), (b), and (c), which depict the CPU, disk I/O, and memory performance, respectively. On the premise that the experiments are undertaken in LAN with 1000 M bandwidth, so the network I/O performance is not taken into consideration and recorded. It is showed in the graphs that, in the beginning of the experiment, the performance index is great because the servers receive a burst of requests concurrently, and it has to respond to the requests as well as query database and process data in the cache queue. The performance index decreases over time to normal state, though with some fluctuation. As a conclusion, the design and implementation make the system able to support large-scale concurrent users smoothly. 6. Conclusion and Future Works This system is designed to track the exact location of carrier in real time, such as vehicles, elderly or children, and pets. Moreover, with the help of G-sensor, it can also provide antitheft and monitor functions. A terminal is embedded in the carrier which includes three modules, GPRS/GSM module, GPS module, and G-sensor module. The embedded terminal receives and encapsulates GPS data, combined with other information according to a given format. Then it builds a socket and sends the s. Considering the potential large scale of users, a distributed architecture is designed to reduce the pressure of every server. In addition, separating reading from writing can further improve the performance of the whole system. Two types of clients are implemented in this system so that users can track their carriers through web application or an application on the smartphone. The path of one embedded terminal, which displays in the Baidu map, can be acquired in both clients. The results have demonstrated the precision and practicability of the system and all the functions ofthesystemareverifiedinthisstudy. For the future work, how to transfer in binary representation and reduce transmission time and bandwidth isthenextproblemtobesolved.atthesametime,the largedatastoredinthesystemcanbeminedtofinduseful information to offer help to other functional departments, such as transportation department and police.
13 International Journal of Distributed Sensor Networks 13 Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. Acknowledgments Thispaperisbasedonaproject ElectricBicycleBodyguard System which has lasted for one year. The research is supported with partner SIM Technology Group Limited. And theauthorswouldliketothankweidonglu. References  S. A. Hameed, O. Khalifa, M. Ershad, F. Zahudi, B. Sheyaa, and W. Asender, Car monitoring, alerting and tracking model: enhancement with mobility and database facilities, in Proceedings of the International Conference on Computer and Communication Engineering (ICCCE 10),pp.1 5,May2010.  H. Tan, J. Feng, G. Feng, W. Wang, and Y.-J. Zhang, Traffic volume data outlier recovery via tensor model, Mathematical Problems in Engineering, vol.2013,articleid164810,8pages,  C.Roadknight,L.Parrott,N.Boyd,andI.W.Marshall, Realtime data management on a wireless sensor network, International Journal of Distributed Sensor Networks, vol.1,no.2,pp ,   M. Zhao and X. Shi, A new developed wireless sensor based on GPRS & GPS for dynamic signals of structures, in Proceedings of the 5th International Workshop on Structural Health Monitoring, pp , DEStech, Stanford, Calif, USA, September  G. S. P. Ganesh, B. Balaji, and T. A. S. Varadhan, Anti-theft tracking system for automobiles (AutoGSM), in Proceedings of the IEEE International Conference on Anti-Counterfeiting, Security and Identification (ASID 11), pp , IEEE, Xiamen, China, June  Z.Liu,A.Zhang,andS.Li, Vehicleanti-thefttrackingsystem based on Internet of Things, in Proceedings of the IEEE International Conference on Vehicular Electronics and Safety (ICVES 13), pp , IEEE, Dongguan, China, July  S.Lee,G.Tewolde,andJ.Kwon, Designandimplementation of vehicle tracking system using GPS/GSM/GPRS technology and smartphone application, in Proceedings of the IEEE World Forum on Internet of Things (WF-IoT 14), pp , IEEE, March  C. Bo, C. Xin, Z. Zhongyi, Z. Chengwen, and C. Junliang, Web of things-based remote monitoring system for coal mine safety using wireless sensor network, International Journal of Distributed Sensor Networks, vol.2014,articleid323127,14 pages,  P.Liang,H.Wang,C.H.Pengetal., Digitaltransmitterdesign for mobile devices, IEEE Communications Magazine,vol.51,no. 10, pp ,  T. Ren, M. Petovello, and C. Basnayake, Requirements analysis for bit synchronization and decoding in a standalone highsensitivity GNSS receiver, in Proceedings of the Ubiquitous Positioning, Indoor Navigation, and Location Based Service (UPINLBS 12), pp. 1 9, IEEE, Helsinki, Finland, October  B. Ji, J. Zhou, L. Qian et al., An implementation of LVSbased highly-available Radius server, in Proceedings of the IET International Conference on Wireless Mobile and Multimedia Networks (ICWMMN 06),p.396,November2006.  P.-J. Yang, Load balancing mechanism for QoS-aware cloud computing using eucalyptus platform [M.S. thesis], Department of Electrical Engineering, K.Suto,H.Nishiyama,N.Kato,T.Nakachi,T.Fujii,andA. Takahara, Toward integrating overlay and physical networks for robust parallel processing architecture, IEEE Network, vol. 28,no.4,pp.40 45,2014. M.Kumar,N.Batra,andH.Aggarwal, Cachebasedquery optimization approach in distributed database, International Journal of Computer Science Issues, vol.9,no.6,pp ,  E. Anderson, C. Hoover, X. Li, and J. Tucek, Efficient tracing and performance analysis for large distributed systems, in Proceedings of the IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS 09), pp. 1 10, IEEE, London, UK, September  A. Dash and B. Demsky, Integrating caching and prefetching mechanisms in a distributed transactional memory, IEEE Transactions on Parallel and Distributed Systems, vol.22,no.8, pp ,  S. Podlipnig and L. Böszörmenyi, A survey of Web cache replacement strategies, ACM Computing Surveys, vol. 35, no. 4, pp ,  Y. Zhiyong, L. Chunlin, L. Yanpei, and A. Malek, DRMST: a novel dynamic replica management strategy based on TOPSIS in cloud storage, Journal of Software Engineering, vol.8,no.4, pp ,  M. Rezvan, K. Pawlikowski, and H. Sirisena, A distributed cache architecture for routing in hierarchical QoS-capable networks, in Proceedings of the IEEE International Conference on Communications (ICC 03), vol. 3, pp , IEEE, May 2003.
14 International Journal of Rotating Machinery The Scientific World Journal Engineering Journal of Advances in Mechanical Engineering Journal of Sensors International Journal of Distributed Sensor Networks Advances in Civil Engineering Submit your manuscripts at Advances in OptoElectronics Journal of Robotics VLSI Design Modelling & Simulation in Engineering International Journal of Navigation and Observation International Journal of Chemical Engineering Advances in Acoustics and Vibration Journal of Control Science and Engineering Active and Passive Electronic Components International Journal of Journal of Antennas and Propagation Shock and Vibration Electrical and Computer Engineering
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
SuperGuard VT-05 Vehicle Tracking Device The SuperGuard VT-05 Vehicle Tracker is a professional GPS tracking device designed for fleet management and commercial data centers, with customizable data upload
1 V680 GPS Watch User s Manual 2 Table of Contents Chapter I Preface..4 I.General...4 II.Notices..4 Chapter II about the Device.5 1. Appearance..5 2. Product Features.5 3. Product Specification.6 (1).Technical
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks Inc 35 E Wacker Drive,
Urban Transport XIII: Urban Transport and the Environment in the 21st Century 409 Vehicle Tracking System using GPRS S. Ikram 1 & F. T. Shah 2 1 Seidco Communication L.L.C, Abu Dhabi, UAE 2 COMSATS Institute
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang
Advances in Internet of Things, 2015, 5, 1-6 Published Online January 2015 in SciRes. http://www.scirp.org/journal/ait http://dx.doi.org/10.4236/ait.2015.51001 Research on Supply Chain Simulation System
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 Vehicle Tracking System with Smartphone Integration S Om Prakash, R Karthikaeyan 7 Abstract Need for reliable management
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
GPS GPRS Tracking System Main Features on GPS device 1. Positioning and Tracking: Locate vehicles and get working status by on-line Positioning Platform or the cell phone at times. You can choose the Positioning
Remote Area Tracking and Mapping TM3000 with Iridium Satellite Back up Communications Step Global has developed a solution to remote area GPS tracking by interfacing the Trimble TM3000 Asset Tracking Device
GPS Vehicle Tracker User Manual VT810 1. Please read this manual carefully for correct operation. 2. You need to ask a professional to install this product in a safe position of your vehicle. Avoid dangerous
Send Orders for Reprints to email@example.com The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
2013 GPS Tracking Solution GPS GSM Tracker Robust solution for tracking your Assets, Cars, Buses, Trucks, Fleet, Shipment, Children, Pets and more with web based tracking from anywhere in the world through
Real Time Bus Monitoring System by Sharing the Location Using Google Cloud Server Messaging Aravind. P, Kalaiarasan.A 2, D. Rajini Girinath 3 PG Student, Dept. of CSE, Anand Institute of Higher Technology,
IJECT Vo l. 5, Is s u e Sp l - 3, Ja n - Ma r c h 2014 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Advanced Vehicle Tracking System on Google Earth Using GPS and GSM 1 Sowjanya Kotte, 2 Hima Bindhu
Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show
SMART VEHICLE TRACKING SYSTEM Mrs. K.P.Kamble 1 Lecturer 1 Department of Electronics and Telecommunication Engineering, YCCE, Nagpur firstname.lastname@example.org ABSTRACT It is amazing to know how simple
Computer&Radioengineering Computer&Radioengineering Bauhaus International Science press www. bhssci.com The Design and Research of the Monitoring System for Library Alliance Based on Cloud Computing Model
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out
Performance Study VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 VMware VirtualCenter uses a database to store metadata on the state of a VMware Infrastructure environment.
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
GIS/GPS/GPRS and Web based Framework for Fleet Tracking Michael Medagama 1, Dilusha Gamage 1, Lanka Wijesinghe 1, Nadeeka Leelaratna 1, Indika Karunaratne 2 and Dileeka Dias 3 1 Dialog-University of Moratuwa
GPS Vehicle Tracker USER MANUAL VT-108 VT-108 is a GPS/GSM/GPRS tracking device which is specially developed and designed for vehicle Real-time tracking and security. With superior GPS and GPRS modules,
Track Forever GPS Tracking Control Center Specification Invincible People, Invincible Technologies & Invincible Solutions We develop solutions that reach beyond physical boundaries using state of the art
Real time vehicle tracking and driver behaviour monitoring using cellular handset based accelerometer and GPS data 4 th Year Electronic and Computing Project Report 05416361 Supervisor: Mr Liam Kilmartin
Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.
MANAGEMENT SYSTEM FOR A FLEET OF VEHICLES BASED ON GPS João André Correia Telo de Oliveira Author Affiliation(s) Instituto Superior Técnico, University of Lisbon, Portugal ABSTRACT This dissertation was
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
GPS Monitoring Device Products Features GPS Tracking System is a multi function tracking device with gps positioning and Anti-theft technology. Main features Mobile phone inquiry (via sms, up to 3 different
Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas
Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller A.Kalaiarasi 1, Raviram.P 2, Prabakaran. P M 3, ShanthoshKumar.K 4, Dheeraj B P 5 Assistant Professor, Dept. of EEE,
The System Design and Implementation of Vehicle Management Jr-Jen Huang, Yi-Yu Chu, and Yen-Jen Chen speed, time, and date. All of that GPS data is sent to MSP430F5438 by the Universal Asynchronous Receiver/Transmitter
Gilsson AlwaysFind Web Base Fleet Management AVL & Personal GPS Trackers System block diagram AlwaysFind GSM/GPRS network GPS Tracking Systems AlwaysFind OR AlwaysFind Mini Web Base control center Internet
Eliot SA Embeds ichip in Mobile Terminals for IP- Based GSM and GPRS Fleet Management Solutions GPRS provides a basic IP connection, but that was not enough for us. Connect One s ichip responded to our
ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 L. Kishore 1, Arun Raja 2 1 M.E. Embedded Systems Technologies, Sri Ramakrishna Engineering College 2 Assistant Professor, Department of ECE, Sri Ramakrishna
Intelligent Fleet Management Platform User Manual (V1.2) 2015-01-28 1 / 54 Catolog I Introduction... 3 II Login Interface... 4 III Monitor... 5 IV Track... 8 V Report... 9 5.1 Trip Fuel Report by Car...
Questions to be responded to by the firm submitting the application Why do you think this project should receive an award? How does it demonstrate: innovation, quality, and professional excellence transparency
A Cost Effective GPS-GPRS Based Women Tracking System and Women Safety Application using Android Mobile Devendra Thorat, Kalpesh Dhumal, Aniket Sadaphule, Vikas Arade B.E Computer Engineering, Navsahyadri
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Journal homepage:http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES Pranesh.S 1, Mr. P.
, pp. 163-174 http://dx.doi.org/10.14257/ijsh.2015.9.4.17 Application of Android Mobile Platform in Remote Medical Monitoring System Yao Wang, Minghan Liu and Jingang Li School of Software, Harbin University
Track on Demand Track by Time Interval Track by Distance Interval Two-way Audio Data Logger SOS Alarm Geo-fence Alarm GPS Blind Area Alarm Low Battery Alarm Speeding Alarm Mileage Report Listen-in (Voice
Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
1 Contact:Peter Zhang Email: email@example.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
GPS Vehicle tracker (Anti-theft Tracking & Positioning) USER MANUAL (Version 2.3) Please read this manual carefully before attempting installation and online activation. Pictures are for indication and
Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System Atul Arora, Ankit Malik ABSTRACT In this paper, a low-power consumption remote home security alarm system developed
1 Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information A Complete Documentation on Vehicle Tracking System Prepared By:- Udham Singh Kumar Anubhav Rashid Chaudhary 2 Table
International Journal of Principles and Applications of Information Science and Technology July 2008, Vol.2, No.1 Measuring AJAX Performance on a GPRS Mobile Platform Feng Xie 1 and David Parsons 2 Institute
SuperGuard Tracking Center TSSR 3.1 Server Software The SuperGuard Tracking Center software is one of the most powerful system integration tools for GPS tracking currently available in the industry. It
MEITRACK T1 User Guide Change History File Name MEITRACK T1 User Guide Created By Kyle Lv Project T1 Creation Date Update Date 2014-06-10 2015-05-28 Subproject User Guide Total Pages 18 Version V2.4 Confidential
Dependency Free Distributed Database Caching for Web Applications and Web Services Hemant Kumar Mehta School of Computer Science and IT, Devi Ahilya University Indore, India Priyesh Kanungo Patel College
Comparative Study of GPS Positioning For Vehicles with Algorithms in Global and Local Position Manoher Kumar bishwas MCA Final Year Veltech Technical University Avadi,Chnnai-62 E-Mailfirstname.lastname@example.org
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 71-75 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) GPS Vehicle Tracking System Shital Mohol
Management of VMware ESXi on W H I T E P A P E R Table of Contents Introduction................................................................ 3 HP Systems Insight Manager.................................................
Redtail Telematics Corporation is based in Southern California and is an established global manufacturer of state-of-the-art GPS tracking products for fleets, as well as a strategic DataWarehouse supplier
REVIEW ON IMPROVED VEHICLE MONITORING SYSTEM WITH ARRIVAL TIME PREDICITION Arti Sharma 1, Ashish Agham 1, Rajeev N. Verma 3, Gauri Kokate 3 1 BE Student, 3 Professor, Nagpur Institute of Technology Nagpur-441501,
ZENDA GPS Tracker ZD-VT2 User Guide Change History File Name ZD-VT2 User Guide Created By Tracy Lv Product ZD-VT2 Creation Date Update Date 2016-04-07 2016-05-17 Subproject User Guide Total Pages 14 Version
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong
2012 MCOM VEHICLE TRACKING SYSTEM MANUAL Vehicle Tracking System allows the Department to track, trace and monitor their vehicles in real time using GSM / GPRS technology. It sends the location address,
ECS 15; Lectures 17 and 18 Final paper: The Abstract 1-2 sentences defining the research problem. What is the internet, and how does it work? 1-2 sentences explaining your approach. 1-2 sentences describing