Enabling Scalable VGS with Weighted Imprecise Voronoi Cell
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
In this paper, we provide techniques that enable a scalable so-called Volunteered Geographic Services system. This system targets the increasing populations of online mobile users, e.g., smart phone users, enabling such users to provide location-based services to each other, thus enabling citizen reporter or citizen as a sensor scenarios. More specifically, the system allows users to register as service volunteers, by accepting service descriptions and periodically updated locations from such volunteers; and the system allows users to subscribe to notifications of available, nearby relevant services by accepting subscriptions with timing, formalized as continuous queries, that take service preferences and user locations as arguments and return relevant services. Services are ranked according to their relevance and distance to a query, and the highest ranked services are returned. The key challenge addressed is that of accessible providing up-to-date results to queries when the query locations change continuously. And the elapsed time will be increased for no response. Then query users need only notify the system when they exit their current location. And if the query or response are blocked if any fake/dummy users. The new model is enabled by weighted and Voronoi cells. The paper covers underlying concepts, properties, and algorithms, and it covers applications in VGS tracking and presents findings of empirical performance studies.
Authors and Affiliations
D. Densifer, S. Keerthana, D. Mahalakshmi
Challenges in Steganography
The primary reason for selecting steganography among the list was due to the unfamiliarity of the word that twigged an interest in the subject. that claims terrorists, may be using steganography to communicate with each...
slugRFID Technology For Libraries: An Indian Scenario
RFID (Radio Frequency Identification), the quintessential pervasive computing technology has been around us for many years and used by various organizations including library and information centers. Now days the librar...
A Novel Technique to Control Congestion in MANET using Knowledge Base Learning
MANET is mobile ad-hoc network in which mobile nodes can create the route from source to destination when they required. The path establishment from source to destination in mobile ad-hoc network is done on the basis of...
Identification, Delineation and Mapping of Micro Watershed of Kaneri
Water is most important part of our life. Now a days almost in all parts of Maharashtra people are suffering from water scarcity. To overcome this problem water conservation and management is the only solution. Delineat...
Criminal Face Identification System
Criminal record generally contains personal informzation about particular person along with photograph. To identify any Criminal we need some identification regarding person, which are given by eyewitness. In most cases...