Using Location-Based Services on Mobile Phones

2009 ◽  
pp. 191-221
Author(s):  
Pter Ekler ◽  
Gbor Zavark
Author(s):  
Shaveta Bhatia

The progressive rise of mobile computing devices and wireless networks have created a lot of interest in location-based systems and services. The involvement of internet applications in almost every field has changed our lives. Location-based services are the services provided to mobile users according to their geographic locations. Each user wants to get the service according to his/her own interest. The general user's actions in location-based services are locating, searching, navigating, identification, and checking. The location identification has now become a critical attribute. Today, internet of things in the field of location-based services (LBS) provide services to the mobile users by explore the location depending on the geographical coordinates for their valuable needs. Mobile phones that are equipped with new technologies and supported by the presence and development of broadband mobile data networks have created new opportunities for the processing of location-based applications.


Author(s):  
F. Hakimpour ◽  
A. Zare Zardiny

Today by extensive use of intelligent mobile phones, increased size of screens and enriching the mobile phones by Global Positioning System (GPS) technology use of location based services have been considered by public users more than ever.. Based on the position of users, they can receive the desired information from different LBS providers. Any LBS system generally includes five main parts: mobile devices, communication network, positioning system, service provider and data provider. By now many advances have been gained in relation to any of these parts; however the users positioning especially in indoor environments is propounded as an essential and critical issue in LBS. It is well known that GPS performs too poorly inside buildings to provide usable indoor positioning. On the other hand, current indoor positioning technologies such as using RFID or WiFi network need different hardware and software infrastructures. In this paper, we propose a new method to overcome these challenges. This method is using the Quick Response (QR) Code Technology. QR Code is a 2D encrypted barcode with a matrix structure which consists of black modules arranged in a square grid. Scanning and data retrieving process from QR Code is possible by use of different camera-enabled mobile phones only by installing the barcode reader software. This paper reviews the capabilities of QR Code technology and then discusses the advantages of using QR Code in Indoor LBS (ILBS) system in comparison to other technologies. Finally, some prospects of using QR Code are illustrated through implementation of a scenario. The most important advantages of using this new technology in ILBS are easy implementation, spending less expenses, quick data retrieval, possibility of printing the QR Code on different products and no need for complicated hardware and software infrastructures.


Author(s):  
Wen-Chen Hu ◽  
Naima Kaabouch ◽  
Lei Chen ◽  
Ming Yang

According to a forecast, the worldwide smartphone sales surpassed the world PC sales at the end of 2011. Smartphones are a kind of mobile handheld devices with phone capability or mobile phones with advanced features. Typical smartphone features include microbrowsers, emails, short message services, mobile games, GPS, et cetera. The feature of high mobility and small size of smartphones has created many applications that are not possible or inconvenient for PCs and servers, even notebooks. Location-based services (LBS), one of mobile applications, have attracted great attention recently. This research proposes a location-based service, which uses location information to find travel route anomalies, a common problem of daily life. For example, an alert should be generated when a school bus misses part of a route or a pupil does not arrive at school on time. Different kinds of route anomalies are discussed, and various methods for detecting the anomalies are proposed in this chapter. The major methods use a technique of incremental location search, which finds matched routes as the search route is entered location by location. An alert is generated when no matched routes exist. Preliminary experiment results show the proposed methods are effective and easy-to-use.


Author(s):  
Bardo Fraunholz ◽  
Jürgen Jung ◽  
Chandana Unnithan

Mobility has become a key factor around the world, as the use of ubiquitous devices, including laptops, personal digital assistants (PDAs), and mobile phones, are increasingly becoming part of daily life (Steinfield, 2004). Adding mobility to computing power, and with advanced personalization of technologies, new business applications are emerging in the area of mobile communications (Jagoe, 2003). The fastest growing segment among these applications is location-based services. This article offers a brief overview of services and their supporting technologies, and provides an outlook for their future.


Author(s):  
Constantinos Delakouridis

Location-based services are receiving signification attention over the last few years due to the increasing use of mobile devices. At the same time, location privacy is important, since position information is considered personal information. Thus, in order to address this issue, several mechanisms have been proposed protecting the mobile user. In this chapter, the authors present an architecture to shield the location of a mobile user and preserve the anonymity on the service delivery. This architecture relies on un-trusted entities to distribute segments of anonymous location information, and authorizes other entities to combine these portions and derive the actual location of a user. The chapter describes how the architecture takes into account the location privacy requirements, and how it is used by the end users’ devices, e.g., mobile phones, for the dissemination of location information to service providers. Furthermore, it notes privacy issues for further discussion and closes with proposed exercises.


Pathology ◽  
2001 ◽  
Vol 33 (3) ◽  
pp. 269-270
Author(s):  
Clive G. Harper ◽  
Victor K. Lee
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document