Rancang Bangun Aplikasi Location Based Service Butik Berbasis Android

2018 ◽  
Vol 1 (1) ◽  
pp. 1-12
Author(s):  
Agus Q Munir ◽  
Harum Setyoningsih

 Yogyakarta was one of Indonesian tourist destinations that had potentials from its art and cultural interest. This was indeed supported mode development that was also one of art-cultural forms. Along with the era development, it was established a mode appreciation in Yogyakarta namely a boutique. The intense of boutiques in Yogyakarta had become various modes created so that it sometimes made customers had difficulties to determine which boutique to visit. This kind of condition was not effective towards time, cost and employees. Therefore, it needed a technology that was able to help customers in selecting boutiques. The study was designed and built using the Android mobile operating system is a variant of a mobile operating system developed from the Linux operating system. Android has a location-based service location-based service that is used to display and manipulate maps. Technology location based services using android smartphone media can create applications that are useful in the selection of modes available in every boutique and facilitate the search location by using maps and routes that connect to the google map service. The results of this study are based apps location-based service boutique android for the selection of boutique and can help facilitate in finding boutique location information.

2012 ◽  
Vol 182-183 ◽  
pp. 854-859 ◽  
Author(s):  
Cheng Ming Huang ◽  
Wen Hung Liao ◽  
Sheng Chih Chen

The functionalities of smart phones have extended from basic voice communication to gaming, multimedia entertainment, information retrieval and location-based services. In this paper, we attempt to design a mobile application to assist visitors to have better understandings of popular tourist destinations and related routing information while on tour. The users can obtain descriptions of a specific attraction by simply taking the picture of a landmark photo often shown in the travel booklet using their mobile devices. This is achieved by matching the landmark picture with an image database containing popular tourist spots to locate the interested destination. The location information is further confirmed using techniques in intelligent character recognition. Upon successful identification of the interested location, tourist information regarding this destination, along with the routing details will be delivered using location-based service. We anticipate the proposed mobile application to effectively assist foreign visitors by bringing comprehensive, up-to-date tourist information and promoting better travel experience.


The main aim of location-sharing is to provide current location information to their designated users. Nowadays, Location Based Service (LBS) has become one of the popular services which are provided by social networks. As LBS activity makes use of the user's identity and current location information, an appropriate path has to be utilized to protect the location privacy. However, as per our knowledge, there is no access to protecting the location sharing with the complete privacy of the location. To consider this issue, we put forward a new cryptographic primitive functional pseudonym for location sharing that make sure privacy of the data. Also, the proposed approach notably reduces the computational overhead of users by delegating part of the computation for location sharing to a server, therefore it is endurable. The primitive can be widely used in many MOSNs to authorize LBS with enhanced privacy and sustainability. As a result, it will contribute to proliferate LBS by eliminating user's privacy concerns.


Author(s):  
Dr. Yousef Ibrahim Daradkeh ◽  
Mujahed ALdhaifallah ◽  
Dmitry Namiot

This paper discusses location-based service for telecom providers. Most of the location-based services in the mobile networks are introduced and deployed by Internet companies. It leaves for telecom just the role of the data channel. Telecom providers should use their competitive advantages and offer own solutions. In our article, we discuss the sharing location information via geo messages. Geo messages let mobile users share location information as signatures to the standard messages (e.g., email, SMS). Rather than let some service constantly monitor (poll) the user’s location (as the most standalone services do) or share location info within any social circle (social network check-in, etc.) The Geo Messages approach lets users share location data on the peer to peer basis. Users can share own location info with any existing messaging systems. And messaging (e.g., SMS) is the traditional service for telecom.


KOMPUTEK ◽  
2017 ◽  
Vol 1 (1) ◽  
pp. 37
Author(s):  
Irfan Khoirul Arifin ◽  
Aliyadi Aliyadi ◽  
Yovi Litanianda

The number of vehicles in Indonesia continues to increase every year. This also happened in Ponorogo regency. It will also be directly proportional to the number of people who have problems with their vehicles, such as leaked tire quotes for being nailed or other causes. And will also increase the need for tire services. For motorists who are less aware of the surrounding area when experiencing damage to motorcycle tires, then of course to find a place nearest tire patch will be quite difficult. Therefore in this study developed information media for Android-based applications to map the locations - tire patch locations in Ponorogo, as well as looking for the closest tire patch with the rider. This app is a location-based service (location-based service) to the driver with the nearest patch of the banal location. Based on the results of testing this application can help users find the location of location preservation, tar bambal patch location, tire repair shop list, and tire repair shop list distance. This application can also show each other the location in accordance with the location of google maps applications. 


Author(s):  
Muhammad Ghifari Arfananda ◽  
◽  
Surya Michrandi Nasution ◽  
Casi Setianingsih ◽  
◽  
...  

The rapid development of information and technology, the city of Bandung tourism has also increased. However, tourists who visit the city of Bandung have problems with a limited time when visiting Bandung tourist attractions. Traffic congestion, distance, and the number of tourist destinations are the problems for tourists travel. The optimal route selection is the solution for those problems. Congestion and distance data are processed using the Simple Additive Weighting (SAW) method. Route selection uses the Floyd-Warshall Algorithm. In this study, the selection of the best route gets the smallest weight with a value of 5.127 from the Algorithm process. Based on testing, from two to five tourist attractions get an average calculation time of 3 to 5 seconds. This application is expected to provide optimal solutions for tourists in the selection of tourist travel routes.


2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


2015 ◽  
Vol 8 (4) ◽  
pp. 93
Author(s):  
Muhammad Aqib ◽  
Jonathan Cazalas

With the advent in mobile and internet technologies, there is a significant increase in the number of users using smartphones and other internet based applications. There are a large number of applications available online that use the internet and provide useful information to the users. These include ones that provide location-based services e.g. google maps etc. These applications provide many facilities to the users who want information regarding a specific area or directions using an optimal path to a destination. Due to these reasons, the number of clients using these applications is increasing on a daily basis. Although these services are very useful and are making it easy for us to get information about our surroundings, some issues are also linked with the use of these applications and their services. One of the more significant issues of using these services is privacy with respect to sending personal location information to location-based services servers. Researchers have provided many solutions to solve these issues. One of the solutions is through caching and use of k-anonymity techniques. In this paper, we have proposed a method to solve the privacy issue that uses caching data approach to reduce the number of queries sent to the location-based services server. We also discuss the use of the concept of k-anonymity when no relevant data is available in cache, and queries are sent to the server.


2006 ◽  
Vol 45 (03) ◽  
pp. 246-252 ◽  
Author(s):  
W. F. Phillips ◽  
S. Phansalkar ◽  
S. A. Sims ◽  
J. F. Hurdle ◽  
D. A. Dorr

Summary Objective: To characterize the difficulty confronting investigators in removing protected health information (PHI) from cross-discipline, free-text clinical notes, an important challenge to clinical informatics research as recalibrated by the introduction of the US Health Insurance Portability and Accountability Act (HIPAA) and similar regulations. Methods: Randomized selection of clinical narratives from complete admissions written by diverse providers, reviewed using a two-tiered rater system and simple automated regular expression tools. For manual review, two independent reviewers used simple search and replace algorithms and visual scanning to find PHI as defined by HIPAA, followed by an independent second review to detect any missed PHI. Simple automated review was also performed for the “easy” PHI that are number- or date-based. Results: From 262 notes, 2074 PHI, or 7.9 ± 6.1 per note, were found. The average recall (or sensitivity) was 95.9% while precision was 99.6% for single reviewers. Agreement between individual reviewers was strong (ICC = 0.99), although some asymmetry in errors was seen between reviewers (p = 0.001). The automated technique had better recall (98.5%) but worse precision (88.4%) for its subset of identifiers. Manually de-identifying a note took 87.3 ± 61 seconds on average. Conclusions: Manual de-identification of free-text notes is tedious and time-consuming, but even simple PHI is difficult to automatically identify with the exactitude required under HIPAA.


Sign in / Sign up

Export Citation Format

Share Document