Design and Implementation of a Location-Based Service With Emphasis on a Geographical Database

Author(s):  
Wen-Chen Hu

One of the most popular apps is location-based services (LBSs) such as navigation, location-based social networks, and location-based advertisements. However, building an LBS is not a simple task because it involves various subjects and techniques like mobile computing, databases, and security and privacy. One of the major LBS components is geographical databases, which are used to store geographic data like locations and functions (such as restaurants and gas stations). A geographical database is usually hosted on a server because of its huge size and should facilitate geographic data storage, indexing, searching, and matching. This article tries to mitigate the high difficulty of LBS construction by showing the construction step by step with a focus on connecting a mobile device to a server-side geographical database. After reading this article, readers will be able to build an LBS prototype for their research or applications.

Author(s):  
Bo Chen ◽  
Huaijie Zhu ◽  
Wei Liu ◽  
Jian Yin ◽  
Wang-Chien Lee ◽  
...  

AbstractMotivated by location-based social networks which allow people to access location-based services as a group, we study a novel variant ofoptimal sequenced route(OSR) queries, optimal sequenced route for group meetup (OSR-G) queries. OSR-G query aims to find the optimal meeting POI (point of interest) such that the maximum users’ route distance to the meeting POI is minimized after each user visits a number of POIs of specific categories (e.g., gas stations, restaurants, and shopping malls) in a particular order. To process OSR-G queries, we first propose anOSR-Based(OSRB) algorithm as our baseline, which examines every POI in the meeting category and utilizes existing OSR (calledE-OSR) algorithm to compute the optimal route for each user to the meeting POI. To address the shortcomings (i.e., requiring to examine every POI in the meeting category) ofOSRB, we propose anupper bound based filteringalgorithm, calledcircle filtering(CF) algorithm, which exploits the circle property to filter the unpromising meeting POIs. In addition, we propose alower bound based pruning(LBP) algorithm, namelyLBP-SPwhich exploits a shortest path lower bound to prune the unqualified meeting POIs to reduce the search space. Furthermore, we develop an approximate algorithm, namely APS, to accelerate OSR-G queries with a good approximation ratio. Finally the experimental results show that bothCFandLBP-SPoutperform theOSRBalgorithm and have high pruning rates. Moreover, the proposed approximate algorithm runs faster than the exact OSR-G algorithms and has a good approximation ratio.


2017 ◽  
Vol 19 (1) ◽  
pp. 4-10 ◽  
Author(s):  
Maria Anna Jankowska ◽  
Piotr Jankowski

The article presents the Idaho Geospatial Data Center (IGDC), a digital library of public-domain geographic data for the state of Idaho. The design and implementation of IGDC are introduced as part of the larger context of a geolibrary model. The article presents methodology and tools used to build IGDC with the focus on a geolibrary map browser. The use of IGDC is evaluated from the perspective of accessa and demand for geographic data. Finally, the article offers recommendations for future development of geospatial data centers.


2020 ◽  
Vol 10 (4) ◽  
pp. 36
Author(s):  
Sajeewan Pratsri ◽  
Prachyanun Nilsook

According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the security and privacy of Big Data and Big Data analysis in organizations, government agencies, and educational institutions also have an impact on the aspect of designing a Big Data platform for higher education institute (HEi). It is a digital learning platform that is an online instruction and the use of digital media for educational reform including a module provides information on functions of various modules between computers and humans. 1) Big Data architecture is a framework for an architecture of numerous data which consisting of Big Data Infrastructure (BDI), Data Storage (Cloud-based), processing of a computer system that uses all parts of computer resources for optimal efficiency (High-Performance Computing: HPC), a network system to detect the target device network. Thereafter, according to Hadoop’s tools and techniques, when Big Data was introduced with Hadoop's tools and techniques, the benefits of the Big Data platform would provide desired data analysis by retrieving existing information, to illustrate, student information and teaching information that is large amounts of information to adopt for accurate forecasting.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Zhiru Li ◽  
Wei Xu ◽  
Huibin Shi ◽  
Yuanyuan Zhang ◽  
Yan Yan

Considering the importance of energy in our lives and its impact on other critical infrastructures, this paper starts from the whole life cycle of big data and divides the security and privacy risk factors of energy big data into five stages: data collection, data transmission, data storage, data use, and data destruction. Integrating into the consideration of cloud environment, this paper fully analyzes the risk factors of each stage and establishes a risk assessment index system for the security and privacy of energy big data. According to the different degrees of risk impact, AHP method is used to give indexes weights, genetic algorithm is used to optimize the initial weights and thresholds of BP neural network, and then the optimized weights and thresholds are given to BP neural network, and the evaluation samples in the database are used to train it. Then, the trained model is used to evaluate a case to verify the applicability of the model.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2014 ◽  
Vol 687-691 ◽  
pp. 1872-1875
Author(s):  
Ying Ying Weng

According to the automobile industry cluster situation at present, the paper introduces the method and train of thought of automobile industry cluster based on GIS from demand analysis, data base design, function design and so on. Also demonstration analysis in one automobile industry cluster. In construction, use client layer, web layer, business logic layer and data layer to design the system architecture. It improved the system maintenance performance, used Oracle and ArcSDE to access space data and attribute data, and mass data storage management. Research results maybe give some significance reference for design and implementation of automobile industry cluster.


2018 ◽  
Vol 5 (6) ◽  
pp. 4778-4802 ◽  
Author(s):  
Philip Asuquo ◽  
Haitham Cruickshank ◽  
Jeremy Morley ◽  
Chibueze P. Anyigor Ogah ◽  
Ao Lei ◽  
...  

Author(s):  
Obiniyi Ayodele Afolayan ◽  
Ezugwu El-Shamir Absalom

This paper identifies the causes associated with delays in processing and releasing results in tertiary institutions. An enhanced computer program for result computation integrated with a database for storage of processed results simplifies a university grading system and overcomes the short-comings of existing packages. The system takes interdepartmental collaboration and alliances into consideration, over a network that speeds up collection of processed results from designated departments through an improved centralized database system. An empirical evaluation of the system shows that it expedites processing of results and transcripts at various levels and management of and access to student results on-line. The technological approach for the implementation of the proposed system is based on open source solutions. Apache is used as Web server extended with PHP for server side processing. In recognition of the confidentiality of data contained in the system, communication networks are protected with open-ssl library for data encryption and role-based authentication. This system increases efficient service delivery and benefits both administration and students.


Author(s):  
Elias Z. K. Ioup ◽  
John T. Sample

Granularity is often ignored when designing geospatial Web services. Choices relating to granularity affect service interfaces, data storage and organization, and XML format design. This chapter highlights the importance of analyzing usage and performance requirements when deciding on granularity choices in the design of geospatial Web services. Often, instead of making design decisions based on these requirements, geospatial services are implemented using default, commonly used techniques which may reduce performance, increase complexity, or fail to fully meet user needs. This chapter discusses the importance of granularity in designing and implementing geospatial Web services and provides common examples that highlight the different approaches to granularity which are available.


Sign in / Sign up

Export Citation Format

Share Document