Social Relationship Analysis and Prediction Based on Location Information

2014 ◽  
Vol 926-930 ◽  
pp. 3966-3969
Author(s):  
Hao Hu ◽  
Liang Zhang

With the development of smart terminal and smart phones, it is more and more conveniently that obtains the peoples locations and movements trajectory. Even though humans daily movement is free and random, we also can find some regular pattern and periodic movements in daily life. These regular movements and locations make up the daily life pattern. The interactions between two daily life pattern cause person-to-person social relation and effect its changing. So we can describe persons life pattern with location data and we also can describe and infer the relations. In this paper, we propose a new method to quantify and predict social relationship affinity with absolute location and approximation location data.

2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


2012 ◽  
Vol 6-7 ◽  
pp. 783-789
Author(s):  
Jian Feng Dong ◽  
Tian Yang Dong ◽  
Jia Jie Yao ◽  
Ling Zhang

With the rapid development of smart-phone applications, how to make the ordering process via smart-phones more convenient and intelligent has become a hotspot. This paper puts forward a method of restaurant dish recommendation relying on position information and association rules. In addition, this paper has designed and developed a restaurant recommendation system based on mobile phone. The system would fetch the real-time location information via smart-phones, and provide customers personalized restaurant and dish recommendation service. According to the related applications, this system can successfully recommend the related restaurants and food information to customers.


2011 ◽  
Vol 2011 (0) ◽  
pp. _J102044-1-_J102044-5
Author(s):  
Takuya MORISAKI ◽  
Daiji YOSHIKI ◽  
Yoshiaki MATSUMOTOCE ◽  
Zhongwei JIANG
Keyword(s):  

Author(s):  
Yunhua Xiao

With the progress of science and technology, the development and improvement of internet technology and smart phones are gradually popular in the daily life; this world has achieved a swift transition to the mobile internet era from the traditional internet era. Various tourist areas have established “Digital Scenic Spots” in recent years, making the internet combine tightly with tourism. The construction of scenic-spot marketing platforms based on internet is an important component of constructing “Digital scenic spot.” In this article, a tourism marketing platform on the mobile internet is established by analyzing the mobile internet mainstream technology and its application in tourism marketing. In this article, the architecture of the marketing system uses the MVC pattern with a three-tier distributed structure and the logic layer of the system uses a construction of JavaBean and EJB. The article also builds a WeChat marketing model based on MM-TIP. The result of research provides some reference for constructing tourism marketing platform based on mobile internet.


Author(s):  
Xuefeng Zhao ◽  
Niannian Wang ◽  
Linan Wang ◽  
Yan Yu ◽  
Mingchu Li ◽  
...  

Some of The Great Wall relics are destroyed or even disappeared. The existing studies relied on field surveys are costly and time consuming. So a new cloud monitoring system based on smart phones is proposed. The system, which consists of three modules, image acquisition, questionnaire and real-time location, can realize rapid acquisition of information. Firstly, using smart phones, some photos of the Great Wall can be obtained. Then, the typical integrity damage information and location information can be obtained, including structure crack, human-caused destruction, the vegetation growth, etc. Secondly, analyzing the typical integrity damage information, the evaluation results are obtained. Then, the Great Wall information in the form of questionnaire is posted on the Great Wall integrity monitoring system. Mobile phone users who logged in the system can upload photos, and fill in the questionnaires. Through taking pictures and filling in the questionnaires, the required information can be obtained.


Author(s):  
Geir M. Køien

Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting user identity and user location data.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Hongtao Li ◽  
Xingsi Xue ◽  
Zhiying Li ◽  
Long Li ◽  
Jinbo Xiong

The widespread use of Internet of Things (IoT) technology has promoted location-based service (LBS) applications. Users can enjoy various conveniences brought by LBS by providing location information to LBS. However, it also brings potential privacy threats to location information. Location data that contains private information is often transmitted among IoT networks in LBS, and such privacy information should be protected. In order to solve the problem of location privacy leakage in LBS, a location privacy protection scheme based on k -anonymity is proposed in this paper, in which the Geohash coding model and Voronoi graph are used as grid division principles. We adopt the client-server-to-user (CS2U) model to protect the user’s location data on the client side and the server side, respectively. On the client side, the Geohash algorithm is proposed, which converts the user’s location coordinates into a Geohash code of the corresponding length. On the server side, the Geohash code generated by the user is inserted into the prefix tree, the prefix tree is used to find the nearest neighbors according to the characteristics of the coded similar prefixes, and the Voronoi diagram is used to divide the area units to complete the pruning. Then, using the Geohash coding model and the Voronoi diagram grid division principle, the G-V anonymity algorithm is proposed to find k neighbors in an anonymous area so that the user’s location data meets the k -anonymity requirement in the area unit, thereby achieving anonymity protection of location privacy. Theoretical analysis and experimental results show that our method is effective in terms of privacy and data quality while reducing the time of data anonymity.


Author(s):  
Chee Oh Chung ◽  
Yilun He ◽  
Hoe Kyung Jung

With the advent of the Android system, smart phones are rapidly developing and through the conveniency of accessing internet on the smart phones, a user’s location information can be accessed anywhere and anytime easily. Augmented Reality Based Technology enables the provision of variety information such as pictures and location of buildings in the navigation field. Most of the augmented reality program used to Visual Trace Method (Marker method and Markerless Method). For the Visual Trace Method, the marker installation and digital information should be assigned while the Non-visual Trace Method requires the use of hardware (G.P.S, sensors etc). Most navigation systems can only show the path from a user’s current location to their destination. In this paper, the design and implementation of an augmented reality program is discussed. It will use the smart phone’s inbuilt camera and GPS to display a user’s surround information in real time on the smart phone. The proposed system will combine the G.P.S location-based technology and virtual trace technology to provide the user with basic information about a building they are looking for or one in their immediate surrounding.


2018 ◽  
Vol 7 (2.12) ◽  
pp. 325
Author(s):  
Jae Gwang Lee ◽  
Jae Pil Lee ◽  
Eun Su Mo ◽  
Jun Hyeon Lee ◽  
Ki Su Yoon ◽  
...  

Background/Objectives: With the development of IT, accidents of industrial secret leakage have occurred more than before. Such acci-dents are mostly caused by insiders. Methods/Statistical analysis: An existing access control system uses RFID and NFC tag. The system saves only the final location in-formation in DB. For the reason, it is hard to track a user’s location data in real time. However, a beacon-based access control system saves a user’s location information in DB in real time. By analyzing the location information of DB, it is possible to track a user. Findings: Beacons are used for determining a user’s location. The determined location information is converted into location data which is saved into DB. The location data is converted into coordinates. The converted coordinate data is analyzed for understanding a user’s behavior pattern. In the pattern analysis, if a user takes an abnormal behavior, policy-based response is performed. The user behavior pattern analysis system proposed in this study is able to respond to an accident in real time. Therefore, it is expected to contribute to reducing the number of industrial secret leakage accidents caused by insiders. Improvements/Applications: This study designs a model that analyzes behavior pattern by using the indoor location data of a user based on beacon. 


Author(s):  
Claudia Hubert

Abstract This article compares the philosophical concept of dialogical existence of Martin Buber with the sociological one from Pierpaolo Donati, which put its focus on the phenomena of social relationship. After a short introduction in the discussion of the concept of dialogue in different sciences, the first paragraph will deal with the concept of “social relationship” by Pierpaolo Donati. It gives a short overview of its main statements, characteristics and its placing in the contemporary sociological discussion. The second chapter will present the basic ideas of the concept of “dialogical existence” from Martin Buber, showing his differentiation of various types of dialogue as well as the characteristics of the two basic relationships “I-THOU” and “I-IT”. The common points and the differences of these two concepts are presented in a third part. The outdrawn similarities leads to the conclusion that, even if both concepts are not concurrent, the “dialogical existence” can be seen as one form of “social relationship. The dialogical method of the Focolare Movement is presented in a forth part. It is a concrete example of how the “dialogical existence” can forge in a “social relationship” with special features and gives a glance on how the two concepts could be connected with each other. Connecting theories from different fields of research and concrete examples, this article wants to give a contribution to a wider discussion of the concept of dialogue.


Sign in / Sign up

Export Citation Format

Share Document