Privacy-Preserving Relative Location Based Services for Mobile Users

Privacy-Preserving Relative Location Based Services for Mobile Users

Privacy-Preserving Relative Location Based Services for Mobile Users

[youtube]https://youtu.be/OX6ZlqZ6yi8[/youtube]

ABSTRACT:

Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS, AGPS, etc. However, all the existing applications gather users’ geographical data and transfer them into the pertinent information to give meaning and value. For this kind of solutions, the user’s privacy and security issues might be raised because the geographical location has to be exposed to the service provider. A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors. There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server. This solution adopts a Client/Server (C/S) architecture, where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP’s topological relationships. A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed. We also prove the feasibility with the prototype of “Circle Your Friends” System (CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.

EXISTING SYSTEM:

The rapid proliferation of smart phone technology in urban communities has enabled mobile users to utilize context aware services on their devices. Service providers take advantage of this dynamic and ever-growing technology landscape by proposing innovative context-dependent services for mobile subscribers. Location-based Services (LBS), for example, are used by millions of mobile subscribers every day to obtain location-specific information .Two popular features of location-based services are location check-ins and location sharing. By checking into a location, users can share their current location with family and friends or obtain location-specific services from third-party providers, the obtained service does not depend on the locations of other users. The other types of location-based services, which rely on sharing of locations (or location preferences) by a group of users in order to obtain some service for the whole group, are also becoming popular. According to a recent study, location sharing services are used by almost 20% of all mobile phone users. One prominent example of such a service is the taxi-sharing application, offered by a global telecom operator, where smart phone users can share a taxi with other users at a suitable location by revealing their departure and destination locations. Similarly, another popular service enables a group of users to find the most geographically convenient place to meet.

DISADVANTAGES OF EXISTING SYSTEM:

  1. Privacy of a user’s location or location preferences, with respect to other users and the third-party service provider, is a critical concern in such location-sharing-based applications. For instance, such information can be used to de-anonymize users and their availabilities, to track their preferences or to identify their social networks. For example, in the taxi-sharing application, a curious third-party service provider could easily deduce home/work location pairs of users who regularly use their service.
  2. Without effective protection, evens parse location information has been shown to provide reliable information about a users’ private sphere, which could have severe consequences on the users’ social, financial and private life. Even service providers who legitimately track users’ location information in order to improve the offered service can inadvertently harm users’ privacy, if the collected data is leaked in an unauthorized fashion or improperly shared with corporate partners.

 PROPOSED SYSTEM:

  • In the proposed system, Problem in a privacy-preserving fashion, where each user participates by providing only a single location preference to the CYFS solver or the service provider.
  • In this significantly extended version of our earlier conference paper, we evaluate the security of our proposal under various passive and active adversarial scenarios, including collusion.
  • We also provide an accurate and detailed analysis of the privacy properties of our proposal and show that our algorithms do not provide any probabilistic advantage to a passive adversary in correctly guessing the preferred location of any participant.
  • In addition to the theoretical analysis, we also evaluate the practical efficiency and performance of the proposed algorithms by means of a prototype implementation on a test bed of Nokia mobile devices. We also address the multi-preference case, where each user may have multiple prioritized location preferences.
  • We highlight the main differences, in terms of   performance, with the single preference case, and also present initial experimental results for the multi-preference implementation. Finally, by means of a targeted user study, we provide insight into the usability of our proposed solutions.

ADVANTAGES OF PROPOSED SYSTEM:

We address the privacy issue in LSBSs by focusing on a specific problem called the CYFS. Given a set of user location preferences, the CYFS is to determine a location among the proposed ones such that the maximum distance between this location and all other users’ locations is minimized, i.e. it is fair to all users.

SYSTEM ARCHITECTURE:

Privacy-Preserving Relative Location Based Services for Mobile Users

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System :         Pentium IV 2.4 GHz.
  • Hard Disk           : 40 GB.
  • Floppy Drive : 44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse :
  • Ram : 512 Mb.
  • MOBILE : ANDROID

SOFTWARE REQUIREMENTS:

  • Operating system : Windows 7.
  • Coding Language : Java 1.7
  • Tool Kit : Android 2.3 ABOVE
  • IDE : Eclipse

REFERENCE:

Fei Ning, Zhuang Yi, Gu Jingjing, Cao Jiannong, Yang Liang, “Privacy-Preserving Relative Location Based Services for Mobile Users”, IEEE SECURITY SCHEMES AND SOLUTIONS, 2015.

Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications

Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications

Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications

[youtube]https://youtu.be/5JmHRWj7-Ac[/youtube]

ABSTRACT:

Reducing the communication energy is essential to facilitate the growth of emerging mobile applications. In this paper, we introduce signal strength into location-based applications to reduce the energy consumption of mobile devices for data reception. First, we model the problem of data fetch scheduling, with the objective of minimizing the energy required to fetch location-based information without impacting the application’s semantics adversely. To solve the fundamental problem, we propose a dynamic-programming algorithm and prove its optimality in terms of energy savings. Then, we perform post-optimal analysis to explore the tolerance of the algorithm to signal strength fluctuations. Finally, based on the algorithm, we consider implementation issues. We have also developed a virtual tour system integrated with existing Web applications to validate the practicability of the proposed concept. The results of experiments conducted based on real-world case studies are very encouraging and demonstrate the applicability of the proposed algorithm toward signal strength fluctuations.

EXISTING SYSTEM:

Location-based applications will become more diverse and pervasive due to the potential for a range of highly personalized and context-aware services. However, the trend will lead to a significant boost in mobile data traffic and, consequently, result in further pressure on the limited battery capacity of mobile devices. Thus, reducing the communication energy is an imminent challenge in stimulating the development of emerging location-based applications. Many existing approaches leverage the complementary characteristics of Wi-Fi and 3G—i.e., WiFi to improve energy efficiency, and 3G to maintain ubiquitous connectivity. Recently, it has been observed that signal strength has a direct impact on the communication energy consumption. The communication energy per bit when the signal is weak could be as much as six times more than that when the signal is strong. This phenomenon has proved evident in both Wi-Fi and 3G. The reason for such a phenomenon results mainly from the adaptive modulation and power control employed in wireless network systems. Based on the observation, it could be promising to exploit signal strength information to reduce the communication energy of mobile devices. However, the challenge is how to exploit this observation to gain energy efficiency. In particular, signal strength may fluctuate with time due to multipath fading, so attention has to be paid to the impact of signal fluctuations on the practicability of the proposed approaches in real-world environments.

DISADVANTAGES OF EXISTING SYSTEM:

  • The significant boost in mobile data traffic and, consequently, result in further pressure on the limited battery capacity of mobile devices.
  • The communication energy per bit when the signal is weak could be as much as six times more than that when the signal is strong. This phenomenon has proved evident in both Wi-Fi and 3G. The reason for such a phenomenon results mainly from the adaptive modulation and power control employed in wireless network systems. Based on the observation, it could be promising to exploit signal strength information to reduce the communication energy of mobile devices. However, the challenge is how to exploit this observation to gain energy efficiency. In particular, signal strength may fluctuate with time due to multipath fading, so attention has to be paid to the impact of signal fluctuations on the practicability of the proposed approaches in real-world environments.

PROPOSED SYSTEM:

  • In this paper, our major contribution is to introduce signal strength into location-based applications to reduce the energy consumption of mobile devices for data reception.
  • To validate the practicability of the concept, we developed a virtual tour system comprised of an online server and a mobile application program based on Android.
  • First, we model the fundamental problem in the virtual tour system as a data fetch scheduling problem.
  • Second, we propose a dynamic-programming algorithm to solve the fundamental problem. The solution involves scheduling the fetching of location-based information at appropriate locations so as to minimize the total energy consumption. We prove that the algorithm is optimal in terms of energy savings.
  • Third, we perform post optimal analysis to explore how the algorithm responds to signal strength fluctuations, especially the fluctuation range within which the derived solution remains optimal or feasible. The analysis helps to understand the impact of signal fluctuations on the practicability of this new concept in real-world environments.
  • Fourth, we discuss technical implementation issues that arise when introducing signal strength into location-based applications for energy savings.
  • Fifth, we conducted a series of experiments in Taipei City, Taiwan, for real-world case studies. The results show that an Android smartphone of HTC EVO 3D can achieve a significant energy reduction when accessing location-based applications.
  • Finally, we discuss the limitations of our work and highlight issues that require further investigation. The concept, once proved practicable and embraced gradually, could be extended and applied to other variants of location-based applications based on the knowledge learned from this work.

ADVANTAGES OF PROPOSED SYSTEM:

  • Exploitation signal strength information has been done to reduce the communication energy of mobile devices.
  • A feasible fetch schedule that minimizes the total energy consumption for data reception
  • Through real-world case studies, we have demonstrated the practicability of introducing signal strength into location-based applications.

 SYSTEM ARCHITECTURE:

Extend Your Journey Considering Signal Strength and Fluctuation in Location-Based Applications

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System :         Pentium IV 2.4 GHz.
  • Hard Disk           : 40 GB.
  • Floppy Drive : 44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse :
  • Ram : 512 Mb.
  • MOBILE : ANDROID

SOFTWARE REQUIREMENTS:

  • Operating system : Windows 7.
  • Coding Language : Java 1.7
  • Tool Kit : Android 2.3 ABOVE
  • IDE : Eclipse

REFERENCE:

Chih-Chuan Cheng and Pi-Cheng Hsiu, “Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications”, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 2, APRIL 2015.

Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

[youtube]https://youtu.be/z1I668lKGyo[/youtube]

ABSTRACT:

Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and image storage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities. Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices. For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability and mobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of our knowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobile cloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the most energy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibility of our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in larger scale networks.

EXISTING SYSTEM:

When selecting remote servers, energy consumption for accessing them must be minimized while taking into account the dynamically changing topology. Serendipity and other VM-based solutions considered the energy cost for processing a task on mobile devices and offloading a task to the remote servers, but they did not consider the scenario in a multi-hop and dynamic network where the energy cost for relaying/transmitting packets is significant.

DISADVANTAGES OF EXISTING SYSTEM:

  1. The V-M based solutions did not consider the scenario in a multi-hop and dynamic network where the energy cost for relaying/transmitting packets is significant.

PROPOSED SYSTEM:

We propose the first framework to support fault-tolerant and energy efficient remote storage & processing under a dynamic network topology, i.e., mobile cloud. Our framework aims for applications that require energy-efficient and reliable distributed data storage & processing in dynamic network. E.g., military operation or disaster response. We integrate the k-out of- n reliability mechanism into distributed computing in mobile cloud formed by only mobile devices. k-out-of- n, a well-studied topic in reliability control, ensures that a system of n components operates correctly as long as k or more components work.

ADVANTAGES OF PROPOSED SYSTEM:

  1. Extensive simulations in larger scale networks proved the effectiveness of this solution.
  2. It assigns data fragments to nodes such that other nodes retrieve data reliably with minimal energy consumption.

SYSTEM ARCHITECTURE:

Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud

 

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System :         Pentium IV 2.4 GHz.
  • Hard Disk           : 40 GB.
  • Floppy Drive : 44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse :
  • Ram : 512 Mb.
  • MOBILE : ANDROID

SOFTWARE REQUIREMENTS:

  • Operating system : Windows 7.
  • Coding Language : Java 1.7
  • Tool Kit : Android 2.3 ABOVE
  • IDE : Eclipse

REFERENCE:

Chien-An Chen, Myounggyu Won, Radu Stoleru, Member, IEEE, and Geoffrey G. Xie, Member, IEEE, “Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud”, IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 3, NO. 1, JANUARY-MARCH 2015.

CWC: A Distributed Computing Infrastructure Using Smartphones

CWC: A Distributed Computing Infrastructure Using Smartphones

CWC: A Distributed Computing Infrastructure Using Smartphones

ABSTRACT:

Every night, many smartphones are plugged into a power source for recharging the battery. Given the increasing computing capabilities of smartphones, these idle phones constitute a sizeable computing infrastructure. Therefore, for an enterprise which supplies its employees with smartphones, we argue that a computing infrastructure that leverages idle smartphones being charged overnight is an energy-efficient and cost-effective alternative to running certain tasks on traditional servers. While parallel execution models and schedulers exist for servers, smartphones face a unique set of technical challenges due to the heterogeneity in CPU clock speed, variability in network bandwidth, and lower availability than servers. In this paper, we address many of these challenges to develop CWC—a distributed computing infrastructure using smartphones. We implement and evaluate a prototype of CWC that employs a novel scheduling algorithm to minimize the makespan of a set of computing tasks. Our evaluations using a testbed of 18 Android phones show that CWC’s scheduler yields a makespan that is 1.6x faster than other simpler approaches.

EXISTING SYSTEM:

The existing haS Enterprise computing using smart phones. The system that is closest in spirit to CWC is CANDIS, where the authors proposed using employee smart phones (being charged) for executing enterprise applications. 2 Similar to our effort in CWC, they implemented an execution environment for Android that allows for running desktop Java applications on smart phones in an automated fashion. They also made similar observations about scheduling tasks based on computational capabilities of smart phones. While we envision similar applications and system implementation in CWC, we provide a sophisticated algorithm that minimizes the make span based on both CPU capabilities and bandwidths of smart phones, which has not been explicitly addressed in CANDIS.

DISADVANTAGES OF EXISTING SYSTEM:

  1. Bootstrapping cost of CANDIS is too high and it has high energy consumption.
  2. There is a possibility that sensitive enterprise data gets exposed when the server communicates with smartphones using residential WiFi networks.

PROPOSED SYSTEM:

In this paper, we envision building a distributed computing infrastructure using smart phones for enterprises. Our vision is based on several compelling observations including (a) enterprises provide their employees with smart phones in many cases, (b) the phones are typically unused when being charged, and (c) such an infrastructure could potentially yield significant cost benefits to the enterprise. We articulate the technical challenges in building such an infrastructure. We address many of them to design CWC, a framework that supports such an infrastructure. We have a prototype implementation of CWC on a test bed of 18 Android phones. Using this implementation, we demonstrate both the viability and efficacy of various components within CWC.

ADVANTAGES OF PROPOSED SYSTEM:

  1. CWC preserves the charging profile of smart phones via task sleeping. This is not addressed by Condor since desktop machines do not exhibit such a problem.
  2. Bootstrapping cost is reduced and it has less energy consumption.

SYSTEM ARCHITECTURE:

CWC A Distributed Computing Infrastructure Using Smartphones

ALGORITHM USED:

  • Greedy Packing Algorithm

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System :         Pentium IV 2.4 GHz.
  • Hard Disk           : 40 GB.
  • Floppy Drive : 44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse :
  • Ram : 512 Mb.
  • MOBILE : ANDROID

SOFTWARE REQUIREMENTS:

  • Operating system : Windows 7.
  • Coding Language : Java 1.7
  • Tool Kit : Android 2.3 ABOVE
  • IDE : Eclipse

REFERENCE:

Mustafa Y. Arslan, Indrajeet Singh, Shailendra Singh, Harsha V. Madhyastha, Karthikeyan Sundaresan, Senior Member, IEEE, and Srikanth V. Krishnamurthy, Fellow, IEEE, “CWC: A Distributed Computing Infrastructure Using Smartphones”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 8, AUGUST 2015.

ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware

ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware

ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware

ABSTRACT:

Malware for smartphones has rocketed over the last years. Market operators face the challenge of keeping their stores free from malicious apps, a task that has become increasingly complex as malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook (e.g., within data objects). In this paper, we describe ALTERDROID, a dynamic analysis approach for detecting such hidden or obfuscated malware components distributed as parts of an app package. The key idea in ALTERDROID consists of analyzing the behavioral differences between the original app and a number of automatically generated versions of it, where a number of modifications (faults) have been carefully injected. Observable differences in terms of activities that appear or vanish in the modified app are recorded, and the resulting differential signature is analyzed through a pattern-matching process driven by rules that relate different types of hidden functionalities with patterns found in the signature. A thorough justification and a description of the proposed model are provided. The extensive experimental results obtained by testing ALTERDROID over relevant apps and malware samples support the quality and viability of our proposal.

OUTPUT VIDEO:

 EXISTING SYSTEM:

Smartphone malware has become a rather profitable business due to the existence of a large number of potential targets and the availability of reuse-oriented malware development methodologies that make exceedingly easy to produce new samples. Smartphone malware is becoming increasingly stealthy and recent specimes are relying on advanced code obfuscation techniques to evade detection by security analysts. More sophisticated obfuscation techniques, particularly in code, are starting to materialize (e.g., stegomalware ). These techniques and trends create an additional obstacle to malware analysts, who see their task further complicated and have to ultimately rely on carefully controlled dynamic analysis techniques to detect the presence of potentially dangerous pieces of code.

 DISADVANTAGES OF EXISTING SYSTEM:

Obfuscation resilient detection is based on semantics rather than syntax.

 PROPOSED SYSTEM:

In this paper we describe ALTERDROID, a tool for detecting, through reverse engineering, obfuscated functionality in components distributed as parts of an app package. Such components are often part of a malicious app and are hidden outside its main code components (e.g. within data objects), as code components may be subject to static analysis by market operators. The key idea in ALTERDROID consists of analyzing the behavioral differences between the original app and an altered version where a number of modifications (faults) have been carefully introduced. Such modifications are designed to have no observable effect on the app execution, provided that the altered component is actually what it should be (i.e., it does not hide any unwanted functionality). For example, replacing the value of some pixels in a picture or a few characters in a string encoding an error message should not affect the execution. However, if after doing so it is observed that a dynamic class loading action crashes or a network connection does not take place, it may well be that the picture was actually a piece of code or the string a network address or a URL.

 ADVANTAGES OF PROPOSED SYSTEM:

  1. ALTERDROID is designed and built to allow ease of tailoring and flexibility in functionality.
  2. We provide simple yet powerful enough models for fault injection operators, behavioral signatures and rule-based analysis of differential behavior.

 SYSTEM ARCHITECTURE:

ALTERDROID

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System :         Pentium IV 2.4 GHz.
  • Hard Disk           : 40 GB.
  • Floppy Drive : 44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse :
  • Ram : 512 Mb.
  • MOBILE : ANDROID

SOFTWARE REQUIREMENTS:

  • Operating system : Windows 7.
  • Coding Language : Java 1.7
  • Tool Kit : Android 2.3 ABOVE
  • IDE : Eclipse

REFERENCE:

Guillermo Suarez-Tangil, Juan E. Tapiador, Flavio Lombardi, Roberto Di Pietro, “ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware”, IEEE TRANSACTIONS ON MOBILE COMPUTING 2015.

A Location- and Diversity-aware News Feed System for Mobile Users

A Location- and Diversity-aware News Feed System for Mobile Users

A Location- and Diversity-aware News Feed System for Mobile Users

ABSTRACT:

A location-aware news feed (LANF) system generates news feeds for a mobile user based on her spatial preference (i.e., her current location and future locations) and non-spatial preference (i.e., her interest). Existing LANF systems simply send the most relevant geo-tagged messages to their users. Unfortunately, the major limitation of such an existing approach is that, a news feed may contain messages related to the same location (i.e., point-of-interest) or the same category of locations (e.g., food, entertainment or sport). We argue that diversity is a very important feature for location-aware news feeds because it helps users discover new places and activities. In this paper, we propose D-MobiFeed; a new LANF system enables a user to specify the minimum number of message categories (h) for the messages in a news feed. In D-MobiFeed, our objective is to efficiently schedule news feeds for a mobile user at her current and predicted locations, such that (i) each news feed contains messages belonging to at least h different categories, and (ii) their total relevance to the user is maximized. To achieve this objective, we formulate the problem into two parts, namely, a decision problem and an optimization problem. For the decision problem, we provide an exact solution by modeling it as a maximum flow problem and proving its correctness. The optimization problem is solved by our proposed three-stage heuristic algorithm. We conduct a user study and experiments to evaluate the performance of D-MobiFeed using a real data set crawled from Foursquare. Experimental results show that our proposed three-stage heuristic scheduling algorithm outperforms the brute-force optimal algorithm by at least an order of magnitude in terms of running time and the relative error incurred by the heuristic algorithm is below 1%. D-MobiFeed with the location prediction method effectively improves the relevance, diversity, and efficiency of news feeds.

EXISTING SYSTEM:

Existing LANF systems simply send the most relevant geo-tagged messages to their users. Unfortunately, the major limitation of such an existing approach is that,   news feed may contain messages related to the same location (i.e., point-of-interest) or the same category of locations (e.g., food, entertainment or sport). We argue that diversity is a very important feature for location-aware news feeds because it helps users discover new places and activities.

DISADVANTAGES OF EXISTING SYSTEM:

  1. Unfortunately, relevance alone is unable to capture the broader aspects of user satisfaction.
  2. Although users expect to receive messages that are highly relevant to their interests, they may prefer a location-aware news feed with a certain level of diversity

PROPOSED SYSTEM:

This work considers a mobile environment that makes our location- and diversity-aware news feed system unique and more challenging. With the geographical
distance between a message and a mobile user in a relevance measure model, the relevance of a message to a mobile user is changing as the user is moving. Such a dynamic environment gives us an opportunity to employ location prediction technique to improve the quality of news feeds and the system efficiency.
Existing diversification problems focus on retrieving an individual list of items with a certain level of diversity. In contrast, with our location prediction techniques, we aim at improving the quality of news feeds by scheduling multiple location- and diversity-aware news feeds for mobile users simultaneously. Experimental results show that, when k = 5, over 75% news feeds contain messages belonging to one category and about 20% of news feeds are related to two categories.

ADVANTAGES OF PROPOSED SYSTEM:

  1. User Satisfaction is improved with the help of topic diversification.
  2. This helps users discover new places and activities.
  3. Total Location Relevance to the user is maximised.

SYSTEM ARCHITECTURE:

A Location- and Diversity-aware News Feed System

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

  • System :         Pentium IV 2.4 GHz.
  • Hard Disk           : 40 GB.
  • Floppy Drive : 44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse :
  • Ram : 512 Mb.
  • MOBILE : ANDROID

SOFTWARE REQUIREMENTS:

  • Operating system : Windows 7.
  • Coding Language : Java 1.7
  • Tool Kit : Android 2.3 ABOVE
  • IDE : Eclipse

REFERENCE:

Wenjian Xu, Chi-Yin Chow, “A Location- and Diversity-aware News Feed System for Mobile Users”, IEEE Transactions on Services Computing 2015.

[youtube]https://youtu.be/XuyAloBG928[/youtube]

ieee projects for cse 2015 with abstract and base paper

IEEE Projects for CSE /IT / ECE / EEE 2015 with Abstracts and Base papers

Dear Student,

Greetings from JP INFOTECH. JP INFOTECH (an ISO 9001-2008 Certified Company) is one of the leading Software development & Research Division located at Puducherry & Chennai. As part of the Training division of JP INFOTECH, we assist you in the final year projects in all major domains. We also assure you to publish your papers in International Journals and International Conferences.

We develop software and IEEE academic projects for CSE, IT, ECE, EEE Departments of Ph.D., M.Phil., M.E., M.Tech., MCA, MBA, B.E., B.Tech., Diploma. Our major Domains are:

  • Cloud computing / Big Data / Networking / Wireless Communications / Mobile Computing / Network Security/Secure & Dependable Computing / Data Mining / Knowledge and Data Engg./ Image processing / Parallel & Distributed Systems / Information Security / Power Electronics/ Power Systems / ROBOTICS / EMBEDDED SYSTEMS And many more.

Implementation technologies in

        JAVA/J2EE/ HADOOP / DOTNET / ANDROID / MATLAB / NS2 / OMNET++ / ROBOTICS / EMBEDDED / SIMULINK AND MANY MORE

For Project titles visit: www.jpinfotech.org

You can download the project titles from http://jpinfotech.org/download-ieee-projects/

For our Project Demos visit: https://www.youtube.com/user/jpinfotechprojects

The project deliverables for JAVA / HADOOP / DOTNET /ANDROID / NS2 / MATLAB are:

1) PROJECT BASEPAPER, Abstract Document

2) Complete Source code, Database

3) Final Report / Document

(Document consists of basic contents of about Abstract, Bibilography, Conclusion, Implementation, I/P & O/P Design, Introduction, Literature Survey, Organisation Profile, Screen Shots, Software Environment, System Analysis, System Design, System Specification, System Study, System Testing)

(The chapter System Design consists of 5 diagrams: Data Flow, Use Case, Sequence, Class, Activity Diagram)

3) Review Documents and PPT (for 4 Reviews)

4) How to run Help file/Video file.

OUR OTHER SALIENT FEATURES:

  • Number 1 Project Master in Puducherry/Chennai.
  • Successfully conducted more than 15 International Conferences in all over South India in the year 2013 & 2014.
  • For the year 2015- 2016, we have Signed MoU with 15 Engineering Colleges in all over South India to Conduct International Conferences in year 2015 – 2016.
  • Published more than 1000 Research Articles of Our Ph.D./M.Phil/ME/M.Tech./BE/B.Tech. Students in Leading International Conferences and International Journals for the year 2014- 2015.
  • For the year 2013- 2014 Recognized and Awarded from “PONDICHERRY UNIVERSITY”, “Paavai College of Engg”, “Arjun College of Technology” and many leading institutions.
  • For the year 2014-2015 Recognized and Awarded from the following colleges:
    • “V.P.Muthaiah Pillai Meenakshi Ammal Engineering College for Women”
    • “Muthayammal Arts and Science College”
    • “Sri Raaja Raajan College of Engineering and Technology”
    • “Latha Mathavan Engineering College”
    • “SKR engineering college”
    • “Dr Pauls Engineering College”
    • “Jaya Engineering College”
    • “Jain College of Engineering”
  • Recognized and published article about JP INFOTECH and our director in “THE HINDU”, “DINAKARAN” and many more newspapers and Media.
  • Leaders with more than 7+ years of experience
  • Guided more than 15,000 students.
  • We assist and guarantee you to publish a paper on your project in INTERNATIONAL JOURNAL PUBLICATIONS / INTERNATIONAL CONFERENCE PUBLICATIONS.
  • We provide REVIEW DOCUMENTS AND PPTS for each review
  • NO FALSE PROMISES
  • 100% Assurance for Project Execution
  • 100% LIVE EXPLANATION
  • VIVA-VOCE QUESTIONS & ANSWERS
  • VALID TRAINEE CERTIFICATION (ISO Certification)
  • 100% PLACEMENT SUPPORT
  • Own Projects are also welcomed.

So don’t wait any more!!! Join us and be a part of us. Walk-in to our Office and Register your projects.

For any queries Contact:

R.JAYAPRAKASH BE,MBA,M.Tech., (Ph.D.)

Managing Director

www.jpinfotech.blogspot.com
www.jpinfotech.org

FOLLOW US ON FACEBOOK @ https://www.facebook.com/jpinfotechresearch

MOBILE: (0)9952649690

 Chennai Office: JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai – 83. Landmark: Next to Kotak Mahendra Bank / Bharath Scans.

Landline: (044) – 43012642 / Mobile: (0)9952649690

Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry – 9. Landmark: Opp. To Thattanchavady Industrial Estate & Next to VVP Nagar Arch.

Landline: (0413) – 4204066 / (0)9952649690