Time filter

Source Type

Chennai, India

Bharathi S.,Dbjain College | Muthukumar A.,Tata Consultancy Services Ltd.
International Journal of Applied Engineering Research | Year: 2015

Recent smartphones set integrates GPS devices that enable users to obtain geographic information about their environments by providing a location-based service with their current coordinates of location. However, LBS providers collect a significant amount of data from mobile users and could be probing to abuse it, by compromising a consumer’s locality privacy (her ability to control the information about her past and present location). There are solutions to mitigate this privacy threat focus on changing both the architecture of location-based systems and the business models of Location Based Service providers. Mobile crowd does not introduce changes to the existing business practices of Location Based Service providers; rather it requires mobile devices to communicate wirelessly in a peer-to-peer fashion. To lessen the privacy loss, users seeking geographic information try to obtain this data by querying neighboring nodes, instead of connecting to the Location Based Service However, such a solution will only function if users are willing to share regional data obtained from the Location Based Service provider. In modern mobile networks, users increasingly share their location with third-parties in return for location-based services. In this way, users attain services customized to their location. However, such communications leakage location information about users. Even if users make practice of pseudonyms, the operators of location-based services may be able to identify them and thus affect their privacy. Our proposed scheme enables users to achieve privacy by encrypting their information. Server who need to get particular mobile user information like location, must have that particular user public key, the user checks for whether it is an authenticated server, by verifying with its own private key, and if it find that particular server is the safest server ,then it responds with the information what that server need about that user. If public key not matches with users private key, then it will not respond to server. The other users who don’t want privacy simply respond to server query without any authentication verification. © Research India Publications. Source

Jagadhesan B.,Dbjain College | Srinath M.V.,Mahendra Engineering College
International Journal of Engineering and Technology | Year: 2013

Content development for e-mode of delivery systems must be specific to particular learner levels, such as: whether the learner is of the level of Diploma (lower) or Degree (middle) or Post Graduate (higher) etc. In view of developing content deliverables that are specific to levels of the elearners, scalability would become an important criterion so that the developers could reduce their efforts through partly reusing the existing system modules. Scalability is the ability of a system, or process to handle a growing amount of work in a capable manner or its ability to be enlarged to accommodate that growth. This paper focuses on how to deliver a scalable, flexible, and yet cost-effective e-content for three different but vertically upward leaner levels namely Diploma (lower level), Degree (middle level) and Post Graduate (PG) (Higher level) of Computer Application subject content. It is proposed to introduce a base e-content object, which is recommended to be of small and reusable in nature. This base content should be editable for different learner levels for future requirements so as to make it feasible for upward vertical scaling. Even though literature on scalability of e-learning systems (for expansion to a growing number of users for the future) is available already, study on scalability for e-content that would be used by different learner levels are rarely seen. The analysis for scalability is limited to components such as file sizes and media specific data that influence developmental efforts of the e-content for the future. Certain scaling factors on these chosen components for the three delimited learner levels have been evolved through experiments. The paper demonstrates the importance of these scaling factors which would indicate whether or not the base content might become feasible to scale up vertically for higher learner levels. Source

Discover hidden collaborations