Mobile Location Based Services Research Papers (original) (raw)

The number of Smartphones users is increasing, and creating opportunities for the development of many applications in various application domains. Most Smartphones come with Internet connection, GSM/GPRS/3G/HSPDA/4G antenna, GPS,... more

The number of Smartphones users is increasing, and creating opportunities for the development of many applications in various application domains. Most Smartphones come with Internet connection, GSM/GPRS/3G/HSPDA/4G antenna, GPS, Bluetooth, Wi-Fi, and other sensors such as magnetometer, gyroscope and accelerometer, facilitating geographic localization, geographic position calculation, the supply of points of interest proximity and supporting the user in trails navigation. This research analyzes the challenges in developing Android mobile applications that contain location services and map navigation support for outdoor pedestrian trails, using only the Smartphones native features and technologies. Besides the main location techniques and technologies available in Smartphones, and particularly in Android, this research analyses power saving strategies, using for instance sensor fusion, map types, and web services consuming. The objective of this research is to discuss and propose bes...

ARIANNA is a small-size system, wearable by an operator for his localisation and tracking. Its design stems from the following assumptions: no need of infrastructure for localisation; low cost, no need of warm-up time (e.g. training... more

ARIANNA is a small-size system, wearable by an operator for his localisation and tracking. Its design stems from the following assumptions: no need of infrastructure for localisation; low cost, no need of warm-up time (e.g. training phases); seamless switch between GPS-denied/available conditions; computational requirements relaxed enough to be hosted in a commercial smartphone. ARIANNA meets these objectives by adopting a novel two-stage approach: the former stage is a conventional tracking process based on Extended Kalman Filter and step detection; the latter is a post-processing in which the errors due to the sensor drifts are estimated and compensated. The system has been extensively tested with various sensors, different operators, in clear and polluted magnetic environments, with good and poor/intermittent GPS, with paths ranging from 300 m to 3 km, each walked with mixed speeds. The results systematically show good and repeatable performance.

116 communications of t h e ac m | n ov e m b e r 2 0 1 0 | vo l . 5 3 | n o. 1 1 contributed articles

In this paper we address the problem of collaborative workflow in mobile environments. Specifically, we present a solution for opportunistic task assignment to mobile users based on location, context and motion awareness. As an example of... more

In this paper we address the problem of collaborative workflow in mobile environments. Specifically, we present a solution for opportunistic task assignment to mobile users based on location, context and motion awareness. As an example of this approach, we present an application based on the new Kinetic User Interface framework where users participate to dynamic workflow through their displacement in designated active zones.

Nowadays, Wireless Sensor Networks are becoming ubiquitous and increasingly attract investigators to focus on different aspects of them. In terms of localization estimation system, location algorithm play an important role to reach... more

Nowadays, Wireless Sensor Networks are
becoming ubiquitous and increasingly attract investigators to
focus on different aspects of them. In terms of localization
estimation system, location algorithm play an important role to
reach high accuracy. Many algorithms have been developed to
improve the accuracy of the system, but so far none has been able
to deliver complete satisfactory and reliable result. This paper
addresses a filter for smoothing the received signal strength
index (RSSI) based on Principle Component Analysis. To
enhance the accuracy of the system and overcome unwanted
signals, the proposed algorithm is utilized to reduce the noise for
triangulation localization approach instead of reducing the
database in fingerprint approach. Our algorithm divided each 10
received packets to a group and replaced a representative signal
for each group. A realistic demo system of the CC2430/CC2431
has been implemented in the fifth floor of Xi’an JiaotongLiverpool
University to represent the feasibility and accuracy of
our algorithm. The results show the enhancement in localization
accuracy in normal speed by at least 2 meters.

Late attention by officers in charge to high volumes of crimes and emergency cases can lead to an increase of unsolved cases nationwide. In this paper, we propose the use of Pull & Push Location Based Service model in experiments of the... more

Late attention by officers in charge to high volumes of crimes and emergency cases can lead to an increase of unsolved cases nationwide. In this paper, we propose the use of Pull & Push Location Based Service model in experiments of the implementation of Location Based Service environment to lessen the problems faced by Police and Fire Fighters in retrieving accurate information while patrolling high risk area. The time taken and the accuracy of information are problems normally faced by Police and Fire Fighters in Emergency Case department. It is crucial for them to get the right information at the right time to their walkie talkie or mobile phones. We first proposed the usage of RSS as the web services to provide feeds for the smart phone application. Updates on crimes or emergency cases within the users' locations are sent upon users' retrieval or push based on the users' locations. The application is developed by using Eclipse IDE platform and tested using HTC Magic with Android OS. The application flow starts by retrieving the location position and information on emergency cases will then be displayed according to date listed. The conceptual design and architecture are designed for Pull and Push Location Based Services.

Compatibility requirements are among the most important factors for selecting sensors to be used in Location Based Service (LBS) systems, especially in the Risk Reduction Management field. Sensors' networks use several protocols to send... more

Compatibility requirements are among the most important factors for selecting sensors to be used in Location Based Service (LBS) systems, especially in the Risk Reduction Management field. Sensors' networks use several protocols to send its signals to system remote servers. Internet protocols-based sensors are widely used. While, there is no framework to connect dialup sensors with LBS' remote servers. In order to improve the sensors' compatibility, this paper provides a framework to be employed for different sensors' communication types. This framework is a part of the proposed LBS approach for auto sending messages to the closest people of the risks.

Since the advent of 2G mobile phones are being used as a strong alternative to radio and television sets for giving public marketing messages, but not as expected strong in the field of the warnings of the risks and evictions, which... more

Since the advent of 2G mobile phones are being used as a strong alternative to radio and television sets for giving public marketing messages, but not as expected strong in the field of the warnings of the risks and evictions, which Strongly require to deliver critical messages in right time and in the event's location. After the Asian tsunami and with the use of mobile GPS in positioning, a great interest paid to risk management field. However, there are still many economic, technical and legal barriers limiting the use of those contributions, especially in developing countries, that cannot afford to spend on these systems despite their dire need for them. This paper focuses on new approach to improve the process of delivering important messages and alerts automatically to mobile devices in a particular location related to an event when it occurs by integrating GPS technology with GIS tools, and GIS measuring distance algorithms. The proposed approach could help people receive alerts in a timely and in-location manner. It would be an alternative solution to existing messaging systems such as SMS, CBS and social media applications for use by Governments or a licensed civil society organization at the lowest possible cost. The success rate in the practical experience of the proposed approach was 97%.

Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequency and to move among them in a certain sequence reflecting their habits and daily routine. With this predictability taken into account,... more

Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequency and to move among them in a certain sequence reflecting their habits and daily routine. With this predictability taken into account, the exposure of these information poses a very high risk with respect to the privacy of the individual/user. We are tempted to give away our location data in exchange for the information about our surroundings (e.g. " nearest restaurants " , " fastest bus route " etc.). Most often, we not only share our location, but we also share the information about the venues (e.g. the type, such as a cinema, or hospital) they visit, either with friends or with Location-Based Service providers. What are the risks if location data leaks to an adversary? How can we avoid the bad consequences of such location leak? Needless to say, this introduces an additional dimension to the threat to location privacy: location semantics, combined with location information, can be used to greatly improve location inference by learning and exploiting patterns at the semantic level (e.g. people go to cinemas after they leave the restaurant). By direct implication, revealing the type of venue a user visits can improve the inference of the type of venues the user visits and predict her next location. This paper formalizes the problem and analyses the effect of venue-type information and location privacy. The experimental results show that there is a significant risk with respect to the users' semantic location privacy which ultimately improves inference of her locations.

Smart-phones become a necessity in our life as we carry them everywhere, store private information, contacts, appointments, birthdays, notes etc. This shows strong relationship between Smart-phone with their users therefore Smart-phones... more

Smart-phones become a necessity in our life as we carry them everywhere, store private information, contacts, appointments, birthdays, notes etc. This shows strong relationship between Smart-phone with their users therefore Smart-phones are well suited for context aware applications. They can not only provide the information regarding the context of user but can also perform some handy task on the basis of user's context. In this paper we presented a framework to handle dynamic behavior of Smart-phone on the basis of location without requiring intervention from user. A prototype application also built and evaluated. The results shows that dynamic behavior in Smart-phone with respect to user location provides great convenience to users.

Mobile sensing and mapping applications are becoming more prevalent because sensing hardware is becoming more portable and more affordable. However, most of the hardware uses small numbers of fixed sensors that report and share... more

Mobile sensing and mapping applications are
becoming more prevalent because sensing hardware is
becoming more portable and more affordable. However,
most of the hardware uses small numbers of fixed sensors
that report and share multiple sets of environmental data
which raises privacy concerns. Instead, these systems can
be decentralized and managed by individuals in their
public and private spaces. This paper describes a robust
system called MobGeoSens which enables individuals to
monitor their local environment (e.g. pollution and temperature)
and their private spaces (e.g. activities and
health) by using mobile phones in their day to day life.
The MobGeoSen is a combination of software components
that facilitates the phone’s internal sensing devices (e.g.
microphone and camera) and external wireless sensors
(e.g. data loggers and GPS receivers) for data collection. It
also adds a new dimension of spatial localization to the
data collection process and provides the user with both
textual and spatial cartographic displays. While collecting
the data, individuals can interactively add annotations and
photos which are automatically added and integrated in the
visualization file/log. This makes it easy to visualize the
data, photos and annotations on a spatial and temporal
visualization tool. In addition, the paper will present ways
in which mobile phones can be used as noise sensors using
an on-device microphone. Finally, we present our experiences
with school children using the above mentioned
system to measure their exposure to environmental
pollution.

Mobile devices are gradually becoming ubiquitous and useful for personal information management and communication through different channels, such as instant messaging, social networking, or news feeds. This mobile revolution depends on... more

Mobile devices are gradually becoming ubiquitous and useful for personal information management and communication through different channels, such as instant messaging, social networking, or news feeds. This mobile revolution depends on two paradigms: firstly, the mobility of people and information, and secondly, the personalisation and contextualisation of information. This leads to new understandings of connectedness, interaction, participation, and context. In the field of distance education these paradigms ...

This paper presents the design and implementation of a mobile application along with a web server for geo-tagging favorite and interesting places and sharing them with the community. The design and architecture shows some key aspects and... more

This paper presents the design and implementation of a mobile application along with a web server for geo-tagging favorite and interesting places and sharing them with the community. The design and architecture shows some key aspects and issues concerning this kind of system. The mobile application is implemented in J2ME and tested on GPS enabled Nokia phones and the web server is implemented on cloud infrastructure implementation, the Google App Engine. The system was evaluated with real devices and ...

Being able to react fast to campaign events such as missing persons or disaster preventions, is of paramount importance. In these situations narrowing down the search area to a targeted and accurate location is imperative. Nowadays,... more

Being able to react fast to campaign events such as missing persons or disaster preventions, is of paramount importance. In these situations narrowing down the search area to a targeted and accurate location is imperative. Nowadays, modern mobile devices have the location awareness capabilities that can be used to determine the users Global Positioning System (GPS) coordinates. However in order to determine if a user is located within a specific area, complex floating point calculations are required. Moreover if the area is determined by a polygon, this calculation is further complicated. In this paper we propose a novel algorithm which makes use of spatial indices to determine if a mobile is located within a predefined polygon shape area. The algorithm determines the optimal length of the spatial index such as to ensure accuracy-processing time-memory trade-off. We build a prototype system, using free and open source software, to deliver alerts to mobile devices within a predetermined geographical area. The system is assessed in terms of accuracy, processing time and memory usage.

Tailored push advertising on smartphones is a key target for the advertising industry. We conducted a study with 20 professionals 'in the wild': over 5 consecutive days participants received ads tailored to their personal profiles... more

Tailored push advertising on smartphones is a key target for the advertising industry. We conducted a study with 20 professionals 'in the wild': over 5 consecutive days participants received ads tailored to their personal profiles and geographical location on their personal smartphones. Of the 400 ads sent, participants accepted 20%, rejected 30%, said 'maybe' to 17%. Interviews revealed that accept or reject decisions were driven by specific needs at the time of delivery -- e.g. a busy workload. Effective tailoring of smartphone ads requires fine-grained data on users' emotional state and context of use - data that is sensitive and requires significant effort to obtain. Users liked context-relevant ads, but also perceived privacy costs associated with disclosing personal information. To break this conundrum, users need to be able to customize the ad service, e.g. choosing which information to disclose, when to receive ads, what types of ad.

Mobile devices are gradually becoming ubiquitous and useful for personal information management and communication through different channels, such as instant messaging, social networking, or news feeds. This mobile revolution depends on... more

Mobile devices are gradually becoming ubiquitous and useful for personal information management and communication through different channels, such as instant messaging, social networking, or news feeds. This mobile revolution depends on two paradigms: firstly, the mobility of people and information, and secondly, the personalisation and contextualisation of information. This leads to new understandings of connectedness, interaction, participation, and context. In the field of distance education these paradigms ...

Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. With the growth of the importance and of the audience of location-based services, questions of security... more

Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. With the growth of the importance and of the audience of location-based services, questions of security and privacy are brought forward. As services are being built on top of this technology, the number of parties increases significantly, and the possibility of a malicious insider (or a misbehaving insider) emerges. The extent to which the parties care to trust each other has reduced, and trust amongst the various parties can no longer be assumed by a location-based service. An attacker may try to steal a service (e.g., claiming to be a client to get free internet access), service providers may gain of private information. There should be a proper authentication mechanism between client and server to access the services. In this paper we have proposed an Authentication Mechanism in which mobile Phone Users will send request for some services from server. Firstly Location Verification is done; server verifies the User's Mobile Phone's location against authorized location.

Originally K-anonymity principle was first used in relational databases to tackle the problem of data anonymity. In earlier protection techniques K threshold is used as personalization factor for mobile users. In case, K users are not... more

Originally K-anonymity principle was first used in relational databases to tackle the problem of data anonymity. In earlier protection techniques K threshold is used as personalization factor for mobile users. In case, K users are not present around needy client mobile user, query can be delayed and thus it will not help to achieve the Quality of service parameter. Moreover, authors have adopted methodology that if K-1 additional travelling users or queries are not seen by needy users, dummies are populated in the environment to improve the quality of service. Earlier architectures shows poor usage of K-principle, cryptography and cloaking space, which leads to threat during communication, more communication cost, more computation cost. We present here enhanced privacy model in a trustworthy third party privacy context that employs the notion of K-anonymity. In this work, enhanced algorithms are introduced, that guarantees a success of Location Based Services (LBS) query replies coming back to mobile client. Client sends the query to the anonymization server (AS), where this server cloaks the users with other at least K users. Our novelty in the experiment is that we have introduced cryptography from client to AS, modified earlier algorithms for Ring-Band approach, smart location updates and simulated the scaled experiment in populated cities environment. The AS add the dummies but creates ring-band cloaking area and sends it to LBS server. Cryptography adds some time however ring-band approach reduces communication overhead. We have studied the performance with variation of different parameters. The response from LBS comes to AS with Point of Interests (POIs) along the ring-band. After which AS filters for precise POIs and sends reply to mobile client. With ring-band approach we may also skip the AS and have client to LBS approach directly but without identity protection.

Late attention by officers in charge to high volumes of crimes and emergency cases can lead to an increase of unsolved cases nationwide. In this paper, we propose the use of Pull & Push Location Based Service model in experiments of the... more

Late attention by officers in charge to high volumes of crimes and emergency cases can lead to an increase of unsolved cases nationwide. In this paper, we propose the use of Pull & Push Location Based Service model in experiments of the implementation of Location Based Service environment to lessen the problems faced by Police and Fire Fighters in retrieving accurate information while patrolling high risk area. The time taken and the accuracy of information are problems normally faced by Police and Fire Fighters in Emergency Case department.

This paper presents the design and implementation of a mobile application along with a web server for geo-tagging favorite and interesting places and sharing them with the community. The design and architecture shows some key aspects and... more

This paper presents the design and implementation of a mobile application along with a web server for geo-tagging favorite and interesting places and sharing them with the community. The design and architecture shows some key aspects and issues concerning this kind of system. The mobile application is implemented in J2ME and tested on GPS enabled Nokia phones and the web server is implemented on cloud infrastructure implementation, the Google App Engine. The system was evaluated with real devices and ...

In VANET, a Location service technique comprises of location update and location request. In location update, a destination vehicle advertises its services and location to a set of vehicles called location servers. In location request, a... more

In VANET, a Location service technique comprises of location update and location request. In location update, a destination vehicle advertises its services and location to a set of vehicles called location servers. In location request, a source vehicle queries location servers in its broadcast range about the location and services of destinations. During location update, separate control messages are exchanged to periodically update location servers which create delay and congestion in the network. Similarly, after location request, pre-loaded digital maps at source vehicle are used to find the shortest path towards destination which does not give vehicle density on road at that moment in time. Other than digital maps, Dijkstra or Bellmen ford algorithms at source or intermediate nodes are also used to find shortest path, which is a computationally time consuming activity leading to an extra delay during path finding and before packet transmission. We therefore propose QoS and traffic density aware location service technique called ZoomOut Location Service (ZLS). We have implemented ZLS in NS2.33. The simulation results for highway traffic show that ZLS updates its location servers in a uni-cast fashion such that the location servers have up-to-date information of advertised services and destination position. Similarly, a source can reach destination in the quickest possible way by sending uni-cast messages without using digital map or shortest path finding algorithms.

This paper presents the design and implementation of a mobile application along with a web server for geo-tagging favorite and interesting places and sharing them with the community. The design and architecture shows some key aspects and... more

This paper presents the design and implementation of a mobile application along with a web server for geo-tagging favorite and interesting places and sharing them with the community. The design and architecture shows some key aspects and issues concerning this kind of system. The mobile application is implemented in J2ME and tested on GPS enabled Nokia phones and the web server is implemented on cloud infrastructure implementation, the Google App Engine. The system was evaluated with real devices and a proof of concept was made that applications such as Place-Tags has its place in the mobile world.

The most pressing need facing Disaster managers during the immediate aftermath of a disaster is to estimate the impact of the disaster on the local population to determine where first-responders should focus rescue efforts. This problem... more

The most pressing need facing Disaster managers during the immediate aftermath of a disaster is to estimate the impact of the disaster on the local population to determine where first-responders should focus rescue efforts. This problem requires an awareness of the scale and scope of the disaster as well as the ability to know where response resources are located, what their capabilities are, and what routes are available for them to take to those who need their help. Solve this problem by developing such a system which will guide Authority taking decision in real time.

Mobile devices are gradually becoming ubiquitous and useful for personal information management and communication through different channels, such as instant messaging, social networking, or news feeds. This mobile revolution depends on... more

Mobile devices are gradually becoming ubiquitous and useful for personal information management and communication through different channels, such as instant messaging, social networking, or news feeds. This mobile revolution depends on two paradigms: firstly, the mobility of people and information, and secondly, the personalisation and contextualisation of information. This leads to new understandings of connectedness, interaction, participation, and context. In the field of distance education these paradigms ...

Compatibility requirements are among the most important factors for selecting sensors to be used in Location Based Service (LBS) systems, especially in the Risk Reduction Management field. Sensors' networks use several protocols to send... more

Compatibility requirements are among the most important factors for selecting sensors to be used in Location Based Service (LBS) systems, especially in the Risk Reduction Management field. Sensors' networks use several protocols to send its signals to system remote servers. Internet protocols-based sensors are widely used. While, there is no framework to connect dialup sensors with LBS' remote servers. In order to improve the sensors' compatibility, this paper provides a framework to be employed for different sensors' communication types. This framework is a part of the proposed LBS approach for auto sending messages to the closest people of the risks.

Mobile users increasingly make use of location-based online services enabled by localization systems. Not only do they share their locations to obtain contextual services in return (e.g., ‘nearest restaurant’), but they also share, with... more

Mobile users increasingly make use of location-based online services enabled by localization systems. Not only do they share their locations to obtain contextual services in return (e.g., ‘nearest restaurant’), but they also share, with their friends, information about the venues (e.g., the type, such as a restaurant or a cinema) they visit. This introduces an additional dimension to the threat to location privacy: location semantics, combined with location information, can be used to improve location inference by learning and exploiting patterns at the semantic level (e.g., people go to cinemas after going to restaurants). Conversely, the type of the venue a user visits can be inferred, which also threatens her semantic location privacy. In this paper, we formalize this problem and analyze the effect of venue-type information on location privacy. We introduce inference models that consider location semantics and semantic privacy-protection mechanisms and evaluate them by using data...

The long term costs of numeracy difficulties. London, Every Child A Chance Trust.

Being able to react fast to campaign events such as missing persons or disaster preventions, is of paramount importance. In these situations narrowing down the search area to a targeted and accurate location is imperative. Nowadays,... more

Being able to react fast to campaign events such as missing persons or disaster preventions, is of paramount importance. In these situations narrowing down the search area to a targeted and accurate location is imperative. Nowadays, modern mobile devices have the location awareness capabilities that can be used to determine the users Global Positioning System (GPS) coordinates. However in order to determine if a user is located within a specific area, complex floating point calculations are required. Moreover if the area is determined by a polygon, this calculation is further complicated. In this paper we propose a novel algorithm which makes use of spatial indices to determine if a mobile is located within a predefined polygon shape area. The algorithm determines the optimal length of the spatial index such as to ensure accuracy-processing time-memory trade-off. We build a prototype system, using free and open source software, to deliver alerts to mobile devices within a predetermined geographical area. The system is assessed in terms of accuracy, processing time and memory usage.

This paper addresses an opportunity for the provision of novel location based services generated by the newly emerging application area of “Intelligent Inhabited Environments”, a form of pervasive / ubiquitous computing that uses agent... more

This paper addresses an opportunity for the provision of novel location based services generated by the newly emerging application area of “Intelligent Inhabited Environments”, a form of pervasive / ubiquitous computing that uses agent based embedded computing devices to construct technologically driven living environments. Intelligent Inhabited Environments (IIEs) can be regarded as being similar to intelligent buildings or smart houses in that they harness collections of network enabled embedded-computing devices to control environments such as houses, or offices, but extends the concept by addressing vehicles, body worn devices and public spaces. Another distinguishing characteristic is the use of intelligent agents embedded into the computational artefacts making up the space. Typical services being controlled include lighting, heating, entertainment, information, access, etc. The role of the embedded agent is both to provide value added service and functionality in addition to providing a means to make the system work without incurring the user in cognitive effort to deal with the technology. Also, the embedded-agents controlling the artefacts or acting on behalf of the user/owner behave in a location aware manner providing access to services or control over the local environment, depending on location or context.

Tailored push advertising on smartphones is a key target for the advertising industry. We conducted a study with 20 professionals 'in the wild': over 5 consecutive days participants received ads tailored to their personal profiles and... more

Tailored push advertising on smartphones is a key target for the advertising industry. We conducted a study with 20 professionals 'in the wild': over 5 consecutive days participants received ads tailored to their personal profiles and geographical location on their personal smartphones. Of the 400 ads sent, participants accepted 20%, rejected 30%, said 'maybe' to 17%. Interviews revealed that accept or reject decisions were driven by specific needs at the time of delivery -- e.g. a busy workload. Effective tailoring of smartphone ads requires fine-grained data on users' emotional state and context of use - data that is sensitive and requires significant effort to obtain. Users liked context-relevant ads, but also perceived privacy costs associated with disclosing personal information. To break this conundrum, users need to be able to customize the ad service, e.g. choosing which information to disclose, when to receive ads, what types of ad.