Air pollution monitoring By sensors embedded on mobile phone
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 5
Abstract
Mobile technology has been available for at least a decade and is increasingly being used in developing countries as away of contacting and connecting citizens and helping them to organize for a better life.Mobile phones are not just for phone calls, but they can also be used to collect data in several different formats and send them to a central server. There the data can be aggregated and analyzed, with tables and visualizations automatically generated. What is new is the sheer number of observation points that are potentially available by using mobile phones. With over 4 billion phones in use worldwide, the mobile phone network is emerging as a form of “global brain” with sensors everywhere. In addition, there are companies such as Fourier Systems that provide purpose-built mobile devices that are specifically designed for science experiments in school sand for data logging in any science project.
Authors and Affiliations
Nasim Khozouie, Faranak Fotouhi-Ghazvini
CPW Fed Hexagonal Patch Shape with Hexagonal slot Ultra Wideband Antenna
In this paper hexagonal patch shape with hexagonal slot, ultra wideband antenna is proposed. The total dimensions of antenna are 55×43.5mm. Sides of hexagonal patch are taken 13mm each and hexagonal slot sides are taken...
Enhancing Cloud Computing Security by Using Pixel Key Pattern
Cloud is a term used as a metaphor for the wide area networks (like internet) or any such large networked environment. It came partly from the cloud-like symbol used to represent the complexities of the networks in the s...
A Group Collaboratable Proof of Retrievability Scheme for Cloud Data Storage
Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity...
Security Test by using F T M and Data Allocation Strategies on Leakage Detection
The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems...
SRGM with Imperfect Debugging using Capability Analysis of Log-Logistic Model
Analyze the predict capability of some SRGMs to understand the different parameters to facilitate the estimate process. The predict validity analysis will be on two key factors, one pertaining to the degree of fitment on...