An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and soon all our gadgets e.g., even our clothes or cars will implant a massive amount of sensors GPS, digital imagers, accelerometers, etc. As a result data unruffled by sensor-equipped devices becomes of intense interest to other users and applications. This concept is called participatory sensing (PS) sometimes also referred to as opportunistic or urban sensing. It mingles the ubiquity of personal devices with sensing capabilities typical of WSNs. As the number of mobile phone subscriptions exceeds 5 billion PS becomes a cutting-edge and helpful distributed computing as well as business model. We squabble that PS considerably expands the capabilities of WSN applications. PS is an rising paradigm that focuses on the faultless collection of information from a large number of connected always on always carried devices such as mobile phones.
Authors and Affiliations
Nanduri Vigna Valli Sita Mahalakshmi, ArunaRekha Gollapalli
Image Edge Detection Using Improved Ant Colony Optimization Algorithm
Image processing is a method to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. Image edge detection is the one of...
Low-Complexity Turbo Decoder Architecture for Energy-Efficient Wireless Sensor Networks
Turbo codes have recently been considered for energy-constrained wireless communication applications, mainly because of low transmission energy consumption. In this project, we decompose the low complexity turbo deco...
A Personalized Anonymization Technique Based On An Aggregate Formulation Implemented In Polynomial Time
Differential Privacy makes available a conjectural formulation for solitude that guarantees that the system basically performs the identical way despite of whether any personality is incorporated in the database. In...
Generalization Algorithm For Prevent Inference Attacks In Social Network Data
Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customiz...
Recent Trends In 4G Over 3G Technology
The objective of this paper is to evaluate recent trends in Fourth generation (4G) mobile services. Given the success of Third generation (3G) mobile communications systems and services, the third generation mobile n...