An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and soon all our gadgets e.g., even our clothes or cars will implant a massive amount of sensors GPS, digital imagers, accelerometers, etc. As a result data unruffled by sensor-equipped devices becomes of intense interest to other users and applications. This concept is called participatory sensing (PS) sometimes also referred to as opportunistic or urban sensing. It mingles the ubiquity of personal devices with sensing capabilities typical of WSNs. As the number of mobile phone subscriptions exceeds 5 billion PS becomes a cutting-edge and helpful distributed computing as well as business model. We squabble that PS considerably expands the capabilities of WSN applications. PS is an rising paradigm that focuses on the faultless collection of information from a large number of connected always on always carried devices such as mobile phones.
Authors and Affiliations
Nanduri Vigna Valli Sita Mahalakshmi, ArunaRekha Gollapalli
Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Profiles
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to represent their social relationships. Users can upload and share information related to the...
Implementation of Multinomial Standard Product for RSA State Identify Algorithm
This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...
An Efficient Method for Steganography in Videos
This paper applies steganography algorithm in videos. In proposed method we are hiding the data in a compressed video by using optimal pixel adjustment process (OPAP). Secrete Message is first encrypted by using cryp...
Power Management Strategy In Hybrid PV-FC And Wind- Power Generation Systems By Using Multi Input Single-Control (MISC) Battery
Global energy consumption is dramatically increasing due to higher standard of living and the increasing world population. The world has limited fossil and oil resources. As a consequence, the need for renewable ener...
Scalable Technique to Answer Continuous Aggregation Queries Using Network Of Aggregators Of Dyanmic Data Items
Continuous aggregation queries are used to monitor the changes in data with time varying for online decision making. For continuous queries, a low-cost and scalable technique using a network of aggregators. Individua...