The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] location-based service(14hit)

1-14hit
  • Performance Evaluation Using Plural Smartphones in Bluetooth Low Energy Positioning System

    Kosuke OMURA  Tetsuya MANABE  

     
    LETTER

      Vol:
    E104-A No:2
      Page(s):
    371-374

    In this paper, we clarify the importance of performance evaluation using a plurality of smartphones in a positioning system based on radio waves. Specifically, in a positioning system using bluetooth low energy, the positioning performance of two types of positioning algorithms is performed using a plurality of smartphones. As a result, we confirmed that the fingerprint algorithm does not always provide sufficient positioning performance. It depends on the model of the smartphone used. On the other hand, the hybrid algorithm that the authors have already proposed is robust in the difference of the received signal characteristics of the smartphone. Consequently, we spotlighted that the use of multiple devices is essential for providing high-quality location-based services in real environments in the performance evaluation of radio wave-based positioning systems using smartphones.

  • Location-Based Forwarding with Multi-Destinations in NDN Networks Open Access

    Yoshiki KURIHARA  Yuki KOIZUMI  Toru HASEGAWA  Mayutan ARUMAITHURAI  

     
    PAPER

      Pubricized:
    2019/03/22
      Vol:
    E102-B No:9
      Page(s):
    1822-1831

    Location-based forwarding is a key driver for location-based services. This paper designs forwarding information data structures for location-based forwarding in Internet Service Provider (ISP) scale networks based on Named Data Networking (NDN). Its important feature is a naming scheme which represents locations by leveraging space-filling curves.

  • l-Close Range Friends Query on Social Grid Index

    Changbeom SHIM  Wooil KIM  Wan HEO  Sungmin YI  Yon Dohn CHUNG  

     
    LETTER

      Pubricized:
    2017/01/17
      Vol:
    E100-D No:4
      Page(s):
    811-812

    The development of smart devices has led to the growth of Location-Based Social Networking Services (LBSNSs). In this paper, we introduce an l-Close Range Friends query that finds all l-hop friends of a user within a specified range. We also propose a query processing method on Social Grid Index (SGI). Using real datasets, the performance of our method is evaluated.

  • Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense

    Zhikai XU  Hongli ZHANG  Xiangzhan YU  Shen SU  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    1991-2001

    Location-based services (LBSs) are useful for many applications in internet of things(IoT). However, LBSs has raised serious concerns about users' location privacy. In this paper, we propose a new location privacy attack in LBSs called hidden location inference attack, in which the adversary infers users' hidden locations based on the users' check-in histories. We discover three factors that influence individual check-in behaviors: geographic information, human mobility patterns and user preferences. We first separately evaluate the effects of each of these three factors on users' check-in behaviors. Next, we propose a novel algorithm that integrates the above heterogeneous factors and captures the probability of hidden location privacy leakage. Then, we design a novel privacy alert framework to warn users when their sharing behavior does not match their sharing rules. Finally, we use our experimental results to demonstrate the validity and practicality of the proposed strategy.

  • Efficient Evaluation of Maximizing Range Sum Queries in a Road Network

    Tien-Khoi PHAN  HaRim JUNG  Hee Yong YOUN  Ung-Mo KIM  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2016/02/16
      Vol:
    E99-D No:5
      Page(s):
    1326-1336

    Given a set of positive-weighted points and a query rectangle r (specified by a client) of given extents, the goal of a maximizing range sum (MaxRS) query is to find the optimal location of r such that the total weights of all points covered by r is maximized. In this paper, we address the problem of processing MaxRS queries over road network databases and propose two new external memory methods. Through a set of simulations, we evaluate the performance of the proposed methods.

  • A New Method for Evaluation of Positioning Accuracy in the Semantic Space

    Luka VIDMAR  Marko PESKO  Mitja ŠTULAR  Blaž PETERNEL  Andrej KOS  Matevž POGAČNIK  

     
    PAPER-Sensing

      Vol:
    E98-B No:9
      Page(s):
    1906-1913

    User context and user location in particular play an important role in location-based services (LBS). The location can be determined by various positioning methods. These are typically evaluated with average positioning error or percentile values, which are not the most suitable metrics for evaluation of how a positioning method functions in the semantic space. Therefore, we propose a new method for evaluation of positioning accuracy in the semantic space. We focus on two types of semantic user locations that are widely available in urban areas: the street address and the categories of the surrounding points of interest (POIs). We demonstrate its use on ten different positioning methods: a standalone satellite navigation device, GPS module on a smartphone, two versions of Foursquare positioning service, Google positioning service, a positioning service of the local mobile operator, and four other possible variants of mobile operator-based positioning methods. The evaluation suggests that approach with the street addresses is more promising approach due to either sparse or unevenly distributed POIs. Furthermore, some of the positioning methods that are less accurate in Euclidean space, such as a combination of the GPS data with the mobile operator-based method that relies on the propagation models, performed comparably well in the semantic space as the methods that are using more accurate technologies, such as Google and Foursquare.

  • A Clustering K-Anonymity Scheme for Location Privacy Preservation

    Lin YAO  Guowei WU  Jia WANG  Feng XIA  Chi LIN  Guojun WANG  

     
    PAPER-Privacy

      Vol:
    E95-D No:1
      Page(s):
    134-142

    The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of Location-Based Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity scheme for location privacy preservation (namely CK) is proposed. The CK scheme does not rely on a trusted third party to anonymize the location information of users. In CK scheme, the whole area that all the users reside is divided into clusters recursively in order to get cloaked area. The exact location information of the user is replaced by the cloaked spatial temporal boundary (STB) including K users. The user can adjust the resolution of location information with spatial or temporal constraints to meet his personalized privacy requirement. The experimental results show that CK can provide stringent privacy guarantees, strong robustness and high QoS (Quality of Service).

  • Examining Impact of Sequential Access for Nearest Neighbor Search in Wireless Data Broadcast

    Myong-Soo LEE  SangKeun LEE  

     
    PAPER-Energy in Electronics Communications

      Vol:
    E91-B No:9
      Page(s):
    2964-2971

    It is observed, surprisingly, that existing nearest neighbor search methods in wireless data broadcast may not work effectively on mobile clients with very limited memory space. To resolve this problem, a novel method for nearest neighbor search is introduced in the context of a representative of indexes, the grid-partition index, in wireless data broadcast. In the proposed scheme, a mobile client performs the nearest neighbor search by making a sequential access to index packets according to their broadcast order over a wireless channel. The performance evaluation demonstrates that our approach substantially outperforms limited memory versions of existing methods in terms of access time, while retaining a good energy conservation.

  • Query Language for Location-Based Services: A Model Checking Approach

    Christian HOAREAU  Ichiro SATOH  

     
    PAPER-Ubiquitous Computing

      Vol:
    E91-D No:4
      Page(s):
    976-985

    We present a model checking approach to the rationale, implementation, and applications of a query language for location-based services. Such query mechanisms are necessary so that users, objects, and/or services can effectively benefit from the location-awareness of their surrounding environment. The underlying data model is founded on a symbolic model of space organized in a tree structure. Once extended to a semantic model for modal logic, we regard location query processing as a model checking problem, and thus define location queries as hybrid logic-based formulas. Our approach is unique to existing research because it explores the connection between location models and query processing in ubiquitous computing systems, relies on a sound theoretical basis, and provides modal logic-based query mechanisms for expressive searches over a decentralized data structure. A prototype implementation is also presented and will be discussed.

  • ACE-INPUTS: A Cost-Effective Intelligent Public Transportation System

    Jongchan LEE  Sanghyun PARK  Minkoo SEO  Sang-Wook KIM  

     
    PAPER-Distributed Cooperation and Agents

      Vol:
    E90-D No:8
      Page(s):
    1251-1261

    With the rapid adoption of mobile devices and location based services (LBS), applications provide with nearby information like recommending sightseeing resort are becoming more and more popular. In the mean time, traffic congestion in cities led to the development of mobile public transportation systems. In such applications, mobile devices need to communicate with servers via wireless communications and servers should process queries from tons of devices. However, because users can not neglect the payment for the wireless communications and server capacities are limited, decreasing the communications made between central servers and devices and reducing the burden on servers are quite demanding. Therefore, in this paper, we propose a cost-effective intelligent public transportation system, ACE-INPUTS, which utilizes a mobile device to retrieve the bus routes to reach a destination from the current location at the lowest wireless communication cost. To accomplish this task, ACE-INPUTS maintains a small amount of information on bus stops and bus routes in a mobile device and runs a heuristic routing algorithm based on such information. Only when a user asks more accurate route information or calls for a "leave later query", ACE-INPUTS entrusts the task to a server into which real-time traffic and bus location information is being collected. By separating the roles into mobile devices and servers, ACE-INPUTS is able to provide bus routes at the lowest wireless communication cost and reduces burden on servers. Experimental results have revealed that ACE-INPUTS is effective and scalable in most experimental settings.

  • Supporting User Privacy in Location Based Services

    Anand S. GAJPARIA  Chris J. MITCHELL  Chan Yeob YEUN  

     
    PAPER

      Vol:
    E88-B No:7
      Page(s):
    2837-2847

    To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constraints may themselves reveal information to any potential LI user--that is, the constraints themselves may also be a privacy threat. To address this problem we introduce the notion of a LI Preference Authority (LIPA). A LIPA is a trusted party which can examine LI constraints and make decisions about LI distribution without revealing the constraints to the entity requesting the LI. This is achieved by encrypting both the LI and the constraints with a LIPA encryption key, ensuring that the LI is only revealed at the discretion of the LIPA.

  • A Spatial Model for Ubiquitous Computing Services

    Ichiro SATOH  

     
    PAPER-Software Platform Technologies

      Vol:
    E88-B No:3
      Page(s):
    923-931

    We present a world model for location-aware and user-aware services in ubiquitous computing environments. It can be dynamically organized like a tree based on geographical containment, such as in a user-room-floor-building hierarchy and each node in the tree can be constructed as an executable software component. The model is unique to existing approaches because it enables location-aware services to be managed without databases, can be managed by multiple computers, and provides a unified view of the locations of not only physical entities and spaces, including users and objects, but also computing devices and services. A prototype implementation of this approach was constructed on a Java-based mobile agent system. This paper presents the rationale, design, implementation, and applications of the prototype system.

  • Azim: Direction-Based Service System for Both Indoors and Outdoors

    Yohei IWASAKI  Nobuo KAWAGUCHI  Yasuyoshi INAGAKI  

     
    PAPER-Application

      Vol:
    E88-B No:3
      Page(s):
    1034-1044

    In this paper, we propose an advanced location-based service that we call a direction-based service, which utilizes both the position and direction of a user. The direction-based service enables a user to point to an object of interest for command or investigation. We also describe the design, implementation and evaluations of a direction-based service system named Azim. With this system, the direction of the user can be obtained by a magnetic-based direction sensor. The sensor is also used for azimuth-based position estimation, in which a user's position is estimated by having the user point to and measure azimuths of several markers or objects whose positions are already known. Because this approach does not require any other accurate position sensors or positive beacons, it can be deployed cost-effectively. Also, because the measurements are naturally associated with some degree of error, the position is calculated as a probability distribution. The calculation considers the error of direction measurement and the pre-obtained field information such as obstacles and magnetic field disturbance, which enables robust position measurements even in geomagnetically disturbed environments. For wide-area use, the system also utilizes a wireless LAN to obtain rough position information by identifying base stations. We have implemented a prototype system for the proposed method and some applications for the direction-based services. Furthermore, we have conducted experiments both indoors and outdoors, and exemplified that positioning accuracy by the proposed method is precise enough for a direction-based service.

  • Organizing the LDD in Mobile Environments

    JeHyok RYU  MoonBae SONG  Chong-Sun HWANG  

     
    PAPER-Networking and Architectures

      Vol:
    E86-D No:9
      Page(s):
    1504-1512

    In wireless mobile environments, data requests based on the location of mobile clients (MCs) have increased. The requested data, called location-dependent data (LDD), may be uncertain if MCs use terms of general distance like "near". Fuzzy theory allows us to represent uncertainty without sharp boundaries. In this paper we quantify the fuzziness and propose a method for constructing the data region of LDD by the degree of the distance between LDDs' and MCs' locations. In simulation studies, we evaluate the LDD regions (LDRs) in various situations: MCs' extensive and intensive queried pattern in data regions of two "near" senses and civilized regions with regional features. Our performance evaluation shows that the number of database accesses in proposed LDRs can be reduced in each case.