SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
62
IMPLEMENTATION OF GEO-MESSAGING USING GOOGLE CLOUD
MESSAGING AND LOCATION BASED SERVICES API OF ANDROID
Bindu Priya1
, Dr. N. Chandra Sekhar Reddy2
, Dr. Poshal3
, Ramya Krishna4
1
(IT, Institute of Aeronautical Engineering, India)
2, 4
(CSE, Institute of Aeronautical Engineering, India)
3
(Mechanical, Institute of Aeronautical Engineering, India)
ABSTRACT
In this paper, we are proposing the implementation of Geo-Messaging using Location based
services and Google Cloud Messaging API’s of Android. Geo-Fencing can be defined as the process
of sending messages tied to a location which means the receiver will not get the message until he
enters the vicinity of the specified location. Geo-Fencing can be implemented using Location based
services support provided by the Android platform. Location based services can be pull- based or
push-based services. Pull based services are where the user sends a query to get the results for
example if the user wants to get the nearest petrol bunk he has to send the query as “Where is the
nearest petrol bunk”. Push based services are where the messages will be automatically pushed to the
users based on their location without explicitly requesting/pulling them from the server.
Keywords: Location-Based Services, Geo-Fencing, Android, GCM (Google Cloud Messaging),
GPS.
I. INTRODUCTION
Geo-Fencing is one of the applications of Location based services which is generally used for
proximity marketing or advertising. Geo-Fencing technology uses the GPS (Global Positioning
System) to select the geographical boundaries. Geo-Fencing uses the location based services to
retrieve the current location of the user/customer.
Geo-Fencing has many practical uses. For example if a customer has downloaded a geo
fencing app which sends alert messages either in the form of text messages or as email alerts then
whenever the customer comes to that boundary of the location then the customer will receive some
discounted coupon codes of the restaurant. Another use case for the usage of Geo Fencing is where a
student smart card will send an alert to the security guard if a student tries to enter a restricted area.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 1, January (2014), pp. 62-67
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
63
Location based personalized recommendations makes sense when they are provided through
a mobile application where the user can look up when he requires. Mobile analytics applications
offers key trends in mobile data usage which in turn helps the service providers and users to receive
right recommendations at the right time.
Geo-Fencing unlocks a new world of innovative applications to create location aware smart
apps in a non-intuitive way. Geo-Fence can be created by specifying the boundaries on the Google
Maps or location-based
This paper presents a mobile application that sends messages to the users at the right time
personalized to their needs and contextualized to the device location.
II. BACKGROUND/RELATED WORK
For determining the location of the user automatically there are various mechanisms available
and are in use today. These techniques are classified into two types, one which is suitable for finding
location in outdoor environments and the other one that is suitable for finding location in indoor
environments.
Capturing the location of the user in outdoor environments can be done in three ways: one is
finding the location based on the mobile device built in capability i.e., using GPS, second is finding
the location based using the mobile cellular network and the third way is to use the combination of
both the above two techniques.
The first technique to determine the user location is through GPS, GPS captures the signals
from the satellites to capture the location information. It gives highly accurate location information
and doesn’t require any additional infrastructure to use it. It provides enhanced privacy to the user.
However this technique doesn’t work in indoor environments and there will be some delay in
computing the user location.
The second technique used to determine the user location is through the Cell ID of the
cellular network. This technique uses the location of the base station of the network operator to find
the location of the user. It is a low cost mechanism and there is no modification required to the
mobile handset. However the accuracy of the location is low when compared to the GPS technique.
The third approach to determine the user location is using the combination of the above two
approaches. Assisted GPS is the hybrid approach of this category, in this technique GPS receivers
are rooted in the mobile cellular network which helps in assisting to get the location information by
reducing the computing burden.
Apart from GPS most of the other techniques are not widely implemented. Regarding the
indoor techniques to find the user location of mobile handset are difficult to implement as there is no
sight with the satellites. Indoor techniques are mostly suited to laptop and desktop users where the
location information can be fetched from Infrared or Bluetooth or Wi-Fi.
Hightower and Borriello (2001) gave six attributes to distinguish the techniques to determine the
location. The six attributes are:
• Physical position and Symbolic Location: GPS receiver gives the physical position in terms
of Latitude and longitude values, whereas the symbolic location indicates the target device
being in some nearby place or in a room.
• Absolute vs. Relative: Absolute location gives the exact the location of the handset in terms
of latitude and longitude. Relative location gives the location with reference to other objects.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January
• Localized location computation:
information supplied by the network to compute its own pos
because no other object knows the location of the device until the device reveals this
information.
• Accuracy and Precision: T
details instead of locating the position
how often the system is recording the accurate position.
• Scale: Scale refers to the area size within which the object location is achievable.
and Borriello (2001) recommend assessing scale in
infrastructure and the number of objects that can be located per unit.
• Cost: Different location sensing systems vary in their costs. There are lot of costs involved in
using a location sensing system
III. PROPOSED SYSTEM
In our proposed system, we are developing an application to send messages to the students
who enter the vicinity of the college. Messages can be related to the latest happenings in the
or some kind of important notifications. These messages will be send only if the student is in the
college vicinity, once the student goes out of the college area notifications will no longer be sent to
the student.
In order to implement this we
Fencing API to set the boundaries of the location that we want to use to track the students entry and
exit. The second API is Google Cloud Messaging API which is used to push the messages sent by
the server to the devices.
System Architecture
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online), Volume 5, Issue 1, January (2014), © IAEME
64
Localized location computation: In Assisted GPS systems, the handset takes the
information supplied by the network to compute its own position. This provides privacy
because no other object knows the location of the device until the device reveals this
The location tracking system should give an accurate position
details instead of locating the position within 10mts of the destination. Precision refers to
how often the system is recording the accurate position.
Scale refers to the area size within which the object location is achievable.
riello (2001) recommend assessing scale in terms of the coverage area per unit of
infrastructure and the number of objects that can be located per unit.
Different location sensing systems vary in their costs. There are lot of costs involved in
using a location sensing system like time costs, maintenance costs and space costs.
, we are developing an application to send messages to the students
who enter the vicinity of the college. Messages can be related to the latest happenings in the
or some kind of important notifications. These messages will be send only if the student is in the
college vicinity, once the student goes out of the college area notifications will no longer be sent to
In order to implement this we are using two API’s of Google Android Platform, one is Geo
API to set the boundaries of the location that we want to use to track the students entry and
exit. The second API is Google Cloud Messaging API which is used to push the messages sent by
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
(2014), © IAEME
In Assisted GPS systems, the handset takes the
ition. This provides privacy
because no other object knows the location of the device until the device reveals this
he location tracking system should give an accurate position
within 10mts of the destination. Precision refers to
Scale refers to the area size within which the object location is achievable. Hightower
terms of the coverage area per unit of
Different location sensing systems vary in their costs. There are lot of costs involved in
maintenance costs and space costs.
, we are developing an application to send messages to the students
who enter the vicinity of the college. Messages can be related to the latest happenings in the college
or some kind of important notifications. These messages will be send only if the student is in the
college vicinity, once the student goes out of the college area notifications will no longer be sent to
are using two API’s of Google Android Platform, one is Geo-
API to set the boundaries of the location that we want to use to track the students entry and
exit. The second API is Google Cloud Messaging API which is used to push the messages sent by
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
65
The workflow of the architecture contains three main components of the application. They
are:
• Google Connection server which is used as the push server which can push the
messages to the user devices. This receives the notification messages and the location
boundaries of the area to the connection server.
• Application Server side code is used for sending the messages/updates to the GCM
Connection server.
• Client Application which runs on the user device and receives the notifications from
the Google Connection server.
In order to receive the notifications from the Google Connection server to the client
application, first the client device has to register itself to the connection server. Registration of the
device can be done programmatically using the Google Cloud Messaging API method register
().The server side code should send the notification messages along with the Latitude and Longitude
information to the Google connection server. Once the GCM server receives the messages it will
push the messages to all the devices registered with it. But the notification message gets displayed to
the user only when he is in the boundary of the given location.
Setting the boundary for pushing the messages can be implemented using the Geo-Fencing
API of Android where the entry and exit by setting the latitude, longitude and radius of the location.
Geofence is generally treated as an area rather than as proximity by the location services. We can
handle both the entry and exit events of Geofence to keep track of the user movement.
In the client application, first the user device has to register with the GCM connection server to
receive the notifications. In order to register the device first we have to create Google API project
and enable the GCM service for it. Using this GCM service we have to create Project ID and API
Key. Getting the Registration ID for the device using the GCM API method as below:
Once the registration ID is received, send the registration ID to the server. Once the server
has the device registration ID’s then it starts sending the notifications to the GCM connection server
and in turn it sends them to the client device.
Once the notification reaches the client application, then the client application will check
whether the device is in the proximity of the location that is set by the server, if it is in the vicinity of
the location then it displays the message to the user, otherwise it will not display the message.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January
For setting the Geofence in the client application first we have set the permissions in the
device to capture the location. These permissions are to be c
file as below
Once the location latitude, longitude and radius are identified, then
using Pending Intent. As soon as the geofence is created then the device starts displaying the
notifications whenever the user enters or exits that location. Below is the screenshot of the
Notifications received when the user enters the premises of IARE
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online), Volume 5, Issue 1, January (2014), © IAEME
66
For setting the Geofence in the client application first we have set the permissions in the
device to capture the location. These permissions are to be configured in the AndroidManifest.xml
Once the location latitude, longitude and radius are identified, then we can
Intent. As soon as the geofence is created then the device starts displaying the
notifications whenever the user enters or exits that location. Below is the screenshot of the
Notifications received when the user enters the premises of IARE College.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
(2014), © IAEME
For setting the Geofence in the client application first we have set the permissions in the
onfigured in the AndroidManifest.xml
add the geofence
Intent. As soon as the geofence is created then the device starts displaying the
notifications whenever the user enters or exits that location. Below is the screenshot of the
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
67
IV. CONCLUSION
In the age of smartphones, location based personalized recommendations based on the user’s
needs help the businesses to reach their customers and improve their profits. This paper presents an
application that uses the device tracking ability and sending the notifications based on the location in
which the device is present. The Location Based services helps the user to find the nearest places like
Hospitals, petrol Bunks, schools and etc., whereas the Google Cloud messaging is the cost free
approach to send the notifications to any number of devices without incurring any operator charges.
V. FUTURE SCOPE
The near future holds a bundle of smart applications that gain from location based services
and their personalized recommendations. Location based gaming like gaming through mobile
applications for large gathering in shopping mall, social media connectivity and identifying the
unauthorized entry of the people into restricted areas are seen as the future of Location based
services. Undoubtedly, location based real time analytics is way to go.
REFERENCES
[1] D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal
21, 1 (2003),20_27
[2] Amit Kushwaha and Vineet Kushwaha, Location Based Services using Android
MobileOperating System. IJAET.March 2011
[3] Adams P, Ashwell G and Baxter R (2003) Location-based services – an overview of the
standards. BT TechnologyJournal 21(1): 34-43
[4] Norris A (2003) Hide and seek: Location-based services are heading for the UK. The
Guardian, February 6, accessedJune 1, 2003,
http://www.guardian.co.uk/online/mobilematters/story/0,12454,889408,00.html
[5] Anirudha A. Kolpyakwar, Sonal Honale, Piyush M. Dhande and Pallavi A. Chaudhari, “A
Review on Cloud-Based Intrusion Detection System for Android Smartphones”, International
Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 6,
2013, pp. 238 - 245, ISSN Print: 0976-6480, ISSN Online: 0976-6499.
[6] Isak Shabani and Amir Kovaçi, “Communication Between Distributed Systems using Google
Infrastructure”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 6, 2013, pp. 386 - 393, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[7] [Online] developer.android.com

Contenu connexe

Tendances

Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12Aman Raj
 
IRJET- Smart Child Safety Monitoring System
IRJET-  	  Smart Child Safety Monitoring SystemIRJET-  	  Smart Child Safety Monitoring System
IRJET- Smart Child Safety Monitoring SystemIRJET Journal
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET Journal
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
 
Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950Editor IJARCET
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Assistance Application for Visually Impaired - VISION
Assistance Application for Visually  Impaired - VISIONAssistance Application for Visually  Impaired - VISION
Assistance Application for Visually Impaired - VISIONIJSRED
 
IRJET- Realtime Indoor Navigation System
IRJET- Realtime Indoor Navigation SystemIRJET- Realtime Indoor Navigation System
IRJET- Realtime Indoor Navigation SystemIRJET Journal
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object DetectionIRJET Journal
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...IRJET Journal
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesIOSR Journals
 
Android Sos app development report
Android Sos app development reportAndroid Sos app development report
Android Sos app development reportSudhanshu kumar Sah
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete ReportChethanHR10
 

Tendances (20)

Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12
 
IRJET- Smart Child Safety Monitoring System
IRJET-  	  Smart Child Safety Monitoring SystemIRJET-  	  Smart Child Safety Monitoring System
IRJET- Smart Child Safety Monitoring System
 
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
[IJET-V1I3P1] Authors :Sayli Nikumbh,Suchal Gujarathi,Shubham Pawar,S.P.Pingat
 
IRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management SystemIRJET- A Survey on Child Safety & Tracking Management System
IRJET- A Survey on Child Safety & Tracking Management System
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950Ijarcet vol-2-issue-3-947-950
Ijarcet vol-2-issue-3-947-950
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
Assistance Application for Visually Impaired - VISION
Assistance Application for Visually  Impaired - VISIONAssistance Application for Visually  Impaired - VISION
Assistance Application for Visually Impaired - VISION
 
IRJET- Realtime Indoor Navigation System
IRJET- Realtime Indoor Navigation SystemIRJET- Realtime Indoor Navigation System
IRJET- Realtime Indoor Navigation System
 
Paper
PaperPaper
Paper
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'
 
IRJET- Application of MCNN in Object Detection
IRJET-  	  Application of MCNN in Object DetectionIRJET-  	  Application of MCNN in Object Detection
IRJET- Application of MCNN in Object Detection
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
 
IRJET - Blind Aid
IRJET - Blind AidIRJET - Blind Aid
IRJET - Blind Aid
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
A Survey of Indoor Localization Techniques
A Survey of Indoor Localization TechniquesA Survey of Indoor Localization Techniques
A Survey of Indoor Localization Techniques
 
Android Sos app development report
Android Sos app development reportAndroid Sos app development report
Android Sos app development report
 
Safety app for woman
Safety app for womanSafety app for woman
Safety app for woman
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete Report
 
14 566
14 56614 566
14 566
 

En vedette (20)

50320130403002
5032013040300250320130403002
50320130403002
 
10120130406019
1012013040601910120130406019
10120130406019
 
40120130406007
4012013040600740120130406007
40120130406007
 
20320130406007 2
20320130406007 220320130406007 2
20320130406007 2
 
10120130405020
1012013040502010120130405020
10120130405020
 
20320130406001 2
20320130406001 220320130406001 2
20320130406001 2
 
20320130405018
2032013040501820320130405018
20320130405018
 
20120130406030 2
20120130406030 220120130406030 2
20120130406030 2
 
Ismail Khayat Faces Or Masks.
Ismail Khayat Faces Or Masks.Ismail Khayat Faces Or Masks.
Ismail Khayat Faces Or Masks.
 
Posto de Turismo de Belém - Questões
Posto de Turismo de Belém - QuestõesPosto de Turismo de Belém - Questões
Posto de Turismo de Belém - Questões
 
Relatório[1]..
Relatório[1]..Relatório[1]..
Relatório[1]..
 
China60 Years National Day
China60 Years National DayChina60 Years National Day
China60 Years National Day
 
03 vayikra levitico
03 vayikra levitico03 vayikra levitico
03 vayikra levitico
 
Grande pechincha
Grande pechinchaGrande pechincha
Grande pechincha
 
Our last day
Our last dayOur last day
Our last day
 
Ativ 3 damas
Ativ 3 damasAtiv 3 damas
Ativ 3 damas
 
Al madina
Al madinaAl madina
Al madina
 
Semana cultural
Semana culturalSemana cultural
Semana cultural
 
30 shir hashrimin_cantosdesolomon
30 shir hashrimin_cantosdesolomon30 shir hashrimin_cantosdesolomon
30 shir hashrimin_cantosdesolomon
 
Aprender y enseñar
Aprender y enseñarAprender y enseñar
Aprender y enseñar
 

Similaire à 50120140501008

Iaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gpsIaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gpsIaetsd Iaetsd
 
Geo location based augmented reality application
Geo location based augmented reality applicationGeo location based augmented reality application
Geo location based augmented reality applicationeSAT Journals
 
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
 
Smart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemSmart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemIOSR Journals
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...eSAT Journals
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
 
IRJET- University Campus Event Navigation System
IRJET-  	  University Campus Event Navigation System   IRJET-  	  University Campus Event Navigation System
IRJET- University Campus Event Navigation System IRJET Journal
 
A change of profile based on location
A change of profile based on locationA change of profile based on location
A change of profile based on locationeSAT Journals
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124aissmsblogs
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...Editor Jacotech
 
OBJECT TRACKING AND RECOGNITION USING GPS
OBJECT TRACKING AND RECOGNITION USING GPSOBJECT TRACKING AND RECOGNITION USING GPS
OBJECT TRACKING AND RECOGNITION USING GPSIRJET Journal
 
Design and Implementation for Trucks Tracking System Using GPS Based on Seman...
Design and Implementation for Trucks Tracking System Using GPS Based on Seman...Design and Implementation for Trucks Tracking System Using GPS Based on Seman...
Design and Implementation for Trucks Tracking System Using GPS Based on Seman...ijtsrd
 
Indoor gps via QR codes
Indoor gps via QR codesIndoor gps via QR codes
Indoor gps via QR codesVaibhav Sharma
 
Location based services using augmented reality
Location based services using augmented realityLocation based services using augmented reality
Location based services using augmented realityIAEME Publication
 
IRJET- Get2School : An Android Application to Track School Location
IRJET-  	  Get2School : An Android Application to Track School LocationIRJET-  	  Get2School : An Android Application to Track School Location
IRJET- Get2School : An Android Application to Track School LocationIRJET Journal
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeastaissmsblogs
 
Implementation of Geo-fencing to monitor a specific target using Point in Pol...
Implementation of Geo-fencing to monitor a specific target using Point in Pol...Implementation of Geo-fencing to monitor a specific target using Point in Pol...
Implementation of Geo-fencing to monitor a specific target using Point in Pol...IRJET Journal
 

Similaire à 50120140501008 (20)

Iaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gpsIaetsd location-based services using autonomous gps
Iaetsd location-based services using autonomous gps
 
Geo location based augmented reality application
Geo location based augmented reality applicationGeo location based augmented reality application
Geo location based augmented reality application
 
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
 
Smart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemSmart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating System
 
Android application to locate and track mobile phones(aaltm) an implementati...
Android application to locate and track mobile phones(aaltm)  an implementati...Android application to locate and track mobile phones(aaltm)  an implementati...
Android application to locate and track mobile phones(aaltm) an implementati...
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
 
IRJET- University Campus Event Navigation System
IRJET-  	  University Campus Event Navigation System   IRJET-  	  University Campus Event Navigation System
IRJET- University Campus Event Navigation System
 
A change of profile based on location
A change of profile based on locationA change of profile based on location
A change of profile based on location
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...A mobile monitoring and alert sms system with remote configuration – a case s...
A mobile monitoring and alert sms system with remote configuration – a case s...
 
OBJECT TRACKING AND RECOGNITION USING GPS
OBJECT TRACKING AND RECOGNITION USING GPSOBJECT TRACKING AND RECOGNITION USING GPS
OBJECT TRACKING AND RECOGNITION USING GPS
 
My Places
My PlacesMy Places
My Places
 
40120130405021
4012013040502140120130405021
40120130405021
 
Design and Implementation for Trucks Tracking System Using GPS Based on Seman...
Design and Implementation for Trucks Tracking System Using GPS Based on Seman...Design and Implementation for Trucks Tracking System Using GPS Based on Seman...
Design and Implementation for Trucks Tracking System Using GPS Based on Seman...
 
Indoor gps via QR codes
Indoor gps via QR codesIndoor gps via QR codes
Indoor gps via QR codes
 
Location based services using augmented reality
Location based services using augmented realityLocation based services using augmented reality
Location based services using augmented reality
 
IRJET- Get2School : An Android Application to Track School Location
IRJET-  	  Get2School : An Android Application to Track School LocationIRJET-  	  Get2School : An Android Application to Track School Location
IRJET- Get2School : An Android Application to Track School Location
 
356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
 
Implementation of Geo-fencing to monitor a specific target using Point in Pol...
Implementation of Geo-fencing to monitor a specific target using Point in Pol...Implementation of Geo-fencing to monitor a specific target using Point in Pol...
Implementation of Geo-fencing to monitor a specific target using Point in Pol...
 

Plus de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Dernier

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

50120140501008

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 62 IMPLEMENTATION OF GEO-MESSAGING USING GOOGLE CLOUD MESSAGING AND LOCATION BASED SERVICES API OF ANDROID Bindu Priya1 , Dr. N. Chandra Sekhar Reddy2 , Dr. Poshal3 , Ramya Krishna4 1 (IT, Institute of Aeronautical Engineering, India) 2, 4 (CSE, Institute of Aeronautical Engineering, India) 3 (Mechanical, Institute of Aeronautical Engineering, India) ABSTRACT In this paper, we are proposing the implementation of Geo-Messaging using Location based services and Google Cloud Messaging API’s of Android. Geo-Fencing can be defined as the process of sending messages tied to a location which means the receiver will not get the message until he enters the vicinity of the specified location. Geo-Fencing can be implemented using Location based services support provided by the Android platform. Location based services can be pull- based or push-based services. Pull based services are where the user sends a query to get the results for example if the user wants to get the nearest petrol bunk he has to send the query as “Where is the nearest petrol bunk”. Push based services are where the messages will be automatically pushed to the users based on their location without explicitly requesting/pulling them from the server. Keywords: Location-Based Services, Geo-Fencing, Android, GCM (Google Cloud Messaging), GPS. I. INTRODUCTION Geo-Fencing is one of the applications of Location based services which is generally used for proximity marketing or advertising. Geo-Fencing technology uses the GPS (Global Positioning System) to select the geographical boundaries. Geo-Fencing uses the location based services to retrieve the current location of the user/customer. Geo-Fencing has many practical uses. For example if a customer has downloaded a geo fencing app which sends alert messages either in the form of text messages or as email alerts then whenever the customer comes to that boundary of the location then the customer will receive some discounted coupon codes of the restaurant. Another use case for the usage of Geo Fencing is where a student smart card will send an alert to the security guard if a student tries to enter a restricted area. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 1, January (2014), pp. 62-67 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 63 Location based personalized recommendations makes sense when they are provided through a mobile application where the user can look up when he requires. Mobile analytics applications offers key trends in mobile data usage which in turn helps the service providers and users to receive right recommendations at the right time. Geo-Fencing unlocks a new world of innovative applications to create location aware smart apps in a non-intuitive way. Geo-Fence can be created by specifying the boundaries on the Google Maps or location-based This paper presents a mobile application that sends messages to the users at the right time personalized to their needs and contextualized to the device location. II. BACKGROUND/RELATED WORK For determining the location of the user automatically there are various mechanisms available and are in use today. These techniques are classified into two types, one which is suitable for finding location in outdoor environments and the other one that is suitable for finding location in indoor environments. Capturing the location of the user in outdoor environments can be done in three ways: one is finding the location based on the mobile device built in capability i.e., using GPS, second is finding the location based using the mobile cellular network and the third way is to use the combination of both the above two techniques. The first technique to determine the user location is through GPS, GPS captures the signals from the satellites to capture the location information. It gives highly accurate location information and doesn’t require any additional infrastructure to use it. It provides enhanced privacy to the user. However this technique doesn’t work in indoor environments and there will be some delay in computing the user location. The second technique used to determine the user location is through the Cell ID of the cellular network. This technique uses the location of the base station of the network operator to find the location of the user. It is a low cost mechanism and there is no modification required to the mobile handset. However the accuracy of the location is low when compared to the GPS technique. The third approach to determine the user location is using the combination of the above two approaches. Assisted GPS is the hybrid approach of this category, in this technique GPS receivers are rooted in the mobile cellular network which helps in assisting to get the location information by reducing the computing burden. Apart from GPS most of the other techniques are not widely implemented. Regarding the indoor techniques to find the user location of mobile handset are difficult to implement as there is no sight with the satellites. Indoor techniques are mostly suited to laptop and desktop users where the location information can be fetched from Infrared or Bluetooth or Wi-Fi. Hightower and Borriello (2001) gave six attributes to distinguish the techniques to determine the location. The six attributes are: • Physical position and Symbolic Location: GPS receiver gives the physical position in terms of Latitude and longitude values, whereas the symbolic location indicates the target device being in some nearby place or in a room. • Absolute vs. Relative: Absolute location gives the exact the location of the handset in terms of latitude and longitude. Relative location gives the location with reference to other objects.
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January • Localized location computation: information supplied by the network to compute its own pos because no other object knows the location of the device until the device reveals this information. • Accuracy and Precision: T details instead of locating the position how often the system is recording the accurate position. • Scale: Scale refers to the area size within which the object location is achievable. and Borriello (2001) recommend assessing scale in infrastructure and the number of objects that can be located per unit. • Cost: Different location sensing systems vary in their costs. There are lot of costs involved in using a location sensing system III. PROPOSED SYSTEM In our proposed system, we are developing an application to send messages to the students who enter the vicinity of the college. Messages can be related to the latest happenings in the or some kind of important notifications. These messages will be send only if the student is in the college vicinity, once the student goes out of the college area notifications will no longer be sent to the student. In order to implement this we Fencing API to set the boundaries of the location that we want to use to track the students entry and exit. The second API is Google Cloud Messaging API which is used to push the messages sent by the server to the devices. System Architecture International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 64 Localized location computation: In Assisted GPS systems, the handset takes the information supplied by the network to compute its own position. This provides privacy because no other object knows the location of the device until the device reveals this The location tracking system should give an accurate position details instead of locating the position within 10mts of the destination. Precision refers to how often the system is recording the accurate position. Scale refers to the area size within which the object location is achievable. riello (2001) recommend assessing scale in terms of the coverage area per unit of infrastructure and the number of objects that can be located per unit. Different location sensing systems vary in their costs. There are lot of costs involved in using a location sensing system like time costs, maintenance costs and space costs. , we are developing an application to send messages to the students who enter the vicinity of the college. Messages can be related to the latest happenings in the or some kind of important notifications. These messages will be send only if the student is in the college vicinity, once the student goes out of the college area notifications will no longer be sent to In order to implement this we are using two API’s of Google Android Platform, one is Geo API to set the boundaries of the location that we want to use to track the students entry and exit. The second API is Google Cloud Messaging API which is used to push the messages sent by International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- (2014), © IAEME In Assisted GPS systems, the handset takes the ition. This provides privacy because no other object knows the location of the device until the device reveals this he location tracking system should give an accurate position within 10mts of the destination. Precision refers to Scale refers to the area size within which the object location is achievable. Hightower terms of the coverage area per unit of Different location sensing systems vary in their costs. There are lot of costs involved in maintenance costs and space costs. , we are developing an application to send messages to the students who enter the vicinity of the college. Messages can be related to the latest happenings in the college or some kind of important notifications. These messages will be send only if the student is in the college vicinity, once the student goes out of the college area notifications will no longer be sent to are using two API’s of Google Android Platform, one is Geo- API to set the boundaries of the location that we want to use to track the students entry and exit. The second API is Google Cloud Messaging API which is used to push the messages sent by
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 65 The workflow of the architecture contains three main components of the application. They are: • Google Connection server which is used as the push server which can push the messages to the user devices. This receives the notification messages and the location boundaries of the area to the connection server. • Application Server side code is used for sending the messages/updates to the GCM Connection server. • Client Application which runs on the user device and receives the notifications from the Google Connection server. In order to receive the notifications from the Google Connection server to the client application, first the client device has to register itself to the connection server. Registration of the device can be done programmatically using the Google Cloud Messaging API method register ().The server side code should send the notification messages along with the Latitude and Longitude information to the Google connection server. Once the GCM server receives the messages it will push the messages to all the devices registered with it. But the notification message gets displayed to the user only when he is in the boundary of the given location. Setting the boundary for pushing the messages can be implemented using the Geo-Fencing API of Android where the entry and exit by setting the latitude, longitude and radius of the location. Geofence is generally treated as an area rather than as proximity by the location services. We can handle both the entry and exit events of Geofence to keep track of the user movement. In the client application, first the user device has to register with the GCM connection server to receive the notifications. In order to register the device first we have to create Google API project and enable the GCM service for it. Using this GCM service we have to create Project ID and API Key. Getting the Registration ID for the device using the GCM API method as below: Once the registration ID is received, send the registration ID to the server. Once the server has the device registration ID’s then it starts sending the notifications to the GCM connection server and in turn it sends them to the client device. Once the notification reaches the client application, then the client application will check whether the device is in the proximity of the location that is set by the server, if it is in the vicinity of the location then it displays the message to the user, otherwise it will not display the message.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January For setting the Geofence in the client application first we have set the permissions in the device to capture the location. These permissions are to be c file as below Once the location latitude, longitude and radius are identified, then using Pending Intent. As soon as the geofence is created then the device starts displaying the notifications whenever the user enters or exits that location. Below is the screenshot of the Notifications received when the user enters the premises of IARE International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 66 For setting the Geofence in the client application first we have set the permissions in the device to capture the location. These permissions are to be configured in the AndroidManifest.xml Once the location latitude, longitude and radius are identified, then we can Intent. As soon as the geofence is created then the device starts displaying the notifications whenever the user enters or exits that location. Below is the screenshot of the Notifications received when the user enters the premises of IARE College. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- (2014), © IAEME For setting the Geofence in the client application first we have set the permissions in the onfigured in the AndroidManifest.xml add the geofence Intent. As soon as the geofence is created then the device starts displaying the notifications whenever the user enters or exits that location. Below is the screenshot of the
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 67 IV. CONCLUSION In the age of smartphones, location based personalized recommendations based on the user’s needs help the businesses to reach their customers and improve their profits. This paper presents an application that uses the device tracking ability and sending the notifications based on the location in which the device is present. The Location Based services helps the user to find the nearest places like Hospitals, petrol Bunks, schools and etc., whereas the Google Cloud messaging is the cost free approach to send the notifications to any number of devices without incurring any operator charges. V. FUTURE SCOPE The near future holds a bundle of smart applications that gain from location based services and their personalized recommendations. Location based gaming like gaming through mobile applications for large gathering in shopping mall, social media connectivity and identifying the unauthorized entry of the people into restricted areas are seen as the future of Location based services. Undoubtedly, location based real time analytics is way to go. REFERENCES [1] D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal 21, 1 (2003),20_27 [2] Amit Kushwaha and Vineet Kushwaha, Location Based Services using Android MobileOperating System. IJAET.March 2011 [3] Adams P, Ashwell G and Baxter R (2003) Location-based services – an overview of the standards. BT TechnologyJournal 21(1): 34-43 [4] Norris A (2003) Hide and seek: Location-based services are heading for the UK. The Guardian, February 6, accessedJune 1, 2003, http://www.guardian.co.uk/online/mobilematters/story/0,12454,889408,00.html [5] Anirudha A. Kolpyakwar, Sonal Honale, Piyush M. Dhande and Pallavi A. Chaudhari, “A Review on Cloud-Based Intrusion Detection System for Android Smartphones”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 6, 2013, pp. 238 - 245, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [6] Isak Shabani and Amir Kovaçi, “Communication Between Distributed Systems using Google Infrastructure”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 6, 2013, pp. 386 - 393, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [7] [Online] developer.android.com