310 research outputs found

    Web-Based GIS System Integrated With SMS and MMS Technology

    Get PDF
    As the technology move, the Location Based Services (LBS) also faced a lot of changes. Now the Location Based Services (LBS) already use in mobile environment which known as Mobile Location Services (MLS). The purpose of this paper is to explain the architecture and the development process of Web- Based GIS System Integrated With SMS and MMS Technology. The main objective of this project is to develop web-based GIS System integrated with SMS and MMS technology. The purpose of this system is to provide accurate information to the user about location direction in Malacca town. The spatial information such distance, direction, road name, building name and map (JPG) will be provided to end user byMMS. Byhaving this MLS, the user canview the map based on their request at their mobile phone. The methodology use in the project development is combination of extreme programming and a part of waterfall model. As the conclusion, the Web-Based GIS System hopefully can cater the need ofMLS to provide direction information to the user

    Implications of Over-The-Top (OTT) Services on National Security

    Get PDF
    The telecom industry is an industry that has to deal with a continuous rapid changing business and technological environment, unlike other industries. Traditionally, the principal revenue streams for telecom operators have been the voice and messaging (SMS) with data coming in at a far third till recently. The internet explosion has led to the inception of diverse internet applications and services amidst which, OTT is one. The proliferation of Internet-based services and applications has given rise to data traffic increase for telecom operators. The growing impact of OTT services on telcos’ voice and messaging revenue is a widely accepted phenomenon that is making telecom operators lose revenue in a rapid manner. Other than the challenges OTT pose on telecom industries, the threat it also poses to national security as a result of its operation under net neutrality is a critical point that needs to be considered. This article highlights the wide adoption of OTT services, its’ devastating impact on telecom operators and its impact on national security. Keywords: Telecom, OTT, Net Neutrality, National Security

    Web-Based GIS System Integrated With SMS and MMS Technology

    Get PDF
    As the technology move, the Location Based Services (LBS) also faced a lot of changes. Now the Location Based Services (LBS) already use in mobile environment which known as Mobile Location Services (MLS). The purpose of this paper is to explain the architecture and the development process of Web- Based GIS System Integrated With SMS and MMS Technology. The main objective of this project is to develop web-based GIS System integrated with SMS and MMS technology. The purpose of this system is to provide accurate information to the user about location direction in Malacca town. The spatial information such distance, direction, road name, building name and map (JPG) will be provided to end user byMMS. Byhaving this MLS, the user canview the map based on their request at their mobile phone. The methodology use in the project development is combination of extreme programming and a part of waterfall model. As the conclusion, the Web-Based GIS System hopefully can cater the need ofMLS to provide direction information to the user

    A Platform Independent Investigative Process Model for Smartphones

    Get PDF
    A properly conducted forensic examination is one of the most fundamental aspects of a digital investigation. Examiners are obligated to obtain the skills necessary to use forensic tools and methodologies and rely on sound judgment when analyzing a digital device. Anytime during this process, the quality of the methods, skills, and expertise of the examiner may be challenged, thus, placing the forensic value of the evidence collected during the process in jeopardy. In order to combat the potential challenges posed as a result of the forensic examination process, the digital forensics community must ensure that suitable protocols are used throughout the analysis process. Currently, there is no standard methodology forensic examiners use to analyze a digital device. Examiners have made use of a model derived from the Digital Forensic Research Workshop in 2001 and the application of ad-hoc techniques has become routine. While these approaches may reveal potential data of evidentiary value when applying them to digital devices, their core purpose specifically involves the analysis of computers. It is not clear how effective these methods have been when examining other digital technologies, in particular Small Scale Digital Devices (SSDDs). Due to these mitigating factors, it is critical to develop standard scientifically sound methodologies in the area of digital forensics that allow us to evaluate various digital technologies while considering their distinctive characteristics. This research addresses these issues by introducing the concept of an extendable forensic process model applicable to smartphones regardless of platform. The model has been developed using the property of invariance to construct a core components list which serves as the foundation of the proposed methodology. This dissertation provides a description of the forensic process, the models currently used, the developed model, and experiments to show its usefulness

    Future of Wireless Data Communication

    Get PDF
    This thesis develops four scenarios, illustrating the future of wireless data communication

    Secure 3G user authentication in ad-hoc serving networks

    Get PDF
    The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. With 3G networks\u27 failure to deliver feasible bandwidth to the customer and the emerging popularity, ease of use and high throughput of 802.11 WLANs, integrating secure access to 3G services from WLANs has become a primary focus. 3G user authentication initiated from WLANs has been defined by an enhancement to the extensible authentication protocol, EAP, used to transport user authentication requests over WLANs. The EAP-AKA protocol executes the 3G USIM user challenge and response authentication process over the IP backbone for WLAN serving networks. To improve the degree of control of 3G subscribers, spatial control has been proposed for 3G-WLAN user authentication. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user\u27s authentication challenge with spatial data defining his/her visited WLAN. With 3G networks\u27 limited capacity to determine a user\u27s location to the granularity of a small WLAN area and restricted access to users\u27 location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement control for authentication. The risks of implementing EAP-AKA spatial control by 3G operators with no prior relationship or trust for serving WLAN networks are presented in this paper. An ad-hoc architecture is proposed for serving networks in 3G-WLAN integration and the advantages of this architecture that facilitate secure 3G user authentication are identified. Algorithms are proposed to define robust trust relationships between the parties in 3G-WLAN networks. The security of 3G user authentication is further protected by new mechanisms defined that are based on the quality of trust established between parties

    Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment

    Get PDF
    In the last decade, integrated logistics has become an important challenge in the development of wireless communication, identification and sensing technology, due to the growing complexity of logistics processes and the increasing demand for adapting systems to new requirements. The advancement of wireless technology provides a wide range of options for the maritime container terminals. Electronic devices employed in container terminals reduce the manual effort, facilitating timely information flow and enhancing control and quality of service and decision made. In this paper, we examine the technology that can be used to support integration in harbor's logistics. In the literature, most systems have been developed to address specific needs of particular harbors, but a systematic study is missing. The purpose is to provide an overview to the reader about which technology of integrated logistics can be implemented and what remains to be addressed in the future

    Assessing the impact of mHealth interventions in low- and middle-income countries – what has been shown to work?

    Get PDF
    PKBackground: Low-cost mobile devices, such as mobile phones, tablets, and personal digital assistants, which can access voice and data services, have revolutionised access to information and communication technology worldwide. These devices have a major impact on many aspects of people’s lives, from business and education to health. This paper reviews the current evidence on the specific impacts of mobile technologies on tangible health outcomes (mHealth) in low- and middle-income countries (LMICs), from the perspectives of various stakeholders. Design: Comprehensive literature searches were undertaken using key medical subject heading search terms on PubMed, Google Scholar, and grey literature sources. Analysis of 676 publications retrieved from the search was undertaken based on key inclusion criteria, resulting in a set of 76 papers for detailed review. The impacts of mHealth interventions reported in these papers were categorised into common mHealth applications. Results: There is a growing evidence base for the efficacy of mHealth interventions in LMICs, particularly in improving treatment adherence, appointment compliance, data gathering, and developing support networks for health workers. However, the quantity and quality of the evidence is still limited in many respects. Conclusions: Over all application areas, there remains a need to take small pilot studies to full scale, enabling more rigorous experimental and quasi-experimental studies to be undertaken in order to strengthen the evidence base
    • 

    corecore