7 research outputs found

    Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS

    Full text link
    Over the past couple of years, the extent of the services provided on the mobile devices has increased rapidly. A special class of service among them is the Location Based Service(LBS) which depends on the geographical position of the user to provide services to the end users. However, a mobile device is still resource constrained, and some applications usually demand more resources than a mobile device can a ord. To alleviate this, a mobile device should get resources from an external source. One of such sources is cloud computing platforms. We can predict that the mobile area will take on a boom with the advent of this new concept. The aim of this paper is to exchange messages between user and location service provider in mobile device accessing the cloud by minimizing cost, data storage and processing power. Our main goal is to provide dynamic location-based service and increase the information retrieve accuracy especially on the limited mobile screen by accessing cloud application. In this paper we present location based restaurant information retrieval system and we have developed our application in Android.Comment: 11 pages, 10 figure

    Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol

    Full text link
    In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may cause private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose and model the technique of ownership authentication transfer. The user who is willing to sell the device has to transfer the ownership of the device under sale. Once the device is sold and the ownership has been transferred, the old owner will not be able to use that device at any cost. Either of the users will not be able to use the device if the process of ownership has not been carried out properly. This also takes care of the scenario when the device has been stolen or lost, avoiding the impersonation attack. The aim of this paper is to model basic process of proposed ownership authentication transfer protocol and check its safety properties by representing it using CSP and model checking approach. For model checking we have used a symbolic model checker tool called NuSMV. The safety properties of ownership transfer protocol has been modeled in terms of CTL specification and it is observed that the system satisfies all the protocol constraint and is safe to be deployed.Comment: 16 pages, 7 figures,Submitted to ADCOM 201

    Discrete element modeling of the machining processes of brittle materials: recent development and future prospective

    Get PDF

    Transcriptional processes: Models and inference

    No full text

    Chromosome fusions triggered by noncoding RNA

    No full text
    Chromosomal fusions are common in normal and cancer cells and can produce aberrant gene products that promote transformation. The mechanisms driving these fusions are poorly understood, but recurrent fusions are widespread. This suggests an underlying mechanism, and some authors have proposed a possible role for RNA in this process. The unicellular eukaryote Oxytricha trifallax displays an exorbitant capacity for natural genome editing, when it rewrites its germline genome to form a somatic epigenome. This developmental process provides a powerful model system to directly test the influence of small noncoding RNAs on chromosome fusion events during somatic differentiation. Here we show that small RNAs are capable of inducing chromosome fusions in four distinct cases (out of four tested), including one fusion of three chromosomes. We further show that these RNA-mediated chromosome fusions are heritable over multiple sexual generations and that transmission of the acquired fusion is associated with endogenous production of novel piRNA molecules that target the fused junction. We also demonstrate the capacity of a long noncoding RNA (lncRNA) to induce chromosome fusion of two distal germline loci. These results underscore the ability of short-lived, aberrant RNAs to act as drivers of chromosome fusion events that can be stably transmitted to future generations
    corecore