SlideShare a Scribd company logo
1 of 5
Download to read offline
Control Theory and Informatics                                                                   www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

    Location Based Spatial Query Processing In Wireless System
                                                Sunny R. Panjwani
                                         Dept of Computer Engineering,
                                    D. Y. Patil College of Engineering,Akurdi
                                                Pune 411 035, India
                                       Email: sunnypanjwani7@gmail.com

                                                 Aarti S.Gaikwad
                                         Dept of Computer Engineering,
                                    D. Y. Patil College of Engineering,Akurdi
                                                Pune 411 035, India
                                         Email: arati.g@rediffmail.com

Abstract
Location-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer.
Efficient processing of LBSQs is of critical importance with the ever-increasing deployment and use of mobile
technologies. Input of the system will be the radius of the region the center of which is the user current location
and the type of entity such as bank, malls etc. Output will consist of the user requested entities ranked in the
increasing distance. Our database will consist of all the entities with their type and geographic location. Our
algorithm will find out all the locations within the specified region intended by the user. All these points will be
used for firing the query along with the entity type to obtain a result set. Real time response due to the mobile
nature of the user and the accuracy are considerable issues to be taken care of. Furthermore the air as media
presents the issues for the abnormal connection loss and errors

Keywords: Spatial query, GPS.

1 Introduction
         In this paper, we present a project that would provide a java mobile application that is used in GPS
supported mobiles phones. Authenticated user login into this application can search information about any place
in a given particular range. Places like IT industries, Hospitals, Banks, ATM’s, Monument, and Government
Offices etc. can be searched by user in this project we are using mobile as a client user interface. Our project is
consisted in 3-tier architecture and in MVC-2 format. User interface in mobile is constructed with the LWUIT.

         Spatial query is used to retrieve information from database. Authenticated user will enter the range up to
which he wants to search the places and according to this query will fire on the database and the response will be
obtained.

2. Theoretical Background

2.1 GPS
          GPS is a system for location identifier. This system is being developed by the US DEPARTMENT OF
DEFENCE and is free to be used by anyone who has a GPS device. The system uses a collection of 24
satellites. For identifying the location precisely at least the device should be in the range of three satellites. GPS
can provide the location accuracy of up to centimeter degree of accuracy.
2.2 Spatial query
          SPATIAL query processing is becoming an integral part of many new mobile applications. Recently,
there has been a growing interest in the use of location-based spatial queries (LBSQs), which represent a set of
spatial queries that retrieve information based on mobile users’ current locations. User mobility and data
exchange through wireless communication give LBSQs some unique characteristics. In our system spatial query
will be used for firing the query to the database for the response of the entities in the region of user.

Mobile Query Semantics
         In a mobile environment, a typical LBSQ is of the following form: “find the top-three nearest hospitals.”
The result of the query depends on the location of its requester. The query from the user consists of the co-
ordinates of the user along with the radius of region and the type of entity.

High Workload


10 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

         The database resides in a centralized server, which typically serves a large mobile user community
through wireless communication. Consequently, bandwidth constraints and scalability become the most important
design concerns of LBSQ algorithms.

Query Promptness and Accuracy
         Due to users’ mobility, answers to an LBSQ will lose their relevancy if there is a long delay in query
processing or in communication. For example, answers to the query “find the top-three nearest hospitals”
received after five minutes of High-speed driving will become meaningless.

2.3 LWUIT
         The Lightweight User Interface Toolkit (LWUIT) is a versatile and compact API for creating attractive
application user interfaces for mobile devices. LWUIT provides sophisticated Swing-like capabilities without
the tremendous power and complexity of Swing. Designed from the ground up as an efficient mobile user
interface toolkit, LWUIT provides many useful Swing-like features.
3. System Architecture Design

         Our project is consisted in MVC-2 format which is efficient than three-tier architecture.

3.1 Three-tier architecture
          The three-tier model is software architecture and a software design pattern.
          Apart from the usual advantages of modular software with well-defined interfaces, the three-tier
architecture is intended to allow any of the three tiers to be upgraded or replaced independently as requirements
or technology change. For example, a change of operating system in the presentation tier would only affect the
user interface code.
          Three-tier architecture has the following three tiers:
a) Presentation tier:
      This is the topmost level of the application. The presentation tier displays information related to such
    services as browsing merchandise, purchasing, and shopping cart contents. It communicates with other tiers
    by outputting results to the browser/client tier and all other tiers in the network.
 b) Application tier (business logic, logic tier, data access tier, or middle tier):
      The logic tier is pulled out from the presentation tier and, as its own layer; it controls an application’s
    functionality by performing detailed processing.
 c) Data tier
      This tier consists of database servers. Here information is stored and retrieved. This tier keeps data neutral
    and independent from application servers or business logic. Giving data its own tier also improves scalability
    and performance.

3.2 MVC ARCHITECTURE

   Model is business logic.
   View is the displaying of the data into pages.
   Controller manipulates model & causes view to update.
                • MVC1 is traditional approach. It is page centric i.e. view and controller are on the page
                   itself.
                • MVC2 is new approach. It is servlet centric i.e. model, view and controller are separated
                   from each other.
                • We are using MVC2 ARCHITECTURE because it provides a single point of control for
                   security and logging. Also as our project requires interaction with database a separate
                   controller will definitely be a better choice than crunching the interaction code in the JSP
                   pages as in case of MVC1.MVC2 is more maintainable.



3.4 DESIGN AND IMPLEMENTATION CONSTRAINTS

Limitations of our system are
 • The position of the user will be uncovered which will not be private



11 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

 • The speed of the spatial query processing matters. For example the response of the query of “three nearest
   neighbor” after five minutes for a mobile user has no relevance.

4. System Features

FEATURE 1:
Accuracy of the system
1. Accuracy in the position & location of the results.
2. Achieved through following techniques
  • Accuracy up to centimeters using GPS.
  • Remedial action is performed during accuracy loss in mathematical processing.

FEATURE 2:
Real time response
1. Real time response means that the response should be calculated and returned to the user in a time critical
manner.
2. The response of the system after the deadline has no meaning.
3. In our system this is achieved through following techniques
   • Simple and normalized (3nf) database schema
   • Simple and light algorithms
   • Less processing of the request
   • Better connection management

5. Block Diagram




                                              Fig1. Block Diagram

6.Working
         Location based spatial query processing in wireless system works in two steps these steps are
mentioned as follows.
Step1: Firstly the administrator will enter the information about all the places. The administrator will just put
his login and password and then he can enter information about the places and stores it in database. Firstly the
information will send to the JSP and then JSP will send request to the servlet after that servlet will execute and
through database layer it will update the database.
Step2: User with java enabled mobile will have to enter the login and password and then the system will check
for authorized person if he is not registered the he have to create his account and only then he can access this
application. If the person found to be registered then he just have to enter the radius according to radius the
range is decided .this input range will fir e on servlet then through database layer spatial query will fire on the
database and then response will be displayed on the user mobile.

         In this above two steps location based spatial query processing in wireless system will work


12 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

         .
7. Benefits of proposed System
         There are many advantage of this system such as

1) User can search any places and its information.
2) This system will available 24x7 as it is depend on GPS.
3) Can work in any java enabled mobile.
4) Cost is reduced as it uses only GPS not GPRS.
5) In case of emergency such as accident any one can find nearest hospital.
6) Can also be put for the advertisements if for example some new mall in an area wants itself to be shown in
the search results for that area.
7) Can be used to prepare the statistics for the different entities in different areas of a city for proper planning
and surveying.


8. Drawbacks of the Proposed System

1. One drawback of this system as it uses GPS so there is continuously communication between the mobile and
the satellite. so it consumes more battery .This is only drawback of the system but it can be avoided by using
GPS when it needed and after that close the GPS such that the connection between the mobile and Satellite will
lost and communication will also lost and the battery will not be used.
2. Our software is in the phase of growth as every device is not GPS enabled and many a times we require
external hardware support.


9. Summaries
         We provided application that will allow any user to search any place in particular range. In this fast
generation no one has time to ask other person about places. So this project will help people to stay fast and
search places like hospital, IT industry, monuments in very fast and cost effective way.

References

Lawrence Letham (Paperback - November 2003) Gps Made Easy: Using
Global Positioning Systems in the Outdoors.

Jonathan Knudsen and Sing Li (Apr 22, 2005) Beginning J2ME Platform: From Novice to Professional

Christopher L. Jerde1,3 and Darcy R. Visscher2 “GPS MEASUREMENT ERROR INFLUENCES ON
MOVEMENT MODEL PARAMETERIZATION”




13 | P a g e
www.iiste.org
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

What's hot

A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann witheSAT Publishing House
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Conference Papers
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningeSAT Journals
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...IJNSA Journal
 
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...IRJET Journal
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object frameworkijscai
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
Design of Digital Parity Generator Layout using 0.7 micron Technology
Design of Digital Parity Generator Layout using 0.7 micron Technology Design of Digital Parity Generator Layout using 0.7 micron Technology
Design of Digital Parity Generator Layout using 0.7 micron Technology IJECEIAES
 
Asp.Net Java Ieee Projects Ncct
Asp.Net Java Ieee Projects NcctAsp.Net Java Ieee Projects Ncct
Asp.Net Java Ieee Projects Ncctncct
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 

What's hot (19)

A virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann withA virtual analysis on various techniques using ann with
A virtual analysis on various techniques using ann with
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)Blockchain secure biometric access systems (bsbas)
Blockchain secure biometric access systems (bsbas)
 
A virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data miningA virtual analysis on various techniques using ann with data mining
A virtual analysis on various techniques using ann with data mining
 
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
 
Epma 010
Epma 010Epma 010
Epma 010
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object framework
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital Evidence
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
Design of Digital Parity Generator Layout using 0.7 micron Technology
Design of Digital Parity Generator Layout using 0.7 micron Technology Design of Digital Parity Generator Layout using 0.7 micron Technology
Design of Digital Parity Generator Layout using 0.7 micron Technology
 
Asp.Net Java Ieee Projects Ncct
Asp.Net Java Ieee Projects NcctAsp.Net Java Ieee Projects Ncct
Asp.Net Java Ieee Projects Ncct
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
B045041114
B045041114B045041114
B045041114
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 

Similar to 11.location based spatial query processing in wireless system

356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeastaissmsblogs
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124aissmsblogs
 
Local area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLocal area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLogicMindtech Nologies
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sIOSR Journals
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...chennaijp
 
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET -  	  A Review on Analysis of Location Management in Mobile ComputingIRJET -  	  A Review on Analysis of Location Management in Mobile Computing
IRJET - A Review on Analysis of Location Management in Mobile ComputingIRJET Journal
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...IEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEEMEMTECHSTUDENTPROJECTS
 
Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...IJERDJOURNAL
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 
IRJET- Location based Management of Profile
IRJET- Location based Management of ProfileIRJET- Location based Management of Profile
IRJET- Location based Management of ProfileIRJET Journal
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middlewareIAEME Publication
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemDr. Amarjeet Singh
 

Similar to 11.location based spatial query processing in wireless system (20)

356 358,tesma411,ijeast
356 358,tesma411,ijeast356 358,tesma411,ijeast
356 358,tesma411,ijeast
 
Ijsartv6 i336124
Ijsartv6 i336124Ijsartv6 i336124
Ijsartv6 i336124
 
Local area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networksLocal area prediction based mobile target tracking in wireless sensor networks
Local area prediction based mobile target tracking in wireless sensor networks
 
A survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’sA survey on context aware system & intelligent Middleware’s
A survey on context aware system & intelligent Middleware’s
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
 
IRJET - A Review on Analysis of Location Management in Mobile Computing
IRJET -  	  A Review on Analysis of Location Management in Mobile ComputingIRJET -  	  A Review on Analysis of Location Management in Mobile Computing
IRJET - A Review on Analysis of Location Management in Mobile Computing
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...Analysis and Implementation Wireless Sensor Network of Information Technology...
Analysis and Implementation Wireless Sensor Network of Information Technology...
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
Binocular Search Engine Using Android
Binocular Search Engine Using AndroidBinocular Search Engine Using Android
Binocular Search Engine Using Android
 
395 401
395 401395 401
395 401
 
IRJET- Location based Management of Profile
IRJET- Location based Management of ProfileIRJET- Location based Management of Profile
IRJET- Location based Management of Profile
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

11.location based spatial query processing in wireless system

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Location Based Spatial Query Processing In Wireless System Sunny R. Panjwani Dept of Computer Engineering, D. Y. Patil College of Engineering,Akurdi Pune 411 035, India Email: sunnypanjwani7@gmail.com Aarti S.Gaikwad Dept of Computer Engineering, D. Y. Patil College of Engineering,Akurdi Pune 411 035, India Email: arati.g@rediffmail.com Abstract Location-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer. Efficient processing of LBSQs is of critical importance with the ever-increasing deployment and use of mobile technologies. Input of the system will be the radius of the region the center of which is the user current location and the type of entity such as bank, malls etc. Output will consist of the user requested entities ranked in the increasing distance. Our database will consist of all the entities with their type and geographic location. Our algorithm will find out all the locations within the specified region intended by the user. All these points will be used for firing the query along with the entity type to obtain a result set. Real time response due to the mobile nature of the user and the accuracy are considerable issues to be taken care of. Furthermore the air as media presents the issues for the abnormal connection loss and errors Keywords: Spatial query, GPS. 1 Introduction In this paper, we present a project that would provide a java mobile application that is used in GPS supported mobiles phones. Authenticated user login into this application can search information about any place in a given particular range. Places like IT industries, Hospitals, Banks, ATM’s, Monument, and Government Offices etc. can be searched by user in this project we are using mobile as a client user interface. Our project is consisted in 3-tier architecture and in MVC-2 format. User interface in mobile is constructed with the LWUIT. Spatial query is used to retrieve information from database. Authenticated user will enter the range up to which he wants to search the places and according to this query will fire on the database and the response will be obtained. 2. Theoretical Background 2.1 GPS GPS is a system for location identifier. This system is being developed by the US DEPARTMENT OF DEFENCE and is free to be used by anyone who has a GPS device. The system uses a collection of 24 satellites. For identifying the location precisely at least the device should be in the range of three satellites. GPS can provide the location accuracy of up to centimeter degree of accuracy. 2.2 Spatial query SPATIAL query processing is becoming an integral part of many new mobile applications. Recently, there has been a growing interest in the use of location-based spatial queries (LBSQs), which represent a set of spatial queries that retrieve information based on mobile users’ current locations. User mobility and data exchange through wireless communication give LBSQs some unique characteristics. In our system spatial query will be used for firing the query to the database for the response of the entities in the region of user. Mobile Query Semantics In a mobile environment, a typical LBSQ is of the following form: “find the top-three nearest hospitals.” The result of the query depends on the location of its requester. The query from the user consists of the co- ordinates of the user along with the radius of region and the type of entity. High Workload 10 | P a g e www.iiste.org
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 The database resides in a centralized server, which typically serves a large mobile user community through wireless communication. Consequently, bandwidth constraints and scalability become the most important design concerns of LBSQ algorithms. Query Promptness and Accuracy Due to users’ mobility, answers to an LBSQ will lose their relevancy if there is a long delay in query processing or in communication. For example, answers to the query “find the top-three nearest hospitals” received after five minutes of High-speed driving will become meaningless. 2.3 LWUIT The Lightweight User Interface Toolkit (LWUIT) is a versatile and compact API for creating attractive application user interfaces for mobile devices. LWUIT provides sophisticated Swing-like capabilities without the tremendous power and complexity of Swing. Designed from the ground up as an efficient mobile user interface toolkit, LWUIT provides many useful Swing-like features. 3. System Architecture Design Our project is consisted in MVC-2 format which is efficient than three-tier architecture. 3.1 Three-tier architecture The three-tier model is software architecture and a software design pattern. Apart from the usual advantages of modular software with well-defined interfaces, the three-tier architecture is intended to allow any of the three tiers to be upgraded or replaced independently as requirements or technology change. For example, a change of operating system in the presentation tier would only affect the user interface code. Three-tier architecture has the following three tiers: a) Presentation tier: This is the topmost level of the application. The presentation tier displays information related to such services as browsing merchandise, purchasing, and shopping cart contents. It communicates with other tiers by outputting results to the browser/client tier and all other tiers in the network. b) Application tier (business logic, logic tier, data access tier, or middle tier): The logic tier is pulled out from the presentation tier and, as its own layer; it controls an application’s functionality by performing detailed processing. c) Data tier This tier consists of database servers. Here information is stored and retrieved. This tier keeps data neutral and independent from application servers or business logic. Giving data its own tier also improves scalability and performance. 3.2 MVC ARCHITECTURE Model is business logic. View is the displaying of the data into pages. Controller manipulates model & causes view to update. • MVC1 is traditional approach. It is page centric i.e. view and controller are on the page itself. • MVC2 is new approach. It is servlet centric i.e. model, view and controller are separated from each other. • We are using MVC2 ARCHITECTURE because it provides a single point of control for security and logging. Also as our project requires interaction with database a separate controller will definitely be a better choice than crunching the interaction code in the JSP pages as in case of MVC1.MVC2 is more maintainable. 3.4 DESIGN AND IMPLEMENTATION CONSTRAINTS Limitations of our system are • The position of the user will be uncovered which will not be private 11 | P a g e www.iiste.org
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 • The speed of the spatial query processing matters. For example the response of the query of “three nearest neighbor” after five minutes for a mobile user has no relevance. 4. System Features FEATURE 1: Accuracy of the system 1. Accuracy in the position & location of the results. 2. Achieved through following techniques • Accuracy up to centimeters using GPS. • Remedial action is performed during accuracy loss in mathematical processing. FEATURE 2: Real time response 1. Real time response means that the response should be calculated and returned to the user in a time critical manner. 2. The response of the system after the deadline has no meaning. 3. In our system this is achieved through following techniques • Simple and normalized (3nf) database schema • Simple and light algorithms • Less processing of the request • Better connection management 5. Block Diagram Fig1. Block Diagram 6.Working Location based spatial query processing in wireless system works in two steps these steps are mentioned as follows. Step1: Firstly the administrator will enter the information about all the places. The administrator will just put his login and password and then he can enter information about the places and stores it in database. Firstly the information will send to the JSP and then JSP will send request to the servlet after that servlet will execute and through database layer it will update the database. Step2: User with java enabled mobile will have to enter the login and password and then the system will check for authorized person if he is not registered the he have to create his account and only then he can access this application. If the person found to be registered then he just have to enter the radius according to radius the range is decided .this input range will fir e on servlet then through database layer spatial query will fire on the database and then response will be displayed on the user mobile. In this above two steps location based spatial query processing in wireless system will work 12 | P a g e www.iiste.org
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 . 7. Benefits of proposed System There are many advantage of this system such as 1) User can search any places and its information. 2) This system will available 24x7 as it is depend on GPS. 3) Can work in any java enabled mobile. 4) Cost is reduced as it uses only GPS not GPRS. 5) In case of emergency such as accident any one can find nearest hospital. 6) Can also be put for the advertisements if for example some new mall in an area wants itself to be shown in the search results for that area. 7) Can be used to prepare the statistics for the different entities in different areas of a city for proper planning and surveying. 8. Drawbacks of the Proposed System 1. One drawback of this system as it uses GPS so there is continuously communication between the mobile and the satellite. so it consumes more battery .This is only drawback of the system but it can be avoided by using GPS when it needed and after that close the GPS such that the connection between the mobile and Satellite will lost and communication will also lost and the battery will not be used. 2. Our software is in the phase of growth as every device is not GPS enabled and many a times we require external hardware support. 9. Summaries We provided application that will allow any user to search any place in particular range. In this fast generation no one has time to ask other person about places. So this project will help people to stay fast and search places like hospital, IT industry, monuments in very fast and cost effective way. References Lawrence Letham (Paperback - November 2003) Gps Made Easy: Using Global Positioning Systems in the Outdoors. Jonathan Knudsen and Sing Li (Apr 22, 2005) Beginning J2ME Platform: From Novice to Professional Christopher L. Jerde1,3 and Darcy R. Visscher2 “GPS MEASUREMENT ERROR INFLUENCES ON MOVEMENT MODEL PARAMETERIZATION” 13 | P a g e www.iiste.org
  • 5. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).