Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies: Geolocation Field Data Collection in Washington State Water Resources

نویسندگان

  • Jeremiah D. Miller
  • Sam Chung
  • Teresa Escrig
  • Yan Bai
  • Barbara Endicott-popovsky
  • Jan Whittington
چکیده

The purpose of this paper is to examine accuracy, security, and architecture impacts and challenges of mobile and web technologies through the case study of collecting geolocation field data in Washington (WA) State water resources. Effective management of water as a public resource relies on the capture, storage, and retrieval of accurate geographic position data. This is also true of a broad range of business domains beyond water resources, such as earth sciences, city planning, and navigation to name a few. Application developers must

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of mobile computing applications for hydraulics and water quality field measurements

Traditional field measurements for water quality and stream gauging still largely depend upon the pencil and paper field notebook for data collection. Recent advances in scalable wireless telecommunications and the proliferation of hand-held computing devices has enabled the development of software tools to assist environmental and earth scientists in improving the collection of field data. Thi...

متن کامل

Vehicular Networks: A Survey on Architecture, Communication Technologies and Applications

The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Analyzing new features of infected web content in detection of malicious web pages

Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014