Accuracy, Security, and Architecture Impacts and Challenges of Mobile and Web Technologies: Geolocation Field Data Collection in Washington State Water Resources
نویسندگان
چکیده
The purpose of this paper is to examine accuracy, security, and architecture impacts and challenges of mobile and web technologies through the case study of collecting geolocation field data in Washington (WA) State water resources. Effective management of water as a public resource relies on the capture, storage, and retrieval of accurate geographic position data. This is also true of a broad range of business domains beyond water resources, such as earth sciences, city planning, and navigation to name a few. Application developers must
منابع مشابه
Development of mobile computing applications for hydraulics and water quality field measurements
Traditional field measurements for water quality and stream gauging still largely depend upon the pencil and paper field notebook for data collection. Recent advances in scalable wireless telecommunications and the proliferation of hand-held computing devices has enabled the development of software tools to assist environmental and earth scientists in improving the collection of field data. Thi...
متن کاملVehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملAnalyzing new features of infected web content in detection of malicious web pages
Recent improvements in web standards and technologies enable the attackers to hide and obfuscate infectious codes with new methods and thus escaping the security filters. In this paper, we study the application of machine learning techniques in detecting malicious web pages. In order to detect malicious web pages, we propose and analyze a novel set of features including HTML, JavaScript (jQuery...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014