Results 21 to 30 of about 2,306,830 (178)
In response to the confusion of data sources in different systems, as well as the possibility of system updates leading to the inability to use related systems, resulting in duplicate development and increased development workload, this paper designs ...
YAO Kejun, LIANG Tianzeng, LI Qi
doaj +1 more source
Kabupaten Jepara memiliki sentra industri yang tersebar di wilayahnya. Beberapa sentra industri diantaranya sentra kerajinan gerabah dan genteng, sentra industri tenun troso, sentra industri kerajinan monel, sentra industri mebel, dan lainnya. Persebaran
Nur Aeni Widiastuti, Teguh Tamrin
doaj +1 more source
In recent years, laser scanners integrated with Unmanned Aerial Vehicles (UAVs) have exhibited great potential in conducting power line inspections in harsh environments. The point clouds collected for power line inspections have numerous advantages over
Sha Zhu +7 more
doaj +1 more source
Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS
Over the past couple of years, the extent of the services provided on the mobile devices has increased rapidly. A special class of service among them is the Location Based Service(LBS) which depends on the geographical position of the user to provide ...
Shetty, Keerthi S., Singh, Sanjay
core +1 more source
PROSEDUR MENANGANI KELUHAN NASABAH OLEH CUSTOMER SERVICE PADA PT. BANK RAKYAT INDONESIA (PERSERO) Tbk. UNIT SOEKARNO HATTA MALANG [PDF]
The task of a customer service person is to serve customers and fulfill customer desires according to the customer's requests. As the front guard, customer service is obliged to provide maximum service to customers.
Putra, Muhammad Taufik Enliana
core
Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj +1 more source
With the development of location-based service, the problem of personal privacy information security is becoming more and more serious. Users’ personal privacy information is used without authorization, personal privacy information security is facing ...
Guobin Chen, Shijin Li
doaj +1 more source
CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection [PDF]
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search.
Chen Di +3 more
doaj +1 more source
Dummy location selection algorithm based on location semantics and query probability
Aiming at the problem of privacy leakage caused by attackers possessing background knowledge in traditional location privacy protection schemes,a dummy location selection algorithm based on location semantics and query probability was proposed.Under the ...
Jie WANG +3 more
doaj +2 more sources
An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Services
With the rapid development of GPS-equipped smart mobile devices and mobile computing, location-based services (LBS) are increasing in popularity in the Internet of Things (IoT).
Yongwen Du +4 more
doaj +1 more source

