Results 1 to 10 of about 2,637,698 (178)
In response to the confusion of data sources in different systems, as well as the possibility of system updates leading to the inability to use related systems, resulting in duplicate development and increased development workload, this paper designs ...
YAO Kejun, LIANG Tianzeng, LI Qi
doaj +1 more source
location privacy based on trusted computing and secure logging [PDF]
Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider.
Urs Hengartner
core +1 more source
In recent years, laser scanners integrated with Unmanned Aerial Vehicles (UAVs) have exhibited great potential in conducting power line inspections in harsh environments. The point clouds collected for power line inspections have numerous advantages over
Sha Zhu +7 more
doaj +1 more source
Kabupaten Jepara memiliki sentra industri yang tersebar di wilayahnya. Beberapa sentra industri diantaranya sentra kerajinan gerabah dan genteng, sentra industri tenun troso, sentra industri kerajinan monel, sentra industri mebel, dan lainnya. Persebaran
Nur Aeni Widiastuti, Teguh Tamrin
doaj +1 more source
PROSEDUR MENANGANI KELUHAN NASABAH OLEH CUSTOMER SERVICE PADA PT. BANK RAKYAT INDONESIA (PERSERO) Tbk. UNIT SOEKARNO HATTA MALANG [PDF]
The task of a customer service person is to serve customers and fulfill customer desires according to the customer's requests. As the front guard, customer service is obliged to provide maximum service to customers.
Putra, Muhammad Taufik Enliana
core
Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj +1 more source
With the development of location-based service, the problem of personal privacy information security is becoming more and more serious. Users’ personal privacy information is used without authorization, personal privacy information security is facing ...
Guobin Chen, Shijin Li
doaj +1 more source
CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection [PDF]
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search.
Chen Di +3 more
doaj +1 more source
Dummy location selection algorithm based on location semantics and query probability
Aiming at the problem of privacy leakage caused by attackers possessing background knowledge in traditional location privacy protection schemes,a dummy location selection algorithm based on location semantics and query probability was proposed.Under the ...
Jie WANG +3 more
doaj +2 more sources
Precipitable Water Vapor from PPP Estimation with Multi-Analysis-Center Real-Time Products
Precipitable water vapor (PWV) is an important component of atmospheric spatial parameters and plays a vital role in meteorological studies. In this study, PWV retrieval by real-time precise point positioning (PPP) technique is validated by using global ...
Wei Li +6 more
doaj +1 more source

