CFP last date
20 May 2024
Reseach Article

Synchronous Relaying of Sensor Data

by Rahul R Upadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 13
Year of Publication: 2014
Authors: Rahul R Upadhyay
10.5120/15942-5234

Rahul R Upadhyay . Synchronous Relaying of Sensor Data. International Journal of Computer Applications. 91, 13 ( April 2014), 22-27. DOI=10.5120/15942-5234

@article{ 10.5120/15942-5234,
author = { Rahul R Upadhyay },
title = { Synchronous Relaying of Sensor Data },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 13 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number13/15942-5234/ },
doi = { 10.5120/15942-5234 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:40.102587+05:30
%A Rahul R Upadhyay
%T Synchronous Relaying of Sensor Data
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 13
%P 22-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we have put forth a novel methodology to relay data obtained by inbuilt sensors of smart phones in real time to remote database followed by fetching of this data . Smart phones are becoming very common and they are laced with a number of sensors that can not only be used in native applications but there data values can also be sent to external nodes to be used by third parties for application and service development. In this paper we demonstrate our mechanism by relaying android accelerometer data followed by retrieving it.

References
  1. S. T. King and P. M. Chen,"Bavktracking Intrusion," ACM Trans. Computer Systems, vol. 23, no. 1, pp, 51-76, 2005.
  2. Bhattasali, Tapalina, Rituparna Chaki, and Sugata Sanyal. "Sleep Deprivation Attack Detection in Wireless Sensor Network. " International Journal of Computer Applications 40 (2012).
  3. Sanyal, Sugata, Rangarajan A. Vasudevan, Ajith Abraham, and Marcin Paprzycki. "Grid Security and Integration with Minimal Performance Degradation. " arXiv preprint arXiv:1111. 4545 (2011).
  4. L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, J. Srivastava, V. Kumar, and P. Dokas, The MINDS-Minnesota Intrusion Detection System Next Generation Data Mining. MIT Press, 2004.
  5. Vasudevan, Rangarajan A. , Ajith Abraham, Sugata Sanyal, and Dharma P. Agrawal. "Jigsaw-based secure data transfer over computer networks. " InInformation Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on, vol. 1, pp. 2-6. IEEE, 2004.
  6. Yu Li, He-xin Chen, Yan Zhao, "A new method of data hiding based on H. 264 encoded video sequences", IEEE 10th International Conference on Signal Processing(ICSP), 24-28 Oct. 2010, pp. 1833-1836.
  7. Self Protection In Clustered Distributed System, Noel De Palma, Daniel Hagimont, Fabienne Boyer, and Laurent Broto, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 2, FEBRUARY 2012
  8. Wojciech Mazurczyk and Krzysztof Szczypiorski, "Steganography of VoIP streams", On the Move to Meaningful Internet Systems, OTM 2008, Springer, Vol. 5332, pp. 1001-1018.
  9. Santosh Kumar and Sonam Rai. Article: Survey on Transport Layer Protocols: TCP & UDP. International Journal of Computer Applications 46(7):20-25, May 2012. Published by Foundation of Computer Science, New York, USA.
  10. J. Jing, A. S. Helal, and A. Elmagarmid, "Client-server Computing in Mobile Environments," ACM Computing Surveys (CSUR), vol. 31, no. 2, pp. 117–157, 1999.
  11. Dey, Sandipan, Ajith, Abraham, Bijoy Bandyopadhyay, and Sugata Sanyal. "Data Hiding Techniques Using Prime and Natural Numbers. " Journal of Digital Information Management 6, no. 6 (2008).
  12. Cui, Zhihua, Chunxia Yang, and Sugata Sanyal. "Training artificial neural networks using APPM. " International Journal of wireless and mobile computing5. 2 (2012): 168-174.
  13. M. Satyanarayanan, "Fundamental challenges in mobile computing," in Proceedings of the 5th annual ACM symposium on Principles of distributed computing, pp. 1-7, May 1996
  14. Roy, Bibhash, Suman Banik, Parthi Dey, Sugata Sanyal, and Nabendu Chaki. "Ant colony based routing for mobile ad-hoc networks towards improved quality of services. " Journal of Emerging Trends in Computing and Information Sciences 3, no. 1 (2012): 10-14. .
  15. Dey, Sandipan, Ajith Abraham, and Sugata Sanyal. "An LSB Data Hiding Technique Using Natural Number Decomposition. " In Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007. Third International Conference on, vol. 2, pp. 473-476. IEEE, 2007.
  16. Michael Armbrust and Armando Fox, "Above the Clouds: A Berkeley View of Cloud Computing", http://www. eecs. berkeley. edu/Pubs/TechRpts/2009/EECS-2009-28. html
  17. C. Wang, Q. Wang, K. Ren, N. Cao and W. Lou, "Toward Secure and Dependable Storage Services in Cloud Computing, " IEEE Transactions on Services Computing, vol. no. 5, art. no. 5765928, pp. 220-232.
  18. J. Jing, A. S. Helal, and A. Elmagarmid, "Client-server Computing in Mobile Environments," ACM Computing Surveys (CSUR), vol. 31, no. 2, pp. 117–157, 1999.
  19. L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, J. Srivastava, V. Kumar, and P. Dokas, The MINDS-Minnesota Intrusion Detection System Next Generation Data Mining. MIT Press, 2004.
  20. Trivedi, Animesh Kr, Rajan Arora, Rishi Kapoor, Sudip Sanyal, and Sugata Sanyal. "A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks. " arXiv preprint arXiv:1006. 1956 (2010).
  21. Abraham, Ajith, Ravi Jain, Sugata Sanyal, and Sang Yong Han. "SCIDS: a soft computing intrusion detection system. " In Distributed Computing-IWDC 2004, pp. 252-257. Springer Berlin Heidelberg, 2005.
  22. Description about PhoneGap Documentation http://docs. phonegap. com/en/3. 4. 0/index. html
  23. Description AJAX http://javascript. about. com/od/ajax/a/ajaxasyn. htm
  24. Rahul R Upadhyay and Rajeev Rao. Article: Controlling Remote Peripherals using Data Present in the Cloud. International Journal of Computer Applications 50(16):28-32, July 2012. Published by Foundation of Computer Science, New York, USA.
  25. Rahul R Upadhyay "Study of Encryption and Decryption of Wave File in Image Formats" International Journal of Advanced Networking and Applications. ISSN: 0975-0290. pages :1847-1852.
Index Terms

Computer Science
Information Sciences

Keywords

PhoneGap Ajax UDP/TCP Cordova.