The communication networks (mobile phone networks, social media platforms) produce digital traces from their usages. This type of information help to understand and analyze the human mobility in very accurate way. By these analyzes over cities, it can give powerful data on daily citizen activities, urban planners have in that way, relevant indications for decision making on design and development. As well as, the Call detail Records (CDRs) provides valuable spatiotemporal data at the level of citywide or even nationwide. The CDRs could be analyzed to extract the life patterns and individuals mobility in an observed urban area and during ephemeral events. Whereas, their analysis gives conceptual views about human density and mobility patterns. In this study, the mobile phone traces concern an ephemeral event called Armada in Rouen city. However, important densities of individuals are analyzed and are represented to extract the life patterns by classifying the most active regions during observed period in this urban area. Then, the collective mobility patterns are investigated in aggregated urban mobility patterns via extracting the universal mobility law (power-law distribution). This investigation explores the characteristics of human mobility patterns, and model them mathematically depending on substantial parameters, that are the inter-event time, traveled distances (displacements), and the radius of gyration. The main purpose of this study is to determine the general pattern law of the population. And, its contribution is the resulting outcomes, which are revealed and visualized in both static and dynamic perspectives. They can be capitalized as guidelines to explore the urban pulse and life patterns. The numerical simulation results endorse the previous investigations. Hence, they found that the real system patterns almost follow an exponential distribution. Additionally, the experiments classified the mobility patterns into major classes as general, work, and off days. Keywords : Complex systems, urban, mobility, CDRs, mobile phone, spatio-temporal, network, radius of gyration, individual trajectory, city pulse, simulation, power-law distribution.
A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP
... Show MoreAbstract
In this research will be treated with a healthy phenomenon has a significant impact on different age groups in the community, but a phenomenon tonsillitis where they will be first Tawfiq model slope self moving averages seasonal ARMA Seasonal through systematic Xbox Cengnzla counter with rheumatoid tonsils in the city of Mosul, and for the period 2004-2009 with prediction of these numbers coming twelve months, has found that the specimen is the best representation of the data model is the phenomenon SARMA (1,1) * (2,1) 12 from the other side and explanatory variables using a maximum temperature and minimum temperature, sol
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreThis paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere
... Show MoreFace Identification is an important research topic in the field of computer vision and pattern recognition and has become a very active research area in recent decades. Recently multiwavelet-based neural networks (multiwavenets) have been used for function approximation and recognition, but to our best knowledge it has not been used for face Identification. This paper presents a novel approach for the Identification of human faces using Back-Propagation Adaptive Multiwavenet. The proposed multiwavenet has a structure similar to a multilayer perceptron (MLP) neural network with three layers, but the activation function of hidden layer is replaced with multiscaling functions. In experiments performed on the ORL face database it achieved a
... Show More