SlideShare a Scribd company logo
Control Theory and Informatics                                                                   www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

    Location Based Spatial Query Processing In Wireless System
                                                Sunny R. Panjwani
                                         Dept of Computer Engineering,
                                    D. Y. Patil College of Engineering,Akurdi
                                                Pune 411 035, India
                                       Email: sunnypanjwani7@gmail.com

                                                 Aarti S.Gaikwad
                                         Dept of Computer Engineering,
                                    D. Y. Patil College of Engineering,Akurdi
                                                Pune 411 035, India
                                         Email: arati.g@rediffmail.com

Abstract
Location-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer.
Efficient processing of LBSQs is of critical importance with the ever-increasing deployment and use of mobile
technologies. Input of the system will be the radius of the region the center of which is the user current location
and the type of entity such as bank, malls etc. Output will consist of the user requested entities ranked in the
increasing distance. Our database will consist of all the entities with their type and geographic location. Our
algorithm will find out all the locations within the specified region intended by the user. All these points will be
used for firing the query along with the entity type to obtain a result set. Real time response due to the mobile
nature of the user and the accuracy are considerable issues to be taken care of. Furthermore the air as media
presents the issues for the abnormal connection loss and errors

Keywords: Spatial query, GPS.

1 Introduction
         In this paper, we present a project that would provide a java mobile application that is used in GPS
supported mobiles phones. Authenticated user login into this application can search information about any place
in a given particular range. Places like IT industries, Hospitals, Banks, ATM’s, Monument, and Government
Offices etc. can be searched by user in this project we are using mobile as a client user interface. Our project is
consisted in 3-tier architecture and in MVC-2 format. User interface in mobile is constructed with the LWUIT.

         Spatial query is used to retrieve information from database. Authenticated user will enter the range up to
which he wants to search the places and according to this query will fire on the database and the response will be
obtained.

2. Theoretical Background

2.1 GPS
          GPS is a system for location identifier. This system is being developed by the US DEPARTMENT OF
DEFENCE and is free to be used by anyone who has a GPS device. The system uses a collection of 24
satellites. For identifying the location precisely at least the device should be in the range of three satellites. GPS
can provide the location accuracy of up to centimeter degree of accuracy.
2.2 Spatial query
          SPATIAL query processing is becoming an integral part of many new mobile applications. Recently,
there has been a growing interest in the use of location-based spatial queries (LBSQs), which represent a set of
spatial queries that retrieve information based on mobile users’ current locations. User mobility and data
exchange through wireless communication give LBSQs some unique characteristics. In our system spatial query
will be used for firing the query to the database for the response of the entities in the region of user.

Mobile Query Semantics
         In a mobile environment, a typical LBSQ is of the following form: “find the top-three nearest hospitals.”
The result of the query depends on the location of its requester. The query from the user consists of the co-
ordinates of the user along with the radius of region and the type of entity.

High Workload


10 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

         The database resides in a centralized server, which typically serves a large mobile user community
through wireless communication. Consequently, bandwidth constraints and scalability become the most important
design concerns of LBSQ algorithms.

Query Promptness and Accuracy
         Due to users’ mobility, answers to an LBSQ will lose their relevancy if there is a long delay in query
processing or in communication. For example, answers to the query “find the top-three nearest hospitals”
received after five minutes of High-speed driving will become meaningless.

2.3 LWUIT
         The Lightweight User Interface Toolkit (LWUIT) is a versatile and compact API for creating attractive
application user interfaces for mobile devices. LWUIT provides sophisticated Swing-like capabilities without
the tremendous power and complexity of Swing. Designed from the ground up as an efficient mobile user
interface toolkit, LWUIT provides many useful Swing-like features.
3. System Architecture Design

         Our project is consisted in MVC-2 format which is efficient than three-tier architecture.

3.1 Three-tier architecture
          The three-tier model is software architecture and a software design pattern.
          Apart from the usual advantages of modular software with well-defined interfaces, the three-tier
architecture is intended to allow any of the three tiers to be upgraded or replaced independently as requirements
or technology change. For example, a change of operating system in the presentation tier would only affect the
user interface code.
          Three-tier architecture has the following three tiers:
a) Presentation tier:
      This is the topmost level of the application. The presentation tier displays information related to such
    services as browsing merchandise, purchasing, and shopping cart contents. It communicates with other tiers
    by outputting results to the browser/client tier and all other tiers in the network.
 b) Application tier (business logic, logic tier, data access tier, or middle tier):
      The logic tier is pulled out from the presentation tier and, as its own layer; it controls an application’s
    functionality by performing detailed processing.
 c) Data tier
      This tier consists of database servers. Here information is stored and retrieved. This tier keeps data neutral
    and independent from application servers or business logic. Giving data its own tier also improves scalability
    and performance.

3.2 MVC ARCHITECTURE

   Model is business logic.
   View is the displaying of the data into pages.
   Controller manipulates model & causes view to update.
                • MVC1 is traditional approach. It is page centric i.e. view and controller are on the page
                   itself.
                • MVC2 is new approach. It is servlet centric i.e. model, view and controller are separated
                   from each other.
                • We are using MVC2 ARCHITECTURE because it provides a single point of control for
                   security and logging. Also as our project requires interaction with database a separate
                   controller will definitely be a better choice than crunching the interaction code in the JSP
                   pages as in case of MVC1.MVC2 is more maintainable.



3.4 DESIGN AND IMPLEMENTATION CONSTRAINTS

Limitations of our system are
 • The position of the user will be uncovered which will not be private



11 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

 • The speed of the spatial query processing matters. For example the response of the query of “three nearest
   neighbor” after five minutes for a mobile user has no relevance.

4. System Features

FEATURE 1:
Accuracy of the system
1. Accuracy in the position & location of the results.
2. Achieved through following techniques
  • Accuracy up to centimeters using GPS.
  • Remedial action is performed during accuracy loss in mathematical processing.

FEATURE 2:
Real time response
1. Real time response means that the response should be calculated and returned to the user in a time critical
manner.
2. The response of the system after the deadline has no meaning.
3. In our system this is achieved through following techniques
   • Simple and normalized (3nf) database schema
   • Simple and light algorithms
   • Less processing of the request
   • Better connection management

5. Block Diagram




                                              Fig1. Block Diagram

6.Working
         Location based spatial query processing in wireless system works in two steps these steps are
mentioned as follows.
Step1: Firstly the administrator will enter the information about all the places. The administrator will just put
his login and password and then he can enter information about the places and stores it in database. Firstly the
information will send to the JSP and then JSP will send request to the servlet after that servlet will execute and
through database layer it will update the database.
Step2: User with java enabled mobile will have to enter the login and password and then the system will check
for authorized person if he is not registered the he have to create his account and only then he can access this
application. If the person found to be registered then he just have to enter the radius according to radius the
range is decided .this input range will fir e on servlet then through database layer spatial query will fire on the
database and then response will be displayed on the user mobile.

         In this above two steps location based spatial query processing in wireless system will work


12 | P a g e
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

         .
7. Benefits of proposed System
         There are many advantage of this system such as

1) User can search any places and its information.
2) This system will available 24x7 as it is depend on GPS.
3) Can work in any java enabled mobile.
4) Cost is reduced as it uses only GPS not GPRS.
5) In case of emergency such as accident any one can find nearest hospital.
6) Can also be put for the advertisements if for example some new mall in an area wants itself to be shown in
the search results for that area.
7) Can be used to prepare the statistics for the different entities in different areas of a city for proper planning
and surveying.


8. Drawbacks of the Proposed System

1. One drawback of this system as it uses GPS so there is continuously communication between the mobile and
the satellite. so it consumes more battery .This is only drawback of the system but it can be avoided by using
GPS when it needed and after that close the GPS such that the connection between the mobile and Satellite will
lost and communication will also lost and the battery will not be used.
2. Our software is in the phase of growth as every device is not GPS enabled and many a times we require
external hardware support.


9. Summaries
         We provided application that will allow any user to search any place in particular range. In this fast
generation no one has time to ask other person about places. So this project will help people to stay fast and
search places like hospital, IT industry, monuments in very fast and cost effective way.

References

Lawrence Letham (Paperback - November 2003) Gps Made Easy: Using
Global Positioning Systems in the Outdoors.

Jonathan Knudsen and Sing Li (Apr 22, 2005) Beginning J2ME Platform: From Novice to Professional

Christopher L. Jerde1,3 and Darcy R. Visscher2 “GPS MEASUREMENT ERROR INFLUENCES ON
MOVEMENT MODEL PARAMETERIZATION”




13 | P a g e
www.iiste.org
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

More Related Content

DOC
Indoor localization Leveraging Human Perception of Textual Signs
PDF
Wireless Network Intrinsic Secrecy
PDF
Multilevel authentication using gps and otp techniques
PDF
Multilevel authentication using gps and otp techniques
PDF
Keystroke Dynamics Authentication with Project Management System
PDF
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
PDF
Narrative of digital signature technology and moving forward
PDF
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...
Indoor localization Leveraging Human Perception of Textual Signs
Wireless Network Intrinsic Secrecy
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
Keystroke Dynamics Authentication with Project Management System
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Narrative of digital signature technology and moving forward
[WWW2014] Reconciling Mobile App Privacy and Usability on Smartphones: Could ...

What's hot (19)

PDF
A virtual analysis on various techniques using ann with
PDF
Location Based Encryption-Decryption Approach for Data Security
PDF
Adaptive authentication to determine login attempt penalty from multiple inpu...
PDF
Blockchain secure biometric access systems (bsbas)
PDF
A virtual analysis on various techniques using ann with data mining
PDF
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
PDF
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
PDF
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
PDF
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
PDF
Epma 010
PDF
Functional requirements of intelligent object framework
PDF
Survey on cloud computing security techniques
RTF
Visualization of Computer Forensics Analysis on Digital Evidence
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
PDF
Design of Digital Parity Generator Layout using 0.7 micron Technology
PDF
Asp.Net Java Ieee Projects Ncct
PDF
Survey on cloud computing security techniques
PDF
B045041114
PDF
11.biometric data security using recursive visual cryptography
A virtual analysis on various techniques using ann with
Location Based Encryption-Decryption Approach for Data Security
Adaptive authentication to determine login attempt penalty from multiple inpu...
Blockchain secure biometric access systems (bsbas)
A virtual analysis on various techniques using ann with data mining
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
Epma 010
Functional requirements of intelligent object framework
Survey on cloud computing security techniques
Visualization of Computer Forensics Analysis on Digital Evidence
IRJET- Attribute based Access Control for Cloud Data Storage
Design of Digital Parity Generator Layout using 0.7 micron Technology
Asp.Net Java Ieee Projects Ncct
Survey on cloud computing security techniques
B045041114
11.biometric data security using recursive visual cryptography
Ad

Similar to 11.location based spatial query processing in wireless system (20)

PDF
356 358,tesma411,ijeast
PDF
Ijsartv6 i336124
DOCX
Local area prediction based mobile target tracking in wireless sensor networks
PDF
A survey on context aware system & intelligent Middleware’s
DOCX
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
PDF
IRJET - A Review on Analysis of Location Management in Mobile Computing
PDF
www.ijerd.com
PPT
Unit-III internet of things sppu. .ppt
PDF
Edge computing and its role in architecting IoT
DOCX
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
DOCX
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
PDF
Analysis and Implementation Wireless Sensor Network of Information Technology...
DOC
Mobile agents in a distributed multimedia dabase system(synopsis)
PPTX
Microservices vs Monolithic Advantages with real time Metrics.pptx
PDF
Android Application For Decentralized Family Locator
PDF
PDF
IRJET- Location based Management of Profile
PDF
A Survey of Cyber foraging systems: Open Issues, Research Challenges
PDF
An approach of software engineering through middleware
356 358,tesma411,ijeast
Ijsartv6 i336124
Local area prediction based mobile target tracking in wireless sensor networks
A survey on context aware system & intelligent Middleware’s
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
IRJET - A Review on Analysis of Location Management in Mobile Computing
www.ijerd.com
Unit-III internet of things sppu. .ppt
Edge computing and its role in architecting IoT
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
Analysis and Implementation Wireless Sensor Network of Information Technology...
Mobile agents in a distributed multimedia dabase system(synopsis)
Microservices vs Monolithic Advantages with real time Metrics.pptx
Android Application For Decentralized Family Locator
IRJET- Location based Management of Profile
A Survey of Cyber foraging systems: Open Issues, Research Challenges
An approach of software engineering through middleware
Ad

More from Alexander Decker (20)

PDF
Abnormalities of hormones and inflammatory cytokines in women affected with p...
PDF
A validation of the adverse childhood experiences scale in
PDF
A usability evaluation framework for b2 c e commerce websites
PDF
A universal model for managing the marketing executives in nigerian banks
PDF
A unique common fixed point theorems in generalized d
PDF
A trends of salmonella and antibiotic resistance
PDF
A transformational generative approach towards understanding al-istifham
PDF
A time series analysis of the determinants of savings in namibia
PDF
A therapy for physical and mental fitness of school children
PDF
A theory of efficiency for managing the marketing executives in nigerian banks
PDF
A systematic evaluation of link budget for
PDF
A synthetic review of contraceptive supplies in punjab
PDF
A synthesis of taylor’s and fayol’s management approaches for managing market...
PDF
A survey paper on sequence pattern mining with incremental
PDF
A survey on live virtual machine migrations and its techniques
PDF
A survey on data mining and analysis in hadoop and mongo db
PDF
A survey on challenges to the media cloud
PDF
A survey of provenance leveraged
PDF
A survey of private equity investments in kenya
PDF
A study to measures the financial health of
Abnormalities of hormones and inflammatory cytokines in women affected with p...
A validation of the adverse childhood experiences scale in
A usability evaluation framework for b2 c e commerce websites
A universal model for managing the marketing executives in nigerian banks
A unique common fixed point theorems in generalized d
A trends of salmonella and antibiotic resistance
A transformational generative approach towards understanding al-istifham
A time series analysis of the determinants of savings in namibia
A therapy for physical and mental fitness of school children
A theory of efficiency for managing the marketing executives in nigerian banks
A systematic evaluation of link budget for
A synthetic review of contraceptive supplies in punjab
A synthesis of taylor’s and fayol’s management approaches for managing market...
A survey paper on sequence pattern mining with incremental
A survey on live virtual machine migrations and its techniques
A survey on data mining and analysis in hadoop and mongo db
A survey on challenges to the media cloud
A survey of provenance leveraged
A survey of private equity investments in kenya
A study to measures the financial health of

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction

11.location based spatial query processing in wireless system

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Location Based Spatial Query Processing In Wireless System Sunny R. Panjwani Dept of Computer Engineering, D. Y. Patil College of Engineering,Akurdi Pune 411 035, India Email: sunnypanjwani7@gmail.com Aarti S.Gaikwad Dept of Computer Engineering, D. Y. Patil College of Engineering,Akurdi Pune 411 035, India Email: arati.g@rediffmail.com Abstract Location-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer. Efficient processing of LBSQs is of critical importance with the ever-increasing deployment and use of mobile technologies. Input of the system will be the radius of the region the center of which is the user current location and the type of entity such as bank, malls etc. Output will consist of the user requested entities ranked in the increasing distance. Our database will consist of all the entities with their type and geographic location. Our algorithm will find out all the locations within the specified region intended by the user. All these points will be used for firing the query along with the entity type to obtain a result set. Real time response due to the mobile nature of the user and the accuracy are considerable issues to be taken care of. Furthermore the air as media presents the issues for the abnormal connection loss and errors Keywords: Spatial query, GPS. 1 Introduction In this paper, we present a project that would provide a java mobile application that is used in GPS supported mobiles phones. Authenticated user login into this application can search information about any place in a given particular range. Places like IT industries, Hospitals, Banks, ATM’s, Monument, and Government Offices etc. can be searched by user in this project we are using mobile as a client user interface. Our project is consisted in 3-tier architecture and in MVC-2 format. User interface in mobile is constructed with the LWUIT. Spatial query is used to retrieve information from database. Authenticated user will enter the range up to which he wants to search the places and according to this query will fire on the database and the response will be obtained. 2. Theoretical Background 2.1 GPS GPS is a system for location identifier. This system is being developed by the US DEPARTMENT OF DEFENCE and is free to be used by anyone who has a GPS device. The system uses a collection of 24 satellites. For identifying the location precisely at least the device should be in the range of three satellites. GPS can provide the location accuracy of up to centimeter degree of accuracy. 2.2 Spatial query SPATIAL query processing is becoming an integral part of many new mobile applications. Recently, there has been a growing interest in the use of location-based spatial queries (LBSQs), which represent a set of spatial queries that retrieve information based on mobile users’ current locations. User mobility and data exchange through wireless communication give LBSQs some unique characteristics. In our system spatial query will be used for firing the query to the database for the response of the entities in the region of user. Mobile Query Semantics In a mobile environment, a typical LBSQ is of the following form: “find the top-three nearest hospitals.” The result of the query depends on the location of its requester. The query from the user consists of the co- ordinates of the user along with the radius of region and the type of entity. High Workload 10 | P a g e www.iiste.org
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 The database resides in a centralized server, which typically serves a large mobile user community through wireless communication. Consequently, bandwidth constraints and scalability become the most important design concerns of LBSQ algorithms. Query Promptness and Accuracy Due to users’ mobility, answers to an LBSQ will lose their relevancy if there is a long delay in query processing or in communication. For example, answers to the query “find the top-three nearest hospitals” received after five minutes of High-speed driving will become meaningless. 2.3 LWUIT The Lightweight User Interface Toolkit (LWUIT) is a versatile and compact API for creating attractive application user interfaces for mobile devices. LWUIT provides sophisticated Swing-like capabilities without the tremendous power and complexity of Swing. Designed from the ground up as an efficient mobile user interface toolkit, LWUIT provides many useful Swing-like features. 3. System Architecture Design Our project is consisted in MVC-2 format which is efficient than three-tier architecture. 3.1 Three-tier architecture The three-tier model is software architecture and a software design pattern. Apart from the usual advantages of modular software with well-defined interfaces, the three-tier architecture is intended to allow any of the three tiers to be upgraded or replaced independently as requirements or technology change. For example, a change of operating system in the presentation tier would only affect the user interface code. Three-tier architecture has the following three tiers: a) Presentation tier: This is the topmost level of the application. The presentation tier displays information related to such services as browsing merchandise, purchasing, and shopping cart contents. It communicates with other tiers by outputting results to the browser/client tier and all other tiers in the network. b) Application tier (business logic, logic tier, data access tier, or middle tier): The logic tier is pulled out from the presentation tier and, as its own layer; it controls an application’s functionality by performing detailed processing. c) Data tier This tier consists of database servers. Here information is stored and retrieved. This tier keeps data neutral and independent from application servers or business logic. Giving data its own tier also improves scalability and performance. 3.2 MVC ARCHITECTURE Model is business logic. View is the displaying of the data into pages. Controller manipulates model & causes view to update. • MVC1 is traditional approach. It is page centric i.e. view and controller are on the page itself. • MVC2 is new approach. It is servlet centric i.e. model, view and controller are separated from each other. • We are using MVC2 ARCHITECTURE because it provides a single point of control for security and logging. Also as our project requires interaction with database a separate controller will definitely be a better choice than crunching the interaction code in the JSP pages as in case of MVC1.MVC2 is more maintainable. 3.4 DESIGN AND IMPLEMENTATION CONSTRAINTS Limitations of our system are • The position of the user will be uncovered which will not be private 11 | P a g e www.iiste.org
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 • The speed of the spatial query processing matters. For example the response of the query of “three nearest neighbor” after five minutes for a mobile user has no relevance. 4. System Features FEATURE 1: Accuracy of the system 1. Accuracy in the position & location of the results. 2. Achieved through following techniques • Accuracy up to centimeters using GPS. • Remedial action is performed during accuracy loss in mathematical processing. FEATURE 2: Real time response 1. Real time response means that the response should be calculated and returned to the user in a time critical manner. 2. The response of the system after the deadline has no meaning. 3. In our system this is achieved through following techniques • Simple and normalized (3nf) database schema • Simple and light algorithms • Less processing of the request • Better connection management 5. Block Diagram Fig1. Block Diagram 6.Working Location based spatial query processing in wireless system works in two steps these steps are mentioned as follows. Step1: Firstly the administrator will enter the information about all the places. The administrator will just put his login and password and then he can enter information about the places and stores it in database. Firstly the information will send to the JSP and then JSP will send request to the servlet after that servlet will execute and through database layer it will update the database. Step2: User with java enabled mobile will have to enter the login and password and then the system will check for authorized person if he is not registered the he have to create his account and only then he can access this application. If the person found to be registered then he just have to enter the radius according to radius the range is decided .this input range will fir e on servlet then through database layer spatial query will fire on the database and then response will be displayed on the user mobile. In this above two steps location based spatial query processing in wireless system will work 12 | P a g e www.iiste.org
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 . 7. Benefits of proposed System There are many advantage of this system such as 1) User can search any places and its information. 2) This system will available 24x7 as it is depend on GPS. 3) Can work in any java enabled mobile. 4) Cost is reduced as it uses only GPS not GPRS. 5) In case of emergency such as accident any one can find nearest hospital. 6) Can also be put for the advertisements if for example some new mall in an area wants itself to be shown in the search results for that area. 7) Can be used to prepare the statistics for the different entities in different areas of a city for proper planning and surveying. 8. Drawbacks of the Proposed System 1. One drawback of this system as it uses GPS so there is continuously communication between the mobile and the satellite. so it consumes more battery .This is only drawback of the system but it can be avoided by using GPS when it needed and after that close the GPS such that the connection between the mobile and Satellite will lost and communication will also lost and the battery will not be used. 2. Our software is in the phase of growth as every device is not GPS enabled and many a times we require external hardware support. 9. Summaries We provided application that will allow any user to search any place in particular range. In this fast generation no one has time to ask other person about places. So this project will help people to stay fast and search places like hospital, IT industry, monuments in very fast and cost effective way. References Lawrence Letham (Paperback - November 2003) Gps Made Easy: Using Global Positioning Systems in the Outdoors. Jonathan Knudsen and Sing Li (Apr 22, 2005) Beginning J2ME Platform: From Novice to Professional Christopher L. Jerde1,3 and Darcy R. Visscher2 “GPS MEASUREMENT ERROR INFLUENCES ON MOVEMENT MODEL PARAMETERIZATION” 13 | P a g e www.iiste.org
  • 5. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).