Abstract

New Model Reference Adaptive System Speed Observer for Field-Oriented Control Induction Motor Drives Using Neural Networks

Highlights

  • With the rapid development of mobile communication technology and the growing popularity of intelligent terminals, there is an urgent need to get information and services from the Internet at anytime and anywhere even during movement

  • If the specific location information of user has been leaked while using the location-based services (LBS) services, it may disclosure some privacy information of user, such as interests, habits, health status, political affiliation, even cause huge loss of personal property and security

  • Facing with the increasing appearance of "Social + Local + Mobile" trends in the future, it is the best time to launch LBS system based on mobile cloud computing

Read more

Summary

Introduction

With the rapid development of mobile communication technology and the growing popularity of intelligent terminals, there is an urgent need to get information and services from the Internet at anytime and anywhere even during movement. By the means of application hosting, LBS providers can outsource their data and services to the cloud computing platform without investing a lot of money and equipment to improve the storage and query capabilities, so that the operation and management costs will be reduced. New Security Problems Brought by Mobile Cloud Computing The combination of cloud computing and mobile internet will face the security threats from traditional internet and mobile communication network, and introduced the security risks of cloud computing technology, which brings unprecedented security challenges to Location-Based Services and Privacy Protection under Mobile Cloud Computing (Yan Yan) user’s data. How to ensure the security management of cloud platform and prevent intentional or unintentional leakage of data from the cloud platform belonged to the LBS providers? due to the high concentration of information resource, cloud platforms are to become the target of hacker attacks, which brings greater security risks to the business and users running on it [26]

LBS System and Location Privacy Protection under MCC
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call