• Title/Summary/Keyword: Location Based Technology

Search Result 2,185, Processing Time 0.031 seconds

A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments

  • Qianfeng Lin;Jooyoung Son
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.644-662
    • /
    • 2023
  • There are still outbreaks of COVID-19 across the world. Ships increase the risk of worldwide transmission of the virus. Close contact tracing remains as an effective method of reducing the risk of virus transmission. Therefore, close contact tracing in ship environments becomes a research topic. Exposure Notifications API (Application Programming Interface) can be used to determine the encountered location points of close contacts on ships. Location points of close contact are estimated by the encountered location points. Risky areas in ships can be calculated based on the encountered location points. The tracking of close contacts is possible with Bluetooth technology without the Internet. The Bluetooth signal can be used to judge the proximity among detecting devices by using the feature that Bluetooth has a strong signal at close range. This Bluetooth feature makes it possible to trace close contacts in ship environments. In this paper, we propose a method for close contact tracing and showing the risky area in a ship environment by combining beacon and Exposure Notification API using Bluetooth technology. This method does not require an Internet connection for tracing close contacts and can protect the personal information of close contacts.

Study of Users' Location Estimation based on Smartphone Sensors for Updating Indoor Evacuation Routes (실내 대피 경로의 최신화를 위한 스마트폰 센서 기반의 사용자 위치 추정에 관한 연구)

  • Quan, Yu;Lee, Chang-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.20 no.2
    • /
    • pp.37-44
    • /
    • 2018
  • The Location Based Service is growing rapidly nowadays due to the universalization of the use for smartphone, and therefore the location determination technology has been placed in a very important position. This study suggests an algorithm that can provide the estimate of users' location by using smartphone sensors. And in doing so we will propose a methodology for the creation and update of indoor map through the more accurate position estimation using smartphone sensors such as acceleration sensor, gyroscope sensor, geomagnetic sensor and rotation sensor.

The Design and Implementation of a CSS based Location Aware System (CSS기반 위치인식 시스템 구현에 관한 연구)

  • Ju, Jun-Hyeong;Kim, Hyun-Wook;Yang, Sung-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1549-1558
    • /
    • 2012
  • Location-aware system is utilized in various fields such as Logistics, Home Network, Healthcare, Military and Transportation systems. In this paper, we designed and implemented a Location-aware system based on IEEE 802.15.4a CSS (Chirp Spread Spectrum) technology in variable environment. The CSS is possible to precision location awareness using RF signal. According to experimental result, the implemented system has recognition error less than 0.5m within 20m radius in space.

Location Estimation Enhancement Using Space-time Signal Processing in Wireless Sensor Networks: Non-coherent Detection

  • Oh, Chang-Heon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.3
    • /
    • pp.269-275
    • /
    • 2012
  • In this paper, we proposed a novel location estimation algorithm based on the concept of space-time signature matching in a moving target environment. In contrast to previous fingerprint-based approaches that rely on received signal strength (RSS) information only, the proposed algorithm uses angle, delay, and RSS information from the received signal to form a signature, which in turn is utilized for location estimation. We evaluated the performance of the proposed algorithm in terms of the average probability of error and the average error distance as a function of target movement. Simulation results confirmed the effectiveness of the proposed algorithm for location estimation even in moving target environment.

Preserving User Anonymity in Context-Aware Location-Based Services: A Proposed Framework

  • Teerakanok, Songpon;Vorakulpipat, Chalee;Kamolphiwong, Sinchai;Siwamogsatham, Siwaruk
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.501-511
    • /
    • 2013
  • Protecting privacy is an important goal in designing location-based services. Service providers want to verify legitimate users and allow permitted users to enjoy their services. Users, however, want to preserve their privacy and prevent tracking. In this paper, a new framework providing users with more privacy and anonymity in both the authentication process and the querying process is proposed. Unlike the designs proposed in previous works, our framework benefits from a combination of three important techniques: k-anonymity, timed fuzzy logic, and a one-way hash function. Modifying and adapting these existing schemes provides us with a simpler, less complex, yet more mature solution. During authentication, the one-way hash function provides users with more privacy by using fingerprints of users' identities. To provide anonymous authentication, the concept of confidence level is adopted with timed fuzzy logic. Regarding location privacy, spatial k-anonymity prevents the users' locations from being tracked. The experiment results and analysis show that our framework can strengthen the protection of anonymity and privacy of users by incurring a minimal implementation cost and can improve functionality.

A Novel Hearability Enhancement Method for Forward-Link Multilateration Using OFDM Signal

  • Park, Ji-Won;Lim, Jeong-Min;Lee, Kyu-Jin;Sung, Tae-Kyung
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.638-648
    • /
    • 2013
  • Together with the GPS-based approach, geo-location through mobile communication networks is a key technology for location-based service. To save the cost, most geo-location system is implemented on the existed network service, which has a cellular structure. Still, multilateration is limited in cellular structure because it is difficult for the mobile terminal to acquire distance measurements from multiple base stations. This low hearability in the receiver is caused by co-channel interference and multipath environment. Therefore, hearability enhancement is necessary for multilateration under multipath and interference environment. Former time domain based hearability methods were designed for real signals. However, orthogonal frequency division multiplexing (OFDM) signal, which its usage has been increased in digital wireless communication, is a complex signal. Thus, different hearability enhancement method is needed for OFDM signals. This paper proposes a hearability enhancement method for forward-link multilateration using OFDM signals, which employ interference cancellation and multipath mitigation. A novel interference cancellation and multipath mitigation strategy for complex-valued OFDM signals is presented that has an iterative structure. Simulation results show that the proposed multilateration method provides the user's position with an accuracy of less than 80m through the mobile WiMAX cellular network in multipath environment.

Data acquisition and computation methods for improved location awareness in the indoor location system (실내 위치 시스템에서의 향상된 위치 인식을 위한 데이터 수집 및 연산 기법)

  • Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.270-271
    • /
    • 2015
  • Recently, There is Increasing interest in the intelligent services using the Internet of Things indoor positioning technologies that enable the communication of information between the objects. In particular Applications and demand for the indoor location based services using smart devices has made active. An indoor location positioning technology for this purpose BLE (Bluetooth Low Energy) has been a lot of interest in technology increases. If iBeacon of BLE(Bluetooth Low Energy) is made available to provide a signal for the indoor location information measurement then reliability of Indoor location information is lowered by signal interference. In this paper, Proposes a technique for data acquisition method for obtaining reliable position information and reliable position information calculation method from signal information data of iBeacon.

  • PDF

Real-Time Precision Vehicle Localization Using Numerical Maps

  • Han, Seung-Jun;Choi, Jeongdan
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.968-978
    • /
    • 2014
  • Autonomous vehicle technology based on information technology and software will lead the automotive industry in the near future. Vehicle localization technology is a core expertise geared toward developing autonomous vehicles and will provide location information for control and decision. This paper proposes an effective vision-based localization technology to be applied to autonomous vehicles. In particular, the proposed technology makes use of numerical maps that are widely used in the field of geographic information systems and that have already been built in advance. Optimum vehicle ego-motion estimation and road marking feature extraction techniques are adopted and then combined by an extended Kalman filter and particle filter to make up the localization technology. The implementation results of this paper show remarkable results; namely, an 18 ms mean processing time and 10 cm location error. In addition, autonomous driving and parking are successfully completed with an unmanned vehicle within a $300m{\times}500m$ space.

Impact of Sink Node Location in Sensor Networks: Performance Evaluation (센서 네트워크에서 싱크 노드 위치가 성능에 미치는 영향 분석)

  • Choi, Dongmin;Kim, Seongyeol;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.977-987
    • /
    • 2014
  • Many of the recent performance evaluation of clustering schemes in wireless sensor networks considered one sink node operation and fixed sink node location without mentioning about any network application requirements. However, application environments have variable requirements about their networks. In addition, network performance is sufficiently influenced by different sink node location scenarios in multi-hop based network. We also know that sink location can influence to the sensor network performance evaluation because of changed multipath of sensor nodes and changed overload spots in multipath based wireless sensor network environment. Thus, the performance evaluation results are hard to trust because sensor network is easily changed their network connection through their routing algorithms. Therefore, we suggest that these schemes need to evaluate with different sink node location scenarios to show fair evaluation result. Under the results of that, network performance evaluation results are acknowledged by researchers. In this paper, we measured several clustering scheme's performance variations in accordance with various types of sink node location scenarios. As a result, in the case of the clustering scheme that did not consider various types of sink location scenarios, fair evaluation cannot be expected.

Analysis of Privacy threats and Security mechanisms on Location-based Service (위치기반 서비스의 프라이버시 위협 요소 분석 및 보안 대책에 관한 연구)

  • Oh, Soo-Hyun;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2009
  • A location information used in LBS provides convenience to the user, but service provider can be exploited depending on how much risk you have. Location information can be exploited to track the location of the personal privacy of individuals because of the misuse of location information may violate the user can import a lot of damage. In this paper, we classify the life cycle of location information as collection, use, delivery, storage and destroy and analyze the factors the privacy is violated. Furthermore, we analyze information security mechanism is classified as operation mechanism and policy/management mechanism and propose a security solutions of all phase in life cycle.

  • PDF