• 제목/요약/키워드: Wireless Location

Search Result 1,174, Processing Time 0.024 seconds

A Two-Way Ranging WPAN Location System with Clock Offset Estimation (클락 오프셋 추정 방식을 이용한 TWR WPAN 측위 시스템)

  • Park, Jiwon;Lim, Jeongmin;Lee, Kyujin;Sung, Tae-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.2
    • /
    • pp.125-130
    • /
    • 2013
  • Compared to OWR (One-Way Ranging) method that requires precise network time synchronization, TWR (Two-Way Ranging) method has advantages in building an indoor WPAN (Wireless Personal Area Network) location system with lower cost. However, clock offsets of nodes in WPAN system should be eliminated or compensated to improve location accuracy of the TWR method. Because conventional clock offset elimination methods requires multiple TWR transactions to reduce clock offset, they produce network traffic burden instead. This paper presents a clock offset estimation method that can reduce clock offset error with a single TWR transaction. After relative clock offsets of sensor nodes are estimated, clock offsets of mobile tags are estimated using a single TWR communication. Simulation results show that location accuracy of the proposed method is almost similar to the conventional clock offset elimination method, while its network traffic is about a half of the conventional method.

Client Collaboration for Power and Interference Reduction in Wireless Cellular Communication

  • Nam, Hyungju;Jung, Minchae;Hwang, Kyuho;Choi, Sooyong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.117-124
    • /
    • 2012
  • A client collaboration (CC) system is proposed for a user relay system. The proposed scheme focuses on the management of transmit power and leakage interference. In the proposed CC system, edge users transmit signals to the masters considered as user relays. The masters relay the signals of the edge users to the base station using the resource blocks (RBs) that are assigned to the edge users. The leakage interference and power consumption were analyzed in the CC system. In addition, an optimal master location problem was formulated based on the signal-to-leakage-plus-noise ratio (SLNR). Because the optimal master location problem is quite complex, a sub-optimal master location problem was proposed and a closed-form sub-optimal master location was obtained. The edge users generate smaller leakage interference and power consumption in the proposed CC system compared to the system without the CC. The numerical results showed that the edge users generate smaller leakage interference and power consumption in the proposed CC system compared to the system without the CC, and the average throughput increases.

  • PDF

Database Investigation Algorithm for High-Accuracy based Indoor Positioning (WLAN 기반 실내 위치 측위에서 측위 정확도 향상을 위한 데이터 구축 방법)

  • Song, Jin-Woo;Hur, Soo-Jung;Park, Yong-Wan;Yoo, Kook-Yeol
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.2
    • /
    • pp.85-93
    • /
    • 2012
  • In this paper, we proposed Wireless LAN (WLAN) localization method that enhances database construction based on weighting factor and analyse the characteristic of the WLAN received signals. The weighting factor plays a key role as it determines the importance of Received Signal Strength Indication (RSSI) value from number of received signals (frequency). The fingerprint method is the most widely used method in WLAN-based positioning methods because it has high location accuracy compare to other indoor positioning methods. The fingerprint method has different location accuracies which depend on training phase and positioning phase. In training phase, intensity of RSSI is measured under the various. Conventional systems adapt average of RSSI samples in a database construction, which is not quite accurate due to variety of RSSI samples. In this paper, we analyse WLAN RSSI characteristic from anechoic chamber test, and analyze the causes of various distributions of RSSI and its influence on location accuracy in indoor environments. In addition, we proposed enhanced weighting factor algorithm for accurate database construction and compare location accuracy of proposed algorithm with conventional algorithm by computer simulations and tests.

A Convergency Study on the QR Code Perception Indoor-mobile Robot Control - Focused on Wireless System Configuration (QR 코드 인식 실내이동 로봇제어 융합연구 - 무선시스템 구성을 중심으로)

  • Lee, Jeongl-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.251-255
    • /
    • 2019
  • The QR codes are printed in sticker form and have many advantages in terms of location recognition accuracy or installation cost compared to the location recognition method, which attaches artificial indicators to ceilings or walls for low-cost location recognition, and the way in which the location is recognized by vision, to create robots that are generally applicable to all industries. In this study, it is shown that the two-dimensional square bar code applied to the robot within 3 mm of error allows the robot to be made with high accuracy and accurate location control. In particular, the fusion research, combined with various engineering technologies, describes QR code-aware indoor mobile robot control research centered on the construction of the system.

Development of a Simulation Tool to Evaluate GNSS Positioning Performance in Urban Area

  • Wu, Falin;Liu, Gang-Jun;Zhang, Kefei;Densley, Liam
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.71-76
    • /
    • 2006
  • With the rapid development of spatial infrastructure in US, Europe, Japan, China and India, there is no doubt that the next generation Global Navigation Satellite System (GNSS) will improve the integrity, accuracy, reliability and availability of the position solution. GNSS is becoming an essential element of personal, commercial and public infrastructure and consequently part of our daily lives. However, the applicability of GPS in supporting a range of location-sensitive applications such as location based services in an urban environment is severely curtailed by the interference of the 3D urban settings. To characterize and gain in-depth understanding of such interferences and to be able to provide location-based optimization alternatives, a high-fidelity 3D urban model of Melbourne CBD built with ArcGIS and large scale high-resolution spatial data sets is used in this study to support a comprehensive simulation of current and future GNSS signal performance, in terms of signal continuity, availability, strength, geometry, positioning accuracy and reliability based on a number of scenarios. The design, structure and major components of the simulator are outlined. Useful time-stamped spatial patterns of the signal performance over the experimental urban area have been revealed which are valuable for supporting location based services applications, such as emergency responses, the optimization of wireless communication infrastructures and vehicle navigation services.

  • PDF

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.

THE EFFICIENCY ROUTING ALGORITHM FOR MULTIMEDIA TRANSMISSION IN DIGITAL HOME NETWORK SCENARIOS

  • Nguyen Thanh Tung;Ahn Sea-Young;An Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.136-138
    • /
    • 2006
  • The high-rate Wireless Personal Area Networks (WPANs) which IEEE 802.15.3 standard support, foster the Digital Home Network (DHN) scenarios with high rate multimedia data transmission. Actually, there are a few routing protocols for ad-hoc networks which considered the terminal location information and routing metric to reduce the energy consumption and optimize the routing path in mobile system. Based on other routing protocols, this paper presents the reliable location-based routing algorithm which is an adaptation to these networks.

  • PDF

Analysis of Indoor Signal Strength from Zigbee Sensor (지그비 센서의 실내 신호 세기 분석)

  • Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.11-17
    • /
    • 2010
  • Recent technological advances allow us to envision a future where large numbers of low-power, inexpensive sensor devices are densely embedded in the physical environment, operating together in a wireless network. This paper considers localization for mobile sensors; localization must be invoked periodically to enable the sensors to track their location. Localizing more frequently allows the sensors to more accurately track their location in the presence of mobility. In this paper, we test and analyze the accuracy of a moving node localization by Received Signal Strength (RSS).

EVALUATING AND EXTENDING SPATIO-TEMPORAL DATABASE FUNCTIONALITIES FOR MOVING OBJECTS

  • Dodge Somayeh;Alesheikh Ali A.
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.778-784
    • /
    • 2005
  • Miniaturization of computing devices, and advances in wireless communication and positioning systems will create a wide and increasing range of database applications such as location-based services, tracking and transportation systems that has to deal with Moving Objects. Various types of queries could be posted to moving objects, including past, present and future queries. The key problem is how to model the location of moving objects and enable Database Management System (DBMS) to predict the future location of a moving object. It is obvious that there is a need for an innovative, generic, conceptually clean and application-independent approach for spatio-temporal handling data. This paper presents behavioral aspect of the spatio-temporal databases for managing and querying moving objects. Our objective is to impelement and extend the Spatial TAU (STAU) system developed by Dr.Pelekis that provides spatio-temporal functionality to an Object-Relational Database Management System to support modeling and querying moving objecs. The results of the impelementation are demonstrated in this paper.

  • PDF

Automatic Mutual Localization of Swarm Robot Using a Particle Filter

  • Lee, Yang-Weon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.390-395
    • /
    • 2012
  • This paper describes an implementation of automatic mutual localization of swarm robots using a particle filter. Each robot determines the location of the other robots using wireless sensors. The measured data will be used for determination of the movement method of the robot itself. It also affects the other robots' self-arrangement into formations such as circles and lines. We discuss the problem of a circle formation enclosing a target that moves. This method is the solution for enclosing an invader in a circle formation based on mutual localization of the multi-robot without infrastructure. We use trilateration, which does require knowing the value of the coordinates of the reference points. Therefore, specifying the enclosure point based on the number of robots and their relative positions in the coordinate system. A particle filter is used to improve the accuracy of the robot's location. The particle filter is operates better for mutual location of robots than any other estimation algorithms. Through the experiments, we show that the proposed scheme is stable and works well in real environments.