LOCATION SENSING AND PRIVACY IN A CONTEXT-AWARE COMPUTING ENVIRONMENT ASIM SMAILAGIC AND DAVID KOGAN, CARNEGIE MELLON UNIVERSITY

Size: px
Start display at page:

Download "LOCATION SENSING AND PRIVACY IN A CONTEXT-AWARE COMPUTING ENVIRONMENT ASIM SMAILAGIC AND DAVID KOGAN, CARNEGIE MELLON UNIVERSITY"

Transcription

1 C ONTEXT-AWARE C OMPUTING LOCATION SENSING AND PRIVACY IN A CONTEXT-AWARE COMPUTING ENVIRONMENT ASIM SMAILAGIC AND DAVID KOGAN, CARNEGIE MELLON UNIVERSITY Pervasive computing is an emerging field in computer systems research. This paradigm introduces smart spaces which interact with users in a natural and flexible manner. For many of these interactions to occur, the system must know the locations of users. ABSTRACT This article presents and evaluates the performance of a location sensing algorithm developed and demonstrated at Carnegie Mellon University. We compare our model with various others based on different architectures and software paradigms. We show comparative results in accuracy, the complexity of training, total power consumption, and suitability to users. Our method reduces training complexity by a factor of eight over previous algorithms, and yields noticeably better accuracy. The algorithm uses less power than previous models, and offers a more secure privacy model. INTRODUCTION Pervasive computing is an emerging field in computer systems research. This paradigm introduces smart spaces that interact with users in a natural and flexible manner. For many of these interactions to occur, the system must know the locations of users. Given the importance of position as a component of context-aware computing, our efforts have focused on developing a location service. Our implementation is based on signal strength and access point information from the IEEE 82.11b WaveLAN wireless network that covers the entire Carnegie Mellon University (CMU) campus [1]. This is in contrast to a Global Positioning System (GPS)-based approach, which has poor indoor accuracy and requires each client to be equipped with a GPS receiver that adds weight and consumes power. Our goal was to develop a power-efficient, easily trained, scalable, and secure location service. It had to be available to a variety of clients including wearable and laptop computers. Within the scope of the WaveLAN wireless network infrastructure, there are two fundamental algorithmic approaches: client-centric and server-centric. In the client-centric model, each client obtains the signal strengths to multiple WaveLAN access points, and that set of data is used to calculate a location. In the server-centric approach, a centralized server determines which clients are in contact with which access points, and uses this data to calculate position. In this article, we discuss a client-centric triangulationbased remapped interpolated approach (CMU- TMI). We evaluate this approach in comparison to our previous client-centric algorithm based on pattern matching (), Microsoft s RADAR system [2], a server-centric approach (CMU-SC), and statistical approaches (e.g., in [3, 4]. We also relate these WaveLAN-dependent systems to proprietary infrastructure-based systems such as GPS [5], radio frequency (RF), and ultrasound [6] systems based on cellular technology [7, 8], and proprietary non-infrastructure-based systems such as video-based systems utilizing pattern matching techniques as described in [9, 1]. We outline the relative merits, and focus specifically on comparing the WaveLAN-based systems in accuracy, complexity, training requirements, power capacity, and the inherent acceptability to end users. PERVASIVE ENVIRONMENT MODEL The location service fits in the server layer of our model for a pervasive computing environment. This architecture, called Handy Andy, is shown in Fig. 1. The bottom of the figure has a range of nonhomogeneous mobile and fixed devices. The second and third layers translate requests coming from devices and associate them with unique users and user states. The fourth layer represents shared applications, utilities, and servers, and is the layer where a location service would exist. The position of the location service in the system makes it clear that a device could request its own position or someone else s position. This is integral to the system s functionality, since it means that location information has to be available to people other than the user. This means that the service must scale well to large numbers of users and large areas, and must be secure to prevent users from misusing the information it contains. An example application of a location service is Portable Help Desk (PHD), a context-aware application prototyped at CMU. This service allows a user to determine the location of other users on campus as well as information about them. This data is used within a class environment for the purposes of arranging meetings, finding people for help or discussion, and finding resources such as printers. Only a partial list of users and resources is available at any given time, since users may not wish to be visible at all times, /2/$ IEEE IEEE Wireless Communications October 22

2 Database Service User proxy Device proxy Device Infrastructure login/logout Device proxy Speech encode/decode Itsy Waldo Figure 1. Handy Andy pervasive computing architecture. Ph.D. User proxy Device proxy Handhelds Virtual whiteboard Device proxy Other devices Location Most applications for position tracking indoors deal with directions as applicable to a person on foot. This means several meters of error is acceptable, but anything beyond the scope of a single room is a problem. and devices may not all be available. Figure 2 illustrates a visual user interface for the PHD application. People and resources are selected in the left pane, the results of the queries are presented in the middle pane, and locations of people and resources are displayed in the right pane. It is clear that the PHD would not be possible without a robust location service. LOCATION SENSING In this section we summarize aspects of previous implementation of location sensing, and go into details of Carnegie Mellon s Triangulation, Mapping and Interpolation algorithm (CMU-TMI). ARCHITECTURES Our choice of architecture stems from the resources available and the requirements of the service. We considered a variety of architectures that can be used for location sensing. GPS-based [5] systems are the most well known. For our purposes, these have two downsides: they require each user to carry specialized hardware, and they are almost useless indoors, particularly in the vertical axis. Since we wish the service to be easily available, and need accuracy within a few meters in a campus environment, this system is unacceptable for our use. Most applications for position tracking indoors deal with directions as applicable to a person on foot. This means several meters of error is acceptable, but anything beyond the scope of a single room is a problem. Proprietary systems based on RF and ultrasound [6] have been implemented in business environments. These have good indoor accuracy, but require a great deal of investment in infrastructure, and special hardware has to be worn by all users. Due to the constraint of making the location server easily available to a large number of users on the CMU campus, this also was not acceptable. Video-based systems utilizing pattern matching techniques [9, 1] require that the user be equipped with a wearable camera. These systems require a great deal of training and suffer from lack of accuracy. Systems based on the inverse approach, identifying users by stationary video cameras, are advantageous because they do not require any hardware to be worn by users. However, this needs a prohibitive investment proportional to both the area covered and accuracy required, since a camera has to be at any location where a user can be tracked. These systems require a great deal of training on each user, so new users are difficult to add, and the accuracy is unclear when dealing with a large population. Systems based on cell phone signals [7, 8] have downsides in accuracy. While cell phones are widely used throughout the world, and the signals provide fair accuracy outdoors and in Figure 2. Portable help desk screen shot. IEEE Wireless Communications October 22 11

3 Frequency Mean: 75.6 Median: 75 Mode: 74 StdDev: Signal strength (dbm) Figure 3. Stationary signal strength distribution certain cases good quality indoors, they suffer from the reflection of the RF signal deep within buildings, and tend to have poor vertical resolution, not being able to distinguish between floors. These systems can be used to complement an based location service. Our ultimate choice was an architecture based on CMU s wireless network. This provides a functional client-server relationship between users with portable devices using WaveLAN network cards and Lucent WaveLAN access points. Anyone using the wireless network has the necessary hardware, so no investment is necessary beyond the development of software. Because the network information is available within the client devices and accessible at the access points, there is no need for contracts with external systems. Furthermore, high levels of accuracy can be achieved due to the density of access points within the campus. SOFTWARE MODEL Several algorithms have been implemented to take advantage of wireless network data, and our algorithm builds on this previous work. The simplest system is a sever-centric approach prototyped at Carnegie Mellon (CMU- SC). This approach gathers data from the wireless access points and returns the position of the access point to which the user is connected. The benefit is the simplicity of the algorithm and independence from the user. The only data required is a mapping of access point addresses to physical access point positions. The downside is that the accuracy is directly proportional to the density of access points, which results in a resolution of approximately 25 m, which is the average range of a wireless access point. A second, less obvious, downside is that because the data is independent of the user, the security involved is poor, since anyone could have access to this part of the network. A final issue concerns implementation. The Lucent WaveLAN access points on the CMU campus cache the medium access control (MAC) addresses of the client s radios. This cache is persistent, even after the client has left the wireless network. This ghosting of MAC addresses prevents accurate location information from being obtained directly from the access points. Two algorithms based on pattern matching have been developed for a greater degree of accuracy. The RADAR [2] system and CMU s Pattern-Matching algorithm () use multiple signal strengths to determine a user s position. Each algorithm gathers the strengths of signals between a user and the wireless access points in the user s vicinity. RADAR gathers this data from the access points, while CMU- PM has the clients gather the data. This data is then matched against a pregenerated table of signal strength vectors mapped onto positions, and the closest match is returned. The advantage of the is that given a sufficiently dense table of patterns, it is possible to pinpoint a user s position to within 1.52 m in the majority of the measurements. The disadvantage is the large amount of training necessary. The algorithms return the trained position that best matches the current signal strength vector, and due to their structure, interpolation is ineffective. So in order to get accuracy within 2 m, there must be trained positions every 2 m throughout the area in which location determination is to be performed. The two algorithms as implemented have different training point density and result in different accuracies, but are quite similar otherwise. Due to its serverside nature, RADAR may not scale as well to large numbers of users, and does not give users complete control over their privacy. When designing our new algorithm, CMU- TMI, within the wireless infrastructure, we had two specific goals. The algorithm had to be accurate on par with the pattern-matching algorithms, which meant accuracy within a few meters. It also had to be scalable, such that there did not have to be a trained data point for every returned value. In other words, for an area A with N training points, the estimate has to be closer than (A/(N p)) with a large probability p. That means there must be interpolation between trained values. In order to achieve these goals, we went with a different model of the world than the previous algorithms. We perform two distinct transformations on the raw data of signal strengths. We first calculate the client s position on a continuous coordinate grid, assuming signal strengths map directly to distance. We then map the resulting coordinates onto real space coordinates using a set of trained values. Because both transformations are continuous, the result is interpolative on the trained data, and we achieve accuracy much greater than that of the area divided by the number of trained values. For the sake of clarity, we call the domain of the initial mapping Signal Space, and the range of the final mapping Physical Space. The definition of Signal Space is a mapping of positions such that the distance between any two points is correlated with the signal strength between those points. Although Signal Space is discontinuous, triangulations based on it are quite accurate. A more detailed discussion of the algorithm follows. 12 IEEE Wireless Communications October 22

4 Figure 4. CMU-TMI possible locations for all access points. CMU-TMI The CMU-TMI system requires an investment of initial data. The physical position of all the access points in the area needs to be known, much like what was needed for CMU-SC. In order to generate the Signal Space positions, a function mapping signal strength to distance has to be generated. This function was calculated empirically from observations. Finally, to map the Signal Space positions onto Physical Space positions, a set of trained points have to be generated. These trained points are nothing more than offset vectors from Signal Space positions onto Physical Space positions, and are calculated by performing the first two steps of the algorithm at a known location and recording that location. The algorithm can be divided into four distinct steps. The first two steps are identical for training the system and tracking a device s position. The third step is different for training and tracking, and the fourth step is only performed when tracking a user. Step 1 (Training or Locating): Scanning The client device initiates this stage. The device scans all the access points within range to determine their signal and noise levels. The algorithm for scanning uses previous well-developed work, accessing the wireless network card hardware on the device. Five scans are performed and averaged to reduce the variance in signal strength due to noise. The number of points within range varies depending on location, but three are generally sufficient for calculating a position, and four to six are commonly available. It is simple to determine the building and building floor from the strongest signal because signals travel poorly between buildings and floors. From there, the distance to three access points is needed to pinpoint a position in two dimensions. The signal strength data can be sent to a central server for processing. In the prototype system, the rest of the calculations are performed locally on the client. Step 2 (Training or Locating): Triangulation The signal strengths are used to infer the distance between Figure 5. CMU-TMI possible locations for strong access points. the client and the access points. Although it is possible to use a principled function to approximate distance [11], this requires considerable data on the building, and it was simpler in our case to use an empirical approach. Prior to implementing the algorithm, several dozen line-of-sight measurements of signal strength were taken to generate the approximate relationship between signal strength and distance. A polynomial function turned out to approximate the data quite well. The following equation, where d = distance in meters and s = signal strength in decibels, describes the relation: d =.163 s2 2.3 s + 8. Circular contours are generated around each access point at the calculated distances, and intersections between contours are found. Because of the inconsistencies of Signal Spaces and the effects of noise, contours of two access points do not necessarily intersect. Nonintersecting contours are grown or shrunk to estimate an intersection, with the change in size linearly proportional to the initial estimated distance, so the contours from nearby points are judged to be more accurate than those from distant points. Noise and the nonlinearity of Signal Space cause the intersections to be fairly scattered. In general, the number of calculated points is order n 2 the number of visible access points. These points are usually clustered, and are averaged for the user s position in Signal Space. It is at this stage that the amount of noise involved in the RF-signal-based system becomes evident. The data generated from a single scan varies a great deal over time, with the outliers particularly widespread. Figure 3 illustrates the distribution of signal strength from a client to a single access point. Figure 4 illustrates the large distribution of calculated possible positions taken from a single location over several minutes. Steps are taken to minimize the noise in this data. Measurements based on weak signal strengths from distant access points are filtered out. Using only the five strongest signals results in a distribution with far fewer outliers. Figure 5 shows the cleaner distribution of points when the distant weak access points are removed. When designing our new algorithm, CMU-TMI, within the wireless infrastructure, we had two specific goals. The algorithm had to be accurate on par with the patternmatching algorithms and had to be scalable. IEEE Wireless Communications October 22 13

5 The idea of Signal Space is just a way of performing fast interpolation. One could achieve a similar result by dividing a map into a mesh with the trained positions, and then interpolating between these positions within the scope of a few of the nearest trained values. This is the final step performed for training. Averaging signal strength over five scans in the scanning stage and then averaging the resulting 5 1 position points results in fairly good accuracy. Noise is discussed further a later section. Step 3 (Training): Training If the previous two steps were executed for training, the next step is to train the correlation between Signal Space and Physical Space. It is important to understand the distinction in Signal Space, the distance between points is correlated with the signal attenuation between the points. Physical Space is the actual map of the area. When we generate the user s position as described earlier, we do so assuming that signal strength can be converted directly to distance. This assumption is clearly wrong, because solid matter absorbs and reflects RF signals, making the previous distance calculations significantly wrong. However, it is reasonable to assume that points significantly distinct in Physical Space will likewise be distinct in Signal Space. That is, a device will return a position in Signal Space that is different from a device at another physical location. Since changing a position in Physical Space changes the value of the position in Signal Space, it is possible to map the positions in Signal Space onto positions in Physical Space. In order to keep the advantage of interpolation, this mapping has to be continuous, and because the algorithm will be executed often, the mapping must be fast. We therefore chose the mapping to be a linear distortion of the space, such that Signal Space is stretched at distinct points, much like a rubber sheet, to generate the positions in Physical Space. The mapping is trained by using Signal Space positions calculated at known positions and then setting those to be anchor points for the distortion. The idea of Signal Space is just a way of performing fast interpolation. One could achieve a similar result by dividing a map into a mesh with the trained positions, and then interpolating between these positions within the scope of a few of the nearest trained values. This is the final step performed for training. Step 3 (Locating): Mapping When the algorithm is used to determine position, applying the mapping function is quite simple. The nearest set of trained mappings from Signal Space to Physical Space are found. An average of the offsets of the trained values is applied to the Signal Space positions to calculate the Physical Space positions. The average is weighed linearly on proximity, and only those trained values within twice the distance of the nearest trained value are applied. Step 4 (Locating): Smoothing Noise and the finite granularity of a mapped physical location causes the resulting position to jump with consecutive scans, regardless of whether the device is moving or not. To alleviate this jitter and to minimize the error caused by a single poor calculation, the results of previous calculations are averaged with the new calculation. This time-averaged location converges slowly toward new data. The speed of the convergence is linear with the distance between the smoothed value and the new calculated point. That way, motion is minimized while the device is still, but permits the value to react quickly to actual motion. Figure 6 shows sample output from this algorithm. The leftmost point is the Signal Space location. The rightmost point is the computed Physical Location. The middle point represents the time averaged smoothed location, which is almost still because the computed value is very close to the old value. In this example, the time averaged smoothed location is indist inguishable from the actual location of the user on this scale. RESULTS AND EVALUATION Different location sensing techniques each have distinct advantages; likewise, they have their weaknesses. We briefly mentioned the problems with using alternative infrastructures earlier, so here we focus on comparing CMU-TMI against, CMU-SC, and RADAR, which all work within the scope of a wireless network. Accuracy is very important, but we also discuss training complexity, power consumption, and usability, which have not been discussed in detail in previous publications. The results were obtained by traversing an area approximately 5 m 2 in size inside a building and automatically gathering signal strength at regular intervals. Approximately 35 data points were gathered throughout the area. This data was then split into training and testing sets. The algorithm was trained on the training set and tested on the testing set to calculate accuracy. The size of the training set is reflected in Fig. 8. ACCURACY The accuracy of the methods is measured by the probability of a measurement being incorrect by more than a given threshold, measured over 35 data points. Figure 7 shows this cumulative distribution function vs. accuracy for the four methods discussed. The accuracy of the nearest base station approach used by CMU-SC is significantly lower than any other method, since it returns the nearest access point, which may be as far as 25 m away from the user. The accuracy of more precise methods, which use signal strengths for position determination, is greatly influenced by the inherent noise in the system. As discussed in previous publications [1], wireless networks within buildings are inherently noisy, since the RF signal reflects and is attenuated by moving objects, and is influenced by minor dynamic changes in the environment. Data gathered at a single position varies commonly by 5 percent in the strength of the signal in decibels, and signal strength is completely erratic when the direction of the wireless network card is changed. The goal of systems such as, RADAR, and CMU-TMI is to give accurate location data despite the noise, which results in the need for multiple scans, caching and smoothing. It is important to note how the systems handle noise. The pattern matching approaches of CMU- PM and RADAR result in accuracy correlated approximately with the density of their trained values. The data for appears biased toward positions near the trained values, which 14 IEEE Wireless Communications October 22

6 A A 121D Figure 6. CMU-TMI location output. results in the sharp slope at small distances. These approaches give good results near the trained values. When the result returned by the two pattern matching algorithms is corrupted by noise, the error is often quite large, since an entirely different trained value returns. This vulnerability to noise is one large downside to pattern matching, and there is a significant probability of large error. For both pattern matching algorithms, 1 percent of the sample data was incorrect by more than 9 m, a significant distance when trying to pinpoint a user. The CMU-TMI algorithm generates results between the two pattern matching accuracies for low distances, but generates better results for errors greater than 2 m. The greater accuracy at high distances is due to the way the different algorithms make errors. When or RADAR make an error, it is generally large, since an incorrect training point is returned. CMU-TMI s error, however, is smooth, so while there is a good chance of the returned position being slightly incorrect, it is very unlikely that the returned position will be far from the actual location of the user. In the experiments performed, only 5 percent of the sample readings were incorrect by more than 5 m, and none of the readings were incorrect by more than 9 m. TRAINING COMPLEXITY The training complexity is important when it comes to implementing the system. Someone has to actually go through the area being scanned to take readings and map them onto corresponding physical locations. Furthermore, because the RF signal strengths can be influenced greatly by small changes in the environment such as minor remodeling or furniture rearrangement, this mapping task would have to be repeated on a regular basis to maintain accuracy. If the number of readings to be taken is overly large, this task can be daunting. Algorithms based on pattern matching such as RADAR and require a great deal of training, since data must be sampled in a regular covering pattern throughout the area where Cumulative probability CMU-TMI Error distance (m) Figure 7. Cumulative distribution function (CDF) accuracy of location sensing algorithms. the location sensing is to be performed. The density of the training points places an upper bound on the accuracy of the location service. RADAR has a training point approximately every 23 m 2, as extrapolated from the work done by Microsoft on a limited scale. has a higher density, with a point approximately every 1 m 2. The accuracies of the algorithms are bounded by those numbers, since there is no way to pinpoint a user s position to more than an area of that size. CMU-TMI relies on interpolation for the accuracy of its results, so even a relatively sparse distribution of training points generates good results. To generate the values in Fig. 7, about one training point every 19 m 2 was used. That means that there can be a distance of 14 m between every two training positions, but because the user s position is interpolated within that space, more than 5 percent of the results are accurate to within 2 m. Figure 8 shows the number of training samples used to achieve the accuracies shown in Fig. 7. The plot shows required training points for a given area, with the estimated size of the CMU 3 RADAR Nearest base station IEEE Wireless Communications October 22 15

7 Required training points 3, 25, 2, 15, 1, 5 RADAR CMU-TMI Nearest base station RADAR 12, training CMU academic building approximate area (28, m 2 ) 28, training points Target location dimension (sqrt(area)) Figure 8. The training complexity of the algorithms. CMU-TMI 15 training points campus highlighted. CMU-TMI would require about 15 points to cover the campus, while RADAR would require 12,, and would need 28, points to achieve similar accuracy. Although each algorithm could use additional points to improve accuracy, the amount of accuracy per concentration of data varies. Figure 8 only shows the number of points needed to achieve the accuracy in Fig. 7. Different densities of training would change the results. POWER CONSUMPTION Location sensing is primarily useful for mobile users, who have significant power constraints. The amount of power consumed by a given location algorithm affects its acceptability, since users are not likely to take advantage of a service that quickly renders their device unusable. The battery life for an HP Jornada 68 handheld computer was evaluated while running the and CMU-TMI location sensing algorithms. These algorithms force the wireless network card on the device to perform rapid scanning of nearby access points, which is a drain on the battery. For our experiment, the device was fully charged, and run until fully discharged. Location calculations were performed once per second. Figure 9 shows the results of this testing. The control group, performing no scans, ran for almost 4 min. averages 1 scans per calculation, and decreases battery life by 75 percent. The interpolation of CMU-TMI, and the smoothing performed in its final step, is more robust to noise, so only 5 scans are done per calculation to achieve the accuracy in Fig. 7. As a result, CMU-TMI has less of an impact, decreasing battery life by 6 percent. It is worthy of note that the reason for the great impact is the frequency of calculation. Changing the scanning rate from once per second to once per 1 s reduces battery life impact to less than 6 percent for CMU-TMI and less than 8 percent for, although this reduces the information known about the user. We did not have access to the RADAR algorithm to perform power tests, but since the data is gathered from the access points rather than the network card, we assume the power consumption was less than or CMU-TMI. However, some response from the network card still needs to take place, so RADAR would consume more energy than the control. Naturally, a device using CMU-SC, which does not force additional scans, would last as long as the control group. USABILITY AND PRIVACY There are several usability issues integral to a location service. The architectural side was discussed earlier, so here we are interested in the human side of the system. A usability study was conducted at Carnegie Mellon to determine what users desired in a system, and it was found that in addition to accuracy, privacy was a great concern. For the most part, users wished to have complete control over the visibility of their location. Although a simple set of Boolean rules is sufficient from a software side to provide privacy, the architecture of the system has to be inherently secure. The advantage to CMU-TMI and is that the gathering of data occurs on the client machine. This provides users the greatest amount of control over their personal information, since the user can choose whether their location is transmitted to the server for others to access. The RADAR system provides the possibility of security, but does not give users direct control over their data. The information is gathered from access points, so any influence a user has over the availability of his or her information must be done through remote accesses to the central server. Finally, in the current state of the implementation, CMU-SC provides no privacy at all, since its data is freely available to anyone who knows the locations of the access points and cares to access the appropriate protocols over the network. This demonstrates a wide gap in the security of the system. In the general case, there is no guarantee that remote systems cannot access private systems, and the only absolute way to ensure invisibility is to make certain one s network card is powered down. However, controlling the data sent by the client, as in the case of CMU-TMI, provides more immediate control than having a server-based system. SUMMARY Each method has its strengths and weaknesses. The nearest base station approach used by CMU-SC is the simplest to implement, requires no field training, and does not drain the target device s batteries substantially. However, it provides only very coarse location results, has implementation issues, and provides little to no privacy. Pattern-matching-based systems such as RADAR and provide good accuracy, but require a great deal of training data. RADAR has less of an impact on battery power than, but is potentially not as secure, and may not scale well. Our latest algorithm, CMU-TMI, reduces training complexity over RADAR by a factor of eight, and generates more accurate results. It also does not drain a mobile device s battery as much as, and offers a secure pri- 16 IEEE Wireless Communications October 22

8 vacy model. Its advantages make it much more suitable to implementation on a large scale than previous algorithms, without sacrificing accuracy. FUTURE RESEARCH Context information is useful for generating more intelligent behavior in systems, but providing this information is greatly taxing on the system s architecture. Location information needs to be scalable, accurate, and yet secure and private. While systems such as CMU-TMI are already highly precise, these systems need to be tested on a wide scale, and, if at all possible, the amount of training required should be reduced further, since it is still quite significant. In addition, it is yet to be determined exactly how well such a system will be accepted by end users, and how easy it will be to integrate into existing systems. More information on the theory and practice of privacy systems needs to be researched as well. Another important piece of research is an assessment of the data needed to retrain the system. We have not presented results on this within this article, but a method for automatically gathering data to simplify retraining is being developed at CMU using a dead reckoning device [12]. At this time, however, retraining the system would require adding data points as in the training step. It is likely that not as much data would be needed for retraining, and a function could be used to age out old data. CONCLUSIONS CMU-TMI Control Runtime (min) Figure 9. Power consumption of CMU algorithms. [8] [9] B. Clarkson and A. Pentland, Recognizing User Context via Wearable Sensors, Proc. 4th Int l. Symp. Wearable Comp., Atlanta, GA, 2. [1] W. Rungsarityotin and T. E. Starner, Finding Location Using Omnidirectional Video on a Wearable Computing Platform, Proc. 4th Int l. Symp. Wearable Comp., Atlanta, GA, 2. [11] Siedel and Rappaport, 914 MHz Path Loss Prediction Model for Indoor Wireless Communications in Multifloored Buildings, [12] A. Hills, Large-scale Wireless LAN Design, IEEE Commun. Mag., vol. 39, no. 11, Nov. 21, pp ADDITIONAL READING [1] J. Small, Location Determination in a Wireless LAN Infrastructure, Master s thesis, Dept. of Elec. and Comp. Eng., CMU, This article presents and evaluates CMU-TMI, a new model of a location service, and compares its implementation against other existing algorithms. We introduce attributes for characterizing location sensing systems: accuracy, complexity of training system, power consumption, and usability. Our results provide guidelines as to under which circumstances one location sensing algorithm may be used in preference to another. Our method reduces training complexity by a factor of eight, and yields noticeably better accuracy. ACKNOWLEDGMENTS We would like to acknowledge the support provided by IBM Research, Hewlett Packard, Lucent, the National Science Foundation, Pennsylvania Infrastructure Technology Alliance, and the Defense Advanced Research Projects Agency. REFERENCES [1] A. Smailagic and D. P. Siewiorek, User-Centered Interdisciplinary Design of Wearable Computers, ACM Mobile Comp. and Commun. Rev., vol. 3, no. 3, 1999, pp [2] P. Bahl and V. N. Padmanabhan, RADAR: An In-Building RF-Based User Location and Tracking System, Proc. IEEE INFOCOM 2, Tel Aviv, Israel, Mar. 2. [3] P. Castro, T. Kremenek, and R. Muntz, Nibble: A Component-based Location System, IEEE Comp., vol. 34, no. 6, 21. [4] T. Roos, P. Myllymaki, and M. Tirri, A Statistical Modeling Approach to Location Estimation, IEEE Trans. Mobile Comp., vol. 1, no. 1, 22. [5] [6] [7] S. Tekinay, Wireless Geolocation Systems and Services, Special Issue IEEE Commun. Mag., Apr BIOGRAPHIES ASIM SMAILAGIC (asim@cs.cmu.edu) is a faculty member at Carnegie Mellon University s Institute for Complex Engineered Systems, College of Engineering, and Department of Electrical and Computer Engineering. He is also director of the Laboratory for Interactive Computer Systems at CMU. This Lab has designed and constructed 24 generations of novel mobile/wearable computer systems over the last decade. He received the Fulbright Postdoctoral award at Carnegie Mellon in Computer Science in He was a visiting professor at Cambridge University and University of Leeds. He has been Program Chair of six IEEE conferences. Also, he has been Associate Editor and Guest Editor in leading archival journals, such as IEEE Transactions on Mobile Computing, IEEE Transactions on VLSI Systems, IEEE Transactions on Computers, Journal on VLSI Signal Processing, and Journal of Computing and Information Technology. He was a recipient of the 1992 Tempus European Community Award for scientific cooperation resulting in new curriculum development, and the 2 Allen Newell Award for Research Excellence from Carnegie Mellon s School of Computer Science. He has written or edited several books in the areas of mobile computing, computer systems design and prototyping, and VLSI system design. He made major contributions to several projects that represent milestones in the evolution of advanced computer systems: from the CMU s Cm*Multiprocessor System and Edinburgh Multi-Microprocessor Assembly (EMMA), until the CMU s current projects on Wearable Computer Systems, Smart Modules, Communicator, Wireless LAN Location Sensing, and Aura Pervasive Computing. His research interests include pervasive and wearable computing, wireless communication, advanced computer architectures, and rapid prototyping. DAVID KOGAN is a software engineer at Oracle Corporation. He received his B.S. and M.S. in electrical and computer engineering from Carnegie Mellon. While at CMU, he participated in the Aura Pervasive Computing project. His current interests are in advanced algorithms and artificial intelligence. He is a member of the Sigma chapter of Eta Kappa Nu. IEEE Wireless Communications October 22 17

On the Optimality of WLAN Location Determination Systems

On the Optimality of WLAN Location Determination Systems On the Optimality of WLAN Location Determination Systems Moustafa Youssef Department of Computer Science University of Maryland College Park, Maryland 20742 Email: moustafa@cs.umd.edu Ashok Agrawala Department

More information

RADAR: An In-Building RF-based User Location and Tracking System

RADAR: An In-Building RF-based User Location and Tracking System RADAR: An In-Building RF-based User Location and Tracking System Venkat Padmanabhan Microsoft Research Joint work with Victor Bahl Infocom 2000 Tel Aviv, Israel March 2000 Outline Motivation and related

More information

On the Optimality of WLAN Location Determination Systems

On the Optimality of WLAN Location Determination Systems On the Optimality of WLAN Location Determination Systems Moustafa A. Youssef, Ashok Agrawala Department of Comupter Science and UMIACS University of Maryland College Park, Maryland 2742 {moustafa,agrawala}@cs.umd.edu

More information

ON INDOOR POSITION LOCATION WITH WIRELESS LANS

ON INDOOR POSITION LOCATION WITH WIRELESS LANS ON INDOOR POSITION LOCATION WITH WIRELESS LANS P. Prasithsangaree 1, P. Krishnamurthy 1, P.K. Chrysanthis 2 1 Telecommunications Program, University of Pittsburgh, Pittsburgh PA 15260, {phongsak, prashant}@mail.sis.pitt.edu

More information

Indoor Positioning with a WLAN Access Point List on a Mobile Device

Indoor Positioning with a WLAN Access Point List on a Mobile Device Indoor Positioning with a WLAN Access Point List on a Mobile Device Marion Hermersdorf, Nokia Research Center Helsinki, Finland Abstract This paper presents indoor positioning results based on the 802.11

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

ANALYSIS OF THE OPTIMAL STRATEGY FOR WLAN LOCATION DETERMINATION SYSTEMS

ANALYSIS OF THE OPTIMAL STRATEGY FOR WLAN LOCATION DETERMINATION SYSTEMS ANALYSIS OF THE OPTIMAL STRATEGY FOR WLAN LOCATION DETERMINATION SYSTEMS Moustafa A. Youssef, Ashok Agrawala Department of Computer Science University of Maryland College Park, Maryland 20742 {moustafa,

More information

Wireless Location Detection for an Embedded System

Wireless Location Detection for an Embedded System Wireless Location Detection for an Embedded System Danny Turner 12/03/08 CSE 237a Final Project Report Introduction For my final project I implemented client side location estimation in the PXA27x DVK.

More information

Handling Samples Correlation in the Horus System

Handling Samples Correlation in the Horus System Handling Samples Correlation in the Horus System Moustafa Youssef and Ashok Agrawala Department of Computer Science and UMIACS University of Maryland College Park, Maryland 20742 Email: {moustafa, agrawala@cs.umd.edu

More information

PERFORMANCE OF MOBILE STATION LOCATION METHODS IN A MANHATTAN MICROCELLULAR ENVIRONMENT

PERFORMANCE OF MOBILE STATION LOCATION METHODS IN A MANHATTAN MICROCELLULAR ENVIRONMENT PERFORMANCE OF MOBILE STATION LOCATION METHODS IN A MANHATTAN MICROCELLULAR ENVIRONMENT Miguel Berg Radio Communication Systems Lab. Dept. of Signals, Sensors and Systems Royal Institute of Technology

More information

Adding Angle of Arrival Modality to Basic RSS Location Management Techniques

Adding Angle of Arrival Modality to Basic RSS Location Management Techniques Adding Angle of Arrival Modality to Basic RSS Location Management Techniques Eiman Elnahrawy, John Austen-Francisco, Richard P. Martin {eiman,deymious,rmartin}@cs.rutgers.edu Department of Computer Science,

More information

Lecture - 06 Large Scale Propagation Models Path Loss

Lecture - 06 Large Scale Propagation Models Path Loss Fundamentals of MIMO Wireless Communication Prof. Suvra Sekhar Das Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 06 Large Scale Propagation

More information

Better Wireless LAN Coverage Through Ventilation Duct Antenna Systems

Better Wireless LAN Coverage Through Ventilation Duct Antenna Systems Better Wireless LAN Coverage Through Ventilation Duct Antenna Systems Benjamin E. Henty and Daniel D. Stancil Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh, PA,

More information

An E911 Location Method using Arbitrary Transmission Signals

An E911 Location Method using Arbitrary Transmission Signals An E911 Location Method using Arbitrary Transmission Signals Described herein is a new technology capable of locating a cell phone or other mobile communication device byway of already existing infrastructure.

More information

Wireless Sensors self-location in an Indoor WLAN environment

Wireless Sensors self-location in an Indoor WLAN environment Wireless Sensors self-location in an Indoor WLAN environment Miguel Garcia, Carlos Martinez, Jesus Tomas, Jaime Lloret 4 Department of Communications, Polytechnic University of Valencia migarpi@teleco.upv.es,

More information

Localization in Wireless Sensor Networks

Localization in Wireless Sensor Networks Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem

More information

Indoor Localization in Wireless Sensor Networks

Indoor Localization in Wireless Sensor Networks International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 03 (August 2014) PP: 39-44 Indoor Localization in Wireless Sensor Networks Farhat M. A. Zargoun 1, Nesreen

More information

Enhancements to the RADAR User Location and Tracking System

Enhancements to the RADAR User Location and Tracking System Enhancements to the RADAR User Location and Tracking System By Nnenna Paul-Ugochukwu, Qunyi Bao, Olutoni Okelana and Astrit Zhushi 9 th February 2009 Outline Introduction User location and tracking system

More information

Enhanced wireless indoor tracking system in multi-floor buildings with location prediction

Enhanced wireless indoor tracking system in multi-floor buildings with location prediction Enhanced wireless indoor tracking system in multi-floor buildings with location prediction Rui Zhou University of Freiburg, Germany June 29, 2006 Conference, Tartu, Estonia Content Location based services

More information

Are Wi-Fi Networks Harmful to Your Health?

Are Wi-Fi Networks Harmful to Your Health? Probably Not, But Why Not Lower Radiation in Them Anyway? A GoNet Systems ebrief With almost every communication and computing function going wireless, consumers and device users are understandably concerned

More information

INDOOR LOCALIZATION Matias Marenchino

INDOOR LOCALIZATION Matias Marenchino INDOOR LOCALIZATION Matias Marenchino!! CMSC 818G!! February 27, 2014 BIBLIOGRAPHY RADAR: An In-Building RF-based User Location and Tracking System (Paramvir Bahl and Venkata N. Padmanabhan) WLAN Location

More information

Mobility Patterns in Microcellular Wireless Networks

Mobility Patterns in Microcellular Wireless Networks Carnegie Mellon University Research Showcase @ CMU Department of Engineering and Public Policy Carnegie Institute of Technology 3-23 Mobility Patterns in Microcellular Wireless Networks Suttipong Thajchayapong

More information

Sponsored by. Nisarg Kothari Carnegie Mellon University April 26, 2011

Sponsored by. Nisarg Kothari Carnegie Mellon University April 26, 2011 Sponsored by Nisarg Kothari Carnegie Mellon University April 26, 2011 Motivation Why indoor localization? Navigating malls, airports, office buildings Museum tours, context aware apps Augmented reality

More information

Using sound levels for location tracking

Using sound levels for location tracking Using sound levels for location tracking Sasha Ames sasha@cs.ucsc.edu CMPE250 Multimedia Systems University of California, Santa Cruz Abstract We present an experiemnt to attempt to track the location

More information

Energy-Efficient Gaming on Mobile Devices using Dead Reckoning-based Power Management

Energy-Efficient Gaming on Mobile Devices using Dead Reckoning-based Power Management Energy-Efficient Gaming on Mobile Devices using Dead Reckoning-based Power Management R. Cameron Harvey, Ahmed Hamza, Cong Ly, Mohamed Hefeeda Network Systems Laboratory Simon Fraser University November

More information

IoT. Indoor Positioning with BLE Beacons. Author: Uday Agarwal

IoT. Indoor Positioning with BLE Beacons. Author: Uday Agarwal IoT Indoor Positioning with BLE Beacons Author: Uday Agarwal Contents Introduction 1 Bluetooth Low Energy and RSSI 2 Factors Affecting RSSI 3 Distance Calculation 4 Approach to Indoor Positioning 5 Zone

More information

OMESH Networks. OPM15 Application Note: Wireless Location and Tracking

OMESH Networks. OPM15 Application Note: Wireless Location and Tracking OMESH Networks OPM15 Application Note: Wireless Location and Tracking Version: 0.0.1 Date: November 10, 2011 Email: info@omeshnet.com Web: http://www.omeshnet.com/omesh/ 2 Contents 1.0 Introduction...

More information

MULTI-LAYERED HYBRID ARCHITECTURE TO SOLVE COMPLEX TASKS OF AN AUTONOMOUS MOBILE ROBOT

MULTI-LAYERED HYBRID ARCHITECTURE TO SOLVE COMPLEX TASKS OF AN AUTONOMOUS MOBILE ROBOT MULTI-LAYERED HYBRID ARCHITECTURE TO SOLVE COMPLEX TASKS OF AN AUTONOMOUS MOBILE ROBOT F. TIECHE, C. FACCHINETTI and H. HUGLI Institute of Microtechnology, University of Neuchâtel, Rue de Tivoli 28, CH-2003

More information

High Performance Computing Systems and Scalable Networks for. Information Technology. Joint White Paper from the

High Performance Computing Systems and Scalable Networks for. Information Technology. Joint White Paper from the High Performance Computing Systems and Scalable Networks for Information Technology Joint White Paper from the Department of Computer Science and the Department of Electrical and Computer Engineering With

More information

On the Estimation of Interleaved Pulse Train Phases

On the Estimation of Interleaved Pulse Train Phases 3420 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 48, NO. 12, DECEMBER 2000 On the Estimation of Interleaved Pulse Train Phases Tanya L. Conroy and John B. Moore, Fellow, IEEE Abstract Some signals are

More information

Cricket: Location- Support For Wireless Mobile Networks

Cricket: Location- Support For Wireless Mobile Networks Cricket: Location- Support For Wireless Mobile Networks Presented By: Bill Cabral wcabral@cs.brown.edu Purpose To provide a means of localization for inbuilding, location-dependent applications Maintain

More information

Wi-Fi Localization and its

Wi-Fi Localization and its Stanford's 2010 PNT Challenges and Opportunities Symposium Wi-Fi Localization and its Emerging Applications Kaveh Pahlavan, CWINS/WPI & Skyhook Wireless November 9, 2010 LBS Apps from 10s to 10s of Thousands

More information

Received-Signal-Strength-Based Logical Positioning Resilient to Signal Fluctuation

Received-Signal-Strength-Based Logical Positioning Resilient to Signal Fluctuation Received-Signal-Strength-Based Logical Positioning Resilient to Signal Fluctuation Thomas Locher, Roger Wattenhofer, Aaron Zollinger {lochert@student, wattenhofer@tik.ee, zollinger@tik.ee}.ethz.ch Computer

More information

2 Limitations of range estimation based on Received Signal Strength

2 Limitations of range estimation based on Received Signal Strength Limitations of range estimation in wireless LAN Hector Velayos, Gunnar Karlsson KTH, Royal Institute of Technology, Stockholm, Sweden, (hvelayos,gk)@imit.kth.se Abstract Limitations in the range estimation

More information

IoT Wi-Fi- based Indoor Positioning System Using Smartphones

IoT Wi-Fi- based Indoor Positioning System Using Smartphones IoT Wi-Fi- based Indoor Positioning System Using Smartphones Author: Suyash Gupta Abstract The demand for Indoor Location Based Services (LBS) is increasing over the past years as smartphone market expands.

More information

Learning and Using Models of Kicking Motions for Legged Robots

Learning and Using Models of Kicking Motions for Legged Robots Learning and Using Models of Kicking Motions for Legged Robots Sonia Chernova and Manuela Veloso Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {soniac, mmv}@cs.cmu.edu Abstract

More information

IF ONE OR MORE of the antennas in a wireless communication

IF ONE OR MORE of the antennas in a wireless communication 1976 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 52, NO. 8, AUGUST 2004 Adaptive Crossed Dipole Antennas Using a Genetic Algorithm Randy L. Haupt, Fellow, IEEE Abstract Antenna misalignment in

More information

Measurements of the propagation of UHF radio waves on an underground railway train. Creative Commons: Attribution 3.0 Hong Kong License

Measurements of the propagation of UHF radio waves on an underground railway train. Creative Commons: Attribution 3.0 Hong Kong License Title Measurements of the propagation of UHF radio waves on an underground railway train Author(s) Zhang, YP; Jiang, ZR; Ng, TS; Sheng, JH Citation Ieee Transactions On Vehicular Technology, 2000, v. 49

More information

best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT

best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT Overview Since the mobile device industry is alive and well, every corner of the ever-opportunistic tech

More information

Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B

Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B Department of Electronics and Communication Engineering K L University, Guntur, India Abstract In multi user environment number of users

More information

It is well known that GNSS signals

It is well known that GNSS signals GNSS Solutions: Multipath vs. NLOS signals GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are invited to send their questions to the columnist,

More information

Mobile Positioning in Wireless Mobile Networks

Mobile Positioning in Wireless Mobile Networks Mobile Positioning in Wireless Mobile Networks Peter Brída Department of Telecommunications and Multimedia Faculty of Electrical Engineering University of Žilina SLOVAKIA Outline Why Mobile Positioning?

More information

Distributed Virtual Environments!

Distributed Virtual Environments! Distributed Virtual Environments! Introduction! Richard M. Fujimoto! Professor!! Computational Science and Engineering Division! College of Computing! Georgia Institute of Technology! Atlanta, GA 30332-0765,

More information

Development of a Wireless Communications Planning Tool for Optimizing Indoor Coverage Areas

Development of a Wireless Communications Planning Tool for Optimizing Indoor Coverage Areas Development of a Wireless Communications Planning Tool for Optimizing Indoor Coverage Areas A. Dimitriou, T. Vasiliadis, G. Sergiadis Aristotle University of Thessaloniki, School of Engineering, Dept.

More information

Indoor Location Detection

Indoor Location Detection Indoor Location Detection Arezou Pourmir Abstract: This project is a classification problem and tries to distinguish some specific places from each other. We use the acoustic waves sent from the speaker

More information

Bloodhound RMS Product Overview

Bloodhound RMS Product Overview Page 2 of 10 What is Guard Monitoring? The concept of personnel monitoring in the security industry is not new. Being able to accurately account for the movement and activity of personnel is not only important

More information

Learning and Using Models of Kicking Motions for Legged Robots

Learning and Using Models of Kicking Motions for Legged Robots Learning and Using Models of Kicking Motions for Legged Robots Sonia Chernova and Manuela Veloso Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {soniac, mmv}@cs.cmu.edu Abstract

More information

Managing Complex Land Mobile Radio Systems

Managing Complex Land Mobile Radio Systems Anyone responsible for a multiple-site, multiple-channel land mobile radio communications system knows that management of even just a single site can often be a complex task. Failures or degradation in

More information

A New WKNN Localization Approach

A New WKNN Localization Approach A New WKNN Localization Approach Amin Gholoobi Faculty of Pure and Applied Sciences Open University of Cyprus Nicosia, Cyprus Email: amin.gholoobi@st.ouc.ac.cy Stavros Stavrou Faculty of Pure and Applied

More information

Location Based Technologies

Location Based Technologies Location Based Technologies I have often wondered whether people really understand Location Based Services (LBS) technology and whether they would like a bit more insight into how exactly location based

More information

DIGITAL SIGNAL PROCESSOR WITH EFFICIENT RGB INTERPOLATION AND HISTOGRAM ACCUMULATION

DIGITAL SIGNAL PROCESSOR WITH EFFICIENT RGB INTERPOLATION AND HISTOGRAM ACCUMULATION Kim et al.: Digital Signal Processor with Efficient RGB Interpolation and Histogram Accumulation 1389 DIGITAL SIGNAL PROCESSOR WITH EFFICIENT RGB INTERPOLATION AND HISTOGRAM ACCUMULATION Hansoo Kim, Joung-Youn

More information

ArrayTrack: A Fine-Grained Indoor Location System

ArrayTrack: A Fine-Grained Indoor Location System ArrayTrack: A Fine-Grained Indoor Location System Jie Xiong, Kyle Jamieson University College London April 3rd, 2013 USENIX NSDI 13 Precise location systems are important Outdoors: GPS Accurate for navigation

More information

Location Services with Riverbed Xirrus APPLICATION NOTE

Location Services with Riverbed Xirrus APPLICATION NOTE Location Services with Riverbed Xirrus APPLICATION NOTE Introduction Indoor location tracking systems using Wi-Fi, as well as other shorter range wireless technologies, have seen a significant increase

More information

Paper presented at the Int. Lightning Detection Conference, Tucson, Nov. 1996

Paper presented at the Int. Lightning Detection Conference, Tucson, Nov. 1996 Paper presented at the Int. Lightning Detection Conference, Tucson, Nov. 1996 Detection Efficiency and Site Errors of Lightning Location Systems Schulz W. Diendorfer G. Austrian Lightning Detection and

More information

Detecting Intra-Room Mobility with Signal Strength Descriptors

Detecting Intra-Room Mobility with Signal Strength Descriptors Detecting Intra-Room Mobility with Signal Strength Descriptors Authors: Konstantinos Kleisouris Bernhard Firner Richard Howard Yanyong Zhang Richard Martin WINLAB Background: Internet of Things (Iot) Attaching

More information

JOHANN CATTY CETIM, 52 Avenue Félix Louat, Senlis Cedex, France. What is the effect of operating conditions on the result of the testing?

JOHANN CATTY CETIM, 52 Avenue Félix Louat, Senlis Cedex, France. What is the effect of operating conditions on the result of the testing? ACOUSTIC EMISSION TESTING - DEFINING A NEW STANDARD OF ACOUSTIC EMISSION TESTING FOR PRESSURE VESSELS Part 2: Performance analysis of different configurations of real case testing and recommendations for

More information

Statistical Pulse Measurements using USB Power Sensors

Statistical Pulse Measurements using USB Power Sensors Statistical Pulse Measurements using USB Power Sensors Today s modern USB Power Sensors are capable of many advanced power measurements. These Power Sensors are capable of demodulating the signal and processing

More information

Specifying, predicting and testing:

Specifying, predicting and testing: Specifying, predicting and testing: Three steps to coverage confidence on your digital radio network EXECUTIVE SUMMARY One of the most important properties of a radio network is coverage. Yet because radio

More information

Population Adaptation for Genetic Algorithm-based Cognitive Radios

Population Adaptation for Genetic Algorithm-based Cognitive Radios Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications

More information

Indoor Localization and Tracking using Wi-Fi Access Points

Indoor Localization and Tracking using Wi-Fi Access Points Indoor Localization and Tracking using Wi-Fi Access Points Dubal Omkar #1,Prof. S. S. Koul *2. Department of Information Technology,Smt. Kashibai Navale college of Eng. Pune-41, India. Abstract Location

More information

Fuzzy Logic Technique for RF Based Localisation System in Built Environment

Fuzzy Logic Technique for RF Based Localisation System in Built Environment Fuzzy Logic Technique for RF Based Localisation System in Built Environment A. Al-Jumaily, B. Ramadanny Mechatronics and Intelligent Systems Group, Faculty of Engineering, University of Technology, Sydney

More information

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira

AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

RADAR: an In-building RF-based user location and tracking system

RADAR: an In-building RF-based user location and tracking system RADAR: an In-building RF-based user location and tracking system BY P. BAHL AND V.N. PADMANABHAN PRESENTED BY: AREEJ ALTHUBAITY Goal and Motivation Previous Works Experimental Testbed Basic Idea Offline

More information

THE APPLICATION OF ZIGBEE PHASE SHIFT MEASUREMENT IN RANGING

THE APPLICATION OF ZIGBEE PHASE SHIFT MEASUREMENT IN RANGING Acta Geodyn. Geomater., Vol. 12, No. 2 (178), 145 149, 2015 DOI: 10.13168/AGG.2015.0014 journal homepage: http://www.irsm.cas.cz/acta ORIGINAL PAPER THE APPLICATION OF ZIGBEE PHASE SHIFT MEASUREMENT IN

More information

Maximizing MIMO Effectiveness by Multiplying WLAN Radios x3

Maximizing MIMO Effectiveness by Multiplying WLAN Radios x3 ATHEROS COMMUNICATIONS, INC. Maximizing MIMO Effectiveness by Multiplying WLAN Radios x3 By Winston Sun, Ph.D. Member of Technical Staff May 2006 Introduction The recent approval of the draft 802.11n specification

More information

Enhanced Positioning Method using WLAN RSSI Measurements considering Dilution of Precision of AP Configuration

Enhanced Positioning Method using WLAN RSSI Measurements considering Dilution of Precision of AP Configuration Enhanced Positioning Method using WLAN RSSI Measurements considering Dilution of Precision of AP Configuration Cong Zou, A Sol Kim, Jun Gyu Hwang, Joon Goo Park Graduate School of Electrical Engineering

More information

Herecast: An Open Infrastructure for Location-Based Services using WiFi

Herecast: An Open Infrastructure for Location-Based Services using WiFi Herecast: An Open Infrastructure for Location-Based Services using WiFi Mark Paciga and Hanan Lutfiyya Presented by Emmanuel Agu CS 525M Introduction User s context includes location, time, date, temperature,

More information

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of

Game Mechanics Minesweeper is a game in which the player must correctly deduce the positions of Table of Contents Game Mechanics...2 Game Play...3 Game Strategy...4 Truth...4 Contrapositive... 5 Exhaustion...6 Burnout...8 Game Difficulty... 10 Experiment One... 12 Experiment Two...14 Experiment Three...16

More information

Primer on GPS Operations

Primer on GPS Operations MP Rugged Wireless Modem Primer on GPS Operations 2130313 Rev 1.0 Cover illustration by Emma Jantz-Lee (age 11). An Introduction to GPS This primer is intended to provide the foundation for understanding

More information

R ied extensively for the evaluation of different transmission

R ied extensively for the evaluation of different transmission IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT. VOL. 39. NO. 5. OCTOBER 1990 Measurement and Analysis of the Indoor Radio Channel in the Frequency Domain 75 I STEVEN J. HOWARD AND KAVEH PAHLAVAN,

More information

Spatially Varying Color Correction Matrices for Reduced Noise

Spatially Varying Color Correction Matrices for Reduced Noise Spatially Varying olor orrection Matrices for educed oise Suk Hwan Lim, Amnon Silverstein Imaging Systems Laboratory HP Laboratories Palo Alto HPL-004-99 June, 004 E-mail: sukhwan@hpl.hp.com, amnon@hpl.hp.com

More information

A Study on Performance Analysis of Distance Estimation RSSI in Wireless Sensor Networks

A Study on Performance Analysis of Distance Estimation RSSI in Wireless Sensor Networks A Study on Performance Analysis of Distance Estimation RSSI in Wireless Sensor Networks S.Satheesh 1, Dr.V.Vinoba 2 1 Assistant professor, T.J.S. Engineering College, Chennai-601206, Tamil Nadu, India.

More information

Jager UAVs to Locate GPS Interference

Jager UAVs to Locate GPS Interference JIFX 16-1 2-6 November 2015 Camp Roberts, CA Jager UAVs to Locate GPS Interference Stanford GPS Research Laboratory and the Stanford Intelligent Systems Lab Principal Investigator: Sherman Lo, PhD Area

More information

The Technologies behind a Context-Aware Mobility Solution

The Technologies behind a Context-Aware Mobility Solution The Technologies behind a Context-Aware Mobility Solution Introduction The concept of using radio frequency techniques to detect or track entities on land, in space, or in the air has existed for many

More information

Analysis Techniques for WiMAX Network Design Simulations

Analysis Techniques for WiMAX Network Design Simulations Technical White Paper Analysis Techniques for WiMAX Network Design Simulations The Power of Smart Planning 1 Analysis Techniques for WiMAX Network Jerome Berryhill, Ph.D. EDX Wireless, LLC Eugene, Oregon

More information

Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network

Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Balancing Bandwidth and Bytes: Managing storage and transmission across a datacast network Pete Ludé iblast, Inc. Dan Radke HD+ Associates 1. Introduction The conversion of the nation s broadcast television

More information

UWB Small Scale Channel Modeling and System Performance

UWB Small Scale Channel Modeling and System Performance UWB Small Scale Channel Modeling and System Performance David R. McKinstry and R. Michael Buehrer Mobile and Portable Radio Research Group Virginia Tech Blacksburg, VA, USA {dmckinst, buehrer}@vt.edu Abstract

More information

A New Power Control Algorithm for Cellular CDMA Systems

A New Power Control Algorithm for Cellular CDMA Systems ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 4, No. 3, 2009, pp. 205-210 A New Power Control Algorithm for Cellular CDMA Systems Hamidreza Bakhshi 1, +, Sepehr Khodadadi

More information

WhereAReYou? An Offline Bluetooth Positioning Mobile Application

WhereAReYou? An Offline Bluetooth Positioning Mobile Application WhereAReYou? An Offline Bluetooth Positioning Mobile Application SPCL-2013 Project Report Daniel Lujan Villarreal dluj@itu.dk ABSTRACT The increasing use of social media and the integration of location

More information

The Intraclass Correlation Coefficient

The Intraclass Correlation Coefficient Quality Digest Daily, December 2, 2010 Manuscript No. 222 The Intraclass Correlation Coefficient Is your measurement system adequate? In my July column Where Do Manufacturing Specifications Come From?

More information

OFDM Pilot Optimization for the Communication and Localization Trade Off

OFDM Pilot Optimization for the Communication and Localization Trade Off SPCOMNAV Communications and Navigation OFDM Pilot Optimization for the Communication and Localization Trade Off A. Lee Swindlehurst Dept. of Electrical Engineering and Computer Science The Henry Samueli

More information

Indoor Positioning Using a Modern Smartphone

Indoor Positioning Using a Modern Smartphone Indoor Positioning Using a Modern Smartphone Project Members: Carick Wienke Project Advisor: Dr. Nicholas Kirsch Finish Date: May 2011 May 20, 2011 Contents 1 Problem Description 3 2 Overview of Possible

More information

FOR THE PAST few years, there has been a great amount

FOR THE PAST few years, there has been a great amount IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 4, APRIL 2005 549 Transactions Letters On Implementation of Min-Sum Algorithm and Its Modifications for Decoding Low-Density Parity-Check (LDPC) Codes

More information

Microsoft Scrolling Strip Prototype: Technical Description

Microsoft Scrolling Strip Prototype: Technical Description Microsoft Scrolling Strip Prototype: Technical Description Primary features implemented in prototype Ken Hinckley 7/24/00 We have done at least some preliminary usability testing on all of the features

More information

Improving the Accuracy of Wireless LAN based Location Determination Systems using Kalman Filter and Multiple Observers

Improving the Accuracy of Wireless LAN based Location Determination Systems using Kalman Filter and Multiple Observers Improving the Accuracy of Wireless LAN based Location Determination Systems using Kalman Filter and Multiple Observers Raman Kumar K, Varsha Apte, Yogesh A Powar Dept. of Computer Science and Engineering

More information

Increasing the precision of mobile sensing systems through super-sampling

Increasing the precision of mobile sensing systems through super-sampling Increasing the precision of mobile sensing systems through super-sampling RJ Honicky, Eric A. Brewer, John F. Canny, Ronald C. Cohen Department of Computer Science, UC Berkeley Email: {honicky,brewer,jfc}@cs.berkeley.edu

More information

Neural Network Approach to Model the Propagation Path Loss for Great Tripoli Area at 900, 1800, and 2100 MHz Bands *

Neural Network Approach to Model the Propagation Path Loss for Great Tripoli Area at 900, 1800, and 2100 MHz Bands * Neural Network Approach to Model the Propagation Path Loss for Great Tripoli Area at 9, 1, and 2 MHz Bands * Dr. Tammam A. Benmus Eng. Rabie Abboud Eng. Mustafa Kh. Shater EEE Dept. Faculty of Eng. Radio

More information

WiFi Fingerprinting Signal Strength Error Modeling for Short Distances

WiFi Fingerprinting Signal Strength Error Modeling for Short Distances WiFi Fingerprinting Signal Strength Error Modeling for Short Distances Vahideh Moghtadaiee School of Surveying and Geospatial Engineering University of New South Wales Sydney, Australia v.moghtadaiee@student.unsw.edu.au

More information

Session 5 Variation About the Mean

Session 5 Variation About the Mean Session 5 Variation About the Mean Key Terms for This Session Previously Introduced line plot median variation New in This Session allocation deviation from the mean fair allocation (equal-shares allocation)

More information

Indoor Location System with Wi-Fi and Alternative Cellular Network Signal

Indoor Location System with Wi-Fi and Alternative Cellular Network Signal , pp. 59-70 http://dx.doi.org/10.14257/ijmue.2015.10.3.06 Indoor Location System with Wi-Fi and Alternative Cellular Network Signal Md Arafin Mahamud 1 and Mahfuzulhoq Chowdhury 1 1 Dept. of Computer Science

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

EXTRACTING AND USING POSITION INFORMATION IN WLAN NETWORKS

EXTRACTING AND USING POSITION INFORMATION IN WLAN NETWORKS EXTRACTING AND USING POSITION INFORMATION IN WLAN NETWORKS Antti Seppänen Teliasonera Finland Vilhonvuorenkatu 8 A 29, 00500 Helsinki, Finland Antti.Seppanen@teliasonera.com Jouni Ikonen Lappeenranta University

More information

Figure 121: Broadcast FM Stations

Figure 121: Broadcast FM Stations BC4 107.5 MHz Large Grid BC5 107.8 MHz Small Grid Figure 121: Broadcast FM Stations Page 195 This document is the exclusive property of Agilent Technologies UK Limited and cannot be reproduced without

More information

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions

CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions CHAPTER 10 CONCLUSIONS AND FUTURE WORK 10.1 Conclusions This dissertation reported results of an investigation into the performance of antenna arrays that can be mounted on handheld radios. Handheld arrays

More information

Analysis of the impact of map-matching on the accuracy of propagation models

Analysis of the impact of map-matching on the accuracy of propagation models Adv. Radio Sci., 5, 367 372, 2007 Author(s) 2007. This work is licensed under a Creative Commons License. Advances in Radio Science Analysis of the impact of map-matching on the accuracy of propagation

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 29 August 2017 Version of attached le: Accepted Version Peer-review status of attached le: Not peer-reviewed Citation for published item: Chiu, Wei-Yu and Sun,

More information

Characterization of L5 Receiver Performance Using Digital Pulse Blanking

Characterization of L5 Receiver Performance Using Digital Pulse Blanking Characterization of L5 Receiver Performance Using Digital Pulse Blanking Joseph Grabowski, Zeta Associates Incorporated, Christopher Hegarty, Mitre Corporation BIOGRAPHIES Joe Grabowski received his B.S.EE

More information

RSSI-Based Localization in Low-cost 2.4GHz Wireless Networks

RSSI-Based Localization in Low-cost 2.4GHz Wireless Networks RSSI-Based Localization in Low-cost 2.4GHz Wireless Networks Sorin Dincă Dan Ştefan Tudose Faculty of Computer Science and Computer Engineering Polytechnic University of Bucharest Bucharest, Romania Email:

More information

RECENT developments in the area of ubiquitous

RECENT developments in the area of ubiquitous LocSens - An Indoor Location Tracking System using Wireless Sensors Faruk Bagci, Florian Kluge, Theo Ungerer, and Nader Bagherzadeh Abstract Ubiquitous and pervasive computing envisions context-aware systems

More information