Error modeling in RE-based location detection (EMLD) for pervasive computing environments

被引:0
作者
Swami, Niraj [1 ]
Ahamed, Sheikh I. [1 ]
机构
[1] Marquette Univ, Milwaukee, WI 53233 USA
来源
ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS | 2007年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, a plethora of signal-based (Radio Frequency based) location detection techniques have been proposed for pervasive computing due to the limited scope of GPS when considering indoor and highly urban environments. However, these techniques have a major drawback in the error they incorporate. This paper addresses the problem of erratic location detection of mobile devices when signal-based technologies (non-GPS based solutions) are used. It generates an error model, EMLD, the parameters of which may be modified and used based on the surroundings of the target location to generate accurate location coordinates. This paper also provides an implementation of EMLD that can be used in order to determine location coordinates. It is a highly generalized approach that becomes more specific based on clients' needs that result in the assumptions and setup criteria of the approach.
引用
收藏
页码:783 / +
页数:2
相关论文
共 17 条
  • [1] Design and implementation of a Bluetooth signal strength based location sensing system
    Bandara, U
    Hasegawa, M
    Inoue, M
    Morikawa, H
    Aoyama, T
    [J]. RAWCON: 2004 IEEE RADIO AND WIRELESS CONFERENCE, PROCEEDINGS, 2004, : 319 - 322
  • [2] BIAZ S, 2005, P 2005 INT C WIR COM, V1, P602
  • [3] Chao-Lin Wu, 2004, 2004 IEEE International Conference on Networking, Sensing and Control (IEEE Cat. No.04EX761), P1026
  • [4] Signal strength based indoor geolocation
    Chen, YG
    Kobayashi, H
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2002, : 436 - 439
  • [5] Radio frequency-based personnel location systems
    Christ, R
    Lavigne, R
    [J]. 34TH ANNUAL 2000 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2000, : 141 - 150
  • [6] IVARS P, 1998, MATH TOURIST NEW UPD
  • [7] Johnson MJ, 2005, CONSUM COMM NETWORK, P533
  • [8] Kaemarungsi K, 2004, PROCEEDINGS OF MOBIQUITOUS 2004, P14
  • [9] Krishnakumar AS, 2005, IEEE INFOCOM SER, P642
  • [10] Krumm J, 2004, PROCEEDINGS OF MOBIQUITOUS 2004, P4