SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2278 – 1323
                                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 4, June 2012



     Location Fingerprinting of Mobile Terminals by
                  Using Wi-Fi Device
                                                 Ruchi Setiya, Prof. Avinash Gaur




                                                                         correct location of users and mobile devices. While the
Abstract— The increasing demand for location-aware services
inside buildings has made indoor positioning a significant               outdoor location can be easily calculated, using Technologies
research topic. While the outdoor location can be easily                 such as GPS (Global Positioning System), it is more difficult
calculated, using technologies such as GPS. The location using           to obtain when the location scenario is an indoor
fingerprinting technique is consist of two different phases: the         environment. One of these techniques is fingerprinting
first phase is the calibration phase at specific points called           technique. From the several wireless communications
calibration points within the environment, the signal strength at        technologies IEEE802.11 is probably the most used in
each point is recorded and saved in a database; the second               Wireless Local Area Networks, so it was chosen for this work
phase is the location estimation phase where the object                  [5].
measures the signal strength at its current position and then,
using a location estimation algorithm, the measured signal is                The techniques used to determine the location of a mobile
estimated with values stored in the database in order to obtain          terminal can be divided into three main categories
an approximation on the user's current position. In this paper a         Triangulation, Proximity and Scene Analysis. When using
fingerprinting based localization of mobile terminals is done by         wireless networks to do the location estimation, any property
using Wi-Fi device. For this approach a data collection was
                                                                         of the wireless signal can be used in the process, as long as it
made without the presence of the user near the laptop. For each
calibration point, the RSS for each access point was taken and           is possible to establish a relation between the property of the
stored in the database. After collecting the data the Fingerprint        wireless signal used to determine the location and the actual
Map is generated to test the chosen LEA. The chosen Location             coordinates of the mobile device. Fingerprinting is a location
Estimation Algorithm is k-Nearest Neighbor Algorithm with                technique that uses the scene analysis technique. It consists in
Euclidean, Manhattan Distance and Chebychev Distance.                    observing and analysing the patterns of electromagnetic
   Index Terms— fingerprinting, Wi-Fi, wireless network, location        signals and their variations along time. A given property of
estimation algorithm.                                                    the electromagnetic signal received from a set of references
                                                                         are read and then are compared with a set of previously stored
                                                                         values, called the Fingerprint Map (FM). From this
                        I. INTRODUCTION                                  comparison, the Location Estimation Algorithm (LEA)
                                                                         outputs the current location. Two different concepts of
    For the past few years, there has been a high interest in            domain exist in this technique: the signals domain and the
mobile terminal (MT) positioning. The primary motivation                 spatial domain. The signals domain is an n-dimensional
for the development of mobile positioning systems was due                space, where the number of dimensions equals the number of
to the mandatory requirement of security services. Although              references that exist in the scene under analysis. The second
the starting was because of security-emergency need, later it            domain is related to the space where the mobile node to
has found various applications in many fields, e.g., to                  locate is. The number of dimensions of this space depends on
increase data throughput in cellular systems. There exist                the type of output of the Location estimation Algorithm
many algorithms developed for the MT localization problem.               (LEA) [6]. It can be a single label indicating the location of
The traditional geometrical localization methods are                     the user (e.g. classroom 1); can be a two dimension
designed to work under line-of-sight (LoS) conditions.                   coordinates system (x; y), a three dimensional coordinates
However, LoS conditions might not always be present                      system (x; y; z), etc. Location fingerprinting comprises of
between the base station (BS) and the MT. Therefore,                     two distinct phases as shown in Figure 1., one is calibration
fingerprinting-based localization techniques which are also              phase on which data is collected and the Fingerprint Map
the subject of this paper attract attention because of their             (FM) is generated and a second phase, is location estimation
ability to work also in multipath and non-line-of-sight                  phase also called as on-line phase when data is collected from
(NLoS) environments. The effectiveness of Location Based                 the wireless communication transceiver are compared with
Systems depends on the                                                   information on the FM and the location is made.
   Manuscript received May, 2012.
   Ruchi Setiya, Electronics and Communication Engineering, Gyan Ganga
College of Technology., (e-mail:ruchi_setiya09@yahoo.co.in). Jabalpur,
India,
  Prof. Avinash Gaur, Electronics and Communication Engineering, Gyan
Ganga College of Technology., (e-mail:avinash.gaur@rediffmail.com).
Jabalpur, India,




                                                                                                                                     311
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 3, May 2012

                                                                      involves time measurement, a specific clock resolution
                                                                      must be attainable by the system according to the timing
                                                                      technology used.

                                                                    iii.Attenuation - The intensity of the emitted signal is
                                                                      inversely proportional to the square of the distance from
                                                                      the source. Using this relation and given the signal
                                                                      strength at the source, the measured signal strength could
                                                                      be used to estimate the distance of the object from the
    Figure 1. The two phases of location fingerprinting               source. Measuring the distance using attenuation is
                                                                      usually less accurate than using time-of-flight specially
                                                                      in environments with many obstructions which cause a
     II. LOCATION USING WIRELESS NETWORKS                             lot of signal reflection.

                                                                  B. Location using Angulation
A. Location using Trilateration
                                                                       In angulation, angles instead of distances are used to
   Trilateration falls under the category of Triangulation
                                                                  determine the location of an object. To compute the position,
where the geometric properties of triangles are used to
                                                                  two angle measurements in addition to one length
compute the objects' locations. The lateration technique
                                                                  measurement between the two reference points are required.
works by measuring the distance to three distinct
                                                                  Using an array of multiple phased antennas with a known
non-collinear reference points from the object of interest X
                                                                  distance between them, by measuring the phase shift angle
and then applying a triangulation algorithm to obtain the
                                                                  between the signal arriving at the first antenna and the signal
position of the object. The triangulation algorithm is
                                                                  arriving at the second antenna and given the differences in
achieved by drawing a circle of radius d which centered at the
                                                                  arrival time and the geometry of the array, the system can
reference point, where d is the measured distance from the
                                                                  compute the angle from which the transmission was emitted
access point to the object of interest at X. Using three access
                                                                  [4].
points, three circles could be drawn which would intersect at
a point X. This point would indicate the location of the user.
In order to measure such distance, three general approaches       C. Location using Fingerprinting
exist [4].                                                           The scene analysis technique depends on analyzing the
                                                                  ―scene‖ to obtain features that are easily compared and
                                                                  represented. A scene can be described either by images for
                                                                  the location or by the signal strength at that location. In static
                                                                  scene analysis, the observed features are looked up in the
                                                                  database that maps objects to locations. In differential scene
                                                                  analysis, the difference between successive scenes is tracked.
                                                                  Those differences will imply that the user has moved. If
                                                                  features are known to be at specific locations, the observer
                                                                  can compute its location relative to them. The advantage of
                                                                  such system is that it can act independently from an external
                                                                  server by storing the database locally which means that less
                                                                  power is required for data transmission and the privacy of the
                                                                  user could be maintained. The disadvantages include the
                                                                  need for a pre built lookup database of the features that might
                                                                  need to be rebuilt if the features of the scene change [5].
                                                                  Fingerprinting is a type of scene analysis. Usually, the
                                                                  Fingerprinting approach consists of two stages:
                  Figure 2.3: Triangulation
                                                                    i. Calibration Phase - At specific points called calibration
                                                                       points within the environment, the signal strength, along
                                                                       with other parameters such as the signal to noise ratio at
   i.Direct - This method involves physically measuring the            each point is recorded and saved in a database. For the
     distance between the mobile object and three different            Fingerprinting database to be accurate, a significant
     reference points which is infeasible and inapplicable to          number of calibration points should be made available
     the applications of indoor positioning. It generally              which increases the time needed for the calibration
     involves robots that measure the distances through                phase.
     extension of probes.
                                                                   ii. Location Estimation Phase - The object measures the
                                                                       signal strength at its current position and then, using a
  ii.Time-of-Flight - Time-of-Flight works by recording the            location estimation algorithm, the measured signal is
     time it takes for a signal to propagate from a transmitter        estimated with values stored in the database in order to
     to a receiver at a known velocity. Since this method              obtain an approximation on the user's current position.


                                                                                                                               312
                                              All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 4, June 2012

    The estimation could be done on the client side which           be the list of calibration point coordinates corresponding the
    requires that the database of fingerprints is stored            list of K fingerprints
    locally, thus increasing the storage and memory
    requirements on the client. The other option is estimation      which satisfy
    on the server side which increases the load on the server
    and possibly the load on the network.
                                                                    where                    and the function d (∙) is a chosen
                                                                    distance measure. The Euclidean norm is widely used, but the
D. Location using Proximity                                         Manhattan norm is also common. The most common choice
    The proximity technique is useful in knowing whether an         as a MU’s location estimator         is the average of the
object is near a specific location rather than knowing the          coordinates of the K ―nearest‖ fingerprints, that is
exact location. One type of proximity detection relies on the
presence of physical proximity detectors such as pressure
pads. Another type of proximity detection relies on the usage       The estimator is a very restricted approach to compute the
of automatic ID systems such as ATM machines or                     location estimate, because the number of possible estimates is
point-of-sale credit card machines where accessing an ATM           always finite and is a function of the number of CPs.
at a certain time gives an indicator of the place of that user at    The location estimation is done by using the value K = 1,
that time. In a university for example, the use of computer         which leads to the nearest neighbor (NN) method. The
login history can help in estimating the possible user location.    Euclidean norm is used as a distance measure, but the
The accuracy of the proximity detection system is usually           estimate is rejected if
lower than other methods so it cannot be used alone and
could be used together with another method [4].


       III. LOCATION USING FINGERPRINTING                           where CPi is the ―nearest‖ calibration point.
   In this section some details about the procedures used to
determine the location of a mobile node using fingerprinting        C. Euclidean distance
and the above mentioned LEA algorithms are presented. To               The Euclidean distance between two vectors,
do the location, the two phases required by fingerprinting
must be made [7]. Although any property of the wireless                             and             can be represented by
signal can be used in this type of analysis, in this work the
fingerprinting analysis will be made based on the RSS values.

A. Building the Fingerprint Map                                     where n represents the fingerprint size and the observation
    Prior to the acquisition of the fingerprint map, it must be     size. The fingerprint size is the number of access points that
established the location of the points (spatial domain) where       has been saved in the database for a particular reading vector.
the RSS readings are going to be made. Data is then acquired        The observation size is the number of access points that have
for each one of the previously defined points. Data collected       been ―seen‖ in this observation. The value of n is equal to the
and stored in this phase includes the value of the RSS for          length of the vectors                      . The length of the
each reference found by the mobile terminal, for each point         vectors be equal to 3, 2 or 1.
of the spatial domain. The number of references (and
therefore dimensions) might be different for each point in the      D. Chebychev Distance
spatial domain [5]. After collecting all data, the FM is               The Chebychev distance           between two vectors,
generated. This is made by calculating the average value of
                                                                                   and                       , is given by
the RSS for every reference at each point. In the database it is
then stored for each point and reference the corresponding
values of the average RSS.                                             This equals the limit of the   metrics. The    metrics/
                                                                    spaces are function spaces defined using a natural
B. K-nearest neighbor Algorithm
                                                                    generalization of the p-norm for finite-dimensional vector
    K-nearest neighbor (KNN) method is one of the simplest          spaces.
ways to determine the location of the MU by using the
fingerprint map. KNN algorithm is a location fingerprinting
method that considers K CPs (Calibration Points) to calculate
the approximate position of the user. The idea is to compare
the fingerprints in the fingerprint map to the observed                Hence it is also known as the L∞ metrics.
measurements and to select K calibration points with the
―nearest‖ RSSI values. In the KNN approach, the vector y
used as a measurement and compared to the fingerprint map,          E. Manhattan Distance
which includes only the sample averages. Let the list                  The Manhattan distance, between two vectors and in
                                                                    an n-dimensional real vector space with fixed Cartesian
                                                                    coordinate system, is the sum of the lengths of the projections


                                                                                                                               313
                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                                             Volume 1, Issue 3, May 2012

of the line segment between the points onto the coordinate                            V. CONCLUSION AND FUTURE WORK
axes. More formally,                                                        In this research, a Fingerprinting approach is proposed
                                                                        that provides a location aware service. The approach is based
                                                                        on the single tier architecture that is both Calibration Phase
                                                                        and Location Estimation Phase is carried out by using same
                                                                        application. The Location Estimation is done by using the
    Finally, after calculating the Euclidean distance,
                                                                        k-Nearest Neighbor Algorithm with Euclidean Distance,
Chebychev distance, Manhattan distance between the
                                                                        Manhattan Distance and Chebychev Distance. The accuracy
observation vector and all the fingerprints that were returned,
                                                                        of Euclidean Distance and Manhattan Distance are better as
the fingerprint vector that yields the minimum distance is
                                                                        compare to Chebychev Distance.
considered the best match. The SSID (Signal Strength ID)
                                                                           The current prototype is implemented on a laptop. For a
associated with this fingerprint is returned to the client, as
                                                                        truly mobile application, this project could be implemented
well as the X and Y coordinates for the map that is associated
                                                                        on mobile operating system, so that it works on mobile
with that area.
                                                                        devices like iPhone, Windows Phone 7, Black Berry10,
                                                                        Android. In the future, the system's accuracy could be
                 IV. TESTS AND RESULTS
                                                                        enhanced by using some other probabilistic approach. Some
   The chosen scenario (Figure 3.) consists of four rooms               of the improvements will be made related with the calibration
and a hall connecting them. The small circles on the map                procedure for each mobile terminal, and the use of other type
represent the calibration points where data was collected and           of LEA, such as based on pattern search.
for which the Fingerprint Map was generated. Also the
location of the three Access Points used as references are                                              REFERENCES
presented in the map.
                                                                        [1] P. Bahl and V. Padmanabhan, ―RADAR: an in-building RF-based user
                                                                            location and tracking system,‖INFOCOM 2000. Nineteenth Annual
                                                                            Joint Conference of the IEEE Computer and Communications
                                                                            Societies. Proceedings. IEEE, vol. 2, pp. 775–784 vol.2, 2000
                                                                        [2] C. Komar and C. Ersoy, ―Location tracking and location based service
                                                                            using IEEE 802.11 WLAN infrastructure,‖ in European Wireless,
                                                                            Barcelona Spain, February 2004.
                                                                        [3] Taheri, A. Singh, and E. Agu, ―Location fingerprinting on infrastructure
                                                                            802.11 wireless local area networks,‖ in LCN ’04: Proceedings of the
                                                                            29th Annual IEEE International Conference on Local Computer
                                                                            Networks. Washington, DC, USA: IEEE Computer Society, 2004
                                                                        [4] H. Liu, H. Darabi, P. Banerjee, and J. Liu, ―Survey of wireless indoor
                                                                            positioning techniques and systems, “Systems, Man, and Cybernetics,
                                                                            Part C: Applications and Reviews, IEEE Transactions on, vol. 37,
                                                                            2007.
Figure 3. Map of the area where the location tests were made, the       [5] Serodio, L. Coutinho, H. Pinto, and P. Mestre, ―A Comparison of
  circles represent the location of the points considered for the           Multiple Algorithms for Fingerprinting using IEEE802.11,‖ in Lecture
                          fingerprint map.                                  Notes in Engineering and Computer Science: Proceedings of The
    The acquisition of the data to build the FM. It was made                World Congress on Engineering 2011, WCE 2011, 6 -8 July, 2011,
                                                                            London, U.K., 2011
by using an application developed in Visual C# 3.0 with
                                                                        [6] Pedro Mestre, Luis Coutinhoy, Luis Reigotoy, Joao Matiasz and Carlos
.NET Framework 3.5, by using a laptop computer (HP G6                       Serodio, ―Hybrid technique for Fingerprinting using IEEE802.11
Notebook with Wireless Network Adapter) running                             Wireless Networks,‖2011 International Conference On Indoor
Windows 7. The data collection was made without the                         Positioning And Indoor Navigation (IPIN), 21-23 September 2011.
presence of the user near the laptop. For each calibration              [7] M. Satyanarayanan, ―Pervasive computing: vision and challenges‖,
point, the RSS for each access point was taken and stored in                Personal Communications, IEEE [see also IEEE Wireless
                                                                            Communications], vol. 8, no. 4, pp. 10-17, 2001.
the database. After collecting the data the Fingerprint Map is
generated to test the chosen LEA. The chosen LEA is
k-nearest neighbor algorithm.




Figure 4. Calibrate data to test the Location Estimation Algorithm to
                    estimate the user’s location.


                                                                                                                                               314
                                                All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksArtificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
Survey of local binary pattern for fire & smoke using
Survey of local binary pattern for fire & smoke usingSurvey of local binary pattern for fire & smoke using
Survey of local binary pattern for fire & smoke usingeSAT Publishing House
 
Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNIRJET Journal
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
Effect of Glittering and Reflective Objects of Different Colors to the Output...
Effect of Glittering and Reflective Objects of Different Colors to the Output...Effect of Glittering and Reflective Objects of Different Colors to the Output...
Effect of Glittering and Reflective Objects of Different Colors to the Output...IDES Editor
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 

What's hot (17)

Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
Mn3621372142
Mn3621372142Mn3621372142
Mn3621372142
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor NetworksArtificial Bee Colony algorithm for Localization in Wireless Sensor Networks
Artificial Bee Colony algorithm for Localization in Wireless Sensor Networks
 
Survey of local binary pattern for fire & smoke using
Survey of local binary pattern for fire & smoke usingSurvey of local binary pattern for fire & smoke using
Survey of local binary pattern for fire & smoke using
 
Performance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSNPerformance Comparison of Sensor Deployment Techniques Used in WSN
Performance Comparison of Sensor Deployment Techniques Used in WSN
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
40120130405021
4012013040502140120130405021
40120130405021
 
E010412433
E010412433E010412433
E010412433
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
A2 l
A2 lA2 l
A2 l
 
Informative Indoor Tracking
Informative Indoor TrackingInformative Indoor Tracking
Informative Indoor Tracking
 
Effect of Glittering and Reflective Objects of Different Colors to the Output...
Effect of Glittering and Reflective Objects of Different Colors to the Output...Effect of Glittering and Reflective Objects of Different Colors to the Output...
Effect of Glittering and Reflective Objects of Different Colors to the Output...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 

Viewers also liked (8)

238 243
238 243238 243
238 243
 
91 94
91 9491 94
91 94
 
24 26
24 2624 26
24 26
 
203 212
203 212203 212
203 212
 
47 50
47 5047 50
47 50
 
289 292
289 292289 292
289 292
 
51 59
51 5951 59
51 59
 
Rapid disclosure of_clients_spot_witg_the_help_of_location_based_services
Rapid disclosure of_clients_spot_witg_the_help_of_location_based_servicesRapid disclosure of_clients_spot_witg_the_help_of_location_based_services
Rapid disclosure of_clients_spot_witg_the_help_of_location_based_services
 

Similar to 311 314

A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
 
Cyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxCyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxRishiDash2
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSpharmaindexing
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networksambitlick
 
FINGERPRINT LOCATION METHODS USING RAY-TRACING
FINGERPRINT LOCATION METHODS USING RAY-TRACINGFINGERPRINT LOCATION METHODS USING RAY-TRACING
FINGERPRINT LOCATION METHODS USING RAY-TRACINGmarcelonog29
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSEditor IJMTER
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocationharisri269
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...eSAT Publishing House
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...ijwmn
 

Similar to 311 314 (20)

A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
 
J017345864
J017345864J017345864
J017345864
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
 
Cyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptxCyber Threat Intelligence for information .pptx
Cyber Threat Intelligence for information .pptx
 
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKSCONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
CONTRADICTION COMMUNICATION RANGE OF SENSOR NETWORKS
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
Coordinate Location Fingerprint Based On WiFi Service
Coordinate Location Fingerprint Based On  WiFi ServiceCoordinate Location Fingerprint Based On  WiFi Service
Coordinate Location Fingerprint Based On WiFi Service
 
Bn24427436
Bn24427436Bn24427436
Bn24427436
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
Bi24385389
Bi24385389Bi24385389
Bi24385389
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
FINGERPRINT LOCATION METHODS USING RAY-TRACING
FINGERPRINT LOCATION METHODS USING RAY-TRACINGFINGERPRINT LOCATION METHODS USING RAY-TRACING
FINGERPRINT LOCATION METHODS USING RAY-TRACING
 
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKSA NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
A NOVEL APPROACH TO DETECT THE MOVEMENT OF TARGET IN WIRELESS SENSOR NETWORKS
 
Indoor geolocation
Indoor geolocationIndoor geolocation
Indoor geolocation
 
Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...Localization based range map stitching in wireless sensor network under non l...
Localization based range map stitching in wireless sensor network under non l...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
NETWORK PERFORMANCE ENHANCEMENT WITH OPTIMIZATION SENSOR PLACEMENT IN WIRELES...
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

311 314

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Location Fingerprinting of Mobile Terminals by Using Wi-Fi Device Ruchi Setiya, Prof. Avinash Gaur  correct location of users and mobile devices. While the Abstract— The increasing demand for location-aware services inside buildings has made indoor positioning a significant outdoor location can be easily calculated, using Technologies research topic. While the outdoor location can be easily such as GPS (Global Positioning System), it is more difficult calculated, using technologies such as GPS. The location using to obtain when the location scenario is an indoor fingerprinting technique is consist of two different phases: the environment. One of these techniques is fingerprinting first phase is the calibration phase at specific points called technique. From the several wireless communications calibration points within the environment, the signal strength at technologies IEEE802.11 is probably the most used in each point is recorded and saved in a database; the second Wireless Local Area Networks, so it was chosen for this work phase is the location estimation phase where the object [5]. measures the signal strength at its current position and then, using a location estimation algorithm, the measured signal is The techniques used to determine the location of a mobile estimated with values stored in the database in order to obtain terminal can be divided into three main categories an approximation on the user's current position. In this paper a Triangulation, Proximity and Scene Analysis. When using fingerprinting based localization of mobile terminals is done by wireless networks to do the location estimation, any property using Wi-Fi device. For this approach a data collection was of the wireless signal can be used in the process, as long as it made without the presence of the user near the laptop. For each calibration point, the RSS for each access point was taken and is possible to establish a relation between the property of the stored in the database. After collecting the data the Fingerprint wireless signal used to determine the location and the actual Map is generated to test the chosen LEA. The chosen Location coordinates of the mobile device. Fingerprinting is a location Estimation Algorithm is k-Nearest Neighbor Algorithm with technique that uses the scene analysis technique. It consists in Euclidean, Manhattan Distance and Chebychev Distance. observing and analysing the patterns of electromagnetic Index Terms— fingerprinting, Wi-Fi, wireless network, location signals and their variations along time. A given property of estimation algorithm. the electromagnetic signal received from a set of references are read and then are compared with a set of previously stored values, called the Fingerprint Map (FM). From this I. INTRODUCTION comparison, the Location Estimation Algorithm (LEA) outputs the current location. Two different concepts of For the past few years, there has been a high interest in domain exist in this technique: the signals domain and the mobile terminal (MT) positioning. The primary motivation spatial domain. The signals domain is an n-dimensional for the development of mobile positioning systems was due space, where the number of dimensions equals the number of to the mandatory requirement of security services. Although references that exist in the scene under analysis. The second the starting was because of security-emergency need, later it domain is related to the space where the mobile node to has found various applications in many fields, e.g., to locate is. The number of dimensions of this space depends on increase data throughput in cellular systems. There exist the type of output of the Location estimation Algorithm many algorithms developed for the MT localization problem. (LEA) [6]. It can be a single label indicating the location of The traditional geometrical localization methods are the user (e.g. classroom 1); can be a two dimension designed to work under line-of-sight (LoS) conditions. coordinates system (x; y), a three dimensional coordinates However, LoS conditions might not always be present system (x; y; z), etc. Location fingerprinting comprises of between the base station (BS) and the MT. Therefore, two distinct phases as shown in Figure 1., one is calibration fingerprinting-based localization techniques which are also phase on which data is collected and the Fingerprint Map the subject of this paper attract attention because of their (FM) is generated and a second phase, is location estimation ability to work also in multipath and non-line-of-sight phase also called as on-line phase when data is collected from (NLoS) environments. The effectiveness of Location Based the wireless communication transceiver are compared with Systems depends on the information on the FM and the location is made. Manuscript received May, 2012. Ruchi Setiya, Electronics and Communication Engineering, Gyan Ganga College of Technology., (e-mail:ruchi_setiya09@yahoo.co.in). Jabalpur, India, Prof. Avinash Gaur, Electronics and Communication Engineering, Gyan Ganga College of Technology., (e-mail:avinash.gaur@rediffmail.com). Jabalpur, India, 311 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012 involves time measurement, a specific clock resolution must be attainable by the system according to the timing technology used. iii.Attenuation - The intensity of the emitted signal is inversely proportional to the square of the distance from the source. Using this relation and given the signal strength at the source, the measured signal strength could be used to estimate the distance of the object from the Figure 1. The two phases of location fingerprinting source. Measuring the distance using attenuation is usually less accurate than using time-of-flight specially in environments with many obstructions which cause a II. LOCATION USING WIRELESS NETWORKS lot of signal reflection. B. Location using Angulation A. Location using Trilateration In angulation, angles instead of distances are used to Trilateration falls under the category of Triangulation determine the location of an object. To compute the position, where the geometric properties of triangles are used to two angle measurements in addition to one length compute the objects' locations. The lateration technique measurement between the two reference points are required. works by measuring the distance to three distinct Using an array of multiple phased antennas with a known non-collinear reference points from the object of interest X distance between them, by measuring the phase shift angle and then applying a triangulation algorithm to obtain the between the signal arriving at the first antenna and the signal position of the object. The triangulation algorithm is arriving at the second antenna and given the differences in achieved by drawing a circle of radius d which centered at the arrival time and the geometry of the array, the system can reference point, where d is the measured distance from the compute the angle from which the transmission was emitted access point to the object of interest at X. Using three access [4]. points, three circles could be drawn which would intersect at a point X. This point would indicate the location of the user. In order to measure such distance, three general approaches C. Location using Fingerprinting exist [4]. The scene analysis technique depends on analyzing the ―scene‖ to obtain features that are easily compared and represented. A scene can be described either by images for the location or by the signal strength at that location. In static scene analysis, the observed features are looked up in the database that maps objects to locations. In differential scene analysis, the difference between successive scenes is tracked. Those differences will imply that the user has moved. If features are known to be at specific locations, the observer can compute its location relative to them. The advantage of such system is that it can act independently from an external server by storing the database locally which means that less power is required for data transmission and the privacy of the user could be maintained. The disadvantages include the need for a pre built lookup database of the features that might need to be rebuilt if the features of the scene change [5]. Fingerprinting is a type of scene analysis. Usually, the Fingerprinting approach consists of two stages: Figure 2.3: Triangulation i. Calibration Phase - At specific points called calibration points within the environment, the signal strength, along with other parameters such as the signal to noise ratio at i.Direct - This method involves physically measuring the each point is recorded and saved in a database. For the distance between the mobile object and three different Fingerprinting database to be accurate, a significant reference points which is infeasible and inapplicable to number of calibration points should be made available the applications of indoor positioning. It generally which increases the time needed for the calibration involves robots that measure the distances through phase. extension of probes. ii. Location Estimation Phase - The object measures the signal strength at its current position and then, using a ii.Time-of-Flight - Time-of-Flight works by recording the location estimation algorithm, the measured signal is time it takes for a signal to propagate from a transmitter estimated with values stored in the database in order to to a receiver at a known velocity. Since this method obtain an approximation on the user's current position. 312 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 The estimation could be done on the client side which be the list of calibration point coordinates corresponding the requires that the database of fingerprints is stored list of K fingerprints locally, thus increasing the storage and memory requirements on the client. The other option is estimation which satisfy on the server side which increases the load on the server and possibly the load on the network. where and the function d (∙) is a chosen distance measure. The Euclidean norm is widely used, but the D. Location using Proximity Manhattan norm is also common. The most common choice The proximity technique is useful in knowing whether an as a MU’s location estimator is the average of the object is near a specific location rather than knowing the coordinates of the K ―nearest‖ fingerprints, that is exact location. One type of proximity detection relies on the presence of physical proximity detectors such as pressure pads. Another type of proximity detection relies on the usage The estimator is a very restricted approach to compute the of automatic ID systems such as ATM machines or location estimate, because the number of possible estimates is point-of-sale credit card machines where accessing an ATM always finite and is a function of the number of CPs. at a certain time gives an indicator of the place of that user at The location estimation is done by using the value K = 1, that time. In a university for example, the use of computer which leads to the nearest neighbor (NN) method. The login history can help in estimating the possible user location. Euclidean norm is used as a distance measure, but the The accuracy of the proximity detection system is usually estimate is rejected if lower than other methods so it cannot be used alone and could be used together with another method [4]. III. LOCATION USING FINGERPRINTING where CPi is the ―nearest‖ calibration point. In this section some details about the procedures used to determine the location of a mobile node using fingerprinting C. Euclidean distance and the above mentioned LEA algorithms are presented. To The Euclidean distance between two vectors, do the location, the two phases required by fingerprinting must be made [7]. Although any property of the wireless and can be represented by signal can be used in this type of analysis, in this work the fingerprinting analysis will be made based on the RSS values. A. Building the Fingerprint Map where n represents the fingerprint size and the observation Prior to the acquisition of the fingerprint map, it must be size. The fingerprint size is the number of access points that established the location of the points (spatial domain) where has been saved in the database for a particular reading vector. the RSS readings are going to be made. Data is then acquired The observation size is the number of access points that have for each one of the previously defined points. Data collected been ―seen‖ in this observation. The value of n is equal to the and stored in this phase includes the value of the RSS for length of the vectors . The length of the each reference found by the mobile terminal, for each point vectors be equal to 3, 2 or 1. of the spatial domain. The number of references (and therefore dimensions) might be different for each point in the D. Chebychev Distance spatial domain [5]. After collecting all data, the FM is The Chebychev distance between two vectors, generated. This is made by calculating the average value of and , is given by the RSS for every reference at each point. In the database it is then stored for each point and reference the corresponding values of the average RSS. This equals the limit of the metrics. The metrics/ spaces are function spaces defined using a natural B. K-nearest neighbor Algorithm generalization of the p-norm for finite-dimensional vector K-nearest neighbor (KNN) method is one of the simplest spaces. ways to determine the location of the MU by using the fingerprint map. KNN algorithm is a location fingerprinting method that considers K CPs (Calibration Points) to calculate the approximate position of the user. The idea is to compare the fingerprints in the fingerprint map to the observed Hence it is also known as the L∞ metrics. measurements and to select K calibration points with the ―nearest‖ RSSI values. In the KNN approach, the vector y used as a measurement and compared to the fingerprint map, E. Manhattan Distance which includes only the sample averages. Let the list The Manhattan distance, between two vectors and in an n-dimensional real vector space with fixed Cartesian coordinate system, is the sum of the lengths of the projections 313 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May 2012 of the line segment between the points onto the coordinate V. CONCLUSION AND FUTURE WORK axes. More formally, In this research, a Fingerprinting approach is proposed that provides a location aware service. The approach is based on the single tier architecture that is both Calibration Phase and Location Estimation Phase is carried out by using same application. The Location Estimation is done by using the Finally, after calculating the Euclidean distance, k-Nearest Neighbor Algorithm with Euclidean Distance, Chebychev distance, Manhattan distance between the Manhattan Distance and Chebychev Distance. The accuracy observation vector and all the fingerprints that were returned, of Euclidean Distance and Manhattan Distance are better as the fingerprint vector that yields the minimum distance is compare to Chebychev Distance. considered the best match. The SSID (Signal Strength ID) The current prototype is implemented on a laptop. For a associated with this fingerprint is returned to the client, as truly mobile application, this project could be implemented well as the X and Y coordinates for the map that is associated on mobile operating system, so that it works on mobile with that area. devices like iPhone, Windows Phone 7, Black Berry10, Android. In the future, the system's accuracy could be IV. TESTS AND RESULTS enhanced by using some other probabilistic approach. Some The chosen scenario (Figure 3.) consists of four rooms of the improvements will be made related with the calibration and a hall connecting them. The small circles on the map procedure for each mobile terminal, and the use of other type represent the calibration points where data was collected and of LEA, such as based on pattern search. for which the Fingerprint Map was generated. Also the location of the three Access Points used as references are REFERENCES presented in the map. [1] P. Bahl and V. Padmanabhan, ―RADAR: an in-building RF-based user location and tracking system,‖INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, vol. 2, pp. 775–784 vol.2, 2000 [2] C. Komar and C. Ersoy, ―Location tracking and location based service using IEEE 802.11 WLAN infrastructure,‖ in European Wireless, Barcelona Spain, February 2004. [3] Taheri, A. Singh, and E. Agu, ―Location fingerprinting on infrastructure 802.11 wireless local area networks,‖ in LCN ’04: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks. Washington, DC, USA: IEEE Computer Society, 2004 [4] H. Liu, H. Darabi, P. Banerjee, and J. Liu, ―Survey of wireless indoor positioning techniques and systems, “Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 37, 2007. Figure 3. Map of the area where the location tests were made, the [5] Serodio, L. Coutinho, H. Pinto, and P. Mestre, ―A Comparison of circles represent the location of the points considered for the Multiple Algorithms for Fingerprinting using IEEE802.11,‖ in Lecture fingerprint map. Notes in Engineering and Computer Science: Proceedings of The The acquisition of the data to build the FM. It was made World Congress on Engineering 2011, WCE 2011, 6 -8 July, 2011, London, U.K., 2011 by using an application developed in Visual C# 3.0 with [6] Pedro Mestre, Luis Coutinhoy, Luis Reigotoy, Joao Matiasz and Carlos .NET Framework 3.5, by using a laptop computer (HP G6 Serodio, ―Hybrid technique for Fingerprinting using IEEE802.11 Notebook with Wireless Network Adapter) running Wireless Networks,‖2011 International Conference On Indoor Windows 7. The data collection was made without the Positioning And Indoor Navigation (IPIN), 21-23 September 2011. presence of the user near the laptop. For each calibration [7] M. Satyanarayanan, ―Pervasive computing: vision and challenges‖, point, the RSS for each access point was taken and stored in Personal Communications, IEEE [see also IEEE Wireless Communications], vol. 8, no. 4, pp. 10-17, 2001. the database. After collecting the data the Fingerprint Map is generated to test the chosen LEA. The chosen LEA is k-nearest neighbor algorithm. Figure 4. Calibrate data to test the Location Estimation Algorithm to estimate the user’s location. 314 All Rights Reserved © 2012 IJARCET