1,405 research outputs found

    Real-time Localisation and Tracking System for Navigation Based on Mobile Multi-sensor Fusion

    Get PDF
    Nutitelefoni tĂ”usuga ja nendesse paigaldatud anduritega on tekkinud lĂ”putult teaduslikke uurimisvĂ”imalusi, ilma kallist riistvara omamata. Selles töös tutvustatakse uut algoritmi, mis vĂ”imaldab jĂ€lgida ja lokaliseerida sĂ”idukit reaalajas, kasutades Android OS nutitelefoni GPS-i, kiirendusmÔÔturi ja güroskoobi andmevoogusid. Loodud algoritm vĂ”ib reageerida kiiruse muutustele ja auto pööretele reaalajas ilma GPS-i sisendita. See tĂ€hendab, et algoritm saab hinnata sĂ”iduki positsiooni, kui GPS andmevoog ei ole teadmata ajahulgal saadaval. Tulemused on paljutĂ”otavad ja nĂ€itavad, et algoritm toimib hĂ€sti nii tĂ€psuse kui ka reaalajas reageerimisega. Isegi ilma GPS infota 30 sekundit jooksul suudab algoritm hinnata sĂ”iduki asukohta 25 meetrilise keskmise tĂ€psusega.With the rise of the smartphone, new research opportunities have emerged. With a wide array of sensors that are available in today’s smartphones, the research possibilities are endless. In this work, we present a new algorithm that can track and localise a vehicle in real-time using the GPS, accelerometer and gyroscope data streams from an Android OS smartphone. The resulting algorithm can respond to speed changes, and the car turns in real-time without any info from the GPS. This means that the algorithm can estimate the vehicle position if the GPS data stream is unavailable for unknown amounts of time. Results are promising and show that the algorithm performs well both in accuracy andreal-time responsiveness. Even without 30 seconds of GPS info, the algorithm is able to estimate the vehicle location with an average accuracy of 25 meters

    Design of advanced benchmarks and analytical methods for RF-based indoor localization solutions

    Get PDF

    Unveiling Web Fingerprinting in the Wild Via Code Mining and Machine Learning

    Get PDF
    Abstract Fueled by advertising companies' need of accurately tracking users and their online habits, web fingerprinting practice has grown in recent years, with severe implications for users' privacy. In this paper, we design, engineer and evaluate a methodology which combines the analysis of JavaScript code and machine learning for the automatic detection of web fingerprinters. We apply our methodology on a dataset of more than 400, 000 JavaScript files accessed by about 1, 000 volunteers during a one-month long experiment to observe adoption of fingerprinting in a real scenario. We compare approaches based on both static and dynamic code analysis to automatically detect fingerprinters and show they provide different angles complementing each other. This demonstrates that studies based on either static or dynamic code analysis provide partial view on actual fingerprinting usage in the web. To the best of our knowledge we are the first to perform this comparison with respect to fingerprinting. Our approach achieves 94% accuracy in small decision time. With this we spot more than 840 fingerprinting services, of which 695 are unknown to popular tracker blockers. These include new actual trackers as well as services which use fingerprinting for purposes other than tracking, such as anti-fraud and bot recognition

    Design of linear regression based localization algorithms for wireless sensor networks

    Get PDF

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification

    Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things

    Get PDF

    On the performance of emerging wireless mesh networks

    Get PDF
    Wireless networks are increasingly used within pervasive computing. The recent development of low-cost sensors coupled with the decline in prices of embedded hardware and improvements in low-power low-rate wireless networks has made them ubiquitous. The sensors are becoming smaller and smarter enabling them to be embedded inside tiny hardware. They are already being used in various areas such as health care, industrial automation and environment monitoring. Thus, the data to be communicated can include room temperature, heart beat, user’s activities or seismic events. Such networks have been deployed in wide range areas and various levels of scale. The deployment can include only a couple of sensors inside human body or hundreds of sensors monitoring the environment. The sensors are capable of generating a huge amount of information when data is sensed regularly. The information has to be communicated to a central node in the sensor network or to the Internet. The sensor may be connected directly to the central node but it may also be connected via other sensor nodes acting as intermediate routers/forwarders. The bandwidth of a typical wireless sensor network is already small and the use of forwarders to pass the data to the central node decreases the network capacity even further. Wireless networks consist of high packet loss ratio along with the low network bandwidth. The data transfer time from the sensor nodes to the central node increases with network size. Thus it becomes challenging to regularly communicate the sensed data especially when the network grows in size. Due to this problem, it is very difficult to create a scalable sensor network which can regularly communicate sensor data. The problem can be tackled either by improving the available network bandwidth or by reducing the amount of data communicated in the network. It is not possible to improve the network bandwidth as power limitation on the devices restricts the use of faster network standards. Also it is not acceptable to reduce the quality of the sensed data leading to loss of information before communication. However the data can be modified without losing any information using compression techniques and the processing power of embedded devices are improving to make it possible. In this research, the challenges and impacts of data compression on embedded devices is studied with an aim to improve the network performance and the scalability of sensor networks. In order to evaluate this, firstly messaging protocols which are suitable for embedded devices are studied and a messaging model to communicate sensor data is determined. Then data compression techniques which can be implemented on devices with limited resources and are suitable to compress typical sensor data are studied. Although compression can reduce the amount of data to be communicated over a wireless network, the time and energy costs of the process must be considered to justify the benefits. In other words, the combined compression and data transfer time must also be smaller than the uncompressed data transfer time. Also the compression and data transfer process must consume less energy than the uncompressed data transfer process. The network communication is known to be more expensive than the on-device computation in terms of energy consumption. A data sharing system is created to study the time and energy consumption trade-off of compression techniques. A mathematical model is also used to study the impact of compression on the overall network performance of various scale of sensor networks

    Sensors and Systems for Indoor Positioning

    Get PDF
    This reprint is a reprint of the articles that appeared in Sensors' (MDPI) Special Issue on “Sensors and Systems for Indoor Positioning". The published original contributions focused on systems and technologies to enable indoor applications

    Cyber Security

    Get PDF
    This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: ​data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification
    • 

    corecore