2,522 research outputs found

    Dynamic clusters (Dynamic Location of Phone Call Clusters)

    Get PDF
    When mobile handsets are making a call, a measurement report is sent to the serving base station periodically which includes the signal strengths to the base station and the next six strongest signals of the surrounding base stations. Motorola asked the Study Group if it was possible to say whether we could use this information to infer if phone calls occur in clusters and if it was possible to determine the locations, size and other features of these clusters. The Study Group found clusters in 'signal space,' that is, handsets reporting similar signal strengths with the same base stations and explored methods of locating these clusters geographically

    Radio frequency optimization of a Global System for Mobile (GSM) network

    Get PDF
    Includes bibliographical references

    Automated tracking of the Florida manatee (Trichechus manatus)

    Get PDF
    The electronic, physical, biological and environmental factors involved in the automated remote tracking of the Florida manatee (Trichechus manatus) are identified. The current status of the manatee as an endangered species is provided. Brief descriptions of existing tracking and position locating systems are presented to identify the state of the art in these fields. An analysis of energy media is conducted to identify those with the highest probability of success for this application. Logistic questions such as the means of attachment and position of any equipment to be placed on the manatee are also investigated. Power sources and manateeborne electronics encapsulation techniques are studied and the results of a compter generated DF network analysis are summarized

    Wireless security for secure facilities

    Get PDF
    This thesis presents methods for securing a facility that has wireless connectivity. The goal of this research is to develop a solution to securing a facility that utilizes wireless communications. The research will introduce methods to track and locate the position of attackers. This research also introduces the idea of using a Honeynet system for added security. This research uses what is called Defense-In-Depth. Defense-in-depth is when multiple layers of security are used. The first of the layers is the Zone of Interference. This Zone is an area where jammer transmitters and directive antennas are set up to take advantage of the near-far-effect. The idea is to use the near-far-effect to give a stronger signal on the perimeter of the secure area, to mask any signals escaping from the secure area. This Zone uses directive Yagi antenna arrays to direct the radiation. There are multiple jamming methods that are utilized within this Zone. The next layer of security is the Honeynet Zone. The idea is to make an attacker believe that they are seeing real network traffic. This is done at the Honeynet Zone once a device has been determined to be unfriendly. Decoy mobile devices are first placed within the Honeynet Zone. Spoofed traffic is then created between the Honeynet base stations and the decoy mobile devices zone; using adaptive antennas incorporated within the design to face the signals away from the inside secure area. The third defense is position location and tracking. The idea is to have constant tracking of all devices in the area. There are several methods available to locate and track a device that is giving off an RF signal. This thesis looks at combining all these methods into an integrated, and more robust, facility security system

    Smart Indoor Positioning/Location and Navigation: A Lightweight Approach

    Get PDF
    In this paper a new location indoor system is presented, which shows the position and orientation of the user in closed environments, as well as the optimal route to his destination through location tags. This system is called Labelee, and it makes easier the interaction between users and devices through QR code scanning or by NFC tag reading, because this technology is increasingly common in the latest smartphones. With this system, users could locate themselves into an enclosure with less interaction

    System-level simulation of a third generation WCDMA wireless geolocation network

    Get PDF
    A wireless geolocation system for use in a WCDMA network was simulated in Matlab. In such a system, the multipath delays have a significant effect on the mobile location estimate.Ü si ul nk end-to-end model was created according to WCDMA system specifications, where the pilot signal was spread using 28400-chip complex Gold spreading and passed through a shaping filter. The effects of multipath fading and noise was added. The received signal was passed through a receive filter and correlated with the mobile station's locally generated Gold code to find the multipath delay. The mobile location was estimated using a hyperbolic time-difference-of-arrival approach. The estimation error was calculated for various environments and channel models and found to be less than 20m for the suburban ATDMA model and less than 110m for the rural CODIT model, which is acceptable considering that one chip time corresponds to 78 m. For comparison, the former WCDMA specification of 40960-chip spreading was evaluated and an error of less than 100m was obtained for the COST-231 suburban model using the CODIT Macro Channel where one chip time corresponds to 73m. This asynchronous system was found to be a satisfactory geolocation system for WCDMA under the given conditions

    Wi-Fi Fingerprinting for Indoor Positioning

    Get PDF
    Wireless Fidelity (Wi-Fi) Fingerprinting is a remarkable approach developed by modern science to detect the user’s location efficiently. Today, the Global Positioning System (GPS) is used to keep track of our current location for outdoor positioning. In GPS technology, satellite signals cannot reach indoor environments as they are shielded from obstructions so that indoor environments with a lack of Line of Sight (LoS) do not provide enough satellite signal accuracy. Since indoor environments are very difficult to track, thus, a wide variety of techniques for dealing with them have been suggested. The best way to offer an indoor positioning service with the current technology is Wi-Fi since the most commercial infrastructure is well equipped with Wi-Fi routers. For indoor positioning systems (IPS), Wi-Fi fingerprinting approaches are being extremely popular. In this paper, all the approaches for Wi-Fi fingerprinting have been reviewed for indoor position localization. Related to Wi-Fi fingerprinting, most of the algorithms have been interpreted and the previous works of other researchers have been critically analyzed in this paper to get a clear view of the Wi-Fi fingerprinting process
    corecore