2,522 research outputs found
Dynamic clusters (Dynamic Location of Phone Call Clusters)
When mobile handsets are making a call, a measurement report is sent to the serving base station periodically which includes the signal strengths to the base station and the next six strongest signals of the surrounding base stations. Motorola asked the Study Group if it was possible to say whether we could use this information to infer if phone calls occur in clusters and if it was possible to determine the locations, size and other features of these clusters.
The Study Group found clusters in 'signal space,' that is, handsets reporting similar signal strengths with the same base stations and explored methods of locating these clusters geographically
Radio frequency optimization of a Global System for Mobile (GSM) network
Includes bibliographical references
Automated tracking of the Florida manatee (Trichechus manatus)
The electronic, physical, biological and environmental factors involved in the automated remote tracking of the Florida manatee (Trichechus manatus) are identified. The current status of the manatee as an endangered species is provided. Brief descriptions of existing tracking and position locating systems are presented to identify the state of the art in these fields. An analysis of energy media is conducted to identify those with the highest probability of success for this application. Logistic questions such as the means of attachment and position of any equipment to be placed on the manatee are also investigated. Power sources and manateeborne electronics encapsulation techniques are studied and the results of a compter generated DF network analysis are summarized
Wireless security for secure facilities
This thesis presents methods for securing a facility that has wireless connectivity. The goal of this research is to develop a solution to securing a facility that utilizes wireless communications. The research will introduce methods to track and locate the position of attackers. This research also introduces the idea of using a Honeynet system for added security. This research uses what is called Defense-In-Depth. Defense-in-depth is when multiple layers of security are used. The first of the layers is the Zone of Interference. This Zone is an area where jammer transmitters and directive antennas are set up to take advantage of the near-far-effect. The idea is to use the near-far-effect to give a stronger signal on the perimeter of the secure area, to mask any signals escaping from the secure area. This Zone uses directive Yagi antenna arrays to direct the radiation. There are multiple jamming methods that are utilized within this Zone. The next layer of security is the Honeynet Zone. The idea is to make an attacker believe that they are seeing real network traffic. This is done at the Honeynet Zone once a device has been determined to be unfriendly. Decoy mobile devices are first placed within the Honeynet Zone. Spoofed traffic is then created between the Honeynet base stations and the decoy mobile devices zone; using adaptive antennas incorporated within the design to face the signals away from the inside secure area. The third defense is position location and tracking. The idea is to have constant tracking of all devices in the area. There are several methods available to locate and track a device that is giving off an RF signal. This thesis looks at combining all these methods into an integrated, and more robust, facility security system
Smart Indoor Positioning/Location and Navigation: A Lightweight Approach
In this paper a new location indoor system is presented, which shows the position and orientation of the user in closed environments, as well as the optimal route to his destination through location tags. This system is called Labelee, and it makes easier the interaction between users and devices through QR code scanning or by NFC tag reading, because this technology is increasingly common in the latest smartphones. With this system, users could locate themselves into an enclosure with less interaction
Recommended from our members
Development and Demonstration of a TDOA-Based GNSS Interference Signal Localization System
Background theory, a reference design, and demonstration
results are given for a Global Navigation Satellite
System (GNSS) interference localization system comprising a
distributed radio-frequency sensor network that simultaneously
locates multiple interference sources by measuring their signals’
time difference of arrival (TDOA) between pairs of nodes in
the network. The end-to-end solution offered here draws from
previous work in single-emitter group delay estimation, very long
baseline interferometry, subspace-based estimation, radar, and
passive geolocation. Synchronization and automatic localization
of sensor nodes is achieved through a tightly-coupled receiver
architecture that enables phase-coherent and synchronous sampling
of the interference signals and so-called reference signals
which carry timing and positioning information. Signal and crosscorrelation
models are developed and implemented in a simulator.
Multiple-emitter subspace-based TDOA estimation techniques
are developed as well as emitter identification and localization
algorithms. Simulator performance is compared to the CramérRao
lower bound for single-emitter TDOA precision. Results are
given for a test exercise in which the system accurately locates
emitters broadcasting in the amateur radio band in Austin, TX.Aerospace Engineering and Engineering Mechanic
System-level simulation of a third generation WCDMA wireless geolocation network
A wireless geolocation system for use in a WCDMA network was simulated in Matlab. In such a system, the multipath delays have a significant effect on the mobile location estimate.Ü si ul nk end-to-end model was created according to WCDMA system specifications, where the pilot signal was spread using 28400-chip complex Gold spreading and passed through a shaping filter. The effects of multipath fading and noise was added. The received signal was passed through a receive filter and correlated with the mobile station's locally generated Gold code to find the multipath delay. The mobile location was estimated using a hyperbolic time-difference-of-arrival approach. The estimation error was calculated for various environments and channel models and found to be less than 20m for the suburban ATDMA model and less than 110m for the rural CODIT model, which is acceptable considering that one chip time corresponds to 78 m. For comparison, the former WCDMA specification of 40960-chip spreading was evaluated and an error of less than 100m was obtained for the COST-231 suburban model using the CODIT Macro Channel where one chip time corresponds to 73m. This asynchronous system was found to be a satisfactory geolocation system for WCDMA under the given conditions
Wi-Fi Fingerprinting for Indoor Positioning
Wireless Fidelity (Wi-Fi) Fingerprinting is a remarkable approach developed by modern science to detect the user’s location efficiently. Today, the Global Positioning System (GPS) is used to keep track of our current location for outdoor positioning. In GPS technology, satellite signals cannot reach indoor environments as they are shielded from obstructions so that indoor environments with a lack of Line of Sight (LoS) do not provide enough satellite signal accuracy. Since indoor environments are very difficult to track, thus, a wide variety of techniques for dealing with them have been suggested. The best way to offer an indoor positioning service with the current technology is Wi-Fi since the most commercial infrastructure is well equipped with Wi-Fi routers. For indoor positioning systems (IPS), Wi-Fi fingerprinting approaches are being extremely popular. In this paper, all the approaches for Wi-Fi fingerprinting have been reviewed for indoor position localization. Related to Wi-Fi fingerprinting, most of the algorithms have been interpreted and the previous works of other researchers have been critically analyzed in this paper to get a clear view of the Wi-Fi fingerprinting process
- …