1,644 research outputs found

    Location-aware computing: a neural network model for determining location in wireless LANs

    Get PDF
    The strengths of the RF signals arriving from more access points in a wireless LANs are related to the position of the mobile terminal and can be used to derive the location of the user. In a heterogeneous environment, e.g. inside a building or in a variegated urban geometry, the received power is a very complex function of the distance, the geometry, the materials. The complexity of the inverse problem (to derive the position from the signals) and the lack of complete information, motivate to consider flexible models based on a network of functions (neural networks). Specifying the value of the free parameters of the model requires a supervised learning strategy that starts from a set of labeled examples to construct a model that will then generalize in an appropriate manner when confronted with new data, not present in the training set. The advantage of the method is that it does not require ad-hoc infrastructure in addition to the wireless LAN, while the flexible modeling and learning capabilities of neural networks achieve lower errors in determining the position, are amenable to incremental improvements, and do not require the detailed knowledge of the access point locations and of the building characteristics. A user needs only a map of the working space and a small number of identified locations to train a system, as evidenced by the experimental results presented

    Count three for wear able computers

    Get PDF
    This paper is a postprint of a paper submitted to and accepted for publication in the Proceedings of the IEE Eurowearable 2003 Conference, and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library. A revised version of this paper was also published in Electronics Systems and Software, also subject to Institution of Engineering and Technology Copyright. The copy of record is also available at the IET Digital Library.A description of 'ubiquitous computer' is presented. Ubiquitous computers imply portable computers embedded into everyday objects, which would replace personal computers. Ubiquitous computers can be mapped into a three-tier scheme, differentiated by processor performance and flexibility of function. The power consumption of mobile devices is one of the most important design considerations. The size of a wearable system is often a design limitation

    Overhearing the Wireless Interface for 802.11-based Positioning Systems

    Full text link
    Not only the proliferation of 802.11, but also the capability to determine the position of mobile devices make 802.11 highly appealing for many application areas. Typically, a mobile device that wants to know its position regularly performs active or passive scans to obtain the signal strength measurements of neighboring access points. Active and passive scanning are survey techniques originally intended to be performed once in a while to learn about the presence and signal reception quality of access points within communication range. Based on this survey the best suitable access point is selected as the gateway to the wired network. However, so far, no investigations are known to have been launched into how regular scanning affects concurrent data transmissions from an end-user point of view. In this paper, we explore how common data communication is affected while actively or passively scanning at the same time. We found that with an active scanning interval of less than 2 seconds the network conditions such as throughput and round trip delay are insufficient for interactive applications. The same is true for passive scanning if a scanning interval of less than 7 seconds is chosen. Furthermore, we present a novel scan scheme called Monitor Sniffing to reduce client service disruptions. Monitor Sniffing exploits the fact that 802.11 operates on overlapping channels by overhearing the wireless interface. We have implemented our Monitor Sniffing algorithm using commodity 802.11g hardware, and we demonstrate that it is faster than active and passive scanning and does not disturb concurrent data communication. Finally, our approach only requires software modifications on the client side, making the adoption process quite easy

    ANALISIS KEAMANAN JARINGAN WI-FI MENGGUNAKAN METODE SIGNAL SCANNING DI FAKULTAS TEKNIK UNIVERSITAS PGRI YOGYAKARTA

    Get PDF
    Wi-Fi atau Wireless Fidelity merupakan sekumpulan standar yang digunakan untuk jaringan lokal nirkabel yang didasari pada spesifikasi IEEE 802.11. Wi-Fi beroperasi dengan menggunakan spesifikasi dasar IEEE 802.11. Pada spesifikasi ini, Wi-Fi menggunakan spesifikasi-spesifikasi yang berbeda pada setiap komputer, laptop, maupun peralatan elektronik lainnya dengan tujuan untuk menggunakan frekuensi kecepatan transfer data yang berbeda. Langkah-langkah yang dilakukan dalam penelitian ini, yang pertama adalah melakukan scan sinyal wireless di lokasi penelitian menggunakan tools inSSIDer dan Vistumbler. Selanjutnya dilakukan analisa terhadap hasil dari proses scan tersebut. Kemudian dilakukan uji keamanan terhadap jaringan wireless, yaitu melalui proses MACchanger yaitu penggantian MAC address untuk dapat masuk ke jaringan tanpa melakukan login menggunakan username dan password yang diberikan dari PPTIK. Hasil dari penelitian ini adalah jaringan Wi-Fi di Fakultas Teknik UPY menggunakan keamanan bersifat open pada setiap perangkatnya, artinya adalah semua pengguna yang akan mengakses jaringan Wi-Fi dapat langsung mengakses dengan menggunakan username dan password masing-masing, tanpa perlu merubah setting dari perangkat jaringan yang ada

    Beyond swarm intelligence: The Ultraswarm

    Get PDF
    This paper explores the idea that it may be possible to combine two ideas – UAV flocking, and wireless cluster computing – in a single system, the UltraSwarm. The possible advantages of such a system are considered, and solutions to some of the technical problems are identified. Initial work on constructing such a system based around miniature electric helicopters is described

    RF Localization in Indoor Environment

    Get PDF
    In this paper indoor localization system based on the RF power measurements of the Received Signal Strength (RSS) in WLAN environment is presented. Today, the most viable solution for localization is the RSS fingerprinting based approach, where in order to establish a relationship between RSS values and location, different machine learning approaches are used. The advantage of this approach based on WLAN technology is that it does not need new infrastructure (it reuses already and widely deployed equipment), and the RSS measurement is part of the normal operating mode of wireless equipment. We derive the Cramer-Rao Lower Bound (CRLB) of localization accuracy for RSS measurements. In analysis of the bound we give insight in localization performance and deployment issues of a localization system, which could help designing an efficient localization system. To compare different machine learning approaches we developed a localization system based on an artificial neural network, k-nearest neighbors, probabilistic method based on the Gaussian kernel and the histogram method. We tested the developed system in real world WLAN indoor environment, where realistic RSS measurements were collected. Experimental comparison of the results has been investigated and average location estimation error of around 2 meters was obtained

    Cellular Multihop Networks: State of the Art

    Full text link
    This paper presents the summary of some research in the area of cellular multihop networks that contains the improvement in network performance also the difficulties and the complexities of the networks. The combination of two different networks, mobile cellular networks and WLAN ad hoc networks will be presented. The main purpose of the combination is to minimize the weaknesses of both network types when they are deployed separately. By having this combination then it is possible to provide higher mobility for WLAN ad hoc networks user and higher data transfer rate for cellular network users in multimedia applications. The cellular multihop networks will reduce blocking probability, balance the cells load and increase the network capacities. Although there are improvement on the performance of the combine networks, but there are additional aspects that should be considered seriously, especially for WLAN ad hoc users. Authentication, Authorization and Accounting (AAA) functions, the dynamic routing and relay path discovery, maintenance and security issues are aspects to be considered for cellular multihop network
    • 

    corecore