Error modeling in RE-based location detection (EMLD) for pervasive computing environments

被引:0
|
作者
Swami, Niraj [1 ]
Ahamed, Sheikh I. [1 ]
机构
[1] Marquette Univ, Milwaukee, WI 53233 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, a plethora of signal-based (Radio Frequency based) location detection techniques have been proposed for pervasive computing due to the limited scope of GPS when considering indoor and highly urban environments. However, these techniques have a major drawback in the error they incorporate. This paper addresses the problem of erratic location detection of mobile devices when signal-based technologies (non-GPS based solutions) are used. It generates an error model, EMLD, the parameters of which may be modified and used based on the surroundings of the target location to generate accurate location coordinates. This paper also provides an implementation of EMLD that can be used in order to determine location coordinates. It is a highly generalized approach that becomes more specific based on clients' needs that result in the assumptions and setup criteria of the approach.
引用
收藏
页码:783 / +
页数:2
相关论文
共 50 条
  • [1] Location-detection strategies in pervasive computing environments
    Fischmeister, S
    Menkhaus, G
    Stumpfl, A
    [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 273 - 278
  • [2] A location model for pervasive computing environments
    Satoh, I
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 215 - 224
  • [3] On Modeling for Pervasive Computing Environments
    Campiolo, Rodrigo
    Cremer, Vivian
    Sobral, Joao Bosco M.
    [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
  • [4] Knowledge-based modeling and natural computing for coordination in pervasive environments
    Cebulla, Michael
    [J]. ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2006, : 99 - 106
  • [5] Context and location-aware encryption for pervasive computing environments
    Al-Muhtadi, J
    Hill, R
    Campbell, R
    Mickunas, MD
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 283 - +
  • [6] A model checking-based approach for location query processing in pervasive computing environments
    Hoareau, Christian
    Satoh, Ichiro
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: OTM 2007 WORKSHOPS, PT 2, PROCEEDINGS, 2007, 4806 : 866 - 875
  • [7] Towards an intrusion detection system for pervasive computing environments
    Kannadiga, P
    Zulkernine, M
    Ahamed, SI
    [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 277 - 282
  • [8] Runtime Detection of the Concurrency Property in Asynchronous Pervasive Computing Environments
    Huang, Yu
    Yang, Yiling
    Cao, Jiannong
    Ma, Xiaoxing
    Tao, Xianping
    Lu, Jian
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (04) : 744 - 750
  • [9] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157
  • [10] Situation-based testing for pervasive computing environments
    O'Neill, Eleanor
    Conlan, Owen
    Lewis, David
    [J]. PERVASIVE AND MOBILE COMPUTING, 2013, 9 (01) : 76 - 97