The document discusses indoor positioning solutions (IPS). It provides background on the growing indoor location market with over 130 companies working on indoor mapping, tracking, and navigation technologies. IPS can be used for navigation, emergency response, tracking people and assets, and user applications like social networking and shopping. Technical approaches to IPS include terminal-based methods using the device itself for positioning, infrastructure-based methods using dedicated indoor infrastructure or existing WiFi networks, and hybrid methods. Baseline positioning methods discussed are connection-based positioning using cell/access point IDs, trilateration/multilateration using signal strength or timing to estimate distance, triangulation using angle of arrival, and fingerprinting using spatial radio environment maps. Google aggregates WiFi
Determining a person’s physical position in a multi-building indoor space using wifi fingerprinting on UJIIndoor Data Set to construct machine learning models.
Determining a person’s physical position in a multi-building indoor space using wifi fingerprinting on UJIIndoor Data Set to construct machine learning models.
For detail report you can send me mail at imhamzasajjad@gamil.com.
This slides consist of the propagation of signal with in the building, how the signals are propagate and effected by the obstacles and give the models of indoor propagation which helps us to find the path loss of the signals.
Detection techniques in coherent optical communicationsCKSunith1
The attached narrated power point presentation attempts to explain the block diagrams of different detection schemes used in coherent optical communication receivers. The material also makes an attempt to compare the various detection schemes used as well, and will be useful to KTU final year B Tech students who prepare for the subject EC 405, Optical Communications.
Intermediate: Vehicle to Everything (V2X) Introduction3G4G
A short introduction to what is meant by V2X or Vehicle to Everything
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
The attached narrated power point presentation will help one get familiarized with the basic concepts of Wavelength Division Multiplexing as well as get introduced to WDM Networks. The material will be useful for KTU final year B Tech students who prepare for the subject EC 405, Optical Communications.
Technology which uses the physical location of the end-user to improve the relevance, context, and value of an application is defined as location based technology. Bluetooth, GPS, Wi-Fi and NFC are all location-based technologies. A service or application which utilizes location-based technology is called Location-based service(LBS).
For detail report you can send me mail at imhamzasajjad@gamil.com.
This slides consist of the propagation of signal with in the building, how the signals are propagate and effected by the obstacles and give the models of indoor propagation which helps us to find the path loss of the signals.
Detection techniques in coherent optical communicationsCKSunith1
The attached narrated power point presentation attempts to explain the block diagrams of different detection schemes used in coherent optical communication receivers. The material also makes an attempt to compare the various detection schemes used as well, and will be useful to KTU final year B Tech students who prepare for the subject EC 405, Optical Communications.
Intermediate: Vehicle to Everything (V2X) Introduction3G4G
A short introduction to what is meant by V2X or Vehicle to Everything
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
The attached narrated power point presentation will help one get familiarized with the basic concepts of Wavelength Division Multiplexing as well as get introduced to WDM Networks. The material will be useful for KTU final year B Tech students who prepare for the subject EC 405, Optical Communications.
Technology which uses the physical location of the end-user to improve the relevance, context, and value of an application is defined as location based technology. Bluetooth, GPS, Wi-Fi and NFC are all location-based technologies. A service or application which utilizes location-based technology is called Location-based service(LBS).
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...IAESIJAI
The recent trend in location-based services has led to a proliferation of studies in indoor positioning technology. Wi-Fi received signal strength indicator (RSSI) Fingerprinting and pedestrian dead reckoning (PDR) are the two best representatives from both approaches. This research proposed a genetic algorithm to combine Wi-Fi Fingerprinting and PDR. By taking advantage of PDR and genetic algorithm, we only need to collect a limited number of points for the fingerprint dataset with known coordinates, then target trajectories' position can be estimated with high accuracy. Results from our experiments and simulations have shown that even in the scenario of noisy inertial measurement unit (IMU) sensors data, using RSSI measurements and the coordinate of 8 points, our proposed method was able to achieve 1.589 meters of average distance error which is 34.4 percent lower than the conventional Fingerprinting method.
ASSESSMENT OF ALTERNATIVE PRECISION POSITIONING SYSTEMSijitcs
The continuous evolution of technology, electronics, and software along with the dramatic decrease in the
cost of electronic devices has led to the spread of sensing, surveillance, and control devices. The Internetof-Things
(IoT) benefits from the spread of devices (things) by processing device feeds using Machine-toMachine
(M2M) technologies. At the heart of the M2M technologies lies the ability of devices (things) to identify their own location on the globe or relative to known landmark. Since location awareness is fundamental to processing sensing and control feeds, it has attracted researchers to identify ways to
identify and improve location accuracy. The article looks at Global Positioning Systems (GPS) along with the enhancements and amendments that apply to satellite based solutions. The article also looks at medium to short-range wireless solutions such as cellular, Wi-Fi, Dedicated Short-Range Communications (5.9 GHz DSRC) and similar solutions.
The proposed System for Indoor Location TrackingEditor IJCATR
Indoor location tracking systems are used to locate people or certain objects in buildings and in closed areas. For example,
finding co-workers in a large office building, locating customers within a shopping mall and locating patients in the hospital are a few
applications of indoor location tracking systems. Indoor tracking capability opens up multiple possibilities. To address this need, this
paper describes the implementation of a Bluetooth-based indoor location tracking system that utilizes the integrated Bluetooth modules
in any today's mobile phones to specify and display the location of the individuals in a certain building. The proposed system aims for
location tracking/monitoring and marketing applications for whom want to locate individuals carrying mobile phones and advertise
products and services.
Introducing a smart sensor system for internal and external security.
A wireless sensor based alternative to the CCTV camera based security systems.
Implements the concept of capacitive sensing, radar vision and GSM technology.
Utilizes the power of Edge Computing for data management in IoT nodes.
Focuses on the practical implementation of the system.
Includes a working hardware and software prototype.
Internet of Things (IoT): Micro-location and Smart BuildingsFaheem Zafari
These slides provide an overview of IoT, localization and smart buildings. The slides aim to highlight how IoT, micro-location and smart buildings are all interlinked and how combining them can improve the overall performance. The slides also provide an in-depth discussion different localization techniques as well as some of the recent IoT-optimized wireless access mechanisms such as LoRA, SigFox and IEEE 802.11ah
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDYIJCSES Journal
Sensing location information in indoor scenes requires a high accuracy and is a challenging task, mainly
because of multipath and NLoS (non-line-of-sight) propagation. GNSS signals cannot penetrate well in
indoor environment. Satellite-based navigation and positioning systems cannot therefore be used for indoor
positioning.. Other technologies have been suggested for indoor usage, among them, Wi-Fi (802.11) and
5G NR (New Radio). The primary aim of this study is to discuss the advantages and drawbacks of 5G and
Wi-Fi positioning techniques for indoor localization
5G Vs Wi-Fi Indoor Positioning: A Comparative StudyIJCSES Journal
Sensing location information in indoor scenes requires a high accuracy and is a challenging task, mainly because of multipath and NLoS (non-line-of-sight) propagation. GNSS signals cannot penetrate well in indoor environment. Satellite-based navigation and positioning systems cannot therefore be used for indoor positioning. Other technologies have been suggested for indoor usage, among them, Wi-Fi (802.11) and 5G NR (New Radio). The primary aim of this study is to discuss the advantages and drawbacks of 5G and Wi-Fi positioning techniques for indoor localization.
A Geolocation API
Fernando Mendioroz, CTO at PAiC Business Development
TADSummit EMEA Americas, 2020
A Geolocation API for real-time, transparent interaction with mobile networks for gathering of location information under any generation of cellular radio access networks.
Independent of core or radio access network, device hardware or software, operational in low-grade network conditions such as underground or indoor environments.
Mobile location information can be retrieved autonomously or triggered by asynchronous events from messaging services such as SMS or USSD, voice, etc., independently of underlying network infrastructure.
Allows service providers to integrate universal location data to any other IoT application, triggering actions and responses from other networked devices and communication channels such as voice and messaging.
Processes location reports upon entry, stay or exit of tracked device from predefined zones, motion events when devices approach zones within a predefined distance, periodic events/timeouts, user equipment availability, emergency calls, etc.
Out-of-the-box location retrieval with SS7 and Diameter-based interfaces in LTE.
Use cases:
e-Health: currently used on covid-19 patients tracking, iWatch cardio activity alarm (2015 TADHack Chicago winner)
Emergency services (2017 TADHack Global winners)
Security services
Fleet/Workforce Management
Road Traffic Control & Planning
Mobile marketing/sales based on proximity
Environmental warnings
Court restraining policing
Next steps: Secure User-Plane location, 5G location through HTTP2, Geolocation as a Service.
Using GIS in Designing and Deploying Wireless Network in City PlansCSCJournals
Site Surveys play a very important role in the successful and efficient deployment of wireless networks. The first step is to understand the basic goal of a wireless network, which is mainly to provide an appropriate coverage and throughput to all end users with high efficiency, full coverage and reasonable cost.
Site Surveys is very important for the sake of planning and designing a wireless network specifically in outdoor networks, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service (QoS). The survey usually involves a site visit to test for RF interference, and to identify optimum installation locations for access points. This requires analysis of building floor plans, inspection of the facility, and use of site survey tools. Interviews with IT management and the end users of the wireless network are also important to determine the design parameters for the wireless network.
Wireless Local Area Network (WLAN) can be implemented and deployed using different techniques and methodologies, starting from site survey to launching. The main problems are that some areas may not be covered well and the high cost of equipment.
This paper discusses a technique that helps determining the best location for access points using GPS system, in order to choose the optimal number of access points. This technique has a positive impact on the cost. Another important factor is the type of antenna, which has a very important effect on both cost and coverage issues.
COMNET as a Capacity-Building Partner for Two African InstitutionsProjectENhANCE
Overview of the role of COMNET-Aalto in the HEI ICI ENhANCE (Enhancing Education and Research in Networking and Communications Engineering) capacity building project.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Indoor Positioning Systems
1. Indoor Positioning Solutions (IPS): Someg ( )
background
J. Hämäläinen, August 2013
D t t f C i ti d N t kiDepartment of Communications and Networking
2. Business backgroundBusiness background
• The indoor location market is growing rapidly
At l t 130 i i l di bi l ki– At least 130 companies – including some big players - are working
on indoor maps, tracking and navigation technologies and services.
– Indoor location market is expected to grow fast and potentialp g p
benefits are seen in every level (consumer, service provider,
operator and supplier).
– There are individual players like Google and also group of players– There are individual players like Google and also group of players
like Nokia lead In-location alliance
http://www.in-location-alliance.com/
3. Some IPS use scenariosSome IPS use scenarios
• Navigation• Navigation
– Finding places in large office buildings, university buildings,malls, museums,
hospitals
Emergency situations: navigation of rescue personality and localization of– Emergency situations: navigation of rescue personality and localization of
people
• People and property tracking – patients, kids, visitors, travellers
– Example: Baggage tracking in airports
– Logistic – cargo and container tracking in warehouses, harbours, airports etc.
– Device (Factories, Offices & Hospitals) and items tracking (keys, wallets, bag,
l )laptops etc.)
• User applications
– Social applications: Finding peoplepp g p p
– Shopping, indoor parking assistance
• Advertising
4. Market expectations: Example onMarket expectations: Example on
Advertising
• Example: Local business
is spending on
advertising 50$ billion peradvertising 50$ billion per
year.
• ABI Research proposes
that by 2017 up to 4$
billion would be spent on
indoor positioning basedp g
advertising.
• This is just one service
example but indicates theexample but indicates the
expected potential of IP
technology. Indoor Location Revenues, Split by Infrastructure,
Analytics, and Advertising. World Market, Forecast:
2010 to 2017 (ABI Research 6/2012)
5. Technical IPS approachesTechnical IPS approaches
• Terminal based IPS:
– Most commercial products use terminal based IPS since it can be
easily implemented without permission/support from networkeasily implemented without permission/support from network.
• Infrastructure based IPS:
– Current infrastructure based IPS products use either dedicated IPSp
infrastructure or existing WiFi networks
• Hybrid IPS (terminal and infrastructure based):
Combine all available IPS information (WiFi BT geomagnetic– Combine all available IPS information (WiFi, BT, geomagnetic
information, intertia sensor information)
– Can be implemented using simple apps in terminals (at least in
A d id OS)Android OS)
8. Connection based positioningConnection based positioning
• In simple methods called as ”Cell of Origin or ”Cell Identity” terminal• In simple methods called as Cell of Origin or Cell Identity terminal
simply uses the location of the serving wireless node.
• To run this positioning system just a database of station IDs and
locations is needed.
• The position is determined by measuring the signal strengths from
different stationsdifferent stations
– It is assumed that the closest station is the station from which
the strongest incoming signal on the device is received
– Terminal just send the ID of the serving station to the IPS
database which send the location of the station to the terminal.
• This method is accurate only for short-range technologies like Wi-Fi• This method is accurate only for short-range technologies like Wi-Fi
and Bluetooth. Used in some GSM networks.
10. Trilateration/multilaterationTrilateration/multilateration
• These methods assume that signal strength and/or time delay is• These methods assume that signal strength and/or time delay is
directly proportional to the distance between the user terminal and
the base station.
– When this assumption holds it is a simple geometrical exercise to compute the
location of the user terminal provided that signals from at least three separate
base stations can be reliably received.
Th h ll f t il t ti th d i i th d t i ti f• The challenge for a trilateration method is in the determination of
the distance between the base station and the user terminal
– Methods that are based on time measurements assume accurate
synchronization between the base stations and the user terminal
– Methods that are based on the signal strength have problems with interference
and multipath propagation effects
– Well‐known methods for distance estimation are ToA, TDoA and RSSI/SNR
12. TriangulationTriangulation
B t ti th l f i l (A A) f th• Base stations measure the angle of arrival (AoA) for the
received signal from user terminal
• Location of the terminal is computed using the known• Location of the terminal is computed using the known
locations of the base stations and AoA measurements.
• Needs directive antennas and thus challenging toNeeds directive antennas and thus, challenging to
implement
– Special infrastructure needed.
– Some commercial solutions exist.
14. Fingerprint based approachFingerprint based approach
• Based on spatial differences in the radio environment.p
• Fingerprint based methods include two phases:
• 1) Offline Phase
• A fingerprint database is build by collecting signal strengths from all
identified base stations at pre-defined locations.
• Several measurements are collected at each location and e.g. theg
median signal strength values are calculated.
• The values are inserted into a radio environment map
– 2) Online Phase2) Online Phase
• User terminal that desire to define location measure the signal
strengths from surrounding base stations and compared result with
the radio environment radio mapthe radio environment radio map.
• Usually many measurements are needed to define the location from
the radio environment map.
15. Example of fingerprintingExample of fingerprinting
Transition probabilities
Light blue dots represent locations where signal strength has been
measured and black lines show possible routes
17. The big player: GoogleThe big player: Google
• Due to Google business approach the user reach in
general is of great importance.
• Google provides IPS map database and location functions
through Android
http://maps.google.com/help/maps/indoormaps/
• Did you know that Google uses your Android to collect
location based information?location based information?
18. Teaser: How google aggregatesTeaser: How google aggregates
radio data for positioning?
19. Automated fingerprintingAutomated fingerprinting
• Android Location Services check periodically user• Android Location Services check periodically user
location using GPS, 3GPP Cell-ID, and Wi-Fi to locate
your device
• When location is defined, user’s Android phone will send
back Wi-Fi access points' Service set identifier (SSID)
and Media Access Control (MAC) dataand Media Access Control (MAC) data
• As a result Google can aggregate radio fingerprinting
information taking advantage of users that employinformation taking advantage of users that employ
Android based location services
• Not only Google does this. It's common practice for
location database vendors.
20. Automated multiradio fingerprintingAutomated multiradio fingerprinting
Google fingerprinting
2) Location reference
Google fingerprinting
approach now
obtained using GPS
WiFi
pRBS
1) Terminal app make
measurements using
different radios
Measurements
include
- Radio node ID
Si l t thWiFi
3) Terminal send
measurement results
- Signal strength
mRBS
and reference
location information
to (Google) database
21. LimitationsLimitations
• The bottleneck in the Google approach is that accurate user• The bottleneck in the Google approach is that accurate user
location is needed before measured radio fingerprinting information
is useful
Usually best reference location is obtained through GPS• Usually best reference location is obtained through GPS
automated indoor fingerprinting is difficult due to lack of GPS
either manual fingerprinting or other location reference information is
needed indoorsneeded indoors
manual fingerprinting is not possible without access to indoor premises
(then, of course, access to indoor maps can be limited)
some development attempts have been done to use inertia sensors to some development attempts have been done to use inertia sensors to
provide reference location: location known when entering the building
and inertia sensors used to update location. Accuracy of this method
decreases with distance that user moves
> Google has been focusing on IPS for public venues – this far