Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425163
Jiun-Jie Chen, Bo-Reui Chen, S. Huang
The traditional brake booster utilizes the pressure difference between atmosphere and vacuum to provide auxiliary force for brake. For the conventional vehicle, the vacuum is generated by the internal combustion engine. In order to use the same brake booster on the electric vehicle, the vacuum has to be created by an electric vacuum pump. The control of the electric vacuum pump can be achieved by an electromechanical pressure sensor which detects the change of the vacuum chamber and activates the pump. However, there is some concern that this system is not safe because the driver can not be noticed when the pump or the sensor failed. Therefore, the new system architecture of the electric vacuum brake booster system was proposed in this paper. The electronic pressure sensor replaces the electromechanical pressure sensor in the original system; as a result, the pressure of the vacuum chamber can be fed back to the electronic control unit, which achieves more precise pressure control. The electronic control unit also monitors the power source and the current of the electric vacuum pump, which can give information about whether the auxiliary brake force is available. Besides, four fail-safe strategies are developed for ensuring that all the failures can be found and handled. The electronic control unit was implemented with a microprocessor, and the functions were validated in the bench test as well as in a prototype vehicle. The results indicate that the driver can be informed the conditions of the electric vacuum brake booster system so that the driver has no unexpected and dangerous situations.
{"title":"The failure modes study for the electric vacuum brake booster system","authors":"Jiun-Jie Chen, Bo-Reui Chen, S. Huang","doi":"10.1109/ITST.2012.6425163","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425163","url":null,"abstract":"The traditional brake booster utilizes the pressure difference between atmosphere and vacuum to provide auxiliary force for brake. For the conventional vehicle, the vacuum is generated by the internal combustion engine. In order to use the same brake booster on the electric vehicle, the vacuum has to be created by an electric vacuum pump. The control of the electric vacuum pump can be achieved by an electromechanical pressure sensor which detects the change of the vacuum chamber and activates the pump. However, there is some concern that this system is not safe because the driver can not be noticed when the pump or the sensor failed. Therefore, the new system architecture of the electric vacuum brake booster system was proposed in this paper. The electronic pressure sensor replaces the electromechanical pressure sensor in the original system; as a result, the pressure of the vacuum chamber can be fed back to the electronic control unit, which achieves more precise pressure control. The electronic control unit also monitors the power source and the current of the electric vacuum pump, which can give information about whether the auxiliary brake force is available. Besides, four fail-safe strategies are developed for ensuring that all the failures can be found and handled. The electronic control unit was implemented with a microprocessor, and the functions were validated in the bench test as well as in a prototype vehicle. The results indicate that the driver can be informed the conditions of the electric vacuum brake booster system so that the driver has no unexpected and dangerous situations.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121211478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425156
Po-Ying Liao, Bing-Mao Wu, Yen-Wen Chen
The purpose of Cognitive Radio (CR) technology is to improve the spectrum utilization and the spectrum selection is one of the important issues to achieve this objective. In CR environment, many secondary users (SU) share the available spectrum and the SU shall properly select the channel to avoid congestion on the same channel so that the throughput can be maximized. This paper proposes a systematic method to select channel for better transmission performance. A fusion center (FC) is assumed to collect the channel information sent by SUs and decides the channel for the SU that issues the transmission request. The proposed schemes adopt the weight based concept to choose the appropriate channel for the SU. Two strategies, which are the egoistic approach and the cooperative approach, are proposed in this paper to maximize the individual transmission rate and overall system throughput, respectively. Exhaustive simulations were carried out to examine the performance of the proposed schemes. The simulation results show that the proposed schemes have better performance when compared to the other scheme.
{"title":"Study of channel selection strategies in cognitive radio networks","authors":"Po-Ying Liao, Bing-Mao Wu, Yen-Wen Chen","doi":"10.1109/ITST.2012.6425156","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425156","url":null,"abstract":"The purpose of Cognitive Radio (CR) technology is to improve the spectrum utilization and the spectrum selection is one of the important issues to achieve this objective. In CR environment, many secondary users (SU) share the available spectrum and the SU shall properly select the channel to avoid congestion on the same channel so that the throughput can be maximized. This paper proposes a systematic method to select channel for better transmission performance. A fusion center (FC) is assumed to collect the channel information sent by SUs and decides the channel for the SU that issues the transmission request. The proposed schemes adopt the weight based concept to choose the appropriate channel for the SU. Two strategies, which are the egoistic approach and the cooperative approach, are proposed in this paper to maximize the individual transmission rate and overall system throughput, respectively. Exhaustive simulations were carried out to examine the performance of the proposed schemes. The simulation results show that the proposed schemes have better performance when compared to the other scheme.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425212
Keita Watari, Takahiro Shoda, K. Tsudaka, T. Wada, K. Mutsuura, H. Okada
In recent years, there are many collision accidents between vehicles due to human errors. As one of measures against the collision accidents, a radar system mounted on a vehicle has been attracting attention. By the radar mounted on a vehicle, it is possible to recognize the situation around the vehicle. The ranging with automotive infrared radar is very accurate, and able to understand the object existence in the observation around the vehicle. However, in order to grasp the situation around the vehicle, it is necessary to be aware of the attribute of the detected object. The information obtained by the automotive radar vehicle is only the direction and the distance of the object. Thus, the determination of the attribute of the detected object is very difficult. In this paper, we propose a vehicle recognition method by using reflectors. Through experiments, we show that the proposed method is effective for vehicle recognition.
{"title":"Vehicle recognition method using reflectors for automotive infrared laser radar","authors":"Keita Watari, Takahiro Shoda, K. Tsudaka, T. Wada, K. Mutsuura, H. Okada","doi":"10.1109/ITST.2012.6425212","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425212","url":null,"abstract":"In recent years, there are many collision accidents between vehicles due to human errors. As one of measures against the collision accidents, a radar system mounted on a vehicle has been attracting attention. By the radar mounted on a vehicle, it is possible to recognize the situation around the vehicle. The ranging with automotive infrared radar is very accurate, and able to understand the object existence in the observation around the vehicle. However, in order to grasp the situation around the vehicle, it is necessary to be aware of the attribute of the detected object. The information obtained by the automotive radar vehicle is only the direction and the distance of the object. Thus, the determination of the attribute of the detected object is very difficult. In this paper, we propose a vehicle recognition method by using reflectors. Through experiments, we show that the proposed method is effective for vehicle recognition.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122968852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425205
Shih-Tzung Chen, Yu-Hsin Chou
A dedicated Human and Organisational Factors (HOFs) framework for maritime accidents analysis is obviously worthwhile to be developed. In this article, a prototype of the framework is proposed and named as Human Factors Analysis and Classification System for Maritime Accidents (HFACS-MA). This is an analogue of HFACS and is in line with the core concepts of Reason's Generic Error Modelling System (GEMS) and Hawkins's SHEL model. Moreover, it complies with the requirements regarding the International Maritime Organization (IMO) guidelines. A proposed analysis method which incorporates HFACS-MA with Why-Because Analysis to provide a comprehensive insight into the accident regarding Herald of Free Enterprise disaster is also demonstrated. This integration may prove beneficial for spotlighting the causalities of the causal factors identified and the vulnerability of the operating system. The reasons that the integration can be deemed as complements to the demographics of a study using HFACS are also discussed in this paper.
一个专门用于海上事故分析的人为和组织因素(HOFs)框架显然值得开发。本文提出了该框架的原型,并将其命名为HFACS-MA (Human factor Analysis and Classification System for Maritime Accidents)。这是HFACS的模拟,符合Reason的通用错误建模系统(GEMS)和Hawkins的SHEL模型的核心概念。此外,它还符合国际海事组织(IMO)准则的要求。本文还提出了一种将HFACS-MA与Why-Because分析法相结合的分析方法,以全面了解“自由企业先驱号”事故。这种集成可能有助于突出所识别的因果因素的因果关系和操作系统的脆弱性。本文还讨论了集成可以被视为使用HFACS进行人口统计研究的补充的原因。
{"title":"Examining Human Factors for marine casualties using HFACS - maritime accidents (HFACS-MA)","authors":"Shih-Tzung Chen, Yu-Hsin Chou","doi":"10.1109/ITST.2012.6425205","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425205","url":null,"abstract":"A dedicated Human and Organisational Factors (HOFs) framework for maritime accidents analysis is obviously worthwhile to be developed. In this article, a prototype of the framework is proposed and named as Human Factors Analysis and Classification System for Maritime Accidents (HFACS-MA). This is an analogue of HFACS and is in line with the core concepts of Reason's Generic Error Modelling System (GEMS) and Hawkins's SHEL model. Moreover, it complies with the requirements regarding the International Maritime Organization (IMO) guidelines. A proposed analysis method which incorporates HFACS-MA with Why-Because Analysis to provide a comprehensive insight into the accident regarding Herald of Free Enterprise disaster is also demonstrated. This integration may prove beneficial for spotlighting the causalities of the causal factors identified and the vulnerability of the operating system. The reasons that the integration can be deemed as complements to the demographics of a study using HFACS are also discussed in this paper.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122645691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425206
Sin-Der Lee, C. Tzeng, K. Shu
This work is concerned with the design analysis and experiment of a small boat-based auto-berthing control system. The autopilot system is implemented using an Internal Model Control (IMC) structure, in which the ship model parameters and the value of the IMC design parameter β are estimated from MATLAB/Simulink simulations performed using the data acquired from a series of real-world maneuvering trials performed using a small fiber reinforced plastic (FRP) boat. In the berthing stage, both the yaw angle and the sway distance are used as feedback signals to activate the bow and stern thrusters, and proper thrust allocation is employed to achieve smooth sideway movements towards the berthing wall. The experimental results revealed that the auto-berthing control system successfully mimics the actions of a human pilot in accomplishing the approach and berthing maneuvers of a small boat in a real-world harbor environment.
{"title":"Design and experiment of a small boat auto-berthing control system","authors":"Sin-Der Lee, C. Tzeng, K. Shu","doi":"10.1109/ITST.2012.6425206","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425206","url":null,"abstract":"This work is concerned with the design analysis and experiment of a small boat-based auto-berthing control system. The autopilot system is implemented using an Internal Model Control (IMC) structure, in which the ship model parameters and the value of the IMC design parameter β are estimated from MATLAB/Simulink simulations performed using the data acquired from a series of real-world maneuvering trials performed using a small fiber reinforced plastic (FRP) boat. In the berthing stage, both the yaw angle and the sway distance are used as feedback signals to activate the bow and stern thrusters, and proper thrust allocation is employed to achieve smooth sideway movements towards the berthing wall. The experimental results revealed that the auto-berthing control system successfully mimics the actions of a human pilot in accomplishing the approach and berthing maneuvers of a small boat in a real-world harbor environment.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we developed an Unmanned Aerial Vehicle (UAV) image registration system consisting of UAV image to UAV image registration, UAV image to Google satellite image registration, and registration refinement with a normalized variant of mutual information for quality mismatch problem. We show the limitation of the conventional mutual information for quality mismatch and then suggest using a normalized variant of mutual information to refine registration between UAV image and Google satellite image. Experiments carried out on the realistic UAV image sequence and Google satellite image show that the developed system could provide better UAV-to-satellite image registration and could conquer the quality mismatch problem.
{"title":"Image registration among UAV image sequence and Google satellite image under quality mismatch","authors":"Shih-Ming Huang, Ching-Chun Huang, Cheng-Chuan Chou","doi":"10.1109/ITST.2012.6425189","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425189","url":null,"abstract":"In this paper, we developed an Unmanned Aerial Vehicle (UAV) image registration system consisting of UAV image to UAV image registration, UAV image to Google satellite image registration, and registration refinement with a normalized variant of mutual information for quality mismatch problem. We show the limitation of the conventional mutual information for quality mismatch and then suggest using a normalized variant of mutual information to refine registration between UAV image and Google satellite image. Experiments carried out on the realistic UAV image sequence and Google satellite image show that the developed system could provide better UAV-to-satellite image registration and could conquer the quality mismatch problem.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122697798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425288
Nesrine Benhassine, Emmanuel Thierry, J. Bonnin
The use of IP tunneling has incredibly increased during the last years. It is needed in some contexts such as IP-based ITS communication but implies overhead. This overhead can be reduced using some techniques as header compression. Among them, RoHC is the most advanced header compression standard wich support errorprone link. In this paper we describe our kernel implementation of an opensource RoHC library. We give the first performance results we obtained with our implementation and sketchup some of our future works.
{"title":"Efficient header compression implementation for IP-based ITS communications","authors":"Nesrine Benhassine, Emmanuel Thierry, J. Bonnin","doi":"10.1109/ITST.2012.6425288","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425288","url":null,"abstract":"The use of IP tunneling has incredibly increased during the last years. It is needed in some contexts such as IP-based ITS communication but implies overhead. This overhead can be reduced using some techniques as header compression. Among them, RoHC is the most advanced header compression standard wich support errorprone link. In this paper we describe our kernel implementation of an opensource RoHC library. We give the first performance results we obtained with our implementation and sketchup some of our future works.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121795797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425284
Wen-min Lin, Jia-Chin Lin, Yu Ting Sun
Orthogonal frequency division multiplexing (OFDM) is desirable technique of wireless communication. Subcarriers of OFDM signal are orthogonally used on the frequency spectrum, and can resist multipath effect characteristics. Recently, OFDM has been used widely in many kinds of communication standards. But the OFDM signal has a major disadvantage is high peak-to-average power ratio (PAPR), which can resulted in significant nonlinear distortion when the signal is operated through a nonlinear region of power amplifier, and induces the degradation of bit error rate (BER). The methods of PAPR reduction, selective mapping (SLM) is effective and uncomplicated. SLM is a linear operation, it doesn't destroyed the signal itself. The received signal can be demodulated perfectly at receiver. But SLM has a problem of the high computational complexity, in this paper, introduce a modified SLM. The technique uses the concept of partition into subcarriers, called a partial-sequence SLM (P-SLM), which considerably reduces the computational complexity with the similar performance of PAPR reduction compared with the conventional SLM scheme. The simulation results show that it achieves better performance of reduces the computational complexity than the conventional SLM scheme.
{"title":"Modified selective mapping technique for PAPR reduction in OFDM systems","authors":"Wen-min Lin, Jia-Chin Lin, Yu Ting Sun","doi":"10.1109/ITST.2012.6425284","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425284","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is desirable technique of wireless communication. Subcarriers of OFDM signal are orthogonally used on the frequency spectrum, and can resist multipath effect characteristics. Recently, OFDM has been used widely in many kinds of communication standards. But the OFDM signal has a major disadvantage is high peak-to-average power ratio (PAPR), which can resulted in significant nonlinear distortion when the signal is operated through a nonlinear region of power amplifier, and induces the degradation of bit error rate (BER). The methods of PAPR reduction, selective mapping (SLM) is effective and uncomplicated. SLM is a linear operation, it doesn't destroyed the signal itself. The received signal can be demodulated perfectly at receiver. But SLM has a problem of the high computational complexity, in this paper, introduce a modified SLM. The technique uses the concept of partition into subcarriers, called a partial-sequence SLM (P-SLM), which considerably reduces the computational complexity with the similar performance of PAPR reduction compared with the conventional SLM scheme. The simulation results show that it achieves better performance of reduces the computational complexity than the conventional SLM scheme.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425197
Yu-Chih Wei, Yi-Ming Chen
In VANETs, how to resistant from collusion attacks are still an open problem. There are more and more attentions in recent years for improving the trust management model to counter collusion attacks. In this paper, we first evaluate beacon based trust management system, BTM, and RSUs aided model, RaBTM, with different combination of collusion attacks. Both of these two systems aim to propagate message opinions quickly while thwart internal attackers in privacy-enhanced VANETs. To evaluate the reliability of these two systems under different combination of collusion attacks effectively, we conducted a set of simulations with colluding alteration attacks and bogus message attacks. The simulation results show that the RaBTM and BTM are highly resilient to collusion attacks and performs at least 15% better than comparison baseline.
{"title":"Evaluation of collusion resistance on trust management systems for VANETs","authors":"Yu-Chih Wei, Yi-Ming Chen","doi":"10.1109/ITST.2012.6425197","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425197","url":null,"abstract":"In VANETs, how to resistant from collusion attacks are still an open problem. There are more and more attentions in recent years for improving the trust management model to counter collusion attacks. In this paper, we first evaluate beacon based trust management system, BTM, and RSUs aided model, RaBTM, with different combination of collusion attacks. Both of these two systems aim to propagate message opinions quickly while thwart internal attackers in privacy-enhanced VANETs. To evaluate the reliability of these two systems under different combination of collusion attacks effectively, we conducted a set of simulations with colluding alteration attacks and bogus message attacks. The simulation results show that the RaBTM and BTM are highly resilient to collusion attacks and performs at least 15% better than comparison baseline.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128037756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/ITST.2012.6425232
T. Nagaosa, H. Iguchi
This paper describes a study of the performance improvement of Wireless LAN (WLAN) positioning system using spot information for pedestrian navigation systems. Spot information presents the names of landmarks, stores, rooms on walls, signboards or door plates. On the positioning procedure, a user first sends a spot name in front of him explicitly and BSSID and received signal strength information from WLAN implicitly to a positioning server. Then the server program specifies the user's position using a spot information database and WLAN database. The spot information database includes the lists of spots' names and their coordinates and the WLAN database includes the list of BSSIDs and received power strength data and their observed coordinates. This system must be registered a spot name by the user which want to get his location.
{"title":"Performance evaluation of a Wireless LAN positioning system using spot information","authors":"T. Nagaosa, H. Iguchi","doi":"10.1109/ITST.2012.6425232","DOIUrl":"https://doi.org/10.1109/ITST.2012.6425232","url":null,"abstract":"This paper describes a study of the performance improvement of Wireless LAN (WLAN) positioning system using spot information for pedestrian navigation systems. Spot information presents the names of landmarks, stores, rooms on walls, signboards or door plates. On the positioning procedure, a user first sends a spot name in front of him explicitly and BSSID and received signal strength information from WLAN implicitly to a positioning server. Then the server program specifies the user's position using a spot information database and WLAN database. The spot information database includes the lists of spots' names and their coordinates and the WLAN database includes the list of BSSIDs and received power strength data and their observed coordinates. This system must be registered a spot name by the user which want to get his location.","PeriodicalId":143706,"journal":{"name":"2012 12th International Conference on ITS Telecommunications","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128959215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}