The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater mobile sensor node localization is a key enabling technology for several subsea missions. A novel scalable underwater localization scheme, called Best Suitable Localization Algorithm (BLSA), is proposed to dynamically fuse multiple position estimates of sensor nodes using fuzzy logic, aiming at improving localization accuracy and availability along the whole trajectory in missions. Numerical...
Tactical military communication networks operate in highly complex environments. The survivability and the range of these networks, especially the mobile wireless segments, are and will be a challenge for the present and future defence forces. OPAL, an autonomous system, has been previously presented where it extended the range and improved the survivability of tactical military networks using unmanned...
Due to the sparse distribution of road video surveillance cameras, precise trajectory tracking for hit-and-run vehicles remains a challenging task. Previous research on vehicle trajectory recovery mostly focuses on recovering trajectory with low-sampling-rate GPS coordinates by retrieving road traffic flow patterns from collected GPS information. However, to the best of our knowledge, none of them...
This work presents a new concept of environment mapping aiming to identify dynamic objects in the scene, and then estimate their direction and future position. The motion analysis is performed directly in the traditional 2D costmap through three different map frames. Costmap is a traditional mapping technique that uses an occupation grid is used, where each cell has a degree of uncertainty about whether...
In the modern information society, accurate prediction of human mobility becomes increasingly essential in various areas such as city planning and resource management. With users' historical trajectories, the inherent patterns of their movements can be extracted and utilized to accurately predict the future movements. In this paper, based on a dataset of 100,000 individuals' actively uploaded location...
Currently deployed wireless and cellular positioning techniques are optimized for outdoor operation and cannot provide highly accurate location information in indoor environments. Meanwhile, new applications and services for mobile devices, including the recent Enhanced 911 (E911), require accurate indoor location information up to the room/suite level. In this work, a new system for improving indoor...
Communications survivability of mobile wireless segments in tactical military networks is and will be an enormous challenge in the present and future defence forces, which is vital to fulfill military missions in a timely manner. We have previously presented an autonomous system named OPAL, which uses distributed cooperative management solutions for enhancing communications survivability in volatile...
Localization is a very important issue to wireless sensor networks. The sensor node requires accurate location information in order to achieve the purpose of real-time monitoring and transmission of information. The more the sensor nodes and GPS modules are used in localization, the higher the localization accuracy can achieve, but employing more sensor nodes also leads to high costs. Thus, how to...
Due to the iteration-varying initial position, it is complicated in path-tracking for the mobile service robot. Perspective dynamic system (PDS) provides a theory to formulate the system, which transmits from the apparent motion to the image plane and provides a good control theoretic framework to estimate motion problem. The proposed iterative learning control (ILC) algorithms not only consider errors...
This paper presents a new technique to locate a device moving along a known trajectory, when it is equipped with an UHF RFID reader. The proposed technique exploits the phase of consecutive readings of a single stationary tag positioned near the device trajectory, within the reader coverage area. To increase the length of the monitored path where the reader can be effectively localized, the localization...
We examine a two-player, zero-sum, differential turret defense game, which consists of two players, a mobile Attacker and a stationary Defender. The Attacker is modeled as a mobile agent moving with a constant speed about a infinite, two-dimensional plane, and it is capable of making instantaneous changes in direction. The Defender is modeled as a stationary target located at the origin, and it is...
With the popularity of mobile Internet and the rapid development of data mining, we can collect users' behavior trajectory and find regularity from a large amount of data. In this paper, we use the WiCloud system to obtain students' trajectory information, and propose a spatial-temporal clustering method based on K-means algorithm, which clusters students into three types: study-oriented, enclosed...
Understanding human mobility patterns is of great importance for planning urban and extra-urban spaces and communication infrastructures. The omnipresence of mobile telephony in today's society opens new avenues of discovering the patterns of human mobility by means of analyzing cellular network data. Of particular interest is analyzing passively collected Network Events (NEs) due to their scalability...
With the rapid development of mobile Internet, the ways in which users access the network become diverse, which provides much convenience for us to collect huge amount of users' behavior information. In this paper, we combine data acquisition based on wireless access and brand analysis innovatively. This paper analyzes proportions of mobile terminal brands on campus using the data collected from WiCloud...
We present a hybrid programming method for industrial robots combining advantages of manual haptic guidance of the end-effector and programming approaches using non-haptic pointing gestures for the spatial definition of poses and trajectories. Whereas the bare-hand spatial interaction can be implemented and performed cost- and time-efficiently but lacks accuracy, haptic-interaction is more time-consuming...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
In this paper we consider the data caching problem in next generation data services in the cloud, which is characterized by using monetary cost and access trajectory information to control cache replacements, instead of exploiting capacityoriented strategies as in traditional research. In particular, given a stream of requests to a shared data item with respect to a homogeneous cost model, we first...
Modern automotive vehicles with their included sensors, recording environmental parameters and also a multitude of car- and traffic-related data have developed into complex mobile systems in the time of Internet of Things and Big Data. These data recorded can be characterized as “spatio-temporal” by their nature and can, thus, be classified as “geodata”, which enables comprehensive analysis and visualizations...
This paper proposes a method to optimize the structure of the radial basis function neural network (RBFNN) by using particle swarm optimization (PSO) algorithm. The combination of PSO and RBFNN can overcome the disadvantages of RBF neural network. The PSO algorithm is used to determine the number of hidden neurons, initial weights, center and base widths in RBF neural network. After being optimised,...
The recent exponential growth of the Internet of Things (IoT) and its mobile devices asks for the advancement of mobile networks technology. In such direction, current and next generations of cellular and vehicular networks foresees adhoc communication. In such paradigm, as entities are constantly moving, connections between them are intermittent and of little, if none, reliability. Recent studies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.