scispace - formally typeset
Search or ask a question

Showing papers on "Smart device published in 2014"


Patent
25 Apr 2014
TL;DR: In this paper, the authors describe an infrastructure for using electronic lists to facilitate commerce, excursion organization, and political discourse in a distributed distribution system using trusted drivers and authorized affiliates.
Abstract: The communication hardware of the system is controlled by software processes that are preferably grouped as engines that also retrieve process and store data using system hardware. The engines control the communication system hardware to send and receive signals to and from users of the system. The communication signals may include data and control signals for exchanging information and also control signals for remote hardware that, for example, generate displays on user hardware such as smart devices. The communications system allows coordination of segmented order deliveries in a segmented order distributed distribution system. The infrastructure described supports efficient communication to a network of couriers and smart device APPS. Systems, methods and applications for using electronic lists to facilitate commerce, excursion organization and political discourse are also described. Lists stored within the system may be used to facilitate a distributed distribution system using trusted drivers and authorized affiliates.

104 citations


BookDOI
23 Apr 2014
TL;DR: This book uses 3GPP LTE-A as a baseline and explains all fundamental requirements for deploying D2D network under cellular systems from an architectural, technical and business view.
Abstract: This book presents a comprehensive analysis of D2D communication over LTE-A band. The book uses 3GPP LTE-A as a baseline and explains all fundamental requirements for deploying D2D network under cellular systems from an architectural, technical and business point of view. The contributors explain the standardization activities of Release 12 of LTE-A, which has been recently acknowledged as support of D2D communication in LTE-A. The text updates the research community on the D2D roadmap as well as new features emerging for consideration in 3GPP.

92 citations


Journal ArticleDOI
TL;DR: The architecture integrates novel data mining and machine learning algorithms with modern sensor fusion techniques and shows that it is quickly able to identify sensor anomalies and compared with several other algorithms, it maintains a higher true positive and lower false negative rate.
Abstract: This paper details the architecture and describes the preliminary experimentation with the proposed framework for anomaly detection in medical wireless body area networks for ubiquitous patient and healthcare monitoring. The architecture integrates novel data mining and machine learning algorithms with modern sensor fusion techniques. Knowing wireless sensor networks are prone to failures resulting from their limitations i.e. limited energy resources and computational power, using this framework, the authors can distinguish between irregular variations in the physiological parameters of the monitored patient and faulty sensor data, to ensure reliable operations and real time global monitoring from smart devices. Sensor nodes are used to measure characteristics of the patient and the sensed data is stored on the local processing unit. Authorized users may access this patient data remotely as long as they maintain connectivity with their application enabled smart device. Anomalous or faulty measurement data resulting from damaged sensor nodes or caused by malicious external parties may lead to misdiagnosis or even death for patients. The authors' application uses a Support Vector Machine to classify abnormal instances in the incoming sensor data. If found, the authors apply a periodically rebuilt, regressive prediction model to the abnormal instance and determine if the patient is entering a critical state or if a sensor is reporting faulty readings. Using real patient data in our experiments, the results validate the robustness of our proposed framework. The authors further discuss the experimental analysis with the proposed approach which shows that it is quickly able to identify sensor anomalies and compared with several other algorithms, it maintains a higher true positive and lower false negative rate.

87 citations


Patent
07 Feb 2014
TL;DR: In this article, the authors describe a cloud-based infrastructure for electronic lists to facilitate commerce, excursion organization, and political discourse in a distributed manner, where the information obtained directly from the users can be used to facilitate commercial and other transactions.
Abstract: Systems, methods and applications for using electronic lists to facilitate commerce, excursion organization and political discourse are described. The cloud based infrastructure described supports smart device APPS that encourage users to create electronic lists that include information that can be searched and used for targeted marketing without compromising the anonymity of the users. By providing IT infrastructure that facilitates and encourages users to create and share multiple lists, the system makes it possible to provide vendors, suppliers, marketers and interest organizations with direct information that is more valuable that information inferred from web browsing or other indirect acts. The information obtained directly from the users can then be used to facilitate commercial and other transactions. Lists stored within the system may be used to facilitate a distributed distribution system using trusted drivers and authorized affiliates.

81 citations


Patent
26 Jun 2014
TL;DR: In this article, a system for contextualized location aware content delivery comprising a group of beacons transmitting respective ID's, an application running on a smart device configured for receiving the beacons, determining signal amplitude, reception time, beacon ID, and sending ID and amplitude to a server over a network.
Abstract: A system for contextualized location aware content delivery comprising a group of beacons transmitting respective ID's, an application running on a smart device configured for receiving the beacons, determining signal amplitude, reception time, beacon ID, and sending ID and amplitude to a server over a network. The server determines location of the smart device and contextualizes the location based on a context location database with the server. Context information sent back to application. Application sends context information along with user action information to an application server over a network. Application server sends context related information to application for display to a user on said smart device. The server, application, and beacons may be provided as a service to a facility for use with customer's smart devices. A beacon ID security method is disclosed. Beacons may include precision location technology and relay information to one another and to the server.

79 citations


Patent
27 May 2014
TL;DR: In this article, the authors present a system comprising a miniature portable electronic device for interacting with a plurality of electronic devices including at least one smart device, at least 1 wireless electronic device and at least a remote web server connected to the mini-device over a wireless communication network.
Abstract: Disclosed system comprising a miniature portable electronic device for interacting with a plurality of electronic devices including at least one smart device, at least one wireless electronic device and at least one remote web server connected to the miniature portable electronic device over a wireless communication network. The system allows a user of the miniature portable electronic device to have partial and/or full control of a variety of electronic devices connected to the miniature portable electronic device over the wireless network. The miniature portable electronic device delivers functionality via its mini- apps to the user and optionally connects to the smart devices, the wireless devices and Internet. The miniature device is encased into wearable devices having a variety of shapes and form factors such as a finger ring, pendant to a neck chain, keychain, etc.

78 citations


Patent
18 Apr 2014
TL;DR: In this article, a smart device is provided with a main remote control application that may be configured using information obtained from a QR code, and the application may present images of original remote controls corresponding to devices which are controllable by the configured main remote controller application.
Abstract: A smart device is provided with a main remote control application that may be configured using information obtained from a QR code. The main remote control application may present images of original remote controls corresponding to devices which are controllable by the configured main remote control application. In connection with a presented image of an original remote control, the display may present icons that are representative of a subset of the buttons of the original remote control. The user interface also allows a user to select amongst the images of the original remote controls to change which appliances are to be controlled via the user interface. A pop-up remote control widget may also be provided which may be invoked without switching to the main remote control application provisioned on the smart device.

77 citations


Proceedings ArticleDOI
27 Mar 2014
TL;DR: A novel set of value added services, aimed at developing a set of modules which can facilitate the diagnosis for the doctors through tele-monitoring of patients, are introduced through this paper.
Abstract: This paper illustrates the design and implementation of an e-health monitoring networked system. The architecture for this system is based on smart devices and wireless sensor networks for real time analysis of various parameters of patients. This system is aimed at developing a set of modules which can facilitate the diagnosis for the doctors through tele-monitoring of patients. It also facilitates continuous investigation of the patient for emergencies looked over by attendees and caregivers. A set of medical and environmental sensors are used to monitor the health as well as the surrounding of the patient. This sensor data is then relayed to the server using a smart device or a base station in close proximity. The doctors and caregivers monitor the patient in real time through the data received through the server. The medical history of each patient including medications and medical reports are stored on cloud for easy access and processing for logistics and prognosis of future complications. The architecture is so designed for monitoring a unitary patient privately at home as well as multiple patients in hospitals and public health care units. Use of smartphones to relay data over internet reduces the total cost of the system. We have also considered the privacy and security aspects of the system keeping the provision for selective authority for patients and their relatives to access the cloud storage as well as the possible threats to the system. We have also introduced a novel set of value added services through this paper which include Real Time Health Advice and Action (ReTiHA) and Parent monitoring for people with their family living abroad.

76 citations


Proceedings ArticleDOI
18 May 2014
TL;DR: W WiFiHonk provides a practical safety means for the distracted VRU without requiring any special device using the WiFi of a smart device and provides an efficient collision estimation algorithm to issue appropriate warnings.
Abstract: Despite various high-tech Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications that have been developed for enhancing traffic safety, protecting vulnerable road users (VRU), such as pedestrians and bicyclists from the vehicles and trains still heavily relies on the traditional sound warning method. Furthermore, as smart devices continue to become highly ubiquitous, the more VRU are shutting out the safety related warning sounds. A traffic accident study shows the number of headphone-wearing VRU involved in roadside accidents has tripled since 2004. Although recently a few Car2Pedestrian communication methods have been proposed by various car makers, their practical usage is still in question. They assume VRUs' active attention to the communication while walking, and also mostly require special communication devices to cope with the wide range of mobility. In this paper, we propose a smartphone based Car2X communication system, named WiFiHonk that can alert of potential collisions to both VRU and vehicles in order to especially protect the distracted VRU. WiFiHonk provides a practical safety means for the distracted VRU without requiring any special device using the WiFi of a smart device. It is novel in that it removes the WiFi association overhead using the beacon stuffed WiFi communication and also provides an efficient collision estimation algorithm to issue appropriate warnings. Our experimental and simulation studies validate that WiFiHonk can successfully alert the VRU within a sufficient reaction time frame.

74 citations


Journal ArticleDOI
TL;DR: This framework transforms a smartphone to act as a unique and only identity required to access the TMIS system remotely, utilizing a smartphone capability over a dynamic Cloud Computing (CC) environment.
Abstract: The Telecare Medical Information System (TMIS) provides a set of different medical services to the patient and medical practitioner. The patients and medical practitioners can easily connect to the services remotely from their own premises. There are several studies carried out to enhance and authenticate smartcard-based remote user authentication protocols for TMIS system. In this article, we propose a set of enhanced and authentic Three Factor (3FA) remote user authentication protocols utilizing a smartphone capability over a dynamic Cloud Computing (CC) environment. A user can access the TMIS services presented in the form of CC services using his smart device e.g. smartphone. Our framework transforms a smartphone to act as a unique and only identity required to access the TMIS system remotely. Methods, Protocols and Authentication techniques are proposed followed by security analysis and a performance analysis with the two recent authentication protocols proposed for the healthcare TMIS system.

71 citations


Patent
14 Mar 2014
TL;DR: In this paper, a motion tracking system monitors the motions performed by a user based on motion data received from one or more sensors, such as accelerometer, gyroscope, and magnetometer.
Abstract: A motion tracking system monitors the motions performed by a user based on motion data received from one or more sensors. The motion tracking system may include a motion tracking device with one or more sensors, a smart device with one or more sensors and/or a server. As the user interacts with the motion tracking system or smart device the motion data generated by one or more sensors is processed by a software application. The software application generates interpreted data based on the motion data and contextual data such as the equipment being used by the user. Feedback is then provided to the user during and/or after the user has performed a motion or a set of motions. The feedback provided to the user may be visual, audio or tactile. The application may be used to monitor a routine in a sporting, fitness, industrial or medical environment, for example.

Journal ArticleDOI
14 Jul 2014
TL;DR: The power line communication (PLC) compliant with HomePlug is adopted to monitor each PV module and will maintain the performance of a PV system and contribute to enhancing home energy management system.
Abstract: This paper describes a photovoltaic (PV) system management scheme. A typical PV system installed in home monitors only the status values at the inverter. It has difficulty in localizing failures in the PV system for maintenance. To overcome this, we propose a PLC-based management scheme that consists of a PLC modem, a renewable energy gateway (REG), and a smart device application. The PLC modems measure the status of PV modules. The REG aggregates the measured status values from the PLC modems. The smart device application displays the status of the whole PV system. A user can easily localize failures in the PV system for better performance and maintenance. The proposed scheme enhances a PV system management and can create synergy with smart home energy management system.

Patent
20 Feb 2014
TL;DR: In this paper, the authors describe techniques for interacting with a portion of a content item through a virtual assistant, such as displaying the portion of the content item on a smart device in a displayable format that is adapted to a display characteristic of the smart device, performing a task for a user that satisfies user input, and so on.
Abstract: Techniques for interacting with a portion of a content item through a virtual assistant are described herein. The techniques may include identifying a portion of a content item that is relevant to user input and causing an action to be performed related to the portion of the content item. The action may include, for example, displaying the portion of the content item on a smart device in a displayable format that is adapted to a display characteristic of the smart device, performing a task for a user that satisfies the user input, and so on.

Journal ArticleDOI
TL;DR: Detailed structure and functionalities of the application with EMR data synchronization aspect of a mobile healthcare application for Android OS, developed to provide self-diabetes management, are introduced.
Abstract: With digitalization of medical information and rapid distribution of smart devices, currently, healthcare service is actively planned and developed based on smart devices. By 2015, 500 million smartphone users are expected to use a mobile health application, especially for exercise, diet, and chronic disease management. Unlike other chronic diseases, diabetes can be managed by the patient. Therefore smart mobile device can be a universal tool for self-diabetes management because of its high penetration and functions. A mobile healthcare application for Android OS was developed to provide self-diabetes management. The application consists of Diabetes management, Weight management, Cardio-cerebrovascular risk evaluation, Stress and depression evaluation and Exercise management. The application synchronizes data with hospital's EMR database to provide accurate data with minimized process of data input. This paper introduces detailed structure and functionalities of the application with EMR data synchronization aspect.

Journal ArticleDOI
TL;DR: In this paper, the authors examined the determinants of Smart Green IT adoption behavior and found that eco-technological knowledge has a positive and significant impact on intrinsic motivation, integrated regulation, identified regulation, and introjected regulation.

Book ChapterDOI
07 Sep 2014
TL;DR: CARDAP is a generic, flexible and extensible, component- based platform that can be deployed in complex distributed mobile analytics applications e.g. sensing activity of citizens in smart cities and can deliver significant benefits in energy efficiency over naive approaches.
Abstract: Distributed online data analytics has attracted significant research interest in recent years with the advent of Fog and Cloud computing. The popularity of novel distributed applications such as crowdsourcing and crowdsensing have fostered the need for scalable energy-efficient platforms that can enable distributed data analytics. In this paper, we propose CARDAP, a (C)ontext (A)ware (R)eal-time (D)ata (A)nalytics (P)latform. CARDAP is a generic, flexible and extensible, component- based platform that can be deployed in complex distributed mobile analytics applications e.g. sensing activity of citizens in smart cities. CARDAP incorporates a number of energy efficient data delivery strategies using real-time mobile data stream mining for data reduction and thus less data transmission. Extensive experimental evaluations indicate the CARDAP platform can deliver significant benefits in energy efficiency over naive approaches. Lessons learnt and future work conclude the paper.

Patent
Jay D. Logue1
16 Dec 2014
TL;DR: In this paper, a joining device is sent an indication that the electronic device is not connected to a network type and receives a device ID for an assisting device to assist the electronic devices in joining a network of the network type.
Abstract: Methods and systems for causing a device to join a network or fabric. A joining device sends an indication that the electronic device is not connected to a network type and receives a device ID for an assisting device to assist the electronic device in joining a network of the network type. Moreover, the assisting device resides on the network. The joining device then authenticates to the assisting device from the assisting device and receives network credentials for the network. Furthermore, the joining device joins the network using the network credentials.

Proceedings ArticleDOI
02 Jun 2014
TL;DR: In this article, a brief outline of an approach to online genetic improvement is presented, where existing progress in genetic improvement can be exploited to support adaptivity, using a "dreaming smart device" example that combines online and offline machine learning and optimisation.
Abstract: This paper presents a brief outline of an approach to online genetic improvement. We argue that existing progress in genetic improvement can be exploited to support adaptivity. We illustrate our proposed approach with a 'dreaming smart device' example that combines online and offline machine learning and optimisation.

Patent
22 Sep 2014
TL;DR: In this paper, the authors present a method, apparatus and system for readily and conveniently getting network access for a smart device, which includes receiving, by a server comprising a processor and a non-transitory storage medium, a first identification identifying a wireless access point and a first terminal identifier; receiving a second identification identifying the smart device and a second terminal identifier.
Abstract: The present disclosure provides a method, apparatus and system for readily and conveniently getting network access for a smart device. The method for network access for a smart device includes receiving, by a server comprising a processor and a non-transitory storage medium, a first identification identifying a wireless access point and a first terminal identifier; receiving a second identification identifying a smart device and a second terminal identifier; associating the wireless access point with the smart device if the first terminal identifier corresponds to the second terminal identifier, and sending the second identification for the associated smart device to the wireless access point. The wireless access point provides network access authentication information to the smart device so that the smart device can get access to a network provided by the wireless access point with the network access authentication information.

Journal ArticleDOI
TL;DR: In this article, an extended Kalman filter in conjunction with a quaternion rotation matrix approach was employed to transform accelerations from the object onto the global frame, and peak-to-trough changes in vertical COM position captured by a motion capture system, inertial measurement unit, and smart device were compared in terms of averaged and individual steps.

Patent
Prashant Reddy1, Mark Malhotra1, Evan J. Fisher1, Todd Hester1, Mark McBride1, Yoky Matsuoka1 
03 Nov 2014
TL;DR: In this article, an estimated time of arrival (ETA) relating to an arrival to an environment, an event, arrival of an activity, or a combination thereof is used to control a smart device.
Abstract: A method includes receiving an estimated time of arrival (ETA) relating to an arrival to an environment, an arrival of an event, arrival of an activity, or a combination thereof; and controlling, configuring, or controlling and configuring a smart device based upon the ETA.

Proceedings ArticleDOI
18 Dec 2014
TL;DR: It is demonstrated how the websites visited by a smart device can be inferred by applying machine learning and pattern matching techniques to eavesdropped encrypted traffic.
Abstract: The concept of Smart Home where appliances, sensors, actuators, displays and computing resources are connected and interact to support the life of the citizen is being increasingly researched. In this context, the Wi-Fi communication technology has grown to become the de-facto standard for data communications in Smart Home environments, with cordless telephony being dominated by the DECT protocol. Even though both technologies incorporate sets of security features aimed at securing the confidentiality and integrity of the communications, the nature and the design of both radio-frequency protocols make them vulnerable, up to a certain extent, to privacy leakages through traffic analysis attacks. In this paper we explore the information leakage vulnerabilities inherent to these technologies and their potential impact on citizens’ privacy in the context of the Smart Home. We demonstrate how the websites visited by a smart device can be inferred by applying machine learning and pattern matching techniques to eavesdropped encrypted traffic. Keywords—Privacy, Wireless communications, Machine learning

Journal ArticleDOI
01 Aug 2014
TL;DR: Design principles for smart objects to support the object discrimination training of students with autism are described and several example prototypes are presented, demonstrating T3 smart objects reduce the workload of teachers, ease the record-keeping and increase its reliability.
Abstract: Teachers spend considerable amount of time keeping students with autism "on task" giving away prompts and rewards and maintaining a detailed record of students' progress during the object discrimination training. We hypothesize that tangible computing, in particular smart objects, could help teachers cope with the problems faced during the object discrimination training of students with autism. In this paper, we describe design principles for smart objects to support the object discrimination training and present several example prototypes. First, we present the design and implementation of "Things that think" (T3), a smart device that converts traditional objects into smart objects that promote interactivity with a playful and engaging interaction, and are capable of the automatic recording of students' progress. Then, we present four T3 smart objects assembled in a board. The results of a 7-week deployment study of the use of such smart objects in three classrooms of students with autism (n = 25, 7 teachers and 18 students with autism) demonstrate T3 smart objects reduce the workload of teachers, ease the record-keeping and increase its reliability, and reduce students' behavioral problems while improving their cognitive efficacy. We close discussing directions for future work.

Patent
18 Sep 2014
TL;DR: In this article, a system and methods are provided that gather and store time series location information or other time-series information of a user using a mobile electronic device such as a smart phone and place that location information under control of the user.
Abstract: Systems and methods are provided that gather and store time-series location information or other time-series information of a user using a mobile electronic device such as a smart phone and place that location information or other information under control of the user A variety of types of analytics may be applied to the location information by consent of the user, and results may be shared by electronic consent of the user in order to provide benefit to the user The benefit may be commercial, personal, social, etc The information may be stored in encrypted form

Proceedings ArticleDOI
13 Sep 2014
TL;DR: The idea of Mobile Sequence Mining (MSM) engine that automatically learns phone usage sequential patterns over the rich context data captured within the device, which provides device intelligence by leveraging mined longitudinal patterns while preserving privacy via on-device mining is introduced.
Abstract: The next revolution in mobile user experience is predicted to be a smart device that can adapt to its user's lifestyle and surroundings to become a proactive personal assistant. We introduce the idea of Mobile Sequence Mining (MSM) engine that automatically learns phone usage sequential patterns over the rich context data captured within the device. The learned patterns can then enable variety of applications including proactive assistance for a variety of use cases. Unlike existing cloud-based intelligence services (e.g., GoogleNow) that rely on internet access and may compromise privacy, MSM provides device intelligence by leveraging mined longitudinal patterns while preserving privacy via on-device mining. MSM is generic and can provide sequential patterns and predictions over multiple data streams, also allowing individual mobile applications to stream their own private data to mine sequential patterns. In our preliminary tests by deploying MSM on 3 user devices, it mines frequent sequential patterns within 8 minutes over 7-53 days of longitudinal user context data including location, app usage and call logs spanning 137-312 unique contexts. We conclude the paper by enumerating future research challenges for mobile sequence mining.

Proceedings ArticleDOI
17 Apr 2014
TL;DR: This paper proposes to couple ID-based authentication and PKI mechanism, which offers mutual authentication between Smart Devices, and reduces the number of message exchanges and ultimately provides secure communication environments to Smart Devices.
Abstract: AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID-based authentication mechanism does not offer mutual authentication between User Device and Smart Meter. PKI (Public Key Infrastructure) in Smart Grid gives a guarantee for security, but the number of exchanged data to generate certificate for all Smart Devices is concerned. This paper proposes to couple ID-based authentication and PKI mechanism, which offers mutual authentication between Smart Devices. This proposed mechanism reduces the number of message exchanges and ultimately provides secure communication environments to Smart Devices.

Journal ArticleDOI
TL;DR: This paper clarifies the causal paths from complex dynamic interactions among young entrepreneurs, social networking sites, and smart devices to new SNS-based business model (BM) creation and finds that entrepreneurs should focus their attention on combining SNS resources with smart device characteristics, helping them create value in a profitable way.
Abstract: This paper clarifies the causal paths from complex dynamic interactions among young entrepreneurs, social networking sites (SNSs), and smart devices to new SNS-based business model (BM) creation. The empirical data are collected through interviews with 102 CEOs in Korean SNS-related venture companies. Using these data, we employ the triple helix model and business model concepts to analyse how the triple helix interactions influence BM innovation. Four types of new SNS-based BMs are identified and described. Our study finds that entrepreneurs should focus their attention on combining SNS resources with smart device characteristics, helping them create value in a profitable way. Also, our study provides policymakers and venture capitalists with a holistic view of BM innovation and enables them to make better decisions on investment and policy design.

Patent
14 Mar 2014
TL;DR: In this article, a motion tracking system monitors the motions performed by a user based on motion data received from one or more sensors, such as accelerometer, gyroscope, and magnetometer.
Abstract: A motion tracking system monitors the motions performed by a user based on motion data received from one or more sensors. The motion tracking system may include a motion tracking device with one or more sensors, a smart device with one or more sensors and/or a server. As the user interacts with the motion tracking system or smart device the motion data generated by one or more sensors is processed by a software application. The software application may be present on the smart device, the server, and/or the motion tracking device. The software application generates interpreted data based on the motion data and contextual data such as the equipment being used by the user. The interpreted data is then provided to the user during and/or after the user has performed a motion or a set of motions. The feedback provided to the user may be visual, audio or tactile.

Proceedings ArticleDOI
02 Jul 2014
TL;DR: The evaluation results show that the implemented system can detect the patient situation and is able to control the situation of patients by using Smart Box.
Abstract: In this paper, we propose and implement a medical support system considering P2P and IoT technologies. We used our implemented smart device that we call Smart Box. We have implemented in the Smart Box many functions and sensor such as body sensor, infrared sensor, chair or bed vibration control, light control, smell control and sound control. By using Smart Box the implemented system is able to control the situation of patients. We carried out experiments to evaluate the implemented system. The evaluation results show that the implemented system can detect the patient situation.

Journal ArticleDOI
28 Oct 2014-Sensors
TL;DR: A Modular Localization Algorithm is proposed to allow seamless switching between different positioning modules and a 2-phase map reduction algorithm is presented which allows one to significantly reduce the complexity of position estimation processes in case that positioning is performed using a fingerprinting framework.
Abstract: In recent times smart devices have attracted a large number of users. Since many of these devices allow position estimation using Global Navigation Satellite Systems (GNSS) signals, a large number of location-based applications and services have emerged, especially in transport systems. However GNSS signals are affected by the environment and are not always present, especially in dense urban environment or indoors. In this work firstly a Modular Localization Algorithm is proposed to allow seamless switching between different positioning modules. This helps us develop a positioning system that is able to provide position estimates in both indoor and outdoor environments without any user interaction. Since the proposed system can run as a service on any smart device, it could allow users to navigate not only in outdoor environments, but also indoors, e.g., underground garages, tunnels etc. Secondly we present the proposal of a 2-phase map reduction algorithm which allows one to significantly reduce the complexity of position estimation processes in case that positioning is performed using a fingerprinting framework. The proposed 2-phase map reduction algorithm can also improve the accuracy of the position estimates by filtering out reference points that are far from the mobile device. Both algorithms were implemented into a positioning system and tested in real world conditions in both indoor and outdoor environments.