Analysis of Object Location Accuracy for iBeacon Technology based on the RSSI Path Loss Model and Fingerprint Map
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 4
Abstract
This paper presents analysis of object location accuracy of a mobile device on the basis of the iBeacon technology. The research starts with radio signal strength indicator analysis along the corridor in order to create a path loss model for iBeacon. Two cases are taken into account: line of sight and non-line of sight for model creation. For both cases two tests: Chi-square, Shapiro-Wilk have been performed. It has also been checked if the HCI (Host Controller Interface) is a source with a memory. Acquired data have been filtered with different type of filters, e.g. median, moving average and then compared. Next, the authors evaluated the indoor positioning trilateration algorithms with the use of created model for exemplary hall. The RSSI map (radiomap) was created and the logarithm propagation model was designed. The logarithmic model estimated distance with average error 1.09m for 1 – 9m and 1.75m for 1-20m and after trilateration, the positions with average error 2.45m was achieved. A statistical analysis for acquiring data led to the final conclusion which enhanced knowledge about positioning based on the popular iBeacon technology
Authors and Affiliations
Damian Grzechca, Piotr Pelczar, Lukas Chruszczyk
MoveSteg: A Method of Network Steganography Detection
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then d...
Heart-rate Monitoring System Design and Analysis Using a Nios II Soft-core Processor
The heart rate of a person is able to tell whether they are healthy. A heart-rate monitoring device is able to measure or record the heart rate of a person in real time, whether it is an electrocardiogram (ECG) or a phot...
Network Steganography in the DNS Protocol
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can b...
Differential Noise Figure and Gain De-Embedding: the Wave Approach
The paper presents complete analysis of differential amplifier noise figure single-ended measurement setup. The analysis is based on scattering matrix representation for the network and wave representation for noise. As...
Understanding of Meyer and Stephens’s operator o as a multi-operational one
In this paper, the idea of an extended operator o introduced in the literature on modelling weakly nonlinear circuits by Meyer and Stephens is revisited. The mathematically precise definitions of this operator for the s...