redundant vs imperfect positioning for context dependent
play

Redundant vs. Imperfect Positioning for Context-dependent Services - PowerPoint PPT Presentation

Redundant vs. Imperfect Positioning for Context-dependent Services Tom Pfeifer Telecommunications Software & Systems Group [TSSG] Waterford Institute of Technology [WIT], Ireland TPfeifer@tssg.org [until 2003 Fraunhofer in Berlin,


  1. Redundant vs. Imperfect Positioning for Context-dependent Services Tom Pfeifer Telecommunications Software & Systems Group [TSSG] Waterford Institute of Technology [WIT], Ireland TPfeifer@tssg.org [until 2003 Fraunhofer in Berlin, Germany] 1

  2. Redundant vs. Imperfect Positioning for Context-dependent Services Positioning as a driving factor for ubiquitous / pervasive applications ❘❙❚ numerous technologies / devices developed in the lab ❘❙❚ few of them are actually used commercially ❘❙❚ some combinations and fusion approaches described – typically 2 technologies ❘❙❚ pervasive, extremely cheap devices ❘❙❚ visual tracking / recognition ❘❙❚ biometrics ❘❙❚ wireless coverage ❘❙❚ new quality of interworking position and context aware systems ❘❙❚ massive redundancy ❘❙❚ synergetic heterogeneity ❘❙❚ self-learning and self-healing vs. misleading, wrong and outdated information ❘❙❚ tailor positioning + confidence to application requirements ❘❙❚ 2 Telecommunications Software & Systems Group Tom Pfeifer

  3. Redundant vs. Imperfect Positioning for Context-dependent Services Widespread commercial systems Radar (ships, aircrafts) GSM/3G cell/subcell positioning RFID GPS (transponders used for decades, new momentum with EPC) Location inference technologies not primarily developed for this purpose, but bearing implicit information readers (at fixed positions) for magnetic swipe cards or chip cards ❘❙❚ network addresses (IP, MAC) can be mapped to positions ❘❙❚ Wifi software positioning ❘❙❚ (cellular access points, signal strength triangulation, mapped signal fingerprints) BlueTooth devices can be recognized in proximity to each other ❘❙❚ 3 Telecommunications Software & Systems Group Tom Pfeifer

  4. Redundant vs. Imperfect Positioning for Context-dependent Services Niche markets and laboratories Ultrawideband Positioning (Ubisense) Biometric devives Visual Tracking/Recognition Weight/force measuring (Active Floor, Smart Carpet) Active Badges (Infrared) Ultrasonic Devices (Active Bat, Cricket Compass) Wireless Sensor Networks 4 Telecommunications Software & Systems Group Tom Pfeifer

  5. Redundant vs. Imperfect Positioning for Context-dependent Services Fusion of location data “the use of multiple location systems simultaneously to form hierarchical and ❘❙❚ overlapping levels of sensing ... to increase accuracy beyond what is possible using any individual system” [Hightower/Borriello] Six layered model Single device fusion: Recursive [Hightower/Borriello, Intel research] Location Fusion PointMan™ OSI-network-layer inspired ❘❙❚ [Leonhardt/Magee GPS + Dead Reckoning ❘❙❚ Imperial College, London] location sensor as well as ❘❙❚ – tilt-compensated context information fusion three layer stack ❘❙❚ magnetic compass, proposed as a replacement can then be layered on to ❘❙❚ ❘❙❚ electronic pedometer and to “monolithic” systems its self barometric altimeter applied to IR / Ultrasound ❘❙❚ designed exclusively for ❘❙❚ fusion personnel on foot. 3.1” = 7.9 cm 5 Telecommunications Software & Systems Group Tom Pfeifer

  6. Redundant vs. Imperfect Positioning for Context-dependent Services Imperfection different classes of errors occur: ❘❙❚ – geometrical uncertainties, dilution of precision Errors ❘❙❚ (the only class considered so far) and misleading information – mismatch of temporal expectations Confidence: ❘❙❚ (temporal validity) multiple aspects: not a – change of relation between objects single percentage value (incidentially or intentionally) large number of individual characteristics: ❘❙❚ Human recognition ❘❙❚ facial properties, size, typical glasses, style of clothing, voice, ... if one of these properties does not match, ❘❙❚ – recognition succeeds due to the redundancy of the other, – compensating misleading information – adjust in a learning process to new values, e.g. the new hair cut or other clothing. redundant positioning ❘❙❚ Technical application ❘❙❚ – vast amount of sensing nodes of different kind – contributing to the whole image, consideration of misleading and wrong information 6 Telecommunications Software & Systems Group Tom Pfeifer

  7. Redundant vs. Imperfect Positioning for Context-dependent Services Redundant Ontology Positioning Architecture external Location API Filter Presentation Confidence Firewall Device type(s) deriving positions ❘❙❚ from all existing and specific Fusion Object interaction Prediction history systems Abstraction Specific positioning Collection Object position API history Preprocessing and Privacy blocking Input channels 7 Telecommunications Software & Systems Group Tom Pfeifer

  8. Redundant vs. Imperfect Positioning for Context-dependent Services Inter-Domain Location Domain communication Server loosely coupled ❘❙❚ cooperating domains Input channels peer to peer location ❘❙❚ information network message format / protocol ❘❙❚ for heterogeneity of data: – positions (geographical, Inter-Domain room-relative, mapped) filtering firewall – characteristics of objects (RFID, visual image, extracted features, Security and privacy measurements, etc.) – biometric data sets, data collection – where acceptable? ❘❙❚ – object interactions early avoiding of unneccessary collection ❘❙❚ filtered and firewalled ❘❙❚ filtering and firewalling, restricted access ❘❙❚ (different authorization levels) 8 Telecommunications Software & Systems Group Tom Pfeifer

  9. Redundant vs. Imperfect Positioning for Context-dependent Services Testbed at Wifi positioning technology (software based) already ❘❙❚ deployed in WIT campus, used for mobile group- Waterford Institute interaction experiments together with psychologists of Technology (NOMAD), adding triangulation hardware now existing partnership with O2 GSM/GPRS operator: ❘❙❚ sub-cell location data for campus area nearly complete penetration of GSM/GPRS handsets among the students GPS devices ❘❙❚ Ultrawideband positioning in office spaces ❘❙❚ RFID reader technology is being installed at ❘❙❚ numerous points around the campus, tags dispensed in a large number (mobiles, office property, teaching material, etc.). Exploiting all these sources Visual tracking cameras for selected labs ❘❙❚ ❘❙❚ –> critical mass of dual Swipe/Smart Card campus card in use, cash ❘❙❚ redundant data for debiting in a central database –> data about the implemention and specific cash terminal as positioning experiments patch-panel database for IP connection ❘❙❚ 9 Telecommunications Software & Systems Group Tom Pfeifer

  10. Redundant vs. Imperfect Positioning for Context-dependent Services Research and Data model Implementation different areas of interest: ❘❙❚ 10 cm within a building distinguishes two rooms Location model required: ❘❙❚ – longitude / latitude – different geodetical models of the earth – mapping to street locations Location – floor / room / sub-room addressing within the Building Name building Building Type Building Part/Floor/Room Building Info Entry/Exit Modelling Secondary Addresses Number Country/Postal Code/City Street different fusion algorithms ❘❙❚ Crossing Street evaluation of approaches in logistics − public offices ❘❙❚ − doctor's office, lawyer office Room Floor − cinema, theatre, ... Mathematical Analysis and Simulation 1 m Facility n n n 1 n n n Address processes a vast amount of data URL ❘❙❚ n:m to any m Business m m m m n Traffic analysis ❘❙❚ Networking Positioning 1 − companies, enterprises continuity and timeliness of the arriving data ❘❙❚ − restaurants, hotels − shops, malls, ... Interworking with other classes of context 10 Telecommunications Software & Systems Group Tom Pfeifer

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend