Location-based the cell tower, then the cell tower

Topic: BusinessSteve Jobs
Sample donated:
Last updated: February 15, 2019

Location-based services are location information services that collect and position geographic information on the map that can be accessed on the internet through appropriate electronic gadgets computers or smart-phones.When estimating the user’s location, there are many different techniques that can be used and with each technique having it’s own advantage and drawback.

(Eg: When positioning a user at a particular location using only GPS satellites, it can take more times to receive the requested output depending upon the location of the user and the signal strength the user’s device is broadcasting. This feature can result in many drawbacks if you are monitoring an object in real-time. To ease this problem, they have introduced new techniques that combine two or more techniques.

Don't use plagiarized sources.
Get Your Custom Essay on "Location-based the cell tower, then the cell tower..."
For You For Only $13.90/page!


Get custom paper

Example: The modern smart-phones, uses Wi-Fi hotspot with the cell tower data triangulation to find the GPS data for the user faster.)Smart-phones are not equipped with real GPS receivers because real GPS are expensive. Smart-phones are instead equipped with AGPSfootnote{AGPS – Assisted Global Position System} which are much faster than real GPS receivers because they ping the cell tower, then the cell tower which is equipped with a real GPS receiver ping the GPS satellites and make the results back to the cell tower and then the smart-phone much faster than the process of the smart-phone sending immediately the request to the GPS satellites. subsection{ extbf{Two methods used to Position an Object}}egin{itemize}item extbf{Triangulation:} is a technique used to estimate the user’s location by calculating the angle of arrival of the signal transmitted by the user’s mobile phone to the base tower.egin{figure}h!  centering  includegraphicswidth=60mm{figs/triangulation.png}  caption{Triangulation Technique.}  label{fig:fig 41}end{figure}This process is executed by converting the Antenna of the user’s mobile phone into a 0.

1 seconds GPS receiver in order to be able to ping all the nearest cell towers with stronger signals to connect to that cell tower as setted up by the carrier of that mobile phone to call and receive phone calls and other related application such as internet surfing, etc. and to use this feature to estimate the current location of that cell phone.Cell towers have known position and unique cell ID which make this application easier and possible.The cell phone log it’s information from the connected cell tower using the phone’s clock and send the collected information to the cell tower to be processed by the BSSfootnote{BSS – Basic Service Set which is a component of IEEE 802.11 WLAN Architecture} computer and then the BSS computer send the exact location of the cell-phone.As shown in Figure ef{fig:fig 41} to pinpoint a mobile signal, we need at least three or more cell towers to increase the accuracy of the output or the exact location of the user.

Apart of the angle of arrival, there are other techniques that can be used in triangulation like extbf{Time of Arrival or Time difference of Arrival or Enhanced-observed Time difference} which are to estimate the distance of the user from the tower by using the time delay of the received signal at each tower between the time the tower ping a request to the mobile user and receive back the acknowledgement of that request. This can also be used to estimate the speed of the moving object.item extbf{Trilateration:} is a technique used by GPS satellite to estimate the location of the user by measuring the distance of the received signal.

The Angle of arrival of the signal is unknown to this technique.This process is executed by calculating the intersection of three radiated spheres from the GPS satellites signals. The GPS satellites have known locations in space which are helpful to estimate the location of the user.As shown in  Figure ef{fig:fig42} the location of the user is determined by the point of intersection of all the circles radiated by the satellites.egin{figure}h!  centering  includegraphicswidth=60mm{figs/trilateration.

png}  caption{Trilateration Technique.}  label{fig:fig42}end{figure}end{itemize}subsection{Application of Positioning Systems}egin{itemize}item extbf{Extracting locations:} You can access your exact location on the map and this accessed location can guide you navigate easily to a particular destination giving you directions and can provide access to monitor real-time traffic conditions and provide the ability to see nearby things like restaurants, grocery stores, etc.item extbf{Social services:} LBS can be used to enrich social networking with help of the “check-ins” features with geographic services and capabilities such as geo-tags to help you know a friend that is near you or where your friends like to go and a shortcut route to a particular destination and monitoring your daily walk.item extbf{Information technology management:} You can track and lost and stolen devices, or help you track the location of a virus outbreak and stop it and it can help you to control wireless networks access, while limiting access to a defined location, measuring and monitoring usage by a device class.end{itemize}subsection{Location Sensing Technology}egin{itemize}item extbf{Global Navigation Satellite Systems (GNSS):} is a type satellite positioning systems powerful enough to cover the whole world, using satellites to provide positioning transmitted coordinates with the time and date they transmitted.The GNSS is mainly divided into three parts: The GPS, GLONAS, and GALILEO where each of these are also made of extit{ space segment, control segment} and extit{ user segment}.

The GNSS uses orbiting satellites that are synchronized with ground stations networks to allow the electronic receiver/transmitter device to provide the positioning geographic locations of the requested user anywhere in the world.The Table ef{tab:gnss} shows the properties for Global Navigation Satellite Systems. The GNSS are used both indoor and outdoor using the time signals transmitted along the line of sight. It provides high precision of the coordinates which are in the range of fewer than 10 meters. egin{table}caption{Global Navigation Satellite Systems}label{tab:gnss}egin{center}egin{tabular}{ c c}hline extbf{Coverage} & outdoor(Line of Sight) extbf{Accuracy} & 10 meters extbf{Infrastructure Cost} & High extbf{Per-Client Cost} & Medium extbf{Privacy} & High extbf{Application Domain} & Outdoor navigationhlineend{tabular}end{center}end{table}item extbf{Manual Coordinate Entry} : the manual coordinates features can be used to search that particular location or to draw or add some geographic locations to the map or the web application manually (eg.

google search, etc.).The Table ef{tab:mce} shows the properties for the manual entry of coordinate to the web application or software to draw some locations on the map. This provides accurate results in the range less than 50 km and only if that place is a populated area, which means that the location is known by the application as the coordinates were shared by the people that have been to that same location.egin{table}caption{Manual coordinate Entry}label{tab:mce}egin{center}egin{tabular}{ c c}hline extbf{Coverage} & Populated Areas extbf{Accuracy} & 10 m – 50 km extbf{Infrastructure Cost} & Low extbf{Per-Client Cost} & Low extbf{Privacy} & High extbf{Application Domain} & Location Based Servicesitem extbf{IEEE 802.

11 Wireless LAN (Wi-Fi): } IEEE 802.11 fingerprint provide wireless network which may be used in identifying a device through a wireless traffic, where each device on the network has it’s own unique signature and MACfootnote{MAC – Medium Access Point, is individually assigned to the network interface cards (NICs)} address assigned to it which may be used to monitor and track the device on the network. Wi-Fi devices are connected as to the wired network via WAPfootnote{WAP – Wireless Access Point}.

egin{table}caption{IEEE 802.11 Fingerprint}label{tab:iee}egin{center}egin{tabular}{ c c}hline extbf{Coverage} & Outdoor, Campus extbf{Accuracy} & 02 – 10 m extbf{Infrastructure Cost} & High extbf{Per-Client Cost} & Low extbf{Privacy} & Low/ High extbf{Application Domain} & Process Management (eg. Hospitals)item extbf{Beacon Location Based System:} they are the type of Bluetooth low energy transmitter that scan or sense nearby radio sources and send data to that particular device with high performance and provide accurate user location. It also stores and updates the radio database. Tableef{tab:iee} show the properties for Radio Beacon Locator. The Beacon consumes low power and cover up to 150 meters.

It is deployed very easily and requires an installed application to run.As we have discussed here before and as shown in the Picture ef{fig:fig40}, mobile phone do more than just calling and receiving calls. It also provides features that are helpful to track the user’s position in real-time and share their locations.  The camera’s also might provide the location of the user using the GPS features that record the location and time the picture or the video were taken and google photos also can estimate the place the picture or the video were taken using Google location history that is stored on the google account of the user.Know services the user need and to& With location shared publicallygive recommendations to the companies.

& User’s privacy and security is at risks.Track User’s movement to might use thisimprove predictive traffic routing. into kidnapping the userSuggests nearby businesses&(eg. Children of a famous person)and points of interest like Hotels, etc.

other related criminals acts.Faster response in case of emergencies can be found even when you don’tWeather condition in your location.&want to be found (eg. famous peopleGeo-tags posts and photos in social media&or their children or visiting friends and o create a digital journal of&take pictures from that home,places you visited in time.&they immediately give the address ofFacility to track your lost items.&that famous person in geo-tags).Provide directions when navigating.

&Burglars might know you are away, Provide geographic relevant search&from the check-ins in your social media 
esults and appropriate ads.&and go to steal at your home. Data mining is a process of analyzing and extracting useful information quickly from all your raw data and analytically discovering all the useful situations to give your enough insightful knowledge for making smart decisions and predicting the future outcome.  This is the reason why we applied data mining in our project to carefully analyze our data trajectories and make accurate predictions of future moves of our users driven to our analysis and preferences of the users as we will discuss in this thesis. cite{A}In Data Mining they are two categories of learning sets: egin{enumerate}    item extbf{Supervised learning:} the data include both input and output values. The supervised learning approach takes the input data which are labeled data vectors, process these input data to produce appropriate output and this process can repeat itself multiple times with taking the output of one process as the input of the next process.    The supervised learning algorithm has high performance rate due to it’s ability to analyze data very fast and produce fast and more precise output and this is the reason why supervised learning models have a wide range of applications especially in Neural Networks and Multi-layer perception, etc.

.        item extbf{Unsupervised learning}: the user does not provide labeled data to the machine during the training of the data set, this means that the machine has to extract the data by its own to produce the required output. Due to this, it’s not easy to assess the performance and accuracy of the result.    This method is very useful when we need to cluster the input information in classes on the basis of their statistical properties, for example in the case of density estimation, K-means, self-organizing maps, etc.     end{enumerate}subsection{Trajectory Data Processing}Initially, spatial trajectories are not authentic due to some noises during collecting the data trajectories and other factors such as receiving poor signals. This is the reason why we introduced the concept ofcite{A} $trajectory$ $processing$, for correcting these errors.

In this section we will deal with extbf{Noise filtering, Segmentation} and extbf{Map matching}. egin{itemize}item extbf{Noise filtering:} is to filter the data trajectory, looking at unwanted data coordinates and removing them. This is performed by checking the trajectory the user took, and removing the points that fall away from other points in the trajectory, as shown in Figure ef{fig:fig7}, the point $p_4$ is far away from the point $p_3$ and $p_5$ which means that the point $p_4$ will be removed from the trajectory.item extbf{Trajectory Segmentation}, Is a process of setting a data trajectory into fragments by the time interval to help analyze more easily the data trajectory to give precise and more meaningful analysis.

This property is much helpful during the clustering of the data trajectory.item extbf{Map Matching} is a process of assigning geographic coordinates (eg. latitude, longitude and altitude) to the digital map.Digital map has the properties to take these provided coordinates and convert them into a human readable format, providing some facilities to help the human navigate and showing some particular area of interest to the user on the map.Eg: If the user wants to know the traffic ahead on his trajectory, he/she can access it in real-time and the digital map can guide him/her from the point of origin to the destination using some feature like GPS to collect his/her current position and project it to the map and making it easier for him/her to predict the shortest path to his/her destination.

When collecting data coordinates of a moving object, the geographic coordinates are recorded with some time delay.The error varies depending upon the length of the time delay as to mention that the object will be at another location after that delay, so this may cause some misreading of our data collection and data analysis. In the chapter ef{chap:lr} and ef{chap:eval} we gave some more details and introduced some methods to correct these anomalies in the data trajectory. 

Choose your subject

x

Hi!
I'm Jessica!

Don't know how to start your paper? Worry no more! Get professional writing assistance from me.

Click here