On Developing Dependable Positioning

نویسندگان

  • Christophe Pitrey
  • Francoise Sailhan
چکیده

Developing indoor positioning remains challenging, especially when we consider an emergency and disaster scenario wherein positioning infrastructures fail. In this case the objective consist in providing to first rescuers (firefighters) robust and reliable positioning under harsh conditions. Toward this goal, we present a navigation system, then, we survey the class of faults that threaten this system along with possible ways of handling it. I. POSITION AND NAVIGATION The proposed positioning system makes use of active and contact-less Radio-Frequency IDentification (RFID): firefighters are equipped with RFID readers while RFID tags are disseminated in the building so as to serve as anchors. The pair-wise distance separating the reader to an anchor, is estimated based-on the Received Signal Strength (RSS)[1][2]. The resulting distance is used to multilaterate the position of the reader. Given that the signal may be perturbated (§1), successive RSS measurements are sanitized, i.e., filtered: infrequent values and outliers are removed so as to ensure that the largest quorum of consistent values is selected. Then, based on the measurements provided by m tags, the position (xp, yp) is approximated by multilateration. Multi-laterating consists in determining the intersection of m circles; each circle C i being centered on an anchor and characterized by a radius corresponding to the measured RSS: (xp − xi) 2 + (yp − yi) 2 = RSS i (1) with (xi, yi) defining the anchor’s coordinates. Multilateration can be seen as resolving a least-squared problem, i.e., finding the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Research of Component-based Dependable Encapsulation

According to the component-based design and developing pattern, we present a plug-in architecture for the dependable component-based software. After that, the dependable encapsulation is put forwards, which mainly focuses on the component security and availability attributes. Finally, the developing and implementing method of security interceptor, high available load balancing and fault toleran...

متن کامل

A Framework for Developing Dependable Software Systems Using the SOFL Method ∗

Development of a dependable software system requires a variety of techniques to be used in a coherent and systematic process, since it needs to take both the reliability and safety and/or security of the system into account. In this paper, we describe a framework for developing dependable software systems using the SOFL formal engineering method, and demonstrate its applicability by a case stud...

متن کامل

Provably Dependable Software Architectures for Adaptable Avionics

Dependable architectures demonstrably possess properties such as safety, security and fault tolerance. We are interested in developing methods allowing formal demonstrations through proof that an architecture does indeed possess the desired dependability properties. We focus on architecture hierarchies as a means of enabling such demonstrations. Integrated avionics offer unprecedented generalit...

متن کامل

Wireless Dependable IoT/M2M for Disaster Rescue and Healthcare – Reliable Machine Centric Sensing and Controlling

Wireless body area network (BAN) has been researched and developed for ubiquitous and remote medicine and its international standard IEEE802.15.6 was established in February, 2012. In order to find missing victims and sense their vital sign at disaster spots, highly reliable and secure, i.e. dependable BAN can be applicable to a body of robots, cars, UAVs (Unmanned Aerial Vehicle) like drones a...

متن کامل

2DCBS: A Model for Developing Dependable Component-Based Software

The software industry has adopted component-based software development (CBSD) to rapidly build and deploy large and complex software systems with significant savings at minimal engineering effort, cost, and time. However, CBSD encounters issues on security trust, mainly with respect to dependability attributes. A system is considered dependable when it can produce the outputs for which it was d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011