Beacon distance measurement method in indoor ubiquitous computing environment

Yunsick Sung, Jeonghoon Kwak, Young Sik Jeong, Jong Hyuk Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

In the indoor ubiquitous computing environment where Global Positioning System (GPS) cannot be utilized, the approach to calculate the locations of Unmanned Aerial Vehicles (UAVs) is the core technique to control multiple UAVs. To calculate the locations of UAVs, the distance between Access Points (APs) and UAVs should be measured accurately given that the location of UAVs is obtained on the basis of the distance between APs and UAVs. In this paper, we propose a method to measure the distance between a single beacon and a single AP in an indoor ubiquitous computing environment. We assume that the beacon is attached to the bottom of a UAV. In the indoor experiment, while transferring a beacon, the distances between the beacon and an AP were measured and tuned. Therefore, the accumulated difference between the real beacon location and the calculated beacon location was reduced by 31.1 %.

Original languageEnglish
Title of host publicationAdvances in Parallel and Distributed Computing and Ubiquitous Services, UCAWSN and PDCAT 2015
EditorsHong Shen, Young-Sik Jeong, Gangman Yi, James J. Park
PublisherSpringer Verlag
Pages125-130
Number of pages6
ISBN (Print)9789811000676
DOIs
StatePublished - 2016
Event4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network, UCAWSN 2015 - Jeju, Korea, Republic of
Duration: 8 Jul 201510 Jul 2015

Publication series

NameLecture Notes in Electrical Engineering
Volume368
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network, UCAWSN 2015
Country/TerritoryKorea, Republic of
CityJeju
Period8/07/1510/07/15

Fingerprint

Dive into the research topics of 'Beacon distance measurement method in indoor ubiquitous computing environment'. Together they form a unique fingerprint.

Cite this