Open Access Open Access  Restricted Access Subscription or Fee Access

Estimating Soldiers War Field Locations Leveraging Large Scale Crowd Sourced Smart Phone Data Using Ibeacon

M. Jenath, G.R. Priyadharshini, R. Nafsin

Abstract


In today’s era enemy warfare is an important factor in any nation’s security. The national security mainly depends on army (ground), navy (sea), air-force (air). The important and vital role is played by the soldiers. There are many concerns regarding the safety of these soldiers. The defense department of country must be effective for the security of that country. This system will be useful for soldiers, who involve in missions or in special operations. This system enables IBEACON to track the soldiers’ locations. In this system, heart beat sensor is attached to the body of soldiers. The sensor monitors the health of the soldier. IBeacons transmit the location based on the principle of BLE.Each soldier will have the UUID to trace out their positions. So by using these equipment’s we are trying to implement the basic lifeguarding system for soldier in low cost and high reliability.


Keywords


iBeacon, Bluetooth Low Energy, Heart Beat Sensor and UUID.

Full Text:

PDF

References


R. Becker et al., “Human Mobility Characterization from Cellular Network Data,” CACM, vol. 56, no. 1, 2013, pp. 74–82.

M. De Domenico, A. Lima, and M. Musolesi, “Interdependence and Predictability of Human Mobility and Social Interactions,” Proc. Nokia Mobile Data Challenge 2012 Wksp., Newcastle, United Kingdom.

I. Sibren et al., “Identifying Important Places in People’s Lives from Cellular Network Data,” Pervasive Computing, 2011, pp. 133–51.

Y. Wang et al, “Towards Street-level Client-independent IP Geolocation,” NSDI, 2011.

I. Poese et al., “IP Geolocation Databases: Unreliable?,” SIGCOMM Comput. Commun. Rev., vol. 41, no. 2, 2011, pp. 53–56.

J. Han and K. Micheline. Data Mining: Concepts and Techniques, Morgan Kaufmann, 2006.

E. Katz-Bassett et al., “Towards IP Geolocation Using Delay and Topology Measurements,” IMC, 2006.

B. Gueye et al., “Constraint-Based Geolocation of Inter- net Hosts,” IEEE/ACM Trans. Net., vol. 14, no. 6, 2006, pp. 1219–32.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.