Tomotaka Wada

Learn More
In this paper, we propose network construction methods of sensor nodes for Border Security Systems. A Border Security System watches intruders by using sensor nodes with communication function. The detection of some intruders and the use of a long-term operation system are required in this system. In this paper, we propose two methods to reduce the power(More)
Nowadays, a lot of people die or are injured due to sudden disasters. In these disasters, it is important to discover them early and evacuate people quickly. To cope with these problems, we are developing ERESS (Emergency Rescue Evacuation Support System). Mobile terminals with this system exchange their information that associate with their sensors among(More)
RFID (Radio Frequency IDentification) systems have become meaningful as a new identification source that is applicable in ubiquitous environments. One of the important technologies that use RFID systems is the indoor position estimation of RFID readers. Using conventional methods, the system needs at least two RFID tags for the accurate indoor position(More)
Recently, the RFID tag system is paid attention to as an identification source. Each RFID tag is attached to some object. With the unique ID of RFID tag, a user identifies the object provided with the RFID tag, and derives appropriate information about the object. One of the important applications of RFID technology is the position estimation of RFID tags.(More)
The RFID (Radio Frequency IDentification) tag is expected to be used as a tool of localization. With the localization of RFID tags, a mobile robot with an installed RFID reader can recognize the surrounding environment. In addition, it can be applied to a navigation system for walkers. In this paper, we propose a new scheme named Communication Range(More)
In recent years, researches and developments on ITS are carried out to solve many problems in road traffic. IVC (inter-vehicular communications) is the key technology to realize the next generation ITS (Tokuda et al., 2002 and Morioka et al., 2000). Vehicles install telecommunication equipments, and exchange information directly with each other. The authors(More)