Computer Science ›› 2018, Vol. 45 ›› Issue (10): 69-77.doi: 10.11896/j.issn.1002-137X.2018.10.014

• Network & Communication • Previous Articles     Next Articles

Incremental Indoor Localization for Device Diversity Issues

XIA Jun, LIU Jun-fa, JIANG Xin-long, CHEN Yi-qiang   

  1. University of Chinese Academy of Sciences,Beijing 100049,China
    Research Center for Ubiquitous Computing Systems,Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190,China
    Beijing Key Laboratory of Mobile Computing and Pervasive Device,Beijing 100190,China
  • Received:2018-03-03 Online:2018-11-05 Published:2018-11-05

Abstract: With the rapid development of Wireless Local Area Network(WLAN),the Received Signal Strength(RSS) based indoor localization becomes a hot area in research and application fields.Among various kinds of up-to-date indoor localization methods,fingerprint based methods are most widely used because of its good performance,and one feature of those methods is that the accuracy is determined by the identification of the training and the testing dataset.Howe-ver,in practical applications,there are three problems in existing fingerprint based methods or system.Firstly,the loca-lization error caused by device variance is a severe problem.Secondly,the wireless data are changing as the time passed,leading to the reduction of the prediction accuracy.Thirdly,traditional fingerprint based methods or system cannot avoid the dependency on a large amount of labeled data to keep effective positioning performance,which usually involves high cost in labor and time.To solve these problems,this paper proposed a incremental indoor localization method for device diversity issues,which keeps real-time update by training uncalibrated data that collected in localization.Experimental results show that the proposed method can increase the precision of overall indoor localization system,especially when error distance is between 3 and 5 meters.What’s more,this method possesses good advantage of timeliness compared with traditional indoor localization method on real BLE dataset.

Key words: Indoor localization, Device diversity, Incremental learning, Extreme learning machine, Internet of things

CLC Number: 

  • TP311
[1]WU T T,YUN Z,LIU Y,et al.BeiDou /GPS combination positioning methodology[J].Journal of Remote Sensing,2014,18(5):1087-1097.
[2]JAKUBSTREIT J.Summary of available indoor location techniques[J].IFAC-PapersOnLine,2016,49(25):311-317.
[3]ZHU J,LUO H,CHEN Z,et al.RSSI based Bluetooth low energy indoor positioning[C]∥International Conference on Indoor Positioning and Indoor Navigation.IEEE,2015:526-533.
[4]HE X,ALOI D N,LI J.Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device[J].Sensors,2015,15(12):31464-31481.
[5]LI W L,ILTIS R A,WIN M Z.A smartphone localization algorithm using RSSI and inertial sensor measurement fusion[C]∥Global Communications Conference.IEEE,2014:3335-3340.
[6]LUO Z J,WU W J,YANG M.MobileInternet:Terminal de- vices,networks and services[J].Chinese Journal of Computers,2011,34(11):2029-2051.(in Chinese)
罗舟军,吴文甲,杨明.移动互联网:终端、网络与服务[J].计算机学报,2011,34(11):2029-2051.
[7]ZHOU A Y,YANG B,JIN C Q,et al.Location-based services:Architecture and progress[J].Chinese Journal of Computers,2011,34(7):1155-1171.(in Chinese)
周傲英,杨彬,金澈清,等.基于位置的服务:架构与进展[J].计算机学报,2011,34(7):1155-1171.
[8]PAHLAVAN K,LI X,MAKELA J P.Indoor geolocation scien- ce and technology[M].IEEE Press,2002.
[9]GNTHER A,HOENE C.Measuring Round Trip Times to Determine the Distance Between WLAN Nodes[C]∥International Conference on Research in Networking.Springer Berlin Heidelberg,2005:768-779.
[10]HOENE C,WILLMANN J.Four-way TOA and software-based trilateration of IEEE 802.11 devices[C]∥International Symposium on Personal,Indoor and Mobile Radio Communications.IEEE,2008:1-6.
[11]LLOMBART M,CIURANA M,BARCELO-ARROYO F.On the scalability of a novel WLAN positioning system based on time of arrival measurements[C]∥Workshop on Positioning,Navigation and Communication,2008(Wpnc 2008).IEEE,2008:15-21.
[12]CIURANA M,BARCELO-ARROYO F,LLOMBART M.Im- proving the Performance of TOA Over Wireless Systems to Track Mobile Targets[C]∥IEEE International Conference on Communications Workshops,2009.IEEE,2009:1-6.
[13]SATHYAN T,HUMPHREY D,HEDLEY M.WASP:A System and Algorithms for Accurate Radio Localization Using Low-Cost Hardware[J].IEEE Transactions on Systems Man & Cybernetics Part C,2011,41(2):211-222.
[14]YOUSSEF M A,AGRAWALA A,SHANKAR A U.WLAN location determination via clustering and probability distributions[C]∥IEEE International Conference on Pervasive Computing and Communications.IEEE,2003:143-150.
[15]HE S,HU T,CHAN S H G.Contour-based Trilateration for In- door Fingerprinting Localization[C]∥ACM Conference on Embedded Networked Sensor Systems.ACM,2015:225-238.
[16]SJOBERG M,KOSKELA M,VIITANIEMI V,et al.Indoor location recognition using fusion of SVM-based visual classifiers[C]∥IEEE International Workshop on Machine Learning for Signal Processing.IEEE,2010:343-348.
[17]WU K,XIAO J,YI Y,et al.FILA:Fine-grained indoor localization[C]∥2012 Proceedings IEEE INFOCOM.IEEE,2012:2210-2218.
[18]SEN S,RADUNOVIC B,CHOUDHURY R R,et al.You are fa- cing the Mona Lisa:spot localization using PHY layer information[C]∥International Conference on Mobile Systems,Applications,and Services.ACM,2012:183-196.
[19]FANG S H,LIN T.Principal Component Localization in Indoor WLAN Environments[J].IEEE Transactions on Mobile Computing,2011,11(1):100-110.
[20]ZHENG V W,XIANG E W,YANG Q,et al.Transferring loca- lization models over time[C]∥National Conference on Artificial Intelligence.AAAI Press,2008:1421-1426.
[21]SUN Z,CHEN Y,QI J,et al.Adaptive Localization through Transfer Learning in Indoor Wi-Fi Environment[C]∥International Conference on Machine Learning and Applications.IEEE,2008:331-336.
[22]HAEBERLEN A,FLANNERY E,LADD A M,et al.Practical robust localization over large-scale 802.11wireless networks[C]∥ACM MOBICOM 2004,the 10th Annual International Conferences on Mobile Computing andNetworking.Philadelphia:ACM Press,2004:70-84.
[23]KJAERGAARD M B,MUNK C V.Hyperbolic location fingerprinting:A calibration-free solution for handling differences in signalstrength[C]∥Proc.of the IEEE Int’l Conf.on Pervasive Computing.Hong Kong:IEEE Press,2008:110-116.
[24]GU Y,JIANG X L,LIU J F,et al.Device adaptive wireless signal feature extraction and localization method[J].Journal of Software,2014,25(Suppl.(2)):12-20.(in Chinese)
谷洋,蒋鑫龙,刘军发,等.设备自适应的无线信号特征提取与定位方法[J].软件学报,2014,55(Suppl.(2)):12-20.
[25]TSUI A W,CHUANG Y H,CHU H H.Unsupervised Learning for Solving RSS Hardware Variance Problem in WiFi Localization[J].Mobile Networks and Applications,2009,14(5):677-691.
[26]HUANG G B,ZHU Q Y,SIEW C K.Extreme learning ma- chine:a new learning scheme of feedforward neural networks[C]∥IEEE International Joint Conference on Neural Networks,2004.IEEE,2005:985-990.
[27]HUANG G B,ZHU Q Y,SIEW C K.Extreme learning ma- chine:Theory and applications[J].Neurocomputing,2006,70(1-3):489-501.
[28]HUANG G B,CHEN L,SIEW C K.Universal approximation using incremental constructive feedforward networks with random hidden nodes[J].IEEE Transactions on Neural Networks,2006,17(4):879.
[29]HUANG G B,ZHOU H,DING X,et al.Extreme learning machine for regression and multiclass classification[J].IEEE Transactions on Systems Man & Cybernetics Part B Cybernetics A Publication of the IEEE Systems Man & Cybernetics Society,2012,42(2):513-529.
[30]CHUNG R K.Spectral graph theory[M].American Mathematical Society,1997.
[31]BELKIN M,MATVEEVA I,NIYOGI P.Regularization and Semi-supervised Learning on Large Graphs[M]∥Learning Theory.Springer Berlin Heidelberg,2004:624-638.
[32]BELKIN M,NIYOGI P,SINDHWANI V.Manifold Regularization:A Geometric Framework for Learning from Labeled and Unlabeled Examples[M].JMLR.org,2006.
[33]LIANG N Y,HUANG G B,SARATCHANDRAN P,et al.A fast and accurate online sequential learning algorithm for feedforward networks[J].IEEE Transactions on Neural Networks,2006,17(6):1411-1423.
[1] LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54.
[2] LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567.
[3] XIANG Chang-sheng, CHEN Zhi-gang. Chaotic Prediction Model of Network Traffic for Massive Data [J]. Computer Science, 2021, 48(5): 289-293.
[4] WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32.
[5] WANG Wei-hong, CHEN Zhen-yu. Intelligent Manufacturing Security Model Based on Improved Blockchain [J]. Computer Science, 2021, 48(2): 295-302.
[6] LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui. IoTGuardEye:A Web Attack Detection Method for IoT Services [J]. Computer Science, 2021, 48(2): 324-329.
[7] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[8] GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80.
[9] SANG Bin-bin, YANG Liu-zhong, CHEN Hong-mei, WANG Sheng-wu. Incremental Attribute Reduction Algorithm in Dominance-based Rough Set [J]. Computer Science, 2020, 47(8): 137-143.
[10] LIU Ling-yun, QIAN Hui, XING Hong-jie, DONG Chun-ru, ZHANG Feng. Incremental Classification Model Based on Q-learning Algorithm [J]. Computer Science, 2020, 47(8): 171-177.
[11] WANG Jun-hao, YAN De-qin, LIU De-shan, XING Yu-jia. Algorithm with Discriminative Analysis Dictionary Learning by Fusing Extreme Learning Machine [J]. Computer Science, 2020, 47(5): 137-143.
[12] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[13] WANG Hong-xing, CHEN Yu-quan, SHEN Jie, ZHANG Xin, HUANG Xiang, YU Bin. Novel Semi-supervised Extreme Learning Machine and its Application in Anti-vibration HammerCorrosion Detection [J]. Computer Science, 2020, 47(12): 262-266.
[14] JIN Hui-fang, LYU Zong-wang, ZHEN Tong. Study on New Model of Food Supply Chain Finance Based on Internet of Things+Blockchain [J]. Computer Science, 2020, 47(11A): 604-608.
[15] XU He, WU Hao, LI Peng. Design of Temporal-spatial Data Processing Algorithm for IoT [J]. Computer Science, 2020, 47(11): 310-315.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .