Hybrid Kernel Based Machine Learning Using Received Signal Strength Measurements for Indoor Localization

2018 ◽  
Vol 67 (3) ◽  
pp. 2824-2829 ◽  
Author(s):  
Jun Yan ◽  
Lin Zhao ◽  
Jian Tang ◽  
Yuwei Chen ◽  
Ruizhi Chen ◽  
...  
Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2392
Author(s):  
Óscar Belmonte-Fernández ◽  
Emilio Sansano-Sansano ◽  
Antonio Caballer-Miedes ◽  
Raúl Montoliu ◽  
Rubén García-Vidal ◽  
...  

Indoor localization is an enabling technology for pervasive and mobile computing applications. Although different technologies have been proposed for indoor localization, Wi-Fi fingerprinting is one of the most used techniques due to the pervasiveness of Wi-Fi technology. Most Wi-Fi fingerprinting localization methods presented in the literature are discriminative methods. We present a generative method for indoor localization based on Wi-Fi fingerprinting. The Received Signal Strength Indicator received from a Wireless Access Point is modeled by a hidden Markov model. Unlike other algorithms, the use of a hidden Markov model allows ours to take advantage of the temporal autocorrelation present in the Wi-Fi signal. The algorithm estimates the user’s location based on the hidden Markov model, which models the signal and the forward algorithm to determine the likelihood of a given time series of Received Signal Strength Indicators. The proposed method was compared with four other well-known Machine Learning algorithms through extensive experimentation with data collected in real scenarios. The proposed method obtained competitive results in most scenarios tested and was the best method in 17 of 60 experiments performed.


2019 ◽  
Vol 9 (18) ◽  
pp. 3930 ◽  
Author(s):  
Jaehyun Yoo ◽  
Jongho Park

This paper studies the indoor localization based on Wi-Fi received signal strength indicator (RSSI). In addition to position estimation, this study examines the expansion of applications using Wi-Fi RSSI data sets in three areas: (i) feature extraction, (ii) mobile fingerprinting, and (iii) mapless localization. First, the features of Wi-Fi RSSI observations are extracted with respect to different floor levels and designated landmarks. Second, the mobile fingerprinting method is proposed to allow a trainer to collect training data efficiently, which is faster and more efficient than the conventional static fingerprinting method. Third, in the case of the unknown-map situation, the trajectory learning method is suggested to learn map information using crowdsourced data. All of these parts are interconnected from the feature extraction and mobile fingerprinting to the map learning and the estimation. Based on the experimental results, we observed (i) clearly classified data points by the feature extraction method as regards the floors and landmarks, (ii) efficient mobile fingerprinting compared to conventional static fingerprinting, and (iii) improvement of the positioning accuracy owing to the trajectory learning.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3203 ◽  
Author(s):  
Syed Khandker ◽  
Joaquín Torres-Sospedra ◽  
Tapani Ristaniemi

In recent times, Received Signal Strength (RSS)-based Wi-Fi fingerprinting localization has become one of the most promising techniques for indoor localization. The primary aim of RSS is to check the quality of the signal to determine the coverage and the quality of service. Therefore, fine-resolution RSS is needed, which is generally expressed by 1-dBm granularity. However, we found that, for fingerprinting localization, fine-granular RSS is unnecessary. A coarse-granular RSS can yield the same positioning accuracy. In this paper, we propose quantization for only the effective portion of the signal strength for fingerprinting localization. We found that, if a quantized RSS fingerprint can carry the major characteristics of a radio environment, it is sufficient for localization. Five publicly open fingerprinting databases with four different quantization strategies were used to evaluate the study. The proposed method can help to simplify the hardware configuration, enhance security, and save approximately 40–60% storage space and data traffic.


Author(s):  
H A Obeidat ◽  
R A Abd-Alhameed ◽  
J M Noras ◽  
S. Zhu ◽  
T Ghazaany ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document