Next Article in Journal
High Quality Coal Foreign Object Image Generation Method Based on StyleGAN-DSAD
Next Article in Special Issue
Magnetic-Field-Based Indoor Positioning Using Temporal Convolutional Networks
Previous Article in Journal
High-Sensitivity Liquid Dielectric Characterization Differential Sensor by 1-Bit Coding DGS
Previous Article in Special Issue
An Improved Method Based on Bluetooth Low-Energy Fingerprinting for the Implementation of PEPS System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Majorization-Minimization Method for Elliptic Localization in the Absence of Transmitter Position

Department of Electronic and Information Engineering, Shantou University, Shantou 515063, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(1), 373; https://doi.org/10.3390/s23010373
Submission received: 3 November 2022 / Revised: 24 December 2022 / Accepted: 25 December 2022 / Published: 29 December 2022
(This article belongs to the Special Issue Indoor and Outdoor Sensor Networks for Positioning and Localization)

Abstract

:
This paper investigates the problem of elliptic localization in the absence of transmitter position. An efficient iterative method is developed to jointly evaluate the target and transmitter positions. Using the measurement information from the indirect paths reflected from the target and the direct paths between the transmitter and receivers, a non-convex maximum likelihood estimation (MLE) problem is formulated. Owing to the non-convex nature of the issue, we apply the majorization–minimization (MM) principle to address the MLE problem, which iteratively minimizes a convex surrogate function instead of the original objective function. Moreover, the proposed MM method is further extended to tackle a general scenario where both multiple unknown transmitters and receiver position errors are considered. Finally, numerical simulations demonstrate that the proposed MM method outperforms the state-of-the-art methods.

1. Introduction

Target localization has been a prevalent research topic with numerous applications in wireless sensor network (WSN) [1,2,3], communications [4], radars [5,6,7], and many others. A straightforward method to locate a target is direct localization [8], in which the position is determined directly from the received signals. The direct approach bears expensive computational complexity due to the multidimensional grid search. Hence, various types of indirect approaches have been presented based on different types of measurement information. The typical measurement information includes time of arrival (TOA) [9,10], time-difference of arrival (TDOA) [11,12,13], received signal strength (RSS) [14], arrival of angle (AOA) [15], and their joint methods [16,17,18]. Among them, localization based on time information holds great research significance owing to its high-positioning accuracy. Elliptic localization is a time-based positioning model that is superior to some typical localization models, such as TOA-based and TDOA-based models [19]. In this model, the transmitter sends out a radar wave and several synchronous receivers collect the signal reflected from the interest target to determine its position. In addition, when the transmitter position is unknown, the signal received directly from the transmitter is also used to improve the positioning performance. Such a multistatic positioning approach [20] can offer more flexibility and better performance than the monostatic counterpart [21]. Hence, elliptic localization has been widely applied in multiple-input-multiple-output (MIMO) radars [22]. The flight time of the radar wave multiplied by its propagation speed produces the sum of the distances from the transmitter to the target and then to the receiver, which is referred to as the bistatic range [23,24]. The track of constant bistatic range in two-dimensional space is an ellipse with the transmitter and receiver positions as its foci, and the target position is on the ellipse. Thus, we can evaluate the target position by the intersection point of some ellipses produced by the bistatic ranges.
In reality, the transmitter position is potentially completely unavailable [20]. For instance, if the transmitter is set in some special inaccessible place or moves with time, its position cannot be accurately obtained. This also occurs in certain system designs such as the passive coherent location system [25,26,27], in which the transmitter position is purposely left unknown to simplify its structure and alleviate hardware requirements. Therefore, this situation bears important research significance. In [20], Zhang et al. first researched the elliptic localization problem in the absence of transmitter position. Using the measurements of the indirect and direct paths, a two-step weighted least squares (TSWLS) method was proposed for jointly estimating the target and transmitter positions. However, since the constrained relationships among those variables are difficult to directly and completely utilize, the TSWLS method has the threshold effect [28,29,30]. Zheng et al. [19] presented a semidefinite program (SDP) method to tackle the same problem, in which the semidefinite relaxation (SDR) technique is applied to convert this non-convex problem to a convex SDP problem. While the SDP method can approach the Cramér–Rao lower bound (CRLB) accuracy at a moderate noise level, this method requires a large number of complicated calculations arising from the CVX toolbox. Furthermore, there are several recursive methods that can be applied to solve the problem, such as the Gauss–Newton method [31] and the Quasi–Newton method [32,33].
This paper advances the topic by developing new solutions to the joint estimation problem. A maximum likelihood estimation (MLE) problem is formulated using the measurements of the indirect and direct paths. Since the problem is non-convex, its optimal solution cannot be solved directly. To tackle the difficulty, we propose an efficient iterative algorithm based on the majorization–minimization (MM) principle to address the formulated MLE problem. It requires constructing a convex surrogate function at each iteration that tightly upper bounds the original objective function, then minimizes the surrogate function to conduct the next iteration. Through the proposed algorithm, any given initial value will constantly approach the stationary point of the object function.
MM principle has been widely applied in signal processing, communications, and machine learning [34]. However, there is limited research about the MM principle for target localization. In fact, to the best of our knowledge, only Panwar et al. [35] has applied the MM principle to the multistatic target localization problem in terms of the precise known transmitter position. Furthermore, currently, no relevant works based on the MM principle have been discovered regarding the unknown transmitter position.
The main contributions of the current work are as follows:
  • We formulate an MLE problem that jointly estimates the target and transmitter positions, and propose an effective iterative algorithm based on the MM principle to solve the optimization problem.
  • We extend the proposed algorithm to a general scenario where both multiple transmitters at unknown positions and receiver position errors are considered.
  • We theoretically analyze the computational complexity and convergence of the proposed algorithm.
The rest of this paper is organized as follows. Section 2 provides the measurement model for elliptic localization. In Section 3, we present a brief overview of the MM technique followed by the derivation of the proposed approach. It is also utilized to solve the scenario where both multiple transmitters and receiver position errors are considered. We then conclude the section with a discussion on the complexity and convergence of the proposed algorithm. In Section 4, numerical simulations are presented and conclusions are given in Section 5.
Notations: Bold upper-case and bold lower-case letters denote matrices and vectors, respectively. The notations A T and A 1 represent the transpose and inverse of the matrix A , respectively. a i , a ( i : j ) , A i j and A ( i : j , k : l ) are the i-th element of a , the subvector containing the i-th to the j-th elements of a , the ( i , j ) -th element of A and the submatrix containing the elements from the i-th to the j-th row and the k-th to the l-th column of A , respectively. I p × p is the p × p identity matrix. O k × l is the k × l zero matrix. ⊗ and · represent the Kronecker product and the Euclidean norm, respectively.

2. Measurement Model

Let us consider an elliptic localization system for locating an unknown target, in which one transmitter and M receivers are deployed in p-dimensional space. As can be seen from Figure 1, the unknown transmitter represented by t o R p × 1 sends out the radar signal. Several known receivers s j R p × 1 for j = 1 , , M not only collect the indirect path signal reflected from the interest target denoted by u o R p × 1 , but receive the direct path signal from the transmitter.
r i = u o s i + n i , i = 1 , , M
and
r i = u o t + u o s i + n r , i , i = 1 , , M
d i = t o s i + n d , i , i = 1 , , M
Multiplying by the signal propagation speed, the range measurements of the indirect and direct paths can be expressed by
r j = u o t o + u o s j + n r , j , j = 1 , , M ,
and
d j = t o s j + n d , j , j = 1 , , M ,
respectively, where n r , j and n d , j are assumed to be independent zero-mean Gaussian variables with known variance σ j 2 and β j 2 , respectively.

3. Majorization–Minimization for Elliptic Localization

In this section, we present the proposed iterative algorithm based on the MM principle to tackle the elliptic location problem with an unknown transmitter position. Before we depict the proposed algorithm, we briefly introduce the MM principle.

3.1. Majorization–Minimization (MM)

The MM procedure is an efficient iterative method for addressing the non-convex problem. As shown in Figure 2, the MM procedure requires constructing a surrogate function ( g ( x | x k ) ) that tightly upper bounds the original objective function ( f ( x ) ) at a given point ( x k ), and then minimizes the surrogate function to obtain the next iteration.
As the tight upper bound of the f ( x ) , the g ( x | x k ) need satisfy
g ( x | x k ) f ( x ) , x , g ( x k | x k ) = f ( x k ) .
Then in the minimization step, we update x as
x k + 1 = arg min x g ( x | x k ) .
According to (3) and (4), we can simply obtain
f ( x k + 1 ) g ( x k + 1 | x k ) g ( x k | x k ) = f ( x k ) .
It can be readily proved from the inequality in (8) that the original objective function decreases monotonously during the updating process. The construction of the surrogate function is the key problem of the MM algorithm, which will determine the accuracy and complexity of the optimization approach. Interested readers can refer to [34] to acquire more details.

3.2. Elliptic Localization Using Single Transmitter

In this subsection, we consider the scenario with one transmitter and apply the MM framework to tackle the problem. From the measurement equations in (4) and (5), an MLE problem for evaluating the target position can be formulated as
min u o , t o j = 1 M 1 σ j 2 r j u o t o u o s j 2 + 1 β j 2 d j t o s j 2 .
Combining u o and t o with θ , the cost function can be further rewritten as
min θ j = 1 M 1 σ j 2 r j D 1 θ D 2 θ s j 2 + 1 β j 2 d j D 3 θ s j 2 ,
where
θ = u o T , t o T T , D 1 = I p × p   I p × p , D 2 = I p × p , O p × p , D 3 = O p × p   I p × p .
Then, expanding the square of (10) and ignoring the constant terms, i.e., j = 1 M 1 σ j 2 r j 2 and j = 1 M 1 β j 2 d j 2 , we can obtain
min θ j = 1 M ( 1 σ j 2 ( D 1 θ + D 2 θ s j ) 2 2 r j D 1 θ 2 r j D 2 θ s j + 1 β j 2 D 3 θ s j 2 2 d j D 3 θ s j ) .
As can be observed, the problem is non-convex. Therefore, we can exploit the MM principle to develop an iterative method to solve it. As mentioned before, constructing a tight surrogate function is the key problem for the MM method [35]. Next, we shall derive the surrogate function by inequality scaling.
According to the inequality of arithmetic and geometric means, we known
a b a + b 2 , a 0 , b 0 .
Plugging a = ( x x ˜ ) 2 and b = ( y y ˜ ) 2 ( x , x ˜ , y , y ˜ are all positive numbers) into the above inequality, we can get
2 x y x ˜ y ˜ x x ˜ 2 + y y ˜ 2 = y ˜ x 2 x ˜ + x ˜ y 2 y ˜ .
Then we can easily obtain
( x + y ) 2 ( 1 + y ˜ x ˜ ) x 2 + ( 1 + x ˜ y ˜ ) y 2 .
Using the above inequality, for any given θ k , the function ( D 1 θ + D 2 θ s j ) 2 can be upper bounded as
j = 1 M 1 σ j 2 ( D 1 θ + D 2 θ s j ) 2 j = 1 M 1 σ j 2 v j D 1 θ 2 + w j D 2 θ s j 2 ,
where
v j = 1 + D 2 θ k s j D 1 θ k , w j = 1 + D 1 θ k D 2 θ k s j .
According to the Cauchy–Schwartz inequality, for any given θ k , these functions D 1 θ , D 2 θ s j and D 3 θ s j can be upper bounded as
j = 1 M 1 σ j 2 r j D 1 θ j = 1 M 1 σ j 2 r j x T θ ,
j = 1 M 1 σ j 2 r j D 2 θ s j j = 1 M 1 σ j 2 r j y j T ( D 2 θ s j ) ,
and
j = 1 M 1 β j 2 d j D 3 θ s j j = 1 M 1 β j 2 d j z j T ( D 3 θ s j ) ,
respectively, where
x = D 1 T D 1 θ k D 1 θ k , y j = D 2 θ k s j D 2 θ k s j , z j = D 3 θ k s j D 3 θ k s j .
Note that the denominators of these functions are not zero, and this situation can be avoided in practical scenario.
Using these inequalities in (16) and (18)–(20), we get the following surrogate function for the cost function in (12) at ( k + 1 ) t h iteration:
g θ | θ k = j = 1 M ( 1 σ j 2 v j D 1 θ 2 + w j D 2 θ s j 2 2 r j x T θ 2 r j y j T ( D 2 θ s j ) + 1 β j 2 D 3 θ s j 2 2 d j z j T ( D 3 θ s j ) ) .
We can find that the surrogate function satisfies the conditions in (6), i.e., g ( θ | θ k ) f ( θ ) , θ , g ( θ k | θ k ) = f ( θ k ) . Therefore, it is one of the tight upper bounds of the original cost function ( f ( θ ) ) at the point ( θ k ). Then, minimizing the surrogate function, the updating process is expressed as
θ k + 1 = min θ j = 1 M g θ | θ k .
It can be simply seen that the surrogate function is convex. By taking the derivative of (22) and letting it equal zero, we can get
θ k + 1 = Q 1 j = 1 M 1 σ j 2 r j ( x T + D 2 T y j ) + w j D 2 T s j + 1 β j 2 D 3 T s j d j D 3 T z j ,
where
Q = j = 1 M 1 σ j 2 v j D 1 T D 1 + w j D 2 T D 2 + 1 β j 2 D 3 T D 3 .
A limit on the number of iterations, K m a x , should be applied for practical scenarios. The criterion to stop the iteration is when
θ k + 1 θ k ϵ , k = 0 , 1 , , K m a x ,
or when the time of iteration attains K m a x , where ϵ is a preset threshold. Then, the estimated results of the target and transmitter positions are expressed as
u * = θ ( 1 : p ) * , t * = θ ( p + 1 : 2 p ) * ,
respectively, where θ * is the final result of iterations. In Algorithm 1, we give the relevant pseudo code.
Algorithm 1: Elliptic Localization using single transmitter
Sensors 23 00373 i001

3.3. Elliptic Localization Using Multiple Transmitters with Receiver Position Errors

It is common in practical applications, especially in sonar/radar, to deploy multiple transmitters for improving performance. Moreover, due to imperfections in GPS precision, the available receiver positions may present errors. Ignoring these errors can generate significant performance degradation [20]. In the subsection, we further apply the MM method to tackle the general scenario where both multiple unknown transmitters and receiver position errors are considered.
The unknown position of the i-th transmitter is represented by t i o R p × 1 , i = 1 , , N . Then, the range measurements of the indirect and direct paths are expressed by
r i j = u o t i o + u o s j o + n r , i j , i = 1 , , N , j = 1 , , M ,
and
d i j = t i o s j o + n d , i j , i = 1 , , N , j = 1 , , M ,
respectively. Furthermore, let s ˜ j R p × 1 , j = 1 , , M be the available position of the j-th receiver. The true position s j o is not known and always modeled as
s ˜ j = s j o + Δ s j , j = 1 , 2 , , M ,
where Δ s j is the position error of s j that obeys the zero-mean Gaussian distribution with known covariance γ j 2 I p × p .
From the measurement equations in (28)–(30), an MLE problem for evaluating the target position can be formulated as
min u o , t 1 o , , t N o , s 1 o , , s M o i = 1 N j = 1 M 1 σ i j 2 r i j u o t i o u o s j o 2 + 1 β i j 2 d i j t i o s j o 2 + j = 1 M 1 γ j 2 s ˜ j s j o 2
Using a vector θ to combine these unknown variables, we can obtain
min θ i = 1 N j = 1 M 1 σ i j 2 r i j H i θ P j θ 2 + 1 β i j 2 d i j Q i j θ 2 + j = 1 M 1 γ j 2 s ˜ j F j θ 2 ,
where,
θ = u T t 1 o T t N o T s 1 o T s M o T T , F j = O p × ( N + j ) p I p × p O p × ( M j ) p , j = 1 , , M , H i = I p × p O p × ( i 1 ) p I p × p O p × ( N + M i ) p , i = 1 , , N , P j = I p × p O p × ( N + j 1 ) p I p × p O p × ( M j ) p , j = 1 , , M , Q i j = O p × i p I p × p O p × ( N + i j 1 ) p I p × p O p × ( M j ) p , i = 1 , , N , j = 1 , , M .
Then, expanding the square of (32) and ignoring the constant terms, i.e., i = 1 N j = 1 M 1 σ i j 2 r i j 2 and i = 1 N j = 1 M 1 β i j 2 d i j 2 , we can obtain
min θ i = 1 N j = 1 M 1 σ i j 2 ( H i θ + P j θ ) 2 2 r i j H i θ 2 r i j P j θ + 1 β i j 2 Q i j θ 2 2 d i j Q i j θ + j = 1 M 1 γ j 2 s ˜ j F j θ 2 .
Similarly, we shall utilize the MM principle to account for the non-convex problem as well. As already mentioned, we shall utilize these inequalities mentioned in the previous subsection to construct the surrogate function.
Using the inequality in (15), for any given θ k , the function ( H i θ + P j θ ) 2 can be upper bounded as
i = 1 N j = 1 M 1 σ i j 2 ( H i θ + P j θ ) 2 i = 1 N j = 1 M 1 σ i j 2 ( v ˜ i j H i θ 2 + w ˜ i j P j θ 2 ) ,
where
v ˜ i j = 1 + P j θ k H i θ k , w ˜ i j = 1 + H i θ k P j θ k .
According to the Cauchy–Schwartz inequality, for any given θ k , these functions H i θ , P j θ and Q i j θ can be upper bounded as
i = 1 N j = 1 M 1 σ i j 2 r i j H i θ i = 1 N j = 1 M 1 σ i j 2 r i j x ˜ i T θ ,
i = 1 N j = 1 M 1 σ i j 2 r i j P j θ i = 1 N j = 1 M 1 σ i j 2 r i j y ˜ j T θ ,
and
i = 1 N j = 1 M 1 β i j 2 d i j Q i j θ i = 1 N j = 1 M 1 β i j 2 d i j z ˜ i j T θ ,
respectively, where
x ˜ i = H i T H i θ k H i θ k , y ˜ j = P j T P j θ k P j θ k , z ˜ i j = Q i j T Q i j θ k Q i j θ k .
Note that the denominators of these functions are not zero as well.
Using these inequalities in (35) and (37)–(39), we get the following surrogate function for the cost function in (34) at ( k + 1 ) t h iteration:
g θ | θ k = i = 1 N j = 1 M 1 σ i j 2 v ˜ i j H i θ 2 + w ˜ i j P j θ 2 2 r i j ( x ˜ i T θ y ˜ j T θ ) + 1 β i j 2 Q i j θ 2 2 d i j z ˜ i j T θ + j = 1 M 1 γ j 2 s ˜ j F j θ 2 .
Minimizing the surrogate function, the updating process can be expressed as
θ k + 1 = W 1 i = 1 N j = 1 M 1 σ i j 2 r i j ( x ˜ i + y ˜ j ) + 1 β i j 2 d i j z ˜ i j + j = 1 M 1 γ j 2 F i T s ˜ i ,
where
W = i = 1 N j = 1 M 1 σ i j 2 ( v ˜ i j H i T H i + w ˜ i j P j T P j ) + 1 β i j 2 Q i j T Q i j + j = 1 M 1 γ j 2 F j T F j .
The criterion to stop the iteration is same to the previous subsection. Then, the estimated results of the target, transmitter, and receiver positions are expressed as
u * = θ ( 1 : p ) * , t i * = θ ( p i + 1 : p ( i + 1 ) ) * , s j * = θ ( p ( N + j ) + 1 : p ( N + j + 1 ) ) * , i = 1 , , N , j = 1 , , M ,
respectively, where θ * is the final result of iterations. As we can see from (44), different from the existing approaches in [19,20], the proposed method can not only estimate the positions of target and transmitters, but also calibrate the erroneous receiver positions.

3.4. Computational Complexity and Convergence of the Proposed Algorithm

We first analyze the computational complexity of the proposed methods. In each iteration, the complexity is mainly dominated by computing (24) for the single transmitter case and (42) for the multiple transmitters case. Hence, their complexities are on the order of O ( M 2 ) and O ( ( N + M ) 4 ) , respectively. Moreover, the average computation time will be shown in the next section.
Next, we shall discuss the convergence of the proposed algorithm. Since the algorithm is based on the MM framework, it is seen from (8) that the objective function monotonically decreases with the iteration. Moreover, the surrogate function at each iteration is convex, so we can easily get its solution θ k + 1 in ( k + 1 ) t h iteration that makes
g ( θ | θ k ) θ θ = θ k + 1 = 0
and
g ( θ k + 1 | θ k ) g ( θ | θ k ) .
Since f ( θ ) θ θ = θ k = g ( θ | θ k ) θ θ = θ k , taking k gives
f ( θ ) θ θ = θ = g ( θ | θ ) θ θ = θ = 0
Hence, through the proposed algorithm, any given initial value will constantly approach the stationary point of the object function.

4. Simulation Results

In this section, numerical simulations are conducted to evaluate the performance of the proposed method in 2-D for ease of illustration. The proposed method is compared with the SDP method [19] (labeled as “SDP”), the two-stage WLS method [20] (labeled as “TSWLS”) and the Gauss–Newton method (labeled as “Gauss–Newton”, the derivation is shown in Appendix A). Moreover, the CRLB is also included as a benchmark. Owing to many unknown variables in the objective function, we choose to initialize θ by successive estimation. The successive estimation can be regarded as a TOA localization problem (based on direct paths) and an elliptic localization problem (based on indirect paths). The TOA localization problem is solved to evaluate the transmitter position by the LS method in [36]. Then, using the evaluated transmitter position, the elliptic localization problem is solved to evaluate the target position by the LS method in [28]. Meanwhile, the receiver position errors are not considered. The noise variances of the indirect and direct paths are set to the same value (represented by σ 2 ). The maximum number of iterations is set to K m a x = 4000 and the predetermined threshold is set as ϵ = 10 3 .
The root mean square error (RMSE) is utilized to evaluate the accuracy of these algorithms, which is expressed as
RMSE ( η * ) = 1 G L g = 1 G l = 1 L η g l * η o ,
where G are the number of geometry configurations and L is the times of Monte Carlo (MC) runs for each geometry configuration. η g l * is the estimated result in the l-th MC run for the g-th configuration. G and L are adopted as 10 and 500 in the simulations.
Next, we shall test those algorithms in the single transmitter and multiple transmitters cases, respectively.

4.1. Single Transmitter Case

Scenario 1: One transmitter and four receivers are uniformly deployed in the region ( 4 , 4 ) × ( 4 , 4 ) km 2 to locate a target at u o = [ 2 , 1 ] T km. The estimated results of the target position are displayed in Figure 3. We find that the RMSE of the TSWLS method attains the CRLB accuracy when 10 log 10 ( σ 2 ) 5 dB m 2 , whereas deviates from the CRLB when 10 log 10 ( σ 2 ) 10 dB m 2 . This may be due to the threshold effect of the TSWLS method. By contrast, the proposed method, SDP method and Gauss–Newton method show better threshold behavior, and the first has a higher performance because its algorithm is based on a more accurate problem formulation. Figure 4 displays the estimated results of the transmitter position. It is observed that the RMSEs of the proposed method, SDP method and Gauss–Newton method attain the optimal performance when 10 log 10 ( σ 2 ) 35 dB m 2 , and slightly deviates from the CRLB at 10 log 10 ( σ 2 ) = 40 dB m 2 .
Scenario 2: In this scenario, receiver position errors are considered to be present. Assuming the covariance matrix of the receiver position errors Q s = σ s 2 J , where σ s 2 relates to the sensor position error power and J = diag [ 5 , 20 , 15 , 10 ] I 2 × 2 . The deployment of the target, transmitter, and receiver is the same as that in Scenario 1. Keeping σ s 2 at 1 m 2 , Figure 5 confirms that the RMSE of the TSWLS method attains the CRLB accuracy when 10 log 10 ( σ 2 ) 5 dB m 2 and deviates from the CRLB when 10 log 10 ( σ 2 ) 10 dB m 2 much earlier than the other methods. When 10 log 10 ( σ 2 ) = 40 dB m 2 , the proposed methods still performs better than the SDP method and Gauss–Newton method.
Scenario 3: In this scenario, the number of receiver M increases from 3 to 8. We let σ 2 = 10 m 2 and Q s = σ s 2 J M , where σ s 2 = 1 m 2 , J M = J ( 1 : 2 M , 1 : 2 M ) for M = 4 , 5 , , 8 and J = diag [ 5 , 20 , 35 , 10 , 25 , 30 , 15 , 40 ] I 2 × 2 . The deployment of the actual coordinates of the target, transmitter, and receiver is the same as that in Scenario 1. As can be seen in Figure 6, the performance of these methods improves as the number of receivers increases. The RMSE of the TSWLS method deviates from the CRLB accuracy when M 4 . The proposed method, SDP method and Gauss–Newton method attain the CRLB accuracy at the entire tested range except for M = 3 . For M = 3 , the SDP method obviously deviates from CRLB; however, the proposed method and Gauss–Newton method just slightly deviate from CRLB, and the former has better performance.

4.2. Multiple Transmitters Case

Scenario 4: Multiple transmitters and receiver position errors are simultaneously considered in this Scenario. Three transmitters and four receivers are used, and the other parameter settings are the same as that in Scenario 2. As can be seen in Figure 7, the observations are similar to those in Figure 5, whereas the RMSEs are lower at the same σ 2 . This is caused by using multiple transmitters.
Scenario 5: Fixing three transmitters, the number of receiver M increases from 3 to 8. We let σ 2 = 100 m 2 and Q s = σ s 2 J M with σ s 2 = 1 m 2 , and the other parameter settings are the same as that in Scenario 3. As we can see in Figure 8, the performance of these methods improves with the rise of the receiver number. Moreover, the TSWLS method deviates from the CRLB accuracy when M 4 and the SDP method and Gauss–Newton method deviate from the CRLB accuracy at M = 3 . By contrast, the proposed method can approach the CRLB accuracy at the whole tested noise level.
Finally, the average CPU time of the methods in Scenario 1 and Scenario 4 is shown in Table 1. The simulation data is obtained by utilizing a PC with Intel Core i7 3.2 GHz processor. As reported in Table 1, the computational complexity of these methods increases as the measurement model becomes more complex. Furthermore, the computational complexity of the proposed method is higher than that of the TSWLS method and Gauss–Newton method, and lower than that of the SDP method.

5. Conclusions

In this paper, we investigate an elliptic localization problem when the transmitter position is unavailable. An MM method is developed to jointly estimate the target and transmitter positions. Subsequently, the MM method is further extended to account for scenarios where both multiple unknown transmitters and receiver position errors are considered. Simulation results demonstrate that the proposed method outperforms state-of-the-art methods and the erroneous receiver positions can also be calibrated.

Author Contributions

Conceptualization, L.W. and Y.Z.; methodology, L.W. and Y.Z.; software, L.W.; writing—original draft preparation, L.W.; writing—review and editing, Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by STU Scientific Research Foundation for Talents under Grant NTF19036.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Sample Availability

The codes of simulations are available from the authors via email [email protected].

Abbreviations

The following abbreviations are used in this manuscript:
WSNWireless sensor network
TOATime-of-arrival
TDOATime-difference-of-arrival
RSSReceived signal strength
AOAAngle-of-arrival
MIMOMultiple-input-multiple-output
TSWLSTwo-step weighted least squares
SDPSemidefinite programming
SDRSemidefinite relaxation
MLEMaximum likelihood
MMMajorization–minimization
GTRSGeneralized trust region sub-problems
CRLBCramer–Rao lower bound
RMSERoot mean-square error

Appendix A. Gauss–Newton Method for Elliptic Localization in Absence of Transmitter Position

Appendix A.1. Elliptic Localization Using Single Transmitter

In this appendix, the Gauss–Newton method for elliptic localization using single transmitter is derived, and the derivation process is similar to [37]. Rewriting the MLE problem in (10)
min θ j = 1 M 1 σ j 2 r j D 1 θ D 2 θ s j 2 + 1 β j 2 d j D 3 θ s j 2
The first-order Taylor series expansions of D 1 θ , D 2 θ s j and D 3 θ s j are
D 1 θ D 1 θ 0 + ( D 1 T D 1 θ 0 ) T ( θ θ 0 ) D 1 θ 0 ,
D 2 θ s j D 2 θ 0 s j + ( D 2 T ( D 2 θ 0 s j ) ) T ( θ θ 0 ) D 2 θ 0 s j ,
D 3 θ s j D 3 θ 0 s j + ( D 3 T ( D 3 θ 0 s j ) ) T ( θ θ 0 ) D 3 θ 0 s j ,
respectively. Then, taking (A2) into (A1) results
min θ j = 1 M ( 1 σ j 2 r j D 1 θ 0 D 2 θ 0 s j ( ( D 1 T D 1 θ 0 ) T D 1 θ 0 + ( D 2 T ( D 2 θ 0 s j ) ) T D 2 θ 0 s j ) ( θ θ 0 ) 2 + 1 β j 2 d j D 3 θ 0 s j ( D 3 T ( D 3 θ 0 s j ) ) T ( θ θ 0 ) D 3 θ 0 s j 2 ) .
Let the gradient of cost function in (A3) with θ to zero
j = 1 M 2 ( 1 σ j 2 r j D 1 θ 0 D 2 θ 0 s j ( ( D 1 T D 1 θ 0 ) T D 1 θ 0 + ( D 2 T ( D 2 θ 0 s j ) ) T D 2 θ 0 s j ) ( θ θ 0 ) ( D 1 T D 1 θ 0 D 1 θ 0   + D 2 T ( D 2 θ 0 s j ) D 2 θ 0 s j ) + 1 β j 2 d j D 3 θ 0 s j ( D 3 T ( D 3 θ 0 s j ) ) T ( θ θ 0 ) D 3 θ 0 s j D 3 T ( D 3 θ 0 s j ) D 3 θ 0 s j ) = 0
Set
Q r = diag [ 1 σ 1 2 , , 1 σ M 2 ] , Q d = diag [ 1 β 1 2 , , 1 β M 2 ] ,
h 1 = [ r 1 D 1 θ 0 D 2 θ 0 s 1 , , r M D 1 θ 0 D 2 θ 0 s M ] T ,
h 2 = [ d 1 D 3 θ 0 s 1 , , d M D 3 θ 0 s M ] T ,
H 1 = [ D 1 T D 1 θ 0 D 1 θ 0 + D 2 T ( D 2 θ 0 s 1 ) D 2 θ 0 s 1 , , D 1 T D 1 θ 0 D 1 θ 0 + D 2 T ( D 2 θ 0 s M ) D 2 θ 0 s M ] ,
H 2 = [ D 3 T ( D 3 θ 0 s 1 ) D 3 θ 0 s 1 , , D 3 T ( D 3 θ 0 s M ) D 3 θ 0 s M ]
Then (A4) can be recast as
H 1 Q r h 1 + H 2 Q d h 2 = ( H 1 Q r H 1 T + H 2 Q d H 2 T ) ( θ θ 0 )
Finally, the updating of θ is
θ = θ 0 + ( H 1 Q r H 1 T + H 2 Q d H 2 T ) 1 ( H 1 Q r h 1 + H 2 Q d h 2 )

Appendix A.2. Elliptic Localization Using Multiple Transmitters with Receiver Position Errors

In this appendix, the Gauss–Newton method for elliptic localization using multiple transmitters with receiver position errors is derived. Rewriting the MLE problem in (32)
min θ i = 1 N j = 1 M 1 σ i j 2 r i j H i θ P j θ 2 + 1 β i j 2 d i j Q i j θ 2 + j = 1 M 1 γ j 2 s ˜ j F j θ 2 .
Similarly, thought the first-order Taylor series expansion, we can get
min θ i = 1 N j = 1 M ( 1 σ i j 2 r i j H i θ 0 P j θ 0 ( ( H i T H i θ 0 ) T H i θ 0 + ( P j T P j θ ) T P j θ 0 ) ( θ θ 0 ) 2 + 1 β i j 2 d i j Q i j θ 0 ( Q i j T Q i j θ 0 ) T ( θ θ 0 ) Q i j θ 0 2 ) + j = 1 M 1 γ j 2 s ˜ j F j θ 2 .
Let the gradient of objective function in (A9) with θ to zero
i = 1 N j = 1 M 2 ( 1 σ i j 2 r i j H i θ 0 P j θ 0 ( ( H i T H i θ 0 ) T H i θ k + ( P j T P j θ 0 ) T P j θ 0 ) ( θ θ 0 ) ( H i T H i θ 0 H i θ 0 + P j T P j θ 0 P j θ 0 )     + 1 β i j 2 d i j Q i j θ 0 ( Q i j T Q i j θ 0 ) T ( θ θ 0 ) Q i j θ 0 Q i j T Q i j θ 0 Q i j θ 0 ) j = 1 M 2 1 γ j 2 F j T ( s ˜ j F j θ ) = 0 .
Set
Q r = diag [ 1 σ 1 , 1 2 , 1 σ 1 , 2 2 , , 1 σ N , M 2 ] , Q d = diag [ 1 β 1 , 1 2 , 1 β 1 , 2 2 , , 1 β N , M 2 ] ,
Q s = diag [ 1 γ 1 2 , 1 γ 2 2 , , 1 γ M 2 ] I p × p , s ˜ = [ s ˜ 1 T , s ˜ 2 T , , s ˜ M T ] T , F = [ F 1 T , F 2 T , F M T ] T ,
h 3 = [ r 11 H 1 θ 0 P 1 θ 0 , r 12 H 1 θ 0 P 2 θ 0 , , r N M H N θ 0 P M θ 0 ] T ,
h 4 = [ d 11 Q 11 θ 0 , d 12 Q 12 θ 0 , , d N M Q N M θ 0 ] T ,
H 3 = [ H 1 T H 1 θ 0 H 1 θ 0 + P 1 T P 1 θ 0 P 1 θ 0 , H 1 T H 1 θ 0 H 1 θ 0 + P 2 T P 2 θ 0 P 2 θ 0 , , H N T H N θ 0 H N θ 0 + P M T P M θ 0 P M θ 0 ] ,
H 4 = [ Q 11 T Q 11 θ 0 Q 11 θ 0 , Q 12 T Q 12 θ 0 Q 12 θ 0 , , Q N M T Q N M θ 0 Q N M θ 0 ] .
Then (A10) can be recast as
H 3 Q r ( h 3 H 3 T ( θ θ 0 ) ) + H 4 Q d ( h 4 H 4 T ( θ θ 0 ) ) + F T Q s ( s ˜ F θ ) = 0 .
Finally, the updating of θ is
θ = ( H 3 Q r H 3 T + H 4 Q d H 4 T + F T Q s F ) 1 H 3 Q r ( h 3 + H 3 T θ 0 ) + H 4 Q d ( h 4 + H 4 T θ 0 ) + F T Q s s ˜ .

References

  1. Abouzar, P.; Michelson, D.G.; Hamdi, M. RSSI-based distributed self-localization for wireless sensor networks used in precision agriculture. IEEE Trans. Wirel. Commun. 2016, 15, 6638–6650. [Google Scholar] [CrossRef] [Green Version]
  2. Nguyen, T.L.T.; Septier, F.; Rajaona, H.; Peters, G.W.; Nevat, I.; Delignon, Y. A Bayesian perspective on multiple source localization in wireless sensor networks. IEEE Trans. Signal Process. 2015, 64, 1684–1699. [Google Scholar] [CrossRef]
  3. Zou, Y.; Liu, H. TDOA localization with unknown signal propagation speed and sensor position errors. IEEE Commun. Lett. 2020, 24, 1024–1027. [Google Scholar] [CrossRef]
  4. Naraghi-Pour, M.; Ikuma, T. EM-based localization of noncooperative multicarrier communication sources with noncoherent subarrays. IEEE Trans. Wirel. Commun. 2018, 17, 6149–6159. [Google Scholar] [CrossRef]
  5. Bartoletti, S.; Giorgetti, A.; Win, M.Z.; Conti, A. Blind selection of representative observations for sensor radar networks. IEEE Trans. Veh. Technol. 2015, 64, 1388–1400. [Google Scholar] [CrossRef]
  6. Yang, L.; Yang, L.; Ho, K. Moving target localization in multistatic sonar by differential delays and doppler shifts. IEEE Signal Process. Lett. 2016, 23, 1160–1164. [Google Scholar] [CrossRef]
  7. Zhang, F.; Sun, Y.; Zou, J.; Zhang, D.; Wan, Q. Closed-form localization method for moving target in passive multistatic radar network. IEEE Sens. J. 2020, 20, 980–990. [Google Scholar] [CrossRef]
  8. Ma, F.; Liu, Z.M.; Guo, F. Direct position determination in asynchronous sensor networks. IEEE Trans. Veh. Technol. 2019, 68, 8790–8803. [Google Scholar] [CrossRef]
  9. Zou, Y.; Wan, Q. Asynchronous time-of-arrival-based source localization with sensor position uncertainties. IEEE Commun. Lett. 2016, 20, 1860–1863. [Google Scholar] [CrossRef]
  10. Feng, X.; Huang, Z.; He, J. A 1-D search approach for single sensor passive localization based on signal periodicity. IEEE Commun. Lett. 2021, 25, 2221–2225. [Google Scholar] [CrossRef]
  11. Le, T.K.; Ono, N. Closed-form and near closed-form solutions for TOA-based joint source and sensor localization. IEEE Trans. Signal Process. 2016, 64, 4751–4766. [Google Scholar] [CrossRef]
  12. Zou, Y.; Liu, H. Semidefinite programming methods for alleviating clock synchronization bias and sensor position errors in TDOA localization. IEEE Signal Process. Lett. 2020, 27, 241–245. [Google Scholar] [CrossRef]
  13. Sun, Y.; Zhang, F.; Wan, Q. Wireless sensor network-based localization method using TDOA measurements in MPR. IEEE Sens. J. 2019, 19, 3741–3750. [Google Scholar] [CrossRef]
  14. Zou, Y.; Liu, H. RSS-based target localization with unknown model parameters and sensor position errors. IEEE Trans. Veh. Technol. 2021, 70, 6969–6982. [Google Scholar] [CrossRef]
  15. Sun, Y.; Ho, K.; Wan, Q. Eigenspace solution for AOA localization in modified polar representation. IEEE Trans. Signal Process. 2020, 68, 2256–2271. [Google Scholar] [CrossRef]
  16. Chang, S.; Li, Y.; Yang, X.; Wang, H.; Hu, W.; Wu, Y. A novel localization method based on RSS-AOA combined measurements by using polarized identity. IEEE Sens. J. 2019, 19, 1463–1470. [Google Scholar] [CrossRef]
  17. Li, Y.Y.; Qi, G.Q.; Sheng, A.D. Performance metric on the best achievable accuracy for hybrid TOA/AOA target localization. IEEE Commun. Lett. 2018, 22, 1474–1477. [Google Scholar] [CrossRef]
  18. Xiong, H.; Peng, M.; Gong, S.; Du, Z. A novel hybrid RSS and TOA positioning algorithm for multi-objective cooperative wireless sensor networks. IEEE Sens. J. 2018, 18, 9343–9351. [Google Scholar] [CrossRef]
  19. Zheng, R.; Wang, G.; Ho, K. Accurate semidefinite relaxation method for elliptic localization with unknown transmitter position. IEEE Trans. Wirel. Commun. 2020, 20, 2746–2760. [Google Scholar] [CrossRef]
  20. Zhang, Y.; Ho, K. Multistatic localization in the absence of transmitter position. IEEE Trans. Signal Process. 2019, 67, 4745–4760. [Google Scholar] [CrossRef]
  21. Farina, A.; Hanle, E. Position accuracy in netted monostatic and bistatic radar. IEEE Trans. Aerosp. Electron. Syst. 1983, 19, 513–520. [Google Scholar] [CrossRef]
  22. Amiri, R.; Behnia, F. An efficient weighted least squares estimator for elliptic localization in distributed MIMO radars. IEEE Signal Process. Lett. 2017, 24, 902–906. [Google Scholar] [CrossRef]
  23. Hamdollahzadeh, M.; Amiri, R.; Behnia, F. Moving target localization in bistatic forward scatter radars: Performance study and efficient estimators. IEEE Trans. Aerosp. Electron. Syst. 2019, 56, 1582–1594. [Google Scholar] [CrossRef]
  24. Noroozi, A.; Oveis, A.H.; Sebt, M.A. Iterative target localization in distributed MIMO radar from bistatic range measurements. IEEE Signal Process. Lett. 2017, 24, 1709–1713. [Google Scholar] [CrossRef]
  25. Griffiths, H.; Baker, C. Passive coherent location radar systems. Part 1: Performance prediction. IEE Proc.-Radar Sonar Navig. 2005, 152, 153–159. [Google Scholar] [CrossRef]
  26. Stinco, P.; Greco, M.S.; Gini, F.; Rangaswamy, M. Ambiguity function and Cramér-Rao bounds for universal mobile telecommunications system-based passive coherent location systems. IET Radar Sonar Navig. 2012, 6, 668–678. [Google Scholar] [CrossRef]
  27. Shen, J.; Molisch, A.F.; Salmi, J. Accurate passive location estimation using TOA measurements. IEEE Trans. Wirel. Commun. 2012, 11, 2182–2192. [Google Scholar] [CrossRef]
  28. Amiri, R.; Behnia, F.; Sadr, M.A.M. Exact solution for elliptic localization in distributed MIMO radar systems. IEEE Trans. Veh. Technol. 2018, 67, 1075–1086. [Google Scholar] [CrossRef]
  29. Amiri, R.; Behnia, F.; Noroozi, A. Efficient joint moving target and antenna localization in distributed MIMO radars. IEEE Trans. Wirel. Commun. 2019, 18, 4425–4435. [Google Scholar] [CrossRef]
  30. Wu, X.; Shen, Y.; Zhu, X.; Lin, Q. Semidefinite programming solutions for elliptic localization in asynchronous radar networks. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3385–3398. [Google Scholar] [CrossRef]
  31. Wu, M.; Xiong, N.; Tan, L. Adaptive range-based target localization using diffusion Gauss–Newton method in industrial environments. IEEE Trans. Ind. Inform. 2019, 15, 5919–5930. [Google Scholar] [CrossRef]
  32. Jia, T.; Ho, K.C.; Wang, H.; Shen, X. Localization of a moving object with sensors in motion by time delays and doppler shifts. IEEE Trans. Signal Process. 2020, 68, 5824–5841. [Google Scholar] [CrossRef]
  33. Gao, W.; Goldfarb, D. Quasi–Newton methods: Superlinear convergence without line searches for self-concordant functions. Optim. Methods Softw. 2019, 34, 194–217. [Google Scholar] [CrossRef] [Green Version]
  34. Sun, Y.; Babu, P.; Palomar, D.P. Majorization-minimization algorithms in signal processing, communications, and machine learning. IEEE Trans. Signal Process. 2016, 65, 794–816. [Google Scholar] [CrossRef]
  35. Panwar, K.; Babu, P.; Stoica, P. Maximum likelihood algorithm for time-delay based multistatic target localization. IEEE Signal Process. Lett. 2022, 29, 847–851. [Google Scholar] [CrossRef]
  36. Beck, A.; Stoica, P.; Li, J. Exact and approximate solutions of source localization problems. IEEE Trans. Signal Process. 2008, 56, 1770–1778. [Google Scholar] [CrossRef]
  37. Zou, Y.; Fan, J.; Wu, L.; Liu, H. Fixed point iteration based algorithm for asynchronous TOA-based source localization. Sensors 2022, 22, 6871. [Google Scholar] [CrossRef]
Figure 1. Illustration of elliptic localization.
Figure 1. Illustration of elliptic localization.
Sensors 23 00373 g001
Figure 2. Illustration of MM principle.
Figure 2. Illustration of MM principle.
Sensors 23 00373 g002
Figure 3. RMSE comparison for estimating target position.
Figure 3. RMSE comparison for estimating target position.
Sensors 23 00373 g003
Figure 4. RMSE comparison for estimating target position.
Figure 4. RMSE comparison for estimating target position.
Sensors 23 00373 g004
Figure 5. RMSE comparison for estimating target position at σ s 2 = 1 m 2 .
Figure 5. RMSE comparison for estimating target position at σ s 2 = 1 m 2 .
Sensors 23 00373 g005
Figure 6. RMSE comparison for estimating target position at σ 2 = 10 m 2 and σ s 2 = 1 m 2 .
Figure 6. RMSE comparison for estimating target position at σ 2 = 10 m 2 and σ s 2 = 1 m 2 .
Sensors 23 00373 g006
Figure 7. RMSE comparison for estimating target position at σ s 2 = 1 m 2 using three transmitters.
Figure 7. RMSE comparison for estimating target position at σ s 2 = 1 m 2 using three transmitters.
Sensors 23 00373 g007
Figure 8. RMSE comparison for estimating target position at σ 2 = 100 m 2 and σ s 2 = 1 m 2 using three transmitters.
Figure 8. RMSE comparison for estimating target position at σ 2 = 100 m 2 and σ s 2 = 1 m 2 using three transmitters.
Sensors 23 00373 g008
Table 1. Avg. CPU time [ms] for methods.
Table 1. Avg. CPU time [ms] for methods.
Scenarios14
Algorithms
TSWLS0.380.84
SDP551.6695.4
Gauss–Newton0.231.6
Proposed10.1157.7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, L.; Zou, Y. Majorization-Minimization Method for Elliptic Localization in the Absence of Transmitter Position. Sensors 2023, 23, 373. https://doi.org/10.3390/s23010373

AMA Style

Wu L, Zou Y. Majorization-Minimization Method for Elliptic Localization in the Absence of Transmitter Position. Sensors. 2023; 23(1):373. https://doi.org/10.3390/s23010373

Chicago/Turabian Style

Wu, Liehu, and Yanbin Zou. 2023. "Majorization-Minimization Method for Elliptic Localization in the Absence of Transmitter Position" Sensors 23, no. 1: 373. https://doi.org/10.3390/s23010373

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop