Next Article in Journal
Multilayer Backbones for Internet of Battlefield Things
Next Article in Special Issue
A CSI Fingerprint Method for Indoor Pseudolite Positioning Based on RT-ANN
Previous Article in Journal
A Long Short-Term Memory Network-Based Radio Resource Management for 5G Network
Previous Article in Special Issue
An Indoor and Outdoor Multi-Source Elastic Fusion Navigation and Positioning Algorithm Based on Particle Filters
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Indoor Smart Parking Algorithm Based on Fingerprinting

Matematics and Applications, University of Naples Federico II, 80138 Napoli, Italy
Future Internet 2022, 14(6), 185; https://doi.org/10.3390/fi14060185
Submission received: 10 May 2022 / Revised: 31 May 2022 / Accepted: 9 June 2022 / Published: 14 June 2022
(This article belongs to the Special Issue Wireless Technology for Indoor Localization System)

Abstract

:
In the last few years, researchers from many research fields are investigating the problem affecting all the drivers in big and populated cities: the parking problem. In outdoor environments, the problem can be solved by relying on vehicular ad hoc networks, which guarantee communication among vehicles populating the network. When it comes to indoor settings, the problem gets harder, since drivers cannot count on classic GPS localization. In this work, a smart parking solution for a specific indoor setting is provided, exploiting the fingerprint approach for indoor localization. The considered scenario is a multi-level car park inside an airport building. The algorithm provides a vehicle allocation inside the car park in quadratic time over the number of parking slots, by also considering the driver’s preferences on the terminal to be reached.

1. Introduction

Indoor localization [1] is the process of detecting positions in indoor environments. The big challenge is about not to rely on a global positioning system (GPS), due to the interruption of connection with satellites. In outdoor settings, typically handled through vehicular ad hoc networks [2], localization is an issue from several points of view: from routing [3] to data dissemination [4], but also smart parking [5]. See [6,7,8] for interesting proposals on localization.
In this work, it has been decided to focus on the last challenging aspect: the smart parking problem. When speaking about the parking problem, we mean the problem of handling, in an efficient manner, the process in which drivers compete for a shared resource, namely the available parking slots.
While in outdoor environments the smart parking problem has been widely investigated, the management of such an issue in indoor contexts seems to be still an open issue. For this reason, in this work, the smart parking problem is formalized in an indoor scenario and solved through fingerprinting. The considered scenario is an airport with a car park to be handled. Typically, people approaching the car park simply try to get as close as possible to their target, which in the case of an airport is a terminal, most likely. To the best of my knowledge, there is not any system able to guide us inside a car park in a way that is similar to how GPS guides us along the streets of our cities.
In this work, a fingerprinting localization technique is used. This has been proven to be simple and reliable and it works in two phases: a training offline phase, and an online localization phase [9]. Precisely, fingerprinting is used in this work to measure the received signal strength from any access point, placed in the offline phase, to infer the position of some points of interest, that in the specific airport scenario are the parking slots and the terminals.
Notice that the indoor smart parking problem is nothing but a particular case of indoor localization since it requires finding the position of available slots in an indoor environment. For this reason, the problem presents the same challenges and difficulties as the standard indoor localization problem. It has been decided to focus on the indoor smart parking problem instead of simple indoor localization since the latter has been already investigated deeply.

Outline

The rest of the paper is organized as follows: in Section 2, the state of the art on parking algorithms is analyzed, both for indoor and outdoor settings; in Section 3, some background concepts are introduced, such as RSSI and fingerprinting; in Section 4, the considered environment is explained and in Section 5, some formal definitions and notations are provided; Section 6 shows the indoor parking algorithm and its complexity in all of its phases, by also applying each step to a running example; in Section 4, the algorithm performance is evaluated over several executions with different parameters; finally, in Section 8, the conclusions of this work are provided.

2. Related Works

The parking problem is still an open issue for many researchers from diverse research fields. In outdoor contexts, several proposals have been made to provide algorithmic solutions to the problem, such as authors of [10], which produced an algorithm to complete the parking process by optimizing the waiting time and considering the destination of the user when assigning a parking slot to him. Additionally, the authors in [11] provided an algorithm based on a known optimization problem, which is the ant colony optimization, by getting inspired by the behavior of real ants looking for food. The authors of [12], instead, proposed a game-theoretic solution, by modeling the parking problem as a multi-agent game in which drivers compete towards the same resource. In this case, the solution is provided by means of a social equilibrium, the Nash equilibrium.
When moving to an indoor setting, one can observe that the literature on smart parking is much poorer. Nevertheless, some interesting solutions to the problem has been proposed, such as the authors in [13] which provided a vision-based parking lot system, where wide-angle fisheye-lens are used and in which vacant parking spaces can be detected by a background subtraction scheme. However, in [14], the authors provided a system based on smartphones that tracks the vehicle’s location in real time and uses landmark recognition methods against noises. Additionally, in [15], they proposed a new map representation for indoor localization: precisely, they considered the permanent elements as static objects and the changing elements as semi-static objects. Recently, the authors of [16] developed a car-searching mobile app based on a turn-by-turn navigation strategy able to correct the user’s heading orientation.
In [17], the authors also used fingerprinting applied to smart parking, with the aim of recording parking positions, through the K-nearest neighbor and fingerprinting techniques based on the RSSI Bluetooth with distance calculation parameters using Manhattan distance. However, they did not formalize and face the problem of finding a suitable parking slot in an indoor context. To the best of my knowledge, this is the first work addressing the indoor parking problem, by providing a solution to associate vehicles to available parking slots by getting drivers as close as possible to their final destination, by means of a fingerprinting-based localization technique.

3. Background

3.1. Outdoor and Indoor Localization

Nowadays, in outdoor environments, the global position system constitutes an established instrument to localize vehicles, pedestrians, and so on. When one moves to indoor contexts, one has to deal with several challenging aspects, as they say in [18]. Indeed, the continuous interruption of connection with satellites makes indoor localization much harder. See [19] for an overview of the existing localization system technologies and algorithms. The classical positioning techniques used for indoor environments are [18]:
  • Time of arrival: based on the computation of the time needed by the signal to go from the unlocated device (UD) to the base station. To detect the position of UD, three base stations are needed.
  • Time difference of arrival: it evaluates the time difference at which the signal arrives at many measuring units.
  • RSS-based fingerprinting: after a collection phase of several RSS fingerprints, it is based on matching online measurements with the closest possible location in the database.
  • Angle of arrival: based on the computation of the angle at which the signal arrives from the UD to the base station.

3.2. RSSI

The received signal strength indicator (RSSI) measures the power received in a radio signal [20]: the greater the RSSI the stronger the signal. The RSSI values are measured in dBm and have typical negative values ranging between 0 dBm (excellent signal) and 110 dBm (extremely poor signal) [21]. We call RSS values the measurements associated with radio signals.

3.3. Fingerprinting

In general, in the same way, a fingerprint identifies uniquely humans, in computer science fingerprints are used to map a large data representation to a much shorter one. In the specific scenario of the localization, given a map, the set of RSS values that are collected for each position in the map from various base stations is called the fingerprint for that location. Matching the observations of RSS to the map of the previously measured RSS values is known as fingerprinting [22]. See [23,24] for interesting proposals on fingerprinting.

4. Environment Setting

For this work, let us imagine a scenario as the following: a multi-level car park within an airport. Clearly, as for the outdoor case, vehicles looking for a free space should be communicating with each other so as to ensure a reduction of traffic congestion and air pollution, but also to facilitate drivers in finding a parking slot which is suitable for his requirements.
While in an outdoor setting drivers can exploit vehicular ad hoc networks to communicate with each other, in an indoor environment things get harder. Indeed, the idea is to perform an indoor localization of vehicles by relying on a slightly different version of fingerprinting approach.
As you can see from Figure 1, the car park building presents several access points, used to measure the signal strength received from the red points, whose position has to be discovered. Those points should be placed in the proximity of each parking slot, so as to know their position in the building.
Some interesting points should be also considered as possible destination points for drivers. More precisely, in a typical scenario, drivers looking for a free parking slot want to allocate their car and then reach some destination. In our airport setting, the interesting destination could easily be the terminals for departure. They are denoted by T in Figure 1.
Moreover, the car park is supposed to be divided into areas with the final aim of associating drivers with an available parking slot belonging to the same area of the target terminal.

5. Notation

In this section, some formal definitions are given to define the indoor parking problem. First, let us fix some notation:
  • A P is the set of access points, with | A P | = n ;
  • S is the set of slots in the considered environment, with | S | = m ;
  • A is the set of areas of the car park, with | A | = k ;
  • T is the set of terminals of the airport, with | T | = l ;
  • r s i , i A P is the received signal strength associated with the i-th access point in A P ;
  • r s j , j T is the received signal strength associated with the i-th terminal in T;
  • a v : S { 0 , 1 } is the available function associating to each slot a 0 value if it is taken, or a 1 value if it is available for parking;
  • a r e a : A P A is the function associating the belonging area in the car park to each access point;
  • i s : S T A is the function associating the belonging area in the car park to each slot or terminal, which will be defined in the sequel.
Let us move to defining the actual fingerprint definition.
Definition 1
(Fingerprint). Given a slot s S , let us denote by f p s = r s 1 , , r s n the associated fingerprinting tuple. Equivalently, given a terminal t T , let us denote by f p t = r s 1 , , r s l the associated fingerprinting tuple.
Notice that some issues related to the unreliability of the RSS values could be easily faced by introducing a mechanism similar to the one of DGPS (differential GPS) [25]. Indeed, one can use one or more access points as detectors of variations to be transmitted through the network to improve the quality of the measurements, such as they did in [26] and in [27].
We denote by m a x ( f p i ) the maximum entry of the f p i tuple, indicating the a p A P with the highest received signal strength for the slot (terminal) i (namely, the closest access point with respect to i). Precisely, i s ( i ) = a r e a ( m a x ( f p i ) ) .
To better define the notion of area, let us introduce a parameter, θ , representing the maximum allowed difference between the signal strengths of the fingerprint entries related to the closest access point.
Definition 2
(Parking Area). Given f p i the fingerprint tuple associated to the parking slot i defined as in Definition 1, and given a threshold θ, a parking area is made of those parking slots i and j such that:
m a x ( f p i ) m a x ( f p j ) θ
m a x ( f p i ) a n d m a x ( f p j ) occupy the same position in the corresponging fingerprints
The same holds in the case of terminals in place of slots.

6. Indoor Parking Algorithm

In this section, the phases of the indoor parking algorithm are described through a running example.

6.1. Sampling Phase

In this offline phase, the airport car park is sampled. Precisely, the access points are placed in the environment in a way that the whole car park is covered by the signal. Let us consider the example shown in Figure 2: the scenario presents four terminals, three access points and twelve parking slots among the several parking areas, among which the black ones are already taken. In this example, the sampling phase produced the access points distribution shown in the figure.

6.2. User Profiling

Since we are dealing with drivers looking for parking space in an airport building, without loss of generality, it is possible to assume that those drivers have to take a plane, or they have to pick someone up who is arriving by plane.
For this reason, one can assume a user profiling phase, in which drivers provide a flight number. Such information allows the system to infer the terminal number that the driver wants to reach.
This will be useful to execute the algorithm according to the driver’s needs, so to associate each driver with the parking slot which best suits his requirements in terms of the destination to be reached.

6.3. Fingerprint Construction

In this phase, the fingerprint of each slot and terminal is built according to Definition 1, by following Algorithm 1.
Algorithm 1 Fingerprint Construction
  • Input: A P , T , S
  • Output: f p
  •    for  s S  do
  •       if  a v ( s )  then
  •           for  a p A P  do
  •                f p s [ a p ] = r e c e i v e d S S ( s , a p )
  •           end for
  •        end if
  •      end for
  •      for  t T  do
  •       for  a p A P  do
  •            f p t [ a p ] = r e c e i v e d S S ( t , a p )
  •       end for
  •      end for
The sets A P , T , S are the once defined in Section 5 and the function receivedSS extracts the signal strength from the access point to the desired interesting point.
By considering the running example in Figure 2, the resulting fingerprints are shown in Table 1 and Table 2.

6.4. Area Construction

In this phase, the entire environment is divided into areas in such a way that slots and terminals belonging to the same area have the same closest access point.
While assigning an area to each slot and terminal, it could be necessary to update the value of the threshold θ so as to have that each terminal has at least one parking slot in the same area.
Based on the parking area definition in Definition 2, by using a threshold of 0.2 , one would obtain the areas of Table 3. The result is clearly unsatisfactory: indeed, all the terminals do not fall in any area containing some parking slots. For this reason, the areas are computed again by increasing the value of the threshold, for instance, 0.4 . The results are shown in Table 4.
The algorithm performing the computation explained above can be summarized in Algorithm 2.
Algorithm 2 Area Construction
  • Input: θ , S , T
  • Output: A
  •   for  s S  do
  •       a s s o c i a t e _ a r e a ( s , θ )
  •   end for
  •   for  t T  do
  •       a s s o c i a t e _ a r e a ( t , θ )
  •   end for
  •   while  t T s . t . ! c o n t a i n s ( a r e a ( t ) , s ) for some s S  do
  •       update θ and start over
  •   end while
The function a s s o c i a t e _ a r e a is supposed to associate a slot or a terminal to an existing or a new parking area according to the Definition 2, while the function c o n t a i n s ( a , b ) returns true if b is contained in a.

6.5. The Driver-Slot Association

In order to complete the indoor parking process, we also need to take into consideration the set of drivers D ready to park. As previously said, each driver can express the terminal he wants to reach after leaving his car during the user profiling phase.
By following the running example, let us consider D = { d 1 , d 2 , d 3 , d 4 , d 5 , d 6 } the set of drivers and a function t e r m i n a l : D T associating to each driver his favorite terminal.
Table 5 provides an example with 6 drivers and their preferences.
Algorithm 3 produces a set R e s u l t D × S made of pairs ( d r i v e r , s l o t ) such that the slot has been associated with the driver, according to his preferences.
Algorithm 3 Slot Association
  • Input: D , A
  • Output: R e s u l t
  •    for  d D  do
  •        a r e a = i s ( t e r m i n a l ( d ) )
  •        s = g e t _ a v a i l a b l e _ s l o t ( a r e a )
  •       if  ! s  then
  •            a r e a = g e t _ n e x t _ a v a i l a b l e _ a r e a ( A )
  •           if  ! a r e a  then
  •                b r e a k
  •           end if
  •            s = g e t _ a v a i l a b l e _ s l o t ( a r e a )
  •       end if
  •       if  ! s  then
  •            e x i t
  •       end if
  •        a d d ( R e s u l t , ( d , s ) )
  •        r e m o v e ( s , a r e a )
  •    end for
The function g e t _ a v a i l a b l e _ s l o t ( a r e a ) gives a random available slot in the selected area. The function g e t _ n e x t _ a v a i l a b l e _ a r e a ( A ) simply returns the next area in A having at least one available parking slot (if any). The function a d d allows putting the new pair (driver,slot) in the resulting set. The function r e m o v e ( s , a r e a ) simply makes the slot s no longer available.
The resulting set by applying Algorithm 3 to the running example is shown in Table 6. They are obtained by applying the algorithm to the areas obtained in Table 4.
Since after this execution, a 1 and a 3 run out of available parking slots, what would happen if some other driver showed up? Let us suppose of having two additional drivers d 7 and d 8 whose preferences about the target terminal are t 3 and t 4 respectively. The area of terminal 3 is a 3 , where there are no available parking slots. Hence, the algorithm provides the next available area, a 2 assigning d 7 to s 2 . The same happens to d 8 , which is assigned to s 3 .
Essentially, the proposed algorithms are able to associate parking slots to drivers as long as the number of available parking slots in the whole car park is enough to cover the number of drivers.

6.6. Complexity

In order to compute the complexity of the indoor parking algorithm, let us compute the cost of the online phases, namely, the fingerprint construction, the area’s construction, and the slot association. Let us also recall the set sizes in Table 7, that will be used for the complexity of the procedures.

6.6.1. Fingerprint Construction

By observing Algorithm 1, one can notice that the first iteration is over the set of slots, with a nested iteration over the set of access points ( m n ). The second iteration is on the set of terminals, with a nested iteration over the set of access points ( l n ).
Proposition 1
(Fingerprint Construction Complexity). The asymptotic complexity of the fingerprint construction procedure is O ( m n + l n ) .

6.6.2. Area Construction

By observing Algorithm 2, one can notice that the first iteration is on the number of slots (m) and the second one is on the number of terminals (l). The function a s s o c i a t e _ a r e a has a constant cost. The final iteration is repeated until any slot is associated with an area containing at least one terminal. After a few updates of the threshold, the exit condition is finally true. Hence, this is executed as a constant number c of time over the slots ( c m ).
Proposition 2
(Areas Construction Complexity). The asymptotic complexity of the areas construction procedure is O ( m + l ) .

6.6.3. Slot Association

By observing Algorithm 3, one can notice that the first iteration is on the set of drivers, with a nested g e t _ a v a i l a b l e _ s l o t function depending on the cardinality of the area, which is m in the worst case ( k m ). The a d d and r e m o v e functions have constant cost.
One can also observe that the number of drivers is less or equal to the number of slots, as well as the number of terminals and access points, in order that the parking process can be completed.
k m
l m
n m
Proposition 3
(Slot Association Complexity). The asymptotic complexity of the slot association procedure is O ( k m ) = O ( m 2 ) by (3).
Proposition 4
(Indoor Parking Algorithm Complexity). The asymptotic complexity of the indoor fingerprint construction procedure is O ( m n + l n ) + O ( m + l ) + O ( m 2 ) = O ( m 2 + l n ) = O ( m 2 ) by (4) and (5).

7. Evaluation

In this section, some experimental results are shown. Precisely, several executions of the algorithm have been tested, with different parameters, shown in Table 8. The number of terminals considered is at most 10, which is already a challenging number, knowing that there is no airport with more than 5 terminals. The number of access points, instead, grows together with the number of vehicles/slots.
Performances of the algorithm are shown in Table 9, where execution times of the algorithm are provided for each execution. As we can observe, the vehicle allocation requires a few seconds even in the case of ten thousand drivers/slots. In Figure 3, the time variation can be observed: the number of seconds needed to complete the allocation process is always below 1, except for the benchmark case of 10,000 drivers. Instead, in Figure 4, the algorithm behavior is represented as the variation of time with respect to the parameters previously chosen.
For a matter of completeness, the behavior of the algorithm has been studied for very high numbers of vehicles and slots, solving the problem in 219.843 s for 50,000 drivers/slots, and 938.116 s for 100,000 drivers/slots.

8. Conclusions

The parking problem is still an open issue in the automotive research field, and it is about suggesting suitable parking slots to the drivers that ask for them. This process becomes harder when moving to an indoor environment, where the localization cannot be obtained through a global positioning system.
In this work, the indoor parking problem is faced. First, the environment is opportunely set and, precisely, the problem is defined in a car park of an airport. Then, the indoor parking algorithm is defined, through three phases, sampling, user profiling, fingerprint construction, area construction, and the driver-slot association phase. Each phase is explained by means of a running example and the final solution is a vehicle allocation that satisfies the driver’s needs about their final destination. The resulting algorithm works in quadratic time over the number of parking slots. Experimental results prove the efficiency of the algorithm, even with high magnitude numbers of vehicles and slots.
Recently, efficient algorithms based on game theory have been developed for the localization [28,29,30,31,32,33]. However, they only consider deterministic environments. As a future hint, one could extend the same algorithms to non-deterministic environments by also exploiting techniques of formal methods for strategic reasoning, by using [34,35,36] as a starting point.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Zafari, F.; Gkelias, A.; Leung, K.K. A survey of indoor localization systems and technologies. IEEE Commun. Surv. Tutor. 2019, 21, 2568–2599. [Google Scholar] [CrossRef] [Green Version]
  2. Campolo, C.; Molinaro, A.; Scopigno, R. Vehicular ad hoc Networks. Stand. Solut. Res. 2015. Available online: https://link.springer.com/book/10.1007/978-3-319-15497-8 (accessed on 1 May 2022).
  3. Li, F.; Wang, Y. Routing in vehicular ad hoc networks: A survey. IEEE Veh. Technol. Mag. 2007, 2, 12–22. [Google Scholar] [CrossRef]
  4. Chaqfeh, M.; Lakas, A.; Jawhar, I. A survey on data dissemination in vehicular ad hoc networks. Veh. Commun. 2014, 1, 214–225. [Google Scholar] [CrossRef]
  5. Yang, J.; Portilla, J.; Riesgo, T. Smart parking service based on wireless sensor networks. In Proceedings of the IECON 2012—38th Annual Conference on IEEE Industrial Electronics Society, Montreal, QC, Canada, 25–28 October 2012; pp. 6029–6034. [Google Scholar]
  6. Balzano, W.; Vitale, F. LEG-PER-LiDAR-enhanced GNSS positioning error reduction. Int. J. Embed. Syst. 2021, 14, 127–132. [Google Scholar] [CrossRef]
  7. Balzano, W.; Murano, A.; Vitale, F. EENET: Energy efficient detection of network changes using a wireless sensor network. In Conference on Complex, Intelligent, and Software Intensive Systems; Springer: Cham, Switzerland, 2017; pp. 1009–1018. [Google Scholar]
  8. Balzano, W.; Formisano, M.; Gaudino, L. WiFiNS: A smart method to improve positioning systems combining WiFi and INS techniques. In International Conference on Intelligent Interactive Multimedia Systems and Services; Springer: Cham, Switzerland, 2018; pp. 220–231. [Google Scholar]
  9. Yiu, S.; Dashti, M.; Claussen, H.; Perez-Cruz, F. Wireless RSSI fingerprinting localization. Signal Process. 2017, 131, 235–244. [Google Scholar] [CrossRef]
  10. Balzano, M.; Balzano, W.; Sorrentino, L.; Stranieri, S. Smart destination-based parking for the optimization of waiting time. In Workshops of the International Conference on Advanced Information Networking and Applications; Springer: Cham, Switzerland, 2020; pp. 1019–1027. [Google Scholar]
  11. Agizza, M.; Balzano, W.; Stranieri, S. An Improved Ant Colony Optimization Based Parking Algorithm with Graph Coloring. In International Conference on Advanced Information Networking and Applications; Springer: Cham, Switzerland, 2022; pp. 82–94. [Google Scholar]
  12. Calise, G.; Murano, A.; Stranieri, S. The Parking Problem: A Game-Theoretic Solution. arXiv 2022, arXiv:2204.01395. [Google Scholar]
  13. Shih, S.E.; Tsai, W.H. A convenient vision-based system for automatic detection of parking spaces in indoor parking lots using wide-angle cameras. IEEE Trans. Veh. Technol. 2014, 63, 2521–2532. [Google Scholar] [CrossRef] [Green Version]
  14. Gao, R.; Zhao, M.; Ye, T.; Ye, F.; Wang, Y.; Luo, G. Smartphone-based real time vehicle tracking in indoor parking structures. IEEE Trans. Mob. Comput. 2017, 16, 2023–2036. [Google Scholar] [CrossRef]
  15. Groh, B.H.; Friedl, M.; Linarth, A.G.; Angelopoulou, E. Advanced real-time indoor parking localization based on semi-static objects. In Proceedings of the 17th International Conference on Information Fusion (FUSION), Salamanca, Spain, 7–10 July 2014; pp. 1–7. [Google Scholar]
  16. Wang, S.S. A BLE-based pedestrian navigation system for car searching in indoor parking garages. Sensors 2018, 18, 1442. [Google Scholar] [CrossRef]
  17. Suheryadi, A.; Putra, W.P.; Al Hilmi, M.A.; Cahyanto, K.A. Vehicles Position Tracking in Parking lots Using K-Nearest Neighbor and Fingerprinting Based on RSSI Bluetooth. In Proceedings of the 2021 Sixth International Conference on Informatics and Computing (ICIC), Jakarta, Indonesia, 3–4 November 2021; pp. 1–6. [Google Scholar]
  18. Yassin, A.; Nasser, Y.; Awad, M.; Al-Dubai, A.; Liu, R.; Yuen, C.; Raulefs, R.; Aboutanios, E. Recent advances in indoor localization: A survey on theoretical approaches and applications. IEEE Commun. Surv. Tutor. 2016, 19, 1327–1346. [Google Scholar] [CrossRef] [Green Version]
  19. Obeidat, H.; Shuaieb, W.; Obeidat, O.; Abd-Alhameed, R. A review of indoor localization techniques and wireless technologies. Wirel. Pers. Commun. 2021, 119, 289–327. [Google Scholar] [CrossRef]
  20. Wikipedia. Received Signal Strength Indication. 2021. Available online: https://en.wikipedia.org/wiki/Received_signal_strength_indication (accessed on 1 May 2022).
  21. Parameswaran, A.T.; Husain, M.I.; Upadhyaya, S. Is RSSI a reliable parameter in sensor localization algorithms: An experimental study. In Field Failure Data Analysis Workshop (F2DA09); IEEE: Niagara Falls, NY, USA, 2009. [Google Scholar]
  22. Bshara, M.; Orguner, U.; Gustafsson, F.; Van Biesen, L. Fingerprinting localization in wireless networks based on received-signal-strength measurements: A case study on WiMAX networks. IEEE Trans. Veh. Technol. 2009, 59, 283–294. [Google Scholar] [CrossRef] [Green Version]
  23. Balzano, W.; Murano, A.; Vitale, F. WiFACT–Wireless Fingerprinting Automated Continuous Training. In Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 75–80. [Google Scholar]
  24. Balzano, W.; Murano, A.; Vitale, F. SNOT-WiFi: Sensor network-optimized training for wireless fingerprinting. J. High Speed Netw. 2018, 24, 79–87. [Google Scholar] [CrossRef]
  25. Parkinson, B.W.; Enge, P.K. Differential gps. Prog. Astronaut. Aeronaut. Glob. Position. Syst. Theory Appl. 1996, 2, 3–32. [Google Scholar]
  26. Hoangt, G.M.; Denis, B.; Häirri, J.; Slock, D. Cooperative localization in VANETs: An experimental proof-of-concept combining GPS, IR-UWB ranging and V2V communications. In Proceedings of the 2018 15th Workshop on Positioning, Navigation and Communications (WPNC), Bremen, Germany, 25–26 October 2018; pp. 1–6. [Google Scholar]
  27. Petovello, M.G.; O’Keefe, K.; Chan, B.; Spiller, S.; Pedrosa, C.; Basnayake, C. Demonstration of inter-vehicle UWB ranging to augment DGPS for improved relative positioning. In Proceedings of the 23rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2010), Portland, OR, USA, 21–24 September 2010; pp. 1198–1209. [Google Scholar]
  28. Zhou, M.; Lin, Y.; Zhao, N.; Jiang, Q.; Yang, X.; Tian, Z. Indoor WLAN intelligent target intrusion sensing using ray-aided generative adversarial network. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 4, 61–73. [Google Scholar] [CrossRef]
  29. Li, Q.; Qu, H.; Liu, Z.; Zhou, N.; Sun, W.; Sigg, S.; Li, J. AF-DCGAN: Amplitude feature deep convolutional GAN for fingerprint construction in indoor localization systems. IEEE Trans. Emerg. Top. Comput. Intell. 2019, 5, 468–480. [Google Scholar] [CrossRef] [Green Version]
  30. Moura, J.; Marinheiro, R.N.; Silva, J.C. Game theory for cooperation in multi-access edge computing. In Paving the Way for 5G Through the Convergence of Wireless Systems; IGI Global: Hershey, PA, USA, 2019; pp. 100–149. [Google Scholar]
  31. Raveendran, N. Game Theoretic and Machine Learning Techniques for Efficient Resource Allocation in Next Generation Wireless Networks. Ph.D. Thesis, University of Houston, Houston, TX, USA, 2019. Available online: https://uh-ir.tdl.org/handle/10657/5539 (accessed on 1 May 2022).
  32. Raveendran, N.; Zhang, H.; Song, L.; Wang, L.C.; Hong, C.S.; Han, Z. Pricing and resource allocation optimization for IoT fog computing and NFV: An EPEC and matching based perspective. IEEE Trans. Mob. Comput. 2020, 21, 1349–1361. [Google Scholar] [CrossRef]
  33. Raveendran, N.; Gu, Y.; Jiang, C.; Tran, N.H.; Pan, M.; Song, L.; Han, Z. Cyclic three-sided matching game inspired wireless network virtualization. IEEE Trans. Mob. Comput. 2019, 20, 416–428. [Google Scholar] [CrossRef]
  34. Jamroga, W.; Murano, A. Module checking of strategic ability. In AAMAS; Springer: Berlin, Germany, 2015; Volume 15, pp. 227–235. [Google Scholar]
  35. Jamroga, W.; Murano, A. On module checking and strategies. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems, Paris, France, 5–9 May 2014; pp. 701–708. [Google Scholar]
  36. Jamroga, W.; Malvone, V.; Murano, A. Natural strategic ability. Artif. Intell. 2019, 277, 103170. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Example of environment setting: a multi-level car park at the airport.
Figure 1. Example of environment setting: a multi-level car park at the airport.
Futureinternet 14 00185 g001
Figure 2. A running example.
Figure 2. A running example.
Futureinternet 14 00185 g002
Figure 3. Time variation over the number of drivers.
Figure 3. Time variation over the number of drivers.
Futureinternet 14 00185 g003
Figure 4. Time variation over the number of terminals, drivers, slots and access points.
Figure 4. Time variation over the number of terminals, drivers, slots and access points.
Futureinternet 14 00185 g004
Table 1. Slot fingerprints.
Table 1. Slot fingerprints.
f p s 1 0.9 , 0.6 , 0.3
f p s 2 0.5 , 0.8 , 0.2
f p s 3 0.6 , 0.9 , 0.3
f p s 4 0.1 , 0.5 , 0.7
f p s 6 0.2 , 0.6 , 0.9
f p s 7 1 , 0.7 , 0.2
f p s 8 0.9 , 0.6 , 0.1
f p s 9 0.8 , 0.5 , 0
f p s 11 0.4 , 0.6 , 0.4
Table 2. Terminal fingerprints.
Table 2. Terminal fingerprints.
f p t 1 0.5 , 0.3 , 0.1
f p t 2 0.5 , 0.3 , 0.1
f p t 3 0.1 , 0.3 , 0.5
f p t 4 0.1 , 0.3 , 0.5
Table 3. Area construction with θ = 0.2 .
Table 3. Area construction with θ = 0.2 .
a 1 s 1 , s 7 , s 8 , s 9
a 2 s 2 , s 3 , s 11
a 3 s 4 , s 6
a 4 t 1 , t 2
a 5 t 3 , t 4
Table 4. Area construction with θ = 0.4 .
Table 4. Area construction with θ = 0.4 .
a 1 s 1 , s 7 , s 8 , s 9 , t 1 , t 2
a 2 s 2 , s 3 , s 11
a 3 s 4 , s 6 , t 3 , t 4
Table 5. Example of driver’s preferences.
Table 5. Example of driver’s preferences.
Favourite Terminal
d 1 t 1
d 2 t 1
d 3 t 3
d 4 t 4
d 5 t 2
d 6 t 2
Table 6. Resulting set of the running example.
Table 6. Resulting set of the running example.
DriverSlot
d 1 s 1
d 2 s 7
d 3 s 4
d 4 s 6
d 5 s 8
d 6 s 9
Table 7. Table of set sizes for the complexity.
Table 7. Table of set sizes for the complexity.
Set Size
            Slotsm
            Access Pointsn
            Terminalsl
            Driversk
Table 8. Experimental data.
Table 8. Experimental data.
TerminalsDriversSlotsAccess Points
E 1 4693
E 2 420204
E 3 5404010
E 4 10808020
E 5 1015015060
E 6 10300300100
E 7 10500500200
E 8 1010001000400
E 9 10300030001000
E 10 1010,00010,0003000
Table 9. Performances of the algorithm.
Table 9. Performances of the algorithm.
E 1 E 2 E 3 E 4 E 5 E 6 E 7 E 8 E 9 E 10
seconds0.0560.0640.0700.0470.0440.0720.0860.1970.7187.527
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Stranieri, S. An Indoor Smart Parking Algorithm Based on Fingerprinting. Future Internet 2022, 14, 185. https://doi.org/10.3390/fi14060185

AMA Style

Stranieri S. An Indoor Smart Parking Algorithm Based on Fingerprinting. Future Internet. 2022; 14(6):185. https://doi.org/10.3390/fi14060185

Chicago/Turabian Style

Stranieri, Silvia. 2022. "An Indoor Smart Parking Algorithm Based on Fingerprinting" Future Internet 14, no. 6: 185. https://doi.org/10.3390/fi14060185

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop