You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

29 December 2022

Cluster-Based JRPCA Algorithm for Wi-Fi Fingerprint Localization

,
,
and
1
School of Mathematics, Hefei University of Technology, Hefei 230009, China
2
School of Software, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue AI in Knowledge-Based Information and Decision Support Systems

Abstract

Indoor localization services are emerging as an important application of the Internet of Things, which drives the development of related technologies in indoor scenarios. In recent years, various localization algorithms for different indoor scenarios have been proposed. The indoor localization algorithm based on fingerprints has attracted much attention due to its good performance without extra hardware devices. However, the occurrence of fingerprint mismatching caused by the complexity and variability of indoor scenarios is unneglectable, which degrades localization accuracy. In this article, by combining weighted kernel norm and L 2 , 1 -norm, a joint-norm robust principal component analysis (JRPCA in brief) assisted indoor localization algorithm is proposed, which can improve the localization accuracy through aggregating the reference points (RPs) and conducting robust feature extraction based on clustering. More specifically, a one-way hierarchical clustering termination method is proposed to obtain reasonable RP clusters adaptively according to the preset RPs. A two-phase fingerprint matching algorithm of JRPCA based on clustering is proposed to further increase the difference between similar RPs, thus facilitating rapid identification and reinforcing localization accuracy. To validate the proposed algorithm, extensive experiments are conducted in real indoor scenarios. The experimental results confirm that the proposed cluster-based JRPCA algorithm outperforms other existing algorithms in terms of robustness and accuracy.

1. Introduction

The Global Positioning System (GPS) [1] has been successfully applied in outdoor environments with high positioning accuracy in practice. In general, GPS technology mainly relies on the propagation of signals through the air. However, when encountering complex buildings (such as supermarkets, commercial centers, hospitals, airports, etc.), signal transmission is easily subjected to interference from plenty of uncertain factors. Weak reception of signals, lack of line of sight between users and satellite, radio multi-path effects, as well as dispersal and fading in indoor environments all contribute to the poor indoor performance of GPS. As a result, GPS is not suitable for indoor positioning. Furthermore, thermal techniques on Wi-Fi [2], Bluetooth [3], RFID [4], and magnetic fields [5] are capable of realizing superior positioning effects in indoor environments, promoting the application of a wide number of indoor positioning systems (IPS) [6]. Wi-Fi-based IPS, in particular, has become one of the most practicable approaches because of the widespread availability and ease of deployment of Wi-Fi infrastructure [7].
The IPS based on Wi-Fi can generally be divided into two categories [8]: trilateral measurement algorithms and fingerprint-based location algorithms. The trilateral measurement algorithm calculates the distance between the target and the access point (AP) through time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA), and radio wave propagation model (RPM). Such schemes are strongly dependent on complex transmitters and receivers [9], making them difficult to implement on every Wi-Fi device. In contrast, a fingerprint-based location method is a classic scene analysis algorithm with broad applicability that does not require precise access point position or additional investment in infrastructure and line-of-sight measurement.
A positioning system based on fingerprints is often composed of two stages [10]: the offline training stage and the online positioning stage. In the training stage, some points with known locations are first selected as training points, and then RSSI data are collected from APs detected at each training point. Therefore, the fingerprint of each training point is made up of these RSSI vectors. In general, we always train the RSSI vectors, and the trained vectors are utilized as RP fingerprints. All fingerprints are stored in a database for online localization. In the online stage, RSSI vectors are collected at the corresponding location and transferred to the back-end server. Subsequently, the back-end server matches the received online RSSI vectors with the stored fingerprints to obtain a set of RPs with fingerprints close to the online received RSSI vectors, thereby estimating the target. The fingerprint database is the key to the RSSI-based method. However, in complex indoor scenes, various noise characteristics such as interference, reflection, and refraction can affect signal transmission, resulting in spike noise during RSSI signal acquisition. This actually cannot fully ensure the accuracy and authenticity of data collection in the fingerprint database.
By reason of the foregoing, to improve the accuracy of the fingerprint database and online RSSI vectors with noise reduction, we use JRPCA to train offline fingerprints and online RSSI vectors. The online matching stage often requires traversing the entire fingerprint database, which leads to resource consumption, as well as matching some more distant reference points, increasing the localization error. An efficient clustering strategy is proposed, which divides offline fingerprint data into multiple clusters, and further uses the localization algorithm to find the cluster where the target is located. Finally, the final location is estimated for the user within the potential clusters.
This article is an extension of our conference paper accepted by ICDH2022. In our previous work, the HCS-based clustering method was used to solve the problem of search overhead; however, it did not consider the problem of the existence of boundary point localization in real scenarios. In addition, we also discuss and analyze the proposed method in more detail in this paper and add more test experiments based on real scenarios, aiming to indicate the superiority of the proposed method.
The main contributions of this paper can be summarized as follows:
  • The JRPCA model is proposed, which enhances the low-rankness of the fingerprint database using the prior knowledge of singular values to make the data more accurate and thus improve the localization accuracy;
  • An effective fingerprint clustering strategy is proposed to reduce the search overhead and radio map size by integrating similar RSSI patterns. A reasonable subset of RPs is obtained adaptively on the basis of predefined RPs to further increase the differences between similar fingerprints.
The rest of this article is organized as follows. We review the related work in Section 2. Section 3 gives an overview of the system and describes the associated processes. Section 4 details the algorithms used in this paper, the JRPCA model optimization algorithm, the one-way hierarchical clustering algorithm, and the localization algorithm. The experiments and the corresponding experimental results are introduced in Section 5. Finally, Section 6 summarizes the whole paper.

3. System Framework

We first establish some fundamental symbols to clearly depict the system framework. In the positioning area, suppose there are n APs and N RPs. The APs’ location, transmission power, manufacturers, and owners are not needed to be known. The location of RP i is l i = x i , y i , and suppose that all APs can be detected at RP i . We measure the RSSI signal multiple times at each RP, and the average of the RSSI signals collected at each reference point is taken as the fingerprint of that point. Suppose that the fingerprint of RP i is f i = r s s i i 1 , r s s i i 2 , , r s s i i j , , r s s i i n , where r s s i i j is the RSSI collected from AP j . All RPs’ locations form the location dataset L N = l 1 , l 2 , , l N T , and all RPs’ fingerprints denote F N = f 1 T , f 2 T , , f N T T . The offline fingerprints database consists of reference point location and its corresponding RSSI value, where the structure is L N , F N .
F N = f 1 f 2 f N = r s s i 1 1 , r s s i 1 2 r s s i 1 n r s s i 2 1 , r s s i 2 2 r s s i 2 n r s s i N 1 , r s s i N 2 r s s i N n N × n .
The proposed Wi-Fi fingerprint localization system adopts a robust noise suppression technique and an efficient clustering method for location estimation in two stages. The framework of the localization system is shown in Figure 1. In the offline phase, the sparse peak noise of the fingerprint database is reduced by the JRPCA model after the fingerprints are collected. The denoised fingerprints are then clustered to reduce the subsequent search overhead by integrating similar RSSI patterns. The offline fingerprint database is constructed by denoising and clustering processes for online matching. In the online phase, online fingerprints are constructed by the same denoising process. After processing the offline fingerprint database and online fingerprints, suitable clusters are matched based on the strongest signal received from the AP by the online fingerprints. Finally, the WKNN algorithm is used to estimate the position of the target point in the selected clusters. The detailed design and working methods of the noise suppression technique, clustering strategy, and localization technique of the fingerprint system proposed in this paper are given in Section 4.
Figure 1. Framework of proposed fingerprint positioning system.

4. Positioning Algorithm

4.1. JRPCA in Offline and Online Phase

In this section, we first introduce the limitations of the RPCA [22] model for training fingerprints. Then, the JRPCA is proposed and the details of solving the JRPCA model by ALM in the offline phase are shown.

4.1.1. RPCA Noise Reduction Optimization Model

Let F N be the offline fingerprint database constructed by n APs and N RPs, F N be the reconstructed database, and E N be the noise. The RPCA model can be represented as
F N = F N + E N .
The problem is to reduce the peak noise E N and reconstruct robust F N :
min rank F N + γ E N 0 s . t . F N + E N = F N ,
where . 0 is applied to force E N to be sparse, and the parameter γ ( γ > 0 ) controls the tradeoff between rank F N and E N 0 .
Due to the non-convex and non-smooth properties of rank and . 0 in optimization, in general, the problem is converted into solving a convex optimization problem. Then (3) is transformed into
min F N * + E N 1 s . t . F N + E N = F N ,
where F N * + E N 1 is a convex hull of rank F N + γ E N 0 over the set F N , E N . Therefore, (4) is convex with a unique minimum value.

4.1.2. Fingerprint Database Reconstruction Based on JRPCA

Here, we propose JRPCA to improve the fingerprint noise and make the data more accurate, thus improving the positioning accuracy.
The nuclear norm . * assigns equal and constant threshold values to all singular values of the matrix, ignoring the different data characteristics represented by different singular values in the matrix. Thus, the concept of weighted is introduced in the nuclear norm optimization model. Relative to the L 1 -norm, the L 2 , 1 -norm can produce row (or column) based sparsity, thus improving the model by using the L 2 , 1 -norm. In this way, the robustness of the model has been enhanced while ensuring no excessive data loss. On this basis, a JRPCA model based on the weighted nuclear norm and L 2 , 1 -norm is constructed to recover the low-rank matrix of the original data. The model is shown as follows:
min F N , E N F N W , + λ E N 2 , 1 s . t . F N = F N + E N ,
where λ refers to the weight of noise and is a known quantity.
The ALM method is used to solve the JRPCA model in this paper. The solution procedure and the block diagram of the algorithm are described in detail in the next subsection.

4.1.3. Model Solution

In this section, the ALM method is adopted to solve the proposed model, which solves the constrained optimization by transforming it into an unconstrained optimization problem. To solve the proposed optimization problem by using ALM, we introduce the preliminary definitions and theorems as follows:
  • Shrinkage Operator: For any τ > 0 and X R m × n , the shrinkage operator S τ ( X ) is defined as
    S τ X i j = X i j τ x > τ X i j + τ x < τ 0 otherwise .
  • Soft-thresholding Operator: For any τ > 0 and X R m × n with a singular value decomposition X = U Σ V T , the soft-thresholding operator is
    D τ ( X ) = U S τ ( Σ ) V T .
  • For any τ > 0 and X R m × n , the shrinkage operator is the optimal solution of the function as
    S τ ( X ) = arg min X 1 2 X Y F 2 + τ X 1 .
  • For any τ > 0 and X R m × n , the soft-thresholding operator is the optimal solution of the function as
    D τ ( X ) = arg min X 1 2 X Y F 2 + τ X * .
To solve the optimization problem, we first convert the constrained optimization problem into an unconstrained optimization problem by introducing a Lagrangian multiplier Y and a quadratic penalty term and then formulating the augmented Lagrange function as follows:
L F N , E N , Y , μ = λ E N 2 , 1 + F N W , + < Y , F N F N E N > + μ 2 F N F N E N 2 2 ,
where Y is a Lagrange multiplier, μ is a positive scalar, and < Y , F N F N E N > is an iterative procedure.
The alternating direction method is used to iterate (10), update the matrices F N and E N , and loop the algorithm to the termination criterion. The updating process is shown as follows.
1.
Fix E N , Y, μ , that is, when E N = E k , Y = Y k , μ = μ k , iteratively update F N .
F N * = arg min F N F N W , + μ 2 F N E N F N + 1 μ Y 2 2 = arg min F N 1 2 F N F N E N + 1 μ Y 2 2 + 1 μ F N W , .
2.
Fix F N , Y, μ , when F N = F N k , Y = Y k , μ = μ k , the matrix E N in (10) is iteratively updated to obtain:
E N * = arg min E N λ μ E N 2 , 1 + 1 2 F N E N F N + 1 μ Y 2 2 = arg min E N 1 2 E N F N E N + 1 μ Y 2 2 + λ μ E N 2 , 1 .
3.
When the matrices F N and E N converge, i.e., F N = F N k and E N = E k , the matrices Y and μ in Equation (10) are updated iteratively:
min Y μ 2 F N F N E N + Y μ 2 2 .
The iterative update of Y is obtained from Equation (13) as:
Y * = Y + μ F N F N E N ,
where the iterative update of the positive penalty coefficient μ is:
μ = min ρ μ , μ max .
4.
The selection of the weight vector W( W = w 1 , w 2 , , w n w i 0 ) is the key to the solution. The unknown weight vector W can be obtained by updating the matrix F N . In the matrix, the information of the data represented by the large singular value is more reflective of the important components of the data compared to the small singular value. Therefore, the contraction range of the small singular values can be increased and the contraction range of the large singular values can be decreased to retain the important information in the data. Thus, the singular value σ i F N ( i = 1 , , n ) is inversely proportional to the weight vector W:
w i = c n σ i F N + τ ,
where c > 0 is a constant, and τ > 0 ensures that the weights can still be calculated when σ i F N is 0.
Based on the above discussion, the complete JRPCA algorithm (Algorithm 1) flow is presented here, as shown below:    
Algorithm 1: JRPCA Algorithm
Intput: data matrix F N R N × n , parameter λ , τ .
Initialize: F N 0 = 0 , E N 0 = 0 , Y 0 = 0 , μ 0 > 0
While F N F N E N 2 > μ 1 F N 2 do
   Calculate the weight
       W = w 1 , w 2 , , w n w i 0
            w i = c n σ i F N + τ
   when solve
       F N k + 1 = arg min F N L F N , E k , Y k , μ k
   use
       ( U , S , V ) = SVD F N E N k + μ k 1 Y k
       F N k + 1 = U S w / μ ( S ) V T
   when solve
       E N k + 1 = arg min E N L F N 1 k + 1 , E N , Y k , μ k
   use
       E N k + 1 = S λ / μ F N F N + μ 1 Y
   Update  Y k + 1 = Y k + μ k F N F N k + 1 E N k + 1
   Update  μ k to μ k + 1
    k k + 1
F N F N k , E N E N k
Output: F N , E N

4.2. Proposed Clustering Strategy

The fingerprint clustering technique proposed in this paper is divided into three main steps. The radio map is first separated into several distinct clusters by the one-way hierarchical clustering strategy’s basic operating concept (one-way HCS). The norm is that only the strongest RSSI from a particular AP is sent to the collection of training locations that make up a cluster. Although the RSSI samples measured by a specific AP at a location fluctuate over time, the RSSI values collected by the same AP are spatially correlated. Therefore, the number of clusters created is equal to the number of APs deployed in the location area. Second, the Euclidean distance between any pair of RPs belonging to the same cluster is calculated, and then subsets are generated by fusing RPs whose distance is within a certain range (called threshold). Finally, a representative RSSI vector for each subset in each cluster is calculated. The RPs with similar RSSI in the same subset are fused on average to obtain a new RP representing the subset. Combining our proposed noise reduction algorithm with this clustering strategy, a two-phase fingerprint matching algorithm of JRPCA based on clustering is proposed to further increase the difference between similar RPs and thus improve the localization accuracy.
The whole working process when applying the clustering technique of this paper to the localization region of the 4 APs is shown in Figure 2. Either only one RP or multiple RPs are included in each generated subset. The introduced new parameter threshold (denoted as δ ) sets the upper limit of the Euclidean distance between each pair of RSSI-similar reference points that can be classified as a subset of the same cluster. After fusing the RPs of each subset, the fingerprint database construction is completed. The fingerprint of each subset comprises a representative RSSI vector of that subset and the location coordinates of all points in the subset. The RSSI of all reference points of the subset (such as kth subset in ith cluster) and their position coordinates are averaged and fused separately to obtain the representative RSSI vector. The estimation results of the representative RSSI vector ( r v ) and location coordinates ( x v , y v ) of the subsets are shown below:
r v i k = 1 b j = 1 b r j ,
where b is the number of reference points within kth subset in the cluster C i , and the set of RSSI computed at those b reference points are denoted as r 1 , r 2 , , r b .
x v i k = 1 b j = 1 b x j , y v i k = 1 b j = 1 b y j ,
where x 1 , y 1 , x 2 , y 2 , , x b , y b denotes the positional coordinates of b training locations within kth subset in the cluster C i .
Figure 2. The working process of proposed efficient clustering strategy.
As shown in Figure 2, after applying one-way HCS clustering, an important issue is how to choose the initial training location to start the data fusion process within each cluster. In order to divide each cluster into the optimal number of subsets, the strategy we propose uses the RP with the largest RSSI value obtained by AP as the starting point of the data fusion process within the cluster. Formally, for the ith cluster ( C i ), the RP with the largest RSSI obtained from APi (strongest AP for cluster C i ) is used as the initial data point, and then the fusion process starts. Compared with other clustering techniques, this clustering technology greatly reduces the storage requirements of radio maps and the search overhead in the localization phase, and is known as an efficient clustering technique.
Figure 3 details the process of the designed clustering method. In the offline phase, all the pre-defined RPs are divided into clusters, and the cluster with the smallest distance is iteratively integrated into a new cluster. Figure 4 shows the heat map of hierarchical clustering, and the color shades in the figure represent the corresponding RSSI values.
Figure 3. Hierarchical clustering process.
Figure 4. Positioning trajectory diagram of different methods.

4.3. Online Target Positioning

In this phase, the user terminal receives RSSI information X at the real-time location, and the proposed noise suppression technique is applied to X to obtain the noise-reduced real-time RSSI vector X . Next, the mean value processing is performed to obtain the RSSI information X of the point to be located. The trained RSSI is then compared to determine the AP with the strongest signal strength, and the potential clusters of X are identified based on this AP. After mapping a cluster, we filter out the RP of other clusters and use only the RP in the potential cluster region for localization, which greatly reduces the computational effort.
However, in the real scenario, the problem of boundary point localization often arises. At this time, we can no longer directly localize a potential cluster by simply clustering it out, and we must also consider whether other clusters have a greater effect on the target point. Therefore, a boundary point judgment is required.
If the target point X is a boundary point, X is divided into multiple neighboring potential clusters and matched with all fingerprint data in these clusters. If the target point X is not a boundary point, then X is divided into one potential cluster and matched with all fingerprint data in that cluster only. Finally, the location of the user is further estimated using WKNN based on the location of the known reference points.
WKNN is a popular algorithm improved from the KNN technique [11] with simple computation and high estimation accuracy. The estimation of the WKNN algorithm is based on the Euclidean distance:
d j = r j r ^ 2 j = 1 , , m ,
where · 2 is the 2 -norm operator, d j is the Euclidean distance, and r j is the jth fingerprint of the potential clusters.
In the WKNN algorithm, the distance values are given weight:
w j = 1 d j + δ ,
where δ is a small positive number introduced in order to control the denominator as not being zero, and j is the index of the reference point that obeys 1 j m .
Then k ( k > 1 ) reference points with the shortest Euclidean distance are selected as candidate locations in the potential clusters, and the user’s location is obtained by averaging the k candidate locations, as follows:
( x ^ , y ^ ) = j = 1 k w j x j , y j j = 1 k w j .

5. Experiments and Discussion

5.1. Experimental Scenarios

We have conducted extensive experiments in laboratories and corridors. The testing area is shown in Figure 5. After analyzing the characteristics of the indoor positioning space, the points are arranged with floor tiles at intervals and collected at each point. The Wi-Fi signal of stable and visible APs will improve the accuracy of fingerprint location results with the increase in the number of selected APs, but it is not infinite. Too many APs will cause mutual interference. Therefore, this paper selects six APs to ensure that the fingerprint reference point in the whole location area can receive Wi-Fi signals to the greatest extent. Then 30 points are randomly selected in the experimental area several times as test points to collect test data. The acquisition time of each reference point and test point is 5 min, and the refresh rate of the sampling equipment is 5 s.
Figure 5. Experimental areas.

5.2. Analysis of Performance

According to the experimental environment established above, the performance of the algorithm is analyzed.
In this experiment, the weighted K-nearest neighbor algorithm (WKNN) is selected as the positioning algorithm, and the K values in the WKNN algorithm are 3∼5 for experiments, and the positioning errors of these several K values are analyzed. Figure 6 shows that when K = 4 , most of the positioning error curves of the WKNN algorithm are below the positioning errors of other values. In other words, in the WKNN algorithm, the positioning effect is better when the K value is 4. Therefore, the value of K will be 4 to carry out the subsequent experiments.
Figure 6. Positioning errors of WKNN algorithm under different K values.
In our experiments, we compare our method with three advanced schemes: Tilejunction (Tilej.), Radar, and Horus:
  • Tilejunction [10]: It maps the target RSSI of each AP to a convex hull termed signal “tile” where the target is likely within. It also partitions the site into multiple clusters to substantially reduce the search space in the LP optimization.
  • Radar [11]: It computes the Euclidean distance between the fingerprint and the target RSSI vector, and finds the k-nearest neighbors of the smallest distance to estimate the target location.
  • Horus [12]: It first calculates the probability distribution of the RSSI value at each RP. Given a target RSSI vector, Horus computes the overall probability of the vector at each RP and finds the one with the maximum likelihood as the target location.
Figure 7 shows the mean localization error versus the number of deployed AP. When the number of AP increases, the localization error decreases because more APs help localize the target to a smaller area. The diminishing returns of adding additional APs are because the signal (or fingerprint) differentiation decreases when we add more APs to a fixed area. Our method achieves the highest accuracy due to the joint consideration of measurement noise and the use of efficient hierarchical clustering. The results show that our method essentially achieves the lowest error compared to other schemes because of the combination of measurement noise considerations and the use of efficient hierarchical clustering.
Figure 7. Mean error versus the number of AP used.
The fingerprint database is constructed based on original data; PCA algorithm, RPCA algorithm, and JRPCA algorithm are, respectively, used for localization experiments; and the positioning errors of the four fingerprint databases are compared. Figure 8 shows the cumulative distribution function (CDF) of positioning errors in the fingerprint database constructed based on different noise reduction algorithms. The experimental results show that the fingerprint database constructed based on the noise reduction algorithm in this paper is superior to those constructed by the other three algorithms in terms of performance, with 64.2 % of the points having a localization error of less than 1 m and 96.8 % of the points having a localization error of no more than 2 m.
Figure 8. CDF of positioning error.
Figure 9 shows the trajectory of the localization results in a 10m×10m hall with the application of the four methods of this paper, Tilej, Radar, and Horus. The blue dots in the figure indicate the actual positions, and the asterisks indicate the estimated positions. During the experiments, initially, the accuracy of these methods was excellent at the localization points, but whenever steering was performed, the error increased, so that the localization accuracy of our method at the steering points was better than the other three methods. As shown in Table 1, among the position estimation of 25 points in the region, the maximum position estimation error of our method is 0.72 m, and the maximum position estimation errors of the other three methods are 1.13 m, 1.34 m, and 1.83 m, respectively. The experimental results show that the performance of the localization technique proposed in this paper is better than the other techniques considered in this paper.
Figure 9. Positioning trajectory diagram of different methods: (a) Horus; (b) Radar; (c) Tilej; (d) ours.
Table 1. Localization error of the four methods.
The distribution of localization errors for the four fingerprint techniques based on experiments with real indoor scenes is shown in Figure 10. Due to the complex indoor environment and large measurement noise, the accuracy of Radar is weakened by the scattered nearest neighbors. Horus assumes a certain distribution of signal level at each RP and therefore does not represent the true signal distribution with limited sampling. Therefore, the fingerprint data they collect in complex indoor environments such as lobbies and corridors are inaccurate, resulting in more scattered matching reference points. In contrast, this paper considers the influence of signal noise and adopts a robust noise suppression technique, which makes the RSSI data more accurate and effectively reduces the error in real indoor scenarios.
Figure 10. Cumulative distribution of localization errors.

6. Conclusions and Future Work

Due to the existence of signal measurement noise, the indoor localization method based on fingerprints often results in matching a set of scattered nearest neighbor RPs. Hence, the estimation results are often unsatisfactory. To alleviate this problem and improve robustness, a two-stage fingerprint localization method of JRPCA based on clustering is proposed in this paper. The method estimates target points only in potential clusters, considering the influence of measurement noise during target localization. JRPCA is used to train offline fingerprints and online RSSI vectors. In addition, considering the storage requirement and search cost of radio maps in fingerprint-based indoor positioning systems, a clustering method based on the one-way hierarchy is proposed to obtain reasonable RP clusters adaptively in accordance with predefined RPs. Experimental results demonstrate that the proposed method outperforms other algorithms with respect to robustness and accuracy.
As is well known, WiFi-based indoor positioning technology is easily influenced by different smartphones. This experiment is carried out using only one kind of device without consideration of the influences of different types of devices and receiving terminals on RSSI signals. Therefore, the selection of smart devices is also a significant research topic for indoor positioning. Moreover, the target to be tested is stationary during the experiment, and the localization of the moving target in the WLAN environment is to be solved in the next step. Consequently, future research will further concentrate on exploring the above factors.

Author Contributions

Conceptualization, M.Z., Y.X., L.Z., and J.X.; methodology, M.Z. and L.Z.; software, M.Z.; validation, L.Z., M.Z., Y.X., and J.X.; formal analysis, M.Z., L.Z., and J.X.; investigation, M.Z. and Y.X.; resources, L.Z.; data curation, L.Z., M.Z., and Y.X.; writing—original draft preparation, M.Z. and L.Z.; writing—review and editing, M.Z., L.Z., Y.X., and J.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Key Research and Development Program (2018YFB2100301); National Natural Science Foundation of China (61972131).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kaplan, E.D.; Hegarty, C. Understanding GPS/GNSS: Principles and Applications; Artech House: Norwood, MA, USA, 2017. [Google Scholar]
  2. Huang, B.; Xu, Z.; Jia, B.; Mao, G. An online radio map update scheme for wifi fingerprint-based localization. IEEE Internet Things J. 2019, 6, 6909–6918. [Google Scholar] [CrossRef]
  3. Yu, N.; Zhan, X.; Zhao, S.; Wu, Y.; Feng, R. A precise dead reckoning algorithm based on bluetooth and multiple sensors. IEEE Internet Things J. 2017, 5, 336–351. [Google Scholar] [CrossRef]
  4. Ma, Y.; Tian, C.; Jiang, Y. A multitag cooperative localization algorithm based on weighted multidimensional scaling for passive uhf rfid. IEEE Internet Things J. 2019, 6, 6548–6555. [Google Scholar] [CrossRef]
  5. Wang, X.; Qian, Z.; Wang, X.; Huang, L. Robust localization for cognitive iot via the mobile anchor node based on the diameter-varying spiral line. IEEE Access 2019, 7, 28487–28497. [Google Scholar] [CrossRef]
  6. Farahsari, P.S.; Farahzadi, A.; Rezazadeh, J.; Bagheri, A. A survey on indoor positioning systems for iot-based applications. IEEE Internet Things J. 2022, 9, 7680–7699. [Google Scholar] [CrossRef]
  7. Chen, L.; Yang, K.; Wang, X. Robust cooperative wi-fi fingerprint-based indoor localization. IEEE Internet Things J. 2016, 3, 1406–1417. [Google Scholar] [CrossRef]
  8. He, S.; Chan, S.H.G. Wi-fi fingerprint-based indoor positioning: Recent advances and comparisons. IEEE Commun. Surv. Tutor. 2015, 18, 466–490. [Google Scholar] [CrossRef]
  9. Shao, H.J.; Zhang, X.P.; Wang, Z. Efficient closed-form algorithms for aoa based self-localization of sensor nodes using auxiliary variables. IEEE Trans. Signal Process. 2014, 62, 2580–2594. [Google Scholar] [CrossRef]
  10. He, S.; Chan, S.H.G. Tilejunction: Mitigating signal noise for fingerprint-based indoor localization. IEEE Trans. Mob. Comput. 2015, 15, 1554–1568. [Google Scholar] [CrossRef]
  11. Bahl, P.; Padmanabhan, V.N. Radar: An in-building RF-based user location and tracking system. In Proceedings of the IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No. 00CH37064), Tel Aviv, Israel, 26–30 March 2000; Volume 2, pp. 775–784. [Google Scholar]
  12. Youssef, M.; Agrawala, A. The horus location determination system. Wirel. Netw. 2008, 14, 57–374. [Google Scholar] [CrossRef]
  13. Chai, X.; Yang, Q. Reducing the calibration effort for probabilistic indoor location estimation. IEEE Trans. Mob. Comput. 2007, 6, 649–662. [Google Scholar] [CrossRef]
  14. Youssef, M.A.; Agrawala, A.; Shankar, A.U. Wlan location determination via clustering and probability distributions. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003), Fort Worth, TX, USA, 26 March 2003; pp. 143–150. [Google Scholar]
  15. Frey, B.J.; Dueck, D. Clustering by passing messages between data points. Science 2007, 315, 972–976. [Google Scholar] [CrossRef] [PubMed]
  16. Sadhukhan, P. Performance analysis of clustering-based fingerprinting localization systems. Wirel. Netw. 2019, 25, 2497–2510. [Google Scholar] [CrossRef]
  17. Kuo, S.P.; Wu, B.J.; Peng, W.C.; Tseng, Y.C. Cluster-enhanced techniques for pattern-matching localization systems. In Proceedings of the 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, Italy, 8–11 October 2007; pp. 1–9. [Google Scholar]
  18. Fabbri, R.; Costa, L.D.F.; Torelli, J.C.; Bruno, O.M. 2D Euclidean distance transform algorithms: A comparative survey. ACM Comput. Surv.(CSUR) 2008, 40, 1–44. [Google Scholar] [CrossRef]
  19. Xue, W.; Yu, K.; Hua, X.; Li, Q.; Qiu, W.; Zhou, B. APs’ virtual positions-based reference point clustering and physical distance-based weighting for indoor Wi-Fi positioning. IEEE Internet Things J. 2018, 5, 3031–3042. [Google Scholar] [CrossRef]
  20. Saha, A.; Sadhukhan, P. A novel clustering strategy for fingerprinting-based localization system to reduce the searching time. In Proceedings of the 2015 IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS), Kolkata, India, 9–11 July 2015; pp. 538–543. [Google Scholar]
  21. Wen, R.P.; Li, S.Z.; Zhou, F. Toeplitz matrix completion via smoothing augmented lagrange multiplier algorithm. Appl. Math. Comput. 2019, 355, 299–310. [Google Scholar] [CrossRef]
  22. Vaswani, N.; Bouwmans, T.; Javed, S.; Narayanamurthy, P. Robust subspace learning: Robust PCA, robust subspace tracking, and robust subspace recovery. IEEE Signal Process. Mag. 2018, 35, 32–55. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.