Next Article in Journal
A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects
Next Article in Special Issue
Hyperbolic Positioning with Antenna Arrays and Multi-Channel Pseudolite for Indoor Localization
Previous Article in Journal
The Applications of Decision-Level Data Fusion Techniques in the Field of Multiuser Detection for DS-UWB Systems
Previous Article in Special Issue
Integrated WiFi/PDR/Smartphone Using an Unscented Kalman Filter Algorithm for 3D Indoor Localization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength

1
Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
Ericsson, San Jose, CA 95134, USA
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(10), 24791-24817; https://doi.org/10.3390/s151024791
Submission received: 29 June 2015 / Revised: 9 September 2015 / Accepted: 21 September 2015 / Published: 25 September 2015
(This article belongs to the Special Issue Sensors for Indoor Mapping and Navigation)

Abstract

:
Due to the wide deployment of wireless local area networks (WLAN), received signal strength (RSS)-based indoor WLAN localization has attracted considerable attention in both academia and industry. In this paper, we propose a novel page rank-based indoor mapping and localization (PRIMAL) by using the gene-sequenced unlabeled WLAN RSS for simultaneous localization and mapping (SLAM). Specifically, first of all, based on the observation of the motion patterns of the people in the target environment, we use the Allen logic to construct the mobility graph to characterize the connectivity among different areas of interest. Second, the concept of gene sequencing is utilized to assemble the sporadically-collected RSS sequences into a signal graph based on the transition relations among different RSS sequences. Third, we apply the graph drawing approach to exhibit both the mobility graph and signal graph in a more readable manner. Finally, the page rank (PR) algorithm is proposed to construct the mapping from the signal graph into the mobility graph. The experimental results show that the proposed approach achieves satisfactory localization accuracy and meanwhile avoids the intensive time and labor cost involved in the conventional location fingerprinting-based indoor WLAN localization.

1. Introduction

Nowadays, people spend more than 80% of their time in the indoor environment, where the signal from the Global Positioning System (GPS) is generally difficult to receive. In this circumstance, many indoor localization systems are proposed to guarantee the performance of a variety of location-based services (LBSs), like the guidance of shopping routes, security and healthcare for the elderly, and asset management in warehouses and modern buildings. At the same time, various kinds of techniques have been developed for indoor localization in the recent decade, like Bluetooth [1], ultrasonic wave [2], radio-frequency ID (RFID) [3], ultra-wideband (UWB) [4], visible light communications (VLC) [5,6,7] and wireless local area networks (WLAN) [8,9,10,11]. Among them, the received signal strength (RSS)-based WLAN localization technique is preferred due to the rapid development of WLAN infrastructures and mobile devices, as well as the wide deployment of WLAN, which is selected as one of the primary high-speed access networks in the indoor environment. To the best of our knowledge, trilateration and location fingerprinting are recognized as two of the most representative approaches used in RSS-based indoor WLAN localization. The performance of the trilateration approach suffers from the inaccurate estimation of the distance from each access point (AP) to the receiver [12,13]. The first reason is that the propagation models used for distance estimation cannot always be effective due to the irregular variation of RSS caused by the signal reflection, scattering and diffraction. The second reason is that many indoor areas where the APs are actually located are not reachable. In this case, both the AP and target locations should be estimated simultaneously, and thereby, the precision of distance estimation generally drops dramatically. On the contrary, the location fingerprinting approach is preferred [14,15,16,17]. This approach consists of two phases. In the offline phase, the RSSs at a batch of pre-calibrated reference points (RPs) with known physical coordinates are collected and then stored as the location fingerprints into the radio map. In the online phase, the newly-collected RSSs are matched against the radio map to realize the location estimation. However, the time and labor cost involved in the radio map construction increases rapidly as the area increases.
To solve the cost problem and to guarantee the accuracy of RSS-based indoor WLAN localization, we propose a novel page rank-based indoor mapping and localization (PRIMAL) by using the gene-sequenced unlabeled WLAN RSS for simultaneous localization and mapping (SLAM). In concrete terms, we first carry out the observation of the motion patterns of the people in the target environment to construct the mobility graph by using the Allen logic. Second, we rely on off-the-shelf smartphones to collect the WLAN RSSs, which are not labeled with physical coordinates. Third, the concept of gene sequencing is adopted to determine the correlation relations among different RSS sequences, so as to assemble the RSS sequences into a signal graph. Fourth, we utilize the graph drawing approach to exhibit the graphs in a more readable manner. Finally, by using the proposed page rank (PR) algorithm, the mapping from the signal graph into the mobility graph is constructed. After the previous steps, the receiver can be located in the area mapped from the node that is matched by the newly-collected RSSs in the signal space.
The rest of this paper is organized as follows. In Section 2, we show some related work on the existing SLAM approaches in the indoor WLAN environment. The steps of the proposed PRIMAL are discussed in detail in Section 3. The extensive experimental results are provided in Section 4. Finally, Section 5 concludes the paper and presents some future directions.

2. Related Work

In response to the cost problem faced by location fingerprinting in the conventional RSS-based indoor WLAN localization [18,19,20,21], many existing works suggested using motion sensing as a candidate to perform the localization. The authors in [22] collected the WLAN RSSs to construct a logic graph, which can be used to characterize the physical layout of the target environment, and meanwhile rely on an accelerator to explore the reachability among different physical areas, as well as to detect the status of RSSs. After that, based on the constructed mapping relationship between the logic graph and ground-truth graph, the target location is estimated in a specific area for each location query. Using a smartphone, the authors in [23] invented a pedestrian tracking system, which can automatically construct both the floor plan of the anonymous target environment and the corresponding radio map. An indoor tracking system based on the labeled topological map constructed by SLAM is addressed in [24]. See [25]: a foot-mounted inertial measurement unit (IMU) is used to perform proprioceptive motion sensing, and meanwhile, an action recognition system is applied to observe the landmarks of location-related actions. The authors in [26] proposed a pedestrian tracking system by integrating the odometry data collected by the foot-mounted IMU and WLAN RSSs. The localization system developed in [27] is based on the fusion of the image data and data from the IMU in a smartphone. The GraphSLAM approach proposed in [28] is appropriate for a large-scale environment, since there is no signature uniqueness assumption in the GraphSLAM. The authors in [29] constructed a multi-modal signal map from the RSSs collected by all of the available sensors. The work in [30] depended on the IMU sensors to label the RSSs as the pedestrian walks in the same direction. A new concept of the Wi-Fi fingerprint (FP), which considers the order relation among the RSS rather than the absolute values of RSSs, is addressed in [31]. The authors in [32] present a new localization approach, in which the training data are obtained by means of finite difference time domain (FDTD) simulations of electromagnetic propagation.
To deal with the computational complexity problem for localization, the authors in [33] use decision trees to minimize the complexity of the localization system. The authors in [34] rely on the joint clustering technique, which performs the clustering of locations to reduce the computational cost. A new low-complexity tracking scheme is proposed in [35], which is based on Fano’s sequential decoding algorithm. The authors in [36] propose the multiple filters (MFs)-based implementation approach, which achieves a significant reduction of the computational complexity. The authors in [37] compare the performance of the probabilistic Gaussian kernel fingerprint-based indoor positioning algorithm by using different types of smartphones. An energy-efficient WLAN-based indoor positioning algorithm, which factors out every part of the probabilistic fingerprint formulae, is proposed in [38].
Different from the existing work in the literature, we propose a novel indoor mapping and localization approach, namely the PRIMAL, which is independent of location fingerprinting and motion sensing. Furthermore, there is no requirement of extra infrastructure or devices compared to the conventional approaches. The four main contributions of this paper are summarized as follows. First of all, there is no requirement of location fingerprinting and motion sensing, which saves much time and labor cost. Second, based on people’s motion pattern observation, the mobility graph, which is constructed by using the Allen logic, can help greatly in investigating the motion behavior of the people in the target environment. Third, we apply the graph drawing approach to exhibit both the mobility and signal graphs in a more readable manner. Finally, by adopting the PAalgorithm, we conduct the indoor mapping and localization simultaneously. Table 1 summarizes the main symbols used in this paper.
Table 1. Symbol notation.
Table 1. Symbol notation.
SymbolsDescription
I z Time duration of the event z
a i The i-th RSS vector in sequence a
b j The j-th RSS vector in sequence b
H i , j Matching score between a i and b j
mLength of sequence a
nLength of sequence b
s ( a i , b j ) Similarity function of RSS pair a i and b j
W k Gap scoring function with depth k
RSS l The l-th RSS sequence
rss l i The i-th RSS vector in RSS l

3. System Description

3.1. Construction of the Mobility Graph

To obtain the connectivity among different areas of interest, we conduct the people’s motion pattern observation in the target environment. Figure 1 shows the layout of the six areas of interest, and Figure 2 illustrates the people’s 17 motion patterns during a working day. Each motion pattern consists of different events, which are separated by the break points (BPs).
Figure 1. Layout of the target area.
Figure 1. Layout of the target area.
Sensors 15 24791 g001
Figure 2. Motion patterns.
Figure 2. Motion patterns.
Sensors 15 24791 g002
In the Allen logic, the relations of events can be represented by 13 different logic operations, as described in Figure 3. On this basis, by using the Allen logic, we draw the event graphs corresponding to the people’s 17 different motion patterns in Figure 4. In each graph, we mark the longest path (or the path involving the largest number of hops) with a dashed line. On each longest path, the event nodes are connected by the edges with the “m” operation, while the last even node and movement node are connected by an edge with the “f” operation. The event nodes that are connected by the edges with the “m” operation indicate the adjacent events happening in chronological order, while the edge with the “f” operation connecting the final event node and movement node indicates that the last event corresponds to the movement state. Based on this, the event nodes on the longest path can be used to describe the connectivity among different areas of interest. For instance, in the first graph, based on the longest path that is associated with the movement 1 , we obtain a motion behavior between Lobby 1 and Lobby 2 and thereby construct a connection between these two lobbies. Hence, the mobility graph can be constructed by considering all of the motion behaviors of the people in the target environment, as shown in Figure 5.
Figure 3. The Allen logic for event expression.
Figure 3. The Allen logic for event expression.
Sensors 15 24791 g003
Figure 4. Event graphs.
Figure 4. Event graphs.
Sensors 15 24791 g004
Figure 5. Mobility graph.
Figure 5. Mobility graph.
Sensors 15 24791 g005

3.2. Construction of the Signal Graph

3.2.1. RSS Characteristics

A significant reason for using the WLAN RSSs to conduct the SLAM is due to the property that the WLAN RSSs collected in two different areas that are separated by a wall could vary greatly. Figure 6 shows an example of the variations of two WLAN RSS sequences as the signal goes through a wall. We take Sequence 1 (with *’s) as an example. The mean of the RSS before crossing the wall is about −72 dBm, whereas after crossing the wall, it decreases to −82 dBm. Hence, the variation of WLAN RSSs can help with characterizing the layout of the target environment.
Figure 6. Variation of WLAN RSSs.
Figure 6. Variation of WLAN RSSs.
Sensors 15 24791 g006

3.2.2. Gene Sequencing

Based on the people’s motion pattern observation during a working day, we obtain the frequencies of the area transitions between every two adjacent areas of interest in Figure 7. There are in total nine patterns of area transitions counted by the path separation, as shown in Figure 8.
Figure 7. Frequencies of area transitions.
Figure 7. Frequencies of area transitions.
Sensors 15 24791 g007
In the target environment, we collected 94 WLAN RSS sequences that obey the frequencies of area transitions shown in Figure 7. Figure 9 illustrates the format of RSS sequences where k is the number of APs, RSS i j l is the j-th RSS vector in the i-th RSS sequence from the l-th AP and m is the number of RSS vectors in each sequence. Table 2 shows the number of RSS sequences collected on each trace. Hence, the collected RSS sequences can not only reflect the connectivity among different areas of interests, but also depict the motion patterns of the people in the signal space. Therefore, by separating each RSS sequence into different segments of RSSs with high correlation, we can obtain the transitions of segments and consequently assemble the RSS sequences into a signal graph.
Figure 8. Path separation.
Figure 8. Path separation.
Sensors 15 24791 g008
Figure 9. Format of RSS sequences.
Figure 9. Format of RSS sequences.
Sensors 15 24791 g009
Table 2. Number of RSS sequences on each trace.
Table 2. Number of RSS sequences on each trace.
TracesNumber of Collected RSS Sequences
Lobby 2 → Lobby 110
Lobby 2 → Corridor 25
Corridor 2 → Lobby 17
Lobby 1 → Corridor 2 → Lobby 32
Corridor 3 → Corridor 29
Lobby 1 → Lobby 219
Corridor 2 → Corridor 34
Lobby 2 → Corridor 31
Lobby 1 → Corridor 2 → Corridor 18
Lobby 1 → Corridor 33
Corridor 2 → Lobby 22
Corridor 3 → Lobby 12
Lobby 2 → Corridor 2 → Corridor 15
Lobby 1 → Corridor 28
Corridor 1 → Corridor 2 → Lobby 13
Corridor 3 → Lobby 22
Corridor 1 → Corridor 2 → Lobby 24
In gene sequencing, given two sequences, a and b, a scoring matrix, H, is constructed to detect the segments of RSSs with high correlation, namely the correlation segments, between these two sequences. The elements in H are calculated by:
H ( i , 0 ) = 0 , 0 i m , H ( 0 , j ) = 0 , 0 j n H ( i , j ) = max 0 H ( i - 1 , j - 1 ) + s ( a i , b j ) max k 1 { H ( i - k , j ) + W k } max l 1 { H ( i , j - l ) + W l } 1 i m , 1 j n
where H ( i , j ) is the matching score between the i-th nucleotide in a, a i and the j-th nucleotide in b, b j . Using this concept, in our system, we view the WLAN RSS sequences as the gene sequences, i.e., a RSS l = { rss l 1 , rss l 2 , rss l m } and b RSS i = { rss i 1 , rss i 2 , rss i n } , and the RSS vectors as the nucleotides, i.e., a i rss l i and b j rss i j . Thus, the calculation of the matching score between the RSS vectors equals the one between the corresponding nucleotides. To detect the correlation segments, we require that the matching scores between the RSS vectors satisfy:
  • H ( i , j ) H ( i , j + 1 ) as a i = b j and a i b j + 1
  • H ( i , j ) H ( i + 1 , j + 1 ) as a i = b j and a i + 1 b j + 1
  • H ( i , j ) H ( i + 1 , j + 1 ) as a i = b j and a i + 1 = b j + 1
  • H ( i , j ) H ( i + 1 , j + 1 ) as a i b j and a i b j + 1
  • H ( i , j ) H ( i + 1 , j + 1 ) as a i b j and a i + 1 = b j + 1
These requirements indicate the characteristics as follows.
(i)
If the current RSS vector is matched with an RSS vector, but mismatched with the next one, the matching score of the current RSS pair is not lower than the one of the next pair;
(ii)
if the current RSS pair is matched, whereas the next RSS pair is mismatched, the matching score of the current RSS pair is not lower than the one of the next pair;
(iii)
if the current RSS pair is matched, while the next RSS pair is also matched, the matching score of the current RSS pair is not higher than the one of the next pair;
(iv)
if the current RSS vector is mismatched and still mismatched with the next one, the matching score of the current RSS pair is not lower than the one of the next pair;
(v)
if the current RSS pair is mismatched, whereas the next RSS pair is matched, the matching score of the current RSS pair is not higher than the one of the next pair.
To satisfy these requirements, we define the similarity function, s ( a i , b j ) , and gap scoring function, W k , in Equation (2). Based on this, the matching scores satisfy the previous requirements, as proven in the Appendix Section. For the collected 94 RSS sequences, we construct in total 4371 scoring matrices (see Supplementary Material). Figure 10 shows nine of them in which each pixel represents the matching score of an RSS pair, while the larger pixel values indicate the higher similarities between the RSS vectors.
s ( a i , b j ) = α > 0 , a i = b j β < 0 , a i b j W k = - ( α - β ) k
where α and β stand for the reward score and penalty score, respectively.
Figure 10. Scoring matrices.
Figure 10. Scoring matrices.
Sensors 15 24791 g010
To detect the correlation segments between two RSS sequences, we start from the highest matching score in the corresponding scoring matrix. The steps of this process are described as follows.
Step 1: Locate the highest score in H, notated as H ( i , j ) , and then store the location ( i , j ) into the set L;
Step 2: Set H ( i , j ) = max { H ( i - 1 , j ) , H ( i , j - 1 ) , H ( i - 1 , j - 1 ) } ;
Step 3: Repeat Steps 1 and 2 until we obtain H ( i , j ) = 0 . We notate L ( r ) ( 1 r g b ) as the r-th location in L, and g b is the number of locations stored in L;
Step 4: Set r = g b ;
Step 5: Examine the jump relation between the locations L ( r ) and L ( r - 1 ) . If there is a diagonal jump [39] from L ( r ) to L ( r - 1 ) , the vertical and horizontal coordinates of L ( r - 1 ) are selected to indicate the IDs of the RSS pair with high correlation;
Step 6: Set r = r - 1 ;
Step 7: Repeat Steps 5 and 6 until r decreases to two.
Figure 11 gives an example of the scoring matrices with respect to a pair of the same RSS sequences and a pair of RSS sequences collected in different areas, respectively. Obviously, based on the result of the diagonal jumps, which are marked with red rectangles in Figure 12, we detect the segments with high correlation. Hence, we can combine the RSS sequences into different clusters, while the RSSs in the same cluster are featured with high correlation.
Figure 11. (a) A pair of the same RSS sequences; (b) a pair of different RSS sequences. Scoring matrices with respect to the same and different RSS sequences.
Figure 11. (a) A pair of the same RSS sequences; (b) a pair of different RSS sequences. Scoring matrices with respect to the same and different RSS sequences.
Sensors 15 24791 g011
Figure 12. Result of diagonal jumps.
Figure 12. Result of diagonal jumps.
Sensors 15 24791 g012
Figure 13 shows the result of RSS sequence combination. There are in total 19 clusters. Based on the transition relations of different clusters, we can assemble the RSS sequences into a signal graph in which each node represents a cluster, while each edge represents the transition relation between two neighboring clusters. The signal graph finally constructed by using the gene sequencing is shown in Figure 14.
Figure 13. Result of RSS sequence combination.
Figure 13. Result of RSS sequence combination.
Sensors 15 24791 g013
Figure 14. Signal graph.
Figure 14. Signal graph.
Sensors 15 24791 g014

3.3. Graph Exhibition by Graph Drawing

In graph theory, during the visual exhibition of graphs, we can obtain many different layout structures with respect to a given graph, namely the isomorphic graphs. The readable, unique and clear graph exhibition can help greatly in exploring the relations between the graphs in the graph visualization aspect. To achieve this goal, we apply the graph drawing approach to guarantee the uniqueness of the layout structures of the mobility and signal graphs with the purpose of avoiding the confusion of the isomorphic graphs.
Specifically, give a undirected graph G = ( V , E ) , we denote V = { v 1 , v 2 , . . . , v n d } and E = { . . . , e i j , . . . } as the sets of vertices and edges. n d is the number of vertices, while e i j indicates that the vertices v i and v j ( i , j { 1 , 2 , . . . , n d } ) are connected by an edge. The steps of the process of graph drawing are described as follows.
Step 1: Construct the set of vertices, V s = { , v i , } ( i { 1 , 2 , , n d } ) , in which the vertices have the same smallest degrees. The degree of vertex v i , d i , is defined as the number of vertices connected with v i . If there are two vertices v i and v j in V s satisfying the relations that for any vertex v r ( r { 1 , 2 , , n d } ) in V - { v i , v j } , there is at least one path connecting v i and v j , i.e., v i e i k v k v r e r t v t v j , we denote v i and v j as v s and v t , respectively, and the set of all the other vertices, V s - { v i , v j } , as v s . Otherwise, we select another vertex with the smallest degree in V - V s , v t . Then, we denote v i and v t as v s and v t , respectively, and the set V s - { v i } as v s .
Step 2: After the vertices v s , v s and v t are obtained, we continue to construct a direct graph G from G. In concrete terms, for each vertex v i ( i { 1 , 2 , , n d } ) in V - { v s , v s , v t } , we construct the set of all direct paths as P A i = { ( v s e s y v y . . . e r i v i . . . v j e j t v t ) ( v s e s y v y . . . e r i v i . . . v j e j t v t ) . . . } = { P a 1 P a 2 . . . P a t } ( y , y , r , r , j , j { 1 , 2 , . . . , n d } ) starting from v s (or v s ) to v t and containing v i , where t is the number of paths in P A i and P a j ( j { 1 , 2 , . . . , t } ) is the j-th path in P A i . After that, the set of direct edges, E D , can be easily obtained from P A i . A direct edge e i j E D exists as there is a path P a j P A i satisfying e i j P a j .
Step 3: Label the vertices v i ( i { 1 , 2 , , n d } ) in G , notated as number( v i ), based on the criteria as follows. We set: (i) number( v s ) = 0 , number( v s ) = 0 and number( v j ) = number( v i ) + 1 for the vertices v i and v j on the direct edge e i j ; and (ii) number( v k ) = number( v i ) + 1 and number( v j ) = number( v k ) + 1 for { e i j , e i k , e k j } E D .
Step 4: Eliminate the edges on P a 1 , which starts from v s (or v s ) to v t and passes by the largest number of edges from G . We repeat this process until all of the edges have been eliminated from G or there is no remaining path starting from v s (or v s ) to v t . If there are remaining edges after the elimination process, we recognize each remaining edge as a distinct path. After that, we continue to detect all of the internal faces of G, { F h } ( h = 1 , 2 , . . . , η ) , where η is the number of internal faces. An internal face is defined as a closed region (or the region containing no edge) with the boundary consisting of the edges in the graph. The external face of G, F, has the boundary, C, containing all of the nodes in G, notated as C = ( e i j v j e j r . . . v s e s l . . . v t e t u . . . e x y v y e y i ) ( i , j , r , l , u , x , y { 1 , 2 , . . . , n d } ) . We divide F into two sub-regions, F s and F t , where F s and F t satisfy the relation F s F t = { v s , v t } .
Step 5: Construct a undirected graph U = ( V U , E U ) , where V U = { P a i } i = 1 λ { F h } h = 1 η { F s , F t } = { v U 1 , v U 2 , . . . , v U d } , E U = { e i j } { e l h } ( i , h { U λ + 1 , U λ + 2 , ..., U λ + η , U λ + η + 1 , U λ + η + 2 } , j , l { U 1 , U 2 , . . . , U λ } ), and λ is the number of detected paths in Step 4. We notate the sets of vertices involved in { P a i } i = 1 λ , { F h } h = 1 η and { F s , F t } as { v U 1 , v U 2 , . . . , v U λ } , { v U λ + 1 , v U λ + 2 , . . . , v U λ + η } and { v U λ + η + 1 , v U λ + η + 2 } , respectively. We regard P a i ( 1 i λ ) as a path vertex, v U j ( 1 j λ ) . Similarly, v U j ( λ + 1 j λ + η + 2 ) is regarded as a face vertex. The number of vertices in U equals d = λ + η + 2 . e i j determines whether there is an edge intersection between the boundaries of the faces of { F h } h = 1 η { F s , F t } and { P a i } i = 1 λ . For simplicity, we notate v U λ + η + 1 and v U λ + η + 2 as v U s and v U t .
Step 6: Denote U, v U s and v U t as G, v s and v t , respectively, and then, construct the direct graph U = ( V U , E U ) from U = ( V U , E U ) based on Step 2.
Step 7: Label the vertices in U based on the criteria as follows. We set: (i) number( v U s ) = - 0 . 5 and number( v j ) = number( v i ) + 0.5 for the vertices v U i and v U j ( i , j { 1 , 2 , . . . , d } ) on e i j ; and (ii) number( v k ) = number( v i ) + 0 . 5 and number( v j ) = number( v k ) + 0 . 5 for { e i j , e i k , e k j } E U .
Step 8: Determine the coordinates of the vertices and edges in G based on the criteria as follows. (i) For each vertex, v i ( 1 i n d ) , the Y coordinate is the assigned value of v i in G, while the range of X coordinates is from the minimum to maximum values assigned to the path associated with v i in U ; and (ii) for each edge, e i j ( i , j { 1 , 2 , . . . , n d } ) , the X coordinate is the assigned value of e i j in U , while the range of Y coordinates is from the minimum to maximum values assigned to the vertices associated with e i j in G .
Figure 15 shows the results of graph drawing for the mobility graph and the signal graph, respectively. From this figure, we observe that by applying the graph drawing approach, the layout structure of graphs becomes unique and more readable in the visualization aspect.
Figure 15. (a) Mobility graph; (b) signal graph. Results of graph drawing.
Figure 15. (a) Mobility graph; (b) signal graph. Results of graph drawing.
Sensors 15 24791 g015

3.4. Page Rank Algorithm

After the mobility and signal graphs are obtained, we propose to use the PR algorithm to construct the mapping from the signal graph into the mobility graph with the purpose of investigating the relation between the physical layout and signal distribution in the target environment.
First of all, based on the results of path separation in Figure 8, we focus on the detection of the hot areas, which appear frequently in the people’s motion patterns. To achieve this goal, we define P z ( i ) as the probability that the individual has visited the i-th area at the timestamp z. Thus, we have:
P z + 1 ( i ) = j P z ( j ) ( P j i / N j )
where N j is the number of paths starting from the j-th area; and P j i is the area indicator function calculated as follows.
P j i = 1 when there is a path starting from the j - th area to i - th area 0 otherwise
Second, by assuming that there are g areas in the target environment, we can obtain:
P z + 1 = M P z
where P z = [ P Z ( 1 ) , P Z ( 2 ) , . . . , P Z ( g ) ] T ; and M is a g × g matrix in which the element on the i-th row and j-th column is calculated as m i j = P j i / N j ( 1 i , j g ) .
In M , m i j ( 1 i g ) becomes zero when P j i ( 1 i g ) is zero, which indicates that there is no path starting from the j-th area involved in the people’s motion patterns. In this case, we name the current area as the hung area and then distribute the same probability to all of the areas of interest at the next timestamp. On this basis, we modify the matrix M into:
S = M + e c T / g
where e = [ 1 , 1 , . . . , 1 g in total ] T ; and c = [ c 1 , c 2 , . . . , c g ] T is an indicator vector in which each element, c i ( 1 i g ) , is calculated by:
c i = 1 when the i - th area is a hung area 0 otherwise
After this modification, we can find that the sum of each column in S equals one, which indicates that the individual must appear in one of the areas of interest at the next timestamp. Due to the observation constraint, the area where the individual appears at the next timestamp may not be detected. To solve this problem, we set a probability factor, θ, to describe the probabilities that the individual appears nearby or in other areas at the next timestamp. Hence, we continue to modify the matrix S into:
G = θ S + ( 1 - θ ) e e T / g
Based on Equation (8), we can find that G is a primitive matrix. Since:
P z + 1 = G P z P z = G z P 0 ,
we calculate the probability distribution of areas as P = lim Z P Z . By setting P 0 = [ 1 / g , 1 / g , . . . , 1 / g g in total ] T , which indicates that each area has the same probability to be visited at the first timestamp, we can detect the hot areas, which have been visited frequently based on the P . Similarly, the probability distribution of clusters in the signal graph can also be calculated based on the results of cluster separation in Figure 16. Table 3 shows the probabilities of the areas and clusters, respectively, in the mobility graph (MG) and the signal graph (SG), respectively.
Figure 16. Cluster separation.
Figure 16. Cluster separation.
Sensors 15 24791 g016
Table 3. Results of probability distributions. MG, mobility graph; SG, signal graph.
Table 3. Results of probability distributions. MG, mobility graph; SG, signal graph.
IDs in MG123456
Probabilities0.270.110.050.220.030.09
IDs in SG1234567
Probabilities0.190.030.0260.030.0260.010.02
IDs in SG891011121314
Probabilities0.020.020.010.020.010.020.02
IDs in SG1516171819
Probabilities0.010.020.010.020.01
Finally, we construct the mapping from the signal graph into the mobility graph based on the PR values of the areas and clusters, as shown in Figure 17. In concrete terms, we map the clusters into the areas with the same rank of PR values to preserve the consistency of the hot nodes in the mobility and signal graphs. In our experiments, Area 5 (i.e., Lobby 3) cannot be mapped by any cluster, which means that this area is not a hot area, and meanwhile, there are very few RSSs collected in this area. Therefore, by using the PR algorithm, we not only construct the relation between the signal graph and the mobility graph, but also detect the hot areas that appear frequently in the people’s motion patterns.
Figure 17. Mapping from the signal graph into the mobility graph.
Figure 17. Mapping from the signal graph into the mobility graph.
Sensors 15 24791 g017

3.5. Target Localization

After the mapping from the signal graph into the mobility graph is constructed, we conduct the localization by using the Kullback–Leibler (KL) divergence. Specifically, first of all, we calculate the distribution of RSS value i in each area, Q j r ( i ) , where r ( 1 r g ) is the area ID, j ( 1 j f ) is the AP ID and f is the AP number. Second, we calculate the KL divergence between the distribution of the newly-collected RSSs, T ( i ) , and the RSS distribution with respect to each area, D KL ( T | | Q r ) , by:
D KL ( T | | Q j r ) = j = 1 f ( i = 1 η r T ( i ) In T ( i ) Q j r ( i ) )
where η r is the maximum of RSSs.
Finally, we locate the target in the area that corresponds to the smallest KL divergence.

4. Performance Evaluation

4.1. Localization Accuracy

Based on the mapping relation between the signal and mobility graphs, we can obtain the RSS distribution with respect to each area, as shown in Figure 18, Figure 19, Figure 20, Figure 21 and Figure 22. In our experiments, we find that the number of RSSs mapped into Lobby 1 is much larger than the number of RSSs mapped into the other areas, which means that Lobby 1 is a hot area that appears frequently in the people’s motion patterns, as expected. Figure 23 shows the result of localization accuracy. In this figure, the value on the i-row and j-th column represents the probability of the RSSs in the i-th area that have been estimated in the j-th area. As can be seen from Figure 23, the probabilities of correct area localization for Areas 1, 2, 3, 4 and 6 approach 100%, 85%, 64%, 64% and 80%, respectively. For the RSSs that have been wrongly estimated, the estimated areas are rather adjacent to the correct one, which means that the proposed approach is featured with satisfactory localization accuracy. We take Area 5 as an example. Although all of the RSSs in this area have been wrongly estimated in Area 6, Areas 5 and 6 are rather physically adjacent.
Figure 18. (a) From Access Point 1 (AP1); (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Lobby 1.
Figure 18. (a) From Access Point 1 (AP1); (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Lobby 1.
Sensors 15 24791 g018
Figure 19. (a) From AP1; (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Corridor 2.
Figure 19. (a) From AP1; (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Corridor 2.
Sensors 15 24791 g019
Figure 20. (a) From AP1; (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Lobby 2.
Figure 20. (a) From AP1; (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Lobby 2.
Sensors 15 24791 g020
Figure 21. (a) From AP1; (b) From AP2; (c) From AP3; (d) From AP4; (e) From AP5.RSS distributions in corridor 1.
Figure 21. (a) From AP1; (b) From AP2; (c) From AP3; (d) From AP4; (e) From AP5.RSS distributions in corridor 1.
Sensors 15 24791 g021
Figure 22. (a) From AP1; (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Corridor 3.
Figure 22. (a) From AP1; (b) from AP2; (c) from AP3; (d) from AP4; (e) from AP5. RSS distributions in Corridor 3.
Sensors 15 24791 g022
Figure 23. Probabilities of area localization.
Figure 23. Probabilities of area localization.
Sensors 15 24791 g023

4.2. Parameter Discussion

Based on Equations (8) and (9), we can find that the value P is determined by the parameter θ. To illustrate this result more clearly, Figure 24 and Figure 25 show the variations of PR values for the mobility graph and signal graph, respectively, under different values of θ. From these figures, we observe that θ has a slight impact on the rank of PR values. Therefore, we conclude that the value of P seriously relies on the calculation of S , which means that the localization and mapping performance is significantly influenced by the observation on the motion patterns of the people in the target environment.
Figure 24. Page rank (PR) values under different values of θ for the mobility graph.
Figure 24. Page rank (PR) values under different values of θ for the mobility graph.
Sensors 15 24791 g024
Figure 25. PR values under different values of θ for the signal graph.
Figure 25. PR values under different values of θ for the signal graph.
Sensors 15 24791 g025

5. Conclusions and Future Work

In this paper, we propose to use a novel indoor SLAM approach, namely the PRIMAL, to characterize the layout of the target environment and consequently achieve area-level localization accuracy. Compared to the existing SLAM approaches, the PRIMAL is independent of location fingerprinting and motion sensing. In addition, the PRIMAL can not only detect the hot areas that have been visited frequently by people, but also conduct effective mapping from the signal graph into the mobility graph. Furthermore, with the help of the Allen logic, we rely on the concept of gene sequencing to investigate the correlation between different RSS sequences and meanwhile use the PR algorithm to rank the nodes in the mobility and signal graphs for better understanding of the people’s motion patterns in both the physical and signal space. For future work, how to explore the people’s motion patterns in a large-scale environment, as well as how to locate the target at the coordinate level form two interesting topics.

Supplementary Materials

Supplementary materials can be accessed at: https://www.mdpi.com/1424-8220/15/10/24791/s1.

Acknowledgments

The authors wish to thank the reviewers and editors for the careful review and the effort in processing this paper. This work was supported in part by the Program for Changjiang Scholars and Innovative Research Team in University (IRT1299), the National Natural Science Foundation of China (61301126 and 61471077), the Special Fund of Chongqing Key Laboratory (CSTC), the Fundamental and Frontier Research Project of Chongqing (cstc2013jcyjA40041 and cstc2013jcyjA40032), the Science Foundation for Young Scientists of CQUPT(A2012-77) and the Student Research Training Program of CQUPT (A2013-64).

Author Contributions

The work presented in this paper corresponds to a collaborative development by all authors. Mu Zhou defined the research line and was involved in writing the manuscript. Qiao Zhang developed the proposed system, performed the data analysis and wrote the manuscript. Kunjie Xu and Zengshan Tian supervised the work. Yanmeng Wang and Wei He were involved in writing the manuscript. All authors have read, revised and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix

Proof of the Scoring Function

The flow chart of the proofs is shown in Figure A1.
Figure A1. Flow chart of the proofs.
Figure A1. Flow chart of the proofs.
Sensors 15 24791 g026
(1) Condition 1: i = 1 .
There are two cases to be considered as follows.
Case 1: a 1 = b 1 ;
Case 2: a 1 b 1 .
In Case 1, we have H ( 1 , 1 ) = max { 0 , α } = α . Then, if j = 2 and a 1 b 2 , we have H ( 1 , 2 ) = max { 0 , β , max { H ( 1 - k , 2 ) + w k } , max { H ( 1 , 2 - l ) + w l } } = 0 < α ; ...; if j = Q - 1 and a 1 b Q - 1 , we have H ( 1 , Q - 1 ) = max { 0 , β , max { H ( 1 - k , Q - 1 ) + w k } , max { H ( 1 , Q - 1 - l ) + w l } } = 0 < α ; and if j = Q and a 1 = b Q ; we have H ( 1 , Q ) = max { 0 , α , max { H ( 1 - k , Q ) + w k } , max { H ( 1 , Q - l ) + w l } } = α > 0 .
In Case 2, we have H ( 1 , 1 ) = max { 0 , β } = 0 . Then, if j = 2 and a 1 b 2 , we have H ( 1 , 2 ) = max { 0 , β } = 0 ; ...; if j = Q - 1 and a 1 b Q - 1 , H ( 1 , Q - 1 ) = max { 0 , β } = 0 ; and if j = Q and a 1 = b Q , H ( 1 , Q ) = max { 0 , α , max { H ( 1 - k , Q ) + w k } , max { H ( 1 , Q - l ) + w l } } = α > 0 .
Therefore, we can easily obtain that H ( 1 , j ) satisfies ①②③④⑤ under Condition 1.
(2) Condition 2: i = 2 .
There are two cases to be considered as follows.
Case 1: a 2 = b 1 ;
Case 2: a 2 b 1 .
In Case 1, we have H ( 2 , 1 ) = max { 0 , α , max { H ( 2 - k , 1 ) + w k } , max { H ( 2 , 1 - l ) + w l } } = α . Then, if j = 2 and a 2 b 2 , we have H ( 2 , 2 ) = max { 0 , H ( 1 , 1 ) + β , max { H ( 2 - k , 2 ) + w k } , max { H ( 2 , 2 - l ) + w l } } { 0 , α + β } < α ; ...; if j = Q - 1 and a 2 b Q - 1 , we have H ( 2 , Q - 1 ) = max { 0 , H ( 1 , Q - 2 ) + β , max { H ( 2 - k , Q - 1 ) + w k } , max { H ( 2 , Q - 1 - l ) + w l } } { 0 , α + β } < α ; and if j = Q and a 2 = b Q , we have H ( 2 , Q ) = max { 0 , H ( 1 , Q - 1 ) + α , max { H ( 2 - k , Q ) + w k } , max { H ( 2 , Q - l ) + w l } } { α , 2 α } α .
Then, we can easily obtain that H ( 2 , j ) satisfies ①. Furthermore, the relationship between H ( 2 , j ) and H ( 3 , j + 1 ) is equivalent to the relationship between H ( 1 , j - 1 ) and H ( 2 , j ) . Thus, based on the results in Condition 1, if a 1 = b j - 1 and a 2 = b j , we have H ( 1 , j - 1 ) = α < 2 α = H ( 2 , j ) ; and if a 1 b j - 1 and a 2 = b j , we have H ( 1 , j - 1 ) = 0 < α = H ( 2 , j ) . Hence, H ( 2 , j ) satisfies ③⑤. On the other hand, if a 1 = b j - 1 and a 2 b j , we have H ( 2 , j ) { 0 , α + β } < α = H ( 1 , j - 1 ) ; and if a 1 b j - 1 and a 2 b j , we have H ( 2 , j ) = 0 = H ( 1 , j - 1 ) . Hence, H ( 2 , j ) satisfies ②④.
In Case 2, we have H ( 2 , 1 ) = max { 0 , β , max { H ( 2 - k , 1 ) + w k } , max { H ( 2 , 1 - l ) + w l } } = 0 . Then, if j = 2 and a 2 b 2 , we have H ( 2 , 2 ) = max { 0 , H ( 1 , 1 ) + β , max { H ( 2 - k , 2 ) + w k } , max { H ( 2 , 2 - l ) + w l } } { 0 , α + β } ; ...; if j = Q - 1 and a 2 b Q - 1 , we have H ( 2 , Q - 1 ) = max { 0 , H ( 1 , Q - 2 ) + β , max { H ( 2 - k , Q - 1 ) + w k } , max { H ( 2 , Q - 1 - l ) + w l } } { 0 , α + β } ; and if j = Q and a 2 = b Q , we have H ( i , j ) = max { 0 , H ( i - 1 , j - 1 ) + α , max { H ( i - k , j ) + w k } , m a x { H ( i , j - l ) + w l } } { α , 2 α } > { 0 , α + β } .
Then, we can easily obtain that H ( 2 , j ) satisfies ①. Similarly, we equate the relationship between H ( 2 , j ) and H ( 3 , j + 1 ) to the relationship between H ( 1 , j - 1 ) and H ( 2 , j ) . Based on the results in Condition 1, if a 1 = b j - 1 and a 2 = b j , we have H ( 1 , j - 1 ) = α < 2 α = H ( 2 , j ) ; and if a 1 b j - 1 and a 2 = b j , we have H ( 1 , j - 1 ) = 0 < α = H ( 2 , j ) . Hence, H ( 2 , j ) satisfies ③⑤. On the other hand, if a 1 = b j - 1 and a 2 = b j , we have H ( 2 , j ) { 0 , α + β } < α = H ( 1 , j - 1 ) ; and if a 1 b j - 1 and a 2 b j , we have H ( 2 , j ) 0 = H ( 1 , j - 1 ) . Hence, H ( 2 , j ) satisfies ②④.
Therefore, we obtain that H ( 2 , j ) satisfies ①②③④⑤ under Condition 2.
In the results that follow, we only focus on the situation that j i in H ( i , j ) . Similar results can be easily obtained with respect to the j < i in the H ( i , j ) situation.
(3) Condition 3: i = 3 .
In this condition, if j = 3 and a 3 b 3 , we have H ( 3 , 3 ) = max { 0 , H ( 2 , 2 ) + β , max { H ( 3 - k , 3 ) + w k } , max { H ( 3 , 3 - l ) + w l } } = max { 0 , H ( 2 , 2 ) + β , H ( 2 , 3 ) + β - α } { 0 , α + β , 2 α + β } ; if j = 4 and a 3 b 4 , we have H ( 3 , 4 ) = max { 0 , H ( 2 , 3 ) + β , max { H ( 3 - k , 4 ) + w k } , max { H ( 3 , 4 - l ) + w l } } = max { 0 , H ( 2 , 3 ) + β , H ( 3 , 3 ) + β - α } { 0 , α + β , 2 α + β , α + 2 β } ; ...; if j = Q - 1 and a 3 b Q - 1 , we have H ( 3 , Q - 1 ) = max { 0 , H ( 2 , Q - 2 ) + β , max { H ( 3 - k , Q - 1 ) + w k } , max { H ( 3 , Q - 1 - l ) + w l } } { 0 , α + β , 2 α + β , α + 2 β } ; if j = Q and a 3 = b Q , we have H ( 3 , Q ) = max { 0 , H ( 2 , Q - 1 ) + α , max { H ( 3 - k , Q ) + w k } , max { H ( 3 , Q - l ) + w l } } = max { 0 , H ( 2 , Q - 1 ) + α } H ( 3 , Q - 1 ) ; and if j = Q + 1 and a 3 b Q + 1 , we have H ( 3 , Q + 1 ) = max { 0 , H ( 2 , Q ) + β , max { H ( 3 - k , Q + 1 ) + w k } , max { H ( 3 , Q + 1 - l ) + w l } } . To obtain the relationship between H ( 3 , Q ) and H ( 3 , Q + 1 ) , we need to examine the relations of four neighboring elements, H ( 3 , Q ) , H ( 3 , Q + 1 ) , H ( 4 , Q ) and H ( 4 , Q + 1 ) . If a 4 = b Q , the calculation of H ( 4 , Q ) is equivalent to the calculation of H ( 3 , Q + 1 ) with a 3 = b Q + 1 . Since H ( 3 , Q + 1 ) | a 3 = b Q + 1 > H ( 3 , Q + 1 ) | a 3 b Q + 1 , we have H ( 4 , Q ) H ( 3 , Q + 1 ) ; and if a 4 = b Q + 1 , we have H ( 4 , Q + 1 ) = max { 0 , H ( 3 , Q ) + α , max { H ( 4 - k , Q + 1 ) + w k } , max { H ( 4 , Q + 1 - l ) + w l } } = max { 0 , 2 α + H ( 2 , Q - 1 ) , max { H ( 4 - k , Q + 1 ) + w k } , max { H ( 4 , Q + 1 - l ) + w l } } 2 α + β H ( 3 , Q + 1 ) .
Therefore, we can easily obtain that H ( 3 , j ) satisfies ①②③④⑤ under Condition 3.
(4) Condition 4: i = n 4 .
In this condition, if j = n and a n b n , we have H ( n , n ) = max { 0 , H ( n - 1 , n - 1 ) + β , max { H ( n - k , n ) + w k } , max { H ( n , n - l ) + w l } } { 0 , α + ( n - 1 ) β , α + ( n - 2 ) β , . . . , α + β , 2 α + ( n - 2 ) β , . . . , 2 α + β , . . . ( n - 1 ) α + β } ; ...; if j = Q - 1 and a n b Q - 1 , we have H ( n , Q - 1 ) = max { 0 , H ( n - 1 , Q - 2 ) + β , max { H ( n - k , Q - 1 ) + w k } , max { H ( n , Q - 1 - l ) + w l } } { 0 , α + ( n - 1 ) β , α + ( n - 2 ) β , . . . , α + β , 2 α + ( n - 2 ) β , . . . , 2 α + β , . . . ( n - 1 ) α + β } ; if j = Q and a n = b Q , we have H ( n , Q ) = max { 0 , H ( n - 1 , Q - 1 ) + α , max { H ( n - k , Q ) + w k } , max { H ( n , Q - l ) + w l } } ; and if j = Q + 1 and a n b Q + 1 , we assume that H ( n , Q + 1 ) satisfies ①②③④⑤.
Then, under the a n + 1 b Q - 1 and a n + 1 = b Q conditions, if H ( n + 1 , Q ) < H ( n + 1 , Q - 1 ) , we obtain:
max 0 { H ( n + 1 , Q - 1 ) - α + β } H ( n , Q - 1 ) + α H ( n , Q ) - α + β < max 0 { H ( n + 1 , Q - 2 ) - α + β } H ( n , Q - 1 ) + β H ( n , Q - 1 ) - α + β
Based on Equation (11), since under the a n b Q - 2 , a n = b Q - 1 and a n b Q conditions, we have H ( n , Q - 1 ) H ( n , Q - 2 ) and H ( n , Q - 1 ) H ( n , Q ) , Equation (11) can be simplified into H ( n + 1 , Q - 2 ) > H ( n + 1 , Q - 1 ) . Thus, the range of the value H ( n + 1 , Q - 2 ) , F ( H ( n + 1 , Q - 2 ) ) , is not overlapped with the range of the value H ( n + 1 , Q - 1 ) , F ( H ( n + 1 , Q - 1 ) ) , notated as F ( H ( n + 1 , Q - 2 ) ) F ( H ( n + 1 , Q - 1 ) ) = Φ .
On the other hand, the relations of H ( n + 1 , Q - 2 ) { 0 , α , α + β , . . . , α + n β , 2 α , 2 α + β , . . . , 2 α + ( n - 1 ) β , n α , n α + β , ( n + 1 ) α } and H ( n + 1 , Q - 1 ) { 0 , α + β , . . . , α + n β , 2 α + β , . . . , 2 α + ( n - 1 ) β , n α + β } indicate that F ( H ( n + 1 , Q - 2 ) ) F ( H ( n + 1 , Q - 1 ) ) Φ , which conflicts with the previous assumption in (Equation (11)). Therefore, we obtain that H ( n + 1 , Q ) H ( n + 1 , Q - 1 ) , and thereby, H ( n + 1 , Q ) satisfies ①②③④⑤ under Condition 4.
In conclusion, it is proven that the definition of H ( i , j ) satisfies ①②③④⑤.

References

  1. Pei, L.; Chen, R.; Liu, J.; Kuusniemi, H. Using inquiry-based bluetooth rssi probability distributions for indoor positioning. J. Glob. Position. Syst. 2010, 9, 122–130. [Google Scholar]
  2. Kim, S.J.; Kim, B.K. Dynamic ultrasonic hybrid localization system for indoor mobile robots. IEEE Trans. Ind. Electron. 2013, 60, 4562–4573. [Google Scholar] [CrossRef]
  3. Chang, S.R.; Lin, W.; Chang, S.; Tu, C.; Wei, C.; Chien, C.; Tsai, C.; Chen, J.; Chen, A. A dual-band RF transceiver for multistandard WLAN applications. IEEE Trans. Microw. Theory Tech. 2005, 53, 1048–1055. [Google Scholar] [CrossRef]
  4. Lai, M.; Jeng, S. A microstrip three-port and four-channel multiplexer for WLAN and UWB coexistence. IEEE Trans. Microw. Theory Tech. 2005, 53, 3244–3250. [Google Scholar] [CrossRef]
  5. Yang, S.; Jung, E.; Han, S.K. Indoor location estimation based on LED visible light communication using multiple optical receivers. IEEE Commun. Lett. 2013, 17, 1834–1837. [Google Scholar] [CrossRef]
  6. Liu, M.; Qiu, K.; Che, S.; Li, S.; Hussain, B.; Wu, L.; Yue, C. Towards indoor localization using visible light Communication for consumer electronic devices. In Proceedings of the IEEE/RSJ International Conference in Intelligent Robots and Systems, Chicago, IL, USA, 14–18 September 2014; pp. 143–148.
  7. Vegni, A.M.; Biagi, M. An indoor localization algorithm in a small-cell LED-based lighting system. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, Sydney, NSW, Australia, 13–15 November 2012; Volume 147, pp. 1–7.
  8. Ma, L.; Xu, Y. Received Signal Strength Recovery in Green WLAN Indoor Positioning System Using Singular Value Thresholding. Sensors 2015, 15, 1292–1311. [Google Scholar] [CrossRef] [PubMed]
  9. Du, Y.; Yang, D.; Xiu, C. Novel Method for Constructing a WIFI Positioning System with Efficient Manpower. Sensors 2015, 15, 8358–8381. [Google Scholar] [CrossRef] [PubMed]
  10. Sun, Y.; Xu, Y.; Li, C.; Ma, L. Kalman/Map filtering-aided fast normalized cross correlation-based Wi-Fi fingerprinting location sensing. Sensors 2013, 13, 15513–15531. [Google Scholar] [CrossRef] [PubMed]
  11. Zhou, M.; Wang, A.K.; Tian, Z.; Luo, X.; Xu, K.; Shi, R. Personal Mobility Map Construction for Crowd-Sourced Wi-Fi Based Indoor Mapping. IEEE Commun. Lett. 2014, 18, 1427–1430. [Google Scholar] [CrossRef]
  12. Chen, Y.; Fracisco, J.A.; Trappe, W.; Martin, R.P. A parctical approach to landmark deployment for indoor localization. In Proceedings of the 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, Reston, VA, USA, 28 September 2006; pp. 3429–3443.
  13. Zhou, M.; Wang, A.K.; Tian, Z.; Zhang, V.Y.; Yu, X.; Luo, X. Adaptive Mobility Mapping for People Tracking Using Unlabelled Wi-Fi Shotgun Reads. IEEE Commun. Lett. 2013, 17, 87–90. [Google Scholar] [CrossRef]
  14. Zhou, M.; Xu, Y.; Ma, L.; Tian, S. On the statistical errors of RADAR location sensor networks with built-in Wi-Fi Gaussian linear fingerprints. Sensors 2012, 12, 3605–3626. [Google Scholar] [CrossRef]
  15. Ma, L.; Xu, Y.; Wu, D. A novel two-step WLAN indoor positioning method. J. Comput. Inf. Syst. 2010, 6, 4627–4636. [Google Scholar]
  16. Wang, B.; Zhou, S.; Liu, W.; Mo, Y. Indoor localization based on curve fitting and location search using received signal strength. IEEE Trans. Ind. Electron. 2015, 62, 572–582. [Google Scholar] [CrossRef]
  17. Zhou, M.; Tian, Z.; Xu, K.; Yu, X.; Hong, X.; Wu, H. SCaNME: Location Tracking System in Large-Scale Campus Wi-Fi Environment Using Unlabeled Mobility Map. Expert Syst. Appl. 2014, 41, 3429–3443. [Google Scholar] [CrossRef]
  18. Bahl, P.; Padmanabhan, V.N. RADAR: An in-building RF-based user location and tracking system. In Proceedings of the IEEE INFOCOM, Tel Aviv, Israel, 26–30 March 2000; Volume 2, pp. 775–784.
  19. Youssef, M.; Agrawala, A. The Horus WLAN location determination system. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, Seattle, WA, USA, 6–8 June 2005; pp. 205–218.
  20. Kaemarungsi, K.; Krishnamurthy, P. Analysis of WLAN’s received signal strength indication for indoor location fingerprinting. Pervasive Mob. Comput. 2012, 8, 292–316. [Google Scholar] [CrossRef]
  21. Zhou, M.; Tian, Z.; Xu, K.; Yu, X.; Wu, H. Theoretical Entropy Assessment of Fingerprint-based Wi-Fi Localization Accuracy. Expert Syst. Appl. 2013, 40, 6136–6149. [Google Scholar] [CrossRef]
  22. Wu, C.; Yang, Z.; Liu, Y.; Xi, W. WILL: Wireless indoor localization without site survey. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 839–848. [Google Scholar]
  23. Shin, H.; Chon, Y.; Cha, H. Unsupervised construction of an indoor floor plane using a smartphone. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2012, 42, 889–898. [Google Scholar] [CrossRef]
  24. Shin, H.; Cha, H. Wi-Fi fingerprint-based topological map building for indoor user tracking. In Proceedings of the 16th IEEE International Conference on Embedded and Real-Time Computer Systems and Applications, Macau, China, 23–25 August 2010; pp. 105–113.
  25. Hardegger, M.; Roggen, D.; Mazilu, S.; Troster, G. ActionSLAM: Using location-related actions as landmarks in pedestrian SLAM. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, Sydney, Australia, 13–15 November 2012; pp. 1–10.
  26. Bruno, L.; Robertson, P. WiSLAM: Improving footSLAM with WiFi. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, Guimaraes, Portugal, 21–23 September 2011; pp. 1–10.
  27. Kao, W.; Huy, B. Indoor navigation with smartphone-based visual SLAM and bluetooth-connected wheel-robot. In Proceedings of the International Automatic Control Conference, Nantou, Taiwan, 2–4 December 2013; pp. 395–400.
  28. Huang, J.; Millman, D.; Quigley, M.; Stavens, D.; Thrun, S.; Aggarwal, A. Efficient, generalized indoor WiFi graphSLAM. In Proceedings of the IEEE International Conference on Robotics and Automation, Beijing, China, 7–10 August 2011; pp. 1038–1043.
  29. Mirowski, P.; Tin, K.H.; Saehoon, Y.; Macdonald, M. SignalSLAM: Simutanous localization and mapping with mixed WiFi, bluetooth, LTE and magnetic signals. In Proceedings of the International Conference on Indoor Positioning and Indoor Navigation, Montbéliard, France, 28–31 October 2013; pp. 1–10.
  30. Hussin, Z. Fast-converging indoor mapping for wireless indoor localization. In Proceedings of the 7th Annual PhD Forum on Pervasive Computing and Communications, Budapest, Hungary, 24–28 March 2014; pp. 171–173.
  31. Bisio, I.; Lavagetto, F.; Marchese, M.; Sciarrone, A. GPS/HPS-and Wi-Fi Fingerprint-Based Location Recognition for Check-in Applications over Smartphones in Cloud-Based LBSs. IEEE Trans. Multimed. 2013, 15, 858–869. [Google Scholar] [CrossRef]
  32. Bisio, I.; Cerruti, M.; Lavagetto, F.; Marchese, M.; Pastorino, M.; Randazzo, A. A Trainingless Wi-Fi Fingerprint Positioning Approach Over Mobile Devices. IEEE Antennas Wirel. Propag. Lett. 2014, 13, 832–835. [Google Scholar] [CrossRef]
  33. Sanchez, R.D.; Hernandez, M.P.; Quinteiro, J.M.; Alonso, G.I. A Low Complexity System Based on Multiple Weighted Decision Trees for Indoor Localization. Sensors 2015, 15, 14809–14829. [Google Scholar] [CrossRef] [PubMed]
  34. Youssef, M.A.; Agrawala, A.; Shankar, A.U. WLAN Location Determination via Clustering and Probability Distributions. In Proceedings of the IEEE PerCom, Fort Worth, TX, USA, 26 March 2003; pp. 143–152.
  35. Severi, S.; Liva, G.; Chiani, M.; Dardari, D. A New Low-Complexity User Tracking Algorithm for WLAN-Based Positioning System. In Proceedings of the 16th IST Mobile and Wireless Communications Summit, Budapest, Hungary, 15–17 December 2007; pp. 1–5.
  36. Pietro, R.; Rocco, R.; Paolo, A. A Computationally Approach to WLAN localization based on multiple filters. In Proceedings of the International Conference on Localization and GNSS, Gothenburg, Sweden, 22–24 June 2015; pp. 1–6.
  37. Bisio, I.; Lavagetto, F.; Marchese, M.; Sciarrone, A. Performance comparison of a probabilistic fingerprint-based indoor positioning system over different smartphone. In Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Toronto, Canada, 7–10 July 2013; pp. 161–166.
  38. Bisio, I.; Lavagetto, F.; Marchese, M.; Sciarrone, A. Energy efficient WiFi-based fingerprinting for indoor positioning with smartphones. In Proceedings of the IEEE GLOBECOM, Atlanta, GA, USA, 9–13 December 2013; pp. 4639–4643.
  39. Smith, T.F.; Waterman, M.S. Identification of Common Molecular Subsequences. J. Mol. Biol. 1981, 147, 195–197. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Zhou, M.; Zhang, Q.; Xu, K.; Tian, Z.; Wang, Y.; He, W. PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength. Sensors 2015, 15, 24791-24817. https://doi.org/10.3390/s151024791

AMA Style

Zhou M, Zhang Q, Xu K, Tian Z, Wang Y, He W. PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength. Sensors. 2015; 15(10):24791-24817. https://doi.org/10.3390/s151024791

Chicago/Turabian Style

Zhou, Mu, Qiao Zhang, Kunjie Xu, Zengshan Tian, Yanmeng Wang, and Wei He. 2015. "PRIMAL: Page Rank-Based Indoor Mapping and Localization Using Gene-Sequenced Unlabeled WLAN Received Signal Strength" Sensors 15, no. 10: 24791-24817. https://doi.org/10.3390/s151024791

Article Metrics

Back to TopTop