Next Article in Journal
A Lightweight Strip Steel Surface Defect Detection Network Based on Improved YOLOv8
Previous Article in Journal
Study on the Design Method of High-Resolution Volume-Phase Holographic Gratings
Previous Article in Special Issue
Cramér–Rao Lower Bound for Magnetic Field Localization around Elementary Structures
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Non-Line-of-Sight Identification in Cellular Positioning Systems Using a Deep Autoencoding and Generative Adversarial Network Model

1
School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
School of Mechanical Engineering and Automation, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(19), 6494; https://doi.org/10.3390/s24196494
Submission received: 26 August 2024 / Revised: 28 September 2024 / Accepted: 8 October 2024 / Published: 9 October 2024

Abstract

:
Positioning service is a critical technology that bridges the physical world with digital information, significantly enhancing efficiency and convenience in life and work. The evolution of 5G technology has proven that positioning services are integral components of current and future cellular networks. However, positioning accuracy is hindered by non-line-of-sight (NLoS) propagation, which severely affects the measurements of angles and delays. In this study, we introduced a deep autoencoding channel transform-generative adversarial network model that utilizes line-of-sight (LoS) samples as a singular category training set to fully extract the latent features of LoS, ultimately employing a discriminator as an NLoS identifier. We validated the proposed model in 5G indoor and indoor factory (dense clutter, low base station) scenarios by assessing its generalization capability across different scenarios. The results indicate that, compared to the state-of-the-art method, the proposed model markedly diminished the utilization of device resources and achieved a 2.15% higher area under the curve while reducing computing time by 12.6%. This approach holds promise for deployment in future positioning terminals to achieve superior localization precision, catering to commercial and industrial Internet of Things applications.

1. Introduction

Currently, location-based services are utilized in several aspects of our daily lives [1,2]. The demand for indoor positioning has exceeded the expectations of researchers. Accurate real-time location information breaks the barriers between virtual data and physical objects, which can revolutionize industries such as manufacturing, logistics, and navigation of large-scale public places, driving the Internet of Everything [3,4]. The development of artificial intelligence and robotics and the rise of new industries, such as autonomous healthcare and intelligent manufacturing, also rely on location-based services (LBSs) for technical support [5,6]. However, the reliability of LBS services depends on accurate positioning. Outdoor positioning technology relies mainly on established global navigation satellite systems (GNSSs) that have achieved submeter accuracy [7]. Nevertheless, due to object occlusion and multipath effects, the positioning accuracy of the GNSS is significantly degraded indoors and in urban canyons [8,9]. Thus, addressing blind spots in GNSS indoor positioning signal coverage is essential for seamless indoor–outdoor high-precision positioning and navigation [10,11].
Historically, wireless local area network-based positioning and navigation technologies such as Bluetooth [12], ultra-wideband [13], and Wi-Fi [14] garnered attention. However, scaling these systems from single buildings to cities incurs substantial network construction costs [15].
In contrast, 5G telecommunication infrastructure offers comprehensive signal coverage across most regions, including cities, suburbs, and rural areas [16]. Establishing 5G positioning systems presents cost advantages over other positioning methods, leveraging 5G’s inherent large bandwidth for seamless indoor–outdoor positioning [17].
Based on these capabilities, the 3rd Generation Partnership Project (3GPP) has incorporated support for radio interface technology-dependent positioning in the Rel-16 version of the 5G protocol [18]. In addition, with the recent development of the large-scale antenna system, also known as massive multiple-input multiple-output (massive MIMO), 5G positioning systems can be implemented in various scenarios, such as indoor spaces and factories [19]. Massive MIMO provides additional degrees of freedom by utilizing the spatial and angular domains of the propagation channel in combination with temporal measurements. This enables a 5G-based positioning system to support multiple localization techniques, including downlink time difference of arrival, downlink angle of departure, uplink time difference of arrival, uplink angle of arrival (AoA), and multicell round-trip time, which ensure higher positioning accuracy than that obtained with a long-term evolution (LTE)-based positioning system [20].
Notably, the trilateration- and triangulation-based localization methods mentioned above achieve optimal performance when the signal propagates in line-of-sight (LoS) environments, i.e., no obstacles are blocking signal propagation [21]. However, in an actual localization scenario, obstacles may exist and their positions may change. When the signal encounters these obstacles in the propagation process, diffraction, reflection, and scattering are likely to occur, resulting in different deviations in the localization and angulation received by the positioning terminal, which seriously affects the positioning accuracy [22]. Fluctuations in observations challenge real-time localization reliability, potentially leading to security vulnerabilities [23]. Figure 1 illustrates various modes of signal transmission.
Notably, according to the functional specifications of user equipment (UE) positioning in a next-generation radio access network (NG-RAN), known as TS 38.305 [20], most instances of location solving occur in the location management function (LMF) [24]. Even cell phones with sufficient computational power can assist in location settlement. During this process, the LMF receives measurements uploaded by the UE or gNodeB (gNB), which can be used to extract features for non-line-of-sight (NLoS) identification.
Therefore, many scholars have examined various NLoS identification and suppression methods, such as the residual-weighted geometric hyperbolic (RWGH) method [25], Neyman–Pearson detection method [26], and Bayesian sequence statistics method [27], each of which has its merits and limitations. We will further discuss these issues in the related works section.
The most obvious limitation is that the probability distribution models struggle to represent the NLoS distribution accurately, particularly considering its variability with indoor objects. In contrast, LoS propagation uniformly follows a Rician distribution [28]. Moreover, as communication standards progress, multimodal and multi-task learning have become a crucial pathway for the enhancement of machine learning in communication technology. Consequently, machine learning functionalities will undoubtedly become a common component of the forthcoming generation of communication systems. Furthermore, non-line-of-sight identification in cellular positioning systems is intricately linked to multitasking and multimodality. Multitasking- and multimodality-based machine learning techniques hold significant reference value for the intelligent prediction of instances [29,30,31]. Therefore, we proposed an NLoS identification method based on training LoS samples. This approach allows the network to accurately recognize the LoS by extracting the latent features of the LoS samples and identifying the NLoS as outliers for precise NLoS identification. This scheme improves network generalization and reduces inference time and storage requirements, facilitating the adoption of positioning terminals.

2. Related Works

In this section, we categorize the existing NLoS recognition methods into two types: traditional NLoS recognition methods and machine learning (ML)-based NLoS recognition methods. We briefly explain the principles of these methods and highlight their shortcomings. Eventually, we use this analysis to develop the proposed method.

2.1. Conventional Methods

Traditional methods for NLoS identification primarily involve two approaches: the first is gathering data from several signal sources simultaneously and assessing whether a signal source exhibits NLoS propagation by cross-analysis of a designated selection of signal sources for comparison. The alternative method is collecting numerous measurements from a singular signal source, constructing a probability distribution, and employing the subordinate relationship between the observed data and the distribution to ascertain whether it signifies NLoS propagation.
The RWGH method is the standard approach for aggregating data from various signal sources to assess if a limited number of signal sources are in the NLoS propagation stage. The RWGH approach utilizes the estimated location coordinates to calculate observation residuals and evaluates these residual values to determine whether an observation is under the NLoS propagation condition [25]. The advantage of this method is that prior knowledge is not required. Ref. [32] leveraged the Cayley–Menger determinants within the framework of the distance geometry theory to ascertain NLoS propagation across three channels within each group, subsequently identifying specific LoS and NLoS anchors through an exhaustive traversal of the detection outcomes across all groups.
Nonetheless, the technique for aggregating various signal sources imposes stringent demands on the user’s surroundings and is capable only of identifying anomalous NLoS propagation, which is inherently unstable. Consequently, it is more prevalent to formulate a probability distribution for the propagation of a singular signal source and utilize this distribution to ascertain the NLoS propagation of the signal source [33]. Aghaie utilized the generalized likelihood ratio test method, postulating that the measurement and NLoS errors follow distinct probability distributions [26]. The probability that different types of channel information belong to different distributions was calculated according to the Neyman–Pearson criterion. NLoS identification was conducted by adjusting the false alarm and detection probabilities. However, the efficacy of this method is heavily dependent on the parameter settings, indicating limited generalization capability. Wang et al. adopted the Bayesian sequential test method, wherein the probabilities are updated after each new data collection and the presence of NLoS is determined based on previous knowledge and current evidence [27]. Similarly, Yan et al. used Bayesian sequential testing to ascertain whether the current propagation is NLoS and applied a modified Kalman filter to smooth the NLoS measurement data, thereby reducing the NLoS forward error [34].
The aforementioned conventional techniques for determining probability distributions frequently encounter the same issue: the information dimension of the probability predominantly comprises the time of arrival and the angle of arrival. This information significantly relies on the estimation methods for distance and angle, rendering it infeasible to utilize propagation data of higher dimensions to assess the probability distribution. Estimating a probability distribution simultaneously requires a predetermined type of probability distribution, and identifying the exact probability distribution associated with NLoS is challenging. Recognizing a probability distribution will profoundly influence the estimation result. Consequently, researchers have contemplated employing machine learning techniques for NLoS identification.

2.2. Machine Learning Methods

Given that signal propagation can fundamentally be categorized into LoS and NLoS, the identification of NLoS can inherently be framed as a binary classification problem [35,36,37]. Consequently, the introduction of ML techniques to address the issue of NLoS identification is feasible [38]. The primary consideration is the selection of the network inputs [39]. Numerous studies have previously utilized the estimated channel characteristics as the inputs, including maximum correlation magnitude, energy decay, peak decay exponent, root-mean-square delay spread, mean excess delay, Rician K-factor, kurtosis, skewness, and total received power [40,41,42,43,44,45,46,47,48]. With the parameters mentioned above as the network inputs, researchers initially considered employing the random forest methodology to identify NLoS propagation [49,50]. This method constructs multiple decision trees for network training by randomly selecting samples and training parameters. In the testing phase, decisions are made by feeding inputs to multiple decision trees, and multiple decisions are weighted to determine whether the signal propagation is LoS or NLoS [51,52]. Similarly, methods based on Support Vector Machines (SVMs) for NLoS identification have been considered [53,54,55]. Barral et al. utilized the received signal strength and range as features for NLoS discrimination using an SVM [56].
The method mentioned above, although effective, essentially addresses only the issue of multi-parameter threshold selection for judgment, whereas the overall recognition performance of the NLoS continues to be constrained by the inherent limitations of these features. Consequently, the academic community has considered directly inputting the raw channel state information, such as the channel impulse response (CIR), into the networks to allow them to autonomously learn the underlying features to realize NLoS identification [57,58,59]. Zhu et al. [60] defined a lightweight convolutional neural network (CNN) architecture for NLoS identification. Si et al. [61] combined multilayer perceptrons (MLPs) with CNNs to achieve enhanced performance. Kong developed the CNN framework and utilized the dung beetle optimizer (DBO) to design an improved DBO-CNN that employed circle chaotic mapping, non-uniform Gaussian mutation strategies, and multi-stage perturbation strategies to optimize exploration capabilities, thereby improving the F1-Score by 3.31% [62]. However, the primary issue with this method is the requirement for a substantial number of labeled samples. Equal numbers of NLoS and LoS channel samples are required to learn the features of the NLoS and LoS channels adequately. Collecting NLoS propagation samples that cover nearly all scenarios during measurements is impractical, and their application across different scenes presents even more significant challenges.
Based on the issues outlined above, one possible solution is a one-class neural network built by training solely with LoS dataset samples, which enables deep neural networks to exhaustively learn the latent features of a single category of samples and construct hyperplanes to differentiate between LoS and NLoS [63,64]. However, this method is computationally complex and updates are slow. Another approach utilizes an autoencoder (AE) to learn the latent features of the LoS samples for efficient encoding [65,66]. The training method involves training a pair of encoders and decoders simultaneously; the encoder first encodes the samples and then decodes them using the decoder [67]. The reconstructed samples are compared with the original samples to construct a loss function for model training. This method can fully extract the features of the LoS samples [68]. Moreover, for NLoS data that do not belong to LoS, the samples reconstructed through encoding and decoding will generate a significant reconstruction error, thereby revealing themselves as NLoS samples [65,69,70,71]. However, the selection of an appropriate discrimination threshold has always been challenging [72]. To this end, some researchers have proposed using the kernel density estimation (KDE) method to estimate the probability density distribution of LoS samples.
By calculating the probability that a test sample belongs to a set of LoS samples, we can determine whether the sample is an LoS sample. This method can reduce the difficulty in threshold selection to a certain extent and is highly accurate. However, a major issue with this method is the need to cache many LoS samples in memory to complete the KDE, thus significantly limiting its practicality.

2.3. Contributions

In response to the issues outlined above, we propose a novel method for NLoS identification in the context of 5G positioning systems. The method aims to address the decline in positioning performance, caused by signal propagation under NLoS conditions. The main contributions of this study are as follows:
  • We improved the basic multipath channel propagation model for a uniform planar array (UPA)-based 5G transmission system. The traditional direction-of-arrival (DoA)-based positioning system model solely focuses on the phase shift of the wavefront reaching each array element without considering the signal content. Therefore, this model is limited to single-frequency or signals centered around a single frequency, failing to meet the analysis requirements of Orthogonal Frequency Division Multiplexing (OFDM) systems. In this study, we analyzed the delay angle of the signal arriving at each array element and derived the phase shift of the position of the array element across all frequency points within the transmission bandwidth. Specifically, in OFDM systems, the improved model can analyze the impact of the delay angle of the signal arriving at each array element on every subcarrier. Finally, we constructed a channel frequency response (CFR) matrix of the UPA-based 5G transmission system.
  • We refer to the processing method for the CFR in the fingerprint localization system and transform the CFR into an angle-delay channel power matrix (ADCPM) as the input to the network so that the network can learn the potential features of the LoS distribution more intuitively [73]. However, owing to variation in the UE location, the ADCPM obtained by the transformation is sparse. Moreover, the peak positions always differ, which significantly affects the learning of other potential features by the network. To this end, we propose a deep autoencoder with channel transformer (DACT) architecture, which utilizes an AE for feature extraction of the ADCPM, introduces the spatial transformer network (STN) to transform the ADCPM, and constrains the loss function related to the difference in the encoder output before and after the transformation, making the network less sensitive to the peak positions of the ADCPM and more sensitive to the extraction of other potential features of LoS propagation.
  • We designed a generative adversarial network (GAN) oriented toward NLoS identification by feeding the AE-encoded ADCPM into the discriminator of the GAN to determine whether it belongs to NLoS propagation. Because the output of the discriminator is a probability, a threshold of 0.5 can be set directly, which solves the problem of threshold selection in traditional NLoS recognition methods. Second, this method can generate various samples from random noise during the generator training process, which allows the discriminator to explore more possibilities without the participation of NLoS samples. This further improves the accuracy of LoS feature extraction and robustness of NLoS identification when compared with the results of pure learning of LoS samples using only the AE. Unlike the KDE method, the proposed method does not need to load training samples in the testing phase, which significantly reduces memory consumption. Finally, because the inputs need to pass through only the encoder and discriminator in the testing phase, the prediction speed is significantly improved when compared with that of the KDE method, which provides strong support for deploying the NLoS recognition method in the localization terminal.
  • We simulated the signaling scenarios for 5G sounding reference signals (SRSs) in indoor offices and factories (dense clutter low base station) based on the 3GPP TS 38.901 standard and verified the effectiveness of the proposed method across the scenarios by training in one scenario and validating in the other scenarios.
The remainder of this paper is organized as follows: Section 3 presents the system modeling and introduces the CFR for a 5G positioning system, elucidates the data preprocessing, namely, transforming the CFR into ADCPM, and describes the details of the designed deep autoencoding channel-transformed generative adversarial network (DACT-GAN) network architecture and construction of the related loss functions. Section 4 introduces the setup for environmental simulation including the testing platform, specific parameters of the network model, and state-of-the-art (SOTA) methods. Section 5 compares the proposed method with the SOTA methods, and quantifies the superiority of the proposed method. Finally, we conclude the paper in Section 6.

3. Methodology

In this section, we presented the system modeling, and addressed the NLoS identification issue in terms of data acquisition and labeling, culminating in the adoption of a GAN discriminator as the NLoS identifier. Subsequently, to facilitate a more profound feature extraction, we incorporated the angle-delay domain channel power matrix as the input to the NLoS identification network and delineated the transformation process from the CFR to the ADCPM. Accordingly, we defined the NLoS identification network proposed in this study as a DACT-GAN. Finally, the network loss function was introduced.

3.1. System Model

We consider 5G-based wireless positioning systems, where 5G signals propagate as electromagnetic waves over air. We can define a 5G-based wireless positioning system as a linear time-invariant system. Consider an uplink where a single-antenna UE broadcasts 5G SRSs to a single-antenna 5G base station (BS); the propagation channel can be modeled as:
h t = p = 0 P 1 α p δ t τ p .
Due to phenomena such as reflection, refraction, and diffraction that may occur as the signal propagates from the UE to BS, multiple propagation paths may be generated, leading to a multipath effect. In this study, we define the number of multipath effects produced during the signal propagation process as P. Specifically, we define the attenuation caused by space on the signal in each propagation path as α and the delay as τ . Typically, without blocking the first-arrival path, we consider τ 0 to be the direct path.
In contemporary deployments, massive MIMO constitutes a pivotal component of 5G technology [74,75]. Within the scope of this study, we postulate that the BS is equipped with a uniform rectangular panel array encompassing J g × I g panels, where I g denotes the number of panels per row and J g denotes the number of panels per column. Each antenna panel is uniformly spaced horizontally and vertically; d g , H and d g , V denote the horizontal and vertical panel spacing, respectively. To focus on the identification of the NLoS conditions, we assume that each panel comprises a single element and that these antenna elements are single-polarized. Consequently, the total number of antenna elements in the UPA can be expressed as J × I = J g × I g . For visual reference, Figure 2 illustrates the UPA.
The arrival times of the signals at various antennas differ because of the different locations of the multiple antennas of the UPA. As shown in Appendix A, the far-field assumption is valid within the context of this study. Consequently, for UPAs, the propagation of 5G signals can be equivalently modeled as plane waves, indicating a uniform DoA across all array elements. Taking Figure 2 as an example, using the panel at the origin as the baseline panel, one can compute the DoA-related time delay, τ DoA , for each panel within the UPA relative to the baseline panel. The method for calculating τ DoA of any panel in the UPA relative to the baseline panel is accomplished by constructing a vector γ directed from the baseline panel toward that panel; the magnitude of this vector and angle ψ between this vector and DoA vector are determined. These parameters facilitate the computation of the propagation delay distance, d DoA , of the electromagnetic wave, converted into a temporal unit for deriving the τ DoA .
Based on the established parameters, the vector representing the position of the panel at the j-th row and i-th column relative to a standard reference panel is articulated in Cartesian coordinates as γ i , j = 0 , i d g , H , j d g , V . Furthermore, in the context of signal propagation, the direction of arrival is typically represented by the azimuth angle ϕ and elevation angle θ . Aiming to model the direction of arrival as a unit vector β , we employ the conversion relationship between the polar and Cartesian coordinate systems to ascertain the Cartesian coordinates of β :
x = sin θ cos ϕ y = sin θ sin ϕ z = cos θ
The delay associated with wave arrival can be equated to the projection of γ i , j in the direction of arrival. Given that the direction of arrival has been modeled as a unit vector β , calculating the delay d DoA , i , j is effectively equivalent to determining the dot product between γ i , j and β , as follows:
d DoA , i , j = γ i , j · β = i d g , H sin θ sin ϕ + j d g , V cos θ .
Then, the delay τ DoA , i , j = d DoA , i , j / c . In summary, for each array element of the UPA, we can derive its CIR as:
h i , j t = p = 0 P 1 α p δ t τ p τ DoA , i , j .
Furthermore, because 5G signals are digital, we consider discrete systems for reception. Let the sampling interval be T s . Then, the above equation can be expressed as:
h i , j n T s = p = 0 P 1 α p δ n T s τ p τ DoA , i , j .
If expressed as a sequence, the above equation can be further reduced to:
h i , j n = p = 0 P α p δ n m p m DoA , i , j .
where m p = τ p T s is a quantized representation of the multipath delay and m DoA , i , j = τ DoA , i , j T s is a quantized representation of the relative delay of the antenna panel.
When considering the CIR matrix h characterized by the dimensions I × J × N , a simplification is proposed for ease of understanding. This entails consolidating the matrix along the J dimension, effectively reducing the two-dimensional matrix formed by the I and J dimensions to a one-dimensional matrix h v . The correspondence between the elements is as follows:
h v i × J + j , n = h i , j , n ,
where i = 0 , 1 , 2 , , I 1 , j = 0 , 1 , 2 , , J 1 , n = 0 , 1 , 2 , , N 1 . Thus, the dimensions of the reduced matrix h v are I J × N .
The presence of multipath effects leads to frequency-selective fading during signal propagation. The essence of 5G systems lies in their foundation as orthogonal frequency-division multiplexing (OFDM) systems, where the signal design is predominantly executed in the frequency domain. Given these considerations, transforming the CIR h v into the CFR H v is imperative. This transformation requires the application of a discrete Fourier transform (DFT) to h v :
H v i × J + j , k = n = 0 N 1 h v i × J + j , n e j 2 π k N n = n = 0 N 1 p = 0 P 1 α p δ ( n m p m DoA , i , j ) e j 2 π k N n = p = 0 P 1 α p e j 2 π k N m p + m DoA , i , j
In the 5G localization system, N = N f , where N f is the order of the Fourier transform of the unit OFDM symbols. Its value is determined by the number of subcarriers N c , which is related to N f as N f = 2 log 2 N c . Furthermore, because the number of subcarriers per resource block (RB) is fixed at 12, the number of subcarriers N c again depends on the number of RBs allocated to the UE by the BS. In summary, N depends on the number of RBs.

3.2. Problem Formulation

In practical measurements, collecting samples from various NLoS scenarios is infeasible. Consequently, the accuracy of supervised learning using the collected NLoS/LoS samples is debatable. Even if a model achieves high scores within the test set of a study, its precision and applicability may be challenged upon its introduction to new environments.
Therefore, one solution is to extract only the features of the LoS to discriminate the NLoS from mismatched features. Thus, we placed only the LoS data in the training set, allowing the model to fully extract the potential features of the LoS samples. However, to verify the effectiveness of the extracted features in the validation set, we collected a certain number of NLoS samples from the same scene.
In addition, to validate the cross-scene adaptability of the proposed method, we selected the data measured under different scenarios. In summary, the primary goal of the model is to fully extract the features of the LoS, followed by learning the method and basis of discrimination based on these features.

3.3. Network Inputs

In Section 3.1, we derived the CFR matrix, denoted as H v , with dimensions of I J × N f . Concurrently, it was established that N f N c , where the discrepancy between the two values was attributed to the insertion of zeros during the Fourier transform process. Moreover, within the OFDM modulation procedure, the system translocated the zero-frequency component from the center to the start of the spectrum. Consequently, reconstructing the original information necessitated an initial cyclic shift in H v followed by the removal of the inserted zeros. The resultant matrix H c is defined as:
H c i × J + j , k = H v i × J + j , N f N c 2 + k , k = 0 , 1 , 2 , , N c 2 1 H v i × J + j , k N c 2 , k = N c 2 , N c 2 + 1 , N c 2 + 2 , , N c 1
When designing OFDM systems, researchers have considered that multipaths can lead to intersymbol interference (ISI) in the propagation of signals, which can severely damage the orthogonality between the subcarriers. Therefore, OFDM systems add protection intervals before successive symbols to limit the ISI, typically by adding a cyclic prefix (CP). During the development of the 5G protocol, the 3GPP specified two types of CPs: normal and extended. In this study, we used a normal CP, defined as:
N CP , l μ = 144 κ · 2 μ + 16 κ l = 0 or l = 7 · 2 μ 144 κ · 2 μ l 0 and l 7 · 2 μ
where l denotes the OFDM symbol index relative to a reference; the parameter μ represents the subcarrier spacing configuration, with the corresponding subcarrier spacing being Δ f = 2 μ · 15 kHz . The variable κ is a constant, signifying the ratio between the basic time units for LTE and 5G, valued at 64. For the convenience of subsequent derivations, we assume that the length of the CP exceeds the maximum delay produced by multipath propagation. Furthermore, we define a constant N t = 144 κ · 2 μ as the upper limit for the delay dimension in the following ADCPM.
Based on the available knowledge, the most intuitive manifestation of multipath is the diversity of the arrival time delay and angles. To further optimize the feature extraction for the NLoS, we transform the H c matrix into the ADCPM matrix P . To this end, we define the phase-shifted DFT matrices V I = v I r , s I × I and V J = v J r , s J × J , where:
v I r , s = 1 I e j 2 π r s I 2 I ,
v J r , s = 1 J e j 2 π r s J 2 J .
Then, we consider the submatrix of dimensions N c × N CP , obtained from the inverse DFT matrix F 1 , where f 1 r , s = 1 N c e j 2 π r s N c . In summary, we can initially derive the angle-delay channel response matrix (ADCRM) as:
G = 1 I J N c V I H V J H H c F 1 ,
where V I H and V J H denote the conjugate transpose of V I and V J , respectively, and ⊗ represents the Kronecker product between the two matrices. However, its complex form renders the matrix less intuitive for neural networks. Thus, it is necessary to further transform the ADCRM into an ADCPM as:
X = E G G * ,
where E and ⊙ represent the expectation of the quantity of interest and Hadamard product between the two matrices, respectively.
Owing to its intuitive reflection of the arrival angles and delays, the ADCPM can more directly reveal the characteristics of the NLoS. Simultaneously, we demonstrate that the ADCPM is sparse and the elements of the matrix are real numbers, making it more suitable for feature extraction using CNN-type networks than CFR. Therefore, this study employed the ADCPM as the input to the NLoS identification network.

3.4. DACT-GAN

The generalized NLoS identification method based on DACT-GAN proposed in this study consists of three main components: an AE, a channel transformer ( C T ), and a GAN. A schematic of the model is shown in Figure 3. In the center of the figure is AE, which includes an encoder ( E n ) and a decoder ( D e ). E n is responsible for extracting the latent core features of ADCPM. The E n attaches the C T , which performs a spatial transformation on the input samples and then encodes them. The loss function combines the two encoding results to reduce the influence of peak position on feature extraction. The D e is used to pair with the E n , construct the loss function, and complete unsupervised learning. After ADCPM encoding is complete, the encoded samples are input into the GAN discriminator (D) to determine whether they are LoS samples or NLoS samples. The GAN generator (G) is responsible for generating fake ADCPM samples, passing them through the encoder, and comparing them with the real encoded samples to complete the joint training of G and D. Note that during testing, NLoS identification only requires the E n and D to complete the task. Hence, the actual operating rate is very high.
For convenience, we denote the ADCPM samples used for training as X , where the i-th sample is X i .
The AE facilitates model training by minimizing the reconstruction error [76]. Specifically, the E n has layers with progressively decreasing dimensions and is tasked with extracting the latent core features of the sample X i , making it exceptionally suitable for NLoS identification. We use Equation z i = E n X i to denote the encoding procedure that the encoder performs on the ADCPM samples, where z i is the encoded form of X i .
The decoder is symmetrical to the encoder, which is responsible for restoring the encoded sample z i to its original form. If the core feature is not satisfied, the sample X i ^ recovered by the decoder will be far from the original sample X i . In this study, we utilized this feature to extract the latent features of the ADCPM and thoroughly learn the features of the LoS to accomplish NLoS identification. We use Equation X i ^ = D e z i to denote the process by which the decoder reconstructs z i into X i ^ .
However, the construction of an NLoS identification database requires measurement data from multiple positions within a scene to various BSs, resulting in inevitable variations in the distance and arrival angles between the BS and UE. Additionally, according to the definition of the ADCPM, under LoS conditions, the ADCPM accentuates the peak of the first-arrival path. Consequently, the features extracted by the AE inherently consider the position of the peak in the ADCPM, which is counterproductive for NLoS identification. To address this, we designed a C T that modifies the original sample X i before feature extraction by the encoder, resulting in X i , c . This X i , c is then encoded as z i , c . This approach aimed to minimize the discrepancy between z i , c and z i , thereby reducing the effect of the peak position on the AE encoding. We use Equation X i , c = C T X i to denote the spatial transformation process. Since the encoding process of X i , c is the same as that of X i , it can be denoted by z i , c = E n X i , c , where z i , c is the encoded form of X i , c .
The extracted features are used for NLoS identification. Based on problem modeling, we formulated the NLoS identification as a binary classification problem. The GAN is an excellent approach when only LoS data are available [77,78]. On the ond hand, G can generate diverse false samples based on noise, facilitating NLoS discrimination in the shortage of NLoS ADCPM samples [79]. On the other hand, with the LoS as the real sample, D can accomplish NLoS identification by discerning whether a sample is an LoS sample.

3.5. Loss Function

For the DACT-GAN, three losses must be computed: the DACT loss, G loss, and D loss. The purpose of the AE of the DACT is to fully extract the potential features of the ADCPM samples in the LoS environment, and joint training of the E n and D e is conducted to minimize the reconstruction error. Therefore, we chose the mean square error as a measure of the reconstruction error, which can be expressed as:
L DACT , AE = 1 B i = 1 B X i X i ^ 2 ,
where B denotes the number of samples in the batch.
Considering the presence of C T , we want the output of the samples before and after the transformation through AE to be approximate; therefore, we consider the C T part of the DACT loss as:
L DACT , C T = 1 B i = 1 B z i z i , c 2 .
By amalgamating the components mentioned above for the DACT loss, we define L D A C T as:
L DACT = ν L DACT , C T + 1 ν L DACT , AE ,
where ν [ 0 , 1 ) denotes the percentage of C T -supervised AE feature extraction.
The AE part of the training process is described in Algorithm 1.
Algorithm 1. DACT Training Procedure
  1:
procedure Training(batch size B)         ▹ Batch number j
  2:
    Clear the parameter gradients of AE and C T .
  3:
    for  i = 1 , 2 , , B  do
  4:
        Encode the training sample X i to z i .
  5:
        Decode z i to X i ^ .
  6:
        Spatially transform X i to X i , c .
  7:
        Encode the transformed X i , c to z i , c .
  8:
   end for
  9:
   Calculate the loss L DACT .
10:
   Perform backward-pass.
11:
   Update the parameters of AE and C T .
12:
end procedure
The role of G in the GAN is to map a known distribution, which we specify as an unknown distribution, followed by real samples. Conversely, the role of D is to discriminate whether the input is a sample generated by a G or a real sample. Specifically, G generates samples that are as close as possible to the real sample, whereas D discriminates as much as possible between the samples generated by the generator, which we call false samples. Thus, they form an adversarial relationship. According to the formulation of the problem, the process of the D discriminating between the samples can be categorized as a binary classification problem; therefore, the process can be measured using binary cross-entropy, which can be expressed as follows:
arg min D max G E X p d a t a X log D [ E n ( X ) ] + E n g N ( 0 , 1 ) log 1 D E n [ G ( n g ) ]
where we define n g as the original noise conforming to a Gaussian distribution. However, in the actual training process, this adversarial relationship involves alternating instead of simultaneous updates; therefore, the formula can be further decomposed into D and G losses, where the D loss function can be expressed as:
L D = 1 B i = 1 B log [ D ( z i ) ] + log 1 D E n [ G ( n g , i ) ]
and the loss function of G can be defined as:
L G = 1 B i = 1 B log ( 1 D E n [ ( G ( n g , i ) ] .
In summary, the training of a GAN can be described using Algorithms 2 and 3.
Algorithm 2. Discriminator Training Procedure
  1:
procedure Training(batch size B)          ▹ Batch number j
  2:
    Clear the parameter gradients of G and the D
  3:
    for  i = 1 , 2 , , B  do
  4:
        Encode the real training sample X i to z i .
  5:
        Input z i to D for NLoS identification.
  6:
    end for
  7:
    Compute L D , real by comparing the prediction to the label of the real sample.
  8:
    Perform backward-pass.
  9:
    for  i = 1 , 2 , , B  do
10:
        Generate Gaussian noise n g , i .
11:
        Generate fake samples: X g , i = G ( n g , i ) .
12:
        Encode the generated sample X g , i to z g , i .
13:
        Input z g , i to D for NLoS identification.
14:
    end for
15:
    Compute L D , fake by comparing the prediction to the label of the fake sample.
16:
    Perform backward-pass.
17:
    Compute total L D : L D = 1 2 ( L D , real + L D , fake )
18:
    if  L D Discriminator’s error threshold then
19:
        Update parameters of D
20:
    end if
21:
end procedure
Algorithm 3. Generator Training Procedure
  1:
procedure Training(batch size B)          ▹ Batch number j
  2:
    Clear the parameter gradients of G and the D
  3:
    for  i = 1 , 2 , , B  do
  4:
        Generate Gaussian noise n g , i .
  5:
        Generate fake samples: X g , i = G ( n g , i ) .
  6:
        Encode the generated sample X g , i to z g , i .
  7:
        Input z g , i to D for NLoS identification.
  8:
    end for
  9:
    Compute L G by comparing the prediction to the label of the real sample.
10:
    Perform backward-pass.
11:
    if  L G Generator’s error threshold then
12:
        Update parameters of G
13:
    end if
14:
end procedure
Notably, throughout this study, the adaptive momentum (Adam) optimizer was uniformly employed to facilitate the gradient update for each model.

4. Simulation Experiments

4.1. Scenario Set

To evaluate the effectiveness of the DACT-GAN approach for NLoS recognition, we meticulously simulated the signal propagation in indoor and indoor factory (dense clutter, low BS; hereafter referred to as InF-DL) scenarios, strictly adhering to the 3GPP TR 38.901 standard [19]. The purpose of this study was to test the efficacy of the proposed method under different training and testing scenarios. The channel simulation encompassed four modules: system initialization, large-scale parameter generation, small-scale parameter generation, and multipath coefficient generation. In particular, the time-variant spatial consistency was considered in the simulation to obtain realistic channel characteristics.
First, we considered the common settings. In both scenarios, 272 RBs were allocated to broadcast the SRS with a subcarrier spacing of 120 KHz . Thus, N c = 272 × 12 = 3264 , N f = 2 log 2 N c = 4096 , N t = 144 κ · 2 μ = 1152 . Notably, N t is defined in terms of 5G time units T c , i.e., N t , T c = N t , where T c = 1 Δ f m a x · N f , m with Δ f m a x = 480 KHz and N f , m = 4096 .
Therefore, in systems with different configurations, the number of samples occupied by the CP needs to be multiplied by a coefficient ζ = T c T s . Based on the above configuration, the coefficient ζ = T c T s = f s f c = 4096 120 10 3 4096 480 10 3 = 1 4 in terms of the system samples; therefore, the length of the CP in terms of the system sample time is N t , T s = N t , T c · ζ = 1152 × 1 4 = 288 . The transmission power of the UE signal, according to 3GPP TS 38.101-1, is set to 23 dBm, which is the maximum output power for FR1 power class 3 [80]. The SRS itself is configured considering K TC = 2 ,   N symb SRS = 1 , C SRS = 61 ,   B SRS = 0 , b hop = 0 , n RRC = 0 . In addition, we considered that the BS receives the SRS uplink signal to compute the ADCPM, where we set the dimensions of the UPA panel to J g = I g = 8 .
Next, we considered the unique characteristics of the different scenarios. For the indoor scenario, an office measuring 120 m × 50 m was set at a ceiling height of 3 m . The BS was at the same height as the ceiling, that is, h BS = 3 m . Twelve BSs, spaced 20 m apart, were considered. A schematic of the BS positions for the entire scenario is shown in Figure 4. Additionally, the positions of the UE in the scenario were randomly distributed, with the height set to h UE = 1 m . The frequency of the signal transmission carrier was set to f c = 2.565 GHz .
For the InF-DL scenario, the hall size was set to 300 m × 150 m , with a ceiling height of 10 m . The BS height was h BS = 1.5 m , with an interstation spacing of 50 m ; in total, 18 BSs were distributed in the scenario. The height of the UE was h UE = 1.5 m . The signal transmission carrier frequency was set to f c = 3.5 GHz . A schematic of the BS positions for the entire scenario is shown in Figure 5.
For the above scenarios, simulations were conducted for both the LoS and NLoS conditions, ultimately forming four types of datasets. Initially, the SRS signals were generated at the UE end. After channel propagation to the BS end, they were downconverted at the BS. Subsequently, operations such as correlation were conducted to extract the receiver’s H . Subsequently, the ADCPM received at each BS from the UE was obtained through transformation.

4.2. Dataset Generation and Testing Platform

Simulations were conducted separately for the two aforementioned scenarios, as well as for the four cases involving LoS and NLoS propagation within these scenarios. Specifically, 65,040 indoor LoS samples were simulated for model training. Additionally, we simulated 5040 indoor LoS samples and 5040 indoor NLoS samples to validate the effectiveness of the proposed method. For the test scenarios, we simulated 35,040 samples each for LoS and NLoS propagation in the InF-DL scenario to evaluate the cross-scenario performance of the method.
The implementation of the test model, along with its training and testing, was conducted using PyTorch 1.10.0 with Python 3.8.18. The simulation platform chosen was equipped with AMD Ryzen™ 5 5600 @ 3.5 GHz, 64 GB of RAM, and NVIDIA GeForce RTX 4060 Ti 16 GB GPU.

4.3. Network Components and Specific Parameters

According to the design of the DACT-GAN, the entire network architecture consists of five parts: E n , D e , C T , G, and D.
The E n and D e were inspired by the architecture design of SegNet [76], with five pairs of symmetric encoding/decoding layers. The encoding/decoding layers extract or restore the features through convolution and perform batch normalization and rectified linear unit (ReLU)-based activation after the convolution. Each encode/decode layer contains two pairs of convolution–BatchNorm–ReLU operations. The first pair is responsible for expanding the feature dimension, while the second pair focuses on hierarchical feature learning. In this paper, the numbers of convolution filters in the E n ’s convolutional layers are 8, 8, 16, 16, 32, 32, 64, 64, 128, and 128. In contrast, the numbers of filters in the D e ’s convolutional layers are 128, 64, 64, 32, 32, 16, 16, 8, 8, and 1. All the convolution filters have dimensions of 3 × 3 , with a stride of 1 and padding of 1. Adjacent encoding/decoding layers utilize max-pooling and max-unpooling layers for downsampling and upsampling of the feature maps, respectively. The max-pooling layer employs a 2 × 2 non-overlapping window with a stride of 2. To implement the maximum unpooling layer, it is feasible to save the pooling indices during the maximum pooling stage and input them into the D e . This approach allows upsampling during the deconvolution process based on the indices.
The function of the C T is to perform spatial transformations on the ADCPM. Considering the ADCPM as a one-channel image, we aimed to minimize the effect of the peak positions on the AE feature extraction. Random transformations, such as translation and rotation, must be applied to the images. These transformations fundamentally involved updating the pixel positions and can be mathematically expressed as:
x i s y i s = A θ x i t y i t 1 = θ 11 θ 12 θ 13 θ 21 θ 22 θ 23 x i t y i t 1 ,
where x i t , y i t represents the pixel index of the transformed image, x i s , y i s denotes the pixel index of the original image, and A θ is the affine transformation matrix. In this study, we adopted the concept of the STN [81], utilizing convolutional and linear layers to extract the image features to obtain the sample-specific A θ . Then, we established a mapping between the source and target images and sampled the original image to generate the transformed image based on A θ .
For the G of the GAN, we did not generate the feature map encoded by the AE to facilitate the direct observation of the output of the G. Instead, we produced the original ADCPM and passed it through the E n . The encoded samples were subsequently fed to D for training. We defined the input noise dimension to be the same as that of the encoded ADCPM. The generation process involved four upsampling layers, each comprising a transpose convolution layer, batch normalization layer, and ReLU activation, followed by a final transpose convolution and tanh activation layer to constrain the output range, resulting in the generated ADCPM. In the transpose convolution layers, we set the window size to 4 × 4 , stride to 2, and padding to 1.
For the D of the GAN, we initially assumed that the latent features extracted from the ADCPM by the AE would not retain spatial hierarchies. Furthermore, we posited that the AE purified the core features of the ADCPM during feature extraction. Thus, we designed D based on an MLP. However, the study did not yield satisfactory results. Consequently, we constructed D based on CNNs. Specifically, we built two feature extraction layers: a flattened layer to unfold the feature map and a fully connected layer with a sigmoid function to output the probabilities. The output, due to its sigmoid nature, has a bounded range between 0 and 1. It is reasonable to infer that if the value of D X i is greater than 0.5, the input sample is a LoS sample; otherwise, it is an NLoS sample. In the feature extraction layers, convolution was applied to the inputs with kernel sizes of 2 × 2 and 1 × 2 , stride of 1, and padding of 0. Subsequently, activation was performed using Leaky ReLU with a negative slope of 0.2. To prevent an overly strong D from impairing the training of G, we inserted dropout layers between successive convolutional layers to randomly discard the pixels and set the dropout rate to 30%.
Finally, for the AE, the learning rate of the Adam optimizer was set to l r AE = 0.0001 , with momentum parameters β 1 , AE = 0.9 and β 2 , AE = 0.999 . The learning rates for G and D were both set to l r G = l r D = 0.0002 , with momentum parameters β 1 , G = β 1 , D = 0.5 and β 2 , G = β 2 , D = 0.999 .

4.4. Baselines

To evaluate the proposed model effectively, we compared it with a series of SOTA models that address the problem of NLoS identification.
  • KDE [33]. This method is effective when the sample probability distribution is unknown. The principle of KDE is to fit the LoS distribution by taking a portion of the training sample z j j = 1 N b as the baseline for the LoS distribution and then calculating the probability density of the input samples in the LoS distribution, i.e., κ z i | z j j = 1 N b = 1 N b j = 1 N b k h z i z j . k h is the kernel function with bandwidth h; universally, the Gaussian model is used, i.e., k h x = e x 2 2 h 2 .
  • Random Forest [49]. The random forest method, a supervised learning algorithm, necessitates the labeling of NLoS for classification learning. It uses bagging to partition the training set into several subsets and train numerous decision tree models. Test samples are dispatched to several decision trees for analysis, and the model consolidates the classification outcomes from all decision trees and votes to ascertain whether it is NLoS propagation.
  • AE-KDE [68]. This approach consists of two steps. Initially, train an autoencoder to thoroughly investigate the latent properties of the training samples. Subsequently, a selection of the encoded samples is utilized as the baseline, and the KDE approach is employed to ascertain if the test sample conforms to the LoS probability distribution, hence indicating whether it represents LoS propagation.
  • GANomaly [71]. This model utilizes a generator network composed of an encoder–decoder–encoder architecture with a discriminator that evaluates the latent features encoded from both samples and their reconstructions. Because the training process involved only LoS samples, the input of the NLoS samples caused significant reconstruction errors, thereby enabling the effective identification of NLoS during the testing phase.

5. Results and Discussions

5.1. Data Processing

Data preprocessing plays a crucial role in scenario testing, where various factors, including the distance between the terminal and signal source and the presence of obstructions, can influence the magnitude of the channel samples, thus making it necessary to preprocess the training and testing samples for more accurate discrimination. The two standard methods are min-max normalization and Z-score normalization. Min-max normalization scales all sample values by obtaining the maximum value in the data, ensuring that all values fall within the range of [0, 1]. In contrast, Z-score normalization first calculates the variance and expectation of the sample values and then applies the transformation x μ σ to standardize the samples to a mean of 0 and variance of 1. Through testing, we found that min-max normalization significantly outperformed Z-score normalization. One explanation for this result is that the E n in this study was designed based on a CNN, which utilizes ReLU as the activation function in the hidden layers, whereas using Z-score normalization may result in the loss of some data information. Figure 6 illustrates the variation in the model training efficiency for different data normalization methods.

5.2. Batch Size

In the process of training the DACT-GAN, adjusting the batch size has a significant influence on the stability and effectiveness of model training. In Figure 7, we analyze the NLoS identification accuracy that DACT-GAN can achieve after training for 20 epochs when the batch size B 16 , 32 , 64 , 80 , 96 , 112 , 128 , 160 . We observed that the training was unstable when B was relatively small. We attribute this to the increased variance in the gradient estimation and instability in the model update direction during the AE training process with a smaller B. Furthermore, a smaller B tended to cause oscillations in the adversarial game between G and D. However, when B was larger, although the instability of the model was noticeably improved, an excessively large B weakened the generalization ability of the AE for new data, which is undesirable for cross-scene NLoS recognition. Consequently, considering the stability and generalization capability of the model as well as the consumption of computational resources and training duration, we ultimately determined B = 80 as the optimal batch size.
GAN architectures differ from conventional network designs, necessitating adversarial training between G and D. Successful network training cannot be achieved if either entity is too strong or weak. Instead of simply adjusting the learning rates, we employed two strategies to ensure stable GAN training and achieve the highest possible accuracy.

5.3. Label Smoothing

First, we adopted the label-smoothing technique to prevent D from confidently predicting the labels, which could cause G to produce highly similar or identical samples, a phenomenon known as mode collapse. By decreasing the values of the real sample labels and increasing those of fake labels, we moderate the learning process of D, enhancing the model’s generalization capability for unseen samples, and encourage G to produce more diverse samples. To determine the optimal real and fake sample label values, we iterated over all possible pairs of real and fake sample labels within the range 0 , 1 using 0.1 as the step size, across ten trials with training cycles of 20 epochs each. Scenarios in which the real sample label values are less than those of the fake samples are illogical and were, therefore, disregarded. As shown in Figure 8, the results indicate that the training is unstable when the real sample label is 1 and the fake sample label is 0, because of the D’s overconfidence.
Conversely, when both labels are low, the GAN training collapses and cannot be completed. Similarly, when both labels are high, G fails to complete the training because it hastily deems the samples as real. Ultimately, we deduced from the graph that the system achieves optimal performance when the real sample label is set to 0.6 and the fake sample label is set to 0.4.

5.4. Early Stopping

The second strategy for training a GAN involved early stopping. Considering the training of GANs required an adversarial process between G and D, it could destabilize the training process if either operation becomes too dominant. Therefore, we set loss thresholds for G and D, halting training when the loss of either G or D fell below these thresholds. This method aimed to maintain a dynamic balance between the training processes of G and D and saved computational resources and training time to a certain extent.
In this study, we set the generator’s loss threshold in the range 0.8 , 4 with a step of 0.4, and the discriminator’s loss threshold in the range 0.08 , 0.4 with a step of 0.04. These threshold ranges were selected based on the loss values of both the D and G when the early stopping strategy was not employed. The results, as illustrated in Figure 9, indicate that appropriately increasing the loss threshold of D, as opposed to that of G, can significantly enhance the training precision. This inference is based on the premise that the D is prone to overfitting in this context. Overfitting by D prevents the G from determining suitable gradients to improve the model. From the graph, we conclude that the system achieves optimal performance when the generator’s loss threshold is set to 3.2 and the discriminator’s loss threshold is set to 0.2.

5.5. Baseline Parameter Selection

This experiment aims to illustrate the effect of the AE-KDE parameter selection on the results of the baseline, which involves KDE, unlike other hyperparameters that only affect the training phase. The number of samples considered and the choice of kernel bandwidth h during KDE can affect the estimation performance. For this purpose, we conducted training and testing by setting different bandwidth values h, assuming the original sample size for KDE is 2048, with h 1 , 16 , 32 , 64 , 128 . The resulting LoS and NLoS distribution diagrams are shown in Figure 10. The horizontal axis represents the KDE output of each data sample. When the value of h is minimal, the distributions of LoS and NLoS cannot be separated, with both trending toward zero.
Conversely, when h is too large, NLoS identification becomes ineffective as the overall outputs of the LoS and NLoS samples tend toward 1. Ultimately, the separation effect between the LoS and NLoS samples was found to be the best when h = 64 , which was also used in subsequent comparative experiments. Furthermore, comparing the range of values indicated that the optimal decision threshold changed with variations in the h values. Therefore, although the AE-KDE method can generate an optimal distribution, its threshold selection is not fixed and poses certain recognition risks.

5.6. Computations and Memory Access Requirements

Recognizing NLoS situations is essential for terminal positioning computations in industrial location-based applications, especially in high-risk processes, where real-time updates of positioning data are vital for worker safety. Consequently, the model’s prediction speed is paramount, with swifter values being unequivocally superior. Consequently, we computed the necessary calculations and memory accesses for both the comparative technique and the proposed way. We utilize one ADCPM as the input sample.
To illustrate this table, we have derived the computational complexity and the amount of memory required for the KDE method. Initially, the kernel function necessitates the computation of the Euclidean distance between the test sample and the samples from the specified distribution, resulting in two floating-point operations per dimension: one for the difference and one for the square. Due to the differing sample dimensions of KDE and AE-KDE, the sample dimension is provisionally established as ι for presentation purposes. A total of 2 ι operations are necessary to compute the difference and the square of each dimension. Following the computation of the square of the difference in each dimension, it is essential to aggregate all dimensions, necessitating ι 1 operations. Ultimately, dividing by the coefficient, executing an exponential function operation, and subsequently normalizing necessitates around 17 operations. In conclusion, each kernel function necessitates 3 ι + 16 operations. Ultimately, by multiplying the number of test samples by the number of samples from the specified distribution, one can ascertain the computational requirements for the KDE approach. In this study, we specify that the sample size in the given distribution is 2048, necessitating 2048 × ( 3 ι + 16 ) operations. The memory utilized is predominantly expended while accessing the test samples and those inside the specified distribution during the computation of the kernel function, indicating that the memory usage is 8192 ι bytes.
Table 1 indicates that DACT-GAN has the minimal memory access requirement, as it does not necessitate temporary sample storage, relying solely on D for NLoS recognition throughout the testing phase. D’s simplified architecture results in the lowest processing requirements among machine learning approaches. The computational complexity of AE-KDE is analogous to that of DACT-GAN. Nevertheless, the application of the KDE technique requires the provisional retention of certain samples from the specified distribution, leading to increased memory consumption. Nonetheless, due to the encoding of the temporarily stored samples, the memory access demand is not excessive.
GANomaly requires greater computational resources because of its encoder–decoder–encoder architecture. Consequently, GANomaly’s computing demands significantly exceed those of DACT-GAN and AE-KDE. Ultimately, the KDE technique does not engage in neural network activities, resulting in minimal computational demands. Nonetheless, due to its continual necessity to access a substantial quantity of original samples, KDE’s memory access demands are the most significant among all methodologies.
It is important to recognize that random forests, being constructed from decision trees, primarily utilize comparative situations to ascertain LoS and NLoS. Consequently, the calculated amount is not comparable to that of other methods and is not presented in this table.

5.7. Performance Comparison

To objectively assess the performance of our proposed DACT-GAN, we trained our method and the baseline using LoS data from an indoor scenario. We performed tests using equal LoS and NLoS samples in the InF-DL scenario. Table 2 lists the average area under the curve (AUC), F-score, Accuracy, Precision, and Recall after training for 20 epochs.
We discovered that the KDE method signifies the lower bound. This outcome arises from the substantial variation in the ADCPM peak’s position relative to the distance and angle between the BS and UE in the test sample. Nevertheless, the KDE technique directly computes the Euclidean distance between the two ADCPMs. Consequently, it is easy to misinterpret LoS samples. Due to its utilization of many decision trees, the Random Forest technique can more effectively ascertain whether a sample qualifies as a LoS sample compared to KDE. Consequently, it attains superior performance compared to KDE. However, this method requires labeled NLoS training samples in practical applications, so it needs further consideration from the practical use perspective.
In the realm of unsupervised learning techniques, GANomaly considerably surpasses conventional machine learning and statistical approaches. The encoder effectively extracts the latent features of ADCPM. Nonetheless, GANomaly is heavily reliant on the data and presents considerable difficulties in enhancing performance due to the information loss associated with the encoding–decoding–encoding process.
In contrast, AE-KDE achieved the second-best performance in this test because the AE effectively learned the latent features of the LoS samples, and the KDE method learned and analyzed the probability density distribution of the LoS samples. Moreover, a log function was used to amplify the differences in probability density. However, this estimation is based on Gaussian kernel fitting, and the actual LoS propagation cannot be strictly assumed to follow a Gaussian distribution. Hence, perfect estimation cannot be achieved.
Finally, DACT-GAN outperformed the other two methods, partly because during the training of the AE, we diminished the influence of the ADCPM peak positions on feature extraction in the loss function, allowing the model to focus more on the latent features of the LoS samples. However, in comparison with the KDE method, the GAN is more adaptable to complex distributions that are difficult to describe using the existing mathematical models, thus achieving the best results in this test.

6. Conclusions

This study investigated the NLoS propagation identification problem in implementing high-accuracy positioning for 5G. First, we defined a 5G system model based on massive MIMO, analyzed the propagation of the uplink SRS under LoS conditions, and adopted the ADCPM transformation method as a sparse input to the network. Given the variability and unpredictability of NLoS, we used the LoS samples as the sole input to the network and innovatively proposed the DACT-GAN method. This method utilizes an AE to extract the features from the ADCPM while employing a C T to circumvent attention shifts caused by spatial location changes. Subsequently, we constructed a GAN in which fake samples generated by G introduce diversity into the training process, thereby enhancing the training of D, which ultimately serves as the NLoS identifier. Moreover, during the online phase, only the E n and D were used, significantly reducing the computational demands on the devices.
We conducted signal propagation simulations for the proposed method under 3GPP standards in both indoor and InF-DL scenarios. By separating the training and testing scenarios, we aimed to confirm the cross-scenario robustness of our proposed method. The test data showed that the proposed DACT-GAN is more effective than the SOTA DL models, requiring only 87.3% and 33.6% of the inference time of AE-KDE and GANomaly, respectively. Moreover, unlike the KDE method, our approach does not require fixed storage of many original distribution samples in the GPU memory during the online phase, significantly reducing the device resource demand. Furthermore, the DACT-GAN method addresses the issue of SOTA methods, wherein the identification threshold varies with the training hyperparameters or scenario changes. Finally, our method improved the performance by 2.15% and 8% compared to AE-KDE and GANomaly, respectively.
Mobile communication networks, poised to evolve into vast distributed neural networks in the upcoming 6G era, will integrate communication, perception, and computing capabilities, extending from human connectivity and the Internet of Things to comprehensive intelligent connectivity for everything. At the same time, semantic coding based on multimodal information such as images, voice, and text will gradually replace traditional source coding. Therefore, efficient and accurate image information extraction is an important research direction.
When it comes to cellular positioning, neural networks’ hardware foundation will enable communication networks to have ML capabilities. The development of the Internet of Everything has created a demand for positioning from numerous nodes within the industrial Internet to home local area networks. High-precision positioning is even more necessary for applications such as safe production and elderly care. In complex environments such as factories and indoors, non-line-of-sight signal propagation can seriously affect the measurement of arrival time, which in turn affects positioning accuracy. As a result, the NLoS recognition method proposed in this paper, based on deep learning, distinguishes between LoS and NLoS signal propagation from a recognition perspective. Moreover, the lower complexity allows nodes with lower power consumption in the industrial Internet to also complete NLoS recognition.
In subsequent research, we will explore NLoS suppression methods to deal with situations where the positioning source is insufficient for positioning after NLoS recognition. On the other hand, we will also explore multimodal positioning, combining information such as images and poses to compensate for the shortcomings of wireless positioning and achieve more reliable and higher-precision positioning to empower safety applications.

Author Contributions

Conceptualization, Y.G. and W.C.; methodology, Y.G. and Y.H.; software, Y.G. and Y.H.; validation, Y.H.; formal analysis, Y.G.; resources, Z.D.; writing—original draft preparation, Y.G.; writing—review and editing, Z.D. and W.C.; visualization, W.C.; supervision, Z.D.; project administration, Z.D.; funding acquisition, Z.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China (grant number: 2022YFB3904603).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of the Far-Field Assumption in This Paper

This study considered the propagation of 5G signals in a sub-6 GHz environment. The far-field assumption is valid when the distance d between the antennas is significantly greater than the wavelength of the electromagnetic wave, with the empirical threshold being twice the wavelength. Based on the simulated scenarios, two propagation environments were considered: InF-DL and indoor. Considering the fixed height of the UE but with random positioning, only the height difference was evaluated. In the InF-DL scenario, the BS height was h BS = 1.5 m , and the UE height was h UE = 1 m , resulting in a height difference of d = 0.5 m . In this scenario, with the center frequency of the 5G signal set at f c = 3.5 GHz , the wavelength λ = c f c = 0.086 m according to the wave equation λ f = c , where c is the speed of light. Thus, d / λ = 5.81 > 2 , satisfying the far-field assumption.
Similarly, for the indoor scenario, with the BS height at h BS = 3 m and UE height at h UE = 1 m , the height difference was d = 2 m . With a signal center frequency of f c = 2.565 GHz , the wavelength is λ = 0.12 m , and d / λ = 16.67 > 2 , also meeting the far-field assumption.

References

  1. Guo, X.; Ansari, N.; Hu, F.; Shao, Y.; Elikplim, N.R.; Li, L. A Survey on Fusion-Based Indoor Positioning. IEEE Commun. Surv. Tutor. 2020, 22, 566–594. [Google Scholar] [CrossRef]
  2. Dao, D.; Rizos, C.; Wang, J. Location-Based Services: Technical and Business Issues. GPS Solut. 2002, 6, 169–178. [Google Scholar] [CrossRef]
  3. Chen, R.; Guo, G.; Chen, L.; Niu, X. Application Status, Development and Future Trend of High-Precision Indoor Navigation and Tracking. Geomat. Inf. Sci. Wuhan Univ. 2023, 48, 1591–1600. [Google Scholar] [CrossRef]
  4. Li, Y.; Ma, L.; Zhong, Z.; Liu, F.; Chapman, M.A.; Cao, D.; Li, J. Deep Learning for LiDAR Point Clouds in Autonomous Driving: A Review. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 3412–3432. [Google Scholar] [CrossRef] [PubMed]
  5. Guo, X.; Ansari, N.; Li, L.; Duan, L. A Hybrid Positioning System for Location-Based Services: Design and Implementation. IEEE Commun. Mag. 2020, 58, 90–96. [Google Scholar] [CrossRef]
  6. Sun, X.; Ansari, N. EdgeIoT: Mobile Edge Computing for the Internet of Things. IEEE Commun. Mag. 2016, 54, 22–29. [Google Scholar] [CrossRef]
  7. Jin, S.; Wang, Q.; Dardanelli, G. A Review on Multi-GNSS for Earth Observation and Emerging Applications. Remote Sens. 2022, 14, 3930. [Google Scholar] [CrossRef]
  8. Garrido, M.S.; Giménez, E.; de Lacy, M.C.; Gil, A.J. Surveying at the Limits of Local RTK Networks: Test Results from the Perspective of High Accuracy Users. Int. J. Appl. Earth Obs. Geoinf. 2011, 13, 256–264. [Google Scholar] [CrossRef]
  9. Wen, W.W.; Zhang, G.; Hsu, L.-T. GNSS NLOS Exclusion Based on Dynamic Object Detection Using LiDAR Point Cloud. IEEE Trans. Intell. Transp. Syst. 2021, 22, 853–862. [Google Scholar] [CrossRef]
  10. Zheng, Z.; Sun, X.; Wen, Z.; Wang, X.; Fan, W.; Yan, H.; Li, Y. Indoor Localization and Trajectory Correction with Point Cloud-Derived Backbone Map. Int. J. Appl. Earth Obs. Geoinf. 2024, 129, 103783. [Google Scholar] [CrossRef]
  11. Liu, T.; Li, B.; Chen, G.; Yang, L.; Qiao, J.; Chen, W. Tightly Coupled Integration of GNSS/UWB/VIO for Reliable and Seamless Positioning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 2116–2128. [Google Scholar] [CrossRef]
  12. Wang, Y.; Yang, X.; Zhao, Y.; Liu, Y.; Cuthbert, L. Bluetooth Positioning Using RSSI and Triangulation Methods. In Proceedings of the 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2013; pp. 837–842. [Google Scholar]
  13. Alarifi, A.; Al-Salman, A.; Alsaleh, M.; Alnafessah, A.; Al-Hadhrami, S.; Al-Ammar, M.A.; Al-Khalifa, H.S. Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances. Sensors 2016, 16, 707. [Google Scholar] [CrossRef] [PubMed]
  14. He, S.; Chan, S.-H.G. Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons. IEEE Commun. Surv. Tutor. 2016, 18, 466–490. [Google Scholar] [CrossRef]
  15. Li, Q.; Zhuang, Y.; Huai, J. Multi-Sensor Fusion for Robust Localization with Moving Object Segmentation in Complex Dynamic 3D Scenes. Int. J. Appl. Earth Obs. Geoinf. 2023, 124, 103507. [Google Scholar] [CrossRef]
  16. Liu, G.; Hou, X.; Huang, Y.; Shao, H.; Zheng, Y.; Wang, F.; Wang, Q. Coverage Enhancement and Fundamental Performance of 5G: Analysis and Field Trial. IEEE Commun. Mag. 2019, 57, 126–131. [Google Scholar] [CrossRef]
  17. Keating, R.; Säily, M.; Hulkkonen, J.; Karjalainen, J. Overview of Positioning in 5G New Radio. In Proceedings of the 2019 16th International Symposium on Wireless Communication Systems (ISWCS), Oulu, Finland, 27–30 August 2019; pp. 320–324. [Google Scholar]
  18. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Study on NR Positioning Support. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3501 (accessed on 23 August 2023).
  19. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Study on Channel Model for Frequencies from 0.5 to 100 GHz. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3173 (accessed on 26 August 2023).
  20. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NG Radio Access Network (NG-RAN); Stage 2 Functional Specification of User Equipment (UE) Positioning in NG-RAN. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3310 (accessed on 23 August 2023).
  21. Cao, B.; Wang, S.; Ge, S.; Liu, W. Improving the Positioning Accuracy of UWB System for Complicated Underground NLOS Environments. IEEE Syst. J. 2022, 16, 1808–1819. [Google Scholar] [CrossRef]
  22. Feng, D.; Peng, J.; Zhuang, Y.; Guo, C.; Zhang, T.; Chu, Y.; Zhou, X.; Xia, X.-G. An Adaptive IMU/UWB Fusion Method for NLOS Indoor Positioning and Navigation. IEEE Internet Things J. 2023, 10, 11414–11428. [Google Scholar] [CrossRef]
  23. Wang, G.; Zhu, W.; Ansari, N. Robust TDOA-Based Localization for IoT via Joint Source Position and NLOS Error Estimation. IEEE Internet Things J. 2019, 6, 8529–8541. [Google Scholar] [CrossRef]
  24. 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; 5G System; Location Management Services; Stage 3. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3407 (accessed on 23 August 2023).
  25. Chen, P.-C. A Non-Line-of-Sight Error Mitigation Algorithm in Location Estimation. In Proceedings of the 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466), New Orleans, LA, USA, 21–24 September 1999; Volume 1, pp. 316–320. [Google Scholar]
  26. Aghaie, N.; Tinati, M.A. Localization of WSN Nodes Based on NLOS Identification Using AOAs Statistical Information. In Proceedings of the 2016 24th Iranian Conference on Electrical Engineering (ICEE), Shiraz, Iran, 10–12 May 2016; pp. 496–501. [Google Scholar]
  27. Wang, Y.; Yang, H.; Gong, Y. A Positioning Algorithm Based on Improved Robust Extended Kalman Filter with NLOS Identification and Mitigation. Eurasip J. Wirel. Commun. Netw. 2023, 2023, 60. [Google Scholar] [CrossRef]
  28. 5G Channel Model for Bands up to 100 GHz. Available online: https://prepareforchange.net/wp-content/uploads/2018/12/5G_Channel_Model_for_bands_up_to100_GHz2015-12-6.pdf (accessed on 6 September 2023).
  29. Li, S.; Shen, Y.; Wang, Y.; Zhang, J.; Li, H.; Zhang, D.; Li, H. PiDiNet-TIR: An Improved Edge Detection Algorithm for Weakly Textured Thermal Infrared Images Based on PiDiNet. Infrared Phys. Technol. 2024, 138, 105257. [Google Scholar] [CrossRef]
  30. Yu, X.; Liang, X.; Zhou, Z.; Zhang, B.; Xue, H. Deep Soft Threshold Feature Separation Network for Infrared Handprint Identity Recognition and Time Estimation. Infrared Phys. Technol. 2024, 138, 105223. [Google Scholar] [CrossRef]
  31. Yu, X.; Liang, X.; Zhou, Z.; Zhang, B. Multi-Task Learning for Hand Heat Trace Time Estimation and Identity Recognition. Expert Syst. Appl. 2024, 255, 124551. [Google Scholar] [CrossRef]
  32. Diao, H.; Zhao, J. CMD-Based NLOS Identification and Mitigation in Wireless Sensor Networks. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  33. Lang, C.I.; Sun, F.-K.; Lawler, B.; Dillon, J.; Dujaili, A.A.; Ruth, J.; Cardillo, P.; Alfred, P.; Bowers, A.; Mckiernan, A.; et al. One Class Process Anomaly Detection Using Kernel Density Estimation Methods. IEEE Trans. Semicond. Manuf. 2022, 35, 457–469. [Google Scholar] [CrossRef]
  34. Yan, L.; Lu, Y.; Zhang, Y. An Improved NLOS Identification and Mitigation Approach for Target Tracking in Wireless Sensor Networks. IEEE Access 2017, 5, 2798–2807. [Google Scholar] [CrossRef]
  35. Atzeni, I.; Arnau, J.; Kountouris, M. Downlink Cellular Network Analysis With LOS/NLOS Propagation and Elevated Base Stations. IEEE Trans. Wirel. Commun. 2018, 17, 142–156. [Google Scholar] [CrossRef]
  36. Huang, C.; Molisch, A.F.; He, R.; Wang, R.; Tang, P.; Ai, B.; Zhong, Z. Machine Learning-Enabled LOS/NLOS Identification for MIMO Systems in Dynamic Environments. IEEE Trans. Wirel. Commun. 2020, 19, 3643–3657. [Google Scholar] [CrossRef]
  37. Galiotto, C.; Pratas, N.K.; Doyle, L.; Marchetti, N. Effect of LOS/NLOS Propagation on 5G Ultra-Dense Networks. Comput. Netw. 2017, 120, 126–140. [Google Scholar] [CrossRef]
  38. Wang, F.; Tang, H.; Chen, J. Survey on NLOS Identification and Error Mitigation for UWB Indoor Positioning. Electronics 2023, 12, 1678. [Google Scholar] [CrossRef]
  39. Sang, C.L.; Steinhagen, B.; Homburg, J.D.; Adams, M.; Hesse, M.; Rückert, U. Identification of NLOS and Multi-Path Conditions in UWB Localization Using Machine Learning Methods. Appl. Sci. 2020, 10, 3980. [Google Scholar] [CrossRef]
  40. Maranò, S.; Gifford, W.M.; Wymeersch, H.; Win, M.Z. NLOS Identification and Mitigation for Localization Based on UWB Experimental Data. IEEE J. Sel. Areas Commun. 2010, 28, 1026–1035. [Google Scholar] [CrossRef]
  41. Xiao, Z.; Wen, H.; Markham, A.; Trigoni, N.; Blunsom, P.; Frolik, J. Identification and Mitigation of Non-Line-of-Sight Conditions Using Received Signal Strength. In Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 7–9 October 2013; pp. 667–674. [Google Scholar]
  42. Tabaa, M.; Saadaoui, S.; Chehaitly, M.; Dandache, A. NLOS Identification for UWB Body Communications. Int. J. Comput. Appl. 2015, 124, 12–17. [Google Scholar] [CrossRef]
  43. Xiao, Z.; Wen, H.; Markham, A.; Trigoni, N.; Blunsom, P.; Frolik, J. Non-Line-of-Sight Identification and Mitigation Using Received Signal Strength. IEEE Trans. Wirel. Commun. 2015, 14, 1689–1702. [Google Scholar] [CrossRef]
  44. Wen, K.; Yu, K.; Li, Y. NLOS Identification and Compensation for UWB Ranging Based on Obstruction Classification. In Proceedings of the 2017 25th European Signal Processing Conference (EUSIPCO), Kos, Greece, 28 August–2 September 2017; pp. 2704–2708. [Google Scholar]
  45. Stahlke, M.; Kram, S.; Mumme, T.; Seitz, J. Discrete Positioning Using UWB Channel Impulse Responses and Machine Learning. In Proceedings of the 2019 International Conference on Localization and GNSS (ICL-GNSS), Nuremberg, Germany, 4–6 June 2019; pp. 1–6. [Google Scholar]
  46. Barral, V.; Escudero, C.J.; García-Naya, J.A.; Maneiro-Catoira, R. NLOS Identification and Mitigation Using Low-Cost UWB Devices. Sensors 2019, 19, 3464. [Google Scholar] [CrossRef] [PubMed]
  47. Kram, S.; Stahlke, M.; Feigl, T.; Seitz, J.; Thielecke, J. UWB Channel Impulse Responses for Positioning in Complex Environments: A Detailed Feature Analysis. Sensors 2019, 19, 5547. [Google Scholar] [CrossRef]
  48. Chang, T.; Jiang, S.; Sun, Y.; Jia, A.; Wang, W. Multi-Bandwidth NLOS Identification Based on Deep Learning Method. In Proceedings of the 2021 15th European Conference on Antennas and Propagation (EuCAP), Dusseldorf, Germany, 22–26 March 2021; pp. 1–5. [Google Scholar]
  49. Ramadan, M.; Sark, V.; Gutierrez, J.; Grass, E. NLOS Identification for Indoor Localization Using Random Forest Algorithm. In Proceedings of the 22nd International ITG Workshop on Smart Antennas, Bochum, Germany, 14–16 March 2018; pp. 1–5. [Google Scholar]
  50. De Sousa, M.N.; Thomä, R.S. Applying Random Forest and Multipath Fingerprints to Enhance TDOA Localization Systems. IEEE Antennas Wirel. Propag. Lett. 2019, 18, 2316–2320. [Google Scholar] [CrossRef]
  51. Kurniawan, E.; Zhiwei, L.; Sun, S. Machine Learning-Based Channel Classification and Its Application to IEEE 802.11ad Communications. In Proceedings of the 2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  52. Zhu, Y.; Xia, W.; Yan, F.; Shen, L. NLOS Identification via AdaBoost for Wireless Network Localization. IEEE Commun. Lett. 2019, 23, 2234–2237. [Google Scholar] [CrossRef]
  53. Chitambira, B.; Armour, S.; Wales, S.; Beach, M. NLOS Identification and Mitigation for Geolocation Using Least-Squares Support Vector Machines. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  54. Yang, X.; Zhao, F.; Chen, T. NLOS Identification for UWB Localization Based on Import Vector Machine. AEU J. Electron. Commun. 2018, 87, 128–133. [Google Scholar] [CrossRef]
  55. Krishnan, S.; Santos, R.X.M.; Ranier Yap, E.; Zin, M.T. Improving UWB Based Indoor Positioning in Industrial Environments through Machine Learning. In Proceedings of the 2018 15th International Conference on Control, Automation, Robotics and Vision (ICARCV), Singapore, 18–21 November 2018; pp. 1484–1488. [Google Scholar]
  56. Barral, V.; Escudero, C.J.; García-Naya, J.A. NLOS Classification Based on RSS and Ranging Statistics Obtained from Low-Cost UWB Devices. In Proceedings of the 2019 27th European Signal Processing Conference (EUSIPCO), A Coruna, Spain, 2–6 September 2019; pp. 1–5. [Google Scholar]
  57. Cui, Z.; Gao, Y.; Hu, J.; Tian, S.; Cheng, J. LOS/NLOS Identification for Indoor UWB Positioning Based on Morlet Wavelet Transform and Convolutional Neural Networks. IEEE Commun. Lett. 2021, 25, 879–882. [Google Scholar] [CrossRef]
  58. Nguyen, V.-H.; Nguyen, M.-T.; Choi, J.; Kim, Y.-H. NLOS Identification in WLANs Using Deep LSTM with CNN Features. Sensors 2018, 18, 4057. [Google Scholar] [CrossRef]
  59. Zeng, T.; Chang, Y.; Zhang, Q.; Hu, M.; Li, J. CNN-Based LOS/NLOS Identification in 3-D Massive MIMO Systems. IEEE Commun. Lett. 2018, 22, 2491–2494. [Google Scholar] [CrossRef]
  60. Zhu, Y.; Xu, B.; Wang, J.; Li, Y.; Qi, W. A Simple Efficient Lightweight CNN Method for LOS/NLOS Identification in Wireless Communication Systems. IEEE Commun. Lett. 2023, 27, 1515–1519. [Google Scholar] [CrossRef]
  61. Si, M.; Wang, Y.; Siljak, H.; Seow, C.; Yang, H. A Lightweight CIR-Based CNN With MLP for NLOS/LOS Identification in a UWB Positioning System. IEEE Commun. Lett. 2023, 27, 1332–1336. [Google Scholar] [CrossRef]
  62. Kong, Q. NLOS Identification for UWB Positioning Based on IDBO and Convolutional Neural Networks. IEEE Access 2023, 11, 144705–144721. [Google Scholar] [CrossRef]
  63. Chalapathy, R.; Menon, A.K.; Chawla, S. Anomaly Detection Using One-Class Neural Networks 2019. arXiv 2018, arXiv:1802.06360. [Google Scholar]
  64. Ruff, L.; Vandermeulen, R.; Goernitz, N.; Deecke, L.; Siddiqui, S.A.; Binder, A.; Müller, E.; Kloft, M. Deep One-Class Classification. In Proceedings of the 35th International Conference on Machine Learning, PMLR, Stockholm, Sweden, 10–15 July 2018; pp. 4393–4402. [Google Scholar]
  65. Liou, C.-Y.; Cheng, W.-C.; Liou, J.-W.; Liou, D.-R. Autoencoder for Words. Neurocomputing 2014, 139, 84–96. [Google Scholar] [CrossRef]
  66. Zhai, J.; Zhang, S.; Chen, J.; He, Q. Autoencoder and Its Various Variants. In Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, 7–10 October 2018; pp. 415–419. [Google Scholar]
  67. Chen, P.; Li, P.; Wang, B.; Ding, X.; Zhang, Y.; Zhang, T.; Yu, T. GFSegNet: A Multi-Scale Segmentation Model for Mining Area Ground Fissures. Int. J. Appl. Earth Obs. Geoinf. 2024, 128, 103788. [Google Scholar] [CrossRef]
  68. Cao, V.L.; Nicolau, M.; McDermott, J. A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection. In Proceedings of the Parallel Problem Solving from Nature—PPSN XIV, Edinburgh, UK, 17–21 September 2016; Springer International Publishing: Cham, Switzerland, 2016; pp. 717–726. [Google Scholar]
  69. Dotti, D.; Popa, M.; Asteriadis, S. Unsupervised Discovery of Normal and Abnormal Activity Patterns in Indoor and Outdoor Environments. In Proceedings of the International Conference on Computer Vision Theory and Applications, Porto, Portugal, 27 February–1 March 2017; Volume 6, pp. 210–217. [Google Scholar]
  70. Abati, D.; Porrello, A.; Calderara, S.; Cucchiara, R. Latent Space Autoregression for Novelty Detection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, 15–20 June 2019; pp. 481–490. [Google Scholar]
  71. Akcay, S.; Atapour-Abarghouei, A.; Breckon, T.P. GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training. In Proceedings of the Computer Vision—ACCV 2018, Perth, Australia, 2–6 December 2018; Springer International Publishing: Cham, Switzerland, 2019; pp. 622–637. [Google Scholar]
  72. Yu, W.; Huang, Q. A Deep Encoder-Decoder Network for Anomaly Detection in Driving Trajectory Behavior under Spatio-Temporal Context. Int. J. Appl. Earth Obs. Geoinf. 2022, 115, 103115. [Google Scholar] [CrossRef]
  73. Wu, C.; Yi, X.; Wang, W.; You, L.; Huang, Q.; Gao, X.; Liu, Q. Learning to Localize: A 3D CNN Approach to User Positioning in Massive MIMO-OFDM Systems. IEEE Trans. Wirel. Commun. 2021, 20, 4556–4570. [Google Scholar] [CrossRef]
  74. Papadopoulos, H.; Wang, C.; Bursalioglu, O.; Hou, X.; Kishiyama, Y. Massive MIMO Technologies and Challenges towards 5G. IEICE Trans. Commun. 2016, E99-B, 602–621. [Google Scholar]
  75. Jin, H.; Liu, K.; Zhang, M.; Zhang, L.; Lee, G.; Farag, E.N.; Zhu, D.; Onggosanusi, E.; Shafi, M.; Tataria, H. Massive MIMO Evolution Toward 3GPP Release 18. IEEE J. Sel. Areas Commun. 2023, 41, 1635–1654. [Google Scholar] [CrossRef]
  76. Badrinarayanan, V.; Kendall, A.; Cipolla, R. SegNet: A Deep Convolutional Encoder-Decoder Architecture for Image Segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 2017, 39, 2481–2495. [Google Scholar] [CrossRef]
  77. Cheng, J.; Zhu, Y.; Zhao, Y.; Li, T.; Chen, M.; Sun, Q.; Gu, Q.; Zhang, X. Application of an Improved U-Net with Image-to-Image Translation and Transfer Learning in Peach Orchard Segmentation. Int. J. Appl. Earth Obs. Geoinf. 2024, 130, 103871. [Google Scholar] [CrossRef]
  78. Chu, S.; Li, P.; Xia, M.; Lin, H.; Qian, M.; Zhang, Y. DBFGAN: Dual Branch Feature Guided Aggregation Network for Remote Sensing Image. Int. J. Appl. Earth Obs. Geoinf. 2023, 116, 103141. [Google Scholar] [CrossRef]
  79. Park, M.; Tran, D.Q.; Bak, J.; Park, S. Advanced Wildfire Detection Using Generative Adversarial Network-Based Augmented Datasets and Weakly Supervised Object Localization. Int. J. Appl. Earth Obs. Geoinf. 2022, 114, 103052. [Google Scholar] [CrossRef]
  80. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NR; User Equipment (UE) Radio Transmission and Reception; Part 1: Range 1 Standalone. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3283 (accessed on 10 November 2023).
  81. Jaderberg, M.; Simonyan, K.; Zisserman, A.; Kavukcuoglu, K. Spatial Transformer Networks. In Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada, 7–12 December 2015; Curran Associates, Inc.: New York, NY, USA, 2015; Volume 28. [Google Scholar]
Figure 1. Possible modes of signal propagation.
Figure 1. Possible modes of signal propagation.
Sensors 24 06494 g001
Figure 2. UPA with antenna panels, each consisting of one single polarized antenna element. The arrived signal’s AoA is decomposed into azimuth and elevation angles.
Figure 2. UPA with antenna panels, each consisting of one single polarized antenna element. The arrived signal’s AoA is decomposed into azimuth and elevation angles.
Sensors 24 06494 g002
Figure 3. Structure of the proposed Deep Autoencoding Channel-Transformed Generative Adversarial Network (DACT-GAN) and components of the loss function to be computed.
Figure 3. Structure of the proposed Deep Autoencoding Channel-Transformed Generative Adversarial Network (DACT-GAN) and components of the loss function to be computed.
Sensors 24 06494 g003
Figure 4. Indoor scenario depicting the distribution of 12 BSs.
Figure 4. Indoor scenario depicting the distribution of 12 BSs.
Sensors 24 06494 g004
Figure 5. Indoor factory (dense clutter, low BS) scenario depicting the distribution of 18 BSs.
Figure 5. Indoor factory (dense clutter, low BS) scenario depicting the distribution of 18 BSs.
Sensors 24 06494 g005
Figure 6. Comparative effects of different data normalization techniques on model training efficacy.
Figure 6. Comparative effects of different data normalization techniques on model training efficacy.
Sensors 24 06494 g006
Figure 7. Violin plots comparing the training accuracies of DACT-GAN across different batch size B with the mean training accuracy for each batch size B.
Figure 7. Violin plots comparing the training accuracies of DACT-GAN across different batch size B with the mean training accuracy for each batch size B.
Sensors 24 06494 g007
Figure 8. Heatmap of accuracy with label smoothing applied at different thresholds for G and D.
Figure 8. Heatmap of accuracy with label smoothing applied at different thresholds for G and D.
Sensors 24 06494 g008
Figure 9. Three-dimensional bar chart showing the effect of early stopping on DACT-GAN accuracy across various loss thresholds for G and D.
Figure 9. Three-dimensional bar chart showing the effect of early stopping on DACT-GAN accuracy across various loss thresholds for G and D.
Sensors 24 06494 g009
Figure 10. Classification of NLoS and LoS after 20 epochs of training with different values of h of AE-KDE.
Figure 10. Classification of NLoS and LoS after 20 epochs of training with different values of h of AE-KDE.
Sensors 24 06494 g010
Table 1. Computation and memory access requirements for baselines and DACT-GAN.
Table 1. Computation and memory access requirements for baselines and DACT-GAN.
Computational Requirements
(M FLOPs)
Memory Access Requirements
(M Bytes)
DACT-GAN156.44201.3303
AE-KDE179.049020.0560
GANomaly465.84803.5348
KDE113.2790155.9950
Table 2. Comparison of mean performance indicators across 10 trials: proposed DACT-GAN vs. Baselines.
Table 2. Comparison of mean performance indicators across 10 trials: proposed DACT-GAN vs. Baselines.
AUCF-ScoreAccuracyPrecisionRecall
DACT-GAN0.82990.82890.82990.83710.8299
AE-KDE0.81240.81030.81240.82710.8124
GANomaly0.76840.76840.76840.76860.7684
Random Forest0.71520.69260.71520.80470.7152
KDE0.69160.65920.69160.80900.6916
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gao, Y.; Deng, Z.; Huo, Y.; Chen, W. Improving Non-Line-of-Sight Identification in Cellular Positioning Systems Using a Deep Autoencoding and Generative Adversarial Network Model. Sensors 2024, 24, 6494. https://doi.org/10.3390/s24196494

AMA Style

Gao Y, Deng Z, Huo Y, Chen W. Improving Non-Line-of-Sight Identification in Cellular Positioning Systems Using a Deep Autoencoding and Generative Adversarial Network Model. Sensors. 2024; 24(19):6494. https://doi.org/10.3390/s24196494

Chicago/Turabian Style

Gao, Yanbiao, Zhongliang Deng, Yuqi Huo, and Wenyan Chen. 2024. "Improving Non-Line-of-Sight Identification in Cellular Positioning Systems Using a Deep Autoencoding and Generative Adversarial Network Model" Sensors 24, no. 19: 6494. https://doi.org/10.3390/s24196494

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop