Next Article in Journal
Can Teleworking Lead to Economic Growth during Pandemic Times? Empirical Evidence at the European Union Level
Next Article in Special Issue
Promoting Adversarial Transferability via Dual-Sampling Variance Aggregation and Feature Heterogeneity Attacks
Previous Article in Journal
Interrupted-Sampling and Non-Uniform Periodic Repeater Jamming against mDT-STAP System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cluster-Based JRPCA Algorithm for Wi-Fi Fingerprint Localization

1
School of Mathematics, Hefei University of Technology, Hefei 230009, China
2
School of Software, Tsinghua University, Beijing 100084, China
*
Author to whom correspondence should be addressed.
Electronics 2023, 12(1), 153; https://doi.org/10.3390/electronics12010153
Submission received: 16 November 2022 / Revised: 20 December 2022 / Accepted: 23 December 2022 / Published: 29 December 2022
(This article belongs to the Special Issue AI in Knowledge-Based Information and Decision Support Systems)

Abstract

:
Indoor localization services are emerging as an important application of the Internet of Things, which drives the development of related technologies in indoor scenarios. In recent years, various localization algorithms for different indoor scenarios have been proposed. The indoor localization algorithm based on fingerprints has attracted much attention due to its good performance without extra hardware devices. However, the occurrence of fingerprint mismatching caused by the complexity and variability of indoor scenarios is unneglectable, which degrades localization accuracy. In this article, by combining weighted kernel norm and L 2 , 1 -norm, a joint-norm robust principal component analysis (JRPCA in brief) assisted indoor localization algorithm is proposed, which can improve the localization accuracy through aggregating the reference points (RPs) and conducting robust feature extraction based on clustering. More specifically, a one-way hierarchical clustering termination method is proposed to obtain reasonable RP clusters adaptively according to the preset RPs. A two-phase fingerprint matching algorithm of JRPCA based on clustering is proposed to further increase the difference between similar RPs, thus facilitating rapid identification and reinforcing localization accuracy. To validate the proposed algorithm, extensive experiments are conducted in real indoor scenarios. The experimental results confirm that the proposed cluster-based JRPCA algorithm outperforms other existing algorithms in terms of robustness and accuracy.

1. Introduction

The Global Positioning System (GPS) [1] has been successfully applied in outdoor environments with high positioning accuracy in practice. In general, GPS technology mainly relies on the propagation of signals through the air. However, when encountering complex buildings (such as supermarkets, commercial centers, hospitals, airports, etc.), signal transmission is easily subjected to interference from plenty of uncertain factors. Weak reception of signals, lack of line of sight between users and satellite, radio multi-path effects, as well as dispersal and fading in indoor environments all contribute to the poor indoor performance of GPS. As a result, GPS is not suitable for indoor positioning. Furthermore, thermal techniques on Wi-Fi [2], Bluetooth [3], RFID [4], and magnetic fields [5] are capable of realizing superior positioning effects in indoor environments, promoting the application of a wide number of indoor positioning systems (IPS) [6]. Wi-Fi-based IPS, in particular, has become one of the most practicable approaches because of the widespread availability and ease of deployment of Wi-Fi infrastructure [7].
The IPS based on Wi-Fi can generally be divided into two categories [8]: trilateral measurement algorithms and fingerprint-based location algorithms. The trilateral measurement algorithm calculates the distance between the target and the access point (AP) through time of arrival (TOA), time difference of arrival (TDOA), angle of arrival (AOA), and radio wave propagation model (RPM). Such schemes are strongly dependent on complex transmitters and receivers [9], making them difficult to implement on every Wi-Fi device. In contrast, a fingerprint-based location method is a classic scene analysis algorithm with broad applicability that does not require precise access point position or additional investment in infrastructure and line-of-sight measurement.
A positioning system based on fingerprints is often composed of two stages [10]: the offline training stage and the online positioning stage. In the training stage, some points with known locations are first selected as training points, and then RSSI data are collected from APs detected at each training point. Therefore, the fingerprint of each training point is made up of these RSSI vectors. In general, we always train the RSSI vectors, and the trained vectors are utilized as RP fingerprints. All fingerprints are stored in a database for online localization. In the online stage, RSSI vectors are collected at the corresponding location and transferred to the back-end server. Subsequently, the back-end server matches the received online RSSI vectors with the stored fingerprints to obtain a set of RPs with fingerprints close to the online received RSSI vectors, thereby estimating the target. The fingerprint database is the key to the RSSI-based method. However, in complex indoor scenes, various noise characteristics such as interference, reflection, and refraction can affect signal transmission, resulting in spike noise during RSSI signal acquisition. This actually cannot fully ensure the accuracy and authenticity of data collection in the fingerprint database.
By reason of the foregoing, to improve the accuracy of the fingerprint database and online RSSI vectors with noise reduction, we use JRPCA to train offline fingerprints and online RSSI vectors. The online matching stage often requires traversing the entire fingerprint database, which leads to resource consumption, as well as matching some more distant reference points, increasing the localization error. An efficient clustering strategy is proposed, which divides offline fingerprint data into multiple clusters, and further uses the localization algorithm to find the cluster where the target is located. Finally, the final location is estimated for the user within the potential clusters.
This article is an extension of our conference paper accepted by ICDH2022. In our previous work, the HCS-based clustering method was used to solve the problem of search overhead; however, it did not consider the problem of the existence of boundary point localization in real scenarios. In addition, we also discuss and analyze the proposed method in more detail in this paper and add more test experiments based on real scenarios, aiming to indicate the superiority of the proposed method.
The main contributions of this paper can be summarized as follows:
  • The JRPCA model is proposed, which enhances the low-rankness of the fingerprint database using the prior knowledge of singular values to make the data more accurate and thus improve the localization accuracy;
  • An effective fingerprint clustering strategy is proposed to reduce the search overhead and radio map size by integrating similar RSSI patterns. A reasonable subset of RPs is obtained adaptively on the basis of predefined RPs to further increase the differences between similar fingerprints.
The rest of this article is organized as follows. We review the related work in Section 2. Section 3 gives an overview of the system and describes the associated processes. Section 4 details the algorithms used in this paper, the JRPCA model optimization algorithm, the one-way hierarchical clustering algorithm, and the localization algorithm. The experiments and the corresponding experimental results are introduced in Section 5. Finally, Section 6 summarizes the whole paper.

2. Related Work

This section displays a brief introduction of some relevant studies on indoor location based on the fingerprint. Bahl and Padmanabhan [11] created the first WLAN-based indoor localization system, Radar, and adopted the Euclidean distance to select a few nearby RPs to estimate the location of target points. It should be noted that random noise was not taken into account in their work. Horus employed the probability distribution histogram of each RP in the offline training phase for further position prediction based on the signal’s probability distribution [12]. Chai and Yang [13] developed a relatively coarse calibration-based technique for estimating signal intensity using an interpolation function. Some studies focus on fingerprint training to enhance accuracy. Youssef et al. [14] developed a MaxMean approach to construct the fingerprint database, which helps to pick several strongest APs in the offline stage that can cover the full localization region. Despite the ability of such a strategy in intensifying the robustness of an offline fingerprint database, it excludes unusual occurrences during the online phase.
On the other hand, a variety of clustering techniques have been put out to address the issue of the huge demand for fingerprint storage. One of these is the k-means clustering method [15], which divides the entire wireless map into k clusters by a recursive approach. The advantage of low calculation cost has advanced its extensive use in fingerprint localization. Such systems based on k-means clustering, however, fall short of providing perfect localization accuracy, as the random selection of initial cluster members or samples increases the risk of incorrect cluster selection. To increase the localization accuracy by overlapping between clusters produced by the k-means algorithm, two types of enhanced clustering technologies have been proposed [15]: the multiple nearest neighbor (MNN) overlap clustering strategy and the Voronoi (VRN)-based overlap clustering strategy. Although both overlapping strategies are superior to the k-means strategy in terms of localization accuracy, the resulted in higher calculation complexity still cannot be ignored, as shown in [16].
Unlike the k-means clustering technique, affinity propagation (AFP) clustering [17] can acquire the ideal cluster head and its related cluster by iteratively transferring two types of information between data points. It has been widely employed in numerous fingerprint systems. AFP clustering does not require a certain number of clusters to be generated, nor does it require a random selection of samples as input. Nevertheless, when applied to datasets with complex structures, the negative Euclidean distance [18] between samples and individual data points, as a measure of similarity, can dramatically impair the effectiveness of such clustering. Another approach for forming training location clusters based on AP virtual locations was proposed in [19] for fingerprint-based indoor localization. However, this clustering technique performs best in indoor conditions without linear limitations. The hierarchical clustering strategy (HCS) proposed by [20] partitions the fingerprint data into a set of non-overlapping clusters. Each cluster contains the training positions that receive the strongest signal from a certain number of APs, which are organized by hierarchical level definitions to form a fixed sequence. Therefore, the number of clusters created by HCS is easily determined based on the number of APs deployed in the localization region and the hierarchy level selected by [20].
Specifically, compared to k-means clustering and the two overlapping strategies shown in [15], the HCS method assigns a unique ID to each formed cluster based on the order of the strongest signals provided by the AP, thus greatly reducing the search overhead and localization errors. On this basis, we propose a two-phase fingerprint-matching algorithm of JRPCA based on clustering, which uses the JRPCA model to further compress the fingerprint database by training the fingerprints through the augmented Lagrange multiplier (ALM) algorithm [21].

3. System Framework

We first establish some fundamental symbols to clearly depict the system framework. In the positioning area, suppose there are n APs and N RPs. The APs’ location, transmission power, manufacturers, and owners are not needed to be known. The location of RP i is l i = x i , y i , and suppose that all APs can be detected at RP i . We measure the RSSI signal multiple times at each RP, and the average of the RSSI signals collected at each reference point is taken as the fingerprint of that point. Suppose that the fingerprint of RP i is f i = r s s i i 1 , r s s i i 2 , , r s s i i j , , r s s i i n , where r s s i i j is the RSSI collected from AP j . All RPs’ locations form the location dataset L N = l 1 , l 2 , , l N T , and all RPs’ fingerprints denote F N = f 1 T , f 2 T , , f N T T . The offline fingerprints database consists of reference point location and its corresponding RSSI value, where the structure is L N , F N .
F N = f 1 f 2 f N = r s s i 1 1 , r s s i 1 2 r s s i 1 n r s s i 2 1 , r s s i 2 2 r s s i 2 n r s s i N 1 , r s s i N 2 r s s i N n N × n .
The proposed Wi-Fi fingerprint localization system adopts a robust noise suppression technique and an efficient clustering method for location estimation in two stages. The framework of the localization system is shown in Figure 1. In the offline phase, the sparse peak noise of the fingerprint database is reduced by the JRPCA model after the fingerprints are collected. The denoised fingerprints are then clustered to reduce the subsequent search overhead by integrating similar RSSI patterns. The offline fingerprint database is constructed by denoising and clustering processes for online matching. In the online phase, online fingerprints are constructed by the same denoising process. After processing the offline fingerprint database and online fingerprints, suitable clusters are matched based on the strongest signal received from the AP by the online fingerprints. Finally, the WKNN algorithm is used to estimate the position of the target point in the selected clusters. The detailed design and working methods of the noise suppression technique, clustering strategy, and localization technique of the fingerprint system proposed in this paper are given in Section 4.

4. Positioning Algorithm

4.1. JRPCA in Offline and Online Phase

In this section, we first introduce the limitations of the RPCA [22] model for training fingerprints. Then, the JRPCA is proposed and the details of solving the JRPCA model by ALM in the offline phase are shown.

4.1.1. RPCA Noise Reduction Optimization Model

Let F N be the offline fingerprint database constructed by n APs and N RPs, F N be the reconstructed database, and E N be the noise. The RPCA model can be represented as
F N = F N + E N .
The problem is to reduce the peak noise E N and reconstruct robust F N :
min rank F N + γ E N 0 s . t . F N + E N = F N ,
where . 0 is applied to force E N to be sparse, and the parameter γ ( γ > 0 ) controls the tradeoff between rank F N and E N 0 .
Due to the non-convex and non-smooth properties of rank and . 0 in optimization, in general, the problem is converted into solving a convex optimization problem. Then (3) is transformed into
min F N * + E N 1 s . t . F N + E N = F N ,
where F N * + E N 1 is a convex hull of rank F N + γ E N 0 over the set F N , E N . Therefore, (4) is convex with a unique minimum value.

4.1.2. Fingerprint Database Reconstruction Based on JRPCA

Here, we propose JRPCA to improve the fingerprint noise and make the data more accurate, thus improving the positioning accuracy.
The nuclear norm . * assigns equal and constant threshold values to all singular values of the matrix, ignoring the different data characteristics represented by different singular values in the matrix. Thus, the concept of weighted is introduced in the nuclear norm optimization model. Relative to the L 1 -norm, the L 2 , 1 -norm can produce row (or column) based sparsity, thus improving the model by using the L 2 , 1 -norm. In this way, the robustness of the model has been enhanced while ensuring no excessive data loss. On this basis, a JRPCA model based on the weighted nuclear norm and L 2 , 1 -norm is constructed to recover the low-rank matrix of the original data. The model is shown as follows:
min F N , E N F N W , + λ E N 2 , 1 s . t . F N = F N + E N ,
where λ refers to the weight of noise and is a known quantity.
The ALM method is used to solve the JRPCA model in this paper. The solution procedure and the block diagram of the algorithm are described in detail in the next subsection.

4.1.3. Model Solution

In this section, the ALM method is adopted to solve the proposed model, which solves the constrained optimization by transforming it into an unconstrained optimization problem. To solve the proposed optimization problem by using ALM, we introduce the preliminary definitions and theorems as follows:
  • Shrinkage Operator: For any τ > 0 and X R m × n , the shrinkage operator S τ ( X ) is defined as
    S τ X i j = X i j τ x > τ X i j + τ x < τ 0 otherwise .
  • Soft-thresholding Operator: For any τ > 0 and X R m × n with a singular value decomposition X = U Σ V T , the soft-thresholding operator is
    D τ ( X ) = U S τ ( Σ ) V T .
  • For any τ > 0 and X R m × n , the shrinkage operator is the optimal solution of the function as
    S τ ( X ) = arg min X 1 2 X Y F 2 + τ X 1 .
  • For any τ > 0 and X R m × n , the soft-thresholding operator is the optimal solution of the function as
    D τ ( X ) = arg min X 1 2 X Y F 2 + τ X * .
To solve the optimization problem, we first convert the constrained optimization problem into an unconstrained optimization problem by introducing a Lagrangian multiplier Y and a quadratic penalty term and then formulating the augmented Lagrange function as follows:
L F N , E N , Y , μ = λ E N 2 , 1 + F N W , + < Y , F N F N E N > + μ 2 F N F N E N 2 2 ,
where Y is a Lagrange multiplier, μ is a positive scalar, and < Y , F N F N E N > is an iterative procedure.
The alternating direction method is used to iterate (10), update the matrices F N and E N , and loop the algorithm to the termination criterion. The updating process is shown as follows.
1.
Fix E N , Y, μ , that is, when E N = E k , Y = Y k , μ = μ k , iteratively update F N .
F N * = arg min F N F N W , + μ 2 F N E N F N + 1 μ Y 2 2 = arg min F N 1 2 F N F N E N + 1 μ Y 2 2 + 1 μ F N W , .
2.
Fix F N , Y, μ , when F N = F N k , Y = Y k , μ = μ k , the matrix E N in (10) is iteratively updated to obtain:
E N * = arg min E N λ μ E N 2 , 1 + 1 2 F N E N F N + 1 μ Y 2 2 = arg min E N 1 2 E N F N E N + 1 μ Y 2 2 + λ μ E N 2 , 1 .
3.
When the matrices F N and E N converge, i.e., F N = F N k and E N = E k , the matrices Y and μ in Equation (10) are updated iteratively:
min Y μ 2 F N F N E N + Y μ 2 2 .
The iterative update of Y is obtained from Equation (13) as:
Y * = Y + μ F N F N E N ,
where the iterative update of the positive penalty coefficient μ is:
μ = min ρ μ , μ max .
4.
The selection of the weight vector W( W = w 1 , w 2 , , w n w i 0 ) is the key to the solution. The unknown weight vector W can be obtained by updating the matrix F N . In the matrix, the information of the data represented by the large singular value is more reflective of the important components of the data compared to the small singular value. Therefore, the contraction range of the small singular values can be increased and the contraction range of the large singular values can be decreased to retain the important information in the data. Thus, the singular value σ i F N ( i = 1 , , n ) is inversely proportional to the weight vector W:
w i = c n σ i F N + τ ,
where c > 0 is a constant, and τ > 0 ensures that the weights can still be calculated when σ i F N is 0.
Based on the above discussion, the complete JRPCA algorithm (Algorithm 1) flow is presented here, as shown below:    
Algorithm 1: JRPCA Algorithm
Intput: data matrix F N R N × n , parameter λ , τ .
Initialize: F N 0 = 0 , E N 0 = 0 , Y 0 = 0 , μ 0 > 0
While F N F N E N 2 > μ 1 F N 2 do
   Calculate the weight
       W = w 1 , w 2 , , w n w i 0
            w i = c n σ i F N + τ
   when solve
       F N k + 1 = arg min F N L F N , E k , Y k , μ k
   use
       ( U , S , V ) = SVD F N E N k + μ k 1 Y k
       F N k + 1 = U S w / μ ( S ) V T
   when solve
       E N k + 1 = arg min E N L F N 1 k + 1 , E N , Y k , μ k
   use
       E N k + 1 = S λ / μ F N F N + μ 1 Y
   Update  Y k + 1 = Y k + μ k F N F N k + 1 E N k + 1
   Update  μ k to μ k + 1
    k k + 1
F N F N k , E N E N k
Output: F N , E N

4.2. Proposed Clustering Strategy

The fingerprint clustering technique proposed in this paper is divided into three main steps. The radio map is first separated into several distinct clusters by the one-way hierarchical clustering strategy’s basic operating concept (one-way HCS). The norm is that only the strongest RSSI from a particular AP is sent to the collection of training locations that make up a cluster. Although the RSSI samples measured by a specific AP at a location fluctuate over time, the RSSI values collected by the same AP are spatially correlated. Therefore, the number of clusters created is equal to the number of APs deployed in the location area. Second, the Euclidean distance between any pair of RPs belonging to the same cluster is calculated, and then subsets are generated by fusing RPs whose distance is within a certain range (called threshold). Finally, a representative RSSI vector for each subset in each cluster is calculated. The RPs with similar RSSI in the same subset are fused on average to obtain a new RP representing the subset. Combining our proposed noise reduction algorithm with this clustering strategy, a two-phase fingerprint matching algorithm of JRPCA based on clustering is proposed to further increase the difference between similar RPs and thus improve the localization accuracy.
The whole working process when applying the clustering technique of this paper to the localization region of the 4 APs is shown in Figure 2. Either only one RP or multiple RPs are included in each generated subset. The introduced new parameter threshold (denoted as δ ) sets the upper limit of the Euclidean distance between each pair of RSSI-similar reference points that can be classified as a subset of the same cluster. After fusing the RPs of each subset, the fingerprint database construction is completed. The fingerprint of each subset comprises a representative RSSI vector of that subset and the location coordinates of all points in the subset. The RSSI of all reference points of the subset (such as kth subset in ith cluster) and their position coordinates are averaged and fused separately to obtain the representative RSSI vector. The estimation results of the representative RSSI vector ( r v ) and location coordinates ( x v , y v ) of the subsets are shown below:
r v i k = 1 b j = 1 b r j ,
where b is the number of reference points within kth subset in the cluster C i , and the set of RSSI computed at those b reference points are denoted as r 1 , r 2 , , r b .
x v i k = 1 b j = 1 b x j , y v i k = 1 b j = 1 b y j ,
where x 1 , y 1 , x 2 , y 2 , , x b , y b denotes the positional coordinates of b training locations within kth subset in the cluster C i .
As shown in Figure 2, after applying one-way HCS clustering, an important issue is how to choose the initial training location to start the data fusion process within each cluster. In order to divide each cluster into the optimal number of subsets, the strategy we propose uses the RP with the largest RSSI value obtained by AP as the starting point of the data fusion process within the cluster. Formally, for the ith cluster ( C i ), the RP with the largest RSSI obtained from APi (strongest AP for cluster C i ) is used as the initial data point, and then the fusion process starts. Compared with other clustering techniques, this clustering technology greatly reduces the storage requirements of radio maps and the search overhead in the localization phase, and is known as an efficient clustering technique.
Figure 3 details the process of the designed clustering method. In the offline phase, all the pre-defined RPs are divided into clusters, and the cluster with the smallest distance is iteratively integrated into a new cluster. Figure 4 shows the heat map of hierarchical clustering, and the color shades in the figure represent the corresponding RSSI values.

4.3. Online Target Positioning

In this phase, the user terminal receives RSSI information X at the real-time location, and the proposed noise suppression technique is applied to X to obtain the noise-reduced real-time RSSI vector X . Next, the mean value processing is performed to obtain the RSSI information X of the point to be located. The trained RSSI is then compared to determine the AP with the strongest signal strength, and the potential clusters of X are identified based on this AP. After mapping a cluster, we filter out the RP of other clusters and use only the RP in the potential cluster region for localization, which greatly reduces the computational effort.
However, in the real scenario, the problem of boundary point localization often arises. At this time, we can no longer directly localize a potential cluster by simply clustering it out, and we must also consider whether other clusters have a greater effect on the target point. Therefore, a boundary point judgment is required.
If the target point X is a boundary point, X is divided into multiple neighboring potential clusters and matched with all fingerprint data in these clusters. If the target point X is not a boundary point, then X is divided into one potential cluster and matched with all fingerprint data in that cluster only. Finally, the location of the user is further estimated using WKNN based on the location of the known reference points.
WKNN is a popular algorithm improved from the KNN technique [11] with simple computation and high estimation accuracy. The estimation of the WKNN algorithm is based on the Euclidean distance:
d j = r j r ^ 2 j = 1 , , m ,
where · 2 is the 2 -norm operator, d j is the Euclidean distance, and r j is the jth fingerprint of the potential clusters.
In the WKNN algorithm, the distance values are given weight:
w j = 1 d j + δ ,
where δ is a small positive number introduced in order to control the denominator as not being zero, and j is the index of the reference point that obeys 1 j m .
Then k ( k > 1 ) reference points with the shortest Euclidean distance are selected as candidate locations in the potential clusters, and the user’s location is obtained by averaging the k candidate locations, as follows:
( x ^ , y ^ ) = j = 1 k w j x j , y j j = 1 k w j .

5. Experiments and Discussion

5.1. Experimental Scenarios

We have conducted extensive experiments in laboratories and corridors. The testing area is shown in Figure 5. After analyzing the characteristics of the indoor positioning space, the points are arranged with floor tiles at intervals and collected at each point. The Wi-Fi signal of stable and visible APs will improve the accuracy of fingerprint location results with the increase in the number of selected APs, but it is not infinite. Too many APs will cause mutual interference. Therefore, this paper selects six APs to ensure that the fingerprint reference point in the whole location area can receive Wi-Fi signals to the greatest extent. Then 30 points are randomly selected in the experimental area several times as test points to collect test data. The acquisition time of each reference point and test point is 5 min, and the refresh rate of the sampling equipment is 5 s.

5.2. Analysis of Performance

According to the experimental environment established above, the performance of the algorithm is analyzed.
In this experiment, the weighted K-nearest neighbor algorithm (WKNN) is selected as the positioning algorithm, and the K values in the WKNN algorithm are 3∼5 for experiments, and the positioning errors of these several K values are analyzed. Figure 6 shows that when K = 4 , most of the positioning error curves of the WKNN algorithm are below the positioning errors of other values. In other words, in the WKNN algorithm, the positioning effect is better when the K value is 4. Therefore, the value of K will be 4 to carry out the subsequent experiments.
In our experiments, we compare our method with three advanced schemes: Tilejunction (Tilej.), Radar, and Horus:
  • Tilejunction [10]: It maps the target RSSI of each AP to a convex hull termed signal “tile” where the target is likely within. It also partitions the site into multiple clusters to substantially reduce the search space in the LP optimization.
  • Radar [11]: It computes the Euclidean distance between the fingerprint and the target RSSI vector, and finds the k-nearest neighbors of the smallest distance to estimate the target location.
  • Horus [12]: It first calculates the probability distribution of the RSSI value at each RP. Given a target RSSI vector, Horus computes the overall probability of the vector at each RP and finds the one with the maximum likelihood as the target location.
Figure 7 shows the mean localization error versus the number of deployed AP. When the number of AP increases, the localization error decreases because more APs help localize the target to a smaller area. The diminishing returns of adding additional APs are because the signal (or fingerprint) differentiation decreases when we add more APs to a fixed area. Our method achieves the highest accuracy due to the joint consideration of measurement noise and the use of efficient hierarchical clustering. The results show that our method essentially achieves the lowest error compared to other schemes because of the combination of measurement noise considerations and the use of efficient hierarchical clustering.
The fingerprint database is constructed based on original data; PCA algorithm, RPCA algorithm, and JRPCA algorithm are, respectively, used for localization experiments; and the positioning errors of the four fingerprint databases are compared. Figure 8 shows the cumulative distribution function (CDF) of positioning errors in the fingerprint database constructed based on different noise reduction algorithms. The experimental results show that the fingerprint database constructed based on the noise reduction algorithm in this paper is superior to those constructed by the other three algorithms in terms of performance, with 64.2 % of the points having a localization error of less than 1 m and 96.8 % of the points having a localization error of no more than 2 m.
Figure 9 shows the trajectory of the localization results in a 10m×10m hall with the application of the four methods of this paper, Tilej, Radar, and Horus. The blue dots in the figure indicate the actual positions, and the asterisks indicate the estimated positions. During the experiments, initially, the accuracy of these methods was excellent at the localization points, but whenever steering was performed, the error increased, so that the localization accuracy of our method at the steering points was better than the other three methods. As shown in Table 1, among the position estimation of 25 points in the region, the maximum position estimation error of our method is 0.72 m, and the maximum position estimation errors of the other three methods are 1.13 m, 1.34 m, and 1.83 m, respectively. The experimental results show that the performance of the localization technique proposed in this paper is better than the other techniques considered in this paper.
The distribution of localization errors for the four fingerprint techniques based on experiments with real indoor scenes is shown in Figure 10. Due to the complex indoor environment and large measurement noise, the accuracy of Radar is weakened by the scattered nearest neighbors. Horus assumes a certain distribution of signal level at each RP and therefore does not represent the true signal distribution with limited sampling. Therefore, the fingerprint data they collect in complex indoor environments such as lobbies and corridors are inaccurate, resulting in more scattered matching reference points. In contrast, this paper considers the influence of signal noise and adopts a robust noise suppression technique, which makes the RSSI data more accurate and effectively reduces the error in real indoor scenarios.

6. Conclusions and Future Work

Due to the existence of signal measurement noise, the indoor localization method based on fingerprints often results in matching a set of scattered nearest neighbor RPs. Hence, the estimation results are often unsatisfactory. To alleviate this problem and improve robustness, a two-stage fingerprint localization method of JRPCA based on clustering is proposed in this paper. The method estimates target points only in potential clusters, considering the influence of measurement noise during target localization. JRPCA is used to train offline fingerprints and online RSSI vectors. In addition, considering the storage requirement and search cost of radio maps in fingerprint-based indoor positioning systems, a clustering method based on the one-way hierarchy is proposed to obtain reasonable RP clusters adaptively in accordance with predefined RPs. Experimental results demonstrate that the proposed method outperforms other algorithms with respect to robustness and accuracy.
As is well known, WiFi-based indoor positioning technology is easily influenced by different smartphones. This experiment is carried out using only one kind of device without consideration of the influences of different types of devices and receiving terminals on RSSI signals. Therefore, the selection of smart devices is also a significant research topic for indoor positioning. Moreover, the target to be tested is stationary during the experiment, and the localization of the moving target in the WLAN environment is to be solved in the next step. Consequently, future research will further concentrate on exploring the above factors.

Author Contributions

Conceptualization, M.Z., Y.X., L.Z., and J.X.; methodology, M.Z. and L.Z.; software, M.Z.; validation, L.Z., M.Z., Y.X., and J.X.; formal analysis, M.Z., L.Z., and J.X.; investigation, M.Z. and Y.X.; resources, L.Z.; data curation, L.Z., M.Z., and Y.X.; writing—original draft preparation, M.Z. and L.Z.; writing—review and editing, M.Z., L.Z., Y.X., and J.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Key Research and Development Program (2018YFB2100301); National Natural Science Foundation of China (61972131).

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kaplan, E.D.; Hegarty, C. Understanding GPS/GNSS: Principles and Applications; Artech House: Norwood, MA, USA, 2017. [Google Scholar]
  2. Huang, B.; Xu, Z.; Jia, B.; Mao, G. An online radio map update scheme for wifi fingerprint-based localization. IEEE Internet Things J. 2019, 6, 6909–6918. [Google Scholar] [CrossRef]
  3. Yu, N.; Zhan, X.; Zhao, S.; Wu, Y.; Feng, R. A precise dead reckoning algorithm based on bluetooth and multiple sensors. IEEE Internet Things J. 2017, 5, 336–351. [Google Scholar] [CrossRef]
  4. Ma, Y.; Tian, C.; Jiang, Y. A multitag cooperative localization algorithm based on weighted multidimensional scaling for passive uhf rfid. IEEE Internet Things J. 2019, 6, 6548–6555. [Google Scholar] [CrossRef]
  5. Wang, X.; Qian, Z.; Wang, X.; Huang, L. Robust localization for cognitive iot via the mobile anchor node based on the diameter-varying spiral line. IEEE Access 2019, 7, 28487–28497. [Google Scholar] [CrossRef]
  6. Farahsari, P.S.; Farahzadi, A.; Rezazadeh, J.; Bagheri, A. A survey on indoor positioning systems for iot-based applications. IEEE Internet Things J. 2022, 9, 7680–7699. [Google Scholar] [CrossRef]
  7. Chen, L.; Yang, K.; Wang, X. Robust cooperative wi-fi fingerprint-based indoor localization. IEEE Internet Things J. 2016, 3, 1406–1417. [Google Scholar] [CrossRef]
  8. He, S.; Chan, S.H.G. Wi-fi fingerprint-based indoor positioning: Recent advances and comparisons. IEEE Commun. Surv. Tutor. 2015, 18, 466–490. [Google Scholar] [CrossRef]
  9. Shao, H.J.; Zhang, X.P.; Wang, Z. Efficient closed-form algorithms for aoa based self-localization of sensor nodes using auxiliary variables. IEEE Trans. Signal Process. 2014, 62, 2580–2594. [Google Scholar] [CrossRef]
  10. He, S.; Chan, S.H.G. Tilejunction: Mitigating signal noise for fingerprint-based indoor localization. IEEE Trans. Mob. Comput. 2015, 15, 1554–1568. [Google Scholar] [CrossRef]
  11. Bahl, P.; Padmanabhan, V.N. Radar: An in-building RF-based user location and tracking system. In Proceedings of the IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No. 00CH37064), Tel Aviv, Israel, 26–30 March 2000; Volume 2, pp. 775–784. [Google Scholar]
  12. Youssef, M.; Agrawala, A. The horus location determination system. Wirel. Netw. 2008, 14, 57–374. [Google Scholar] [CrossRef]
  13. Chai, X.; Yang, Q. Reducing the calibration effort for probabilistic indoor location estimation. IEEE Trans. Mob. Comput. 2007, 6, 649–662. [Google Scholar] [CrossRef] [Green Version]
  14. Youssef, M.A.; Agrawala, A.; Shankar, A.U. Wlan location determination via clustering and probability distributions. In Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003), Fort Worth, TX, USA, 26 March 2003; pp. 143–150. [Google Scholar]
  15. Frey, B.J.; Dueck, D. Clustering by passing messages between data points. Science 2007, 315, 972–976. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Sadhukhan, P. Performance analysis of clustering-based fingerprinting localization systems. Wirel. Netw. 2019, 25, 2497–2510. [Google Scholar] [CrossRef]
  17. Kuo, S.P.; Wu, B.J.; Peng, W.C.; Tseng, Y.C. Cluster-enhanced techniques for pattern-matching localization systems. In Proceedings of the 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, Pisa, Italy, 8–11 October 2007; pp. 1–9. [Google Scholar]
  18. Fabbri, R.; Costa, L.D.F.; Torelli, J.C.; Bruno, O.M. 2D Euclidean distance transform algorithms: A comparative survey. ACM Comput. Surv.(CSUR) 2008, 40, 1–44. [Google Scholar] [CrossRef]
  19. Xue, W.; Yu, K.; Hua, X.; Li, Q.; Qiu, W.; Zhou, B. APs’ virtual positions-based reference point clustering and physical distance-based weighting for indoor Wi-Fi positioning. IEEE Internet Things J. 2018, 5, 3031–3042. [Google Scholar] [CrossRef]
  20. Saha, A.; Sadhukhan, P. A novel clustering strategy for fingerprinting-based localization system to reduce the searching time. In Proceedings of the 2015 IEEE 2nd International Conference on Recent Trends in Information Systems (ReTIS), Kolkata, India, 9–11 July 2015; pp. 538–543. [Google Scholar]
  21. Wen, R.P.; Li, S.Z.; Zhou, F. Toeplitz matrix completion via smoothing augmented lagrange multiplier algorithm. Appl. Math. Comput. 2019, 355, 299–310. [Google Scholar] [CrossRef]
  22. Vaswani, N.; Bouwmans, T.; Javed, S.; Narayanamurthy, P. Robust subspace learning: Robust PCA, robust subspace tracking, and robust subspace recovery. IEEE Signal Process. Mag. 2018, 35, 32–55. [Google Scholar] [CrossRef]
Figure 1. Framework of proposed fingerprint positioning system.
Figure 1. Framework of proposed fingerprint positioning system.
Electronics 12 00153 g001
Figure 2. The working process of proposed efficient clustering strategy.
Figure 2. The working process of proposed efficient clustering strategy.
Electronics 12 00153 g002
Figure 3. Hierarchical clustering process.
Figure 3. Hierarchical clustering process.
Electronics 12 00153 g003
Figure 4. Positioning trajectory diagram of different methods.
Figure 4. Positioning trajectory diagram of different methods.
Electronics 12 00153 g004
Figure 5. Experimental areas.
Figure 5. Experimental areas.
Electronics 12 00153 g005
Figure 6. Positioning errors of WKNN algorithm under different K values.
Figure 6. Positioning errors of WKNN algorithm under different K values.
Electronics 12 00153 g006
Figure 7. Mean error versus the number of AP used.
Figure 7. Mean error versus the number of AP used.
Electronics 12 00153 g007
Figure 8. CDF of positioning error.
Figure 8. CDF of positioning error.
Electronics 12 00153 g008
Figure 9. Positioning trajectory diagram of different methods: (a) Horus; (b) Radar; (c) Tilej; (d) ours.
Figure 9. Positioning trajectory diagram of different methods: (a) Horus; (b) Radar; (c) Tilej; (d) ours.
Electronics 12 00153 g009
Figure 10. Cumulative distribution of localization errors.
Figure 10. Cumulative distribution of localization errors.
Electronics 12 00153 g010
Table 1. Localization error of the four methods.
Table 1. Localization error of the four methods.
HorusRadarTilejOurs
Maximum error (m)1.831.341.130.72
Average error (m)0.890.800.630.47
Accumulated error (m)22.2520.7515.7511.75
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, L.; Zhang, M.; Xu, J.; Xu, Y. Cluster-Based JRPCA Algorithm for Wi-Fi Fingerprint Localization. Electronics 2023, 12, 153. https://doi.org/10.3390/electronics12010153

AMA Style

Zhang L, Zhang M, Xu J, Xu Y. Cluster-Based JRPCA Algorithm for Wi-Fi Fingerprint Localization. Electronics. 2023; 12(1):153. https://doi.org/10.3390/electronics12010153

Chicago/Turabian Style

Zhang, Li, Min Zhang, Jingao Xu, and Yi Xu. 2023. "Cluster-Based JRPCA Algorithm for Wi-Fi Fingerprint Localization" Electronics 12, no. 1: 153. https://doi.org/10.3390/electronics12010153

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop