The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2008 vol.7)
pp: 869-883
ABSTRACT
In wireless networks, a client's locations can be estimated using the signals received from various signal transmitters. Static fingerprint-based techniques are commonly used for location estimation, in which a radio map is built by calibrating signal-strength values in the offline phase. These values, compiled into deterministic or probabilistic models, are used for online localization. However, the radio map can be outdated when the signal-strength values change with time due to environmental dynamics, and repeated data calibration is infeasible or expensive. In this paper, we present a novel algorithm, known as LEMT (Location Estimation using Model Trees), to reconstruct a radio map using real-time signal- strength readings received at the reference points. This algorithm can take into account real-time signal-strength values at each time point and make use of the dependency between the estimated locations and reference points. We show that this technique can effectively accommodate the variations of signal strength over different time periods without the need to rebuild the radio maps repeatedly. We demonstrate the effectiveness of our proposed technique on realistic data sets collected from an 802.11b wireless network and a RFID-based network.
INDEX TERMS
Location Estimation, Signal Strength, Reference Points, Temporal Radio Maps
CITATION
Jie Yin, Qiang Yang, Lionel M. Ni, "Learning Adaptive Temporal Radio Maps for Signal-Strength-Based Location Estimation", IEEE Transactions on Mobile Computing, vol.7, no. 7, pp. 869-883, July 2008, doi:10.1109/TMC.2007.70764
REFERENCES
[1] P. Bahl and V.N. Padmanabhan, “RADAR: An In-Building RF-Based User Location and Tracking System,” Proc. IEEE INFOCOM '00, pp. 775-784, Mar. 2000.
[2] E.S. Bhasker, S.W. Brown, and W.G. Griswold, “Employing User Feedback for Fast, Accurate, Low-Maintenance Geolocationing,” Proc. Second IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '04), Mar. 2004.
[3] Y. Chen, Q. Yang, J. Yin, and X. Chai, “Power-Efficient Access-Point Selection for Indoor Location Estimation,” IEEE Trans. Knowledge and Data Eng., vol. 18, no. 7, pp. 877-888, July 2006.
[4] D. Fox, J. Hightower, L. Liao, and D. Schulz, “Bayesian Filtering for Location Estimation,” IEEE Pervasive Computing, vol. 2, no. 3, pp. 24-33, 2002.
[5] R.J. Freund and W.J. Wilson, Regression Analysis: Statistical Modeling of a Response Variable. Academic Press, 1998.
[6] C. Gentile and L.K. Berndt, “Robust Location Using System Dynamics and Motion Constraints,” Proc. IEEE Int'l Conf. Comm. (ICC '04), pp. 1360-1364, June 2004.
[7] A. Haeberlen, E. Flannery, A. Ladd, A. Rudys, D. Wallach, and L. Kavraki, “Practical Robust Localization over Large-Scale 802.11 Wireless Networks,” Proc. ACM MobiCom '04, pp. 70-84, Sept./Oct. 2004.
[8] H. Hashemi, “The Indoor Radio Propagation Channel,” Proc. IEEE, vol. 81, no. 7, pp. 943-968, July 1993.
[9] P. Krishnan, A.S. Krishnakumar, W.H. Ju, C. Mallows, and S. Ganu, “A System for LEASE: Location Estimation Assisted by Stationary Emitters for Indoor RF Wireless Networks,” Proc. IEEE INFOCOM '04, pp. 1001-1011, Mar. 2004.
[10] A. Ladd, K. Bekris, G. Marceau, A. Rudys, L. Kavraki, and D. Wallach, “Robotics-Based Location Sensing Using Wireless Ethernet,” Proc. ACM MobiCom '02, pp. 227-238, Sept. 2002.
[11] L.M. Ni, Y. Liu, Y.C. Lau, and A.P. Patil, “LANDMARC: Indoor Location Sensing Using Active RFID,” Proc. First IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '03), pp. 407-415, Mar. 2003.
[12] J.R. Quinlan, “Learning with Continuous Classes,” Proc. Fifth Australian Joint Conf. Artificial Intelligence, 1992.
[13] NDIS Developer's Reference, http:/www.ndis.com/, 2007.
[14] Inc. RF Code, http:/www.rfcode.com, 2007.
[15] T. Roos, P. Myllymaki, H. Tirri, P. Misikangas, and J. Sievanen, “A Probabilistic Approach to WLAN User Location Estimation,” Int'l J. Wireless Information Networks, vol. 9, no. 3, pp. 155-164, July 2002.
[16] S. Roweis and L. Saul, “Nonlinear Dimensionality Reduction by Locally Linear Embedding,” Science, vol. 290, pp. 2323-2326, 2000.
[17] Y. Wang and I. Witten, “Inducing Model Trees for Continuous Classes,” Proc. Ninth European Conf. Machine Learning (ECML '97), pp. 128-137, Apr. 1997.
[18] I.H. Witten and E. Frank, Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, 2000.
[19] J. Yin, X. Chai, and Q. Yang, “High-Level Goal Recognition in a Wireless LAN,” Proc. 19th Nat'l Conf. Artificial Intelligence (AAAI '04), pp. 578-584, July 2004.
[20] J. Yin, Q. Yang, and L.M. Ni, “Adaptive Temporal Radio Maps for Location Estimation,” Proc. Third IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '05), pp. 85-94, Mar. 2005.
[21] M. Youssef and A. Agrawala, “Small-Scale Compensation for WLAN Location Determination Systems,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '03), vol. 3, pp. 1974-1978, Mar. 2003.
[22] M. Youssef and A. Agrawala, “Handling Samples Correlation in the Horus System,” Proc. IEEE INFOCOM '04, pp. 1023-1031, Mar. 2004.
[23] M. Youssef, A. Agrawala, and U. Shankar, “WLAN Location Determination via Clustering and Probability Distributions,” Proc. First IEEE Int'l Conf. Pervasive Computing and Comm. (PerCom '03), pp. 143-150, Mar. 2003.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool