1. Introduction
Recently, the problem of the source localization in wireless sensor networks (WSNs) has received considerable attention due to its increasingly widespread application, such as in smart transportation system, monitoring systems, and intrusion target detection systems [1]-[4]. Among the detection area, there are a number of sensors called sensing nodes which are deployed for localization problems in WSNs. Based on the measured data of sensing nodes, the final goal of the localization problem is to estimate the position of an unknown source. Considering the scenarios, most of the current localization methods were designed for two-dimentional (2-D) problems. However, three-dimentional (3-D) localization is also needed in some cases, such as the localization problem of unmanned aerial vehicles (UAVs) in some special environments, and the target source localization in vocal concert environments [5]-[7].
Many kinds of the localization methods such like received signal strength (RSS) based algorithms or their improved methods have been investigated which are based on the measured energy data [8]-[11]. Most of these methods were designed in 2-D and can be extended to 3-D cases. However, one problem with these distance estimated localization techniques is that the signal propagation model should be correctly and concisely described. Due to the varying air-ground topography, wireless radio channels are more seriously suffered by noise and other interference, the signal model can not be clearly depicted. Hence, the final measurements are deviating from the real data, which further decrease the final estimated source position precision [12]-[13].
The fingerprint localization technique, which uses a radio map to determine user locations, has received considerable attention [14]-[16]. Different from determining distances, this method first constructs the fingerprint database by measuring the source’s RSS values at each point during an offline phase. Whenever the source requests services, the position can be quickly estimated by matching the sensing data with the previously constructed fingerprint database and finding the best item during the online phase. Due to the learning mechanism used, the fingerprinting method is less sensitive to complex conditions and can provide relatively accurate localization performance [17]-[19].
As described above, an offline fingerprint database must be constructed for the training phase of the fingerprint based localization, which is composed of the RSS value collected at each grid point of the testing area. However, due to various obstacles, quickly building a complete fingerprint database may not be possible. Firstly, some measured data may not be available given the difficulty of a complicated environment, such as some remote corners, which leads to an incomplete fingerprint database. Secondly, the number of grid points to be trained in 3-D localization are increasing when compared to 2-D scenes, which results in a high computation requirement. Also, to more precisely estimate a position, a high density of grid points is prefered, which also increases the training burden. Thirdly, to strive for an accurate estimation, a recalibration procedure is needed whenever the environmental changes occur in the measured area, which will further increase the training effort [20]. To complete the data matrix and reduce the data collecting overhead, some related works based on signature map construction were investigated [21]-[26]. To data, this idea have mainly been applied in the field of data processing, which shows a bright future in the localization problem.
In this paper, an efficient source localization technique is developed to solve the abovementioned problems. By analyzing the problems in the completion of the fingerprint and the 208 reduction of the sensing overhead in the training phase, we find that the core issue involves using less measurement data to complete the unknown data of other grid points. Aimed at the issue, we first exploit the RSS spatial correlation and show the low rank property of the RSS data matrix measured in the localization area. By using this property, a tensor completion scheme is then proposed to effectively recover the incomplete fingerprint database in the training phase. Furthermore, we propose a kernel based learning technique in the matching process that can simplify the localization problem and improve the sensitivity and accuracy in fingerprint matching.
Specifically, the contributions of this paper are summarized as follows:
- We exploit the spatial correlation of the RSS data and propose a novel training scheme based on tensor completion. Since the tensor completion can efficiently generate a complete fingerprint database, the effort and time spent during training phase can be substantially reduced by the proposed training scheme and the integrity of the fingerprint database is also improved.
- We introduce a kernel based learning method in the matching phase. The kernel based method simplifies source localization by clarifying the complicated relationship between the fingerprint and the corresponding position and identifying the source position more effectively, which further improves the localization precision.
- Finally, we present some deeper insights into the proposed scheme. By comparison, the simulation results show the effectiveness of the proposed method.
The rest of this paper is structured as follows. In Section 2, the preliminaries of the our work is described, which conclude the basic signal model and the RSS spatial correlation property. Then, the efficient kernel based 3-D localization algorithm via tensor completion is proposed in Section 3. In Section 4, we provide the simulation results which to demonstrate the effectiveness of the new proposed algorithm. Finally, the main conclusions are summarized in Section 5.
2. Preliminaries
2.1 Signal Model
We considered the fundamental signal model of the localization problem. In the measured environment, we put \(M\) sensing nodes for localization, the positions of these nodes are known and the sensing nodes are gridding distributed. The target source performs random distribution and its position is unknown. The estimate the source position, we should firstly measured the received power of each sensing node from the unknown source. By using the radio propagation path loss model, the average received power \(P_i\) of the \(i^{th}\) sensing node can be written as [11].
\(P_i(dB)-P_t(dB)=K-10\gamma log_{10}(\frac{d_i}{d_0})+n_i\) (1)
where \(P_t\) is the transmit power of the unknown source; \(d_0\) is the reference distance which is normally taken as 1 m; \(d_i\) is the real distance of the \(i^{th}\) sensing node and source; and \(n_i\) is the Gaussian distributed measurement noise; \(K\) is a constant value and \(\gamma\) is the pass loss exponent.
2.2 RSS Correlation Property
In this part, the spatial correlation of the RSS measurements received from the sensing nodes is exploited. Since that the limited number of freedom degrees means that the rank of the measurement data matrix is much lower than its dimension. The correlations of the measured data can also be implied by the lower freedom degrees of the data matrix [20]. The RSS data correlation as well as thelow rank nature of the data matrix which showed by the normalized singular values can be observed in Fig. 1.
Fig. 1. Normalized singular values of the data matrix in the simulation model.
The figure can clearly show that the first few singular values are containing most of the energy, whereas additional singular values which caused by noise-like phenomena that exhibit much lower energy. The exploited low rank nature of the sensing data matrix plays a pivotal role in our proposed localization technique.
3. Efficient Kernel Based 3-D Source Localization via Tensor Completion
In this part, we propose our novel efficient kernel based localization technique. The new algorithm exploits the spatial correlation of the RSS measurements in the sensing data matrix. By taking advantage of this property, the localization overhead in the training procedure is further reduced. The proposed algorithm is divided into two phases: the training phase, which provides a subset of the RSS measurements for some grid points and then recovers the grid points to build the complete reference fingerprint database; and the matching phase, which uses kernel learning to find the best estimation for the source position. In the following, we describe these two phases in detail.
3.1 Training Phase
The core task of the training phase involves building the fingerprint database. Firstly, in some grid points among the measurement area that were chosen randomly, we record all the measured RSS data received by sensing nodes from the constructing node. Since only part of the grid points are used for data collecting, tensor completion was used to complete the entire data matrix based on the incomplete data. Finally, all RSS vector data of all the grid points formed the entire fingerprint database.
Specifically, for a random sensing node \(m\), the recorded data matrix can be written as
\(\mathbf{\Phi}_{\Omega}=\left\{\begin{array}{ll} \boldsymbol{\Phi}, & i \in \Omega \\ 0, & \text { otherwise } \end{array}\right.\) (2)
where \(\Omega\) is the subset of the grid points that are used for data collecting, \(i\) is the corresponding serial number, and \(\Phi\) is the measured data matrix we want to recover as precisely as possible.
After that, an optimization problem can be modeled by the tensor completion for the missing RSS value, which is try to complete the whole data by using the known subset. The problem can be which is written as
\(\begin{aligned} &\min _{\boldsymbol{\Phi}}\|\boldsymbol{\Phi}\|_* \\ &s . t . \mathbf{\Phi}_{\Omega}=\mathbf{\Gamma}_{\Omega} \end{aligned}\) (3)
where \(|| \ ||_*\) denotes the tightest convex envelop for the rank of matrix. \(\Phi\) is the incomplete tensor to be completed. Since the sensing data are a 3-D matrix, \(\Phi_\Omega\) and \(\Gamma_\Omega\) are three-mode tensors and the size in each mode are the same. Entries of \(\Gamma_\Omega\) from the set \(\Omega\) are known whereas the remaining entries are missing. Since that computing the rank of a tensor is an NP hard problem which can not be directly solved, we introduce the following definition for the tensor trace norm [23]:
\(\|\mathbf{\Phi}\|_{*}:=\sum_\limits{i=1}^{3} \delta_{i}\left\|\mathbf{\Phi}_{(i)}\right\|_*\) (4)
where \(\sum_\limits{i=1}^{3} \delta_{i} =1\) is content and \(\delta_{i} \geq 0 .\left\|\mathbf{\Phi}_{(i)}\right\|\) denotes the norm of unfolded matrix \(\Phi_{(i)}\). However, a tensor’s trace norm is consistent with all the matrices unfolded along each mode. Based on this, the above mentioned problem is further written as:
\(\begin{aligned} &\min _{\boldsymbol{\Phi}}\sum_\limits{i=1}^{3} \delta_{i}\|\boldsymbol{\Phi_{(i)}}\|_* \\ &s . t . \mathbf{\Phi}_{\Omega}=\mathbf{\Gamma}_{\Omega} \end{aligned}\) (5)
Due to the interdependence among the matrix trace norm terms, the problem in Equation (5) is challenging to solve. Hence, we introduced the additional matrices\(\left\{\mathbf{T}_{1}, \mathbf{T}_{2}, \mathbf{T}_{3}\right\}\) to split these interdependent terms. The problem in Equation (5) can be simplified as follows:
\(\begin{aligned} &\min _{\boldsymbol{\Phi}, T_i}\sum_\limits{i=1}^{3} \delta_{i}\|\boldsymbol{T_i}\|_* \\ &s . t . \mathbf{\Phi}_{(i)}=\mathbf{T}_{i} \quad\quad i =1,2,3. \\ & \quad \quad \Phi_\Omega = \Gamma_\Omega \end{aligned}\) (6)
In order to solve this convex optimization problem, we are trying to use the alternating direction method of multipliers (ADMM). Firstly, we use the tensor versions \(\beta_i\) to replace the corresponding matrix \(T_i\) :
\(\begin{aligned} &\min _{\boldsymbol{\Phi}, \beta_1, \beta_2, \beta_3 }\sum_\limits{i=1}^{3} \delta_{i}\|\boldsymbol{\beta_{i(i)}}\|_* \\ &s . t . \mathbf{\Phi}_{(i)}=\mathbf{\beta}_{i} \quad\quad i =1,2,3. \\ & \quad \quad \Phi_\Omega = \Gamma_\Omega \end{aligned}\) (7)
Finally, we define the augmented Lagrangian function as follows:
\(L_{\rho}\left(\boldsymbol{\Phi}, \boldsymbol{\beta}_{i}, \boldsymbol{\gamma}_{i}\right)=\sum_\limits{i=1}^{n} \delta_{i}\left\|\boldsymbol{\beta}_{i(i)}\right\|_{*}+\left\langle\boldsymbol{\Phi}-\boldsymbol{\beta}_{i}, \boldsymbol{\gamma}_{i}\right\rangle+\frac{\rho}{2}\left\|\boldsymbol{\Phi}-\boldsymbol{\beta}_{i}\right\|_{F}^{2}\) (8)
According to the ADMM framework, the augmented Lagrangian function is applied toupdate \(\beta_i\) , \(\Phi\), and \(\gamma_i\) iteratively.
After the iteration, the final recovered data matrix of the th m sensing node is achieved. The same procedure can be applied to the other sensing nodes for their data matrix completion, \(\left\{\Phi^1, \Phi^2, \cdots, \Phi^M\right\}\).
To facilitate the following analysis, we further translated the above data matrices into a new matrix form. Specifically, for a fixed grid p, the fingerprint vector can be written as
\(\vec{F}_{R, p}=\left[P_{R, p}^{1}, P_{R, p}^{2}, P_{R, p}^{3}, \cdots, P_{R, p}^{M}\right]\) (9)
The entire fingerprint database is:
\(\mathbf{D}=\left[\vec{F}_{R, 1}, \vec{F}_{R, 2}, \vec{F}_{R, 3}, \cdots, \vec{F}_{R, N}\right]^{T}\) (10)
3.2 Matching Phase
When the unknown source is set in the area, the fingerprint vector can also be achieved, which is written as
\(\vec{F}_{S}=\left[P_{r, S}^{1}, P_{r, S}^{2}, P_{r, S}^{3}, \cdots, P_{r, S}^{M}\right]\) (11)
In the matching phase, by defining a model \(\Psi(\ )\) to estimate the source position, the estimated coordinates can be written as
\(\hat{\mathbf{x}}=\mathbf{\Psi}\left(\vec{F}_{s}\right)\) (12)
where \(\vec F_S\) is an input entry of the defined model \(\Psi(\ )\) and \(\hat{\mathbf{x}}\) is the corresponding estimated position.
Hence, the objective was to find the model \(\Psi(\ )\) associated with the fingerprint \(\vec F_{R,P}\) and the corresponding \(\hat{\mathbf{y}}_p\) output . Since that this is a 3-D problem, let \(\hat{\mathbf{y}}_{p}=\left(\hat{y}_{p, 1}, \hat{y}_{p, 2}, \hat{y}_{p, 3}\right)\) be the estimated position of the reference node in point p. Also, \(\Psi(\ )\) can be written as \(\Psi(\ )=(\Psi_1(\ ), \ \Psi_2(\ ), \ \Psi_3(\ ))\), where \(\Psi_d(\ )\) is responsible for the estimation of the \(d_{th}\) coordinate and \(d\) is an indicator for a random dimension.
Table 1. Commonly used kernels with parameters \(c>0, d \in N_{+}, \sigma>0\)
In this part, the functions \(\Psi_d(\ )\) is determined by the kernel based learning method. Hence,a reproducing kernel Κ is considered and υis its Reproducing Kernel Hilbert Space (RKHS) with inner product \(<,>_v\) [27]. Here some of the commonly used kernel functions are showed in Table 1. Then, the function \(\Psi_d(\ )\) is obtained by minimizing the following regularized empirical risk:
\(\xi\left(\left(p_{1, d}, \Psi_{d}\left(\vec{F}_{R, 1}\right)\right), \ldots,\left(p_{N, d}, \Psi_{d}\left(\vec{F}_{R, N}\right)\right)\right)+\eta \zeta\left(\left\|\Psi_{d}\right\|_{v}^{2}\right)\) (13)
where \(\xi\) is an arbitrary cost function, for example, the mean squared error. \(\zeta\) is defined as areal-valued function which is strictly monotonically increased. \(||\ ||_v\) is the norm in the RKHS. \(\eta\) is set to be a positive tunable parameter, which is used to control the trade-off between the fitness error and the solution complexity as measured by the norm in the RKHS.
Specifically, the first term in Equation (13) is taken using the mean squared error of the estimated position \( \Psi_{d}(\vec{F}_{R, 1})\) and the real position \(y_{p,d}\),
\(\xi\left(\left(p_{1, d}, \Psi_{d}\left(\vec{F}_{R, 1}\right)\right), \ldots,\left(p_{N, d}, \Psi_{d}\left(\vec{F}_{R, N}\right)\right)\right)=\frac{1}{N} \sum_\limits{p=1}^{N}\left(y_{p, d}-\Psi_{d}\left(\vec{F}_{R, p}\right)\right)^{2}\) (14)
The regularization term in Equation (13) is changed in its simplest form as \(||\Psi_d||_v^2\). Hence, the optimization problem is finally defined, which is written as [28]:
\(\min \frac{1}{N} \sum_\limits{p=1}^{N}\left(y_{p, d}-\Psi_{d}\left(\vec{F}_{R, p}\right)\right)^{2}+\eta\left\|\Psi_{d}\right\|_{v}^{2}\) (15)
By determining the \(a_{p,d}\) and transforming it into a finite dimension, we express the minimizer \(\Psi_d(\ )\) as a finite linear combination of the kernels. Hence, the problem of the minimizer of the regularized empirical risk in Equation (13) is described in a simpler form, as follows:
\(\Psi_{d}(*)=\sum_\limits{p=1}^{N} \alpha_{p, d} \mathbf{K}\left(\vec{F}_{R, p}, *\right)\) (16)
By combining Equation (15) and (16), we obtain the following optimization problem in terms of \(a_{*,d}\) :
\(\min \left(\mathbf{P}_{*, d}-\mathbf{K} \boldsymbol{\alpha}_{*, d}\right)^{T}\left(\mathbf{P}_{*, d}-\mathbf{K} \boldsymbol{\alpha}_{*, d}\right)+\eta N \boldsymbol{\alpha}_{*, d}^{T} \mathbf{K} \boldsymbol{\alpha}_{*, d}\) (17)
where \(P_{*,d}\) is the th d coordinate of all the grid points, which is\(\mathbf{P}_{*, d}=\left[y_{1, d}, \cdots, y_{p, d}, \cdots, y_{N, d}\right]\). K is the \(N \times N\)matrix and the \((i, j) th\) entry is \(v\left\langle\rho_{i}, \rho_{j}\right\rangle\) , for \(i, j \in\{1,2, \cdots, N\}\) . Also, \(a\) is defined as a \(N \times N\) matrix, which the \(d^{th}\) column of \(a\) is \(a_{*,d}\) and the \(p^{th}\) line is \(a_{p,*}\).
This is a classical quadratic regression problem, we further transform it into the following forms:
\(\mathbf{K P}_{*, d}+\mathbf{K}^{2} \boldsymbol{a}_{*, d}+\eta N \mathbf{K} \boldsymbol{a}_{*, d}=\mathbf{0}\) (18)
Thus, we obtain the following form of the solution:
\(\boldsymbol{\alpha}_{*, d}=(\mathbf{K}+\eta N \mathbf{I})^{-1} \mathbf{P}_{*, d}\) (19)
where \(I\) is the \(N \times N\) identity matrix.
After calculating the estimation of all the dimensions, the whole formulation can be written as:
\(\boldsymbol{\alpha}=(\mathbf{K}+\eta N \mathbf{I})^{-1} \mathbf{P}\) (20)
Using Equation (16) and the definition of the vector of functions \(\Psi(\ )\) , we now define amodel that allows us to estimate all three coordinates of the unknown source at once, as follows:
\(\Psi(*)=\sum_{p=1}^{N} \alpha_{p, *} \mathbf{K}\left(\vec{F}_{R, p}, *\right)\) (21)
Therefore, by using the source fingerprint \(\vec F_S\) as the input entry, the final estimated position \(\hat{\mathbf{x}}\) is calculated.
The overall efficient source localization algorithm is summarized in Algorithm 1.
4. Performance Evaluation
4.1 Simulation Setup
Fig. 2 shows the fundamental simulation scenario. In this scenario, the measured area was a 20 × 20 ×20 m cube and nine sensing nodes were deployed at the known coordinates (0,0), (0,10), (0,20), (10,0), (10,10), (10,20), (20,0), (20,10), (20,20) in meters. The unknown source was distributed randomly in the area. The measured area was divided into 10 × 10 × 10 grids, thus, each grid was about a 2 × 2 × 2m cube area. For signal propagation modeling, the transmitting power of the source is \(P_S\) = 0dBm. The pass loss exponent is \(\gamma\) = 3. The AWGN is with zero mean and a variance \(\sigma = 1\). To reduce the overhead, only a part of the grid are used to collect the RSS data in the training process. The sampling rate is set to be 0.5 and the samples are chosen randomly.
Fig. 2. The configuration of the simulation scenario.
4.2 Effectiveness analysis of the proposed localization algorithm
In the following analysis, the root mean square error (RMSE) metric is used to compare the position estimation performance of different algorithms. The RMSE can clearly show the performance variation under each condition.
\(R M S E=\sqrt{\frac{1}{T} \sum_\limits{i=1}^{T}\left\|\hat{\mathbf{x}}_{i}-\mathbf{x}_{i}\right\|^{2}}\) (22)
where \(\hat{\mathbf{x}}\) is the estimated position of the unknown source and \({\mathbf{x}}\)is the correct position. \(T\) is set to be the simulation time.
Also, we have performed several localization schemes under different conditions for comparison, which is to demonstrate the effectiveness of the proposed novel localization algorithm. The schemes are listed as follows.
- A baseline scheme called “Original Data + Kernel” (OD-Kernel scheme), which directly uses the complete sensing data to perform the position estimation. Meanwhile, the kernel learning method is used for the matching phase.
- A baseline scheme called “Tensor Completion + Kernel” (TC-Kernel scheme), which uses the incomplete data and processed by tensor completion method for the position estimation. In the matching phase, the kernel learning method is used to find the best point. Note that this scheme is also our proposed algorithm.
- A baseline scheme called “Interpolation Completion + Kernel” (IC-Kernel scheme), which uses the incomplete data and processed by an interpolation completion method in [29] for the final position estimation. The kernel learning method is used to find the best point in the matching phase.
- A baseline scheme called “Tensor Completion + KNN” (TC-KNN scheme), which uses the incomplete data and processed by tensor completion method for the final position estimation. However, the matching phase uses the K-nearest neighbor (KNN) method to find the best matching point.
- A baseline scheme called “Interpolation Completion + KNN” (IC-KNN scheme), which uses the incomplete data and processed by an interpolation completion method for the final position estimation. Also, the KNN method is used to find the best matching point.
The effect of the data sampling rate on the RMSE of the source position estimate is presented in Fig. 3. Especially, the effectiveness of the tensor completion is shown in this simulation, so that only the localization schemes using kernel learning are compared. From the figure, by using the tensor completion, our proposed TC-Kernel scheme obviously improved the localization precision when compared with the IC-Kernel scheme. This occurred because the tensor completion can efficiently recover the incomplete sensing data matrix, which increased the precision of the final position estimation. When the data sampling rate increased, our proposed TC-Kernel scheme gradually reached a comparative performance to the OD-kernel scheme, while the overhead was almost cut in a half. Also, a phenomenon is seen that our proposed method may have worse performance when the sampling rate is lower, such as 0.2. A rational explanation may be that too little existed sensing data exceed the tolerance of tensor completion, which is more sensitive compared to the IC-Kernel scheme.
Fig. 3. Effect of the tensor completion on RMSE versus data sampling rate.
Fig. 4 shows the effect of the data sampling rate on the RMSE of several localization schemes. The effectiveness of the kernel method on the localization performance is mainly verified in this part. By using the kernel method, the TC-Kernel scheme and the IC-Kernelscheme are all performed well when compared with the other schemes, which attained a position precision of about 0.8 m, when the sampling rate was greater than 0.5. However, when comparing the TC-Kernel scheme with the IC-Kernel scheme, an interesting phenomenon occurred: the superiority of our proposed scheme disappeared gradually as the sampling rate decreased. A rational explanation for this observation may be that the kernel method is more sensitive than the KNN method especially in harsh cases. As the sampling rate decreased, the effciency of the tensor completion similarly decreased, the increasing error data generated will definitely impair the finally localization, which influences the kernel learning method more than the KNN method.
Fig. 4. Effect of the kernel learning on RMSE versus data sampling rate.
Fig. 5 shows the effect of the number of sensing node on the source position estimation for each schemes. In the figure, using different matching methods have distrinct performance trends. The KNN method, the TC-KNN scheme and the IC-KNN scheme all demonstrate a monotonically decreasing trend along with the number of sensing nodes, which means that the localization performance improves gradually. For this reason, increasing the number of sensing nodes will enlarge the sensing data matrix and further improve the localization precision. However, when using the kernel based schemes (TC-KNN and IC-KNN), the performance decreased whenzhe number of nodes was nine or less, but as the sensing node number increased above nine, the localization performance decreased. A possible reason for this may be that since the sampling rate was fixed, increasing the number of sensing nodes enlarged the sensing data matrix, but also introduced more missing data that required completion. Since the kernel method is more sensitive than the KNN method, when the sensing node number is much larger, the increasing error in the completed data becomes excessive, so the performance of the kernel based schemes decreased. However, our proposed scheme still outperformed the other schemes despite the variation in the number of the sensing nodes.
Fig. 5. Effect of the number of sensing node on RMSE for various schemes.
Fig. 6 illustrates the effect of noise variance on the source position precision for each schemes. The large noise variance resulted in a small signal tonoise ratio (SNR), which resulted in poor performance for all the schemes. From Fig. 6 we can see that whatever the noise variance is set, the proposed TC-Kernel scheme is always achieves a better performance when compared with other algorithms.
Fig. 6. Effect of the noise variance on RMSE for various schemes.
5. Conclusion
In this paper, an efficient kernel based source localization method via tensor completion is proposed. We first exploit the RSS spatial correlation and uses a tensor completion scheme to effectively recover the incomplete fingerprint database. Furthermore, we propose a kernel based learning technique which can simplify the localization problem and improve the sensitivity and accuracy in fingerprint matching. Simulation results showed that our new localization technique can effectively eliminate the impairment caused by incomplete sensing data and improve the localization performance. For future work, we will consider the real multi-channel data and try to figure out the frequency domain property of the measured data, which will further improve the accuracy of the completed data and increase the precision of the localization estimation.
Acknowledgement
We express sincere appreciation for the support from Beijing education science Project (No. SM201810038006); the Young-Middle-Ages Backbone Teachers of Capital University ofeconomics and business.
References
- I. T. Haque, and C. Assi, "Profiling-based indoor localization schemes," IEEE Systems Journal, vol. 9, no. 1, pp. 76-85, Sep. 2013. https://doi.org/10.1109/JSYST.2013.2281257
- E. Dall'Anese, S.-J. Kim, and G. B. Giannakis, "Channel gain map tracking via distributed kriging," IEEE Trans. Veh. Technol., vol. 60, no. 3, pp. 1205-1211, Mar. 2011. https://doi.org/10.1109/TVT.2011.2113195
- J. Hong, and T. Ohtsuki, "Signal eigenvector-based device-free passive localization using array sensor," IEEE Trans. Veh. Technol., vol. 64, no.4, pp. 1354-1363, Apr. 2015. https://doi.org/10.1109/TVT.2015.2397436
- N. Saeed, and H. Nam, "Robust multidimensional scaling for cognitive radio network localization," IEEE Trans. Veh. Technol., vol. 64, no. 9, pp. 4056-4062, Sep. 2015. https://doi.org/10.1109/TVT.2014.2366515
- F. Lazzari, A. Buffi, P. Nepa, and S. Lazzari, "Numerical Investigation of an UWB Localization Technique for Unmanned Aerial Vehicles in Outdoor Scenarios," IEEE sensors J., vol. 17, no. 9, pp. 2896-2903, May 2017. https://doi.org/10.1109/JSEN.2017.2684817
- W. Cui, C. Wu, W. Meng, B. Li, Y. Zhang, and L. Xie, "Dynamic Multidimensional Scaling Algorithm for 3-D Mobile Localization," IEEE Transactions on Instrumentation and Measurement, vol. 65, no. 12, pp. 2853-2865, Dec. 2016. https://doi.org/10.1109/TIM.2016.2608518
- Y. Wang, and K. C. Ho, "An Asymptotically Efficient Estimator in Closed-Form for 3D AOA Localization Using a Sensor Network," IEEE Transactions on Wireless Communications, vol. 14, no. 12, pp. 6524-6535, Dec. 2015. https://doi.org/10.1109/TWC.2015.2456057
- R. M. Vaghefi, M. R. Gholami, R. M. Buehrer, and E. G. Strom, "Cooperative received signal strength-based sensor localization with unknown transmit powers," IEEE Trans. Signal Process., vol. 61, no. 6, pp. 1389-1403, Mar. 2013. https://doi.org/10.1109/TSP.2012.2232664
- M. R. Gholami, R. M. Vaghefi, and E. G. Strom, "RSS-based sensor localization in the presence of unknown channel parameters," IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3752-3759, Aug. 2013. https://doi.org/10.1109/TSP.2013.2260330
- L. Lu, H. Zhang, and H.-C. Wu, "Novel energy-based localization technique for multiple sources," IEEE Systems J., vol. 8, no. 1, pp. 142-150, Mar. 2014. https://doi.org/10.1109/JSYST.2013.2260628
- H. Lohrasbipeydeh, T. A. Gulliver, and H. Amindavar, "Blind received signal strength difference based source localization with system parameter errors," IEEE Trans. Signal Process., vol. 62, no. 17, pp. 4516-4531, Sep. 2014. https://doi.org/10.1109/TSP.2014.2336634
- C.-Y. Shih and P. J. Marron, "COLA: Complexity-reduced trilateration approach for 3D localization in wireless sensor networks," in Proc. of 4th Int. Conf. Sensor Technol. Appl. (SENSORCOMM), pp. 24-32, 2010.
- P. Pivato, L. Palopoli, and D. Petri, "Accuracy of RSS-based centroid localization algorithms in an indoor environment," IEEE Trans. Instrum. Meas., vol. 60, no. 10, pp. 3451-3460, Oct. 2011. https://doi.org/10.1109/TIM.2011.2134890
- Q. D. Vo and P. De, "A Survey of Fingerprint-Based Outdoor Localization," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 491-506, 1st Quart. 2016. https://doi.org/10.1109/COMST.2015.2448632
- S. He and S.-H. G. Chan, "Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons," IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 466-490, 1st Quart. 2016. https://doi.org/10.1109/COMST.2015.2464084
- Q. Chen and B. Wang, "FinCCM: Fingerprint Crowdsourcing, Clustering and Matching for Indoor Subarea Localization," IEEE Wireless Commun. Lett., vol. 4, no. 6, pp. 677-680, Dec. 2015. https://doi.org/10.1109/LWC.2015.2482971
- S.-H. Fang, Y.-T. Hsu, and W.-H. Kuo, "Dynamic Fingerprinting Combination for Improved Mobile Localization," IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 4018-4022, Dec 2011. https://doi.org/10.1109/TWC.2011.101211.101957
- E. Kupershtein, M. Wax, and I. Cohen, "Single-Site Emitter Localization via Multipath Fingerprinting," IEEE Trans. Signal Process., vol. 61, no. 1, pp. 10-21, Jan. 2013. https://doi.org/10.1109/TSP.2012.2222395
- M. Zhou, Y. Wei, Z. Tian, X. Yang, and L. Li, "Achieving Cost-efficient Indoor Fingerprint Localization on WLAN Platform: A Hypothetical Test Approach," IEEE Access, vol. 5, pp. 15865-15874, Aug. 2017. https://doi.org/10.1109/ACCESS.2017.2737651
- S. Nikitaki, G. Tsagkatakis, and P. Tsakalides, "Efficient Multi-Channel Signal Strength Based Localization via Matrix Completion and Bayesian Sparse Learning," IEEE Trans. Mobile Comput., vol. 14, no. 11, pp. 2244-2256, Nov. 2015. https://doi.org/10.1109/TMC.2015.2393864
- J. Liu, P. Musialski, P. Wonka, and J. Ye, "Tensor completion for estimating missing values in visual data," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 35, no. 1, pp. 208-220, Jan. 2013. https://doi.org/10.1109/TPAMI.2012.39
- S. Sorour, Y. Lostanlen, S. Valaee, and K. Majeed, "Joint indoor localization and radio map construction with limited deployment load," IEEE Trans. Mobile Comput., vol. 14, no. 5, pp. 1031-1043, May 2015. https://doi.org/10.1109/TMC.2014.2343636
- M. Tang, G. Ding, Z. Xue, J. Zhang, and H. Zhou, "Multi-dimensional spectrum map construction: A tensor perspective," in Proc. of Wireless Communications Signal Processing (WCSP), 2016 8th International Conference on, Oct. 2016.
- F. Xiao, W. Liu, Z. Li, L. Chen, and R. Wang, "Noise-Tolerant Wireless Sensor Networks Localization via Multi-norms Regularized Matrix Completion," IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2409-2419, Mar. 2018. https://doi.org/10.1109/TVT.2017.2771805
- J. Cheng, Z. Song, Q. Ye, and H. Du, "MIL: A mobile indoor localization scheme based on matrix completion," in Proc. of Communications (ICC), 2016 IEEE International Conference on, 2016.
- M. Tang, G. Ding, Q. Wu, Z. Xue, and T. A. Tsiftsis, "A Joint Tensor Completion and Prediction Scheme for Multi-Dimensional Spectrum Map Construction," IEEE Access, vol. 4, pp. 8044-8052, Nov. 2016. https://doi.org/10.1109/ACCESS.2016.2627243
- G. Ding, Q. Wu, Y.-D. Yao, J. Wang, and Y. Chen, "Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions," IEEE Signal Processing Magazine, vol. 30, no. 4, pp. 126-136, Jul. 2013. https://doi.org/10.1109/MSP.2013.2251071
- S. Mahfouz, F. M.-Chehade, P. Honeine, J. Farah, and H. Snoussi, "Kernel -based machine learning using radio-fingerprints for localization in wsns," IEEE Transactions on Aerospace and Electronic Systems, vol. 51, no. 2, pp. 1324-1336, Apr. 2015. https://doi.org/10.1109/TAES.2015.140061
- M. Tang, Z. Zheng, G. Ding, and Z. Xue, "Efficient TV White Space Database Construction via Spectrum Sensing and Spatial Inference," in Proc. of Computing and Communications Conference, pp. 1-5, 2015.