Sei sulla pagina 1di 26

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/330713199

BLEMAT-Context Modeling and Machine Learning for Indoor Positioning


Systems

Preprint · December 2018


DOI: 10.13140/RG.2.2.12686.61763

CITATIONS READS

0 95

6 authors, including:

Sasa Pesic Milenko Tosic


University of Novi Sad La Citadelle Inzenjering
4 PUBLICATIONS   2 CITATIONS    13 PUBLICATIONS   29 CITATIONS   

SEE PROFILE SEE PROFILE

Ognjen Iković Mirjana Ivanovic

7 PUBLICATIONS   11 CITATIONS   
University of Novi Sad
378 PUBLICATIONS   2,364 CITATIONS   
SEE PROFILE
SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Asset Tracking View project

Teaching Introductory Programming View project

All content following this page was uploaded by Sasa Pesic on 29 January 2019.

The user has requested enhancement of the downloaded file.


December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

International Journal on Artificial Intelligence Tools


c World Scientific Publishing Company

BLEMAT - Context Modeling and Machine Learning for Indoor


Positioning Systems

Saša Pešić
University of Novi Sad, Faculty of Sciences, Department of Mathematics and Informatics, Trg
Dositeja Obradovića 4
Novi Sad, 21000, Serbia
sasa.pesic@dmi.uns.ac.rs

Milenko Tošić
VizLore Labs, Braće Ribnikar 56
Novi Sad, 21000, Serbia
milenko.tosic@vizlore.com

Ognjen Iković
VizLore Labs, Braće Ribnikar 56
Novi Sad, 21000, Serbia
ognjen.ikovic@vizlore.com

Miloš Radovanović
University of Novi Sad, Faculty of Sciences, Department of Mathematics and Informatics, Trg
Dositeja Obradovića 4
Novi Sad, 21000, Serbia
radacha@dmi.uns.ac.rs

Mirjana Ivanović
University of Novi Sad, Faculty of Sciences, Department of Mathematics and Informatics, Trg
Dositeja Obradovića 4
Novi Sad, 21000, Serbia
mira@dmi.uns.ac.rs

Dragan Bošković
VizLore Labs, Braće Ribnikar 56
Novi Sad, 21000, Serbia
dragan.boskovic@vizlore.com

Received (10 December 2018)

Indoor positioning systems are gaining the attention of the research community and
industry that try to solve challenges in the domain of smart spaces. In this paper, we
propose BLEMAT, a space-agnostic, context-aware fog computing system that performs
real-time indoor positioning, fingerprinting and floor plan layout detection. BLEMAT ac-
quires high accuracy and precision in position estimation while maintaining low resource
utilization. Through offering an approach to fingerprinting without system downtime,

1
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

2 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

BLEMAT takes a significant step in diminishing human efforts required to build signal
propagation maps. Furthermore, BLEMAT is a space-agnostic positioning system, aim-
ing to detect the floor plan layout of the operational context of the system. Based on
the results described in this paper, we are confident that the BLEMAT provides a solid
basis for deployment of high-performance location-aware IoT services and applications.

Keywords: IoT; Bluetooth indoor positioning; machine learning.

1. Introduction
The Internet of Things (IoT) services and applications rely heavily on context in-
formed decision making when performing automation of every day and mission-
critical operations. One of the main aspects of contextual awareness is knowing
precise location and spatial distribution of managed resources and IoT system users
in order to make proper decisions. This is why concepts like indoor positioning
and location tracking are gaining the attention of the research community and
industry that tries to solve challenges in the domain of smart spaces1 . These chal-
lenges include the efficient utilization of resources and energy efficiency2 , emergency
evacuation3 , security fencing, and asset tracking. In order to be solved, they require
knowledge of mobility patterns, space organization and layout and real-time location
of specific assets. Indoor positioning does not have a robust solution like outdoor po-
sitioning based on the global navigation satellite systems (GNSS). It relies on less
precise techniques based on video surveillance or wireless radio technologies like
Bluetooth, WiFi, Near Field Communication (NFC), etc. Solutions based on ra-
dio technologies are less intrusive than video surveillance, but, traditionally, require
detailed contextual insights including software representation of floorplans, organi-
zations‘ schedules and signal propagation maps. Preparing and maintaining these
contextual inputs for indoor positioning systems (IPS) is a cumbersome manual
task. This is why machine learning (ML) techniques are introduced as a potential
solution for indoor positioning based on radio signal propagation. Systems based
on ML collect signal and position related measurements and learn about their sur-
roundings and different patterns that impact the accuracy of the position estimation
tasks.
Services that leverage IPS are often referred to as position-based or location-
based services. On the other hand, there are proximity-based services, which provide
only information about the proximity of the object or a person, without disclosing
the exact position. IPS refer to a framework of network devices that communicate
wirelessly in order to provide position estimations of objects or people. There are
two distinguishable categories of IPS4 :

(1) IPS using specialized hardware (e.g., IR or RF tags, an ultrasound receiver,


etc.). They often require considerable deployment effort in term of infrastructure
and communication, as well as customized user devices or cards with integrated
chips.
(2) IPS built on top of existing technologies (e.g. based on WiFi or Bluetooth).
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 3

They leverage the infrastructural components of already deployed and used


systems (i.e. smartphones), thus reducing deployment time.

In the IPS that belong to the first group, position estimation is frequently de-
rived from point-to-point touch-based events (e.g. an employee scanned his ID card),
thus deliberating the system of heavy data collection, signal noise processing, signal
filtering, and finally position estimation calculation through triangulation or tri-
lateration. IPS that belong to the second group offer position estimation through
the observance and collection of different sources of signal. Often, receiver signal
strength (RSS), also known as RSS indicator (RSSI) is used to determine the dis-
tance between a source of the signal and its destination, employing a specific dis-
tance model, such as log-distance path loss model (PLM)5 , mean PLM6 , free space
PLM7 , etc. Once distance/angle has been established from destination to a number
of source points, triangulation or trilateration is used to pinpoint the exact loca-
tion. Both triangulation and trilateration are means to determine a position inside a
specified coordinate system using the help of anchor nodes whose position is known
(see Fig. 1).

Fig. 1. Trilateration and triangulation.

Since GPS is undependable within interior spaces due to lack of visual contact
with the satellite, IPS are obliged to resort to other positioning techniques. These
can include technologies like Bluetooth or Bluetooth Low Energy (BLE), WiFi,
radio frequency identification (RFID), etc. Indoor spaces require finer precision and
granularity of positioning accuracy. Whilst an error in position estimation of 5–10m
might be tolerable in outdoor environments when positioning is performed indoors
the error in estimation is significant and unacceptable. GPS cannot be used indoors
is due to the operational characteristics of the system - signals from the satellite
are not designed to penetrate most construction materials, and as a rule, require
line-of-sight transmission between receivers and satellites. Although none of these
technologies (WiFi, BLE) presents itself as robust as GPS, services that leverage IPS
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

4 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

are hastily gaining traction in closed spaces like airports, shopping malls, hospitals,
and other venues where indoor navigation, route guidance or position-based services
can prove to be indispensable. Accurate real-time indoor location determination is
essential to enabling various context-aware services and protocols8,9,10 .
When considering IPS deployment option, IoT is a suitable approach. IoT is a
hot topic of technological, economic, social and industrial importance. Driven by
artificial intelligence, cognitive computing and new solutions for device-to-device
connectivity as well as rising technologies concerning big data and data analytics,
the adoption of the Internet of Things concept is accelerating rapidly. Ciscoa predicts
a 2.4-fold growth in machine-to-machine IoT communications, from 6.1 billion in
2017 to 14.6 billion devices by 2022. The prediction paints a picture of accelerating
technological and economic growth, as well as increasing influence on different scales
as an added value to industry and global economy.
As an extension of IoT, there is the concept of fog computing. Fog computing
is a decentralized architecture that brings computational resources and application
services closer to data sources. It creates an environment for a new type of applica-
tions and services that rest on responsiveness, privacy protection, location aware-
ness, with improved quality of service for direct streaming of data. A micro-location
asset tracking system for large indoor spaces requires the properties brought by fog
computing systems and IoT. Through massive technology improvements of wireless
indoor localization hardware and software, tracking of resources in confined spaces
has become a challenge that holds a promise of being answered to, and also with a
high- quality, low-cost solution.
The rest of the paper is structured as follows: in Section 2 challenges in location
determination are presented; section S concerns itself with contributions of this
paper, in Ssection 4 related work is presented; Section 5 presents a novel approach for
context building implemented in BLEMAT; in Section 6 BLEMAT’s approach to ML
is presented; Section 7 concerns itself with results of the implemented experiments;
and finally, in Section 8 the paper is concluded and future work is presented.

2. Challenges in Location Determination


There are persistent challenges in precise indoor location determination: choice of
technology and signal characteristics, pre-deployment effort, selection of filtering
algorithms and selection of machine learning algorithms.
Most present solutions are based on WiFi or Bluetooth, in the 2.4 GHz frequency
band, that is very susceptible to noise and interference. Bluetooth uses radio fre-
quencies (RF), to wirelessly send signals between devices. When two Bluetooth
devices connect using the same band, the signal can be blocked. Presence of peo-
ple, metal objects, or other obstacles or RF reflective surfaces causes perturbation

a Cisco VNI: Forecast and Trends – http://www.cisco.com/c/en/us/solutions/service-


provider/visual-networking-index-vni/index.html, last access date: 12/6/2018
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 5

in signal propagation. Other electrical equipment emitting strong RFs might do


the same. Because WiFi uses the same 2.4 GHz bandwidth, these two signals also
often interfere with each other. Furthermore, geolocation calculated based on the
propagation of WiFi or Bluetooth signals might be inaccurate for a set of reasons:
(1) Signal perturbation and obstruction – Buildings, tunnels, clothing, the human
body, etc. are all obstructors of GPS and other positioning signals. This can
result in occasional outages of GPS and other network signals.
(2) Multipath signal distortion – The signal that arrives at the receiver might be
distorted by the multitude of reflective objects such as building or vehicles
outside, or walls and people inside. Signal distortion directly leads to errors in
location determination.
(3) Device design – the way the antennas and devices are designed can affect the
sensitivity of the signal and its’ ability to cope with interferences.
(4) Device setup – The accuracy of the location available to an application through
a device might be off due to different configuration options allowing the creation
of trade-offs between battery and accuracy, for example.
In terms of pre-deployment efforts, there are several issues that are connected
to IPS. Deployment of indoor positioning and asset tracking systems traditionally
requires multiple fixed beacons stationing at the observed closed space, where the
device being tracked is the midpoint of the system – it is responsible for beacon
scanning, carrying out calculations and in the end positioning itself on the space
map 11,12,13,14,15 . This approach has several issues: it often includes an excessive fin-
gerprinting phase, in order to create a spectral map throughout the space; beacons
deployed are fixed and cannot be reconfigured or changed easily; system recalibra-
tion can take a long time to finish, and requires a considerable amount of downtime
(i.e. change the advertising interval of every beacon, create a new fingerprint map,
etc.); system cannot adapt to contextual changes in the managed environment (i.e.
different flow of people throughout a day/week/year, new obstacles etc.).
Furthermore, specifying a fitting filtering model for signal perturbation is a well-
researched scientific topic and there are many approaches to it12,14,16 . Although
there are many referent filtering approaches in location determination: averages,
moving averages, Kalman filtering, autoregressive moving averages, etc. it is up to
the use-case requirements at hand to give most relevant information about the best
filtering approach. Furthermore, it is usually the case that many filtering methods
are combined to reach a final decision about the state of a value. These combina-
tions have to be handled carefully. In location determination, there are two distinct
approaches to filtering that can be considered: heuristic and statistical filtering. If
there is a broader knowledge about the use-case at hand, heuristic rules can be
used to filter data and can, thus, infer thresholds for accuracy, location age, speed
and change in location time, etc. Otherwise resorting to statistical filtering, which
involves forming an estimate of the location based on historical data - location
time series, is used. Recursive Bayesian estimator, Kalman filter, Particle filter are
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

6 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

representatives of statistical filtering approach in IPS 17 .


By recognizing the importance and advantages of machine-learning approaches
in indoor positioning, there is a challenge in modeling the approach that can best
work with the proposed filtering models, while overcoming the problems of the
constant signal perturbation. Based on data volume and structure, the appropriate
supervised and unsupervised machine-learning algorithms have to be selected. While
supervised methods can be used to perform fingerprinting or area presence detection,
unsupervised methods could be leveraged to detect clusters of locations and infer
useful presence and movement information.
Keeping in mind that traditional fingerprinting requires a big pre-deployment
effort, there is also a challenge in eliminating or diminishing the time required to
carry out this step in IPS, with the help of ML.

3. Related Work
In the positioning literature, machine learning algorithms have widespread usage in
estimating positions18 . To be able to guarantee high location estimation accuracy
and precision, most machine learning algorithms require a large number of carefully
labeled samples19,20 .
Through academic research, it has become evident that IPS cannot be precise
without contextual knowledge and aggressive filtering. Honggui Li14 presents a low-
cost 3D indoor positioning with Bluetooth smart device and least square methods
for linear and nonlinear parameters estimation. By fusing Bluetooth beacons and a
pedestrian dead reckoning (PDR) technique to provide meter-level positioning with
the help of Extended Kalman Filter (EKF) system, Xin Li, et.al.16 acquire 2-meter
precision. Qi Wang et.al.15 propose a Bluetooth positioning based on weighted K-
nearest neighbors and adaptive bandwidth man shift, which achieves high precision.
Cheng et.al.13 , utilize Kalman filtering, while Jianyong et.tl.21 propose Gaussian
filtering of RSSI and positioning optimization based on Taylor series expansion.
There are solutions proposing BLE and WiFi Combination22,23 with respect to
clear advantages of the approach. While following the trend of inducing machine
learning and consecutive filtering to different trilateration approaches, the above-
mentioned solutions are not space-agnostic – all reference nodes and the reference
space must be known at the time of deployment. Moreover, they mostly need a large
contextual dataset at the beginning, that is the WiFi or BLE spectral map of the
entire physical space.
A standard approach to building IPS is ML-based fingerprinting. Fingerprint-
ing requires a big pre-deployment effort to record a spectral map of the observed
space. This represents a major issue in the adoption and practical applications of
fingerprinting as a standard for location determination. When it comes to discussing
fingerprinting calibration and initial signal spectral map creation, there are a few
studies that aspired to diminish the human effort required for it. By analyzing and
studying crowdsourcing gathered unlabeled data to improve location estimation
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 7

accuracy, Gu et.al24 present a novel semi-supervised Deep Extreme Learning Ma-


chine (SDELM) algorithm, which takes the advantages of semi-supervised learning,
Deep Learning (DL), and Extreme Learning Machine (ELM), so that the localiza-
tion performance can be improved both in the feature extraction procedure and in
the classifier. Zhou et.al25 and Yang et.al26 have utilized user activities and mo-
tion data to help with online location estimation to estimate the final location.
Hence, a location accuracy comparable to that of using fingerprinting was achieved.
However, these methods still require a large amount of labeled data to ensure lo-
cation accuracy. Reducing human effort in data collection and space mapping is an
imperative27 , and it is a topic also addressed in our paper.
Graph-based space modeling, data acquisition, and information extraction mod-
els have been researched for IPS. Jensen, et.al.28 proposed a base graph and mapping
model to represent the topology of indoor space at different levels. Werner, et.al.29
provide a novel idea for graph-based data structure modeling for indoor naviga-
tion, for scalable and flexible geolocation querying. Hilsenbeck, et.al.30 proposed a
graph-based, low-complexity sensor fusion approach for ubiquitous pedestrian in-
door positioning using mobile devices. Our paper focuses on using graphs for both
data structure and indoor environment modeling, path persistence and exploration,
as well as semantic information extraction.
Unsupervised detection of floor plan layouts using contextual data in indoor
spaces is well-researched in academy31,32 . SmartSLAM33 enables unsupervised con-
struction of floor plan layouts, using odometry tracing with inertial sensors, WiFi
radio maps, and a Bayesian estimation. It uses the history of position estimations
and WiFi observations to build a representation of the floor plan, achieving good
results for low to average complexity floor plans. Using crowdsourced smartphone
data, odometry tracing, and clustering using dynamic time warping similarity crite-
ria Haiyong, et.al34 propose another approach to building estimations of floor plan
layouts. Mobile crowdsensing for indoor floor plan building was also research by
Gao, et.al35 . Our approach rests on contextual data as well (RSS), but does not
require any sensory data (such as odometer, pedometer, etc.). Crowdsensing in our
approach is carried out by observing beacons, extracting their typical paths and
quantifying them, without extra hardware (such as a mobile device). Thus, our ap-
proach abstracts more over the operational context of the IPS than the mentioned
approaches, while achieving good results.

4. Contributions Outline
BLEMAT is an upgrade to the results of two previous research papers 36,37 . It pro-
poses a novel approach to space-agnostic context building through a specific matrix,
grid and graph-based space modeling, online machine-learning based fingerprinting,
graph-based beacon paths persistence and exploration, and floor plan estimation.
On top of that, BLEMAT is a highly autonomous distributed fog computing system
offering auto-discovery and onboarding of new devices. Combining these features is
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

8 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

the key to developing a space-agnostic IPS and the research goal that this work
aspires to achieve. Furthermore, the contributions in this paper showcase:
(1) That the human work required to build the initial signal propagation map i.e.
fingerprinting map is vastly reduced with the proposed framework;
(2) That machine-learning algorithms for fingerprinting have a positive effect on
the final position estimation;
(3) That graph-based beacon path modeling, persistence, and analysis have a pos-
itive effect on the results of context building and space modeling, as well as
filtering of final position estimations.
Through this set of contributions, BLEMAT indirectly offers to speed up the
onboarding of new smart spaces systems, since it mitigates the need for digital
representation of a floor plan.
BLEMAT accounts for signal perturbation and distortion by employing a set
of filtering methods. It adapts to the changes in the system context by resting
on an infrastructure of gateways that communicate seamlessly and share contextual
information non-stop. BLEMAT utilizes ML for fingerprinting, where, in BLEMAT,
fingerprinting is an online-phase that requires minimal pre-deployment and data
acquisition efforts. It offers novel approaches to physical space modeling through
estimation of the floor plan layout. In conclusion, BLEMAT represents a significant
step in building context-aware, space-agnostic, distributed and autonomous IPS.

5. Context Building in BLEMAT


BLEMAT is a BLE-based IPS that rests on a deployed infrastructure of fog gate-
ways, that we call scanners. BLE beacons are the devices being tracked in the
system. Scanners are capable of scanning the environment for active beacons and
calculating their position in the space. Beacons are mobile and are emitting Blue-
tooth signal, also known as advertising.
A semi space-agnostic IPS needs to have access to system’s operational context
at all times. The operational context includes the flow of people, mobile and static
obstacles, other signal sources that cause signal distortion, failure of devices, etc.
As soon as the context changes, the models, approximations and workflows need
to be updated accordingly. In this section, a novel approach to context building
for IPS through matrix-grid space modeling fusion, and graph-based beacon path
persistence and exploration is proposed. This section will give foundations for imple-
mentation of floor plan layout detection, present the ideas behind the concept, and
proposes a context building approach that aggregates data in both mathematical
and visual styles.

5.1. Matrix-grid Space Modeling Fusion


At first, the matrix model of the observed indoor space is presented as a n x m
zero matrix, where n refers to the maximum length, and m to the maximum width
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 9

of the space (see Fig. 2). Matrix fields marked with Si represent the deployed
BLEMAT scanners in the matrix. In order to get insight into the physical context
the system operates in, BLEMAT first needs scanners to be deployed. It is important
to distinguish between every scanner, as each has its own characteristics - every Si
is characterized by its position in the observed space matrix, hardware, etc. So, at
first, the only two things that are known about the observed space are the maximum
width and length, and the position of deployed scanners. This is necessary to be
prepared as the first step in context-building.

 
S1 0 0 0 000 0 000 0 0
 0 00 0 000 0 000 0 0
 
 0 00 0 0 0 0 S3 0 0 0 0 0
 
M =
 0 00 0 000 0 000 0 0

 
 0 00 S2 0 0 0 0 0 0 0 0 0
0 00 0 0 0 0 0 0 0 0 S4 0

Fig. 2. Initial space matrix

Fig. 3 shows how each element of the matrix maps to an element in the grid
representation of the physical space. Every element of the matrix represents a 1m2
area of the observed physical space – this means that element (0, 0) corresponds
to the area of the space that represents a square meter around that element. From
Fig. 2 it is clear that the position of scanner S1 is inside element M [0, 0], meaning
that, on the floor plan its position is inside a square defined with four edges: (0, 0),
(0, 1), (1, 0) and (1, 1) (also visualized in Fig. 3 ). The figure shows the fusion of the

Fig. 3. Matrix-grid modeling fusion.

matrix representation and a 2-D grid representation. The matrix representation is


relevant as a basis for future algorithms and calculations that will be performed in
the rest of the paper, while the 2-D grid representation directly connects the matrix
representation to the observed physical space. In a 3-D IPS, there would be a 2-D
grid per building floor. The grid representation is further used for visualization
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

10 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

purposes and showcasing the results of the floor plan layout detection algorithm
(Section 7).

5.2. Graph-based Beacon Path Persistence and Exploration


This section concerns itself with our approach in using graphs, graph-related algo-
rithms and models to create a graph representation for all beacons that are part of
the system, through carefully collecting contextual data from the moment a beacon
is detected in the system. The aim of the beacon graph models is to persist move-
ment patterns for each beacon for future data analysis, enable detection of unusual
movement activity, and most significantly, improve position estimations accuracy in
the system and aid in context-building of the observed space. As already mentioned
before, graphs are created per beacon in the system. Graph GB is defined as:

Definition 1. Graph GB for a beacon B is a directed lattice graph38 where each


node is represented as:
Ni = {x, y, V }, Ein = {n | n ∈ N }, Eout = {m | m ∈ N }.

In Def. 1 elements x and y represent the position of a given node regarding the
observed space (x and y position in a 2-D grid representation). V represents a vector
of objects where each object is described by two attributes: timestamp and duration
of stay. Timestamp represents the exact time when beacon visited the node, and
the duration represents the duration of stay at that visited node in seconds. For
Ein /Eout , n is the number of transitions that have been made towards/outwards
the respective graph node.
Once a beacon has been detected in the system the graph maintenance frame-
work commences and adds the first node to the digraph GB . This node contains
the captured x and y positions, as well as one element in the vector of all visits,
V . If the position of a beacon in the system is captured every two seconds, then
a node and an edge are both added or updated in the graph representation. As
explained in Section 5.1 every captured position can be tied to a specific element
of the space matrix, as well a m2 of the observed physical space. Adding a new
node and a new edge means that the beacon has moved to another field in the ma-
trix/grid representation. If the beacon has not moved to another field, the node’s
information is updated accordingly (duration of stay for the current visits vector
element is increased).
To keep the graph representation simple, diagonal transitions are not allowed,
but are rather modeled as regular, straight-line, transitions with a intermediary
node. The intermediary node will not be updated, only the final destination node.
This is to distinguish the actual visited nodes from the ones that have only been
used to model the transitions. An example for graph GB is given in Fig. 4. GB
nodes are marked with N .
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 11

Fig. 4. Grid-graph modeling fusion.

The visual representation of the graph corresponds to the matrix and graph
representations, meaning that there are three overlapping representations for the
observed space and context, each of them providing unique insights into the oper-
ational context of the system, its elements, and the observed space. Once created
these graphs enable us to persist and explore beacon paths and extract patterns
from them, giving the possibility to detect anomalous behavior easily. Beacon paths
are persisted to a database for further processing and information retrieval.

5.3. Floor Plan Layout Detection


Based on information extracted from graph representations of multiple beacons
in the operational context, the first idea behind data collection is to perform floor
plan layout detection. Resting on the collected information about beacons and their
movements in a form of graphs described above, a set of mappings and algorithms
to aid in space modeling is proposed. It is offering detection of less and more fre-
quently visited areas, respectively extracting the floor plan layout. The basis for
this framework includes several steps:

(1) Defining a mapping between graph representations of beacons and matrix rep-
resentation of the observed space;
(2) Defining an algorithm to estimate floor plan layout from the collected data;
(3) Storing floor plan layout information and updating the matrix-grid space rep-
resentation.

A mapping has already been defined between matrix-grid and grid-graph rep-
resentations in Sections 5.1 and 5.2. Defining a mapping between graph represen-
tations of beacons and matrix representation of the observed space is the first step
in performing floor plan layout detection, and is necessary to complete the circle
between all representations. The mapping can be defined naturally since the matrix-
grid-graph representations of the observed space and its context overlap. The data
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

12 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

from the graphs complement the matrix representation, and the matrix representa-
tion is further used to perform calculations and information extraction that is part
of step (2). A visual representation of the mapping circle is displayed in Fig 5.

Fig. 5. Matrix-grid-graph models overlapping.

The context modeling starts with a matrix that holds only values of where
scanner devices are stored, (upper step (1) in Fig. 5), other fields have value 0. In
the second step (step (2) in Fig. 5) the matrix is mapped to the grid representation
of the observed space. The third step (step (3) in Fig. 5) consecutively collects
beacon data, which leads to constant updates of the previous matrix representation
for the given graph (bottom-left corner in Fig. 5). The mapping of node attributes
to matrix values is defined in Equation 1.

n
X n
X
M[i,j] = Vi · Vdi + (Ein + Eout ) (1)
i=1 i=1

Equation 1 shows that an element of the matrix is quantified as a product of the


sum of elements of vector V, and the sum of duration times of Vd , added to the sum
of Ein and Eout . While this being a simple mapping function, it is quantifying the
graph representation of the nodes in the graph, thus converting further calculations
from graph-based to matrix-based, making them simpler and faster.

6. Machine learning in BLEMAT


Machine learning algorithms have far-reaching usage in IPS (see Section 3). All
fingerprinting approaches, however, rely on heavy human work effort in creating
the initial spectral map of signals for an indoor environment. Approaches described
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 13

in the related work section focus on offline fingerprinting. The approach presented
in our paper vastly diminishes human effort required to collect fingerprinting data
while automating data collection and ML model training at the same time. In this
section, an overview of the BLEMAT ML framework is given.

6.1. Background
There are four principles39 used in building positioning systems: trilateration, tri-
angulation, scene analysis, and proximity. Although systems relying only on the
combination of these principles and attributes are computationally efficient and
have proven to have a 2–4 meter accuracy40,41 , the authors themselves criticize
the approaches from the point of view of the system’s ability to handle contextual
information input like regard for obstacles, signal deviation, etc. Based on cur-
rent research done in indoor positioning based on Bluetooth, relying only on signal
parameters gives unsatisfactory results42,43 . Thus, a proactive approach must be
considered – an approach that would not only use signal parameters but also act
upon detecting patterns, deviations and correcting them.
There are three types of indoor positioning approaches based on used machine
learning techniques: supervised, semi-supervised and unsupervised. Supervised po-
sitioning relies on fingerprinting – two-phase process of matching elements from a
database to a particular signal strength fingerprint in real-time. The major flaw
with this approach is that it requires a comprehensive training phase – to create a
radio map with reference points within the area of interest which requires on-site
measurements and cumbersome manual actions12,13,44 . Semi-supervised positioning
has a short or no training phase, and needs to be space-agnostic. It relies on real-
time filtering of RSSI, distance and position estimation. Ideally, it has a minimal
set of pre-deployment requirements: dimensions of the indoor space and location of
a subset of scanners. Unsupervised approaches, like cluster analysis, can be used in
combination with the two above-mentioned approaches to improve the positioning
results. The aim of this section is to present an online, semi-supervised ML-based
fingerprinting framework.

6.2. ML Data Acquisition, Transformation and Model Training


Once the system starts to operate it will immediately gather information about
spectral images for each of the scanners, in the background. A scanner’s spectral
image represents its spectral characteristics, a vector of signal strengths, to all other
system scanners. In this manner, every scanner has a unique spectral image, a vector
of values that can be directly tied to its position in the indoor space. All scanners can
see each other in this framework. This is an original approach to fingerprinting from
this paper, a workflow designed to ensure that the spectral map of the indoor space
can be built during regular system operation, fast, and with no system downtime.
The data acquisition process is initiated on every scanner, separately. Data is
first collected in a raw form: from each scanner, every other scanner’s BLE RSSI is
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

14 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

measured and recorded with a timestamp. While raw data is being collected, it is
automatically being averaged over a period of one minute, and a spectral image for
every scanner is built. Raw data is displayed on the top side of the figure, while the
averaged, preprocessed data ready for machine learning input is displayed in the
bottom part in Fig. 6.

Fig. 6. Spectral image building.

The upper side table in Fig 6 can be interpreted as: at 08:00:01 from Scanner
S1 to scanner S2 RSSI is −72 dBm, from scanner S1 to scanner S3 RSSI is −68
dBm, etc. The bottom side table then shows averaged value from one scanner to
all others, per minute. For example, the first row can be interpreted as: from 8:00
to 8:01, RSSI measurement from scanner S1 to scanner S2 was −82 dBm, from
scanner S1 to scanner S2 was −66 dBm, etc. Other rows show averaged values for
all scanners and all timestamps (4 scanners, 24 hours). The lower table in Fig.
6 represents the input training data format for the ML model, as rows represent
spectral images for a specific controller, at a specific time. Details about the training
of the model will be discussed later, in Section 7.
In order to understand how this is useful for the observed beacons in the IPS, it
is necessary to establish a clear correlation between a beacon’s RSSI and a scanner’s
RSSI. A scanner is a part of the system, but a beacon is an external device with its
own signal characteristics (signal stability, range, etc.). This correlation is presented
as a mapping function in the system. This mapping function is able to transform
any beacon to a scanner, thus giving the system the possibility to interpret external
beacons as integral part of the system (scanners). It is a novel approach designed
to automate fingerprinting, increase its efficiency, and reduce data acquisition time.
In fact, beacon’s RSSI has to be transformed into a scanners RSSI in order for the
system to observe it as a scanner. In order to be able to do that, beacon RSSI
data needs to be collected as well, prior to the creation of the mapping function.
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 15

External beacon’s RSSI data collection implies that the beacon is placed in the
indoor space, at the exact position of one of the scanners. After this condition is
met, the data acquisition process is initiated on all of the scanners, again, and the
data is collected in the same manner for scanners (see Fig. 6). For example, let there
be a measurement of RSSI between scanner S1 and scanner S2 of −76 dBm, and
scanner S4 and scanner S2 of −57 dBm. Let us replace scanner S2 with an external
beacon B. Now the RSSI is measured again, and the results are: between scanner
S1 and beacon B, −56 dBm, and between scanner S4 and beacon B, −67 dBm.
Intuitively, a mapping has been obtained. It can transform an external beacon B
into Si, by simply adding/subtracting a certain number. In the first case difference
is −20 dBm, and in the second −10 dBm. Now, we can effectively observe beacons as
internal system scanners, and that will help in the automation of the fingerprinting
process, and later, ML training.
There are three ways how this mapping could be implemented:

(1) Find a unique parameter λ that will transform beacon measurements into scan-
ner measurements as followed:

RSSIscanner = y · λ, y = current beacon measurement; (2)

(2) For the observed data generate a set of mapping functions for every minute of
every hour throughout one day: f (0, 0) = y − λ, . . . , f (23, 59) = y − λ; where y
is a current beacon measurement and λ is derived from Algorithm 1;
(3) Same as (2) but with a thirty-second margin instead of one minute, for increased
accuracy and smaller granularity.

Algorithm 1 Algorithm for mapping definition


1: function Define Mapping()
2: hours ← 24
3: minutes ← 60
4: scanners ← [S1 , S2 , ...Sk ]
5: for i ← 0, hours do
6: for j ← 0, minutes do
7: for si ∈ scanners do
8: for sj ∈ scanners & j 6= i do
9: a ← average RSSI from Si to Sj
10: b ← average RSSI from Si to B
11: λ←a−b
12: end for
13: end for
14: end for
15: end for
16: end function
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

16 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

Finding a unique λ, as in (1), was not possible due to the nature of Bluetooth
signal (signal perturbation, losses, noise, etc.). Algorithm 1 showcases a solution to
(2) – the algorithm creates a set of mapping functions for each minute of the day,
per scanner. The algorithm is initiated for every type of beacon (hardware type)
introduced to the system. It will go through every minute of one day (24 hours)
and extract a mapping function for every scanner, to one beacon type. Thus, when
a beacon’s measurement is captured in the system from scanner Si , and there is a
mapping function for Si and the beacon, this beacon is transformed to a scanner
Sk . Approaches (2) and (3) are both equivalently valid, and the algorithm 1 could
be revised for (3).
From the values that are the output of this set of mapping functions, a machine
learning model to classify beacons to the closest scanner is built. Machine learning
for proximity detection is not only faster, but more accurate as well since the model’s
decision is resting on a continuous stream of data and is retrained periodically to
better adapt to the changing context. The model is updatable upon system request.
Classical fingerprint-based localization methods (Section 3) could be classified as
probabilistic and deterministic. Furthermore, they require additional building time,
and they cannot incorporate system context updates. Thus, the only way to generate
a new fingerprint spectral map is to go through the process of physically measuring
the whole indoor space again.
In our approach, based on a vector of RSSI values that represent a beacon
in the system, a decision is made on which scanner in the system can best be
represented by the same vector, thus classifying the beacon to the near proximity
of that specific scanner. Creating a new fingerprint map requires no downtime,
and can be completed while the system operates normally. This model impacts
the filtering of the position estimations by removing noisy and improbable values.
Selection of utilized machine learning algorithms, construction of machine learning
datasets, feasibility study of training data collection, and analyzing their impact on
the system’s performance, is going to be presented in Section 7.

7. Implementation - Results and Discussion


In our previous paper37 following novel results were presented: BLEMAT’s satis-
fiable accuracy and precision according to academic benchmarks, positive region-
coverage density impact, positive impact in obstacle detection via RSSI signal de-
viation, and the positive effect of utilizing the Kalman filter for consecutive asset
tracking and indoor positioning.
In this section, the experiments and presented results are aimed at proving
concepts behind the research hypothesis introduced in the rest of the paper: that
machine-learning algorithms for scanner area classification achieve high accuracy
and can aid final position estimations while at the same time diminishing the hu-
man effort needed to carry out fingerprinting; that graph-based modeling and data
collection can be used for area boundaries detection in space-agnostic modeling and
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 17

layout building.

7.1. Experiment Setup


Concerning the hardware used in performing the experiments, IoT scanner devices
are ARM-based processing boards capable of both scanning for BLE signals and ad-
vertising their own BLE packets. Four IoT gateway devices (scanners) are deployed
at known, fixed points of the experimental physical space. Each IoT gateway is
capable of performing beacon scanning and advertising, contextual information col-
lection, and communication with the rest of the system. The experimental physical
space the experiments were conducted in is a 80m2 office space with two separate
rooms/offices and a kitchen, connected by a hallway and separated by a concrete
wall. The flow of people in the office is rather dynamic, and so is the WiFi spectral
image, so there is considerable noise in signal propagation. Raw RSSI point-to-point
data were collected for one week, for 24 hours, every second. In total, approximately
1.5 million observations were recorded.

7.2. Machine-Learning Algorithms and Outcomes


Considering machine-learning techniques and applications mentioned in the related
work section of this paper(Section )3), in this section three research questions will
be explored:
(1) Which selection of machine-learning algorithms to train the model with and
what is their classification accuracy?
(2) Is the classification accuracy same/better/worse if a combination of scanners is
used to train the model, instead of all?
(3) Is the spectral characteristics around a scanner different throughout the
day/different days, and if yes, is there a need to train different machine-learning
models for one beacon?
(4) Is the final position estimation process better/worse/same when position esti-
mations are first filtered by the outputs of the ML classifier?
In the rest of the section, we will present selected algorithms for our experiments
and discuss the obtained results.

7.2.1. Algorithms
Regarding the selection of machine-learning algorithms, the following were con-
sidered: Naive Bayes classifier, K-nearest neighbors and Logistic Regression (LR).
Naive Bayes is a good candidate because it is easy to build and particularly useful
for very large data sets. Along with simplicity, Naive Bayes is known to outper-
form even highly sophisticated classification methods. KNN can be used for both
classification and regression problems, however, it is more commonly used in classi-
fication problems. KNN is easy to build and interpret, and its training time is small,
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

18 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

however, one does need to analyze the value of K carefully in order to obtain good
results. Logistic regression is a special case of linear regression when the outcome
variable is categorical, and the log of odds is used as dependent variable. Simpler,
it predicts the probability of occurrence of an event by fitting data to a logit func-
tion. Although it is considered to be used more for binary classification problems,
logistic regression can help answer different questions like: can the categories be
correctly predicted given a set of predictors and what is the relative importance of
each predictor. Also, for multi-class classification one-vs-all method is used in LR.

7.2.2. Signal characteristics and datasets


In order to grasp the behavior of raw RSSI values, measurements have been plotted
over one day. As seen in Fig. 7, where RSSI signal was measured from Scanner
1 to other scanners, the signal values are distinguishable firsthand. It is, however,
noticeable that the signal interference is larger from 8:00 – 15:00, which represents
the working hours, and there are more people and active devices in the observed
space at that time.

Fig. 7. RSSI values in dBm for a typical workday.

When the rest of the scanners were plotted, the same results regarding sig-
nal characteristics were noticed. Furthermore, when comparing signal behavior for
two consecutive days, the plotting results were nearly identical with insignificant
signal deviations. Once it has been established that there are grounds for trying
machine-learning classification a set of experiments with the three above-mentioned
algorithms was conducted.

7.2.3. Evaluation
Evaluation of three ML algorithms was carried out on training datasets with three
different sizes: one-hour dataset, five-hour dataset, and 24-hour dataset. From each
of these datasets, two distinct datasets were extracted: one where measurements are
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 19

averaged over one minute, and another where they are averaged over 30 seconds.
Test datasets were collected in the same manner: one-hour, five-hour, and 24-hour
BLE measurements were averaged over both 1-minute and 30-seconds resulting in
two distinct datasets for each of three datasets, from another workday. A dataset
larger than one day was not considered - the context of system operation in IoT
is ever-changing and a large dataset approximates the context worse than smaller
datasets.
The metrics that are of interest in the experiments are the number of mislabeled
points, accuracy and training time. Alongside, ML prediction capabilities when
taking certain combinations of predictors (scanners) into account rather than all
predictors is evaluated. Furthermore, efficiency between training ML models and
choosing the dataset size was investigated.
Model training times were first evaluated on a 16GB DDR4 2133MHz SDRAM
virtual machine with a SSD and an Intel Core i7 6700HQ processor. The program-
ming language used for data analysis was Python, and the library for ML used was
scikit-learnb . The results of the evaluation are presented in Table 1.

Table 1. ML algorithms evaluation.


Naive Bayes Classification K-nearest neighbors (k=1) Logistic regression
Mislabeled Classification Training Mislabeled Classification Training Mislabeled Classification Training
Dataset
points accuracy time (ms) points accuracy time (ms) points accuracy time (ms)
1-hour 1-min 1/240 99.58% 6.44 7/240 97.09% 9.42 0/240 100% 119.33
1-hour 30-sec 4/480 99.17% 5.09 9/480 98.12% 9.02 4/480 99.66% 121.64
5-hours 1-min 9/1200 99.25% 3.96 46/1200 96.17% 7.98 0/1200 100% 316.40
5-hours 30-sec 17/2400 99.29% 3.66 58/2400 97.59% 8.95 2/2400 99.92% 340.80
24-hours 1-min 41/5760 99.29% 4.46 277/5760 95.19% 16.12 28/5760 99.51% 1307.48
24-hours 30-sec 113/11520 99.02% 4.25 633/11520 94.51% 20.63 39/11520 99.67 2353.12

As can be seen, Logistic Regression gives the best classification accuracy, but the
highest training times for all datasets. It was trained with 100 iterations utilizing
the Newton-CG solver from scikit-learn. When increasing the number of iterations,
the same level of accuracy is achieved, but training times are larger. When bellow
70 iterations are performed, the model fails to converge. Naive Bayes classification
gives second-best classification accuracy in all of the cases, and it is the fastest model
to train. For KNN, best results are achieved when k = 1. For k = 2 and k = 3,
accuracy linearly decreases, however it does not go below 90% of classification
accuracy. For different k values, training times differ insignificantly, 5ms.
The trained ML models were further tested with the real-time position estima-
tion service (PES) running in BLEMAT. One beacon was observed, with known
real-positions, where the position of the beacon was changed three times in a one-
hour period. A position has been captured every 30 seconds, resulting in 120 position
estimations. Two experiments were run. In the first experiments the final position
estimation was the result of PES solely – relying on: (1) the averaging of signals,
(2) dBm to meter conversion, and (3) trilateration. In the second experiment the

b Scikit-learn library – https://scikit-learn.org/stable, last access date: 12/6/2018


December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

20 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

position estimations were first filtered by the class output of the ML model, and
then steps (1), (2) and (3) were performed. In the first experiment, without relying
on the trained ML model, all 120 position estimations are taken into account as
potential positions. A total of 18% of these positions (22 position estimations) were
from 3-5 meters further from the actual noted position of the beacon at the given
time. However, when the trained ML model is used to first classify the spectral
representation of the beacon to a certain scanner’s area, 18% was reduced to 2%.
The ML model eliminated a significant majority of captured positions that were not
within 1m2 of the scanner that the spectral representation was assigned to. This is
a rather good result showcasing that the ML models trained for fingerprinting have
a serious impact on the quality of the PES.

7.2.4. Discussion
Given that observed training time intervals are short, and that a 24-hour dataset
includes many measurements points that are not needed for IPS (data at night),
it is more efficient to train and build ML classification models on smaller BLE
measurement datasets. While this hypothesis has been proven on one-hour and
five-hour datasets, a typical training dataset should include data during working
hours. If the system needs to operate non-stop, the experimental results indicate
that training a whole day‘s dataset requires insignificant time and outputs stable
predicting capabilities.
Experimental results showed that when ML models are trained with less than
three predictors/scanners (combinations of two), the average classification accuracy
decreases, as a rule. Training with all scanners gives more accurate and reliable
prediction results.
Since ML models are being trained on a remote VM there is an induced network
latency possibility. However, due to insignificant training times, the roundtrip from
sending data to the VM to receiving a trained model is just under three seconds.
Another possibility is to move the training of the models to the fog layer, to the
fog scanners. This will dismiss reduce the network latency, but then training times
on scanner machines is going to be slower. The issue becomes a trade-off between
latency and training time.
The human effort in building a spectral map in this framework is vastly dimin-
ished. When the system starts to operate, an instance of the proposed ML model can
be built within the first hour of operation and used to extrapolate for the upcoming
hours. This model might not be the most accurate but will have predictor capabil-
ities around 90%. However, it is evident that, as the data accumulates, the model
becomes more accurate in predicting classes. On the contrary, if the spectral map
had to be created by physically measuring signals at every m2 of the observed space
(80m2 ), at least 80 minutes would be required for the data acquisition phase, while
data transformation and ML training would be further delayed. Furthermore, once
trained in this manner, the model cannot incorporate context changes in the system,
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 21

thus increasing the probability that the physical fingerprinting will be repeated in
the future.

7.3. Floor Plan Layout Detection


In Section 6.2 a mapping function between graph and matrix representations was
elaborated on. In this section the algorithm used for floor plan layout detection will
be specified and its execution results presented. Matrix, grid and graph representa-
tion creation and maintenance run on one of the scanners in the system. Scanners
are connected in a mesh-like network topology37 . In this section results for one ob-
served beacon are discussed. Fig. 8 shows how the grid representation maps to the
offices layout in the real observed physical space.

Fig. 8. Real physical floor plan layout.

The proposed algorithm was tested on the grid-matrix representation of the


presented space (Fig. 8). Graph for an Estimote BLE beacon has been maintained
for two hours, where a position has been captured every 5 seconds resulting in 1440
position estimations. The beacon was moved to represent movements of an employee
during a regular workday. An experiment for floor plan layout detection was run on
the matrix defined in Fig. 9. This matrix represents quantified movements of one
beacon.

 
0 11 12 18 5 0 9 14 3 0 3 0 1
6 9 14 16 12 0 15 11 654 1312 1301 1244 1560 
 
6 23 17 16 18 4 5 5 224 1223 1020 1311 1566 
 
M =
3 2 16 21 18 22 16 21 268 1100 3121 1678 1098 

 
 17 35 15 11 41 43 39 34 45 990 1234 1345 1312 
20 29 27 22 34 22 43 28 50 345 1117 1337 1087

Fig. 9. Final matrix representation of beacon movement.

On this matrix, the algorithm for floor plan layout detection is run. The algo-
rithm receives a matrix M as a parameter. M represents a matrix representation
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

22 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

of the observed space, as shown in Fig. 9. The algorithm then calculates the mean
of the data from M and outputs a heat map of the observed space, according to
M . Fig. 10 shows the heat map of the office layout where the median of empirical
results was used as the only threshold, thus all elements which are larger than the
median (median of M is 22) were saturated on the heat map. This incurs an in-
teresting approach where using only the median for categorization in algorithm for
floor plan layout detection could be employed. The presented heat map is a valid
representation of the actual physical office space configuration where all 1m2 areas
shown in white and light gray color are indeed detected as walls and occupied space
in the office. In addition to obtained empirical results, we have run 50 simulations
for the same area where the value for each element was randomized between 0 to
1000. Values of elements representing physical obstacles (walls) were randomized
between 0 and 10 representing low-frequency visits of beacons. For both empirical
and simulation results it was shown that the best strategy for identifying the rele-
vant threshold for floor plan layout detection was using the median of the observed
results.

Fig. 10. Physical office space heat map based on matrix M (corresponds to Fig. 8)
.

8. Conclusion and Future Work


In this paper, we have presented a context-aware fog computing system comprising
IoT gateways (scanners) that performs real-time position estimation of BLE bea-
cons. We have shown that high accuracy and precision in position estimation can
be obtained while maintaining low resource utilization. We have provided a solid
framework for fast and online fingerprinting and conducted a series of experiments
that show that the classification accuracy of ML algorithms used for fingerprinting
is always above 90%. Furthermore, we have proposed and tested a novel approach
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 23

to floor plan layout detection based on matrix-grid-graph modeling, that showed


good layout detection performance. Based on the results we are confident that the
BLEMAT solution for semi-supervised indoor positioning based on fog computing
platform provides a solid basis for deployment of high-performance location-aware
IoT services and applications.
In our future work, the possibilities of matrix-grid-graph space modeling and
contextual data extraction will be further explored in order to design new ap-
proaches to using contextual data in improving BLEMAT. This modeling and data
collection approach could be further expanded into a multidisciplinary study of so-
cial interaction and creation and analysis of complex social networks in the observed
space (e.g. a company building where beacons represent humans). An obstacle de-
tection framework that rests on both signal perturbation and floor plan layout
detection algorithm will be a part of future research.

References
1. J. J. Gomez-Sanz, R. Pax, M. Arroyo and M. Cárdenas-Bonett, Requirement engi-
neering activities in smart environments for large facilities., Comput. Sci. Inf. Syst.
14(1) (2017) 239–255.
2. L. Wang, W. Wu, J. Qi and Z. Jia, Wireless sensor network coverage optimization
based on whale group algorithm., Computer Science & Information Systems 15(3)
(2018).
3. M. Lujak, H. Billhardt, J. Dunkel, A. Fernández, R. Hermoso and S. Ossowski, A
distributed architecture for real-time evacuation guidance in large smart buildings.,
Comput. Sci. Inf. Syst. 14(1) (2017) 257–282.
4. N. Swangmuang and P. Krishnamurthy, Location fingerprint analyses toward effi-
cient indoor positioning, in Pervasive Computing and Communications, 2008. PerCom
2008. Sixth Annual IEEE International Conference on (IEEE, 2008), pp. 100–109.
5. V. Erceg, L. J. Greenstein, S. Y. Tjandra, S. R. Parkoff, A. Gupta, B. Kulic, A. A.
Julius and R. Bianchi, An empirically based path loss model for wireless channels
in suburban environments, IEEE Journal on selected areas in communications 17(7)
(1999) 1205–1211.
6. V. Abhayawardhana, I. Wassell, D. Crosby, M. Sellars and M. Brown, Comparison of
empirical propagation path loss models for fixed wireless access systems, in Vehicular
Technology Conference, 2005. VTC 2005-Spring. 2005 IEEE 61st 1, (IEEE, 2005),
pp. 73–77.
7. A. Bose and C. H. Foh, A practical path loss model for indoor wifi positioning enhance-
ment, in Information, Communications & Signal Processing, 2007 6th International
Conference on (IEEE, 2007), pp. 1–5.
8. J. Hightower and G. Borriello, Location systems for ubiquitous computing, Computer
34(8) (2001) 57–66.
9. K. Muthukrishnan, M. Lijding and P. Havinga, Towards smart surroundings: Enabling
techniques and technologies for localization, in International Symposium on Location-
and Context-Awareness (Springer, 2005), pp. 350–362.
10. K. Pahlavan, X. Li and J.-P. Makela, Indoor geolocation science and technology, IEEE
Communications Magazine 40(2) (2002) 112–118.
11. R. Faragher and R. Harle, Location fingerprinting with bluetooth low energy beacons,
IEEE journal on Selected Areas in Communications 33(11) (2015) 2418–2428.
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

24 Saša Pešić, Milenko Tošić, Ognjen Iković, Miloš Radovanović, Mirjana Ivanović, Dragan Bošković

12. F. Subhan, H. Hasbullah, A. Rozyyev and S. T. Bakhsh, Indoor positioning in blue-


tooth networks using fingerprinting and lateration approach, in Information Science
and Applications (ICISA), 2011 International Conference on (IEEE, 2011), pp. 1–9.
13. R. Faragher and R. Harle, An analysis of the accuracy of bluetooth low energy for
indoor positioning applications, in Proceedings of the 27th International Technical
Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+’14) (In-
stitute of Navigation, 2014), pp. 201–210.
14. H. Li, Low-cost 3d bluetooth indoor positioning with least square, Wireless personal
communications 78(2) (2014) 1331–1344.
15. Q. Wang, R. Sun, X. Zhang, Y. Sun and X. Lu, Bluetooth positioning based on
weighted k-nearest neighbors and adaptive bandwidth mean shift, International Jour-
nal of Distributed Sensor Networks 13(5) (2017) p. 1550147717706681.
16. X. Li, J. Wang and C. Liu, A bluetooth/pdr integration algorithm for an indoor
positioning system, Sensors 15(10) (2015) 24862–24885.
17. Z. Chen et al., Bayesian filtering: From kalman filters to particle filters, and beyond,
Statistics 182(1) (2003) 1–69.
18. H. Liu, H. Darabi, P. Banerjee and J. Liu, Survey of wireless indoor positioning tech-
niques and systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C
(Applications and Reviews) 37(6) (2007) 1067–1080.
19. X. Wen, L. Shao, Y. Xue and W. Fang, A rapid learning algorithm for vehicle classi-
fication, Information Sciences 295 (2015) 395–406.
20. Z. Chen, Y. Chen, X. Gao, S. Wang, L. Hu, C. C. Yan, N. D. Lane and C. Miao,
Unobtrusive sensing incremental social contexts using fuzzy class incremental learning,
in Data Mining (ICDM), 2015 IEEE International Conference on (IEEE, 2015), pp.
71–80.
21. Z. Jianyong, L. Haiyong, C. Zili and L. Zhaohui, Rssi based bluetooth low energy
indoor positioning, in Indoor Positioning and Indoor Navigation (IPIN), 2014 Inter-
national Conference on (IEEE, 2014), pp. 526–533.
22. P. Kriz, F. Maly and T. Kozel, Improving indoor localization using bluetooth low
energy beacons, Mobile Information Systems 2016 (2016).
23. G. de Blasio, A. Quesada-Arencibia, C. R. Garcı́a, J. M. Molina-Gil and C. Caballero-
Gil, Study on an indoor positioning system for harsh environments based on wi-fi and
bluetooth low energy, Sensors 17(6) (2017) p. 1299.
24. Y. Gu, Y. Chen, J. Liu and X. Jiang, Semi-supervised deep extreme learning machine
for wi-fi based localization, Neurocomputing 166 (2015) 282–293.
25. M. Zhou, Z. Tian, K. Xu, X. Yu, X. Hong and H. Wu, Scanme: location tracking
system in large-scale campus wi-fi environment using unlabeled mobility map, Expert
Systems with Applications 41(7) (2014) 3429–3443.
26. Z. Yang, C. Wu and Y. Liu, Locating in fingerprint space: wireless indoor localiza-
tion with little human intervention, in Proceedings of the 18th annual international
conference on Mobile computing and networking (ACM, 2012), pp. 269–280.
27. X. Jiang, Y. Chen, J. Liu, Y. Gu and L. Hu, Fselm: fusion semi-supervised extreme
learning machine for indoor localization with wi-fi and bluetooth fingerprints, Soft
Computing 22(11) (2018) 3621–3635.
28. C. S. Jensen, H. Lu and B. Yang, Graph model based indoor tracking, in Mobile Data
Management: Systems, Services and Middleware, 2009. MDM’09. Tenth International
Conference on (IEEE, 2009), pp. 122–131.
29. M. Werner and M. Kessel, Organisation of Indoor Navigation data from a data query
perspective (IEEE, 2010).
30. S. Hilsenbeck, D. Bobkov, G. Schroth, R. Huitl and E. Steinbach, Graph-based data
December 25, 2018 14:45 WSPC/INSTRUCTION FILE ws-ijait

Instructions for Typing Manuscripts (Paper’s Title) 25

fusion of pedometer and wifi measurements for mobile indoor positioning, in Pro-
ceedings of the 2014 ACM international joint conference on pervasive and ubiquitous
computing (ACM, 2014), pp. 147–158.
31. Y. Jiang, Y. Xiang, X. Pan, K. Li, Q. Lv, R. P. Dick, L. Shang and M. Hannigan,
Hallway based automatic indoor floorplan construction using room fingerprints, in
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiqui-
tous computing (ACM, 2013), pp. 315–324.
32. C. Wu, Z. Yang, Y. Liu and W. Xi, Will: Wireless indoor localization without site
survey, IEEE Transactions on Parallel and Distributed Systems 24(4) (2013) 839–848.
33. H. Shin, Y. Chon and H. Cha, Unsupervised construction of an indoor floor plan
using a smartphone., IEEE Trans. Systems, Man, and Cybernetics, Part C 42(6)
(2012) 889–898.
34. H. Luo, F. Zhao, M. Jiang, H. Ma and Y. Zhang, Constructing an indoor floor plan
using crowdsourcing based on magnetic fingerprinting, Sensors 17(11) (2017) p. 2678.
35. R. Gao, M. Zhao, T. Ye, F. Ye, Y. Wang, K. Bian, T. Wang and X. Li, Jigsaw:
Indoor floor plan reconstruction via mobile crowdsensing, in Proceedings of the 20th
annual international conference on Mobile computing and networking (ACM, 2014),
pp. 249–260.
36. S. Pešić, M. Tošić, O. Iković, M. Ivanović, M. Radovanović and D. Bošković, Context
aware resource and service provisioning management in fog computing systems, in
International Symposium on Intelligent and Distributed Computing (Springer, 2017),
pp. 213–223.
37. S. Pešić, M. Tošić, O. Iković, M. Radovanović, M. Ivanović and D. Bošković, Bluetooth
low energy microlocation asset tracking (blemat) in a context-aware fog computing
system, in Proceedings of the 8th International Conference on Web Intelligence, Min-
ing and Semantics (ACM, 2018), p. 23.
38. N. Lanchier, Stochastic modeling (Springer, 2017).
39. K. Al Nuaimi and H. Kamel, A survey of indoor positioning systems and algorithms, in
Innovations in information technology (IIT), 2011 international conference on (IEEE,
2011), pp. 185–190.
40. S. Mazuelas, A. Bahillo, R. M. Lorenzo, P. Fernandez, F. A. Lago, E. Garcia, J. Blas
and E. J. Abril, Robust indoor positioning provided by real-time rssi values in unmod-
ified wlan networks, IEEE Journal of selected topics in signal processing 3(5) (2009)
821–831.
41. M. E. Rusli, M. Ali, N. Jamil and M. M. Din, An improved indoor positioning algo-
rithm based on rssi-trilateration technique for internet of things (iot), in Computer
and Communication Engineering (ICCCE), 2016 International Conference on (IEEE,
2016), pp. 72–77.
42. W.-H. Kuo, Y.-S. Chen, G.-T. Jen and T.-W. Lu, An intelligent positioning approach:
Rssi-based indoor and outdoor localization scheme in zigbee networks, in Machine
Learning and Cybernetics (ICMLC), 2010 International Conference on 6, (IEEE,
2010), pp. 2754–2759.
43. G. Zanca, F. Zorzi, A. Zanella and M. Zorzi, Experimental comparison of rssi-based
localization algorithms for indoor wireless sensor networks, in Proceedings of the work-
shop on Real-world wireless sensor networks (ACM, 2008), pp. 1–5.
44. H. Liu, H. Darabi, P. Banerjee and J. Liu, Survey of wireless indoor positioning tech-
niques and systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C
(Applications and Reviews) 37(6) (2007) 1067–1080.

View publication stats

Potrebbero piacerti anche