47 research outputs found
Improved NLOS Error Mitigation Based on LTS Algorithm
A new improved Least Trimmed Squares (LTS) based algorithm for Non-line-of sight (NLOS) error mitigation is proposed for indoor localisation systems. The conventional LTS algorithm has hard threshold to decide the final set of base stations (BSs) to be used in position calculations. When the number of Line of Sight (LOS) base stations is more than the number of NLOS BSs the conventional LTS algorithm does not include some of them in position estimation due to principle of LTS algorithm or under heavy NLOS environments it cannot separate least biased BSs to use. To improve the performance of the conventional LTS algorithm in dynamic environments we have proposed a method that selects BSs for position calculation based on ordered residuals without discarding half of the BSs. By choosing a set of BSs which have least residual errors among all combinations as a final set for position calculation, we were able to decrease the localisation error of the system in dynamic environments. We demonstrate the robustness of the new improved method based on computer simulations under realistic channel environments
Location-Enabled IoT (LE-IoT): A Survey of Positioning Techniques, Error Sources, and Mitigation
The Internet of Things (IoT) has started to empower the future of many
industrial and mass-market applications. Localization techniques are becoming
key to add location context to IoT data without human perception and
intervention. Meanwhile, the newly-emerged Low-Power Wide-Area Network (LPWAN)
technologies have advantages such as long-range, low power consumption, low
cost, massive connections, and the capability for communication in both indoor
and outdoor areas. These features make LPWAN signals strong candidates for
mass-market localization applications. However, there are various error sources
that have limited localization performance by using such IoT signals. This
paper reviews the IoT localization system through the following sequence: IoT
localization system review -- localization data sources -- localization
algorithms -- localization error sources and mitigation -- localization
performance evaluation. Compared to the related surveys, this paper has a more
comprehensive and state-of-the-art review on IoT localization methods, an
original review on IoT localization error sources and mitigation, an original
review on IoT localization performance evaluation, and a more comprehensive
review of IoT localization applications, opportunities, and challenges. Thus,
this survey provides comprehensive guidance for peers who are interested in
enabling localization ability in the existing IoT systems, using IoT systems
for localization, or integrating IoT signals with the existing localization
sensors
Collaborative Sensor Network Localization: Algorithms and Practical Issues
Emerging communication network applications including fifth-generation (5G) cellular and the Internet-of-Things (IoT) will almost certainly require location information at as many network nodes as possible. Given the energy requirements and lack of indoor coverage of Global Positioning System (GPS), collaborative localization appears to be a powerful tool for such networks. In this paper, we survey the state of the art in collaborative localization with an eye toward 5G cellular and IoT applications. In particular, we discuss theoretical limits, algorithms, and practical challenges associated with collaborative localization based on range-based as well as range-angle-based techniques
Fingerprinting Localization Method Based on TOA and Particle Filtering for Mines
Accurate target localization technology plays a very important role in ensuring mine safety production and higher production efficiency. The localization accuracy of a mine localization system is influenced by many factors. The most significant factor is the non-line of sight (NLOS) propagation error of the localization signal between the access point (AP) and the target node (Tag). In order to improve positioning accuracy, the NLOS error must be suppressed by an optimization algorithm. However, the traditional optimization algorithms are complex and exhibit poor optimization performance. To solve this problem, this paper proposes a new method for mine time of arrival (TOA) localization based on the idea of comprehensive optimization. The proposed method utilizes particle filtering to reduce the TOA data error, and the positioning results are further optimized with fingerprinting based on the Manhattan distance. This proposed method combines the advantages of particle filtering and fingerprinting localization. It reduces algorithm complexity and has better error suppression performance. The experimental results demonstrate that, as compared to the symmetric double-sided two-way ranging (SDS-TWR) method or received signal strength indication (RSSI) based fingerprinting method, the proposed method has a significantly improved localization performance, and the environment adaptability is enhanced
Filter Bank-based Transceiver Design for Ultrawideband
Peer ReviewedPostprint (published version
Recommended from our members
Receiver Design and Security for Low Power Wireless Communications Systems
This dissertation focuses on two important areas in wireless communications: receiver design and security. In the first part of this dissertation we consider low data rate receiver design for ultra-wideband (UWB), a wideband radio technology that promises to help solve the frequency allocation problem that often inhibits narrowband systems. Reference-based receivers are promising candidates in the UWB regime, because the conventional rake receiver designs suffers from complexity limitations and inaccuracies in channel estimation. Many reference-based systems have arisen as viable solutions for receivers. We unify these systems as well as other systems into the general framework for performance analysis to suggest the optimal system for varying constraints. We improve the performance of frequency-shifted reference (FSR-UWB) for an average power constraint by halving the frequency offset and employing a sample-and-hold approach across the frame period. Also, we introduce a novel peak mitigation technique; tone reservation, for the multi-differential (MD) version of FSR-UWB, to reduce the high peak-to-average power ratio observed as the data carriers increase. The next part of this dissertation is about wireless security which is ubiquitous in modern news. Cryptography is widely use for security but it assumes limited computational abilities of an eavesdropper, is based on the unproven hardness of the underlying primitives, and allows for the message to be recorded and decrypted later. In this dissertation we consider an information-theoretic security approach to guaranteeing everlasting secrecy. We contribute a new secrecy rate pair outage formulation, where an outage event is based on the instantaneous rates of the destination and the eavesdropper being below and above desired thresholds, respectively. In our new secrecy rate pair outage formulation, two new unaccounted outage events emerge: secrecy breach, where the eavesdropper is above the targeted threshold; unreliable, where the destination is unable to successfully decode the message. The former case must be carefully avoided, while for the latter case we can exploit automatic retransmissions (ARQ) while maintaining the eavesdropper intercept probability below the target threshold. We look at both ``simple\u27\u27 receivers and also complex receivers that use a buffer to store previous messages to maximally combine signal-to-noise ratio (SNR). Then we extend these results to the two-hop case where we maximize the end-to-end secure throughput by optimizing the intercept probability at each eavesdropper given a total end-to-end intercept constraint. Lastly, we consider the difficult case in information-theoretic security: the near eavesdropper case, where we contribute an optimal power allocation algorithm that leverages nearby chatter nodes to generate noise to reduce the probability of intercept by the eavesdropper while minimally impeding the source-to-destination communication. As shown in both one-hop and two-hop cases, allowing a slight outage at the destination for cases of when the eavesdropper is above a specific threshold greatly improves secrecy performance