181 research outputs found
Cloud-based Indoor Positioning Platform for Context-adaptivity in GNSS-denied Scenarios
The demand for positioning, localisation and navigation services is on the rise, largely owing to the fact that such services form an integral part of applications in areas such as human activity recognition, robotics, and eHealth. Depending on the field of application, these services must accomplish high levels of accuracy, massive device connectivity, real-time response, flexibility, and integrability. Although many current solutions have succeeded in fulfilling these requirements, numerous challenges remain in terms of providing robust and reliable indoor positioning solutions.
This dissertation has a core focus on improving computing efficiency, data pre-processing, and software architecture for Indoor Positioning Systems (IPSs), without throwing out position and location accuracy. Fingerprinting is the main positioning technique used in this dissertation, as it is one of the approaches used most frequently in indoor positioning solutions. The dissertation begins by presenting a systematic review of current cloud-based indoor positioning solutions for Global Navigation Satellite System (GNSS) denied scenarios. This first contribution identifies the current challenges and trends in indoor positioning applications over the last seven years (from January 2015 to May 2022).
Secondly, we focus on the study of data optimisation techniques such as data cleansing and data augmentation. This second contribution is devoted to reducing the number of outliers fingerprints in radio maps and, therefore, reducing the error in position estimation. The data cleansing algorithm relies on the correlation between fingerprints, taking into account the maximum Received Signal Strength (RSS) values, whereas the Generative Adversarial Network (GAN) network is used for data augmentation in order to generate synthetic fingerprints that are barely distinguishable from real ones. Consequently, the positioning error is reduced by more than 3.5% after applying the data cleansing. Similarly, the positioning error is reduced in 8 from 11 datasets after generating new synthetic fingerprints.
The third contribution suggests two algorithms which group similar fingerprints into clusters. To that end, a new post-processing algorithm for Density-based Spatial Clustering of Applications with Noise (DBSCAN) clustering is developed to redistribute noisy fingerprints to the formed clusters, enhancing the mean positioning accuracy by more than 20% in comparison with the plain DBSCAN. A new lightweight clustering algorithm is also introduced, which joins similar fingerprints based on the maximum RSS values and Access Point (AP) identifiers. This new clustering algorithm reduces the time required to form the clusters by more than 60% compared with two traditional clustering algorithms.
The fourth contribution explores the use of Machine Learning (ML) models to enhance the accuracy of position estimation. These models are based on Deep Neural Network (DNN) and Extreme Learning Machine (ELM). The first combines Convolutional Neural Network (CNN) and Long short-term memory (LSTM) to learn the complex patterns in fingerprinting radio maps and improve position accuracy. The second model uses CNN and ELM to provide a fast and accurate solution for the classification of fingerprints into buildings and floors. Both models offer better performance in terms of floor hit rate than the baseline (more than 8% on average), and also outperform some machine learning models from the literature.
Finally, this dissertation summarises the key findings of the previous chapters in an open-source cloud platform for indoor positioning. This software developed in this dissertation follows the guidelines provided by current standards in positioning, mapping, and software architecture to provide a reliable and scalable system
Analysis and evaluation of Wi-Fi indoor positioning systems using smartphones
This paper attempts to analyze the main algorithms used in Machine Learning applied to the indoor location. New technologies are facing new challenges. Satellite positioning has become a typical application of mobile phones, but stops working satisfactorily in enclosed spaces. Currently there is a problem in positioning which is unresolved. This circumstance motivates the research of new methods. After the introduction, the first chapter presents current methods of positioning and the problem of positioning indoors. This part of the work shows globally the current state of the art. It mentions a taxonomy that helps classify the different types of indoor positioning and a selection of current commercial solutions. The second chapter is more focused on the algorithms that will be analyzed. It explains how the most widely used of Machine Learning algorithms work. The aim of this section is to present mathematical algorithms theoretically. These algorithms were not designed for indoor location but can be used for countless solutions. In the third chapter, we learn gives tools work: Weka and Python. the results obtained after thousands of executions with different algorithms and parameters showing main problems of Machine Learning shown. In the fourth chapter the results are collected and the conclusions drawn are shown
Smart Monitoring and Control in the Future Internet of Things
The Internet of Things (IoT) and related technologies have the promise of realizing pervasive and smart applications which, in turn, have the potential of improving the quality of life of people living in a connected world. According to the IoT vision, all things can cooperate amongst themselves and be managed from anywhere via the Internet, allowing tight integration between the physical and cyber worlds and thus improving efficiency, promoting usability, and opening up new application opportunities. Nowadays, IoT technologies have successfully been exploited in several domains, providing both social and economic benefits. The realization of the full potential of the next generation of the Internet of Things still needs further research efforts concerning, for instance, the identification of new architectures, methodologies, and infrastructures dealing with distributed and decentralized IoT systems; the integration of IoT with cognitive and social capabilities; the enhancement of the sensing–analysis–control cycle; the integration of consciousness and awareness in IoT environments; and the design of new algorithms and techniques for managing IoT big data. This Special Issue is devoted to advancements in technologies, methodologies, and applications for IoT, together with emerging standards and research topics which would lead to realization of the future Internet of Things
Security and Privacy for Modern Wireless Communication Systems
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks
Adaptive indoor positioning system based on locating globally deployed WiFi signal sources
Recent trends in data driven applications have encouraged expanding
location awareness to indoors. Various attributes driven by location data
indoors require large scale deployment that could expand beyond specific
venue to a city, country or even global coverage. Social media, assets or
personnel tracking, marketing or advertising are examples of applications
that heavily utilise location attributes. Various solutions suggest
triangulation between WiFi access points to obtain location attribution
indoors imitating the GPS accurate estimation through satellites
constellations. However, locating signal sources deep indoors introduces
various challenges that cannot be addressed via the traditional war-driving
or war-walking methods.
This research sets out to address the problem of locating WiFi signal
sources deep indoors in unsupervised deployment, without previous
training or calibration. To achieve this, we developed a grid approach to
mitigate for none line of site (NLoS) conditions by clustering signal readings
into multi-hypothesis Gaussians distributions. We have also employed
hypothesis testing classification to estimate signal attenuation through
unknown layouts to remove dependencies on indoor maps availability.
Furthermore, we introduced novel methods for locating signal sources
deep indoors and presented the concept of WiFi access point (WAP)
temporal profiles as an adaptive radio-map with global coverage.
Nevertheless, the primary contribution of this research appears in
utilisation of data streaming, creation and maintenance of self-organising
networks of WAPs through an adaptive deployment of mass-spring
relaxation algorithm. In addition, complementary database utilisation
components such as error estimation, position estimation and expanding to
3D have been discussed. To justify the outcome of this research, we
present results for testing the proposed system on large scale dataset
covering various indoor environments in different parts of the world.
Finally, we propose scalable indoor positioning system based on received
signal strength (RSSI) measurements of WiFi access points to resolve the
indoor positioning challenge. To enable the adoption of the proposed
solution to global scale, we deployed a piece of software on multitude of
smartphone devices to collect data occasionally without the context of
venue, environment or custom hardware. To conclude, this thesis provides
learning for novel adaptive crowd-sourcing system that automatically deals
with tolerance of imprecise data when locating signal sources
Estimating Movement from Mobile Telephony Data
Mobile enabled devices are ubiquitous in modern society. The information gathered by
their normal service operations has become one of the primary data sources used in the
understanding of human mobility, social connection and information transfer. This thesis
investigates techniques that can extract useful information from anonymised call detail records
(CDR). CDR consist of mobile subscriber data related to people in connection with the network
operators, the nature of their communication activity (voice, SMS, data, etc.), duration of the
activity and starting time of the activity and servicing cell identification numbers of both the
sender and the receiver when available.
The main contributions of the research are a methodology for distance measurements
which enables the identification of mobile subscriber travel paths and a methodology for
population density estimation based on significant mobile subscriber regions of interest. In
addition, insights are given into how a mobile network operator may use geographically located
subscriber data to create new revenue streams and improved network performance. A range of
novel algorithms and techniques underpin the development of these methodologies. These
include, among others, techniques for CDR feature extraction, data visualisation and CDR data
cleansing.
The primary data source used in this body of work was the CDR of Meteor, a mobile
network operator in the Republic of Ireland. The Meteor network under investigation has just
over 1 million customers, which represents approximately a quarter of the country’s 4.6 million
inhabitants, and operates using both 2G and 3G cellular telephony technologies.
Results show that the steady state vector analysis of modified Markov chain mobility
models can return population density estimates comparable to population estimates obtained
through a census. Evaluated using a test dataset, results of travel path identification showed
that developed distance measurements achieved greater accuracy when classifying the routes
CDR journey trajectories took compared to traditional trajectory distance measurements.
Results from subscriber segmentation indicate that subscribers who have perceived similar
relationships to geographical features can be grouped based on weighted steady state mobility
vectors. Overall, this thesis proposes novel algorithms and techniques for the estimation of
movement from mobile telephony data addressing practical issues related to sampling, privacy
and spatial uncertainty
Applications
Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications
Analyses of location-based services in Africa and investigating methods of improving its accuracy
The subject area of this thesis analyses the provision of location-based services (LBS) in Africa
and seeks methods of improving their positional accuracy. The motivation behind this work is
based on the fact that mobile technology is the only modern form of information and
communication technology available to most people in Africa. Therefore all services that can be
offered on the mobile network should be harnessed and LBS are one of these services. This
research work is novel and is the first critical analysis carried out on LBS in Africa; therefore it
had to be carried out in phases.
A study was first carried out to analyse the provision of LBS in Africa. It was discovered that
Africa definitely lags much of the World in the provision of LBS to its mobile subscribers; only
a few LBS are available and these are not adapted to the needs of the African people. A field data
empirical investigation was carried out in South Africa to evaluate the performance of LBS
provided. Data collected indicated that the LBS provided is not dependable due to the inaccuracy
introduced by two major factors - the positioning method and the data content provided.
Analyzing methods to improve the positional accuracy proved quite challenging because Africa
being one of the poorest continents has most mobile subscribers using basic mobile phones.
Consequently, LBS often cannot be provided in Africa based on the capability of the mobile
phones but rather on the capability of the mobile operator’s infrastructure. However, provision of
LBS using the network-based positioning technologies poses the challenge of dynamically
varying error sources which affects its accuracy.
The effect of some error sources on network-based positioning technologies were analysed and a
model developed to investigate the feasibility of making the RSS-based geometric positioning
technologies error aware. Major consideration is given to the geometry of the BSs whose
measurements are used for position estimation.
Results indicated that it is feasible to improve location information in Africa not just by
improving the positioning algorithms but also by using improved prediction algorithms,
incorporating up-to-date geographical information and hybrid technologies. It was also
confirmed that although errors are introduced due to location estimation methods, it is impossible
to model the error and make it applicable for all algorithms and all location estimations. This is
because the errors are dynamically varying and unpredictable for every measurement
Applications
Volume 3 describes how resource-aware machine learning methods and techniques are used to successfully solve real-world problems. The book provides numerous specific application examples: in health and medicine for risk modelling, diagnosis, and treatment selection for diseases in electronics, steel production and milling for quality control during manufacturing processes in traffic, logistics for smart cities and for mobile communications
Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study
This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives
- …