SlideShare a Scribd company logo
1 of 5
Download to read offline
Indoor Tracking with Bluetooth Low Energy
Devices Using K-Nearest Neighbour Algorithm
Koon Kee, Lie1
Kwok Shien, Yeo2*
Department Electrical and Electronics
Faculty of Engieering and Technology
Tunku Abdul Rahman University College
Jalan Genting Klang, Setapak
53300 Kuala Lumpur
Malaysia
liekoonkee@gmail.com1
yeoks@tarc.edu.my2*
Alvin Kee Ngoh, Ting3
David Heng Tze, Chieng4
Wireless Innovation
MIMOS Berhad
Technology Park Malaysia, Bukit Jalil
57000 Kuala Lumpur
Malaysia
kee.ting@mimos.my3
ht.chieng@mimos.my4
Abstract— In this paper we discuss the design of an
indoor positioning system (IPS) using Bluetooth Low
Energy (BLE) scanners and beacons. We deployed the
prototype system in a laboratory where its dimension is
measured at 	 × 	cm2
. Range test has been
carried out to study the relationship between distance
and Received Signal Strength (RSSI) of the BLE devices.
Using the highest RSSI values received from 3 of the
scanners, we use K-Nearest Neighbour algorithm to
predict the region where the beacon is possibly located.
We further demonstate that our system is able to
estimate the location region of the target beacon with
good accuracy.
Keywords—Indoor tracking, localization, Bluetooth Low
Energy, K-Nearest Neighbour.
I. INTRODUCTION
Due to unavailability of GPS signal in indoor environment,
the development of Indoor Positioning System (IPS) has
received growing attention. However, the research
community is yet to find a reliable indoor positioning
system to be commercialized. To counter this issue,
researchers have been proposing different solutions
including but not limited to Wi-Fi, Bluetooth, visible lights,
magnetic fields, and RFID. Another reason that hinders
indoor positioning system from practical implementation is
that indoor maps are yet to be prepared. Although a few
parties such as Google and Nokia are collecting indoor data
of the indoor mappings, the journey for its completion is
still far away.
II. RELATED WORKS
This chapter discusses variety of indoor localization
techniques in search of low cost and simple solution that are
able to provide reliable results. Besides that, the literature of
indoor positioning system technology is also be presented.
The theory behind different technologies is explained and
compared through different aspects such as area of
effectiveness, accuracy and cost.
A. Localization Techniques
1. Received Signal Strength Indicator (RSSI)
RSS is a measurement of how well a device is receiving a
signal from a transmitter, usually measured in the form of
decibel-milliwatts (dBm), and can be applied in most
wireless environment, for example Wi-Fi and Bluetooth.
RSS is the exact value of signal strength at the received by
the receiver and thus can be used to roughly estimate the
distance between the transmitter and the receiver. In a
survey done by Faheem et al.[1], they mentioned that RSSI
is often get confused with RSS. As how it is named, RSSI is
the indicator of the RSS and the measurement of RSSI can
be different for different device when dealing with a
transmitter at the same conditions [1]. IEEE 802.11 standard
defined that RSSI can be on a scale of 0-255, but they do not
define any other parameters that affects the value of RSSI.
Basically, the value of RSSI including the factors that
affects the value such as accuracy, RSSI value at a reference
value and more is predefined by the chip manufacturer, for
instance Cisco has their chips set at a 0-100 scale and
Atheros put their scale at 0-60. RSSI value is normally
represented in negative form, in other words the closer the
value is to 0, the stronger the received signal. RSSI will also
be affected by the signal propagation medium, where a
signal propagation constant will be taken in consideration
when calculating the RSSI. As a conclusion, the authors in
[?] highlighted that RSS and RSSI approach for localization
technique is simple and cost effective, and would be the first
technique in consideration for the development of an indoor
positioning system. However, the use of complex algorithm
is required including adding filter to the system and
different mechanisms to make this technique more reliable.
The RSSI is very difficult to be implemented in indoor
environment due to its nature of easily disrupted by different
factors such as obstacles that block its line of sight (LOS),
reflections due to walls and also indoor noise which causes
multipath effect [2]. Therefore, it is highly suggested that
this technique is applied along different techniques.
2. Fingerprinting
Fingerprinting or sometimes called as scene analysis is a
further localization technique based on the RSSI method.
This method mainly involved the gathering of labelled data,
known as fingerprints, and building a radio map based on
the RSS values stored in the database [3]. This process is
usually done during offline phase, before the system
operation. The fingerprinting technique is a method which
978-1-7281-5033-8/20/$31.00 ©2020 IEEE 155
Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
used a reverse function to determine the location of an
object in indoor environment given a real-time RSS value.
They further commented that this technique often results in
a coarse measurements and troublesome calibration step to
build up the radio map. The technique started by setting grid
at the desired area. The next procedure will be taking
samples of RSS values at the different grid points and stored
in a database. However, the offline fingerprints data alone is
not enough to obtain an accurate and reliable prediction of
indoor position due to dynamic nature of the Wi-Fi or
Bluetooth RSSI signals. Once the system is brought online,
a localization algorithm has to be utilized to estimate an
online RSSI measurement with the offline fingerprints for a
more precise localization result.
3. Trilateration
Trilateration is another technique that is based on the RSSI
method, though it can also be based on other technique such
as Time of Arrival (ToA). In contrast to fingerprinting
technique which is an estimation approach, trilateration is a
mathematical approach that is currently applied in the GPS
system. Trilateration measures distances between 3 anchor
nodes with known position and 1 mobile device which the
position is to be found. It can be said that one of the benefits
of trilateration technique is that it does not require tedious
offline scene analysis, unlike fingerprinting technique [4].
The information needed for this technique is the position of
the anchor nodes, in order to estimate the position of the
mobile device. Theoretically, when one anchor node
received the RSSI from the mobile device, the possible
position of the mobile device will be any point on the
imaginary sphere formed with the distance as the radius and
the anchor node at the center. When the second node is
added to form the second sphere, the possible position of
mobile node is now narrowed down to the two intersection
points between the spheres. When third anchor node is
added, the only possible position of the mobile node is the
only intersection point between all the three imaginary
spheres formed with anchor node as center and distance
measured as radius. Multipath effect is often being observed
in different tests that applied trilateration technique [5].
III. EXISTING TECHNOLOGY
1. Wi-Fi
Wi-Fi is a trademark term registered under Wi-Fi Alliance
where it is defined under IEEE’s 802.11 standards as any
wireless local area network (WLAN) products. In the aspect
of indoor positioning, researchers had exploited the nature
of the Wi-Fi that sent its Service Set Identifier (SSID),
timestamps and RSSI in estimating the position of a mobile
device with Wi-Fi detection ability, for example a
smartphone. With this information in its signals, localization
technique such as fingerprinting, multilateration or even
ToA can be easily done. Another reason that gained the
attention of researchers towards the possibility of applying
Wi-Fi in IPS is that the Wi-Fi signal is commonly available
in in indoor environment nowadays and therefore the cost of
installation is low [6].
2. Bluetooth
Bluetooth is a wireless communication technology that
allows devices to transmit data over a short distance.
Developed in 1994, Bluetooth uses 2.4GHz frequency, the
same frequency as most of the other wireless technologies,
such as Wi-Fi. Bluetooth 4.0, which is more commonly
known as BLE, featured lower power consumption and
lower cost at a higher range, which attracted the attention of
researchers to be implemented in an IPS [7]. The low power
consumption feature allowed BLE to be one of the main
competitors of Wi-Fi for IPS, where one coin cell in the
BLE beacons can last up to a few years. Bluetooth uses 40
channels, each 2MHz wide spreading from 2.4GHz to
2.48Hz [8]. Only 3 channels that are labelled 37, 38 and 39
which center at 2.402GHz, 2.426GHz and 2.48GHz are the
advertising channels that commonly used to broadcast the
information in IPS applications. However, BLE signal is
easily interfered by other signals that use 2.4GHz such as
Wi-Fi. Nevertheless, it has been observed that the
performance and accuracy of BLE is higher compared to the
other method and it is found that the mean RSSI provides
the most accurate result for the localization [9].
3. Infrared
Infrared is considered as one of the earliest tools that
attempted to develop an IPS. Unlike Wi-Fi and Bluetooth
which operating principle is based on radio frequency, IR is
a type of electromagnetic wave that has shorter wavelengths
than radio frequency. IR is said to be more stable than most
of the other wireless technologies because the structure of
the room is not a concern [10]. However, IR is more suitable
to be used only in a room as its coverage is very low.
Another problem of IR is that it is vulnerable to sunlight,
but this problem can be neglected as there will be low
sunlight interference in most indoor environment.
Furthermore, due to IR signal is transmitted in a straight
line, clear LOS is the priority when using IR.
IV. METHODOLOGY
The aim of this project is to create an indoor positioning
system using Bluetooth Low Energy technology. In this
project, IGS01 Bluetooth scanner (Fig 1) and IGB01 BLE
beacon (Figure 2) manufactured by Ingics Technology [11]
is used to support the BLE functionality of the project. The
reason for choosing IGS01 Bluetooth scanner is because it
has built in Wi-Fi, where received message is supported
with various protocols and to be sent to server such as
Message Queuing Telemetry Transport (MQTT),
Transmission Control Protocol (TCP) and Hypertext
Transfer Protocol (HTTP). In this project, the MQTT
protocol of IGS01 is exploited and the received message is
published to the MQTT host on the public broker.
The BLE scanners are configured to connect to a Wi-Fi
modem that is prepared for the project purpose and also to
connect to a MQTT broker for data publication purpose.
Once activated, the scanners start to scan for Bluetooth
signals in the range of its effectiveness while publishing the
data to the MQTT broker in real time. The message that is
published include the ID of the scanner, the detected ID of
the beacons in the surrounding, the RSSI from the specific
beacon, the timestamp in epoch format and other raw packet
content which is not needed. The timestamp in epoch format
156
Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
is converted into human readable format. However, this
scanner has no capability to filter and select a specific BLE
beacon. Therefore, specific beacon tracking process has to
be done in the data processing part
Fig 1: IGS01 BLE scanner Fig 2: IBS01 BLE beacon
.
Python is used for the data processing. Two separate
modules are developed for this system and they run
simultaneously to produce correct output for the system.
The first module retrieves data from the MQTT broker and
data storage in database. The second module retrieves the
data from the database to process and produces the
localization output. Ubuntu OS is used in the development
of this project. In this project SQL database serves as the
medium to store the data that is obtained from the MQTT
broker before the large amount of data is processed.
A laboratory with dimension of 990cm x 770cm is
converted into grids of 198 x 154 is to be used as the testing
venue. 10 BLE scanners are setup as shown in Fig 3. The
scanners are setup at a height of 1 m from the ground.
Fig 3: Plan of the laboratory with dimension and the distribution of
10 IGS01 BLE scanners with coordinate
For every second when the system is running, the system
retrieves data from the database where their time value
matches with the current time. The system then identifies
each data by the ID of the scanners that publish them, to
find the average RSSI values of all the 10 BLE scanners that
are deployed in the laboratory. The transmission interval of
the BLE beacon is set to be 100ms, therefore it is expected
that each scanner is able to detect 10 signals from the
targeted beacon in a second, if the beacon is in the
detectable area of the scanner.
Distance between each coordinate in the laboratory grid map
with every BLE scanners is calculated to produce arrays of
10 distance values. The calculation of distance is done by
using Euclidean distance formula:
=	 ( − ) + ( − ) (1)
For each of the 10 distance values, K-nearest neighbor
(KNN) algorithm in the Python code is used to find the 3
lowest average distance values. The 3 BLE scanners that
have the returned the mentioned 3 distance values are used
to represent that specific coordinate. Coordinate with same
representative of 3 BLE scanners are grouped together as a
region. The result is used to produce the theoretical region
map with 20 regions as shown in Fig 4. This procedure is
important to produce this region map as a reference for the
actual system to make a prediction on the region of the
targeted beacon, when 3 BLE scanners with highest RSSI
value are identified, assuming BLE scanners that return
higher RSSI values are nearer to the targeted beacon.
Fig 4: Classification of 20 regions in the laboratory.
Table I: The region and its respective combination of scanners
Region Combination Region Combination
1 [8,9,10] 11 [6,7,8]
2 [1,9,10] 12 [5,7,8]
3 [1,2,10] 13 [5,7,10]
4 [7,8,9] 14 [3,5,10]
5 [7,8,10] 15 [2,3,5]
6 [2,8,10] 16 [2,3,4]
7 [2,3,10] 17 [3,5,7]
8 [1,2,3] 18 [5,6,7]
9 [5,8,10] 19 [3,4,5]
10 [2,5,10] 20 [4,5,6]
Next, we carried out a test to observe the relationship
between RSSI value and scanner-beacon distance. The setup
consists of only 1 BLE scanner and 1 BLE beacon. RSSI
value is collected at different distance between the scanner
and beacon to plot a graph of RSSI VS Distance as shown in
Fig 5. An equation of y = 0.0052x2
- 0.7824x - 49.851 is
curved-fitted where y is the RSSI and x is the distance
between the BLE scanner and beacon. This equation can be
used for reversed calculation to predict the distance when
the RSSI data from the BLE scanner is obtained in the
system.
157
Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
Fig 5: Graph of RSSI VS Distance
V. RESULTS AND DISCUSSIONS
During the experiment, the system recorded all readings
detected by the BLE scanner through MQTT broker every
second. The system then used the RSSI values obtained to
perform KNN to sort out the 3 strongest RSSI values. The 3
strongest RSSI values indicate the 3 scanners that were
nearest to the targeted beacon. The result was then be used
to predict the region of the targeted beacon every second.
100 sets of readings were obtained from each region to
investigate the reliability and accuracy of the system.
Reliability of the system is judged by the ability of the
system to make consistent estimation while the accuracy is
judged by the correctness of the estimation. For example, it
can be seen from Figure 6 that the system has made 2
correct estimations of Region 3, 1 wrong estimation at
Region 8 and 1 with no output. The reliability of the system
is calculated by the number of times the system is able to
make a estimation even if the prediction is incorrect, which
in this case 3 out of 4 iterations yield a reliability of 75%.
The accuracy on the other hand only looks at the number of
times the system is able to make a correct region estimation.
As mentioned previously, the estimation of Region 3 is a
correct estimation, therefore there are 2 success attempts to
make a correct estimation out of 4 iterations which give an
accuracy of 50%.
Fig 6: Results of a few iterations to show the output of the system
The system is tested for 3 times, where the beacon are
placed at 3 different grid locations, where the coordinates
are (30,130), (95,80) and (168,35) respectively. The location
of these coordinates in the laboratory are shown in Fig 7.
The results are calculated into reliability and accuracy to be
recorded in Table II and presented graphically in Fig 8.
Fig 7: The testing positions
Table II: Results obtained from the system
Coordinate Reliability Accuracy
(30,130) 98% 92%
(95,80) 98% 85%
(168,35) 97% 93%
Fig 8: Graphical representation of accuracy and reliability of the
system
The reliability of the system is investigated to optimize the
BLE scanners location in the laboratory. When the BLE
scanners are placed too near to each other, the system
reliability is jeopardized of the system and therefore the
system will never be able to make any estimation at all. The
result that is obtained will always be similar to the 36th
iteration in Fig 6 (no match of any of the region defined in
Table I). The reliability of the system is utmost important
compare to accuracy of the system. Because even if the
accuracy is not at a satisfactory level, enhancement effort to
improve accuracy still can possibly be done by intelligent
coding and algorithm, however there would be not much to
do if the system is not reliable.
As in Fig 8, it can be seen that the reliability of the system is
very good, being able to achieve more than 95 valid
estimation out of 100. This means that the system is able to
constantly generate valid estimation without fail. On the
other hand, for the accuracy of the system, it can be seen
that for the coordinates of (30,130) and (168,35), the
accuracy is considered very good with 92% and 93% of
accuracy respectively while for the coordinate of (95,80),
the accuracy slightly drops. This is because as referred to
Fig 4, the center part of the region map is more compact and
therefore it is highly possible that the system gives an
estimation of other nearby regions rather than the correct
prediction.
y = 0.0052x2 - 0.7824x - 49.851
-80
-75
-70
-65
-60
-55
-50
0 20 40 60 80
RSSI
Distance (unit)
RSSI VS Distance
0
50
100
30,130 95,80 168,35
Accuracy and Reliability of the system
Correct Estimation Acceptable Estimation Error
158
Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
Next, using the formula of y = 0.0052x2
- 0.7824x - 49.851
described in the part III, the accuracy test for the system to
make an estimation of the actual position is carried out. By
using 3 distance values calculated from the 3 highest
average RSSI value, trilateration method can be applied to
estimate the actual position of the beacon. The system is put
into an iteration of 100 runs to obtain 100 estimated
coordinates. Then, the relative distance between each of the
coordinates and the actual coordinate are calculated to
produce the graph as shown in Fig 9. When the relative
distance between the predicted coordinate and the actual
coordinate is 0, it means that the estimation is accurate. As
seen from the graph, 42 correct estimations are made out of
100 iterations which can be said that the accuracy of the
system to make an exact prediction of coordinate is 42%.
The number of occurrence of the coordinates decreases as
the distance between the incorrect predictions and the actual
position increases.
Fig 9: Graph of frequency of occurrence vs relative distance
between predictions and actual coordinate
VI. CONCLUSIONS
As a conclusion, this project is able to utilize the
functionality of BLE scanners to setup an indoor positioning
system that is able to predict the region of the beacon in a
laboratory. The system are tested where beacon is placed at
3 different locations. It showed that the reliability of the
system is very good. On the other hand, the accuracy of the
system varies with location of the beacon. The accuracy
tends to be higher when the beacon is placed at the outer
part of the laboratory while lower when the beacon is placed
at the center part.
There are a few future works that can be done. For example,
applying w-KNN algorithm to the RSSI obtained in the
system so that instead of predicting regions, more precise
coordinate can be predicted.
REFERENCES
[1] Faheem Zahari, Athanasios Gkelias, Kin K. Leung, "A Survey of
Indoor Localization Systems and Technologies," IEEE
Communications Surveys & Tutorials (Early Access), pp. 1-1, 2019.
[2] Wen-Ching Chen, Kuo-Fong Kao, Yung-Tsang Chang, Chih-Hung
Chang, "An RSSI-based distributed real-time indoor positioning
framework," 2018 IEEE International Conference on Applied System
Invention (ICASI), pp. 1288-1291, 2018.
[3] W. K. Zegeye, S. B. Amsalu, Y. Astatke and F. Moazzami, "WiFi
RSS fingerprinting indoor localization for mobile devices," 2016
IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile
Communication Conference (UEMCON), pp. 1-6, 2016.
[4] Mohd Ezanee Rusli, Mohammad Ali, Norziana Jamil, Marina Md
Din1, "An Improved Indoor Positioning Algorithm Based on RSSI-
Trilateration technique," 2016 International Conference on Computer
& Communication Engineering, pp. 72-77, 2016.
[5] Hwi-Hwan Kim, Byeong-Gwon Kang, "A study on the
implementation of a 3-dimensional positioning system on indoor
environments," 2014 International Conference on Advanced
Technologies for Communications (ATC 2014), pp. 750-753, 2014.
[6] Anum Hameed, Hafiza Anisa Ahmed, "Survey on indoor positioning
applications based on different technologies," 2018 12th International
Conference on Mathematics, Actuarial Science, Computer Science
and Statistics (MACS), pp. 1-5, 2018.
[7] A. Satan, "Bluetooth-based Indoor Navigation Mobile System," 2018
19th International Carpathian Control Conference (ICCC), pp. 332-
337, 2018.
[8] Ramsey Faragher and Robert Harle, "Location Fingerprinting with
Bluetooth Low Energy Beacons," IEEE JOURNAL ON SELECTED
AREAS IN COMMUNICATION, vol. 33, no. 11, pp. 2418-2428, 2015.
[9] Kevin Bouchard, Ramin Ramezani, Arash Naeim, "Features based
proximity localization with Bluetooth emitters," 2016 IEEE 7th
Annual Ubiquitous Computing, Electronics & Mobile Communication
Conference (UEMCON), pp. 1-5, 2016.
[10] Wanye Yao and Liqi Ma, "Research and Application of Indoor
Positioning Method Based on Fixed Infrared Beacon," 2018 37th
Chinese Control Conference (CCC), pp. 5375-5379, 2018.
[11] "INGICS Technology," [Online]. Available:
https://www.ingics.com/index.html. [Accessed 27 February 2020].
159
Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.

More Related Content

What's hot

Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...journalBEEI
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
 
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingSayed Chhattan Shah
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
 
An insight into internet sector in Iraq
An insight into internet sector in Iraq An insight into internet sector in Iraq
An insight into internet sector in Iraq IJECEIAES
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
 
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET Journal
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksEricsson
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 

What's hot (19)

Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...Performance analysis of software defined network using intent monitor and rer...
Performance analysis of software defined network using intent monitor and rer...
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 
An insight into internet sector in Iraq
An insight into internet sector in Iraq An insight into internet sector in Iraq
An insight into internet sector in Iraq
 
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...Efficient radio resource allocation scheme for 5G networks with device-to-devi...
Efficient radio resource allocation scheme for 5G networks with device-to-devi...
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
 
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Wibree and ZigBee
Wibree and ZigBeeWibree and ZigBee
Wibree and ZigBee
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)
 
Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary Networks
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 

Similar to Indoor tracking with bluetooth low energy devices using k nearest neighbour algorithm

5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDYIJCSES Journal
 
5G Vs Wi-Fi Indoor Positioning: A Comparative Study
5G Vs Wi-Fi Indoor Positioning: A Comparative Study5G Vs Wi-Fi Indoor Positioning: A Comparative Study
5G Vs Wi-Fi Indoor Positioning: A Comparative StudyIJCSES Journal
 
Location estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingLocation estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingHanumesh Palla
 
Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
 
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...IAESIJAI
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...Journal Papers
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
The proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingThe proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingEditor IJCATR
 
Indoor positioning-methods-using-vlc-leds-2015
Indoor positioning-methods-using-vlc-leds-2015Indoor positioning-methods-using-vlc-leds-2015
Indoor positioning-methods-using-vlc-leds-2015THIENNGUYENVAN12
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266journalBEEI
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioningSherwin Rodrigues
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Sensorless sensing with wi fi
Sensorless sensing with wi fiSensorless sensing with wi fi
Sensorless sensing with wi fiashajuly20
 
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINTWLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINTijwmn
 

Similar to Indoor tracking with bluetooth low energy devices using k nearest neighbour algorithm (20)

5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
5G VS WI-FI INDOOR POSITIONING: A COMPARATIVE STUDY
 
5G Vs Wi-Fi Indoor Positioning: A Comparative Study
5G Vs Wi-Fi Indoor Positioning: A Comparative Study5G Vs Wi-Fi Indoor Positioning: A Comparative Study
5G Vs Wi-Fi Indoor Positioning: A Comparative Study
 
Location estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingLocation estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprinting
 
Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology
 
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
A hybrid model based on constraint oselm, adaptive weighted src and knn for l...
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
The proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingThe proposed System for Indoor Location Tracking
The proposed System for Indoor Location Tracking
 
Coordinate Location Fingerprint Based On WiFi Service
Coordinate Location Fingerprint Based On  WiFi ServiceCoordinate Location Fingerprint Based On  WiFi Service
Coordinate Location Fingerprint Based On WiFi Service
 
Indoor positioning-methods-using-vlc-leds-2015
Indoor positioning-methods-using-vlc-leds-2015Indoor positioning-methods-using-vlc-leds-2015
Indoor positioning-methods-using-vlc-leds-2015
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266On the analysis of received signal strength indicator from ESP8266
On the analysis of received signal strength indicator from ESP8266
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioning
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Loramesh
LorameshLoramesh
Loramesh
 
Sensorless sensing with wi fi
Sensorless sensing with wi fiSensorless sensing with wi fi
Sensorless sensing with wi fi
 
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINTWLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
WLAN BASED POSITIONING WITH A SINGLE ACCESS POINT
 

More from Conference Papers

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generatorConference Papers
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Conference Papers
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Conference Papers
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Conference Papers
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...Conference Papers
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Conference Papers
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaConference Papers
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...Conference Papers
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous thingsConference Papers
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorConference Papers
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designConference Papers
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edgeConference Papers
 

More from Conference Papers (20)

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generator
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysia
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
Super convergence of autonomous things
Super convergence of autonomous thingsSuper convergence of autonomous things
Super convergence of autonomous things
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistor
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edge
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Indoor tracking with bluetooth low energy devices using k nearest neighbour algorithm

  • 1. Indoor Tracking with Bluetooth Low Energy Devices Using K-Nearest Neighbour Algorithm Koon Kee, Lie1 Kwok Shien, Yeo2* Department Electrical and Electronics Faculty of Engieering and Technology Tunku Abdul Rahman University College Jalan Genting Klang, Setapak 53300 Kuala Lumpur Malaysia liekoonkee@gmail.com1 yeoks@tarc.edu.my2* Alvin Kee Ngoh, Ting3 David Heng Tze, Chieng4 Wireless Innovation MIMOS Berhad Technology Park Malaysia, Bukit Jalil 57000 Kuala Lumpur Malaysia kee.ting@mimos.my3 ht.chieng@mimos.my4 Abstract— In this paper we discuss the design of an indoor positioning system (IPS) using Bluetooth Low Energy (BLE) scanners and beacons. We deployed the prototype system in a laboratory where its dimension is measured at × cm2 . Range test has been carried out to study the relationship between distance and Received Signal Strength (RSSI) of the BLE devices. Using the highest RSSI values received from 3 of the scanners, we use K-Nearest Neighbour algorithm to predict the region where the beacon is possibly located. We further demonstate that our system is able to estimate the location region of the target beacon with good accuracy. Keywords—Indoor tracking, localization, Bluetooth Low Energy, K-Nearest Neighbour. I. INTRODUCTION Due to unavailability of GPS signal in indoor environment, the development of Indoor Positioning System (IPS) has received growing attention. However, the research community is yet to find a reliable indoor positioning system to be commercialized. To counter this issue, researchers have been proposing different solutions including but not limited to Wi-Fi, Bluetooth, visible lights, magnetic fields, and RFID. Another reason that hinders indoor positioning system from practical implementation is that indoor maps are yet to be prepared. Although a few parties such as Google and Nokia are collecting indoor data of the indoor mappings, the journey for its completion is still far away. II. RELATED WORKS This chapter discusses variety of indoor localization techniques in search of low cost and simple solution that are able to provide reliable results. Besides that, the literature of indoor positioning system technology is also be presented. The theory behind different technologies is explained and compared through different aspects such as area of effectiveness, accuracy and cost. A. Localization Techniques 1. Received Signal Strength Indicator (RSSI) RSS is a measurement of how well a device is receiving a signal from a transmitter, usually measured in the form of decibel-milliwatts (dBm), and can be applied in most wireless environment, for example Wi-Fi and Bluetooth. RSS is the exact value of signal strength at the received by the receiver and thus can be used to roughly estimate the distance between the transmitter and the receiver. In a survey done by Faheem et al.[1], they mentioned that RSSI is often get confused with RSS. As how it is named, RSSI is the indicator of the RSS and the measurement of RSSI can be different for different device when dealing with a transmitter at the same conditions [1]. IEEE 802.11 standard defined that RSSI can be on a scale of 0-255, but they do not define any other parameters that affects the value of RSSI. Basically, the value of RSSI including the factors that affects the value such as accuracy, RSSI value at a reference value and more is predefined by the chip manufacturer, for instance Cisco has their chips set at a 0-100 scale and Atheros put their scale at 0-60. RSSI value is normally represented in negative form, in other words the closer the value is to 0, the stronger the received signal. RSSI will also be affected by the signal propagation medium, where a signal propagation constant will be taken in consideration when calculating the RSSI. As a conclusion, the authors in [?] highlighted that RSS and RSSI approach for localization technique is simple and cost effective, and would be the first technique in consideration for the development of an indoor positioning system. However, the use of complex algorithm is required including adding filter to the system and different mechanisms to make this technique more reliable. The RSSI is very difficult to be implemented in indoor environment due to its nature of easily disrupted by different factors such as obstacles that block its line of sight (LOS), reflections due to walls and also indoor noise which causes multipath effect [2]. Therefore, it is highly suggested that this technique is applied along different techniques. 2. Fingerprinting Fingerprinting or sometimes called as scene analysis is a further localization technique based on the RSSI method. This method mainly involved the gathering of labelled data, known as fingerprints, and building a radio map based on the RSS values stored in the database [3]. This process is usually done during offline phase, before the system operation. The fingerprinting technique is a method which 978-1-7281-5033-8/20/$31.00 ©2020 IEEE 155 Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
  • 2. used a reverse function to determine the location of an object in indoor environment given a real-time RSS value. They further commented that this technique often results in a coarse measurements and troublesome calibration step to build up the radio map. The technique started by setting grid at the desired area. The next procedure will be taking samples of RSS values at the different grid points and stored in a database. However, the offline fingerprints data alone is not enough to obtain an accurate and reliable prediction of indoor position due to dynamic nature of the Wi-Fi or Bluetooth RSSI signals. Once the system is brought online, a localization algorithm has to be utilized to estimate an online RSSI measurement with the offline fingerprints for a more precise localization result. 3. Trilateration Trilateration is another technique that is based on the RSSI method, though it can also be based on other technique such as Time of Arrival (ToA). In contrast to fingerprinting technique which is an estimation approach, trilateration is a mathematical approach that is currently applied in the GPS system. Trilateration measures distances between 3 anchor nodes with known position and 1 mobile device which the position is to be found. It can be said that one of the benefits of trilateration technique is that it does not require tedious offline scene analysis, unlike fingerprinting technique [4]. The information needed for this technique is the position of the anchor nodes, in order to estimate the position of the mobile device. Theoretically, when one anchor node received the RSSI from the mobile device, the possible position of the mobile device will be any point on the imaginary sphere formed with the distance as the radius and the anchor node at the center. When the second node is added to form the second sphere, the possible position of mobile node is now narrowed down to the two intersection points between the spheres. When third anchor node is added, the only possible position of the mobile node is the only intersection point between all the three imaginary spheres formed with anchor node as center and distance measured as radius. Multipath effect is often being observed in different tests that applied trilateration technique [5]. III. EXISTING TECHNOLOGY 1. Wi-Fi Wi-Fi is a trademark term registered under Wi-Fi Alliance where it is defined under IEEE’s 802.11 standards as any wireless local area network (WLAN) products. In the aspect of indoor positioning, researchers had exploited the nature of the Wi-Fi that sent its Service Set Identifier (SSID), timestamps and RSSI in estimating the position of a mobile device with Wi-Fi detection ability, for example a smartphone. With this information in its signals, localization technique such as fingerprinting, multilateration or even ToA can be easily done. Another reason that gained the attention of researchers towards the possibility of applying Wi-Fi in IPS is that the Wi-Fi signal is commonly available in in indoor environment nowadays and therefore the cost of installation is low [6]. 2. Bluetooth Bluetooth is a wireless communication technology that allows devices to transmit data over a short distance. Developed in 1994, Bluetooth uses 2.4GHz frequency, the same frequency as most of the other wireless technologies, such as Wi-Fi. Bluetooth 4.0, which is more commonly known as BLE, featured lower power consumption and lower cost at a higher range, which attracted the attention of researchers to be implemented in an IPS [7]. The low power consumption feature allowed BLE to be one of the main competitors of Wi-Fi for IPS, where one coin cell in the BLE beacons can last up to a few years. Bluetooth uses 40 channels, each 2MHz wide spreading from 2.4GHz to 2.48Hz [8]. Only 3 channels that are labelled 37, 38 and 39 which center at 2.402GHz, 2.426GHz and 2.48GHz are the advertising channels that commonly used to broadcast the information in IPS applications. However, BLE signal is easily interfered by other signals that use 2.4GHz such as Wi-Fi. Nevertheless, it has been observed that the performance and accuracy of BLE is higher compared to the other method and it is found that the mean RSSI provides the most accurate result for the localization [9]. 3. Infrared Infrared is considered as one of the earliest tools that attempted to develop an IPS. Unlike Wi-Fi and Bluetooth which operating principle is based on radio frequency, IR is a type of electromagnetic wave that has shorter wavelengths than radio frequency. IR is said to be more stable than most of the other wireless technologies because the structure of the room is not a concern [10]. However, IR is more suitable to be used only in a room as its coverage is very low. Another problem of IR is that it is vulnerable to sunlight, but this problem can be neglected as there will be low sunlight interference in most indoor environment. Furthermore, due to IR signal is transmitted in a straight line, clear LOS is the priority when using IR. IV. METHODOLOGY The aim of this project is to create an indoor positioning system using Bluetooth Low Energy technology. In this project, IGS01 Bluetooth scanner (Fig 1) and IGB01 BLE beacon (Figure 2) manufactured by Ingics Technology [11] is used to support the BLE functionality of the project. The reason for choosing IGS01 Bluetooth scanner is because it has built in Wi-Fi, where received message is supported with various protocols and to be sent to server such as Message Queuing Telemetry Transport (MQTT), Transmission Control Protocol (TCP) and Hypertext Transfer Protocol (HTTP). In this project, the MQTT protocol of IGS01 is exploited and the received message is published to the MQTT host on the public broker. The BLE scanners are configured to connect to a Wi-Fi modem that is prepared for the project purpose and also to connect to a MQTT broker for data publication purpose. Once activated, the scanners start to scan for Bluetooth signals in the range of its effectiveness while publishing the data to the MQTT broker in real time. The message that is published include the ID of the scanner, the detected ID of the beacons in the surrounding, the RSSI from the specific beacon, the timestamp in epoch format and other raw packet content which is not needed. The timestamp in epoch format 156 Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
  • 3. is converted into human readable format. However, this scanner has no capability to filter and select a specific BLE beacon. Therefore, specific beacon tracking process has to be done in the data processing part Fig 1: IGS01 BLE scanner Fig 2: IBS01 BLE beacon . Python is used for the data processing. Two separate modules are developed for this system and they run simultaneously to produce correct output for the system. The first module retrieves data from the MQTT broker and data storage in database. The second module retrieves the data from the database to process and produces the localization output. Ubuntu OS is used in the development of this project. In this project SQL database serves as the medium to store the data that is obtained from the MQTT broker before the large amount of data is processed. A laboratory with dimension of 990cm x 770cm is converted into grids of 198 x 154 is to be used as the testing venue. 10 BLE scanners are setup as shown in Fig 3. The scanners are setup at a height of 1 m from the ground. Fig 3: Plan of the laboratory with dimension and the distribution of 10 IGS01 BLE scanners with coordinate For every second when the system is running, the system retrieves data from the database where their time value matches with the current time. The system then identifies each data by the ID of the scanners that publish them, to find the average RSSI values of all the 10 BLE scanners that are deployed in the laboratory. The transmission interval of the BLE beacon is set to be 100ms, therefore it is expected that each scanner is able to detect 10 signals from the targeted beacon in a second, if the beacon is in the detectable area of the scanner. Distance between each coordinate in the laboratory grid map with every BLE scanners is calculated to produce arrays of 10 distance values. The calculation of distance is done by using Euclidean distance formula: = ( − ) + ( − ) (1) For each of the 10 distance values, K-nearest neighbor (KNN) algorithm in the Python code is used to find the 3 lowest average distance values. The 3 BLE scanners that have the returned the mentioned 3 distance values are used to represent that specific coordinate. Coordinate with same representative of 3 BLE scanners are grouped together as a region. The result is used to produce the theoretical region map with 20 regions as shown in Fig 4. This procedure is important to produce this region map as a reference for the actual system to make a prediction on the region of the targeted beacon, when 3 BLE scanners with highest RSSI value are identified, assuming BLE scanners that return higher RSSI values are nearer to the targeted beacon. Fig 4: Classification of 20 regions in the laboratory. Table I: The region and its respective combination of scanners Region Combination Region Combination 1 [8,9,10] 11 [6,7,8] 2 [1,9,10] 12 [5,7,8] 3 [1,2,10] 13 [5,7,10] 4 [7,8,9] 14 [3,5,10] 5 [7,8,10] 15 [2,3,5] 6 [2,8,10] 16 [2,3,4] 7 [2,3,10] 17 [3,5,7] 8 [1,2,3] 18 [5,6,7] 9 [5,8,10] 19 [3,4,5] 10 [2,5,10] 20 [4,5,6] Next, we carried out a test to observe the relationship between RSSI value and scanner-beacon distance. The setup consists of only 1 BLE scanner and 1 BLE beacon. RSSI value is collected at different distance between the scanner and beacon to plot a graph of RSSI VS Distance as shown in Fig 5. An equation of y = 0.0052x2 - 0.7824x - 49.851 is curved-fitted where y is the RSSI and x is the distance between the BLE scanner and beacon. This equation can be used for reversed calculation to predict the distance when the RSSI data from the BLE scanner is obtained in the system. 157 Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
  • 4. Fig 5: Graph of RSSI VS Distance V. RESULTS AND DISCUSSIONS During the experiment, the system recorded all readings detected by the BLE scanner through MQTT broker every second. The system then used the RSSI values obtained to perform KNN to sort out the 3 strongest RSSI values. The 3 strongest RSSI values indicate the 3 scanners that were nearest to the targeted beacon. The result was then be used to predict the region of the targeted beacon every second. 100 sets of readings were obtained from each region to investigate the reliability and accuracy of the system. Reliability of the system is judged by the ability of the system to make consistent estimation while the accuracy is judged by the correctness of the estimation. For example, it can be seen from Figure 6 that the system has made 2 correct estimations of Region 3, 1 wrong estimation at Region 8 and 1 with no output. The reliability of the system is calculated by the number of times the system is able to make a estimation even if the prediction is incorrect, which in this case 3 out of 4 iterations yield a reliability of 75%. The accuracy on the other hand only looks at the number of times the system is able to make a correct region estimation. As mentioned previously, the estimation of Region 3 is a correct estimation, therefore there are 2 success attempts to make a correct estimation out of 4 iterations which give an accuracy of 50%. Fig 6: Results of a few iterations to show the output of the system The system is tested for 3 times, where the beacon are placed at 3 different grid locations, where the coordinates are (30,130), (95,80) and (168,35) respectively. The location of these coordinates in the laboratory are shown in Fig 7. The results are calculated into reliability and accuracy to be recorded in Table II and presented graphically in Fig 8. Fig 7: The testing positions Table II: Results obtained from the system Coordinate Reliability Accuracy (30,130) 98% 92% (95,80) 98% 85% (168,35) 97% 93% Fig 8: Graphical representation of accuracy and reliability of the system The reliability of the system is investigated to optimize the BLE scanners location in the laboratory. When the BLE scanners are placed too near to each other, the system reliability is jeopardized of the system and therefore the system will never be able to make any estimation at all. The result that is obtained will always be similar to the 36th iteration in Fig 6 (no match of any of the region defined in Table I). The reliability of the system is utmost important compare to accuracy of the system. Because even if the accuracy is not at a satisfactory level, enhancement effort to improve accuracy still can possibly be done by intelligent coding and algorithm, however there would be not much to do if the system is not reliable. As in Fig 8, it can be seen that the reliability of the system is very good, being able to achieve more than 95 valid estimation out of 100. This means that the system is able to constantly generate valid estimation without fail. On the other hand, for the accuracy of the system, it can be seen that for the coordinates of (30,130) and (168,35), the accuracy is considered very good with 92% and 93% of accuracy respectively while for the coordinate of (95,80), the accuracy slightly drops. This is because as referred to Fig 4, the center part of the region map is more compact and therefore it is highly possible that the system gives an estimation of other nearby regions rather than the correct prediction. y = 0.0052x2 - 0.7824x - 49.851 -80 -75 -70 -65 -60 -55 -50 0 20 40 60 80 RSSI Distance (unit) RSSI VS Distance 0 50 100 30,130 95,80 168,35 Accuracy and Reliability of the system Correct Estimation Acceptable Estimation Error 158 Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.
  • 5. Next, using the formula of y = 0.0052x2 - 0.7824x - 49.851 described in the part III, the accuracy test for the system to make an estimation of the actual position is carried out. By using 3 distance values calculated from the 3 highest average RSSI value, trilateration method can be applied to estimate the actual position of the beacon. The system is put into an iteration of 100 runs to obtain 100 estimated coordinates. Then, the relative distance between each of the coordinates and the actual coordinate are calculated to produce the graph as shown in Fig 9. When the relative distance between the predicted coordinate and the actual coordinate is 0, it means that the estimation is accurate. As seen from the graph, 42 correct estimations are made out of 100 iterations which can be said that the accuracy of the system to make an exact prediction of coordinate is 42%. The number of occurrence of the coordinates decreases as the distance between the incorrect predictions and the actual position increases. Fig 9: Graph of frequency of occurrence vs relative distance between predictions and actual coordinate VI. CONCLUSIONS As a conclusion, this project is able to utilize the functionality of BLE scanners to setup an indoor positioning system that is able to predict the region of the beacon in a laboratory. The system are tested where beacon is placed at 3 different locations. It showed that the reliability of the system is very good. On the other hand, the accuracy of the system varies with location of the beacon. The accuracy tends to be higher when the beacon is placed at the outer part of the laboratory while lower when the beacon is placed at the center part. There are a few future works that can be done. For example, applying w-KNN algorithm to the RSSI obtained in the system so that instead of predicting regions, more precise coordinate can be predicted. REFERENCES [1] Faheem Zahari, Athanasios Gkelias, Kin K. Leung, "A Survey of Indoor Localization Systems and Technologies," IEEE Communications Surveys & Tutorials (Early Access), pp. 1-1, 2019. [2] Wen-Ching Chen, Kuo-Fong Kao, Yung-Tsang Chang, Chih-Hung Chang, "An RSSI-based distributed real-time indoor positioning framework," 2018 IEEE International Conference on Applied System Invention (ICASI), pp. 1288-1291, 2018. [3] W. K. Zegeye, S. B. Amsalu, Y. Astatke and F. Moazzami, "WiFi RSS fingerprinting indoor localization for mobile devices," 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 1-6, 2016. [4] Mohd Ezanee Rusli, Mohammad Ali, Norziana Jamil, Marina Md Din1, "An Improved Indoor Positioning Algorithm Based on RSSI- Trilateration technique," 2016 International Conference on Computer & Communication Engineering, pp. 72-77, 2016. [5] Hwi-Hwan Kim, Byeong-Gwon Kang, "A study on the implementation of a 3-dimensional positioning system on indoor environments," 2014 International Conference on Advanced Technologies for Communications (ATC 2014), pp. 750-753, 2014. [6] Anum Hameed, Hafiza Anisa Ahmed, "Survey on indoor positioning applications based on different technologies," 2018 12th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), pp. 1-5, 2018. [7] A. Satan, "Bluetooth-based Indoor Navigation Mobile System," 2018 19th International Carpathian Control Conference (ICCC), pp. 332- 337, 2018. [8] Ramsey Faragher and Robert Harle, "Location Fingerprinting with Bluetooth Low Energy Beacons," IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATION, vol. 33, no. 11, pp. 2418-2428, 2015. [9] Kevin Bouchard, Ramin Ramezani, Arash Naeim, "Features based proximity localization with Bluetooth emitters," 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 1-5, 2016. [10] Wanye Yao and Liqi Ma, "Research and Application of Indoor Positioning Method Based on Fixed Infrared Beacon," 2018 37th Chinese Control Conference (CCC), pp. 5375-5379, 2018. [11] "INGICS Technology," [Online]. Available: https://www.ingics.com/index.html. [Accessed 27 February 2020]. 159 Authorized licensed use limited to: University of Exeter. Downloaded on June 24,2020 at 01:22:58 UTC from IEEE Xplore. Restrictions apply.