Next Article in Journal
Sink-Type-Dependent Data-Gathering Frameworks in Wireless Sensor Networks: A Comparative Study
Next Article in Special Issue
A Development of the Self Shape Adjustment Cushion Mechanism for Improving Sitting Comfort
Previous Article in Journal
A Blockchain-Enabled Framework for mHealth Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Movement Path Data Generation from Wi-Fi Fingerprints for Recurrent Neural Networks

1
NEOWIZ Corp. 14, Daewangpangyo-ro 645beon-gil, Bundang-gu, Seongnam-si 13487, Gyeonggi-do, Korea
2
School of Robotics, Kwangwoon University, 20, Kwangwoon-ro, Nowon-gu, Seoul 01897, Korea
3
Department of Computer & Mobile Convergence, Gyeonggi University of Science and Technology, 269, Gyeonggigwagidae-ro, Siheung-si 15073, Gyeonggi-do, Korea
*
Authors to whom correspondence should be addressed.
Sensors 2021, 21(8), 2823; https://doi.org/10.3390/s21082823
Submission received: 10 March 2021 / Revised: 13 April 2021 / Accepted: 14 April 2021 / Published: 16 April 2021

Abstract

:
The recurrent neural network (RNN) model, which is a deep-learning network that can memorize past information, is used in this paper to memorize continuous movements in indoor positioning to reduce positioning error. To use an RNN model in Wi-Fi-fingerprint based indoor positioning, data set must be sequential. However, Wi-Fi fingerprinting only saves the received signal strength indicator for a location, so it cannot be used as RNN data. For this reason, we propose a movement path data generation technique that generates data for an RNN model for sequential positioning from Wi-Fi fingerprint data. Movement path data can be generated by creating an adjacency list for Wi-Fi fingerprint location points. However, creating an adjacency matrix for all location points requires a large amount of computation. This problem is solved by dividing indoor environment by K-means clustering and creating a cluster transition matrix based on the center of each cluster.

1. Introduction

Recently, Wi-Fi fingerprinting has been used to construct indoor positioning systems [1,2,3,4,5,6,7,8]. In this approach, the Wi-Fi fingerprinting system records the received signal strength indicator (RSSI) of the access points (APs) collected at each location point in the database. It then compares input data with the recorded data to calculate a position. The signal strength values of Wi-Fi APs can lead to incorrect positions because they contain noise caused by obstacles. To improve the location accuracy and reduce the adverse effects of environmental factors, several types of studies have been conducted. A method of fingerprint location for Wi-Fi signals assisted by smart phone built-in sensors has been studied in work [9]. To improve the location accuracy, Wang et al. [10] utilized 5G mmWave beam. However, these approaches require auxiliary devices, which makes configuration and operation complex.
Another approach to improve location accuracy is to use RSSI with mobile user trajectory [11,12,13]. An approach for fusion of dead reckoning trajectories generated from foot-mounted inertial measurement units (IMUs), RSSI from Wi-Fi signals and position estimations from global positioning system (GPS) from multiple users was proposed for trajectory estimation and crowd-sourced RM generation [12]. A Wi-Fi RSSI dataset containing sequentially collected trajectories at a finer level of reference point is presented in [13]. Positioning accuracy can be improved by using a dataset containing trajectory, however, it is difficult to apply in a real environment because it takes a lot of effort to prepare and process the dataset. Also, there is a limitation that only the movement paths followed during the collection process exist as a dataset.
It is often difficult to estimate a movement path of mobile users from a dataset (e.g., collected Wi-Fi fingerprint) for which trajectory is not provided. Regarding the movement path generation, recurrent neural network (RNN) models capable of learning time series information are attracting attention. It is well-known that the RNN can extract features from high-dimensional time series input data and perform well in classification and regression problems. The RNN model is a supervised learning algorithm that can consider the continuity of the data [14,15,16]. This network can consider the continuous movement of a person in indoor positioning and hence calculate his or her current position more accurately or predict his or her next movement. To use an RNN in an indoor positioning system, RSSIs must be sequentially input according to a human’s path. However, most of the datasets provided for indoor positioning studies do not provide this path.
This paper proposes a method to generate movement path data based on Wi-Fi fingerprinting. We use K-means clustering to create clusters that separate indoor location areas. The generated clusters and an adjacency matrix for these clusters are used to create path data by converting them into the states and state transition probabilities of a Markov chain. The proposed machine learning model uses the generated movement path data instead of Wi-Fi fingerprinting, so the RSSIs of the previous location affect the positioning of the current location. We compared the performance of the proposed technique with that of the Wi-Fi fingerprint-based positioning method.
The structure of this paper is as follows. Section 2 describes K-means clustering and Markov chains. Section 3 describes methods to divide an indoor environment based on K-means clustering and generate movement path data. Section 4 describes the performance evaluation of the proposed and existing positioning algorithms. Finally, Section 5 presents the conclusion and future work of this study.

2. Related Works

2.1. K-means Clustering

K-means clustering is an algorithm that classifies given data into K clusters. It updates the centroid of cluster in a way that minimizes the variance of the distance between clusters. Assume that all data in set D belongs to one of the clusters in set C . When D = C 1 C 2     C K ,   C i C j = and the number of clusters is K , the cluster to which data point d j belongs is calculated as follows:
argmin c i = 1 K d j C i   d j c i 2
Algorithm 1 shows the K-means clustering algorithm used in this paper. It takes D , K , and the maximum number of iterations as input, and outputs cluster center set C and cluster index set L , which indicates to which cluster data point d i belongs. The center points of a cluster are initialized using the method described in the K-means++ algorithm [17].
Algorithm 1 K-means Clustering Algorithm
Input: D = d 1 ,   d 2 ,   ,   d n /* set of data to be clustered */
    K /* number of clusters */
    M /* limit of iterations */
Output: C = c 1 ,   c 2 ,   ,   c K /* set of cluster centroids */
     L = l d i | i = 1 ,   , n /* set of cluster labels of D */
begin
C initialized by K-means++;
for each d i D do
   l d i argmin j 1 , , K d d i ,   c j ;
end
c h a g n e d f a l s e ;
i t e r 0 ;
repeat
  for each c i C do
    UpdateCluster( c i );
   end
   for each d i D do
     m i n D i s t argmin j 1 , , K d d i ,   c j ;
    if m i n D i s t l d i then
      l d i m i n D i s t ;
      c h a n g e d t r u e ;
    end
   end
    i t e r i t e r + 1 ;
  until c h a n g e d = t r u e and i t e r M ;
end

2.2. Markov Chains

The Markov property states that the current state is affected by the past state. Markov chains are discrete probability processes with Markov properties and change state at every time step. In a Markov chain, the probability of transitioning to another state is expressed by the state transition probability matrix. Assuming states C = 1 ,   2 ,   3 ,   ,   K , the state transition matrix is represented as follows:
P = p 11 p 12 p 13 p 21 p 22 p 23 p 31 p 23 p 33 p 1 K p 2 K p 3 K p K 1 p K 2 p K 3 p KK
where p i j 0 and for all i , the following formula holds:
j = 1 K p i j = j = 1 K P ( C t + 1 = j C t = i ) = 1

2.3. Fingerprint Positioning Technique

The positioning algorithm compares the input data with the radio fingerprint and estimates it as the most similar location. Euclidean distance is representative distance comparison algorithm, but the distance difference becomes ambiguous when high-dimensional data is input [1]. To solve this problem, Shrestha studied logarithmic Gaussian distance, which shows high performance in high-dimensional data [3]. Tian studied affinity propagation clustering, which selects clusters with features like input data and compares Euclidean distances within the cluster [5]. Positioning algorithms using deep neural networks (DNN) have been studied to use higher-dimensional input data. Zhang improved the positioning accuracy by designing a layer that mixed DNN and hidden Markov model (HMM) [6]. Park studied data augmentation techniques for generating Wi-Fi fingerprints with high density data and parallel learning for learning multistory buildings [4]. Sahar and Han collected Wi-Fi fingerprints by walking survey dataset and used them as input to the LSTM model [2].

3. Proposed Method

3.1. Clustering of Location Points

Dataset must be collected by transitioning to adjacent location points over time to generate movement path data based on Wi-Fi fingerprinting. Adjacency lists that contain the adjacent location points for all location points require a large amount of computation to generate according to dataset size. In addition, this approach may generate movement paths with non-mobility data or long distances data that cannot be moved by humans depending on the density of the location points.
To solve this problem, we create clusters based on the set of location point in the Wi-Fi fingerprint data to separate indoor areas. The K-means clustering algorithm shown in Algorithm 2 computes the centroids of the set of clusters C for the location points of Wi-Fi fingerprint D. This study does not consider multistory buildings, so the centroid of each cluster c i stores the X-axis and Y-axis data. The centroids of cluster set C use the adjacency matrix:
A = a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 23 a 33 a 1 K a 2 K a 3 K a K 1 a K 2 a K 3 a KK
where a i j is computed as follows:
a i j = 1 ,   x i x j 2 + y i y j 2   d m a x 0 ,                                                                                         o t h e r w i s e   ,
where a i j stores the adjacency of c i and c j , coordinate x i ,   y i is centroid positions of c i , coordinate x j ,   y j is centroid positions of c j , and d m a x is the maximum distance. If the distance between c i and all the other clusters is larger than this distance, c i is merged with the nearest cluster.
The adjacency list a i = a i 1 ,   a i 2 ,   , a i K represents how a cluster can move from cluster c i . Because the cluster selected at the current time is affected by the cluster selected at the previous time, the clusters can be expressed as a Markov chain. The probability of transition between clusters is expressed by the state transition probability matrix P of the Markov chain as follows:
p i j = 1 k = 1 K a i k ,   a i k = 1 0 ,                     o t h e r w i s e
where p i j is the transition probability of moving from c i to c j . In this paper, we do not consider movement frequencies for the positioning environment, so the transition probability is equal for all clusters adjacent to c i . Algorithm 2 shows the proposed state transition matrix initialization algorithm for the clusters. The state transition matrix P for a cluster does not need to be changed unless the structure of the indoor environment changes.
Algorithm 2 Cluster State Transition Matrix Generation Algorithm
Input: C = = c 1 ,   c 2 ,   ,   c K /* set of cluster centroids */
    K /* number of clusters */
    d m a x /* distance limit */
Output: P = p 11 ,   ,   p K K /* set of cluster transition matrix */
for i 1 to K do
   c m i n i ;
   d m i n 0 ;
   f l a g f a l s e ;
  for j 1 to K do
     d distance c i ,   c j ;
    if i = j or d d m a x then
      a i j 1 ;
      f l a g t r u e ;
    else
      a i j 0 ;
     if c m i n = i or d m i n d then
       c m i n j ;
       d m i n d ;
     end
    end
   end
   if f l a g = f a l s e then
     j c m i n ;
     a i j 1 ;
  end
end
for i 1 to K do
   n e a r _ n u m j = 1 K a i j ;
  for j 1 to K do
   if a i j = 1 then
     p i j 1 n e a r _ n u m ;
   else
     p i j 0 ;
   end
end
end

3.2. Generation of Movement Path Data Using Clustered Fingerprint Data

This section proposes a method for creating movement path data using cluster labels L and cluster transition matrix P of the data calculated by Algorithms 1 and 2. This paper does not consider indoor structures and does not specify start and end clusters. For this reason, the path is created by traversing clusters according to the path length p a t h m a x from a randomly chosen cluster [18]. The movement path randomly extracts one data point in the current cluster to generate input data and uses the location point of the last visited cluster as a label. Because the input size of the learning model is proportional to p a t h m a x , not only does the amount of computation increase, but so does the amount of old data that is not needed to predict the current location. Hence, p a t h m a x considers a time interval over which the RSSI and device performance is collected. The generated movement path data consists of RSSI data for each AP over time, so a long short-term memory (LSTM) layer for time-based data can be used, as shown in Figure 1.
The size of the input layer in Algorithm 1 is the number of APs in the Wi-Fi fingerprinting system multiplied by p a t h m a x . The learning model predicts the location using the last result of the LSTM layer as an input to the fully connected layer. Algorithm 3 shows the movement path data generation algorithm proposed in this paper. The algorithm input consists of dataset D and cluster labels L of the data. The Wi-Fi fingerprint training and testing sets are input separately. If the amount of data in the Wi-Fi fingerprint is small, there is a high probability that duplicate data will be generated. Therefore, an appropriate value for m should be used.
Algorithm 3 Movement Path Generation Algorithm
Input:  D = d 1 ,   d 2 ,   ,   d n /* set of data to be clustered */
     L = l d i d = 1 ,   ,   n /* set of cluster labels of D */
     P = p 11 ,   ,   p KK /* set of cluster transition matrix */
     path max /* maximum path length */
     m /* number of data to generate */
     K /* number of clusters */
     d max /* distance limit */
Output:   T = t 1 ,   ,   t m /* set of sequential location data */
for   iter 1 to m do
   i k 1 ,   2 , ,   K ;
   t iter d i D for all   l d i = i ;
for   path 2 to path max do
    i k { 1 ,   2 , ,   K | p i } ;
    t iter concat ( t iter ,   d i D   for   all   l   d i = i ) ;
  end
end

4. Experiment

4.1. Experimental Environment

We use a published Wi-Fi fingerprint dataset to compare the performance of the proposed method with existing methods. The dataset consists of RSSI fingerprint collected from 21 devices installed at the Tampere University of Technology (TUT) in Finland [19]. As shown in Table 1, the number of training data in the TUT dataset is smaller than the number of test data. The training and test sets of the TUT dataset were exchanged to increase the amount of training data. In addition, this study does not consider multistory buildings, so only the ground floor data in the TUT dataset were used.

4.2. Experimental Scenario

The experiment compares the positioning performance of the proposed method and that of the existing methods 3-Layer DNN, P-DNN [4], DNN-DLB [20], 2D-CNN-DLB [20], RSS clustering [21], and 3D clustering [21]. The existing methods determine the position using the Wi-Fi fingerprint inputs. The proposed method determines the position using movement path data generated from the Wi-Fi fingerprints. K-means clustering was used to create clusters from the training and test sets of the TUT dataset. The state transition matrix initialization algorithm was used to create the state transition probability of the clusters, and the movement path data generation algorithm was used to generate the movement path data for learning and testing with state transition probabilities, training set, and test set.
The architecture of a layer of the RNN model used in the proposed technique is shown in Figure 2 for p = 5. The input layer was set to 992 × p a t h m a x and the output layer was used to regress the positioning coordinates X and Y.
The hyperparameters of the K-means clustering and path data generation method are shown in Table 2. A Bayesian optimizer was used to optimize hyperparameters [22]. This study used the search range listed in Table 3 to find the optimal hyperparameter settings.

4.3. Experimental Results

Figure 3 shows the results of applying the location points of the TUT Wi-Fi fingerprint dataset to the K-means clustering of Algorithm 1. In Figure 3, the X marks the center of the cluster and the other symbols indicate the location of data point. To distinguish the cluster to which the data point belongs, when marking the data point, the symbol (e.g., triangle, plus signal, circle, etc.) and color are expressed differently. The sum of the distances between the centers of the clusters and the observation points averages 438.36 m, with a minimum distance of 52.66 m and a maximum distance of 972.19 m.
Figure 4 shows the result of generating a neighbor list between midpoints of a cluster. The cluster on the right side of the figure is connected to the nearest cluster because the distance to all clusters is greater than the distance limit. This paper does not consider the building structure, however it can generate a neighbor list similar to that of the TUT dataset.
Table 4 shows the mean error of each method for the TUT dataset. The results show that proposed method yields the lowest average error. The movement path data includes various paths to reach the same position. Therefore, it can be concluded that the positioning is accurate because the previous RSSI influences the current RSSI.

5. Conclusions

In this paper, we proposed a method to generate movement path data based on information gathered from Wi-Fi RSSI. This data is used as input data for an RNN model to reduce the position error of an indoor positioning system. The method used to generate movement path data is based on K-means clustering and Markov chains. Since the Wi-Fi fingerprint dataset did not include time information, we had to use a single set of RSSIs as input for machine learning. To solve this problem, we divided the location points of the Wi-Fi fingerprinting area into clusters and created movement paths for discrete time steps based on a Markov chain. The experimental results of the proposed technique on the TUT dataset yielded an average error of about 4.9 m, which is lower than that of other existing methods.
The proposed method generated data through a random walk without considering a multi-level indoor structure. This approach can generate a movement path for an open indoor space, but it cannot generate movement paths for a unidirectional movement space (e.g., a museum or aquarium).

Author Contributions

Conceptualization, H.-G.S., Y.-H.C., and C.-P.Y.; methodology, H.-G.S., Y.-H.C., and C.-P.Y.; software, H.-G.S.; validation, H.-G.S., Y.-H.C., and C.-P.Y.; formal analysis, H.-G.S. and C.-P.Y.; investigation, H.-G.S.; resources, H.-G.S.; data curation, H.-G.S.; writing—original draft preparation, H.-G.S.; writing—review and editing, Y.-H.C. and C.-P.Y.; visualization, H.-G.S., Y.-H.C., and C.-P.Y.; supervision, Y.-H.C. and C.-P.Y.; project administration, Y.-H.C. and C.-P.Y.; funding acquisition, Y.-H.C. All authors have read and agreed to the published version of the manuscript.

Funding

The present Research has been conducted by the Research Grant of Kwangwoon University in 2020.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the authors.

Acknowledgments

The work reported in this paper was conducted during the sabbatical year of Kwangwoon University in 2019.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Feng, C.; Au, W.S.A.; Valaee, S.; Tan, Z. Received-signal-strength-based indoor positioning using compressive sensing. IEEE Trans. Mob. Comput. 2011, 11, 1983–1993. [Google Scholar] [CrossRef]
  2. Sahar, A.; Han, D. An LSTM-based indoor positioning method using Wi-Fi signals. In Proceedings of ACM International Conference on Vision, Image and Signal Processing (ICVISP); ACM: Las Vegas, NV, USA, 2018. [Google Scholar]
  3. Shrestha, S.; Talvitie, J.; Lohan, E.S. Deconvolution-based indoor localization with WLAN signals and unknown access point locations. In Proceedings of the International Conference on Localization and GNSS (ICL-GNSS), Turin, Italy, 25–27 June 2013. [Google Scholar]
  4. Park, C.U.; Shin, H.-G.; Choi, Y.-H. A parallel artificial neural network learning scheme based on radio wave fingerprint for indoor localization. In Proceedings of the 10th International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 3–6 July 2018. [Google Scholar]
  5. Tian, Z.; Tang, X.; Zhou, M.; Tan, Z. Fingerprint indoor positioning algorithm based on affinity propagation clustering. EURASIP J. Wirel. Commun. Netw. 2013, 2013, 1–8. [Google Scholar] [CrossRef] [Green Version]
  6. Zhang, W.; Liu, K.; Zhang, W.; Zhang, Y.; Gu, J. Wi-Fi positioning based on deep learning. In Proceedings of the IEEE International Conference on Information and Automation (ICIA), Hailar, China, 28–30 July 2014; pp. 1176–1179. [Google Scholar]
  7. Jarawan, T.; Kamsing, P.; Tortceka, P.; Manuthasna, S.; Hematulin, W.; Chooraks, T.; Phisannupawong, T.; Sanzkarak, S.; Munakhud, S.; Somjit, T. Wi-Fi Received Signal Strength-based Indoor Localization System Using K-Nearest Neighbors fingerprint integrated D*algorithm. In Proceedings of the 23rd International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea, 7–10 February 2021; pp. 242–247. [Google Scholar]
  8. Wang, G.; Abbasi, A.; Liu, H. WiFi-based Environment Adaptive Positioning with Transferable Fingerprint Features. In Proceedings of the IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), Virtual Conference, 27–30 January 2021; pp. 123–128. [Google Scholar]
  9. Gao, K.; Wang, H.; Nazarko, J.; Chobanov, G. Indoor Trajectory Prediction Algorithm Based on Communication Analysis of Built-In Sensors in Mobile Terminals. IEEE Sens. J. 2021, 1–8. [Google Scholar] [CrossRef]
  10. Wang, P.; Koike-Akino, T.; Orlik, P. Fingerprinting-Based Indoor Localization with Commercial MMWave WiFi: NLOS Propagation. In Proceedings of the IEEE Global Communications Conference 2020 (IEEE Globecom 2020), Taipei, Taiwan, 7–11 December 2020. [Google Scholar]
  11. Echizenya, K.; Kondo, K.; Kitagawa, T. Evaluation of the real-time indoor location and motion direction estimation system applying DNN to RSSI Fingerprints of BLE beacons. In Proceedings of the IEEE 9th Global Conference on Consumer Electronics (GCCE), Kobe, Japan, 13–16 October 2020. [Google Scholar]
  12. Gu, Y.; Zhou, C.; Wieser, A.; Zhou, Z. Trajectory Estimation and Crowdsourced Radio Map Establishment from Foot-Mounted IMUs, Wi-Fi Fingerprints, and GPS Positions. IEEE Sens. J. 2019, 19, 1104–1113. [Google Scholar] [CrossRef]
  13. Khassanov, Y.; Nurpeiissov, M.; Sarkytbayev, A.; Kuzdeuov, A.; Varol, H. Finer-level Sequential WiFi-based Indoor Localization. In Proceedings of the 2021 IEEE/SICE International Symposium on System Integration (SII), Iwaki, Fukushima, Japan, 11–14 January 2021; pp. 163–169. [Google Scholar]
  14. Chung, J.; Gulcehre, C.; Cho, K.; Bengio, Y. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling. arXiv 2014, arXiv:1412.3555. [Google Scholar]
  15. Gers, F.A.; Schmidhuber, J.; Cummins, F. Learning to forget: Continual prediction with LSTM. In Proceedings of International Conference on Artificial Neural Networks (ICANN); IET: Edinburgh, UK, 1999. [Google Scholar]
  16. Mikolov, T.; Karafiat, M.; Burget, L.; Cernocky, J.; Khudanpur, S. Recurrent neural network-based language model. In Proceedings of Annual Conference of the International Speech Communication Association (INTERSPEECH 2010); International Speech Communication Association; International Speech Communication Association: Chiba, Japan, 2010. [Google Scholar]
  17. Arthur, D.; Vassilvitskii, S. K-means++: The advantages of careful seeding. In Proceedings of the 18th Annual ACM-SIAM Symposium on Discrete Algorithms; ACM: New Orleans, LA, USA, 2007. [Google Scholar]
  18. Spitzer, F. Principles of Random Walk; Springer Science & Business Media: New York City, NY, USA, 2013. [Google Scholar]
  19. Lohan, E.; Torres-Sospedra, J.; Leppäkoski, H.; Richter, P.; Peng, Z.; Huerta, J. Wi-Fi Crowdsourced Fingerprinting Dataset for Indoor Positioning. Data 2017, 2, 32. [Google Scholar] [CrossRef] [Green Version]
  20. Laska, M.; Blankenbach, J. DeepLocBox: Reliable Fingerprinting-Based Indoor Area Localization. Sensors 2021, 21, 2000. [Google Scholar] [CrossRef] [PubMed]
  21. Cramariuc, A.; Huttunen, H.; Lohan, E.S. Clustering benefits in mobile-centric WiFi positioning in multi-floor buildings. In Proceedings of the International Conference on Localization and GNSS (ICL-GNSS), Barcelona, Spain, 28–30 June 2016. [Google Scholar]
  22. Snoek, J.; Larochelle, H.; Adams, R.P. Practical Bayesian Optimization of Machine Learning Algorithms. In Proceedings of the 25th International Conference on Neural Information Processing Systems-Volume 2; Curran Associates Inc.: Lake Tahoe, NV, USA, 2012. [Google Scholar]
Figure 1. Architecture of the proposed neural network for movement path data.
Figure 1. Architecture of the proposed neural network for movement path data.
Sensors 21 02823 g001
Figure 2. Proposed deep learning layer at p = 5
Figure 2. Proposed deep learning layer at p = 5
Sensors 21 02823 g002
Figure 3. K-means clustering result on TUT Wi-Fi fingerprint dataset (K = 50).
Figure 3. K-means clustering result on TUT Wi-Fi fingerprint dataset (K = 50).
Sensors 21 02823 g003
Figure 4. Result of creating neighbor list of clusters   d m a x = 15
Figure 4. Result of creating neighbor list of clusters   d m a x = 15
Sensors 21 02823 g004
Table 1. TUT Wi-Fi fingerprint dataset about ground floor.
Table 1. TUT Wi-Fi fingerprint dataset about ground floor.
NameValue
Area size 108   m   × 208   m
Number of training data697
Number of test data3951
Number of APs992
Table 2. Hyperparameters for movement path data generation.
Table 2. Hyperparameters for movement path data generation.
HyperparameterValue
Number of clusters k50
Maximum number of iterations M1000
Distance limit d m a x 15m
Path p5
Number   of   generated   training   data   m t r a i n 20,000
Number   of   generated   test   data   m t e s t 5000
Table 3. Search ranges for hyperparameter optimization.
Table 3. Search ranges for hyperparameter optimization.
HyperparameterValue
Minibatch size50 (fixed)
Learning rate0.001—0.05
Dropout0.5—1
Number of stacked LSTMs2—7
Number of LSTM hidden cells100—Input size × 2
Number of epochs20—1000
Table 4. Mean error of positioning algorithms on the TUT dataset.
Table 4. Mean error of positioning algorithms on the TUT dataset.
AlgorithmMean Error [m]
2-Layer LSTM with movement path data (proposed)4.91
DNN-DLB [20]5.33
3-Layer DNN5.73
Data Augmented 5-Layer P-DNN [4]6.94
2D-CNN-DLB [20]7.08
RSS clustering (affinity propagation) [21]8.08
3D clustering (K-means) [21]14.80
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shin, H.-G.; Choi, Y.-H.; Yoon, C.-P. Movement Path Data Generation from Wi-Fi Fingerprints for Recurrent Neural Networks. Sensors 2021, 21, 2823. https://doi.org/10.3390/s21082823

AMA Style

Shin H-G, Choi Y-H, Yoon C-P. Movement Path Data Generation from Wi-Fi Fingerprints for Recurrent Neural Networks. Sensors. 2021; 21(8):2823. https://doi.org/10.3390/s21082823

Chicago/Turabian Style

Shin, Hong-Gi, Yong-Hoon Choi, and Chang-Pyo Yoon. 2021. "Movement Path Data Generation from Wi-Fi Fingerprints for Recurrent Neural Networks" Sensors 21, no. 8: 2823. https://doi.org/10.3390/s21082823

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop