• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Yongle, Zhu Hongsong, Sun Limin. A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow[J]. Journal of Computer Research and Development, 2013, 50(3): 524-531.
Citation: Chen Yongle, Zhu Hongsong, Sun Limin. A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow[J]. Journal of Computer Research and Development, 2013, 50(3): 524-531.

A Line of Sight Fingerprint Localization Algorithm Resisting Multipath and Shadow

More Information
  • Published Date: March 14, 2013
  • Indoor localization utilizing wireless technology is becoming an eager interest of research community in recent years. To provide location aware service, obtaining the position of a user accurately is important. The fingerprint localization based on received signal strength (RSS), is a radio map of the area by measuring the power present in a received radio signal, which don’t require the additional hardware cost. However, utilizing RSS for localization has a number of limitations. For example, the fingerprint localization algorithm generally faces the multipath and shadow interference caused by the physical blocking in the practical application. This paper analyzes how the physical blocking to change the signal strength in fingerprint algorithm, and finds that the line of sight(LoS) fingerprint instead of the original fingerprint can avoid the emergency of shadow and reduce the multipath influence. Based on above analysis, we propose a line of sight fingerprint-based localization algorithm (LoSF). Since the line of sight fingerprint has the abnormal values, we design an error processing algorithm to eliminate errors in the fingerprint data. Compared with the existing algorithms, the performance of LoSF algorithm achieves a median error of 2m, much less than the 6m of RADAR algorithm based on the original fingerprint, and less than the half of the COMPASS algorithm with 4.2m precision.
  • Related Articles

    [1]Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware[J]. Journal of Computer Research and Development, 2025, 62(3): 808-819. DOI: 10.7544/issn1000-1239.202330815
    [2]Wang Pan, Yang Pingli, Huang Shaohua, Lin Chengdi, Kong Longxing. A Direct Send Image Compositing Algorithm with Minimal Communication Costs[J]. Journal of Computer Research and Development, 2018, 55(4): 885-892. DOI: 10.7544/issn1000-1239.2018.20160875
    [3]Zhou Yuhang, Zhou Zhihua. Cost-Sensitive Large Margin Distribution Machine[J]. Journal of Computer Research and Development, 2016, 53(9): 1964-1970. DOI: 10.7544/issn1000-1239.2016.20150436
    [4]Liu Yue, Li Jintao, Hu Songlin. A Cost-Based Splitting Policy Search Algorithm for Hive Multi-Dimensional Index[J]. Journal of Computer Research and Development, 2016, 53(4): 798-810. DOI: 10.7544/issn1000-1239.2016.20151163
    [5]Guo He, Chen Zheng, Yu Yulong, Wang Yuxin, Chen Xin. A Communication Aware DAG Workflow Cost Optimization Model and Algorithm[J]. Journal of Computer Research and Development, 2015, 52(6): 1400-1408. DOI: 10.7544/issn1000-1239.2015.20140205
    [6]Zong Ming, Wang Xiaodong, and Zhou Xingming. Cost-Optimizing Adaptive Location Service Protocol in MANET[J]. Journal of Computer Research and Development, 2012, 49(12): 2515-2528.
    [7]Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, Liao Zhen. Cost-Sensitive Listwise Ranking Approach[J]. Journal of Computer Research and Development, 2012, 49(8): 1738-1746.
    [8]Liu Cancan, Zhang Weimin, Luo Zhigang, and Ren Kaijun. Temporal Consistency Based Heuristics for Cost Optimization in Workflow Scheduling[J]. Journal of Computer Research and Development, 2012, 49(6): 1323-1331.
    [9]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [10]He Xiaoyang and Wang Yasha. Model-Based Methods for Software Cost Estimation[J]. Journal of Computer Research and Development, 2006, 43(5): 777-783.

Catalog

    Article views (634) PDF downloads (553) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return