1 An Algorithmic and Systematic Approach for Improving Robustness of TOA-based Localization Yongcai Wang, Lei Song Institute for Interdisciplinary Information.

Slides:



Advertisements
Similar presentations
An Interactive-Voting Based Map Matching Algorithm
Advertisements

Using Cramer-Rao-Lower-Bound to Reduce Complexity of Localization in Wireless Sensor Networks Dominik Lieckfeldt, Dirk Timmermann Department of Computer.
Adaptive Accurate Indoor-Localization Using Passive RFID Xi Chen, Lei Xie, Chuyu Wang, Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing.
Random Forest Predrag Radenković 3237/10
Chunyi Peng, Guobin Shen, Yongguang Zhang, Yanlin Li, Kun Tan BeepBeep: A High Accuracy Acoustic Ranging System using COTS Mobile Devices.
Probabilistic Roadmaps. The complexity of the robot’s free space is overwhelming.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Tian Honeywell ACS Fellows Symposium Event-Driven Localization Techniques Tian He Department of Computer Science and Engineering University of Minnesota.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
More on Clustering Hierarchical Clustering to be discussed in Clustering Part2 DBSCAN will be used in programming project.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
Robust Global Registration Natasha Gelfand Niloy Mitra Leonidas Guibas Helmut Pottmann.
Doorjamb: Unobtrusive Room-level Tracking of People in Homes using Doorway Sensors Timothy W. Hnat, Erin Griffiths, Ray Dawson, Kamin Whitehouse U of Virginia.
Object Recognition using Invariant Local Features Applications l Mobile robots, driver assistance l Cell phone location or object recognition l Panoramas,
Adapting the Ranging Algorithm to the Positioning Technique in UWB Sensor Networks Mats Rydström, Erik G. Ström and Arne Svensson Dept. Signals and Systems.
Multiple People Detection and Tracking with Occlusion Presenter: Feifei Huo Supervisor: Dr. Emile A. Hendriks Dr. A. H. J. Stijn Oomes Information and.
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
© University of Minnesota Data Mining for the Discovery of Ocean Climate Indices 1 CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance.
HCS Clustering Algorithm
A Study of Approaches for Object Recognition
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 16th Lecture Christian Schindelhauer.
I Am the Antenna: Accurate Outdoor AP Location using Smartphones
Presented by Ozgur D. Sahin. Outline Introduction Neighborhood Functions ANF Algorithm Modifications Experimental Results Data Mining using ANF Conclusions.
Efficient Estimation of Emission Probabilities in profile HMM By Virpi Ahola et al Reviewed By Alok Datar.
1 Localization Technologies for Sensor Networks Craig Gotsman, Technion/Harvard Collaboration with: Yehuda Koren, AT&T Labs.
TPS: A Time-Based Positioning Scheme for outdoor Wireless Sensor Networks Authors: Xiuzhen Cheng, Andrew Thaeler, Guoliang Xue, Dechang Chen From IEEE.
RFID Object Localization Gabriel Robins and Kirti Chawla Department of Computer Science University of Virginia
Pipelined Two Step Iterative Matching Algorithms for CIOQ Crossbar Switches Deng Pan and Yuanyuan Yang State University of New York, Stony Brook.
I AM THE ANTENNA: ACCURATE OUTDOOR AP LOCATION USING SMARTPHONES ZENGBIN ZHANG, XIA ZHOU, WEILE ZHANG, YUANYANG ZHANG GANG WANG, BEN Y. ZHAO, HAITAO ZHENG.
Gwangju Institute of Science and Technology Intelligent Design and Graphics Laboratory Multi-scale tensor voting for feature extraction from unstructured.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Christian Le, Intel (Rahul Khanna, Intel and Huaping Liu, OSU)
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 3.
BY  INTRODUCTION  NEED FOR MOBILE TRACKING  EXISTING TECHNOLOGIES & CONSTRAINTS  LOCATION TRACKING CURVE METHOD  CONCLUSION.
Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System Yang Chen 1, Xiao Wang 1, Xiaoxiao Song 1, Eng Keong Lua 2, Cong Shi.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
Localization using DOT3 Wireless Sensors Design & Implementation Motivation Wireless sensors can be used for locating objects: − Previous works used GPS,
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors Weikuan Yu Dept. of Computer and Info. Sci. The Ohio State University.
Assist. Prof. Peerapong Uthansakul, Ph.D. School of Telecommunication Engineering Suranaree University of Technology.
1 Robust Statistical Methods for Securing Wireless Localization in Sensor Networks (IPSN ’05) Zang Li, Wade Trappe Yanyong Zhang, Badri Nath Rutgers University.
A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking Liqiang Zhang, Member, IEEE, Qiang Cheng, Member, IEEE, Yingge Wang, and.
Museum and Institute of Zoology PAS Warsaw Magdalena Żytomska Berlin, 6th September 2007.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Localization and Secure Localization. Learning Objectives Understand why WSNs need localization protocols Understand localization protocols in WSNs Understand.
Proximity Based Access Control for Smart- Emergency Departments * Sandeep Gupta*, T. Mukherjee*, K. Venkatasubramanian* and T. Taylor + *Department of.
Robust data filtering in wind power systems
J. Hwang, T. He, Y. Kim Presented by Shan Gao. Introduction  Target the scenarios where attackers announce phantom nodes.  Phantom node  Fake their.
ERROR DETECTING AND CORRECTING CODES -BY R.W. HAMMING PRESENTED BY- BALAKRISHNA DHARMANA.
Bundle Adjustment A Modern Synthesis Bill Triggs, Philip McLauchlan, Richard Hartley and Andrew Fitzgibbon Presentation by Marios Xanthidis 5 th of No.
Course14 Dynamic Vision. Biological vision can cope with changing world Moving and changing objects Change illumination Change View-point.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
I Am the Antenna Accurate Outdoor AP Location Using Smartphones Zengbin Zhang†, Xia Zhou†, Weile Zhang†§, Yuanyang Zhang†, Gang Wang†, Ben Y. Zhao† and.
SketchVisor: Robust Network Measurement for Software Packet Processing
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors
Indoor Navigation Using a Wireless Sensor Network
A Methodology for Finding Bad Data
Presented by Prashant Duhoon
Adaptation Behavior of Pipelined Adaptive Filters
Combating Tag Cloning with COTS RFID Devices
Fast Localization for Emergency Monitoring and Rescue in Disaster Scenarios Based on WSN SPEAKER:Jyun-Ying Yu ADVISOR:DR. Kai-Wei Ke DATE:2018/05/04.
Royal Institute of Technology Dept. of Signals, Sensors and Systems
Wireless Mesh Networks
Wireless Sensor Networks and Internet of Things
Mobile-Assisted Localization in Sensor Network
RFID Object Localization
QGesture: Quantifying Gesture Distance and Direction with WiFi Signals
Presentation transcript:

1 An Algorithmic and Systematic Approach for Improving Robustness of TOA-based Localization Yongcai Wang, Lei Song Institute for Interdisciplinary Information Sciences (IIIS), Tsinghua University, Beijing, China in EUC2013, Nov.13, 2013

2 Positioning by Time of Arrival (TOA) of ultrasound Advantages:  Accurate: Centi-meter level positioning accuracy  Safe: user-imperceptible  Low cost: US transducers are cheap (around 10 RMBs). Context ultrasoundRF TOA1 0 t ultrasoundRF TOA3 0 t ultrasoundRF TOA2 0 t

3 Challenges : Sensitive to Environment Challenge 1: Non-Line-of-Sight Impacts 1.Non-Line-of-Sight (NLOS) paths, caused by furniture, doors, moving people may lead to large positioning error.  NLOS is generally inevitable

4 Challenges (2): Miss of Synchronization 2.Background RF signal from WiFi, microwave oven, etc may collide the synchronization RF signal, leading to positioning error. T1T1 T2T2 TOA 1 TOA 2 Interference from background RF is also inevitable R1R1 R2R2

5 Our Work We show NLOS outlier detection problem is NP-hard. We developed COFFEE, an iterative clustering, voting and filtering algorithm to detect NLOS distances. First-Falling-Edge robust time synchronization A prototype of Dragon system which implements COFFEE and First-Falling-Edge time synchronization.

6 1. NLOS Outlier Detection Problem N beacons with known coordinates N beacons take N distance measurements: m of the distances are NLOS outliers: m<N/2 NLOS detection Problem: To detect the m outliers among the N distances.

7 Conventional Approach: 1. Geometrical method Outlier detection by Triangular Inequality [zhao2008]. Graph embeddability and rigidity. [Jian 2010]  High computation cost.  May fail to detect outlier when normal ranging distances have noises. Coarse-grained, may fail to detect the outlier

8 Conventional Approaches 2: Least Trimmed Square Method [Pireto2009] is a subset of distance measurements Enumerate D s to find the set with the minimum positioning residue. N distances can generate at most O(2 N ) subsets. Searching all sets needs high computation cost Problem: Method:

9 Our Approach: Clustering and Filtering (COFFEE)  Distance measurements Assign doubting weight Potential positions Density-based clustering Core cluster Position outlier Filter outlier distance Delete outlier positions COFFEE: Conduct clustering and filtering iteratively on the bipartite graph

10 N=15 m=3 N=15 m=3

11 Algorithm Properties Convergence speed  Detect m distance outliers in m iterations. Complexity  N 4 logN

12 COFFEE performs best in positioning accuracy improvement Coffee provides the best accuracy

13 COFFEE is Robust to the number of the distance outliers  Positioning error of COFFEE is small until m=8

14 2. First-Falling-Edge Time Synchronization A hardware type design  Using a sync-line to connect all the receivers (beacons) All receivers can be synchronized only if one receiver detects the synchronization RF signal.

15 Robust Synchronization By First-Falling-Edge When probability of missing RF signal is 1% It helps more receivers to provide correct ranging, which improves the positioning accuracy.

16 3. Prototype System (Dragon)

17 Deployment of Dragon System

18 Experiment Results Without sync-lineWith sync-line Positioning failure probability

19 Indoor Positioning Error

20 Reason of Positioning Error in Dragon The ranging error caused by angle

21 Conclusion We proposed COFFEE, an efficient clustering and filtering algorithm for NLOS outlier detection.  Accurate  Low complexity  Robust to the number of distance outliers. First-Falling-Edge time synchronization improves the time synchronization probability effectively. We developed a prototype of Dragon system, which verified the effectiveness of above designs.

22 Thanks a lot For your patience Visit my homepage for further information