handbook of position location (theory, practice, and advances) || rf fingerprinting location...

9
NEOFORMED PHYSILS IN ORDOVICIAN OOIDS l CHARLES E. WEAVER School of Earth and Atmospheric Sciences Georgia Institute of Technology Atlanta, Georgia 30332 Aas'raAcr: The Middle Ordovician Ottosee Formation of eastern Tennessee consists of a thick wedge ofcalcareous shale containing isolated lenses of oolitic limestone. The individual ooids contain authigenic/diagenetic Fe-chlonte (30% FeO) growing between sub- rhombic calcite grains and forming Fe-chlorite molds. Fe-chlorite is not present in the cement. Where present in low concentrations, it occurs in both concentric and radial patterns. The concentration of Fe-chlorite increases as stylolites are approached, particularly the l- to 10-mm thick (width of non-carbonate layers) bed-parallel stylolites. The Fe-chlorite can form cardhouse spheres and compose up to 9% of a calcite ooid. The styiolites and the surrounding shale contain appreciable illite and I/S (9:1). Strings of partially dissolved half-moon ooids, consisting largely of Fe-dolomite and Fe-chlorlte, form pseudo-stylolites. The Fe-chlorlte and Fe-dolomite were early ore-cement phases deposited under reducing conditions. The Mg was supplied by Mg-calcite; the Fe was probably transported as Fe-organic complexes in the interstitial waters from the surrounding shales. During the later stages, transport was via the stylolites. A1, Si, and K were obtained from detfital illite-I/S, probably bound to the ooids by algal mucilage or humic substances. The Fe-chiorite presumably crystallized with the lower temperature Ib structure and was later transformed to the IIb structure at a burial temperature between 150-200°C. INTRODUCTION Authigenic/diagenetic physils are extensively and strik- ingly well developed in sandstones (for review see Weaver 1989) and we now know they can also be well developed in some limestones. The petrography ofphysils (phyllosil- icates with no size connotation, Weaver 1980) in car- bonate rocks has been neglected. Most studies of physils in carbonate rocks consist of x-ray analyses of the clay fraction of the acid insoluble residue, largely assumed to be detrital. A systematic SEM study of physils in car- bonate rocks from over a dozen formations showed that neoformed physils are beautifully developed in the mi- cropores of calcite ooids, pellets, bioclasts, algal mats, grain boundary voids and coating dolomite rhombs. Among the authigenic/diagenetic physils identified are Fe-chlorite, Mg-chlorite, corrensite, saponite, Ch/S, illite and I/S. This paper reports the results of a study of the neoformed Fe-chlorite in the micropores of ooids in a small oolite lens of Middle Ordovician age. With this paper I hope to demonstrate the potential importance of an overlooked aspect of carbonate petrology--the physils. GEOLOGIC SETTING The Middle Ordovician Ottosee Formation of eastern Tennessee is largely a calcareous mudstone and shale wedge, thickening from west to east, containing small isolated lenses of oolitic limestone and patch reefs. The oolite lenses are elongate parallel to the shelf-edge break and are believed to have been shoal deposits just bank- ward of the self-edge break, an environment similar to that in which the Bahama oolites are forming (Cantrell and Walker 1985). The oolite is composed largely of ooids with a lesser amount of fossils, quartz, and feldspar grains. The rocks are fully cemented and have little intergranular porosity. Cantrell and Walker (1984) use minor differences in grain composition to delineate three facies representing depo- t Manuscript received 5 July 1990; accepted 13 November 1990. sition in a mobile seaward environment, bankkward-sta- bilized environment, and cross-cutting tidal channels. Thickness values suggest the oolite lenses were buried to a maximum depth of around 4000 m. Samples were obtained from 7 areas, top to bottom, of an oolite lens approximately 10 m thick and 250 m wide along The Alcoa Highway, 15 km east of Knoxville, TN. Samples ofOttosee limy shale and a small patch reef were collected a few miles west of the oolite outcrop (Cantrell and Walker 1985; Walker 1980). COMPOSITION Residues were obtained using EDTA at pH 10. Samples from the lower half of the oolite lens contain from 2.1 to 5.7% noncarbonate material; samples from the upper half contain from 9.4 to 13.5%. Physils comprise between 30 and 60% of the residue. Quartz and minor K-feldspar are the other two main components. The bulk rocks are com- posed primarily of calcite and a trace to 10% of ferroan dolomite or ankerite (2.92/~); less than 5% detrital quartz is present. The dominant physil in all oolite samples is tnocta- hedral Fe-fich IIb chlorite with an (00 l) value of about 14.2 ~ (14.16) and an (060) of 1.544 Jt (S.W. Bailey, personal communication 1989). The (001) spacing sug- gests the chlorite contains 1.33 atoms of tetrahedral Al 3+. The odd order reflections (Fig. 1) are not as weak as those of typical chamosites (Odin 1988), and the (060) value indicates on FeO value of approximately 15% (Shirozu 1958). This is equivalent to 1.5 atoms of octahedral Fe E+ per 6.0 sites. However, EDX (Fig. 1) and electron probe analyses indicate the chlorite contains approximately 30% FeO, equivalent to approximately 3.0 atoms ofoctahedral Fe 2+, a typical value for chamosite and thuringite. Part of the discrepancy may be due to the presence of an appreciable amount of Fe203, probably due to weather- ing. The EDX spectra indicate that a minor amount of K is associated with most of the Fe-chlorite, presumably indicating the presence of some illite layers or packets intimately mixed with the chlorite. The only other physils JOURNAL OF SEDIMENTARYPETROLOGY,VOL. 62, NO. 1, JANUARY, 1992, P. 122-130 Copyright © 1992, SEPM (Society for Sedimentary Geology) 0022-4472/92/0062-122/$03.00

Upload: r-michael

Post on 11-Dec-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

487

CHAPTER 15

RF FINGERPRINTING LOCATION TECHNIQUES

Rafael Saraiva Campos and Lisandro Lovisolo Universidade do Estado do Rio de Janeiro, Rio de Janeiro, Brazil

IN THIS chapter, the principles of radio frequency ( RF ) fi ngerprinting

methods, also known as database correlation methods ( DCM s), are presented.

Although there is a wide variety of DCM implementations, they all share the

same basic elements. These elements are identifi ed and analyzed in this chapter.

Different alternatives for building RF fi ngerprint correlation database s ( CDB s) are

presented, and the advantages and drawbacks of each of them are discussed, as

well as their impact on the positioning accuracy of location services based on

DCM. Different methods to numerically evaluate the similarity between each

fi ngerprint within the CDB and the measured RF fi ngerprint are presented,

including an artifi cial neural network (ANN) - based approach. Two alternatives to

reduce the correlation or search space are analyzed, including an approach based

on genetic algorithms (GAs). Finally, fi eld tests are used to evaluate the

positioning accuracy of fi ngerprinting techniques in both Global System for

Mobile Communications ( GSM ) and Wi - Fi ( wireless fi delity ) 802.11b networks.

15.1 INTRODUCTION

RF fi ngerprinting location techniques are a class of mobile station ( MS ) positioning methods, which can be applied in any wireless network [1] . Even though there is a wide variety of fi ngerprinting location techniques, they all share the same basic elements:

Handbook of Position Location: Theory, Practice, and Advances, First Edition.Edited by Seyed A. (Reza) Zekavat and R. Michael Buehrer.© 2012 the Institute of Electrical and Electronics Engineers, Inc.Published 2012 by John Wiley & Sons, Inc.

c15.indd 487c15.indd 487 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 2: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

488 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

• RF Fingerprint . This is a set of location - dependent signal parameters, avail-able in the radio access network ( RAN ). These parameters are location depen-dent; therefore, each RF fi ngerprint is associated with a specifi c position. Note that the more signals that are observed or the more parameters per signal that are observed, the more unique the fi ngerprint and thus the better the location accuracy. If only RAN inherent parameters are included in the RF fi ngerprint, the fi ngerprinting location technique can be entirely network based, therefore not requiring any modifi cation to the existing MSs [2] . The RF fi ngerprint is defi ned in Section 15.2 .

• CDB . RF fi ngerprints are collected in fi eld tests or generated using simulation models, and are stored in a database called the CDB , which is directly acces-sible to the location server. Each RF fi ngerprint stored in the CDB is associated with a specifi c position. The CDB is defi ned in Section 15.3 .

• Location Server . This is the network element responsible for receiving loca-tion requests, consulting the CDB, and estimating the MS location.

• Reduction of the Search Space within the CDB . The CDB might be quite large, and analyzing all RF fi ngerprints stored in it might be very time - consuming. Therefore, all fi ngerprinting location techniques apply some method to reduce the search space within the CDB. As a consequence, the time required to produce a position fi x is also reduced. Two alternatives of such techniques are presented in Section 15.4 .

• Pattern Matching . In order to estimate the MS position, the location server must compare the RF fi ngerprint measured by the MS with a subset of the RF fi ngerprints stored in the CDB. This comparison or pattern matching might be done using different techniques, as discussed in Section 15.5 .

As discussed in Chapter 11 , any fi ngerprinting location technique has two phases. The fi rst is the training phase, when the CDB is built. The second is the test or operational phase, during which MS position estimates are produced [3] . Unlike direction of arrival ( DOA ), time of arrival ( TOA ), or time difference of arrival ( TDOA ), fi ngerprinting location techniques do not rely on line - of - sight ( LOS ) geometric assumptions [1] . TOA - and TDOA - based position location tech-niques are discussed in Chapter 6 . DOA estimation techniques are introduced in Chapter 9 . LOS/non - line - of - sight (NLOS) discrimination techniques are presented in Chapter 16 .

A simplifi ed diagram of a generic fi ngerprinting location solution is presented in Figure 15.1 . This diagram corresponds to an MS originated position request [4] . In step 1, the MS sends a position request to the location server through the RAN. In step 2, the RAN communicates with the location server, usually through a gateway . The location server receives the position request, together with the RF fi ngerprint measured by the MS. In step 3, the location server queries the CDB, obtaining in step 4 the RF fi ngerprints, which will be compared to the RF fi ngerprint measured by the MS. The location server then applies a location estimation or com-parison function to obtain the MS position estimate, which is sent back to the MS through the RAN in steps 5 and 6.

c15.indd 488c15.indd 488 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 3: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.2 RF FINGERPRINTS 489

15.2 RF FINGERPRINTS

An RF fi ngerprint is a set of location - dependent signal parameters measured by the MS or the anchor cells [1] . Just like a human fi ngerprint, which carries the unique identifi cation of a person, an RF fi ngerprint is expected to uniquely identify a geo-graphic position. In order to do so, the number of signal parameters in the RF fi n-gerprint must be high enough to allow for a unique correspondence with a given location. The selected signal parameters — or at least, their time averages — must have low variability in time at any given position. However, it is obvious that they will not be completely stable over time. Even though the use of mean values reduces small - scale variations, changes in the RAN — like the addition of new cells, changes in transmission or reception antennas, and changes in output power — might jeopar-dize the connection between a given RF fi ngerprint and a certain position. In such cases, it is necessary to obtain new RF fi ngerprints, using the methods described in Section 15.3.2 .

An RF fi ngerprint can be classifi ed as either a target or reference fi ngerprint. A target RF fi ngerprint is the RF fi ngerprint associated with the MS that is to be localized; that is, it contains signal parameters measured by the MS or by its anchor cells. The reference RF fi ngerprints are the RF fi ngerprints collected or generated during the training phase and stored in the CDB. Each reference RF fi ngerprint is associated with a unique set of geographic coordinates. Ideally, all the parameters used in the target fi ngerprint must be present in the reference fi ngerprint. The target RF fi ngerprint used in the remainder of this chapter is given by the N a × 3 matrix:

F =1 1 1ID RSS RTD

ID RSS RTD

� � �

N N Na a a

⎢⎢⎢

⎥⎥⎥, (15.1)

Figure 15.1 Schematic diagram of a fi ngerprinting location.

CDBLocation Server

MS

RAN

1

2

3

4

5

6

c15.indd 489c15.indd 489 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 4: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

490 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

where N a is the number of anchor cells within range of the MS; ID i and RSS i are the cell identity ( CID ) and the measured received signal strength ( RSS ) from the i th anchor, respectively. RTD i is the round trip delay ( RTD ) between the MS and the i th anchor cell. The rows are sorted in descending order of RSS, so RSS i ≥ RSS j , if i ≤ j . The RSS and RTD quantization steps and dynamic ranges, the maximum number of anchor cells, and the number of available RTD values are specifi c to each type of wireless network. In some networks, like GSM, the RTD value is available only for the best server [5] , which usually is the anchor cell with the highest RSS. In other networks, like Wi - Fi, there is no RTD value available at all [6] .

A wide variety of signal parameters can be selected to compose an RF fi nger-print: RSS [7] , RTD [8] , power delay profi le calculated using the channel impulse response [9] , DOA [10] , and so on. These parameters are measured from (or by) a number of anchor cells. The more anchors that can be measured, the more unique is the RF fi ngerprint. Ideally, the selected parameters should already be available in the network. The use of parameters ordinarily involved with call or session manage-ment prevents additional load at the RAN. Another benefi t of this approach is that no modifi cations — hardware or software — are required in the MS, therefore making it possible to locate any MS within the network coverage area. That is why the most frequently used parameters are the RSS and RTD, which are the parameters selected for the target and reference RF fi ngerprints used in this chapter. The MS periodically measures the control channel RSS of cells to allow for cell selection and handover. Those values are reported to the core network through special messages called network measurement report s ( NMR s). Only the RSS of channels transmitted with constant (or known) power should be inserted in an RF fi ngerprint [7] , so the control channel in cellular networks, which is transmitted by all cells and whose output power is constant (i.e., power control is not applied), is the most obvious choice. The RTD is periodically measured by either the MS or the anchor cells in networks using code division multiplexing ( CDM ) or time division multiplexing ( TDM ) in the physical layer.

15.3 CDB

The CDB is a collection of reference RF fi ngerprints. As previously stated, each reference RF fi ngerprint is associated with a unique set of geographic coordinates. The CDB is built during the training phase of the RF fi ngerprinting location algo-rithm [11] using radio propagation modeling, fi eld measurements, or a combination of both alternatives.

15.3.1 CDB Structure

Each CDB element contains a reference RF fi ngerprint and a unique set of geo-graphic coordinates. The planar — or spatial, for three - dimensional location — distribution of these coordinates within the service area defi nes the CDB structure. The service area is the region where a location service is to be offered. In the remain-der of this chapter, only two - dimensional location is used, but the extension to the three - dimensional case is straightforward.

c15.indd 490c15.indd 490 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 5: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.3 CDB 491

Uniform Grid: If the CDB is organized as a uniform grid , all the reference coor-dinates are evenly spaced in the plane. One RF fi ngerprint is associated with each reference coordinate. The distance between adjacent reference coordinates defi nes the uniform grid spacing or planar resolution. The planar resolution should be com-parable to the location method ’ s expected precision [1] . The effect of different values of planar resolution on the location precision of fi ngerprinting methods is analyzed in Section 15.6 . The uniform grid is the most suitable structure for CDBs built using propagation modeling and is presented in more detail in Section 15.3.2 .

Indexed List: If the CDB is organized as an indexed list , the reference coor-dinates ’ planar distribution does not follow any regular pattern. This structure is usually adopted for CDBs built using fi eld measurements [3] . For example, if the CDB is built using drive test measurement routes, the irregular pattern of the street grid might prevent obtaining evenly spaced reference fi ngerprints.

Each element in the list contains a reference RF fi ngerprint and a set of refer-ence geographic coordinates, obtained either by a global positioning system ( GPS ) receiver or directly from a map — this is usually the case for CDBs built from indoor measurements.

15.3.2 Building the CDB

The CDB stores the reference RF fi ngerprints collected during fi eld tests or gener-ated with propagation models. The CDB is built during the training phase of the RF fi ngerprinting location method. This section discusses the main alternatives to build the CDB, pointing out the main advantages and drawbacks of each technique.

Field Measurements: The CDB can be built entirely from fi eld measurements. This usually requires an MS, a software to collect and process radio interface mea-surements made by the MS, and a GPS receiver, in the case of outdoor measure-ments. The software might be running on a laptop or palmtop connected to the MS. Periodically, location - related parameters, like those listed in Equation 15.1 , are col-lected by the software and are stored for further processing. These parameters are either measured by the MS or the network. For each collected set of parameters, the ground truth position of the MS is registered by the GPS receiver connected to the laptop or palmtop. For indoor measurements, it might be necessary to use a map of the building layout and to register manually the MS reference position within the building. The MS reference coordinates and the measured location - dependent parameters compose an entry in the CDB, internally structured as an indexed list, as described in Section 15.3.1 .

The empirical CDB obtained by fi eld measurements usually provides the highest location accuracy. However, it has a major drawback, especially when used in metropolitan area networks ( MAN s). In those networks, to keep empirical CDBs up to date, drive tests must be carried out after any change in RAN elements. These changes — deployment of new cells; changes in antenna models, azimuth, and incli-nation; increase or decrease of transmit power; and so on — occur constantly, espe-cially in cellular networks, making this solution impractical for MANs. The detrimental effects due to the use of out - of - date network parameters in the pattern

c15.indd 491c15.indd 491 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 6: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

492 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

matching process in cellular networks have been evaluated in References 3 and 12 . However, for indoor RF fi ngerprinting location systems, using CDBs built from measurements might be a feasible option, if one considers the greater complexity of the indoor environment, which makes it diffi cult to accurately model RF propaga-tion, and the smaller area to be covered by the measurement campaign.

Propagation Modeling: The main advantage of using a CDB built from propa-gation modeling is to allow for easy, fast, and inexpensive CDB updating. Whenever there are changes in the RAN elements, it is necessary only to rerun the propagation models with the new RAN parameters to obtain an updated CDB. However, the achieved location precision might be lower than the one obtained with fi eld measure-ments. This degradation can be minimized by means of proper propagation model calibration [13] .

There is a wide variety of mathematical models for radio propagation predic-tion, but they can be roughly grouped in two main classes: deterministic and empiri-cal. Deterministic propagation models are based on ray tracing techniques. They describe the electromagnetic wave propagation using rays launched from the trans-mitting antenna. These rays are refl ected and diffracted at walls and other obstacles. Ray tracing models require a very accurate knowledge of the environment and have a high computational load, resulting in a long computation time for the coverage predictions [14] . Empirical propagation models are based on extensive fi eld mea-surements that, after statistical analysis, produce parametric path loss equations. Those parameters or coeffi cients can be adjusted, within some predetermined bounds, to better represent a particular propagation environment [15] . Empirical models are less computationally intensive and, even though they are usually less accurate than deterministic propagation models, they still provide an accuracy compatible with the average accuracy of most RF fi ngerprinting methods for outdoor positioning [8] [2] . Therefore, empirical models become the most suitable option to build a CDB with RF propagation modeling in outdoor environments.

The Okumura – Hata model [16] provides an empirical formula for propagation loss derived from extensive fi eld measurements in urban areas. This model is appli-cable to system designs for ultrahigh - frequency ( UHF ) and very high - frequency ( VHF ) under the following conditions: frequency range 100 – 1500 MHz, distance 1 – 20 km, base station antenna height 30 – 200 m, and MS antenna height 1 – 10 m. The Okumura – Hata model is widely used for RF planning in cellular networks.

The basic Okumura – Hata propagation loss formula does not explicitly take into account diffraction over terrain and buildings. In order to do so, the topography of the service area is represented by a matrix H , also referred to as a digital eleva-tion model ( DEM ) or a digital topographical database [17] . Each matrix element h i , j stores the terrain height averaged over a r H × r H m 2 surface and is referred to as a pixel . Parameter r H is the H matrix planar resolution. The H matrix might also contain, added to the terrain height, the building heights. If the region covers a total surface of l × w m 2 , then H has

l

r

w

rH H

⎡⎢⎢

⎤⎥⎥

× ⎡⎢⎢

⎤⎥⎥

( )elements pixels .

c15.indd 492c15.indd 492 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 7: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.3 CDB 493

To represent the service area surface as a plane, divided into evenly spaced pixels, it is necessary to apply a geographic coordinate system that uses a rectangular car-tographic projection. The Universal Transverse Mercator ( UTM ) [18] is an example of such a system. Assume that the UTM system is being used and that h 1,1 , the fi rst element of H , is placed at the northwest corner of the service area, as depicted in Figure 15.2 . If the UTM coordinates [ x 1 y 1 ] T of h 1,1 are known, then the coordinates of h i , j are given by

x

y

x r j

y r ij

i

H

H

⎡⎣⎢

⎤⎦⎥

=+ −( )− −( )

⎡⎣⎢

⎤⎦⎥

1

1

1

1, (15.2)

where

iw

rH

= … ⎡⎢⎢

⎤⎥⎥

1 2, , ,

and

jl

rH

= … ⎡⎢⎢

⎤⎥⎥

1 2, , , .

The terrain profi le — including the building heights, if available — between the k th cell and pixel ( i , j ) is read from the DEM. Figure 15.3 shows a terrain profi le and the boundary of the fi rst Fresnel zone [15] in the radio link.

After obtaining the terrain profi le, the diffraction losses must be calculated using a specifi c model, like Epstein – Peterson, Bullington, or Deygout [15] . The Okumura – Hata average propagation loss in dB between the k th cell in the service area and pixel ( i , j ), plus the additional diffraction loss u i , j , k , is given by

Figure 15.2 Service area surface represented as a matrix.

y

x

rH

rH

l

w

x1

y1

h1,1

hi,j

xj

yi

c15.indd 493c15.indd 493 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 8: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

494 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

L c c d c z c u c zi j k i j k k i j k k, , , , , ,log ( ) log ( ) log ( )= + + + +1 2 10 3 10 4 5 10 llog ( ),, ,10 di j k (15.3)

where z k is the k th cell antenna effective height [19] in meters and d i , j , k is the distance in meters between the k th cell antenna and pixel ( i , j ). The model coeffi cients ( c 1 , c 2 , c 3 , c 4 , and c 5 ) depend on the area morphology and transmission frequency. For a network using the 869 - to 881 - MHz band, like the one in Section 15.6.1 , the model is applied at the central frequency of 875 MHz. The coeffi cient values are c 1 = − 12.1, c 2 = − 44.9, c 3 = − 5.83, c 4 = 0.5, and c 5 = 6.55. All of these values are the standard Okumura – Hata values for urban environments except c 4 , which was empirically defi ned by the authors [7] .

The vertical ϕ and horizontal θ angles between the k th cell antenna and pixel ( i , j ) can be calculated using trigonometry, as the geographic coordinates in space — x , y , and z — of both the antenna and the pixel are known. The k th cell control channel transmission power is assumed to be known, as well as the connector and cable losses between the transmitter and the antenna. Therefore, with the antenna vertical and horizontal radiation patterns, it is possible to estimate the k th cell control channel effective isotropic radiated power ( EIRP ) in the direction of pixel ( i , j ). This direc-tion is defi ned by angles ϕ and θ . The reference k th cell control channel RSS in dBm at pixel ( i , j ) is given by

RSS EIRPi j k i j k i j kL, , , , , , ,= − (15.4)

where EIRP i , j , k is the k th cell control channel EIRP in the direction of pixel ( i , j ) and L i , j , k is the propagation loss between the k th cell and pixel ( i , j ), given by Equation 15.3 .

Considering the RF fi ngerprint described in Equation 15.1 , not only the RSS values but also the RTD values must be estimated. The reference RTD value between the k th cell and pixel ( i , j ) can be calculated by

RTDT

i j ki j k

s

d

c, ,

, , ,= ⎢⎣⎢

⎥⎦⎥

2 (15.5)

Figure 15.3 Terrain profi le with building heights.

60

50

40

30

20

100.1 0.2 0.4 0.6 0.8 1.0 1.2

c15.indd 494c15.indd 494 8/5/2011 3:35:59 PM8/5/2011 3:35:59 PM

Page 9: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.3 CDB 495

where c is the speed of light in free space in meters per second, T s is the symbol period in seconds, and d i , j , k is the distance in meters between the k th cell antenna and pixel ( i , j ). Equation 15.5 assumes LOS conditions between the transmitting antenna and the pixel, but this is hardly the case, especially in dense urban areas. To enhance the accuracy of the reference RTD value, the additional propagation delay due to NLOS conditions can be modeled as a random variable [8] .

The reference RF fi ngerprint at ( i , j ) is completed after RSS i , j , k and RTD i , j , k have been calculated for k = 1, 2, … , N i , j , where N i , j is the number of cells whose predicted RSS values are above the minimum threshold at pixel ( i , j ). Note that 1 ≤ N i , j ≤ N c , where N c is the total number of cells in the service area. The reference RF fi ngerprint at pixel ( i , j ) is represented by

Si j

i j i j i j

i j N i j N i ji j i j

,

, ,

, , ,

=ID RSS RTD

ID RSS RTD

1 , ,1 , ,1

, , ,,

� � �

,, ,Ni j

⎢⎢⎢

⎥⎥⎥, (15.6)

where ID i , j , k is the k th cell ID at pixel ( i , j ). The rows are classifi ed in descending order of RSS; that is, RSS RSSi j k i j k, , , ,′ ′′≥ , if k ′ ≤ k ″ .

The CDB is complete after S i , j has been calculated for all pixels in the service area, that is, for

iw

rH

= … ⎡⎢⎢

⎤⎥⎥

1 2, , ,

and

jl

rH

= … ⎡⎢⎢

⎤⎥⎥

1 2, , , .

The structure of the CDB thus obtained is a uniform grid, as defi ned in Section 15.3.1 .

The planar resolution of the CDB should be comparable to the location method expected precision [1] . So, if r H is much smaller than the expected location precision, the CDB grid can be subsampled [8] . The resulting matrix will have

l

r

w

rS S

⎡⎢⎢

⎤⎥⎥

× ⎡⎢⎢

⎤⎥⎥

elements,

where r S is the new planar resolution of the CDB. Figure 15.4 shows an example where r S = 2 r H . The new reference RF fi ngerprint ′S1 1, of the fi rst matrix element is obtained by averaging the original reference RF fi ngerprints S 1,1 , S 1,2 , S 2,1 , and S 2,2 . The process is repeated for all pixels. If the UTM coordinates [ x 1 y 1 ] T of ′S1 1, are known, then the coordinates of ′Si j, are given by

x

y

x r j

y r ij

i

S

S

⎡⎣⎢

⎤⎦⎥

=+ −( )− −( )

⎡⎣⎢

⎤⎦⎥

1

1

1

1, (15.7)

c15.indd 495c15.indd 495 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 10: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

496 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

where

iw

rS

= … ⎡⎢⎢

⎤⎥⎥

1 2, , ,

and

jl

rS

= … ⎡⎢⎢

⎤⎥⎥

1 2, , , .

If the CDB is built using propagation modeling, fi eld tests might be used for fi ne - tuning the empirical propagation models. This procedure is expected to enhance the location precision of an RF fi ngerprinting method using such CDB. Consider that a calibration route is carried out across the service area. At each measurement point, the RSS of each detected cell is collected. The GPS coordinates of the measurement points are also registered, allowing one to identify the CDB pixels where they are located, as shown in Figure 15.5 a. An average of each cell RSS must be calculated for all measurement points located at the same pixel. After that, the test route is complete and each measurement point is identifi ed by the 3 - uple ( i n , j n , M n ), as shown in Figure 15.5 b. The pair ( i n , j n ) identifi es the pixel where the n th measure-ment point is located. Note that 1 ≤ n ≤ N m , where N m is the number of measurement points in the calibration route. Matrix M n is the set of RSS measurements collected at the n th point and is given by

Mn

n n

n N n Nn n

=,1 ,1

, ,

ID RSS

ID RSS

� �⎡

⎢⎢⎢

⎥⎥⎥, (15.8)

Figure 15.4 CDB organized as a uniform grid with subsampling.

y

x

rH

l

w

S1,1

rS

rSS1,2

S2,1 S2,2

S'1,1

S1,1 S1,2

S2,1 S2,2

c15.indd 496c15.indd 496 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 11: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.3 CDB 497

where ID n , k and RSS n , k are the k th cell ID and RSS, respectively, at the the n th mea-surement point. Note that 1 ≤ k ≤ N n , where N n is the number of cells detected at the n th point and 1 ≤ N n ≤ N c . The rows are classifi ed in descending order of RSS, so RSS RSSn k n k, ,′ ′′≥ , if k ′ ≤ k ″ .

At the n th point in the calibration route, the difference between the predicted and measured RSS of the k th cell, is given by

b k kn k n i j, ,= ′( ) − ′ ′( )M S, 2 , 2′ (15.9)

for

M Sn i j kk k′( ) = ′ ′′( ) =,1 ,1, ID (15.10)

Figure 15.5 (a) Calibration route. (b) Calibration route after averaging.

y

xl

w

rS

rS

(i1, j1, M1)l

w

rS

rS

i

j1 2 3 4 5 l /rs

1

2

w/rs

(in, jn, Mn) (iNm, jNm, MNm)

(a)

(b)

c15.indd 497c15.indd 497 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 12: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

498 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

and

i j i jn n, , ,( ) = ( ) (15.11)

where ID k is the k th cell ID. Observe that k ′ is the index of the line in M n , whose cell ID (value in the fi rst column) is equal to the k th CID, that is, ID k . An analogous observation can be made regarding k ″ and ′Si j, . Note that 1 ≤ k ′ ≤ N n , 1 ≤ k ″ ≤ N i , j , 1 ≤ k ≤ N c , and 1 ≤ n ≤ N m .

Calculating b n , k for all points on the calibration route where the k th cell has been detected, one obtains a N m , k × 1 matrix B k . The parameter N m , k is the number of calibrating points where the k th cell was detected. Note that 1 ≤ N m , k ≤ N m .

The propagation model calibration is done on a per cell basis, defi ning a cali-bration factor C k that shall be added to the path loss, given by Equation 15.3 , between the k th cell and any pixel ( i , j ) in the service area. The C k factor minimizes the sum of the squared differences between the measured and predicted k th RSS values along the calibration route points where the k th cell was detected. The C k factor in decibel can be estimated using least squares ( LS ) [20] , as follows:

Ck k= ( )−V V V BT T1

, (15.12)

where V is a N m , k × 1 matrix of ones [21] .

Mixing Predicted and Measured Values: It is also possible to simultaneously use both predicted and measured reference fi ngerprints in the CDB. First, a CDB structured as a uniform grid is built using propagation models. Then, measurements are carried out to collect reference fi ngerprints. These measurement points might be isolated or located along drive test routes. At pixels where measurement points are available, the measured reference fi ngerprints replace the predicted fi ngerprints. To smooth discontinuities between measured and predicted RSS values, some form of interpolation might be used at pixels around the measurement points [21] . For pixels far from measurement points, the purely predicted reference RF fi ngerprints are used.

The insertion of measured reference RF fi ngerprints in the CDB is expected to increase the MS location accuracy, especially at and around pixels where those measured fi ngerprints are available. However, as in CDBs built entirely with mea-surements, the problem of CDB updating is also crucial in mixed CDBs. After any change in RAN elements, updated measurements must be obtained to prevent loca-tion accuracy degradation [3] . If the measurement points are obtained from drive test routes, this means that new routes must be carried out to update the CDB. This might be very time - consuming and expensive.

An alternative solution for updating a mixed CDB is the use of passive listen-ers [12] , which are MSs placed at fi xed known locations. These MSs perform mea-surements that are sent to serving base stations through NMRs, allowing for an automatic update of the mixed CDB. It is possible to increase the location accuracy at a given zone by deploying a suffi ciently high number of passive listeners at that

c15.indd 498c15.indd 498 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 13: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.4 TECHNIQUES TO REDUCE THE SEARCH SPACE 499

zone. An algorithm to indicate the optimum distribution of passive listeners in a given area is proposed in Reference 12 .

15.4 TECHNIQUES TO REDUCE THE SEARCH SPACE

Each CDB element contains a reference RF fi ngerprint and a set of geographic coordinates. The search space is the set of CDB elements whose reference RF fi n-gerprints are compared to the target RF fi ngerprint. The geographic coordinates of the search space elements are location candidates for the MS location problem.

Initially, the search space comprises all CDB elements. However, it is not feasible to compare the target fi ngerprint to all reference fi ngerprints stored in the CDB, as this would result in a very large computational load and in a corre-spondingly long time to produce a position fi x. Therefore, some technique must be applied to reduce the search space, without signifi cantly impairing the location accuracy.

Two search space reducing techniques are presented in this section: CDB fi lter-ing [8] and optimized search with GAs [22] [23] . For better understanding, the search space reducing techniques are presented assuming that the CDB is organized as a uniform grid. However, the extension to a CDB structured as an indexed list is straightforward.

The original search space is represented by set A and comprises the whole CDB. If the CDB is organized as a uniform grid and the service area covers a total surface of l × w m 2 , then the cardinality — that is, the number of elements — of set A is given by

# ,A = ⎡⎢⎢

⎤⎥⎥

× ⎡⎢⎢

⎤⎥⎥

l

r

w

rS S

where r s is the planar resolution of the CDB. Set A is defi ned as

A = ′( ) ⎡⎢⎢

⎤⎥⎥

⎡⎢⎢

⎤⎥⎥

⎧⎨⎩

⎫⎬x y i

w

rj

l

rj i i j

S S

, , = 1, 2, , = 1, 2, ,,S … …and⎭⎭

, (15.13)

where ′Si j, is the reference RF fi ngerprint at pixel ( i , j ). The geographic coordinates ( x j , y i ) of pixel ( i , j ) are given by Equation 15.7 .

The reduced search space A is a subset of A . The search space reduction factor can be defi ned as

γ = −1#

#,

D

A (15.14)

where # A and #D are the number of elements in the original ( A ) and reduced ( D ) search spaces, respectively. Note that D ⊂ A . For a service area of 10 × 10 km 2 and r s = 5 m, # A = 4 million elements. Without a technique to reduce the search space, for every position fi x, 4 million reference fi ngerprints would have to be compared

c15.indd 499c15.indd 499 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 14: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

500 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

to the target RF fi ngerprint. For a search space reducing technique with γ = 99%, this number would drop to 40,000 reference fi ngerprints per position fi x.

15.4.1 CDB Filtering

This technique progressively reduces the search space, applying three successive fi ltering steps to the CDB elements [8] . The whole service area is depicted in Figure 15.6 a, where the best server area of each cell is shown, as well as the vectors rep-resenting the streets. The service area map includes all CDB elements and corre-sponds to the original search space A .

First Filtering Step: In the fi rst fi ltering step, the search space A is restricted to the CDB elements within the best server area of the sector with the highest RSS in the target RF fi ngerprint, obtaining

B A= ′( ) ′ ∈ ′ ( ) ( ){ }x yj i i j i j i j, ,, 1,1 = 1,1, , ,S S S Fand (15.15)

where ′ ( )Si j, ,1 1 and F (1, 1) are the cell IDs of the strongest received signal at the reference and target RF fi ngerprints, respectively. The reference RF fi ngerprint is defi ned by Equation 15.6 . The target RF fi ngerprint is defi ned by Equation 15.1 .

Figure 15.6 Reducing the search space with CDB fi ltering. See color insert.

(d) After Third Filtering Step (# = 8).

(a) Original Search Space (# = 7569).

(c) After Second Filtering Step (# = 78).

(b) After First Filtering Step (# = 1338).

c15.indd 500c15.indd 500 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 15: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.4 TECHNIQUES TO REDUCE THE SEARCH SPACE 501

The best server area of an arbitrary cell, whose ID is indicated by F (1, 1), is shown in Figure 15.6 b. This area contains the elements of B .

Second Filtering Step: In the second fi ltering step, the search space B is restricted to the elements whose best server RTD values are equal to the best server RTD value in the target RF fi ngerprint. The resulting set is represented by

C B= ′( ) ′ ∈ ′ ( ) = ( ){ }x yj i i j i j i j, , 1, 3 1, 3, , ,S S S Fand , (15.16)

where ′ ( )Si j, ,1 3 and F (1, 3) are the reference and target best server RTD values, respectively. This fi ltering step is omitted in networks where RTD values are not available, like in Wi - Fi networks. Figure 15.6 c shows the pixels that belong to C .

Third Filtering Step: In the third fi ltering step, the search space C is restricted to the elements whose reference RF fi ngerprints contain the fi rst N cells listed in the target RF fi ngerprint F . As the rows of F are classifi ed in descending order of RSS, these N cells are the ones with the highest RSS values in F . The set of the N CIDs with the highest RSS values in the target RF fi ngerprint is given by

IT aN N N N= 1 1 1,F : , ,( ) ∈[ ]{ } (15.17)

where N a is the number of anchor cells in F . The set of cell IDs in the reference RF fi ngerprint at pixel ( i , j ) is given by

I CR i j i j i j i jN, , , ,= ′ ( ) ′ ∈{ }S S, ,1 : ,1 (15.18)

where N i , j is the number of cells in ′Si j, . The cardinality of the set I IR i j TN, , ∩( ) informs how many of the cell IDs in

the reference RF fi ngerprint of pixel ( i , j ) are among the N cell IDs with the highest RSS values at the target RF fi ngerprint. In the third fi ltering step, the search space C is restricted to the elements where # , ,I IR i j TN N∩( ) ≥ . The reduced search space thus obtained is represented by

D C I I= , , # 1,, , , ,x y N N Nj i i j i j R i j T aN′( ) ′ ∈ ∩( ) ≥ ∈[ ]{ }S S and and . (15.19)

Figure 15.6 d shows the pixels that belong to D . Note that D ⊂ C ⊂ B ⊂ A and that # D << # A , which means that the CDB fi ltering technique achieves a high search space reduction factor.

Example 15.1

Given a target RF fi ngerprint F defi ned by Equation 15.20 and a sample 3 × 3 uniform grid CDB defi ned by Equation 15.21 , use CDB fi ltering and identify the elements in D for N = 4. Assume that only the best server RTD value is known, so all other RTD values are given a negative value to indicate that they are not avail-able. Also assume that the RSS is quantized using 64 possible values in 1 - dB steps

c15.indd 501c15.indd 501 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 16: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

502 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

from 0 ( − 110 dBm or below) to 63 ( − 48 dBm or above). Both assumptions are based on the GSM radio interface specifi cations [5] :

F =− − − −

⎢⎢⎢

⎥⎥⎥

100 110 5 2 99

62 60 59 43 40

0 1 1 1 1

T

(15.20)

and

′ = − − − − − −[S1 1 100 551 5 50 1 110 49 1 111 45 1 10 34 1 200 30 1 201 29 1, ; ; ; ; ; ; ]]′ = − − − −[ ]′ =

S

S

1 2

1 3

100 60 0 110 50 1 2 45 1 5 40 1 10 35 1

100 591 11

,

,

; ; ; ;

; 00 49 1 2 50 1 5 39 1 10 36 1

100 54 0 5 50 1 110 49 1 111 42 1

− − − −[ ]′ = − −

; ; ;

; ; ;,S 55 1 10 34 1 200 30 1 201 29 1

100 61 0 110 50 1 2 45 1 5 42 2

− − − −[ ]′ = − −

; ; ;

; ; ;,S 00 1 10 35 1

110 60 0 2 52 1 100 50 1 5 39 1

110 63

2 3

3 1

− −[ ]′ = − − −[ ]′ =

;

; ; ;,

,

S

S 00 2 52 1 100 50 1 5 38 1

110 60 0 100 52 1 2 50 13 2

3 3

; ; ;

; ;,

,

− − −[ ]′ = − −[ ]′ =

S

S 1110 591 100 52 1 2 50 1; ; .− −[ ]

(15.21)

Solution

After the fi rst fi ltering step is carried out, as defi ned in Equation 15.15 , the set B is obtained, being given by B = ′ ′ ′ ′ ′{ }S S S S S1 1 1 2 1 3 2 1 2 2, , , , ,, , , , . As the CDB is organized as a uniform grid, the B set (as well as the other sets obtained during the CDB fi ltering) might contain, instead of the reference fi ngerprints, the relative coordinates of the pixels within the CDB (i.e., their lines and columns). So, alternatively, this set would be expressed by B = {(1, 1), (1, 2), (1, 3), (2, 1), (2, 2)}. Note that the cell IDs (i.e., the value in the fi rst column) in the fi rst line of all elements in B are equal to the best server ID in F (cell ID = 100). Then, the second fi ltering step is applied, as defi ned in Equation 15.16 , selecting the elements of B whose RTD value is equal to the one informed in F (RTD = 0), yielding the set C = {(1, 2), (2, 1), (2, 2)}. Finally, the third fi ltering step, as defi ned in Equation 15.19 , is applied, yielding the reduced search space D = {(1, 2), (2, 2)}. Note that ′S1 2, and ′S2 2, are the only reference fi n-gerprints in the CDB that contain the four strongest cell IDs in F (cell IDs 100, 110, 5, and 2).

15.4.2 Optimized Search Using GA s

GA is an optimized and highly parallel search technique based on the principle of natural selection and genetic reproduction, which is expected to converge to a sub-optimal solution after evaluating just a small subset of the entire search space [24] .

c15.indd 502c15.indd 502 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 17: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.4 TECHNIQUES TO REDUCE THE SEARCH SPACE 503

Therefore, GA is a suitable option to reduce the search space in RF fi ngerprinting algorithms [23, 25] . Each candidate solution is an individual, represented by a numeric sequence called a chromosome. When using binary representation, each bit in a chromosome is referred to as a gene. The set of individuals at each cycle or generation is called the population. The individuals of a population are modifi ed and combined by means of genetic operators — crossover, mutation, and elitism — producing a new population for the following generation. A crossover mixes seg-ments of chromosomes of two individuals (parents), producing two new individuals (crossover children) for the next generation. Mutation is a random modifi cation of one or more genes of a chromosome. Elitism is the technique of cloning the best individual of a generation into the next cycle [22] . The aptitude or fi tness of an individual is assessed by means of an evaluation function. Better - fi tted individuals have a higher probability of being selected for reproduction (crossover). The best individual in a population is the one who achieves the highest value at the evaluation function. This cycle continues until a stop criterion — maximum number of genera-tions, fi tness of the best individual, processing time, and so on — has been reached. The best individual of the last generation provides a suboptimal solution to the problem [24] .

In the proposed GA application, each individual is a pixel. Each pixel has a reference RF fi ngerprint, which is used to evaluate the individual ’ s fi tness. The GA steps are the following:

1. Initialize the fi rst - generation population, randomly selecting individuals within set B , defi ned by Equation 15.15 .

2. Evaluate the fi tness of each individual of the current population, using a cor-relation function.

3. Create chromosomes, converting the individual coordinates to a binary format.

4. Apply genetic operators — crossover, mutation, and elitism — to create a new generation.

5. Convert chromosomes to an integer format.

6. If stop criterion has been met, provide MS location, given by the coordinates of the fi ttest individual; otherwise, return to step 2.

The fi rst step is an improvement of the formulation presented in Reference 25 , where the initial population is randomly selected among the pixels within A . The proposed improvement is based on the assumption that the probability of an MS being located within the predicted best server area of its serving sector is higher than in any other pixels in the service area. Therefore, when initializing the fi rst - generation popula-tion, instead of randomly selecting individuals throughout the whole service area, the individuals should be randomly selected among the pixels within B [23] . As a result, the average fi tness of the fi rst - generation population is higher; that is, on average, the fi rst - generation individuals are closer to the real MS location, which means that, in comparison to Reference 25 , fewer generations are required to reach the suboptimal solution.

c15.indd 503c15.indd 503 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 18: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

504 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

Each individual has a reference RF fi ngerprint. The higher the correlation between the reference RF fi ngerprint and the target RF fi ngerprint, the higher the fi tness of this individual. The fi ttest individual in any given generation is the one who achieves the highest correlation. The correlation is calculated using one of the techniques described in Sections 15.5.1 and 15.5.3 .

If the CDB is a uniform grid, the length of each chromosome created in the third step is the number of bits required to identify the position of a pixel, that is, its row and column within the CDB, and is given by

log log ,2 2l

r

w

rS S

⎡⎢⎢

⎤⎥⎥

+ ⎡⎢⎢

⎤⎥⎥

⎛⎝⎜

⎞⎠⎟

⎡⎢⎢

⎤⎥⎥

where l × w m 2 is the service area surface and r S is the CDB planar resolution. The GA stops when one of the two conditions occurs: (1 ) The maximum

number of generation g max is reached; (2 ) the fi tness of the best individual during α consecutive generations does not improve by a value higher than ε . The second condition is a modifi cation of the common stop criterion based only on the maximum number of generations: If the aptitude of the best individual reaches a steady state, it might mean that the algorithm has reached a local maximum, and therefore there is no need to evaluate new generations [26] .

The reduced search space D contains the coordinates and the reference RF fi ngerprints of all individuals evaluated along all generations. The cardinality of set D is # D = g × τ , where g is the number of generations and τ is the number of indi-viduals per generation. Note that g ≤ g max and that D ⊂ B ⊂ A .

15.5 PATTERN MATCHING OF RF FINGERPRINTS

After defi ning the RF fi ngerprint, the CDB, the search space, and the techniques to reduce it, it is necessary to specify how the reference RF fi ngerprints in the reduced search space are compared to the target RF fi ngerprint. The key idea is to fi nd the reference RF fi ngerprint in the search space having the highest similarity or correla-tion with the target RF fi ngerprint.

If the correlation between the reference and target RF fi ngerprints is evaluated using absolute RSS values , this evaluation can be done in two ways: (1 ) calculating the distance in the N - dimensional RSS space between the reference and target RF fi ngerprints [8] or (2 ) using a pattern matching algorithm based on ANNs [27] . If the correlation is evaluated using relative RSS values , this evaluation can be done, for example, using the Spearman rank correlation coeffi cient [28] .

The MS is assumed to be located at the pixel whose reference RF fi ngerprint has the highest correlation with the target RF fi ngerprint. Alternatively, instead of selecting just the best match, it is possible to select the K best matches, in which case the MS location is given by the arithmetic mean of the K best match coordinates. This method is called k - nearest neighbor ( KNN ) [29] , and its effect in the location accuracy is analyzed in Section 15.6 .

c15.indd 504c15.indd 504 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 19: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.5 PATTERN MATCHING OF RF FINGERPRINTS 505

15.5.1 Distance in N - Dimensional RSS Space

The problem of defi ning the similarity between the reference and target RF fi nger-prints can be seen as one of determining the distance between those fi ngerprints in an N - dimensional RSS space [30] . Each dimension corresponds to a cell. The dis-tance in the k th dimension is proportional to the difference between the reference and target RSS values of the k th cell. Figure 15.7 shows an example for N = 3. The Euclidean distance between the target RF fi ngerprint (black dot) and each reference RF fi ngerprint (white dots) in the three - dimensional RSS space is indicated by the line segments.

The similarity or correlation between the reference and target RF fi ngerprints is inversely proportional to the N - dimensional distance between those fi ngerprints in the RSS space. This distance can be calculated using different metrics: Euclidean distance, sum of absolute differences ( SAD ), and so on. The use of different metrics might yield signifi cantly different location estimates. This effect is analyzed in Section 15.6 .

Two situations are considered when calculating the N - dimensional distance in RSS space: a particular case , to be applied specifi cally when CDB fi ltering is used [8] , and a generic case , where a penalty term is introduced [1] .

Particular Case: For simplicity, it is assumed here that the CDB is organized as a uniform grid and that the reduced search space D is obtained using CDB fi ltering, as described in Section 15.4.1 . It is also assumed that i j i j, , ,′( )∈S D. The Euclidean distance between the target RF fi ngerprint F and the reference RF fi ngerprint ′Si j, in the N - dimensional RSS space is given by

dn k

i ji j k

k

N

,, , ,

,=′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

⎛⎝⎜

⎞⎠⎟=

∑ S F2 2 2

1 δ (15.22)

Figure 15.7 Euclidean distances between target (black dot) and reference (white dots) RF fi ngerprints in a three - dimensional RSS space.

−60−58

−56−54

−52−50

−60−58

−56−54

−52−50−60

−58

−56

−54

−52

−50

RSS Cell A (dBm)RSS Cell B (dBm)

RS

S C

ell C

(dB

m) (−55, −52, −53)

(−54, −53, −52)

(−54, −57, −55)

c15.indd 505c15.indd 505 8/5/2011 3:36:00 PM8/5/2011 3:36:00 PM

Page 20: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

506 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

where n k is the index of the line in ′Si j, , whose cell ID is equal to the cell ID in the k th line in F , that is, ′ ( ) = ( )S Fi j kn k, , ,1 1 , with n k ∈ [1, N i , j ]. The parameter N i,j is the number of rows in ′Si j, . The parameter δ represents the MS inherent RSS measure-ment inaccuracy in decibel units [7] . In Equation 15.22 , any difference between target and reference RSS values that is smaller than δ is considered to be zero.

Generic Case with Penalty Term: It is assumed here that the CDB is organized as a uniform grid and that i j i j, , ,′( )∈S D. In the generic case with a penalty term, the Euclidean distance between the target RF fi ngerprint F and the reference RF fi ngerprint ′Si j, in the N - dimensional RSS space is given by

dn m

N Ni ji j k k

k

N

a,, , ,

,=′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+ −( )=

∑ S F2 22

2

1 δβ (15.23)

where n k and m k are the indexes of the lines in ′Si j, and F , respectively, whose cell IDs are equal to the cell ID of the k th element in I = ′ ( ) ∩ ( )S Fi j, :, :,1 1 . Note that n k ∈ [1, N i , j ] and m k ∈ [1, N a ]. The parameter N a is the number of anchor cells in F . The parameter β is the RSS dynamic range in decibel units. In GSM networks, for example, β = 63 dB [5] .

In Equation 15.23 , the parameter N informs how many of the cell IDs that are listed in F are also listed in ′Si j, ; that is, N = # I . Unlike Equation 15.22 , these cell IDs are not necessarily the ones with the N highest RSS values in F . For each cell ID listed in F and absent from ′Si j, , a penalty term 2 β is added. This value is twice the maximum difference between any target and reference RSS values. This ensures that, given two reference RF fi ngerprints, the one with the higher N will be closer to the target RF fi ngerprint, regardless of the value yielded by the fi rst term of Equation 15.23 . Note that, for any given reference RF fi ngerprint, if N = N a , Equations 15.22 and 15.23 yield the same result.

If, instead of the Euclidean distance, the SAD is used, then Equation 15.23 becomes

dn m

N Ni j

k

Ni j k k

a,, .=′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

+ −( )=

∑1

, 2 , 22

S F

δβ (15.24)

Example 15.2

Given a target RF fi ngerprint F and two reference RF fi ngerprints, ′S10 20, and ′S10 25, , associated with the pixels (10, 20) and (10, 25), respectively, fi nd the pixel whose reference RF fi ngerprint is closest to the target RF fi ngerprint using Equation 15.22 . Repeat using Equation 15.24 . The target and reference RF fi ngerprints are given by Equation 15.25 . Assume that only the best server RTD value is known, so all other RTD values are given a negative value to indicate that they are not available. Also assume that the RSS is quantized using 64 possible values in 1 - dB steps from 0 ( − 110 dBm or below) to 63 ( − 48 dBm or above). Both assumptions are based on the GSM radio interface specifi cations [5] :

c15.indd 506c15.indd 506 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 21: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.5 PATTERN MATCHING OF RF FINGERPRINTS 507

F S=−−−

⎢⎢⎢⎢

⎥⎥⎥⎥

′ =

100 62 0

110 60 1

005 54 1

002 43 1

100 55 0

005

10 20,

550 1

110 49 1

111 45 1

010 34 1

200 30 1

10 25

−−−−−

⎢⎢⎢⎢⎢⎢⎢

⎥⎥⎥⎥⎥⎥⎥

′S , ==−−−−

⎢⎢⎢⎢⎢⎢

⎥⎥⎥⎥⎥⎥

100 60 0

110 50 1

002 45 1

005 40 1

010 35 1

. (15.25)

Solution

If the reduced search space D is obtained using CDB fi ltering, the sets ITN and I R , i , j must be identifi ed. They are defi ned by Equations 15.17 and 15.18 , respectively. From the RF fi ngerprints in Equation 15.25 and assuming N = 3, one obtains

I

IR

R

, ,

, ,

, , , , ,

, , ,10 20

10 25

005 010 100 110 111 200

002 005 010 100

= { }= ,,

, ,

,, , , ,

110

005 100 110

00510 20 10 25

{ }= { }

∩( ) = ∩( ) =I

I I I ITN

R T R TN N 1100 110, .{ }

(15.26)

Therefore, x y20 10 10 20, , ,′( )∈S D and x y25 10 10 25, , ,′( )∈S D because

′ ( ) = ( ) ′ ( ) = ( ) ∩( ) =′

S F S F10 20 10 20 10 201 1 1 1 1 3 1 3 3, , , ,, , , , , , # I IR TN

SS F S F10 25 10 25 10 251 1 1 1 1 3 1 3 3, , , ,, , , , , , # .( ) = ( ) ′ ( ) = ( ) ∩( ) =I IR TN

(15.27)

Using Equation 15.22 to calculate the N - dimensional distances in RSS space between each reference RF fi ngerprint and the target fi ngerprint, one obtains

d10 20

10 202

10 201 2 1 2 3 2 2 2

,

, ,, , , ,

=

′ ( ) − ( )⎢⎣⎢

⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+′ ( ) −S F S F

δ(( )⎢

⎣⎢⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

=δ δ

210 20

2

10 25

2 2 3 2S F,

,

, ,

d

′′ ( ) − ( )⎢⎣⎢

⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+′ ( ) − ( )⎢

⎣⎢S F S F10 25

210 251 2 1 2 2 2 2 2, ,, , , ,

δ δ⎥⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

210 25

24 2 3 2S F, , ,

δ (15.28)

Assuming δ = 6 dB [5] ,

d10 20

2 255 62

6

49 60

6

50 54

6, = −⎢

⎣⎢⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+ −⎢⎣⎢

⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+ −⎢⎣⎢

⎥⎦⎥⎥

⎛⎝⎜

⎞⎠⎟

=

= −⎢⎣⎢

⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

+ −⎢⎣⎢

⎥⎦⎥

⎛⎝⎜

⎞⎠

2

10 25

2

1 41

60 62

6

50 60

6

.

,d ⎟⎟ + −⎢⎣⎢

⎥⎦⎥

⎛⎝⎜

⎞⎠⎟

=2 240 54

62 23. .

(15.29)

c15.indd 507c15.indd 507 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 22: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

508 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

If there are no other location candidates, then ˆ ,x = ( )x y20 10 , as d 10,20 < d 10,25 . Using Equation 15.24 to calculate the N - dimensional distances in RSS space

between each reference RF fi ngerprint and the target fi ngerprint, one obtains

d10 2010 20 10 201 2 1 2 3 2 2 2

,, ,, , , ,

=′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

+′ ( ) − ( )⎢

⎣⎢⎥S F S F

δ δ ⎦⎦⎥+

′ ( ) − ( )⎢⎣⎢

⎥⎦⎥

+ −( )

=( ) −

S F10 20

10 2510 25

2 2 3 22 4 3

1 2

,

,,

, ,

,

δβ

dS FF 1 2 2 2 2 2

3 2 4

10 25

10 25

, , ,

, ,

,

,

( )⎢

⎣⎢

⎦⎥ +

′ ( ) − ( )⎢⎣⎢

⎥⎦⎥

+

′ ( ) −

δ δS F

S F 22 5 2 3 22 4 410 25( )⎢

⎣⎢⎥⎦⎥

+′ ( ) − ( )⎢

⎣⎢⎥⎦⎥

+ −( )δ δ

βS F, , ,

.

(15.30)

Assuming δ = 6 dB and β = 63 dB [5] ,

d

d

10 20

10 2

55 62

6

49 60

6

50 54

6126 128,

,

=−⎢

⎣⎢⎥⎦⎥

+−⎢

⎣⎢⎥⎦⎥

+−⎢

⎣⎢⎥⎦⎥

+ =

55

60 62

6

50 60

6

40 54

6

45 43

63=

−⎢⎣⎢

⎥⎦⎥

+−⎢

⎣⎢⎥⎦⎥

+−⎢

⎣⎢⎥⎦⎥

+−⎢

⎣⎢⎥⎦⎥

= .

(15.31)

If there are no other location candidates, then ̂ ,x = ( )x y25 10 , as d 10,25 < d 10,20 . Note that by changing the distance evaluation function from Equation 15.22 to Equation 15.24 , the MS location estimate ̂x changes from ( x 20 , y 10 ) to ( x 25 , y 10 ).

15.5.2 Pattern Matching Using ANN s

ANNs are distributed parallel systems composed by interconnected processing units called neurons , which perform mathematical functions [32] . ANNs are usually applied to solve function approximation and classifi cation problems.

An ANN can be used to approximate a function, which represents the mapping between an RF fi ngerprint and a position ( x , y ) with the LS error [33] . The proposed ANN topology has 3 N c inputs, M neurons in the hidden layer and two neurons in the output layer [27] , as shown in Figure 15.8 .

In the input layer, there are three inputs per cell in the service area: The fi rst is a Boolean variable indicating if the cell is present or not in the RF fi ngerprint; the second is the normalized RSS value of that cell; and the third is the normalized RTD value of that cell, if available. The RSS and RTD values are normalized within a range that depends on the transfer function used on the neurons in the hidden layer.

Only one hidden layer is used with M neurons. This is in keeping with the universal approximation theorem , which states that a single hidden layer, if correctly dimensioned, is enough to approximate most nonlinear functions [27] .

c15.indd 508c15.indd 508 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 23: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.5 PATTERN MATCHING OF RF FINGERPRINTS 509

There are two neurons at the output layer, as only two - dimensional positioning is being considered. The MS estimated coordinates at the ANN output are normal-ized within a range that depends on the transfer function used in the neurons in the output layer.

The connections between the neurons are called synapses , each one having a numeric weight. Each neuron has a bias , which is a numeric value added to the output of its transfer function. The weights and biases are adjusted during the train-ing phase to enable the multilayer feed - forward ANN to approximate a nonlinear function. The initial weights and biases are usually randomly selected within prede-termined boundaries.

During the supervised learning phase [32] , all reference RF fi ngerprints stored in the CDB are presented as inputs to the ANN. For each input ′Si j, , the ANN yields an output ˆ , ˆx yj i( ), which is then compared to the target output ( x j , y i ). The weights and biases of the network are iteratively adjusted to minimize the mean square error ( MSE ) between the network outputs and the target outputs. The training ends when a target MSE has been reached or after a maximum number of epochs.

After being successfully trained, the ANN is ready to receive target RF fi n-gerprints as inputs, yielding as outputs the MS location estimates.

Example 15.3

Given a test and training sets, with their respective target outputs (i.e., the MS truth ground positions associated with each fi ngerprint in the test and training sets), train and test an ANN in MATLAB. During the test phase, evaluate the resulting MS positioning error.

Figure 15.8 Schematic representation of ANN topology.

1

2

3

M

1

2

3

-1

3Nc

3Nc

3Nc

-2

1st cell indicator

1st cell norm. RSS

1st cell norm. RTD

NCth cell indicator

NCth cell norm. RSS

NCth cell norm. RTD

Norm. x

Norm. y

c15.indd 509c15.indd 509 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 24: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

510 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

Solution

First, it is necessary to load the input training patterns. Each input pattern follows the structure shown in Figure 15.8 . There will be an input pattern for each reference RF fi ngerprint stored in the CDB. After normalization using the mapminmax command, the coordinates associated with each CDB element become the ANN output targets. The backpropagation ANN is created using the newff command. After the stop criteria have been met — maximum number of epochs, MSE value, or maximum number of validation failures — the trained ANN is stored for further use, as well as the training session record. The trained ANN is tested using the sim command. First, the test set must be loaded. It contains the target RF fi ngerprints — already in the format described by Figure 15.8 . The test set is given to the ANN, and the achieved outputs are compared to the target MS coordinates. The location error is calculated by the two - dimensional Euclidean distance between the ANN output and the MS target coordinate.

15.5.3 Spearman Rank Correlation Coeffi cient

Manufacturing variations among MS devices might affect the way they measure RSS values. As a result, at a same location and time, different MS devices might yield different RSS values for the same cell. If the CDB is built from fi eld measure-ments using a certain MS device, and another MS device is to be localized, the location accuracy of a fi ngerprinting method using this CDB will deteriorate. This is even more likely to occur if the MS used to build the CDB and the MS used to test the location accuracy are from different manufacturers. To mitigate this cross - device effect [3] , instead of using absolute RSS values in the correlation function, one might use the relative RSS values, that is, their ranking. The ranking of RSS values is more robust to cross - device operation, which means that, while the absolute RSS values of a set of cells might be quite different when measured by different MS devices, their ranking is more likely to remain the same or, at least, more similar. This is based on the assumption that the relationship between the input signal strength and the RSS is a monotonically increasing function [34] .

For a better understanding, consider two MS devices, MS 1 and MS 2 , both placed at the same location, and two base stations, BTS A and BTS B . The signals from these base stations reach both MS devices with input signal strengths s A and s B . The RSS values informed by MS 1 are RSS 1 A and RSS 1 B . The RSS values informed by MS 2 are RSS 2 A and RSS 2 B . If the relationship between the input signal strength and the RSS is a monotonically increasing function, then, if s A > s B , RSS 1 A > RSS 1 B and RSS 2 A > RSS 2 B . While (RSS 1 A , RSS 1 B ) might be different from (RSS 2 A , RSS 2 B ), the ranking of BTS A and BTS B RSS values is the same on both MS devices.

The similarity between different rankings of the same set of cells might be evaluated by the Spearman rank correlation coeffi cient [28] . This coeffi cient might be used to calculate the correlation between the target RF fi ngerprint F and a refer-ence RF fi ngerprint ′Si j, . However, these fi ngerprints do not necessarily have the same number of cells nor the same cells. Therefore, before applying the Spearman correla-

c15.indd 510c15.indd 510 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 25: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.5 PATTERN MATCHING OF RF FINGERPRINTS 511

tion factor, some modifi cation is required. Two N c × 2 matrices, V F and V S , are created, with initial values defi ned by

V V

V VF S n

F S c

n n

n n N

, ,

, , ,

1 1

2 2

( ) = ( ) =( ) = ( ) =

ID (15.32)

where n = 1, 2, … , N c . The parameter N c is the number of cells in the service area and ID n is the cell ID of the n th cell in the service area.

The position of each cell in the RSS ranking in F must be inserted in the second column of the correspondent row in V F . As the rows in F are organized in descending order of RSS, the position of each cell in the RSS ranking is the row index, as defi ned by

V

V FF k

F k k c a

n k

n k n N k N

, ,

, , , , , , , .

2

1 1 1 1 2

( ) =( ) = ( ) ∈[ ] = …where and

(15.33)

The same procedure must be followed for ′Si j, and V S , as defi ned by

V

V SS k

S k i j k c i

n k

n k n N k N

, ,

, , , , , , ,,

2

1 1 1 1 2

( ) =( ) = ( ) ∈[ ] = …where and ,, .j

(15.34)

The Spearman rank correlation coeffi cient between the target RF fi ngerprint and the reference RF fi ngerprint at pixel ( i , j ) is given by

ρi j

F F S Sn

N

F Fn

N

n R n R

n R

c

c,

, ,

,=

( ) −( ) ( ) −( ){ }

( ) −( ){ }=

=

∑∑

V V

V

2 2

2

1

2

1VVS S

n

Nn R

c,

,2

2

1( ) −( ){ }=∑

(15.35)

where

RN

nFc

Fn

Nc= ( ){ }=∑1

21

V ,

and

RN

nSc

Sn

Nc= ( ){ }=∑1

21

V , .

The Spearman distance can be defi ned as [28]

di j i j, , .= −1 ρ (15.36)

Note that, as ρ i , j ranges from − 1 to 1, the Spearman distance, as defi ned in Equation 15.36 , ranges from 0 to 2.

c15.indd 511c15.indd 511 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 26: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

512 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

Example 15.4

Calculate the Spearman distance between the target RF fi ngerprint F defi ned in Equation 15.20 and the reference RF fi ngerprint ′S2 2, defi ned in Equation 15.21 , assuming N c = 10:

VF

T

= ⎡⎣⎢

⎤⎦⎥

1 2 5 10 99 100 110 120 130 200

10 4 3 10 5 1 2 10 10 10 (15.37)

VS

T

= ⎡⎣⎢

⎤⎦⎥

1 2 5 10 99 100 110 120 130 200

10 3 4 5 10 1 2 10 10 10. (15.38)

Solution

First, the second column of V F and V S must be fi lled with the ranking of the cell IDs in F and ′S2 2, , respectively. The matrices thus obtained are given by Equations 15.37 and 15.38 , with R RF S= = 6 5. . Applying Equations 15.37 and 15.38 , RF and RS to Equation 15.36 , one obtains the Spearman distance d = 0.1379.

15.6 EXPERIMENTAL PERFORMANCE

This section presents some experimental results obtained applying the RF fi nger-printing techniques described in this chapter in two different RANs and environ-ments: in a GSM network in an outdoor dense urban area, and in Wi - Fi 802.11b/g networks in an indoor environment.

15.6.1 Outdoor 850 - MH z GSM Network

Field tests were performed in a 850 - MHz GSM network in the downtown region of Rio de Janeiro city. The region is a 2.2 × 2.2 km 2 dense urban area with 24 cells/km 2 [8] . The DEM used to represent the test area has a planar resolution r H = 5 m and includes building heights, which increases the accuracy of the propagation modeling used to build the CDB. The test set was composed of a GSM phone and a GPS receiver, both connected to a laptop placed inside a moving vehicle. The MS was in active mode, and for each transmitted NMR, the current location was calcu-lated by the GPS receiver. The MS sends two NMRs per second containing the cell ID and RSS of the best server and up to the six strongest neighbor cells. The RTD values, known as timing advance ( TA ) in GSM systems, were registered every time an NMR was sent. A total of 4500 NMRs, TA values, and GPS measurements were recorded for further processing. The GPS location was assumed to be the reference position, so, for each NMR and each location method, the positioning error is the Euclidean distance in meters between the GPS position and the location provided by the respective method.

The location precision of fi ve MS positioning methods is evaluated using the cumulative distribution function ( CDF ) of the location error (other performance

c15.indd 512c15.indd 512 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 27: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.6 EXPERIMENTAL PERFORMANCE 513

metrics might also be used, as proposed in Chapter 12 ). For each method, a moving average fi lter with length 20 is used to eliminate abrupt variations in location esti-mates between adjacent position fi xes along the test route [35] , so the current MS location estimate is given by the arithmetic mean of the previous 20 estimated positions.

Methods I – IV are fi ngerprinting location methods using a CDB built from propagation modeling, and Method V is a CID location method [11] where the MS is assumed to be located at the best serving cell coordinates. The main characteristics of Methods I – V are summarized in Table 15.1 . The CID positioning method usually has poor accuracy and is included for comparison only.

The GA - specifi c parameters in Method III are 60% crossover ratio, roulette selection [26] , 1% mutation ratio, elitism, 16 - bit chromosomes, g max = 20 genera-tions, α = 5 generations, ε = 0.00001, and γ = 3%. The number of individuals per generation is given by (# B × γ )/ g max . Set B is defi ned by Equation 15.15 and γ is the search space reduction factor, defi ned by Equation 15.14 [23] .

Method IV uses an ANN to estimate the MS position. The ANN topology is the one described in Section 15.5.2 , with 15 neurons in the hidden layer. The neurons in the hidden and output layers have hyperbolic tangent sigmoid transfer functions [36] . The input patterns, that is, the reference fi ngerprints stored in the CDB, are randomly divided into two groups: 95% are selected for the training set and 5% are selected for the validation set . The validation set is used to monitor the ANN learn-ing and to prevent overtraining [32] . The input patterns in the training set are pre-sented three times to the ANN to reinforce its learning. The learning algorithm is the Levenberg – Marquardt backpropagation [37] .

Methods I – IV are fi ngerprinting location methods using a CDB built from propagation modeling. This CDB was built using the Okumura – Hata path loss equa-tion upon a DEM with 5 - m planar resolution. The CDB is available at three different planar resolutions, 5, 10, and 25 m. Figure 15.9 a shows a Method I location error CDF obtained with the three different values of r S . The location precision is slightly lower for r S = 25 m. For r S = 5 m, and r S = 10 m, the location precision is approxi-mately the same. Therefore, 10 m is the better choice for the CDB planar resolution, as it provides the same location precision of r S = 5 m while resulting in a CDB four

TABLE 15.1. Positioning Methods in a GSM Test

Method Type Search Space

Reduction Technique Correlation Function N δ

I Fingerprinting CDB fi ltering Euclidean distance Equation 15.22

5 6 dB

II Fingerprinting CDB fi ltering Spearman distance Equation 15.36

n/a n/a

III Fingerprinting GA SAD with penalty term Equation 15.24

5 6 dB

IV Fingerprinting n/a ANN n/a n/a V Cell identity n/a n/a n/a n/a

n/a, not applicable.

c15.indd 513c15.indd 513 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 28: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

514 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

times smaller, which reduces computational complexity and the time to produce each position fi x.

Figure 15.9 b shows the location error CDF of Methods I – IV, using a CDB with r S = 10 m, and of Method V, which is a CID location method and is inserted for comparison. Method I achieves the best overall results, with location errors of 98, 128, and 205 m for the 50th, 67th, and 90th percentiles, respectively. Similar fi ngerprinting methods using CDBs built from fi eld measurements in GSM networks in dense urban areas achieved 94 and 291 m for the 50th and 90th percentiles in Reference 3 and an average positioning error of 100 m in Reference 12 . These results show that a fi ngerprinting location method using a CDB built from properly tuned propagation models can achieve a location precision comparable to that achieved with a CDB built from fi eld measurements.

Methods I – III greatly outperform the basic CID method, while Method IV has the worst performance. The low accuracy achieved by Method IV suggests that the

Figure 15.9 Location error CDF for fi eld test in a GSM network.

0 50 100 150 200 250 3000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1.0

meters

Per

cent

ile

Rs = 5 mRs = 10 mRs = 25 m

(a) Method I with three different rS values

(b) Fingerprinting Methods with rS = 10 m

0 50 100 150 200 250 3000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1.0

meters

Per

cent

ile

Method I Method IIMethod IIIMethod IVMethod V (CID)

c15.indd 514c15.indd 514 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 29: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

15.6 EXPERIMENTAL PERFORMANCE 515

ANN with the described topology is not able to approximate the nonlinear function mapping the RF fi ngerprints into geographic coordinates, when reference RF fi nger-prints generated with propagation modeling are used in the training phase. Nonetheless, good results have been achieved in References 27 and 33 using ANN trained with measured reference RF fi ngerprints, which therefore held greater simi-larity with the target RF fi ngerprints used in the test phase.

15.6.2 Indoor W i - F i Networks

A total of 275 measurement positions have been selected on the fourth fl oor of the Universidade do Estado do Rio de Janeiro main building. Two Wi - Fi 802.11b/g adapters — an Atheros AR5005GS and a TP - Link — were used to collect the ID and RSS of access point s ( AP s), at a rate of one measurement per second. Each measure-ment contains the ID and RSS of up to 20 APs. Each adapter collected between 90 and 120 measurements per point. The RSS value of each detected AP, averaged during the 90 - to 120 - second period, was inserted in a reference RF fi ngerprint and stored in the CDB. Therefore, two CDBs built from fi eld measurements were obtained, one for each adapter, both with 275 elements. To test the fi ngerprinting location methods, a single measurement (1 second) per measurement point was randomly selected to compose a target RF fi ngerprint for each adapter.

Due to the small number of elements in the CDB, no search space reduction technique was used. Three correlation functions were tested: N - dimensional Euclidean distance, SAD with penalty factor, and Spearman distance. The fi rst two functions used a parameter δ = 5 dB [6] .

Figure 15.10 a shows the location error CDF obtained when the test set and CDB are built using the Atheros adapter. All functions yield a median accuracy approximately equal to the measurement point grid spacing, that is, 3 m. However, the Spearman distance achieves the higher precision, with location errors of 2.9, 3.4, and 16 m for the 50th, 67th, and 90th percentiles, respectively. In the GSM test, Method II, which uses Spearman distance, does not yield the best results. Ranking correlation achieves the highest precision among other methods in Wi - Fi networks, but not in GSM networks, probably due to the higher dimensionality — that is, the number of anchor cells — of the Wi - Fi RF fi ngerprints: Each RF fi ngerprint collected in the Wi - Fi test might have up to 20 APs, while in the GSM test, the maximum number of cells in a fi ngerprint is seven. Ranking correlation — as the Spearman distance — compares sequences of cell IDs, ordered by RSS. A longer sequence is more likely to be unique, that is, not likely to repeat itself at different geographic locations. In such conditions, the ranking correlation has a higher probability of correctly identifying the MS location, in comparison to correlation functions com-paring absolute RSS values.

Figure 15.10 b shows the location error CDF obtained in a cross - device opera-tion , that is, when the test set is built using one adapter (TP - Link) and the CDB is built using another adapter (Atheros). For the cross - device test, two laptops (one with a TP - Link Wi - Fi card, another with an Atheros Wi - Fi card) running NetStumbler were placed upon a table with wheels. Each measurement for each card was taken at the same position, at the same time. The precision is clearly worse than in Figure

c15.indd 515c15.indd 515 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 30: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

516 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

15.10 a. In such conditions, the Spearman distance and SAD with penalty factor and δ = 5 dB obtain higher precision, in comparison with the SAD with penalty factor and δ = 0 dB. These results indicate that, as discussed in Section 15.5.3 , the ranking correlation mitigates the accuracy degradation due to cross - device operation.

15.7 CONCLUSIONS

In this chapter, the main elements of network - based RF fi ngerprinting methods have been presented: (1 ) the target and reference RF fi ngerprints; (2 ) the CDB and the alternatives to build it, either using fi eld measurements or propagation modeling, including an overview of empirical propagation model calibration; (3 ) the concept of search space and techniques to reduce it; and (4 ) target and reference RF fi nger-

Figure 15.10 Indoor location error CDF.

0 5 10 15 20 25 300

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1.0

meters

Per

cent

ile

Euclidean DistanceSAD with PenaltySpearman Distance

(a) Three Different Correlation Functions

0 10 20 30 40 50 600

0.2

0.4

0.6

0.8

1.0

meters

Per

cent

ile

SAD with Penalty (Delta = 0 dB)SAD with Penalty (Delta = 5 dB)Spearman Distance

(b) Cross-Device Operation

c15.indd 516c15.indd 516 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 31: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

TAB

LE 1

5.2.

Lo

cati

on

Met

ho

d C

om

par

iso

n

Test

E

nvir

onm

ent

Sear

ch S

pace

Red

uctio

n (a

nd C

DB

Typ

e)

Patte

rn M

atch

ing

Filte

ring

67

th a

nd 9

5th

Loc

atio

n E

rror

s (m

) Pe

rfor

man

ce R

emar

ks

Ref

eren

ces

Out

door

G

SM

CD

B fi

lter

ing

(pre

dict

ed)

RSS

cor

rela

tion

(Euc

lidea

n di

stan

ce)

Mov

ing

aver

age

and

KN

N

134

and

261

Hig

hest

pre

cisi

on i

n ou

tdoo

r ne

twor

ks

7 , 8

, and

3

Out

door

G

SM

CD

B fi

lter

ing

(pre

dict

ed)

Ran

king

cor

rela

tion

(Spe

arm

an d

ista

nce)

M

ovin

g av

erag

e an

d K

NN

13

3 an

d 26

7 B

est

suite

d fo

r cr

oss -

devi

ce

oper

atio

n 31

and

34

Out

door

G

SM

GA

(pr

edic

ted)

R

SS c

orre

latio

n (S

AD

w

ith p

enal

ty t

erm

) M

ovin

g av

erag

e 14

5 an

d 27

6 H

igh

com

puta

tiona

l co

mpl

exity

res

ults

in

high

de

lay

23 a

nd 2

5

Out

door

G

SM

– (p

redi

cted

) A

NN

M

ovin

g av

erag

e 35

2 an

d 49

3 Su

itabl

e on

ly f

or u

se w

ith

CD

Bs

built

fro

m fi

eld

m

easu

rem

ents

39 , 2

7 ,

and

33

Indo

or W

i - Fi

(mea

sure

d)

RSS

cor

rela

tion

(Euc

lidea

n di

stan

ce)

Mov

ing

aver

age

5.3

and

37

Bet

ter

prec

isio

n th

an S

AD

and

lo

wer

del

ay t

han

Spea

rman

30

Indo

or W

i - Fi

(mea

sure

d)

RSS

cor

rela

tion

(SA

D

with

pen

alty

ter

m)

Mov

ing

aver

age

5.9

and

33.9

L

ow c

ompu

tatio

nal

com

plex

ity

40

Indo

or W

i - Fi

(mea

sure

d)

Ran

king

cor

rela

tion

(Spe

arm

an d

ista

nce)

M

ovin

g av

erag

e 3.

4 an

d 23

.3

Bes

t su

ited

for

cros

s - de

vice

op

erat

ion

31

c15.indd 517c15.indd 517 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 32: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

518 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

print correlation, using either ANNs, absolute RSS correlation, or RSS ranking correlation.

The MS positioning precision of the presented location techniques was ana-lyzed in fi eld tests in a GSM network in an outdoor dense urban environment and in Wi - Fi networks in an indoor environment. Table 15.2 summarizes the main characteristics and experimental results of the analyzed fi ngerprinting location techniques.

The results obtained in the Wi - Fi test suggest that ranking correlation is capable of improving the location accuracy in cross - device operation conditions, specially for RF fi ngerprints with higher dimensionality, that is, with a greater number of RSS values (at least around 20). A similar result is obtained when the MS inherent RSS measurement inaccuracy is considered in the evaluation function.

The results obtained in the GSM network and in the literature suggest that a fi ngerprinting location method using a CDB built from propagation modeling can achieve an MS location precision comparable to that achieved when a CDB built from fi eld measurements is used. Model I (CDB fi ltering, N - dimensional Euclidean distance and KNN with K = 5, and moving average fi ltering with L = 20) achieved the higher overall precision, with location errors of 98, 128, and 244 m for the 50th, 67th, and 95th percentiles, respectively. The Federal Communications Commission ( FCC ) Enhanced 911 ( E - 911 ) location accuracy requirements for network - based methods are 100 and 300 m for the 67th and 95th percentiles [38] . The results obtained by Method I meet the FCC E - 911 accuracy requirement for the 95th per-centile, but not for the 67th percentile. Additional research and tests are necessary to improve Method ’ s I location precision, possibly through the use of a mixed CDB, as the one described in Section 15.3.2 , using propagation modeling and fi eld mea-surements obtained by passive listeners [12] . Calibration of the propagation models might also improve Method ’ s I positioning accuracy.

REFERENCES

[1] H. Laitinen , J. Lahteenmaki , and T. Nordstrom , “ Database correlation method for GSM location , ” in Proceedings of IEEE 53rd Vehicular Technology Conference , Rhodes, Greece, pp. 2504 – 2508 , May 2001 .

[2] D. Zimmermann , J. Baumann , A. Layh , F. Landstorfer , R. Hoppe , and G. W ö lfl e , “ Database correla-tion for positioning of mobile terminals in cellular networks using wave propagation models , ” in Proceedings of IEEE 60th Vehicular Technology Conference , Los Angeles, USA, pp. 4682 – 4686 , September 2004 .

[3] M. Chen , T. Sohn , D. Chmelev , D. Haehnel , J. Hightower , J. Hughes , A. LaMarca , F. Potter , I. Smith , and A. Varshavsky , “ Practical metropolitan - scale positioning for GSM phones , ” in Proceed-ings of 8th International Conference on Ubiquitous Computing , Newport Beach, USA, pp. 225 – 242 , September 2006 .

[4] European Telecommunications Standard Institute , ETSI TS 101724 v8.9.0 (2004 – 06) — Digital Telecommunications System (Phase 2 + ); Location Services (LCS); Functional Description; Stage 2 (3GPP TS 03.71 version 8.9.0 Release 1999) , 2004 .

[5] European Telecommunications Standard Institute , ETSI TS 100911 v6.2.0 (1998 – 07) — Digital Cellular Telecommunications System (Phase 2 + ); Radio Subsystem Link Control (GSM 05.08 version 6.2.0 Release 1997) , 1998 .

c15.indd 518c15.indd 518 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 33: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

REFERENCES 519

[6] IEEE Computer Society , IEEE Standard for Information Technology — Telecommunications and Information Exchange between Systems — Local and Metropolitan Area Networks — Specifi c Requirements; Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifi cations , 2007 .

[7] R. S. Campos and L. Lovisolo , “ Location methods for legacy GSM handsets using coverage predic-tion , ” in Proceedings of IEEE 9th Workshop on Signal Processing Advances in Wireless Communications , Recife, Brazil, pp. 21 – 25 , July 2008 .

[8] R. S. Campos and L. Lovisolo , “ A fast database correlation algorithm for localization of wireless network mobile nodes using coverage prediction and round trip delay , ” in Proceedings of IEEE 69th Vehicular Technology Conference , Barcelona, Spain, April 2009 .

[9] S. Ahonen and H. Laitinen , “ Database correlation method for UMTS location , ” in Proceedings of IEEE 57th Vehicular Technology Conference , Jeju, Korea, pp. 2696 – 2700 , April 2003 .

[10] G. Manara , M. Porreta , P. Nepa , and F. Giannetti , “ Location, location, location — use of deterministic propagation models for testing wireless networks location techniques , ” IEEE Veh. Technol. Mag. , vol. 3 , no. 2 , pp. 20 – 29 , 2008 .

[11] S. Gezici , “ A survey on wireless position estimation , ” Wireless Pers. Commun. , vol. 44 , no. 3 , pp. 263 – 282 , 2008 .

[12] M. A. Hallak , M. Safadi , and R. Kouatly , “ Mobile positioning technique using signal strength measurement method with the aid of passive mobile listener grid , ” in Proceedings of 2nd International Conference on Information and Communication Technologies: from Theory to Applications , Damascus, Syria, pp. 105 – 110 , April 2006 .

[13] E. Aarn æ s and S. Holm , “ Tuning of empirical radio propagation models effect of location accuracy , ” Wireless Pers. Commun. , vol. 4 , no. 2 – 4 , pp. 267 – 281 , 2004 .

[14] G. W ö lfl e , R. Hoppe , D. Zimmermann , and F. Landstorfer , “ Enhanced localization technique within urban and indoor environments based on accurate and fast propagation models , ” in European Wireless , Firence, Italy, February 2002 .

[15] M. D. Yacoub , Foundations of Mobile Radio Engineering . Boca Raton, FL : CRC Press , 1993 . [16] M. Hata , “ Empirical formula for propagation loss in land mobile radio services , ” IEEE Trans. Veh.

Technol. , vol. 29 , no. 3 , pp. 317 – 325 , 1980 . [17] International Telecommunications Union , “ Digital topographical database for propagation studies , ”

Recommendation ITU - R P.1058 - 1 , 1997 . [18] S. Dutch , “ The universal transverse mercator system , ” http://www.uwgb.edu/dutchs/fi eldmethods/

utmsystem.htm , January 2000 . [19] MSI , “ Planet technical reference guide version DMS 2.0 , ” Tech. rep., MSI, 1999 . [20] C. L. Lawson and R. J. Hanson , Solving Least Squares Problems . Englewood Cliffs, NJ : Prentice

Hall , 1974 . [21] J. Zhu and G. D. Durgin , “ Indoor/outdoor location of cellular handsets based on received signal

strength , ” Eletron. Lett. , vol. 41 , no. 1 , pp. 24 – 26 , 2005 . [22] D. Goldberg , Genetic Algorithms in Search, Optimization and Machine Learning . Boston : Addison -

Wesley , 1989 . [23] R. S. Campos and L. Lovisolo , “ Mobile station location using genetic algorithm optimized

radio frequency fi ngerprinting , ” in Proceedings of ITS 2010 — International Telecommunications Symposium , Manaus, Brazil, September 2010 .

[24] P. M. Pardalos , L. Pitsoulis , T. Mavridou , and M. G. C. Resende , “ Parallel search for combinatorial optimization: genetic algorithms, simulated annealing, tabu search and GRASP , ” in Proceedings of the 2nd International Workshop on Parallel Algorithms for Irregularly Structured Problems , Lyon, France, pp. 317 – 332 , September 1995 .

[25] M. J. Magro and C. J. Debono , “ A genetic algorithm approach to user location estimation in UMTS networks , ” in EUROCON — The International Conference on Computer as a Tool , Warsaw, Poland, pp. 1136 – 1139 , September 2007 .

[26] C. Houck , J. Joines , and M. Kay , “ A genetic algorithm for function optimization: a MATLAB implementation , ” NCSU - IE TR 95 - 09 , 1995 .

[27] M. A. Spirito , M. Caceres , and F. Sottile , “ WLAN - based real time vehicle locating system , ” in Proceedings of IEEE 69th Vehicular Technology Conference , Barcelona, Spain, April 2009 .

c15.indd 519c15.indd 519 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM

Page 34: Handbook of Position Location (Theory, Practice, and Advances) || RF Fingerprinting Location Techniques

520 CHAPTER 15 FINGERPRINTING LOCATION TECHNIQUES

[28] The MathWorks, Inc. , “ Pairwise distance between pairs of objects , ” http://www.mathworks.de/access/helpdesk/help/toolbox/stats/pdist.html , May 2010 .

[29] T. Seidl and H. - P. Kriegel , “ Optimal multi - step k - nearest neighbor search , ” in Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data , Seattle, USA, pp. 154 – 165 , June 1998 .

[30] P. Bahl and V. N. Padmanabhan , “ RADAR: an in - building RF - based user location and tracking system , ” in Proceedings of 19th Annual Joint Conference of the IEEE Computer and Communications Societies , Tel Aviv, Israel, pp. 775 – 784 , March 2000 .

[31] Y. - C. Cheng , Y. Chawathe , and J. Krumm , “ Accuracy characterization for metropolitan - scale Wi - Fi localization , ” in Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services , Seattle, USA, pp. 233 – 245 , June 2005 .

[32] S. Haykin , Neural Networks: A Comprehensive Foundation . Hamilton, Ontario, Canada : Prentice Hall PTR , 1994 .

[33] C. Takenga , C. Xi , and K. Kyamakya , “ A hybrid neural network - data base correlation positioning in GSM network , ” in Proceedings of IEEE 10th International Conference on Communication Systems , Singapore, pp. 1 – 5 , October 2006 .

[34] J. Krumm , G. Cermak , and E. Horvitz , “ Rightspot: a novel sense of location for a smart personal object , ” in Proceedings of Ubicomp 2003 , Seattle, USA, pp. 36 – 43 , October 2003 .

[35] X. Shen , J. W. Mark , and J. Ye , “ Mobile location estimation in cellular networks using fuzzy logic , ” in Proceedings of IEEE 52nd Vehicular Technology Conference , Boston, USA, pp. 2108 – 2114 , September 2000 .

[36] T. P. Vogl , J. K. Mangis , A. K. Rigler , W. T. Zink , and D. Alkon , “ Accelerating the convergence of the backpropagation method , ” Biol. Cybern. , vol. 59 , pp. 257 – 263 , 1988 .

[37] D. M. Bates and D. G. Watts , Nonlinear Regression and Its Applications . New York : Wiley , 1988 . [38] Federal Communications Commission , “ Guidelines for testing and verifying the accuracy of wire-

less E911 location systems , ” OET BULLETIN No.71 , 2000 . [39] Z. Salcic , “ GSM mobile station location using reference stations and artifi cial neural networks , ”

Wireless Pers. Commun. , vol. 19 , pp. 205 – 226 , 2001 . [40] V. Otsason , A. Varshavsky , A. LaMarca , and E. de Lara , “ Accurate GSM indoor localization , ”

in Proceedings of the 7th International Conference on Ubiquitous Computing , Tokyo, Japan, pp. 141 – 158 , September 2005 .

c15.indd 520c15.indd 520 8/5/2011 3:36:01 PM8/5/2011 3:36:01 PM