Professional Documents
Culture Documents
Al Obaidy2020
Al Obaidy2020
Abstract— Developing wireless communication technology as well strength can help to measure the sensor and the reader (i.e.
as the extensive usage of wireless networks imply that location between the transmitter and receiver) at WSN [3]. A frequent
applications have been made rendered necessary. Notably, this challenge that WSN systems are often confronted with is
position denotes the functionality and events to estimate a node of wireless reader’s behavioral variations in received signal strength
interest’s location. This study compares different machine
learning (ML) approaches to locate the accurate localization of a
indicator (RSSI) signals. Such a problem arises when readers
moving tag based on wireless sensor network (WSN) as the unable to get the tag queried in their range of reading. However,
wireless propagation medium to improve the prediction of it is possible to address this problem by augmenting the level of
positions. Our experimental recommends using neural networks power and seeking ways of ensuring that the distance between
method to design an appropriate intelligent WSN networks and readers and tags falls in an acceptable range and does not
seek an optimal position with high precisions. The results show the drastically tamper RSSI levels [4]. WSN localization, another
proposed method provides a prediction accuracy about 94%based common challenge, is attributed to factors causing environment
on neural network approach. interference as well as collision induced due to obstacles that
prevent the transmission of signals. Researchers have strived hard
Keywords— Neural network, Wireless position network, Machine
learning prediction, Received signal strength
to reduce these errors attributed to reasons similar to those that
find mention by other studies [5,6]. However, there is a need to
I. INTRODUCTION conduct new studies in order to derive results that are more
Object positioning location forms an important part of scalable. Therefore, the need for a new or enhanced algorithms
numerous applications like security, tracking, location-based that improve the WSN localization methods based on machine
services and navigation. A geometric description is a typical way learning (ML) techniques.
of describing locations spatially. Wireless positioning system for
indoor localization is a key enabling technology comprising of a
minimum of a couple of hardware components.
This includes a signal transmitter and a measuring unit. The
former denotes a simplistic version by transmitting beacon
signals [1-2]. The typical wireless sensors network (WSN)
structure for system localization is shown in fig.1, its consists
from hundreds of wireless tag nodes for locating the positions,
wireless tag readers for data collecting and processing then this
information are send into the end user for manipulation via
gateway unit and the internet. Moreover, routing MAC protocols
are used to handle and communicate between the wireless
network nodes and readers.
WSN based technology is predicted on existing networks for
seeking information pertaining to reader position. In turn, this
entails the utilization of networking infrastructure for determine
the tags’ angulation position. Therefore, a receiving signal’s Fig. 1. Shows typical wireless positioning system structure.
Authorized licensed use limited to: University of Exeter. Downloaded on June 01,2021 at 22:30:29 UTC from IEEE Xplore. Restrictions apply.
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
used to fit the model during the training stage), so that the conjugate gradient method scheme is shown in fig.5 with
model derives learnings from this data. Through this phase, the parameters being set in table II. In order to examine the
validation data set is also used in order to evaluate a learning accuracy of results in this prediction technique, we make a series
model in a proper manner so as to derive appropriate results. of attempts and compare their accuracy for different structures
For this reason, the model occasionally got the data (i.e. of ANFIS. This demonstrates that ANFIS scheme shows
validation data) tested. Thus, it implies that the validation does improved performance with 16 membership functions for each
impact a model, albeit indirectly. In the testing phase, test data input. As a consequence, the SVM predictor model is
set is only used once a model is completely trained (i.e. using implemented in accordance with the sequential minimal
the train and validation sets). As part of this step, we used our optimization approach that entails the use of kernel function. In
test sets as the testing mechanism. The verification of test this predictor, a kernel function, referred to as quadratic
samples is done on the basis of the desired position or target function, is used to conceal layers for the same effect.
output. In testing phase, test data set is only used once a model
TABLE I. PARAMETERS SETTING FOR WPN STRUCTURE.
is completely trained (i.e. using the train and validation sets).
For this step we used our test sets for testing mechanism. The Parameter Value
Network size 13×9 m2
test samples are verified depending on the target output (i.e.
No. of sensors (tags) 25
desired position). Frequency 6.49 GHz; Band = [6.24 - 6.74] GHz
Packet size 25 bytes
Initial energy 15876 joules= 1470mAh, 3Volt for a
Training Data Set Target Output battery type CR123A.
(Desired position) Transmission current 75 mA
Receiving current 130 mA
Distance between each node 4 m to 9.22 m
Input features Beacon Order (BQ) 4
Output results
(RSSI, Measured Predictor Beacon interval 2 sec
(Optimal position)
position) MAC Technique (protocol) IEEE 802.15.4
collecting the samples period 30-40 min
Authorized licensed use limited to: University of Exeter. Downloaded on June 01,2021 at 22:30:29 UTC from IEEE Xplore. Restrictions apply.
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
All the techniques of prediction were considered in a PeyTec through the support provided by the National Science
separate manner. Table III demonstrates this approach. and Engineering (NSERC-Engage) program.
According to the findings, the accuracy rate of MLP REFERENCES
algorithm is higher by almost 94.32% % in comparison
[1] Wen, Q., Liang, Y., Wu, C., Tavares, A. and Han, X., “Indoor localization
to algorithms used elsewhere. algorithm based on artificial neural network and radio-frequency
identification reference tags,” J. Advances in Mechanical Eng., vol.10,
• Sensitivity Analysis no.pp.1-12, 2018.
[2] Khan, Aftab et al. “Standing on the Shoulders of Giants: AI-driven
Calibration of Localization Technologies,” J. arXiv , 2019.
As part of this step, we gathered from the same
[3] Al-Obaidy, F., Momtahen, S. and Mohammadi, F., “Wireless Sensor
experimental conditions, although the readers are located at Networks Analysis based on MAC Protocols,”, In Proc. Conf. IEEE
same height (z- coordinate). Steps taken previously are Canadian Elect. Comput. Eng. (CCECE) pp. 1-4, 2019.
repeated under the new scenario as well. In this case, the MLP [4] A.M. Khalel, “Position Location Techniques in Wireless Communication
algorithm displays an increased height, as illustrated in Table Systems,” Master Thesis, Bleckinge Institute of Technol.,
IV. MPL provide us higher prediction accuracy 93.91 % on Karlskrona,Sweden, 2010.
average compares with others ML techniques. [5] F. Khelifi, A. Bradai, A. Benslimane, P. Rawat, and M. Atri, “A Survey
of Localization Systems in Internet of Things,” J . Mobile Netw. Appl.,
vol.24, no.3, pp. 761–785, 2019.
[6] D. Zhang, J. Zhou, M. Guo, J. Cao, and T. Li, "TASA: Tag-free activity
sensing using RFID tag arrays,” J. IEEE Trans. Parallel & Distributed
Syst., vol. 22, no.4, pp. 558-570, 2011.
[7] Oguntala, G., Abd-Alhameed, R., Jones, S., Noras, J., Patwary, M. and
Rodriguez, J., “Indoor location identification technologies for real-time
Authorized licensed use limited to: University of Exeter. Downloaded on June 01,2021 at 22:30:29 UTC from IEEE Xplore. Restrictions apply.
2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)
IoT-based applications: An inclusive survey,” J. Comput. Science [16] Al-Obaidy, Furat, Yazdani, F., and Mohammadi, F., "Fault detection
Review, vol.30, pp.55-79, 2018. using thermal image based on soft computing methods: Comparative
[8] L. Yang, J. Han, Y. Qi, C. Wang, T. Gu, and Y. Liu, "Season: Shelving study," J. Microelectronics Rel., vol.71, pp. 56-64, 2017.
interference and joint identification in large-scale RFID systems," in Proc. [17] A. Dorostkar, A. Asad, M. Fathy, M. R. Jahed-Motlagh, & F.
IEEE INFOCOM, 2011, pp. 3092-3100. Mohammadi, “Low-power heterogeneous uncore architecture for future
[9] X. Li, “A Mac Layer Protocol For Smart Indoor Inventory Management 3D chip-multiprocessors,” ETRI Journal, vol.40, no.6, pp.759-773,2018.
System.” Master. Thesis, Ryerson University, Toronto, Canada, 2020. [18] A. Asad, M. Fazeli, M. R. Jahed-Motlagh, M. Fathy, & F. Mohammadi,
[10] Kamruzzaman, S.M., Jaseemuddin, M., Fernando, X. and Moeini, P., “ An Energy-Efficient Reliable Heterogeneous Uncore Architecture for
“Wireless Positioning Sensor Network Integrated with Cloud for Future 3D Chip-Multiprocessors. Journal of Circuits, Systems and
Industrial Automation.” In Proc. Conf. IEEE 42nd Local Comput. Netw. Computers,” pp.1950224,2019.
(LCN), pp. 543-546, 2017. [19] F. Al-Obaidy, A. Asad, and F. Mohammadi, “Reconfigurable hybrid
[11] R. D'Errico, M. Bottazzi, F. Natali, E. Savioli, S. Bartoletti, A. Conti, et cache hierarchy in 3D chip-multi processors based on a convex
al., "An UWB-UHF semi passive RFID System for localization and optimization method”, 32nd In Proc. IEEE Conf. Canadian Elect. &
tracking applications," in Proc. IEEE Int. Conf. RFID-Technol. Appl., Comput. Eng. (CCECE), pp. 1-6, 2019.
RFID-TA 2012, pp. 18-23. [20] A. Asad, O. Ozturk, M. Fathy, and M. R. Jahed-Motlagh, “Optimization-
[12] Z. Xiong, Z. Song, A. Scalera, E. Ferrera, F. Sottile, P. Brizzi, et al., based power and thermal management for dark silicon aware 3D chip
"Hybrid WSN and RFID indoor positioning and tracking system RFID multiprocessors using heterogeneous cache hierarchy,” J.
and near field communications in embedded systems," J. Eurasip Microprocessors & Microsystems, vol. 51, pp. 76-98, 2017.
Embedded Syst., vol. 2013, no.1, pp.6, 2013. [21] F. Al-Obaidy, A. Asad, and F. Mohammadi, “Power-Management based
[13] B. Jachimczyk, D. Dziak, and W. J. Kulesza, "RFID-Hybrid Scene on Reconfigurable Last-Cache level on Non-volatile Memories in Chip-
Analysis-Neural Network System or 3D Indoor Positioning optimal Multi processors”, 32nd In Proc. IEEE Conf. Canadain Elect. & Comput.
system arrangement approach," in Proc. IEEE Int. Conf. Inst. Meas. Eng. (CCECE), pp. 1-4, 2019.
Technol. (I2MTC) 2014, pp. 191-196. [22] M. Jo, H. Y. Youn, S. Cha and H. Choo, "Mobile RFID Tag Detection
[14] Choi, J.S. “Accurate and Cost-Efficient Object Localization Using Passive Influence Factors and Prediction of Tag Detectability," J. IEEE Sensors,
UHF RFID,” University of Texas at Arlington, Arlington, Ph.D. Thesis, vol. 9, no. 2, pp. 112-119, 2009.
USA, 2011 [23] Moore, Holly. MATLAB for Engineers. Pearson, 2017.
[15] Fan, X., Wang, F., Wang, F., Gong, W. and Liu, J., “When RFID Meets
Deep Learning: Exploring Cognitive Intelligence for Activity
Identification,” J. IEEE Wireless Communications, pp.2, 2019.
Authorized licensed use limited to: University of Exeter. Downloaded on June 01,2021 at 22:30:29 UTC from IEEE Xplore. Restrictions apply.