Indoor Localisation System R 1
Indoor Localisation System R 1
CPG No.
Assistant Professor
Dr. 1234567890
Research Scholar
May-Dec, 2019
ABSTRACT
With the passage of time, the importance of the global positioning system has increased
exponentially in our lives. Most of the apps these days use the GPS technology as one of their
major underlying components. Be it google maps, uber eats, Ola or any other company, GPS
is widely used in our daily lives. Seen all the pros of GPS, it has some cons too. The simple
and basic requirement of GPS is the line of site. These systems thus perform tremendously
well outdoors but can’t be used for indoors. We have utilized this opportunity to create an
indoor positioning system which will be able to cater to the shortcomings of the GPS system.
The indoor positioning system aims to help navigate within a closed premise where there are
enough access points and WIFI connection availability. This indoor positioning system will
use the received signal strength values from the various access points and match them in a
database with the stored signal strength values corresponding to various different
co-ordinates.
The signal strength values will also be used to perform the trilateration process and the results of the
fingerprint matching process will be augmented by this trilateration process in order to
improve the accuracy. We aim to deploy this project in our college premise where there are
enough access points thus helping in saving the time which people waste when looking for a
teacher, guard or a lab. This automated and user-friendly service will be available to the
users, students, teachers via an android app installed on their phone.
2
DECLARATION
We hereby declare that the design principles and working prototype model of the
project entitled INDOOR LOCALISATION SYSTEM is an authentic record of our own
work carried out in the Computer Science and Engineering Department, TIET, Patiala, under
the guidance of Dr. Smita Agrawal and Dr. PS Rana during 6th semester (2019).
Date:
CSED, CSED,
3
4
ACKNOWLEDGEMENT
We would like to express our thanks to our mentors Dr. Smita Agrawal and Dr. PS Rana.
They has been of great help in our venture, and an indispensable resource of technical
knowledge. They are truly an amazing mentor to have.
We are also thankful to Dr. Maninder Singh, Head, Computer Science and Engineering
Department, entire faculty and staff of Computer Science and Engineering Department, and
also our friends who devoted their valuable time and helped us in all possible ways towards
successful completion of this project. We thank all those who have contributed either directly
or indirectly towards this project.
Lastly, we would also like to thank our families for their unyielding love and encouragement.
They always wanted the best for us and we admire their determination and sacrifice.
Date:
5
TABLE OF CONTENTS
ABSTRACT Ii
DECLARATION iii
ACKNOWLEDGEMENT iv
LIST OF FIGURES Vii
LIST OF TABLES viii
LIST OF ABBREVIATIONS Ix
CHAPTER 1- INTRODUCTION
1.1 PROJECT OVERVIEW 1
1.2 NEED ANALYSIS 4
1.3 RESEARCH GAPS 5
1.4 PROBLEM DEFINITION AND SCOPE
1.5 ASSUMPTIONS AND CONSTRAINTS
1.6 APPROVED OBJECTIVES
1.7 METHODOLOGY USED
1.8 PROJECT OUTCOMES AND DELIVERABLES
1.9 NOVELTY OF WORK
CHAPTER 2 - REQUIREMENT ANALYSIS
2.1 LITERATURE SURVEY
2.1.1 Theory Associated With Problem Area
2.1.2 Existing Systems and Solutions
2.1.3 Research Findings for Existing Literature
2.1.4 The Problem That Has Been Identified
2.1.5 Survey of Tools and Technologies Used
2.2 STANDARDS
2.3 SOFTWARE REQUIREMENTS SPECIFICATION
2.3.1 Introduction
2.3.1.1 Purpose
2.3.1.2 Intended Audience and Reading Suggestions
2.3.1.3 Project Scope
2.3.2 Overall Description
2.3.2.1 Product Perspective
2.3.2.2 Product Features
2.3.3 External Interface Requirements
2.3.3.1 User Interfaces
2.3.3.2 Hardware Interfaces
2.3.3.3 Software Interfaces
2.3.4 Other Non-functional Requirements
2.3.4.1 Performance Requirements
6
2.3.4.2 Safety Requirements
2.3.4.3 Security Requirements
2.4 COST ANALYSIS
2.5 RISK ANALYSIS
CHAPTER 3 – METHODOLOGY ADOPTED
3.1 INVESTIGATIVE TECHNIQUES
3.2 PROPOSED SOLUTION
3.3 WORK BREAKDOWN STRUCTURE
3.4 TOOLS AND TECHNOLOGIES USED
CHAPTER 4 - DESIGN SPECIFICATIONS
4.1 SYSTEM ARCHITECTURE
4.2 DESIGN LEVEL DIAGRAMS
4.3 USER INTERFACE DIAGRAMS
4.4 SNAPSHOTS OF WORKING PROTOTYPE MODEL
CHAPTER 5: CONCLUSION
5.1 Conclusions
5.2 Environmental Benefits
5.3 Reflections
APPENDIX A: REFERENCES
7
LIST OF TABLES
8
LIST OF FIGURES
9
LIST OF ABBREVIATIONS
AP Access Points
10
INTRODUCTION
3 Technique 1:-
4 During an offline phase fingerprints are collected at known positions in the building.
This database of locations and the associated fingerprints are called the radio map.
Bolliger [1], on the other hand, explored the issue of localization accuracy using multiple
deterministic and probabilistic methods based on WLAN fingerprinting and tested the
feasibility of crowdsourcing to improve the radio map precision in the database. In the
online mode, the current Wi-Fi fingerprint probability distributions are compared with
those of the radio map. The user location is estimated by applying the best suitable
matching algorithm, which matches the fingerprint of the current position of the user and
the fingerprints being stored in the database for the different positions thus calculating
the position of the user.
5 Technique 2:-
6 Trilateration technique is a positioning method that uses geometric properties to estimate
the target location. Distance between transmitters and receivers can be measured using
either received signal strength (RSS), time of arrival (TOA) or time difference of arrival
(TDOA).The target location is determined by the strongest signal transmitted by the
predefined location of beacons or base stations. The accuracy of this method is
measured by the maximum signal range and density of the beacons. Computing the
distance between the user and a nearby AP requires knowledge of the signal path loss
1
which can generally be represented using the Log-distance Path Loss equation explained
by Faria Daniel B [2]. Note that the assumed parameters are similar to many other
empirically found values [3]. The accuracy of this technique is very sensitive to the
environment, therefore this technique when applied standalone may give unreliable
results.
1.1.3 Goal
Project aims on building an application based on Wi-Fi Fingerprinting and Trilateration.
The basic objectives that the project intends to achieve are as follows :-
• Find current location of user.
• Find current location of any accessible teacher.
• Find current location of nearby guard of your building/floor.
• Find location of a particular class/lab/office on the map.
• Get shortest path from a source to a destination on the map
1.1.4 Solution
The objectives of the project listed above will be achieved in small steps as per the schedule
and plan. Firstly, received signal strength values will be calculated from the nearby
2
access points. These received signal strength values will then be used by matching
them with the entries in the database. These entries/fingerprints will help determining
the current location of the user.
Now, the user generates the request to locate a teacher, guard or a lab in the campus. Once the
request is generated the location of the desired entity is again searched and mapped
based on received signal strength values and then the shortest route is generated and
displayed on the user interface guiding the user to his destination.
Locating the user/entity is done based on fingerprinting and trilateration to improve the
accuracy of the indoor localization system. Trilateration will complement the received
signal strength values and help in determining the location with better precision and
accuracy.
Once the data has been collected, an android app will be designed with a user- friendly
interface which will send data and receive data from the application server at the
backend. All the processing will be done remotely and the results will be displayed on
the user’s interface.
Alternative flows of control will also be taken into account, by showing prompts to the user in
scenarios where the rights to access the teacher’s location have not been granted, or
whenever the signal strengths are weak enough to be matched with the fingerprints, etc.
Whenever signal strength is weak wrong location will not be shown to the user, a
prompt will be shown regarding the inconvenience caused by the app. Major attempts
will be made to update the database of fingerprints regularly to ensure that the
fluctuations in the received signal strength values have been taken into account.
3
new demands in location-aware applications have encouraged researchers to develop
the most efficient and effective indoor positioning solution using various platforms
such as Wi-Fi, RFID technology, Bluetooth, Global System for Mobile
Communication (GSM) networks, magnetic field and hybrid system. But none have
been able to provide the accurate results up to 1.5 -2 m.
Although the possibilities with Indoor Navigation alone are very diverse, the same technology
also enables a much broader range of solutions such as Proximity, Asset Tracking and
Analytics. This is a door opener for many industries to include Indoor Positioning
services in their day-to-day business and thus increase efficiency and ROI. Be it
Proximity Marketing or Analytics for Retail, Navigation for patients and Asset
Tracking in Hospitals or for Heavy Engineering, or a Meeting room Finder for office
spaces. Everyone will find something tailored to their needs.
4
have enough strength (not enough access points), so as to fulfill the requirements of our
algorithm.
S. No. Assumptions
1.5.2 Constraints
Table 2: List of Constraints
S. No. Constraints
5
6
1.7 Methodology Used
The objectives of the project listed above will be achieved in small steps as per the schedule
and plan. Firstly, received signal strength values will be calculated from the nearby
access points. These received signal strength values will then be used by matching
them with the entries in the database. These entries/fingerprints will help determining
the current location of the user.
Now, the user generates the request to locate a teacher, guard or a lab in the campus. Once
the request is generated the location of the desired entity is again searched and mapped
based on received signal strength values and then the shortest route is generated and
displayed on the user interface guiding the user to his destination.
Locating the user/entity is done based on fingerprinting and trilateration to improve the
accuracy of the indoor localization system. Trilateration will complement the received
signal strength values and help in determining the location with better precision and
accuracy.
Once the data has been collected, an android app will be designed with a user- friendly
interface which will send data and receive data from the application server at the
backend. All the processing will be done remotely and the results will be displayed on
the user’s interface.
Alternative flows of control will also be taken into account, by showing prompts to the user
in scenarios where the rights to access the teacher’s location have not been granted, or
whenever the signal strengths are weak enough to be matched with the fingerprints, etc.
Whenever signal strength is weak wrong location will not be shown to the user, a
prompt will be shown regarding the inconvenience caused by the app. Major attempts
will be made to update the database of fingerprints regularly to ensure that the
fluctuations in the received signal strength values have been taken into account.
7
1.8 Project Outcomes And Deliverables
We will develop a support system based on facial recognition. In addition, you can work with
videos, identify the students that appears there and surround them with the face
delimiting box. The first part of the system is to automatically extract the relevant
characteristics of the image. These characteristics will be used later to determine if two
images belong to the same person or not. Following are the project outcomes of our
project.
8
REQUIREMENT ANALYSIS
9
2.1.3 Research Findings for Existing Literature
Many systems have been developed in the past like Wise Groove, SYNEL, FINGERTEC,
ZKTECO etc. These systems are expensive and require expert care. With the invent
of neural networks it has become feasible to use affordable and accurate systems.
Many types of recognition systems are possible like FACE ID (4D, 3D, 2D),
Pin+Face etc. Deep Learning and Computer vision are progressive fields and a lot of
developments and enhancements are achievable. A brief overview of studies made on
face detection and recognition will be introduced alongside some popular face
detection and recognition algorithms. This will give a general idea of the history of
systems and approaches that have been used so far.
Technology
Deep Residual Learning Yolo DNN’s are difficult to train so they provide
for Image Recognition empirical evidence showing that residual networks
are easier to optimize and gain accuracy.
Recognizing Facial R-CNN Here they use neural networks to identify key
Expression using deep seven human emotions: anger, disgust, fear,
learning happiness, sadness, surprise and neutrality.
Face Detection and RBF Feature extraction and Facial recognition are
Recognition Technology studied in order to resolve problems like
10
for HCI based on RBF high-dimension problem, small size samples and
Neural Network no-linear separable problem that exist in facial
recognition technology.
Support Vector Machine SVM SVM is a classification method that separate two
Applied to Face data sets with maximum distance between them.
Recognition The concept is to extend the spatial resolution
around the margin by a conformal mapping, such
that the divisibility between classes is increased.
Fuzzy Hybrid Learning RBFNN The FHLA combines thegradient method and
Algorithm the linear least-squared method foradjusting
the RBF parameters and the neural
network connection weights. The RBFNN with
the proposed FHLA is used as a classifier in a face
recognition system.
11
2.1.4 The Problem That Has Been Identified
In order to locate the position of the user inside the building, the conventional GPS fails to
give the accurate results .GPS has been used and been remarkably great in terms of
locating the object, but it has considerably failed to provide accurate results for the
indoor positioning purposes. Therefore there is immense need for an indoor
localization technology which overcomes the barriers faced by the GPS.
2.2 STANDARDS
● IEEE 802.11 WLAN standards
12
2.3.2.1 Product Perspective
With the passage of time, the importance of the global positioning system has increased
exponentially in our lives. Most of the apps these days use the GPS technology as
one of their major underlying components. Be it google maps, uber eats, Ola or
any other company, GPS is widely used in our daily lives. Seen all the pros of
GPS, it has some cons too. The simple and basic requirement of GPS is the line of
site. These systems thus perform tremendously well outdoors but can’t be used for
indoors.
13
1. The speed of locating the desired entity should be fast.
2. The accuracy of the result should be good.
3. App size should be small.
2. The server data should be secured as it contains the location of the teacher,
which should not be accessed without their permission
3. For a small organization like in this case our college, we would store data on a
local server instead of a cloud to prevent it from external attacks.
14
2.5 RISK ANALYSIS
Though our project is taken care of every causality but certainly there can be many flaws and
further risks involved if not checked every part of our project's functioning. Some of the
major flaws can be :-
1. The teachers and guards we intend to find might not be using android phones.
2. Unavailability of good wifi signal strength in the area of interest.
3. RSSI (Recieved Signal Strength Identification) value may not be upto the mark
because of several environmental conditions.
4. Database collection is a vast process and their might be some errors in data collection
which may lead to error in position calculation process.
5. It might be possible that the user is not inside the mapped area.
15
METHODOLOGY ADOPTED
3
3.1INVESTIGATIVE TECHNIQUES
Table 4: List of various Investigative Projects Techniques
3.2PROPOSED SOLUTION
The objectives of the project listed above will be achieved in small steps as per the schedule and
plan. Firstly, received signal strength values will be calculated from the nearby access
points. These received signal strength values will then be used by matching them with the
entries in the database. These entries/fingerprints will help determining the current
location of the user.
Now, the user generates the request to locate a teacher, guard or a lab in the campus. Once the
request is generated the location of the desired entity is again searched and mapped based
on received signal strength values and then the shortest route is generated and displayed
on the user interface guiding the user to his destination.
Locating the user/entity is done based on fingerprinting and trilateration to improve the accuracy
of the indoor localization system. Trilateration will complement the received signal
strength values and help in determining the location with better precision and accuracy.
16
Once the data has been collected, an android app will be designed with a user- friendly interface
which will send data and receive data from the application server at the backend. All the
processing will be done remotely and the results will be displayed on the user’s interface.
Alternative flows of control will also be taken into account, by showing prompts to the user in
scenarios where the rights to access the teacher’s location have not been granted, or
whenever the signal strengths are weak enough to be matched with the fingerprints, etc.
Whenever signal strength is weak wrong location will not be shown to the user, a prompt
will be shown regarding the inconvenience caused by the app. Major attempts will be
made to update the database of fingerprints regularly to ensure that the fluctuations in the
received signal strength values have been taken into account.
17
3.3WORK BREAKDOWN STRUCTURE
3.4TOOLS AND TECHNOLOGIES USED
3.4.1 Tools Used
Hardware:
● Laptop/ Android phone
Software:
● LINSSID
● Spyder
● Android Studio
18
• Google maps API
• Wi-Fi fingerprinting
• Trilateration
19
DESIGN SPECIFICATIONS
4
4.1SYSTEM ARCHITECTURE
20
FIGURE 4: Component Diagram
4.3USER INTERFACE DIAGRAMS
21
FIGURE 5: User Interface Diagrams
4.4SNAPSHOTS OF WORKING PROTOTYPE MODEL
22
FIGURE 6: Home Page
23
FIGURE 7: Teacher’s Portal
24
CONCLUSION
5
5.1 CONCLUSION
The technology used by us to locate a teacher, lab, or a guard is solely based on the concept of
fingerprint matching and trilateration. We have been able to test the code in the
directorate in our campus area and have successfully inferred the results which are quite
accurate and close to the actual value of the co-ordinates of the points. Considering this
first step done, we now aim to make an android app where we would deploy the
technology used above in the indoor positioning system. All in all, this app will help
teachers as well as students to navigate in the campus by avoiding them to waste their
time in finding a teacher, guard or a lab.
5.3 Reflections
The innovation utilized by us to find an teacher, lab, or a guard is exclusively founded on the
idea of unique finger printing and trilateration. We have had the option to test the code in
the directorate in our grounds region and have effectively gathered the outcomes which
are very exact and near the genuine estimation of the co-ordinates of the focuses.
Considering this initial step done, we presently expect to make an android application
where we would send the innovation utilized above in the indoor situating framework.
25
REFERENCES
[1] Bolliger Philipp Lukas, “Robust Indoor Positioning through Adaptive Collaborative
Labeling of Location Fingerprints”, PhD‟s thesis, ETH Zurich,
http://e-collection.library.ethz.ch/eserv/eth:5267/eth-5267-02.pdf
[3] Faria Daniel B., “Modeling Signal Attenuation in IEEE 802.11 Wireless LANs – Vol. 1”,
Standord university, 2006
26