METHODS FOR LOCATING A MOBILE RADIOCOMMUNICATION DEVICE OR PASSIVE OBJECT IN A CONFINED ENVIRONMENT

20230204707 · 2023-06-29

    Inventors

    Cpc classification

    International classification

    Abstract

    Methods are provided for locating a mobile radio communication device with a receiver detecting electromagnetic identification signals broadcast by transmitters in a confined environment, or an object with a transmitter periodically broadcasting an electromagnetic identification signal detectable by a plurality of receivers of a localization infrastructure. The receiver of the mobile radiocommunication device, or the plurality of receivers of the localization infrastructure, determine identification data indicative of strength of received identification signals, forming an identification data matrix which is processed to obtain an identification data matrix with reduced noise, from which a characteristic identification vector is extracted including a characteristic identification data element for each transmitter or receiver. Position coordinates of the mobile radio communication device or of the object are determined by minimizing an error in calculating distances between position of the mobile radio communication device, or of the object, and position of at least three transmitters, respectively receivers.

    Claims

    1. A method for locating a mobile radio communication device in a confined environment, in particular a personal mobile radio communication device in possession of a user, equipped with receiving means for receiving electromagnetic signals, the method comprising: providing a localization infrastructure including a plurality of transmitters of electromagnetic signals in said confined environment, installed in predetermined sites of said confined environment, said transmitters each being adapted to periodically broadcast a respective electromagnetic identification signal, adapted to be detected by said receiving means of the mobile radio communication device; determining, by said receiving means of the mobile radio communication device, a plurality of identification data indicative of a strength of a received electromagnetic identification signal, starting from a plurality of received electromagnetic identification signals, from at least three transmitters of said plurality of transmitters, in a predetermined time interval or starting from a predetermined plurality of electromagnetic identification signals received over time; wherein respective pluralities of identification data acquired from said at least three transmitters form an identification data matrix; reducing noise from the identification data matrix to obtain an identification data matrix with reduced noise; extracting from said identification data matrix with reduced noise a characteristic identification vector including a characteristic identification data element for each of said at least three transmitters; and determining position coordinates of said mobile radio communication device in a predetermined reference system of the confined environment to which the transmitters belong, by minimizing an error in calculating distances between a position of said mobile radio communication device and a position of each of said at least three transmitters in solving a multilateration problem in which distance between the position of said mobile radio communication device and the position of each of said at least three transmitters is determined according to a predetermined function of the characteristic identification data element of the respective transmitter.

    2. A method for locating an object in a confined environment, the method comprising: providing transmitting means coupled to said object, adapted to periodically broadcast an electromagnetic identification signal; providing a localization infrastructure including a plurality of receivers in said confined environment, said receivers being adapted to detect said electromagnetic identification signal over time; determining, by at least three receivers of said plurality of receivers, a plurality of identification data indicative of a strength of a received electromagnetic identification signal, starting from a plurality of electromagnetic? identification signals received in a predetermined time interval or starting from a predetermined plurality of electromagnetic identification signals received over time, wherein respective pluralities of identification data acquired by said at least three receivers form an identification data matrix. reducing noise from the identification data matrix to obtain an identification data matrix with reduced noise; extracting from said identification data matrix with reduced noise a characteristic identification vector including a characteristic identification data element for each of said at least three receivers; and determining position coordinates of said object in a predetermined reference system of the confined environment to which the receivers belong, by minimizing an error in calculating distances between a position of said object and a position of each said at least three receivers in solving a multilateration problem in which distance between the position of said object and the position of each of said at least three receivers is determined according to a predetermined function of the characteristic identification data element of the respective receiver.

    3. The method for locating an object in a confined environment of claim 2, wherein said plurality of receivers of the localization infrastructure includes a first subset of fixed receivers, installed at predetermined sites in said confined environment, and a second subset of mobile receivers within said confined environment, said second subset of mobile receivers including mobile radio communication devices localized in said confined environment.

    4. The method for locating an object in a confined environment of claim 3, wherein said second subset of mobile receivers includes personal mobile radio communication devices in possession of users localized by the method of claim 1.

    5. The method for locating a mobile radio communication device in a confined environment of claim 1, further comprising applying a sequential Monte Carlo method to the determined position coordinates of said device, comprising: to each position of a predetermined set of discrete positions on a map of the confined environment, associating a weight indicative of a probability that said position corresponds to a real position of the device; updating weights based on a predetermined succession of determinations of the position coordinates over time and on map information indicative of environmental structures incompatible with the position of said device; and calculating a weighted center of gravity of the positions to obtain a final estimate of the position of the device.

    6. The method for locating an object in a confined environment of claim 2, further comprising applying a sequential Monte Carlo method to the determined position coordinates of said object, comprising: to each position of a predetermined set of discrete positions on a map of the confined environment, associating a weight indicative of a probability that said position corresponds to a real position of the object; updating weights based on a predetermined succession of determinations of the position coordinates over time and on map information indicative of environmental structures incompatible with the position of the object; and calculating a weighted center of gravity of the positions to obtain a final estimate of the position of the object.

    7. The method for locating a mobile radio communication device in a confined environment of claim 1, wherein each identification data element is also associated with a current position of the respective transmitter and a timestamp of detection of the respective electromagnetic identification signal.

    8. The method for locating an object in a confined environment of claim 2, wherein each identification data element is also associated with a current position of the respective receiver, and a timestamp of detection of the respective electromagnetic identification signal.

    9. The method for locating a mobile radio communication device in a confined environment of claim 1, wherein the receiving means of the mobile radio communication device are configured to determine an identification data element indicative of the strength of the received electromagnetic identification signal if the strength is greater than a predetermined threshold.

    10. The method for locating an object in a confined environment of claim 2, wherein each receiver of the plurality of receivers of the localization infrastructure is configured to determine an identification data element indicative of the strength of the received electromagnetic identification signal if the strength is greater than a predetermined threshold.

    11. The method for locating a mobile radio communication device in a confined environment of claim 1, wherein the extraction of a characteristic identification vector includes an extraction for each transmitter of a predetermined plurality of identification data with reduced noise acquired in the most recent time and a calculation of a characteristic identification data element starting from said plurality of identification data with reduced noise.

    12. The method for locating an object in a confined environment of claim 2, wherein the extraction of a characteristic identification vector includes an extraction for each receiver of the plurality of receivers of a predetermined plurality of identification data with reduced noise acquired in the most recent time and calculation of a characteristic identification data element starting from said plurality of identification data with reduced noise.

    13. The method for locating a mobile radio communication device in a confined environment of claim 11, wherein the calculation of a characteristic identification data element starting from said plurality of identification data with reduced noise includes calculating an average of said plurality of identification data with reduced noise acquired in the most recent time.

    14. The method for locating an object in a confined environment of claim 12, wherein the calculation of a characteristic identification data element starting from said plurality of identification data with reduced noise includes calculating an average of said plurality of identification data with reduced noise acquired in the most recent time.

    15. The method for locating a mobile radio communication device in a confined environment of claim 13, wherein said plurality of identification data with reduced noise acquired in the most recent time comprises the last two identification data elements with reduced noise acquired over time.

    16. The method for locating an object in a confined environment of claim 14, wherein said plurality of identification data with reduced noise acquired in the most recent time comprises the last two identification data elements with reduced noise acquired over time.

    17. The method for locating a mobile radio communication device in a confined environment of claim 1, wherein said noise reduction from the identification data matrix comprises a compact singular value decomposition of said identification data matrix resulting in a diagonal singular matrix, zeroing of a predetermined subset of singular values of said diagonal singular matrix and computation of an approximate identification data matrix of lower rank, in which the number of zero singular values is chosen according to the percentage of information contained in the identification data matrix.

    18. The method for locating an object in a confined environment of claim 2, wherein said noise reduction from the identification data matrix comprises a compact singular value decomposition of said identification data matrix resulting in a diagonal singular matrix, zeroing of a predetermined subset of singular values of said diagonal singular matrix and computation of an approximate identification data matrix of lower rank, in which the number of zero singular values is chosen according to the percentage of information contained in the identification data matrix.

    19. The method for locating a mobile radio communication device in a confined environment of claim 1, wherein reducing noise from the identification data matrix comprises applying a denoising autoencoder to said identification data matrix, which comprises a neural network that implements an encoder of the identification data matrix into a latent representation matrix of the identification data, and a decoder of said latent representation matrix of the identification data into an output identification data matrix with reduced noise by respective predetermined activation functions of weighted linear combinations of identification data of said identification data matrix and of said latent representation matrix of the identification data, in which said respective predetermined activation functions are a sine activation function and a linear activation function.

    20. The method for locating an object in a confined environment of claim 2, wherein reducing noise from the identification data matrix comprises applying a denoising autoencoder to said identification data matrix, which comprises a neural network that implements an encoder of the identification data matrix into a latent representation matrix of the identification data, and a decoder of said latent representation matrix of the identification data into an output identification data matrix with reduced noise by respective predetermined activation functions of weighted linear combinations of identification data of said identification data matrix and of said latent representation matrix of the identification data, in which said respective predetermined activation functions are a sine activation function and a linear activation function.

    21. The method for locating a mobile radio communication device in a confined environment of claim 19, wherein said denoising autoencoder is trained by feeding an input identification data matrix in which random noise components extracted from a Gaussian noise distribution are added to said identification data matrix, computing a reconstructed identification data matrix by the denoising autoencoder, and minimizing an error function which is the difference between the identification data matrix and the reconstructed identification data matrix.

    22. The method for locating an object in a confined environment of claim 20, wherein said denoising autoencoder is trained by feeding an input identification data matrix in which random noise components extracted from a Gaussian noise distribution are added to said identification data matrix, computing a reconstructed identification data matrix by the denoising autoencoder, and minimizing an error function which is the difference between the identification data matrix and the reconstructed identification data matrix.

    23. The method for locating a mobile radio communication device in a confined environment of claim 1, wherein minimizing the error in calculating the distances between the position of said mobile radio communication device and the position of each of said at least three transmitters comprises a resolution of a least squares optimization problem by minimization of a weighted norm of errors in calculating the distances defined as a weighted linear combination of the squares of said errors, in which values for weights are predetermined through an inversely proportional relationship between the distance and relative weight, and in which the distance between the position of said mobile radio communication device and the position of each one of said at least three transmitters is determined according to the relationship d i = { ( rssi i TxPower i ) C 1 se rssi i TxPower i 1 C 2 ( rssi i TxPower i ) C 3 + C 4 se rssi i TxPower i > 1 where TxPower.sub.i is the value of the strength of an electromagnetic identification signal at a predetermined reference unitary distance from a transmitter of the localization infrastructure and C.sub.1, C.sub.2, C.sub.3, C.sub.4 are predetermined constants.

    24. The method for locating an object in a confined environment of claim 2, wherein minimizing the error in calculating the distances between the position of said object and the position of each of said at least three receivers, comprises a resolution of a least squares optimization problem by minimization of a weighted norm of errors in calculating the distances defined as a weighted linear combination of the squares of said errors, in which values for weights are predetermined through an inversely proportional relationship between the distance and relative weight, and in which the distance between the position of said object and the position of each of said at least three receivers, is determined according to the relationship d i = { ( rssi i TxPower i ) C 1 se rssi i TxPower i 1 C 2 ( rssi i TxPower i ) C 3 + C 4 se rssi i TxPower i > 1 where TxPower.sub.i is the value of the strength of an electromagnetic identification signal at a predetermined reference unitary distance from a transmitting means coupled to said object, and C.sub.1, C.sub.2, C.sub.3, C.sub.4 are predetermined constants.

    Description

    BRIEF DESCRIPTION OF THE FIGURES

    [0040] Further characteristics and advantages of the invention will be set out in more detail in the following detailed description of its embodiments, given by way of non-limiting example, with reference to the attached drawings, in which

    [0041] FIG. 1 is a schematic representation of an object localization system according to a first embodiment of the invention;

    [0042] FIG. 2 is a schematic representation of an object location system in a second embodiment of the invention;

    [0043] FIG. 3 is a flow chart of the operations of the localization methods of the invention;

    [0044] FIG. 4 is a detail of some steps of the flow chart of FIG. 4; and

    [0045] FIG. 5 represents a standard configuration of a trilateration problem.

    DETAILED DESCRIPTION

    [0046] With reference to FIG. 1, a system for locating an object E in a confined environment is essentially shown, comprising transmitter means T coupled to said object adapted to periodically broadcast an electromagnetic identification signal S, for example according to a Bluetooth protocol, and a localization infrastructure including a plurality of electromagnetic signal receivers R in said environment, adapted to detect said identification signal over time. For the purposes of the invention, The R receivers are preferably three or more in number.

    [0047] In the figure, the receivers R are indicated R.sub.1, R.sub.2, R.sub.3, . . . , R.sub.N and are marked by the coordinates of their position in a reference system x, y of the environment, respectively (x.sub.1, y.sub.1), (x.sub.2, y.sub.2), (x.sub.3, y.sub.3), . . . , (x.sub.N, y.sub.N). Each of them receives the electromagnetic identification signal S emitted by the transmitting means T coupled to the object E, at different times and with different strengths due to its distance from the object. The strength of the received identification signal is respectively indicated RSSI.sub.1, RSSI.sub.2, RSSI.sub.3, RSSI.sub.N.

    [0048] The receivers R are in connection with a server V, associated with a database DB, and are arranged to determine a plurality of identification data indicative of the strength of the received identification signal, starting from a plurality of identification signals received in a predetermined time interval or starting from a predetermined plurality of identification signals received over time. For each receiver R.sub.i with i=1, . . . , N and N preferably greater than or equal to three, the identification data indicative of the strength of successive instances of the identification signal S periodically broadcast over time are indicated RSSI.sub.1i, . . . , RSSI.sub.Mi, where M is the number of instances of the identification signal considered and therefore the number of identification data. The plurality of identification data RSSI.sub.1i, RSSI.sub.Mi forms an identification vector.

    [0049] Advantageously, each identification data element is also associated with the current position of the relative receiver R.sub.i , indicated (x.sub.i, y.sub.i) and with a timestamp of detection of the related identification signal S (of each instance of the signal). In the case of simultaneous identification of a plurality of objects, an identification code of the object or of the transmitter associated with the object is also associated with each identification data element.

    [0050] The server V is programmed to perform a method according to the invention, which will be described in detail below, thus determining the distance between the position of the object E (indicated by the coordinates x.sub.i, y.sub.i) and the position of each of said receivers R.sub.i, indicated respectively d.sub.1, d.sub.2, d.sub.3, . . . , d.sub.N, based on the strength of the received identification signal.

    [0051] With reference to FIG. 2, a system for locating an object E in a confined environment is essentially shown, comprising transmitter means T coupled to said object adapted to periodically broadcast an electromagnetic identification signal S, for example according to a Bluetooth protocol, and a localization infrastructure including a plurality of electromagnetic signal receivers R in said environment, which includes a first subset of fixed receivers, installed in predetermined sites of the environment, indicated with R.sub.1 and R.sub.2 and a second subset of mobile receivers within the environment, R.sub.3 and R.sub.4, which includes (or which are included in) mobile radio communication devices at least temporarily present in the environment and localized in it, indicated with P.sub.1, and P.sub.2. The mobile radio communication devices P.sub.1, and P.sub.2 are preferably personal mobile radio communication devices in the possession of users or associated with moving means at least temporarily present in the environment.

    [0052] In FIG. 2 elements or components identical or functionally equivalent to those illustrated in FIG. 1 have been indicated with the same references already used in the description of FIG. 1, and everything that will not be described again is intended to be replicated according to the teachings provided with reference to the FIG. 1, to the extent that they are not incompatible therewith.

    [0053] The mobile radio communication devices P.sub.1, and P.sub.2 are localized in the environment (at positions x.sub.P1, y.sub.P1 and x.sub.P2, y.sub.P2) by any localization method, for example a method according to the invention, starting from a localization infrastructure including a plurality of transmitters B.sub.1, . . . B.sub.N of electromagnetic signals in said environment, installed in predetermined sites of said environment (whose positions are indicated x.sub.B1, . . . , x.sub.BN) and adapted to broadcast an identification signal S.sub.B over time, for example according to a Bluetooth protocol, adapted to be detected by the receiving means integrated in the mobile radio communication devices (and not shown here).

    [0054] For the purposes of the invention, the transmitters B.sub.1, . . . , B.sub.N are preferably three or more in number.

    [0055] The mobile radio communication devices P.sub.1 and P.sub.2 are arranged to determine a plurality of identification data indicative of the strength of the received identification signal, starting from a plurality of identification signals received in a predetermined time interval or starting from a predetermined plurality of identification signals received over time. For each transmitter B.sub.i with i=1, . . . , N and N preferably greater than or equal to three, the identification data indicative of the strength of successive instances of the identification signal S periodically broadcast over time can be indicated RSSI.sub.1i, . . . , RSSI.sub.Mi, where M is the number of instances of the identification signal considered and hence the number of identification data. The plurality of identification data RSSI.sub.1i, . . . , RSSI.sub.Mi, forms an identification vector. This notation, completely identical to the notation referred to with reference to the localization of an object, allows a single treatment of the data processing aspects, which will be described in more detail below.

    [0056] With reference to the architecture of FIG. 1, the transmitter T associated with the object E transmits the identification signal which is detected by the N receivers whose position is known. Each receiver sends the RSSI value relating to the detected signal to server V, for example a server in the cloud, associated with the database DB for storing the detections, and on which a program is installed for carrying out the localization method. The server is programmed to associate a vector of RSSI values to the detection, which will be transformed into a vector of distances, from which the position of the object E is calculated. The calculated coordinates are then stored in the database DB which represents the source of location information in real time for presentation to a user, for example location information can be shown on screen on a web portal or on an application residing on a smart device owned by a user U.

    [0057] With reference to the architecture of FIG. 2, the transmitter T associated with the object E transmits the identification signal which is detected by the N receivers whose position is known. The receivers comprise two fixed receivers and two mobile receivers. Each receiver sends the RSSI value relating to the detected signal to server V, for example a server in the cloud, associated with the database DB for storing the detections, and on which a program for carrying out the localization method is installed. In the case of receivers R.sub.1 and R.sub.2 the position is fixed and known a priori. In the case of the receivers R.sub.3 and R.sub.4, implemented by the mobile radio communication devices P.sub.1 and P.sub.2, each of them sends identification data of the same type to the server with the only difference that the position of the receiver is not fixed and is not known to priori, but calculated, for example on the mobile radiocommunication device P.sub.1 and P.sub.2 itself thanks to the presence of the B.sub.i Beacon transmitters of the infrastructure, which can also be integrated with the receivers R.sub.1 and R.sub.2. As in the previous case, the program for performing the localization method present on the server associates a vector of RSSI values to the scan, which will be transformed into a vector of distances, starting from which the position of the object E to be located is calculated. The calculated coordinates are then stored in the database DB which represents the source of location information in real time for presentation to a user, for example the location information can be shown on screen on a web portal or on a resident application on a smart device owned by a user U.

    [0058] FIG. 3 shows a flow diagram of the operations of the localization methods of the invention.

    [0059] At step 100 the identification signals transmitted by the object E to be located (i.e., by the transmitter previously associated with it) are scanned by the receivers R, which determine a corresponding plurality of identification data indicative of the strength of the identification signal received over time which in step 120 are transmitted and stored in the database DB.

    [0060] The set of steps indicated with 200 in the box includes the operations that, starting from the identification data stored in the database DB, provide the position of the object E as the final result.

    [0061] Assuming that one wishes to identify the position of an object E, to which a transmitter (Bluetooth Beacon) T is coupled, the first step of the localization algorithm 220 consists in receiving the identification signals S transmitted by the transmitter T of the object E to be located, through N reference anchors (receivers). The term “reference anchors” will refer from now on to receivers R or to the set of receivers R and mobile radio communication devices P.

    [0062] With the reception of the identification signals S, M values of signal strength are acquired, indicated RSSI.sub.j, with j=1, . . . , M, greater than a determined threshold, detected by each receiver. The number M of acquisitions is the number of acquisitions in a predetermined time interval, or a predetermined plurality of identification signals received over time. For example, if a transmitter is configured to emit an identification signal every 25 ms and the number of samples of the identification signal is preset to 10, each receiver, always listening, receives and sends to the server and to the associated database all the RSSI values detected at a constant scanning step every p seconds, with p preferably greater than or equal to 1 second, so that the identification data matrix contains the readings of a scan of 2.5 seconds long. At this point the identification data of the obtained identification data matrix can be associated with the current position of the related receiver and with a timestamp of detection of the related identification signal. In this way, a detection matrix is created, i.e., an identification data matrix, N×M, where N is the number of receivers, which is continuously updated by replacing the vector of older detections with the vector of more recent detections, and is stored continuously in the database DB.

    [0063] It is hence possible to associate the following matrix to a scan:

    [00001] R = ( RSSI 11 .Math. RSSI 1 N .Math. .Math. .Math. RSSI M 1 .Math. RSSI MN )

    [0064] The localization procedure is performed periodically and cyclically on the identification data stored in the database and coming from the reference anchors at each cycle, so that at the i-th cycle there are N M-tuple, (one M-tuple for each anchor reference) and the N×M matrix is subjected to the noise filtering procedure of the next step.

    [0065] Advantageously, the number of receivers is chosen on the basis of the size of the localization environment, while the scanning step, the size of the matrix, the duration of the acquisition interval of the identification signals and the threshold for the strength values of the identification signals are calibrated experimentally according to the environment and localization conditions, for example if it is necessary to provide the position data in a near real-time condition accepting a lower accuracy, or if greater accuracy and stability are required, but accepting a lower calculation frequency.

    [0066] The obtained identification data matrix R

    [00002] R = ( RSSI 11 .Math. RSSI 1 N .Math. .Math. .Math. RSSI M 1 .Math. RSSI MN )

    is subjected to filtering for noise reduction at step 240 thus obtaining an identification data matrix with reduced noise, i.e., whose data representing the strength of the identification signals detected over time contain a lower percentage of noise than the original signals.

    [0067] The filtering procedure returns a similar matrix at the output, containing however a lower percentage of noise, from which a characteristic vector of RSSI values representative of the detection carried out is extracted.

    [0068] As an example, two alternative filtering techniques are cited, which can be used according to the computing power available at the localization system, the truncated Singular Value Decomposition (SVD), a linear dimensionality reduction technique, and the Denoising autoencoder, a technique based on a class of neural networks. Both filters act on the overall matrix taking into account, in addition to the individual detections, the correlation between them. The detections relating to all objects at the same time are then considered if there are several objects to be localized in an environment.

    [0069] The SVD technique is a very effective technique of linear algebra, which provides the matrix of minor rank that best approximates the original.

    [0070] Given a matrix A of size m×n, with m>n, there is a factorization of the same, in the form:


    A=UΣV.sup.T

    being U and V the unit matrices of dimensions m×m and n×n respectively, V.sup.T the transpose of V, Σ a rectangular diagonal matrix of dimensions m×n, which has non-zero elements only when the row and column indices coincide. The matrix Σ is, therefore, of the form:

    [00003] ( σ 1 .Math. 0 .Math. .Math. .Math. 0 .Math. σ n 0 0 0 0 0 0 )

    whose non-zero values are in descending order σ.sub.1≥σ.sub.2≥. . . ≥σ.sub.n≥0 and are called singular values of A. Since m>n, the SVD of A can be represented in the following form:

    [00004] A ? = U ? × S n m × C = V ? ? indicates text missing or illegible when filed

    where S.sub.n×n=diag (σ.sub.1, σ.sub.2, . . . , σ.sub.n). This representation is called the “thin SVD” of A.

    [0071] The singular value decomposition returns the rank of the matrix, in fact the number of singular values of A is the rank of A.

    [0072] Let r be the rank of the matrix, then its corresponding SVD is written:

    [00005] ? ? indicates text missing or illegible when filed

    where u.sub.1, u.sub.2, . . . , u.sub.r are the columns of U.sub.m×r and v.sub.1, v.sub.2, . . . , v.sub.r are the columns of V.sub.n×r.

    [0073] The approximation of rank k (also called truncated or partial SVD) of A, A.sub.k with k<r, is given by zeroing the r−k singular values of A, that is:

    [00006] ? ? indicates text missing or illegible when filed

    [0074] The value of the individual σ.sub.i is linked to the amount of information contained within the member σ.sub.iu.sub.iv.sub.i.sup.T with respect to the totality of information contained within the matrix A.

    [0075] The following describes how to implement the truncated SVD technique in the filtering procedure.

    [0076] Considering R, the matrix of the detections to be subjected to filtering by SVD, and choosing Alpha, the percentage of variance to be kept, i.e., the amount of information contained in the matrix, K, the number of components to be kept within the truncated SVD, is calculated. Then, a return to the initial dimensional situation is made, performing the inverse of the SVD to return to a matrix of M×N dimensions, but containing less noise than the original.

    [0077] So, it is obtained the matrix:

    [00007] R = ( RSSI 11 .Math. RSSI 1 N .Math. .Math. .Math. RSSI M 1 .Math. RSSI MN )

    [0078] Autoencoders are a class of neural networks that have the aim of recreating the data provided at the input through back-propagation techniques. In detail, an Autoencoder comprises two parts, an encoder and a decoder, the encoder reads the input and compresses it into a compact representation (latent representation), the decoder reads the compact representation and recreates the input. In other words, the Autoencoder tries to learn the identity function by minimizing the error during the data reconstruction process; it therefore has an intrinsic ability to learn the latent compact representation of data.

    [0079] Autoencoders can be thought of as two neural networks, the first consists of the encoder, the second of the decoder. The encoder takes in a set of data x and transforms it through the transformation h:


    y=h(x)

    [0080] The decoder takes the encoded signal y as an input and decodes it through another transformation f:


    r=f(y)=f(h(x))

    being r the signal reconstructed by the Autoencoder.

    [0081] By defining the error e, as the difference between the original signal and the reconstructed signal:


    e=x−r

    network gets trained and learns by reducing the chosen loss function (for example the standard deviation).

    [0082] Denoising Autoencoders belong to the Autoencoder class, but the size of the hidden layer is greater than that of the input layer. A Denoising Autoencoder learns to recognize and remove the noise from the set of input data starting from an input consisting of the clean signal (x) to which a percentage of noise (N) is added.

    [0083] Following the transformations of the decoder and the encoder, the reconstructed signal is obtained


    r=f(h(x+N))

    [0084] By means of the back-propagation, the Autoencoder tries to reconstruct, from the corrupted input, the clean data set, minimizing the loss function relating to the error:


    e=x−r

    [0085] Through this process, the Autoencoder is stimulated to learn a function that removes the noise from the input data set.

    [0086] This type of learning presupposes having a large amount of clean signal available to which noise is artificially added, to be supplied to the auto-encoder in the training phase.

    [0087] In this case, it is not possible to have a clean signal. The idea is therefore to add noise N to the real signal x.sub.real (therefore naturally corrupted) and run the training step with the aim of minimizing the loss function relating to the error


    e=x.sub.real−f(h(x.sub.real+N))

    [0088] Assuming that the added noise N is of the same type as that present in x.sub.real, it is assumed that the autoencoder is able to learn a latent representation of the relationships between the various receivers and to reduce the percentage of noise present on x.sub.real.

    [0089] In the specific use case, x.sub.real, consists of the detection matrix

    [00008] R = ( RSSI 11 .Math. RSSI 1 N .Math. .Math. .Math. RSSI M 1 .Math. RSSI MN )

    [0090] The currently preferred Autoencoder includes 2 dense layers, one with a ‘sine’ activation function and the other with a linear activation function. A periodic activation function was chosen for the implicit representation of the network because it is more suitable for the representation of natural signals and their derivatives.

    [0091] Subsequently, in step 260 a characteristic identification vector is extrapolated that best represents the information contained in the identification data matrix.

    [0092] After the filtering, the matrix that is thus obtained is:

    [00009] R = ( RSSI 11 .Math. RSSI 1 N .Math. .Math. .Math. RSSI M 1 .Math. RSSI MN )

    [0093] Containing a lower percentage of noise than the matrix R.

    [0094] From the last lines of the matrix obtained, for example from the last two lines, which correspond to the most recent detections available, a characteristic identification vector is extrapolated containing the definitive RSSI values, which characterize the detection in question.

    [0095] The characteristic identification vector, which will be the input to the next phase of the multilateration procedure, is for example defined as follows, i.e., the vector r′ is made up of the average of the last two rows of the matrix R′:

    [00010] r = ( RSSI M - 1 , 1 + RSSI M , 1 2 , .Math. , RSSI M - 1 , N + RSSI M , N 2 )

    [0096] Steps 240 and 260 are schematized in the notation of FIG. 4.

    [0097] At step 280 the operations which calculate the position of the object from the characteristic identification vector are carried out. Specifically, from each value representative of the strength of the identification signals received, the distance between the object E and each receiver of the localization infrastructure that has received an identification signal emitted by the transmitter associated with the object with strength above the threshold is calculated, thus transforming the vector of RSSI values into a vector of distances. Starting from the calculated distance data, least squares optimization techniques are implemented for the resolution of a multilateralization problem between the positions of the receivers and the position of the object (unknown) and for the consequent calculation of the coordinates the position of the object. The standard configuration of a trilateration problem with three receivers (reference anchors) is shown in FIG. 5.

    [0098] Be it assumed that each irreducible area of the environment, that is, each minimum area that is not intended to be further subdivided, corresponds to a respective point of a map of the environment, uniquely identified by the pair of coordinates (x, y) in a predetermined reference system of the environment.

    [0099] Let P be the target point whose coordinates (x, y) are to be determined and let P.sub.i(x.sub.i, y.sub.i), being i∈(1, . . . , N) the known positions of the reference anchors.

    [0100] In order to set up an optimization problem, whose minimum returns the position P (x, y) of the target point, the following system of equations is set up:

    [00011] { ( x 1 - x ) 2 + ( y 1 - y ) 2 - d 1 2 = e 1 ( x 2 - x ) 2 + ( y 2 - y ) 2 - d 2 2 = e 2 ( x 3 - x ) 2 + ( y 3 - y ) 2 - d 3 2 = e 3

    [0101] Each equation of the system is the result of applying the Pythagorean theorem to each single right triangle which has the hypotenuse d.sub.i, with i∈(1,2,3).

    [0102] In order to choose the coordinates (x, y) such that the sum of the rejects is minimal, the following function is defined:


    ƒ:R.sup.2.fwdarw.R.sup.3

    being:

    [00012] f ( x , v ) == ( f 1 ( x , y ) , f 2 ( x , y ) , f 3 ( x , y ) ) = ( ( x 1 - x ) 2 + ( y 1 - y ) 2 - d 1 2 , ( x 2 - x ) 2 + ( y 2 - y ) 2 - d 2 2 , ( x 3 - x ) 2 + ( y 3 - y ) 2 - d 3 2 )

    [0103] The goal is to minimize the function ƒ. The weighted norm ∥.∥w has been chosen as reference metric, and it is defined as follows


    ∥ƒ(x,y)∥.sub.w.sup.2=ƒ(x,y).sup.T.Math.W.Math.ƒ(x,y)

    and the weight matrix W is a diagonal one:

    [00013] W = ( w 11 0 0 0 w 22 0 0 0 w 33 )

    [0104] The problem then boils down to solving the following minimum problem:

    [00014] ( x * , y * + S ( x , y )

    being

    [00015] S ( x , y ) = .Math. f ( x , y ) .Math. W 2 = .Math. i = 1 3 w ii f i 2 ( x , y )

    [0105] For the sake of simplicity, the case with the minimum number of reference anchors necessary to set up a trilateration problem was presented. Indeed, in real cases, the reference anchors are, in most cases, more than three. The generalization of the minimum problem is expressed by the following formula:

    [00016] S ( x , y ) = .Math. f ( x , y ) .Math. W 2 = .Math. i = 1 3 w ii f i 2 ( x , y )

    [0106] The search for the coordinates of the position point of the object is then led back to the solution of a nonlinear least squares optimization problem.

    [0107] The preferred method for solving this problem is the Levenbarg-Marquardt method. To set the function to be minimized, it is necessary to know the following elements: [0108] the coordinates of the reference anchors (xi, yi) with i∈(1, . . . , N), [0109] the distances between the target point and each reference anchor di with i∈(1, . . . , N), [0110] the weights w.sub.ii with i∈(1, . . . , N).

    [0111] The coordinates of the reference anchors are known, as they are recorded when the technology is installed.

    [0112] Considering the characteristic identification vector r′=(RSSI′.sub.1, . . . , RSSI′.sub.N that identifies a detection relating to a given position, we define below the formulas for obtaining the related distances di and the related weights Wi with i∈(1, . . . , N).

    [0113] The distance between the target point and the i-th reference anchor is calculated with the following formula

    [00017] d i = { ( rssi i TxPower i ) C 1 se rssi i TxPower i 1 C 2 ( rssi i TxPower i ) C 3 + C 4 se rssi i TxPower i > 1

    [0114] where TxPower.sub.i indicates the RSSI value expected at a distance of one meter from the transmitter and C.sub.1, C.sub.2, C.sub.3, C.sub.4 are constants obtained experimentally. The values for the weights w.sub.ii are experimentally optimized and are calculated using a formula which expresses an inversely proportional non-linear relationship of decreasing type between the distance and the relative weight. The solution of the minimum problem will be the calculated position.

    [0115] The position of the object thus obtained is preferably subjected in step 300 to the application of a particle filter, that is a sequential Monte Carlo method, to obtain a definitive position as accurate as possible.

    [0116] It is a post processing technique which acts on the positions, unlike the SVD and Autoencoder filters which act on the RSSI readings which are used to calculate the position.

    [0117] The general structure of the particle filter consists of the following steps: [0118] 1) generating a set of particles which in the present case consist of a predetermined set of discrete positions on the map. Each particle is associated with a weight (a probability) which quantifies how much that position is close to the real position of the entity being traced. The initialization of the particles takes place with weights of equal measure before starting the localization method; [0119] 2) moving the particles with respect to a random orientation and a pre-defined step, where the orientation can be given by the gyroscope in the case of localization of a mobile radio communication device or fixed and pre-defined in the case of localization of an object; [0120] 3) updating the particle weights based on the position measurements at the current state and on the information relating to the map (presence of walls and obstacles in the environment, to whose corresponding points a null probability is associated). [0121] 4) rejecting the particles with weight=0 and replacing them with copies of the most probable particles; and [0122] 5) calculating the weighted center of gravity of the particles, that is the weighted average of their coordinates for the relative probabilities to obtain the final estimate of the position of the object. Particle probabilities are built from a predetermined sequence of measurements over time. For example, if the position calculated at time to is subjected to the particle filter, this position is surrounded by a set of other positions (particles) for each of which a weight is calculated based on the previously calculated positions (for example, at the times tn−5, tn−4, tn−3, tn−2, tn−1) and on the presence of walls and obstacles on the map. Therefore, the set of points whose centre is calculated is formed by the particles created and weighed on the basis of the state of the previous particle system.

    [0123] Each calculated position is therefore affected by the previous measurements. This leads to an increase in the stability of the process result.

    [0124] Of course, the principle of the invention remaining the same, the embodiments and the particular implementations may be widely varied with respect to what has been described and illustrated purely by way of non-limiting example, without thereby departing from the scope of protection of the invention defined by the attached claims.