<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Experiments on Robust Indoor Localization of Mobile Devices Using Interval Arithmetic</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stefania Monica</string-name>
          <email>stefania.monica@unipr.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fisiche e Informatiche</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Universita` degli Studi di Parma 43124 Parma</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <fpage>14</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>-The lack of techniques and tools to estimate the position of mobile devices with high accuracy and robustness is one of the major causes that limit the provision of advanced location-based services in indoor environments. An algorithm to enable mobile devices to estimate their positions in known indoor environments is discussed in this paper under the assumption that fixed network nodes are available at known locations. The discussed algorithm is designed to allow devices to estimate their positions by actively measuring the distances from visible fixed nodes. In order to reduce the errors introduced by the arrangement of the fixed nodes in the environment, the discussed algorithm transforms the localization problem into an optimization problem, which is then solved using interval arithmetic. Experimental results on the use of the discussed algorithm with distance estimates obtained using ultra-wide band are presented to assess the performance of the algorithm and to compare it with a reference alternative. Presented experimental results confirm that the discussed algorithm provides an increased level of robustness with respect to the considered reference alternative with no loss of accuracy. Index Terms-localization as optimization, indoor localization, ultra-wide band, software agents</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>The possibility of robustly associating an accurate position
with a mobile device in an indoor environment has recently
become a major feature needed to increase the level of
personalization of services and applications offered to users
(e.g., [1]–[3]). Robust and accurate indoor localization can be
used, for example, to personalize and increase the interactivity
of visits to art exhibitions by means of educational games
(e.g., [4]), it can be used to support the automation of work in
warehouses (e.g., [5]), and it can be used to extend the services
of location-based social networks (e.g. [6]) to large indoor
areas like shopping malls, train stations, and airports. Solutions
to problems related to indoor localization can be found in
recent literature (e.g., [7]–[9]), but the general problem of
enabling a mobile device to accurately and robustly estimate
its position in a known environment is still an open issue
(e.g., [10], [11]) even if specific technologies like Ultra-Wide
Band (UWB) (e.g., [12], [13]) are readily available.</p>
      <p>Software agents are expected to play a relevant role in the
delivery of mentioned services and applications (e.g., [14])
because agents are normally characterized as situated entities
capable of exhibiting context-aware behaviors. With this
respect, the position can be considered as just another context
information that agents can use to bring about their goals.
Therefore, the use of the position to enrich the behaviors of
agents is expected to be simple and effective. This is the reason
why the algorithm used to run the experiments documented
in this paper was implemented as an extension of the
localization add-on module (e.g. [15]) for JADE (e.g., [16]).
The localization add-on module for JADE is responsible
for providing timely information to agents regarding their
positions using one of the available localization algorithms.
Actually, the localization add-on module extends a JADE
container (e.g., [16]) executed on a mobile device with the
possibility of interfacing the sensors of the device to obtain the
low-level information needed to apply the chosen localization
algorithm. The estimated position of the device is then passed
to interested agents hosted by the container so that they can
use it to bring about their goals. Note that, besides available
localization algorithms, additional algorithms like the one
discussed in this paper can be easily integrated in the add-on
module provided that they implement a specific Java interface.</p>
      <p>The discussions in this paper are focused on the general
problem of allowing a mobile device, denoted as Target Node
(TN), to estimate its position inside an indoor environment
with known geometry under the assumption that fixed network
nodes, denoted as Anchor Nodes (ANs), are installed at known
locations. One of the major assumption of this work is that
mobile devices can actively measure the distances from the
ANs installed in the environment using one of the available
ranging technologies. An average error of 1 m in the estimation
of positions is considered acceptable for targeted application
scenarios, and experimental results discussed in Section V
show that such an accuracy is feasible using the discussed
localization algorithm when ranging information are obtained
using UWB. With minor loss of generality, it is assumed that
the considered indoor environment is composed of possibly
overlapping rectangular cuboids, called boxes in this paper to
follow a consolidated nomenclature. Under this assumption, it
is possible to focus the hunt for TNs in the environment on
the single boxes that compose the environment, and therefore
the localization problem can be simplified by considering
only box-shaped environments. Observe that the minimum
bounding box containing the considered environment can be
used if the environment cannot be split into boxes, but, in this
case, estimated positions of TNs should be filtered accordingly.
One of the problems that make indoor localization difficult
is related to the fact that the positions of ANs in the
environment strongly affect the accuracy of ordinary localization
algorithms (e.g., [17], [18]), like the Two-Stage
MaximumLikelihood (TSML) [19] algorithm discussed in Section V. In
particular, a significant loss of the accuracy provided by such
algorithms is normally observed when ANs are not positioned
properly in the environment. Such a problematic characteristic
of ordinary localization algorithms is critical for indoor
environments because ANs are normally located near the ceilings
of rooms, which is an arrangement that exacerbates the
mentioned problem. The choice of installing all ANs at (roughly)
the same height near the ceilings of rooms degrades the
performance of ordinary localization algorithms because some
of the matrices involved in computations become strongly
illconditioned (e.g., [5], [20]). Unfortunately, the choice of the
positions of ANs in indoor environments is often dictated by
practical considerations intended, for example, to limit the
interference caused by people and furniture, and to maximize
coverage. Therefore, the positions of ANs cannot be changed
just to limit the mentioned problem of ordinary localization
algorithms. The remainder of this paper is devoted to study
the robustness of an alternative algorithm in situations in
which the accuracy of ordinary algorithm degrades sensibly.
Experimental results presented in Section V show that the
accuracy of the studied algorithm is acceptable even when
the accuracy of the TSML algorithm, which is used as a point
of reference, degrades sensibly.</p>
      <p>This paper is organized as follows. Section II introduces
adopted notation. Section III describes the adopted approach
to localization. Section IV describes the discussed algorithm
and briefly presents its characteristics. Section V reports the
results of the experimental campaign performed to assess
the robustness of the studied algorithm. Finally, Section VI
concludes the paper.</p>
      <p>II. NOTATION</p>
      <p>This section summarizes the notation commonly used to
study real functions of several real variables, as it is used to
present the localization problem and the discussed algorithm in
the following sections. The set of natural numbers, including
zero, is denoted as N and the set of positive natural numbers
is denoted as N+. Given n ∈ N+, a multi-index I ∈ Nn is
defined as an n−tuple of natural numbers
n</p>
      <p>I = (i1, i2, . . . , in) = (ik)k=1.</p>
      <p>Note that it is a common notation to use an uppercase letter to
denote a multi-index and to use the same letter, but lowercase
and with a subscript, to denote its components. The following
notation is adopted to use a multi-index I ∈ Nn as an exponent
for t ∈ Rn with t = (t1, t2, . . . , tn) = (tk)kn=1
n
tI = Y tikk .</p>
      <p>
        k=1
Note that it is a common notation to use a boldface letter
to denote an n−tuple of real numbers, and the same letter,
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
but lightface and with a subscript, for its components. Also
note that the common understanding of 00 = 1 is adopted
consistently throughout this paper.
      </p>
      <p>Given two multi-indices I ∈ Nn and J ∈ Nn, they can be
compared using the following partial order</p>
      <p>I ≤ J ⇐⇒ i1 ≤ j1 ∧ i2 ≤ j2 ∧ · · · ∧ in ≤ jn
and they can also be added componentwise</p>
      <p>I + J = (i1 + j1, i2 + j2, . . . , in + jn).</p>
      <p>The following abbreviation is introduced for multi-indices
H ∈ Nn, I ∈ Nn, and J ∈ Nn to express repeated sums
X (·)</p>
      <p>=
H≤I≤J
j1
X
j2
X · · ·
jn</p>
      <p>
        X (·).
i1=h1 i2=h2
in=hn
Note that H is omitted in (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), so that only I ≤ J remains, if
it is the null multi-index (0)kn=1.
      </p>
      <p>
        The multi-index notation is particularly well-suited to study
polynomial functions. A polynomial function p : Rn 7→ R of
n ∈ N+ real variables with real coefficients can be written as
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
where {aI }I≤L ⊂ R is the set of the coefficients of p and
multi-index L ∈ Nn is the multi-degree of p.
      </p>
      <p>
        Observe that the localization algorithm discussed in this
paper works by studying the bounds of polynomial functions
over boxes. Hence, it is worth recalling the following notation
for intervals and boxes. A closed (real) interval from a ∈ R
to a ∈ R is denoted as
[a, a] = {x ∈ R : a ≤ x ≤ a},
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
and it equals the empty set if and only if a &gt; a. A
singleton (real) interval that contains only a ∈ R is denoted
as [a] = [a, a]. Given n ∈ N+, a (real) box B ⊂ Rn from
b = (bk)k=1 ∈ Rn to b = (bk)kn=1 ∈ Rn is denoted as
n
B = [b, b] = [b1, b1] × [b2, b2] × · · · × [bn, bn],
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
and it equals the empty set if and only if bi &gt; bi for some
1 ≤ i ≤ n. Note that the notation Bi = [bi, bi] ⊂ R with
1 ≤ i ≤ n is used to refer to the closed intervals that compose
the nonempty box B. Also note that the notation Bi→W is
used to refer to the box obtained by replacing the i−th closed
interval that composes the nonempty box B with the nonempty
closed interval W ⊂ R.
      </p>
      <p>
        Interval arithmetic (e.g., [21]) uses the introduced
notation to express computations whose arguments and results
are closed intervals. Given two nonempty closed intervals
A = [a, a] ⊂ R and C = [c, c] ⊂ R, they can be added
A + C = [a + c, a + c],
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
and they can be multiplied
      </p>
      <p>
        A · C = [min{a c, a c, a c, a c}, max{a c, a c, a c, a c}]. (
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
In both cases the result is a nonempty closed interval. Note that
the product among intervals can be used to define the m−th
power of a closed interval A ⊂ R, where m ∈ N+. Also note
that the convention [0]0 = [1] is adopted consistently in this
paper. Given n ∈ N+, a nonempty box B ⊂ Rn, and a
multiindex I ∈ Nn, the following notation that uses only products
among intervals is normally used
n
BI = Y Bjij .
      </p>
      <p>
        j=1
Using the introduced notation, which is typical of interval
arithmetic, a polynomial function p : Rn 7→ R of n ∈ N+
real variables with real coefficients can be extended to work
on boxes. If the function is expressed as in (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ), then for any
box B ⊂ Rn
p(B) =
      </p>
      <p>X[aI ]BI ,
I≤L
where the notation for singleton intervals is used to treat the
coefficients of the polynomial function as closed intervals.
Observe that it is easy to prove that the result of the evaluation
of p(B) is a closed interval that includes the range of p over
box B (e.g. [21]).</p>
    </sec>
    <sec id="sec-2">
      <title>III. LOCALIZATION AS OPTIMIZATION</title>
      <sec id="sec-2-1">
        <title>The localization as optimization approach was proposed</title>
        <p>
          in previous works (e.g., [5], [20]) with the aim of reducing
the loss of accuracy that characterizes ordinary algorithms
for critical arrangements of the ANs, as briefly recalled in
Section I. The localization as optimization approach is based
on the possibility of rewriting any localization problem into a
related optimization problem, which can then be solved using
one of the algorithms documented in the vast literature on
optimization. Observe that many of the optimization
algorithms available in the literature still have problems related
to ill-conditioned matrices. Therefore, specific attention must
be paid to the choice of a proper optimization algorithm in
order to guarantee that the reformulation of the localization
problem in terms of an optimization problem would lead to
high accuracy in scenarios where the arrangements of ANs is
critical. This is the reason why, among the large number of
optimization algorithms, the use of Particle Swarm Optimization
(PSO) [22] was chosen for initial experiments. Experimental
results (e.g., [5], [20]) showed that the use of PSO to
implement localization as optimization proved to be effective in
solving the loss of accuracy caused by critical arrangements
of ANs. Unfortunately, PSO has two severe issues that limits
its applicability to solve practical localization problems. First,
just like all other general optimization algorithms, PSO does
not guarantee that global extrema of studied functions are
computed in finite time. Second, the performance of the PSO
algorithm depends on a set of parameters whose optimal
values can be determined only by simulating the behavior
of the algorithm in the considered environment. Therefore,
alternatives to the use of PSO to implement localization as
optimization are under experimentation. Among them, the
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
algorithm briefly recalled in Section IV is a specific
instantiation of an algorithmic framework proposed in an upcoming
paper. Interested readers can obtain from authors a preprint
of the paper where the algorithmic framework is proposed
and studied. In the remainder of this section, the approach of
localization as optimization is recalled for the tridimensional
case for the sake of clarity and to fix the adopted notation.
        </p>
        <p>A set of m ≥ 4 ANs is positioned at fixed and known
locations in the considered indoor environment. The position
of the i−th AN is denoted as ai ∈ R3 with 1 ≤ i ≤ m. The
true position of the TN is denoted as t ∈ R3, and the true
distance between the TN and the i−th AN is</p>
        <p>ri = ||t − ai||.</p>
        <p>
          Note that (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ) can be used to try to compute the position
estimate ˜t. Unfortunately, even if (
          <xref ref-type="bibr" rid="ref14">14</xref>
          ) always has a single
solution, (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ) may not have a single solution because of the
errors introduced in the estimation of distances. In general,
(
          <xref ref-type="bibr" rid="ref16">16</xref>
          ) may have no solutions, and only rarely it has one solution.
        </p>
        <p>
          Note that (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ) can be rewritten in matrix notation as follows
1m˜t⊺˜t − 2A˜t = k˜,
where 1m ∈ Rm is a vector whose components are all equal to
1, k˜ ∈ Rm is a vector whose i−th element is k˜i = r˜i2 − ||ai||2,
and A is the following m × 3 anchor matrix
 a1⊺ 
        </p>
        <p>a⊺
A =  a...⊺2  .</p>
        <p>m
The geometry of the problem suggests that the position of the
TN can be found by intersecting m spheres, the i−th of which
is centered at ai and has radius ri
The localization problem is the problem of finding estimates
of the position of the TN provided that the distances between
the TN and each AN are estimated using one of the available
ranging technologies. The estimated position of the TN is
denoted as ˜t ∈ R3, while the estimated distance between the
TN and the i−th AN is</p>
        <p>r˜i = ||˜t − ai||.</p>
        <p>
          Therefore, the estimated position ˜t of the TN is expected to
satisfy the following system of nonlinear equations, which is
obtained by exchanging the true values with their
corresponding estimated values in (
          <xref ref-type="bibr" rid="ref14">14</xref>
          )
 ||t − a1||2 = r1
        </p>
        <p>2
 ||t − a2||2 = r2</p>
        <p>2

.
.</p>
        <p>.

 2
 ||t − am||2 = rm
 ||˜t − a1||2 = r˜1</p>
        <p>2
 ||˜t − a2||2 = r˜2</p>
        <p>
          2


 2
 ||˜t − am||2 = r˜m
Many localization algorithms (e.g., [18]) perform algebraic
manipulations of matrices whose entries depend on the
positions of the TN and of the ANs. The matrices involved
in such computations can become ill-conditioned in critical
situations, and this represents one of the inherent problems
of such algorithms. For example, it is evident from (
          <xref ref-type="bibr" rid="ref18">18</xref>
          ) that
the anchor matrix is rank deficient if all ANs are placed at the
same height because the entries in its last column are all equal.
As discussed in detail in Section V, the TSML algorithm is not
applicable if all ANs are installed at the same height because
it would require to invert a singular matrix. Similarly, if the
heights of the ANs are not exactly the same, but they are
sufficiently close, the TSML algorithm produces large errors
because the matrix to be inverted is strongly ill-conditioned.
        </p>
        <p>
          If (
          <xref ref-type="bibr" rid="ref17">17</xref>
          ) has exactly one solution, such a solution can be
computed by using the equations of the system to state a proper
minimization problem. Actually, the solution ˜t of (
          <xref ref-type="bibr" rid="ref17">17</xref>
          ), which
is the estimated position of the TN, can be found by solving
the following minimization problem
˜t = argmin f (x),
x∈D
(
          <xref ref-type="bibr" rid="ref19">19</xref>
          )
where D ⊆ R3 is the region of space where the TN is
supposed to be located, and f : D 7→ R is the function to
be minimized, normally called localization cost function
f (x) = ||1mx⊺x − 2Ax − k˜||2.
(
          <xref ref-type="bibr" rid="ref20">20</xref>
          )
Even if (
          <xref ref-type="bibr" rid="ref17">17</xref>
          ) does not have exactly one solution, the
reformulation of (
          <xref ref-type="bibr" rid="ref17">17</xref>
          ) in terms of a minimization problem can
still provide an estimate of the position of the TN. Note that
function f is a polynomial function of three variables whose
multi-degree is L = (
          <xref ref-type="bibr" rid="ref4 ref4 ref4">4, 4, 4</xref>
          ). Also note that since it is assumed
that the indoor environment can be split into disjoint boxes,
D can be considered as a box without loss of generality.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>IV. THE POSTI ALGORITHM</title>
      <p>The Polynomial Optimization using Subdivision Trees
(POST) algorithmic framework is introduced in an upcoming
paper as an effective means to support the localization as
optimization approach described in previous section. The POST
framework is completed with a suitable method to compute
lower and upper bounds of polynomial functions to obtain an
algorithm to solve the minimization problems derived from
localization problems. In this paper, the instantiation of the
POST framework that uses interval arithmetic to compute
lower and upper bounds of polynomial functions over boxes,
normally called POSTI algorithm, is described. The
experimental results presented in Section V were obtained using an
implementation of the POSTI algorithm integrated within the
localization add-on module for JADE recalled in Section I.</p>
      <p>
        The POSTI algorithm uses classic results from the literature
on interval arithmetic (e.g., [21]) to compute lower and upper
bounds of a given polynomial function over a given box. Then,
the POSTI algorithm uses such bounds to drive an ordinary
subdivision method to solve the minimization problem at hand.
In detail, the POSTI algorithm is based on the possibility of
rewriting a localization problem into a related optimization
problem that aims at finding a global minimum of the
localization cost function f defined in (
        <xref ref-type="bibr" rid="ref20">20</xref>
        ). Given that one of
the adopted assumptions in this paper is that the considered
environment can be split into possibly overlapping boxes, as
discussed in Section I, the considered minimization problems
can be restricted to boxes. In summary, the POSTI algorithm
estimates the position of the TN by finding a global minimum
of a polynomial function f of n = 3 variables and
multidegree L = (
        <xref ref-type="bibr" rid="ref4 ref4 ref4">4, 4, 4</xref>
        ) over a given box, which corresponds to
the considered indoor environment.
      </p>
      <p>Note that the accuracy of the POSTI algorithm does not
depend on the positions of the TN or of the ANs, and therefore
it can be used when the accuracy of ordinary algorithms,
like the TSML algorithm, degrades sensibly. In addition, note
that experimental results discussed in Section V show that
the POSTI algorithm ensures an accuracy of localization
comparable to the accuracy of the TSML algorithm when the
arrangement of ANs is not critical. The comparison with the
TSML algorithm is particularly relevant because the TSML
algorithm is an accepted reference to assess the performance
of localization algorithms. Actually, the TSML algorithm is
particularly relevant in the context of localization because it is
proved [23] that it can attain the Crame´r-Rao lower bound [24]
for the position estimator.</p>
      <p>
        The literature on nonlinear programming proposes several
algorithms to minimize a polynomial function. When the
minimum is searched in a box, as in the scenarios considered
in this paper, most of the minimization algorithms make use
of the properties of the Bernstein polynomial basis (e.g., [25]
for a comprehensive review of the subject and a historical
retrospective). Actually, well-known properties of the Bernstein
polynomial basis can be used to compute lower and upper
bounds of a polynomial function over a given box, and such
bounds can be used to drive the subdivision of the box using
a branch-and-bound approach in search for a global minimum
(e.g., [26]). In particular, for each subdivision, the so called
Bernstein coefficients are computed on the two resulting
subboxes, and such coefficients are used to obtain the needed
lower and upper bounds of the polynomial function for the two
sub-boxes. Unfortunately, such an approach is problematic in
terms of computational cost when the polynomial function to
minimize is obtained from a localization problem because of
the number n = 3 of variables and because of multi-degree
L = (
        <xref ref-type="bibr" rid="ref4 ref4 ref4">4, 4, 4</xref>
        ) of the polynomial function. Even if effective
algorithms for the computation of Bernstein coefficients are
available (e.g., [27]–[31]), a total of 125 Bernstein coefficients
are needed for each considered sub-box in the worst case, and
preliminary tests showed that needed computation cost is too
high for the intended applications of indoor localization briefly
mentioned in Section I.
      </p>
      <p>
        Classic results from the literature on interval arithmetic can
be used to compute lower and upper bounds for a given
polynomial function over a given box instead of using the bounds
provided by Bernstein coefficients. The bounds obtained from
the application of interval arithmetic are typically less strict
than the bounds obtained using Bernstein coefficients, but the
needed computation cost for n = 3 variables and multi-degree
L = (
        <xref ref-type="bibr" rid="ref4 ref4 ref4">4, 4, 4</xref>
        ) is reduced and it is compatible with the intended
applications of indoor localization. In particular, the following
proposition can be used to compute lower and upper bounds
of a polynomial function over a box. The proposition is shown
without proof because it is a classic result of the literature on
interval arithmetic (e.g., [21]).
      </p>
      <p>
        Proposition 1: Given a polynomial function p : Rn 7→ R of
n ∈ N+ variables with multi-degree L ∈ Nn
(
        <xref ref-type="bibr" rid="ref21">21</xref>
        )
(
        <xref ref-type="bibr" rid="ref22">22</xref>
        )
if B = [b, b] ⊂ Rn is a box from b ∈ Rn to b ∈ Rn, then
p ≤ min p(x)
x∈B
max p(x) ≤ p,
x∈B
where p(B) = [p, p] is computed using interval arithmetic.
      </p>
    </sec>
    <sec id="sec-4">
      <title>V. EXPERIMENTAL RESULTS</title>
      <p>In order to test the applicability of the POSTI algorithm for
indoor localization, an experimental campaign was performed
in an indoor environment, as discussed in this section.
Results were obtained using a commercial Android smartphone
equipped with the necessary hardware and software to
communicate with UWB tags and to derive distance estimates
from the time of flight of UWB signals. The smartphone used
for experiments was a SpoonPhone, produced by BeSpoon
(www.bespoon.com), which is, to the best of our knowledge,
the only commercial smartphone equipped with a dedicated
programming interface to easily estimate the distance between
the smartphone and a paired UWB tag. In the considered
experiments, four UWB tags were used as active ANs and
distance acquisition was performed by the SpoonPhone, which
was used as TN. The collected distance estimates were then
processed according to the POSTI algorithm to obtain
estimates of the position of the TN. In order to compare the
performance of the POSTI algorithm with that of a known
and appreciated algorithm, the distance estimates passed to
the implementation of the POSTI algorithm were also passed
to the implementation of the TSML algorithm that is readily
available in the localization add-on module for JADE.</p>
      <p>The indoor environment used to perform reported
experiments is a 4 m wide, 10 m long, and 3 m tall corridor. All
obstacles were removed from the corridor during experiments
to guarantee that all ANs were in line of sight with the
TN, and to reduce errors caused by multipath interference.
Four different scenarios were considered, which correspond
to different configurations of the ANs. For each scenario,
twelve different positions of the TN were considered. Such
positions are shown as red dots in Fig. 1, which also shows a
schematization of the considered environment. Three different
heights for the TN were considered, i.e., 3 m (near the ceiling),
1.5 m, and 0 m (near the floor). The four positions of the TN
near the ceiling of the corridor are associated in Fig. 1 with
3
numbers from 1 to 4, and their coordinates are expressed in
meters in the coordinate system shown in the figure as</p>
      <p>The four positions of the TN whose heights are all equal
to 1.5 m are associated with numbers from 5 to 8, and
their coordinates are expressed in meters in the considered
coordinate system shown in Fig. 1 as</p>
      <p>The four positions of the TN near the floor are associated with
numbers from 9 to 12, and their coordinates are expressed in
meters in the coordinate system shown in the figure as
where t is the true position of the TN and ˜t is the estimated
position of the TN. Since four different scenarios
corresponding to four different arrangements of the ANs were studied,
and since experimental results were derived in correspondence
of twelve positions of the TN for each scenario, a total of
48 experimental configurations were considered. For each
considered experimental configuration, r = 100 estimates of
the distance between the TN and each AN were acquired,
and such estimates were used to derive r position estimates
using the POSTI algorithm. Then, r position estimates were
also derived by processing the same distance estimates with
the TSML algorithm. Finally, the average and the standard
deviation of the Euclidean norm of e over the r acquisitions
obtained using the POSTI algorithm, denoted as eP and
σP , were computed together with the corresponding values,
denoted as eT and σT , obtained using the TSML algorithm.</p>
      <sec id="sec-4-1">
        <title>A. Scenario 1</title>
        <p>
          In the first scenario, the four ANs are placed at the same
height near the ceiling of the considered environment. Using
the coordinate system shown in Fig. 1, the positions of the
ANs have the following coordinates expressed in meters
a1 = (
          <xref ref-type="bibr" rid="ref3">0, 0, 3</xref>
          )
a3 = (
          <xref ref-type="bibr" rid="ref10 ref3">0, 10, 3</xref>
          )
        </p>
        <p>As discussed in Section I, the fact that all ANs share the
same height is problematic for ordinary algorithms, and the
TSML algorithm is actually inapplicable in this scenario. For
this reason, only the accuracy of the POSTI algorithm can be
evaluated. Table I shows the results related to the accuracy
of the POSTI algorithm using the values eP and σP defined
above for the r = 100 experiments and for each one of
the twelve positions of the TN shown. Observe that values
of eP vary from 0.249 m to 0.730 m. Therefore, it can
be concluded that the accuracy of localization is compatible
with the intended applications discussed in Section I. The
values of standard deviations are also compatible with practical
applications because they vary from 0.07 m to 0.411 m.</p>
      </sec>
      <sec id="sec-4-2">
        <title>B. Scenario 2</title>
        <p>In the second scenario, the height of two of the four ANs
is reduced with respect to the previous scenario. Using the
coordinate system shown in Fig. 1, the positions of the ANs
have the following coordinates expressed in meters
a1 = (0, 0, 2.5)
a3 = (0, 10, 2.5)
Results show that the accuracy of the POSTI algorithm is
similar to the accuracy measured in the first scenario. As a
matter of fact, the values of eP vary between 0.246 m and
0.793 m, and the values of σP vary between 0.092 m and
0.580 m. The similarity between the results obtained in the
two scenarios is not surprising because the position of the
ANs did not change significantly.</p>
        <p>Table II also shows the results related to the accuracy
of the TSML algorithm, expressed in terms of eT and σT .
Observe that such results are affected by significant errors in
correspondence of some positions of the TN. In detail, the
value of the average error eT is larger than 2 m when the TN
was positioned in t3 and t9, and it is larger than 1 m when
the TN was positioned in t5, t10, t11, and t12. Moreover, for
8 positions out of 12, the value of σT is larger than 1 m and
it is often larger than 2 m, which emphasizes the inaccuracy
of position estimates obtained with the TSML algorithm for
the studied arrangement of ANs. From obtained results it can
be concluded that the performance of the POSTI algorithm is
good in this scenario, while the TSML algorithm leads to very
inaccurate position estimates.</p>
      </sec>
      <sec id="sec-4-3">
        <title>C. Scenario 3</title>
        <p>As observed in the previous scenario, the reduction of the
height of two ANs by 0.5 m is not sufficient to obtain accurate
position estimates with the TSML algorithm. For this reason,
in this scenario the height of two ANs is further reduced with
respect to the previous scenario and it equals 1.5 m. Hence,
using the coordinate system shown in Fig. 1, the positions of
the ANs have the following coordinates expressed in meters
a1 = (0, 0, 1.5)
a3 = (0, 10, 1.5)</p>
        <p>Observe that the new height of the two relocated ANs may not
be sufficient to guarantee visibility in practical applications
because of the possible presence of obstacles. However, in
the considered scenario, the corridor is empty and, therefore,
visibility is guaranteed just like in previous scenarios.</p>
        <p>Table III shows the accuracy of the algorithms in terms of
eP and σP (evaluated using the POSTI algorithm), and of eT
and σT (evaluated using the TSML algorithm). All values are
computed using r = 100 repetitions of the experiments for
each one of the twelve positions of the TN shown in Fig. 1.
Results show that the accuracy of the POSTI algorithm is
similar to the accuracy measured in the first and in the second
scenarios. Actually, the values of eP vary between 0.287 m
and 0.557 m, and the values of σP vary between 0.064 m and
0.474 m. The results obtained in the considered scenarios are
not surprising because the accuracy of the POSTI algorithm
is expected to be independent from the position of ANs.</p>
        <p>Table III also shows the results related to the accuracy of
the TSML algorithm, expressed in terms of eT and σT . In
this scenario, results obtained with the TSML algorithm are
sufficiently accurate for many applications. As a matter of
fact, the values of the average error eT vary between 0.196 m
and 0.896 m, and the values of the standard deviation σT
vary between 0.098 m and 0.923 m. A comparison between
the values of the average errors eP obtained with the POSTI
algorithm and the values of the average errors eT obtained
with the TSML algorithm shows that the characteristics of the
two algorithms are comparable in this scenario. Analogous
considerations can be derived from the values of the standard
deviation σP obtained with the POSTI algorithm and the
value of the standard deviation σT obtained with the TSML
algorithm, even though the values of σP are actually lower
than the corresponding values of σT for 9 out of the 12
positions of the TN.</p>
      </sec>
      <sec id="sec-4-4">
        <title>D. Scenario 4</title>
        <p>
          In this scenario, the height of the two relocated ANs is
further reduced and they are placed near the floor of the
corridor while the other two ANs are still at their original
positions. Using the coordinate system shown in Fig. 1, the
positions of the ANs are expressed in meters as
a1 = (0, 0, 0)
a3 = (
          <xref ref-type="bibr" rid="ref10">0, 10, 0</xref>
          )
        </p>
        <p>As in the previous scenario, the new height of the two
relocated ANs may not be sufficient to guarantee visibility
in practical applications because of the presence of obstacles.</p>
        <p>Table IV shows the accuracy of the algorithms in terms of
eP and σP (evaluated using the POSTI algorithm), and of</p>
        <p>Table IV</p>
        <p>EXPERIMENTAL RESULTS IN SCENARIO 4
eT and σT (evaluated using the TSML algorithm). All values
are computed using r = 100 repetitions of the experiments
for each one of the twelve positions of the TN shown in
Fig. 1. Results show that the accuracy of the POSTI algorithm
is similar to the accuracy measured in the first, second, and
third scenarios. As a matter of fact, the values of eP vary
between 0.218 m and 0.483 m, and values of σP vary between
0.065 m and 0.420 m. Such results are in agreement with
those obtained in previous scenarios, which is not surprising,
since the accuracy of the POSTI algorithm is expected to be
independent from the position of ANs.</p>
        <p>Table IV also shows the accuracy of the TSML algorithm
using the quantities defined previously for the r = 100
repetitions of experiments and for the twelve positions of
the TN shown in Fig. 1. In this case, the accuracy obtained
with the TSML algorithm is similar to the accuracy obtained
in the third scenario. Actually, the values of the average
error eT vary between 0.257 m and 0.878 m, and the values
of the standard deviation σT vary between 0.103 m and
0.589 m, which ensures an accuracy of localization compatible
with intended applications discussed in Section I. As for the
previous scenarios, the results reported in Table IV show that
the performance of the two algorithms are similar in this case.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSIONS</title>
      <p>The POSTI algorithm is discussed in this paper as a
viable opportunity to support the localization as optimization
approach (e.g., [5], [20]). The POSTI algorithm is based on
consolidated results from the literature on nonlinear
programming, and it relies on a subdivision method to search for
the position of the TN in the considered indoor environment,
which is assumed to be composed of possibly overlapping
rectangular cuboids. According to the current implementation
of the algorithm, the TN can actively obtain estimates of the
distances from ANs using UWB. An alternative
implementation of the algorithm that uses WiFi signaling to obtain
distance estimates was experimented, but the accurate and
robust distance estimates that UWB provides ensures far better
localization performance and such an implementation is not
discussed in this paper.
One of the most relevant characteristics of the POSTI
algorithm is that it provides a level of accuracy that is independent
from the position of the ANs in the environment. This is not
true for other localization algorithms, like the TSML
algorithm, whose performance significantly degrades when
problematic arrangements of ANs are used. Experimental results
shown in the last part of this paper confirm that the POSTI
algorithm leads to accurate position estimates in all considered
scenarios, independently from the positions of ANs. Actually,
the average localization errors and the corresponding standard
deviations are independent from the considered position of the
TN and from the adopted arrangement of ANs. At the opposite,
significant localization errors are produced by the TSML
algorithm when ANs are installed in critical arrangements. In
detail, presented experimental results show that the POSTI
algorithm outperforms the TSML algorithm in terms of average
localization error and corresponding standard deviation when
considering scenarios where all the ANs are almost coplanar.
Such a result is particularly significant because the TSML
algorithm is often used as a reference for the assessment of
the performance of localization algorithms because it is well
known [23] that it can attain the Crame´r-Rao lower bound [24]
for the position estimator.</p>
      <p>Finally, it is worth noting that the critical arrangements
of the ANs that make the use of the TSML impractical
are those in which all the ANs are located at (roughly) the
same height. Unfortunately, this is one of the most common
arrangements in indoor environments, where all the ANs are
typically placed at the same height close to the ceilings of
rooms to ensure a good line-of-sight coverage. According to
such considerations, the use of the POSTI algorithm for robust
and accurate localization seems a valid opportunity for
envisaged applications of indoor localization, which demands that
practical considerations regarding the line-of-sight coverage of
environments are seriously taken into consideration.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Farid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Nordin</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ismail</surname>
          </string-name>
          , “
          <article-title>Recent advances in wireless indoor localization techniques and system</article-title>
          ,
          <source>” Journal of Computer Networks and Communications</source>
          , vol.
          <year>2013</year>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lo</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Niemegeers</surname>
          </string-name>
          , “
          <article-title>A survey of indoor positioning systems for wireless personal networks</article-title>
          ,
          <source>” IEEE Communications Surveys &amp; Tutorials</source>
          , vol.
          <volume>11</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Patterson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Muntz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Pancake</surname>
          </string-name>
          , “
          <article-title>Challenges in location-aware computing,” IEEE Pervasive Computing</article-title>
          , vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>89</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , “
          <article-title>Location-aware social gaming with AMUSE,” in Advances in Practical Applications of Scalable Multi-agent Systems, the PAAMS Collection</article-title>
          ,
          <article-title>PAAMS 2016, ser</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          , vol.
          <volume>9662</volume>
          . Sevilla: Springer,
          <year>2016</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>A swarm-based approach to real-time 3D indoor localization: Experimental performance analysis</article-title>
          ,
          <source>” Applied Soft Computing</source>
          , vol.
          <volume>43</volume>
          , pp.
          <fpage>489</fpage>
          -
          <lpage>497</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Purushotham</surname>
          </string-name>
          and
          <string-name>
            <surname>C.-C. J. Kuo</surname>
          </string-name>
          , “
          <article-title>Personalized group recommender systems for location- and event-based social networks</article-title>
          ,
          <source>” ACM Transactions on Spatial Algorithms and Systems</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>4</issue>
          , pp.
          <volume>16</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          :
          <fpage>29</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Skoumas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pfoser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kyrillidis</surname>
          </string-name>
          , and T. Sellis, “
          <article-title>Location estimation using crowdsourced spatial relations</article-title>
          ,
          <source>” ACM Transactions on Spatial Algorithms and Systems</source>
          , vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <volume>5</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          :
          <fpage>23</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.-Y.</given-names>
            <surname>Teng</surname>
          </string-name>
          , W.-S. Ku,
          <article-title>and</article-title>
          K.-T. Chuang, “
          <article-title>Toward mining stop-by behaviors in indoor space</article-title>
          ,
          <source>” ACM Transactions on Spatial Algorithms and Systems</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , pp.
          <volume>7</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          :
          <fpage>38</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Teng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Yuan</surname>
          </string-name>
          , “
          <article-title>From one to crowd: A survey on crowdsourcing-based wireless indoor localization,” Frontiers of Computer Science</article-title>
          , vol.
          <volume>12</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>423</fpage>
          -
          <lpage>450</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Pannuto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kempke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.-X.</given-names>
            <surname>Chuo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Blaauw</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Dutta</surname>
          </string-name>
          , “Harmonium:
          <article-title>Ultra wideband pulse generation with bandstitched recovery for fast, accurate, and robust indoor localization</article-title>
          ,
          <source>” ACM Transactions on Sensor Networks</source>
          , vol.
          <volume>14</volume>
          , no.
          <issue>2</issue>
          , pp.
          <volume>11</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          :
          <fpage>29</fpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>X.</given-names>
            <surname>Teng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Liu</surname>
          </string-name>
          , “CloudNavi:
          <article-title>Toward ubiquitous indoor navigation service with 3D point clouds</article-title>
          ,
          <source>” ACM Transactions on Sensor Networks</source>
          , vol.
          <volume>15</volume>
          , no.
          <issue>1</issue>
          , pp.
          <volume>1</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>1</lpage>
          :
          <fpage>28</fpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gezici</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. V.</given-names>
            <surname>Poor</surname>
          </string-name>
          , “
          <article-title>Position estimation via Ultra-Wide-Band signals</article-title>
          ,
          <source>” Proceedings of the IEEE</source>
          , vol.
          <volume>97</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>386</fpage>
          -
          <lpage>403</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Sahinoglu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gezici</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I.</surname>
          </string-name>
          <article-title>Gu¨venc, Ultra-wideband positioning systems: Theoretical limits, ranging algorithms and protocols</article-title>
          . Cambridge, U.K.: Cambridge University Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , “
          <article-title>Location-aware JADE agents in indoor scenarios</article-title>
          ,”
          <source>in Proceedings of the 16th Workshop “</source>
          From Objects to Agents”,
          <source>ser. CEUR Workshop Proceedings</source>
          , vol.
          <volume>1382</volume>
          . RWTH Aachen,
          <year>2015</year>
          , pp.
          <fpage>103</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          , “
          <article-title>Indoor localization of JADE agents without a dedicated infrastructure,” in Multiagent System Technologies, ser</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          , vol.
          <volume>10413</volume>
          . Cham: Springer,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bellifemine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bergenti</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Caire, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Poggi</surname>
          </string-name>
          ,
          <string-name>
            <surname>“JADE - A Java Agent</surname>
          </string-name>
          <article-title>DEvelopment framework,” in Multi-Agent Programming</article-title>
          . Springer,
          <year>2005</year>
          , pp.
          <fpage>125</fpage>
          -
          <lpage>147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zetik</surname>
          </string-name>
          , and R. S. Thoma¨, “
          <article-title>Performance comparison of TOA and TDOA based location estimation algorithms in</article-title>
          LOS environment,”
          <source>in Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC</source>
          <year>2008</year>
          ). Hannover: IEEE,
          <year>2008</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>F.</given-names>
            <surname>Mekelleche</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Haffaf</surname>
          </string-name>
          , “
          <article-title>Classification and comparison of rangebased localization techniques in wireless sensor networks</article-title>
          ,
          <source>” Journal of Communications</source>
          , vol.
          <volume>12</volume>
          , no.
          <issue>4</issue>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>K. C. Ho</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <string-name>
            <surname>Xiaoning</surname>
          </string-name>
          , and L.-o. Kovavisaruch, “
          <article-title>Source localization using TDOA and FDOA measurements in the presence of receiver location errors: Analysis and solution</article-title>
          ,
          <source>” IEEE Transactions on Signal Processing</source>
          , vol.
          <volume>55</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>684</fpage>
          -
          <lpage>696</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Monica</surname>
          </string-name>
          and G. Ferrari, “
          <article-title>Impact of the number of beacons in PSO-based auto-localization in UWB networks,” in Applications of Evolutionary Computation, ser</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          , vol.
          <volume>7835</volume>
          . Berlin: Springer,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W.</given-names>
            <surname>Tucker</surname>
          </string-name>
          ,
          <article-title>Validated numerics: A short introduction to rigorous computations</article-title>
          . Princeton: Princeton University Press,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Bonyadi</surname>
          </string-name>
          and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Michalewicz</surname>
          </string-name>
          , “
          <article-title>Particle swarm optimization for single objective continuous space problems: A review,” Evolutionary Computation</article-title>
          , vol.
          <volume>25</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>54</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Y. T.</given-names>
            <surname>Chan</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. C.</given-names>
            <surname>Ho</surname>
          </string-name>
          , “
          <article-title>A simple and efficient estimator for hyperbolic location</article-title>
          ,
          <source>” IEEE Transactions on Signal Processing</source>
          , vol.
          <volume>42</volume>
          , no.
          <issue>8</issue>
          , pp.
          <fpage>1905</fpage>
          -
          <lpage>1915</lpage>
          ,
          <year>1994</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Shao</surname>
          </string-name>
          , Mathematical Statistics, ser. Springer Texts in Statistics. New York: Springer-Verlag,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>R. T.</given-names>
            <surname>Farouki</surname>
          </string-name>
          , “
          <article-title>The Bernstein polynomial basis: A centennial retrospective</article-title>
          ,” Computer Aided Geometric Design, vol.
          <volume>29</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>379</fpage>
          -
          <lpage>419</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>J.</given-names>
            <surname>Garloff</surname>
          </string-name>
          , “
          <article-title>The Bernstein algorithm</article-title>
          ,” Interval Computations, vol.
          <volume>2</volume>
          , pp.
          <fpage>154</fpage>
          -
          <lpage>168</lpage>
          ,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>R. T.</given-names>
            <surname>Farouki</surname>
          </string-name>
          and V. T. Rajan, “
          <article-title>Algorithms for polynomials in Bernstein form,” Computer-Aided Geometric Design</article-title>
          , vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          ,
          <year>1988</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>J.</given-names>
            <surname>Garloff</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Smith</surname>
          </string-name>
          , “
          <article-title>Solution of systems of polynomial equations by using Bernstein expansion,” in Symbolic Algebraic Methods</article-title>
          and
          <string-name>
            <given-names>Verification</given-names>
            <surname>Methods</surname>
          </string-name>
          . Vienna: Springer,
          <year>2001</year>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>97</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ray</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Nataraj</surname>
          </string-name>
          , “
          <article-title>An efficient algorithm for range computation of polynomials using the Bernstein form</article-title>
          ,
          <source>” Journal of Global Optimization</source>
          , vol.
          <volume>45</volume>
          , pp.
          <fpage>403</fpage>
          -
          <lpage>426</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Smith</surname>
          </string-name>
          , “
          <article-title>Fast construction of constant bound functions for sparse polynomials</article-title>
          ,
          <source>” Journal of Global Optimization</source>
          , vol.
          <volume>43</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>445</fpage>
          -
          <lpage>458</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ray</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. S.</given-names>
            <surname>Nataraj</surname>
          </string-name>
          , “
          <article-title>A matrix method for efficient computation of Bernstein coefficients</article-title>
          ,
          <source>” Reliable Computing</source>
          , vol.
          <volume>17</volume>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>71</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>