<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Conference on Applied Informatics
Eger, Hungary, January</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Classification Refinement With Category Hierarchy</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Judit Tamás</string-name>
          <email>tamas.judit@uni-eszterhazy.hu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Zsolt Tóth</string-name>
          <email>toth.zsolt@uni-eszterhazy.hu</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Eszterházy Károly University Eger</institution>
          ,
          <country country="HU">Hungary</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>2</volume>
      <fpage>9</fpage>
      <lpage>31</lpage>
      <abstract>
        <p>The concept of classification refinement using hierarchical grouping of categories is presented in this paper. Hierarchical grouping can be determined by heuristic, or existing hierarchical clustering algorithms can be applied to generate tree structures. The concept presented requires the classifier, the grouping of the categories and a threshold value as parameters. The concept is defined to be used for multiple classification tasks. The presented concept can improve the accuracy of classifiers in the case of low confidence level.</p>
      </abstract>
      <kwd-group>
        <kwd>classification</kwd>
        <kwd>hierarchical clustering</kwd>
        <kwd>Miskolc IIS Hybrid Data Set</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>These days people depend on technology, our life has become unimaginable
without high-tech tools and gadgets. We highly rely on navigation, which give us
turn-by-turn directions, trafic congestion information, and alternative routes to
a given location. The demand arisen to use navigation in complex buildings like
airports, railway stations or hospitals. However, classic Global Positioning Systems
do not work in indoor spaces. As a result, Indoor Positioning Systems (IPS) are
introduced.</p>
      <p>
        Indoor Positioning Systems can be used to determine the position of people or
objects in buildings and closed areas. IPS has been considered as an active research
ifeld since the early 1990s, and these systems are detailed in the following surveys
[
        <xref ref-type="bibr" rid="ref3 ref6">3, 6</xref>
        ]. The existing indoor positioning solutions rely on diferent technologies such
Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License
Attribution 4.0 International (CC BY 4.0).
as Infrared [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], ultrasonic [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], magnetic field [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], mobile communication [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], LED
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] or other radio frequency [
        <xref ref-type="bibr" rid="ref19 ref20 ref8">8, 19, 20</xref>
        ] signals.
      </p>
      <p>Indoor positioning is challenging due to the unique properties of the indoor
environment. Developers have to make trade-ofs between accuracy and cost when
they choose a technology. Currently, indoor positioning is vital for smart
environments. However, a suficiently precise, easily accessible, and sustainable industrial
standard has not been created yet.</p>
      <p>Symbolic positions can be considered as a category, thus the symbolic
positioning can be converted into a classification problem. Some well-known classifier
accept classes as prediction based on the confidence values. There are some cases
when the confidence for each class is relatively small. Hence, the accuracy of these
classifiers can vary in a moderate range.</p>
      <p>For indoor positioning purposes, a new approach can be introduced. It should
increase the accuracy of the classification, and consider the topology of the indoor
space.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Enhanced classification concept</title>
      <p>To boost the performance of these classifiers, a hierarchical grouping of class
categories can be introduced. Using hierarchical clustering information of symbolic
positions, the accuracy of symbolic indoor positioning algorithms can be improved
in case of a low confidence level.</p>
      <p>
        The concept of enhanced classification requires parameters, namely the
classiifer, the threshold and the dendrogram. The classifier is a method for supervised
learning based on the training set and data set, where the target is a discrete
attribute. The threshold is a real value between 0 and 1, which determines whether
the prediction is accepted or the proposed concept is used. If the confidence value
of the predicted class is equal to or higher than the threshold, the classifier method
returns with the class. The dendrogram can be predefined by a linkage matrix or
it is produced by linkage [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and distance methods parameters from the topology
information.
      </p>
      <p>The tree structure generated by the hierarchical clustering can be seen in
Figure 1. The leaf nodes are the rooms, while the root node is the whole described
environment.</p>
      <p>The tree structure had been modified to include additional information using
Python language. The representation of the dendrogram is created with treelib,
which enables the traversal in the tree. The identifier of each node is derived
from the dendrogram. Each node contains pointers for its parent and its child
nodes. The nodes contain a data object, which contains two information. The first
information is the universally unique identifier (uuid), which is used for searching
purposes. The second is the set of the contained zones, which will be returned as
a result by the process.</p>
      <p>
        Based on the improved tree structure, the following process of the enhancement
concept is performed.
1. The prediction is performed with the classifier.
2. If the confidence of the predicted class is equal to or higher than the threshold,
the process terminates by returning the class as the result.
3. The leaf node in the tree is located using the uuid.
4. Until the confidence of the current node is not reaching the threshold or the
root node is reached.
(a) The parent of this node is selected for examination.
(b) Its confidence is calculated as the sum of the confidence values of its
descendant leaf nodes.
5. The process terminating by returning the contained zones of the lastly
examined node.
2.1. Test
In the experiment, the  –NN and the Naive Bayes classifiers are used to the
available functionality to return the class probabilities. These classifiers are
instancebased classifier, which does not require retraining in case of new instances. The
 –NNW denotes the weighted vote version of the  –NN classifier in this paper. The
threshold is noted as   , and   ∈ {0.6, 0.7, 0.8, 0.9, 1}. In this experiment, each
linkage method is performed for each classifier and threshold. The linkage methods
in the experiment are average, complete, single and weighted. The distance
function is selected to be the dissimilarity value of gravitational force-based approach
[
        <xref ref-type="bibr" rid="ref10 ref11 ref13">10, 11, 13</xref>
        ]. The gravitational force-based approach is defined in our previous work,
it is designed to be used for indoor positioning. The environment is narrowed to
rooms on the same level for understandable examination. Diferent cases can be
found in the test, which can present the benefit of the presented concept.
      </p>
      <sec id="sec-2-1">
        <title>2.1.1. Environment</title>
        <p>
          The Miskolc IIS Hybrid IPS Data set [
          <xref ref-type="bibr" rid="ref15 ref7">7, 15</xref>
          ] was used to perform the
classification. The data set had been recorded in the Miskolc IIS Building of the University
of Miskolc using the ILONA System [
          <xref ref-type="bibr" rid="ref12 ref14 ref21">12, 14, 21</xref>
          ]. Each measurement consists of
three part, namely the measurement information, the position information and
the measurements. The ID and the timestamp of the measurements is stored as
the measurement information. Both absolute position with , ,  coordinates, and
symbolic position with uuid and name is saved for each measurement. Sensor
information from WiFi, Bluetooth and Magnetometer are included in the measurements.
The sensor information is the features for the classification process, while the uuid
is the target. These information will be included in the classification process. The
topology of the building had been described using IndoorGML [
          <xref ref-type="bibr" rid="ref2 ref4">2, 4</xref>
          ], which is used
to generate the dendrograms. Both the data set and the IndoorGML document
uses the same identification for the zones.
        </p>
        <p>To narrow the scope of the experiment, the environment is chosen to be the
second floor of the Miskolc IIS Building. Hence the used data set is also narrowed
to 431 measurements. From the narrowed data set, the training and the test set are
constructed by using stratified sampling with 0.9 and 0.1 ratio. The training and
the test sets are fixed during the test. The environment contains 20 zones, and it
can be seen in Figure 2. It can represent a general building with narrow corridors,
a huge room, which is a lecture hall in this environment, and small ofice rooms.</p>
        <p>However, the Miskolc IIS Hybrid Dataset contains measurements taken in only
5 of these rooms, namely the East Corridor, West Corridor and North Corridor,
the Lobby and the Lecture Hall 205.
2.1.2. Case
To verify the usability of the presented concept, a beneficial case scenario is
presented. Although there are cases, where the enhancing concept is not required or
applied. For example, 1–NN will always result in 1 confidence during the prediction.</p>
        <p>Based on the environment, the weighted linkage method and the gravitational
force-based distance, the hierarchical clustering resulted the dendrogram shown in
Figure 3.</p>
        <p>The 9-NN classifier was used without a weighted vote to predict the class using
the measured values. Based on the dendrogram presented in Figure 3, a tree can
be constructed as seen in Figure 4. In this tree, the leaf nodes presented in the
dataset have probability values for the given measurement. But only two of these
nodes have a non-zero value. The first is marked with 11, and it represents the
East Corridor room. This room has a 0.328 probability in the classification. The
second is the Lobby denoted by the number 14 with 0.672 probability. The actual
class node is East Corridor marked by green background colour on the Figure.
A traditional classifier would return with the Lobby, because it has the highest
probability value.</p>
        <p>However, the concept presented in Section 2, instead of returning the predicted
class, check whether the probability of the predicted class reaches the given
threshold. With 0.7 or above threshold, the enhanced classifier locates the predicted class
in the tree, and it examines its parent. Hence the parent is not the root node, the
process continues. As the predicted node has only one sibling with zero
probability, the parent also has the probability value below the threshold. For this reason,
the search moves up one level to the parent. The sum of the probabilities of each
descendant leaf node is 1, which could pass any threshold. Thus, the last examined
node, with the blue background, is the terminating node, which returns the list of
its descendant leaf nodes. The result of the classification process consists of only 4
rooms, namely East Corridor, West Corridor, Lab200 and Lobby. As it can be seen
in Figure 4, the actual class if the descendant of the terminating node. Thus the
enhanced concept correctly classified the measurement using 4 rooms. However, it
could prevent an incorrect classification, which was the goal of the concept.
2.2. Results
The results are stored in a csv file for further processing, the schema can be seen
in Table 1. Moreover, the file name contains meta-information about the setup,
namely the classifier, the linkage method and the threshold.</p>
        <p>Correct Classification</p>
        <sec id="sec-2-1-1">
          <title>Confidence</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>Set Size</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>Actual ID</title>
        </sec>
        <sec id="sec-2-1-4">
          <title>Predicted IDs</title>
          <p>
            Correct Classification can be True or False based on the containment of
the Actual ID in the Predicted IDs set. Confidence is a real value between the
threshold and 1, including both value, which represents the accepted confidence
of the result. The cardinality of the Predicted IDs is stored in the Set Size
column. The transformation of the selected properties is required for comparison.
2.2.1. Hit
Hit is the associated value for the True or False of Correct Classification.
Derived from this property of the results, hitRate can be calculated for a setup.
It is the rate of the correctly classified cases and all the cases to represent the
accuracy. Hence, the hitRate is a real number in the [
            <xref ref-type="bibr" rid="ref1">0, 1</xref>
            ] interval. The goal
function is to maximize the hitRate.
          </p>
          <p>(a) Weighted
(b) Average
(c) Single</p>
          <p>(d) Complete</p>
          <p>The hitRate values can be seen in Figure 5 for each classifier tested. The values
are grouped by both linkage method and threshold. As can be seen, the linkage
method does not have a high impact on the hitRate in this test. The Figure
shows, that 1 hitRate was not achieved using a 0.6 or a 0.7 threshold. With 0.8
threshold, the 9–NN and 9–NNW were the few classifiers to achieve 1. Moreover,
the set of fully correct classifiers does not difer using 0.9 or 1 as threshold. 1–NN
1–NNW and Naive Bayes classifiers did not use the enhancement in the experiment.
Although, 3–NN and 3–NNW were able to increase the hitRate, these methods
stuck below 1.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2.2. Confidence</title>
        <p>The confidence property of the results is presented in Figure 6. It is displayed by
box plot, grouped by classifier, linkage method and threshold. The goal function
is to maximize the confidence values.</p>
        <p>(a) Weighted
(b) Average
(c) Single</p>
        <p>(d) Complete</p>
        <p>As seen in Figure 6, the linkage method has a slight impact on the confidence
values. Weighted, average, and single linkage methods resulted in the same
statistics of the result set in terms of the confidence property. Compared to the other
linkage methods, the complete linkage method has a few hardly noticeable
differences. For example, the minimum confidence values using 9–NN and 9–NNW
has decreased in case of 0.6 threshold compared to the others. In this setup, the
ifrst quartile is also decreased, while there is no outlier detected. However, the 5–
NNW and the 13–NNW developed a higher first quartile with the complete linkage
method, while outlier is not detected. With 0.7 threshold, 11–NN and 11–NNW
achieved a considerably lower first quartile using the complete linkage method, and
the minimum of the 11–NNW slightly decreased. In the rest of the thresholds, the
diference lies only in the outlier data.</p>
        <p>In terms of the classifiers, it can be said that besides the obvious 1–NN and
1–NNW confidence values, the Naive Bayes resulted also 1 confidence with only
one outlier, which is only rounded to 1. The third quartile and the maximum
value are 1 regardless of the classifier, the linkage method and the threshold. 9–
NN and 9–NNW achieved the notably higher first quartile and minimum using
0.6 threshold. It can be also observed, that the 3–NN and 3–NNW has the first
quartile in the 1 value with a 0.7 threshold. However, with 0.8 threshold, 5–NN
achieved the equality of minimum and first quartile, while there are no outlier data.
Some classifier resulted the first quartile as 1, however, the number of outlier fairly
increased. Most classifier has all of their box plot values as 1 using 0.9 threshold,
however the number of outlier is still relevant.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.2.3. Abstraction</title>
        <p>
          To minimize the size of the resulted list, the abstraction feature is introduced.
However, to be consistent with the goal functions of the hitRate and the confidence,
the goal for the abstraction should also be maximization. To eliminate the number
of rooms from the property, the level of abstraction is designed to be a real number
in the [
          <xref ref-type="bibr" rid="ref1">0, 1</xref>
          ] range.
        </p>
        <p>Equation 2.1 shows the calculation of abstraction level based on the set size,
where  is the set size,  is the number of classes and ˆ is the normalized abstraction
level. In case the set size is 1, the abstraction level is 1, while the highest possible
set size results in 0 as abstraction level.</p>
        <p>Figure 7 shows the abstraction levels of classifier, linkage method and threshold
setups. As can be seen, linkage method has a high impact on the abstraction
feature. From the point of view of minimal abstraction value, the complete linkage
method behaves diverse. It shows that some classifiers have cases when the list of
all rooms is the prediction results. The weighted linkage method only treats cases
as outlier below 0.8 abstraction with every threshold tested. Moreover, compared
to the others, the weighted linkage method does not let the minimum abstraction
below 0.8, even with a 1 threshold. However, average and single linkage methods
mainly difer in the minimal level of abstraction.</p>
        <p>In the point of view of the classifiers, the 1–NN, 1–NNW and Naive Bayes have
a constant abstraction level with 1. However, using 0.6 as the threshold, other
classifiers behave alike, except those have outlier. Only the 3–NN has a minimum
lower than 1 in case of 0.7 threshold regardless of the linkage method. With 0.8
threshold, the classifiers that have not lowered their minimum are 5–NN and 5–
NNW. Moreover, the amount of change in the case of 11-NN and 11–NNW are also
low. The other classifiers took the minimum value to the second row of an outlier
in the Figure. Using 0.9 threshold, most of the classifiers took the minimum and
(c) Single</p>
        <p>(d) Complete
ifrst quartile values to the second row of an outlier. With the increment of the
threshold to 1, 11–NN, 11–NNW, 13–NN and 13–NNW dropped their minimum
value last row of outlier, except with weighted linkage.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.2.4. Discussion</title>
        <p>The increment of the threshold does not necessarily improve the classification
properties in every case. There is a value, which in case of further increment, does not
have any efect, or even reduces the property value. For example, the abstraction
is the most reasonable in case of 0.8 or 0.9 as a threshold.</p>
        <p>The 3–NNW classifier seems to be the best candidate in the perspective of
conifdence and abstraction using at least 0.7 as a threshold. Naive Bayes classifier was
tested on this environment, however, none of its cases used the concept. Therefore
the examination in larger scope is admissible.</p>
        <p>The variety of linkage methods does not have an impact on the hit rates, and
has a low efect on the confidence property. However, the level of abstraction highly
depends on this parameter. For example, the complete linkage method resulted all
of the available rooms in some cases, which resulted in a 0 abstraction level. While
the weighted, average and single linkage resulted in at least 0.2 abstraction.</p>
        <p>In the points of view of the properties, the following can be noticed. When
the accuracy is the main goal, the concept can return all of the rooms as the
result, producing a low abstraction level. Moreover, when the level of abstraction
is aimed to be as low as possible, the performance of the classification can be
poor. For example, Figure 7 shows that the level of abstraction is the best using a
0.6 threshold, the confidence of the classifiers, shown in Figure 6, is weak, and the
accuracy is below potential values. Therefore, the threshold and the linkage cannot
be based on only one of these features. Hence, the tuning of these properties is
required to be examined.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Summary</title>
      <p>A concept of enhanced classification is presented in this paper. To boost the
performance, this concept using hierarchical grouping of class categories. The concept
requires the classifier, the threshold and the dendrogram as parameters. The
concept is presented with a scenario, which shows its usability. Then the concept is
tested in a narrow environment. In the test, the  –NN and Naive Bayes
classiifers are selected. The dendrogram is generated by using hierarchical clustering
with the dissimilarity value of gravitational force-based approach and weighted,
average, single, and complete linkage methods. The results are evaluated using
hitRate, confidence, and abstraction properties. However, the properties are
conlficting, hence the tuning of these properties is suggested to be further investigated.
Acknowledgements. The first author’s research was supported by the grant
EFOP-3.6.1-16-2016-00001 (“Complex improvement of research capacities and
services at Eszterhazy Karoly University)”.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Blashfield</surname>
            ,
            <given-names>R. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aldenderfer</surname>
            ,
            <given-names>M. S.:</given-names>
          </string-name>
          <article-title>The literature on cluster analysis</article-title>
          ,
          <source>Multivariate Behavioral Research 13.3</source>
          (
          <issue>1978</issue>
          ), pp.
          <fpage>271</fpage>
          -
          <lpage>295</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Ilku</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tamas</surname>
          </string-name>
          , J.:
          <source>IndoorGML Modeling: A Case Study, in: Carpathian Control Conference (ICCC)</source>
          ,
          <year>2018</year>
          19th International, IEEE,
          <year>2018</year>
          , pp.
          <fpage>633</fpage>
          -
          <lpage>638</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Koyuncu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>S. H.:</given-names>
          </string-name>
          <article-title>A survey of indoor positioning and object locating systems</article-title>
          ,
          <source>IJCSNS International Journal of Computer Science and Network Security 10.5</source>
          (
          <issue>2010</issue>
          ), pp.
          <fpage>121</fpage>
          -
          <lpage>128</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          -J.,
          <string-name>
            <surname>Zlatanova</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , et al.:
          <article-title>OGC® indoorgml, Open Geospatial Consortium standard (</article-title>
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peng</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhao</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Epsilon: A Visible Light Based Positioning System</article-title>
          .
          <source>In: NSDI</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>331</fpage>
          -
          <lpage>343</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Darabi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banerjee</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
          </string-name>
          , J.:
          <article-title>Survey of wireless indoor positioning techniques and systems</article-title>
          ,
          <source>Systems, Man, and Cybernetics</source>
          , Part C:
          <article-title>Applications</article-title>
          and Reviews,
          <source>IEEE Transactions on 37.6</source>
          (
          <issue>2007</issue>
          ), pp.
          <fpage>1067</fpage>
          -
          <lpage>1080</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Miskolc</given-names>
            <surname>IIS Hybrid IPS Data Set</surname>
          </string-name>
          , [Online; Date donated 04-July-2016], url: http: //archive.ics.uci.edu/ml/datasets/Miskolc+IIS+Hybrid+IPS.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Ni</surname>
            ,
            <given-names>L. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lau</surname>
            ,
            <given-names>Y. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Patil</surname>
            ,
            <given-names>A. P.:</given-names>
          </string-name>
          <article-title>LANDMARC: indoor location sensing using active RFID</article-title>
          ,
          <source>Wireless networks 10.6</source>
          (
          <issue>2004</issue>
          ), pp.
          <fpage>701</fpage>
          -
          <lpage>710</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Särkkä</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tolvanen</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kannala</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahtu</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          :
          <article-title>Adaptive Kalman filtering and smoothing for gravitation tracking in mobile systems</article-title>
          (Oct.
          <year>2015</year>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Tamas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toth</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Topology-Based Evaluation for Symbolic Indoor Positioning Algorithms</article-title>
          ,
          <source>IEEE Transactions on Industry Applications</source>
          <volume>55</volume>
          .6 (
          <issue>Nov</issue>
          .
          <year>2019</year>
          ), pp.
          <fpage>6324</fpage>
          -
          <lpage>6331</lpage>
          , issn:
          <fpage>1939</fpage>
          -
          <lpage>9367</lpage>
          , doi: 10.1109/TIA.
          <year>2019</year>
          .
          <volume>2928489</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Tamas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          :
          <source>Hierarchical Clustering based on IndoorGML Document, in: 2019 IEEE 15th International Scientific Conference on Informatics (INFORMATICS</source>
          <year>2019</year>
          ), IEEE,
          <year>2019</year>
          , pp.
          <fpage>411</fpage>
          -
          <lpage>416</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Tamas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toth</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Limitation of CRISP accuracy for evaluation of room-level indoor positioning methods</article-title>
          ,
          <source>in: 2018 IEEE International Conference on Future IoT Technologies (Future IoT)</source>
          ,
          <source>Jan</source>
          .
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/FIOT.
          <year>2018</year>
          .
          <volume>8325585</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Tamas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toth</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Topology-based Classification Error Calculation for Symbolic Indoor Positioning</article-title>
          ,
          <source>in: Carpathian Control Conference (ICCC)</source>
          ,
          <year>2018</year>
          19th International, IEEE,
          <year>2018</year>
          , pp.
          <fpage>643</fpage>
          -
          <lpage>648</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Toth</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>ILONA: indoor localization and navigation system</article-title>
          ,
          <source>Journal of Location Based Services 10.4</source>
          (
          <issue>2016</issue>
          ), pp.
          <fpage>285</fpage>
          -
          <lpage>302</lpage>
          , doi: 10.1080/17489725.
          <year>2017</year>
          .
          <volume>1283453</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Toth</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tamas</surname>
          </string-name>
          , J.:
          <article-title>Miskolc IIS hybrid IPS: Dataset for hybrid indoor positioning</article-title>
          ,
          <source>in: 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA)</source>
          , IEEE, Kosice, Slovakia, Apr.
          <year>2016</year>
          , pp.
          <fpage>408</fpage>
          -
          <lpage>412</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Green</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malkawa</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>E-911 location standards and location commercial services</article-title>
          ,
          <source>in: Emerging Technologies Symposium: Broadband, Wireless Internet Access</source>
          ,
          <year>2000</year>
          IEEE, IEEE, Richardson,
          <string-name>
            <surname>TX</surname>
          </string-name>
          , USA, Apr.
          <year>2000</year>
          , 5-pp.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Want</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hopper</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Active badges and personal interactive computing objects, Consumer Electronics</article-title>
          ,
          <source>IEEE Transactions on 38.1</source>
          (
          <issue>1992</issue>
          ), pp.
          <fpage>10</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Ward</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hopper</surname>
            ,
            <given-names>A.:</given-names>
          </string-name>
          <article-title>A new location technique for the active ofice</article-title>
          ,
          <source>Personal Communications, IEEE 4.5</source>
          (
          <issue>1997</issue>
          ), pp.
          <fpage>42</fpage>
          -
          <lpage>47</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Weissman</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>Indoor location, White paper</article-title>
          , Tadlys
          <string-name>
            <surname>Ltd</surname>
          </string-name>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Youssef</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Agrawala</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>The Horus WLAN location determination system</article-title>
          ,
          <source>in: Proceedings of the 3rd international conference on Mobile systems</source>
          , applications, and services, ACM, Seattle, WA, USA,
          <year>June 2005</year>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>218</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Zsolt</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Péter</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Richárd</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Judit</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Data Model for Hybrid Indoor Positioning Systems</article-title>
          ,
          <source>Production Systems and Information Engineering</source>
          <volume>7</volume>
          (
          <year>2015</year>
          ), pp.
          <fpage>67</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>