<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>SEBD</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Mining for Smart Cities: A Focus on Indoor Localization using 5G Technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <string-name>Smart City, Trajectory Mining, 5G, Indoor Localization</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Electrical Engineering and Information Technology, University of Naples Federico II</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>31</volume>
      <fpage>02</fpage>
      <lpage>05</lpage>
      <abstract>
        <p>This paper focuses on the use of Trajectory Mining techniques within Smart Cities. In particular, it is proposed the use of 5G technology for indoor localization and the use of trajectory mining techniques to analyze the trajectory data of users inside buildings. Thanks to the coverage and speed ofered by the 5G network, you can improve the user experience and optimize space management. In this paper I describe one of the possible developments of my PhD research in order to develop optimized processes applicable in diferent contexts and adaptable within both public and private buildings.</p>
      </abstract>
      <kwd-group>
        <kwd>Technology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Smart Cities are an urban environment that uses advanced technologies to improve citizens’
quality of life, optimize eficiency and reduce environmental impact. Among the technologies
used, Trajectory Mining has become increasingly popular in recent years thanks to the ability
to provide valuable information about user activities within the city.</p>
      <p>
        Trajectory Mining allows you to analyze the movements of individuals within the city, tracing
their path and identifying areas of interest. This can be used to better understand user mobility
patterns, to identify areas of the city with more trafic and to improve urban planning [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
For example, Trajectory Mining can be used to identify areas of the city that require more
security, analyzing routes taken by individuals in an emergency. In addition, it can be used
to analyse public transport routes, identify the most popular routes and improve the service
ofered to citizens.
      </p>
      <p>Trajectory Mining can also be used to improve the environmental sustainability of cities by
identifying areas where energy eficiency can be improved and CO
2 emissions reduced.</p>
      <p>
        There are many techniques available for trajectory Mining, each with its own advantages and
limitations. Some of the most common Trajectory Mining techniques are the following:
• Trajectory Clustering: Trajectory clustering is a technique that groups similar
trajectories into clusters based on diferent metrics, such as Euclidean distance or Hausdorf
distance[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This technique is useful for the analysis of the movement patterns of
individuals[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
• Trajectory segmentation: Trajectory segmentation is a technique that divides trajectories
into smaller segments, each of which represents a particular behavior or event [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This
technique is useful for analyzing the activities of individuals, such as work or shopping.
• Trajectory pattern mining: Trajectory pattern mining is a technique that analyzes
recurrent patterns in the trajectories of individuals [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This technique is useful for identifying
abnormal behaviors, such as unusual paths or unusual areas of interest[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
• Spatio-temporal analysis of trajectories: Spatio-temporal analysis of trajectories is a
technique that analyses trajectories in relation to space and time [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. This technique is
useful for identifying patterns of movement of individuals, such as speed and direction.
• Trajectory classification: Trajectory classification is a technique that assigns trajectories
to certain classes or categories based on specific characteristics [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. This technique is
useful for the analysis of the movement patterns of individuals based on their activities
or behaviors.
• Trajectory prediction models: Trajectory prediction models are a technique that uses past
trajectories to predict the future trajectories of individuals [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This technique is useful
for urban planning and trafic management.
      </p>
      <p>In the literature, however, there are few references to the use of trajectory mining techniques
inside buildings, this particular application could be a further increase in the eficiency of Smart
Cities.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Indoor Trajectory Mining</title>
      <p>
        Indoor trajectories Mining refers to the technique of extracting significant information from
the trajectories of individuals within buildings or enclosed spaces. This technique uses diferent
data sources, such as motion sensors, surveillance cameras, and users’ mobile devices to acquire
information about the activities of individuals [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>The extraction of indoor trajectories is important for many applications, such as resource
management, security, urban planning and operations optimization. For example, in the field
of resource management, the extraction of indoor trajectories can help to optimize the use of
spaces and improve the management of flows of people and resources. In security, extracting
indoor trajectories can help identify abnormal behaviors of individuals within buildings and
prevent security threats [11]. In urban planning, the extraction of indoor trajectories can help
improve public space, service and transport planning.</p>
      <p>The extraction of indoor trajectories can also help improve the user experience within buildings,
for example through the customization of services or the management of queues [12].
Unlike outdoor trajectories, the extraction of indoor trajectories requires the use of diferent
technologies and data collection techniques, since the internal environment presents many
obstacles.</p>
      <p>The main challenges in extracting indoor trajectories are the poor availability of GPS signals,
the lack of accurate indoor maps, the presence of obstacles limiting the accuracy of tracking
and the lack of standardisation between diferent data collection systems.</p>
      <p>To address these challenges and take full advantage of the opportunities ofered by the extraction
of indoor trajectories, it is necessary to continue to develop new technologies and data collection
methodologies, as well as work to standardize data acquisition systems. In addition, the use of
advanced data analysis techniques, such as machine learning [13, 14], can help process large
amounts of trajectory data and extract useful information from it.</p>
      <p>Among the various localization techniques that can be the basis of Trajectory mining, some
are not yet used to the full of their potential. As in the case of advanced 5G
telecommunications networks, they are a tool of great interest for indoor localization, which requires an
interdisciplinary approach and constant technological innovation to reach its full potential.</p>
    </sec>
    <sec id="sec-3">
      <title>3. 5G-based Localization</title>
      <p>There are many indoor localization techniques, such as Wi-Fi, Bluetooth and UWB (Ultra Wide
Band) technology, which have been used successfully in many applications. Today the most
used techniques are:
1. GPS (Global Positioning System): GPS technology is used to capture the exact location
of a moving object. GPS uses a system of satellites orbiting the Earth to determine its
location. Satellites send radio signals to the GPS device, which uses them to calculate its
position based on the distance from the satellites. GPS can provide a very precise location,
but can be afected by obstacles such as tall buildings, trees or tunnels. [ 15]
2. Motion sensors: Motion sensors such as the accelerometer, gyroscope, and orientation
sensor can be used to detect the movement and position of an object [16]. Accelerometers
measure the accelerating force of the moving object, gyroscopes measure its rotation, and
the orientation sensor measures its position relative to the magnetic north.
3. Wi-Fi: Wi-Fi can be used to detect the location of an object based on its location relative
to the available Wi-Fi access points. This technology leverages the fact that each Wi-Fi
access point has a unique identity, called BSSID, which can be used to identify its location
[17]. The Wi-Fi device of the moving device uses the signal strength received from the
surrounding Wi-Fi access points to calculate its approximate location.
4. RFID (Radio Frequency Identification): RFID technology can be used to detect the location
of an object through the use of RFID tags and readers. An RFID tag is a device that can
be attached to an object and contains a unique identity. An RFID reader can detect the
presence of the tag and its location [18]. This technology is often used in environments
such as warehouses or airports to track the location of objects.
5. Bluetooth: Bluetooth technology can be used to detect the location of an object via
its Bluetooth signal.This technology takes advantage of the fact that the Bluetooth
signal strength decreases as the distance between devices increases [19]. Using multiple
Bluetooth detection points, you can triangulate the position of a moving device.
6. Environmental sensors: Environmental sensors such as temperature sensors, humidity
sensors, and light sensors can be used to detect the location of an object based on
its surroundings. For example, if an object moves from a hot area to a cold area, the
temperature sensor can detect this change and infer the location of the object. This
technology is less precise than other localization techniques, but may be useful in some
specific scenarios.
5G, the latest generation of wireless technologies for mobile communication, holds the promise
of delivering ultra-fast and reliable connectivity [20]. By utilizing higher frequency bands (700
MHz, 3700 MHz, and 27 GHz) compared to its predecessors, 5G enables the transmission of
large amounts of data at exceptionally high speeds, reaching up to 10 Gbps.
This technology has the potential to revolutionize indoor localization by ofering unparalleled
accuracy, enhanced reliability, and wider coverage when compared to previous technologies
like Wi-Fi and Bluetooth. Specifically, 5G can leverage a combination of localization techniques,
including multi-antenna access, radio pulse analysis, and the utilization of external sensors, to
achieve precise localization.</p>
      <p>Moreover, 5G brings forth a myriad of advanced features, such as ultra-low latency and the
ability to handle massive data volumes, making it highly suitable for high-precision indoor
location applications like indoor navigation and device monitoring [20].</p>
      <p>To compare the efectiveness of 5G with existing indoor localization techniques, several factors
can be considered, including accuracy, coverage, speed, and system complexity. For example,
Wi-Fi and Bluetooth are extensively used for indoor localization due to their relatively low
cost. However, their accuracy may be limited in crowded or noisy environments. On the other
hand, Ultra-Wideband (UWB) technology ofers exceptional precision but can be expensive and
power-intensive.</p>
      <p>In contrast, 5G stands out by providing superior accuracy owing to its advanced location features
such as multi-antenna access and radio pulse analysis.</p>
      <p>The indoor localization capabilities of 5G are facilitated by various techniques. One of these
techniques is beamforming technology, which employs antennas to direct signals towards
specific devices. Additionally, Massive Multiple Input Multiple Output (MIMO) technology
utilizes multiple antennas to deliver stronger and more accurate signals. Another approach
involves utilizing millimeter waves within the 5G framework, which ofer high spatial and
temporal resolution.</p>
      <p>Advanced Telecommunication Networks, encompassing 5G technology, can support
sophisticated indoor location technologies like Time Diference of Arrival (TDOA) and Angle of Arrival
(AoA) [20]:
• TDOA is a technology that determines the location of a device by analyzing the
diference in signal arrival time from a series of base stations. This technology necessitates
exceptionally high time accuracy.
• AoA is a technology that determines the location of a device by analyzing the arrival angle
of the signal from a series of base stations. Real-time processing of large data volumes is
required for this technology [20].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Potential Applications</title>
      <p>The use of 5G technology for indoor localization can provide important solutions to improve
signal accuracy and coverage, paving the way for new opportunities for indoor Trajectory Data
Mining.</p>
      <p>Inside buildings, localization and Trajectory mining can be used in diferent contexts, such as:
1. Indoor navigation: Indoor localization can be used to help people navigate inside large
buildings such as airports, shopping malls, hospitals, museums and train stations.
2. Safety: Indoor location can be used to improve building safety. For example, location
tracking can be used to track the movement of staf and guests and report suspicious
behavior. In addition, localization can be used to quickly evacuate people in an emergency.
3. Resource Management: Indoor localization can be used to manage resources within
buildings such as valuables, equipment, goods, and people. For example, localization can
be used to track the location of objects within a warehouse and optimize the distribution
of goods.
4. Marketing: Indoor localization can be used to ofer customized marketing services to
building visitors. For example, stores can use localization to send personalized ofers to
customers within the store.</p>
      <p>In addition, the combination of indoor Trajectory data and other data sources such as weather,
trafic data and environmental data can provide additional valuable information for Smart City
management and optimization.</p>
      <p>The combination of 5G-based indoor localization and indoor Trajectory Mining can open up
new perspectives for Smart City management, improving the eficiency of public services and
the quality of life of citizens.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>Smart Cities are increasingly present in people’s lives and represent a new frontier for the
intelligent management of cities and public services. Indoor localization is a fundamental
technology for Smart Cities, as it allows you to monitor and track the movements of users
within buildings and public facilities. The use of 5G technology for indoor localization can
provide important solutions to improve signal accuracy and coverage, paving the way for new
opportunities for indoor Trajectory data mining.</p>
      <p>In this paper, we evaluated an approach to indoor Trajectory Mining using 5G-based localization
in smart cities. The methodology involves the use of Machine Learning algorithms to analyze
Trajectory data and identify user mobility patterns, with potential applications in the field of
optimizing the flow of people in public environments, vehicle trafic monitoring, identification
of points of interest and prevention and emergency management.</p>
      <p>The combination of 5G-based indoor localization and indoor Trajectory Mining can open up
new perspectives for Smart City management, improving the eficiency of public services and
the quality of life of citizens.</p>
      <p>In conclusion, I believe that the use of 5G technology for the indoor localization and Data
Mining of indoor trajectories represents a new frontier in the intelligent management of Smart
Cities and can provide important solutions to improve the quality of life of citizens and the
eficiency of public services.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>Author’s PhD is funded via PNRR-Partenariato Esteso PE14-RESearch and innovation on future
Telecommunications systems and networks (RESTART)
Work supported by the project ”MOD‐UPP” ‐ Macroarea 4 - project PON_MDG_1.4.1_17- PON
GOV grant.
[11] A. Kontarinis, K. Zeitouni, C. Marinica, D. Vodislav, D. Kotzinos, Towards a semantic
indoor trajectory model: application to museum visits, GeoInformatica 25 (2021) 311–352.
[12] A. Kontarinis, K. Zeitouni, C. Marinica, D. Vodislav, D. Kotzinos, Towards a semantic indoor
trajectory model, in: 2nd International Workshop on” Big Mobility Data Analytics”(BMDA)
with EDBT 2019, 2019.
[13] W. Huayi, H. Rui, Y. Lan, X. Longgang, Recent progress in taxi trajectory data mining,</p>
      <p>Acta Geodaetica et Cartographica Sinica 48 (2019) 1341.
[14] C. Wang, L. Ma, R. Li, T. S. Durrani, H. Zhang, Exploring trajectory prediction through
machine learning methods, IEEE Access 7 (2019) 101441–101452.
[15] Y. Zheng, Q. Li, Y. Chen, X. Xie, W.-Y. Ma, Understanding mobility based on gps data,
in: Proceedings of the 10th international conference on Ubiquitous computing, 2008, pp.
312–321.
[16] T. Takafuji, K. Fujita, T. Higuchi, A. Hiromori, H. Yamaguchi, T. Higashino, Indoor
localization utilizing tracking scanners and motion sensors, in: 2014 IEEE 11th Intl Conf on
Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and
Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and
Communications and Its Associated Workshops, IEEE, 2014, pp. 112–119.
[17] S. Boonsriwai, A. Apavatjrut, Indoor wifi localization on mobile devices, in: 2013 10th
International Conference on Electrical Engineering/Electronics, Computer,
Telecommunications and Information Technology, IEEE, 2013, pp. 1–5.
[18] T. Sanpechuda, L.-o. Kovavisaruch, A review of rfid localization: Applications and
techniques, in: 2008 5th international conference on electrical engineering/electronics,
computer, telecommunications and information technology, volume 2, IEEE, 2008, pp. 769–772.
[19] G. Fischer, B. Dietrich, F. Winkler, Bluetooth indoor localization system, in: Proceedings of
the 1st Workshop on Positioning, Navigation and Communication, University of California,
Berkeley, CA, US, 2004, pp. 147–156.
[20] P. Zhang, J. Lu, Y. Wang, Q. Wang, Cooperative localization in 5g networks: A survey, Ict
Express 3 (2017) 27–32.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <article-title>Trajectory data mining: an overview</article-title>
          ,
          <source>ACM Transactions on Intelligent Systems and Technology (TIST) 6</source>
          (
          <issue>2015</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>41</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-G.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          , J. Han,
          <article-title>Incremental clustering for trajectories</article-title>
          ,
          <source>in: Database Systems for Advanced Applications: 15th International Conference, DASFAA</source>
          <year>2010</year>
          , Tsukuba, Japan, April 1-
          <issue>4</issue>
          ,
          <year>2010</year>
          , Proceedings,
          <source>Part II 15</source>
          , Springer,
          <year>2010</year>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Masciari</surname>
          </string-name>
          ,
          <article-title>Trajectory clustering via efective partitioning</article-title>
          ,
          <source>in: Flexible Query Answering Systems: 8th International Conference, FQAS</source>
          <year>2009</year>
          , Roskilde, Denmark,
          <source>October 26-28</source>
          ,
          <year>2009</year>
          . Proceedings 8, Springer,
          <year>2009</year>
          , pp.
          <fpage>358</fpage>
          -
          <lpage>370</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ding</surname>
          </string-name>
          , J. Han,
          <string-name>
            <surname>R</surname>
          </string-name>
          . Kays,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nye</surname>
          </string-name>
          ,
          <article-title>Mining periodic behaviors for moving objects</article-title>
          ,
          <source>in: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          ,
          <year>2010</year>
          , pp.
          <fpage>1099</fpage>
          -
          <lpage>1108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Giannotti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nanni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pedreschi</surname>
          </string-name>
          ,
          <article-title>Trajectory pattern mining</article-title>
          ,
          <source>in: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>330</fpage>
          -
          <lpage>339</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>E.</given-names>
            <surname>Masciari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zaniolo</surname>
          </string-name>
          ,
          <article-title>Sequential pattern mining from trajectory data</article-title>
          ,
          <source>in: Proceedings of the 17th International Database Engineering &amp; Applications Symposium</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>162</fpage>
          -
          <lpage>167</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Jeung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. T.</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Convoy queries in spatio-temporal databases</article-title>
          ,
          <source>in: 2008 IEEE 24th International Conference on Data Engineering</source>
          , IEEE,
          <year>2008</year>
          , pp.
          <fpage>1457</fpage>
          -
          <lpage>1459</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          , L. Liu,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <article-title>Learning transportation mode from raw gps data for geographic applications on the web</article-title>
          ,
          <source>in: Proceedings of the 17th international conference on World Wide Web</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>247</fpage>
          -
          <lpage>256</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Monreale</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pinelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Trasarti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Giannotti</surname>
          </string-name>
          ,
          <article-title>Wherenext: a location predictor on trajectory pattern mining</article-title>
          ,
          <source>in: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>637</fpage>
          -
          <lpage>646</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pi</surname>
          </string-name>
          ,
          <article-title>An indoor trajectory frequent pattern mining algorithm based on vague grid sequence</article-title>
          ,
          <source>Expert Systems with Applications</source>
          <volume>118</volume>
          (
          <year>2019</year>
          )
          <fpage>614</fpage>
          -
          <lpage>624</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>