<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Workshop for Computing &amp; Advanced Localization at the Fifteenth International Conference on Indoor
Positioning and Indoor Navigation, September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>A Structured Survey of Client-Based and Client-Assisted Localization for Underground Environments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Benny Platte</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rico Thomanek</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marc Ritter</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian Roschke</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Applied Sciences Mittweida</institution>
          ,
          <addr-line>09648 Mittweida</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>1</volume>
      <fpage>5</fpage>
      <lpage>18</lpage>
      <abstract>
        <p>Positioning in underground environments poses a fundamental challenge due to the absence of GNSS signals and often limited communication infrastructure. This survey investigates positioning systems in mines, tunnels, and other subterranean settings that involve the client device in a significant way - either by performing the localization directly on the device (fully client-based) or by recording sensor data locally for server-side processing (client-assisted). Based on a structured analysis of over 30 selected systems, we classify and compare approaches by signal technology, algorithmic method, infrastructure requirements, and system topology. The results show a dominance of RF-based solutions, but also highlight promising alternatives like magnetic methods. While fully client-autonomous systems are still rare, recent advances in onboard processing, sensor fusion and SLAM demonstrate the increasing potential of client-side localization in safety-critical and infrastructure-poor underground scenarios.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Underground localization</kwd>
        <kwd>indoor localization</kwd>
        <kwd>self-positioning</kwd>
        <kwd>client-side positioning</kwd>
        <kwd>infrastructure-free</kwd>
        <kwd>geomagnetic positioning</kwd>
        <kwd>dead reckoning</kwd>
        <kwd>geomagnetic localization</kwd>
        <kwd>survey</kwd>
        <kwd>tunnel environments</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Positioning in underground environments such as mines, tunnel systems, or caves poses considerable
challenges to current research. Unlike above-ground or urban settings, no external signals such as
GPS are available underground. Additional constraints such as darkness, moisture, narrow geometries,
and highly variable material structures further limit conventional indoor localization approaches. This
becomes particularly critical in emergency situations: power outages, damaged infrastructure, or lack
of communication technology may render traditional systems completely inoperative—precisely when
reliable positioning is needed most.</p>
      <p>Compared to conventional indoor environments, underground localization scenarios difer not
only due to the absence of GNSS signals but also in terms of technical boundary conditions: Tunnel
geometries—particularly for radio-based systems—are prone to multipath propagation and signal
reflections. Lighting conditions and line-of-sight paths for radio-frequency systems are severely limited
or subject to significant attenuation. Moreover, infrastructure failure can quickly escalate into an
emergency situation, which is why special attention must be given to this aspect.</p>
      <p>In well-equipped mines, advanced infrastructure-dependent localization systems are already in
use to reliably track personnel and machinery. However, these systems typically rely on complex
installations such as wireless networks, RFID tagging, or so-called leaky-feeder cables—solutions that
require continuous maintenance and substantial investment. Such systems are unavailable for visitor
mines, temporary operations, scientific expeditions in cave systems, or unauthorized entries. Even
in well-equipped mines, infrastructure cannot be assumed to remain functional in real emergency
scenarios.</p>
      <p>Accordingly, the development of systems that determine and display positions on the user side
(client-side) is of high importance. The degree of operational independence—possibly even without
communication links or network coverage—must be critically examined. Such infrastructure-resilient
solutions are essential not only for safe return from uncharted or damaged areas, but also for explorative
scenarios with minimal equipment.</p>
      <p>This survey provides a systematic overview of current approaches to underground localization,
focusing on systems that operate on the client side. The aim is to classify existing methods, identify key
challenges, and highlight research gaps. Particular attention is given to the question of whether, and
to what extent, localization can be achieved without external infrastructure, and which technologies
enable reliable positioning under extreme conditions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Application scenarios &amp; Requirements</title>
      <p>
        Unlike typical indoor environments, underground settings are characterized by extreme attenuation and
lack of fallback infrastructure. Traditional infrastructures such as GNSS, WLAN, or mobile networks
are generally unavailable in mines, tunnels, or cave systems—or become non-functional in emergency
scenarios. In short: there is “no longer any help from above” [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. At the same time, the demand for
reliable positioning information is high—both in routine operations and in critical emergencies.
      </p>
      <p>Typical application scenarios include:
(a) Routine operation in industrial settings (e.g., navigation of personnel, machine guidance,
documentation of tunneling progress),
(b) Emergency operation in the event of power failure or structural collapse, such as for self-rescue
or locating missing persons,
(c) Exploratory use in research, e.g., in unmapped mines or caves where no technical infrastructure
exists, can be provided, or is allowed (e.g., visitor mines, cave expeditions, or unauthorized
entries).</p>
      <p>In routine operation, underground positioning systems are typically designed to transmit the position
of workers and machines to a central control unit. Seguel et al. refer to such systems as “Remote
Positioning” when the position is determined externally to the client, and as “Indirect Remote
Positioning” when the client determines its position but transmits it to a central system [2, p. 9]. A variety of
commercial solutions exist for this use case, predominantly based on radio-frequency technologies. A
key example are leaky feeder systems, also referred to as “radiating cables” [3, p. 1], [4, p. 15]. These
systems use special cables with periodic openings (“leaks”) to emit signals at regular intervals along a
tunnel (first core) and simultaneously receive signals (second core).</p>
      <p>
        Originally designed for communication, these systems are now also being explored for positioning
purposes using spectral analysis of dedicated chirp signals [
        <xref ref-type="bibr" rid="ref4 ref5">5, 4</xref>
        ]. Algorithms such as Time of Flight are
also employed. Both methods rely on external infrastructure and specialized end devices [
        <xref ref-type="bibr" rid="ref4 ref6">6, 4</xref>
        ]. As long
as the infrastructure remains intact, these systems are robust and widely used in the mining industry.
      </p>
      <p>In a review study, Yarkan et al. point out the advantages of coverage, but also highlight the need for
line-of-sight (LOS), power supply, and the susceptibility to single cable cuts as major disadvantages [7,
p. 136]. If the cables remain intact, leaky feeder systems can provide cost-efective communication even
in emergencies [“£10/100 m” 8, p. 226]. Bedford et al. report a “useable signal strength [...] to a range of
800 m” [8, p. 224].</p>
      <p>
        The application contexts of “emergency operation” and “exploration” in particular lead to a number
of specific requirements for localization systems. The main focus is on resilience to infrastructure
failure, robustness to environmental conditions (e.g., darkness, moisture, dust, unstable geometries),
and intuitive usability—even under stress, systems must be operable by non-expert users [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This
results in a clear demand for localization systems that operate on the client side and are capable of
delivering reliable position information despite adverse conditions.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Research on Client-side Underground Localization</title>
      <p>
        In routine underground operations, it is essential to know the location of personnel at all times in
order to initiate targeted rescue measures in the event of an emergency. Workers are trained in how to
act. In non-productive settings—such as visitor mines or cave exploration by laypersons—client-side
localization is often the only way to inform the user of their position. Seguel et al. refer to this approach
as “Self Positioning”, but describe the clients as “dumb node[s]” [2, p. 9]. This terminology suggests that
the clients do not perform the position estimation themselves but merely receive externally computed
results. In such underground applications, mines can be retrofitted after their productive phase with
localization technologies. With the increasing substitution of formerly specialized technology by
standardized “of-the-shelf” solutions, positioning functionality is becoming available to clients without
further technical efort. WiFi access points with RSSI-based distance estimation [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ], as well as
ZigBee, Bluetooth [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ], and 5G [
        <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
        ] are increasingly used. These technologies enable both
centralized and client-side communication and localization.
      </p>
      <p>The notion of Self Positioning—understood as actual position estimation performed by the
client—stands in contrast to the dumb-node paradigm. In exploration scenarios, no external option for
position estimation or communication is typically available. Systems should therefore also be evaluated
in terms of the degree to which the client is capable of autonomously determining its own position.
Table 1 lists works that implement signal acquisition and evaluation on the client side.
Summary of Trends and Gaps The literature shows a clear dominance of RF-based approaches, yet
true infrastructure-free client-side systems remain rare. While many systems achieve sub-meter accuracy
in controlled environments, real-world evaluations—especially under emergency constraints—are scarce.
Magnetic methods ofer promising alternatives, particularly when combined with inertial fusion, but
their deployment is currently limited to prototypes.</p>
      <sec id="sec-3-1">
        <title>3.1. System classification by signal source</title>
        <p>An analysis of the identified signal technologies reveals a clear dominance of radio-frequency (RF)-based
systems. A total of 15 of the examined systems utilize RF communication. Another focus is on optical
systems, either in the form of visible light communication (VLC) or through sensor technologies such
as cameras. These optical methods often achieve very high accuracy in the sub-meter range, but rely
on line-of-sight conditions and stable lighting environments.</p>
        <p>Magnetic field–based localization is represented by a total of five systems. Two of these systems
generate and evaluate artificial magnetic fields: Lin et al. and Abrudan et al. use wireless underground
sensor networks (WUSNs) to create time-modulated magnetic fields, which are then used by clients to
estimate their position [36, p. 1454], [25, p. 4389].</p>
        <p>Of the three systems that rely on the Earth’s magnetic field [ 43, 42, 44], one is used to reconstruct
the trajectory of a drill during a boring operation [42]: In this case, the position of the drill head is
estimated via dead reckoning and refined using geomagnetic fingerprinting [“dead reckoning is used at
ifrst” 42, p. 1379].</p>
        <p>Haverinen and Kemppainen recorded magnetic vectors using a sensor array mounted on a board
containing 60 sensors distributed over an area of 0.5 × 0.5 m [44]. The authors employed Monte Carlo
Localization (MCL) using the measurements from these 60 sensors. Particle filter–based methods often
require a prior reference map or rely on server-side computation, as is the case in the work of Haverinen
and Kemppainen [44].</p>
        <p>Among the surveyed systems, filtering techniques include Kalman filters (e.g., for inertial fusion),
Particle filters (e.g., for geomagnetic localization), and SLAM-based graph optimization.</p>
        <p>In summary, RF-based systems continue to play a dominant role in underground positioning. While
optical methods are being explored, their real-world deployment remains limited. Alternative
signal sources such as magnetism, light, or acoustics are currently used primarily in specialized niche
applications.
Comparative overview of underground self-localization systems based on primarily client-side or
clientassisted signal processing and positioning (“client-side” topology means: both, signal acquisition and</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. System classification according to topology and infrastructure</title>
        <p>The systems considered in this survey can be categorized based on their topology into three types:
• fully client-side systems,
• systems with a return channel,
• and approaches with server-side computation based on client-side data acquisition.</p>
        <p>A special case in which the client merely transmits a signal while reception and computation are fully
handled on the server side was included as last item in table 1 for completeness, but strictly speaking, it
does not qualify as client-side data acquisition or processing.</p>
        <sec id="sec-3-2-1">
          <title>3.2.1. Client-Side Systems</title>
          <p>
            In the first category—fully client-side systems—all positioning computations are carried out locally
on the device, without any return channel or external servers. These systems are characterized by
high autonomy and are particularly suitable for emergency scenarios and exploration settings without
network connectivity. Examples include systems that rely solely on optical sensing or inertial navigation.
Ren and Wang describe a system based on 3D LiDAR and odometry, which operates entirely onboard a
remotely controlled vehicle in a tunnel environment [
            <xref ref-type="bibr" rid="ref32">32</xref>
            ]. Similarly, the LiDAR-based solution by Reid
et al. follows this topology and was evaluated in a small-scale test setting on a paved surface [
            <xref ref-type="bibr" rid="ref29">29</xref>
            ]. It
should be noted that while both systems function autonomously, the required computing hardware
necessitates integration into larger vehicles.
          </p>
          <p>
            An intermediate form between pure client-side and server-based approaches is represented by the
system of Li and Zhan. They use a laser scanner for onboard localization of mining vehicles in a
real-world scenario, while higher-level functions such as path planning, progress monitoring, and data
fusion are handled by a central server [
            <xref ref-type="bibr" rid="ref21">21</xref>
            ].
          </p>
          <p>
            Client-side systems typically rely on infrastructure-free principles or strategically placed
sensors [40, “distance between nodes”], [
            <xref ref-type="bibr" rid="ref20">20</xref>
            ]. Their accuracy varies, but often reaches the sub-meter
range—particularly when visual or inertial sensor fusion techniques are applied. Compared to client-side
with return channel or client-side data acquisition with server-side computation, these systems are more
frequently tested in real-world underground scenarios.
          </p>
        </sec>
        <sec id="sec-3-2-2">
          <title>3.2.2. Client-Side with Return Channel</title>
          <p>Another category includes systems with a return channel, in which the end device collects data locally,
but the actual position estimation is carried out by a central instance. Wu and Zhang implemented
a system based on visible light, in which the mobile device communicates with a central unit using
Manchester-modulated headlamp signals [37]. In [41], VLC signals are combined with inertial step
counting, and a reverse communication path to the base station is integrated. This inverts the traditional
principle: headlamps transmit a code, which is received by ceiling-mounted sensors. Lin et al. use a
magnetic system enhanced by return-channel communication to improve positioning accuracy [36].</p>
          <p>Infrastructure in this class is typically characterized by strategic placement or reuse of existing
infrastructure. The resulting accuracies often fall below one meter, especially when UWB or hybrid
methods are employed.</p>
        </sec>
        <sec id="sec-3-2-3">
          <title>3.2.3. Client-Side Data Acquisition with Server-Side Computation</title>
          <p>In the third category, data is acquired locally, while the actual position computation is carried out on a
server. Cypriani et al. refer to the central unit as an “aggregation server” [39, p. 3]. These systems are
therefore not suitable for ofline use and are typically intended for production-related applications. Lin
et al. present a WiFi fingerprinting system, in which positioning for “moving Android smart phones”
is handled by a dedicated server module (“database server”) [38, p. 4]. The system was deployed in a
large-scale tunnel setting of a dam project and achieved positional accuracies of around 3–5 meters.</p>
          <p>Yinjing et al. developed a method based on feature vectors and matching against a previously recorded
tunnel database. Signal characteristics are captured on the mobile device, but the actual matching is
performed on a server [45]. The UWB-based system by Song et al. also follows this architecture and uses
a particle filter to enhance server-side estimation accuracy [ 46]. However, the test setup was limited
in scale [“nine reference points” 46, p. 7]. The underlying infrastructure in this category is typically
strategically placed.</p>
        </sec>
        <sec id="sec-3-2-4">
          <title>3.2.4. Conclusion on System Topology</title>
          <p>The variety of analyzed systems demonstrates that there is no one-size-fits-all solution for underground
applications. Systems with fully client-side computation ofer the greatest potential for autonomous
operation in infrastructure-poor or emergency-driven scenarios. In contrast, return-channel and
servercentric architectures provide high accuracy and feature-rich functionality for production use but rely
on intact communication links.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusion and Outlook</title>
      <p>The review of existing systems for client-side underground localization reveals a wide range of technical
approaches, whose suitability depends heavily on the specific application context. While
infrastructurebased solutions still dominate in productive mining operations, autonomous client-side systems are
particularly relevant for exploratory scenarios, temporary deployments, and emergencies. Their ability
to operate independently of central infrastructure or communication makes them an essential component
of future localization strategies.</p>
      <p>The systems analyzed can be grouped into three main categories: fully client-side systems, systems
with a return channel, and systems with server-side computation. Notably, there is a growing number
of solutions that enable localization directly on the client device. These systems increasingly rely on
modern sensor technology (e.g., LiDAR, cameras, inertial units, magnetic sensors) and algorithmic
methods such as particle filters, SLAM, or deep learning. The rising computational power of mobile
devices is gradually shifting previously server-side computations to the clients themselves, increasing
their autonomy—especially in the context of computationally intensive methods such as fingerprinting,
particle filtering, and neural networks.</p>
      <p>Nevertheless, significant research gaps remain. Many of the systems described in the literature
are prototypes, simulations, or were evaluated only under idealized conditions. As a result, their
applicability to real, complex underground environments is not always guaranteed. In particular,
systems that operate entirely without infrastructure remain rare—despite their especially high value in
emergency scenarios.</p>
      <p>Future research should increasingly focus on robust localization methods that function without
infrastructure and remain operational even under harsh conditions. In addition, systematic evaluation
under realistic field conditions is needed to ensure the practical viability of proposed approaches. The
combination of standardized sensor technology, eficient signal processing, and adaptive, learning-based
algorithms ofers promising perspectives for the development of resilient underground navigation
systems.</p>
    </sec>
    <sec id="sec-5">
      <title>Author Contributions, CRediT Statement</title>
      <p>In accordance with the CRediT (Contributor Roles Taxonomy) taxonomy, the first author was solely
responsible for the conceptualization, methodology, investigation, formal analysis, data curation,
visualization, and writing of the original draft and revisions of the manuscript. Authors 2 and 3 acted in
supervisory and administrative roles, providing institutional support and funding acquisition. They
were not involved in the conceptual development, writing, or editing of the manuscript.</p>
    </sec>
    <sec id="sec-6">
      <title>Author Contributions and Declaration on Generative AI</title>
      <p>In line with the CEUR-WS Taxonomy for the Use of Generative AI in Scientific Writing 1, the author(s)
used GPT-4 during the preparation of this work for piecewise translation of text segments (T1.1) and
for grammar and spelling correction (R1.1). These uses were limited to language-level assistance; all
intellectual contributions remain the sole responsibility of the human authors.
tioning, thesis, Toronto Metropolitan University, 2023. doi:10.32920/24050727.v1.
[35] U. I. Minhas, I. H. Naqvi, S. Qaisar, K. Ali, S. Shahid, M. A. Aslam, A WSN for Monitoring and
Event Reporting in Underground Mine Environments, IEEE Systems Journal 12 (2018) 485–496.
doi:10.1109/JSYST.2016.2644109.
[36] S.-C. Lin, A. A. Alshehri, P. Wang, I. F. Akyildiz, Magnetic Induction-Based Localization in
Randomly Deployed Wireless Underground Sensor Networks, IEEE Internet of Things Journal 4
(2017) 1454–1465. doi:10.1109/JIOT.2017.2729887.
[37] G. Wu, J. Zhang, Demonstration of a Visible Light Communication System for Underground
Mining Applications, DEStech Transactions on Engineering and Technology Research (2016).
doi:10.12783/dtetr/iect2016/3708.
[38] P. Lin, Q. Li, Q. Fan, X. Gao, S. Hu, A Real-Time Location-Based Services System Using WiFi
Fingerprinting Algorithm for Safety Risk Assessment of Workers in Tunnels, Mathematical
Problems in Engineering 2014 (2014) 371456. doi:10.1155/2014/371456.
[39] M. Cypriani, G. Delisle, N. Hakem, Wi-Fi-based positioning in underground mine tunnels, in:
International Conference on Indoor Positioning and Indoor Navigation, 2013, pp. 1–7. doi:10.
1109/IPIN.2013.6817894.
[40] Y. Qin, C. Zhou, S.-H. Yang, F. Wang, A distributed newton iteration based localization scheme in
underground tunnels, in: Proceedings of 2012 UKACC International Conference on Control, 2012,
pp. 851–856. doi:10.1109/CONTROL.2012.6334743.
[41] M. Pang, K. Zhang, X. Yang, Y. Yin, S. Gao, P. Chen, Reliable Visible Light-Based Underground
Localization Utilizing a New Mechanism: Reverse Transceiver Position, Lecture Notes in Computer
Science (2020). doi:10.1007/978-3-030-59019-2_7.
[42] B. Park, H. Myung, Resilient Underground Localization Using Magnetic Field Anomalies for
Drilling Environment, IEEE Transactions on Industrial Electronics 65 (2018) 1377–1387. doi:10.
1109/TIE.2017.2733420.
[43] T. Makkonen, R. Heikkilä, A. Kaaranka, The applicability of a geomagnetic field based
positioning technique with mobile phone to underground tunnels, 31st International Symposium on
Automation and Robotics in Construction and Mining, ISARC 2014 - Proceedings (2014) 953–959.
[44] J. Haverinen, A. Kemppainen, A geomagnetic field based positioning technique for underground
mines, in: 2011 IEEE International Symposium on Robotic and Sensors Environments (ROSE),
2011, pp. 7–12. doi:10.1109/ROSE.2011.6058533.
[45] G. Yinjing, S. Xianqi, Y. Lei, L. Wenhong, A Coal Mine Underground Localization Algorithm
Based on the Feature Vector, Journal of Engineering and Technological Sciences 51 (2019) 184–197.
doi:10.5614/j.eng.technol.sci.2019.51.2.3.
[46] B. Song, S. Zhang, J. Long, Q. Hu, Fingerprinting Localization Method Based on TOA and Particle
Filtering for Mines, Mathematical Problems in Engineering 2017 (2017) 3215978. doi:10.1155/
2017/3215978.
[47] D. Larionov, O. Lukashenko, A. Moschevikin, R. Voronov, A. Sikora, Improving the Accuracy
for Radio-Based Positioning in Mines Using SLAM, in: 2020 IEEE 5th International Symposium
on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and
Advanced Computing Systems (IDAACS-SWS), 2020, pp. 1–7. doi:10.1109/IDAACS-SWS50031.
2020.9297088.
[48] Z. Li, Z. Li, Reference coordinate based Chan algorithm for UWB personnel localization in
underground coal mines, Scientific Reports 15 (2025) 17922. doi:10.1038/s41598-025-03007-6.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Fischer</surname>
          </string-name>
          ,
          <article-title>Wegweiser zum Trefen mitten im Berg, Neue Zürcher Zeitung (</article-title>
          <year>2007</year>
          ). URL: https: //www.nzz.ch/wegweiser_zum_trefen_mitten_im_berg-ld.
          <volume>449816</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Seguel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Palacios-Jativa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Azurdia-Meza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Krommenacker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Charpentier</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Soto</surname>
          </string-name>
          , Underground Mine Positioning: A Review,
          <source>IEEE Sensors Journal</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <fpage>4755</fpage>
          -
          <lpage>4771</lpage>
          . doi:
          <volume>10</volume>
          . 1109/JSEN.
          <year>2021</year>
          .
          <volume>3112547</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>N.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Fernando</surname>
          </string-name>
          ,
          <article-title>Reduced side lobe MM-wave leaky feeder transceiver by slot space optimization</article-title>
          ,
          <year>2015</year>
          . doi:
          <volume>10</volume>
          .1109/GSMM.
          <year>2015</year>
          .
          <volume>7175463</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>O.</given-names>
            <surname>Blaszkiewicz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sadowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stefanski</surname>
          </string-name>
          ,
          <article-title>Position Estimation in Corridors Along the Coupled Mode of Radiating Cables</article-title>
          ,
          <source>Sensors</source>
          <volume>20</volume>
          (
          <year>2020</year>
          )
          <article-title>5064</article-title>
          . doi:
          <volume>10</volume>
          .3390/s20185064.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Moschevikin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Serezhina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sikora</surname>
          </string-name>
          ,
          <article-title>On the possibility to use leaky feeders for positioning in chirp spread spectrum technologies</article-title>
          ,
          <source>in: 2014 2nd International Symposium on Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems</source>
          , IEEE, Odessa, Ukraine,
          <year>2014</year>
          , pp.
          <fpage>56</fpage>
          -
          <lpage>65</lpage>
          . doi:
          <volume>10</volume>
          .1109/IDAACS-SWS.
          <year>2014</year>
          .
          <volume>6954624</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Seseña-Osorio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Zaldívar-Huerta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Aragón-Zavala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. A.</given-names>
            <surname>Castañón-Ávila</surname>
          </string-name>
          ,
          <article-title>Analysis and experimental evaluation of the frequency response of an indoor radiating cable in the UHF band</article-title>
          ,
          <source>EURASIP Journal on Wireless Communications and Networking</source>
          <year>2015</year>
          (
          <year>2015</year>
          )
          <article-title>24</article-title>
          . doi:
          <volume>10</volume>
          .1186/ s13638-015-0245-1.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yarkan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Guzelgoz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Arslan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Murphy</surname>
          </string-name>
          , Underground Mine Communications: A Survey,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>11</volume>
          (
          <year>2009</year>
          )
          <fpage>125</fpage>
          -
          <lpage>142</lpage>
          . doi:
          <volume>10</volume>
          .1109/SURV.
          <year>2009</year>
          .
          <volume>090309</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Bedford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. J. A.</given-names>
            <surname>Rodríguez López</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. J.</given-names>
            <surname>Foster</surname>
          </string-name>
          ,
          <article-title>Low-cost leaky feeder communication for mines rescue</article-title>
          ,
          <source>Mining Technology</source>
          <volume>129</volume>
          (
          <year>2020</year>
          )
          <fpage>217</fpage>
          -
          <lpage>227</lpage>
          . doi:
          <volume>10</volume>
          .1080/25726668.
          <year>2020</year>
          .
          <volume>1838110</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>F.</given-names>
            <surname>Hammer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pichler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Fenzl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gebhard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Hesch</surname>
          </string-name>
          ,
          <article-title>An acoustic position estimation prototype system for underground mining safety</article-title>
          ,
          <source>Applied Acoustics</source>
          <volume>92</volume>
          (
          <year>2015</year>
          )
          <fpage>61</fpage>
          -
          <lpage>74</lpage>
          . doi:
          <volume>10</volume>
          .1016/j. apacoust.
          <year>2014</year>
          .
          <volume>12</volume>
          .009.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Mohapatra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Keswani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nanda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Khanna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Keswani</surname>
          </string-name>
          ,
          <article-title>Precision local positioning mechanism in underground mining using IoT-enabled WiFi platform</article-title>
          ,
          <source>International Journal of Computers and Applications</source>
          <volume>42</volume>
          (
          <year>2020</year>
          )
          <fpage>266</fpage>
          -
          <lpage>277</lpage>
          . doi:
          <volume>10</volume>
          .1080/1206212X.
          <year>2018</year>
          .
          <volume>1551178</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Halder</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chakravarty</surname>
          </string-name>
          ,
          <article-title>Investigation of wireless tracking performance in the tunnel-like environment with particle filter</article-title>
          ,
          <source>Mathematical Modelling of Engineering Problems</source>
          <volume>5</volume>
          (
          <year>2018</year>
          )
          <fpage>93</fpage>
          -
          <lpage>101</lpage>
          . doi:
          <volume>10</volume>
          .18280/mmep.050206.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Zhigao</surname>
            <given-names>Liu</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Chunwen</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Qingqing</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <surname>Danchen Wu</surname>
          </string-name>
          ,
          <article-title>A coal mine personnel global positioning system based on wireless sensor networks</article-title>
          ,
          <source>in: 2010 8th World Congress on Intelligent Control and Automation</source>
          , IEEE, Jinan, China,
          <year>2010</year>
          , pp.
          <fpage>7026</fpage>
          -
          <lpage>7031</lpage>
          . doi:
          <volume>10</volume>
          .1109/WCICA.
          <year>2010</year>
          .
          <volume>5554279</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          , Engineering Project:
          <article-title>The Method to solve practical problems for the monitoring and control of Driver-less Electric Transport Vehicles in the underground mines</article-title>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .20944/preprints202103.
          <fpage>0585</fpage>
          .
          <year>v2</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Hadji</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nedil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Seddiki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. B.</given-names>
            <surname>Mabrouk</surname>
          </string-name>
          ,
          <article-title>Millimeter-Wave Massive MU-MIMO Performance Analysis for Private Underground Mine Communications</article-title>
          ,
          <source>IEEE Transactions on Antennas and Propagation</source>
          <volume>72</volume>
          (
          <year>2024</year>
          )
          <fpage>1792</fpage>
          -
          <lpage>1803</lpage>
          . doi:
          <volume>10</volume>
          .1109/TAP.
          <year>2023</year>
          .
          <volume>3340301</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Stefanovic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Panic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A</given-names>
            .
            <surname>A. De Souza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Reig</surname>
          </string-name>
          , Recent Advances in RF Propagation doi:
          <volume>10</volume>
          .1155/
          <year>2017</year>
          /4701208.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Štroner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Urban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Křemen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Braun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Michal</surname>
          </string-name>
          , T. Jiřikovský,
          <article-title>Scanning the underground: Comparison of the accuracies of SLAM and static laser scanners in a mine tunnel</article-title>
          ,
          <source>Measurement</source>
          <volume>242</volume>
          (
          <year>2025</year>
          )
          <article-title>115875</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.measurement.
          <year>2024</year>
          .
          <volume>115875</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Meng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Duan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>A new autonomous positioning method of Baseline-RFMDR and Kalman filter solution</article-title>
          ,
          <source>Measurement</source>
          <volume>240</volume>
          (
          <year>2025</year>
          )
          <article-title>115585</article-title>
          . doi:
          <volume>10</volume>
          . 1016/j.measurement.
          <year>2024</year>
          .
          <volume>115585</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A. F.</given-names>
            <surname>Dehghan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Azurdia-Meza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Soto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Seguel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Krommenacker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Iturralde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Charpentier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zabala-Blanco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Novel</given-names>
            <surname>Frequency Domain Visible Light</surname>
          </string-name>
          <article-title>Communication (VLC) ThreeDimensional Trilateration System for Localization in Underground Mining</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>9</volume>
          (
          <year>2019</year>
          )
          <article-title>1488</article-title>
          . doi:
          <volume>10</volume>
          .3390/app9071488.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>N.</given-names>
            <surname>Tahir</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Karim</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Sharif</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <source>Quadrant-Based Weighted Centroid Algorithm for Localization in Underground Mines</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>462</fpage>
          -
          <lpage>472</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -94268-1_
          <fpage>38</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Banda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <article-title>A robust approach for WSN localization for underground coal mine monitoring using improved RSSI technique</article-title>
          ,
          <source>Mathematical Modelling of Engineering Problems</source>
          <volume>5</volume>
          (
          <year>2018</year>
          )
          <fpage>225</fpage>
          -
          <lpage>231</lpage>
          . doi:
          <volume>10</volume>
          .18280/mmep.050314.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>J</surname>
            .-g. Li,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Zhan</surname>
          </string-name>
          ,
          <source>Intelligent Mining Technology for an Underground Metal Mine Based on Unmanned Equipment, Engineering</source>
          <volume>4</volume>
          (
          <year>2018</year>
          )
          <fpage>381</fpage>
          -
          <lpage>391</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eng.
          <year>2018</year>
          .
          <volume>05</volume>
          .013.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>D.</given-names>
            <surname>Iturralde</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Seguel</surname>
          </string-name>
          , I. Soto,
          <string-name>
            <given-names>C.</given-names>
            <surname>Azurdia-Meza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>A New VLC System for Localization in Underground Mining Tunnels</article-title>
          ,
          <source>IEEE Latin America Transactions</source>
          <volume>15</volume>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1109/TLA.
          <year>2017</year>
          .
          <volume>7896341</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>You</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.-i. Kim</surname>
          </string-name>
          ,
          <article-title>Vehicle autonomous localization in local area of coal mine tunnel based on vision sensors and ultrasonic sensors</article-title>
          ,
          <source>PLOS ONE 12</source>
          (
          <year>2017</year>
          )
          <article-title>e0171012</article-title>
          . doi:
          <volume>10</volume>
          .1371/journal.pone.
          <volume>0171012</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <article-title>Improved sequence-based localization applied in coal mine</article-title>
          ,
          <source>International Journal of Distributed Sensor Networks</source>
          <volume>12</volume>
          (
          <year>2016</year>
          )
          <article-title>1550147716669615</article-title>
          . doi:
          <volume>10</volume>
          .1177/1550147716669615.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>T. E.</given-names>
            <surname>Abrudan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Markham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Trigoni</surname>
          </string-name>
          , Underground Incrementally Deployed MagnetoInductive 3-
          <string-name>
            <given-names>D</given-names>
            <surname>Positioning</surname>
          </string-name>
          Network,
          <source>IEEE Transactions on Geoscience and Remote Sensing</source>
          <volume>54</volume>
          (
          <year>2016</year>
          )
          <fpage>4376</fpage>
          -
          <lpage>4391</lpage>
          . doi:
          <volume>10</volume>
          .1109/TGRS.
          <year>2016</year>
          .
          <volume>2540722</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>A Distributed UWB-based Localization System in Underground Mines</article-title>
          ,
          <source>Journal of Networks</source>
          <volume>10</volume>
          (
          <year>2015</year>
          )
          <fpage>134</fpage>
          -
          <lpage>140</lpage>
          . doi:
          <volume>10</volume>
          .4304/jnw.10.3.
          <fpage>134</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <source>Integrated Positioning for Coal Mining Machinery in Enclosed Underground Mine Based on SINS/WSN, The Scientific World Journal</source>
          <year>2014</year>
          (
          <year>2014</year>
          )
          <article-title>460415</article-title>
          . doi:
          <volume>10</volume>
          .1155/
          <year>2014</year>
          /460415.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>N.</given-names>
            <surname>Lavigne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Marshall</surname>
          </string-name>
          ,
          <article-title>A landmark-bounded method for large-scale underground mine mapping</article-title>
          ,
          <source>Journal of Field Robotics</source>
          <volume>29</volume>
          (
          <year>2012</year>
          )
          <fpage>861</fpage>
          -
          <lpage>879</lpage>
          . doi:
          <volume>10</volume>
          .1002/rob.21415.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>D.</given-names>
            <surname>Reid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dunn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Reid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ralston</surname>
          </string-name>
          ,
          <article-title>A practical inertial navigation solution for continuous miner automation (</article-title>
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>N.</given-names>
            <surname>Krommenacker</surname>
          </string-name>
          , Ó. C. Vásquez,
          <string-name>
            <given-names>M. D.</given-names>
            <surname>Alfaro</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Soto</surname>
          </string-name>
          ,
          <article-title>A self-adaptive cell-ID positioning system based on visible light communications in underground mines</article-title>
          ,
          <source>in: 2016 IEEE International Conference on Automatica (ICA-ACCA)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICA-ACCA.
          <year>2016</year>
          .
          <volume>7778427</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <source>Enhanced Berth Mapping and Clothoid Trajectory Prediction Aided Intelligent Underground Localization, Applied Sciences</source>
          <volume>14</volume>
          (
          <year>2024</year>
          )
          <article-title>5032</article-title>
          . doi:
          <volume>10</volume>
          .3390/ app14125032.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Accurate Real-Time Localization Estimation in Underground Mine Environments Based on a Distance-Weight Map (DWM)</article-title>
          ,
          <source>Sensors</source>
          <volume>22</volume>
          (
          <year>2022</year>
          )
          <article-title>1463</article-title>
          . doi:
          <volume>10</volume>
          .3390/s22041463.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , L. Chen, ULSM:
          <article-title>Underground Localization and Semantic Mapping with Salient Region Loop Closure under Perceptually-Degraded Environment</article-title>
          , in: 2022
          <source>IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1320</fpage>
          -
          <lpage>1327</lpage>
          . doi:
          <volume>10</volume>
          . 1109/IROS47612.
          <year>2022</year>
          .
          <volume>9982170</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>B.</given-names>
            <surname>Adhikari</surname>
          </string-name>
          ,
          <article-title>Neural Network Based Recursive Least Square Technique for Indoor Wireless Posi-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>