Preprint
Article

This version is not peer-reviewed.

IoT-Dynamic Indoor Localization Leveraging Transfer Learning Techniques

Submitted:

14 April 2026

Posted:

15 April 2026

You are already at the latest version

Abstract
With the rapid growth of location-based services (LBS) in the Internet of Things (IoT), fingerprint-based indoor localization has attracted attention for its high accuracy. However, environmental changes degrade signal stability, and traditional methods require frequent site surveys, leading to high labor and time costs. In response, we propose an adaptive Bluetooth Low Energy (BLE) indoor localization system that relies on an updated fingerprint to address these issues. We integrate the Domain Adaptation Localization (DALoc) method into the system. The framework combines historical data with deep transfer learning to extract features and update fingerprints based on a small amount of labeled data at a new time. To enhance the adaptability of the Received Signal Strength (RSS), we utilize historically collected RSS data to fit a K-order Gaussian mixture model (GMM). Furthermore, we assess the system’s performance using the Cramér-Rao lower bound (CRLB) to ensure reliability and robustness. The DAloc approach helps address the challenges posed by mixed and time-varying signals. We conducted multiple sets of experiments related to positioning error in the laboratory corridor, and the results demonstrate that the system’s location accuracy exceeds 70% when tested with dynamic signals, with a location error within the meter-level range.
Keywords: 
;  ;  ;  

1. Introduction

Location-based services (LBS) are often associated with the massive deployment of Internet-of-Things (IoT) applications. With highly accurate real-time localization techniques, user equipment (UE) can provide several unmanned functions, including robot collaboration [1] and autonomous driving [2,3,4,5]. With Global Navigation Satellite Systems (GNSS) and inertial guidance, meter-level localization accuracy is possible for outdoor IoT applications. However, more precise indoor location is desirable, such as smart healthcare and in-home asset tracking. It is still challenging to provide this type of LBS, where the navigation signals heavily attenuate due to the building blockage effects [6].
The researchers recently exploited various wireless communication systems to construct new navigation signals. For instance, the signal propagation of cellular network and wireless local area network considered in [7,8] and the achievable localization accuracy is around several meters. If sufficient and expensive infrastructure support for Ultra-wideband (UWB) pulse generation is available, UWB signals have been proposed in [9] to reach centimeter-level accuracy. Other types of wireless signals, including radio frequency identification, Zigbee, or magnetic field variations, have been proposed in [10,11,12], which achieves meter level localization results as well. Many scenes adopt Bluetooth Low Energy (BLE) in modern mobile devices to balance the infrastructure cost and operating energy consumption. Moreover, it also has been regarded as a high-precision localization technique, which is more feasible than other wireless communication systems [13].
Despite different types of wireless navigation signals, as mentioned before, the localization techniques can be mainly summarized into two categories, namely geometric-based and fingerprint-based schemes. The geometric-based localization approaches exploit the geometric relations between the localization entity and the reference stations, either through the simple cell proximity[14,15], the triangulation with propagation parameters[16,17], or even a hybrid of them[18]. The fingerprint-based mechanism, however, constructs a radio map with location-labeled signal features in the offline stage and compares it with the real-time observations to identify the locations online[19]. Generally speaking, with advanced pattern recognition and deep learning methods, high localization accuracy can be attained using the fingerprint-based scheme, which has attracted a tremendous amount of research attention recently[20].
One of the most critical components behind the highly accurate fingerprint-based localization scheme is the timely and exact signal features to construct the real-time radio map. Due to the time-varying scattering and reflection environments, the localization accuracy is shown to gradually degrade over time for many types of wireless navigation signals[21]. In this paper, we initiate a BLE fingerprint-based localization system to study the temporal correlations of the fingerprint database. We propose a novel approach to construct a self-evolving fingerprint database by applying the transfer learning-based algorithm, which achieves sub-meter level accuracy in the prototype localization systems using off-the-shelf BLE beacons.

3. Contributions and Organization

The contributions of this paper contain the following three parts: We formulate a BLE localization problem by considering the correlations2 of the fingerprint database, which has not been addressed in the existing literature.
Inspired by the transfer learning framework, we propose a novel approach to convert the original error minimization problem to the maximum mean discrepancy (MMD) minimization problem by exploiting the correlations. Moreover, we also derive a low-complexity localization method thereafter. We analyze the localization accuracy concerning the time-varying parameters to determine the potential application scenarios for the proposed algorithm. Although we cannot cover all types of wireless navigation signals, we hope the proposed scheme can shed some light on the future fingerprint-based localization system design.
The rest of this article is structured as follows. We present the system model for BLE indoor localization in Section 4 and discuss the learning-based problem formulation in Section 5. In Section 7, we propose MMD minimization-oriented scheme and analyze the corresponding performance in Section 8. Numerical examples are demonstrated in Section 9 and we finally conclude this paper in Section 10.

4. System Model

In this section, we briefly describe the topology model, the BLE signal propagation model, and the construction of different fingerprint databases.

4.1. Topology & BLE Channel Models

Consider a BLE localization system with N i iBeacons uniformly distributed along the corridor as shown in Figure 1, and the corresponding locations are denoted by L 1 , , L N i . Within the entire space A defined by this corridor, we uniformly select N R P reference points (RPs) to construct the fingerprint database DB , where their locations are given by L R P 1 , , L R P N R P , respectively. The localization entity, with the target location L m , collects the received signals from N i iBeacons and estimates its location by comparing them with the fingerprint database, e.g., DB .
Given a time slot t, the received BLE signal vector at the localization entity, y ( L m , t ) C N i × 1 , is modeled as,
y ( L m , t ) = h ( L m , t ) x + n ( L m , t ) ,
where x and h ( L m , t ) = h 1 ( L m , t ) , , h N i ( L m , t ) T C N i × 1 denote the transmitted beacon signals with normalized power, and the channel conditions between iBeacons and the localization entity, respectively. n ( L m , t ) = n 1 ( L m , t ) , , n N i ( L m , t ) T C N i × 1 is additive white Gaussian noise (AWGN) with zero mean and unit variance. The received signal strength (RSS), e.g. r ( L m , t ) = r 1 ( L m , t ) , , r N i ( L m , t ) T C N i × 1 , is thus given by,
r ( L m , t ) = y ( L m , t ) y * ( L m , t ) ,
where ⊙ denotes the element-wise multiplication, and ( · ) * denotes the complex conjugate operation3.

4.2. Fingerprint Database

By collecting RSS information of N R P RPs, we can form a time-varying BLE signal fingerprint database, DB t , for a given time slot t as follows,
DB t = r ( L R P 1 , t ) , L R P 1 , t r ( L R P N R P , t ) , L R P N R P , t .
In the practical systems, we can regularly update the fingerprint database by measuring the instantaneous RSS of N R P RPs. Without loss of generality, we choose T 1 and T 2 to be the closest database updating time stamps and T 3 localization time. Therefore, we rely on measured fingerprint databases DB T 1 and DB T 2 to infer the instantaneous database DB T 3 and perform the localization process afterward.
The following assumptions are made throughout the rest of this paper. First, we assume T 2 T 1 T 3 T 2 4, since the fingerprint database can not be updated very frequently. Secondly, we apply a time-varying K-order Gaussian mixture model (GMM) as explained in [37,38,39], e.g.,
r ˜ ( L , t ) = C R S S k = 1 K α k ( t ) N ( μ k ( t ) , Σ k ( t ) ) ,
to fit the collected RSSs in the database DB t , such that for all L m and t, | | r ( L m , t ) r ˜ ( L m , t ) | | ξ . Last but not least, we assume the GMM consistency holds true for T 3 as discussed in [40,41,42].

5. Problem Formulation

This section will formulate the mean square error (MSE) minimization problem and then derive the equivalent form for MMD minimization.

5.1. MSE Minimization Problem

Denote F ( · ) to be the mapping function from the instantaneous (e.g., t = T 3 ) measured RSS, r ( L m , T 3 ) , and the estimated location L ^ m . The initial MSE minimization problem can be formulated as follows.
Problem 1
(MSE Minimization). The MSE minimized strategy, F ( · ) , can be determined by solving the following optimization problem.
minimize F ( · ) 1 M m = 1 M L m L ^ m 2 2 ,
subject to L ^ m = F r ( L m , T 3 ) , DB T 1 , DB T 2 ,
L ^ m , L m A , m 1 , , M ,
where · 2 denotes the Euclidean norm as specified in [43] and M is the total number of localization rounds.
The above optimization problem is challenging to solve since the searching space contains all the possible mathematical functions. In order to reduce the implementation complexity of the function F ( · ) , we decompose the entire MSE minimization into two stages, including the instantaneous database inference and the standard KNN algorithm5 based on the inferred database DB T 3 ^ . Mathematically, we have the following transferred MSE minimization problem.
Problem 2
(Transferred MSE Minimization). With the decomposed localization structure, the transferred MSE minimization problem is given by,
minimize F 2 ( · ) 1 M m = 1 M L m L ^ m 2 2 ,
subject to L ^ m = F 1 r ( L m , T 3 ) , DB T 3 ^ ,
L ^ m , L m A , m 1 , , M ,
DB T 3 ^ = F 2 DB T 1 , DB T 2 ,
where F 1 ( · ) denotes the standard KNN localization scheme, and F 2 ( · ) denotes the migration function from the existing databases DB T 1 , and DB T 2 to the inferred database DB T 3 ^ .
In the above formulation, the optimization framework is still difficult to solve, since there is a limited design guideline for the database migration function F 2 ( · ) . Following the aforementioned time-varying GMM model, we define the ill-conditioned function Φ ( · ) to be the mapping relations between the measured RSSs and the fitted RSSs, e.g., r ˜ ( L m , t ) = Φ r ( L m , t ) , and the entire migration function F 2 ( · ) can thus be obtained by learning the time-varying relation of the GMM models and approximating the function Φ ( · ) through the following MMD minimization.

6. MMD Minimization Problem

In order to obtain the mapping function Φ ( · ) , we first define the temporal MMD to describe the differences between two fingerprint databases and propose the corresponding MMD minimization problem as follows.
Definition 1
(Temporal MMD). Without loss of generality, we define the temporal MMD between two different fingerprint databases to be the discrepancy of two time-varying GMMs in the Reproducing Kernel Hilbert Space (RKHS). Mathematically, the temporal MMD of DB T 1 and DB T 2 , e.g., M ( DB T 1 , DB T 2 ) , is given by
M ( DB T 1 , DB T 2 ) = i = 1 N R P Φ r ( L R P i , T 1 ) j = 1 N R P Φ r ( L R P j , T 2 ) H 2 .
Problem 3
(MMD minimization). The ill-conditioned function Φ ( · ) can be obtained by solving the following MMD minimization problem, which is given by,
minimize Φ ( · ) M ( DB T 1 , DB T 2 ) ,
subject to r ˜ ( L m , T 1 ) = Φ r ( L m , T 1 ) ,
r ˜ ( L m , T 2 ) = Φ r ( L m , T 2 ) .
Lemma 1.
Problem 3 and Problem 2 are equivalent.
Proof of Lemma 1 
Please refer to Appendix A for the proof. □
The aforementioned MMD minimization problem overcame the challenge of fitting the mapping function Φ ( · ) , which was not resolved. As a result, we attempt to integrate the underlying feature distributions of the temporal fingerprint databases to explain the solution practicability in Section 8.

7. Proposed MMD Minimization Scheme

In this section, we propose a domain adaptation localization (DALoc) method based on solving the MMD minimization problem as defined in Problem . To be more specific, we approximate the nonlinear mapping function Φ ( · ) via deep domain adaptation networks, and the corresponding framework is depicted in Figure 1.

7.1. Deep Domain Adaptation Networks

In order to shrink the updated cycle of the fingerprint database, the system considers domain adaptation of transfer learning. For the domain adaptation, the probability distributions of the source and target domains are mapped in the same space, and the discrepancy between the probability distributions is minimized. Intuitively, acquiring the mapping function is the primary task of domain adaptation. Therefore, minimizing the discrepancy between the fingerprint databases mapped in the same space is the ultimate goal. Concerning the domain adaptation networks, the input is the two fingerprint databases at time intervals, and the output is the transferable feature between the fingerprint databases.
Our primary objective is to establish a mapping function between location coordinates and fingerprint features in the database. To accomplish this, we use labeled wireless signals as input and produce likelihood probability distributions of position coordinates as output. Initially, we use DCNN for feature extraction and dimensionality reduction. However, since the convolutional layers only learn the general features of the related dataset, the unique features of the data can only emerge when the network is deep enough. Therefore, we add MMD domain adaptation at the end and output the classification results through a fully connected network. In our practical system, we collect RSS at the reference point during T 1 and T 2 to construct the corresponding location fingerprint databases, DB T 1 and DB T 2 . We then update the fingerprint database and network parameters by training the neural network. We evaluate the algorithm’s ability to build the fingerprint database by using unlabeled T 3 data as test data and passing it through the trained network model.
Inspired by the conventional transfer learning technique as illustrated in [45], we design the neural network architecture as shown in Figure 2, where the deep convolutional neural networks (DCNN) are applied to extract the high dimensional transferable features for the source domain DB T 1 and the target domain DB T 2 . Furthermore, with two identical neural network architectures for the source domain DB T 1 and the target domain DB T 2 , we can minimize the temporal MMD by establishing the following discrepancy loss function,
L m = M ( DB T 1 , DB T 2 ) ,
We derive the mapping function Φ ( · ) by obtaining transferable features after training with the temporal MMD. We can predict the RSS data based on the relationship between the mapping function and the actual data in problem 3, we can predict the RSS data. Then, we employ the classification layer to train each label to predict the corresponding coordinate task. The reconstruction process employs layers of transferable features extracted by DCNN to construct renewed labels and coordinates. Therefore, for the loss function of the classification layer, we regard the cross-entropy to illustrate the probability distribution between the estimated output probability g i p and the ground-truth label g ^ i p , which can be represented by,
L c = i = 1 N R P g i p log g ^ i p .
The objective is to train a model that minimizes the classification and the temporal MMD loss function. Therefore, when the general loss function is minimized, the total loss function can be established in the following mathematical form,
L t o t a l = L c + λ L m = i = 1 N R P g i p log g ^ i p + λ M ( DB T 1 , DB T 2 ) ,
where λ is the weight parameter that balances the important proportions between the classification and the discrepancy loss function.

7.2. Data Collection and Processing

Compared with a significant amount of time for establishing the fingerprint database, the influence of the short-term temporal variation caused by collecting the RSS values can be ignored. Since the measured RSS in the practical systems is easily affected by multiple fading paths, and surrounding environments change. Therefore, we removed outliers due to the fluctuations in the RSS caused by environmental changes. Considering large batches of the RSS data will increase the algorithm complexity of the networks. We process the RSS measurements by the average of the quantitative RSS value as follows,
r n i ( L m , t ) = 1 N o = 1 N r ^ o n i ( L m , t ) .
Here, r ^ o n i ( L m , t ) is the o-th ( o 1 , , N ) raw collection values at the certain L m from the n i -th ( n i 1 , , N i ) AP and N is a fixed constant that denotes the average number.

7.3. Training Skills

We design the deep transfer learning networks in detail as follows. The proposed DCNN architecture consists of five convolutional, pooling, and FC layers. The aspiration of devising DCNN is to learn generic features that can be prone to transferable and are sightly domain-biased. Therefore, we opt to freeze in c o n v 1 c o n v 3 and fine-tune in c o n v 4 c o n v 5 . In DCNN, average polling and fully connected (FC) layers are also utilized to output the transferable features to the one-dimensional feature vector. Since the adaptation layer is often employed to analyze the temporal MMD to minimize the domain discrepancy, we embed a lower-dimensional adaptation layer into the proposed domain adaptation architecture and fetched the latent mapping function in the temporal domain by minimizing the temporal MMD to accomplish domain adaptation.
Furthermore, we introduce the training option parameters of the structure and configuration as depicted in Figure 2. The proposed architecture includes FC hidden layers, the number of cells in each layer, the learning rate, and the gradient update algorithm. We utilize the Rectified Linear Unit (ReLU) as an activation function in the training process. The whole training epoch should be tiny for deep domain adaptation, and optimization proceeds using the Adam optimizer for 10 , 000 iterations. The batch size is set to 32 for learning at each iteration. We set the number of training epochs to 10. The output layer composes neurons equal to the number of reference points in the fingerprint database. It is finally trained as a multinomial classifier by the softmax function in the output layer.
Moreover, before the neural networks were pre-trained, the global learning rate was arranged to a value of 10 4 . For the MMD model, a linear combination of 19 RBF kernels is used. Finally, the source and target domain data are fed to the network to calculate the final estimations, and the performance measures can be obtained. With the above neural network configuration and the loss function setting, the time domain fingerprint evolution knowledge is transferred across different time stamps by minimizing the temporal MMD. The physical interpretation is that the neural network architecture learns domain-invariant features from the discrepancies between two different fingerprint databases, which can be applied to update the fingerprint database for upcoming localization.

7.4. Reconstructed Fingerprint

The temporal RSS data and location are redrafted through the same network to produce the renewed fingerprint database. We obtain the feature vector through the DCNN feature extraction layer for the labeled data. After obtaining the feature vector, labeled or unlabeled data, we reconstruct new labeled data very close to the original data through the reconstruction layer. Similarly, we also accomplish data augmentation through adaptive layers for the labeled data.
DALoc utilizes domain-adaptive transfer learning to construct the fingerprint database. The system learns a function that can transfer localization features, and the function can learn localization knowledge from the initial fingerprint database to the time-varying fingerprint database. Under the condition that the time change is satisfied, DALoc maps the initial DB T 1 and the outdated DB T 2 fingerprint database in the time domain to the same subspace. Moreover, when the time T 3 meets T 2 T 1 T 3 T 2 , the system generates the split-new fingerprint database by a small number of RPs after the network is trained, thereby reducing the workload in the offline phase overhead. Finally, after acquiring a small number of labels at the new time T 3 , the positioning system automatically revises the fingerprint database to obtain the estimated position coordinates.
During the positioning phase, users can obtain location information by reporting their RSS to the server. The trained network will then update a set of network parameter vectors, which primarily consist of the likelihood probability distribution related to the user’s final location. The final position can be mathematically expressed using a vector that includes the updated probability distribution and its corresponding coordinates, as follows,
L ^ t + 1 d = p = 1 N P g ^ t + 1 , p d · L p c
where L c p represents a set of all possible position coordinates corresponding to the likelihood probabilities g ^ t + 1 , p d in the d-th target. Besides, N p is the total number of the location time instants.

8. Performance Analysis

We conduct a draft to derive a theoretical Cram e ´ r-Rao Lower Bound (CRLB) analysis of the generalization bound for the MMD minimization problem estimation in this section. Generally, the CRLB [46] is utilized to estimate the performance in the field of localization systems. It is well known that the CRLB is defined as the lower bound for the variance matrix of the unbiased location estimator, which is represented as the inverse of the Fisher Information Matrix (FIM) [47].

8.1. CRLB for Location Error

In the localization system, the coordinate L m = ( x m , y m ) and RSS r ( L m , t ) can be linked together according to the channel attenuation model of BLE in [48]. After the CRLB analysis for the RSS, it is because of the existence of this connection that we can fetch the CRLB of the location error through the transpose matrix.
As the fitted RSS r ( L m , t ) model, we denote the parameters interrelated r ˜ ( L m , t ) as the set for the GMM unknown parameters θ = ( γ 1 T , , γ K T T k = 1 K R K × 3 in the target location coordinate L m = ( x m , y m ) R 2 . Mathematically, we define the k-th GMM component of the vector γ k as follows,
γ k = α k ( t ) , μ k ( t ) , Σ k ( t ) .
According to [49], the CRLB of the localization error estimation for the target location L m is lower bounded by,
C o v ( L ^ m ) Φ ( · ) H | L m L ^ m | 2 = E r ˜ ( L m , t ) ( L m L ^ m ) ( L m L ^ m ) T J ( L ^ m ) 1 2 × 2 ,
where [ · ] 2 × 2 is denoted by the operation to the upper left sub-matrix. In addition, J ( L ^ m ) is the FIM for the estimated parameter θ at the target location.
Corollary 1.
When the error ϱ θ is derived in θ , we can obtain the CRLB of localization error that is defined as,
ϱ θ = t r J ( L ^ m ) 1 2 × 2 ,
where t r · denotes the trace of the matrix. And a lower bound on the estimation variance of the location error is provided in ( 23 ) .
Proof of Corollary 1. 
Please refer to Appendix B for the proof. □
Therefore, we can derive the CRLB of the localization error analysis at the estimated location from c o r o l l a r y 1.

8.2. The Temporal RSS Analysis

In the context of obtaining the optimal function Φ ( · ) , assuming that θ ˜ is the unbiased estimate θ , then its covariance matrix is,
C o v θ Φ ( · ) H ( θ ˜ ) = E θ ( θ ˜ θ ) ( θ ˜ θ ) T ,
where E θ ( · ) is defined as the expectation operator. In the light of the CRLB definition, the covariance matrix also can be expressed as,
C o v θ Φ ( · ) H ( θ ˜ ) J θ 1 .
Then according to[50], the FIM, J θ , is depicted as,
J θ = E l n P ( r ˜ ( L m , t ) ; θ ) θ 2 .
Hence, the formula (26) can be calculated by,
J θ = E ( γ 1 , γ 1 ) , , E ( γ 1 , γ K ) E ( γ K , γ 1 ) , , E ( γ K , γ K ) K × K ,
where E ( γ k , γ k ) denote the item at k-th row and k-th column in the matrix (27). And it is described as the following form,
E ( γ k , γ k ) = E l n P ( r ˜ ( L m , t ) ; θ ) 2 γ k γ k T = G ( α k ( t ) , α k ( t ) ) , G ( α k ( t ) , μ k ( t ) ) , G ( α k ( t ) , Σ k ( t ) ) G ( μ k ( t ) , α k ( t ) ) , G ( μ k ( t ) , μ k ( t ) ) , G ( μ k ( t ) , Σ k ( t ) ) G ( Σ k ( t ) , α k ( t ) ) , G ( Σ k ( t ) , μ k ( t ) ) , G ( Σ k ( t ) , Σ k ( t ) )
And we denote P ( r ˜ ( L m , t ) ; θ ) as the joint probability density function (PDF) of the estimated r ˜ ( L m , t ) conditioned on θ . Then, because the received RSS of each AP is independent, the joint PDF P ( r ˜ ( L m , t ) ; θ ) can be established by a form as following form multiplied by N i single Gaussian distribution,
L = P ( r ˜ ( L m , t ) ; θ ) = n i = 1 N i P ( r ˜ N i ( L m , t ) ; θ ) ,
where
l n P ( r ˜ ( L m , t ) ; θ ) = n i = 1 N i α k ( t ) k = 1 K N i 2 l n ( 2 π ) 1 2 | Σ k ( t ) | r ˜ N i ( L m , t ) μ k ( t ) 2 2 Σ k ( t )
Next, we can calculate the formula (28), each element of E ( γ k , γ k ) can be calculated in Appendix C.
According to the formula (27), the goal is to obtain the solution for the matrix. Combing the above results, we can achieve the covariance matrix for the estimated parameters in RKHS. So far, we can acquire the CRLB for the temporal RSS analysis, which can be expressed by,
C R L B 1 = ϱ θ ˜ = t r J θ 1 K × K = k = 1 K t r J E ( γ k , γ k ) 1
Corollary 2.
Consistent inference of CRLB in the time domain:the C R L B 2 derived from the parameters in the time domain is consistent with the parameters C R L B 1 estimated by the algorithm, and the following inference is made:
C R L B 1 C R L B 2 ζ ,
where ζ denotes a constant with a value nearly approaching zero.
Proof of Corollary 2. 
Please refer to Appendix D for the proof. □
We mainly report on the evaluation of the proposed algorithm based on the real experimental test-bed in this part. Then, we conduct the following experiments under simulation on the performance of the reconstructed fingerprint database in the time domain. This section primarily encompasses two aspects: test-bed description and the updated fingerprint database evaluation results.

9. Results

9.1. Test-Bed Description

Test Environment and Configurations: The whole experiment scenarios are conducted in the laboratory corridor of the university. Moreover, the scene diagram is shown in the grey area of Figure 3. The grey area is divided into several squares. The blue triangle represents the symbol where to arrange APs, and the red dot shows the location of RPs.
The system is mainly relied on manual collection to build the fingerprint database for a different time during the offline phase. We arranged the Brightstone beacons with different minors at each AP. Furthermore, the NRF52832 Dongle is connected to the computer to receive the BLE signals at RPs and test points. The collected BLE signal data are visualized in Wireshark software. The computer tests the experiments with the Intel CORE i7 8th Gen and operator system of Windows 10. We process the RSS data on MATLAB, and the training model is generated on P y c h a r m .
Time Interval Setting: We can observe the disparity between the extreme variations in RSS and the conventional range of RSS fluctuations by examining Figure 4. Some wireless signals with relatively large fluctuations cannot be monitored, so we set the RSS to the default value of 100 d B m in the fingerprint database. This setting reduces the hazard of missing data due to signal fluctuations. We collected the RSS of all RP points at T 1 , T 2 , and T 3 , where T 2 T 1 T 3 T 2 .
To fully reflect the feasibility of the proposed algorithm, we randomly select the different time data at four RPs in the fingerprint database for Pearson correlation analysis, as shown in Figure 5. The correlation is highest when the time interval is one day from the Figure 5. Furthermore, we analyzed three different groups of time intervals between T 1 and T 2 : 1-day, 6-days, and 7-days, respectively.
Fingerprint database: The fingerprint database corresponding to time T is represented by DB T . We take DB T 1 and DB T 2 as the initial dataset to train the model parameters. A limited amount of RP data at time T 3 is used as the test set, and the trained network is utilized to generate the reconstructed fingerprint database DB T 3 . To effectively assess the performance of the DAloc algorithm, we retain the source domain used for transfer training, and the validation set remains associated with the target-domain data of data at T 3 to update the new fingerprint database.

9.2. The Updated Fingerprint Database Evaluation Results

9.2.1. Effect of Reconstructed Fingerprint Database

To study the performance of the reconstructed database, we conducted experiments that verified the location error in T 3 . To establish multiple baselines, we have selected four different fingerprint databases. These include the original fingerprint databases collected at three different time points, namely T 1 , T 2 , and T 3 , as well as the fingerprint database generated using the traditional transfer learning JDA algorithm.
Specifically, we choose T 3 time for the test set of all updated fingerprint databases. We can observe four lines below the solid red curves: blue, purple, green, and cyan. From the results, it can be shown in Figure 6 that the database collected manually in real-time is still the most reliable and accurate. Furthermore, we have plotted the positioning error of the fingerprint database reconstructed by the DAloc algorithm on a CDF diagram for comparative analysis. From the results in Figure 6, the DAloc algorithm in the paper is greatly improved.
The fingerprint database and network parameters were updated using marked data at T 1 , T 2 , and data at T 3 were collected to test the algorithm after networks were trained. The reconstructed fingerprint database resulted in higher positioning accuracy than JDA, DB T 2 , DB T 2 , with a significant difference between the blue and purple curves at 1-2 meters. After analyzing several fingerprint databases, our experiments have yielded varying levels of location error of 0.5152 m, 0.8041 m, 1.1830 m, 1.2871 m, and 1.4684 m for the five different databases ( DB T 3 , DB D A l o c , DB J D A , DB T 2 , DB T 1 ). The fingerprint database DB T 3 exhibited the highest positioning accuracy, followed by the DAloc algorithm. However, the JDA algorithm resulted in even lower location errors than the fingerprint database collected in the other two time periods.
Besides, the database updated by DALoc has a probability of within one-meter location error, which is more than 70%. What is more noteworthy is that the probability of the location error within 1.5 m in the fingerprint database updated by the DAloc method is more than 90%, and a satisfactory result can be obtained for the positioning error. It can also be observed from the figure that the probability of positioning results below the meter level for other fingerprint databases is less than 50%. In general, although the location accuracy of the fingerprint database updated with JDA is higher than that of the fingerprint database at the original time T 1 and T 2 , the DALoc method obtains better accuracy, which is higher than that of baseline-JDA.
Figure 7 presents the CDF of the localization error for five databases: the real-time manually collected database DB T 3 , the proposed DAloc reconstruction, the methods of Hsiao et al.[19] and Huang et al.[20], and the traditional JDA algorithm. The corresponding average errors are 0.5152 m, 0.8041 m, 1.4684 m, 1.2871 m, and 1.1830 m, respectively. Among them, DB T 3 (red solid line) achieves the best performance, serving as the upper bound. The proposed DAloc (blue line) closely follows DB T 3 and significantly outperforms all other baselines across the entire error range.
Quantitatively, for an error threshold of 1 m, the success probabilities are: DB T 3 : 95 % (since at 1.0 m, CDF 0.95 ), DAloc: 90 % , Hsiao et al.: 64 % , Huang et al.: 60 % , and JDA: 40 % . At the 1.5 m threshold, the DAloc method reaches a probability exceeding 90 % (from the data, at 1.5 m, DAloc CDF 0.94 ), whereas the other baselines (Hsiao et al., Huang et al., JDA) remain below 70 % . For sub-meter accuracy, only DB T 3 and DAloc exceed 90 % and 70 % , respectively; all other methods have probabilities below 50 % (e.g., at 0.5 m, DAloc: 80 % , JDA: 20 % , Huang et al.: 31 % , Hsiao et al.: 34 % ). These results demonstrate that the DAloc reconstruction substantially improves localization reliability compared to conventional transfer learning and other published methods.
From an engineering perspective, considering the high labor cost of maintaining a real-time manually collected database, the DAloc-based fingerprint reconstruction offers a practical trade-off. It achieves a satisfactory average error of 0.8041 m and a 1.5 -m accuracy of over 90 % , making it a feasible solution for large-scale indoor localization systems.

9.2.2. Effect of Different Time Intervals

In this section, the experiment assesses the location error of the fingerprint database following the construction of various RP intervals. Three RP intervals were chosen for the experiment, namely 0.6 m, 1.2 m, and 1.8 m. Due to the limited range of the experimental site, we chose RPs that were equally spaced and evenly distributed over the location area. The localization system’s performance in terms of localization error gradually deteriorates with an increasing label distance, as shown in Figure 8. As can be seen from Figure 8, the location errors are 0.8041 m, 0.8381 m, and 0.8921 m in sequence. The results show that the localization accuracy is inversely proportional to the size of the RP interval.

9.2.3. Effect of Outliers

In Figure 9, after removing outliers from the statistical analysis, we draw the following conclusions based on the box plot. Firstly, when examining the skewness measurement of the location error distribution in the figure, we observe that the average location error from the small to the large as follows: D B T 3 , D B D A L o c , D B J D A , D B T 2 , D B T 1 . Secondly, the analysis of the number of outliers reveals that the DALoc method exhibits the most reasonable robustness in Figure 9.

9.2.4. Effect of Eliminating Non-Line of Sight (NLOS) Situation

This experiment section evaluates the algorithm’s feasibility in Non-Line-of-Sight (NLOS) scenarios. To mitigate the impact of NLOS and achieve higher accuracy, we have considered the utilization of a location fingerprint database approach and incorporated the use of Mean Excess Delay (MED) to detect signal instabilities in the NLOS test environment. Identifying and mitigating NLOS paths are critical factors to enhance localization accuracy in NLOS testing environments. Our approach to NLOS path recognition and filtering underscores the importance of incorporating NLOS recognition in test data to achieve superior indoor localization outcomes in NLOS scenarios. Additionally, we conducted simulation experiments to further illustrate the practicality and versatility of our proposed algorithm in NLOS situations.
In Figure 10, the dotted line represents the curve obtained using the MED method, while the solid line shows the CDF curve without this method. The results indicate that identifying and eliminating NLOS paths leads to better positioning accuracy in 2D scenarios. To evaluate our approach, we collected time intervals of 1-day, 6-day, and 7-day for migration. For ease of comparison, we calculated the average positioning errors using MATLAB and presented them in Table 1.
In conclusion, the experimental analysis yields the following conclusions: the fingerprint database is influenced in the time domain, and the DALoc algorithm demonstrates the expected efficacy for the fingerprint database.

10. Conclusions

In this paper, we proposed an adaptive indoor localization framework based on Bluetooth Low Energy (BLE) signals, which addresses the temporal degradation of fingerprint databases using deep transfer learning. Specifically, we formulated the database update problem as a maximum mean discrepancy (MMD) minimization task and developed a domain adaptation localization (DALoc) method that learns a mapping function between historical and current signal distributions. By leveraging a Gaussian mixture model (GMM) to characterize the time-varying received signal strength (RSS), the proposed system reconstructs the fingerprint database with only a small number of labeled samples at the new time instant. Experimental results in a laboratory corridor environment demonstrate that the DALoc algorithm achieves a one-meter localization accuracy with over 70% probability and an average positioning error of approximately 0.8 m, significantly outperforming traditional methods such as JDA and KNN. Moreover, the system reduces the labor-intensive overhead of frequent site surveys while maintaining robust performance under dynamic signal conditions and non-line-of-sight (NLOS) scenarios. These results confirm the effectiveness of transfer learning for adaptive indoor localization in IoT environments.
Future work will integrate large language models (LLMs) and generative AI to enhance adaptability, interpretability, and generalization. Specifically, LLMs will enable semantic-aware localization through natural language priors and zero-shot alignment with visual landmarks, while generative models (e.g., diffusion models) will synthesize high-fidelity fingerprints and predict temporal RSS evolution, drastically reducing offline site survey overhead. Furthermore, LLMs will serve as intelligent orchestrators for dynamic multi-modal fusion and explainable positioning, and foundation models with prompt-based adaptation will facilitate rapid cross-scene transfer without full retraining. These advancements collectively address key challenges including costly database updates, poor robustness to environmental changes, lack of interpretability, and limited cross-domain generalization.

Author Contributions

Conceptualization, F. L. and S. Z.; methodology, F. L. and S. Z.; software, F. L. and S. Z.; validation, F. L. and S. Z.; formal analysis, F. L. and S. Z.; investigation, F. L. and S. Z.; resources, F. L. and S. Z.; data curation, F. L. and S. Z.; writing—original draft preparation, F. L. and S. Z.; writing—review and editing, F. L. and S. Z.; visualization, F. L. and S. Z.; supervision, F. L. and S. Z.; project administration, F. L. and S. Z.; funding acquisition, F. L. and S. Z.. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (NSFC) under Grants 62071284, 61871262, 61901251, and 61904101, the National Key Research and Development Program of China under Grants 2017YEF0121400 and 2019YFE0196600, the Innovation Program of Shanghai Municipal Science and Technology Commission under Grant 20JC1416400, Pudong New Area Science & Technology Development Fund, and research funds from Shanghai Institute for Advanced Communication and Data Science (SICS).

Data Availability Statement

The dataset used for this study are available upon request to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Lemma 1

We want to show that the absolute difference between the estimated r ˜ ( L m , t ) and the real r ( L m , t ) is close to its expected value, which is subject to the restriction about T 2 T 1 T 3 T 2 . To this end, we prove the result based on the GMM consistency and adopt the result to the certificate that problem 3 and problem 2 are equivalent.
The result we need is an upper bound on the absolute difference between r ˜ ( L m , T 3 ) and r ( L m , T 3 ) , which is near to zero. Primarily, we want to confirm the truth that the RSS-GMM consistency is correct in RKHS. Notably, [51] has precisely certificated the feasibility of the consistency in RKHS. Thence, based on existing T 1 and T 2 data, we can exploit mathematical formulas to express the GMM consistency as follows,
r ( L m , T 1 ) r ˜ ( L m , T 1 ) ξ , r ( L m , T 2 ) r ˜ ( L m , T 2 ) ξ ,
where ξ 0 .
And we consider a mapping function Φ ( · ) 6 ( C N i × 1 H ) to express the consistency. Simultaneously, the mapping function has proved the property that implies Frechet differentiability in [53]. We can depict the underlying distribution function Φ ( · ) as follows,
r ˜ ( L m , t ) C N i × 1 H = Φ r ( L m , t ) .
Furthermore, we obtained from the Frechet differentiability of the mapping function Φ ( · ) , and the differential in γ k = ( α k ( t ) , μ k ( t ) , Σ k ( t ) ) is a linear function from C N i × 1 to RKHS H . The differentiability can be mathematically expressed as,
d Φ θ = k = 1 K Φ θ .
Let Φ θ denote the vector Φ θ k = 1 , , K of elements in RKHS H . Indeed, the mapping function’s properties (continuity, derivability) make it possible to minimize the distances via gradient descent approaches.
Simultaneously, the differentiability in θ can be calculated by the following formula,
Φ ( · ) θ + h = Φ ( · ) θ + B h + o ( h ) ,
where B is a linear operator, and o ( h ) 0 .
According to the differentiability in equation A4, θ at T 3 can derived as
θ ( T 3 ) = θ ( T 2 ) + T 3 T 2 T 2 T 1 θ ( T 2 ) θ ( T 1 ) .
So far, according to all parameters satisfying the continuity expression, we get the fitted r ˜ ( L m , T 3 ) also satisfies the next equation,
r ( L m , T 3 ) r ˜ ( L m , T 3 ) ξ .
We can derive r ˜ ( L m , T 3 ) based on the GMM consistency at T 3 . Thereby, we can acquire r ( L m , T 3 ) and fulfill the up-to-data fingerprint database DB T 3 ^ from the derivation process. To re-establish the fingerprint database in a real localization system, we estimate the entire fingerprint database DB T 3 ^ employing the raw data for DB T 2 and DB T 2 . Hence,
DB T 3 ^ = Φ ( DB T 2 , DB T 1 ) , Φ ( · ) H ,
T 2 T 1 T 3 T 2 .
However, the bottleneck is obtaining the underlying distribution Φ ( · ) in the above-formed solution process. In the paper, we use the temporal MMD criterion [54,55,56,57] to express the discrepancy between the two databases so that we derive the mapping distribution. Therefore, the underlying distribution function Φ ( · ) to correspond to the database migration from the time domain can be calculated by the defined MMD minimization in problem . Combining the above results, we have completed the derivation.

Appendix B. Proof of Corollary 1

We rely on the relationship between r ( L m , t ) and the position L m to obtain the CRLB location error.
J ( L ^ m ) = E l n P ( L ^ m ; r ˜ ( L m , t ) L ^ m 2 = J x ^ m x ^ m , J x ^ m y ^ m J y ^ m x ^ m , J y ^ m y ^ m .
Then the CRLB of L m can be expressed by (A10) through mathematical calculation,
ϱ θ = J x ^ m x ^ m + J y ^ m y ^ m J x ^ m x ^ m J y ^ m y ^ m J x ^ m y ^ m J y ^ m x ^ m ,
where
J x ^ m x ^ m = v = 1 N i x ^ m x v d v m 2 2 ,
J x ^ m y ^ m = J y ^ m x ^ m = v = 1 N i ( x ^ m x v ) ( y ^ m y v ) d v m 4 2 ,
J y ^ m y ^ m = v = 1 N i y ^ m y v d v m 2 2 .
And d l m denotes the distance from L m to the v-th ( x v , y v ) AP, which can be given by,
d l m = ( x m x v ) 2 + ( y m y v ) 2 .

Appendix C. Derivation of Each Item

By expanding the matrix in 28, each item can be calculated separately as follows, the 1st derivative for the matrix element
l n P ( r ˜ ( L m , t ) ; θ ) α k ( t ) = n i = 1 N i k = 1 K N i 2 l n ( 2 π ) 1 2 | Σ k ( t ) | r ˜ N i ( L m , t ) μ k ( t ) 2 2 Σ k ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) μ k ( t ) = n i = 1 N i α k ( t ) r ˜ N i ( L m , t ) μ k ( t ) Σ k ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) Σ k ( t ) = n i = 1 N i α k ( t ) 1 2 + r ˜ ( L m , t ) μ k ( t ) 2 2 Σ k 2 ( t ) .
and the 2 n d derivative is
l n P ( r ˜ ( L m , t ) ; θ ) α k ( t ) α k ( t ) = 0 .
l n P ( r ˜ ( L m , t ) ; θ ) α k ( t ) μ k ( t ) = n i = 1 N i r ˜ N i ( L m , t ) μ k ( t ) Σ k ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) α k ( t ) Σ k ( t ) = n i = 1 N i 1 2 + r ˜ N i ( L m , t ) μ k ( t ) 2 2 Σ k 2 ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) μ k ( t ) α k ( t ) = n i = 1 N i r ˜ N i ( L m , t ) μ k ( t ) Σ k ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) μ k ( t ) μ k ( t ) = n i = 1 N i α k ( t ) 2 Σ k ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) μ k ( t ) Σ k ( t ) = n i = 1 N i α k ( t ) r ˜ N i ( L m , t ) μ k ( t ) 2 Σ k 2 ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) Σ k ( t ) α k ( t ) = n i = 1 N i 1 2 + r ˜ N i ( L m , t ) μ k ( t ) 2 2 Σ k 2 ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) Σ k ( t ) μ k ( t ) = n i = 1 N i α k ( t ) r ˜ N i ( L m , t ) μ k ( t ) Σ k 2 ( t ) .
l n P ( r ˜ ( L m , t ) ; θ ) Σ k ( t ) Σ k ( t ) = n i = 1 N i α k ( t ) r ˜ N i ( L m , t ) μ k ( t ) 2 4 Σ k 3 ( t ) .
Then the expectation for each item on the diagonal is calculated as follows,
G ( α k ( t ) , α k ( t ) ) = G l n P ( r ˜ ( L m , t ) ; θ ) 2 α k ( t ) α k ( t ) = 0 .
G ( μ k ( t ) , μ k ( t ) ) = G l n P ( r ˜ ( L m , t ) ; θ ) 2 μ k ( t ) μ k ( t ) = N i α k ( t ) 2 Σ k ( t ) .
G ( Σ k ( t ) , Σ k ( t ) ) = G l n P ( r ˜ ( L m , t ) ; θ ) 2 Σ k ( t ) Σ k ( t ) = n i = 1 N i α k ( t ) r ˜ N i ( L m , t ) μ k ( t ) 2 4 Σ k 3 ( t ) .
So we let J E ( γ k , γ k ) express the FIM for E ( γ k , γ k ) .

Appendix D. Proof of Corollary 2

We denote the CRLB error analysis derived from transfer learning and error analysis derived from GMM by C R L B 1 and C R L B 2 , respectively, at T 3 . And we conclude the corollary 2; the following is the derivation process.
Firstly, we can derive C R L B 1 by the parameters obtained from the GMM fitted in T 1 and T 2 . According to A5,
α k ( T 3 ) = α k ( T 2 ) + T 3 T 2 T 2 T 1 α k ( T 2 ) α k ( T 1 ) .
μ k ( T 3 ) = μ k ( T 2 ) + T 3 T 2 T 2 T 1 μ k ( T 2 ) μ k ( T 1 ) .
Σ k ( T 3 ) = Σ k ( T 2 ) + T 3 T 2 T 2 T 1 Σ k ( T 2 ) Σ k ( T 1 ) .
Based on the fitted GMM model, C R L B 2 is the bound derived in θ ( T 3 ) , which can be expressed as,
C o v θ ( T 3 ) J θ ( T 3 ) 1
We can acquire the CRLB for the actual RSS parameters analysis in θ ( T 3 ) , which can be expressed by,
C R L B 2 = ϱ θ ( T 3 ) = t r J θ ( T 3 ) 1
In the case of known time conditions T 2 T 1 T 3 T 2 , the consistency theorem is satisfied according to the parameters evaluated by CRLB. When the total number of samples gradually increases, the estimator θ ˜ gradually converges to the actual value θ , and the following inferences are made:
C R L B 1 C R L B a c t u a l ζ C R L B 2 C R L B a c t u a l ζ
where ζ denotes a constant close to zero. And C R L B 1 is derived from transfer learning at T 3 . C R L B 2 is the error analysis obtained after deriving from time-domain-related parameters in T 1 and T 2 . C R L B a c t u a l is the CRLB that derived from actual parameters at T 3 .
Then, we can derive the conclusion,
C R L B 1 C R L B 2 ζ

References

  1. Zhou, Baoding; et al. Cooperative Indoor Localization Using Mobile Robot Anchors via Factor Graph Optimization. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
  2. Zuo, Yiping; et al. Mobile blockchain-enabled secure and efficient information management for indoor positioning with federated learning. IEEE Trans. Mob. Comput. 2024, 23.12, 12176–12194. [Google Scholar] [CrossRef]
  3. Fayyad, Jamil; et al. Deep learning sensor fusion for autonomous vehicle perception and localization: A review. Sensors 2020, 20.15, 4220. [Google Scholar] [CrossRef]
  4. Dauptain, Xavier; et al. Conception of a high-level perception and localization system for autonomous driving. Sensors 2022, 22.24, 9661. [Google Scholar] [CrossRef]
  5. Ušinskis, Vygantas; et al. Towards autonomous driving: technologies and data for vehicles-to-everything communication. Sensors 2024, 24.11, 3411. [Google Scholar] [CrossRef]
  6. Ren, Yanbing; et al. DistPreserv: Maintaining user distribution for privacy-preserving location-based services. IEEE Trans. Mob. Comput. 2022, 22.6, 3287–3302. [Google Scholar] [CrossRef]
  7. Zhu, Lipeng; et al. A tutorial on movable antennas for wireless networks. IEEE Commun. Surv. Tutorials 2025. [Google Scholar] [CrossRef]
  8. Saunders, Simon R.; Aragón-Zavala, Alejandro A. Antennas and propagation for wireless communication systems; John Wiley & Sons, 2024. [Google Scholar]
  9. Jiang, Wei; et al. Indoor and outdoor seamless positioning method using UWB enhanced multi-sensor tightly-coupled integration. IEEE Trans. Veh. Technol. 2021, 70.10, 10633–10645. [Google Scholar] [CrossRef]
  10. Wu, Chong; et al. RF-SLAM: UHF-RFID based simultaneous tags mapping and robot localization algorithm for smart warehouse position service. IEEE Trans. Ind. Inf. 2023, 19.12, 11765–11775. [Google Scholar] [CrossRef]
  11. Bianchi, V.; Ciampolini, P.; De Munari, I. RSSI-based indoor localization and identification for ZigBee wireless sensor networks in smart homes[J]. IEEE Trans. Instrum. Meas. 2018, 68(2), 566–575. [Google Scholar] [CrossRef]
  12. Zhang, B.; Sifaou, H.; Li, G. Y. CSI-fingerprinting indoor localization via attention-augmented residual convolutional neural network[J]. IEEE Trans. Wireless Commun. 2023, 22(8), 5583–5597. [Google Scholar] [CrossRef]
  13. Mackey, Andrew; et al. Improving BLE beacon proximity estimation accuracy through Bayesian filtering. IEEE Internet Things J. 2020, 7.4, 3160–3169. [Google Scholar] [CrossRef]
  14. Liu, Hui; et al. Survey of wireless indoor positioning techniques and systems. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2007, 37.6, 1067–1080. [Google Scholar] [CrossRef]
  15. Morar, Anca; et al. A comprehensive survey of indoor localization methods based on computer vision. Sensors 2020, 20.9, 2641. [Google Scholar] [CrossRef]
  16. Abuhoureyah, Fahd; Wong, Yan Chiew; Isira, Ahmad Sadhiqin Mohd. Trajectory mapping through channel state information by triangulation method and fine-tuning. J. Eng. Appl. Sci. 2024, 71.1, 196. [Google Scholar] [CrossRef]
  17. Qin, Junping; et al. Indoor trajectory tracking scheme based on Delaunay triangulation and heuristic information in wireless sensor networks. Sensors 2017, 17.6, 1275. [Google Scholar] [CrossRef] [PubMed]
  18. Li, Ze; et al. TriLoc: Toward accurate indoor localization with assistance of microwave reflections. IEEE Trans. Microwave Theory Tech. 2022, 71.6, 2734–2747. [Google Scholar] [CrossRef]
  19. Shamaei, Kimia; Kassas, Zaher M. A joint TOA and DOA acquisition and tracking approach for positioning with LTE signals. IEEE Trans. Signal Process. 2021, 69, 2689–2705. [Google Scholar] [CrossRef]
  20. Hsiao, An-Hung; et al. SALC: Skeleton-Assisted Learning-Based Clustering for Time-Varying Indoor Localization. IEEE Trans. Network Sci. Eng. 2023, 11.1, 439–452. [Google Scholar] [CrossRef]
  21. Huang, Huakun; et al. Wi-Fi Sensing Based on Deep Supervised Dictionary Learning for Robust Device-Free Localization. IEEE Trans. Veh. Technol. 2025. [Google Scholar] [CrossRef]
  22. Rafique, Hamaad; et al. A characteristics-based least common multiple algorithm to optimize magnetic field-based indoor localization. IEEE Internet Things J. 2024. [Google Scholar] [CrossRef]
  23. Farahsari; Shams, Pooyan; et al. A survey on indoor positioning systems for IoT-based applications. IEEE Internet Things J. 2022, 9.10, 7680–7699. [Google Scholar]
  24. Zhu, Xiaoqiang; et al. Indoor intelligent fingerprint-based localization: Principles, approaches and challenges. IEEE Commun. Surv. Tutorials 2020, 22.4, 2634–2657. [Google Scholar] [CrossRef]
  25. Zang, Yiming; et al. A novel optical localization method for partial discharge source using ANFIS virtual sensors and simulation fingerprint in GIL. IEEE Trans. Instrum. Meas. 2021, 70, 1–11. [Google Scholar] [CrossRef]
  26. Wei, Chen; et al. Fingerprint-based localization and channel estimation integration for cell-free massive MIMO IoT systems. IEEE Internet Things J. 2022, 9.24, 25237–25252. [Google Scholar] [CrossRef]
  27. Li, Qiao; et al. Automatic indoor radio map construction and localization via multipath fingerprint extrapolation. IEEE Trans. Wireless Commun. 2023, 22.9, 5814–5827. [Google Scholar] [CrossRef]
  28. Liu, Yutong; Kong, Linghe; Chen, Guihai. Data-oriented mobile crowdsensing: A comprehensive survey. IEEE Commun. Surv. Tutorials 2019, 21.3, 2849–2885. [Google Scholar] [CrossRef]
  29. Gong, Xiaodong; et al. An enhanced indoor positioning solution using dynamic radio fingerprinting spatial context recognition. IEEE Internet Things J. 2022, 10.2, 1297–1309. [Google Scholar] [CrossRef]
  30. Zhou, Rong; et al. A wi-fi indoor positioning method based on an integration of emdt and wknn. Sensors 2022, 22.14, 5411. [Google Scholar] [CrossRef]
  31. Tan, Chuanqi; et al. A survey on deep transfer learning. In International conference on artificial neural networks; Springer International Publishing: Cham, 2018. [Google Scholar]
  32. Pan, Sinno Jialin; et al. Domain adaptation via transfer component analysis. IEEE Trans. Neural Networks 2010, 22.2, 199–210. [Google Scholar] [CrossRef]
  33. Long, Mingsheng; et al. Transfer feature learning with joint distribution adaptation. In Proceedings of the IEEE international conference on computer vision, 2013. [Google Scholar]
  34. Long, Mingsheng; et al. Learning transferable features with deep adaptation networks. International conference on machine learning. PMLR 2015. [Google Scholar]
  35. Redner, Richard A.; Walker, Homer F. Mixture densities, maximum likelihood and the EM algorithm. SIAM review 1984, 26.2, 195–239. [Google Scholar] [CrossRef]
  36. Xie, Ning; Li, Zhuoyuan; Tan, Haijun. A survey of physical-layer authentication in wireless communications. IEEE Commun. Surv. Tutorials 2020, 23.1, 282–310. [Google Scholar] [CrossRef]
  37. Zhang, Menglin; et al. Two-stage stochastic optimal operation of integrated electricity and heat system considering reserve of flexible devices and spatial-temporal correlation of wind power. Appl. Energy 2020, 275, 115357. [Google Scholar] [CrossRef]
  38. Reynolds, Douglas. Gaussian mixture models. In Encyclopedia of biometrics.; Springer: Boston, MA, 2015; pp. 827–832. [Google Scholar]
  39. Bond, S. R.; Hoeffler, A.; Temple, J. R. W. GMM estimation of empirical growth models[J]. Available at SSRN. 2001, 290522. [Google Scholar]
  40. Yu, L.; Yang, T.; Chan, A. B. Density-preserving hierarchical EM algorithm: Simplifying Gaussian mixture models for approximate inference. IEEE Trans. Pattern Anal. Mach. Intell. 2018, 41(6), 1323–1337. [Google Scholar] [CrossRef]
  41. Moon, H. R.; Phillips, P. C. B. GMM estimation of autoregressive roots near unity with panel data[J]. Econometrica 2004, 72(2), 467–522. [Google Scholar] [CrossRef]
  42. Conley, Timothy G. GMM estimation with cross sectional dependence. Journal of econometrics 1999, 92.1, 1–45. [Google Scholar] [CrossRef]
  43. Andrews, D. W. K. Consistent moment selection procedures for generalized method of moments estimation[J]. Econometrica 1999, 67(3), 543–563. [Google Scholar] [CrossRef]
  44. Barni, Mauro; et al. A quasi-Euclidean norm to speed up vector median filtering. IEEE Trans. Image Process. 2000, 9.10, 1704–1709. [Google Scholar] [CrossRef]
  45. Guo, Gongde; et al. KNN model-based approach in classification. OTM Confederated International Conferences" On the Move to Meaningful Internet Systems", Berlin, Heidelberg, 2003; Springer Berlin Heidelberg. [Google Scholar]
  46. Krizhevsky, A.; Sutskever, I.; Hinton, G. E. Imagenet classification with deep convolutional neural networks[J]. Advances in neural information processing systems 2012, 25. [Google Scholar] [CrossRef]
  47. Peleg, S.; Porat, B. The Cramer-Rao lower bound for signals with constant amplitude and polynomial phase. IEEE Trans. Signal Process. 2002, 39(3), 749–752. [Google Scholar] [CrossRef]
  48. Kay, S. M. Fundamentals of statistical signal processing: estimation theory[M]; Prentice-Hall, lnc., 1993. [Google Scholar]
  49. Shen, Y.; Win, M. Z. On the accuracy of localization systems using wideband antenna arrays[J]. IEEE Trans. Commun. 2010, 58(1), 270–280. [Google Scholar] [CrossRef]
  50. Gui, Linqing; et al. A Cramer–Rao lower bound of CSI-based indoor localization. IEEE Trans. Veh. Technol. 2017, 67.3, 2814–2818. [Google Scholar] [CrossRef]
  51. Patwari, Neal; et al. Locating the nodes: cooperative localization in wireless sensor networks. IEEE Signal Process Mag. 2005, 22.4, 54–69. [Google Scholar] [CrossRef]
  52. Carrasco, M.; Florens, J. P. On the asymptotic efficiency of GMM[J]. Econom. Theory 2014, 30(2), 372–406. [Google Scholar] [CrossRef]
  53. Carrasco, M.; Florens, J. P. Generalization of GMM to a continuum of moment conditions[J]. Econom. Theory 2000, 16(6), 797–834. [Google Scholar] [CrossRef]
  54. Gretton, Arthur; et al. A kernel two-sample test. The journal of machine learning research 2012, 13.1, 723–773. [Google Scholar]
  55. Borgwardt, Karsten M.; et al. Integrating structured biological data by kernel maximum mean discrepancy. Bioinf. 2006, 22.14, e49–e57. [Google Scholar] [CrossRef]
  56. Yan, Hongliang; et al. Mind the class weight bias: Weighted maximum mean discrepancy for unsupervised domain adaptation. Proceedings of the IEEE conference on computer vision and pattern recognition 2017. [Google Scholar]
  57. Jia, Xiaodong; et al. Assessment of data suitability for machine prognosis using maximum mean discrepancy. IEEE Trans. Ind. Electron. 2017, 65.7, 5872–5881. [Google Scholar] [CrossRef]
1
The variations indicate that the range of RSS values under consideration shifts from [- 80 d B m , - 50 d B m ] to [- 100 d B m , - 50 d B m ].
2
Our analysis included examining the wireless signal’s impact from both the signal itself and the temporal correlation [34,35,36] between fingerprint databases. To better represent the stable and instantaneous wireless signal, we used the GMM estimator and analyzed the time domain correlation of RSS-GMM, which can be expressed as an exponential covariance function. We conducted simulations on the positioning results obtained from the constructed fingerprint database and added simulation experiments to verify the impact of long time spans.
3
In the practical systems, we often apply a time averaging operation to obtain more smooth RSS values, e.g., r ( L m , t ) = E t [ t , t + Δ t ] [ y ( L m , t ) y * ( L m , t ) ] , and we abuse the notation t here for simplicity.
4
We analyzed wireless channel propagation, which involves random signal changes and variations in reflective surfaces and reflectors along the path. As a result, the received signal power exhibits both nonlinear and random characteristics. To address this, we approximated the nonlinear wireless signals using the Taylor series. This allowed us to convert the problem into a linear one within the range of T 2 and T 3 .
5
The KNN algorithm will compare the measured results with the database to determine K nearest RPs and calculate the location thereby to obtain the estimated location L m , which is shown to be quite effective for practical systems[44].
6
The function is continuous and differentiable on H [52].
Figure 1. The BLE localization system framework.
Figure 1. The BLE localization system framework.
Preprints 208278 g001
Figure 2. The architecture diagram details the deep transfer learning process combined with the DAloc system.
Figure 2. The architecture diagram details the deep transfer learning process combined with the DAloc system.
Preprints 208278 g002
Figure 3. The gray area represents the testing scenarios in the corridor.
Figure 3. The gray area represents the testing scenarios in the corridor.
Preprints 208278 g003
Figure 4. Comparison figure of extreme variations in RSS and conventional RSS fluctuation range.
Figure 4. Comparison figure of extreme variations in RSS and conventional RSS fluctuation range.
Preprints 208278 g004
Figure 5. The figure of the temporal correlation.
Figure 5. The figure of the temporal correlation.
Preprints 208278 g005
Figure 6. Comparison of DAloc against the traditional method (JDA and KNN) .
Figure 6. Comparison of DAloc against the traditional method (JDA and KNN) .
Preprints 208278 g006
Figure 7. Comparison of DAloc against other methods (Hasio. et al and Huang. et al) in terms of cumulative distribution of localization error.
Figure 7. Comparison of DAloc against other methods (Hasio. et al and Huang. et al) in terms of cumulative distribution of localization error.
Preprints 208278 g007
Figure 8. The influence of the regular and random RPs on location error.
Figure 8. The influence of the regular and random RPs on location error.
Preprints 208278 g008
Figure 9. Boxplot of location error distribution for outlier removal.
Figure 9. Boxplot of location error distribution for outlier removal.
Preprints 208278 g009
Figure 10. Comparison of MED method and Non-MED method in 2D NLOS positioning.
Figure 10. Comparison of MED method and Non-MED method in 2D NLOS positioning.
Preprints 208278 g010
Table 1. The Location Error of NLOS Situations.
Table 1. The Location Error of NLOS Situations.
Algorithm Location error(m)
M E D 1 0.8041
1 d a y 0.9251
M E D 6 0.9762
6 d a y 1.1175
M E D 7 0.9864
7 d a y 1.1403
M E D J D A 1.6490
J D A 1.6963
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated