{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:24:22Z","timestamp":1767612262344,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3501774.3501790","type":"proceedings-article","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T16:12:37Z","timestamp":1648311157000},"page":"106-111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["An Empirical Evaluation of Machine Learning Algorithms for Indoor Localization using Dual-Band WiFi"],"prefix":"10.1145","author":[{"given":"Ashraf","family":"Tahat","sequence":"first","affiliation":[{"name":"Department of Communications Engineering, Princess Sumaya University for Technology, Jordan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rozana","family":"Awwad","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Princess Sumaya University for Technology, Jordan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nadia","family":"Baydoun","sequence":"additional","affiliation":[{"name":"Department of Communications Engineering, Princess Sumaya University for Technology, Jordan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shurooq","family":"Al-Nabih","sequence":"additional","affiliation":[{"name":"Department of Communications Engineering, Princess Sumaya University for Technology, Jordan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Talal","family":"A.Edwan","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Ahliyya Amman University, Jordan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001912"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402263"},{"volume-title":"Neural networks for pattern recognition","author":"M Bishop","key":"e_1_3_2_1_3_1","unstructured":"Christopher\u00a0 M Bishop 1995. Neural networks for pattern recognition . Oxford university press . Christopher\u00a0M Bishop 1995. Neural networks for pattern recognition. Oxford university press."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_5_1","volume-title":"Random forests. Machine learning 45, 1","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman . 2001. Random forests. Machine learning 45, 1 ( 2001 ), 5\u201332. Leo Breiman. 2001. Random forests. Machine learning 45, 1 (2001), 5\u201332."},{"key":"e_1_3_2_1_6_1","volume-title":"A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery 2, 2","author":"Burges JC","year":"1998","unstructured":"Christopher\u00a0 JC Burges . 1998. A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery 2, 2 ( 1998 ), 121\u2013167. Christopher\u00a0JC Burges. 1998. A tutorial on support vector machines for pattern recognition. Data mining and knowledge discovery 2, 2 (1998), 121\u2013167."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2567736"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. 13th Intl. Conf. Machine Learning. Citeseer, 105\u2013112","author":"Domingos Pedro","year":"1996","unstructured":"Pedro Domingos and Michael Pazzani . 1996 . Beyond independence: Conditions for the optimality of the simple bayesian classier . In Proc. 13th Intl. Conf. Machine Learning. Citeseer, 105\u2013112 . Pedro Domingos and Michael Pazzani. 1996. Beyond independence: Conditions for the optimality of the simple bayesian classier. In Proc. 13th Intl. Conf. Machine Learning. Citeseer, 105\u2013112."},{"key":"e_1_3_2_1_10_1","first-page":"11","article-title":"IEEE P802. 11 wireless LANs TGn channel models","volume":"802","author":"Erceg Vinko","year":"2004","unstructured":"Vinko Erceg . 2004 . IEEE P802. 11 wireless LANs TGn channel models . IEEE 802 . 11 - 03 \/940r4(2004). Vinko Erceg. 2004. IEEE P802. 11 wireless LANs TGn channel models. IEEE 802.11-03\/940r4(2004).","journal-title":"IEEE"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1946.234568"},{"key":"e_1_3_2_1_12_1","volume-title":"Statistics and its Interface 2, 3","author":"Hastie Trevor","year":"2009","unstructured":"Trevor Hastie , Saharon Rosset , Ji Zhu , and Hui Zou . 2009. Multi-class AdaBoost. Statistics and its Interface 2, 3 ( 2009 ), 349\u2013360. Trevor Hastie, Saharon Rosset, Ji Zhu, and Hui Zou. 2009. Multi-class AdaBoost. Statistics and its Interface 2, 3 (2009), 349\u2013360."},{"key":"e_1_3_2_1_13_1","volume-title":"2016 16th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 439\u2013444","author":"Hong Li","year":"2016","unstructured":"Li Hong and You-Wen Wu . 2016 . Path loss measurement of 2.4 G band radio signal communication in disaster ruins . In 2016 16th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 439\u2013444 . Li Hong and You-Wen Wu. 2016. Path loss measurement of 2.4 G band radio signal communication in disaster ruins. In 2016 16th International Symposium on Communications and Information Technologies (ISCIT). IEEE, 439\u2013444."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18113987"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2871099"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2307\/2347628"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. 2nd Int. Conf. Softw. Technol, Vol.\u00a019","author":"Lee Joo-Yub","year":"2013","unstructured":"Joo-Yub Lee , Cheal-Hwan Yoon , Hyunjae Park , and Jungmin So . 2013 . Analysis of location estimation algorithms for WiFi fingerprint-based indoor localization . In Proc. 2nd Int. Conf. Softw. Technol, Vol.\u00a019 . 89\u201392. Joo-Yub Lee, Cheal-Hwan Yoon, Hyunjae Park, and Jungmin So. 2013. Analysis of location estimation algorithms for WiFi fingerprint-based indoor localization. In Proc. 2nd Int. Conf. Softw. Technol, Vol.\u00a019. 89\u201392."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2543242"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.905750"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2042475"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940054"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814469"},{"key":"e_1_3_2_1_23_1","volume-title":"Program for machine learning morgan kaufmann","author":"Quinlan J","year":"1993","unstructured":"J Quinlan . 1993. 4.5 : Program for machine learning morgan kaufmann . San Mateo, CA, USA ( 1993 ). J Quinlan. 1993. 4.5: Program for machine learning morgan kaufmann. San Mateo, CA, USA (1993)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v16i08.14795"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-0725-7"},{"key":"e_1_3_2_1_26_1","volume-title":"International journal of distributed sensor networks 10, 12","author":"Yu Feng","year":"2014","unstructured":"Feng Yu , Minghua Jiang , Jing Liang , Xiao Qin , Ming Hu , Tao Peng , and Xinrong Hu. 2014. 5G WiFi signal-based indoor localization system using cluster k-nearest neighbor algorithm . International journal of distributed sensor networks 10, 12 ( 2014 ), 247525. Feng Yu, Minghua Jiang, Jing Liang, Xiao Qin, Ming Hu, Tao Peng, and Xinrong Hu. 2014. 5G WiFi signal-based indoor localization system using cluster k-nearest neighbor algorithm. International journal of distributed sensor networks 10, 12 (2014), 247525."}],"event":{"name":"ESSE 2021: 2021 2nd European Symposium on Software Engineering","acronym":"ESSE 2021","location":"Larissa Greece"},"container-title":["2021 2nd European Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501774.3501790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501774.3501790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:45Z","timestamp":1750191105000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501774.3501790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":26,"alternative-id":["10.1145\/3501774.3501790","10.1145\/3501774"],"URL":"https:\/\/doi.org\/10.1145\/3501774.3501790","relation":{},"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"2022-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}