2021
DOI: 10.1016/j.procs.2021.07.028
|View full text |Cite
|
Sign up to set email alerts
|

Passive BLE Sensing for Indoor Pattern Recognition and Tracking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…The UWB anchors are installed at the four corners of the room at a height of 2700 mm. We checked the measurement errors of a UWB sensor at nine points in the room, and, as listed in Table 2, the total average error of a UWB sensor is 251.6 mm on the X-axis and 201.3 mm on the Y-axis, whereas the errors at Position IDs (1,3,(7)(8)(9) near the hallway side and metallic bookshelves are larger than the average. First, to confirm the effectiveness of stay-area extraction, we compared it with a simple time-based clustering method in terms of the detection accuracy and size of stay areas.…”
Section: Settingsmentioning
confidence: 99%
“…The UWB anchors are installed at the four corners of the room at a height of 2700 mm. We checked the measurement errors of a UWB sensor at nine points in the room, and, as listed in Table 2, the total average error of a UWB sensor is 251.6 mm on the X-axis and 201.3 mm on the Y-axis, whereas the errors at Position IDs (1,3,(7)(8)(9) near the hallway side and metallic bookshelves are larger than the average. First, to confirm the effectiveness of stay-area extraction, we compared it with a simple time-based clustering method in terms of the detection accuracy and size of stay areas.…”
Section: Settingsmentioning
confidence: 99%
“…• Timestamping: this technique is especially effective in preventing replay attacks, as it allows the receiver device to ensure that the received packets are not a replay of any older packets [3]. This method can be implemented by adding a time value to each individual advertisement packet before being sent.…”
Section: Replay Attack Mitigationsmentioning
confidence: 99%
“…e principle of Canny algorithm will be introduced in detail below. e process of realizing image edge detection based on Canny algorithm mainly includes the following five steps [5][6][7].…”
Section: Canny Edge Detectionmentioning
confidence: 99%
“…erefore, we need to combine maintenance theory and practice. Because each edge detection algorithm has its own advantages and disadvantages, one or more edge detection algorithms can be combined according to di erent tasks [5,6], so that the optimal solution can be designed and the optimal e ect can be achieved to the greatest extent. Intelligent identi cation of intelligent interior decoration design can e ectively meet the requirements of modern society.…”
Section: Introductionmentioning
confidence: 99%