[HTML][HTML] Review on Security Range Perception Methods and Path-Planning Techniques for Substation Mobile Robots

J Zheng, T Chen, J He, Z Wang, B Gao - Energies, 2024 - mdpi.com
The use of mobile robots in substations improves maintenance efficiency and ensures the
personal safety of staff working at substations, which is a trend in the development of …

Real-time and accurate gesture recognition with commercial RFID devices

S Zhang, Z Ma, C Yang, X Kui, X Liu… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Gesture recognition based on radio frequency identification (RFID) has attracted much
research attention in recent years. Most existing RFID-based gesture recognition …

RF-Focus: Computer vision-assisted region-of-interest RFID tag recognition and localization in multipath-prevalent environments

Z Wang, M Xu, N Ye, R Wang, H Huang - Proceedings of the ACM on …, 2019 - dl.acm.org
Capturing RFID tags in the region of interest (ROI) is challenging. Many issues, such as
multipath interference, frequency-dependent hardware characteristics and phase periodicity …

Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives

C Shao, H Roh, W Lee - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless power transfer technique aiming at wireless energy provision has emerged as a
prominent solution to the architecture of long-term and self-sustainable wireless systems …

Computer vision-assisted 3D object localization via COTS RFID devices and a monocular camera

Z Wang, M Xu, N Ye, F Xiao, R Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In most RFID localization systems, acquiring a reader antenna's position at each sampling
time is challenging, especially for those antenna-carrying robot or drone systems with …

[HTML][HTML] TransTM: A device-free method based on time-streaming multiscale transformer for human activity recognition

Y Liu, W Huang, S Jiang, B Zhao, S Wang, S Wang… - Defence …, 2024 - Elsevier
RFID-based human activity recognition (HAR) attracts attention due to its convenience, non-
invasiveness, and privacy protection. Existing RFID-based HAR methods use modeling …

RF-Rhythm: Secure and usable two-factor RFID authentication

J Li, C Wang, A Li, D Han, Y Zhang… - … -IEEE Conference on …, 2020 - ieeexplore.ieee.org
Passive RFID technology is widely used in user authentication and access control. We
propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong …

Toward Robust RFID Localization via Mobile Robot

J Zhang, X Liu, S Chen, X Tong… - … /ACM Transactions on …, 2024 - ieeexplore.ieee.org
A wide range of scenarios, such as warehousing, and smart manufacturing, have used RFID
mobile robots for the localization of tagged objects. The state-of-the-art RFID-robot based …

Awash: handwashing assistance for the elderly with dementia via wearables

Y Cao, H Chen, F Li, S Yang… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Hand hygiene has a significant impact on human health. Proper handwashing, having a
crucial effect on reducing bacteria, serves as the cornerstone of hand hygiene. For the elder …

SILoc: A speed inconsistency-immune approach to mobile RFID robot localization

J Zhang, X Liu, T Gu, X Tong… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Mobile RFID robots have been increasingly used in warehousing and intelligent
manufacturing scenarios to pinpoint the locations of tagged objects. The accuracy of state-of …