[HTML][HTML] Review on Security Range Perception Methods and Path-Planning Techniques for Substation Mobile Robots
J Zheng, T Chen, J He, Z Wang, B Gao - Energies, 2024 - mdpi.com
The use of mobile robots in substations improves maintenance efficiency and ensures the
personal safety of staff working at substations, which is a trend in the development of …
personal safety of staff working at substations, which is a trend in the development of …
Real-time and accurate gesture recognition with commercial RFID devices
Gesture recognition based on radio frequency identification (RFID) has attracted much
research attention in recent years. Most existing RFID-based gesture recognition …
research attention in recent years. Most existing RFID-based gesture recognition …
RF-Focus: Computer vision-assisted region-of-interest RFID tag recognition and localization in multipath-prevalent environments
Capturing RFID tags in the region of interest (ROI) is challenging. Many issues, such as
multipath interference, frequency-dependent hardware characteristics and phase periodicity …
multipath interference, frequency-dependent hardware characteristics and phase periodicity …
Next-generation RF-powered networks for Internet of Things: Architecture and research perspectives
Wireless power transfer technique aiming at wireless energy provision has emerged as a
prominent solution to the architecture of long-term and self-sustainable wireless systems …
prominent solution to the architecture of long-term and self-sustainable wireless systems …
Computer vision-assisted 3D object localization via COTS RFID devices and a monocular camera
In most RFID localization systems, acquiring a reader antenna's position at each sampling
time is challenging, especially for those antenna-carrying robot or drone systems with …
time is challenging, especially for those antenna-carrying robot or drone systems with …
[HTML][HTML] TransTM: A device-free method based on time-streaming multiscale transformer for human activity recognition
Y Liu, W Huang, S Jiang, B Zhao, S Wang, S Wang… - Defence …, 2024 - Elsevier
RFID-based human activity recognition (HAR) attracts attention due to its convenience, non-
invasiveness, and privacy protection. Existing RFID-based HAR methods use modeling …
invasiveness, and privacy protection. Existing RFID-based HAR methods use modeling …
RF-Rhythm: Secure and usable two-factor RFID authentication
Passive RFID technology is widely used in user authentication and access control. We
propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong …
propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong …
Toward Robust RFID Localization via Mobile Robot
A wide range of scenarios, such as warehousing, and smart manufacturing, have used RFID
mobile robots for the localization of tagged objects. The state-of-the-art RFID-robot based …
mobile robots for the localization of tagged objects. The state-of-the-art RFID-robot based …
Awash: handwashing assistance for the elderly with dementia via wearables
Hand hygiene has a significant impact on human health. Proper handwashing, having a
crucial effect on reducing bacteria, serves as the cornerstone of hand hygiene. For the elder …
crucial effect on reducing bacteria, serves as the cornerstone of hand hygiene. For the elder …
SILoc: A speed inconsistency-immune approach to mobile RFID robot localization
Mobile RFID robots have been increasingly used in warehousing and intelligent
manufacturing scenarios to pinpoint the locations of tagged objects. The accuracy of state-of …
manufacturing scenarios to pinpoint the locations of tagged objects. The accuracy of state-of …