SlideShare a Scribd company logo
1 of 12
Download to read offline
TELKOMNIKA, Vol 16, No 1: February 2018, pp. 390~401
ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013
DOI: 10.12928/TELKOMNIKA.v16i1.7393  390
Received Sep 24, 2017; Revised December 25, 2017; Accepted January 8, 2018
The Locator Framework for Detecting Movement
Indoors
Kevin Curran
Ulster University, School of Computing and Intelligent Systems, Londonderry, Northern Ireland
*Corresponding author, e-mail: kj.curran@ulster.ac.uk
Abstract
There are many advantages to being able to track in real-time the movement of things or humans.
This is especially important in tracking goods in the supply chain, in security and also in health and safety.
The Global Positioning Satellite (GPS) system works well in outdoor environments but it cannot track items
indoors. There is also the problem of power hungry sensor chips inherent in some GPS trackers. Mobile
Cellular triangulation also works well for many outdoor solutions but problems with cost, accuracy and
reliability make it difficult to deploy for indoor tracking scenarions. The levels of accuracy can vary by up to
50 meters which hinder its ability for adoption in many use case scenarios. There are also problems with
poor cellular coverage in rural areas. Solutions built on WiFi–the IEEE 802.11 standard overcome many of
these issues. WiFi location tracking works via sampling of the received signal strength (RSS) which along
with triangulation and prior mapping allows systems to locate items or humans with fine-granularity. This
WiFi fingerprinting is a viable cost-effective approach to determining movement within indoor enviroments.
This paper presents an overview of popular techniques and off-the-shelf solutions which can be used to
determine movement of people and objects indoors. We outline the Locator frameworks which is built on
both active and passive indoor localisation techniques for tracking movement within indoor environments.
Keywords: Device Free Passive Localisation (DFPL), movement detection, indoor tracking, mobile activity
detection
Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Determing the movement, location and activity of individuals indoors is an active area of
research [1], [2]. Determining movement is important within vertical markets such as tracking
company assets, gaming, supply chain, manufacturing, elderly care monitoring, fire fighting,
entertainment and security. The ability to use existing wireless infrastructures for the tracking of
individuals makes it feasible to roll-out cost-effective tracking sytems within these vertical
markets. Location determination can be categorized as either active or passive [3]. Examples of
such approaches are common and have differing qualaties and benefits depending on the use
case, acess to sensors and granuality of accucacy required [4].
An active tracking system requires participants to carry on their person an electronic
tracking device e.g. mobile, sensor, e-badge, laptop, smartwatch which communicates with the
infrastructure. This does offer the ability of two-way communication and in some cases a certain
amount of processing which could be considered similar to the Edge Computing Paradigm. A
passive localization approach does not require any on-body devices but relies on the
infrastructure sensing changes in the signal values which within certain thresholds can be
determined to indicate movement. These are known as Device Free Passive Localisation (DfPL)
systems and work by sampling the signal strength variances in the wireless network [5]. An
underlying enabler for this device free person movement detection is due to the human body
being composed of 70% water which resonates at 2.4 GHz which of course if the frequency with
which 802.11 WiFi networks can work at. Here the human’s body acts as an absorber and
attenuates the WiFi signal.
Examples of where indoor location deterimation technology can be applied include:
a. Keeping tabs on the elderly. Here patients can be equipped with bracelets or sensors with
acceloromers which can detect falls or when they wander outside predetermined safe
zones. There is also the ability to track their movement over time which provides an early
warning system. Tracking with WiFi is also less intrusive than camera-based systems and
TELKOMNIKA ISSN: 1693-6930 
Stream a Framework for Detecting Movement Indoors (Kevin Curran)
391
augmenting older people’s homes with non-intrusive tracking solutions can allow them to
live in the community longer.
b. Fire fighting. Fire fighters can enter large buildings and it is important to be able to
determine where each fire fighter is and in which zone. Indoor tracking solutions can work
alongside fire fighters to increase the safety of this occupation.
c. Gaming. There are many scenarios where being able to accurately track people moving
inside a building can be augmented with mobile apps to provide a more immersive
engaging experience. Location and accurate detection of movement has been shown to be
an additive combination as shown in the popular Pokemon Go Augmented app.
d. Security. Passive localization tracking systems especially provide a potential benefit to
intruder detection. If the thresholds are properly set, movement detection can be sensed by
the network thus providing an early warning or secondary source of alert to security
personnel. The next part provides an overview of passive and active movement detection
approaches.
2. The Technology behind Pinpointing Users Indoors
The key enabler of detecting movement using wireless networks is the Received Signal
Strength Indicator (RSSI) [6]. RSSI is a relative measurement using within the wireless network
chip to determine the signal quality between an access point and a communicating target. RSSI
measurements will result in an estimation of the distance of the target. The more
measurements, the more accurate the hardware, stability in weather and the isolation of
external electromagnetic interference will all contribute to more accurate results.
An important aspect when measuring RSSI is power attenuation due to distance. It
must be noted however that absorption gradient will affect any RSSI measurements. Other
factors such as walls, doors, direction of antenna, manufacturer wifi cards, other humans &
large obstacle will bring discontinuities between RSSI and the distances to be measured [7].
RSSI values are recorded as percentages or non-dimensional numbers which frequently get
converted to DBm through nonlinear mappings [8]. The problem here however is that each
manufacturer uses a proprietary mapping for their cards. Examples invlude Cisco WiFi cards
which follow a table for conversion with higher granularity, and Atheros WiFi cards which use a
lower resolution mapping [9]. It is more ideal if the entire wireless infrastructure consists of
single manufacturers products. The error caused by different types of WLAN cards can be
around 20% which is a considerable error value [10].
It is important therefore when conducting experiments which rely on RSSI
measurements that the antenna positioning & orientation along with dBm mappings are
controlled. Antenna orientation can lead to variances of up to 10 dBm in RSSI which is a
considerable variance given the limitations inherent in determing movement through the same
dBm measurements [3]. Other aspects which will affect the accuracy of measurments are the
existence of other people in the area. This results in the received signal strength becoming
absorbed when other humans obstruct the signal which leads to additional attenuation [14].
Next, we outline the main active location tracking technologies for indoor environments.
2.1. RFID Tracking
Radio Frequency Identification (RFID) is a wireless technology used in areas like
entering buildings or carparks, asset management and tracking wildlife. RFID works through
tadio signals transmitted between tags & RFID readers. The RFID reader contain much
functionality than the tags. The readers have an antenna and a transceiver, power supply,
processor and network interface. Each RFID tag is composed of an antenna, transceiver,
memory & unique ID. They can be classified as either active or passive tags. Passive tags do
not contain a power source but are rather activated by the reader in a neat backscatter energy
technique. Active tags however can contain power (e.g. batteries) which enable them to be
scanned at greater distance (e.g. typically 1-30meters). The integration of batteries does tend to
lead to larger tags and an increase in costs. Some active tags offer 10 years battery life. In
detecting movement of people, the most common scenario is to place RFID readers at the
portals to room so that the process of obtaining access through the RFID tag also doubles as a
recording of movement through the portal. RFID tracking systems can therefore monitor
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401
392
attendance via such techniques. It is a rather crude tracking however and can only determine a
person’s location at room or building level.
Active RFID tags possess unique identifierd which enable tracking each second so long
of course as they can interact with the reader. There are generally power saving features
enabled such that tags will sleep until movement is detected. A common real-world use case for
active tags is on shopping carts within supermarkets. This allows the retailers to track shopper
movement and apply machine learning technqiues to mine shopper behavior. Active tags
generally offer higher reliability in tracking due to their maintenance of active sessions with
readers There also exists a category of RFID tags known as semi-active (or semi-passive)
which contain power sources which only power the microship. The signal response is obtained
similar to passive in a backscatter of the radio frequency waves. They have a higher sensitivity
than passive tags, longer battery life cycles than active tags and are able to actually record
aspects such as temperature logging under their own power, even if no reader is there to
power it.
2.2. WiFi Tracking Solutions
WiFi (IEEE 802.11) networks have become a ubiquitous presence in home and public
spaces. Access Points in infrastructure mode broadcast signals which can be availed of for
location determination [12]. This can be attractive option due to the low costs involved. The low
costs come from the fact no additional infrastrure needs to be built and the popularity of 802.11
devices ensure they are realtively cheap to deploy [15]. Wireless systems rely on
measurements of RSSI, Signal to Noise (SnR) ratio and Proximity Sensing to control power and
assist in link quality measurements. Here beacon access points send out broadcasts on the up
or down link periodically [14]. The receivers also make measurements of RSSI and Signal to
noise Ratio (SnR).
Becons emits signals which transmit identifiers and quality indicators. Devices can use
passive scanning (or active) to latch onto these signals [15]. The Basic Service Set Identifier
(BSSI) i.e name of wireless network is broadcast periodically to all listening devices within range
of the Base Service Set (BSS). The frequency of broadcasts can be configured and is usually
every few milliseconds. These beacons can be used for location determination. For instance, an
access point which has been determined to have the strongest signal can be considered to be
the location of the mobile device. So, if we know the Base Station’s coordinates (e.g. x, y), then
the Mobile Device’s (or person carrying it) coordinates can also be determined to be (x, y). To
achieve this, WLAN fingerprinting is the most common method Systems such as from Ekahau
system and the LA200 system from Trapeze networks both use this technique as their
foundation for tracking.
All indoor wireless tracking systems must begin with a fingerprinting process. Here
there is an offline & online stage. The offline stage is where a calibration of the positioning
environment is done physically by a walk through the building. Here a map of the building floors
is updated and RSSI values are constantly sampled as the engineer walks through the building
clicking on the map to indicate where they are positioning themselves. This is time consuming
but a necessary step towards having accurated positions at a later date. Ideally the mapper will
turn 360 degrees in various places to capture the best recordings of each neighbouring access
point(s). The recordings of RSSI values are stored in the indoor mapping database.Next, the
online stage is there position location fixes are obtained and mapped towards the best match in
the database [16]. There can be problems if access points are moved or if substantial building
changes occur which can affect accuracy. Frequeny mappings for the offline stage will
overcome this [17].
2.3. Bluetooth Tracking Solutions
Bluetooth indoor positioning systems are similar to the WiFi and RFID systems in that
they use positioning servers, access points and Bluetooh tags/badges. There is also an option
to simply use a Bluetooh device such as mobile phone or laptop to substitute for a badge.
These systems offer similar accuracies to WiFi in the range of 2-10 meters. The most common
triangulation method is again via RSSI measurements. The more Blueooth beacons used, the
more accurate the tracking will be.
2.4. Indoor Map Based Systems
TELKOMNIKA ISSN: 1693-6930 
Stream a Framework for Detecting Movement Indoors (Kevin Curran)
393
Examples of indoor mapping systems include an offering from Point Inside. These
location solutions work with indoor maps and have found roll-outs in shopping outlets and
airports. Point Inside have integrated their indoor mapping and platform capabilities directly into
many production apps with their native and web SDKs. These sytems use WiFi mostly for
indoor position triangulation. A major difference between these & the earlier WiFi olutions are
that you are reliant on have pre-existing indoor location maps in place. A key selling point for
systems like Point Inside is the desire by retailers to understand more about the products their
shoppers are purchasing, where they spend time within a store and what actually brands they
are interacting with. They also care about how long a customer spends looking at brands and
which they select. This ultimately provides retail marketers with the additional knowledge
needed to individually meet shoppers needs through in-app marketing. Indoor map solutions are
a relaltively easy way for users to enter the indoor location tracking sector.
2.5. Ultra-wideband
Ultra wideband (UWB) is a radio technology that uses timed short bursts of RF energy
to enale accurate triangulation of the position of an object or person who is attributed to a
corresponding ultra-wideband tag. Ultra-wideband can be used at low power levels for short-
range high-bandwidth communications (typically >500 MHz). It uses a large portion of the radio
spectrum [18]. It differs from the spread spectrum in that it transmits in a manner which does not
interfere with conventional narrowband & carrier wave transmission within the same frequency
band. The information is modulated on Ultra wideband signals (pulses) through encoding the
polarity of the pulse, the amplitude and using orthogonal pulses. These pulses can be sent
periodically at relatively low pulse rates to support time or position modulation. They can also be
sent at rates up to the inverse of the UWB pulse bandwidth. These pulses are short (<60 cm for
500 MHz-wide pulse and <23 cm for 1.3 GHz-bandwidth pulse).
In Ultra wideband location systems, active tags can be attached to people who are
being tracked. These tags emit signals which are detected by a network of nearby UWB
receivers. If detected by at least two receivers, then the persons position can be determined.
The algorithm used can be the time difference of arrival (ToA) of a signal at two readers or UWB
systems can also used the angle of arrival (AoA) of the signal to determine position. Ultra wide
band systems are quite adapted to working within indoor environments as the UWB tags short
bursts of radio pulses can easily cope with multipath reflections from competing conventional
RF signals. It is worth noting that metallic & liquid materials can cause signal interference.
2.6. Wireless Sensor Networks–zigbee
Wireless Sensor Networks (WSN) are where a number of wireless sensors are
connected together for means of communication through a radio medium. A popula wireless
sensor network standard is Zigbee (IEEE 802.15.4). Zigbee allows for control and
communication in WSNs in a power efficient manner. The Wireless Sensor nodes create what is
called a mesh network. They are also characterized by their self-forming & self-healing
architecture. This aspect lends itself to positioning. When used in positioning, Zigbee uses the
Time of Arrical (TOA) algorithm to triangulate between devices/tags and fixed infrastructure.
Advantages of using Zigbee as a positioning technology are akin to ultra wideband. These are
power efficiency, low costs and accuracy. Wireless sensor networks built on Zigbee also suffer
from the weaknesses that all radio frequency technologies do such as interference, range,
battery life of devices and security issues.
2.7. Camera Based
While not at first glance an obvious indoor positioning technique, camera-based
positioning systems are deployed. It is accepted that vision is an excellent positioning method
for humans. We are quite capable of estimating distances given a target and a clear line of
sight. Cameras can attempt to replicate this. They are becoming cheaper and the resolutions
are increasing at a rapid rate. The use of multiple cameras trained on particular areas within
buildins allows a positioning system to perform similar complex position estimations but also to
visually detect a known human. All the exising problems with face recognition apply in addition
to changes in facial features however they can be useful for crowd policing, crowd size
estimation and also in tracking elderly patients within their home. There is of course an intrusive
aspect to camera-based tracking. Vision based tracking systems also overcome the
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401
394
requirement for individuals to carry tracking devices so it is similar to the device free passive
localization approach. The UK is widely report to have the highest per capita number of
surveillance cameras in the world and many camera-based tracking case studies are in
existence [19].
3. Locator Framework
This section provides an overview of an indoor location tracking extensible architecture
including the web application and the mobile app which we have developed which builds on our
previous work [19]. This framework allows the use of various indoor tracking technologies to be
plugged in. It also allows the use of passive and active tracking technologies in a hybrid
approach to increase the accuracy and the number of scenarios under which activity recognition
could be detected in addition to location within the indoor environment
3.1. Architecture
The web application is implemented in Java and supports interaction with the system by
a range of different types of clients. The web application offers content in a RESTful way.
Access to the web portal is via JSP pages which are compiled into HTML mark-up with Ajax
used as the primary means of transferring data. Data transfer is based on a commonly used
data interchange format (i.e. JSON) to permit reuse of functionality by the mobile application.
Figure 1 shows the communication procedure with the web application. The request and
response may or may not contain JSON data.
Figure 1. Web app communication
The web application is modular and loosely coupled allowing functionality to easily be
reused or replaced entirely if required. A three tiered system is used to achieve this. The layers
are data access, business and presentation. Each layer has a clearly defined role; the data
access layer or DAL is used exclusively for communication with the database, the business
layer holds any application specific logic while the presentation layer contains user
display/interaction logic as well as offering an endpoint for client communication. The
presentation layer communicates with the business layer while the business layer
communicates with the DAL layer which communicates with the database. As a result program
flow of control is easily followed and traced. The presentation layer makes use of the model
view controller architectural pattern to further separate display logic from interaction logic
helping to keep the system maintainable and easily changed in the future. In order to transfer
data between layers, data transfer objects (DTOs) were created to model application data (e.g.
a BeaconDTO contains all beacon information). Web application layers are shown in Figure 2.
The layers of the web application use the open source Spring framework. Spring is an
application and inversion of control container for Java web applications which relies heavily on
the use of interfaces and XML wiring to inject dependencies (or configurable properties) into
other classes. The use of dependency injection is one of the most effective ways of reducing a
class’ dependency on another class and greatly aides in keeping classes loosely coupled,
reusable, extensible and highly testable. A number of software design patterns were used for
the implementation, most noticeably the business layer which uses the command design pattern
TELKOMNIKA ISSN: 1693-6930 
Stream a Framework for Detecting Movement Indoors (Kevin Curran)
395
to encapsulate particular pieces of functionality such as saving a user’s location. A business
command performs some specific high level business functionality and interacts with the
database by using the DAL services mentioned previously to persist or retrieve data (e.g. a
location service which contains references to a position DAO and beacon DAO used to
determine location). The presentation layer uses the Spring framework’s Java annotations to
specify web request (URIs) mapping with specific Java functionality in classes known as
controllers. Each controller contains a collection of URI mappings with Java methods offering
similar aspects of functionality e.g. a beacon controller only contains functionality related to
beacons. In keeping with the system structure, controller methods will always execute a
business command.
Figure 2. Web app architecture
3.2. Mobile Application
The mobile application uses the Android beacon library to communicate with nearby
beacons to retrieve their Eddystone-UID. This Eddystone-UID is comprised of an id and
instance id. The Android beacon library is an open source library with a large support base and
is regularly updated for bug fixes and support for new features. Once retrieved the Eddystone-
UID communicates to the server which determines and stores the user’s current position. The
mobile app is how the end users interact with the system both in the initial stages where
locations can be detected/recorded, settings changed but also for initial registration. The various
screens within this mobile app are shown in the following sections.
3.2.1. Registration
Figure 3 shows the register page which allows new user to create a new user account
to collect reward points with. Here any new user wishing to gain access to the system will be
required to enter a unique username along with a password. The password input is run through
a complexity checker prior to being accepted. There are a number of navigation options
available on this and subsequent input screens to that users can cancel, return to previous
screens or quit. Figure 4 shows the main menu with options for activities, position settings,
account settings and exiting the app.
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401
396
Figure 3. Register page with (left) and without (right) input Figure 4. Main menu
3.2.2. Menu
The menu page shown to users after login allows the user to navigate between
application pages. The menu bar includes access to all pages via icons or an overflow icon
(three dots on the right with text shown on selection) if there is limited space. At any time, the
user may exit the application which displays a confirmation dialog beforehand. The menu bar is
shown on all pages to allow quick navigation to any page from any page.
3.2.3. Beacon Scanning
The beacon scanning screen allows a user to enable scanning for beacons with a
prompt shown if Bluetooth is not already enabled as shown in Figure 6. Once scanning is
enabled, the scanning functionality of the mobile application lets beacons be scanned for every
ten seconds. If a beacon (closer than the ranging distance threshold) is found, then its
Eddystone-UID details are sent to the web application which saves a new position history with
the current timestamp. While remaining within range of the same beacon, new position histories
are saved every 60 seconds. If multiple beacons are scanned, then the closest beacon is used.
Once beacon scanning is enabled it will continue to run in the background even if the user
closes the application completely. We choose this because beacon scanning is performed in a
custom background service which the application communicates with. This becomes
problematic however when attempting to get the current status of the background service after
restarting the application as Android does not provide a clear way of checking if a service is
running or not. Nevertheless, if the application does restart, the state of the background service
is correctly shown by the state of the buttons. Although the normal scan cooldown time results
in very little additional battery consumption, a power saving mode has been included which
increases the scanning cooldown to thirty seconds. This reduces the time it takes to discover
new beacons although user locations are still saved often enough to be considered accurate.
3.2.4. Position History
The position history page allows a user to view all their own position histories in a list
shown in Figure 5. When a position history is selected, specific details are shown including the
time and date they visited each position. This page automatically updates each time a new
position history is saved (if beacon scanning is enabled) allowing the user to see in real time
which location they are in.
TELKOMNIKA ISSN: 1693-6930 
Stream a Framework for Detecting Movement Indoors (Kevin Curran)
397
Figure 5. Position histories Figure 6. User activity
3.2.5. Account Settings
The account settings page allows users to manage their account details such as name
and password. The user account id and username are also shown. These can be used if admin
support is needed. Any validation errors will result in icons similar to those on the login and
registration pages. The URL that the application uses can be changed here. The reset button
allows a user to reset any changes they have made. Figure 7 shows the about page.
Figure 7. FAQ screen
3.3. Web Application
Since the web portal is only accessible by admin users, the main page displays a login
form in which users must enter valid administrative credentials to gain access to the
management section of the web portal. The index page includes a download button from which
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401
398
a user can download the mobile application and install it. Once Eddystone-URLs gain
widespread native support by mobile browsers, the download functionality could be simply
offered to users (without any knowledge of the system) by configuring beacons to broadcast this
download URL.
3.3.1. Manage User Accounts
Here the key information relating to user accounts is shown. This include usernames,
user account types and full names. This page allows an administrative to update, create or
delete any user accounts. Figure 8 shown manage user accounts page. A sample of some of
the dialogs produced because of various actions on this page are shown in Figure 9 including
the delete and create user account dialog which is also used for updating user accounts.
Figure 8. Manage user accounts page
Figure 9. User account page dialogs
3.3.2. Manage Locations
The manage locations section as shown in Figure 10 allows administrative to assign
positions to beacons. This is crucial and can only be performed in this screen. Here an admin
can manage locations and create, update & delete pre-existing location data if incorrect.
Positions associated with a particular location can be deleted here. Deletion confirmation is
inbuilt
TELKOMNIKA ISSN: 1693-6930 
Stream a Framework for Detecting Movement Indoors (Kevin Curran)
399
Figure 10. Manage locations page
3.3.3. Manage Beacons
Managing beacons is one of the key features of the web portal and the manage beacon
page allows admins to do this. Beacons can be created, modified and deleted from this page as
shown in Figure 11. During creation or modification, beacons can be optionally assigned to a
location via a dropdown which is populated with locations saved through the manage locations
page. If a beacon is assigned a location, then a position name must be entered.
Figure 11. Manage beacons page
3.3.4. View Position Histories
The view position histories page can be used by admins to view position histories for all
users within the system as shown in Figure 12. The admin can also elect to auto refresh this
page meaning table data will automatically update every few seconds, displaying any new
position histories which may have been saved.
 ISSN: 1693-6930
TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401
400
This pages includes search functionality (also offered on all other management pages),
which allows the information displayed to be searched allowing an admin user to filter these
results by a username, date, location or position.
Figure 12. View position histories page
3.3.5. View Charts
Admin users through the View charts feature can look at various statistics such as the
most popular locations (this is capured through total linger time), the most frequently visited
positions, average linger time & the last known location visited. Session & Linger time are
calculated from the amount of continuous time each user spends at a position. This is referred
to as a position history session. The view charts fearture contains an auto refresh functionality
which can be disabled if required. The chart data automatically refreshes every 5 seconds.
Hovering over a chart will display additional details. Also, a user can select locations which
updates other charts with data explicitly for the chosen location.
4. Conclusion
An overview of an extensible indoor location determination framework which uses
Bluetooth beacons for active positioning which can determine location of individuals is
presented here. It also uses device free passive localisation techniques for determination of
activities performed in each location. The Bluetooth active localisation hardware can easily be
substituted with another active technology such as WiFi or Zigbee. The framework allows a
seamless updating of locations, beacons & activities. The Java web application supports
interaction with the system by a range of different types of clients. It offers content in a RESTful
way via JSP pages which are compiled into HTML with Ajax used as the primary means of
transferring data. Data transfer is based on JSON data interchange format to permit reuse of
functionality by the mobile application.Future plans include the integration of Channel State
Information (CSI) in order to more accurately classify activities using device free passive
localisation.
Acknowledgements
This work was funded by the Royal Academy of Engineering under their Royal
Academy of Engineering Senior Research Fellowship scheme.
References
[1] Vance P, Prasad G, Harkin J, Curran K. Analysis of Device-free Localisation (DFL) Techniques for
Indoor Environments. ISSC 2010 - The 21st Irish Signals and Systems Conference, University
College Cork, 23rd - 24th June
TELKOMNIKA ISSN: 1693-6930 
Stream a Framework for Detecting Movement Indoors (Kevin Curran)
401
[2] Vance P, Prasad G, Harkin J, Curran K. A wireless approach to Device-Free Localisation (DFL) for
indoor environments. Assisted Living 2011 - IET Assisted Living Conference 2011, IET London:
Savoy Place, UK, 6 April 2011.
[3] Furey E, Curran K, Lunney T, Woods D, Santos K. Location Awareness Trials at the University of
Ulster, Networkshop bThe JANET UK International Workshop on Networking, The University of
Strathclyde, 8th-10th April 2008.
[4] Bekris K, Rudys A, Marceau G, Kavraki L, Wallach D. Robotics based location sensing using wireless
Ethernet. The Eighth ACM Int. Conf. MOBICOM2002, pp. 227-238, Atlanta, GA, USA, Sept. 2002.
[5] Deak G, Curran K, Condell J. Evaluation of Smoothing Algorithms for a RSSI-based Device-free
Passive Localisation. Advances in Intelligent and Soft Computing. Springer-Verlag 2010: 59-66 ISBN:
978-3-642-162947, DOI 10.1007/978-3-642-162-16295-4
[6] Furey E, Curran K, Mc Kevitt P. A Bayesian filter approach to modelling Human Movement Patterns
for First Responders within Indoor Locations. CIDM 2011 – 2nd Workshop on Computational
Intelligence for Disaster Management, Fukuoka, Japan, Nov 30
[7] Nafarieh A, How J. A Testbed for Localizing Wireless LAN Devices Using Received Signal Strength,
Communication Networks and Services Research Conference, 2008. CNSR 2008. 6th Annual. 5-8
May 2008: 481-487.
[8] Bardwell J. Certified Wireless Network Administrator Official Study Guide. McGraw Hill, 2005.
[9] Bardwell J. Converting Signal Strength Percentage to dBm Value, WildPackets Inc., 20021217-M-
WP007, Nov 2002.
[10] Furey E, Curran K, Mc Kevitt P. Incorporating Past Human Movement into Indoor Location
Positioning Systems for Accurate Updates. IT&T 2010 – 10th Conference on Information Technology
and Telecommunications, Letterkenny Institute of Technology, Ireland, 21st - 22nd Oct 2010
[11] Furey E, Curran K, Mc Kevitt P. HABITS: A History Aware Based Wi-Fi Indoor Tracking System.
PGNET The 9th Annual Symposium: Convergence of Telecommunications Networking and
Broadcasting 2008, Liverpool, John Moores, UK, 23rd-24th June 2008
[12] Deak G, Curran K, Condell J, Bessis N. Asimakopoulou E. IoT (Internet of Things) and DfPL (Device-
free Passive Localisation) in a disaster management scenario. Simulation Modelling Practice and
Theory. 2013; 34(3): 86-96.
[13] Furey E, Curran K, Mc Kevitt P. A Bayesian Filter Approach to Indoor Tracking and Location. AICS
2011 - The 22nd Irish Conference on Artificial Intelligence and Cognitive Science, University of
Ulster, Magee Campus, N. Ireland, 31 August - 2 September 2011
[14] Carlin S. Curran, K. An Active Low Cost Mesh Networking Indoor Tracking System. International
Journal of Ambient Computing and Intelligence. January-March 2014; 6(1): 45-79.
[15] Curran K, Furey E, Lunney T, Santos J, Woods D, Mc Caughey A. An Evaluation of Indoor Location
Determination Technologies. Journal of Location Based Services. June 2011; 5(2): 61-78. ISSN:
1748-9725.
[16] Feng W, Curran K. Enhanced WiFi Location Sensing with Activity Data, Intel Conference 2009-Intel
European Research and Innovation Conference 2009, Intel Ireland Campus, Leixlip, Co Kildare, 8-
10th September 2009.
[17] Furey E, Curran K, Mc Kevitt P. Learning Indoor Movement Habits for Predictive Control.
International Journal of Space-Based and Situated Computing. July-August 2011; 1(2). ISSN: 2044-
4894, InderScience Publishing.
[18] Knox J, Condell J, Curran K. An Ultra Wideband Location Positioning System. TAROS 2009 - The
10th International Towards Autonomous Robotic Systems (TAROS) Conference, University of Ulster,
Derry, August 31st - September 2nd, 2009.
[19] Mansell G, Curran K. Location Aware Tracking with Beacons. IPIN 2016 - The 7th International
Conference on Indoor Positioning and Indoor Navigation, Madrid, Spain, 4-7 October 2016
[20] Curran K, Furey E. Pinpointing Users with Location Estimation Techniques and Wi-Fi Hotspot
Technology. International Journal of Network Management. John Wiley & Sons, Ltd, 2007; 16(5).
[21] Curran K, Norrby S. RFID-Enabled Location Determination within Indoor Environments. International
Journal of Ambient Computing and Intelligence, IGI Publishing, 2009; 1(4).
[22] Deak G, Curran K, Condell J, Deak D. Detection of Multi-Occupancy using Device-free Passive
Localisation (DfPL). IET Wireless Sensor Systems. June 2014; 4(2): 1-8.
[23] Furey E, Curran K, Mc Kevitt P. Predictive Indoor Tracking by the Probabilistic Modelling of Human
Movement Habits. IERIC 2010- Intel European Research and Innovation Conference 2010, Intel
Ireland Campus, Leixlip, Co Kildare, 12-14th October 2010.
[24] Furey E, Curran K, Mc Kevitt P. HABITS: A Bayesian Filter Approach to Indoor Tracking and
Location, International Journal of Bio-Inspired Computation (IJBIC). 2012; 4(1.
[25] Furey E, Curran K, Mc Kevitt P. Probabilistic Indoor Human Movement Modeling to Aid First
Responders. Journal of Ambient Intelligence and Humanized Computing. Ambient Intelligence
Humanized Computing. 3(2). 07 April 2012. DOI:10.1007/s12652-012-0112-4

More Related Content

What's hot

A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computingaazeem689
 
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...Maarten Weyn
 
The Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMasterThe Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMasterWoMaster
 
Shradha maheshwari 24 04-10-4g wireless technology
Shradha maheshwari 24 04-10-4g wireless technologyShradha maheshwari 24 04-10-4g wireless technology
Shradha maheshwari 24 04-10-4g wireless technologyShradha Maheshwari
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationeSAT Journals
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
 
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...nwgong
 
Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...TELKOMNIKA JOURNAL
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
4g wireless technology
4g wireless technology 4g wireless technology
4g wireless technology hardik_khengar
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topicsAce Beau
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Kashyap Shah
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 

What's hot (17)

A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
 
Wireless vs mobile computing
Wireless vs mobile computingWireless vs mobile computing
Wireless vs mobile computing
 
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
 
The Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMasterThe Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMaster
 
Shradha maheshwari 24 04-10-4g wireless technology
Shradha maheshwari 24 04-10-4g wireless technologyShradha maheshwari 24 04-10-4g wireless technology
Shradha maheshwari 24 04-10-4g wireless technology
 
Secure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfigurationSecure remote protocol for fpga reconfiguration
Secure remote protocol for fpga reconfiguration
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
Leveraging Conductive Inkjet Technology to Build a Scalable and Versatile Sur...
 
Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...Machine learning based lightweight interference mitigation scheme for wireles...
Machine learning based lightweight interference mitigation scheme for wireles...
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
4g wireless technology
4g wireless technology 4g wireless technology
4g wireless technology
 
Computer engineering and it seminar topics
Computer engineering and  it seminar topicsComputer engineering and  it seminar topics
Computer engineering and it seminar topics
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 

Similar to Detecting Movement Indoors Using Wireless Signals

Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0Journal Papers
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIRJET Journal
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
 
Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology IJECEIAES
 
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...IAESIJAI
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyIRJET Journal
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in MallsIRJET Journal
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATION
F B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATIONF B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATION
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATIONIJCI JOURNAL
 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET Journal
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDEditor IJCATR
 
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGIMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGcscpconf
 

Similar to Detecting Movement Indoors Using Wireless Signals (20)

Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0High precision location tracking technology in ir4.0
High precision location tracking technology in ir4.0
 
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTORIMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
IMPLEMENTATION OF AN INTELLIGENT MOTION DETECTOR
 
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
 
Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology Development of real-time indoor human tracking system using LoRa technology
Development of real-time indoor human tracking system using LoRa technology
 
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
A genetic based indoor positioning algorithm using Wi-Fi received signal stre...
 
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
 
RFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for SocietyRFID Technology: An Upgradation for Society
RFID Technology: An Upgradation for Society
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
 
40120130405021
4012013040502140120130405021
40120130405021
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATION
F B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATIONF B ASED  T ALKING  S IGNAGE FOR  B LIND  N AVIGATION
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATION
 
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
Review of the Introduction and Use of RFID
Review of the Introduction and Use of RFIDReview of the Introduction and Use of RFID
Review of the Introduction and Use of RFID
 
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSINGIMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
IMPLEMENTING UHF RFID READER ON SMARTPHONE PLATFORM FOR IOT SENSING
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Detecting Movement Indoors Using Wireless Signals

  • 1. TELKOMNIKA, Vol 16, No 1: February 2018, pp. 390~401 ISSN: 1693-6930, accredited A by DIKTI, Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v16i1.7393  390 Received Sep 24, 2017; Revised December 25, 2017; Accepted January 8, 2018 The Locator Framework for Detecting Movement Indoors Kevin Curran Ulster University, School of Computing and Intelligent Systems, Londonderry, Northern Ireland *Corresponding author, e-mail: kj.curran@ulster.ac.uk Abstract There are many advantages to being able to track in real-time the movement of things or humans. This is especially important in tracking goods in the supply chain, in security and also in health and safety. The Global Positioning Satellite (GPS) system works well in outdoor environments but it cannot track items indoors. There is also the problem of power hungry sensor chips inherent in some GPS trackers. Mobile Cellular triangulation also works well for many outdoor solutions but problems with cost, accuracy and reliability make it difficult to deploy for indoor tracking scenarions. The levels of accuracy can vary by up to 50 meters which hinder its ability for adoption in many use case scenarios. There are also problems with poor cellular coverage in rural areas. Solutions built on WiFi–the IEEE 802.11 standard overcome many of these issues. WiFi location tracking works via sampling of the received signal strength (RSS) which along with triangulation and prior mapping allows systems to locate items or humans with fine-granularity. This WiFi fingerprinting is a viable cost-effective approach to determining movement within indoor enviroments. This paper presents an overview of popular techniques and off-the-shelf solutions which can be used to determine movement of people and objects indoors. We outline the Locator frameworks which is built on both active and passive indoor localisation techniques for tracking movement within indoor environments. Keywords: Device Free Passive Localisation (DFPL), movement detection, indoor tracking, mobile activity detection Copyright © 2018 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Determing the movement, location and activity of individuals indoors is an active area of research [1], [2]. Determining movement is important within vertical markets such as tracking company assets, gaming, supply chain, manufacturing, elderly care monitoring, fire fighting, entertainment and security. The ability to use existing wireless infrastructures for the tracking of individuals makes it feasible to roll-out cost-effective tracking sytems within these vertical markets. Location determination can be categorized as either active or passive [3]. Examples of such approaches are common and have differing qualaties and benefits depending on the use case, acess to sensors and granuality of accucacy required [4]. An active tracking system requires participants to carry on their person an electronic tracking device e.g. mobile, sensor, e-badge, laptop, smartwatch which communicates with the infrastructure. This does offer the ability of two-way communication and in some cases a certain amount of processing which could be considered similar to the Edge Computing Paradigm. A passive localization approach does not require any on-body devices but relies on the infrastructure sensing changes in the signal values which within certain thresholds can be determined to indicate movement. These are known as Device Free Passive Localisation (DfPL) systems and work by sampling the signal strength variances in the wireless network [5]. An underlying enabler for this device free person movement detection is due to the human body being composed of 70% water which resonates at 2.4 GHz which of course if the frequency with which 802.11 WiFi networks can work at. Here the human’s body acts as an absorber and attenuates the WiFi signal. Examples of where indoor location deterimation technology can be applied include: a. Keeping tabs on the elderly. Here patients can be equipped with bracelets or sensors with acceloromers which can detect falls or when they wander outside predetermined safe zones. There is also the ability to track their movement over time which provides an early warning system. Tracking with WiFi is also less intrusive than camera-based systems and
  • 2. TELKOMNIKA ISSN: 1693-6930  Stream a Framework for Detecting Movement Indoors (Kevin Curran) 391 augmenting older people’s homes with non-intrusive tracking solutions can allow them to live in the community longer. b. Fire fighting. Fire fighters can enter large buildings and it is important to be able to determine where each fire fighter is and in which zone. Indoor tracking solutions can work alongside fire fighters to increase the safety of this occupation. c. Gaming. There are many scenarios where being able to accurately track people moving inside a building can be augmented with mobile apps to provide a more immersive engaging experience. Location and accurate detection of movement has been shown to be an additive combination as shown in the popular Pokemon Go Augmented app. d. Security. Passive localization tracking systems especially provide a potential benefit to intruder detection. If the thresholds are properly set, movement detection can be sensed by the network thus providing an early warning or secondary source of alert to security personnel. The next part provides an overview of passive and active movement detection approaches. 2. The Technology behind Pinpointing Users Indoors The key enabler of detecting movement using wireless networks is the Received Signal Strength Indicator (RSSI) [6]. RSSI is a relative measurement using within the wireless network chip to determine the signal quality between an access point and a communicating target. RSSI measurements will result in an estimation of the distance of the target. The more measurements, the more accurate the hardware, stability in weather and the isolation of external electromagnetic interference will all contribute to more accurate results. An important aspect when measuring RSSI is power attenuation due to distance. It must be noted however that absorption gradient will affect any RSSI measurements. Other factors such as walls, doors, direction of antenna, manufacturer wifi cards, other humans & large obstacle will bring discontinuities between RSSI and the distances to be measured [7]. RSSI values are recorded as percentages or non-dimensional numbers which frequently get converted to DBm through nonlinear mappings [8]. The problem here however is that each manufacturer uses a proprietary mapping for their cards. Examples invlude Cisco WiFi cards which follow a table for conversion with higher granularity, and Atheros WiFi cards which use a lower resolution mapping [9]. It is more ideal if the entire wireless infrastructure consists of single manufacturers products. The error caused by different types of WLAN cards can be around 20% which is a considerable error value [10]. It is important therefore when conducting experiments which rely on RSSI measurements that the antenna positioning & orientation along with dBm mappings are controlled. Antenna orientation can lead to variances of up to 10 dBm in RSSI which is a considerable variance given the limitations inherent in determing movement through the same dBm measurements [3]. Other aspects which will affect the accuracy of measurments are the existence of other people in the area. This results in the received signal strength becoming absorbed when other humans obstruct the signal which leads to additional attenuation [14]. Next, we outline the main active location tracking technologies for indoor environments. 2.1. RFID Tracking Radio Frequency Identification (RFID) is a wireless technology used in areas like entering buildings or carparks, asset management and tracking wildlife. RFID works through tadio signals transmitted between tags & RFID readers. The RFID reader contain much functionality than the tags. The readers have an antenna and a transceiver, power supply, processor and network interface. Each RFID tag is composed of an antenna, transceiver, memory & unique ID. They can be classified as either active or passive tags. Passive tags do not contain a power source but are rather activated by the reader in a neat backscatter energy technique. Active tags however can contain power (e.g. batteries) which enable them to be scanned at greater distance (e.g. typically 1-30meters). The integration of batteries does tend to lead to larger tags and an increase in costs. Some active tags offer 10 years battery life. In detecting movement of people, the most common scenario is to place RFID readers at the portals to room so that the process of obtaining access through the RFID tag also doubles as a recording of movement through the portal. RFID tracking systems can therefore monitor
  • 3.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401 392 attendance via such techniques. It is a rather crude tracking however and can only determine a person’s location at room or building level. Active RFID tags possess unique identifierd which enable tracking each second so long of course as they can interact with the reader. There are generally power saving features enabled such that tags will sleep until movement is detected. A common real-world use case for active tags is on shopping carts within supermarkets. This allows the retailers to track shopper movement and apply machine learning technqiues to mine shopper behavior. Active tags generally offer higher reliability in tracking due to their maintenance of active sessions with readers There also exists a category of RFID tags known as semi-active (or semi-passive) which contain power sources which only power the microship. The signal response is obtained similar to passive in a backscatter of the radio frequency waves. They have a higher sensitivity than passive tags, longer battery life cycles than active tags and are able to actually record aspects such as temperature logging under their own power, even if no reader is there to power it. 2.2. WiFi Tracking Solutions WiFi (IEEE 802.11) networks have become a ubiquitous presence in home and public spaces. Access Points in infrastructure mode broadcast signals which can be availed of for location determination [12]. This can be attractive option due to the low costs involved. The low costs come from the fact no additional infrastrure needs to be built and the popularity of 802.11 devices ensure they are realtively cheap to deploy [15]. Wireless systems rely on measurements of RSSI, Signal to Noise (SnR) ratio and Proximity Sensing to control power and assist in link quality measurements. Here beacon access points send out broadcasts on the up or down link periodically [14]. The receivers also make measurements of RSSI and Signal to noise Ratio (SnR). Becons emits signals which transmit identifiers and quality indicators. Devices can use passive scanning (or active) to latch onto these signals [15]. The Basic Service Set Identifier (BSSI) i.e name of wireless network is broadcast periodically to all listening devices within range of the Base Service Set (BSS). The frequency of broadcasts can be configured and is usually every few milliseconds. These beacons can be used for location determination. For instance, an access point which has been determined to have the strongest signal can be considered to be the location of the mobile device. So, if we know the Base Station’s coordinates (e.g. x, y), then the Mobile Device’s (or person carrying it) coordinates can also be determined to be (x, y). To achieve this, WLAN fingerprinting is the most common method Systems such as from Ekahau system and the LA200 system from Trapeze networks both use this technique as their foundation for tracking. All indoor wireless tracking systems must begin with a fingerprinting process. Here there is an offline & online stage. The offline stage is where a calibration of the positioning environment is done physically by a walk through the building. Here a map of the building floors is updated and RSSI values are constantly sampled as the engineer walks through the building clicking on the map to indicate where they are positioning themselves. This is time consuming but a necessary step towards having accurated positions at a later date. Ideally the mapper will turn 360 degrees in various places to capture the best recordings of each neighbouring access point(s). The recordings of RSSI values are stored in the indoor mapping database.Next, the online stage is there position location fixes are obtained and mapped towards the best match in the database [16]. There can be problems if access points are moved or if substantial building changes occur which can affect accuracy. Frequeny mappings for the offline stage will overcome this [17]. 2.3. Bluetooth Tracking Solutions Bluetooth indoor positioning systems are similar to the WiFi and RFID systems in that they use positioning servers, access points and Bluetooh tags/badges. There is also an option to simply use a Bluetooh device such as mobile phone or laptop to substitute for a badge. These systems offer similar accuracies to WiFi in the range of 2-10 meters. The most common triangulation method is again via RSSI measurements. The more Blueooth beacons used, the more accurate the tracking will be. 2.4. Indoor Map Based Systems
  • 4. TELKOMNIKA ISSN: 1693-6930  Stream a Framework for Detecting Movement Indoors (Kevin Curran) 393 Examples of indoor mapping systems include an offering from Point Inside. These location solutions work with indoor maps and have found roll-outs in shopping outlets and airports. Point Inside have integrated their indoor mapping and platform capabilities directly into many production apps with their native and web SDKs. These sytems use WiFi mostly for indoor position triangulation. A major difference between these & the earlier WiFi olutions are that you are reliant on have pre-existing indoor location maps in place. A key selling point for systems like Point Inside is the desire by retailers to understand more about the products their shoppers are purchasing, where they spend time within a store and what actually brands they are interacting with. They also care about how long a customer spends looking at brands and which they select. This ultimately provides retail marketers with the additional knowledge needed to individually meet shoppers needs through in-app marketing. Indoor map solutions are a relaltively easy way for users to enter the indoor location tracking sector. 2.5. Ultra-wideband Ultra wideband (UWB) is a radio technology that uses timed short bursts of RF energy to enale accurate triangulation of the position of an object or person who is attributed to a corresponding ultra-wideband tag. Ultra-wideband can be used at low power levels for short- range high-bandwidth communications (typically >500 MHz). It uses a large portion of the radio spectrum [18]. It differs from the spread spectrum in that it transmits in a manner which does not interfere with conventional narrowband & carrier wave transmission within the same frequency band. The information is modulated on Ultra wideband signals (pulses) through encoding the polarity of the pulse, the amplitude and using orthogonal pulses. These pulses can be sent periodically at relatively low pulse rates to support time or position modulation. They can also be sent at rates up to the inverse of the UWB pulse bandwidth. These pulses are short (<60 cm for 500 MHz-wide pulse and <23 cm for 1.3 GHz-bandwidth pulse). In Ultra wideband location systems, active tags can be attached to people who are being tracked. These tags emit signals which are detected by a network of nearby UWB receivers. If detected by at least two receivers, then the persons position can be determined. The algorithm used can be the time difference of arrival (ToA) of a signal at two readers or UWB systems can also used the angle of arrival (AoA) of the signal to determine position. Ultra wide band systems are quite adapted to working within indoor environments as the UWB tags short bursts of radio pulses can easily cope with multipath reflections from competing conventional RF signals. It is worth noting that metallic & liquid materials can cause signal interference. 2.6. Wireless Sensor Networks–zigbee Wireless Sensor Networks (WSN) are where a number of wireless sensors are connected together for means of communication through a radio medium. A popula wireless sensor network standard is Zigbee (IEEE 802.15.4). Zigbee allows for control and communication in WSNs in a power efficient manner. The Wireless Sensor nodes create what is called a mesh network. They are also characterized by their self-forming & self-healing architecture. This aspect lends itself to positioning. When used in positioning, Zigbee uses the Time of Arrical (TOA) algorithm to triangulate between devices/tags and fixed infrastructure. Advantages of using Zigbee as a positioning technology are akin to ultra wideband. These are power efficiency, low costs and accuracy. Wireless sensor networks built on Zigbee also suffer from the weaknesses that all radio frequency technologies do such as interference, range, battery life of devices and security issues. 2.7. Camera Based While not at first glance an obvious indoor positioning technique, camera-based positioning systems are deployed. It is accepted that vision is an excellent positioning method for humans. We are quite capable of estimating distances given a target and a clear line of sight. Cameras can attempt to replicate this. They are becoming cheaper and the resolutions are increasing at a rapid rate. The use of multiple cameras trained on particular areas within buildins allows a positioning system to perform similar complex position estimations but also to visually detect a known human. All the exising problems with face recognition apply in addition to changes in facial features however they can be useful for crowd policing, crowd size estimation and also in tracking elderly patients within their home. There is of course an intrusive aspect to camera-based tracking. Vision based tracking systems also overcome the
  • 5.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401 394 requirement for individuals to carry tracking devices so it is similar to the device free passive localization approach. The UK is widely report to have the highest per capita number of surveillance cameras in the world and many camera-based tracking case studies are in existence [19]. 3. Locator Framework This section provides an overview of an indoor location tracking extensible architecture including the web application and the mobile app which we have developed which builds on our previous work [19]. This framework allows the use of various indoor tracking technologies to be plugged in. It also allows the use of passive and active tracking technologies in a hybrid approach to increase the accuracy and the number of scenarios under which activity recognition could be detected in addition to location within the indoor environment 3.1. Architecture The web application is implemented in Java and supports interaction with the system by a range of different types of clients. The web application offers content in a RESTful way. Access to the web portal is via JSP pages which are compiled into HTML mark-up with Ajax used as the primary means of transferring data. Data transfer is based on a commonly used data interchange format (i.e. JSON) to permit reuse of functionality by the mobile application. Figure 1 shows the communication procedure with the web application. The request and response may or may not contain JSON data. Figure 1. Web app communication The web application is modular and loosely coupled allowing functionality to easily be reused or replaced entirely if required. A three tiered system is used to achieve this. The layers are data access, business and presentation. Each layer has a clearly defined role; the data access layer or DAL is used exclusively for communication with the database, the business layer holds any application specific logic while the presentation layer contains user display/interaction logic as well as offering an endpoint for client communication. The presentation layer communicates with the business layer while the business layer communicates with the DAL layer which communicates with the database. As a result program flow of control is easily followed and traced. The presentation layer makes use of the model view controller architectural pattern to further separate display logic from interaction logic helping to keep the system maintainable and easily changed in the future. In order to transfer data between layers, data transfer objects (DTOs) were created to model application data (e.g. a BeaconDTO contains all beacon information). Web application layers are shown in Figure 2. The layers of the web application use the open source Spring framework. Spring is an application and inversion of control container for Java web applications which relies heavily on the use of interfaces and XML wiring to inject dependencies (or configurable properties) into other classes. The use of dependency injection is one of the most effective ways of reducing a class’ dependency on another class and greatly aides in keeping classes loosely coupled, reusable, extensible and highly testable. A number of software design patterns were used for the implementation, most noticeably the business layer which uses the command design pattern
  • 6. TELKOMNIKA ISSN: 1693-6930  Stream a Framework for Detecting Movement Indoors (Kevin Curran) 395 to encapsulate particular pieces of functionality such as saving a user’s location. A business command performs some specific high level business functionality and interacts with the database by using the DAL services mentioned previously to persist or retrieve data (e.g. a location service which contains references to a position DAO and beacon DAO used to determine location). The presentation layer uses the Spring framework’s Java annotations to specify web request (URIs) mapping with specific Java functionality in classes known as controllers. Each controller contains a collection of URI mappings with Java methods offering similar aspects of functionality e.g. a beacon controller only contains functionality related to beacons. In keeping with the system structure, controller methods will always execute a business command. Figure 2. Web app architecture 3.2. Mobile Application The mobile application uses the Android beacon library to communicate with nearby beacons to retrieve their Eddystone-UID. This Eddystone-UID is comprised of an id and instance id. The Android beacon library is an open source library with a large support base and is regularly updated for bug fixes and support for new features. Once retrieved the Eddystone- UID communicates to the server which determines and stores the user’s current position. The mobile app is how the end users interact with the system both in the initial stages where locations can be detected/recorded, settings changed but also for initial registration. The various screens within this mobile app are shown in the following sections. 3.2.1. Registration Figure 3 shows the register page which allows new user to create a new user account to collect reward points with. Here any new user wishing to gain access to the system will be required to enter a unique username along with a password. The password input is run through a complexity checker prior to being accepted. There are a number of navigation options available on this and subsequent input screens to that users can cancel, return to previous screens or quit. Figure 4 shows the main menu with options for activities, position settings, account settings and exiting the app.
  • 7.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401 396 Figure 3. Register page with (left) and without (right) input Figure 4. Main menu 3.2.2. Menu The menu page shown to users after login allows the user to navigate between application pages. The menu bar includes access to all pages via icons or an overflow icon (three dots on the right with text shown on selection) if there is limited space. At any time, the user may exit the application which displays a confirmation dialog beforehand. The menu bar is shown on all pages to allow quick navigation to any page from any page. 3.2.3. Beacon Scanning The beacon scanning screen allows a user to enable scanning for beacons with a prompt shown if Bluetooth is not already enabled as shown in Figure 6. Once scanning is enabled, the scanning functionality of the mobile application lets beacons be scanned for every ten seconds. If a beacon (closer than the ranging distance threshold) is found, then its Eddystone-UID details are sent to the web application which saves a new position history with the current timestamp. While remaining within range of the same beacon, new position histories are saved every 60 seconds. If multiple beacons are scanned, then the closest beacon is used. Once beacon scanning is enabled it will continue to run in the background even if the user closes the application completely. We choose this because beacon scanning is performed in a custom background service which the application communicates with. This becomes problematic however when attempting to get the current status of the background service after restarting the application as Android does not provide a clear way of checking if a service is running or not. Nevertheless, if the application does restart, the state of the background service is correctly shown by the state of the buttons. Although the normal scan cooldown time results in very little additional battery consumption, a power saving mode has been included which increases the scanning cooldown to thirty seconds. This reduces the time it takes to discover new beacons although user locations are still saved often enough to be considered accurate. 3.2.4. Position History The position history page allows a user to view all their own position histories in a list shown in Figure 5. When a position history is selected, specific details are shown including the time and date they visited each position. This page automatically updates each time a new position history is saved (if beacon scanning is enabled) allowing the user to see in real time which location they are in.
  • 8. TELKOMNIKA ISSN: 1693-6930  Stream a Framework for Detecting Movement Indoors (Kevin Curran) 397 Figure 5. Position histories Figure 6. User activity 3.2.5. Account Settings The account settings page allows users to manage their account details such as name and password. The user account id and username are also shown. These can be used if admin support is needed. Any validation errors will result in icons similar to those on the login and registration pages. The URL that the application uses can be changed here. The reset button allows a user to reset any changes they have made. Figure 7 shows the about page. Figure 7. FAQ screen 3.3. Web Application Since the web portal is only accessible by admin users, the main page displays a login form in which users must enter valid administrative credentials to gain access to the management section of the web portal. The index page includes a download button from which
  • 9.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401 398 a user can download the mobile application and install it. Once Eddystone-URLs gain widespread native support by mobile browsers, the download functionality could be simply offered to users (without any knowledge of the system) by configuring beacons to broadcast this download URL. 3.3.1. Manage User Accounts Here the key information relating to user accounts is shown. This include usernames, user account types and full names. This page allows an administrative to update, create or delete any user accounts. Figure 8 shown manage user accounts page. A sample of some of the dialogs produced because of various actions on this page are shown in Figure 9 including the delete and create user account dialog which is also used for updating user accounts. Figure 8. Manage user accounts page Figure 9. User account page dialogs 3.3.2. Manage Locations The manage locations section as shown in Figure 10 allows administrative to assign positions to beacons. This is crucial and can only be performed in this screen. Here an admin can manage locations and create, update & delete pre-existing location data if incorrect. Positions associated with a particular location can be deleted here. Deletion confirmation is inbuilt
  • 10. TELKOMNIKA ISSN: 1693-6930  Stream a Framework for Detecting Movement Indoors (Kevin Curran) 399 Figure 10. Manage locations page 3.3.3. Manage Beacons Managing beacons is one of the key features of the web portal and the manage beacon page allows admins to do this. Beacons can be created, modified and deleted from this page as shown in Figure 11. During creation or modification, beacons can be optionally assigned to a location via a dropdown which is populated with locations saved through the manage locations page. If a beacon is assigned a location, then a position name must be entered. Figure 11. Manage beacons page 3.3.4. View Position Histories The view position histories page can be used by admins to view position histories for all users within the system as shown in Figure 12. The admin can also elect to auto refresh this page meaning table data will automatically update every few seconds, displaying any new position histories which may have been saved.
  • 11.  ISSN: 1693-6930 TELKOMNIKA Vol 16, No 1: February 2018 : 390 – 401 400 This pages includes search functionality (also offered on all other management pages), which allows the information displayed to be searched allowing an admin user to filter these results by a username, date, location or position. Figure 12. View position histories page 3.3.5. View Charts Admin users through the View charts feature can look at various statistics such as the most popular locations (this is capured through total linger time), the most frequently visited positions, average linger time & the last known location visited. Session & Linger time are calculated from the amount of continuous time each user spends at a position. This is referred to as a position history session. The view charts fearture contains an auto refresh functionality which can be disabled if required. The chart data automatically refreshes every 5 seconds. Hovering over a chart will display additional details. Also, a user can select locations which updates other charts with data explicitly for the chosen location. 4. Conclusion An overview of an extensible indoor location determination framework which uses Bluetooth beacons for active positioning which can determine location of individuals is presented here. It also uses device free passive localisation techniques for determination of activities performed in each location. The Bluetooth active localisation hardware can easily be substituted with another active technology such as WiFi or Zigbee. The framework allows a seamless updating of locations, beacons & activities. The Java web application supports interaction with the system by a range of different types of clients. It offers content in a RESTful way via JSP pages which are compiled into HTML with Ajax used as the primary means of transferring data. Data transfer is based on JSON data interchange format to permit reuse of functionality by the mobile application.Future plans include the integration of Channel State Information (CSI) in order to more accurately classify activities using device free passive localisation. Acknowledgements This work was funded by the Royal Academy of Engineering under their Royal Academy of Engineering Senior Research Fellowship scheme. References [1] Vance P, Prasad G, Harkin J, Curran K. Analysis of Device-free Localisation (DFL) Techniques for Indoor Environments. ISSC 2010 - The 21st Irish Signals and Systems Conference, University College Cork, 23rd - 24th June
  • 12. TELKOMNIKA ISSN: 1693-6930  Stream a Framework for Detecting Movement Indoors (Kevin Curran) 401 [2] Vance P, Prasad G, Harkin J, Curran K. A wireless approach to Device-Free Localisation (DFL) for indoor environments. Assisted Living 2011 - IET Assisted Living Conference 2011, IET London: Savoy Place, UK, 6 April 2011. [3] Furey E, Curran K, Lunney T, Woods D, Santos K. Location Awareness Trials at the University of Ulster, Networkshop bThe JANET UK International Workshop on Networking, The University of Strathclyde, 8th-10th April 2008. [4] Bekris K, Rudys A, Marceau G, Kavraki L, Wallach D. Robotics based location sensing using wireless Ethernet. The Eighth ACM Int. Conf. MOBICOM2002, pp. 227-238, Atlanta, GA, USA, Sept. 2002. [5] Deak G, Curran K, Condell J. Evaluation of Smoothing Algorithms for a RSSI-based Device-free Passive Localisation. Advances in Intelligent and Soft Computing. Springer-Verlag 2010: 59-66 ISBN: 978-3-642-162947, DOI 10.1007/978-3-642-162-16295-4 [6] Furey E, Curran K, Mc Kevitt P. A Bayesian filter approach to modelling Human Movement Patterns for First Responders within Indoor Locations. CIDM 2011 – 2nd Workshop on Computational Intelligence for Disaster Management, Fukuoka, Japan, Nov 30 [7] Nafarieh A, How J. A Testbed for Localizing Wireless LAN Devices Using Received Signal Strength, Communication Networks and Services Research Conference, 2008. CNSR 2008. 6th Annual. 5-8 May 2008: 481-487. [8] Bardwell J. Certified Wireless Network Administrator Official Study Guide. McGraw Hill, 2005. [9] Bardwell J. Converting Signal Strength Percentage to dBm Value, WildPackets Inc., 20021217-M- WP007, Nov 2002. [10] Furey E, Curran K, Mc Kevitt P. Incorporating Past Human Movement into Indoor Location Positioning Systems for Accurate Updates. IT&T 2010 – 10th Conference on Information Technology and Telecommunications, Letterkenny Institute of Technology, Ireland, 21st - 22nd Oct 2010 [11] Furey E, Curran K, Mc Kevitt P. HABITS: A History Aware Based Wi-Fi Indoor Tracking System. PGNET The 9th Annual Symposium: Convergence of Telecommunications Networking and Broadcasting 2008, Liverpool, John Moores, UK, 23rd-24th June 2008 [12] Deak G, Curran K, Condell J, Bessis N. Asimakopoulou E. IoT (Internet of Things) and DfPL (Device- free Passive Localisation) in a disaster management scenario. Simulation Modelling Practice and Theory. 2013; 34(3): 86-96. [13] Furey E, Curran K, Mc Kevitt P. A Bayesian Filter Approach to Indoor Tracking and Location. AICS 2011 - The 22nd Irish Conference on Artificial Intelligence and Cognitive Science, University of Ulster, Magee Campus, N. Ireland, 31 August - 2 September 2011 [14] Carlin S. Curran, K. An Active Low Cost Mesh Networking Indoor Tracking System. International Journal of Ambient Computing and Intelligence. January-March 2014; 6(1): 45-79. [15] Curran K, Furey E, Lunney T, Santos J, Woods D, Mc Caughey A. An Evaluation of Indoor Location Determination Technologies. Journal of Location Based Services. June 2011; 5(2): 61-78. ISSN: 1748-9725. [16] Feng W, Curran K. Enhanced WiFi Location Sensing with Activity Data, Intel Conference 2009-Intel European Research and Innovation Conference 2009, Intel Ireland Campus, Leixlip, Co Kildare, 8- 10th September 2009. [17] Furey E, Curran K, Mc Kevitt P. Learning Indoor Movement Habits for Predictive Control. International Journal of Space-Based and Situated Computing. July-August 2011; 1(2). ISSN: 2044- 4894, InderScience Publishing. [18] Knox J, Condell J, Curran K. An Ultra Wideband Location Positioning System. TAROS 2009 - The 10th International Towards Autonomous Robotic Systems (TAROS) Conference, University of Ulster, Derry, August 31st - September 2nd, 2009. [19] Mansell G, Curran K. Location Aware Tracking with Beacons. IPIN 2016 - The 7th International Conference on Indoor Positioning and Indoor Navigation, Madrid, Spain, 4-7 October 2016 [20] Curran K, Furey E. Pinpointing Users with Location Estimation Techniques and Wi-Fi Hotspot Technology. International Journal of Network Management. John Wiley & Sons, Ltd, 2007; 16(5). [21] Curran K, Norrby S. RFID-Enabled Location Determination within Indoor Environments. International Journal of Ambient Computing and Intelligence, IGI Publishing, 2009; 1(4). [22] Deak G, Curran K, Condell J, Deak D. Detection of Multi-Occupancy using Device-free Passive Localisation (DfPL). IET Wireless Sensor Systems. June 2014; 4(2): 1-8. [23] Furey E, Curran K, Mc Kevitt P. Predictive Indoor Tracking by the Probabilistic Modelling of Human Movement Habits. IERIC 2010- Intel European Research and Innovation Conference 2010, Intel Ireland Campus, Leixlip, Co Kildare, 12-14th October 2010. [24] Furey E, Curran K, Mc Kevitt P. HABITS: A Bayesian Filter Approach to Indoor Tracking and Location, International Journal of Bio-Inspired Computation (IJBIC). 2012; 4(1. [25] Furey E, Curran K, Mc Kevitt P. Probabilistic Indoor Human Movement Modeling to Aid First Responders. Journal of Ambient Intelligence and Humanized Computing. Ambient Intelligence Humanized Computing. 3(2). 07 April 2012. DOI:10.1007/s12652-012-0112-4