Imaging With WiFi
نویسندگان
چکیده
منابع مشابه
Sensorless Sensing with WiFi
Can WiFi signals be used for sensing purpose? The growing PHY layer capabilities of WiFi has made it possible to reuse WiFi signals for both communication and sensing. Sensing via WiFi would enable remote sensing without wearable sensors, simultaneous perception and data transmission without extra communication infrastructure, and contactless sensing in privacy-preserving mode. Due to the popul...
متن کاملTracking Synchronous Gestures with WiFi
Tracking synchronous gestures benefits various applications in team sport training, group interactive gaming, and computer-supported cooperative working. We present WiSync, a ubiquitous synchronous gesture tracking scheme on a single WiFi link. It reuses the pervasive WiFi networks, imposes no wearable sensors on users and operates in Non-Line-Of-Sight (NLOS) propagation. The idea is that with ...
متن کاملVisualizing Wifi using the Wifi Camera
These images were created using a " Wifi Camera " custom designed by Somlai-Fischer, Sjölén and Haque (information available at ). It makes a use of a directional 2.4Ghz wifi antenna mounted on servos scanning an environment at varying resolutions, measuring signal strength of all present networks to generate an image of the wifi " view " of the space. A ...
متن کاملWiFi-NC : WiFi Over Narrow Channels
The quest for higher data rates in WiFi is leading to the development of standards that make use of wide channels (e.g., 40MHz in 802.11n and 80MHz in 802.11ac). In this paper, we argue against this trend of using wider channels, and instead advocate that radios should communicate over multiple narrow channels for efficient and fair spectrum utilization. We propose WiFi-NC, a novel PHY-MAC desi...
متن کاملSaving Energy on WiFi with Required IPsec
The move to a pervasive computing environment, with the increasing use of laptops, netbooks, smartphones and tablets, means that we are more reliant on wireless networking and batteries for our daily computational needs. Specifically, this includes applications which have sensitive data that must be securely communicated over VPNs. However, the use of VPNs and mobile, wireless computing creates...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2902315