HARaaS: HAR as a Service using WiFi signal in IoT-enabled edge computing: poster abstract

Jin Zhang, Bo Wei, Jun Cheng

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Human activity recognition (HAR) is an important component in context awareness IoT applications such smart home, smart building etc. With the proliferation of WiFi-integrated devices, researchers exploit WiFi signals to recognize various human activities. In this work, we introduce a HAR as a Service (HARaaS) model for activity recognition services applied in IoT areas. HARaaS proposes a novel edge computing model in the concept of the Sensing as a Service (S2aaS) architecture to offer accurate and real-time activities recognition services with good energy efficiency. HARaaS distributes the resource-hungry computing workload i.e. training recognition model to edge terminals, and exploits the built-in intelligence of IoT devices. A WiFi-based activity recognition service is designed following the HARaaS architecture, and the lightweight machine learning and deep learning model are incorporated in the service for accurate activity recognition. Experiments are conducted and demonstrate the service achieves an activity recognition accuracy of 95% with extremely low latency and high energy efficiency.
Original languageEnglish
Title of host publicationSenSys '20
Subtitle of host publicationProceedings of the 18th Conference on Embedded Networked Sensor Systems
Place of PublicationNew York
PublisherACM
Pages681-682
Number of pages2
ISBN (Print)9781450375900
DOIs
Publication statusPublished - 16 Nov 2020
EventACM SenSys 2020 - Online, Yokohama, Japan
Duration: 16 Nov 202019 Nov 2020
http://sensys.acm.org/2020/

Conference

ConferenceACM SenSys 2020
Country/TerritoryJapan
CityYokohama
Period16/11/2019/11/20
Internet address

Keywords

  • WiFi
  • CSI
  • human activity recognition
  • IoT
  • edge computing

Fingerprint

Dive into the research topics of 'HARaaS: HAR as a Service using WiFi signal in IoT-enabled edge computing: poster abstract'. Together they form a unique fingerprint.

Cite this