期刊文献+

一种基于RFID和HMM的设备智能控制模型

An Intelligent Device Controlling Model Based on RFID and HMM
下载PDF
导出
摘要 智能环境中的设备越来越多且越来越复杂,配置以及正确地使用这些设备变得更费时,也更容易出错。本文讨论了一种设备智能控制模型来辅助用户控制设备,该模型方法利用基于RFID的定位系统的传感器网络观测用户和设备状态数据,用户的活动通过任务模型分解和描述,待控制的环境设备状态作为用户子任务的效果。应用推理规则,任务模型被转化为HMM模型,当用户特定的动作序列被识别后,系统使用设备的状态动作关系表完成设备的后续操作序列。 The devices in smart environments become more and more complex. Thus the users spend more time on configuration and correct usage. An intelligent device controlling model is discussed in this paper. By making use of sensor network including RFID-hased location tracking system, the model can get the observation of user and device states. A task model is employed to decompose and describe user activities and the states of the device are annotated to sub-task as effect. The task mode is synthesized to a HMM by applying inference rules. When particular activities have been recognized, the sequences of device actions which are pre-defined in a state-action table will be executed by system.
出处 《电信科学》 北大核心 2012年第10期99-105,共7页 Telecommunications Science
关键词 RFID 隐马尔可夫模型 意图识别 智能控制 radio frequency identification, hidden Markov model, intention recognition, intelligent control
  • 相关文献

参考文献20

  • 1Giersich M, Forbrig P, Fuchs G, et al. Towards an integrated approach for task modeling and human behavior recognition. Proceedings of the 12th International Conference on Human- Computer Interaction: Interaction Design and Usability, Beijing, China, 2007:1109-1118.
  • 2Cook D J, Augusto J C, Jakkula V R. Ambient intelligence: technologies, applications, and opportunities. Pervasive and Mobile Computing, 2009, 5(4): 277-298.
  • 3Youngblood G M, Cook D J. Data mining for hierarchical model creation. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2007, 37(4): 561-572.
  • 4Wang S, Pentney W, Popeseu A M, et al. Common sense based joint training of human activity recognizers. Proceedings of the 20th International Joint Conference on Artificial Intelligence, Hyderabad, India, 2007.
  • 5Nguyen N T, Phung D Q, Venkatesh S, et al. Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA, 2005.
  • 6Mahajan D, Kwatra N, Jain S, et al. A framework for activity recognition and detection of unusual activities. Proceedings of the Fourth Indian Conference on Computer Vision, Kolkata, India, 2004.
  • 7Patterson D, Liao L, Gajos K, et al. Opportunity knocks: a system to provide cognitive assistance with transportation services. Proceedings of UbiComp 2004:Ubiquitous Computing, Nottingham, England, 2004:433-450.
  • 8Perkowitz M, Philipose M, Fishkin K, et al. Mining models of human activities from the web. Proceedings of the 13th International Conference on World Wide Web, Manhattan, NY, USA, 2004:573-582.
  • 9Burghardt C, Wurdel M, Bader S, et al. Synthesising generative probabilistie models for high-level activity recognition. Activity Recognition in Pervasive Intelligent Environment, 2011(4): 209- 236.
  • 10Dasgupta S, Littman M L, Mcallester D. PAC generalization bounds for co-training. Advances in neural information processing systems. Proceedings of NIPS, Vancouver, British Columbia, Canada, 2001:375-382.

二级参考文献42

  • 1余松森,詹宜巨,彭卫东,赵振宇.基于后退式索引的二进制树形搜索反碰撞算法及其实现[J].计算机工程与应用,2004,40(16):26-28. 被引量:69
  • 2余松森,詹宜巨,王志平,唐忠平.跳跃式动态树形反碰撞算法及其分析[J].计算机工程,2005,31(9):19-20. 被引量:52
  • 3FINKENZELLER K.射频识别技术(第3版)[M].吴晓峰.陈大才,译.北京:电子工业出版社.2006.
  • 4Lionel M N,Liu Yunhao.LANDMAC:Indoor lncation sensing using active RFID[C].IEEE International Conference in Pervasive Computing and Communications, 2003:407-415.
  • 5SHIH S T,HSIEH K,Chen Peiyuan. An improvement approach of indoor location sensing using active RFID[C] First International Conference on Innovative Computing. 2006 : 453-456.
  • 6SUNGJUN K,DOOHYUN K.Geographical location based RFID tracking system[C].World of Wireless, Mobile and Multimedia Networks, 2008.
  • 7Rfidinfo.中国RFID市场首次突破120亿规模.http://www.rfidinfo.com.cn/Info/n20110_1.html.
  • 8In-stat. Hotspot Usage to Reach 120 Billion Connects by 2015. http://www.instat.com.
  • 9Kodialam M, Nandagopal T. Fast and Reliable Estimation Schemes in RFID Systems. Bell Labs, Lucent Technologies Holmdel, NJ 07733, USA,2006.
  • 10Burdet L A. RFID Multiple Access Methods. Technical Report, ETH ZiJrich, 2004.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部