 Research
 Open access
 Published:
Features extraction and analysis for devicefree human activity recognition based on channel statement information in b5G wireless communications
EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 36 (2020)
Abstract
Features extraction and analysis for human activity recognition (HAR) have been studied for decades in the 5th generation (5G) and beyond the 5th generation (B5G) era. Nowadays, with the extensive use of unmanned aerial vehicles (UAVs) in the civil field, integrating wireless signal receivers on UAVs could be a better choice to receive hearable signals more conveniently. In recent years, the HAR system based on CSI based on WiFi radar has received widespread attention due to its low cost and privacy protection property. However, in the existing CSIbased HAR system, there are two disadvantages: (1) The detection threshold is manually set, which limits its adaptability and immediacy in different wireless environments. (2) A sole classifier is used to complete the recognition, resulting in poor robustness and relatively low recognition accuracy. In this paper, we propose a CSIbased devicefree HAR (CDHAR) system with WiFisensing radar integrated on UAVs to recognize everyday human activities. Firstly, by using machine learning, CDHAR applies kernel density estimation (KDE) to obtain adaptive detection thresholds to complete the extraction of activity duration. Second, we proposed a random subspace classifier ensemble method for classification, which applies the frequency domain feature instead of the time domain feature, and we choose each kind of feature in the same amount. Finally, we prototype CDHAR on commercial WiFi devices and evaluate its performance in both indoor environment and outdoor environments. The experiment results tell that even if experimental scenario varies, the accuracy of activity durations extraction can reach 98% and 99.60% whether in outdoor or indoor environments. According to the extracted data, the recognition accuracy in outdoor and indoor environments can reach 91.2% and 90.2%, respectively. CDHAR ensures high recognition accuracy while improving the adaptability and instantaneity.
1 Introduction
Human activity recognition (HAR) is the vital technology nowadays, and it enables to use for realizing applications such as intelligent sensory games, smart homes, and human body posture monitoring and some other individual applications [1–7]. Channel statement information (CSI) is a kind of finegrained physical layer information with high resolution [8–10]. Therefore, CSIbased HAR is popular with researchers and has been extensively studied [11–16].
Traditional HAR systems distinguish the difference of CSI between action phase (the case that someone is interfering with the link) and stationary phase (the case that no one is interfering with the link) [10, 17–19] and artificially set the threshold to detect the start and the end of the activity. However, when the environment varies the threshold needs to be reset or new activities need to be identified, which limits the adaptability and instantaneity of this system. Because the HAR system is sensitive to unexpected errors, using this unique method will result in incorrect or incomplete activity duration extraction. In addition, the existing HAR system ignores the frequency domain feature, which is the key parameter of recognition. Moreover, the previous HAR systems mainly use a limited sole classifier with poor robustness and low recognition rate, such as knearest neighbor (KNN) classification algorithm [20–22] and support vector machine (SVM) [23]. When identifying similar activities, the recognition accuracy of this sole classifier is not satisfactory. Because ensemble learning is a way to train and combine multiple classifiers [24–27], a recent work cited an integrated method in BaggingSVM to identify cite R11. However, BaggingSVM is replacing samples, so some samples may appear multiple times in the same training set, while others may be ignored, which will reduce the recognition accuracy.
In this paper, we propose a CSIbased devicefree HAR (CDHAR) system that integrates WiFisensing radar on a UAV for HAR to overcome the shortcomings of existing HAR systems. First of all, CDHAR estimates the probability density distribution of the CSI of each subcarrier in the action phase and the rest phase according to the fluctuation of the signal, so as to obtain the adaptive detection threshold, and then, use this threshold to complete the extraction of the activity duration. In order to make full use of the frequency domain features, the discrete wavelet transform (DWT) is used to extract the timefrequency component features of each activity [28–31]. In addition, a sampling criterion is proposed to choose subsets of components from the input feature matrix by CDHAR. Finally, SVM is conducted on the subsets in order to generate a set of classifiers and giving each of them a weight by the weight assignment method, and the classification results are combined according to the obtained weight vector to get the final recognition result.
We show the framework of CDHAR in Fig. 1. CDHAR is composed of two parts: offline phase and online phase. In the offline phase, it extracts activity durations by using the proposed detection algorithm. Then, a random subspace set classification method based on support vector machine is designed. In the online phase, it uses the same method as the classifier trained in the offline phase to extract features and classify activities.
Different from the previous systems which struggle to set the detection threshold manually and utilizes a simple classifier with time domain feature to reach HAR, CDHAR obtains the adaptive threshold for the extraction of activity durations and complete recognition by the proposed ensemble method. The main contributions of this paper are summarized as follows.
The rest of the paper is organized as follows. Section 2 introduces the process of the proposed adaptive detection threshold and the detail steps of the proposed random subspace ensemble method. The extensive experiments and evaluation are shown in Section 3. Finally, we conclude the paper in Section 4.
2 Methods
2.1 Extraction of activity durations based on adaptive detection threshold
The link between Commercial WiFi devices are used in our system to detect human activities and it is shown in Fig. 2. It is considered that the case that the transmitter is sending WiFi frames to the receiver continuously. When an action emerges, the signal reflected by the human body will influence the signals traveled through the lineofsight (LoS) path as shown in Fig. 2. receivers can measure small signal changes caused by human movements and apply these changes to recognize human activities by monitoring the wireless channel state.
In this paper, we proposed a new algorithm to obtain the adaptive detection threshold in order to extract activity durations when the environment varies or other activities are added. The algorithm is adaptive and instantaneous in different wireless environments. The experimental results show that the extraction of CDHAR activity duration is accurate and it can meet the requirement of HAR.
In this paper, a random subspace classifier ensemble method is proposed, in which frequency domain features are used instead of time domain features, and each feature is selected with the same amount. Due to the use of CDHAR, the recognition accuracy of CDHAR is higher than that of the existing HAR system.
In order to extract the activity durations in online phase, adaptive detection threshold is estimated by CDHAR in the offline phase. Let H(f_{j},t) denote the amplitude of CSI, f_{j} and t represent the frequency at the jth subcarrier and the time moment, respectively. To analyze the fluctuation feature of the received signal, we calculate the mean and the variance of H(f_{j},t) at moment t in a sliding window with length l.
where m_{j,t} and v_{j,t} represent the mean and variance of H(f_{j},t) in a sliding window, respectively. CDHAR employs v_{j,t} as the feature of the signal fluctuation.
Since kernel density estimation (KDE) [32–34] constructs the distribution model of the data according to the data itself instead of depending on the assumption of the distribution in advance, CDHAR statistically estimates the v_{j,t} extracted above and establishes the distribution model by KDE.
where K(·) represents the kernel function, h_{j} and n denote the length and the number of sliding window, respectively. The type of K(·) does not affect the estimation result and CDHAR chooses Gaussian as the kernel function for the universality of Gaussian function. Then, CDHAR calculates the optimal bandwidth by Eq. (4) whose robustness and practicality have been tested [35].
where \({\hat \sigma _{j}}\) denotes the variance of v_{j,t}. Let \({\hat g_{0,j}}(x)\) and \({\hat g_{1,j}}(x)\) represent the probability density function (PDF) of v_{j,t} in the stationary phase and in the action phase, respectively. Thus, we can obtain \({\hat g_{0,j}}(x)\) and \({\hat g_{1,j}}(x)\) by Eqs. (3) and (4). The false alarm probability P_{e0,j} and the missed alarm probability P_{e1,j} are carried out by Eqs. (5) and (6), respectively.
The total error detection probability of the jth subcarrier is P_{e,j}=P_{e0,j}+P_{e1,j}, and it is minimized by Eq. (7)
This is a problem of finding the minimum value that can be solved by conducting derivation.
The detection threshold is set according to \(j' = \mathop {\arg \min }\limits _{j} {P_{e,j}}\phantom {\dot {i}\!}\) and \(\phantom {\dot {i}\!}{\rho _{\text {opt}}} = {\rho _{j',\text {opt}}}\), where j^{′} and ρ_{opt} represent the index of the j^{′}th subcarrier and the adaptive detection threshold which is obtained by the j^{′}th subcarrier, respectively. These steps are done in the offline phase. During the online phase with an action, t_{0} and t_{1} are recorded as the beginning and the ending of the activity in the case that v_{j,t} is larger and lower than ρ_{opt} during a fixed period, respectively. The activity durations extracted from 30 subcarrier form a matrix H with 30 rows and T columns, where T represents the durations of one activity.
2.2 Random subspace classifier ensemble
CDHAR proposed a random subspace classifier integration method for classification. First of all, it divides the feature space into subspaces through the proposed selection method, which takes into account the balance of each feature. Then, the SVM is used to classify the subspace to generate a classifier. Then, CDHAR assigns weights to each classifier through the proposed weight allocation method. Finally, the recognition result is obtained through the weighted sum of the results of each classifier.
In order to extract important information from H and reduce the time cost at the same time, the principal component analysis (PCA) is used. It is considered that the correlation between each subcarrier has high correlation and the first principal component contains a large number of sudden noise as a result of the instability of the device. The second to fourth principal components are chosen in this paper and the number of principle components k=3. The matrix H_{r} with k rows and T columns is obtained after the PCA of H. Since the change rate of CSI amplitude can reflect the speed of the activity[11], different activities can be distinguished by the variation trend of CSI amplitude. Since DWT is a tool for numerical and timefrequency analysis, CDHAR utilizes it to extract the feature in frequency domain. H_{d} with k×(q+1) rows and T columns is obtained after the qlayer DWT of H_{r}.
Due to the length of data in each row of H_{d} is long, the realtime performance of the system cannot be satisfied. CDHAR extracts the statistical information of H_{d} to reduce the length of features. The statistical features selected in this paper are mean, standard deviation, interquartile range, the 50th percentile, the 68.3th percentile, and the 95th percentile. For each row in H_{d}, 6 kinds of statistical features can be obtained, which means each activity is featured by a vector with size 6×k×(q+1). Suppose there are N activities in the database and they can form a matrix H_{e} with N rows and 6×k×(q+1) columns. Each row represents features of one activity and each column represents the same statistical feature of different activity. H_{e} is standardized by
where S_{j}=mean(H_{e}(·,j)) and S_{j}=std(H_{e}(·,j)). It should be noted that mean(·) denotes the mean of (·), and std(·) represent the standard deviation of (·). Thus, H_{f} is a matrix with N rows and 6×k×(q+1) columns. It is noted that features are standardized both in online and offline phase.
From above, we know that the feature matrix H_{f} is 6×k×(q+1) dimensions and the space composed by all matrix elements is termed full space, which is denoted as V, while the space composed by part of matrix elements is termed subspace. CDHAR selects x subsets from V with the thought of bagging to construct the subspaces. The proposed selecting method ensures the final results do not bias any one of the principal components, frequency components or statistics. x is set to be x=lcm(6,k,q+1), where lcm(·) denotes the lowest common multiple of (·). The subsets selection approach of subsets is conducted by following steps:
Step 1: Divide V into k×(q+1) groups, each of them is made up by 6 kinds of statistical features of one frequency component in a principal component.
Step 2: Initialize the candidate set U=[1,2,...,x], the subset S=∅, and the index of the ith statistical feature i=1.
Step 3: Initialize the set S_{i}^{′}=∅ and the times of sampling time=0.
Step 4: Randomly extract a number z from U and conduct z^{′}= mod (z,k×(q+1)). If z^{′}∉S_{i}^{′}, add the ith statistical feature of group z^{′} to S and z^{′} to S_{i}^{′}, remove z from U,time=time+1; otherwise, repeat step 4.
Step 5: If \(time = \frac {x}{6}\), i=i+1; otherwise, go back to step 4.
Step 6: If i≤6, go back to step 3.
Step 7: If i>6, end.
It should be noted that z^{′} is the column index of V. In other words, S stores a series index of column which are elected from V. The subsets {S_{1},S_{2},⋯,S_{c}} that construct the feature subspaces can be obtained, and SVM is conducted to generate the classifiers {model_{1},model_{2},⋯,model_{c}}, where c represents repeat times. Because classifiers that contain certain functions have better performance, these classifiers should be given more weight. Then, the final result can be obtained through the weighted sum of the results of each classifier. The idea of crossverification is used to obtain the weight vector. The pseudo code for the proposed weight allocation method is shown below.
The weight vector w is calculated in the offline phase. In the online phase, when there has new data, the feature is extracted by {S_{1},S_{2},⋯,S_{c}}; thus, we can obtain c groups of the feature. Then, CDHAR gets the set of results {b_{1},b_{2},⋯b_{c}} by classifying each group in corresponding classifier, and the recognition results are combined by Eqs. (6) and (7).
where i denotes the activity index of the ith activity in {b_{1},b_{2},⋯b_{c}}, J(i) represents the weighted sum of classifier whose recognition result is i, and opt indicates the activity index of final recognition result.
3 Results and discussion
In order to verify the effectiveness of proposed system, we test activities in two environments and experimental scenarios are demonstrated in Fig. 3. Figure 3a and b respectively demonstrate the indoor and outdoor environment. The later one with size 57.6 m × 51.0 m is a typical outdoor environment which has seldom obstacles and multipath components. The transmitter is 10m far from the receiver. The other one with size 13.3 m × 7.8 m is a typical indoor environment which has more furniture and the receiver is 7.6 m far from the transmitter.
We use the MSB083 mini host equipped with an Intel 5300 network card. Both the transmitter and receiver use a single antenna, as demonstrated in Fig. 4a. During the experiments, we tested 5 common activities shown in Fig. 4 to verify the effectiveness of the proposed system. Offline activity databases have been built in the two scenarios. The structure of the database is the same in indoor and outdoor environments. For outdoor environment, the database includes the above 5 activities, each of which is repeated 30 groups (30 times). To obtain the detection threshold, we collected data for 10 min without taking any action. Volunteers are invited to perform these 5 activities indoors and outdoors, and each activity will collect 100 groups.
In order to analyze the effect of length of the sliding window on the effect of signal fluctuation feature extraction, we do “Run” 4 times through the link back and forth, and the results are demonstrated in Fig. 5. We can see from Fig. 5a that when someone approaches the link, the CSI amplitude will fluctuate significantly within the duration of 2 to 2.5 s, 4.2 to 5.8 s, 6.4 to 8 s, and 9.9 to 10.2 s as the result of the impact of multipath. In particular, when the target is in the middle of the link at the moments of 2.5 s, 5 s, 7.5 s, and 10.2 s, the CSI amplitude decreases. From Fig. 5b and c we can find in the case of l is relatively small, when the target is still running in the link, the variance of CSI amplitude in the sliding window is reduced to low, which will cause the detection to end earlier and the extracted data to be incomplete. Due to the variance at time t is calculated from the data in the following l moments, which may cause the detection to start earlier when l is relatively large, as demonstrated in Fig. 5f. When l is too long the realtime of the system will be affected. On the contrary, when the l is too short, we cannot extract the fluctuation of CSI amplitude completely. As a result, CDHAR takes l=200 in this paper.
We observe a significant difference in the distribution of CSI amplitude variance between the action phase and the stationary phase as demonstrated in Fig. 6. A red solid dot marks the intersection of blue and orange line, and the adaptive detection threshold is represented by the abscissa value of it. From the ordinate range in Fig. 6a and b, it can find that the value of the variance of CSI amplitude in outdoor environment is smaller than that in indoor as a result of the mutipath. It also can know from it that as the existence of mutipath the threshold in indoor environment is higher than that in outdoor.
In this paper, we apply three evaluation indexes to analyze the performance of the proposed detection algorithm, namely falsepositive rate (FPR), falsepositive rate (FNR), and F1measure. Due to FPR and FNR are indicators of the error ratio, the lower the values of FNR and FPR, the better the system performance. F1measure is a comprehensive evaluation index used to evaluate the performance of the detection algorithm and it represents the average of the precision and the recall [36, 37]. Therefore, the F1measure is higher and the system performance is better. We can find from Fig. 7 that in both outdoor and indoor scenarios, the FPR and the FNR are lower than 10% as well as the F1measure which can reach more than 90% and the proposed detection algorithm meets the requirements of activity extraction. Compared to outdoor environment, the indoor FPR is higher and the FNR is lower, as a result of the indoor multipath environment.
We design a succession of experiments to proof the relationship between the CSI amplitude and target’s moving speed. Volunteers push a smooth plate respectively across the link at a slow and fast speed. They collect 5 groups of data in each case and extract the amplitude of CSI. At the same time, the instantaneous phase of CSI can be obtained through Hilbert transformation. From Fig. 8a, the phase of CSI does not vary when the plate is stationary, while the phase quickly changes when the plate is moving. Comparing Fig. 8a from Fig. 8b, we can find when the plate moves faster, the phase changes quicker. Due to the phase is calculated by the CSI amplitude, it can verify the CSI amplitude reflects the target speed to some extent.
We use the Matlab Discrete Wavelet Transform (DWT) Toolbox to analyze the DWT performance after principal component analysis (PCA). Note that we have extended the duration of the extracted activity to include stationary piece for further analysis. The timefrequency component diagram is demonstrated in Fig. 9. Each layer represents a frequency range, the frequency increases in an orderly manner from the first layer to the ninth layer, and brightness indicates feature amount in frequency components. The darker it is in Fig. 9, the more features there are in this frequency components. It is shown in Fig. 9a that the frequency components of “walk” are no more than seventh layer. It is shown in both Fig. 9a and b that the frequency components of “Run” with eight layers is no more layer than that of “Walk”. It is shown in both Fig. 9c and d that features of “Squat” and “Sit down” are mostly concentrated in the lower layers. It is shown in Fig. 9e and b that similar to ’Run’, there are more highfrequency components of “Fall down” due to the sudden increase of the speed in the moment of the falling. The difference between “Squat” and “Sit down” is mostly reflected by the fourth and fifth layers and the difference between “Run” and “Fall down” mostly exist in the intermediate frequency section. The difference between “Squat” and “Sit down” is mainly reflected by the fourth and fifth layers and the differences between “Run” and “Fall down” mostly exist in the intermediate frequency section. It can also be demonstrated from Fig. 9 that the timefrequency components are concentrated in the first layer in the stationary phase. In addition, the highfrequency components increased obviously in the action phase. The above results demonstrate that each activity can be well characterized by the timefrequency component.
The offline activity database is trained in both indoor and outdoor environment. Figure 10 shows the confusion matrix of the recognition results. It can be found from Fig. 10 that the recognition accuracy of the outdoor achieves more than 90%, and the misjudgment rate of the indoor significantly increases. As the result of the influence of multipath, the fluctuation of the signal is more random, which may cause the extracted features to deviate from a certain frequency component, thereby affecting the recognition result.
Most existing HAR systems apply unique classifiers (such as KNN, SVM, and BaggingSVM) to accomplish HAR. By using the same data, the proposed algorithm is compared with these common recognition algorithms to analyze the recognition performance of CDHAR. As can be seen from Fig. 11, the algorithm has good performance whether in an outdoor or indoor environment. In addition, the recognition accuracy can reach 90%. The performance of KNN is dependent on the selection of neighboring points K, and it has insufficient robustness. What is more, the recognition rate will be further reduced if the feature sizes of various samples is uneven. Due to the use of signals, SVM is not stable and in the multipath in indoor environment, the misjudgement rate increases significantly. Because of the limitation of samples and sampling methods on BaggingSVM, the training samples are uneven and lead to the insufficient training of a certain type of activity. From the results of our experiments, CDHAR has good detection performance and can ensure the requirements for activity extraction. Moreover, the recognition rate of proposed algorithm perform slightly well than intensely used conventional recognition method for existing HAR system.
4 Conclusions
In this paper, an adaptive detection method is first proposed for extracting activity durations. It is adaptive and instantaneous in an indoor and outdoor wireless environment and works in various environments or adding other activities. Secondly, a recognition method based on frequency domain features is proposed to design a subspace selection scheme and a weight assignment scheme, which can overcome the poor robustness of existing sole classifier. From our experimental result, even in the various experimental site, the extraction accuracy rate of CDHAR can reach 99.80% in outdoor environment and 99.60% in indoor environment, respectively. Besides, the rate of recognition accuracy can achieve 91.2% in outdoor environment and 90.2% in indoor environment, respectively.
Availability of data and materials
Not applicable
Abbreviations
 CDHAR:

CSIbased devicefree HAR
 CSI:

Channel state information
 DWT:

Discrete wavelet transform
 HAR:

Human activity recognition
 KDE:

Kernel density estimation
 KNN:

Knearest neighbor
 LoS:

Lineofsight
 PDF:

Probability density function
 PCA:

Principal component analysis
 SVM:

Support vector machine
References
N. Twomey, T. Diethe, I. Craddock, et al., Unsupervised learning of sensor topologies for improving activity recognition in smart environments. Neurocomputing. 234:, 93–106 (2017).
G. M. Jeong, P. H. Truong, S. I. Choi, Classification of three types of walking activities regarding stairs using plantar pressure sensors. IEEE Sensors J.17(9), 2638–2639 (2017).
B. Boufama, P. Habashi, I. S. Ahmad, in International Conference on Advanced Technologies for Signal and Image Processing. Trajectorybased human activity recognition from videos (Fez, 2017), pp. 1–5.
J. Wang, Z. Huang, W. Zhang, et al., in IEEE International Conference on Big Data. Wearable sensor based human posture recognition (Washington, 2016), pp. 3432–3438.
J. Yang, H. Zou, H. Jiang, et al., Devicefree occupant activity sensing using WiFienabled IoT devices for smart homes. IEEE Internet Things J.5(5), 3991–4002 (2018).
X. Cao, B. Chen, Y. Zhao, in IEEE Trustcom/BigDataSE/ISPA. Wiwri: finegrained writing recognition using wifi signals (Tianjin, 2016), pp. 1366–1373.
H. Zou, Y. Zhou, J. Yang, et al., in IEEE International Conference on Communications. Deepsense: devicefree human activity recognition via autoencoder longterm recurrent convolutional network (Kansas City, 2018), pp. 1–6.
H. Zhu, F. Xiao, L. Sun, et al., Rttwd: robust devicefree throughthewall detection of moving human with WiFi. IEEE J. Sel. Areas Commun.35(5), 1090–1103 (2017).
H. Zhu, F. Xiao, L. Sun, et al., in International Performance Computing and Communications Conference. Rpmd: robust passive motion detection using PHY information with MIMO (Nanjing, 2015), pp. 1–8.
C. Li, H. J. Yang, F. Sun, et al., Multiuser overhearing for cooperative twoway multiantenna relays. IEEE Transactions Vehicular Technology. 65(5), 3796–3802 (2016).
G. J. Zheng, G.Y., W. Company, Study on human activity recognition based on WLAN signals. Inst. Electr. Electron. Eng. Inc. 3(5), 796–805 (2016).
K. Zhao, W. Xi, Z. Jiang, et al., in International Conference on Mobile AdHoc and Sensor Networks. Leveraging topic model for CSI based human activity recognition (Hefei, 2016), pp. 23–30.
X. Wu, Z. Chu, P. Yang, et al., Twsee: human activity recognition through the wall with commodity WiFi devices. IEEE Trans. Veh. Technol.68(1), 306–319 (2019).
C. Li, S. Zhang, P. Liu, et al., Overhearing protocol design exploiting intercell interference in cooperative green networks. IEEE Trans. Veh. Technol.65(1), 441–446 (2016).
T. Z. Chowdhury, C. Leung, C. Y. Miao, in IEEE Global Conference on Signal and Information Processing. Wihacs: leveraging WiFi for human activity classification using OFDM subcarriers’ correlation (Montreal, 2017), pp. 338–342.
W. Wang, A. X. Liu, M. Shahzad, et al., Devicefree human activity recognition using commercial WiFi devices. IEEE J. Sel. Areas Commun.35(5), 1118–1131 (2017).
W. Wang, A. X. Liu, M. Shahzad, et al., in International Conference on Mobile Computing and Networking.Understanding and modeling of WLAN signal based human activity recognition (Paris, 2015), pp. 65–76.
C. Li, P. Liu, C. Zou, et al., Spectralefficient cellular communications with coexistent one and twohop transmissions. IEEE Trans. Veh. Technol.65(8), 6765–6772 (2016).
C. Li, F. Sun, J. M. Cioffi, et al., Energy efficient MIMO relay transmissions via joint power allocations. IEEE Trans. Circ. Syst.61(7), 531–535 (2014).
M. Zhou, Y. Wang, Y. Liu, Z. Tian, An informationtheoretic view of WLAN localization error bound in GPSdenied environment. IEEE Trans. Veh. Technol.68(4), 4089–4093 (2019).
M. Zhou, Y. Wang, Z. Tian, et al., Calibrated data simplification for energyefficient location sensing in internet of things. IEEE Internet Things J.6(4), 6125–6133 (2019).
C. Li, H. J. Yang, F. Sun, et al., Adaptive overhearing in twoway multiantenna relay channels. IEEE Sig. Process. Lett.23(1), 117–120 (2016).
X. Qi, G. Zhou, Y. Li, et al., in IEEE RealTime Systems Symposium. Radiosense: exploiting wireless communication patterns for body sensor network activity recognition (San Juan, 2012), pp. 95–104.
H. Liu, S. Chen, in International Symposium on Computational Intelligence and Design. Multilevel fusion of classifiers through fuzzy ensemble learning (Hangzhou, 2018), pp. 19–22.
G. I. Webb, Z. Zheng, Multistrategy ensemble learning: reducing error by combining ensemble learning techniques. IEEE Trans. Knowl. Data Eng.16(8), 980–991 (2004).
M. Zhou, Y. Tang, Z. Tian, et al., Robust neighborhood graphing for semisupervised indoor localization with lightloaded location fingerprinting. IEEE Internet Things J.5(5), 3378–3387 (2018).
L. Su, H. Liao, Z. Yu, Q. Zhao, in IEEE International Conference on Intelligent Computing and Intelligent Systems. Ensemble learning for question classification (Shanghai, 2009), pp. 501–505.
W. Zhao, R. M. Rao, in IEEE International Conference on Acoustics, Speech, and Signal Processing. A discretetime wavelet transform based on a continuous dilation framework (Phoenix, 1999), pp. 1201–1204.
W. Zhao, R. M. Rao, in International Symposium on TimeFrequency and TimeScale Analysis. Discretetime continuousdilation wavelet transforms (Pittsburgh, 1998), pp. 233–236.
W. Zhao, R. M. Rao, in IEEE International Conference on Acoustics, Speech and Signal Processing. Continuousdilation discretetime selfsimilar signals and linear scaleinvariant systems (Seattle, 1998), pp. 1549–1552.
M. Wang, H.J., Y. Li, in International Conference on Computer Application and System Modeling. Face recognition based on DWT/DCT and SVM (Taiyuan, 2010), pp. 3–5073510.
A. Elgammal, R. Duraiswami, D. Harwood, et al., Background and foreground modeling using nonparametric kernel density estimation for visual surveillance. Proc. IEEE. 90(7), 1151–1163 (2002).
X. Yin, Z. Hao, in International Conference on Machine Learning and Cybernetics. Adaptive kernel density estimation using beta kernel (Hong Kong, 2007), pp. 3293–3297.
Z. Jin, X. Ma, in Chinese Control and Decision Conference. Model selection for support vector machines based on kernel density estimation (Xuzhou, 2010), pp. 1161–1165.
L. Liu, C. Yuen, Y. L. Guan, et al., Convergence analysis and assurance for gaussian message passing iterative detector in massive MUMIMO systems. IEEE Trans. Wirel. Commun.15(9), 6487–6501 (2016).
L. Liu, Y. Li, Y. Su, et al., Quantizeandforward strategy for interleave division multipleaccess relay channel. IEEE Trans. Veh. Technol.65(3), 1808–1814 (2016).
X. Liu, M. Jia, Z. Na, et al., Multimodal cooperative spectrum sensing based on DempsterShafer fusion in 5Gbased cognitive radio. IEEE Access, 199–208 (2018).
Acknowledgements
The authors are thankful to the chief editor and anonymous reviewers for their valuable comments in reviewing this paper.
Funding
This work was supported by the Scientific and Technological Research Foundation of Chongqing Municipal Education Commission (grant number KJQN201800625), The National Natural Science Foundation of China (grant number 61771083, 61704015), the Program for Changjiang Scholars and Innovative Research Team in University (grant number IRT1299), and the Natural Science Foundation of Chongqing (grant number cstc2019jcyjmsxmX0635).
Author information
Authors and Affiliations
Contributions
The authors have contributed jointly to all parts on the preparation of this manuscript, and all authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Yuan, H., Yang, X., He, A. et al. Features extraction and analysis for devicefree human activity recognition based on channel statement information in b5G wireless communications. J Wireless Com Network 2020, 36 (2020). https://doi.org/10.1186/s1363802016543
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363802016543