123 research outputs found
Indoor positioning of shoppers using a network of bluetooth low energy beacons
In this paper we present our work on the indoor positioning of users (shoppers), using a network of Bluetooth Low Energy (BLE) beacons deployed in a large wholesale shopping store. Our objective is to accurately determine which product sections a user is adjacent to while traversing the store, using RSSI readings from multiple beacons, measured asynchronously on a standard commercial mobile device. We further wish to leverage the store layout (which imposes natural constraints on the movement of users) and the physical configuration of the beacon network, to produce a robust and efficient solution. We start by describing our application context and hardware configuration, and proceed to introduce our node-graph model of user location. We then describe our experimental work which begins with an investigation of signal characteristics along and across aisles. We propose three methods of localization, using a βnearest-beaconβ approach as a base-line; exponentially averaged weighted range estimates; and a particle-filter method based on the RSSI attenuation model and Gaussian-noise. Our results demonstrate that the particle filter method significantly out-performs the others. Scalability also makes this method ideal for applications run on mobile devices with more limited computational capabilitie
Understanding collaborative workspaces:spatial affordances & time constraints
Abstract. This thesis presents a generic solution for indoor positioning and movement monitoring, positioning data collection and analysis with the aim of improving the interior design of collaborative workspaces. Since the nature of the work and the work attitude of employees varies in different workspaces, no general workspace layout can be applied to all situations. Tailoring workspaces according to the exact needs and requirements of the employees can improve collaboration and productivity.
Here, an indoor positioning system based on Bluetooth Low Energy technology was designed and implemented in a pilot area (an IT company), and the position of the employees was monitored during a two months period. The pilot area consisted of an open workplace with workstations for nine employees and two sets of coffee tables, four meeting rooms, two coffee rooms and a soundproof phone booth. Thirteen remixes (BLE signal receivers) provided full coverage over the pilot area, while light durable BLE beacons, which were carried by employees acted as BLE signal broadcasters. The RSSIs of the broadcasted signals from the beacons were recorded by each remix within the range of the signal and the gathered data was stored in a database.
The gathered RSSI data was normalized to decrease the effect of workspace obstacles on the signal strength. To predict the position of beacons based on the recorded RSSIs, a few approaches were tested, and the most accurate one was chosen, which provided an above 95% accuracy in predicting the position of each beacon every 3 minutes. This approach was a combination of fingerprinting with a Machine Learning-based Random Forest Classifier.
The obtained position results were then used to extract various information about the usage pattern of different workspace areas to accurately access the current layout and the needs of the employees
Analysis and evaluation of Wi-Fi indoor positioning systems using smartphones
This paper attempts to analyze the main algorithms used in Machine Learning applied to the indoor location. New technologies are facing new challenges. Satellite positioning has become a typical application of mobile phones, but stops working satisfactorily in enclosed spaces. Currently there is a problem in positioning which is unresolved. This circumstance motivates the research of new methods. After the introduction, the first chapter presents current methods of positioning and the problem of positioning indoors. This part of the work shows globally the current state of the art. It mentions a taxonomy that helps classify the different types of indoor positioning and a selection of current commercial solutions. The second chapter is more focused on the algorithms that will be analyzed. It explains how the most widely used of Machine Learning algorithms work. The aim of this section is to present mathematical algorithms theoretically. These algorithms were not designed for indoor location but can be used for countless solutions. In the third chapter, we learn gives tools work: Weka and Python. the results obtained after thousands of executions with different algorithms and parameters showing main problems of Machine Learning shown. In the fourth chapter the results are collected and the conclusions drawn are shown
Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces
Physical retailers, who once led the way in tracking with loyalty cards and
`reverse appends', now lag behind online competitors. Yet we might be seeing
these tables turn, as many increasingly deploy technologies ranging from simple
sensors to advanced emotion detection systems, even enabling them to tailor
prices and shopping experiences on a per-customer basis. Here, we examine these
in-store tracking technologies in the retail context, and evaluate them from
both technical and regulatory standpoints. We first introduce the relevant
technologies in context, before considering privacy impacts, the current
remedies individuals might seek through technology and the law, and those
remedies' limitations. To illustrate challenging tensions in this space we
consider the feasibility of technical and legal approaches to both a) the
recent `Go' store concept from Amazon which requires fine-grained, multi-modal
tracking to function as a shop, and b) current challenges in opting in or out
of increasingly pervasive passive Wi-Fi tracking. The `Go' store presents
significant challenges with its legality in Europe significantly unclear and
unilateral, technical measures to avoid biometric tracking likely ineffective.
In the case of MAC addresses, we see a difficult-to-reconcile clash between
privacy-as-confidentiality and privacy-as-control, and suggest a technical
framework which might help balance the two. Significant challenges exist when
seeking to balance personalisation with privacy, and researchers must work
together, including across the boundaries of preferred privacy definitions, to
come up with solutions that draw on both technology and the legal frameworks to
provide effective and proportionate protection. Retailers, simultaneously, must
ensure that their tracking is not just legal, but worthy of the trust of
concerned data subjects.Comment: 10 pages, 1 figure, Proceedings of the PETRAS/IoTUK/IET Living in the
Internet of Things Conference, London, United Kingdom, 28-29 March 201
Digitalization of Retail Stores using Bluetooth Low Energy Beacons
This thesis explores the domains of retail stores and the Internet of Things, with a focus on Bluetooth Low Energy beacons. It investigates how one can use the technology to improve physical stores, for the benefit of both the store and the customers. It does this by going through literature and information from academia and the relevant industry. Additionally, an interview with an expert in the retail domain is conducted, and a survey consisting of a series of interviews and questionnaire with what can be considered experts in the IT domain. A prototype app called Stass is developed, the app demonstrates some of the usages of the technology and is also used for evaluating the performance of the beacons.Masteroppgave i informasjonsvitenskapINFO39
Analyzing of Gender Behaviors from Paths Using Process Mining: A Shopping Mall Application
[EN] The study presents some results of customer pathsΒΏ analysis in a shopping mall. Bluetooth-based technology is used to collect data. The event log containing spatiotemporal information is analyzed with process mining. Process mining is a technique that enables one to see the whole process contrary to data-centric methods. The use of process mining can provide a readily-understandable view of the customer paths. We installed iBeacon devices, a Bluetooth-based positioning system, in the shopping mall. During December 2017 and January and February 2018, close to 8000 customer data were captured. We aim to investigate customer behaviors regarding gender by using their paths. We can determine the gender of customers if they go to the menΒΏs bathroom or womenΒΏs bathroom. Since the study has a comprehensive scope, we focused on male and female customersΒΏ behaviors. This study shows that male and female customers have different behaviors. Their duration and paths, in general, are not similar. In addition, the study shows that the process mining technique is a viable way to analyze customer behavior using Bluetooth-based technology.Dogan, O.; Bayo-Monton, JL.; FernΓ‘ndez Llatas, C.; Oztaysi, B. (2019). Analyzing of Gender Behaviors from Paths Using Process Mining: A Shopping Mall Application. Sensors. 19(3):1-20. https://doi.org/10.3390/s19030557S120193Oosterlinck, D., Benoit, D. F., Baecke, P., & Van de Weghe, N. (2017). Bluetooth tracking of humans in an indoor environment: An application to shopping mall visits. Applied Geography, 78, 55-65. doi:10.1016/j.apgeog.2016.11.005Merad, D., Aziz, K.-E., Iguernaissi, R., Fertil, B., & Drap, P. (2016). Tracking multiple persons under partial and global occlusions: Application to customersβ behavior analysis. Pattern Recognition Letters, 81, 11-20. doi:10.1016/j.patrec.2016.04.011Wu, Y., Wang, H.-C., Chang, L.-C., & Chou, S.-C. (2015). Customerβs Flow Analysis in Physical Retail Store. Procedia Manufacturing, 3, 3506-3513. doi:10.1016/j.promfg.2015.07.672Dogan, O., & Γztaysi, B. (2018). In-store behavioral analytics technology selection using fuzzy decision making. Journal of Enterprise Information Management, 31(4), 612-630. doi:10.1108/jeim-02-2018-0035Hwang, I., & Jang, Y. J. (2017). Process Mining to Discover Shoppersβ Pathways at a Fashion Retail Store Using a WiFi-Base Indoor Positioning System. IEEE Transactions on Automation Science and Engineering, 14(4), 1786-1792. doi:10.1109/tase.2017.2692961Abedi, N., Bhaskar, A., Chung, E., & Miska, M. (2015). Assessment of antenna characteristic effects on pedestrian and cyclists travel-time estimation based on Bluetooth and WiFi MAC addresses. Transportation Research Part C: Emerging Technologies, 60, 124-141. doi:10.1016/j.trc.2015.08.010Mou, S., Robb, D. J., & DeHoratius, N. (2018). Retail store operations: Literature review and research directions. European Journal of Operational Research, 265(2), 399-422. doi:10.1016/j.ejor.2017.07.003Fernandez-Llatas, C., Lizondo, A., Monton, E., Benedi, J.-M., & Traver, V. (2015). Process Mining Methodology for Health Process Tracking Using Real-Time Indoor Location Systems. Sensors, 15(12), 29821-29840. doi:10.3390/s151229769Van der Aalst, W. M. P., van Dongen, B. F., Herbst, J., Maruster, L., Schimm, G., & Weijters, A. J. M. M. (2003). Workflow mining: A survey of issues and approaches. Data & Knowledge Engineering, 47(2), 237-267. doi:10.1016/s0169-023x(03)00066-1Ou-Yang, C., & Winarjo, H. (2011). Petri-net integration β An approach to support multi-agent process mining. Expert Systems with Applications, 38(4), 4039-4051. doi:10.1016/j.eswa.2010.09.066Partington, A., Wynn, M., Suriadi, S., Ouyang, C., & Karnon, J. (2015). Process Mining for Clinical Processes. ACM Transactions on Management Information Systems, 5(4), 1-18. doi:10.1145/2629446Yoo, S., Cho, M., Kim, E., Kim, S., Sim, Y., Yoo, D., β¦ Song, M. (2016). Assessment of hospital processes using a process mining technique: Outpatient process analysis at a tertiary hospital. International Journal of Medical Informatics, 88, 34-43. doi:10.1016/j.ijmedinf.2015.12.018Funkner, A. A., Yakovlev, A. N., & Kovalchuk, S. V. (2017). Towards evolutionary discovery of typical clinical pathways in electronic health records. Procedia Computer Science, 119, 234-244. doi:10.1016/j.procs.2017.11.181Jans, M., Alles, M., & Vasarhelyi, M. (2013). The case for process mining in auditing: Sources of value added and areas of application. International Journal of Accounting Information Systems, 14(1), 1-20. doi:10.1016/j.accinf.2012.06.015Yoshimura, Y., Sobolevsky, S., Ratti, C., Girardin, F., Carrascal, J. P., Blat, J., & Sinatra, R. (2014). An Analysis of Visitorsβ Behavior in the Louvre Museum: A Study Using Bluetooth Data. Environment and Planning B: Planning and Design, 41(6), 1113-1131. doi:10.1068/b130047pDe Leoni, M., van der Aalst, W. M. P., & Dees, M. (2016). A general process mining framework for correlating, predicting and clustering dynamic behavior based on event logs. Information Systems, 56, 235-257. doi:10.1016/j.is.2015.07.003Rebuge, Γ., & Ferreira, D. R. (2012). Business process analysis in healthcare environments: A methodology based on process mining. Information Systems, 37(2), 99-116. doi:10.1016/j.is.2011.01.003Arroyo, R., Yebes, J. J., Bergasa, L. M., Daza, I. G., & AlmazΓ‘n, J. (2015). Expert video-surveillance system for real-time detection of suspicious behaviors in shopping malls. Expert Systems with Applications, 42(21), 7991-8005. doi:10.1016/j.eswa.2015.06.016Popa, M. C., Rothkrantz, L. J. M., Shan, C., Gritti, T., & Wiggers, P. (2013). Semantic assessment of shopping behavior using trajectories, shopping related actions, and context information. Pattern Recognition Letters, 34(7), 809-819. doi:10.1016/j.patrec.2012.04.015Kang, L., & Hansen, M. (2017). Behavioral analysis of airline scheduled block time adjustment. Transportation Research Part E: Logistics and Transportation Review, 103, 56-68. doi:10.1016/j.tre.2017.04.004Rovani, M., Maggi, F. M., de Leoni, M., & van der Aalst, W. M. P. (2015). Declarative process mining in healthcare. Expert Systems with Applications, 42(23), 9236-9251. doi:10.1016/j.eswa.2015.07.040FernΓ‘ndez-Llatas, C., Benedi, J.-M., GarcΓa-GΓ³mez, J., & Traver, V. (2013). Process Mining for Individualized Behavior Modeling Using Wireless Tracking in Nursing Homes. Sensors, 13(11), 15434-15451. doi:10.3390/s131115434Van der Aalst, W. M. P., Reijers, H. A., Weijters, A. J. M. M., van Dongen, B. F., Alves de Medeiros, A. K., Song, M., & Verbeek, H. M. W. (2007). Business process mining: An industrial application. Information Systems, 32(5), 713-732. doi:10.1016/j.is.2006.05.003M. Valle, A., A.P. Santos, E., & R. Loures, E. (2017). Applying process mining techniques in software process appraisals. Information and Software Technology, 87, 19-31. doi:10.1016/j.infsof.2017.01.004JuhaΕΓ‘k, L., Zounek, J., & RohlΓkovΓ‘, L. (2019). Using process mining to analyze studentsβ quiz-taking behavior patterns in a learning management system. Computers in Human Behavior, 92, 496-506. doi:10.1016/j.chb.2017.12.015Sedrakyan, G., De Weerdt, J., & Snoeck, M. (2016). Process-mining enabled feedback: Β«Tell me what I did wrongΒ» vs. Β«tell me how to do it rightΒ». Computers in Human Behavior, 57, 352-376. doi:10.1016/j.chb.2015.12.040Schoor, C., & Bannert, M. (2012). Exploring regulatory processes during a computer-supported collaborative learning task using process mining. Computers in Human Behavior, 28(4), 1321-1331. doi:10.1016/j.chb.2012.02.016Werner, M., & Gehrke, N. (2015). Multilevel Process Mining for Financial Audits. IEEE Transactions on Services Computing, 8(6), 820-832. doi:10.1109/tsc.2015.2457907De Weerdt, J., Schupp, A., Vanderloock, A., & Baesens, B. (2013). Process Mining for the multi-faceted analysis of business processesβA case study in a financial services organization. Computers in Industry, 64(1), 57-67. doi:10.1016/j.compind.2012.09.010Herbert, L., Hansen, Z. N. L., Jacobsen, P., & Cunha, P. (2014). Evolutionary Optimization of Production Materials Workflow Processes. Procedia CIRP, 25, 53-60. doi:10.1016/j.procir.2014.10.010Yim, J., Jeong, S., Gwon, K., & Joo, J. (2010). Improvement of Kalman filters for WLAN based indoor tracking. Expert Systems with Applications, 37(1), 426-433. doi:10.1016/j.eswa.2009.05.047Delafontaine, M., Versichele, M., Neutens, T., & Van de Weghe, N. (2012). Analysing spatiotemporal sequences in Bluetooth tracking data. Applied Geography, 34, 659-668. doi:10.1016/j.apgeog.2012.04.003Frisby, J., Smith, V., Traub, S., & Patel, V. L. (2017). Contextual Computingβ―: A Bluetooth based approach for tracking healthcare providers in the emergency room. Journal of Biomedical Informatics, 65, 97-104. doi:10.1016/j.jbi.2016.11.008Yoshimura, Y., Krebs, A., & Ratti, C. (2017). Noninvasive Bluetooth Monitoring of Visitorsβ Length of Stay at the Louvre. IEEE Pervasive Computing, 16(2), 26-34. doi:10.1109/mprv.2017.33Cao, Q., Jones, D. R., & Sheng, H. (2014). Contained nomadic information environments: Technology, organization, and environment influences on adoption of hospital RFID patient tracking. Information & Management, 51(2), 225-239. doi:10.1016/j.im.2013.11.007Larson, J. S., Bradlow, E. T., & Fader, P. S. (2005). An exploratory look at supermarket shopping paths. International Journal of Research in Marketing, 22(4), 395-414. doi:10.1016/j.ijresmar.2005.09.005Fernandez-Llatas, C., Martinez-Millana, A., Martinez-Romero, A., Benedi, J. M., & Traver, V. (2015). Diabetes care related process modelling using Process Mining techniques. Lessons learned in the application of Interactive Pattern Recognition: coping with the Spaghetti Effect. 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). doi:10.1109/embc.2015.7318809Conca, T., Saint-Pierre, C., Herskovic, V., SepΓΊlveda, M., Capurro, D., Prieto, F., & Fernandez-Llatas, C. (2018). Multidisciplinary Collaboration in the Treatment of Patients With Type 2 Diabetes in Primary Care: Analysis Using Process Mining. Journal of Medical Internet Research, 20(4), e127. doi:10.2196/jmir.8884De Medeiros, A. K. A., Weijters, A. J. M. M., & van der Aalst, W. M. P. (2007). Genetic process mining: an experimental evaluation. Data Mining and Knowledge Discovery, 14(2), 245-304. doi:10.1007/s10618-006-0061-7Heyer, L. J. (1999). Exploring Expression Data: Identification and Analysis of Coexpressed Genes. Genome Research, 9(11), 1106-1115. doi:10.1101/gr.9.11.1106Yang, W.-S., & Hwang, S.-Y. (2006). A process-mining framework for the detection of healthcare fraud and abuse. Expert Systems with Applications, 31(1), 56-68. doi:10.1016/j.eswa.2005.09.00
Π Π°Π΄ΠΈΠΎΡΠ°ΡΡΠΎΡΠ½ΡΠ΅ ΡΠ΅Ρ Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΏΠΎΠ·ΠΈΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π² Π·Π΄ΡΠ°Π²ΠΎΠΎΡ ΡΠ°Π½Π΅Π½ΠΈΠΈ
Introduction. Localization of objects position in closed space plays an important role in many areas of human activity, including medicine. Using indoor-positioning technologies as a part of telemedicine systems allows one to improve the quality of medical care and to reduce mortality of patients. Therefore, indoor-positioning technologies contribute to achieve the goals outlined in the Russian Federation government`s program "Healthcare development". Aim. To study the applicability of modern radiofrequency technologies for localization of patients inside a hospital building. Materials and methods. Scientific sources devoted to indoor-positioning based on radiofrequency technologies were analyzed. The methods used included: - bibliographic retrieval; - selection and verification of sources based on their relevance; - analysis of sources by methods of deconstruction and comparative analysis . Results. The result of the analysis indicated that radiofrequency positioning technologies allow one to locate objects using radio waves properties. The disadvantage of the technology is the penetration of radio signal through walls and floors. Given this, it is necessary to use complex algorithms to detect an object with accuracy to a specific room. Despite this disadvantage, radiofrequency technologies can be used for positioning in medical facilities since they are easy in deployment and service. Also, they are used in ready-made commercial solutions. ZigBee technology is an exception because it does not allow one to track moving objects in real-time. Conclusion. Based on the study it was concluded that BLE technology is the most suitable for indoor-positioning in medical facilities. It is energy-efficient, it has sufficiently fast data transfer rate, good communication radius and a large range of ready-made communication equipment. It is also worth noting that most wireless medical sensors exchange data via the BLE interface.ΠΠ²Π΅Π΄Π΅Π½ΠΈΠ΅. ΠΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ ΠΌΠ΅ΡΡΠΎΠΏΠΎΠ»ΠΎΠΆΠ΅Π½ΠΈΡ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² Π² Π·Π°ΠΊΡΡΡΠΎΠΌ ΠΏΠΎΠΌΠ΅ΡΠ΅Π½ΠΈΠΈ ΠΈΠ³ΡΠ°Π΅Ρ Π±ΠΎΠ»ΡΡΡΡ ΡΠΎΠ»Ρ Π²ΠΎ ΠΌΠ½ΠΎΠ³ΠΈΡ
ΡΡΠ΅ΡΠ°Ρ
Π΄Π΅ΡΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ ΡΠ΅Π»ΠΎΠ²Π΅ΠΊΠ°, Π² ΡΠΎΠΌ ΡΠΈΡΠ»Π΅ ΠΈ Π² ΠΌΠ΅Π΄ΠΈΡΠΈΠ½Π΅. ΠΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΏΠΎΠ·ΠΈΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π² ΡΠΎΡΡΠ°Π²Π΅ ΡΠ΅Π»Π΅ΠΌΠ΅Π΄ΠΈΡΠΈΠ½ΡΠΊΠΈΡ
ΡΠΈΡΡΠ΅ΠΌ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΠΏΠΎΠ²ΡΡΠΈΡΡ ΠΊΠ°ΡΠ΅ΡΡΠ²ΠΎ ΠΎΠΊΠ°Π·Π°Π½ΠΈΡ ΠΌΠ΅Π΄ΠΈΡΠΈΠ½ΡΠΊΠΎΠΉ ΠΏΠΎΠΌΠΎΡΠΈ ΠΈ ΡΠ½ΠΈΠ·ΠΈΡΡ ΡΠΌΠ΅ΡΡΠ½ΠΎΡΡΡ ΠΏΠ°ΡΠΈΠ΅Π½ΡΠΎΠ², ΡΡΠΎ ΡΠΏΠΎΡΠΎΠ±ΡΡΠ²ΡΠ΅Ρ Π΄ΠΎΡΡΠΈΠΆΠ΅Π½ΠΈΡ ΡΠ΅Π»Π΅ΠΉ, ΠΎΠ±ΠΎΠ·Π½Π°ΡΠ΅Π½Π½ΡΡ
Π² Π³ΠΎΡΡΠ΄Π°ΡΡΡΠ²Π΅Π½Π½ΠΎΠΉ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠ΅ Π ΠΎΡΡΠΈΠΉΡΠΊΠΎΠΉ Π€Π΅Π΄Π΅ΡΠ°ΡΠΈΠΈ "Π Π°Π·Π²ΠΈΡΠΈΠ΅ Π·Π΄ΡΠ°Π²ΠΎΠΎΡ
ΡΠ°Π½Π΅Π½ΠΈΡ". Π¦Π΅Π»Ρ ΡΠ°Π±ΠΎΡΡ. ΠΠ½Π°Π»ΠΈΠ· ΠΏΡΠΈΠΌΠ΅Π½ΠΈΠΌΠΎΡΡΠΈ ΡΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΡΡ
ΡΠ°Π΄ΠΈΠΎΡΠ°ΡΡΠΎΡΠ½ΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ Π΄Π»Ρ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΡ ΠΌΠ΅ΡΡΠΎΠΏΠΎΠ»ΠΎΠΆΠ΅Π½ΠΈΡ ΠΏΠ°ΡΠΈΠ΅Π½ΡΠ° Π² Π·Π΄Π°Π½ΠΈΠΈ ΡΡΠ°ΡΠΈΠΎΠ½Π°ΡΠ°. ΠΠ°ΡΠ΅ΡΠΈΠ°Π»Ρ ΠΈ ΠΌΠ΅ΡΠΎΠ΄Ρ. Π Ρ
ΠΎΠ΄Π΅ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ Π΄Π°Π½Π½ΠΎΠΉ ΡΠ°Π±ΠΎΡΡ Π°Π½Π°Π»ΠΈΠ·ΠΈΡΡΡΡΡΡ Π½Π°ΡΡΠ½ΡΠ΅ ΠΈΡΡΠΎΡΠ½ΠΈΠΊΠΈ, ΠΏΠΎΡΠ²ΡΡΠ΅Π½Π½ΡΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ ΠΏΠΎΠ·ΠΈΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π½Π° Π±Π°Π·Π΅ ΡΠ°Π΄ΠΈΠΎΡΠ°ΡΡΠΎΡΠ½ΡΡ
ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΉ. ΠΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΠ΅ ΠΌΠ΅ΡΠΎΠ΄Ρ Π²ΠΊΠ»ΡΡΠ°ΡΡ Π² ΡΠ΅Π±Ρ: β Π±ΠΈΠ±Π»ΠΈΠΎΠ³ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΠΉ ΠΏΠΎΠΈΡΠΊ; β ΠΎΡΠ±ΠΎΡ ΠΈ ΠΏΡΠΎΠ²Π΅ΡΠΊΡ ΠΈΡΡΠΎΡΠ½ΠΈΠΊΠΎΠ² Ρ ΡΡΠ΅ΡΠΎΠΌ ΠΈΡ
Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΡΡΠΈ, ΡΠΎΠΎΡΠ²Π΅ΡΡΡΠ²ΠΈΡ ΡΠ΅ΠΌΠ°ΡΠΈΠΊΠ΅ ΠΈ Π°Π²ΡΠΎΡΠΈΡΠ΅ΡΠ½ΠΎΡΡΠΈ; β Π°Π½Π°Π»ΠΈΠ· ΠΈΡΡΠΎΡΠ½ΠΈΠΊΠΎΠ² Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ² Π΄Π΅ΠΊΠΎΠ½ΡΡΡΡΠΊΡΠΈΠΈ ΠΈ ΡΡΠ°Π²Π½ΠΈΡΠ΅Π»ΡΠ½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΠΈΠ·Π°. Π Π΅Π·ΡΠ»ΡΡΠ°ΡΡ. Π Π΅Π·ΡΠ»ΡΡΠ°Ρ Π°Π½Π°Π»ΠΈΠ·Π° ΠΏΠΎΠΊΠ°Π·ΡΠ²Π°Π΅Ρ, ΡΡΠΎ ΡΠ°Π΄ΠΈΠΎΡΠ°ΡΡΠΎΡΠ½ΡΠ΅ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΠΏΠΎΠ·ΠΈΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡ ΠΎΠΏΡΠ΅Π΄Π΅Π»ΡΡΡ ΠΌΠ΅ΡΡΠΎΠΏΠΎΠ»ΠΎΠΆΠ΅Π½ΠΈΠ΅ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ², ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΡ ΡΠ²ΠΎΠΉΡΡΠ²Π° ΡΠ°Π΄ΠΈΠΎΠ²ΠΎΠ»Π½. ΠΡΠ½ΠΎΠ²Π½ΠΎΠΉ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΎΠΊ Π΄Π°Π½Π½ΠΎΠΉ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ Π·Π°ΠΊΠ»ΡΡΠ°Π΅ΡΡΡ Π² ΡΠΎΠΌ, ΡΡΠΎ ΠΈΠ·-Π·Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΡ ΡΠ°Π΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² ΡΠΊΠ²ΠΎΠ·Ρ ΡΡΠ΅Π½Ρ ΠΈ ΠΏΠ΅ΡΠ΅ΠΊΡΡΡΠΈΡ ΠΏΡΠΈΡ
ΠΎΠ΄ΠΈΡΡΡ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΡ ΡΠ»ΠΎΠΆΠ½ΡΠ΅ Π²ΡΡΠΈΡΠ»ΠΈΡΠ΅Π»ΡΠ½ΡΠ΅ Π°Π»Π³ΠΎΡΠΈΡΠΌΡ Π΄Π»Ρ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΡ ΠΎΠ±ΡΠ΅ΠΊΡΠ° Ρ ΡΠΎΡΠ½ΠΎΡΡΡΡ Π΄ΠΎ ΠΊΠΎΠ½ΠΊΡΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΏΠΎΠΌΠ΅ΡΠ΅Π½ΠΈΡ. ΠΠ΅ΡΠΌΠΎΡΡΡ Π½Π° Π΄Π°Π½Π½ΡΠΉ Π½Π΅Π΄ΠΎΡΡΠ°ΡΠΎΠΊ, ΡΠ°Π΄ΠΈΠΎΡΠ°ΡΡΠΎΡΠ½ΡΠ΅ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΠΈ ΠΌΠΎΠ³ΡΡ ΠΏΡΠΈΠΌΠ΅Π½ΡΡΡΡΡ Π΄Π»Ρ ΠΏΠΎΠ·ΠΈΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π² ΠΌΠ΅Π΄ΠΈΡΠΈΠ½ΡΠΊΠΈΡ
ΡΡΡΠ΅ΠΆΠ΄Π΅Π½ΠΈΡΡ
, ΡΠ°ΠΊ ΠΊΠ°ΠΊ ΠΎΠ½ΠΈ ΠΏΡΠΎΡΡΡ Π² ΡΠ°Π·Π²Π΅ΡΡΡΠ²Π°Π½ΠΈΠΈ ΠΈ ΠΎΠ±ΡΠ»ΡΠΆΠΈΠ²Π°Π½ΠΈΠΈ ΠΈ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΡΡΡΡ Π² Π³ΠΎΡΠΎΠ²ΡΡ
ΠΊΠΎΠΌΠΌΠ΅ΡΡΠ΅ΡΠΊΠΈΡ
ΡΠ΅ΡΠ΅Π½ΠΈΡΡ
. ΠΡΠΊΠ»ΡΡΠ΅Π½ΠΈΠ΅ΠΌ ΡΠ²Π»ΡΠ΅ΡΡΡ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡ ZigBee, ΡΠ°ΠΊ ΠΊΠ°ΠΊ ΠΎΠ½Π° Π½Π΅ ΠΏΠΎΠ·Π²ΠΎΠ»ΡΠ΅Ρ ΠΎΡΡΠ»Π΅ΠΆΠΈΠ²Π°ΡΡ ΠΏΠΎΠ΄Π²ΠΈΠΆΠ½ΡΠ΅ ΠΎΠ±ΡΠ΅ΠΊΡΡ Π² ΡΠ΅ΠΆΠΈΠΌΠ΅ ΡΠ΅Π°Π»ΡΠ½ΠΎΠ³ΠΎ Π²ΡΠ΅ΠΌΠ΅Π½ΠΈ. ΠΠ°ΠΊΠ»ΡΡΠ΅Π½ΠΈΠ΅. ΠΠ° ΠΎΡΠ½ΠΎΠ²Π΅ ΠΏΡΠΎΠ²Π΅Π΄Π΅Π½Π½ΠΎΠ³ΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΠ΄Π΅Π»Π°Π½ Π²ΡΠ²ΠΎΠ΄ ΠΎ ΡΠΎΠΌ, ΡΡΠΎ ΡΠ΅Ρ
Π½ΠΎΠ»ΠΎΠ³ΠΈΡ BLE ΡΠ²Π»ΡΠ΅ΡΡΡ Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΠΏΠΎΠ΄Ρ
ΠΎΠ΄ΡΡΠ΅ΠΉ Π΄Π»Ρ ΠΏΠΎΠ·ΠΈΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π² ΠΌΠ΅Π΄ΠΈΡΠΈΠ½ΡΠΊΠΈΡ
ΡΡΡΠ΅ΠΆΠ΄Π΅Π½ΠΈΡΡ
, ΡΠ°ΠΊ ΠΊΠ°ΠΊ ΠΎΠ½Π° ΠΎΠ±Π»Π°Π΄Π°Π΅Ρ Π½ΠΈΠ·ΠΊΠΈΠΌ ΡΠ½Π΅ΡΠ³ΠΎΠΏΠΎΡΡΠ΅Π±Π»Π΅Π½ΠΈΠ΅ΠΌ, Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΠΎ Π²ΡΡΠΎΠΊΠΎΠΉ ΡΠΊΠΎΡΠΎΡΡΡΡ ΠΏΠ΅ΡΠ΅Π΄Π°ΡΠΈ Π΄Π°Π½Π½ΡΡ
, Ρ
ΠΎΡΠΎΡΠΈΠΌ ΡΠ°Π΄ΠΈΡΡΠΎΠΌ ΡΠ²ΡΠ·ΠΈ ΠΈ Π±ΠΎΠ»ΡΡΠΈΠΌ Π²ΡΠ±ΠΎΡΠΎΠΌ Π³ΠΎΡΠΎΠ²ΠΎΠ³ΠΎ ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΠΎΠ³ΠΎ ΠΎΠ±ΠΎΡΡΠ΄ΠΎΠ²Π°Π½ΠΈΡ. Π’Π°ΠΊΠΆΠ΅ ΡΡΠΎΠΈΡ ΠΎΡΠΌΠ΅ΡΠΈΡΡ, ΡΡΠΎ Π±ΠΎΠ»ΡΡΠΈΠ½ΡΡΠ²ΠΎ Π±Π΅ΡΠΏΡΠΎΠ²ΠΎΠ΄Π½ΡΡ
ΠΌΠ΅Π΄ΠΈΡΠΈΠ½ΡΠΊΠΈΡ
Π΄Π°ΡΡΠΈΠΊΠΎΠ² ΠΎΡΡΡΠ΅ΡΡΠ²Π»ΡΡΡ ΠΎΠ±ΠΌΠ΅Π½ Π΄Π°Π½Π½ΡΠΌΠΈ ΡΠ΅ΡΠ΅Π· ΠΈΠ½ΡΠ΅ΡΡΠ΅ΠΉΡ BLE
- β¦