Next Article in Journal
Construction of Journal Knowledge Graph Based on Deep Learning and LLM
Previous Article in Journal
Life Prediction Model for Press-Pack IGBT Module Based on Thermal Resistance Degradation
Previous Article in Special Issue
FFTNet: Fusing Frequency and Temporal Awareness in Long-Term Time Series Forecasting
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Transmission-Based Human Behavior Recognition Algorithm

1
School of Communications and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
Zhongxing Telecommunication Equipment Corporation, Shenzhen 518055, China
3
China Mobile Communications Group Co., Ltd., Beijing 100033, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(9), 1727; https://doi.org/10.3390/electronics14091727
Submission received: 19 March 2025 / Revised: 15 April 2025 / Accepted: 22 April 2025 / Published: 24 April 2025

Abstract

:
In the contemporary field of wireless sensing, passive sensing leveraging channel state information (CSI) has found widespread applications across diverse scenarios, including behavior recognition, keystroke recognition, breath detection, and indoor localization. To ensure optimal sensing performance, wireless devices often collect a substantial number of CSI packets. However, when these packets need to be transmitted to a server or the cloud for time series analysis, the transmission load on the passive sensing system escalates rapidly, thereby impeding the system’s real-time performance. To address this challenge, we introduce the KCS algorithm, a novel compressed sensing (CS) algorithm grounded in K-Singular Value Decomposition (KSVD). The primary objective of the KCS algorithm is to enable the efficient transmission of CSI data. Departing from the use of a universal sparse matrix in traditional CS, the KCS algorithm constructs an overcomplete sparse matrix. This construction not only substantially bolsters the sparse representation capacity but also fine-tunes the compression performance. By doing so, it ensures the secure and efficient transmission of data. We applied the KCS algorithm to human behavior recognition and prediction. The experimental outcomes reveal that even when the volume of CSI data is reduced by 90%, the system still attains an average accuracy of 90%. This showcases the effectiveness of the KCS algorithm in balancing data compression and recognition performance, offering a promising solution for realistic applications where efficient data transmission and accurate sensing are crucial.

1. Introduction

In recent years, the passive sensing system based on Wi-Fi has emerged as a captivating research area, primarily because it eliminates the need for users to carry additional devices [1]. The movement and occlusion of targets within the sensing environment can cause fluctuations in the received signal strength indicator (RSSI) and channel state information (CSI) of wireless signals [2,3,4,5]. By analyzing and processing feature parameters (such as Doppler frequency shift) extracted from RSSI or CSI, the passive sensing system can be employed for diverse sensing applications. Compared to RSSI, CSI collected by wireless devices can reflect the channel frequency response (CFR) of the communication system. Each CSI sampling value at subcarriers of antennas contains both amplitude and phase information, endowing CSI-based sensing with finer granularity, higher robustness, and stability. Additionally, the integration of orthogonal frequency division multiplexing (OFDM) and multiple-input multiple-output (MIMO) technologies holds the promise of further enhancing the accuracy of wireless sensing [6].
However, a significant challenge in CSI-based passive sensing systems is the large volume of CSI packets that need to be collected by wireless devices. While this large-scale data collection is beneficial for improving sensing performance [7,8,9], it leads to a sharp increase in the data volume when transmitting CSI packets to the server for processing. This, in turn, affects the system’s transmission performance. For instance, in a three-by-three Wi-Fi link operating under the IEEE 802.11n protocol, a single CSI packet for all 64 subcarriers collected by the wireless network card amounts to 1152 bytes, while the maximum transmission unit (MTU) in Ethernet is 1500 bytes [10]. In the scenario shown in Figure 1, multiple access points (APs) need to be deployed to cover the whole environment, so as to achieve passive sensing. At the same time, in order to realize real-time sensing, wireless devices must constantly collect CSI data, which brings enormous transmission burdens to the network.
Therefore, it is imperative to compress the CSI data of the passive sensing system. In the existing research, CSI compression is generally aimed at massive multiple-input multiple-output (MIMO) systems, because untimely CSI feedback or large CSI bandwidth overhead will affect the user scheduling, precoding, and power allocation of the base station and further deteriorate the communication performance [11,12]. To address this issue, researchers have explored different CSI compression methods. Early works in the area of massive MIMO systems focused on reducing the CSI feedback burden. For example, some initial attempts involved simple data reduction techniques such as transmitting only a part of the CSI matrix after singular value decomposition. However, as pointed out by [13], these methods often failed to reconstruct the original CSI accurately, limiting their applicability in practical scenarios.
Subsequently, more sophisticated approaches were proposed. Roh et al. [11] introduced a method using SVD and Givens transform to compress CSI data. This approach, while reducing computational complexity, had limitations in terms of compression ratio and signal fidelity. In an effort to improve compression performance, Chang et al. [14] proposed vector quantization and codebook-based methods. Although these methods could capture fine-grained channel information, they required substantial computational resources for codebook construction.
Conversely, the compression method based on curve fitting has been demonstrated to exhibit effective compression ability [15,16], yet its reconstruction accuracy is suboptimal. The field of compressed sensing (CS) [17] has emerged as a synthesis of the advantages inherent in both of these approaches, thus providing the motivation to compress the CSI of commercial Wi-Fi-based passive sensing systems. The theoretical underpinnings of compressed sensing demonstrate that, under certain conditions, a high-dimensional signal can be sparse in a transform matrix, thereby enabling its projection onto a low-dimensional space by a measurement matrix that is independent of the transform matrix. This reconstruction can be achieved with a high probability from a small number of projections by solving an optimization problem. Furthermore, the accuracy of the reconstructed signal is directly proportional to the sparsity of the original signal in the transform matrix [18]. Despite the sparsity of the CSI matrix of a massive MIMO system in a discrete cosine transform (DCT) matrix [19] or a discrete Fourier transform (DFT) matrix [20], the number of antennas and subcarriers in a commercial Wi-Fi system is significantly lower than that of a massive MIMO system. Consequently, the CSI compression method for massive MIMO systems is not applicable to commercial Wi-Fi systems.
In order to address these issues, a methodology was devised with a view to reducing the amount of CSI data for efficient transmission in commercial Wi-Fi systems. Simultaneously, we utilize commercial Wi-Fi devices to collect experimental data and verify the feasibility of the method on the behavior recognition system. The findings demonstrate that the average accuracy of the behavior recognition system exhibits only a marginal decline when the data volume of CSI is significantly diminished. In short, our main contributions are as follows:
  • The proposed KCS algorithm enhances compressed sensing performance by constructing an overcomplete sparse matrix through KSVD dictionary learning, which not only improves sparse representation fidelity but also facilitates efficient data transmission and enables effective temporal feature extraction in signal processing applications;
  • A behavior recognition model based on a convolutional neural network (CNN) has been developed in order to ascertain the impact of compressing CSI data on sensing performance. The experimental results demonstrate that the behavior recognition system maintains optimal performance when the volume of CSI data is significantly reduced.

2. Related Work

The advent of the intelligent information age has precipitated rapid development in the field of indoor passive sensing technology. Wi-Fi devices are characterized by their low cost, safety, and reliability, and have been extensively deployed. As a common network transmission device, the CSI data of its physical layer can also be used as the signal source of indoor passive sensing. In order to promote the cloud of passive sensing and reduce the burden of sensing data storage and transmission, it is necessary to compress CSI.
In the existing research, CSI compression algorithms are usually used in massive MIMO systems, while there are few CSI compression algorithms for commercial Wi-Fi systems. In massive MIMO systems, users often need to feed CSI data back to the base station (BS) through the feedback link in real time [21]. However, due to the large number of antennas and subcarriers in massive MIMO systems, it is unrealistic to directly feed back CSI data. Therefore, how to effectively reduce the cost of CSI feedback has always been a concern. After singular value decomposition of the original CSI matrix, the method of transmitting only the V matrix after singular value decomposition [22] can reduce a certain amount of CSI data, but it cannot reconstruct the original CSI signal, so it is not suitable for CSI compression of commercial Wi-Fi in passive sensing systems. Roh et al. [11] utilized SVD and Givens transform to express the matrix as angle values and quantized these values to achieve the purpose of compression. Although the computational complexity of this method is low, the CSI compression performance is not strong. Chang et al. [14] applied vector quantization and codebook-based methods to reduce channel state information feedback, but in order to capture fine-grained channel state information, a large number of codebooks must be constructed, which brings additional computational overhead to the passive sensing system. Jiménez et al. [23] employed Huffman codes to quantify CSI to reduce CSI data volume, but it also has the problem of low CSI compression ability. Luo et al. [24] proposed a CSI prediction model based on the convolutional neural network (CNN) and long short-term memory (LSTM), which can predict the channel state information from the historical data of wireless communication systems. However, the model is only suitable for relatively stable environments, and its prediction ability will be greatly reduced due to rich multipaths and drastic changes in CSI in indoor environments. CSIFit [15] is the first algorithm to compress CSI on commercial Wi-Fi systems, which is verified by collecting real-world CSI data. It constructs an analytical expression with only a few undetermined parameters to fit the CSI curve and employs the Levenberg Marquardt (LM) algorithm to solve the parameters in the analytical expression. Because a small number of parameters can recover the original CSI data, CSIFit has a good compression ability. CSIApx [16] optimizes the analytical expression of CSIFit and obtains the complex coefficient of the analytical expression through the mean square error fitting (MSE Fit) algorithm, which further improves the compression ability of CSI. However, these two algorithms are very vulnerable to noise, which degrades the performance of fitting CSI curves and further affects the performance of passive sensing systems. Han et al. [25] utilized compressed sensing technology to compress the CSI of massive MIMO systems. However, the sparse matrix employed in CSI compression in commercial Wi-Fi systems is not suitable for this purpose, due to the significantly lower number of antennas and subcarriers in such systems compared to that of massive MIMO systems. Furthermore, the sparsity of CSI signals in the sparse matrix is not readily apparent. To address these challenges, we have devised the KCS algorithm, a methodology that optimizes the sparse matrix for compressed sensing. This enhancement of sparsity in the CSI signals within the sparse matrix leads to an improvement in the reconstruction accuracy of CSI signals, thereby facilitating superior sensing outcomes. Notably, this approach not only enhances the transmission rate but also ensures the security of data by facilitating the recovery of the original CSI matrix through the sparse dictionary at the server.

3. Preliminaries

In this section, we introduce basic knowledge about CSI and compressed sensing, which together form the basis of this paper.

3.1. Channel State Information

In wireless communication systems, CSI is often used for power allocation and rate adaptation [26]. The signal propagation delay, amplitude attenuation, and phase offset can be reflected by CSI [27]. Now, some commercial devices can obtain CSI values for passive sensing, such as the Linux 802.11n CSI tool [28], Atheros CSI tool [29], and Nexmon CSI tool [30]. Figure 2 shows the format of CSI packet collected by the wireless network card. At the sampling time t, the dimension of the CSI packet is N T × N R × N C , where N T is the number of transmit antennas, N R is the number of receive antennas, and N C is the number of subcarriers. Since each CSI value is a complex number, the exponential form is expressed as
h k = | h k | e j θ k ,
where | h k | and θ k represent the amplitude and phase of the kth subcarrier, respectively. It can be seen that CSI contains the amplitude and phase information of signals. In the passive sensing system, the movement of the target will cause a change in the signal propagation direction, and then it affects the signal propagation delay, phase offset, and amplitude attenuation, and these changes will be recorded in the CSI information [31,32], so the CSI information can be used to achieve passive sensing.

3.2. Compressed Sensing

The idea of compression can be described as
y = Φ h ,
where h R N × 1 denotes the original CSI signal, Φ R M × N represents the fixed measurement matrix, and y R M × 1 is the compressed CSI signal. As long as M < N , the measurement matrix can compress CSI. However, Formula (2) refers to underdetermined equations and there is no definite solution, so h would not be reconstructed through y and Φ uniquely. Fortunately, the emergence of compressed sensing [33] solves this problem. Formula (2) can be written as
y = Φ Ψ s ,
where Φ is the sparse matrix, s is the sparse coefficient, and h = Φ s . According to compressed sensing theory, if the matrix s is k-sparse in the sparse domain represented by matrix Φ and if the sensing matrix A satisfies the restricted isometry property (RIP) criterion [34], then the sparse coefficient s can be uniquely recovered from the sensing matrix A and the measurement value y with high probability. Subsequently, by multiplying the recovered sparse coefficient s with Ψ , the original CSI h can be reconstructed.

4. System Structure

In this section, we illustrate the overall architecture of CSI compression and reconstruction for behavior recognition, as shown in Figure 3. Initially, Wi-Fi devices in radio frequency (RF) link collect a substantial number of CSI packets. Subsequent to down-sampling, the original CSI is compressed and transmitted to the server, whilst the original CSI is utilized to train a sparse dictionary. Then, following the reception of the sparse dictionary and compressed CSI, the server reconstructs the original CSI by employing the orthogonal matching pursuit (OMP) algorithm. Finally, following a series of preprocessing steps, the CSI data are input into a CNN classifier for behavior recognition.

4.1. Down-Sampling

In the process of CSI packet collection, the packet rate is set to 500 Hz. For behavior recognition, the necessity for high packet rates [35] is not as imperative as in certain passive sensing applications, such as indoor tracking [36]. In order to facilitate future expansion of the application, this section has been included. Simultaneously, an elevated packet rate will increase the time taken for training, which requires down-sampling of CSI packets. In this instance, one CSI packet is extracted for every 20 packets, a process which significantly reduces the quantity of CSI data requiring transmission.

4.2. CSI Data Compression

The dimension of a CSI matrix collected by a Wi-Fi device operating under a MIMO-OFDM mechanism is N T × N R × N C (the number of transmit antennas is N T , the number of receive antennas is N R , and the number of subcarriers is N C ). In order to facilitate the calculation process, it is necessary to transform a single CSI packet into a column vector. This results in the dimensions of the original CSI signal, denoted by h , being reduced to N T N R N C × 1 prior to compression. For the measurement matrix Φ , Candes and Tao proved that the independent and identically distributed (IID) Gaussian random matrix satisfies the RIP criterion and can become a universal measurement matrix in CS [37]; that is, the entries ϕ i j 1 M N ( 0 , 1 ) in matrix Φ . The CSI compression process in Figure 3 can be expressed as
Y = Φ H = Φ Ψ S ,
where H R N T N R N C × L and Y R M × L represent CSI data before and after compression, respectively. Φ R M × N T N R N C is the measurement matrix, Ψ R N T N R N C × N T N R N C is the sparse matrix, and S R N T N R N C × L is the sparse coefficient matrix, respectively. L is the number of CSI packets, and M is the number of measurement values. The data volume of CSI in the behavior recognition system exhibits a positive correlation with the parameter M. Specifically, a reduction in M leads to a corresponding decrease in CSI data volume. The CSI compression can reduce N T N R N C M N T N R N C to 100 % the amount of CSI data transmission.

4.3. Dictionary Training

For massive MIMO systems, complete sparse matrices (such as the DFT or DCT matrix) have a good sparse representation effect. However, due to the limited number of antennas and subcarriers in indoor Wi-Fi devices, the CSI signal cannot be well represented by sparse matrices, which poses difficulties in recovering the original CSI signal and affects the performance of passive sensing.
In order to enhance the sparsity of S , we propose the KCS algorithm to generate an overcomplete sparse dictionary D (the number of columns of a matrix is greater than the number of rows of a matrix) for CSI compression in a behavior recognition system and use it to replace Ψ . The reason that the overcomplete sparse dictionary D can enhance the sparsity of S is illustrated in Figure 4. Considering the kth column s k in S , when D = { d 1 , d 2 , d 3 } and h = s 1 d 1 + s 2 d 2 + s 3 d 3 , the sparse coefficient s k is { s 1 , s 2 , s 3 } .
Now, Formula (5) can be written as
Y = Φ H = Φ DS ,
where H represents the original CSI, S is the sparse coefficient matrix, and D is the sparse dictionary obtained by the KCS algorithm. Then, the specific generation process of the sparse dictionary D can be described as the optimization problem
D * = argmin | | H DS | | F 2 s . t . i = 1 L | | s i | | 0 K s ,
where H = { h 1 , h 2 , , h L } refers to the total CSI packets collected by Wi-Fi devices for training the sparse dictionary, D = { d 1 , d 2 , , d μ N T N R N C } is the sparse dictionary, and S = { s 1 , s 2 , , s L } is the sparse coefficient matrix. h i , d i , and s i are N T N R N C × 1 vectors. Here, μ is an overcomplete factor to ensure that the number of columns of the matrix is greater than the number of rows, K s is a sparsity constraint for S , and L μ N T N R N C .
The sparse coefficient matrix and the sparse dictionary alternately need to be solved to obtain the optimal sparse dictionary D * . The sparse coefficient matrix S * is initialized by randomly selecting N T N R N C columns from H , denoted by
S * = argmin | | H DS | | F 2 s . t . i = 1 L | | s i | | 0 K s .
When the ith column h i in H is selected, the corresponding s i is obtained by the orthogonal matching pursuit (OMP) algorithm. The current sparse dictionary D is updated column by column, which is
D * = argmin | | H i = 1 μ N T N R N C d i s T i | | F 2 = argmin | | H i k μ N T N R N C d i s T i d k s T k | | F 2 = argmin | | E k d k s T k | | F 2 ,
where E k = H i k μ N T N R N C d i s T i is the residual, and | | · | | F is the Frobenius norm. d i and s T i are the ith column of D and the ith row of S , respectively. In order to ensure that the sparsity of S is not destroyed in the update process, it is necessary to select the elements which are not 0 in s T k to form a new s ˜ T k , and the corresponding column index set c k is also recorded. The corresponding column of E k is selected to form a new E ˜ k based on the column index set c k , and then SVD can be performed, which is
E ˜ k = U Σ V T .
The column vector u m a x in the left singular matrix corresponding to the maximum singular value σ m a x is assigned to d k , and the product of the maximum singular value  σ m a x and the transpose of its corresponding row vector v m a x in the right singular matrix is assigned to s ˜ T k
d k = u m a x , s ˜ T k = σ m a x v m a x T ,
and then s ˜ T k is updated to the corresponding position in s T k by index c k . By iteratively updating D and S until | | H DS | | F 2 < ε , the optimal sparse dictionary D * can be obtained, and its explicit steps are described in Algorithm 1.
Algorithm 1 KCS algorithm.
Input:   CSI data H
Output:   Sparse dictionary D
  1:
Initialization:  D 0 = H 0 , S 0 = O , j = 0
  2:
repeat
  3:
   for  i = 1 to L do
  4:
        s i = OMP h i , D j
  5:
   end for
  6:
   for  k = 1 to μ N T N R N C  do
  7:
        E k = H m k μ N T N R N C d m s T m
  8:
        c k = { n | 1 n L , s T k n 0 }
  9:
        E ˜ k = E k : , c k
10:
        [ U , Σ , V ] = SVD E ˜ k
11:
        s ˜ T k = σ m a x v m a x T
12:
        [ d k , s T k c k ] = [ u m a x , s ˜ T k ]
13:
   end for
14:
    j = j + 1
15:
until halting condition true;
16:
return  D = D j
The μ N T N R N C columns of H 0 are initialized randomly selected from H . O is a zero matrix whose dimension is N T N R N C × L , and j is the number of iterations. c k is the column index set of non-zero elements in s T k , E k ( : , c k ) represents a new matrix formed by taking out the corresponding columns in E k according to the column index set c k . Here, the halting condition is | | H D j S j | | < ε .

4.4. CSI Data Reconstruction

After the server obtains the compressed CSI Y and sparse dictionary D , it can recover the original CSI H using convex optimization algorithms or greedy algorithms. Although convex optimization algorithms have high precision in CSI reconstruction, they have higher time complexity compared with greedy algorithms [38], which will introduce additional time overhead. Therefore, we choose the OMP algorithm, a type of greedy algorithm, to reconstruct the original CSI. Compared with other greedy algorithms, it is relatively simple and has excellent performance [39], which is shown in Algorithm 2.
Algorithm 2 OMP algorithm.
Input:   Sensing matrix A = Φ D , sampled vector y
Output:   Sparse coefficient vector s
1:
Initialization: s 0 = 0 , r 0 = y , Λ 0 = ϕ , μ 0 = 0 , k = 1
2:
repeat
3:
     μ k 1 = arg max i = 1 , 2 , , N | a i , r k 1 |
4:
     Λ k = Λ k 1 μ k 1
5:
     s k = A Λ k y
6:
     r k = y k A Λ k s k
7:
     k = k + 1
8:
until halting condition true;
9:
return  s = s k
In Algorithm 2, y = h i and A = D j are the inputs to the OMP algorithm. In addition, s k , r k , and Λ k are the sparse coefficient, the residual, and the column index set of the kth iteration, respectively. a , b , · , and · represent the vector inner product, the absolute value, and the matrix pseudo inverse, respectively. For the column index set Λ k 1 , , N , A Λ k is the submatrix of A with indices i Λ k . Here, the halting condition is r k < ε . After the sparse coefficient vector S is obtained, the original CSI can be reconstructed: H = DS .
Through the construction of an overcomplete sparse matrix via KSVD dictionary learning, the KCS algorithm transforms the original CSI data into a sparse representation. This representation retains the essential features necessary for applications such as human behavior recognition. Crucially, an attacker receiving the compressed data and the associated dictionary would find it extremely challenging to reconstruct the original CSI data. The KCS algorithm decomposes the original CSI matrix into a sparse dictionary and sparse coefficients. Without knowledge of the specific dictionary construction process, the sparsity patterns, and the overall compression algorithm, an unauthorized party cannot reverse-engineer the data back to their original form. This is not a form of encryption in the traditional sense, where data are scrambled using cryptographic keys. Instead, it is an algorithm-based security mechanism that is an added value of the KCS algorithm.

4.5. Behavior Recognition

In order to evaluate the efficacy of the CSI compression and reconstruction algorithm, a CNN has been developed for the purpose of behavior recognition in passive sensing. Prior to the input of the reconstructed CSI data into the CNN classifier [40,41,42], it is necessary to undertake preprocessing.
The CSI collected by the wireless network card includes not only the frequency components caused by the movement of torso and limbs but also components such as electromagnetic pulse and burst noise. Due to the slow movement of the human body, the frequency of CSI which can effectively distinguish human behavior is low. The high-frequency components caused by electromagnetic pulse and burst noise will cover or suppress the low-frequency components we need, so it is necessary to filter the original CSI. In this study, the Butterworth low-pass filter is employed for this purpose, with a passband cutoff frequency of
ω c = 2 × π × f F s
where f is the highest frequency of the CSI signal and F s is the sampling frequency. In the experiment, frequency components of the CSI signal above 80 Hz are filtered out. Because the Butterworth low-pass filter’s stopband characteristics may still contain residual noise due to its limited attenuation, a weighted moving average (WMA) is introduced to further deal with it [43]
c s i ^ t = m × c s i ˜ t + ( m 1 ) × c s i ˜ t 1 + + 1 × c s i ˜ t ( m 1 ) m + ( m 1 ) + + 1
where t is the sampling time, m is the size of the sliding window, c s i ˜ i is the signal after low-pass filtering, and c s i ^ i is the signal after WMA filtering.
In order to reduce the irregular fluctuation in the CSI data and enhance the difference between static-state and motion-state CSI data, a first-order difference is applied to the filtered CSI. After applying the first-order difference, the CSI value tends to be stable when there is no action, and it fluctuates significantly when there is action, which is convenient for subsequent data processing. The CSI before and after preprocessing is shown in Figure 5. It can be seen that the preprocessed signal is more conducive to behavior segmentation.

4.6. Classification

In this section, we propose the construction of a CNN for the purpose of behavior recognition. Prior to the input of data into the CNN, it is necessary to extract the initial and final points of the activity. In this instance, the difference in sliding variance of CSI is utilized to extract the initial and final points of CSI activity. Let the CSI sequence be CSI = { c s i ^ 1 , c s i ^ 2 , , c s i ^ L } and c s i ^ i be the ith CSI value in the CSI sequence. The sliding variance can be written as
σ i = j = 1 m ( c s i ^ i + j 1 c s i ^ ¯ ) 2 m
where m is the size of the sliding window, and x ¯ is the mean value of CSI in the sliding window, i.e., c s i ^ ¯ = 1 m j = 1 m c s i ^ j . Algorithm 3 provides the specific process of obtaining the starting and ending points of activities in a CSI sequence.
Algorithm 3 first uses the SV function to compute sliding variance. After obtaining the variance, the starting and ending points of the activity are recorded through threshold comparison. Once the starting and ending points of all activities are obtained, the activity classification model based on CNN will be adopted to classify activities. Here, the CNN is used to avoid complicated feature extraction steps and has strong recognition and classification ability [44,45,46,47], so it is selected as the classifier of our activity classification model. Table 1 shows the network architecture of CNN, where Conv, BN, FM, Pooling, and IReLU stand for the convolution layer, batch normalization, feature maps, the pooling layer, and the activation function, respectively. The input window size was set to 100, and the number of subcarriers and antennas was determined by the wireless network card.
Algorithm 3 Segment algorithm.
Input:  CSI data, sliding window size m, the number of activities N, and the threshold T
Output:   The starting and ending points of activities
  1:
Initialization: j = 1 , i = 1 , P s t a r t = 0 , P e n d = 0
  2:
repeat
  3:
     σ i = SV ( CSI , m )
  4:
    if  P s t a r t ( j ) = 0  then
  5:
         P s t a r t ( j ) = i 10 ( σ i > T )
  6:
    else
  7:
         P e n d ( j ) = i + 10 ( σ i < T )
  8:
    end if
  9:
    if  P s t a r t ( j ) 0 a n d P e n d ( j ) 0  then
10:
         j = j + 1
11:
    end if
12:
     i = i + 1
13:
until  j = N
14:
return  P s t a r t ,   P e n d

5. Implementation

This section presents an evaluation of the performance of the algorithms. The experimental settings and scenarios are introduced first, followed by a comparison of the performance of different algorithms. The impact of the experimental environment is then analyzed.

5.1. Experiment Setup

The ProBox23 mini computer is utilized as both the transmitter and receiver, equipped with an Intel 5300 wireless network card manufacted by Intel from US for the purpose of collecting CSI packets. Concurrently, the RF link system operates in 1 × 3 MIMO mode, with the transmitter being equipped with a single omni-directional antenna and the receiver possessing three such antennas. In order to extract the CSI packets collected by the device, it is also necessary to install the open-source CSI tool. The CSI tool runs on a Linux system (Ubuntu 12.04 LTS) and can set the parameters of the working bandwidth, signal power, packet rate, and working mode between wireless transceiver devices. The specific installation steps can be referenced at http://dhalperi.github.io/linux-80211n-csitool/, accessed on 23 September 2023. In the present experiment, the packet rate was set to 500 packets/s and the transmitter power to 15 dBm. As the indoor environment was full of 2.4 G wireless signals (e.g., Bluetooth, ZigBee), the central frequency was set to 5 GHz to mitigate the risk of packet loss due to signal congestion.

5.2. Experiment Scenarios and Data

The collection of CSI packets was undertaken in two experimental scenarios: one in a meeting room and the other in a classroom. Figure 6 shows the floor plan of the experimental areas in different scenes. During CSI packet collection, the transceivers are hung 1.5 m high and 5 m apart. In each experimental scene, four actions (fall, run, sit, and walk) were recorded from five participants (three males and two females), with each action being recorded 30 times. The experiments were conducted using K-fold cross-validation, where K = 4 , and 66.6% of the collected data were used as the training set and 33.3% as the test set.

5.2.1. Impact of CSI Compression on Different Sparse Dictionaries in CS

We conducted experiments on three different sparse dictionaries: DCT, DFT, and KCS. Figure 7 shows the construction time and average recovery error of the different sparse dictionaries. Although the KCS dictionary increased the calculation time, the KCS dictionary only needed to be transferred once, and the server could reuse the KCS dictionary to recover CSI data in the subsequent sensing process. With the increase in passive sensing time, the overhead of KCS dictionary can be ignored.

5.2.2. Impact of Different Overcomplete Factors

In order to facilitate a comparison of the CSI recovery error of different overcomplete factors, a total of nine configurations from one to five were established, with an interval of 0.5. Figure 8 shows the time overhead and the corresponding average CSI recovery error under different overcomplete factors. As shown in Figure 8, when the overcomplete factor μ increases from 1 to 1.5, the recovery error of KCS decreases from 0.18 to 0.12; when the overcomplete factor μ increases from 1.5 to 5, the recovery error of KCS increases to a certain extent. Although the error decreases when μ = 2.5 or μ = 4 , it is still higher than when μ = 1.5 . In addition, with the increase in the overcomplete factor, the time cost of the algorithm will increase to a certain extent. Therefore, the relatively optimal value of 1.5 is selected as the overcomplete factor in the KCS algorithm.

5.2.3. Impact of Different CSI Compression Algorithms

Here, we compare the recovery error and running time of four different CSI compression algorithms, including KCS, CSIFit, CSIApx, and SVD. As shown in Figure 9, the recovery error of KCS in most cases is very small, with a median of 0.095. Although the running time of the KCS algorithm is higher than that of SVD, our recovery error is less than it in most cases. CSIApx has the lowest time complexity, but its recovery error is the highest. Compared with CSIApx, CSIFit increases the time overhead significantly, but the recovery error is only slightly reduced.

5.2.4. Impact of CSI Compression for Activity Recognition

In order to evaluate the impact of CSI data volume on the performance of a behavior recognition system, the CSI data were input into a CNN classifier both before and after compression. This enabled an assessment to be made of the accuracy of behavior recognition. Figure 10 shows the CSI data volume reduction from 0% (no CSI compression) to 99% (maximum compression of CSI). As shown, the accuracy of the behavior recognition system based on the CNN classifier reaches 94.2% without CSI compression. For the KCS algorithm, when the reduction in CSI data volume is less than 50%, the performance of the system remains almost unchanged. With the further reduction in CSI data volume, the recognition accuracy of the system begins to slow down. Even in the extreme case (99% reduction in CSI data volume), the accuracy of the behavior recognition system still remains higher than 70%. For the other three algorithms, when the CSI data volume begins to decrease, the accuracy of behavior recognition also decreases. In extreme cases, the performance of KCS is about 15.2%, 22.6%, and 33.8% higher than that of CSIFit, SVD, and CSIApx, respectively.

5.2.5. Impact of Different Classification Algorithms

In order to compare the performance of different classification algorithms before and after CSI compression, four common classification algorithms were selected for analysis: CNN, KNN, SVM, and Decision Tree. Figure 11 shows the behavior recognition accuracy of the four algorithms under different CSI data volumes. When the reduction in CSI data volume is from 0% to 70%, the accuracy of any classification algorithm is relatively stable; when the reduction in CSI data volume is from 70% to 90%, the recognition accuracy of algorithm has a slight downward trend. In the most extreme case (99% reduction in CSI data volume), the result shows that the accuracy of any algorithm has a steep drop, which is due to the loss of key information caused by too few measurements. Although the classification algorithm based on CNN has the best performance under different CSI data volumes, the compressed CSI maintains a relatively stable performance under different algorithms; that is, the CSI compression has little impact on the subsequent algorithm classification.

5.2.6. Impact of Different Environment

Figure 12 shows the behavior recognition accuracy under different experimental scenes. The CSI compression algorithm has been demonstrated to function effectively in a variety of scenarios. Furthermore, the efficacy of the algorithm in processing CSI data collected from the meeting room is superior to that collected from the classroom. This is attributable to the fact that the classroom structure is more intricate, the multipath is more abundant, and the collected CSI data contain a greater amount of noise.

6. Conclusions

In recent years, the widespread installation of wireless devices has spurred the development of passive sensing technology, enabling more seamless implicit interactions. This paper focuses on devising a behavior recognition system to reduce the volume of CSI data. Our system can achieve a 70% accuracy in behavior recognition even when the CSI data volume is cut by 99%, effectively alleviating the burden of large-scale CSI data transmission in passive sensing.
The KCS algorithm we proposed serves as a practical solution for data compression and time series analysis in wireless sensing systems. By creating an overcomplete sparse matrix, it improves the sparse representation and compression efficiency. This allows for better data transmission while maintaining the recognition performance of the sensing system, offering useful insights for the application of CSI sensing technology in intelligent environment monitoring, health monitoring, and human–computer interaction.
Nonetheless, our approach has limitations. The KCS algorithm’s performance can be affected by complex wireless environments. High levels of interference or low signal-to-noise ratios may disrupt the construction of the overcomplete sparse matrix, resulting in less ideal compression and a drop-in recognition accuracy. Also, although our system works well for common behaviors, accurately recognizing highly variable and complex realistic behaviors remains a challenge. In terms of deployment, although our solution has potential in many realistic applications, such as smart homes and healthcare monitoring, further research is needed to optimize the algorithms for resource-constrained devices, such as low-power IoT devices. Despite these drawbacks, the KCS algorithm’s unique application of KSVD for CSI data compression and the overall system design offer new ideas for the field. Our work contributes to the ongoing research on CSI-based passive sensing and can potentially lead to further improvements in relevant applications.

Author Contributions

Conceptualization, R.T. and X.Y.; methodology, R.T., P.Z. and X.W.; software, S.Z.; validation, Y.Y., N.G. and X.Y.; formal analysis, K.G.; investigation, R.T. and X.W.; resources, X.Y.; data curation, Y.Y.; writing—original draft preparation, R.T.; writing—review and editing, R.T., P.Z. and N.G.; visualization, S.Z.; supervision, K.G.; project administration, P.Z.; funding acquisition, Y.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62101085, in part by the Science and Technology Research Program of Chongqing Municipal Education Commission Grant KJQN202400647, and in part by the Chongqing Graduate Student Research Innovation Project Grant CYS240401.

Data Availability Statement

Interested researchers can obtain the source code and, subject to compliance with our partner’s confidentiality requirements, access the datasets by contacting the corresponding author.

Conflicts of Interest

Authors Peng Zheng, Shaowei Zhao and Kai Guan were employed by the company Zhongxing Telecommunication Equipment Corporation. Authors Yuan Yao and Ninglun Gu were employed by the company China Mobile Communications Group Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Ma, Y.; Zhou, G.; Wang, S. WiFi Sensing with Channel State Information: A Survey. ACM Comput. Surv. 2019, 52, 9500115. [Google Scholar] [CrossRef]
  2. Tang, C.; Sun, W.; Zhang, X.; Zheng, J.; Li, K.; Liu, J. An Efficient Wi-Fi-Vision Map Construction and Self-Maintenance Method for Indoor Localization. IEEE Trans. Instrum. Meas. 2024, 73, 1–15. [Google Scholar] [CrossRef]
  3. Yu, X.; Li, B.; Chen, J. WiFi-Enabled Gesture Recognition Using Attention-enhanced DenseNet. In Proceedings of the 2024 IEEE/CIC International Conference on Communications in China (ICCC), Hangzhou, China, 7–9 August 2024; pp. 1692–1697. [Google Scholar] [CrossRef]
  4. Jiao, W.; Zhang, C. An Efficient Human Activity Recognition System Using WiFi Channel State Information. IEEE Syst. J. 2023, 17, 6687–6690. [Google Scholar] [CrossRef]
  5. Lin, Y.; Yu, K.; Hao, L.; Wang, J.; Bu, J. An Indoor Wi-Fi Localization Algorithm Using Ranging Model Constructed with Transformed RSSI and BP Neural Network. IEEE Trans. Commun. 2022, 70, 2163–2177. [Google Scholar] [CrossRef]
  6. Muta, O.; Takata, K.; Noguchi, K.; Murakami, T.; Otsuki, S. Device-Free WLAN Based Indoor Localization Scheme with Spatially Concatenated CSI and Distributed Antennas. IEEE Trans. Veh. Technol. 2023, 72, 852–865. [Google Scholar] [CrossRef]
  7. Li, X.; Li, S.; Zhang, D.; Xiong, J.; Wang, Y.; Mei, H. Dynamic-MUSIC: Accurate device-free indoor localization. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Heidelberg, Germany, 12–16 September 2016; UbiComp ’16. pp. 196–207. [Google Scholar] [CrossRef]
  8. Qian, K.; Wu, C.; Yang, Z.; Liu, Y.; Jamieson, K. Widar: Decimeter-Level Passive Tracking via Velocity Monitoring with Commodity Wi-Fi. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Chennai, India, 10–14 July 2017. Mobihoc ’17. [Google Scholar] [CrossRef]
  9. Zhang, T.; Song, T.; Chen, D.; Zhang, T.; Zhuang, J. WiGrus: A Wifi-Based Gesture Recognition System Using Software-Defined Radio. IEEE Access 2019, 7, 131102–131113. [Google Scholar] [CrossRef]
  10. Jang, S.; Han, M. Optimal MTU Selection for Maximizing Goodput in Wireless Networks. In Proceedings of the 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Republic of Korea, 17–19 October 2018; pp. 1525–1527. [Google Scholar] [CrossRef]
  11. Roh, J.; Rao, B. Multiple antenna channels with partial channel state information at the transmitter. IEEE Trans. Wirel. Commun. 2004, 3, 677–688. [Google Scholar] [CrossRef]
  12. Pereira de Figueiredo, F.A. An Overview of Massive MIMO for 5G and 6G. IEEE Lat. Am. Trans. 2022, 20, 931–940. [Google Scholar] [CrossRef]
  13. Roh, J.C.; Rao, B. An efficient feedback method for MIMO systems with slowly time-varying channels. In Proceedings of the 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733), Atlanta, GA, USA, 21–25 March 2004; Volume 2, pp. 760–764. [Google Scholar] [CrossRef]
  14. Chang, J.; Lu, I.T.; Li, Y. Efficient Adaptive Double Codebook Based CSI Prediction for SU/MU MIMO-OFDM Systems. In Proceedings of the 2011 IEEE Global Telecommunications Conference—GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar] [CrossRef]
  15. Mukherjee, A.; Zhang, Z. Channel State Information Compression for MIMO Systems Based on Curve Fitting. In Proceedings of the 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), London, UK, 27–30 June 2016; pp. 1–9. [Google Scholar] [CrossRef]
  16. Mukherjee, A.; Zhang, Z. Fast Compression of OFDM Channel State Information with Constant Frequency Sinusoidal Approximation. In Proceedings of the GLOBECOM 2017—2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar] [CrossRef]
  17. Sharifi, E.; Feghhi, M.M.; Azarnia, G.; Nouri, S.; Lee, D.; Piran, M.J. Channel Estimation Based on Compressed Sensing for Massive MIMO Systems with Lens Antenna Array. IEEE Access 2023, 11, 79016–79032. [Google Scholar] [CrossRef]
  18. Tropp, J.A.; Gilbert, A.C. Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit. IEEE Trans. Inf. Theory 2007, 53, 4655–4666. [Google Scholar] [CrossRef]
  19. Kuo, P.H.; Kung, H.T.; Ting, P.A. Compressive sensing based channel feedback protocols for spatially-correlated massive antenna arrays. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, 1–4 April 2012; pp. 492–497. [Google Scholar] [CrossRef]
  20. Zeng, W.; He, Y.; Li, B.; Wang, S. Sparsity Learning-Based CSI Feedback for FDD Massive MIMO Systems. IEEE Wirel. Commun. Lett. 2021, 10, 585–588. [Google Scholar] [CrossRef]
  21. Rao, X.; Ruan, L.; Lau, V.K.N. CSI Feedback Reduction for MIMO Interference Alignment. IEEE Trans. Signal Process. 2013, 61, 4428–4437. [Google Scholar] [CrossRef]
  22. Hao, D.; Ge, J. An Improved Codebook Design for Precoding in MIMO System. In Proceedings of the 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, 12–17 October 2008; pp. 1–4. [Google Scholar] [CrossRef]
  23. Gil Jiménez, V.P.; Eriksson, T.; García Armada, A.; Fernández-Getino García, M.J.; Ottosson, T.; Svensson, A. Methods for Compression of Feedback in Adaptive Multi-carrier 4G Schemes. Wirel. Pers. Commun. 2008, 47, 101–112. [Google Scholar] [CrossRef]
  24. Luo, C.; Ji, J.; Wang, Q.; Chen, X.; Li, P. Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach. IEEE Trans. Netw. Sci. Eng. 2020, 7, 227–236. [Google Scholar] [CrossRef]
  25. Han, Y.; Lee, J.; Love, D.J. Compressed Sensing-Aided Downlink Channel Training for FDD Massive MIMO Systems. IEEE Trans. Commun. 2017, 65, 2852–2862. [Google Scholar] [CrossRef]
  26. Halperin, D.; Hu, W.; Sheth, A.; Wetherall, D. 802.11 with multiple antennas for dummies. Sigcomm Comput. Commun. Rev. 2010, 40, 19–25. [Google Scholar] [CrossRef]
  27. Gjengset, J.; Xiong, J.; McPhillips, G.; Jamieson, K. Phaser: Enabling Phased Array Signal Processing on Commodity Wi-Fi Access Points. GetMobile Mob. Comput. Commun. 2015, 19, 6–9. [Google Scholar] [CrossRef]
  28. Halperin, D.; Hu, W.; Sheth, A.; Wetherall, D. Predictable 802.11 packet delivery from wireless channel measurements. Sigcomm Comput. Commun. Rev. 2010, 40, 159–170. [Google Scholar] [CrossRef]
  29. Xie, Y.; Li, Z.; Li, M. Precise Power Delay Profiling with Commodity Wi-Fi. IEEE Trans. Mob. Comput. 2019, 18, 1342–1355. [Google Scholar] [CrossRef]
  30. Gringoli, F.; Schulz, M.; Link, J.; Hollick, M. Free Your CSI: A Channel State Information Extraction Platform For Modern Wi-Fi Chipsets. In Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization, Los Cabos, Mexico, 25 October 2019; WiNTECH ’19. pp. 21–28. [Google Scholar] [CrossRef]
  31. Wang, Z.; Guo, B.; Yu, Z.; Zhou, X. Wi-Fi CSI-Based Behavior Recognition: From Signals and Actions to Activities. IEEE Commun. Mag. 2018, 56, 109–115. [Google Scholar] [CrossRef]
  32. Chen, L.; Chen, X.; Ni, L.; Peng, Y.; Fang, D. Human Behavior Recognition Using Wi-Fi CSI: Challenges and Opportunities. IEEE Commun. Mag. 2017, 55, 112–117. [Google Scholar] [CrossRef]
  33. Candes, E.J.; Wakin, M.B. An Introduction To Compressive Sampling. IEEE Signal Process. Mag. 2008, 25, 21–30. [Google Scholar] [CrossRef]
  34. Candès, E. The restricted isometry property and its implications for compressed sensing. Compte Rendus De l’Academie Des Sci. 2008, 346, 589–592. [Google Scholar] [CrossRef]
  35. Xiao, C.; Lei, Y.; Ma, Y.; Zhou, F.; Qin, Z. DeepSeg: Deep-Learning-Based Activity Segmentation Framework for Activity Recognition Using WiFi. IEEE Internet Things J. 2021, 8, 5669–5681. [Google Scholar] [CrossRef]
  36. Qian, K.; Wu, C.; Zhang, Y.; Zhang, G.; Yang, Z.; Liu, Y. Widar2.0: Passive Human Tracking with a Single Wi-Fi Link. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, Munich, Germany, 10–15 June 2018; MobiSys ’18. pp. 350–361. [Google Scholar] [CrossRef]
  37. Candes, E.; Tao, T. Decoding by linear programming. IEEE Trans. Inf. Theory 2005, 51, 4203–4215. [Google Scholar] [CrossRef]
  38. Mohimani, H.; Babaie-Zadeh, M.; Jutten, C. A Fast Approach for Overcomplete Sparse Decomposition Based on Smoothed 0 Norm. IEEE Trans. Signal Process. 2009, 57, 289–301. [Google Scholar] [CrossRef]
  39. Cai, T.T.; Wang, L. Orthogonal Matching Pursuit for Sparse Signal Recovery with Noise. IEEE Trans. Inf. Theory 2011, 57, 4680–4688. [Google Scholar] [CrossRef]
  40. Liu, H.; Zhang, C.; Deng, Y.; Liu, T.; Zhang, Z.; Li, Y.F. Orientation Cues-Aware Facial Relationship Representation for Head Pose Estimation via Transformer. IEEE Trans. Image Process. 2023, 32, 6289–6302. [Google Scholar] [CrossRef]
  41. Liu, H.; Zhang, C.; Deng, Y.; Xie, B.; Liu, T.; Li, Y.F. TransIFC: Invariant Cues-Aware Feature Concentration Learning for Efficient Fine-Grained Bird Image Classification. IEEE Trans. Multimed. 2025, 27, 1677–1690. [Google Scholar] [CrossRef]
  42. Liu, H.; Zhou, Q.; Zhang, C.; Zhu, J.; Liu, T.; Zhang, Z.; Li, Y.F. MMATrans: Muscle Movement Aware Representation Learning for Facial Expression Recognition via Transformers. IEEE Trans. Ind. Inform. 2024, 20, 13753–13764. [Google Scholar] [CrossRef]
  43. Guo, L.; Wang, L.; Liu, J.; Zhou, W.; Lu, B.; Zhang, K. HuAc: Human Activity Recognition Using Crowdsourced WiFi Signals and Skeleton Data. Wirel. Commun. Mob. Comput. 2018, 2018, 6163475. [Google Scholar] [CrossRef]
  44. Albawi, S.; Mohammed, T.A.; Al-Zawi, S. Understanding of a convolutional neural network. In Proceedings of the 2017 International Conference on Engineering and Technology (ICET), Antalya, Turkey, 21–23 August 2017; pp. 1–6. [Google Scholar] [CrossRef]
  45. Liu, T.; Liu, H.; Yang, B.; Zhang, Z. LDCNet: Limb Direction Cues-Aware Network for Flexible HPE in Industrial Behavioral Biometrics Systems. IEEE Trans. Ind. Inform. 2024, 20, 8068–8078. [Google Scholar] [CrossRef]
  46. Liu, H.; Liu, T.; Chen, Y.; Zhang, Z.; Li, Y.F. EHPE: Skeleton Cues-Based Gaussian Coordinate Encoding for Efficient Human Pose Estimation. IEEE Trans. Multimed. 2024, 26, 8464–8475. [Google Scholar] [CrossRef]
  47. Liu, H.; Liu, T.; Zhang, Z.; Sangaiah, A.K.; Yang, B.; Li, Y. ARHPE: Asymmetric Relation-Aware Representation Learning for Head Pose Estimation in Industrial Human–Computer Interaction. IEEE Trans. Ind. Inform. 2022, 18, 7107–7117. [Google Scholar] [CrossRef]
Figure 1. CSI data transmission network.
Figure 1. CSI data transmission network.
Electronics 14 01727 g001
Figure 2. The format of the CSI packet.
Figure 2. The format of the CSI packet.
Electronics 14 01727 g002
Figure 3. System architecture.
Figure 3. System architecture.
Electronics 14 01727 g003
Figure 4. Sparse representation.
Figure 4. Sparse representation.
Electronics 14 01727 g004
Figure 5. (a) The original CSI for time series. (b) The preprocessed CSI for time series.
Figure 5. (a) The original CSI for time series. (b) The preprocessed CSI for time series.
Electronics 14 01727 g005
Figure 6. Floor plan of the experimental areas. (a) Meeting room. (b) Classroom.
Figure 6. Floor plan of the experimental areas. (a) Meeting room. (b) Classroom.
Electronics 14 01727 g006
Figure 7. Sparse representation.
Figure 7. Sparse representation.
Electronics 14 01727 g007
Figure 8. Impact of different overcomplete factors.
Figure 8. Impact of different overcomplete factors.
Electronics 14 01727 g008
Figure 9. The CSI recovery error and time cost. (a) CSI recovery error. (b) Time cost.
Figure 9. The CSI recovery error and time cost. (a) CSI recovery error. (b) Time cost.
Electronics 14 01727 g009
Figure 10. Impact of different CSI compression.
Figure 10. Impact of different CSI compression.
Electronics 14 01727 g010
Figure 11. Impact of CSI compression on different classification algorithms. (a) Decision Tree. (b) SVM. (c) KNN. (d) CNN.
Figure 11. Impact of CSI compression on different classification algorithms. (a) Decision Tree. (b) SVM. (c) KNN. (d) CNN.
Electronics 14 01727 g011
Figure 12. Impact of different environments.
Figure 12. Impact of different environments.
Electronics 14 01727 g012
Table 1. Network architecture of CNN.
Table 1. Network architecture of CNN.
No.OperationConfiguration
1Input100 × 30 × 3 (window × subcarriers × antennas)
2Dropout0.3
3ConvKernel = 3 × 3 Stride = 1 × 1 FM = 32 BN IReLU
4ConvKernel = 3 × 3 Stride = 1 × 1 FM = 32 BN IReLU
5Dropout0.3
6PoolingKernel = 2 × 2 Stride = 2 × 2 averagePooling
7ConvKernel = 3 × 3 Stride = 4 × 2 FM = 64 BN IReLU
8ConvKernel = 3 × 3 Stride = 4 × 2 FM = 64 BN IReLU
9Dropout0.5
10PoolingKernel = 2 × 2 Stride = 2 × 2 averagePooling
11ConvKernel = 3 × 3 Stride = 4 × 2 FM = 128 BN IReLU
12ConvKernel = 3 × 3 Stride = 4 × 2 FM = 128 BN IReLU
13Fc10
14Fc4
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tong, R.; Zheng, P.; Yao, Y.; Gu, N.; Zhao, S.; Guan, K.; Wang, X.; Yang, X. Efficient Transmission-Based Human Behavior Recognition Algorithm. Electronics 2025, 14, 1727. https://doi.org/10.3390/electronics14091727

AMA Style

Tong R, Zheng P, Yao Y, Gu N, Zhao S, Guan K, Wang X, Yang X. Efficient Transmission-Based Human Behavior Recognition Algorithm. Electronics. 2025; 14(9):1727. https://doi.org/10.3390/electronics14091727

Chicago/Turabian Style

Tong, Ruixuan, Peng Zheng, Yuan Yao, Ninglun Gu, Shaowei Zhao, Kai Guan, Xiaolong Wang, and Xiaolong Yang. 2025. "Efficient Transmission-Based Human Behavior Recognition Algorithm" Electronics 14, no. 9: 1727. https://doi.org/10.3390/electronics14091727

APA Style

Tong, R., Zheng, P., Yao, Y., Gu, N., Zhao, S., Guan, K., Wang, X., & Yang, X. (2025). Efficient Transmission-Based Human Behavior Recognition Algorithm. Electronics, 14(9), 1727. https://doi.org/10.3390/electronics14091727

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop