Want to create interactive content? It’s easy in Genially!

Get started free

How does DenseTrack work?

Joey TANG

Created on February 14, 2025

Start designing with a free template

Discover more than 1500 professional designs like these:

Project Roadmap Timeline

Step-by-Step Timeline: How to Develop an Idea

Artificial Intelligence History Timeline

Museum Escape Room

Momentum: Onboarding Presentation

Urban Illustrated Presentation

3D Corporate Reporting

Transcript

Click on the blue buttons to find out more!

What is DenseTrack?

Tracking Suspicious Individuals

Safety and Evacuation

How does DenseTrack work?

Leveraging Existing Infrastructure

Wi-Fi for Unique Identification

Video for Location

Combining Wi-Fi and Video

Addressing Wi-Fi Limitations

CAIVU Algorithm

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.
Wi-Fi for Unique Identification

Wi-Fi MAC addresses are used as unique identifiers for devices. Even with MAC address randomisation, a connected MAC address persists long enough for tracking within a building.

Video for Location

Computer vision algorithms analyse video data to detect and locate people in each camera's view.

Leveraging Existing Infrastructure

DenseTrack uses Wi-Fi signals from existing enterprise network deployments and video from surveillance cameras.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.
Wi-Fi for Unique Identification

Wi-Fi MAC addresses are used as unique identifiers for devices. Even with MAC address randomisation, a connected MAC address persists long enough for tracking within a building.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.
Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

Wi-Fi for Unique Identification

Wi-Fi MAC addresses are used as unique identifiers for devices. Even with MAC address randomisation, a connected MAC address persists long enough for tracking within a building.
CAIVU Algorithm

The "inCremental Association of Independent Variables under Uncertainty" (CAIVU) algorithm is at the heart of DenseTrack. It's inspired by the multi-armed bandit model and is designed to handle the uncertainties and complexities of real-world environments.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Addressing Wi-Fi Limitations

Wi-Fi localisation is not accurate in dense environments due to interference and multipath effects. DenseTrack uses Wi-Fi as a coarse indicator of presence rather than relying on precise Wi-Fi-based location.
CAIVU Algorithm

The "inCremental Association of Independent Variables under Uncertainty" (CAIVU) algorithm is at the heart of DenseTrack. It's inspired by the multi-armed bandit model and is designed to handle the uncertainties and complexities of real-world environments.

Leveraging Existing Infrastructure

DenseTrack uses Wi-Fi signals from existing enterprise network deployments and video from surveillance cameras.

Leveraging Existing Infrastructure

DenseTrack uses Wi-Fi signals from existing enterprise network deployments and video from surveillance cameras.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Combining Wi-Fi and Video

The core idea is to match Wi-Fi MAC addresses to the video blobs. This combines the unique identification capability of Wi-Fi with the location information from video.

Combining Wi-Fi and Video

The core idea is to match Wi-Fi MAC addresses to the video blobs. This combines the unique identification capability of Wi-Fi with the location information from video.

Combining Wi-Fi and Video

The core idea is to match Wi-Fi MAC addresses to the video blobs. This combines the unique identification capability of Wi-Fi with the location information from video.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.
Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Wi-Fi for Unique Identification

Wi-Fi MAC addresses are used as unique identifiers for devices. Even with MAC address randomisation, a connected MAC address persists long enough for tracking within a building.
Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.
Wi-Fi for Unique Identification

Wi-Fi MAC addresses are used as unique identifiers for devices. Even with MAC address randomisation, a connected MAC address persists long enough for tracking within a building.

Addressing Wi-Fi Limitations

Wi-Fi localisation is not accurate in dense environments due to interference and multipath effects. DenseTrack uses Wi-Fi as a coarse indicator of presence rather than relying on precise Wi-Fi-based location.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.
Addressing Wi-Fi Limitations

Wi-Fi localisation is not accurate in dense environments due to interference and multipath effects. DenseTrack uses Wi-Fi as a coarse indicator of presence rather than relying on precise Wi-Fi-based location.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Video for Location

Computer vision algorithms analyse video data to detect and locate people in each camera's view.
Combining Wi-Fi and Video

The core idea is to match Wi-Fi MAC addresses to the video blobs. This combines the unique identification capability of Wi-Fi with the location information from video.

CAIVU Algorithm

The "inCremental Association of Independent Variables under Uncertainty" (CAIVU) algorithm is at the heart of DenseTrack. It's inspired by the multi-armed bandit model and is designed to handle the uncertainties and complexities of real-world environments.

Leveraging Existing Infrastructure

DenseTrack uses Wi-Fi signals from existing enterprise network deployments and video from surveillance cameras.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.
Addressing Wi-Fi Limitations

Wi-Fi localisation is not accurate in dense environments due to interference and multipath effects. DenseTrack uses Wi-Fi as a coarse indicator of presence rather than relying on precise Wi-Fi-based location.

Combining Wi-Fi and Video

The core idea is to match Wi-Fi MAC addresses to the video blobs. This combines the unique identification capability of Wi-Fi with the location information from video.
CAIVU Algorithm

The "inCremental Association of Independent Variables under Uncertainty" (CAIVU) algorithm is at the heart of DenseTrack. It's inspired by the multi-armed bandit model and is designed to handle the uncertainties and complexities of real-world environments.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

Addressing Wi-Fi Limitations

Wi-Fi localisation is not accurate in dense environments due to interference and multipath effects. DenseTrack uses Wi-Fi as a coarse indicator of presence rather than relying on precise Wi-Fi-based location.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Leveraging Existing Infrastructure

DenseTrack uses Wi-Fi signals from existing enterprise network deployments and video from surveillance cameras.

Combining Wi-Fi and Video

The core idea is to match Wi-Fi MAC addresses to the video blobs. This combines the unique identification capability of Wi-Fi with the location information from video.

CAIVU Algorithm

The "inCremental Association of Independent Variables under Uncertainty" (CAIVU) algorithm is at the heart of DenseTrack. It's inspired by the multi-armed bandit model and is designed to handle the uncertainties and complexities of real-world environments.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.
Leveraging Existing Infrastructure

DenseTrack uses Wi-Fi signals from existing enterprise network deployments and video from surveillance cameras.

Video for Location

Computer vision algorithms analyse video data to detect and locate people in each camera's view.

Safety and Evacuation

If you need to evacuate certain areas, you can identify the whereabouts of people inside the building and lead them to safety.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.
Addressing Wi-Fi Limitations

Wi-Fi localisation is not accurate in dense environments due to interference and multipath effects. DenseTrack uses Wi-Fi as a coarse indicator of presence rather than relying on precise Wi-Fi-based location.

Video for Location

Computer vision algorithms analyse video data to detect and locate people in each camera's view.
Video for Location

Computer vision algorithms analyse video data to detect and locate people in each camera's view.

Video for Location

Computer vision algorithms analyse video data to detect and locate people in each camera's view.

Tracking Suspicious Individuals

If security gets a report that somebody on level one was showing suspicious behaviour, they can figure out where they are in the building immediately and don't have to send people everywhere and cause panic.

CAIVU Algorithm

The "inCremental Association of Independent Variables under Uncertainty" (CAIVU) algorithm is at the heart of DenseTrack. It's inspired by the multi-armed bandit model and is designed to handle the uncertainties and complexities of real-world environments.
Wi-Fi for Unique Identification

Wi-Fi MAC addresses are used as unique identifiers for devices. Even with MAC address randomisation, a connected MAC address persists long enough for tracking within a building.