Sixthsence rfid based enterprise intelligence
This presentation is the property of its rightful owner.
Sponsored Links
1 / 28

SixthSence:RFID -based Enterprise Intelligence PowerPoint PPT Presentation


  • 76 Views
  • Uploaded on
  • Presentation posted in: General

SixthSence:RFID -based Enterprise Intelligence. HELEN. Outline. RFID Equipment RFID PERFORMANCE MEASUREMENT Algorithms Evaluation Application. RFID Equipment. The Impinj UHF Gen 2 Speedway Reader Impinj's Monza RFID tag. RFID PERFORMANCE MEASUREMENT.

Download Presentation

SixthSence:RFID -based Enterprise Intelligence

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Sixthsence rfid based enterprise intelligence

SixthSence:RFID-based Enterprise Intelligence

HELEN


Outline

Outline

  • RFID Equipment

  • RFID PERFORMANCE MEASUREMENT

  • Algorithms

  • Evaluation

  • Application


Rfid equipment

RFID Equipment

  • The Impinj UHF Gen 2 Speedway Reader

  • Impinj's Monza RFID tag


Rfid performance measurement

RFID PERFORMANCE MEASUREMENT


Effect of displacement from antenna axis on read range

Effect of displacement from antenna axis on read range

  • Tag move away from the antenna axis the read range decreases


Effect of distance from antenna on allowed displacement from axis

Effect of distance from antenna on allowed displacement from axis

  • The tag moves farther from antenna , the allowed displacement from

    axis also increases

    proportionally


Read range for tags on object carried by a person

Read range for tags on object carried by a person


Algorithms

Algorithms

  • Person-object differentiation

  • Object ownership

  • Zone identification

  • Person identification


Tag belong to person or object

Tag belong to person or object?

Object move only when carried by a person

transition=?

Define a suitable threshold person


Problem

Problem?

  • An object belong to an active person might well exhibit far more movement than a sedentary

    >


Co movement

Co-movement

  • The movement of a tag is compare with the movement of other tags at the same point


Sixthsence rfid based enterprise intelligence

tag1

m1=1 C1=1

Tag0

tag1

Tag2,m2=2,

C2=2

tag2


Object ownership

Object ownership

borrow

confuse


Co presence

Co-presence

  • For each object , we simply keep track of the amount time .


Zone identification

Zone identification

  • Individual workspace

  • Shared workspace

  • Reserved shared workspace

  • Common area


Person identification

Person identification

Logging

  • Tag id of person person identity

1

2

1

1

1


Object interaction

Object interaction

  • If environment is stable , the RSSI from the tag would also be stable

  • If object is picked up , this would change its distance and its orientation ,thereby causing the RSSI of its tag change

  • Differ at least 10 dBm interacted


Evaluation movement detection

Evaluation movement detection

  • ……………

    100

tag

tag


Object interaction detection

Object interaction detection

Sample every 200 ms

4 second window 20 samples6-7 times

antenna

antenna


Stability

Stability


Test bed deployment

Test bed deployment

  • …………..

  • 1 2 3 …………… 20

  • x 20 10% go x 4 (pick at random)


Movement with walk length of 10

Movement with walk length of 10


Movement with walk length of 2

Movement with walk length of 2


Application

Application

  • Misplaced object alert

  • Annotated video

  • Automatic conference room booking

  • Semi-automated image catalog


  • Login