SlideShare a Scribd company logo
1 of 28
RFID based localizationA presentation for the course: ELT-46206 Signal Processing for Mobile Positioning
Mehjabin Sultana,
Gourab Datta,
Jarno Salonen
Definition of the topic
Technology and standards
Methods / Algorithms used
● Multilateration
● Bayesian inference
● Nearest neighbor
● Proximity
Targets of application / demos
● 3 demo cases
Discussion on challenges
Conclusion
Outline
Radio-Frequency IDentification (RFID) is a generic term for technologies
that use radio waves for automatic identification of objects and/or people.
RFID localization basics: RFID reader and tag(s)
Definition of the topic
Uses algorithms very similar to WLAN localization, main differences:
● signal strength as indicator of distance (WLAN: time-of-arrival)
● easiness of deployment as RFID tags are portable
Tags can be either active, passive or semi-passive
● Active tags with on-board batteries provide a range of <100m
● Passive tags are less expensive, but provide a range of only <2m
(LF/HF) or <6m (UHF)
● Semi-passive tags use internal battery to enhance the broadcasting
signal strength, range comparable to active tags
● Active tags don’t need reader initialization, (semi-)passive ones do
Typical targets of application: healthcare, transport and logistics,
Automated Guided Vehicles (AGV)
Definition of the topic (cont.)
Frequencies used by RFID and their target application areas:
● LF (inductive coupling): 125 kHz-134 kHz
o ISO 11784/5 and ISO 14223: animal tracking
● HF (inductive coupling): 13,56 MHz
o ISO 15693: retail and item-level logistics, pharmaceutical item tracking, patient
tracking in hospitals
● UHF (electromagnetic coupling): 965-928 MHz
o ISO 18000-6a and b: tracking of goods with high density of tags
o ISO 18000-7: indoor and outdoor Real Time Location Systems
● Microwaves (electromagnetic coupling): 2,4 GHz (unlicensed ISM)
o ISO 24730-21 (incl. IEEE 802.11): WiFi-based localization among others in
healthcare (patient tracking), other uses where WiFi interoperability is needed
Technology and standards
•The biggest challenge for RFID localization is how to mathematically
model the variation of the RF signals in space.
•Friis transmission equation -
•Other methods such as statistical analysis are developed to calibrate the
relationship between signal strength and distance as this formula doesn’t do the job
done properly.
Methods/algorithms used
•Multilateration estimates the coordinates of the target node from the distances
between the target node and the reference nodes with known coordinates.If there
are n reference nodes Rk, k = 1,2,...,n with known coordinates (xk, yk), and the
distances between the target node, T, with unknown coordinates (x, y) and reference
nodes are estimated to be rk, k = 1,2,...,n we can obtain
•r1
2 = (x − x1)2 +(y − y1)2
•r2
2 = (x − x2)2 +(y − y2)2,
• rn
2 = (x − xn)2 +(y − yn)2
•
Multilateration
Typical methods to solve multilateration equations:
Normal equations
QR-factorization
Singular-value
Decomposition
•Multilateration is a mature algorithm which is easy to code and requires
less computation effort.
•That’s why, it is being widely used in many localization studies
Multilateration (Cont...)
•Bayesian inference is a method of inference in which Bayes' rule is used
to update the probability estimate for a hypothesis as additional evidence
is acquired.
•The basic principle for localizing a stationary target by Bayesian inference
can be represented by Fig.
•According to Bayesian Rule, the position of the target
node can be obtained by the following
recursive equation,
P((x, y)|s1, s2, . . . , sn) = αP(sn|(x, y))
×P((x, y)|s1, s2, . . . , sn−1)
Bayesian inference
where α is a normalizing factor to ensure the sum of posterior probability
P((x, y)|s1, s2, . . . , sn) to be one, and P(sn|(x, y)) calculates the probability
of signal strength given the location of the target node.
•One of the unique advantages of Bayesian inference is that it can update
the target’s location from the dynamical data of signal strength. This
property makes this method effective in localizing mobile targets, such as
the AGVs in manufacturing facilities.
Bayesian inference (Cont...)
•The closer two points, the smaller the difference between the signal
strengths of the two points->an object can be localized by its neighbors.
•The coordinates of the target point, (x, y), can be obtained by the equation:
•where xi , yi, wi = coordinates, i = 1, 2, . . . , k= weights; and k is the
number of nearest neighbors.
•
Nearest neighbor
•This method avoids the signal propagation estimation, and it is suitable for
the complex non-isotropic environments and it is not sensitive to the
variation of application environments
•Successfully used for localization in some applications such as health care
systems
Nearest neighbor (Cont..)
Proximity method uses the approximate communication area to detect whether the target node is
in a region or not.
ürequires less computation than Bayesian inference
ü positioning accuracy is usually poorer
1.An RFID tag is to be localized by a mobile reader
2.The localization area is partitioned into n ×n
square cells ,each cell located at the coordinates (i, j ) 0
≤ i, j ≤ n−1
1.The communication area of the reader can be approximated by a square composed of 2k ×2k
cells.
2. If the reader detects the tag at m known positions, (xr , yr ), r = 1, . . . ,m, at each position the
communication area is a union of cells (xr − k, xr + k − 1) × (yr − k, yr + k − 1).
3.The location of the tag can then be estimated by computing the centroid of this intersection of
communication areas.
Proximity
Can be used in :
•Construction site
•Localization in Wireless sensor network
Proximity (Cont..)
Three demo cases in which RFID localization is used in different ways
1. Indoor localization of a person using active RFID tags
2. Indoor localization system using passive RFID technology
3. Practical use case of using active RFID localization in a restaurant
Targets of application
Video Demonstration:
Case 1: Indoor localization of a person with active
RFID tags (1)
Description of the Video:
● The Left section of the video shows Probability Density
Function (PDF) of the position of the person.
● The Right section of the video shows True trajectory (green)
and estimated trajectory (black) of the person.
Case 1: Indoor localization of a person with active
RFID tags (2)
How the system works:
● An RF reader is carried by the mobile user.
● A number of active RFID tags are distributed at known positions which
regularly emit RF signals with an identification code.
● Upon reception of a signal, the range of the user to the corresponding
tag is estimated indirectly from the received signal strength (RSSI),
using a previously obtained statistical model. A computationally
efficient Bayesian localization method (particle filter) is used to process
the measurements and produce an estimation of the user’s position.
Case 1: Indoor localization of a person with active
RFID tags (3)
Analysis of the system:
● The best approximation was obtained when the route passed entirely
through the common hall. Although measurements from tags in the
other rooms are considered nonetheless.
● When the route goes through several rooms, the positioning error often
increases. This is caused by the change between rooms and also by a
relatively lower tag density in the corridor.
● However, even with lower precision, the trajectory of the user between
rooms was traced without problems.
Ref: http://lopsi.weebly.com/publications.html
Case 1: Indoor localization of a person with active
RFID tags (4)
Video Demonstration:
Case 2: Indoor location system based on passive
RFID technology (1)
Description of the system:
● The video shows tracking of autonomous robots within a closed
environment based on passive RFID technology.
How the system works:
● Robot Lego Mindstorm NXT carrying a PDA that supports Wi-Fi
connection.
Case 2: Indoor location system based on passive
RFID technology (2)
How the system works (contd.):
● Sensing surfaces, divided into a grid of small squared surfaces or locations
units with passive RFID tags, where each tag represents a location unit with
unique identifier.
● PDA hp iPAQ 2940x with a passive RFID reader (HF-13.56 MHz) which reads
tags from the sensing surface and retrieves the location unit identification code.
● Localization manager receives the IDs of the entity location from the PDA,
maps the physical ID to a virtual map position and shows the entity locations to
the final user in the map presentation screen.
Case 2: Indoor location system based on passive
RFID technology (3)
Practical Feasibility Analysis:
● One of the lacks of the system is the capability of being wearable, because
readers must be near the sensing surface. However, the release of RFID reader
chips by INTEL (R1000) and Samsung may set a tendency of RFID to be
present in everyday applications.
● The cost of maintenance and infrastructure is low because there is no necessity
to use any special device apart from the PDA and RFID reader. On the other
hand, setup and installation costs are almost irrelevant considering low cost of
passive RFID tags.
● As passive RFID does not require external power supply, the cost of power is
negligible.
Ref: Youtube Link ; Article
Case 2: Indoor location system based on passive
RFID technology (4)
Scenario:
● A tag given to the customer is used to locate the customer later in the
restaurant in order to deliver the portion (steak, burger, etc.)
Problem:
● In a restaurant for 350+ customers, the customer is not easy to find
Solution:
● Add an active rfid transponder to the tag, equip the restaurant with
readers and a location system for finding the customer
● Method: proximity (signal strength/reader)
Result:
● Reduce the time to find the customer to less than half
Case 3: RFID localization in practice (1)
Case 3: RFID localization in practice (2)
Case 3: RFID localization in practice (3)
Major challenge with active tags is battery lifetime.
● Lifetime of up to 5 years can be reached, depending on use
Challenge with passive tags is the small reading distance
● Price of individual tags is low
Other issues
● Interference (multiple tag responses, multiple reader queries, reader signal power, non-
conductive materials such as metal or glass)
● Multipath propagation
● Require more reliability, availability and precision
o Therefore hybrid technology system will be the optimum solution.
● Since no single positioning technology provides all requirements, some researchers are
already working on the combination system like Wireless LAN and RFID
● Privacy (when the number of RFID tags around us increases)
Discussion on challenges
RFID localization basics: RFID reader + tags + application = localization
● Active tags are self-powered and have a significantly good read range
● Passive tags are low-cost and have a shorter (<6m) read range
● Semi-passive tags have a power source for enhancing signal strength
Methods and algorithms
● Multilateration, Bayesian inference
● Nearest neighbor, Proximity
Usage mostly indoor
● Localization of patients, assets, etc.
Challenges
● Tag issues such as battery lifetime, short read range
● Requires WiFi/LAN to be more efficient
Conclusions

More Related Content

What's hot

Active rfid trilateration for indoor positioning
Active rfid trilateration for indoor positioningActive rfid trilateration for indoor positioning
Active rfid trilateration for indoor positioningJOSE ESPEJO VASQUEZ
 
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...IJMER
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationambitlick
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...eSAT Journals
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos basedeSAT Publishing House
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
 
20080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture0320080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture03Computer Science Club
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewEditor IJCATR
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 
1103.0305
1103.03051103.0305
1103.0305nk179
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 

What's hot (18)

Active rfid trilateration for indoor positioning
Active rfid trilateration for indoor positioningActive rfid trilateration for indoor positioning
Active rfid trilateration for indoor positioning
 
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimation
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...A multilevel security scheme using chaos based encryption and steganography f...
A multilevel security scheme using chaos based encryption and steganography f...
 
A multilevel security scheme using chaos based
A multilevel security scheme using chaos basedA multilevel security scheme using chaos based
A multilevel security scheme using chaos based
 
Ai25204209
Ai25204209Ai25204209
Ai25204209
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
 
20080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture0320080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture03
 
311 314
311 314311 314
311 314
 
Digital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief ReviewDigital Watermarking Applications and Techniques: A Brief Review
Digital Watermarking Applications and Techniques: A Brief Review
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
1103.0305
1103.03051103.0305
1103.0305
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
37 44
37 4437 44
37 44
 

Similar to Rfid based localization

Wireless Indoor Localization with Dempster-Shafer Simple Support Functions
Wireless Indoor Localization with Dempster-Shafer Simple Support FunctionsWireless Indoor Localization with Dempster-Shafer Simple Support Functions
Wireless Indoor Localization with Dempster-Shafer Simple Support FunctionsVladimir Kulyukin
 
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s Needle
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s NeedleSurface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s Needle
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s NeedleVladimir Kulyukin
 
IRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following RobotIRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following RobotIRJET Journal
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESijassn
 
Indoor localization using wifi fingerprinting
Indoor localization using wifi fingerprintingIndoor localization using wifi fingerprinting
Indoor localization using wifi fingerprintingChaitali Bose Roy
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...
DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...
DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...VLSICS Design
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in MallsIRJET Journal
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliabilitynikhiltiware
 
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Eswar Publications
 
Location estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingLocation estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingHanumesh Palla
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsTELKOMNIKA JOURNAL
 
Temporal Contrast Vision Sensor
Temporal Contrast Vision SensorTemporal Contrast Vision Sensor
Temporal Contrast Vision SensorNisarg Shah
 
Data_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsData_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsAlchazidis Nikolas
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...iosrjce
 

Similar to Rfid based localization (20)

Wireless Indoor Localization with Dempster-Shafer Simple Support Functions
Wireless Indoor Localization with Dempster-Shafer Simple Support FunctionsWireless Indoor Localization with Dempster-Shafer Simple Support Functions
Wireless Indoor Localization with Dempster-Shafer Simple Support Functions
 
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s Needle
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s NeedleSurface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s Needle
Surface-Embedded Passive RF Exteroception: Kepler, Greed, and Buffon’s Needle
 
IRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following RobotIRJET- Survey Paper on Human Following Robot
IRJET- Survey Paper on Human Following Robot
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
F04 3-3944
F04 3-3944F04 3-3944
F04 3-3944
 
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUESIOT-WSN: SURVEY ON POSITIONING TECHNIQUES
IOT-WSN: SURVEY ON POSITIONING TECHNIQUES
 
Indoor localization using wifi fingerprinting
Indoor localization using wifi fingerprintingIndoor localization using wifi fingerprinting
Indoor localization using wifi fingerprinting
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...
DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...
DESIGN AND VLSIIMPLEMENTATION OF ANTICOLLISION ENABLED ROBOT PROCESSOR USING ...
 
IRJET- Personal Assistant for Visually Impaired People in Malls
IRJET-  	  Personal Assistant for Visually Impaired People in MallsIRJET-  	  Personal Assistant for Visually Impaired People in Malls
IRJET- Personal Assistant for Visually Impaired People in Malls
 
07.dsn.rfid reliability
07.dsn.rfid reliability07.dsn.rfid reliability
07.dsn.rfid reliability
 
Indoor Tracking System
Indoor Tracking SystemIndoor Tracking System
Indoor Tracking System
 
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...
 
Location estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprintingLocation estimation in zig bee network based on fingerprinting
Location estimation in zig bee network based on fingerprinting
 
The Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement IndoorsThe Locator Framework for Detecting Movement Indoors
The Locator Framework for Detecting Movement Indoors
 
Temporal Contrast Vision Sensor
Temporal Contrast Vision SensorTemporal Contrast Vision Sensor
Temporal Contrast Vision Sensor
 
Data_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_SystemsData_Integrity_in_RFID_Systems
Data_Integrity_in_RFID_Systems
 
43 97-101
43 97-10143 97-101
43 97-101
 
J017345864
J017345864J017345864
J017345864
 
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
A Novel Three-Dimensional Adaptive Localization (T-Dial) Algorithm for Wirele...
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Rfid based localization

  • 1. RFID based localizationA presentation for the course: ELT-46206 Signal Processing for Mobile Positioning Mehjabin Sultana, Gourab Datta, Jarno Salonen
  • 2. Definition of the topic Technology and standards Methods / Algorithms used ● Multilateration ● Bayesian inference ● Nearest neighbor ● Proximity Targets of application / demos ● 3 demo cases Discussion on challenges Conclusion Outline
  • 3. Radio-Frequency IDentification (RFID) is a generic term for technologies that use radio waves for automatic identification of objects and/or people. RFID localization basics: RFID reader and tag(s) Definition of the topic
  • 4. Uses algorithms very similar to WLAN localization, main differences: ● signal strength as indicator of distance (WLAN: time-of-arrival) ● easiness of deployment as RFID tags are portable Tags can be either active, passive or semi-passive ● Active tags with on-board batteries provide a range of <100m ● Passive tags are less expensive, but provide a range of only <2m (LF/HF) or <6m (UHF) ● Semi-passive tags use internal battery to enhance the broadcasting signal strength, range comparable to active tags ● Active tags don’t need reader initialization, (semi-)passive ones do Typical targets of application: healthcare, transport and logistics, Automated Guided Vehicles (AGV) Definition of the topic (cont.)
  • 5. Frequencies used by RFID and their target application areas: ● LF (inductive coupling): 125 kHz-134 kHz o ISO 11784/5 and ISO 14223: animal tracking ● HF (inductive coupling): 13,56 MHz o ISO 15693: retail and item-level logistics, pharmaceutical item tracking, patient tracking in hospitals ● UHF (electromagnetic coupling): 965-928 MHz o ISO 18000-6a and b: tracking of goods with high density of tags o ISO 18000-7: indoor and outdoor Real Time Location Systems ● Microwaves (electromagnetic coupling): 2,4 GHz (unlicensed ISM) o ISO 24730-21 (incl. IEEE 802.11): WiFi-based localization among others in healthcare (patient tracking), other uses where WiFi interoperability is needed Technology and standards
  • 6. •The biggest challenge for RFID localization is how to mathematically model the variation of the RF signals in space. •Friis transmission equation - •Other methods such as statistical analysis are developed to calibrate the relationship between signal strength and distance as this formula doesn’t do the job done properly. Methods/algorithms used
  • 7. •Multilateration estimates the coordinates of the target node from the distances between the target node and the reference nodes with known coordinates.If there are n reference nodes Rk, k = 1,2,...,n with known coordinates (xk, yk), and the distances between the target node, T, with unknown coordinates (x, y) and reference nodes are estimated to be rk, k = 1,2,...,n we can obtain •r1 2 = (x − x1)2 +(y − y1)2 •r2 2 = (x − x2)2 +(y − y2)2, • rn 2 = (x − xn)2 +(y − yn)2 • Multilateration
  • 8. Typical methods to solve multilateration equations: Normal equations QR-factorization Singular-value Decomposition •Multilateration is a mature algorithm which is easy to code and requires less computation effort. •That’s why, it is being widely used in many localization studies Multilateration (Cont...)
  • 9. •Bayesian inference is a method of inference in which Bayes' rule is used to update the probability estimate for a hypothesis as additional evidence is acquired. •The basic principle for localizing a stationary target by Bayesian inference can be represented by Fig. •According to Bayesian Rule, the position of the target node can be obtained by the following recursive equation, P((x, y)|s1, s2, . . . , sn) = αP(sn|(x, y)) ×P((x, y)|s1, s2, . . . , sn−1) Bayesian inference
  • 10. where α is a normalizing factor to ensure the sum of posterior probability P((x, y)|s1, s2, . . . , sn) to be one, and P(sn|(x, y)) calculates the probability of signal strength given the location of the target node. •One of the unique advantages of Bayesian inference is that it can update the target’s location from the dynamical data of signal strength. This property makes this method effective in localizing mobile targets, such as the AGVs in manufacturing facilities. Bayesian inference (Cont...)
  • 11. •The closer two points, the smaller the difference between the signal strengths of the two points->an object can be localized by its neighbors. •The coordinates of the target point, (x, y), can be obtained by the equation: •where xi , yi, wi = coordinates, i = 1, 2, . . . , k= weights; and k is the number of nearest neighbors. • Nearest neighbor
  • 12. •This method avoids the signal propagation estimation, and it is suitable for the complex non-isotropic environments and it is not sensitive to the variation of application environments •Successfully used for localization in some applications such as health care systems Nearest neighbor (Cont..)
  • 13. Proximity method uses the approximate communication area to detect whether the target node is in a region or not. ürequires less computation than Bayesian inference ü positioning accuracy is usually poorer 1.An RFID tag is to be localized by a mobile reader 2.The localization area is partitioned into n ×n square cells ,each cell located at the coordinates (i, j ) 0 ≤ i, j ≤ n−1 1.The communication area of the reader can be approximated by a square composed of 2k ×2k cells. 2. If the reader detects the tag at m known positions, (xr , yr ), r = 1, . . . ,m, at each position the communication area is a union of cells (xr − k, xr + k − 1) × (yr − k, yr + k − 1). 3.The location of the tag can then be estimated by computing the centroid of this intersection of communication areas. Proximity
  • 14. Can be used in : •Construction site •Localization in Wireless sensor network Proximity (Cont..)
  • 15. Three demo cases in which RFID localization is used in different ways 1. Indoor localization of a person using active RFID tags 2. Indoor localization system using passive RFID technology 3. Practical use case of using active RFID localization in a restaurant Targets of application
  • 16. Video Demonstration: Case 1: Indoor localization of a person with active RFID tags (1)
  • 17. Description of the Video: ● The Left section of the video shows Probability Density Function (PDF) of the position of the person. ● The Right section of the video shows True trajectory (green) and estimated trajectory (black) of the person. Case 1: Indoor localization of a person with active RFID tags (2)
  • 18. How the system works: ● An RF reader is carried by the mobile user. ● A number of active RFID tags are distributed at known positions which regularly emit RF signals with an identification code. ● Upon reception of a signal, the range of the user to the corresponding tag is estimated indirectly from the received signal strength (RSSI), using a previously obtained statistical model. A computationally efficient Bayesian localization method (particle filter) is used to process the measurements and produce an estimation of the user’s position. Case 1: Indoor localization of a person with active RFID tags (3)
  • 19. Analysis of the system: ● The best approximation was obtained when the route passed entirely through the common hall. Although measurements from tags in the other rooms are considered nonetheless. ● When the route goes through several rooms, the positioning error often increases. This is caused by the change between rooms and also by a relatively lower tag density in the corridor. ● However, even with lower precision, the trajectory of the user between rooms was traced without problems. Ref: http://lopsi.weebly.com/publications.html Case 1: Indoor localization of a person with active RFID tags (4)
  • 20. Video Demonstration: Case 2: Indoor location system based on passive RFID technology (1)
  • 21. Description of the system: ● The video shows tracking of autonomous robots within a closed environment based on passive RFID technology. How the system works: ● Robot Lego Mindstorm NXT carrying a PDA that supports Wi-Fi connection. Case 2: Indoor location system based on passive RFID technology (2)
  • 22. How the system works (contd.): ● Sensing surfaces, divided into a grid of small squared surfaces or locations units with passive RFID tags, where each tag represents a location unit with unique identifier. ● PDA hp iPAQ 2940x with a passive RFID reader (HF-13.56 MHz) which reads tags from the sensing surface and retrieves the location unit identification code. ● Localization manager receives the IDs of the entity location from the PDA, maps the physical ID to a virtual map position and shows the entity locations to the final user in the map presentation screen. Case 2: Indoor location system based on passive RFID technology (3)
  • 23. Practical Feasibility Analysis: ● One of the lacks of the system is the capability of being wearable, because readers must be near the sensing surface. However, the release of RFID reader chips by INTEL (R1000) and Samsung may set a tendency of RFID to be present in everyday applications. ● The cost of maintenance and infrastructure is low because there is no necessity to use any special device apart from the PDA and RFID reader. On the other hand, setup and installation costs are almost irrelevant considering low cost of passive RFID tags. ● As passive RFID does not require external power supply, the cost of power is negligible. Ref: Youtube Link ; Article Case 2: Indoor location system based on passive RFID technology (4)
  • 24. Scenario: ● A tag given to the customer is used to locate the customer later in the restaurant in order to deliver the portion (steak, burger, etc.) Problem: ● In a restaurant for 350+ customers, the customer is not easy to find Solution: ● Add an active rfid transponder to the tag, equip the restaurant with readers and a location system for finding the customer ● Method: proximity (signal strength/reader) Result: ● Reduce the time to find the customer to less than half Case 3: RFID localization in practice (1)
  • 25. Case 3: RFID localization in practice (2)
  • 26. Case 3: RFID localization in practice (3)
  • 27. Major challenge with active tags is battery lifetime. ● Lifetime of up to 5 years can be reached, depending on use Challenge with passive tags is the small reading distance ● Price of individual tags is low Other issues ● Interference (multiple tag responses, multiple reader queries, reader signal power, non- conductive materials such as metal or glass) ● Multipath propagation ● Require more reliability, availability and precision o Therefore hybrid technology system will be the optimum solution. ● Since no single positioning technology provides all requirements, some researchers are already working on the combination system like Wireless LAN and RFID ● Privacy (when the number of RFID tags around us increases) Discussion on challenges
  • 28. RFID localization basics: RFID reader + tags + application = localization ● Active tags are self-powered and have a significantly good read range ● Passive tags are low-cost and have a shorter (<6m) read range ● Semi-passive tags have a power source for enhancing signal strength Methods and algorithms ● Multilateration, Bayesian inference ● Nearest neighbor, Proximity Usage mostly indoor ● Localization of patients, assets, etc. Challenges ● Tag issues such as battery lifetime, short read range ● Requires WiFi/LAN to be more efficient Conclusions