Tanmaya Kumar 3 rd May 2011. Outline  Problem and Objective  Key personnel  Approach  Risks  Test Cases  Results  Impact  Tasks as Executed.

Slides:



Advertisements
Similar presentations
RFID IN UNIVERSITY OF JAMMU RFID is used in libraries primarily to automate the book handling process including checkout, inventory maintenance, and check-in.
Advertisements

Hybrid Context Inconsistency Resolution for Context-aware Services
Benjamin J. Deaver Advisor – Dr. LiGuo Huang Department of Computer Science and Engineering Southern Methodist University.
上海交通大学 自动化系 FROZEN FOOD Case : Cool-Chain of RFID.
Computerised Maintenance Management Systems
Enhancing ERP System with RFID: Logistic Process Integration and Exception Handling Dickson K. W. CHIU Senior Member, IEEE Eleanna Kafeza Athens University.
Mobile Application Abstract Future Work The potential applications and integration of this project are vast – many large department and grocery stores.
Electrical and Computer Engineering Klaus Kristo Clem Leung Adam Frieden Chris Davidson Faculty: Professor Ramgopal Mettu Project: iPlanAhead Comprehensive.
Agent-based Device Management in RFID Middleware Author : Zehao Liu, Fagui Liu, Kai Lin Reporter :郭瓊雯.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Extreme/Agile Programming Prabhaker Mateti. ACK These slides are collected from many authors along with a few of mine. Many thanks to all these authors.
Session-8 Data Management for Decision Support
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Database System Introduction to Database Environment October 31, 2009 Software Park, Bangkok Thailand Pree Thiengburanathum College of Arts and Media Chiang.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
Abstract Inexpensive ultrasonic tape measures are available that can only measure perpendicular distances to fairly large, flat surfaces. Complex environments.
EbiTrack Architecture Version 1.0 September 24, 2012.
RFID Agent Middleware Architecture Craig Thompson and Joe Hoag {cwt, Department of Computer Science and Computer Engineering.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Using Radio Frequency Identification in Agent- Based Manufacturing Control Systems By: Lamar Alston ASQ Student Member.
Information Systems in Organizations 4.1 Supply Chain Management Systems.
Information Retrieval in Practice
Double and Multiple Sampling Plan
Database Development Lifecycle
Software Project Configuration Management
Lecture 3 Prescriptive Process Models
Discovering Computers 2010: Living in a Digital World Chapter 14
Implementation of Computer Maintenance Management system - CMMS
Definition CASE tools are software systems that are intended to provide automated support for routine activities in the software process such as editing.
CS522 Advanced database Systems
Presented by: BeeLinda L. Temple CPhT
IS 130 Information systems 1
Chapter 6 - Database Implementation and Use
Lecture #1 Introduction
CS4311 Spring 2011 Process Improvement Dr
Introduction Characteristics Advantages Limitations
Database Systems Chapter 3 1.
AS/RS (Automated Storage/Retrieval System)
Rhetorical SITUATION We are at a convention for Canadian retailers, transportation brokers and yard management companies. I am a representative from.
Lecture 2.
Using MIS 2e Chapter 7 Information Systems within Organizations
Week 12 Option 3: Database Design
Objectives of DBMS Ashima Wadhwa
Software Configuration Management
Chapter 1: The Database Environment
Othello Artificial Intelligence With Machine Learning
Order Fulfillment along the Supply Chain in E-Commerce
Big Data - in Performance Engineering
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
World-Views of Simulation
CHAPTER SIX OVERVIEW SECTION 6.1 – DATABASE FUNDAMENTALS
CHAPTER 1: THE DATABASE ENVIRONMENT AND DEVELOPMENT PROCESS
Chapter 1: The Database Environment
Chapter 1: The Database Environment
The Database Environment
Chapter 1: The Database Environment
Business Intelligence
Data Warehouse.
INTRODUCTION TO Databases
Automated Analysis and Code Generation for Domain-Specific Models
Data Structures & Algorithms
RFID Object Localization
Chapter 1: The Database Environment
Extreme Programming.
Soft System Stakeholder Analysis
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Soft System Stakeholder Analysis
Database management systems
Presentation transcript:

Tanmaya Kumar 3 rd May 2011

Outline  Problem and Objective  Key personnel  Approach  Risks  Test Cases  Results  Impact  Tasks as Executed

Problem and Objective  Problem: In a warehouse or retail store setup a sizable chunk of time is spent by employees walking up to each item on each isle and checking it off a list. Creating, Maintaining, and replenishing inventory and correct positioning for items in a huge store is very difficult and time consuming, and, very cost ineffective.  Objective: The objective of the project is to streamline the process of developing and maintaining regular inventory in a store or warehouse environment. This involves a combination of projects each accomplishing a separate task- a step in the creation or maintenance of inventory. The projects include RFID tag data collection and insertion into a main database, and, extending to the combination of robotics and RFID to maintain a current and regular live inventory of the store floor. The project will also extend on to being a customer support system for location of particular items in the store.

Key Personnel  Tanmaya Kumar Kumar is a junior in the Computer Science and Computer Engineering Department expecting to graduate with a BS degree in the Spring of 2012 (May, 2012). He has relevant previous experience in programming and a deep interest in artificial intelligence.  Dr. Craig Thompson (Champion / Advisor) Dr. Thompson is Professor and Acxiom Database Chair in Engineering in the Computer Science and Computer Engineering Department at University of Arkansas, Fayetteville. He has a background in database management, artificial intelligence, middleware, software architectures, agents, virtual worlds, and pervasive computing.

Approach  High level design: The project involves multiple components and elements: The Robot RFID Reader (Stationary): Symbol Forklift Reader Database Population Generator App The back end database RFID Handheld tag reader Locator Tags Recalibration, Updating and Location search

Risks RiskSteps Taken 1. Metal Shelves Reflect RF WavesTesting at multiple high-low strength frequencies to find optimum read values 2. Inconsistent read data due to reflectionMultiple reads(test cases) at different angles and different frequency values 3. Inconsistent read data sue to speed and location variation Multiple reads at different speeds and different locations in the aisle, including standing stationary reads 4. Read data varies even at same test conditions due to RF Limitations Multiple reads with same test conditions and averaging out the data 5. Different read data when standing and moving robot Test cases with a combination of standing and moving reads

Test Cases Reader PositionDescriptionAntenna Power (dBm)No. of Runs 1. Center AisleStanding with the reader held at a height of 1m Forward – Backward Runs2 forward and backward runs at 200mm/s: 200(F) -200(B) Forward – Stop – Backward2 forward and backward runs at 200mm/s with a 5 second stop in the center of the aisle: Forward – Stop – Forward Backward – Stop - Backward Walking with the readerWalking forwards from start to end of aisle with reader at 1m height 15001

Results  We tested the system by collecting data from the runs listed in the test cases table. The preliminary results for the runs were as follows:  Best Antenna Strength for gathering Data: 2700 – 3000 dBm.  Most Successful Run (Most tags captured): Forward – Backward with 5 second stops.  The results are preliminary in nature and require further testing, however, there are some caveats to the signal strength and start - stop mechanism of the test case. The ability of the reader to capture more RFID tags within the 2700 – 3000 dBm range increases significantly but it also picks up random tags with the same frequency as well. The number of dirty reads becomes a lot more consistent and later sorting becomes very task intensive. Also, the start – stop method for testing is a very time consuming method in a large scale environment.

Impact  Currently retailers like Wal-Mart spend uncountable hours and money maintaining inventory and making sure items are in the correct spots in their stores. A push is underway towards using RFID to tag every single object in the store, most commonly jeans(Dillards and JCPenney), maintaining a live inventory will help immensely towards streamlining the process.

Tasks to be Executed and Schedule  Tasks: Data Capture Create Database Robot Path Control and Tag Data Collection Implement location triangulation algorithms Debugging Documentation

Schedule TaskFall 1. Data Capture… 2. Create Database … 3. Robot Path Control and Tag Data Coll… 4. Debugging 5. Documentation…

Questions Thank you!