SixthSense RFID based Enterprise Intelligence

Slides:



Advertisements
Similar presentations
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Advertisements

1 Electrical and Computer Engineering Drebin Rescuing Firefighters in Distress FPR Team Ganz: Jonathan Bruso Michael Carney Daniel Fortin James Schafer.
People Identification Construction siteManufacturing Customer Identification for better QoS Integrated vehicle and driver identification People Tracking.
P11016: Intra-building Navigation Shannon Carswell Dan Paris Tim Garvin Dan Stanley.
Challenges: Device-free Passive Localization for Wireless Environments Moustafa Youssef, Matthew Mah, Ashok Agrawala University of Maryland College Park.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
SixthSense: RFID-based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan (MSR India) Piyush Agrawal (IIT Kanpur)
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B21 Mobile Technology.
Created by the Community for the Community Building a RFID solution in BTS 09.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
Radio Frequency Identification Inventory Tracking and Status Monitoring of Blood Units Team 10 Mark Green Melissa Kronenberger Nadine Tribur Aaron Schlanser.
Developing RFID Application In Supply Chain
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
A C JOSHI LIBRARY A C Joshi Library is considered to be one of the best libraries of India: Annual budget approx 5 Crores Annual budget approx 5 Crores.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan Interns: Piyush Agrawal (IITK), SriKrishna (BITS Pilani)
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
RFID: Automating Weapons Management David P. Sandrowitz Senior Associate Sytex Inc.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
1 Battelle is a not-for-profit S&T enterprise that fulfills its purpose in part by operating laboratories  Translating scientific discovery to innovative.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Final Project Presentation.
TEMPLATE DESIGN © E-Eye : A Multi Media Based Unauthorized Object Identification and Tracking System Tolgahan Cakaloglu.
Describe direct data entry and associated devices, e. g
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Radio Frequency Identification (RFID)
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
TIU Tracking System Introduction Intel's large and complex validation labs contain many Testing Interface Unit's(TIU) used in validating hardware. A TIU.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
RAPT RFID based Asset and Personnel Tracker Team 24.
IMPROVED ASSET UTILIZATION Lack of visibility of assets and devices results in low equipment utilization rates, excess equipment purchasing and sometimes.
Digital Carpool Aid Mid-semester Presentation Senior Design I March 5, 2015.
Tag! You’re It! UNLV’s Experience with RFID Tom Boone UNLV Wiener-Rogers Law Library Jennifer Fabbi UNLV Curriculum Materials Library Bobbie Studwell UNLV.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
Digital Carpool Aid Mid-semester Presentation Senior Design I March 5, 2015.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Using Radio Frequency Identification in Agent- Based Manufacturing Control Systems By: Lamar Alston ASQ Student Member.
Korea University Ubiquitous LAB. Chapter 11. RFID peripherals Ph.D Chang-Duk Jung.
Information Systems in Organizations 4.1 Supply Chain Management Systems.
Intelligent parking system based on RFID
Unit 2 Technology Systems
Radio Frequency Identification composition - implementation – vision
Teng Wei and Xinyu Zhang
RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARIES
Software Quality. Assured.
By: Tarun Sharma Chinta Rahul SCSE VIT University
PARKING AUTOMATION SYSTEM
RFID enabled Solutions
Radio Frequency Identification (RFID)
Ubiquitous Computing and Augmented Realities
RFID SENSORS OBJECTIVES ABOUT PASSIVE RFID METHODS FINDINGS
Tracking parameter optimization
Chapter 2: Input and output devices
Chapter 10 – Integrating RFID Readers in Enterprise IT
Databases.
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
مرکز آموزش های الکترونیکی ارایه درس مدیریت منابع سازمان
Mobility, Networks, and Systems
Radio Frequency Identification
Stallion Systems & Solution Pvt Ltd
RFID Object Localization
The Things in IoT - Sensors and Actuators Sadoon Azizi Department of Computer Engineering and IT.
Introduction Radio Frequency Identification (RFID)
SUPPLY CHAIN TECHNOLOGY:
Presentation transcript:

SixthSense RFID based Enterprise Intelligence Lenin Ravindranath, Venkat Padmanabhan

RFID Radio Frequency Identification Components RFID Reader with Antennas Tags (Active and Passive) Electromagnetic waves induce current Tag responds Globally unique ID Data

RFID Applications Mainly an Identification Technology Tracking Inventory Supply Chain Authentication Mainly an Identification Technology

SixthSense Overview Goal Setting Methodology Use RFID to capture the rich interaction between people and their surroundings Setting Focus on Enterprise Environment People and their interesting objects are tagged Methodology Track people and objects Infer their inter-relationship and interaction Combine with other Enterprise systems/sensors (Camera, Presence, Calendar) Provide Useful Services

Challenges Manual input is error prone and is best avoided Erroneous mapping Passive Tags are fragile RFID Passive tags are inherently unreliable Tag Orientation Environment (Metal, Water)

Key Research Tasks Addressing Challenges Self-configuring system/Verify manual input Person-Object Differentiation Object Ownership Inference Zone Identification Person Identification Person-Object Interaction Reliability Multiple Tagging

Person-Object Differentiation People can move on their own Objects move only when carried by a person Co-movement based heuristic For every tag T, find co-movement tag set {T1, T2..Tn} m – total inter-zone movement of T mi – total inter-zone movement of Ti ci – amount of co-movement exhibited by Ti with T Declare the tag with the highest RM as person Eliminate this tags movements Repeat the algorithm till RM is positive Tags with negative RM are objects

Person Identification Find Workspace Zone where the tag spent most of its time Log Desktop Login/Active Events Temporal Correlation Trace of person entering workspace zone Trace of desktop login/active events

Person Identification xyz@microsoft abc@microsoft 534 1 12 1 1

Object Interaction Identify interaction between person and objects A person lifted an object A person turned an object Signal Strength of tag varies Change in distance Change in orientation Monitor the variation is Received Signal Strength from tags 2 2

Object Interaction

Architecture RFID Monitor Enterprise Monitors Database Calendar Presence Camera Database Inference Engine Person Differentiation Object Ownership Person Identification Object Interaction API Lookups Callbacks Applications Annotated Video Enhanced Calendar/IM Lost Object Alert

Applications Lost object Finder Annotated Security Video Enhanced Calendar and IM Presence RFID based WiFi-Calibration

Lost Object Finder Inferred object ownership Inferred workspace Raise alarm When object misplaced and owner moving without it Query for lost object information I had the object in the evening but not with me right now

Semi-Automated Image Catalog Objects Tagged Lift a object and show it before the camera Take a picture Build a catalog (Tag ID, Image)

Annotating Videos with Events Camera – Video Feed Tagging videos with interesting RFID events Person lifted an object Person entered workspace Rich video database Support rich queries Give me all videos where Person A interacted with Object B

Enhanced Calendar/Presence Automatic Conference Room booking If conference room not booked And bunch of people go into the conference room Enhanced Presence Learn trajectory from one location to another E.g. Workspace to Conference Room Trajectory Mapping Enhanced User Presence On the way Lost