RFID Data Aggregation Dritan Bleco, Yannis Kotidis Department of Informatics Athens University of Economics and Business.

Slides:



Advertisements
Similar presentations
Enabling New RFID Communication Opportunities with EPC Network Services Tony Rutkowski Vice President VeriSign Communication Services tel:
Advertisements

Intellitag500 RFID Technology Overview. t Upon completion of this lesson, you will ä Have the background information on the RFID technology in general.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Information Modelling and Sharing for RFID-Equipped Objects Harri Hämäläinen WAWC’07 – Work In Progress -session Lappeenranta, August 16th 2007.
ITEC 810 Overview of Micropayment Technology
RFID Topics Mo Liu Bart Shappee Temporal Management of RFID Data.
Beyond the Barcode RFIDs Radio Frequency Identification.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
RFID Cardinality Estimation with Blocker Tags
RFID Technologies Master seminar : Tangible User Interfaces Bruno Dumas – DIVA Group University of Fribourg
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
Radio frequency identification technology (RFID) Dominic Payne Janna Thomson Kevin Mackay.
Adaptive Cleaning for RFID Data Streams VLDB /12/06 Shawn Jeffery Minos Garofalakis Michael Franklin UC Berkeley Intel Research Berkeley UC Berkeley.
RFID Cow Jewelry – or – Revolution Travis Sparks
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
RFID Technology and Asset Tracking “Any sufficiently advanced technology is indistinguishable from magic.” Arthur C Clark.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
RFID passports How does is work? Step by step By: Einav Mimram.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
FPGA based RFID Reader Group Members – Farhan Tariq Usman Sarwar Khalid Khan Supervisor- Mr. Naveed Ahmed Internal Advisor- Prof. Dr. Abdul Razzak Memon.
Nick Ruggieri CIS 1055 Section 005 Radio Frequency Identification  RFID System A wireless, non contact system that uses data from a tag for the purpose.
Radio Frequency Identification So What? What is RFID Type of technology that uses electromagnetic radio frequency to identify objects, animals and humans.
Developing RFID Application In Supply Chain
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Business Intelligence on Complex Graph Data Dritan Bleco Yannis Kotidis Department.
Muhammad Wasim Raad1 What is RFID? RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify,
RFID TECHNOLOGY By: Sunil Patel Anat Krikunets Ge Qu Priya Pathmanathan.
Clifford Poulard Team C – Cliff Po
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
Interrelativity.com The Practicalities, Perils and Promise of RFID Joe McCarthy Connector in Chief Interrelativity, Inc 26 April 2005.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
RFID Technology What is it? (And why should you care?)
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
RFID (RADIO FREQUENCY IDENTIFICATION)
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
RFID Types Passive RFID – No batteries required – Weaker – Cheaper Active RFID – Battery powered – More complex – Expensive Three Main Types of Frequencies.
Chapter 9 The Microsoft Access 2007 Window © 2007 Lawrenceville Press Slide 1.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
Tag! You’re It! UNLV’s Experience with RFID Tom Boone UNLV Wiener-Rogers Law Library Jennifer Fabbi UNLV Curriculum Materials Library Bobbie Studwell UNLV.
RFID (RADIO FREQUENCY IDENTIFICATION) Presented by Sreenesh Shenoy GM RFID & Software Stallion Systems and Solutions P Ltd.
Using Radio Frequency Identification in Agent- Based Manufacturing Control Systems By: Lamar Alston ASQ Student Member.
By: Tarun Sharma Chinta Rahul SCSE VIT University
Mobile Computing CSE 40814/60814 Spring 2017.
RADIO FREQUENCY IDENTIFICATION(RFID)
Radio Frequency Identification (RFID)
Radio Frequency IDentification
مرکز آموزش های الکترونیکی ارایه درس مدیریت منابع سازمان
Adaptive Cleaning for RFID Data Streams
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Radio Frequency Identification
- Dylan Leintz - Dr. Davies
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

RFID Data Aggregation Dritan Bleco, Yannis Kotidis Department of Informatics Athens University of Economics and Business

Yannis Kotidis Outline Introduction Temporal Aggregation Basic Temporal Aggregation - BTA Lossy Temporal Aggregation - LTA Spatial Aggregation Evaluation Conclusions

Yannis Kotidis Radio Frequency Identification (RFID) Use radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track... Does not require physical sight or contact between reader/scanner and the tagged item

Yannis Kotidis Variations Active/Passive Tags Memory Size (16bits- KBs) Memory Type Read Only, WORM, Read/Write Frequency 125KHz GHz Physical Dimensions Thumbnail to Brick sizes Price (few cents-hundred euros)

Yannis Kotidis Existing Applications Animal/livestock tracking Postal services (routing and sorting) Libraries Toll collection Warehousing Supply chain management …

Yannis Kotidis RFID System Architecture RFID Reader tag RFID Reader tag Edgeware (on-site) filtering, cleaning, aggregation Raw RFID Data Stream Aggregated RFID Data Stream Middleware (remote) IT Applications tag Level-0 Level-1 Level-2 Level-3 EPC Code (tag) Time (reader) Location (reader)

Yannis Kotidis Simple RFID data stream model Assume streaming records with schema EPC code: EPC i (Discrete) Time: t i Location: loc i

Yannis Kotidis Basic Temporal Aggregation (BTA) Collate consecutive reports of the same tag Reader (EPC i,loc i,t start ) (EPC i,loc i,t start+1 ) (EPC i,loc i,t start+2 ) … (EPC i,loc i,t end ) t start t end Raw stream (EPC i,loc i,t start,t end ) Aggregated stream EPC i loc i

Yannis Kotidis Problems with BTA RFID readers often drop observations e.g. due to collisions Up to 30% loss is not uncommon [Jeffery2006] Objects are often moved within the facility Multiple BTA records Reduction depends on data characteristics Need an application-controllable reduction framework OLAP analysis does not require precise knowledge!

Yannis Kotidis Lossy Temporal Aggregation (LTA) LTA record format: (EPC,loc,t start,t end,p) Tag may be partially present during the interval Value denotes the fraction of times that the tag was observed during the interval BTA: p=1 (implied) LTA: 0<p≤1 Allow us to control the size of the aggregated stream or the level of accuracy

Yannis Kotidis Types of Error in LTA t start t end X=epochs when tag was reported in [t start,t end ] Y=epochs when tag was not reported in [t start,t end ] p = X / (X+Y) Tag spotted but not reported Tag spotted but reported with probability p instead of 1 Tag not spotted but nevertheless reported with probability p selected LTA interval

Yannis Kotidis Problem Formulation Compute best B-tuple LTA representation such that cumulative error (including both false negative and false positive error types) is minimized Cumulative Error = 2*X*Y/(X+Y) 2 Other error metrics? Dual problem also interesting

Yannis Kotidis Helpful Observations 1. Selected end-points t start,t end must contain appearance of a tag 2. Should not break consecutive observations Bad choice due to (1) Bad choice due to (2) Thus, we can first apply BTA and afterwards LTA

Yannis Kotidis Linear Algorithm Goal: generate B LTA records Input: n BTA records Example: Reduce stream from 8 to B=4 records BTA Interval LTA Interval

Yannis Kotidis Greedy Algorithm Iteratively merge intervals Select best candidate at each step Stop when left with exactly B intervals

Yannis Kotidis Optimal LTA Dynamic Programming formulation E(i,k): error of best k LTA representation for first i BTA intervals err(a,b): error for single LTA record encoding intervals a, a+1, … b k-1 LTA intervals 12jj+1i 1 LTA interval E(i,k)=min(E(j,k-1)+err(j+1,i)) j<i BTA intervals:

Yannis Kotidis Spatial Aggregation Tags often move in batches Common in supply- chain/distribution networks Idea: create surrogate EPC codes to replace multiple tags packaged together Proposed in [Gonzales et all ICDE 2006] Note: Do not know in advance how items are grouped Surrogate codes do not imply physical grouping

Yannis Kotidis Example G1: I1 I2 Surrogate Group codes I1 L1 T1 T5.78 I2 L1 T1 T5.69 I3 L1 T2 T5.90 I1 L2 T12 T22.67 I2 L2 T12 T22.62 I4 L2 T12 T22.66 LTA stream These items are observed at the same interval/location

Yannis Kotidis Example G1L1 T1 T5.69 I3 L1 T2 T5.90 I1 L2 T12 T22.67 I2 L2 T12 T22.62 I4 L2 T12 T22.66 LTA stream New record replaces both entries G1: I1 I2 G2: G1 I4 Surrogate Group codes More tags spotted together

Yannis Kotidis Resulting Tables G1L1 T1 T5.69 I3 L1 T2 T5.90 G2 L2 T12 T22.62 Reduced stream G1: I1 I2 G2: G1 I4 Surrogate Group codes I1 L1 T1 T5.78 I2 L1 T1 T5.69 I3 L1 T2 T5.90 I1 L2 T12 T22.67 I2 L2 T12 T22.62 I4 L2 T12 T22.66 LTA stream

Yannis Kotidis Experiments Used RFID traces from 2008 Hope Conference in New York Sampled data at 30sec intervals 1.9Million records Reduced to 423K records via BTA

Yannis Kotidis Accuracy (LTA) Picked tag with most intervals (569) Vary number of requested LTA-tuples (B)

Yannis Kotidis Execution Times (LTA)

Yannis Kotidis Notes on Spatial Aggregation Input: 434K BTA records Output 77K surrogate group ids 39% space reduction (accounting surrogates) 3.3secs (1.83GHz Core Duo with 1GB)

Yannis Kotidis Different Choices LosslessLossy 3:1

Yannis Kotidis Conclusions Explored different aggregation schemes Exploit temporal and spatial correlations Schemes reduce size of RFID stream in a user- controllable manner All algorithms are fairly fast Greedy is orders of magnitude faster than OptimalDP with practically identical performance More schemes possible Ex: spatial with fuzzy groups Other error metrics, dual problem

Yannis Kotidis Thank you, Questions?