U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science SPIRE: Scalable Processing of RFID Event Streams Yanlei Diao University of Massachusetts,

Slides:



Advertisements
Similar presentations
© 2010 IBM Corporation IBM Sensor Solutions When Physical meets Digital.
Advertisements

Kien A. Hua Division of Computer Science University of Central Florida.
CS240A: Databases and Knowledge Bases Temporal Applications and SQL:1999 Carlo Zaniolo Department of Computer Science University of California, Los Angeles.
High-Performance Complex Event Processing over Streams Eugene Wu, Yanlei Diao, ShariqRizvi Presented by Ming Li and Mo Liu Presented by Ming Li and Mo.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Sherlock: Automatically Locating Objects for Humans Aditya Nemmaluri, Mark D. Corner, Prashant Shenoy Department of Computer Science UMass Amherst.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Leveraging Interleaved Signal Edges for Concurrent Backscatter by Pan Hu, Pengyu.
U NIVERSITY OF M ASSACHUSETTS, A MHERST – Department of Computer Science Dynamic Provisioning for Multi-tier Internet Applications Bhuvan Urgaonkar, Prashant.
5 Complex Event Processing (CEP) is the continuous and incremental processing of event streams from multiple sources based on declarative query.
Course Project Ideas Yanlei Diao University of Massachusetts Amherst.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 1 River Sensor Network Application: Monitor river dynamics (e.g: seasonal, flood.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Informed Detour Selection Helps Reliability Boulat A. Bash.
The Consumer World of. You’ve seen it before…  Books  Digital Media  Computer Hardware  Other high value items.
Lecture 1: Project Initiation  A Project is a sequence of unique, complex, and connected activities having one goal or purpose and that must be completed.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Multi-user Data Sharing System in Radar Sensor Networks Ming Li, Tingxin Yan, Deepak.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
U NIVERSITY OF M ASSACHUSETTS, A MHERST – Department of Computer Science Dynamic Resource Allocation for Shared Data Centers Using Online Measurements.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Re-thinking Data Management for Storage-Centric Sensor Networks Deepak Ganesan University.
Declarative Support for Sensor Data Cleaning Shawn Jeffery Gustavo Alonso Michael Franklin Wei Hong Jennifer Widom UC Berkeley ETH Zurich UC Berkeley Arch.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Virtualization in Data Centers Prashant Shenoy
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science From Cloud Computing to Sensor Networks: Distributed Computing Research at LASS.
HOL9396: Oracle Event Processing 12c
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Hyperion: High Volume Stream Archival for Restrospective Querying Peter Desnoyers.
Department of Computer Science University of Massachusetts, Amherst PRESTO: Feedback-driven Data Management in Sensor Network Ming Li, Deepak Ganesan,
Data Warehousing: Defined and Its Applications Pete Johnson April 2002.
Created by the Community for the Community Building a RFID solution in BTS 09.
Home Health Care and Assisted Living John Stankovic, Sang Son, Kamin Whitehouse A.Wood, Z. He, Y. Wu, T. Hnat, S. Lin, V. Srinivasan AlarmNet is a wireless.
© 2012 TeraMedica, Inc. Big Data: Challenges and Opportunities for Healthcare Joe Paxton Healthcare and Life Sciences Sales Leader.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
Introduction to Database
Developing RFID Application In Supply Chain
Database Systems – Data Warehousing
U NIVERSITY OF M ASSACHUSETTS A MHERST Department of Computer Science 2007 Eon: A language and runtime for perpetual systems Jacob Sorber, Alexander Kostadinov,
Sensor Data Management: Challenges and (some) Solutions Amol Deshpande, University of Maryland.
RFID TECHNOLOGY By: Sunil Patel Anat Krikunets Ge Qu Priya Pathmanathan.
Introduction and Overview Questions answered in this lecture: What is an operating system? How have operating systems evolved? Why study operating systems?
Zhao Cao*, Charles Sutton +, Yanlei Diao*, Prashant Shenoy* * University of Massachusetts, Amherst + University of Edinburgh Distributed Inference and.
SOA-based E-Commerce: Better online business management system? Presenters: Huy Pham and Wei Lu {hpham, Instructor: Dr. Qusay H.
11 C H A P T E R Artificial Intelligence and Expert Systems.
Chapter 1 In-lab Quiz Next week
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Re-thinking Data Management for Storage-Centric Sensor Networks Deepak Ganesan University.
John Plummer Technical Specialist Data Platform Microsoft Ltd StreamInsight Complex Event Processing (CEP) Platform.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
INNOV-10 Progress® Event Engine™ Technical Overview Prashant Thumma Principal Software Engineer.
Yanlei Diao, University of Massachusetts Amherst Future Directions in Sensor Data Management Yanlei Diao University of Massachusetts, Amherst.
La Piattaforma Applicativa RFID Giuseppe Russo Product Marketing Manager Giovanni Zoffoli Business Solutions Industry Marketing Manager.
A Data Stream Publish/Subscribe Architecture with Self-adapting Queries Alasdair J G Gray and Werner Nutt School of Mathematical and Computer Sciences,
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
Assoc. Prof. Dr. Ahmet Turan ÖZCERİT.  What is engineer,  What is Computer Engineering  The topics in Computer Engineering You will learn: 2.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Sensor Networks and Platforms for Advancing Water Research Prashant Shenoy University.
U NIVERSITY OF M ASSACHUSETTS A MHERST Department of Computer Science Computer Systems Principles Synchronization Emery Berger and Mark Corner University.
Yanlei Diao, University of Massachusetts Amherst Capturing Data Uncertainty in High- Volume Stream Processing Yanlei Diao, Boduo Li, Anna Liu, Liping Peng,
RTLS systems rev this is now slide 1do not print it to pdf things to do (check off when complete): add revision date to cover page remove triangles.
IMPROVED ASSET UTILIZATION Lack of visibility of assets and devices results in low equipment utilization rates, excess equipment purchasing and sometimes.
Big Data Quality Challenges for the Internet of Things (IoT) Vassilis Christophides INRIA Paris (MUSE team)
Fraud Detection with Machine Learning: A Case Study from Sift Science
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Vision: A Robust Architecture for a Diverse Mobile Wireless Internet.
IXIA + FIREEYE SECURITY BATTLECARD
Data Mining and Data Warehousing: Concepts and Techniques What is a Data Warehouse? Data Warehouse vs. other systems, OLTP vs. OLAP Conceptual Modeling.
Integrated Supply chain management using RFID
Smarter, safer Pharmaceuticals
Fundamentals of Information Systems
RFID enabled Solutions
Radio Frequency Identification (RFID)
Eng Computation & Data Science.
Harrick M. Vin Vice President (R&D); Head, Systems Research Lab (SRL)
Adaptive Cleaning for RFID Data Streams
By Sandeep Patil, Department of Computer Engineering, I²IT
Tel Hope Foundation’s International Institute of Information Technology, (I²IT). Tel
Presentation transcript:

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science SPIRE: Scalable Processing of RFID Event Streams Yanlei Diao University of Massachusetts, Amherst Joint work with Richard Cocci and Prashant Shenoy

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 2 UMass RFID Research Center Kevin Fu RFID security & privacy Yanlei Diao RFID data management Wayne Burleson Secure RFID Hardware Mark Corner RFID locationing and mobile readers Prashant Shenoy RFID software systems UMass Center for Advanced RFID Research 5 faculty + 9 students

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 3 Research Thrusts Embedded devices & hardware thrust Data management middleware thrust Application thrust Security & Privacy Robustness & Scalability Contact-less payments Contact-less payments Precise locationing at home/office Precise locationing at home/office Healthcare process management Healthcare process management Trace-&-trace in supply chain Trace-&-trace in supply chain Monitoring & anomaly detection Monitoring & anomaly detection

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 4 Real-time Visibility using Event Processing Monitor, Alert, Correct, Control, Improve Data management middleware thrust Data Management Middleware Tracking Individual Objects on a Large Scale Track-and-Trace

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 5 Challenges Data-information mismatch  RFID data  Meaningful, actionable information Incomplete, insufficient, misleading data  Missing data  Overlapping read ranges  Location unclear  Containment unclear

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 6 Challenges Scalability  Large-scale deployment:  Dozens of locations  Thousands of readers  Millions of objects  Unprecedented volume of data Low-latency  Anomaly detection: up-to-the-second information  Online data warehousing: frequent updates

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 7 Historical Data 4. Event DB Track & trace Overview of SPIRE RFID Devices Continuous queriesResultsSQL queriesResults Data/Queries 1. Data Cleaning Incomplete data, misleading data Live Data 3. Complex Event Processor Monitoring, anomaly detection 2. Data Interpretation, Compression Insufficient data, redundant data

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 8 Data Cleaning Raw RFID Stream Anomaly Filtering Temporal Smoothing Time Conversion Deduplication Removes bad data Handles missing data Adds logical timestamp Resolves misleading data For details see [CocciDS07, GyllstromWC+07, JefferyGM06].

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 9 Location-Containment View A physical world  Objects, locations, object containment at time t RFID readings  Isolated, fragmented views of the physical world An integrated location-containment view  View evolves as new readings arrive  View is used to interpret (give meanings to) the readings

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 10 View Maintenance View(time T, location A) 1, 6, 2, 4, 5 + Stream(T+1, A) 7, 3, 8 + Stream(T+2, B) View(T+2, B) ? X View(T+1, A) ?

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 11 Data Interpretation & Compression Interpretation of low-quality, insufficient data  Location unclear  Containment unclear Data Compression - Location compression - Containment compression - Compression vs. real-time anomaly detection Archival to event database for track-and-trace  Querying over both history and current state

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 12 Complex Event Processing Real-time translation from data to actionable information  Filtering  Correlation  Aggregation  Transformation  Predication Proactive, adaptive systems  Monitor, alert, correct, control, improve

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 13 SASE Event Processor Computation Complexity Misplaced Inventory EVENTSEQ(Shelf_Reading x, Shelf_Reading y, !(ANY(Register_Reading, Shelf_Reading) z) ) WHERE [TagId] AND x.AreaId != y.AreaId AND x.AreaId = z.AreaId WITHIN1 minute RETURNx.TagId, x.ProdId, x.AreaId, y.AreaId, retrieveHistOfMvmt(x.TagId) Stock Market Analysis Event SEQ(Stock+ a[], Stock b) Where skip_till_next_match(a[]!,b) { [symbol] AND a[1].volume > 1000 AND a[i].price > avg(a[…i-1].price)) AND b.volume < 80%*a[a.LEN].volume } Within 1 hour Return a[1].symbol, a[].(price,volume), b.(price,volume) Medical Compliance Event seq(MEDICINE-TAKEN x, MEDICINE-TAKEN y) Where[name=‘John’]  [medicine=‘Antibiotics’]  (x.amount + y.amount) > 1000 Within 4 hours Event Language * 2 * AB D Implementation Mechanisms

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 14 Monitoring & Anomaly Detection Alert if a bottle of drug with an unknown manufacturer appeared in the supply chain. Alert if a case of vaccines has not been seen at three consecutive points in the supply chain. Alert if a nominally peanut-free bottle was filled with food containing peanuts. Alert if two credit cards with the same number have been found in different locations. Alert if a patient has taken overdoses of medicine in past 12 hours. ……

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 15 Receiving Area Shelf 1 Shelf 2 Shipping Area RFID Simulator: Supply Chain

U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 16 Questions