Experiences with Location Sensing Systems at the University of Michigan Presented at 2005 NSF CISE/CNS CRI PI’s MeetingScott Gifford

Slides:



Advertisements
Similar presentations
Improving Statistical Systems: Advice from the UIS Technical Guide National training workshop Amman, Jordan October 2010.
Advertisements

S3 Technologies Presents Tactile Vision Glove for The Blind S3 Technologies: Shaun Marlatt Sam Zahed Sina Afrooze ENSC 340 Presentation: December 17, 2004.
1 Copyright Extronics Ltd 2010 Automatic Mustering & Personnel Location System iMUSTER Automatic Mustering & Personnel Location System - Partner Overview.
1 Electrical and Computer Engineering Drebin Rescuing Firefighters in Distress FPR Team Ganz: Jonathan Bruso Michael Carney Daniel Fortin James Schafer.
PulseHR Time and Attendance software development and coding web development, web hosting IT project management and consulting Str. Ghioceilor.
Chapter 15 Radio Frequency Site Survey Fundamentals
Location and Tracking Spring 2004: Location Recognition Larry Rudolph Location of what? Services applications, resources, sensors, actuators where.
PROPERTY MONITORING TECHNOLOGY BY: ALEXANDER GOUNTRAS.
Towards Seamless Navigation Ari Virtanen, Sami Koskinen VTT Industrial Systems P.O.Box 1302, Tampere Finland
Selected Location Sensors Judy Kay CHAI: Computer human adapted interaction research group School of Information Technologies.
RFID- Arduino Rat Tracking
17 November Solving Problems. What is the problem? What are the constraints? What can be done to solve or mitigate the problem? How could computers help?
Mobile and Ubiquitous Computing. Overview Attributes Discussion.
P11016: Intra-building Navigation Shannon Carswell Dan Paris Tim Garvin Dan Stanley.
Reverse Hashing for Sketch Based Change Detection in High Speed Networks Ashish Gupta Elliot Parsons with Robert Schweller, Theory Group Advisor: Yan Chen.
UNIVERSITY of CRETE Fall04 – HY436: Mobile Computing and Wireless Networks Location Sensing Overview Lecture 8 Maria Papadopouli
Electrical & Computer Engineering Mid-Course Design Review Anh-Vu Huynh Timothy Levernoch Samuel Patterson Christopher Ramonetti Advisor: Professor Siqueira.
Dr. Tahseen Al-Doori Site Survey. Dr. Tahseen Al-Doori  To get the best performance out of your wireless network, you must both ensure that your access.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Blue Tears Project Bluetooth Tracking: Distributed Information Systems.
Library Automation: Planning and Implementation
Life Logging Melekam Tsegaye Shaun Bangay Alfredo Terzoli Research area: Wearable, Pervasive and Ubiquitous Computing
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Computer communication
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Al Yaros Tomer Peled Kobi Ruham. Background Problem domain Our solution System Main features System architecture Top Level architecture System components.
Autonomous Surface Navigation Platform Michael Baxter Angel Berrocal Brandon Groff.
Bi-Directional RF Data Communication A Robot Control Device Team BDRFC.
Indoor Localization using Wireless LAN infrastructure Location Based Services Supervised by Prof. Dr. Amal Elnahas Presented by Ahmed Ali Sabbour.
3- System modelling An architectural model presents an abstract view of the sub-systems making up a system May include major information flows between.
Indoor Localization Using a Modern Smartphone Carick Wienke Advisor: Dr. Nicholas Kirsch Although indoor localization is an important tool for a wide range.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Department of Electrical and Computer Engineering Team BeepachU November 26, 2013 Midway Design Review.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Library & Bookstore Navigation using RFID grid ACE B4 dra 親 richie 卒論最終発表.
Mobile Navigation With SVG Christian Schmitt SVG Open 2005.
Implementing a Sentient Computing System Presented by: Jing Lin, Vishal Kudchadkar, Apurva Shah.
Location Based Services - SIMPLE NZNOG 2006, VUW March 22-24, 2006 Jonathan Wierenga Peter Komisarczuk.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Practicing Technology For Over 27 Years Markets Served: Health Care & Supply Chain Mission Statement: We are part of our client's vision; It is their best.
Radio Frequency ID (RFID) Tracking System for a Building Complex Tim Gordon Matt Tracy John O’Malley Mentor: Y. Shang, Y. Saab.
RF Code Presentation To T-20 Standards Committee.
Problem Statement Automotive and heavy equipment applications use sensors on machines to report temperatures, pressures, speeds, etc. to a central embedded.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Rover Technology Enabling Scalable Location Aware Computing ( Wireless ) Myoung – Seo Kim Super Computing Lab
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Nissanka B. PriyanthaAnit Chakraborty Hari Balakrishnan MIT Lab for Computer Science The Cricket Location-Support System.
Short Range Networks Mark Green School of Creative Media.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Discussing environment. INTRODUCTION ● Course Overview ● Course Objectives.
Dead Reckoning with Smart Phone Sensors for Emergency Rooms Ravi Pitapurapu, Ajay Gupta, Kurt Maly, Tameer Nadeem, Ramesh Govindarajulu, Sandip Godambe,
Outline Location sensing techniques Location systems properties Existing systems overview WiFi localization techniques WPI precision personnel locator.
Ubiquiplex The Scrap Devices Company Engineering: Joshua Doubleday Maksim Noy Jing Su Daniel Tran Steve Zhang Managed By: Daniel Howe Business: Eddie Chung.
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
RAPT RFID based Asset and Personnel Tracker Team 24.
The information systems lifecycle Far more boring than you ever dreamed possible!
Component 8/Unit 1bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 1b Elements of a Typical.
RFID in Education and Childcare By Analytica Overview What is RFID? RFID Components ARIES Software RFID Applications Selling RFID Summary Sales Power.
How to Track the Location of a Mobile Phone.
Mobile Computing CSE 40814/60814 Spring 2017.
Wireless Technologies
PARKING AUTOMATION SYSTEM
Section 4 – Computer Networks
Location Sensing (Inference)
Introduction to Computers
TYPES OF NETWORK
OCR GCSE ICT Data capture methods.
Presentation transcript:

Experiences with Location Sensing Systems at the University of Michigan Presented at 2005 NSF CISE/CNS CRI PI’s MeetingScott Gifford This work is funded in part by the National Science Foundation under grant EIA as “An Infrastructure for Wide Area Pervasive Computing”.

Introduction Many location-aware projects are focused on novel ways of gathering and processing location information. We want to provide this as infrastructure, to allow researchers to spend their time thinking about the “next step”—what can you do with location information.

Goals ● Developing a building-wide location sensing infrastructure using commercial, off-the-shelf technology. ● Keeping costs low enough for a large- scale installation, eventually spanning multiple buildings, and with many participants. ● Creating an interface to this system which is scalable, powerful, and respectful of users’ privacy.

Technologies Tried In our quest for the “perfect system,” we tried out quite a few different technologies: ● Passive RFID, hallway ● Passive RFID, room ● Active RFID, hallway ● Active RFID, room ● UbiSense ● AeroScout ● Ekahau ● Many APs ● Bluetooth I'll present a brief overview of these technologies, and what we found to be their strengths and weaknesses.

Passive RFID, Hallway Thresholds Status: Small Prototype Tag Lifetime: Infinite Granularity: Hallway Tag form: Thin tag + foam on shirt Tag-Based Estimated Cost Key Facts Use EPC sensors at hallway intersections to detect passersby. Maintain current location based on recent movements. Summary ● Cheap tags, moderately expensive infrastructure ● Tags are easily blocked, so must be worn on outside of clothing or near outside of bag ● Increasingly used in industry, so likely to get cheaper ● Sensing is sometimes subject to false positives, but we may be able to filter in software

Passive RFID, Room Thresholds Status: Small Prototype Tag Lifetime: Infinite Granularity: Room Tag form: Thin tag + foam on shirt Tag-Based Estimated Cost Key Facts Use EPC sensors at hallway intersections and room entrances to detect passersby. Maintain current location based on recent movements. Summary ● Cheap tags, very expensive infrastructure ● Tags are easily blocked, so must be worn on outside of clothing or near outside of bag ● Increasingly used in industry, so likely to get cheaper ● Sensing is sometimes subject to false positives, but we may be able to filter in software

Active RFID, Hallway Thresholds Status: Equipment testing Tag Lifetime: Unknown Granularity: Hallway Tag form: Keychain-size tag Tag-Based Estimated Cost Key Facts Use active RFID sensors at hallway intersections to detect passersby. Maintain current location based on recent movements. Summary ● Not yet thoroughly tested ● Moderately expensive tags and infrastructure ● Don't yet know where tags must be placed ● Sensing is likely to be subject to false positives, but we may be able to filter in software

Active RFID, Room Thresholds Status: Equipment testing Tag Lifetime: Unknown Granularity: Hallway Tag form: Keychain-size tag Tag-Based Estimated Cost Key Facts Use active RFID sensors at hallway intersections and room entrances to detect passersby. Maintain current location based on recent movements. Summary ● Not yet thoroughly tested ● Moderately expensive tags and very expensive infrastructure ● Don't yet know where tags must be placed ● Sensing is likely to be subject to false positives, but we may be able to filter in software

Ubisense Status: Tested in small room, hallway Tag Lifetime: Up to 1 year Granularity: 0.5 M Radius Tag form: Size of Deck of Cards Tag-Based Estimated Cost Key Facts Uses ultra wideband signaling to triangulate / trilateralate position. Summary ● Works OK in small room ● In larger area, didn't work for us, perhaps because of metal- backed cement walls ● Very expensive tags but cheap infrastructure ● Haven't yet verified accuracy of battery claims ● Tags are a bit unwieldy, but can be carried in purse / briefcase / bookbag or kept in pocket

Aeroscout Status: Small Prototype Granularity: 4-5 Rooms (8M Radius) (maybe 1M w/ diff. walls) Tag Lifetime: 3 months Tag form: 3 x 1 x 3/ or Tag-Based Estimated Cost (with tags) Key Facts Aeroscout uses time difference of arrival to custom hardware at known locations to estimate location of tags or any device. Summary ● For us, accuracy was poor, perhaps because of metal- backed cement walls ● Integrates well into infrastructure ● System requires a great deal of manual adjustment ● Requires no custom drivers, and works with any device or with tags

Ekahau Status: Building-wide installation Granularity: Room Based Estimated Cost Key Facts Ekahau uses signal strength and a statistical model to estimate your location. A map of the area is first surveyed with their software, then clients supply RSSI readings to a server to get their location. Summary ● Tests so far show good room- level accuracy ● Uses existing APs, so no/low infrastructure costs ● Licensing is bulk of cost ● Can improve accuracy by adding more base stations ● Requires vendor-supplied drivers ● Requires IP network, which can be a problem for PDAs ● Tags too, but only last 2 days!

Many Low-Power APs Status: Very Small Prototype Granularity: Room Based Estimated Cost Key Facts Place low-power access points in each room in the building. A client can then find its location by finding the AP with the strongest signal strength and consulting a database. Summary ● Usually works, but can be incorrect near doorways ● Copper screen can block signal to minimize bleed through walls ● Very expensive ● May be difficult to coordinate with IT staff and to plan channel allocation ● Clients can find their location anonymously, then tell server

Many Low-Power Bluetooth Sensors Status: Simple tests were succesful Granularity: Room Bluetooth-Based Estimated Cost Key Facts Place low-power bluetooth devices in each room. A client can then find its location by finding the AP with the strongest signal strength and consulting a database, and the infrastructure can locate clients by scanning for active devices Summary ● Likely to work comparably to Many APs, but cheaper ● Signal should bleed out of rooms less ● Doesn't interfere with ● Equipment is cheap ● Designed for low-power, so cheap tags should be possible ● Clients can find their location anonymously, then tell server ● Or server can track registered clients

Lessons Learned ● System performance is very dependent on environment ● User factors are important ● Immature technology, no clear leader ● Decision driven by prioritizing trade-offs

Questions ? ? ? For more information: Scott Gifford -