Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.

Slides:



Advertisements
Similar presentations
Adaptive Accurate Indoor-Localization Using Passive RFID Xi Chen, Lei Xie, Chuyu Wang, Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing.
Advertisements

Efficiently Collecting Histograms Over RFID Tags Lei Xie, Hao Han, Qun Li, Jie Wu, and Sanglu Lu State Key Laboratory for Novel Software Technology, Nanjing.
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Yu Stephanie Sun 1, Lei Xie 1, Qi Alfred Chen 2, Sanglu Lu 1, Daoxu Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China.
1 Link Layer Multicasting with Smart Antennas: No Client Left Behind Souvik Sen, Jie Xiong, Rahul Ghosh, Romit Roy Choudhury Duke University.
Yi Wang, Wenjie Hu, Yibo Wu and Guohong Cao
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
A Multicamera Setup for Generating Stereo Panoramic Video Tzavidas, S., Katsaggelos, A.K. Multimedia, IEEE Transactions on Volume: 7, Issue:5 Publication.
1 Minimum-energy broadcasting in multi-hop wireless networks using a single broadcast tree Department of Computer Science and Information Engineering National.
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
Detecting Network Intrusions via Sampling : A Game Theoretic Approach Presented By: Matt Vidal Murali Kodialam T.V. Lakshman July 22, 2003 Bell Labs, Lucent.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
RFID Cardinality Estimation with Blocker Tags
Impact of Problem Centralization on Distributed Constraint Optimization Algorithms John P. Davin and Pragnesh Jay Modi Carnegie Mellon University School.
A New Algorithm for Solving Many-objective Optimization Problem Md. Shihabul Islam ( ) and Bashiul Alam Sabab ( ) Department of Computer Science.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Da Yan, Zhou Zhao and Wilfred Ng The Hong Kong University of Science and Technology.
1/20 Obtaining Shape from Scanning Electron Microscope Using Hopfield Neural Network Yuji Iwahori 1, Haruki Kawanaka 1, Shinji Fukui 2 and Kenji Funahashi.
Suriya, A. September 19, 2015, Slide 0 Atipong Suriya School of MIME March 16, 2011 FE 640 : Term Project Presentation RFID Network Planning using Particle.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
Optimal n fe Tian-Li Yu & Kai-Chun Fan. n fe n fe = Population Size × Convergence Time n fe is one of the common used metrics to measure the performance.
1 Introduction to Estimation Chapter Concepts of Estimation The objective of estimation is to determine the value of a population parameter on the.
Prof. Dr. S. K. Bhattacharjee Department of Statistics University of Rajshahi.
1 A Bayesian Method for Guessing the Extreme Values in a Data Set Mingxi Wu, Chris Jermaine University of Florida September 2007.
Optimal Scheduling of File Transfers with Divisible Sizes on Multiple Disjoint Paths Mugurel Ionut Andreica Polytechnic University of Bucharest Computer.
A Polynomial Time Approximation Scheme For Timing Constrained Minimum Cost Layer Assignment Shiyan Hu*, Zhuo Li**, Charles J. Alpert** *Dept of Electrical.
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
A Hybrid Method for achieving High Accuracy and Efficiency in Object Tracking using Passive RFID Lei Yang 1, Jiannong Cao 1, Weiping Zhu 1, and Shaojie.
U N E C E Software Tools for Statistical Disclosure Control by Complementary Cell Suppression – Reality Check Ramesh A. Dandekar U. S. Department.
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
On Distinguishing the Multiple Radio Paths in RSS-based Ranging Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao and Lionel M. Ni College of Software, Shenzhen.
VAPR: Void Aware Pressure Routing for Underwater Sensor Networks
Brian Macpherson Ph.D, Professor of Statistics, University of Manitoba Tom Bingham Statistician, The Boeing Company.
BodyT2 Throughput and Time Delay Performance Assurance for Heterogeneous BSNs Zhen Ren, Gang Zhou, Andrew Pyles, Mathew Keally, Weizhen Mao, Haining Wang.
Xiaobing Wu, Guihai Chen
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
A Semi-Blind Technique for MIMO Channel Matrix Estimation Aditya Jagannatham and Bhaskar D. Rao The proposed algorithm performs well compared to its training.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Resource Allocation in Hospital Networks Based on Green Cognitive Radios 王冉茵
I Am the Antenna Accurate Outdoor AP Location Using Smartphones Zengbin Zhang†, Xia Zhou†, Weile Zhang†§, Yuanyang Zhang†, Gang Wang†, Ben Y. Zhao† and.
Enhancements to IIIG LTMS By: Todd Dvorak
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
BackPos: Anchor-free Backscatter Positioning for RFID Tags with High Accuracy Tianci Liu, Lei Yang, Qiongzheng Lin, Yi Guo, Yunhao Liu.
Similarity Measurement and Detection of Video Sequences Chu-Hong HOI Supervisor: Prof. Michael R. LYU Marker: Prof. Yiu Sang MOON 25 April, 2003 Dept.
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
1 Chapter 5 Branch-and-bound Framework and Its Applications.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 1 Sriram Chellappan, Xiaole Bai, Bin Ma ‡ and Dong Xuan Presented by Sriram.
1 A Throughput Enhancement Handover Algorithm for WiMAX Network Architecture Hao-Ming Chang and Gwo-Jong Yu Graduate School of Mathematical Sciences, Aletheia.
A Stochastic Frame Based Approach to RFID Tag Searching Ann L. Wang Dept. of Computer Science and Engineering Michigan State University Joint work with.
Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection Qing Cao, Tarek Abdelzaher, Tian He, John Stankovic Department of Computer.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
TEMPLE UNIVERSITY Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications Guoju Gaoa, Mingjun Xiao∗a, Jie Wub, Kai Hana, Liusheng Huanga.
Going Backwards In The Procedure and Recapitulation of System Identification By Ali Pekcan 65570B.
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Multi-hop Coflow Routing and Scheduling in Data Centers
Weihuang Fu1, Zhifeng Tao2, Jinyun Zhang2, and Dharma P. Agrawal1
Cell Size Limitation Notes
MURI Kickoff Meeting Randolph L. Moses November, 2008
Presentation transcript:

Yafeng Yin 1, Lei Xie 1, Jie Wu 2, Athanasios V. Vasilakos 3, Sanglu Lu 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China 2 Department of Computer and Information Sciences, Temple University, USA 3 University of Western Macedonia, Greece Focus and Shoot: Efficient Identification over RFID Tags in the Specified Area MobiQuitous 2013

Outline 1

Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 2 Scenario Warehouse ManagementSampling Inspection  How to efficiently identify the tags in the specified area ? In these kinds of applications, in order to have a good knowledge of the tags in the specified area, we need to identify as many tags as possible in the area efficiently.

System Model  Efficient tag identification in the specified area in the realistic environments. Tag Identification; Specified area; Realistic environments; Tag Identification; Specified area; Realistic environments; target tags interference tags Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 3

System Model Antenna is rotatable.Power is adjustable. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 4

Problem Description target tags Number of target tags in the specified area: m Number of identified target tags: s interference tags Number of identified interference tags: u Efficient tag Identification in the specified area: Identify as many target tags as possible while minimize the execution time.  1) Constraint: Coverage ratio, ≥ α 2) Objective: Minimize execution time T Misreading ratio:, which is related to T. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 5

Challenge target tags interference tags (1) Make the antenna face towards the specified area; (2) How to find the boundary of the area? How to efficiently focus on the specified area ? (3) How to select the optimal power ? Realistic environments: Interference; Energy absorption; Multipath effect… Realistic environments: Interference; Energy absorption; Multipath effect… Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 6

Observations from the realistic environments Angle between the antenna and the tag  1) As the angle between the radiation direction and the surface of the antenna decrease, the reading performance decreases. 2) When a tag is located in the center of the interrogation region, the reader often has a good reading performance, no matter how the tag is placed. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 7

Observations from the realistic environments Angle between the antenna and the tag  1) As the angle between the radiation direction and the surface of the antenna decrease, the reading performance decreases. 2) When a tag is located in the center of the interrogation region, the reader often has a good reading performance, no matter how the tag is placed. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 8

Observations from the realistic environments Reader's Power  1) The larger the reader’s power, the larger the interrogation region. 2) As the power increases, the new identified tags may not be located in the boundary. 3) If a tag can be identified with a low power, it must be identified with a larger power. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 9

Observations from the realistic environments Distance between the tags and the antenna  1) As the distance of the tags and the antenna increases, the reading performance decreases. 2) When the distance and the tags are fixed, the maximum converge ratio has an upper bound. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 10

Observations from the realistic environments Effect of Tag Size  1) The tag size can affect the effective interrogation region. 2) The tag size has little effect on the number of identified tags. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 11

Indication from the realistic environments When the distance between the tags and the antenna is fixed, the distribution of tags is fixed, the converge ratio has an upper bound (Depend on the realistic Environments). If we want to improve the reading performance, we should make the objects be located in the center of the interrogation region. Since the tag size has little effect on the number of identified tag, we can find the boundary of the specified area by identifying some tags around the area. When we need to focus on a specified area, we need to select an optimal power. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 12

Baseline Solutions Identification with Maximum Power In order to identify as many target tags as possible: The solution uses the maximum power to identify the tags. Identification with the maximum power. The effective interrogation region is too large. Weakness: 1) More misreading ratio; 2) More execution time. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 13

Baseline Solutions Identification with Minimum Power In order to only focus on the specified area (not identify the interference tags): The solution uses the minimum power to identify the tags.  It needs to rotate the antenna to scan all the target tags. Weakness: 1) Multiple scans; 2) Low converge ratio; 3) More execution time The effective interrogation region is too small. Identification with the minimum power. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 14 How to make the interrogation region just enough to cover the area ?

Photography based tag Identification with Distance measurement (PID) picture-taking process The process of PID can be compared to the picture-taking process in a camera. —— 1) Focusing Process: focus on the specified area (area A) with a 3D camera; —— 2) Shooting Process: collect the tag IDs in the interrogation region. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 15

Photography based tag Identification with Distance measurement (PID) Focusing Process picture-taking process The process of PID can be compared to the picture-taking process in a camera. —— 1) Focusing Process: focus on the specified area (area A) with a 3D camera; —— 2) Shooting Process: collect the tag IDs in the interrogation region. 1) The antenna rotates towards the center of the specified area A with a 3D camera; 2) The reader adjusts the power to make its scanning range just enough to cover the area A : —— Establishing the boundary; —— Power Stepping; The distance between the tags and the antenna is fixed. The distribution of tags is unknown.  We can only adjust the antenna’s angle and the reader’s power. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 16

Photography based tag Identification with Distance measurement (PID) Focusing Process Establishing the boundary 1) Establishing the boundary: Although the specified area A is appointed by a 3D camera, the reader can hardly find the boundary of the area.  Outline the specified area. 1) Identify a part of interference tags in the boundary: 2) Use these tags as reference tags of the boundary. Minimum interval Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 17, represents the number of tags that should be steadily identified, in order to describe the boundary.

Photography based tag Identification with Distance measurement (PID) Focusing Process Power Stepping 2) Power Stepping: Adjust the reader’s power to make its scanning range be just enough to cover the area A.  Find optimal power to just enough cover the area A. 2) Update reader’s power: 3) Identify tags in the boundary: —— When, optimal power 1) Choose the minimum active power ;, is related to the realistic environments, while can be derived from the value coverage ratio. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 18

Photography based tag Identification with Distance measurement (PID) Shooting Process ID 1, ID 2, ID 3, …, ID n ID i Request message We do not modify any parameter of the commercial reader (Alien-9900+), which conforms to EPC C1G2 Standard. Objective: Collecting the tag IDs in the interrogation region. Approach: —— Identifying one tag ID in each slot. —— Only no tags respond to reader, the process terminates, which means each tag has transmitted its tag ID to the reader. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 19

Photography based tag Identification with Angle rotation (PIA) Identify the target tags without any auxiliary equipment. Focusing Process Exploring the boundary 1) Exploring the boundary: Rotate the antenna to explore the boundary of the specified area.  Outline the specified area. 1) Identify a part of target tags: 2) Identify some interference tags N l ( N r ) of the boundary by rotating ( ) to left (right); reference tags 3) Use the tags identified with smaller angle as the reference tags of the boundary. Smaller angle Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 20 and. The remaining process is the same as that in PID.

Performance Evaluation System Prototypes Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 21 d Minimum Interval: l d The center box is the specified area. The number of target tags in the specified area is s. The number of interference tags out of the specified area is u. We get α=60% and based on the realistic environments. We vary s, u, d, l to evaluate the performance of each solution. Performance Metrics: Execution time, coverage ratio, misreading ratio.

Performance Evaluation We set d =1m, l =1m, s =80, u =70 by default. Coverage Ratio PID, PIA, and MaxPw can satisfy the requirement of coverage ratio. MinPw can not satisfy the requirement because of its power is too small.  We ignore MinPw in the following comparisons. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 22

Performance Evaluation We set d =1m, l =1m, s =80, u =70 by default. Execution Time PID and PIA have better performances than MaxPw. When s =120, PID can reduce T by 46% compared to MaxPw. When u=270, PID can reduce T by 84.5% compared to MaxPw. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 23

Performance Evaluation We set d =1m, l =1m, s =80, u =70 by default. Misreading Ratio PID and PIA have lower misreading ratios that MaxPw, because PID and PIA only focus on the specified area and use the optimal power. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 24

Conclusion —— We investigate the problem of tag identification in the specified area. —— We conduct extensive experiments on the commodity RFID systems. —— We propose the photography based identification method, which works in a similar way of picture-taking in a camera. Based on the picture-taking scheme, we propose two solutions PID and PIA. 1) PID works with a 3D camera; 2) PIA works without any auxiliary equipment. —— Realistic environments show that our solutions outperform the baseline solutions. Motivation and ProblemEvaluation and ConclusionObservationsBaseline SolutionsOur Solutions 25

Thank you ! Questions ? MobiQuitous 2013