Presentation is loading. Please wait.

Presentation is loading. Please wait.

Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15 th.

Similar presentations


Presentation on theme: "Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15 th."— Presentation transcript:

1 Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15 th

2 Agenda Goals Goals RFID Concepts RFID Concepts RFID Applications RFID Applications Event Processing and RFID Events Event Processing and RFID Events Use Cases Use Cases Requirements for Event Processing with RFID Applications Requirements for Event Processing with RFID Applications

3 Agenda Presentations Presentations Dr In K. Mun, Director, Hospital Research HRI, MIT Dr In K. Mun, Director, Hospital Research HRI, MIT RFID for Hospital Asset Tracking RFID for Hospital Asset Tracking Mark Tsimelzon, President and CTO, Coral8 Mark Tsimelzon, President and CTO, Coral8 RFID for Personal Security in Theme Parks RFID for Personal Security in Theme Parks Tom Abraham, Director of Solutions, Xterprise Tom Abraham, Director of Solutions, Xterprise Multiple Event Streams in Supply Chain Applications Multiple Event Streams in Supply Chain Applications Dieter Gawlick, Architect, Oracle Dieter Gawlick, Architect, Oracle ChemSecure Use Case ChemSecure Use Case Tao Lin, Director AutoID Infrastructure, SAP Labs Tao Lin, Director AutoID Infrastructure, SAP Labs RFID, Event Processing and Business Applications RFID, Event Processing and Business Applications

4 Goals Define use cases where event processing can be applied to RFID Define use cases where event processing can be applied to RFID Identify weaknesses in event processing concepts and technologies with respect to RFID Identify weaknesses in event processing concepts and technologies with respect to RFID Identify opportunities for RFID with event processing concepts Identify opportunities for RFID with event processing concepts Are sensor applications the next Event Processing sweet spot? Are sensor applications the next Event Processing sweet spot?

5 RFID Concepts (relevant to EP) Serialized identifier for assets Serialized identifier for assets Identifier structure (tag content) Identifier structure (tag content) No line of sight requirement No line of sight requirement Filtering & Collection Filtering & Collection Event Granularity Event Granularity Other types of Sensors and event input Other types of Sensors and event input

6 Event Processing & RFID Events Event Collection Event Collection Raw Read Raw Read Reader Controller/Management Reader Controller/Management Capture Applications Capture Applications Correlate Correlate Retrieve and apply context Retrieve and apply context To other events (same tag) To other events (same tag) To different asset class To different asset class To other event streams To other event streams React React Event Report/Analysis Event Report/Analysis Higher level business messages to application ecosystem Higher level business messages to application ecosystem Higher level event correlation Higher level event correlation Event Repository Event Repository Archive/Consolidate Archive/Consolidate Support track and trace with required level of detail Support track and trace with required level of detail

7 Tag & EPC 21.203D2A9.16E8B8.719BAE03C - Tag - - EPC - Scale Printer Digital I/O Lightstack PLC DeviceNet Optical Profibus Counter RFID Mobile Device Data Store Device Device Middleware EPC Data Management Manufacture Execution Asset Maintenance Logistics TransportationPlanningAnalytics

8 RFID/EPC Applications Applications Applications Supply Chain Supply Chain Inventory tracking Inventory tracking Surveillance Surveillance Asset Management Asset Management Security Security Locating Locating Pedigree Tracking Pedigree Tracking Industries Industries CP Retailer Health Aerospace and defense Utility Pharma

9 Use Case 1: Cold Chain Compliance in Supply Chain

10 Sample Business Cases Warehousing / Supply Chain / Transportation Warehousing / Supply Chain / Transportation Creates a chain of custody to determine where in the cold chain a temperature breach has occurred if at all Creates a chain of custody to determine where in the cold chain a temperature breach has occurred if at all With integration, this solution can tell operators in real time, to accept, reject, or accelerate the product through the supply chain (dynamic queuing—not limited to FIFO or Expiration Date) With integration, this solution can tell operators in real time, to accept, reject, or accelerate the product through the supply chain (dynamic queuing—not limited to FIFO or Expiration Date) Disaster Planning and Recovery Disaster Planning and Recovery Allows companies to understand the temperature changes in products when an anticipated power outage takes place. Executed at retail stores with a handheld and tags in the coolers / freezers. Allows companies to understand the temperature changes in products when an anticipated power outage takes place. Executed at retail stores with a handheld and tags in the coolers / freezers.

11 Web Based Reporting (Secured)

12 Sample Business Case Benefits Accountability / Profitability Financial obligation for refused product is placed on the correct source in the chain of custody because there is a correlation between the cold chain breach and the time it took place Financial obligation for refused product is placed on the correct source in the chain of custody because there is a correlation between the cold chain breach and the time it took placeQuality The shelf life of temperature sensitive products is impacted in a negative manner by variations in temperature. The shelf life of temperature sensitive products is impacted in a negative manner by variations in temperature. In understanding the impact temperature has on shelf life, the amount of time that the product was in an unacceptable temperature range must be known (degree minutes). In understanding the impact temperature has on shelf life, the amount of time that the product was in an unacceptable temperature range must be known (degree minutes).

13 Sample Business Case Benefits, cont’d In-stock Position Cold chain breaches are identified immediately versus when the recipient opens the product and determines that it is unacceptable. That product must be immediately reordered and increases the safety stock levels. Cold chain breaches are identified immediately versus when the recipient opens the product and determines that it is unacceptable. That product must be immediately reordered and increases the safety stock levels. Food Safety Liability Microbial activity starts at an exponential rate at temperatures over 40°F Microbial activity starts at an exponential rate at temperatures over 40°F The consequences of infecting a customer with this type of illness are detrimental, not only from a financial sense but a company’s reputation is tarnished. The consequences of infecting a customer with this type of illness are detrimental, not only from a financial sense but a company’s reputation is tarnished.

14 Use Case 2: Asset Management (Hospital)

15 Patient Wristband Blood Product Management ER, OR, ICU Management Point of Care Pharmaceutical Pedigree Combating Counterfeit Drugs Asset Management RFID Applications At Hospitals

16  National average utilization of mobile equipment is 45% - Universal Hospital Services  Hospitals can lose nearly $1 million a year in medical equipment thefts alone - HCPro Healthcare Marketplace  Five to fifteen percent of hospital inventory is written off each year since it can no longer be located or more importantly serviced - Frost & Sullivan  “Equipment moving from patient to patient without going through decontamination in between has become a significant issue to JCAHO in regard to infection control in hospitals” - JCAHO Sentinel Alert  To prevent infant mix-up  To build an infrastructure Why Asset Management?

17  Location Identification  Security  Inventory Management  Utilization  Requisition / Distribution  Rentals  Safety / Risk Management  Transport  Equipment Cleaning  Regulatory Compliance  Clinical Engineering  Financing / Accounting Business Process Management RFID Positioning System RFID-Enabled Equipment Management Application Asset Tracking Equipment Management

18 Use Case 3 – People Tracking/Security

19 Losing a Child is a HUGE Problem Kids get lost everywhere: amusement parks, shopping malls, stadiums, skiing areas, etc. Kids get lost everywhere: amusement parks, shopping malls, stadiums, skiing areas, etc. Kids tend to wander away Kids tend to wander away Kids are sometimes kidnapped Kids are sometimes kidnapped If a child is missing, EVERY SECOND COUNTS If a child is missing, EVERY SECOND COUNTS

20 Solution Overview 1. Enrich RFID data by doing a DB subquery Reader locations Reader locations Family information Family information 2. Split the enriched stream into Parents and Children streams 3. Join Parents and Children streams and select the pairs that are far apart

21 Location-based RFID Applications: Lessons Learned Must analyze large volumes of data at high data rates Must analyze large volumes of data at high data rates Must provide real-time response Must provide real-time response Must enrich real-time data with reference data from databases Must enrich real-time data with reference data from databases Must provide functionality to make distance-based correlation easy Must provide functionality to make distance-based correlation easy

22 Summary

23 Common Themes for Sensors & EP Interfacing with Real World Interfacing with Real World Volumes, incomplete data, out of order Volumes, incomplete data, out of order Temporal Horizons Temporal Horizons Some short Some short Some longer term Some longer term Deriving Higher Level Events Deriving Higher Level Events At different levels in the information chain At different levels in the information chain Environments with Multiple Streams Environments with Multiple Streams Event Processing Driving Process Management in Dynamic Environments Event Processing Driving Process Management in Dynamic Environments

24 Goals Define use cases where event processing can be applied to RFID Define use cases where event processing can be applied to RFID Identify weaknesses in event processing concepts and technologies with respect to RFID Identify weaknesses in event processing concepts and technologies with respect to RFID Identify opportunities for RFID with event processing concepts Identify opportunities for RFID with event processing concepts Are sensor applications the next Event Processing sweet spot? Are sensor applications the next Event Processing sweet spot?

25 Challenges for EP in RFID Cost Cost Is there COTS opportunity? Is there COTS opportunity? It’s a hardware world … It’s a hardware world … Do enterprises realize that they have an event based problem? Do enterprises realize that they have an event based problem? Implementing hierarchical filtering and correlation Implementing hierarchical filtering and correlation

26 Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15th


Download ppt "Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15 th."

Similar presentations


Ads by Google