SlideShare a Scribd company logo
1 of 42
RFID TAG THE WORLD OF OBJECTS Davide Del Monte –  www.diplod.it   – Complex Adaptive Systems 2008 – Management Engineering – unimore –  http://www.ingre.unimore.it/
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Outline Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009
What is RFID Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009
What is RFID ,[object Object],[object Object],Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 Wikipedia definition of RFID
Components and types of RFID tag ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 125/134 kHz 13,56 MHz 868/915 MHz >2,4 GHz international standard for RFID:  Epc Gen2  Electronic Product Code Generation 2: From Wikipedia
Communication in passive tags Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore Image from Alien Guide Image from Alien Guide
RFID vs BAR CODE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009 ..but RFID are not only for identification scope..
[object Object],[object Object],[object Object],[object Object],Detection of interactions with RFID tagged Objects Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009
Idea ,[object Object],Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009
Tagged objects and movements ,[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Response rate  α ,[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore ,[object Object],[object Object]
Experiments and scenarios ,[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore All 23 pick up / put down events were detected, all 3 motions with an object were detected, and all 4 hand-waves were correctly labeled as occlusions: 100% accuracy by the algorithm. No false positives occurred. ,[object Object],All 9 pick up / put down events were detected, and one of the 3 placements were detected: the other two were not. No false positives occurred. Overall, 10 of 12 events were detected, for an accuracy of 83%.
Parameters and conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],[object Object],[object Object],Inferring activities from interaction with objects Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Idea ,[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Prototype and models ,[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Create the model ,[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Experiments ,[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Results ,[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore PROACT correctly inferred that an activity occurred 88 percent of the time Applications are possible in health-care: ADL monitoring of elders with earlystage dementia
Other studies Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore A Scalable Approach to Activity Recognition Based on Object Use “ The ability to recognize human activities from sensory information is essential for developing the next generation of smart devices. Many human activity recognition tasks are — from a machine learning perspective — quite similar to tagging tasks in natural language processing.” From  Relational Transformation-Based Tagging for Human Activity Recognition
[object Object],RFIG Lamps: Interacting with a self-describing world via photosensing wireless tags and projectors Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],Objects become self-describing Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Augmented reality ,[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],..but we aren’t Neo. In the real world? Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Antitheft systems and human implants ,[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore See  www.amal.net   From Wikipedia
Passport and payment methods ,[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Logistic and Domotic ,[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Yes.. Also my car! ,[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore Wikipedia definition of DST
And much more.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore From Wikipedia
[object Object],Java Experiments with Alien Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],[object Object],Alien reader Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],Setting IP Address Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
MessageListenerTest ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
MessageReceived ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],Output Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Output ,[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
XML Message ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Writing Data ,[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore String tagID = "12345678"; reader.setProgAntenna(0); //set the antenna for programming tag reader.eraseTag(); //erase data reader.programTag(tagID); //set new tag ID
Session ,[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
Session Code ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
[object Object],..and this is the session Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore
THANKS Davide Del Monte –  www.diplod.it   – Complex Adaptive Systems 2008 – Management Engineering – unimore –  http://www.ingre.unimore.it/ Bibliography I Sense a Disturbance in the Force: Unobtrusive Detection of  Interactions with RFID-tagged Objects http://www.intel-research.net/Publications/Seattle/062420041544_244.pdf Inferring Activities from Interactions with Objects. http://192.5.53.208/u/kautz/papers/pervasive_proact_final.pdf A Scalable Approach to Activity Recognition Based on Object Use http://seattleweb.intel-research.net/people/matthai/pubs/iccv07.pdf RFIG Lamps: Interacting with a self-describing world via photosensing wireless tags and projectors http://www.merl.com/people/raskar/Sig04/ Alien Technology http://www.alientechnology.com/ EPC http://www.epcglobalinc.org/home Amal Graafstra http://www.amal.net/ Wikipedia http://en.wikipedia.org/wiki/RFID

More Related Content

What's hot

What's hot (20)

Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
RFID
RFIDRFID
RFID
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
RFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar TopicRFID Technology - Electronics and Communication Seminar Topic
RFID Technology - Electronics and Communication Seminar Topic
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 
RFID
RFID RFID
RFID
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
RFID
RFIDRFID
RFID
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 

Similar to RFID Tag Detection of Object Interactions

Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...
Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...
Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...SensorUp
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing SocietyFaisal Razzak
 
Visually Impaired People Monitoring in a Smart Home using Electronic White Cane
Visually Impaired People Monitoring in a Smart Home using Electronic White CaneVisually Impaired People Monitoring in a Smart Home using Electronic White Cane
Visually Impaired People Monitoring in a Smart Home using Electronic White CaneAIRCC Publishing Corporation
 
VISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANE
VISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANEVISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANE
VISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANEijcsit
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iemArpan Pal
 
Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...Muragesh Kabbinakantimath
 
Godeye An Efficient System for Blinds
Godeye An Efficient System for BlindsGodeye An Efficient System for Blinds
Godeye An Efficient System for Blindsijtsrd
 
A real time aggressive human behaviour detection system in cage environment a...
A real time aggressive human behaviour detection system in cage environment a...A real time aggressive human behaviour detection system in cage environment a...
A real time aggressive human behaviour detection system in cage environment a...Journal Papers
 
iot module 1 ppt.pptx
iot module 1 ppt.pptxiot module 1 ppt.pptx
iot module 1 ppt.pptxShreeDevi42
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence DroneBasilA2
 
iot module 1 ppt (3).pdf
iot module 1 ppt (3).pdfiot module 1 ppt (3).pdf
iot module 1 ppt (3).pdfShreeDevi42
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 

Similar to RFID Tag Detection of Object Interactions (20)

Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...
Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...
Discussion materials for Internet of Things and Smart Cities - Vespucci 2016 ...
 
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning TechniquesIJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniques
 
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESMALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUES
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
WoD: Application for Ageing Society
WoD: Application for Ageing SocietyWoD: Application for Ageing Society
WoD: Application for Ageing Society
 
L16 Internet of Things
L16 Internet of ThingsL16 Internet of Things
L16 Internet of Things
 
Visually Impaired People Monitoring in a Smart Home using Electronic White Cane
Visually Impaired People Monitoring in a Smart Home using Electronic White CaneVisually Impaired People Monitoring in a Smart Home using Electronic White Cane
Visually Impaired People Monitoring in a Smart Home using Electronic White Cane
 
VISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANE
VISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANEVISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANE
VISUALLY IMPAIRED PEOPLE MONITORING IN A SMART HOME USING ELECTRONIC WHITE CANE
 
delna's journal
delna's journaldelna's journal
delna's journal
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
 
Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...Internet of Things for Underground Drainage and Manhole monitoring System for...
Internet of Things for Underground Drainage and Manhole monitoring System for...
 
Godeye An Efficient System for Blinds
Godeye An Efficient System for BlindsGodeye An Efficient System for Blinds
Godeye An Efficient System for Blinds
 
A real time aggressive human behaviour detection system in cage environment a...
A real time aggressive human behaviour detection system in cage environment a...A real time aggressive human behaviour detection system in cage environment a...
A real time aggressive human behaviour detection system in cage environment a...
 
iot module 1 ppt.pptx
iot module 1 ppt.pptxiot module 1 ppt.pptx
iot module 1 ppt.pptx
 
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence Drone
 
iot module 1 ppt (3).pdf
iot module 1 ppt (3).pdfiot module 1 ppt (3).pdf
iot module 1 ppt (3).pdf
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
G017133033
G017133033G017133033
G017133033
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

RFID Tag Detection of Object Interactions

  • 1. RFID TAG THE WORLD OF OBJECTS Davide Del Monte – www.diplod.it – Complex Adaptive Systems 2008 – Management Engineering – unimore – http://www.ingre.unimore.it/
  • 2.
  • 3. What is RFID Davide Del Monte - www.diplod.it - Management Engineering @ unimore Jun 2, 2009
  • 4.
  • 5.
  • 6. Communication in passive tags Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore Image from Alien Guide Image from Alien Guide
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Other studies Jun 2, 2009 Davide Del Monte - www.diplod.it - Management Engineering @ unimore A Scalable Approach to Activity Recognition Based on Object Use “ The ability to recognize human activities from sensory information is essential for developing the next generation of smart devices. Many human activity recognition tasks are — from a machine learning perspective — quite similar to tagging tasks in natural language processing.” From Relational Transformation-Based Tagging for Human Activity Recognition
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. THANKS Davide Del Monte – www.diplod.it – Complex Adaptive Systems 2008 – Management Engineering – unimore – http://www.ingre.unimore.it/ Bibliography I Sense a Disturbance in the Force: Unobtrusive Detection of Interactions with RFID-tagged Objects http://www.intel-research.net/Publications/Seattle/062420041544_244.pdf Inferring Activities from Interactions with Objects. http://192.5.53.208/u/kautz/papers/pervasive_proact_final.pdf A Scalable Approach to Activity Recognition Based on Object Use http://seattleweb.intel-research.net/people/matthai/pubs/iccv07.pdf RFIG Lamps: Interacting with a self-describing world via photosensing wireless tags and projectors http://www.merl.com/people/raskar/Sig04/ Alien Technology http://www.alientechnology.com/ EPC http://www.epcglobalinc.org/home Amal Graafstra http://www.amal.net/ Wikipedia http://en.wikipedia.org/wiki/RFID