• Save
090302 Identifying Rfid Embedded Objects In Pervasive Healthcare Applications
Upcoming SlideShare
Loading in...5
×
 

090302 Identifying Rfid Embedded Objects In Pervasive Healthcare Applications

on

  • 1,689 views

 

Statistics

Views

Total Views
1,689
Views on SlideShare
1,667
Embed Views
22

Actions

Likes
0
Downloads
0
Comments
0

3 Embeds 22

http://g9676055.blogspot.com 16
http://www.slideshare.net 4
http://g9676055.blogspot.tw 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

090302 Identifying Rfid Embedded Objects In Pervasive Healthcare Applications 090302 Identifying Rfid Embedded Objects In Pervasive Healthcare Applications Presentation Transcript

  • Identifying RFID- embedded objects in pervasive healthcare applications 1
  • Reference  Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu “Identifying RFID-embedded objects in pervasive healthcare applications” , Decision Support Systems Volume 46 , Issue 2 (January 2009) 2
  • Outline  Introduction  RFID tags and healthcare  Related literature on improving RFID tag identification accuracy  Proposed methods  Discussion 3
  • Introduction  The primary goal of pervasive healthcare is to be able to deliver necessary quality healthcare service anytime to anyone regardless of location and other constraints.  The underlying principle in most of these intelligent information systems are rather similar to the extent that they all utilize knowledge in some form to enable decision making in the healthcare environment. Clinical Decision Support Systems (CDSS) Intelligent Decision Support Systems (IDSS) Healthcare Information Systems (HIS) 4
  • Introduction  RFID tags are used in scenarios an object needs to be identified tracked when ambient condition surrounding an object is captured stored  Although it is generally assumed that data read from RFID tags are highly accurate, variations in accuracy can and do occur due to several reasons. 5
  • RFID tags and healthcare  One of the largest volumes of RFID application has been in the healthcare industry, where about 4.5 million tags have been used every year on Diprivan drug syringes by AstraZeneca since 1999.  Asset tracking is a prime candidate for RFID applications A typical hospital is unable to locate about 15–20% of its assetswhen needed  Cost and privacy concerns have generally been recognized as major factors in the success of RFID applications 6
  • RFID tags and healthcare  Three main areas benefit from RFID technology in the healthcare industry: (1) asset management (2) patient care (3) inventory management 7
  • Related literature on improving RFID tag identification accuracy  Bai et al. propose means to filter and clean data streams from RFID applications that contain false (e.g., false positive, false negative) readings and duplicates  To improve RFID tag detection reliability, Agarwal et al. let the reader sample every 2 s  Data reliability and ambiguity are two major issues in extraction of information from RFID data  Khoussainova et al. use probabilistic method to provide the application with the flexibility to build its own balance between detection and precision rate 8
  • Proposed methods  False positives and false negatives can be a problem in RFID-embedded systems, especially when signal from a given tag is blocked by an impenetrable object (e.g., metal shielding) or when corrupted signal is read  Algorithm 1 (the base case)  Algorithm 2  Algorithm 3  Algorithm 4  Results 9
  • Algorithm 1 (the base case) 10
  • Algorithm 2 11
  • Algorithm 3 12
  • Algorithm 4 13
  • Algorithm 4 14
  • Results  We simulated the four algorithms presented above 10 times with 1000 readings per run with the following assumptions: The tag T (or, T1 in Algorithm 4) is always present (or, absent) during both the reads in a reader's field  Algorithm 1  Algorithm 2  Algorithm 3  Algorithm sliding window 15
  • Results 16
  • The p-values for results (using pairwise t-test) 17
  • Average false positive cases using different probability values for reader R1 18
  • Average false negative cases using different probability values for reader R1 19
  • Average overall false cases using different probability values for reader R1 20
  • Average false positive cases using different probability values for reader R2 21
  • Average false negative cases using different probability values for reader R2 22
  • Average overall false cases using different probability values for reader R2 23
  • Discussion  The algorithms to reduce false positives and false negatives while identifying the presence/absence of an RFID tag in the field of a reader, and illustrated these algorithms by means of an example scenario (Although our results are based on simplified assumptions)  Any successful attempt at improving true (positive and negative) readings would ultimately increase the performance and efficiency of RFID tag-enabled systems  This is even more salient given that the methods proposed in this paper can be implemented with minimal resources and effort 24