SlideShare a Scribd company logo
Reliability
 improvement for an
RFID-based psychiatric
 patient localization
       system
Reference

 Chieh-Ling Huang, Pau-Choo Chung, Ming-Hua Tsai,
 Yen-Kuang Yang, Yu-Chia Hsu Reliability improvement
 for an RFID-based psychiatric patient localization
 system IEEE Computer Communications 31 (2008)
 2039–2048




                                                       2
Outline

 Introduction
 System overview
 Reliability improvement with field generator scheduling
 Experiments
 Conclusion




                                                           3
Introduction

 Psychiatric patients often cannot control their actions,
  occasionally resulting in dangerous behavior
 RFID technology has been utilized in various
  applications, including supply chain management, entry
  and exit control
 Localizing moving objects, e.g., freight localization or
  human localization is a challenging and relatively
  unexplored task
 presents a novel graph coloring with merging and
  deletion (GCMD) algorithm


                                                             4
System overview
 The Department of Psychiatry, National Cheng Kung University
  Hospital (NCKUH) uses an RFID-based psychiatric patient
  localization system
   The second floor serves as a clinic for psychiatric patients, and the third floor
    is an activity area
   Nurses : scheduling daily activities and providing basic care
   Doctors : medical treatment
 This RFID-based psychiatric patient localization system uses a
  ultra high frequency (UHF) long range tracker. The Field
  Generators operate on 433 MHz when triggering the Tag to
  respond, and the Tag replies to a Reader with 916 MHz signal
  once it is triggered
 Psychiatric patients in the care center wear watch-like Tags, Tag
  transmits information, including Tag ID and Field Generator ID


                                                                                      5
System overview




                  6
Reliability improvement with
     field generator scheduling
 This system relies on the Tag correctly receiving signal from
  the Field Generators to estimate the Tag location
 Two Field Generators with overlapping transmission ranges
  simultaneously issuing trigger signals to a Tag causes signal
  interferences in the overlapped region
 This interference results in loss of signal and, therefore,
  decreases localization accuracy
 Transform the relationships among all Field Generators into
  a graph
 Vertex deletion and merging
 Vertex coloring
 Operation slot allocation


                                                                  7
Reliability improvement with
 field generator scheduling




                               8
Transform the relationships among
  all Field Generators into a graph
 The relationships among Field Generators are
 transformed into an undirected graph G, whereas V and
 E are sets of vertices and edges, respectively. Where V
 and E are derived based on the Field Generators and
 their signal region overlapping situations, respectively




                                                            9
Vertex deletion

 When the range of one Field Generator, FGx, is
 completely covered by other Field Generators, the
 function of FGx can be replaced by a combination of
 these other Field Generators




                                                       10
Vertex merging

 The entire overlapping region is covered by a union of
 Field Generators, so other Field Generators can cover
 the overlapping region
 Consequently, the two vertices associated with the two
 Field Generators can be merged, and no special care is
 required to avoid signal interference from the two Field
 Generators




                                                            11
Vertex coloring

 A coloring algorithm is applied to the trimmed graph, in
  which connected vertices are assigned different colors
 The Field Generators with the same color are assigned
  to the same group, and, therefore, can transmit signals
  simultaneously
 Conversely, the Field Generators with different colors
  are assigned to different groups; scheduling must be
  applied to avoid signal conflict



                                                             12
Operation slot allocation

 A weighted TDMA is applied to assign time slots for
  operation to each group
 Consider that each partitioned group can occupy
  different levels of importance
 Another consideration is the size of an area covered by a
  group of Field Generators
 The importance factor for each group wi can be
  approximated
 The time slot ratio for each group



                                                              13
Experiments

 Elucidating system performance


 Fixed-points test


 Route test




                                   14
15
16
Elucidating system performance




                                 17
Elucidating system performance

 Tags
  send out responses periodically (reciprocated regularly)
  only when triggered by Field Generators


 A patient’s location is computed based on the
  communication range of the patient’s Tag within the
  Field Generators with respect to ranges of reference
  Tags



                                                              18
Elucidating system performance

 More than two Tags are sending reports back to the
 Reader simultaneously             Repetitive transmission

 Repetitive transmission times are set at 6 and the
 associated lasting time is Trep




                                                             19
Elucidating system performance

 Time in field (TIF) time: a Tag can be programmed with
 a TIF Time (TTIF) that specifies the time duration before
 the Tag can be triggered again
  A Reader receives two consecutive reports from the same Tag.
   How can the Reader determine whether the two reports are
   issued due to two separate triggers, or whether the two reports
   are due to a repetitive response trigger?
  Another aim of TIF time is to prevent Tags from wasting
   energy replying to the same trigger from a Field Generator




                                                                     20
Elucidating system performance
 Trep + TTIF is defined as one round; if one of the six
  responses in one round is received, this round is regarded as
  successfully received
 lost rate of responses L as the total number of lost rounds
  divided by the total number of rounds that should trigger the
  Tag:                        r denotes the number of rounds that
  the Reader successfully received Tag’s reply signal and T
  represents time cost
 In this system, it takes roughly three rounds for a patient to
  move from the building exit to the main gate. Under this
  scenario, we define response rate Rn as:                   n is
  the number of rounds – 3 in this case

                                                                    21
Fixed-points test

 positions 1–6 reside in single Field Generator range
 positions 7–10 are located in the overlapping region of two
  Field Gen-erators
 positions 11–14 are in the overlapped region for three Field
  Generators
 position 15 is in the overlapping region of four Field
  Generators
 people wearing Tags stand at each fixed position for 1 min
 group1 is assigned 2 s for operation and group2 is assigned
  1s


                                                                 22
Fixed-points test




                    23
Fixed-points test




                    24
Fixed-points test




                    25
Route test

 5 routes
 (a) Route1 is the path passing the 15 representative points
 (b) Route2 is the path connecting with poor reliability in the
  fixed-point test
 (c) Route3 is the path connecting points with high reliability
 (d) Route4 is the path of shortest distance from the building
  exit to the main gate and
 (e) Route5 is a route tracing through a region that is rarely
  covered by routes (a–d)


                                                                   26
 (a) The route
  connecting 15
  representative
  points
 (b) The route
  connecting the
  lowest reliability
  points
 (c) The route
  connecting the
  highest reliability
  points
 (d) The route
  having the shortest
  path from exit to
  main gate
 (e) The route
  tracing a region
  not tested in (a–d)

                        27
Route test




             28
Route test




             29
Route test




             30
Route test




             31
Experiments

 position 3: The Field Generator has difficulty reaching
  this sharp corner and the Tag cannot reach the Reader.
  Thus, a Reader is added at position 10
 Experimental results: response rate for position 3 improves
  from 0% to 57.81% in the unscheduled original system,
  and from 14.26% to 83.36% using GCMD scheduling
 Transmission time slots should be based on group
  importance
 For group covering important regions or large areas
  should be allocated increased time periods


                                                                32
Reliability comparison for original system and the
     system with proposed GCMD algorithm




                                                     33
Conclusion

 The RFID devices that are small and relatively cheap are
  very appropriate for use in localizing psychiatric Patients
 In this study, a GCMD scheduling model is utilized for
  scheduling Field Generator transmissions in an RFID-based
  psychiatric patient localization system, thereby reducing
  interference caused by Field Generators located near one
  another
 Experimental results demonstrated that the system is highly
  effective when using the proposed scheduling algorithm



                                                                34

More Related Content

Similar to Reliability Improvement For An Rfid Based Psychiatric Patient Localization

Conv-TasNet.pdf
Conv-TasNet.pdfConv-TasNet.pdf
Conv-TasNet.pdf
ssuser849b73
 
Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...
Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...
Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...
Luca Sinico
 
Reporting.ppt
Reporting.pptReporting.ppt
Reporting.ppt
asodiatel
 
Conducting and reporting the results of a cfd simulation
Conducting and reporting the results of a cfd simulationConducting and reporting the results of a cfd simulation
Conducting and reporting the results of a cfd simulation
Malik Abdul Wahab
 
Trackster Pruning at the CMS High-Granularity Calorimeter
Trackster Pruning at the CMS High-Granularity CalorimeterTrackster Pruning at the CMS High-Granularity Calorimeter
Trackster Pruning at the CMS High-Granularity Calorimeter
Yousef Fadila
 
DSUS_MAO_2012_Jie
DSUS_MAO_2012_JieDSUS_MAO_2012_Jie
DSUS_MAO_2012_Jie
MDO_Lab
 
Primary mirror edge sensor project for the Southern African Large Telescope
Primary mirror edge sensor project for the Southern African Large TelescopePrimary mirror edge sensor project for the Southern African Large Telescope
Primary mirror edge sensor project for the Southern African Large Telescope
DeonBester4
 
Change Impact Analysis for Natural Language Requirements
Change Impact Analysis for Natural Language RequirementsChange Impact Analysis for Natural Language Requirements
Change Impact Analysis for Natural Language Requirements
Lionel Briand
 
Navigation Control of Agent Automobiles Using Wireless Sensor Network
Navigation Control of Agent Automobiles Using Wireless Sensor NetworkNavigation Control of Agent Automobiles Using Wireless Sensor Network
Navigation Control of Agent Automobiles Using Wireless Sensor Network
Mohammad Samadi Gharajeh
 
AIAA-MAO-RegionalError-2012
AIAA-MAO-RegionalError-2012AIAA-MAO-RegionalError-2012
AIAA-MAO-RegionalError-2012
OptiModel
 
MobileNet - PR044
MobileNet - PR044MobileNet - PR044
MobileNet - PR044
Jinwon Lee
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
InVID Project
 
LTE KPI Optimization - A to Z Abiola.pptx
LTE KPI Optimization - A to Z Abiola.pptxLTE KPI Optimization - A to Z Abiola.pptx
LTE KPI Optimization - A to Z Abiola.pptx
ssuser574918
 
Measurement Procedures for Design and Enforcement of Harm Claim Thresholds
Measurement Procedures for Design and Enforcement of Harm Claim ThresholdsMeasurement Procedures for Design and Enforcement of Harm Claim Thresholds
Measurement Procedures for Design and Enforcement of Harm Claim Thresholds
Pierre de Vries
 
QC of gamma camera using different phantoms and their specification
QC of gamma camera using different phantoms and their specificationQC of gamma camera using different phantoms and their specification
QC of gamma camera using different phantoms and their specification
Preetrana12
 
Multiple UGV SLAM Map Sharing
Multiple UGV SLAM Map SharingMultiple UGV SLAM Map Sharing
Multiple UGV SLAM Map Sharing
Akash Borate
 
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Prasanna Shanmugasundaram
 
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET Journal
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)kike2005
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
Hakim Zentani
 

Similar to Reliability Improvement For An Rfid Based Psychiatric Patient Localization (20)

Conv-TasNet.pdf
Conv-TasNet.pdfConv-TasNet.pdf
Conv-TasNet.pdf
 
Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...
Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...
Review of the paper: Traffic-aware Frequency Scaling for Balanced On-Chip Net...
 
Reporting.ppt
Reporting.pptReporting.ppt
Reporting.ppt
 
Conducting and reporting the results of a cfd simulation
Conducting and reporting the results of a cfd simulationConducting and reporting the results of a cfd simulation
Conducting and reporting the results of a cfd simulation
 
Trackster Pruning at the CMS High-Granularity Calorimeter
Trackster Pruning at the CMS High-Granularity CalorimeterTrackster Pruning at the CMS High-Granularity Calorimeter
Trackster Pruning at the CMS High-Granularity Calorimeter
 
DSUS_MAO_2012_Jie
DSUS_MAO_2012_JieDSUS_MAO_2012_Jie
DSUS_MAO_2012_Jie
 
Primary mirror edge sensor project for the Southern African Large Telescope
Primary mirror edge sensor project for the Southern African Large TelescopePrimary mirror edge sensor project for the Southern African Large Telescope
Primary mirror edge sensor project for the Southern African Large Telescope
 
Change Impact Analysis for Natural Language Requirements
Change Impact Analysis for Natural Language RequirementsChange Impact Analysis for Natural Language Requirements
Change Impact Analysis for Natural Language Requirements
 
Navigation Control of Agent Automobiles Using Wireless Sensor Network
Navigation Control of Agent Automobiles Using Wireless Sensor NetworkNavigation Control of Agent Automobiles Using Wireless Sensor Network
Navigation Control of Agent Automobiles Using Wireless Sensor Network
 
AIAA-MAO-RegionalError-2012
AIAA-MAO-RegionalError-2012AIAA-MAO-RegionalError-2012
AIAA-MAO-RegionalError-2012
 
MobileNet - PR044
MobileNet - PR044MobileNet - PR044
MobileNet - PR044
 
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
Comparison of Fine-tuning and Extension Strategies for Deep Convolutional Neu...
 
LTE KPI Optimization - A to Z Abiola.pptx
LTE KPI Optimization - A to Z Abiola.pptxLTE KPI Optimization - A to Z Abiola.pptx
LTE KPI Optimization - A to Z Abiola.pptx
 
Measurement Procedures for Design and Enforcement of Harm Claim Thresholds
Measurement Procedures for Design and Enforcement of Harm Claim ThresholdsMeasurement Procedures for Design and Enforcement of Harm Claim Thresholds
Measurement Procedures for Design and Enforcement of Harm Claim Thresholds
 
QC of gamma camera using different phantoms and their specification
QC of gamma camera using different phantoms and their specificationQC of gamma camera using different phantoms and their specification
QC of gamma camera using different phantoms and their specification
 
Multiple UGV SLAM Map Sharing
Multiple UGV SLAM Map SharingMultiple UGV SLAM Map Sharing
Multiple UGV SLAM Map Sharing
 
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
 
IRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing ProtocolIRJET- Underwater Acoustic Wsn:Routing Protocol
IRJET- Underwater Acoustic Wsn:Routing Protocol
 
Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)Positioning techniques in 3 g networks (1)
Positioning techniques in 3 g networks (1)
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
 

More from wacerone

090223 Pervasive Behavior Tracking For Cognitive Assistance
090223 Pervasive Behavior Tracking For Cognitive Assistance090223 Pervasive Behavior Tracking For Cognitive Assistance
090223 Pervasive Behavior Tracking For Cognitive Assistancewacerone
 
An Intelligent Mobile Robot Navigation Technique Using RFID Technology
An Intelligent Mobile Robot Navigation Technique Using RFID TechnologyAn Intelligent Mobile Robot Navigation Technique Using RFID Technology
An Intelligent Mobile Robot Navigation Technique Using RFID Technologywacerone
 
Indoor Outdoor
Indoor OutdoorIndoor Outdoor
Indoor Outdoorwacerone
 
improvement RFID
improvement RFIDimprovement RFID
improvement RFID
wacerone
 
全人關懷投影片
全人關懷投影片全人關懷投影片
全人關懷投影片wacerone
 
Assistive Intelligent Environments For Automatic Health Monitoring
Assistive Intelligent Environments For Automatic Health MonitoringAssistive Intelligent Environments For Automatic Health Monitoring
Assistive Intelligent Environments For Automatic Health Monitoringwacerone
 
Common Sense Based Joint Training of Human Activity Recognizers
Common Sense Based Joint Training of Human Activity RecognizersCommon Sense Based Joint Training of Human Activity Recognizers
Common Sense Based Joint Training of Human Activity Recognizerswacerone
 
Personalizing Threshold Values On Behavior Detection With Collaborative Filte...
Personalizing Threshold Values On Behavior Detection With Collaborative Filte...Personalizing Threshold Values On Behavior Detection With Collaborative Filte...
Personalizing Threshold Values On Behavior Detection With Collaborative Filte...wacerone
 
080616
080616080616
080616
wacerone
 
080609
080609080609
080609
wacerone
 
社會系統設計
社會系統設計社會系統設計
社會系統設計wacerone
 
社會系統設計
社會系統設計社會系統設計
社會系統設計wacerone
 
Summarize the What Is Web 2.0
Summarize the What Is Web 2.0Summarize the What Is Web 2.0
Summarize the What Is Web 2.0wacerone
 
9.17
9.179.17
9.17
wacerone
 

More from wacerone (19)

090223 Pervasive Behavior Tracking For Cognitive Assistance
090223 Pervasive Behavior Tracking For Cognitive Assistance090223 Pervasive Behavior Tracking For Cognitive Assistance
090223 Pervasive Behavior Tracking For Cognitive Assistance
 
An Intelligent Mobile Robot Navigation Technique Using RFID Technology
An Intelligent Mobile Robot Navigation Technique Using RFID TechnologyAn Intelligent Mobile Robot Navigation Technique Using RFID Technology
An Intelligent Mobile Robot Navigation Technique Using RFID Technology
 
Indoor Outdoor
Indoor OutdoorIndoor Outdoor
Indoor Outdoor
 
improvement RFID
improvement RFIDimprovement RFID
improvement RFID
 
全人關懷投影片
全人關懷投影片全人關懷投影片
全人關懷投影片
 
wasn
wasnwasn
wasn
 
Assistive Intelligent Environments For Automatic Health Monitoring
Assistive Intelligent Environments For Automatic Health MonitoringAssistive Intelligent Environments For Automatic Health Monitoring
Assistive Intelligent Environments For Automatic Health Monitoring
 
Common Sense Based Joint Training of Human Activity Recognizers
Common Sense Based Joint Training of Human Activity RecognizersCommon Sense Based Joint Training of Human Activity Recognizers
Common Sense Based Joint Training of Human Activity Recognizers
 
Personalizing Threshold Values On Behavior Detection With Collaborative Filte...
Personalizing Threshold Values On Behavior Detection With Collaborative Filte...Personalizing Threshold Values On Behavior Detection With Collaborative Filte...
Personalizing Threshold Values On Behavior Detection With Collaborative Filte...
 
080616
080616080616
080616
 
080609
080609080609
080609
 
社會系統設計
社會系統設計社會系統設計
社會系統設計
 
社會系統設計
社會系統設計社會系統設計
社會系統設計
 
Summarize the What Is Web 2.0
Summarize the What Is Web 2.0Summarize the What Is Web 2.0
Summarize the What Is Web 2.0
 
071203
071203071203
071203
 
07 11 12
07 11 1207 11 12
07 11 12
 
071029
071029071029
071029
 
10.1
10.110.1
10.1
 
9.17
9.179.17
9.17
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Reliability Improvement For An Rfid Based Psychiatric Patient Localization

  • 1. Reliability improvement for an RFID-based psychiatric patient localization system
  • 2. Reference  Chieh-Ling Huang, Pau-Choo Chung, Ming-Hua Tsai, Yen-Kuang Yang, Yu-Chia Hsu Reliability improvement for an RFID-based psychiatric patient localization system IEEE Computer Communications 31 (2008) 2039–2048 2
  • 3. Outline  Introduction  System overview  Reliability improvement with field generator scheduling  Experiments  Conclusion 3
  • 4. Introduction  Psychiatric patients often cannot control their actions, occasionally resulting in dangerous behavior  RFID technology has been utilized in various applications, including supply chain management, entry and exit control  Localizing moving objects, e.g., freight localization or human localization is a challenging and relatively unexplored task  presents a novel graph coloring with merging and deletion (GCMD) algorithm 4
  • 5. System overview  The Department of Psychiatry, National Cheng Kung University Hospital (NCKUH) uses an RFID-based psychiatric patient localization system  The second floor serves as a clinic for psychiatric patients, and the third floor is an activity area  Nurses : scheduling daily activities and providing basic care  Doctors : medical treatment  This RFID-based psychiatric patient localization system uses a ultra high frequency (UHF) long range tracker. The Field Generators operate on 433 MHz when triggering the Tag to respond, and the Tag replies to a Reader with 916 MHz signal once it is triggered  Psychiatric patients in the care center wear watch-like Tags, Tag transmits information, including Tag ID and Field Generator ID 5
  • 7. Reliability improvement with field generator scheduling  This system relies on the Tag correctly receiving signal from the Field Generators to estimate the Tag location  Two Field Generators with overlapping transmission ranges simultaneously issuing trigger signals to a Tag causes signal interferences in the overlapped region  This interference results in loss of signal and, therefore, decreases localization accuracy  Transform the relationships among all Field Generators into a graph  Vertex deletion and merging  Vertex coloring  Operation slot allocation 7
  • 8. Reliability improvement with field generator scheduling 8
  • 9. Transform the relationships among all Field Generators into a graph  The relationships among Field Generators are transformed into an undirected graph G, whereas V and E are sets of vertices and edges, respectively. Where V and E are derived based on the Field Generators and their signal region overlapping situations, respectively 9
  • 10. Vertex deletion  When the range of one Field Generator, FGx, is completely covered by other Field Generators, the function of FGx can be replaced by a combination of these other Field Generators 10
  • 11. Vertex merging  The entire overlapping region is covered by a union of Field Generators, so other Field Generators can cover the overlapping region  Consequently, the two vertices associated with the two Field Generators can be merged, and no special care is required to avoid signal interference from the two Field Generators 11
  • 12. Vertex coloring  A coloring algorithm is applied to the trimmed graph, in which connected vertices are assigned different colors  The Field Generators with the same color are assigned to the same group, and, therefore, can transmit signals simultaneously  Conversely, the Field Generators with different colors are assigned to different groups; scheduling must be applied to avoid signal conflict 12
  • 13. Operation slot allocation  A weighted TDMA is applied to assign time slots for operation to each group  Consider that each partitioned group can occupy different levels of importance  Another consideration is the size of an area covered by a group of Field Generators  The importance factor for each group wi can be approximated  The time slot ratio for each group 13
  • 14. Experiments  Elucidating system performance  Fixed-points test  Route test 14
  • 15. 15
  • 16. 16
  • 18. Elucidating system performance  Tags send out responses periodically (reciprocated regularly) only when triggered by Field Generators  A patient’s location is computed based on the communication range of the patient’s Tag within the Field Generators with respect to ranges of reference Tags 18
  • 19. Elucidating system performance  More than two Tags are sending reports back to the Reader simultaneously Repetitive transmission  Repetitive transmission times are set at 6 and the associated lasting time is Trep 19
  • 20. Elucidating system performance  Time in field (TIF) time: a Tag can be programmed with a TIF Time (TTIF) that specifies the time duration before the Tag can be triggered again A Reader receives two consecutive reports from the same Tag. How can the Reader determine whether the two reports are issued due to two separate triggers, or whether the two reports are due to a repetitive response trigger? Another aim of TIF time is to prevent Tags from wasting energy replying to the same trigger from a Field Generator 20
  • 21. Elucidating system performance  Trep + TTIF is defined as one round; if one of the six responses in one round is received, this round is regarded as successfully received  lost rate of responses L as the total number of lost rounds divided by the total number of rounds that should trigger the Tag: r denotes the number of rounds that the Reader successfully received Tag’s reply signal and T represents time cost  In this system, it takes roughly three rounds for a patient to move from the building exit to the main gate. Under this scenario, we define response rate Rn as: n is the number of rounds – 3 in this case 21
  • 22. Fixed-points test  positions 1–6 reside in single Field Generator range  positions 7–10 are located in the overlapping region of two Field Gen-erators  positions 11–14 are in the overlapped region for three Field Generators  position 15 is in the overlapping region of four Field Generators  people wearing Tags stand at each fixed position for 1 min  group1 is assigned 2 s for operation and group2 is assigned 1s 22
  • 26. Route test  5 routes  (a) Route1 is the path passing the 15 representative points  (b) Route2 is the path connecting with poor reliability in the fixed-point test  (c) Route3 is the path connecting points with high reliability  (d) Route4 is the path of shortest distance from the building exit to the main gate and  (e) Route5 is a route tracing through a region that is rarely covered by routes (a–d) 26
  • 27.  (a) The route connecting 15 representative points  (b) The route connecting the lowest reliability points  (c) The route connecting the highest reliability points  (d) The route having the shortest path from exit to main gate  (e) The route tracing a region not tested in (a–d) 27
  • 32. Experiments  position 3: The Field Generator has difficulty reaching this sharp corner and the Tag cannot reach the Reader. Thus, a Reader is added at position 10  Experimental results: response rate for position 3 improves from 0% to 57.81% in the unscheduled original system, and from 14.26% to 83.36% using GCMD scheduling  Transmission time slots should be based on group importance  For group covering important regions or large areas should be allocated increased time periods 32
  • 33. Reliability comparison for original system and the system with proposed GCMD algorithm 33
  • 34. Conclusion  The RFID devices that are small and relatively cheap are very appropriate for use in localizing psychiatric Patients  In this study, a GCMD scheduling model is utilized for scheduling Field Generator transmissions in an RFID-based psychiatric patient localization system, thereby reducing interference caused by Field Generators located near one another  Experimental results demonstrated that the system is highly effective when using the proposed scheduling algorithm 34