• Ei tuloksia

(1)Jari-Pekka Teurajärvi 26-Apr-2010

N/A
N/A
Info
Lataa
Protected

Academic year: 2022

Jaa "(1)Jari-Pekka Teurajärvi 26-Apr-2010"

Copied!
19
0
0

Kokoteksti

(1)Jari-Pekka Teurajärvi 26-Apr-2010.

(2) Typical characteristics • Low power and small terminals • Short distances (typically <100 m) • Short TOF => time resolution needed around 10 ns. (equivalent of 3 m range) • Indoor environment (NLOS, severe multipath conditions) • Usage of unlicenced bands => interference from other system signal types.

(3) €. €. € € €. A Radio Frequency Identification (RFID) system consists of two components: the Tranceiver (a transmitter and receiver in one), often called the Reader and Transponders (from transmitter and responder) responder), often called the Tags Tags. If three or more readers receive the signal from one particular tag, the tag's position can be calculated by triangulation of the signal i l to t the th different diff t readers. d Each tag's position is calculated in the central computer, not in the tags. The range in which readers and tags can communicate with each other is very limited RFID technology gy can be used together g with other p positioning g technologies (e.g. UWB).

(4)

(5) €. g use radio frequency q y energy gy to All RFID tags communicate with the readers. • An active tag embeds an internal battery which. continuously powers it and its RF communication circuitry. Readers can transmit very low-level signals, and the tag can reply with high-level signals. An active tag can also have additional functionalities such as memory, and a sensor, or a cryptography module. • Passive tag has no internal power supply. Generally, it backscatters the carrier signal received from a reader. Passive tags have a smaller size and are cheaper than active tags, but h have very li limited it d ffunctionalities. ti liti • Semipassive tags communicate with the readers like passive tags but they embed an internal battery that constantly powers their internal circuitry. circuitry.

(6)

(7) RFID localization schemes can be classified into three families: lateration with distance estimation, scene analysis off extra reference tags, and i i l i with i h the h deployment d l f d constrainti based approach.. Schemes are classified according to their approach of the problem. Some of them require the deployment of reference tags which provide finer data but also considerably increase the cost of the system and the maintenance. Except two schemes that are built on very specific properties of passive tags, they all concerns active tags which have larger capacities. Accuracies cannot be directly compared since the systems do not consider the same hypothesis..

(8) € SpotON: Based. on RSS measurements from adjustable long range active RFID tags. The approach is simple: multiple readers collect signal strength measurements in order to approximate distance through a function defined with empirical data. Classic laterations are then performed to localize tags..

(9) €. SAW ID tags: Surface Acoustic Wave Identification (SAW ID) tags ID-tags: are completely passive. They utilize pulse compression techniques and a large number of coding possibilities. Each tag is interrogated with the time inverse of its impulse response. Then, it retransmits the correlated signal. This retransmitted signal shows an autocorrelation peak. The response with the highest amplitude identifies the searched tag tag. The distance between each reader and the tag is measured based on TOA. The time delay caused by the system and the time delay due to the cables between each receiving antenna and the demodulator are calculated during a pre-calibration phase. The time delay TSAW is equal for all tags. When three estimated distances are available, the system performsa trilateration to localize the tag. tag.

(10) € LPM: The. Local Position Measurement (LPM) system uses active tags. Since it is based on the TDOA technique, readers are synchronized with the help of reference tags (RT) at well-known well known and fixed positions that operate continuously. After having received an activation command, the h selected l d measurement tag (MT) responds d at time. The time difference of the corresponding ssignals g a s at each eac reader eade ca can tthus us be ca calculated. cu ated The weighted mean squares method is then utilized to estimate the locations of the tags with at least three different readers. readers.

(11) € RSP: Direction. Of Arrival (DOA) to the localization of passive RFID tags. Approach consists in placing two readers at specific locations in order to calculate the phase difference and thus the direction of a moving tag When several observations are available, tag. available the estimation can be improved by using the least-square east squa e fitting tt g tec technique. que W With t two pa pairss o of readers, two oblique angles are obtained and utilized for a triangulation calculation..

(12) € Landmarc: This. system is based on the kNN technique. Reference tags which are fixed tags with known positions are deployed regularly on the covered area. Readers have eight different power levels levels. This approach consists in selecting the nearest reference tags from the unknown active tag with the indicator for each reference tags..

(13) €. VIRE: uses the principle of Landmarc, that is 2D regular grid of reference tags. Nevertheless, this method introduces the concept of proximity map. The whole sensing area is divided into regions where the center of each region corresponds to a reference tag. Every reader maintains its own proximity map. If the difference between the RSS measurement of the unknown tag and the RSS measurement of a region is smaller than a threshold, threshold the region is marked as 010. The fusion of all the n readers’ maps provides a global proximity map for the tag. Two weighting factors are defined The first one demonstrates the discrepancy of the RSS defined. measurements between the selected reference tags and the tag. The second weighting factor is a function related to the density of selected reference tags. tags.

(14) €. p Simplex: This method is also based on the deployment of reference tags. It requires that the n readers have K transmission power levels. For the localization of a tag, g, the readers start with the lowest power level and gradually increase the transmission power until they receive the response from the tag. In tthe e mean ea ttime, e, eac each reader eade a also so receives ece ves tthe e responses from reference tags. The distance between a reader and a tag is then estimated by averaging the distances from the reader to all reference tags detected in the same power level but not in the previous power levels. The location is calculated by minimizing the error function..

(15) €. Kalman filtering: This approach also utilizes reference tags. The first step consists in calculating with RSS measurements from two readers the distance between each reference tag and the target tag. The location of the tag is obtained by solving with the minimum mean squared error algorithm the system of non-linear equations. The second step consists in building a probabilistic map of the error measurement for the readers readers’ detection area. area The first step is applied for each reference tag in order to calculate their corresponding error probability distribution function with the help of their estimated location and their real location location. The Kalman filter is then used iteratively on this online map to reduce the effect of RSS error measurement and thus to improve the accuracy of the localization. localization.

(16) €. g to the family y of p Scout: belongs probabilistic localization techniques. This method also utilizes reference tags and several readers. Active tags are localized following g three steps. p First,, the propagation p p g parameters are calibrated using on-site reference tags. Secondly, the distance between the targeted tag and a d the t e readers eade s iss estimated est ated with w t a probabilistic p obab st c RSS SS model. Finally, the location of the tag is determined by applying Bayesian inference. Iteratively, predicted beliefs are calculated and then corrected with observations until obtaining a good model resulting in an estimated area..

(17) €3 D 3-D. Constraints: This approach is only based on connectivity information. They are used to define inclusive constraints, that is if a reader can detect a tag that means that the distance between them is inferior to the read range, and exclusive constraints, the complementary with readers d that h cannot d detect the h tag. Th The space iis discretized into points in order to delimit the detection detect o a area ea o of tthe e readers. eade s The e mean ea o of tthe e set of points that respect the maximum of constraints corresponds to the estimated location of the tag. tag.

(18) The choice of technique and technology (passive or active tags) significantly affects the granularity and accuracy of the location information but also the whole cost and the efficiency of the RFID system. system.

(19) € Material. by teacher JJ-P P Rontu: http://www.tekniikka.oamk.fi/tllab/tietoliikennejarjestelmat/Location/Location _technologies_introduction_spring_2010.pdf € Positioning with BT, Irda and RFID: http://epubl luth se/1402 1617/2002/125/LTU http://epubl.luth.se/1402-1617/2002/125/LTUEX-02125-SE.pdf € RFID Tags: ags Positioning os t o g Principles c p es and a d Localization Techniques: http://www.nr2.ufpr.br/papers/RFIDTags08.pdf.

(20)

Viittaukset

LIITTYVÄT TIEDOSTOT

7 Tieteellisen tiedon tuottamisen järjestelmään liittyvät tutkimuksellisten käytäntöjen lisäksi tiede ja korkeakoulupolitiikka sekä erilaiset toimijat, jotka

Työn merkityksellisyyden rakentamista ohjaa moraalinen kehys; se auttaa ihmistä valitsemaan asioita, joihin hän sitoutuu. Yksilön moraaliseen kehyk- seen voi kytkeytyä

Aineistomme koostuu kolmen suomalaisen leh- den sinkkuutta käsittelevistä jutuista. Nämä leh- det ovat Helsingin Sanomat, Ilta-Sanomat ja Aamulehti. Valitsimme lehdet niiden

Istekki Oy:n lää- kintätekniikka vastaa laitteiden elinkaaren aikaisista huolto- ja kunnossapitopalveluista ja niiden dokumentoinnista sekä asiakkaan palvelupyynnöistä..

In the third chapter of Part I, Tommi Kurki &amp; Liisa Mustanoja discuss the.. history of Fennistic dialectology and variation research in terms of paradigm change and

The shifting political currents in the West, resulting in the triumphs of anti-globalist sen- timents exemplified by the Brexit referendum and the election of President Trump in

Finally, development cooperation continues to form a key part of the EU’s comprehensive approach towards the Sahel, with the Union and its member states channelling

Indeed, while strongly criticized by human rights organizations, the refugee deal with Turkey is seen by member states as one of the EU’s main foreign poli- cy achievements of