Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Copy of Efficiently Filtering RFID Data Streams: Providing Refined Data through Matlab

No description
by

d b

on 3 April 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Copy of Efficiently Filtering RFID Data Streams: Providing Refined Data through Matlab

David Buickians Glendale Community College
Los Angeles Efficiently Filtering RFID Data Streams: Providing Refined Data through Matlab© Under the Advisement of... Dr. Marcus Afshar
Professor of Physics History of RFID 1935 1960s RADAR is advancing

RF communications is
expanding its scope Electronic article
Surveillance

Primitive RFID
Memory 1 bit 1950s January 23, 1973
First RFID patent w/
rewritable memory

Mario W. Cardullo 1973 Charles Walton
Patents
Passive transponder 1973 Los Alamos
Scientists design RFID
system to track nuclear materials
Commercialized RFID technology 1980 RFID systems have gained considerable momentum in monitoring physical objects in real time. They provide the ability to consistently locate, track, and record objects without human interaction or interference. This method of identification allows greater freedom and diversity in design, which enables it to be implemented in a wide range of pervasive computing scenarios.
This paper will present several filtering techniques including both noise and duplicate data removal.
In an exponentially growing production market, the ability for multinational conglomerates to provide consistent, economical, and real-time adaptability into their production line is a vital aspect. RIFD systems provide information in order for the mass production of products to be systematically processed, distributed and purchased by the end user.
This system is helping eliminate errors, labor and costs from production, manufacturing, distribution, retailing, inventory control and asset management operations in numerous industries. The end result of implementing RFID systems might provide great leaps in business efficiency, but the aspect that provides these advancements at its core is information.
Information is crucial, and in order for multifaceted production systems to function correctly and optimally the data produced through RFID technology must be filtered.
In order to optimally utilize RFID systems, data must be collected, filtered and transformed into semantic form. Unreliability of the data streams generated by RFID readers is a major obstacle that RFID systems pose when confronted with large volumes of data. Data containing errors cannot be directly used by applications unless they are systematically filtered. The two most common errors in RFID data streams are noise, misreads, or duplicates, multiple reads of an identical tag. This process demands accuracy and precision in order to produce a refined set of data that can be transferred to the backend system for data analysis. The implementation of MatLab© computing software will provide the test bench that will demonstrate both of these filters. The application of simulation software allows for software engineers to mold, adapt and revise their code without the cost of trial an error. RFID data stream filters must be rigorously tested, debugged and improved to fit the needs of the system. The ability to create intricate data filters and analyze them without any costs is the definition of efficient! Who's Presenting? A Student
From? At the.... Introduction 1. RFID Architecture Basics
2. Brief History
3. Context
4. Algorithm Design
5. Future
6. Question/Answer Presentation Outline RFID stands for radio frequency identification. A computer chip is attached to an antenna, and they are often referred to together as an RFID tag. Data stored on the chip transmits wirelessly through the antenna to an RFID reader or scanning device that operates on the same frequency as the antenna. Hosted By.... RADAR

Sir Robert Alexander Watson-Watt 80s on ward Data stream filtering is a necessary component of RFID systems in order to provide the backend system with refined data. Context Where are RFID Systems
Implemented ? Government Academia RFID in our daily lives Security Industry International Trading
Manufacturers
Distributors
Assembly line
Inventory Accounting
Supply Chain Department of State
Department of Defense
Homeland Security
Department of Commerce Various Universities utilize RFID :
California Institute of Technology
Stanford
Cornell
Jet Propulsion Laboratory (Smart Card)
Replacing the need for physical tumbler keys Credit Cards
State Identification cards
Passport Book / Passport Card
Bank Associated Access cards
Company Identification cards
Pets(ie dogs,cats, etc.) Each RFID has a unique identification string of numbers.
Proximity parameter
Information encrypted & decrypted Companies that Utilize RFID Systems Walmart
United Postal Service
Target
FedEx
International Business Machine
Siemens
Intel
Barnes and Noble ACADEMIA Inc.©
DOD
Coca-Cola
General Electric
Lockheed Martin
Amgen
Pfizer
Boeing ABSTRACT RFID sector grew from $2.7 billion to as much as $26 billion by 2016.

Infiltrated every aspect of modern society 1 2 3 RFID Basics & Systems Architecture Algorithm Design Talk about philosophy/methodology
programming language c++
object oriented.
Algorithm procedure/process 4 Matlab Question/Answer C++
3 looping structure
Do While
While
For 6 Electronic Product Code (EPC) 96 bit code
1) Header 8 bit
2)EPC Manager 28 bit
3)Object Class 24 bit
4)Serial Number 36 bit The while Statement The do-while Loop Active
Passive
RFID TAGS Mathematical Topology:
Computational Topology Applications Topological data analysis (TDA) is a new area of study aimed at having applications in areas such as data mining and computer vision. The main problems are:
how one infers high-dimensional structure from low-dimensional representations; and
how one assembles discrete points into global structure.
The human brain can easily extract global structure from representations in a strictly lower dimension, i.e. we infer a 3D environment from a 2D image from each eye. The inference of global structure also occurs when converting discrete data into continuous images, e.g. dot-matrix printers and televisions communicate images via arrays of discrete points.
The main method used by topological data analysis is:
Replace a set of data points with a family of simplicial complexes, indexed by a proximity parameter.
Analyse these topological complexes via algebraic topology — specifically, via the theory of persistent homology.[1]
Encode the persistent homology of a data set in the form of a parameterized version of a Betti number which is called a barcode.[2] Types of Errors 5 Filtering tasks 4 Parameters being filtered 20 cycles a (1) : a branch of mathematics concerned with those properties of geometric configurations (as point sets) which are unaltered by elastic deformations (as a stretching or a twisting) that are homeomorphisms
(2) : the set of all open subsets of a topological space*


*Meriam-Webster Dictionary Taking complex, multi-faceted mechanisms reducing them simple point particles and analyzing their connections, geometry, and allows the data to be visualized in a new way.
Apply Mathematical Principles to real world problems. Modeling
Data Analysis
Linking IBM: Smarter Planet Future It breaks the bounds of
Euclidean Geometry
Hamiltonian Mechanics INFINITE APPLICATIONS Allows filters to function simultaneous, working on multiply data files.
Creating correlations between data inputs .
Displays errors in data and models data to provide new understanding in RFID filter algorithms Filters are specifically designed for the system they will be implemented on Meaning different priorities need different algorithms:
Time
Accuracy
Money
Location
Distance
Redundancy 5 Data Inputted from
RFID READERS All data retrieved from RFID READERS stored in database code calls on stored files
uploads files at a specific given rate Initializes code through recognition of EPC on an id imported from database Implements needed filtering
technique First Cycle of loop verifies if EPC id is 96 bit Second Cycle of loop verifies Header 8 bit Third Cycle of Loop verifies
EPC Manager 28 bit
Fifth Cycle of Loop verifies
Serial Number 36 bit Fourth Cycle of loop verifies Object Class 24 bit Stores refined data in database
server specified for correct data Database server allows access of data TRUE

Continues forward to next stage False

Deletes id from database TRUE

Continues forward to next stage False

Deletes id from database Runs Id through 5 cycles of possible errors TRUE

Continues forward to next stage False

Deletes id from database TRUE

Continues forward to next stage False

Deletes id from database TRUE

Continues forward to next stage False

Deletes id from database Data available for analysis by end user TRUE

Continues forward to next stage False

Deletes id from database TRUE

Continues forward to next stage False

Deletes id from database Runs id through 5 cycles error possibilities TRUE

Continues forward to next stage False

Deletes id from database TRUE

Continues forward to next stage False

Deletes id from database TRUE

Continues forward to next stage False

Deletes id from database Runs id through 5 cycles error possibilities Runs id through 5 cycles error possibilities Runs id through 5 cycles error possibilities ALGORITHM THANKS
Full transcript