The Community for Technology Leaders
RSS Icon
Issue No.04 - April (2011 vol.22)
pp: 558-570
Jingyu Zhou , Shanghai Jiao Tong University, Minhang
Daqiang Zhang , Shanghai Jiao Tong University, Minhang
Jiannong Cao , Hong Kong Polytechnic University, Hong Kong
Tianbao Li , Shanghai Jiao Tong University, Minhang
Radio Frequency IDentification (RFID) has attracted considerable attention in recent years for its low cost, general availability, and location sensing functionality. Most existing schemes require the tracked persons to be labeled with RFID tags. This requirement may not be satisfied for some activity sensing applications due to privacy and security concerns and uncertainty of objects to be monitored, e.g., group behavior monitoring in warehouses with privacy limitations, and abnormal customers in banks. In this paper, we propose TASA—Tag-free Activity Sensing using RFID tag Arrays for location sensing and frequent route detection. TASA relaxes the monitored objects from attaching RFID tags, online recovers and checks frequent trajectories by capturing the Received Signal Strength Indicator (RSSI) series for passive RFID tag arrays where objects traverse. In order to improve the accuracy for estimated trajectories and accelerate location sensing, TASA introduces reference tags with known positions. With the readings from reference tags, TASA can locate objects more accurately. Extensive experiment shows that TASA is an effective approach for certain activity sensing applications.
RFID, activity sensing, tag-free localization, object tracking, frequent trajectories.
Jingyu Zhou, Daqiang Zhang, Jiannong Cao, Tianbao Li, "TASA: Tag-Free Activity Sensing Using RFID Tag Arrays", IEEE Transactions on Parallel & Distributed Systems, vol.22, no. 4, pp. 558-570, April 2011, doi:10.1109/TPDS.2010.118
[1] J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, pp. 57-66, 2001.
[2] J. Ye, L. Coyle, S. Dobson, and P. Nixon, "Ontology-Based Models in Pervasive Computing Systems," Knowledge Eng. Rev., vol. 22, no. 4, pp. 315-347, 2007.
[3] G. Roussos and V. Kostakos, "RFID in Pervasive Computing: State-of-the-Art and Outlook," Pervasive and Mobile Computing, vol. 5, no. 1, pp. 110-131, 2009.
[4] R. Want, A. Hopper, V. Falcão, and J. Gibbons, "The Active Badge Location System," ACM Trans. Information Systems, pp. 91-102, 1992.
[5] U. Bandara, M. Hasegawa, M. Inoue, H. Morikawa, and T. Aoyama, "Design and Implementation of a Bluetooth Signal Strength Based Location Sensing System," Proc. Radio and Wireless Conf., pp. 319-322, 2004.
[6] O. Rashid, P. Coulton, and R. Edwards, "Providing Location Based Information/Advertising for Existing Mobile Phone Users," Personal and Ubiquitous Computing, vol. 12, pp. 3-10, 2008.
[7] N.B. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location-Support System," Proc. ACM MobiCom '00, pp. 32-43, 2000.
[8] A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, "The Anatomy of a Context-Aware Application," Proc. ACM MobiCom '99, pp. 59-68, 1999.
[9] L.M. NI, Y. Liu, Y.C. Lau, and A. Patil, "LANDMARC: Indoor Location Sensing Using Active RFID," Proc. First IEEE Int'l Conf. Pervasive Computing and Communications (PERCOM '03), pp. 407-415, 2003.
[10] P. Wilson, D. Prashanth, and H. Aghajan, "Utilizing RFID Signaling Scheme for Localization of Stationary Objects and Speed Estimation of Mobile Objects," Proc. IEEE Int'l Conf. Radio Frequency IDentification (RFID), pp. 94-99, 2007.
[11] Y. Liu, L. Chen, J. Pei, Q. Chen, and Y. Zhao, "Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays," Proc. Fifth Ann. IEEE Int'l Conf. Pervasive Computing and Communications (PERCOM '07), pp. 37-46, 2007.
[12] C. Qian, H. Ngan, and Y. Liu, "Cardinality Estimation for Large-Scale RFID Systems," Proc. Sixth Ann. IEEE Int'l Conf. Pervasive Computing and Communications (PERCOM '08), 2008.
[13] G. Johansson, "Visual Perception of Biological Motion and a Model for its Analysis," Perception and Psychophysics, vol. 14, pp. 76-88, 1973.
[14] K. Yamaashi, J.R. Cooperstock, T. Narine, and W. Buxton, "Beating the Limitations of Camera-Monitor Mediated Telepresence with Extra Eyes," Proc. ACM SIGCHI, pp. 50-57, 1996.
[15] M. Al Nahlaoui, K. Jostschulte, R. Kays, J. Schmitz, T. GmbH, and G. Bochum, "Camera Based Eye-Tracking System for Medical Purposes," Proc. Third European Medical and Biological Eng. Conf., 2005.
[16] R. Collins, T.K. Alan Lipton, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto, and O. Hasegawa, "A System for Video Surveillance and Monitoring," Technical Report CMU-RI-TR-00-12, Robotics Inst., Carnegie Mellon Univ., May 2000.
[17] A. Baumann, M. Boltz, J. Ebling, M. Koenig, H. Loos, M. Merkel, W. Niem, J. Warzelhan, and J. Yu, "A Review and Comparison of Measures for Automatic Video Surveillance Systems," EURASIP J. Image and Video Processing, vol. 2008, pp. 30-59, 2008.
[18] H. Dee and S. Velastin, "How Close are We to Solving the Problem of Automated Visual Surveillance?" Machine Vision and Applications, vol. 19, no. 5, pp. 329-343, 2008.
[19] B. Sheng, C.C. Tan, Q. Li, and W. Mao, "Finding Popular Categories for RFID Tags," Proc. ACM MobiHoc '08), pp. 159-168, 2008.
[20] R. Want, "An Introduction to RFID Technology," IEEE Pervasive Computing Magazine, vol. 5, no. 1, pp. 25-33, Jan.-Mar. 2006.
[21] A. R. S. Inc., "Active RFID vs. Passive RFID Technology," RFID Solutions Online, pp. 1-2, Sept. 2007.
[22] R. Tesoriero, J. Gallud, M. Lozano, and V. Penichet, "Using Active and Passive RFID Technology to Support Indoor Location-Aware Systems," IEEE Trans. Consumer Electronics, vol. 54, no. 2, pp. 578-583, May 2008.
[23] Y. Zhao, Y. Liu, and L.M. Ni, "Vire: Active RFID-Based Localization Using Virtual Reference Limitation," Proc. 36th Int'l Conf. Parallel Processing (ICPP '07), pp. 56-64, 2007.
[24] JTC 1/SC 31, "Information Technology—Automatic Identification and Data Capture Techniques—Air Interface Specification for Mobile RFID Interrogators," Draft ISO/IEC JTC 1/SC 31/WG 6, 2009.
[25] D.W. Engels and S.E. Sarma, "The Reader Collision Problem," White Paper, mitautoid-wh-007, Auto-ID Center, Dec. 2001.
[26] D.W. Engels and S.E. Sarma, "The Reader Collision Problem," Proc. IEEE Int'l Conf. Systems, Man and Cybernetics, vol. 3, p. 6, 2002.
[27] C. Tan, B. Sheng, and Q. Li, "How to Monitor for Missing RFID Tags," Proc. 28th Int'l Conf. Distributed Computing Systems (ICDCS '08), pp. 295-302, 2008.
[28] EPCglobal, "Epcglobal Radio-Frequency Identity Protocols Class-1 Generation-2 uhf RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0," pp. 24-76, , 2008.
[29] L. Pan and H. Wu, "Smart Trend-Traversal: A Low Delay and Energy Tag Arbitration Protocol for Large RFID Systems," Proc. IEEE INFOCOM '09, 2009.
[30] R. Agrawal, T. Imielinski, and A.N. Swami, "Mining Association Rules Between Sets of Items in Large Databases," Proc. ACM SIGMOD '00, pp. 207-216, 1993.
[31] J. Han, J. Pei, and Y. Yin, "Mining Frequent Patterns without Candidate Generation," Proc. ACM SIGMOD '00, pp. 1-12, 2000.
[32] W.-K. Chan, J.-Y. Chang, T.-W. Chen, Y.-H. Tseng, and S.-Y. Chien, "Efficient Content Analysis Engine for Visual Surveillance Network," IEEE Trans. Circuits and Systems for Video Technology, vol. 19, no. 5, pp. 693-703, May 2009.
[33] M. Park, K. Brocklehurst, R. Collins, and Y. Liu, "Deformed Lattice Detection in Real-World Images Using Mean-Shift Belief Propagation," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 31, no. 10, pp. 1804-1816, Oct. 2009.
[34] K. Sundaresan and S. Rangarajan, "On Exploiting Diversity and Spatial Reuse in Relay-Enabled Wireless Networks," Proc. ACM MobiHoc '08, pp. 13-22, 2008.
[35] H. Xu and T. Chua, "Fusion of AV Features and External Information Sources for Event Detection in Team Sports Video," ACM Trans. Multimedia Computing, Comm., and Applications, vol. 2, no. 1, pp. 44-67, 2006.
[36] B. Anandampilai and K. Krishnamoorthy, "Automated Visual Surveillance in Computer Vision," Proc. 10th World Scientific and Eng. Academy and Soc. (WSEAS) Int'l Conf. Acoustics and Music: Theory and Applications (AMTA '09), pp. 36-44, 2009.
[37] W. Hu, T. Tan, L. Wang, and S. Maybank, "A Survey on Visual Surveillance of Object Motion and Behaviors," IEEE Trans. Systems, Man, and Cybernetics, Part C: Applications and Rev., vol. 34, no. 3, pp. 334-352, Aug. 2004.
[38] H. Liu, X. Jia, P.-J. Wan, C.-W. Yi, S.K. Makki, and N. Pissinou, "Maximizing Lifetime of Sensor Surveillance Systems," IEEE/ACM Trans. Networks, vol. 15, no. 2, pp. 334-345, Apr. 2007.
[39] M. Ali, A. Böhm, and M. Jonsson, "Wireless Sensor Networks for Surveillance Applications—A Comparative Survey of Mac Protocols," Proc. Int'l Conf. Wireless and Mobile Comm., pp. 399-403, 2008.
[40] C.-S. Liao, S.-Y. Lin, H.-M. Peng, K.-Y. Tu, H.-T. Lin, and H. Shyu, "Design of GPS Remote Calibration System," Proc. IEEE Int'l Frequency Control Symp., Joint with the 21st European Frequency and Time Forum, pp. 914-917, 2007.
[41] G. Sen Gupta, S. Mukhopadhyay, M. Sutherland, and S. Demidenko, "Wireless Sensor Network for Selective Activity Monitoring in a Home for the Elderly," Proc. IEEE Conf. Instrumentation and Measurement Technology, pp. 1-6, 2007.
[42] L. Dong, J. Wu, and X. Chen, "Real-Time Physical Activity Monitoring by Data Fusion in Body Sensor Networks," Proc. 10th Int'l Conf. Information Fusion, pp. 1-7, 2007.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool