You are on page 1of 4

2016 2nd International Conference on Control Science and Systems Engineering

RFID Sensor Placement Algorithm in Ubiquitous Computing

Jetendra Joshi, Munnangi Sri Harsha, Urijit kurulkar, Avinash Reddy, Dandamudi Akhil, Abhinav Goel, Byreddy
Nikhil Reddy, Amrit Bagga
Department of Computer Science and Engineering
NIIT University
Rajasthan, India
e-mail: name@xyz.com

AbstractRFID applications are used in the Internet of Things wireless technology which allows automated remote
(IoTs) which uses multiple readers to read the IDs of multiple identification of objects [6]. An RFID based system uses
tags and form the RFID network. In such a network, wireless radio communication technology in order to
unguarded reader deployment may generate over-crowded uniquely identify people or objects with tags. In the recent
readers, cause interferences. The deployment is crucial for days, RFID has found a wide range of applications in the
RFID system performance Radio Frequency Identification (or field of supply-chain tracking, library book tracking, parking
RFID) tags have seen its wide range of applications in the access control, retail stock management, airline luggage
recent years and has a very promising future. In the present tracking, toll collection, theft prevention, health care, etc. An
scenario, Ubiquitous computing plays an important role in our
RFID based system mainly consists of tags or transponders
daily lives and has a vast range of applications in many fields .
In this paper we have proposed a system which uses RFID tags
that has a unique identification number (ID) and a memory
for guidance of tourists. The system uses RFID tags to guide which is used to store additional data like the producers
and inform the tourists about a given location and surrounding. name, type or class of product, and also environmental
We have proposed an algorithm which describes the systems factors like temperature, humidity, etc., that are attached to
implementation even for densely populated RFID Reader objects of priority or interest. The technological
based geographical area. The system requires multiple readers advancements in the field of wireless communication
and it collaborates to read the RFID tag data. technology and electronics have motivated the development
of low powered and small-sized, inexpensive sensing radio-
Keywords-radio frequency identification (RFID); sensor; equipped devices, reducing the cost of deploying monitoring
activity detection; localization network architecture and tracking applications even in large-scale scenarios where
a large amount of data is collected from numerous different
I. INTRODUCTION locations. In painting or other exhibitions or museums,
people sometimes skip some of the exhibits because of less
Today radio frequency identification (RFID), has become information available in the description labels. Such situation
a widely used technology in practical applications [1-3], has leads to the loss of interest for further desire of knowledge.
been considered as one of the main building blocks for RFID technology is generally based on the idea of ID
understanding the Internet of Things (IoTs) concept [4-6]. In matching. The RFID reader reads the tags and compares it
IoTs, most RFID applications include use of multiple readers with the pre-stored memory. If the ID matched then it allows
to read the IDs of multiple tags and form the required RFID access to a certain operation. There are cases when the
network. For example, a logistics or supermarket artifacts or different tags are very close to each other due to
management usually requires multiple readers to read the which the RFID reader is densely constrained while
multiple items in a specific area. To facilitate the operations, providing the information of a particular tag. This paper
it is important to arrange that to-be-deployed RFID reader deals with this problem of dense network and hence reader
that includes their positions and power levels, by an optimal matching solution is thereby proposed.
topology design. Unplanned or Unguarded reader We have already been through the introduction of this
deployment (for instance, readers are largely or randomly paper. In section II we have mentioned some of the research
deployed) may generate over-crowded readers in the network work which has been going on related to our paper. In
and therefore interferences occur. When this type of situation section III we have laid down the problem statement which
occurs, the deployment cost will increase rapidly and the we have primarily focused in this paper. The complete
percentage of successful tag detection will tumble down. system description and RFID Reader Deployment algorithm
Optimal RFID topology design, we must consider notonly has been given in the section IV. Section V explains about
the reader deployment cost and the percentage of tag the hardware used for our paper and the interfacing done
detection but also the above two interferences into account. with the other modules. It also includes the algorithm by
Seeing that reader deployment plays a significant role in means of which the system operates. Section VI explains the
RFID system performance. system efficiency and also the techniques used for
Tourism is one of the major sources of income for many optimization .Conclusion of paper is shown in section VII.
countries. Radio Frequency Identification (RFID) is a

978-1-4673-9872-5/16/$31.00 2016 IEEE 33


II. RELATED WORK Step 1: Initialize the population size. Step 2: Calculate
The authors in [7] have made an automatic ware house the fitness value of each species according to the objective
system using RFID technology. In their paper they presented function. Step 3: Go through the selection process according
a framework of an RFID-based management system through to the fitness values. Step 4: Go through the crossover
application and integration of fast-growing IT technologies process to produce the next generation. Step 5: Take the
like that of RFID tags, wireless sensors and communication mutation process to avoid local optima.
networks to maximize the warehouse capacity and achieve a
better visualization of inventory control and data handling
management. The authors in [8] have presented an assistance
based system to locate lost objects, support blind and
partially sighted people with daily living activities and assist
in the rehabilitation of adults with acquired brain injury.
In [9] the authors have proposed a material tracking
system based on RFID technology. The authors of [10] have
proposed a vehicle speed assistance system with a new
Infrastructure to Vehicles (I2V) communication and control
system for intelligent speed control, based on RFID
technology for identification of traffic signals on the road.
III. PROBLEM FORMULATION
With the increasing use of RFID technology in much
application. The use of semi-passive or active RFID
technology has a promising future since reading range
becomes much larger. It opens up a large number of
applications in remote sensing and monitoring is done. The
spreading adoption of RFID and its large scale deployments
have given importance to some planning and coverage
problems in this field. Tags coverage in RFID networks is
one of these problems that can be defined generally as
finding the number and locations of RFID readers needed to
identify a set of RFID tags in a particular area. Accurate
coverage is crucial in RFID systems as failing to cover a tag
may result in missing an important event and/or losing asset
and revenue. Is there any method that we can focus on Figure 1. Flow chart of the genetic algorithm.
designing a system that enables us to overcome these
difficulties and to propose an algorithm for efficient A previous optimization approach of ours, GAA is the
identification of objects that may be densely or sparsely hybrid practice of GA, SA (simulated annealing) [11] and
located. Is there any method to optimize the sensor GESA (guided evolutionary simulated annealing) [12]. It
placement so that efficient topology can be defined. involves only one operation, the stir operation, and four
parameters: the number of genes to be stirred (N), the
IV. SYSTEM DESCRIPTION AND RFID READER decreased number of genes to be stirred (n), the number of
DEPLOYMENT ALGORITHMS stirs (M), and the decreased number of stirs (m). G = N/n =
The major objectives of this paper is to deploy algorithms the number of generations. M decides the frequency of stirs
that uses full coverage with minimum number of readers and while m decides the decreasing stir frequency, in the stir
to propose an algorithm for minimization of the overlapping operation. Denoted by Stir(X, N), where X represents any
among readers in some coverage areas just like the case of an solution and N is the number of genes to be stirred, the stir
art exhibition, for instance, hence, we come up with an operation works as follows.
improved set of algorithms namely, Genetic Algorithm (GA) (1) Randomly select N genes (characters) from an X. (2)
and Genetic Annealing Algorithm (GAA). GA has three Change the values of the selected genes or their positions in
major operations: selection, crossover and mutation. It uses the chromosomes. (3) Completely stir the genes in the
the selection process, which covers selection and copying, to chromosomes to bring up all possible solutions scattering
select better fitness values into the next generation (common over the search space. GAA operates in the following steps:
mechanisms include roulette wheel and tournament), the Step 1: Set the four parameters N, n, M and m. Step 2:
crossover process to mix the species in order to produce a Randomly generate a solution X. Step 3: Generate a new
better next generation (common mechanisms include a single solution Y after executing the stir operation for X. Step 4:
point, pairs of points and even crossover), and the mutation Select Y if F(Y) is better than F(X) or select X if otherwise.
process to avoid the missing of excellent species. GA The figure shown below depicts the flow chart of the
operates in the following steps: Genetic Annealing algorithm used.

34
A. Algorithm
The track whose ID matches with that of the RFID tag is
played. The below given Figure 4, shows the sequential
working diagram of RFID based Audio System.

Figure 4. Sequential diagram of the audio system.

B. System Implementation
We have tested the algorithm on both the hardware and
programming is done on computer using C language.

Figure 2. Flow chart of the genetic annealing algorithm.

V. HARDWARE DESCRIPTION AND SYSTEM DESIGN


The hardware proposed in this paper comprises of two
parts. The users RFID Reader based handset consists of
Micro Controller Unit (MCU), 16 bit LCD screen, audio
codec attached with headphone, an RFID reader module of
125 kHz in the system and external memory. The MCU used
is ATMEGA 8515-16PU. The interfacing of the hardware
block diagram is shown in the Figure 3.
Figure 5. Algorithm and system implementation.

The module testing will be done on the Linux platform as


shown in Figure 5. The hardware suggested in this paper is
tested for real time implementation in Artifacts in Art gallery
by applying the placement appropriate algorithm for.
Minimizing the overlapping of RFID readers.
VI. SYSTEM EFFICIENCY
A RFID reader system deals with large amount of data to
be analyzed by a MCU or a central computer system. Hence,
Figure 3. Block diagram of the proposed system. in order to increase the system efficiency and lower the
power consumption, the amount of data communicated can
The users handset is to be issued to the visitors at the be reduced without affecting the decision-making quality.
time of entry. As it approaches an object or place of interest There might be chances of collision at times or might even
the users handset is used to identify the RFID Tag come across tags which are not useful across the system. The
Transmitter and whatever track is registered against the simulation to evaluate the performance of optimization based
RFID tag will be played. RFID sensor placement topology using genetic algorithms

35
GA, GAA is tested. Figure 6 shows the fitness value of the of the IEEE 9th International Conference on Wireless and Mobile
algorithm GA and GAA. Computing, Networking and Communications, (2013), pp. 444-451.
[2] S. Ma, Y. Zhang, and D. Wang, Distributed Work Flow System for
RFID Integration and Application, Proceedings of 2009 IEEE Youth
Conference on Information, Computing and Telecommunication,
(2009), pp. 62-65.
[3] F. Hussian, S. Durrani, J. Farooqi, H. Mahmood, G. Junjua, I. Jattala,
and N. Ikram, RFID & WSN Based Integrated Maternity Ward
Monitoring System, Proceedings of the 16th International Multi
Topic Conference, (2013), pp. 43-48.
[4] L. D. Xu, W. He, and S. Li, Internet of Things in Industries: A
Survey, IEEE Transactions on Industrial Informatics, vol. 10, no. 4,
(2014), pp. 2233-2243.
[5] G. Fortino, A. Guerrieri, W. Russo, and C. Savaglio, Integration of
Agent-based and Cloud Computing for the Smart Objects-oriented
IoT, Proceedings of the IEEE 18th International Conference on
Computer Supported Cooperative Work in Design, (2014), pp. 493-
498.
Figure 6. Fitness value calculated by different schemes. [6] I. Ganchev, Zhanlin Ji, and M. O'Droma, A Generic IoT
Architecture for Smart Cities, Proceedings of the 25th IET Irish
Signals & Systems Conference and China-Ireland International
Conference on Information and Communications Technologies,
VII. CONCLUSION (2014), pp. 196-199.
We have described a system to integrate the audio [7] Wang, Qian, Saleh Alyahya, Nick Bennett, and Hom Dhakal. "An
guidance system and RFID technologies. The reader RFID-Enabled Automated Warehousing System."
deployment plays a significant role in RFID system [8] Bos, L., and B. Blobel. "An RFID-based system for assisted living:
performance; this investigation introduces a new approach is Challenges and solutions." Medical and Care Compunetics 4 4 (2007):
127.
built on genetic annealing algorithms (GAA). The learning
phase investigates technology compatibility with a simulated [9] Min, Zhang, et al. "A RFID-based material tracking information
system."Automation and Logistics, 2007 IEEE International
RFID system. The development phase builds a system that Conference on. IEEE, 2007.
consists of RFID based Audio Guidance System for Tourists [10] Prez, Joshu, et al. "An RFID-based intelligent vehicle speed
and help in the promotion of Tourism Industry. It is targeted controller using active traffic signals." Sensors 10.6 (2010): 5872-
for in-house exhibition monitoring and guidance. In this 5887.
paper, we have focused particularly on performance issues in [11] Z. P. Lo and B. Bavarian, Job Scheduling on Parallel Machines
dense environments, such as those that can arise in factory Using Simulated Annealing, Proceedings of the 1991 IEEE
automation, supply chain and various smart environments. International Conference on Systems, Man, and Cybernetics, vol. 1,
(1991).
REFRENCES [12] C. Y. Shen, Y. H. Pao, and P. Yip, Scheduling Multiple Job
Problems with Guided Evolutionary Simulated Annealing Approach,
[1] L. Sanchez and V. Ramos, Towards a New Paradigm for RFID Proceedings of the 1st IEEE Conference on Evolutionary
Identification: Should We Cluster RFID Tags Or Not?, Proceedings Computation, (1994).

36

You might also like