This invention relates to the interrogation of Radio Frequency Identification (RFID) sensors in a particular area. More particularly, this invention relates to systems and methods for estimating a number of RFID sensors in an area to be interrogated.
RFID sensors are used for many purposes. One of the most common types of RFID sensors is a passive RFID sensor. A passive RFID sensor includes circuitry that stores a particular encoding; a transceiver module that receives an RF signal from a reader; and circuitry that uses the energy from the received RF signal to power circuitry in the sensor that generates and transmits an RF signal that includes the stored encoding. Passive RFID sensors are popular because of the low cost of the sensor and their durability. In particular, passive RFID sensors do not require replaceable or chargeable batteries since they operate on the energy from the received RF signals.
One of the most common uses of passive RFID sensors is inventory control. To track items in a store or warehouse, passive RFID sensors with unique encodings are attached to the items in the store or warehouse. RFID readers are then placed throughout the store or warehouse. Each RFID reader periodically interrogates the RFID sensors within the coverage area of the reader to obtain the unique encodings to identify the items in the area. The interrogation is performed by transmitting an interrogation signal and reading the signals from the RFID sensors that are received by the RFID reader in predetermined time slots of a particular interrogation frame. The process is repeated for several frames until information is received from all of the RFID sensors in the coverage area of the reader.
As items tend to move within the area, it is often difficult to determine whether an RFID reader has captured the information from all of the RFID sensors in its coverage area. Currently, this is often solved by having the RFID reader perform the interrogation for a predetermined number of interrogation frames that assures that a predetermined number of RFID sensors can be interrogated. The predetermined number is often set much higher than the average number of RFID sensors that are commonly in an area to assure information from all of the RFID sensors in the area are received. However, this does not assure that all of the RFID sensors in an area have been identified. Thus, a way of estimating the number of RFID sensors in a particular area is needed to ensure that all of the items in a particular area are identified.
The above and other problems are solved and an advance in the art is made by systems and methods of estimating a population of passive RFID sensors in accordance with embodiments of this invention. Embodiments of this invention use the determination of contention resolutions in slots of an interrogation response frame to estimate the population of RFID sensors in the area and provide a certain degree of confidence in the population estimate. For purposes of this discussion, a contention resolution is the result of the signals read from a slot in the interrogation frame. The estimate may then be used to determine whether a predetermined amount of RFID sensors in the area have been identified.
In accordance with embodiments of this invention, the system receives signals from the RFID sensors during the allotted time slots in an interrogation frame. A contention resolution is then determined for each of the time slots. The contention resolutions of the time slots are then used to determine a probability state. Probabilities for different estimated populations or numbers of RFID sensors in the area are determined based upon the probability state. One of the estimated populations is selected as the population based on the determined probabilities of the estimated populations.
In accordance with some of these embodiments of the invention, a state machine is traversed using the contention resolutions of the time slots to determine the probability state and the probabilities for each population estimate are calculated based upon the determined probability state.
In accordance with other embodiments of this invention, the determining of the probability state is performed by determining an address in a lookup table based upon the contention resolutions of the time slots. The probability of each estimated population is read from the determined address in the lookup table. In accordance with some of these embodiments, the lookup table is populated by determining a probability for each possible state for the time slots and storing the probabilities of each possible state of each slot at an address in the lookup table corresponding to the particular state of the particular slot.
In accordance with embodiments of this invention, the contention resolution of each of the slots is a singleton response, an empty response, a captured response, or a deleted response. In accordance with these embodiments, a singleton response and a captured response advance the probability state to a next probability state; and the empty response and deleted response cause the probability state to remain in the same probability state.
In accordance with some embodiments of this invention, the system transmits an interrogation signal prior to the response frame. In accordance with further embodiments, an acknowledgement sachet is transmitted to an RFID sensor in response to a proper decoding of the RFID sensor information received from the RFID sensor to prevent transmission by the RFID sensor in subsequent time slots. In accordance with some embodiments, the population is then used to determine whether a predetermined threshold of RFID sensors in the area have been interrogated.
Turning now to the drawings, passive RFID sensors 101-109 in an area covered by an RFID reader system in accordance with an embodiment of this invention is illustrated in
As shown in
A more detailed description of the components of controller 115 in accordance with embodiments of this invention is given with reference to
Processor 205 is then connected to RFID transceiver 111 and 112 either directly through an Input/Output (I/O) bus or wireless via transponders connected to the I/O bus. In operation, the processor executes applications that control RFID transceivers to operate at different times to prevent interference between signals and to prevent an RFID sensor from being interrogated by different RFID readers.
In order to determine the amount of time that a particular RFID transceiver needs to perform the interrogation process to gather data from all of the RFID sensors in the coverage area of the transceivers, controller 115 ideally would need to know the exact number of passive RFID sensors in the coverage area or alternatively, needs an estimate the population of passive RFID sensors in the coverage area of each of the transceivers that is accurate to within a certain degree of confidence. In an environment where the RFID sensor may move between coverage areas of various transceivers, it is impossible to know the exact number of sensors in the coverage area at any particular time. This is particularly true in an environment, such as a store or warehouse, where there may be 100s or 1000s of RFID sensors moving about the area at any given time. Thus, a system is needed to estimate the population of the passive RFID sensors with a reasonable degree of certainty so that the controller can determine when data has been collected from substantially all of the passive RFID sensors in an area covered by a transceiver. Systems and methods of estimating the population in an area in accordance with embodiments of this invention provide estimates of populations of passive RFID sensors in coverage areas of the RFID reader system that can be used in determining when an RFID receiver has collected data from substantially all of the RFID sensors in the coverage area of the transceiver.
In accordance with many embodiments of this invention, RFID sensor population estimation is based on the following premises. The first premise is that when a population of RFID sensors respond to an interrogation by a RF transceiver the following contention scenarios or results occur in the time slots of an interrogation receive frame of the transceiver:
In the above contention resolutions, the capture and deletion events result from collisions of signals from transmitting RFID sensors in a time slot. The observation of these contention resolutions over a number of slots, L, during an interrogation receive frame may be used to provide an estimate of the number of sensors in the area.
In accordance with embodiments of this invention, the contention resolutions of the time slots in the interrogation receiving frame define a set of integers that represent the value of a state of a slot. Each integer, Xn, is determined as follows: Xn=Xn−1+δn
where
and
Ac˜capture event, As˜singleton event, Ae˜empty slot event, Ad˜deletion event.
Let N denote the total number of RFID sensors and L is the number of slots in an interrogation frame. Based on the maximum a posteriori probability (MAP) estimation approach which is optimal in “strict sense” for estimating parameter N, an estimate of N, {circumflex over (N)}, may be represented in the following manner:
{circumflex over (N)}=MaxN ∈ {1, . . . , N
where MaxN ∈ {1, . . . , N
PL (N|X1 . . . XL) is confidence in the probability that N is correct based upon the set of integers representing the slots, X1 through XL. The values of each Xn being the state value of the Xn for each slot based on the contention resolutions observed.
One skilled in the art will note that in a real-world deployment scenario N is typically bounded by an NMAX in a particular area of coverage for an RFID receiver. Nmax in a passive RFID application is typically in a range of about 1-10 for large assets and may be in a range of 1-1000 for small tagged items, such as pieces of merchandise in a store. Based on Bayes Rule, the estimate of N, {circumflex over (N)}, can be rewritten as follows:
where a discrete stochastic process {Xn, n=1, . . . , L} forms a Markov Chain.
Hence, the probability of Xn based on the chain may be rewritten as follows:
P
n(Xn|X1 . . . Xn−1)=Pn(Xn|Xn−1).
It should be noted that in a general setting that when a RFID sensor responds in a slot and the RFID receiver successfully decodes the data from the sensor, the RFID reader system sends an acknowledgement packet to the RFID sensor to prevent the RFID sensor from transmitting in the remaining time slots of the interrogation receive frame. Thus, the population of active RFID sensors in an area exhibits a time varying behavior from slot to slot depending on the contention resolutions observed in each slot.
Furthermore, each RFID reader system has a different capture capability. Capture capability may be defined as the ability of a RFID reader system to decode the strongest signal received during a slot despite interference that may be cause the transmission of signals from other sensors and/or other environmental factors. The capture capability of a particular RFID reader system is set as a variable threshold denoted as α.
To compute each term for Pn(X1 . . . X2|N), a theoretical graph denoted (G+R) may be used when the only non-zero probability for traversing from one node in state Si to state Si are Pn(S1→Si+1) and Pn(Si→Si), i.e. Pn(Si→Si)=0 except i=j. There is one-to-one isomorphism between each state Sin and Xn. The probabilities of empty, deletion, singleton and capture contention resolutions for slot n are pen, Pdn, Psn, Pcn respectively. Hence, the Markov Chain, of Xs can be represented by the state diagram illustrated
In
Based on the state diagram shown in
Prob(ρ)=Πi=1LΠj=1Lδpijδqij
The probabilities of each of the contentions resolutions causing a change in state are then as follows. The probability of an empty contention resolution is:
The probability of a singleton contention resolution is:
The probability of a capture contention resolution is:
Probability of a deletion contention resolution is:
P
d
n=1−Pen−Psn−Pcn.
As stated above, each interrogation response frame has L slots. In each of the L slots in the frame, the RFID reader system can detect one of the four contention resolutions namely Ac, As, Ae, or Ad. Each contention resolution corresponds to a transition for traversing the trellis illustrated
This operation is repeated for each value of N∈ {0, . . . , Nmax} in the first frame and N∈ {0, . . . , {circumflex over (N)}p} where {circumflex over (N)}p denotes the estimate of N from the previous frame. The maximum probability path is then selected. Subsequently, {circumflex over (N)} is found in the equation,
by imposing an additional constraint of P2 (N) (which may be chosen if one does not assume uniformly probable distribution of N) that may be a typical choice to provide a binomial distribution. This assumes apriori knowledge of mean and variance of distribution of N. For example μ=Nmax, σ2=Np(1−p) may be assumed where p can be chosen by the user as desired for the particular use case. Otherwise, one can assume a uniform distribution and simply use the equation {circumflex over (N)}=Maxn Pn(X1 . . . X2|N) whereby the maximization is taken over the trellis for {circumflex over (N)}=Max−1Pn(SL). Based on the above, a fully pruned trellis 400 for the case of 16-slots in accordance with embodiments of this invention is shown in
X
n
X
n−1+δn
where
Based on the above, a first system in accordance with some embodiments of this invention is provided in the following manner. All realizable paths in a trellis of possible nodes based upon the number of slots are pre-computed. The paths of the trellis are then stored in memory. During runtime, a vector including the contention resolutions of the slots (Ac, As, Ad, Ae) is used by an address generator to output the terminal node of the path corresponding to {circumflex over (N)}. The probability of {circumflex over (N)} may be determined for the node based upon the determined path. A conceptual diagram of a system in accordance with these embodiments is shown in
System 600 includes module 605 that pre-computes all of the possible paths of a trellis of the nodes for the number of slots, L, in the each interrogation receive frame. These paths are stored in a memory, such as, but not limited to Random Access Memory 610. Address generator 615 then receives the string of contention resolutions observed during the L slots of an interrogation receive frame and uses the contention resolutions to determine the proper address of the node in the trellis for the probability determination for each N from 1 to Nmax or {circumflex over (N)}.
In accordance with these embodiments, a process performed by a processing system in either the controller or the transceiver based upon instructions stored in the system estimates the population in accordance with the flow diagram illustrated in
Process 700 includes transmitting an interrogation signal from the RFID reader system to illuminate RFID sensors in the coverage area of the transceiver (705). The RFID reader system then receives RF signals from the RFID sensors during an interrogation receive frame (710). The frame is divided into L time slots. The contention resolution for each time slot is determined from the signals received in each time slot (715). The contention resolutions are then used to determine the probability node for each of the possible population estimates (1 to Nmax for the first frame or 1 to {circumflex over (N)} of the last frame for subsequent frames) (720). Based upon the determined probability nodes for each of the possible population estimates, the probability of each of the population estimates is calculated (730). The population estimate that has a probability that meets a predetermined criterion is then selected as the population of the sensors (735). The predetermined criterion may include any number of parameters including, but not limited to, the population estimate having the highest probability. One skilled in the art will note that the selected population and probability associated with the selected probability may then be used for any number of functions including as criteria in determining when to the interrogation process with a RFID reader system is complete.
As one skilled in the art will appreciate, N may be bounded by a maximum number such as, a thousand tags, and therefore it is feasible to compute the ensemble trellis for all N in the subspace of the sample space of size LN. This approach alleviates the need to compute probabilities for each path in the trellis bank at runtime if computational bandwidth is limited in the reader architecture. A conceptual drawing of a system in accordance with embodiments using this approach is illustrated in
While the above description contains many specific embodiments of the invention, these should not be construed as limitations on the scope of the invention, but rather as an example of embodiments thereof. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.
The current application is a continuation if U.S. application Ser. No. 15/065,554 entitled “Systems and Methods for Estimation of a Population of Passive RFID Sensors,” filed Mar. 9, 2016 to Ramin Sadr, which is a continuation if U.S. application Ser. No. 14/205,279 entitled “Systems and Methods for Estimation of a Population of Passive RFID Sensors,” filed Mar. 11, 2014 to Ramin Sadr, which application claims priority to U.S. Provisional Patent Application No. 61/776,683 entitled “Systems and Methods for Estimation of a Population of Passive RFID Sensors,” filed Mar. 11, 2013 to Ramin Sadr, the disclosures of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
61776683 | Mar 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15065554 | Mar 2016 | US |
Child | 15815402 | US | |
Parent | 14205279 | Mar 2014 | US |
Child | 15065554 | US |