WO2001015070A2 - Method and apparatus for locating mobile tags - Google Patents

Method and apparatus for locating mobile tags Download PDF

Info

Publication number
WO2001015070A2
WO2001015070A2 PCT/US2000/023459 US0023459W WO0115070A2 WO 2001015070 A2 WO2001015070 A2 WO 2001015070A2 US 0023459 W US0023459 W US 0023459W WO 0115070 A2 WO0115070 A2 WO 0115070A2
Authority
WO
WIPO (PCT)
Prior art keywords
tag
location
zone
receiver
determining
Prior art date
Application number
PCT/US2000/023459
Other languages
English (en)
French (fr)
Other versions
WO2001015070A3 (en
Inventor
Jay Werb
Emin Martinian
Melanie Swiderek
Samuel Levy
Peter Stein
Original Assignee
Pinpoint Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pinpoint Corporation filed Critical Pinpoint Corporation
Priority to AU69402/00A priority Critical patent/AU6940200A/en
Publication of WO2001015070A2 publication Critical patent/WO2001015070A2/en
Publication of WO2001015070A3 publication Critical patent/WO2001015070A3/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/04Position of source determined by a plurality of spaced direction-finders
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S11/00Systems for determining distance or velocity not using reflection or reradiation
    • G01S11/16Systems for determining distance or velocity not using reflection or reradiation using difference in transit time between electrical and acoustic signals
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/87Combinations of radar systems, e.g. primary radar and secondary radar
    • G01S13/878Combination of several spaced transmitters or receivers of known location for determining the position of a transponder or a reflector
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0205Details
    • G01S5/0244Accuracy or reliability of position solution or of measurements contributing thereto
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0269Inferred or constrained positioning, e.g. employing knowledge of the physical or electromagnetic environment, state of motion or other contextual information to infer or constrain a position
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10079Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the spatial domain, e.g. temporary shields for blindfolding the interrogator in specific directions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Definitions

  • the invention relates to determining the location of mobile assets associated with a tag.
  • Determining the location of assets can be important in a variety of different applications. For example, a company may wish to sound an alarm when a piece of equipment, such as a computer, is moved from one location to another, or when a person moves within a potentially dangerous area of a facility.
  • One way to track the location of assets is to associate each asset, or group of assets, with a tag.
  • the tag may be capable of communicating with a controller through one or more receivers to provide information used to determine the location of the tag, and thus the location of the associated asset.
  • the tag may send a radio frequency signal that is received by one or more antennas that communicate with a controller. Based on the signal, the controller may determine where the tag is located.
  • the controller may receive a signal output by a tag at two antennas and use the signals received by each antenna to locate the tag using triangulation.
  • triangulation may not be useful in situations where a signal from a tag can not be received at more than one antenna. In such cases, triangulation alone may not be used to determine the location of the tag.
  • a signal output by a tag may be properly received at two receivers, allowing a proper determination of the location of the tag, but improperly received at a third receiver. In such a case, inclusion of the information related to the signal received at the third receiver in the triangulation determination may prevent or confuse the process of properly identifying the location of the tag.
  • the present invention provides a system for determining a location of a tag.
  • at least one device is provided to communicate with a tag, e.g., the device may receive a signal sent by the tag.
  • Information regarding communication with a reference tag is stored, processed, and/or analyzed to determine a location of a tag.
  • information regarding the communication with the reference tag may be stored in a lookup table and used to determine the location of other tags.
  • an asset location system including at least one receiver that receives a signal from a tag, a controller that communicates with the at least one receiver, and a memory that stores data regarding previous communication between at least one receiver and a reference tag while the reference tag is in at least two different locations.
  • the controller may determine a location of the tag based on the stored information regarding communications with the reference tag.
  • a method for locating a tag is provided. One or more signals representing a communication with a reference tag while the reference tag is in at least two locations is received and stored. A location of a tracking tag is determined based on the stored information regarding communications with the reference tag.
  • a method of determining a location of a tag is provided. At least one device to communicate with a tag is provided and a signal representing communication with the tag is received. A preliminary location for the tag is determined based on the signal, and the preliminary location is filtered before being used to report the tag location.
  • a method for developing a system for determining a location of a tag is provided. A reference tag is positioned in at least one zone, and data representing a distance from the reference tag to at least one reference point is obtained while the reference tag is in the zone. An algorithm for determining a location of a tracking tag is determined based on the obtained data.
  • a storage medium including a set of instructions to be executed by a data processing apparatus.
  • the set of instructions includes instructions to receive a plurality of signals representing a location of a reference tag with respect to at least one reference point, instructions to analyze the plurality of signals for patterns regarding locations of the reference tag with respect to the at least one reference point, and instructions to provide a representation of the analysis of the signals to a user.
  • a method for determining a location of a tag is provided. A tag is communicated with at at least two different receiver locations, and tag-receiver distances between the tag and the two receiver locations are determined. The location of the tag is determined based on the two tag-receiver distances.
  • FIG. 1 is a schematic diagram of a portion of an asset location system
  • Figs. 2 and 3 are schematic diagrams representing situations where an erroneous distance reading has been obtained
  • Fig. 4 is a schematic diagram of a portion of an asset location system in which an erroneous antenna reading has been obtained
  • Fig. 5. is a schematic diagram of a configuration in which a tagged asset is to be located in rows of assets;
  • Fig. 6 is a schematic diagram of a configuration in which a tagged asset is to be located in a movable train of assets
  • Fig. 7 is a schematic diagram of an illustrative zone layout and corresponding hierarchy for an asset location system
  • Fig. 8 is a schematic block diagram of an asset location system
  • Figs. 9-11 show illustrative facility structures for which a template may be constructed
  • Fig. 12 shows an illustrative location system template setup for a T-shaped facility portion
  • Fig. 13 is a schematic diagram of an illustrative neural network structure
  • Fig. 14 is an illustrative histogram of distance readings for one receiver and one zone
  • Fig. 15 is an illustrative probability distribution of distance readings for one receiver and two zones;
  • Fig. 16 illustrates two possible tag location determined using a geometric analysis and one tag location determined using a non-geometric analysis;
  • Fig. 17 is a schematic diagram of an asset location system for an illustrative parking lot facility.
  • tags of various kinds are currently used to track the location of one or more assets associated with the tag.
  • the tags may have a variety of different configurations, which may depend on the application.
  • the tags may be radio frequency identification tags (RFID tags) that communicate with one or more receivers, e.g., antennas.
  • RFID tags are not the only type of tags that may be used to track assets.
  • tags may communicate using other signals, such as electromagnetic signals outside of the radio frequency band, ultrasonic signals, combinations of electromagnetic and ultrasonic signals, and so on.
  • communication between the tags and a receiver may be one-way or two-way communications, and the tags may be active (include an internal power source) or passive (include no internal power source and be powered by an external source, such as an interrogation signal).
  • the communications between the tags and receivers may include a variety of different types of information or may be used in a variety of different ways to determine the location of a tag. For example, the communications may be used to determine a difference in the time of arrival of a signal from the tag at two or more receivers, a round trip time of flight of a signal between a receiver and the tag, a time of arrival of a signal at a receiver, a direction from which the signal was sent, or a strength of a signal received at a receiver.
  • the fact that a signal sent by a tag was received may provide information useful for determining the tag's location, e.g., receiver sensitivity to a signal sent from the tag may be varied, thereby indicating an approximate distance between the receiver and the tag. Such information may then be used to determine the location of the tag, as is well known in the art and not described in detail herein.
  • a tag antenna distance TAD
  • the TAD is determined based on a round trip time of flight of a signal between an antenna and a tag.
  • asset location systems such as those that communicate using ultrasonic signals, that determine a tag antenna distance not based on a round trip time of flight of a signal, or that do not use a tag antenna distance to determine tag location.
  • One method for locating tagged assets is triangulation. This method may involve using signals received at two or more locations, e.g., signals received by two or more antennas, to locate the position of a tag. The distance from each antenna to the tag may be determined, and a geometric solution for the tag location can be produced. Alternately, a direction from which the tag signal was received at each antenna location, and/or a combination of direction and distance may be used to determine the tag location. In the illustrative embodiments described below, Tag- Antenna Distance (TAD) information is determined based on signals received from a tag at each antenna. Thus, a signal received at an antenna from a tag may be used to determine the distance between the antenna and the tag.
  • TAD Tag- Antenna Distance
  • This distance may be determined in any of a number of suitable ways, as are well known in the art.
  • One such way is to determine the TAD information, or distance reading, based on round trip time of flight of a signal traveling from an antenna to the tag and a signal traveling from the tag to the antenna.
  • a configuration with two antennas la and lb at known positions (X 0 , Y 0 ) and (Xi, Yi) are at distances D 0 and Di from the tag 2.
  • This information may be used to determine the tag location (X ⁇ , Y ⁇ ).
  • the solution may proceed in two steps. First, the configuration may be reoriented so that it can be placed within a simple coordinate system with the antenna la at the origin and the antenna lb on the X-axis. This allows the triangulation calculations to be performed using simple geometry. Once the basic calculations are performed, the result may be rotated and translated back to the original orientation.
  • the distance D A between two antennas la and lb may be defined as in Equation
  • (XT J , Y U ) may be determined, which is the position of the tag 2 relative to our simple coordinate system (that is, prior to rotating and translating it back to its original orientation) as shown in Equations 4 and 5:
  • An estimated tag location may represent, at least in some cases, an exact location of a tag 2, and in other cases an approximate location of the tag 2 since there is typically some limit to the accuracy of an asset location system, e.g., the system may accurately locate a tag to within 3 feet.
  • estimate tag locations and “tag locations” determined by an asset location system. That is, “estimated tag locations” and “tag locations” determined by a location system refer to the same determination as used herein.
  • tag locations may refer to absolute tag positions, e.g., coordinate positions, or general tag positions, e.g., a zone within which a tag is located.
  • absolute tag positions e.g., coordinate positions
  • general tag positions e.g., a zone within which a tag is located.
  • the angle ⁇ may be as close as possible to a right angle, because such a configuration may result in only moderate error in two dimensions, rather than high error in one dimension. However, this depends to a certain degree on the needs of the user. At times, high resolution may be desired in one axis, but not the other. In this case, an angle ⁇ much lesser (or greater) than 90° may produce more useful results.
  • Equations 11-14 may be used to determine the effect of geometric error on the tag location estimate: dT x o dT x D ⁇
  • the sensitivity of a particular tag 2/antenna 1 configuration may also be determined in at least two ways.
  • One way is to solve for the above Equations 11-14 and then rotate and translate the results back to the original orientation.
  • Another way is to use actual values for distance readings between each antenna 1 and the tag 2 and calculate the effects of small errors in distance measurement on the final tag 2 location estimates.
  • Information about the angle ⁇ may be used as a kind of filter on distance readings, e.g., determined distances between an antenna 1 and a tag 2. For example, suppose that there are more than two antennas 1 receiving readings from a tag 2. Some of these readings may be erroneous. If that is so, then using all possible pairs of antennas 1 for triangulation calculations may result in multiple location estimates that are not in agreement.
  • Fig. 4 shows a parking lot such as might be used for tractor-trailers delivering goods.
  • three antennas la-lc are used to locate tagged trucks within the lot.
  • Fig. 4 shows tag 2 distance estimates (dashed line circles) based on a distance reading from each antenna 1.
  • a particular truck is to be located within the parking lot.
  • Two of the antennas (la and lb) have produced accurate readings, and the third antenna 1 c reading is inaccurate.
  • distance information received from the antennas la-lc have produced four different tag location estimates (A, B, C, D) where each of the distance estimates (dashed line circles) for each antenna la- 1 c intersect.
  • Points A and B may be eliminated because they are too far away from a parking space. Also, it may be expected that point C is more accurate than point D for three reasons:
  • Point C locates the truck within a parking space, while point D does not.
  • one way to determine which of the remaining distance estimates to use is to calculate the angle ⁇ for each point still under consideration.
  • the angle for each of the two points may be calculated. If the angle for point C were appreciably closer to 90° than the angle for point D, we would choose point C.
  • tagged assets may need to be located in a configuration that requires higher resolution in one dimension than in another. This would be the case, for instance, in an automated sorting facility.
  • the setup may be somewhat like the parking lot example in Fig. 4.
  • the "spaces" in which a container 50 might be found may be smaller and closer together.
  • geometry may be compensated for by installing a larger number of antennas along one axis, e.g., the X-axis, in order to achieve higher resolution along a transverse axis, e.g., on the Y-axis.
  • Locating a tag 2 associated with a container 50 in the configuration shown in Fig. 5 may be done in two steps. First, triangulation may be used as described above. This narrows the location of the container 50 to a particular row. (In Fig. 5, location estimates have already been filtered and a pair of antennas, e.g., antennas lb and If, with the most favorable geometry have been selected.) This gives a location, but with the effects of geometric error, the location may not be precise enough to determine the location of a particular container 50 in a row of closely spaced containers 50.
  • an X-axis antenna with the best geometry e.g., antenna lb
  • antenna lb is selected and used to measure tag-antenna distance in a single dimension, e.g., in a direction approximately parallel to the Y axis. This indicates where the container 50 is in that particular row.
  • Another instance in which geometry may be compensated for is when the relative positions of groups of objects that roll around freely are to be determined, but the objects have a known relation to each other.
  • An example of this involves container trains 61 being loaded and unloaded near aircraft 60, as shown in Fig. 6.
  • a tagged object may need to be located somewhere on a container train 61 near an aircraft 60.
  • the location of tagged objects on a container train 61 is somewhat complicated by the fact that the train 61 moves around the area near the aircraft 60. Thus, a fixed location for an object alone may not be determined.
  • the solution of this problem may proceed in several steps. First, the general orientation of the train 61 may be determined using triangulation as described above. This indicates where each container is relative to the tug at the front of the train 61. Then, the distance of a tagged object relative to the tug may be determined. In order to do this, a tag may need to be placed on each tug. The best antenna may be selected and (a) the distance from the antenna to the tug may be determined, and (b) the distance from the antenna to the tagged object may be determined.
  • the difference between the two is the distance of the tagged object relative to the tug. This indicates where the tagged object is relative to the tug. Since the sizes and spacing of the containers on the train are known, the relative distance may be used to determine which container holds the tagged object. Triangulation may again be used to look for outliers, which would tend to be location estimates that do not coincide with a container. Since the train may stop multiple times while loading or unloading items near the aircraft, there may be multiple chances to locate an object on the train and to eliminate inconsistent data. This is another example of a situation in which compensation for the effects of geometry may be made. Additional reference may be made to "3D-iD Technical Overview," Billerica, MA, PinPoint Corporation, 2000.
  • Tag locations may be determined using methods other than triangulation, e.g., in a way that does not necessarily determine, or attempt to determine, a precise location for the tag 2.
  • a system may communicate with a tag 2 using one or more antennas 1 in such a way that a zone, or area, within which the tag 2 is located may be determined.
  • One such system is a Boolean rule-based system, in which a facility, or other region within which tags 2 may be located, is logically divided into zones.
  • a zone may be a room, a portion of a hallway, a manufacturing station where a particular process occurs, or some other identifiable area.
  • ViewPoint a commercially available software application used with the 3D-iD system offered by PinPoint Corp., allows the creation of hierarchically organized zones.
  • An example of a zone hierarchy is shown in Fig. 7.
  • a facility may be divided into parent zones and child zones within a corresponding parent.
  • the facility A is divided into three parent zones, East, West and Common.
  • Each of these parent zones has corresponding child zones, such that if a tag is located within a child zone, the tag is necessarily located within the parent zone.
  • Fig. 7 shows only three hierarchical levels, a configuration may have fewer or more than three levels, if suitable.
  • zones may be useful, for example, in Boolean rule-based systems. That is, rather than executing every rule in a system to determine the location of a tag, rules may be applied in a top-down manner so that parent rules are first applied to a set of antenna readings, followed by child rules.
  • This approach may reduce the time needed to determine the location of a tag and provide a way to quickly provide a general indication of a tag's location, since not all rules in a system need be checked to locate the tag.
  • the rules for the three parent zones, West, East and Common may first be applied to a set of antenna readings for a tag. If the antenna readings satisfy the rules for one of the zones, e.g., Common, then the rules for MIS and Bathroom may next be applied to locate the tag. Rules for child zones under the West and East zones need not be applied.
  • Boolean rule-based systems typically involve a human rule designer, who estimates and/or analyzes antenna readings received when a tag 2 is placed at different locations and orientations in the zones. The human rule designer then creates rules to map the antenna readings to zones.
  • a location builder application within ViewPoint allows the rule designer to define Boolean rules that the system uses to convert Tag- Antenna Distance (TAD) data to information about the location of a tag 2.
  • TAD Tag- Antenna Distance
  • a rule designer might create a statement that indicates that a tag 2 is in zone A if it is within 15 feet of antenna #1 on controller ccl and more than 30 feet from antenna #4 on controller ccl .
  • Another type of statement (“closest to”) might indicate that a tag 2 is in zone D if it is closest to antenna #3 on controller ccl.
  • Locations may be set in the lowest level of the hierarchy, and higher-level (“parent") locations may have rule sets that are the sum of the rule sets of lower-level (“child”) locations.
  • parent higher-level
  • child lower-level
  • a set of parent rules may indicate that an asset is on a floor of a multi-story building, with child rules indicating the suite. If there was not enough information to identify whether a tag 2 is currently located within a particular suite (child zone) based on the rules provided, the system may report that the tag 2 is somewhere on the floor (parent zone).
  • a similar result could be obtained by including a child location at the end of a rules list, indicating that the tag 2 is within the parent and not in any of the other children.
  • Boolean rules for use with this type of asset location system, and Boolean rule-based systems have several advantages over systems using triangulation:
  • TAD Tag- Antenna Distance
  • a set of Boolean rules may be developed for an asset location system such as that shown in Fig. 8.
  • an area is divided into eight zones, Zones A through H.
  • Four antennas la- Id communicate with a controller 10.
  • the controller 10 receives signals from the antennas la- Id and may determine the location of the tag 2, possibly with reference to information, such as Boolean rules, stored in a memory 11.
  • the controller 10 may be a general purpose computer, or network of computers, that is suitably programmed to perform the desired input/output and/or other functions.
  • the controller 10 may also include any suitable components or devices, such as software modules, communication devices, memories, displays, user interface devices, etc.
  • the controller 10 may include a cell controller that receives signals from and sends signals to a plurality of antennas or other receiving/transceiving devices and a data processing apparatus that receives information from multiple cell controllers to determine tag location.
  • the antennas 1 may operate as receivers and/or transmitters in communicating with tags 2 or other devices.
  • tags 2 may communicate with the controller 10 using ultrasonic, electromagnetic or any other suitable signal.
  • the antennas 1 may be replaced or supplemented with other devices, such as microphones, infrared transceivers, etc.
  • the controller 10 may determine a variety of different information from communication with a tag 2. For example, the controller 10 may determine a tag-antenna distance (TAD), a direction in which the tag 2 is located relative to a reference point (such as a receiver location), etc.
  • TAD tag-antenna distance
  • Such determinations may be made based on a signal strength of the tag signal at one or more receivers, a time difference of arrival of a tag signal at two or more receivers, Doppler shift of a tag in motion, a round-trip time of flight for communication between a transmitter, receiver and a tag, and so on.
  • a service test application operating within the controller 10 or another data processing apparatus (not shown) that communicates with the controller 10) is first used to collect reference data.
  • an individual may walk around each zone with a tag 2 for a brief period of time, and as the individual (and the tag 2) moves from zone to zone, or within a single zone, the tag 2 sends signals that may be used by the controller 10 (or other apparatus) to determine in which zone the tag 2 is located, e.g., the distance from the tag 2 to one or more antennas la- Id may be determined from signals sent to and/or from the tag 2.
  • the controller 10 or other apparatus
  • data regarding the actual location of the tag 2 at specific times, such as the actual zone that the tag 2 is located in for each communication is also collected, e.g., by a personal digital assistant (PDA) or other suitable device.
  • PDA personal digital assistant
  • the controller 10 may be instructed to collect data for the tag 2 while the tag 2 is moved within a specific zone, e.g., to collect data while the tag is in Zone A.
  • the controller 10 may then be instructed to pause data collection while the tag 2 is moved from the current zone (Zone A) to another zone, and resume data collection when the tag 2 is in the new zone.
  • the controller 10 may collect readings from the tag 2 and write them to a file, e.g., write distance readings and a corresponding actual zone for each reading in the memory 11.
  • the TAD Analyzer application (operating on the controller 10 or other data processing apparatus) may then analyze the collected data to extract patterns.
  • the application may produce a table for one or more zones that contains data similar to that contained in Table 1.
  • the tag is in this zone if it is between 29 and 30 feet from Antenna la on Controller 10 and between 24 and 25 feet from Antenna lb on Controller 10.
  • a TAD consolidation process or similar method or device may be used with the TAD analyzer or similar application.
  • This process allows the system to manage a particular problem known as tag dropout.
  • tag dropout When a tag 2 is within a particular zone, there is typically a subset of antennas 1 that receives readings from that tag 2. Occasionally, however, an antenna 1 covering that zone does not receive a reading from that tag 2. This is known as tag dropout.
  • Tag dropout may be a problem if the Boolean rules for a zone rely on readings from a particular antenna 1.
  • the TAD Consolidation process may provide a way to obtain a location estimate even when there is tag dropout.
  • the TAD consolidation process may examine a previous antenna reading and a current antenna reading for a tag and consolidate the data from the two readings according to certain rules. For example, suppose we see the readings:
  • the TAD consolidation process may provide, in part, that if at least one antenna 1 has a matching distance between a past and a current reading, the system should take the shortest distance for matching antennas 1 and simply add unique antenna readings.
  • a consolidated reading may be:
  • the system can apply the rule for this zone to the consolidated reading to obtain a location estimate for this tagged object.
  • the TAD Consolidation process may include a number of rules for different situations. For example, different rules may be provided for when at least one antenna has a matching distance between two readings and when no antennas have matching reads.
  • the TAD consolidation process may operate over a window of time.
  • a length of time may be set by the user so that when an antenna reading arrives, it may be held by the system for a specified length of time, and subsequent reads during that time are accumulated. At the end of the time period, the reads are compared and consolidated. This is done so that redundant messages can be consolidated without losing information conveyed by different read periods.
  • the system may be configured to automatically analyze the data and generate or suggest Boolean rules. This will further limit the difficulties inherent in using human rule designers by not requiring that a designer locate the patterns within a set of data.
  • Another way to contend with the difficulties posed by using an untrained human rule designer is to use templates for system and rules setup that are pre-generated by expert rule designers.
  • pre-designed setups for antenna 1 locations and rule sets may be designed by expert rule designers for use in various types of facility arrangements.
  • a facility would not necessarily require that an on-site rule designer be trained to solve all of the unique setup issues of his or her facility from scratch.
  • on-site personnel can set up the system based on a set of templates that have been pre-designed to address issues typically found in a given facility configuration.
  • the templates may be developed by experts based on prior experience, so that there is some precedent for evaluating the utility of a rule set for a particular configuration.
  • users may have access to a limited set of pre-designed configurations with instructions for placing antennas 1 and using rule sets.
  • These configurations may be available for several different facility dimensions and include common facility arrangements, such as a T-shaped hallway, a hallway with a room off to one side, or a hallway with a room at the end, such as those shown in Figs. 9-11, respectively. Each arrangement may be divided into two or more zones. Users simply select the pertinent configuration and dimensions and follow the instructions to set up antennas 1 for that configuration. Tag 2 location then proceeds using pre-designed Boolean rule sets that are particular to that configuration in those dimensions.
  • Each setup may show an assumed facility configuration along with antenna placement and zone definitions, and a set of Boolean rules for the zones that is based on the dimensions of the space being configured.
  • the predesigned Boolean rules may be as follows:
  • the tag is in the top right far zone D if it is closest to Antenna lc on Controller 10 and between 40 and 60 feet from Antenna lc on Controller 10."
  • a simple version of this system may allow the user to select an appropriate facility configuration and set the necessary parameters for the system. For example with reference to Fig. 12, the user may be prompted to input the names of the antennas 1 in the system that correspond to the antennas 1 in the template. In addition, the user may input the dimensions of the space to which the configuration will apply, provide names for the zones, etc.
  • a more complex system may include a wider variety of facility configurations and greater flexibility of scaling.
  • a system could be designed to work with an AutoCAD map of a facility. Users could drag, rotate, and drop various pre-designed facility configurations onto the facility map and scale or reorient them as needed. If the scaling is too great, for example, over 300%, the system may return a message stating that the template is inappropriate for use in that location.
  • the system may also allow for further adjustment as needed in cases where, for example, it is difficult to distinguish between zones, or where certain zones need rules that are more specific than the rules provided with the template.
  • pre-designed templates may improve upon manually designed Boolean rule-based systems. Templates may eliminate the need for training an on-site rule designer who must then determine from scratch how to design rule sets that are appropriate for his or her facility. However, there is still the difficulty of having an expert rule designer create these templates. In addition, demanding users may require some adjustments to the templates to make them work better in their particular facilities. In addition, some facilities may be configured in such a way that templates can not be easily applied nor Boolean rules readily created. In such cases, a different type of zone-based or other system may be required.
  • zone instability There are a number of filtering techniques that may be used with Boolean rule- based or other systems to improve the quality of tag location estimates.
  • zone instability we may want to avoid the situation in which the system alternates rapidly between zones when providing a determination of a tag's location (hereafter called "zone instability"). For example, suppose a facility is divided into zones A and B. A zone-based system may produce ten consecutive preliminary estimates for the location of a tag 2 that look like (A, B, B, B, A, A, B, A, A, A). In this situation it is difficult to tell where the tag 2 is located; based on the estimates, it looks like the tag 2 is moving rapidly between zones A and B, which may or may not be the case.
  • the exponential smoothing process uses d t to calculate a smoothed value, which we call the average distance over time (A t ). This smoothed value is used in combination with d t+ i to produce the next smoothed value (A t+ ⁇ ). This process can be illustrated as
  • a t is the average distance up through time t.
  • exponential smoothing in this case is a way to account for both the current distance reading and the prior history of the movement of the tagged asset. How d t and A t are weighted depends on the value selected by the user for ⁇ . If ⁇ is large, then current distance readings are weighted more heavily, whereas if ⁇ is small, prior history will be weighted more heavily.
  • a second smoothing method may use a moving average of the last R readings to estimate the tag location.
  • the moving average filter the user selects the number of readings over which to average. The higher the number of readings over which we average, the more distance readings will be smoothed out over time.
  • Another smoothing method that can be used is the TAD consolidation process (or other similar process) described earlier. Recall that this method uses an algorithm to manage the problem of tag dropout.
  • the TAD consolidation process may also smooth data by, for example, using the shortest distance reading when there are two readings from the same antenna.
  • the result of the above smoothing methods is to lessen the impact of outliers on tag location estimates.
  • a system may obtain a distance reading that is longer than it should be. This can occur for numerous reasons, including environmental effects. There may be a desire that the location estimates not be unduly affected by unreliable readings.
  • one or more smoothing methods prior to filtering, or as a part of filtering may be used to lessen the impact of any one reading on tag location estimates.
  • One method is to check new readings against the most recently determined tag location. If the Boolean rules for the most recently determined tag location still apply to the new reading, the system may continue to report that the tagged item is in the same location. (This is known as having "sticky" rules.)
  • Another filtering process is a sequential filter, which may instruct the system not to report a change in location until N consecutive readings suggest the same location change.
  • Another is the average filter which is a "best of N" filter. This filter instructs the system to use the location that was seen the most in the previous N readings. (This process may, or may not, achieve the same result as the moving average filter described above. For example, the moving average filter may actually average distance readings to determine an averaged distance reading that is then used to determine tag location, whereas the average filter may look at actual tag location determinations, not distance readings, to determine whether the current tag location determination was seen the most in the previous N readings.) In this case, the reads indicating the location may or may not be sequential.
  • the system bases its tag location estimates on readings that may be more reliable, thereby mitigating the effect of outliers.
  • the asset location system may use any of the smoothing and/or filtering operations in any suitable combination. For example, the system may check whether the new location has been suggested N times in a row, and then check whether the majority of the last R readings have suggested the same new location.
  • the values of N and R may be set depending on the needs of the user; if greater certainty is desired, N and R can be set to a greater value.
  • a related method that may be employed is to use time as a filter.
  • the system may not report a change in tag location until a tag has been seen in that new location for T amount of time.
  • the value of T may be set by the user depending on needs; if greater certainty is desired, Tcan be set to a greater value.
  • Another approach is not to report a change in location if the new reading causes an undefined location. Again, the system eliminates unreliable readings by using only readings it has seen before and/or readings that can be resolved to a defined location.
  • One way to implement the aforementioned filters is to set a publish delay that is greater than zero.
  • the system may publish the estimates with a delay. This may allow the system, for example, to compare the last N readings, rather than publishing a location estimate immediately after receiving and processing the last of N readings.
  • zones Users may also prioritize zones and thereby control how location determinations are reported. For example, suppose that a tagged object is at the boundary between zones A and B. The system may not be able to determine whether the object is in zone A or zone B if the Boolean rules for both zones apply to the new reading. Suppose further that the tagged object is expected more often to be in zone B than in zone A. Thus, zone B may be set with a higher priority than zone A. Then, if both zone A and zone B satisfy the Boolean rules or other criteria for a new reading, the system may report that the object is in the zone with higher priority (in this case, zone B).
  • zone instability may depend on objectives for the system. If a goal is to track the location of personnel or assets in real time, it may be desirable to allow zone instability between locations, since rapid location changes may reflect the actual movement of tagged assets. However, if a goal is to create a database of tagged asset movement, zone instability requirements may be made more restrictive, since zone instability may cause a database to fill quickly with potentially meaningless data. Likewise, if an alarm is triggered when a tag moves into a particular zone, we might want to be more certain that the tag really has moved into that zone. Using one or more filtering techniques may decrease the occurrence of false alarms.
  • tag location reporting There is, however, a tradeoff between immediacy and reliability in tag location reporting. For example, suppose that a facility has two zones and that an asset location system has been set up so that an alarm is triggered when a tagged asset enters zone A. If we want to decrease the likelihood of false alarms, the data may be filtered so that the system does not report a location change unless it sees five consecutive readings for which the same new location is estimated. For example, a tagged individual may be in zone B and pacing near the doorway to zone A. Because the individual is moving near the zone boundary, the system may occasionally report that he or she is in zone A. If we filter the data, though, an alarm may not be triggered if only one reading indicates that he or she is in zone A.
  • filtering techniques may be adjusted to accommodate the objectives for the asset location system.
  • One way to accommodate desires of immediately and accurately determining asset location is to use two location systems that operate simultaneously (or a single location system that effectively operates as two systems).
  • Two or more location systems may operate in parallel on a single data processing system, and each can use different instructions to locate tagged assets.
  • One system may collect data appropriate for a database used to track historical asset movement, and a second system may collect realtime movement data.
  • For the database there may be a desire to collect tag location data that are more reliable over time; for the real-time data, there may be a need for greater immediacy of response.
  • different parameters e.g., filtering rules, may be set for each system.
  • a history of the general locations of tagged assets may be maintained in a database without filling up the database with highly granular data.
  • tagged assets may be tracked in real-time and/or alarms may be triggered as necessary with greater immediacy.
  • Smoothing and filtering parameters may be set at a global level; that is, the same filters may be used for all of the zones in a system.
  • filtering for some zones may be set differently than other zones. For example, in certain zones within a facility, such as quiet office areas, false alarms may be undesirable. In other zones, such as those with dangerous equipment in which alarms are sounded when someone has entered a room without authorization, false alarms may be more tolerated.
  • a more complex system may allow filtering parameters to be set differently for different zones.
  • the system may allow the user to choose different packages of settings for different types of zones. For example, one setting may be provided for alarmed zones and another setting may be provided for regular zones. The user can choose a parameter package for each zone type, and the system can apply the packages to the appropriate zones. Thereafter, adjustments could be made as needed for individual zones (such as when a particular alarmed zone requires an even lower N than the rest of the alarmed zones).
  • neural networks may be used to classify a variety of different inputs into different categories, a neural network may be used to classify tag readings into zones or specific tag locations.
  • neural networks can assume many different forms, there are several features that most such networks have in common: • Neural networks involve processors operating in parallel.
  • Neural networks include an input layer, one or more hidden layers, and an output layer.
  • the input layer takes in data
  • the hidden layers process the data
  • the output layer generates a result based on the neuron activations produced during processing.
  • the processing layers are referred to as "hidden” because their activity is typically invisible to the user.
  • Neural networks are typically trained to learn relationships. Usually a neural network is presented with examples and/or rules to train it to pick out patterns in input. These patterns in input produce patterns in neuronal activation. (Systems that learn by training are known as supervised systems. However, it is possible to design an unsupervised system, that is, a system designed to pick out patterns on its own, without examples or rules to guide it.) The neuronal activation patterns yield different outputs, which are compared to the "correct" outputs for the examples. The network is then adjusted so that its outputs match more and more closely to the "correct” outputs.
  • Neural networks can produce output based on the rules they learn. Once a neural network is trained (or, in the case of an unsupervised system, trains itself), it can use the patterns it has discerned to process new output. Again, this output is generated based on the pattern of neuronal activation produced during processing.
  • neural networks may have some drawbacks. Neural networks may require lengthy training times, and it may be difficult to understand what the network is actually doing and why it works.
  • choosing the right parameters for neural networks may be more of an art than a science, and may often be accomplished through trial and error, rather than through any deep understanding of why the parameters should be set a certain way.
  • a feed-forward network is a neural network in which input passes unidirectionally through one or more hidden layers to produce output. Each hidden layer processes the result of the prior layer, generates its own result, and passes its own result on to the next layer for further processing.
  • Fig. 13 is a schematic diagram of one possible neural network. The arrows indicate the unidirectional nature of the network; there is no feedback loop present in this illustrative structure.
  • the inventors used the neural net software provided by Masters. This software implements a variety of neural networks and handles supervised training of a network. This software was used to implement one- and two-hidden-layer feed forward networks. Default settings were found to be satisfactory for tests, and the default sigmoid function was used for the activation function of each neuron. A mean square difference was used as the error function to be minimized during training. For the training, genetic programming and simulated annealing techniques followed by gradient descent were used.
  • Two input neurons were used for each antenna in the tag location system.
  • the distance reading for each antenna was encoded in one input neuron and the "quality" of the distance reading was encoded in another neuron. (A metric that may be used to determine this quality is described below.) If an antenna did not pick up a distance reading, the distance was set to 0.5 and the quality was set to zero. When an antenna did receive a distance reading, the distance value was normalized to a real number between zero and one, and the quality was computed according to a formula designed to measure the stability of the distance reading. One output neuron was used for each zone. The output neuron with the highest activation was chosen as representing the correct zone. Reference data of some kind may be needed to train the neural network before it can operate to determine tag locations.
  • a tag 2 may be moved around the various zones and another device 21, such as a handheld computer that is operated by a user, that may move with the tag 2 may communicate with the controller 10 to report the actual current zone for the tag 2.
  • the tag 2 may send a signal, or "chirp," that is received by the antennas 1.
  • a quickly chirping tag 2 such as a tag 2 that chirps every quarter second.
  • TAD data may be collected by the controller 10 for each chirp of the tag 2.
  • the device 21 may instruct the controller 10 to pause data collection while the tag 2 is moved to another zone. Once the tag 2 is positioned within another zone, the controller 10 may again collect reference data. The controller 10 need not stop collecting reference data while the tag 2 moves from one zone to another. Instead, the controller 10 may continue collecting data and be told by the device 21 or a user, for example, when the tag 2 has moved to another zone. Collected data may be stored in the memory 11.
  • the distance value for a TAD reading may be computed by correlating a received signal with a reference signal.
  • an optimal way to compute the distance may be to search for the maximum of the correlation waveform sampling units, v (n).
  • this triangular peak may be slightly obscured by noise.
  • the triangular peaks from the multiple paths add to produce a smeared correlation waveform. For example, consider the case in which the tag 2 is at distance d, but there is also a reflected path at distance d+ ⁇ .
  • v ( ⁇ ) has a clear triangular structure, then a high quality distance measurement may be extracted.
  • the quality metric is a formula that determines the quality of the extracted distance d for the correlation waveform v (n) as shown in Equation 22 below:
  • A max ⁇ v (0), v (1), v (2), ..., v (d-2) ⁇ .
  • Q (x) is the probability that a random variable with mean 0 and variance 1 is greater than x.
  • the variance of the noise in v (n) is estimated by ⁇ 2 .
  • the formula above has two components.
  • the first component represents the probability that the first peak of the correlation waveform occurs before d-2.
  • the second component represents the probability that the large value of v(d) is caused purely by Gaussian noise with variance ⁇ and mean 0.
  • the quality metric has proved useful in computing weighted averages of current and past distance readings for filtering, and as an input parameter to the neural network designed for zone location.
  • an algorithm that computes a distance using the leading edge of a correlation waveform may provide a more robust extracted distance and a reduced the need to use the quality metric.
  • a potentially more useful approach for determining the location of a tag involves using a lookup table.
  • lookup table approach is to create a lookup table where the keys in the table are antenna readings and the corresponding values are the zones that are most likely to have generated those readings. (Antenna readings may be TAD information or other information regarding communication between a receiver and a tag that is used to determine tag location.)
  • a lookup table may be constructed in a number of different ways. For example, a facility may be divided into two or more logical zones and reference data obtained for the zones. This reference data may then be stored in lookup table such that certain sets of antenna readings are associated with a given zone or tag location. Thus, when future antenna readings are received for a tag, the antenna readings may be used to identify a corresponding tag location in the look up table.
  • the lookup table may be populated, for example, by moving a chirping tag around each zone and collecting reference data in a way similar to that described above. For example, suppose that we want to create two zones, Office-Zone and Hall-Zone. A tag may be moved around Office-Zone while the system collects reference data. Next, the tag may be moved around Hall-Zone while the system again collects reference data. The readings for Office-Zone and Hall-Zone may then be placed into a database. Later, reference data stored in the database may be used together with current antenna readings, or "tracking data," to locate a tag 2. For example, if the tracking data was previously seen in the Office-Zone reference data, the controller 10 may determine that the tag 2 is in Office-Zone.
  • the controller 10 may determine that the tag 2 is in Hall-Zone.
  • This straightforward idea has a number of attractive features: • It is easy to set up. Setting up the system is easy: Reference data from each zone is obtained to train the lookup table. Highly trained rule designers are not required.
  • the lookup table may be used to report zones that are difficult to distinguish. Further, reference data may be collected for the zones, the zones may be eliminated or merged, or more antennas may be added for finer discrimination between the zones. • It is easy to fix questionable zones. If we determine that the lookup table performs poorly in distinguishing between certain zones, it is a simple matter to collect more reference data for the questionable zones and retrain the table. If it is at all possible to differentiate between the two zones, the lookup table will be able to do so, given enough reference data.
  • the lookup table can be designed so that it not only decides which zone a tag is in, but also provides a confidence estimate for that decision.
  • the error profile can be adjusted.
  • the lookup table can be designed to value certain kinds of errors more than other kinds. For example, if an alarm is triggered whenever a tag enters Office-Zone, the asset location system using a lookup table can be designed to report that a tag is in Office-Zone only when there is a certain level of confidence that the tag actually is in Office- Zone.
  • Reference data may be collected for each zone as discussed above.
  • the zones may be defined before and/or after reference data is collected.
  • One way to do this may be to store the conditional density estimates for each value of x (where x is a vector representing a set of antenna readings (e.g., distance readings from each antenna for a single read of a single tag)). Then each time a decision needs to be made, the conditional densities can be evaluated for each new reading and the decision rule can be applied to the results.
  • a better way to do this may be to apply the decision rule to all recorded values of x and record the results in a lookup table. Then, when a new reading is presented, we can just look up the corresponding decision in the table.
  • determining the conditional probability densities for a specific application need not be difficult.
  • the probability distribution of antenna readings is to be determined for each zone.
  • An antenna reading thus consists of a vector x consisting of m values representing the distances from each antenna. (In practice, readings from all m antennas may not be available. Getting readings from two or three antennas is more typical.)
  • the probability distributions for each zone may be represented as n functions
  • p(x I H, ) may correspond to the probability density for antenna readings when the tag 2 is in zone A. If the tag 2 is moved around zone A and reference data from the antennas 1 is recorded, an estimate of the probability density function, p(x
  • the histogram may provide a suitable approach for estimating the probability densities for zones in an asset location system. For example, suppose that a tag 2 is moved around zone A and reference data is collected for antenna la to generate the reference data in Table 2:
  • a histogram may be generated by dividing the number of reads at each distance by the total number of reads and plotting the result versus distance. The resulting histogram is shown in Fig. 14.
  • a histogram may be a simple and effective method for producing density estimates. If the data from the antennas is presented in a discrete form, then a histogram may provide a good estimator. However, if the data is presented in a continuous form, it may be appropriate to use the more sophisticated methods of estimating a probability density.
  • the histogram may provide an attractive approach for generating probability densities, in practice there may be some cases that require a more sophisticated approach.
  • PNN Probabilistic Neural Networks
  • a PNN is a particular form of neural network that has an input layer, a radial (hidden) layer, and an output layer.
  • a fourth layer in the form of a cost matrix can also be added to weight the outputs.
  • PNNs are often used to classify new data based on patterns that are discerned from training examples.
  • GRNN General Regression Neural Network
  • the radial units (neurons) correspond to the training cases. There is one output unit per class, and there are connections between each class and its associated neurons.
  • neurons When new data is presented as input, neurons are activated in the radial layer based on the similarity of the new data to the training cases.
  • the output units add up the activations of the neurons belonging to their own class and calculate approximate probability densities for each class. When normalized, these calculations provide estimates of the probability that new data belongs to a particular class. In this case, a PNN may calculate the probability that a new set of tag readings belongs to a particular zone.
  • This approach offers several advantages over the feed-forward network approach.
  • One is training speed; training is nearly instantaneous and consists mainly of copying cases into the PNN.
  • One is the size of the network. Because it contains all of the training cases, a PNN can potentially be very large, requiring a considerable amount of storage.
  • a related problem involves the speed of output. The large size of PNNs slows the speed of processing new data through the network and obtaining output.
  • One suitable approach maintains the simplicity and ease of training of a PNN and calculates probability estimates in a similar way while decreasing the size and access time required of a PNN.
  • Fig. 15 shows an example of what the probability functions p(x
  • a Bayes Optimal Estimator may be constructed to make tag location determinations. "Optimal” in this sense refers to minimizing the expected value of a cost function that represents how costly various errors are. Assume that c ⁇ is the cost for choosing zone when the correct zone is zoney. Then the Bayes Optimal Estimator minimizes: m
  • prior probabilities are not available or do not exist in a meaningful way. For example, suppose that someone who is carrying a tag wishes to hide. Obviously, this individual will want to be in a place where others can not find her, so it is unlikely that she will go to a location where she is expected to be found, i.e., with a high prior probability. In this case, a meaningful prior probability does not exist.
  • Neyman-Pearson estimation may be used. With Neyman-Pearson estimation, an estimator that minimizes certain types of errors based on constraints on other types of errors may be determined.
  • an estimator may be determined that minimizes the probability of making an error when the tag is in Hall-Zone, subject to the constraint that the probability of making an error when the tag is in Office-Zone can be no more than 0.1%.
  • This type of estimator may be quite useful if, for example, an alarm is triggered whenever a tag enters Hall-Zone and a false alarm probability of more than 0.1% cannot be tolerated.
  • ML maximum likelihood
  • the maximum likelihood rule corresponding to the probability density functions in Fig. 15 may correspond to choosing zone A when the reading is less than 10 and zone B when the reading is 10 or greater.
  • the probability estimates can also be used to calculate a confidence level for a given decision.
  • Equation 33 Equation 33 becomes
  • Fig. 15 illustrates the probability distribution functions for the two zones.
  • a threshold for a decision may be set such that zone A would always be chosen, unless the probability estimate for choosing zone B exceeds .9.
  • zone A would be chosen unless a distance reading of 12 or greater was obtained.
  • Confidence estimates can be quite useful in a number of applications, such as reporting the confidence level of a particular location estimate or alarm event.
  • One of the most obvious applications is to use the confidence levels when deciding under what circumstances to trigger alarms. For example, suppose an alarm is set to go off when a tag enters zone B. If the probability densities were the same as those shown in Fig. 15, then it may not be appropriate to trigger an alarm in response to a distance reading of 10 from antenna la. Although the ML rule may assign the tag to zone B, the confidence level of this decision is just over 50% (assuming equal prior probabilities). In some applications, it may make more sense to trigger the alarm only when the confidence level rises above a certain threshold.
  • Another use for confidence levels is to stabilize tag location determinations over time. For example, suppose that in a period of four seconds readings of 7, 9, 10, and 8 are obtained from an antenna 1. If the maximum likelihood rule is used to determine the location of the tag, the tag would be assigned to zones A, A, B, and A for each reading, respectively. However, when zone B is chosen based on the reading of 10, the confidence for this choice is near 50%, while the confidence for the other choices is much higher. This could indicate that the tag was always in zone A, even when the distance reading of 10 was obtained.
  • a number of approaches can be designed to take advantage of the confidence level in making this kind of deduction. One such approach is to ignore all decisions that have a confidence level lower than a certain threshold.
  • Another approach may be to look at the last N readings and choose the decision with the highest average confidence level.
  • a different use for confidence levels may be to use them to decide whether a particular zone configuration even makes sense. For example, an installer might try to set up a system with zones that are too close together to be distinguished. This could result in a system where some zones are never chosen because the confidence level associated with these zones never rises above a certain threshold.
  • a "Zone Checker" application may be designed to examine the data and draw attention to all zones with inadequate reference data to support a confidence level above a given threshold. This application could also calculate the average confidence level for decisions pertaining to each zone and report all zones with a low average confidence level. The application may pay particular attention to alarmed zones, since it may be desired to trigger alarms promptly, but accurately. Different thresholds may be set for alarmed and non-alarmed zones.
  • a confidence value table may also be maintained.
  • maintaining the confidence values requires extra storage, and thus including the confidence table may be optional.
  • the lookup table may be built using tag reference data and other suitable information, such as probability densities generated from the reference data.
  • x represents a reading where a first antenna la reads 12, a second antenna lb reads 60, and a third antenna lc reads 36.
  • the goal in this illustrative embodiment is to build a location system L(») that takes tracking readings as input and returns a location and a confidence level as output. For example, we may want to be able to call
  • a hash table is a table that maps a given item to another item. The entries in a hash table associate a particular key with a particular value (one value per key).
  • One function of a hash table is to find the value that is associated with a given key. Finding the value requires very little time, even if there are many entries; this is an important advantage of hash tables over a very large array as described above.
  • the format for a key may be:
  • the key ⁇ ant-id>, ⁇ dist>, ⁇ ant-id>, ⁇ dist>, ⁇ ant-id>, ⁇ dist>, ⁇ num> (36) where "ant-id” represents an antenna ID, "dist” represents the distance reading for that antenna, and “num” represents the number of antenna readings for the key. If there are at most 255 antennas and 255 possible distance values, then the key may be represented as seven bytes.
  • the Standard Template Library offers a generic hash table implementation via the hash-map object.
  • the Standard Template Library is a C++ library that provides a set of C++ container classes and generic algorithms for common type of data manipulations.
  • the Microsoft Visual C/C++ compiler does not implement the hash-map object. Consequently, a hash table may be created that functions similarly to the hash-map object in the Standard Template Library to allow the code to work both on LINUX and Windows.
  • the hash table object may be an array- based quadratic probing implementation. It should be understood that although specific details regarding the key format, hash table implementation and so on are described, other suitable approaches may be used for the lookup table.
  • An estimate of P (x) may be made by multiplying each sample of the reference data collected while a tag is in the zone by a "potential function" g (x) and taking the weighted average of the samples. If we represent the m reference data points recorded from zone A as
  • a tag location may be determined using the ML rule by choosing the zone that has the highest probability for that reading. Thus for a reading x , choose zonej as the location for that tag if and only if
  • This method of estimation may be simple, fast, and reasonably accurate provided enough reference data is collected. However, when small amounts of reference data are collected, using a different potential function g(x) may populate the table more thoroughly and may yield better results.
  • the extrapolation may be performed in the following way.
  • the antenna reading (a, b, c) is received, and that it has already been sorted for entry into the table such that a ⁇ b ⁇ c.
  • we want to compute the potential of the reading (a', b', c') (a, b, c) + (x, y, z).
  • the potential may be determined as
  • g (a', b', c') (a, b, c) + (0, 0, 0) has a potential of one, since this data point corresponds to an actual reading.
  • the potentials for all other data points will be less than one because they are extrapolations.
  • the factors of 16, 8, and 1 in front of x 2 , y 2 , and z 2 are arbitrarily chosen to weight the importance of the shorter antenna readings more than longer antenna readings. Since the shorter antennas may be deemed more reliable, extrapolation by changing the reading for a short antenna distance is considered a larger extrapolation than changing the reading for a longer antenna distance reading.
  • the value cr 2 is a shape parameter that determines the width of the Gaussian potential.
  • antenna lb 12 feet
  • first reference data is collected, e.g., by walking a tag around each zone.
  • the working table may be converted to the final lookup table by going through each key, x , in the working table, choosing the i that maximizes P. (x) , and storing that for the key x in the final working table.
  • the confidence estimates for the zone choices may also be stored. Bayes' theorem may be used, assuming equal prior probabilities, to compute the confidence level in choosing the i that maximizes P, (x) :
  • the lookup table may report that reading x corresponds to zone A even when the tag is not actually in zone A.
  • the confidence levels can be used to distinguish whether a reading indicates that the tag is in zone A with high probability or whether the system does not have a good idea of where the tag is, but is making its best guess.
  • maintaining the confidence levels requires extra storage, and thus the user may be provided with an option of whether or not to include the confidence table.
  • a tag location system using a lookup table may also filter antenna readings and/or preliminary tag location estimates before they are used to finally determine or report a tag's location. For example, a system may use prior probabilities to filter TAD data before a location estimate is reported. Filtering may increase the accuracy of location estimates, as discussed above. A simple way of filtering the location estimates may be to choose prior probabilities that the system can apply to tag behavior. If we know, for example, how a tagged object is likely to behave, prior probabilities of the likelihood of certain events can be set. For instance, suppose that a seldom used storage closet is positioned next to a room.
  • the system might have difficulty distinguishing whether the individual is in the room or the closet. If we know ahead of time, however, that personnel do not need to visit the storage closet very often, we can set the prior probability for the closet to be very low. Thus, when the system sees a reading indicating that the tagged individual is in either the room or the closet, the system can use prior probabilities to locate the individual in the room, rather than in the closet.
  • a more complex method uses transitional probabilities to filter antenna readings; that is, the probabilities that a tagged asset will move to a given zone at time T given that the tagged asset was in zone i at time T-l .
  • Other sorts of transitional probabilities may be created. Assume a configuration with four zones in which zones A, B, and C are near each other and zone D is relatively distant. In this case, when a tagged object is in zone A, it might be possible for the object to move to zones B and C, but it is highly unlikely to go to zone D (at least within a relatively short time period).
  • the probability that the tag is in each zone may be determined.
  • the probabilities that the tag could have gone from being in zone k last time to zone/ this time are summed, based on the transitional probabilities and the current antenna readings.
  • the transitional probabilities may be used to filter the data in a similar way to using prior probabilities, because these probabilities indicate how likely it is that a tagged asset has moved from a given zone to every other zone. For example, the system may only report that a tagged asset has moved from one zone to another if the probability of that event is above a certain threshold.
  • One advantage of this approach is that at each time the probability of error in the location estimate is minimized by using the history of the movement of the tagged object.
  • the amount of memory needed and the total computation needed per tag at each time step may be proportional to the number of zones.
  • This process only depends on the prior probabilities at the start. After that, it only depends on the transitional probabilities and the antenna readings. Thus, even if prior probabilities are not available, transitional probabilities may still be used. Consequently, this approach does not rely on the user being able to choose reasonable prior probabilities at the outset. It should be understood that different data intervals can be used with the lookup table.
  • the table may contain many readings that represent tag locations that are physically close together, and/or fewer readings that cover a facility less densely. How fine-grained the table is made may depend on the needs of the user and the storage capabilities of the system. For example, a table including readings every twenty feet may cover an entire facility while using very little storage space, but such a table would not be very accurate, since it may need to do much extrapolation. Instead, the table may be constructed with six-foot intervals. This may require more storage space for the table, but would provide greater accuracy.
  • a variable interval may be used for the table. For example, a twenty-foot interval might be sufficient for covering most of a facility, but a shorter interval may be used in certain areas, such as near zone boundaries, or where high accuracy is needed to prevent false alarms.
  • One way of doing this is to populate the table with data at twenty-foot intervals and then collect more fine-grained data to populate the table for areas requiring higher accuracy.
  • Another way of doing this is to collect fine-grained data throughout the facility and use it to populate the table. The system can then consolidate table entries that are close together and give essentially the same result.
  • the lookup table may also be constructed such that tags are only located (or a location reported) when the tags are in certain discontinuous zones. For example, a user may desire only to know when assets have reached certain discontinuous points in a processing system, such as an assembly line. Thus, the lookup table need only be populated with data so that tags can be located within each zone, but not at points between zones. The zones need not be very large, since the zones may be physically separated by relatively large distances so that the asset location system has no difficulty distinguishing between them. Test Results The inventors have built and tested a prototype of an asset location system.
  • Table 5 shows the results of the various location approaches.
  • the first column indicates the location method used.
  • the second column indicates the confidence threshold required when using the lookup table. Readings with confidence levels lower than the threshold were discarded.
  • the third column indicates the percentage of erroneous responses.
  • the final column indicates the percent of readings that were found in the lookup table.
  • the third row in Table 5 has a confidence threshold of 0.5, 19.50% errors, and 92.98% of readings for which a zone was determined. This indicates that the system considered only those readings for which zones could be determined with a confidence level of at least 0.5. Of these determinations, 19.50% were in error. Roughly 93% of the readings were answered. The other 7% were either not found in the lookup table or had a confidence level below 0.5 and thus were ignored.
  • the manually designed Boolean rules were in error approximately 36% of the time.
  • the lookup table location method achieved an error rate of about 25%.
  • the lookup table system failed to classify only 0.29% of the readings. This indicates that the lookup table method may be considerably more accurate than the Boolean rule-based system.
  • the accuracy of the lookup table-based system may be improved with further modification.
  • additional reference data may be collected for those zones, thus potentially increasing the accuracy of the system. For example, suppose that when the tag is in zone A, 20% of the time our system classifies the tag as being in zone B. This indicates that there may not be enough reference data in the lookup table to distinguish accurately whether a tag is in zone A or zone B. This problem may be fixed by collecting additional reference data for zones A and B, or possibly by adding more antennas to differentiate between these zones.
  • a lookup table approach might not be feasible, in which case a feed-forward network may be used.
  • a relevant variable e.g., a signal used to determine a tag-antenna distance
  • a lookup table approach might have difficulty storing the necessary data, whereas a neural network may not suffer from this limitation.
  • filtering techniques there are a number of filtering techniques that can be used to improve the quality of location estimates. Many of these techniques may also be used with the lookup table approach.
  • tracking data may be smoothed before filtering, or as a part of filtering.
  • the asset location system may not report a change in location until N consecutive antenna readings suggest the same location change, or until the majority of the last N readings suggest the same location change.
  • the system may not report a new location until a tag has been seen in that location for Tlength of time, or if the new reading causes an undefined location.
  • the tracking data may also be filtered using prior probabilities as discussed above.
  • the system can use prior probabilities to set a level of "stickiness" for the zones, which may be similar to the use of sticky rules described earlier. For example, it may be specified that a certain tag will almost never be in a certain zone. One simple way of doing this would be to choose prior probabilities that the system can apply to tag behavior. For instance, if we expect that a tagged employee almost never enters a certain area, that event will have a low prior probability. Thus, the system may not often report that the employee has entered that area.
  • a more complex method utilizes transitional probabilities; that is, the probabilities that a tagged object will move to a given zone at time T given that the tagged object was in zone at time T-l .
  • This method accounts for both the current reading and prior history. Recall that transitional probabilities may be determined by considering the probability that the tagged object could have gone from being in zone k last time to zoney this time, based on the current antenna readings and the tagged object's behavior up until now.
  • the two aforementioned methods may take advantage of any knowledge about how tagged assets behave.
  • a confidence level threshold for example, 80%
  • the system may not report a determined location if the confidence level for that decision is less than 80%.
  • the Boolean filtering techniques may be modified to take advantage of confidence levels. For example, the system may not report a change in location unless the previous N readings suggest the same change in location with confidence greater than a threshold. This type of filtering may assure that the system will report only those decisions in which it has substantial confidence and will ignore unreliable readings.
  • Confidence levels can also be used to limit zone instability.
  • One simple method would be to set a confidence threshold of C and instruct the system only to change the estimated location when readings with confidence greater than C are received. This could potentially limit zone instability for the following reason. Even if the tag were on a boundary, readings with high confidence are usually correct. If the erroneous readings have a confidence level less than C, then they will be ignored. Since the system may ignore the low confidence readings that are causing zone instability, the location estimates may be more stable.
  • Another method may be to use confidence levels to filter over time.
  • One way of doing this is to allow the user to set a window of readings N, and a confidence threshold C. Whenever a reading with confidence level greater than C is received, the system will use that reading to estimate the tag location. However, if the reading has a confidence level less than C, then the reading with the highest confidence out of the last N readings may be used instead. This "best of N" system may filter out random readings with low confidence estimates.
  • confidence levels could be used to decide when alerts or alarms are triggered. For example, alarms may be triggered only when the confidence level for a decision reaches a certain threshold, e.g., 90%. Another option is to report only those tag location decisions associated with a confidence level above 70%, and in addition only trigger alarm conditions when the confidence level rises above 90%.
  • a certain threshold e.g. 90%.
  • Another option is to report only those tag location decisions associated with a confidence level above 70%, and in addition only trigger alarm conditions when the confidence level rises above 90%.
  • a facility has someone monitoring the location of objects in real-time. If the monitor notices that the system has reported a location change, he or she might direct someone to investigate an area where an alarm has not yet been triggered, but where readings suggest unauthorized activity may be occurring.
  • Another way to decrease the likelihood of false alarms using confidence levels may be to specify that the system should trigger an alarm only once for a given event.
  • a relatively low threshold to trigger an alarm may be set initially, so that immediate notice of any potentially unauthorized activity may be received.
  • the system may only trigger another alarm after a given period of time. For instance, suppose that a tagged individual is lurking about near the entrance to a restricted-access room. Setting a low confidence threshold would allow the system to trigger an alarm, thus quickly alerting a user of a potential problem.
  • the system may only be permitted to trigger an alarm once for a given area within a five minute time period. Thus, if zone instability causes the system to report multiple changes in location for the individual, who is near a zone boundary, the system will not repeatedly trigger an alarm for every detected location change.
  • Still another way to decrease the likelihood of false alarms using confidence levels may be to set two different confidence thresholds, C ⁇ and C 2 .
  • a relatively low confidence threshold C- may be set to place a tagged object within a location at the outset.
  • a higher confidence threshold C 2 may be set to allow the system to report that the tag has moved from one zone to another. This method may decrease both zone instability and false alarms, but may not constrain the system by requiring a high level of confidence for the first location of a tagged asset.
  • Tag location estimates with a confidence level greater than C ⁇ may be used to track real-time movement, while estimates with a confidence level greater than C may be collected in a database. For the real-time data, greater immediacy of response may be desired, and thus a lower confidence threshold; for the database, more reliable information over time may be desired, and thus a higher confidence threshold.
  • a history of the general locations of tagged objects may be stored in a database without filling up the database with potentially meaningless data. At the same time, tagged objects may be tracked in real-time and alarms may be triggered as necessary with greater immediacy.
  • Table 5 shows some of the possible advantages of using a lookup table with a confidence threshold. For example, when a confidence threshold of 0.55 was used, the lookup table process achieved an error rate of half that of the Boolean system. A confidence threshold of 0.55 resulted in only 10% of the readings being ignored. In practice, this may result in an occasional slight delay before the system realizes that a tag has changed position, while yielding better accuracy.
  • a system may be configured to sound an alarm if an individual is within zone C.
  • the system may trigger an alarm.
  • whether the system should sound an alarm in this situation may depend on the prior history of the individual's movement. For example, if the individual was most recently determined to be in zone D and is now determined to be at the border between zones B and C, it is likely that the individual must have moved through zone C, and thus the system should trigger an alarm.
  • the system may not trigger an alarm when the individual is determined to be at the border of zones B and C. Instead, the system may wait until a confidence level for the individual's location in zone C is higher before sounding an alarm.
  • the system may be configured to account for prior history so that it can decide more intelligently whether an alarm should be triggered.
  • an alarm may be triggered if a tagged asset is in an alarmed zone now and was last seen in a zone from a different parent. For example, if the ninth floor of a building is restricted, and a tagged individual was last seen on the eighth floor, but is now seen on the ninth floor, the system may trigger an alarm.
  • the system may trigger an alarm if a tagged asset was last determined to have been in an alarmed zone, but is now seen in a zone from a different parent. For example, if a tagged baby was last seen in the fourth-floor maternity ward of a hospital, which is alarmed, and the baby is now seen on the ground floor, the system may trigger an alarm. However, if the baby was last seen in one room within the maternity ward and is now seen in a different room on the same floor, we might instruct the system not to trigger an alarm, since the baby has not yet left the maternity ward. This parent-based examination of past tag movement history provides another way to lessen the likelihood of false alarms.
  • a lookup table might be especially useful in certain situations. If tags are to be located in a limited number of positions, auto zone lookup tables may work particularly well. For example, a tagged asset may need to be located when it has reached certain points on an assembly line in a plant. If so, a large amount of reference data may be collected from those locations. If the locations were non-contiguous, the system may not have data to identify the location of tags positioned between locations. So, even if the plant were very large, the lookup table need not be very big, and since the locations at which tags are to be identified are non-contiguous it is unlikely that the system would confuse one location with another.
  • the type of system that is used to determine tag location may depend on the setting and needs of the user. For example, in a hospital setting, it may be relatively easy to set up logical zones for a zone-based system. Various rooms and hallways are naturally modeled using zones, and useful information can be obtained in knowing that tagged objects, such as crash carts, wheelchairs, and patients, are in the zone representing room 102, for example, or the east end of the hallway on the eighth floor. However, not all facilities are easy to model using a zone-based system. Users in manufacturing facilities without well-defined stations for various processes might find it more useful to locate objects by triangulation. In such cases, it may be easier to determine where a product is in the manufacturing process by pinpointing its location in a facility with X-Y coordinates, rather than by setting arbitrarily-defined zones.
  • a system may be set up to report the location of a tagged object using X-Y coordinates, a Boolean-rule-defined zone, and a lookup-table-defined zone. That is, the system can use triangulation to estimate an object's X-Y coordinates in a grid representing a facility. It can then report a zone estimated by applying Boolean rules to TAD data. It can finally use the lookup table to report an estimated location (as well as a confidence level for that decision, if desired). The user can instruct the system as to the order of priority location estimates determined by each of the methods.
  • a user might indicate that the system should report a zone using the lookup table first, and then narrow the location further using triangulation.
  • the user might also specify that the system should only report decisions from the lookup table if the confidence level for those decisions exceeds 70%.
  • the system can be instructed to use Boolean rules to return a location.
  • the system can be further instructed to check the most recent location first when using Boolean rules in order to increase reliability further.
  • Boolean rules or a lookup table-based system can first be used to constrain the general location of a tagged object. Then, triangulation can be used to estimate a more precise location for the object. Since triangulation may produce multiple location estimates for each set of readings, Boolean rules or a lookup table can tell us beforehand which of the estimates is likely to produce the correct location. An example of this can be seen in Fig. 16. In this situation, Boolean rules or a lookup table have been used to determine in which zone a tagged object is likely to be located, e.g., the top left quadrant. Triangulation has produced two estimates for the possible location of the object (A and B), but only one of those estimates falls within the estimated zone. Thus, the object is more likely to be in location A than location B.
  • FIG. 17 shows a large parking lot such as might be used for tractor-trailers.
  • Fig. 17 shows a large parking lot such as might be used for tractor-trailers.
  • a large parking lot such as might be used for tractor-trailers.
  • the rules shown in Fig. 17 can limit the possible location of the truck to a particular parking space, or tell us that the truck is not yet parked in a space.
  • zone-based location methods e.g., such as those that may be used with PinPoint Corporation's 3D- z ' D product
  • similar methods can be used with other Real Time Locating Systems (RTLS).
  • RTLS Real Time Locating Systems
  • One example of an RTLS with which zone-based location methods can be used is a system using signal strength to determine location, such as the PalTrack system created by Sovereign Tracking Systems.
  • Signal strength systems tags send out signals periodically, and the system analyzes the strength of the received signal to determine distance from an antenna. Multiple distance readings taken together can be used to estimate the location of a tag.
  • the methods described herein can nonetheless be applied.
  • signal strength reference data may be used.
  • the temporary working table may contain estimates of the likelihood of obtaining particular signal strength readings from particular antennas when the tag in each zone. Then, a final lookup table can be constructed that associates particular signal strength readings with particular zones.
  • WhereNet Another type of system with which these methods can be used is the system developed by WhereNet. With this type of system, tags send out signals periodically, and they arrive at different antennas at different times. The system uses the difference between the arrival times to estimate the location of a tag. Although this approach is different from that used with the 3D- D system, the methods discussed above can still be applied.
  • time difference of arrival data may be used.
  • the temporary working table may contain estimates of the likelihood of obtaining particular time difference combinations from particular sets of antennas when in each zone. Then, a final lookup table can be constructed that associates particular time difference combinations with particular zones.
  • zone-based location systems can be used to improve the accuracy of location estimates not only with systems like the 3D-/D system, but also with a variety of other Real Time Locating Systems.
  • Various aspects of the invention can also be applied to ultrasonic motion/position tracking systems.
  • Such systems send ultrasonic signals from transmitters to receivers and calculate the distance between a transmitter and a receiver using time of flight (TOF) data.
  • TOF time of flight
  • These systems can have a very high resolution, locating objects to within several inches or less.
  • a lookup table can be populated with TOF data rather than TAD data.
  • a temporary working table may contain estimates of the likelihood of obtaining particular TOF readings from particular receivers when a tag is in each zone. Both the measurement intervals and the zones themselves may be small (on the order of inches, or even smaller as the system resolution permits and as required by the user).
  • a final lookup table can be constructed that associates particular TOF readings with particular zones.
  • a receiver is attached to the asset to be tracked, while the transmitter is part of an infrastructure.
  • This is essentially the opposite of systems such as the 3D- D system or that shown in Fig. 8, in which a transmitter is part of the tag and the receiver is part of the infrastructure. Nonetheless, aspects of the invention may still be applied with these "reversed" systems.
  • the temporary working table would contain estimates of the likelihood of obtaining particular TOF readings from particular receivers when in each zone. Then, as with the 3D- D system, a final lookup table can be constructed that associates particular TOF readings with particular zones.
PCT/US2000/023459 1999-08-25 2000-08-25 Method and apparatus for locating mobile tags WO2001015070A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU69402/00A AU6940200A (en) 1999-08-25 2000-08-25 Method and apparatus for locating mobile tags

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15057599P 1999-08-25 1999-08-25
US60/150,575 1999-08-25

Publications (2)

Publication Number Publication Date
WO2001015070A2 true WO2001015070A2 (en) 2001-03-01
WO2001015070A3 WO2001015070A3 (en) 2002-01-17

Family

ID=22535143

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/023459 WO2001015070A2 (en) 1999-08-25 2000-08-25 Method and apparatus for locating mobile tags

Country Status (3)

Country Link
US (1) US6456239B1 (US06456239-20020924-M00019.png)
AU (1) AU6940200A (US06456239-20020924-M00019.png)
WO (1) WO2001015070A2 (US06456239-20020924-M00019.png)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002080086A1 (en) * 2001-03-31 2002-10-10 Koninklijke Philips Electronics N.V. Machine readable label reader system with versatile default mode
US6529164B1 (en) 2000-03-31 2003-03-04 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
WO2003060545A2 (en) * 2002-01-09 2003-07-24 M/A-Com, Inc. Method and apparatus for determining location of objects based on range reading from mulitiple sensors
EP1394719A1 (fr) * 2002-09-02 2004-03-03 EM Microelectronic-Marin SA Ajustement des paramètres de détection, d'émission et/ou de réception d'un lecteur RFID en fonction du bruit électromagnétique ambiant
US6958677B1 (en) 2000-03-31 2005-10-25 Ge Medical Systems Information Technologies, Inc. Object location monitoring system
US7030811B2 (en) 2000-11-14 2006-04-18 Symbol Technologies, Inc. Methods and apparatus for identifying asset location in communication networks
US7038584B2 (en) * 2000-03-31 2006-05-02 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
WO2009062956A2 (en) * 2007-11-13 2009-05-22 Universitetet I Oslo Ultrasound zone location system with high capacity
DE102009056642A1 (de) * 2009-12-02 2011-06-09 Eads Deutschland Gmbh RFID System, damit durchführbares Verfahren zur Bestimmung von Position und/oder Bewegung eines RFID-Etiketts und Zugangsüberwachungssystem
US8190730B2 (en) 2001-03-09 2012-05-29 Consortium P, Inc. Location system and methods
WO2013077961A1 (en) * 2011-11-22 2013-05-30 Motorola Solutions, Inc. Method and apparatus for determining a location of an item attached to a radio frequency identification tag
US8842013B2 (en) 2002-07-09 2014-09-23 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people

Families Citing this family (134)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6496806B1 (en) * 1999-12-16 2002-12-17 Samsys Technologies Inc. Method and system for tracking clustered items
US20020008621A1 (en) * 2000-01-06 2002-01-24 Isogon Corporation Method and system for determining the inventory and location of assets
US6552661B1 (en) 2000-08-25 2003-04-22 Rf Code, Inc. Zone based radio frequency identification
US7588185B2 (en) * 2001-06-07 2009-09-15 3M Innovative Properties Company RFID data collection and use
US20020190862A1 (en) * 2001-06-15 2002-12-19 3M Innovative Properties Company Methods of managing the transfer, use, and importation of data
JP2005525003A (ja) * 2001-09-05 2005-08-18 ニューベリイ ネットワークス,インコーポレーテッド 無線ネットワークにおける位置検出および場所追跡
US7099796B2 (en) * 2001-10-22 2006-08-29 Honeywell International Inc. Multi-sensor information fusion technique
US7538715B2 (en) * 2004-10-04 2009-05-26 Q-Track Corporation Electromagnetic location and display system and method
US7414571B2 (en) * 2002-08-19 2008-08-19 Q-Track Corporation Low frequency asset tag tracking system and method
US7298314B2 (en) * 2002-08-19 2007-11-20 Q-Track Corporation Near field electromagnetic positioning system and method
US8018383B1 (en) 2010-06-08 2011-09-13 Q-Track Corporation Method and apparatus for determining location using signals-of-opportunity
US9285453B2 (en) 2002-08-19 2016-03-15 Q-Track Corporation Method of near-field electromagnetic ranging and location
US7002472B2 (en) * 2002-09-04 2006-02-21 Northrop Grumman Corporation Smart and secure container
JP2004132890A (ja) * 2002-10-11 2004-04-30 Fujitsu Component Ltd 非接触icカードリーダ/ライタ装置、非接触icカード、入力装置、及び非接触icカードの位置算出方法
US6822551B2 (en) * 2002-11-14 2004-11-23 General Hydrogen Corporation System for communication with a vehicle in close proximity to a fixed service port
WO2004072879A1 (en) * 2003-02-14 2004-08-26 Philips Intellectual Property & Standards Gmbh Method of managing stocks of articles
JP4062519B2 (ja) * 2003-02-25 2008-03-19 株式会社エヌ・ティ・ティ・ドコモ タググルーピングシステム、タググルーピング方法
JP4019986B2 (ja) * 2003-03-20 2007-12-12 セイコーエプソン株式会社 非接触データ通信システム、位置情報管理システム、データ通信装置及びデータ通信装置制御プログラム
JP2004357216A (ja) * 2003-05-30 2004-12-16 Toshiba Corp 位置探索システム及び位置探索方法
US6919802B2 (en) * 2003-07-08 2005-07-19 Rf Saw Components, Inc. Multi-layer method of accommodating code collisions from multiple surface acoustic wave identification tags
US20050010663A1 (en) * 2003-07-11 2005-01-13 Tatman Lance A. Systems and methods for physical location self-awareness in network connected devices
US7346359B2 (en) * 2003-07-31 2008-03-18 Pango Networks, Inc. Method for RF fingerprinting
US20070080801A1 (en) * 2003-10-16 2007-04-12 Weismiller Matthew W Universal communications, monitoring, tracking, and control system for a healthcare facility
US20050105600A1 (en) * 2003-11-14 2005-05-19 Okulus Networks Inc. System and method for location tracking using wireless networks
US7420458B1 (en) 2004-01-20 2008-09-02 Charles A. Eldering Secondary card reader
US7298264B1 (en) 2004-01-20 2007-11-20 Charles A. Eldering RFID tag filtering and monitoring
WO2005079122A1 (en) * 2004-02-11 2005-08-25 Cstar Technologies Inc. Method and apparatus for cataloguing and poling movement in an environment for purposes of tracking and/or containment of infectious diseases
US7948381B2 (en) 2004-04-30 2011-05-24 Binforma Group Limited Liability Company Reversibly deactivating a radio frequency identification data tag
US7336183B2 (en) * 2004-04-30 2008-02-26 Kimberly-Clark Worldwide, Inc. Decommissioning an electronic data tag
US7151455B2 (en) * 2004-04-30 2006-12-19 Kimberly-Clark Worldwide, Inc. Activating a data tag by load or orientation or user control
US7098794B2 (en) * 2004-04-30 2006-08-29 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
EP1749347B1 (en) * 2004-05-27 2012-08-15 Tag Safety Systems, Inc. Method of and system for determining the delay of digital signals
WO2006014532A2 (en) * 2004-07-07 2006-02-09 Rosita Yap File indexing and retrieval system employing rfid visual indicators
US7489242B2 (en) * 2004-07-13 2009-02-10 Tony Hines RFID multiple range method and system
US7116230B2 (en) * 2004-07-14 2006-10-03 Verichip Corporation Asset location system
US8570156B2 (en) 2010-09-01 2013-10-29 Quake Global, Inc. Pluggable small form-factor UHF RFID reader
US7839289B2 (en) * 2004-08-26 2010-11-23 Avante International Technology, Inc. Object monitoring, locating, and tracking system and method employing RFID devices
US8174383B1 (en) 2004-08-26 2012-05-08 Avante International Technology, Inc. System and method for operating a synchronized wireless network
US7319397B2 (en) * 2004-08-26 2008-01-15 Avante International Technology, Inc. RFID device for object monitoring, locating, and tracking
US7342497B2 (en) * 2004-08-26 2008-03-11 Avante International Technology, Inc Object monitoring, locating, and tracking system employing RFID devices
US7423535B2 (en) * 2004-08-26 2008-09-09 Avante International Technology, Inc. Object monitoring, locating, and tracking method employing RFID devices
US7365645B2 (en) * 2005-01-26 2008-04-29 Rf Technologies, Inc. Mobile locator system and method with wander management
US20060208893A1 (en) * 2005-02-28 2006-09-21 Anson Gary S Weight audit methods and systems utilizing data reader
US7199715B2 (en) * 2005-03-01 2007-04-03 Kimberly-Clark Worldwide, Inc. System and method for tracking ID tags using a data structure of tag reads
US7529925B2 (en) 2005-03-15 2009-05-05 Trapeze Networks, Inc. System and method for distributing keys in a wireless network
US7583178B2 (en) * 2005-03-16 2009-09-01 Datalogic Mobile, Inc. System and method for RFID reader operation
JP2006319710A (ja) * 2005-05-13 2006-11-24 Brother Ind Ltd 無線タグ通信システム
US7401061B2 (en) * 2005-06-14 2008-07-15 Lehman Brothers Inc. Attribute engine
US7411508B2 (en) * 2005-06-17 2008-08-12 Perkinemer Las, Inc. Methods and systems for locating and identifying labware using radio-frequency identification tags
US20070060098A1 (en) * 2005-08-03 2007-03-15 Innerwireless Radio frequency location determination system and method with wireless mesh sensor networks
US7375634B2 (en) * 2005-08-08 2008-05-20 Xerox Corporation Direction signage system
US7394358B2 (en) * 2005-09-19 2008-07-01 Datalogic Scanning, Inc. Method and system for inventory monitoring
US7573859B2 (en) 2005-10-13 2009-08-11 Trapeze Networks, Inc. System and method for remote monitoring in a wireless network
US8638762B2 (en) 2005-10-13 2014-01-28 Trapeze Networks, Inc. System and method for network integrity
WO2007044986A2 (en) 2005-10-13 2007-04-19 Trapeze Networks, Inc. System and method for remote monitoring in a wireless network
US7724703B2 (en) 2005-10-13 2010-05-25 Belden, Inc. System and method for wireless network monitoring
WO2007064747A1 (en) * 2005-11-29 2007-06-07 Pango Networks Methods and apparatus for active radio frequency identification tags
US20070129983A1 (en) * 2005-12-01 2007-06-07 Siemens Medical Solutions Health Services Corporation Task and Workflow Management System for Healthcare and other Applications
US20070290924A1 (en) * 2005-12-14 2007-12-20 Innerwireless, Inc. Wireless resource monitoring system and method
US7558266B2 (en) 2006-05-03 2009-07-07 Trapeze Networks, Inc. System and method for restricting network access using forwarding databases
US8966018B2 (en) 2006-05-19 2015-02-24 Trapeze Networks, Inc. Automated network device configuration and network deployment
US8630308B2 (en) * 2006-05-31 2014-01-14 The Trustees Of Columbia University In The City Of New York Methods and apparatuses for detecting deviations from legitimate operation on a wireless network
US9191799B2 (en) 2006-06-09 2015-11-17 Juniper Networks, Inc. Sharing data between wireless switches system and method
US9258702B2 (en) 2006-06-09 2016-02-09 Trapeze Networks, Inc. AP-local dynamic switching
US8818322B2 (en) 2006-06-09 2014-08-26 Trapeze Networks, Inc. Untethered access point mesh system and method
US7579952B2 (en) * 2006-07-31 2009-08-25 Caterpillar Inc. System and method to identify and track RFID tags
US8340110B2 (en) 2006-09-15 2012-12-25 Trapeze Networks, Inc. Quality of service provisioning for wireless networks
CA2558626C (en) * 2006-09-21 2008-05-20 Tenxc Wireless Inc. Highly-accurate radio location of beacons in a warehouse
US9489813B1 (en) * 2006-09-22 2016-11-08 Michael L. Beigel System for location in environment and identification tag
US7821400B2 (en) * 2006-09-29 2010-10-26 Datalogic Scanning, Inc. System and method for verifying number of wireless tagged items in a transaction
EP1913890B1 (de) * 2006-10-20 2009-04-15 BrainLAB AG Markernavigationsvorrichtung insbesondere für medizinische Zwecke
US20080099557A1 (en) * 2006-10-31 2008-05-01 James Kenneth A Distributed inventory management system
US20080180218A1 (en) * 2006-11-07 2008-07-31 Flax Stephen W Bi-Modal Remote Identification System
US7873061B2 (en) 2006-12-28 2011-01-18 Trapeze Networks, Inc. System and method for aggregation and queuing in a wireless network
US7616113B2 (en) * 2007-01-04 2009-11-10 International Business Machines Corporation Spatially locating RFID tags using multiple readers and correction factors
US8395482B2 (en) 2007-03-23 2013-03-12 Mojix, Inc. RFID systems using distributed exciter network
US8040221B2 (en) * 2007-05-02 2011-10-18 The Boeing Company Mobile radio frequency identification reader
US8269606B2 (en) * 2007-05-02 2012-09-18 The Boeing Company Methods and systems for RFID tag read verification
US8098150B2 (en) * 2007-05-25 2012-01-17 Palo Alto Research Center Incorporated Method and system for locating devices with embedded location tags
US20090002165A1 (en) * 2007-06-28 2009-01-01 Micron Technology, Inc. Method and system of determining a location characteristic of a rfid tag
US8902904B2 (en) 2007-09-07 2014-12-02 Trapeze Networks, Inc. Network assignment based on priority
US8238942B2 (en) 2007-11-21 2012-08-07 Trapeze Networks, Inc. Wireless station location detection
US20090153298A1 (en) * 2007-12-13 2009-06-18 Honeywell International, Inc. System and method for forecasting location of mobile object
CA2652731A1 (en) * 2008-02-07 2009-08-07 Mark Iv Industries Corp. Real-time location systems and methods
US8150357B2 (en) 2008-03-28 2012-04-03 Trapeze Networks, Inc. Smoothing filter for irregular update intervals
JP6150455B2 (ja) 2008-04-14 2017-06-21 モジクス, インコーポレイティッド 無線自動識別タグの位置を推定及び追跡するシステム並びに方法
TW201001958A (en) 2008-04-29 2010-01-01 Odin Technologies Inc Method and apparatus for a deployable radio-frequency identification portal system
US20090309734A1 (en) * 2008-06-16 2009-12-17 Honeywell International Inc. Intelligent system and method to monitor object movement
US8978105B2 (en) 2008-07-25 2015-03-10 Trapeze Networks, Inc. Affirming network relationships and resource access via related networks
US8238298B2 (en) 2008-08-29 2012-08-07 Trapeze Networks, Inc. Picking an optimal channel for an access point in a wireless network
US8279112B2 (en) * 2008-11-03 2012-10-02 Trimble Navigation Limited Methods and apparatuses for RFID tag range determination
US20100127875A1 (en) * 2008-11-21 2010-05-27 Wong Alex C Y Rfid systems
US8938211B2 (en) * 2008-12-22 2015-01-20 Qualcomm Incorporated Providing and utilizing maps in location determination based on RSSI and RTT data
US20100157848A1 (en) * 2008-12-22 2010-06-24 Qualcomm Incorporated Method and apparatus for providing and utilizing local maps and annotations in location determination
US8938355B2 (en) * 2009-03-13 2015-01-20 Qualcomm Incorporated Human assisted techniques for providing local maps and location-specific annotated data
US8416891B2 (en) * 2009-07-16 2013-04-09 Telefonaktiebolaget L M Ericsson (Publ) Optimized physical broadcast channel reception
US8478290B2 (en) * 2009-09-21 2013-07-02 Aeroscout, Ltd. Method to reduce database load in real time location systems
US8811199B2 (en) * 2009-11-06 2014-08-19 Rosemount Inc. Location detection in a wireless network
US11630366B2 (en) 2009-12-22 2023-04-18 View, Inc. Window antennas for emitting radio frequency signals
US11342791B2 (en) 2009-12-22 2022-05-24 View, Inc. Wirelessly powered and powering electrochromic windows
US20130271813A1 (en) 2012-04-17 2013-10-17 View, Inc. Controller for optically-switchable windows
US11732527B2 (en) 2009-12-22 2023-08-22 View, Inc. Wirelessly powered and powering electrochromic windows
US11205926B2 (en) 2009-12-22 2021-12-21 View, Inc. Window antennas for emitting radio frequency signals
US8599011B2 (en) 2010-07-30 2013-12-03 Q-Track Corporation Firefighter location and rescue equipment employing path comparison of mobile tags
WO2012079080A1 (en) 2010-12-10 2012-06-14 The Trustees Of Columbia University In The City Of New York Methods, systems, and media for detecting usage of a radio channel
US10460266B2 (en) 2010-12-30 2019-10-29 Cerner Innovation, Inc. Optimizing workflows
US9019071B1 (en) * 2011-09-06 2015-04-28 George Mallard Method and apparatus for integrating a plurality of legacy access control systems with partitionable resources
US9436857B2 (en) 2012-01-16 2016-09-06 Hand Held Products, Inc. Encoded information reading system including RFID reading device having multiple antennas
US9080882B2 (en) 2012-03-02 2015-07-14 Qualcomm Incorporated Visual OCR for positioning
WO2013134714A1 (en) 2012-03-08 2013-09-12 The Trustees Of Columbia University In The City Of New York Methods, systems, and media for determining whether a signal of interest is present
US11300848B2 (en) 2015-10-06 2022-04-12 View, Inc. Controllers for optically-switchable devices
US9841501B1 (en) * 2012-10-29 2017-12-12 The Boeing Company Use of blink counts to locate movable tagged assets
US9081076B2 (en) * 2012-11-12 2015-07-14 Isolynx, Llc System and method for object tracking anti-jitter filtering
US9841492B2 (en) 2013-02-25 2017-12-12 Quake Global, Inc. Ceiling-mounted RFID-enabled tracking
EP2962254A1 (en) 2013-02-26 2016-01-06 Quake Global, Inc. Methods and apparatus for automatic identification wristband
US9465827B1 (en) 2013-03-05 2016-10-11 Emc Corporation Proximity based management services
US9940663B2 (en) 2013-08-15 2018-04-10 Frank Daly Ward Indoor location mapping and wayfinding system
CA3156883A1 (en) 2014-03-05 2015-09-11 View, Inc. Monitoring sites containing switchable optical devices and controllers
US10049556B2 (en) * 2014-09-30 2018-08-14 Xiaomi Inc. Method and device for positioning objects
US11114742B2 (en) 2014-11-25 2021-09-07 View, Inc. Window antennas
US10510028B2 (en) * 2014-11-25 2019-12-17 Change Healthcare Holdings, Llc Method and apparatus for utilizing task value units for imaging interpretation and other tasks
US11054711B2 (en) 2014-11-25 2021-07-06 View, Inc. Electromagnetic-shielding electrochromic windows
CN107112620B (zh) 2014-11-25 2019-12-31 唯景公司 窗天线
US9883337B2 (en) 2015-04-24 2018-01-30 Mijix, Inc. Location based services for RFID and sensor networks
CN105101408B (zh) * 2015-07-23 2018-10-23 常熟理工学院 基于分布式ap选择策略的室内定位方法
US10521554B2 (en) * 2015-10-16 2019-12-31 Siemens Healthcare Gmbh Harmonization of cross-vendor data
KR20230104994A (ko) * 2016-05-06 2023-07-11 뷰, 인크. 윈도우 안테나
US20180054706A1 (en) * 2016-08-19 2018-02-22 Abl Ip Holding Llc System for auto-commissioning of luminaires and asset tracking
US10157337B1 (en) * 2017-06-16 2018-12-18 Amazon Technologies, Inc. Pre-notification with RFID dock door portals
DE202019103228U1 (de) * 2019-06-07 2019-06-14 Kemas Gmbh Warenspeicher
US11363419B2 (en) * 2019-12-10 2022-06-14 Hill-Rom Services, Inc. Intelligent location estimation for assets in clinical environments
TW202206925A (zh) 2020-03-26 2022-02-16 美商視野公司 多用戶端網路中之存取及傳訊
US11631493B2 (en) 2020-05-27 2023-04-18 View Operating Corporation Systems and methods for managing building wellness
US11057689B1 (en) 2020-12-10 2021-07-06 Elliot Klein Docking station accessory device for connecting electronic module devices to a package

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0245555A1 (en) * 1986-03-31 1987-11-19 Lo-Jack Corporation Method of and system and apparatus for locating and/or tracking stolen or missing vehicles and the like
WO1994019781A1 (en) * 1993-02-16 1994-09-01 N.V. Nederlandsche Apparatenfabriek Nedap Identification system for reading out a plurality of transponders in an interrogation field and determining the position of these transponders
WO1999067737A1 (en) * 1998-06-24 1999-12-29 Pinpoint Corporation Dual mode tracking system

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4827395A (en) 1983-04-21 1989-05-02 Intelli-Tech Corporation Manufacturing monitoring and control systems
US4658357A (en) 1983-10-04 1987-04-14 B.I. Incorporated Time and accounting system
US4711994A (en) 1986-01-17 1987-12-08 Princeton Synergetics, Inc. Security system for correlating passengers and their baggage
US5892441A (en) 1996-06-26 1999-04-06 Par Government Systems Corporation Sensing with active electronic tags
US5774876A (en) 1996-06-26 1998-06-30 Par Government Systems Corporation Managing assets with active electronic tags
US6046683A (en) 1996-12-31 2000-04-04 Lucent Technologies Inc. Modulated backscatter location system
US6026304A (en) 1997-01-08 2000-02-15 U.S. Wireless Corporation Radio transmitter location finding for wireless communication network services and management
US6108557A (en) 1997-01-08 2000-08-22 Us Wireless Corporation Signature matching for location determination in wireless communication systems
US6112095A (en) 1997-01-08 2000-08-29 Us Wireless Corporation Signature matching for location determination in wireless communication systems
US6064339A (en) 1997-01-08 2000-05-16 Us Wireless Corporation Subspace signature matching for location ambiguity resolution in wireless communication systems
US5959275A (en) 1997-03-25 1999-09-28 Mci Communications Corporation System and method for registering and maintaining field equipment inventory based on individualized equipment and location information
US6154657A (en) * 1997-10-21 2000-11-28 Telefonaktiebolaget Lm Ericsson Smart subdivision of base station candidates for position location accuracy
US6104344A (en) 1999-03-24 2000-08-15 Us Wireless Corporation Efficient storage and fast matching of wireless spatial signatures
US6282426B1 (en) * 1999-06-08 2001-08-28 Nokia Mobile Phones Limited Method, and associated apparatus, for determining geographic positioning of a wireless communication station operable in a non-ideal propagation environment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0245555A1 (en) * 1986-03-31 1987-11-19 Lo-Jack Corporation Method of and system and apparatus for locating and/or tracking stolen or missing vehicles and the like
WO1994019781A1 (en) * 1993-02-16 1994-09-01 N.V. Nederlandsche Apparatenfabriek Nedap Identification system for reading out a plurality of transponders in an interrogation field and determining the position of these transponders
WO1999067737A1 (en) * 1998-06-24 1999-12-29 Pinpoint Corporation Dual mode tracking system

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6529164B1 (en) 2000-03-31 2003-03-04 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
US7038584B2 (en) * 2000-03-31 2006-05-02 Ge Medical Systems Information Technologies, Inc. Object location monitoring within buildings
US6958677B1 (en) 2000-03-31 2005-10-25 Ge Medical Systems Information Technologies, Inc. Object location monitoring system
US7030811B2 (en) 2000-11-14 2006-04-18 Symbol Technologies, Inc. Methods and apparatus for identifying asset location in communication networks
US7250906B2 (en) 2000-11-14 2007-07-31 Symbol Technologies, Inc. Methods and apparatus for identifying asset location in communication networks
US7069025B2 (en) 2000-11-14 2006-06-27 Symbol Technologies, Inc. Methods and apparatus for identifying asset location in communication networks
US7030812B2 (en) 2000-11-14 2006-04-18 Symbol Technologies Inc. Wireless clock synchronization
US8190730B2 (en) 2001-03-09 2012-05-29 Consortium P, Inc. Location system and methods
WO2002080086A1 (en) * 2001-03-31 2002-10-10 Koninklijke Philips Electronics N.V. Machine readable label reader system with versatile default mode
WO2003060545A2 (en) * 2002-01-09 2003-07-24 M/A-Com, Inc. Method and apparatus for determining location of objects based on range reading from mulitiple sensors
WO2003060545A3 (en) * 2002-01-09 2003-11-13 Ma Com Inc Method and apparatus for determining location of objects based on range reading from mulitiple sensors
JP2005515444A (ja) * 2002-01-09 2005-05-26 メイコム インコーポレイテッド 複数センサからの距離読み取りに基づいて複数の物体の位置を決定する方法及び装置
CN1320370C (zh) * 2002-01-09 2007-06-06 M/A-Com公司 基于多个传感器的距离读数而确定对象位置的方法和设备
US9619679B2 (en) 2002-07-09 2017-04-11 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US10496859B2 (en) 2002-07-09 2019-12-03 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US10152620B2 (en) 2002-07-09 2018-12-11 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8842013B2 (en) 2002-07-09 2014-09-23 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8896449B2 (en) 2002-07-09 2014-11-25 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8866615B2 (en) 2002-07-09 2014-10-21 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US7142815B2 (en) 2002-09-02 2006-11-28 Em Microelectronics-Marin Sa Adjustment of the detection, transmission and/or reception parameters of an RFID reader as a function of ambient electromagnetic noise
EP1394719A1 (fr) * 2002-09-02 2004-03-03 EM Microelectronic-Marin SA Ajustement des paramètres de détection, d'émission et/ou de réception d'un lecteur RFID en fonction du bruit électromagnétique ambiant
WO2009062956A3 (en) * 2007-11-13 2009-07-23 Uni I Oslo Ultrasound zone location system with high capacity
US8779895B2 (en) 2007-11-13 2014-07-15 Universitetet I Oslo Ultrasound zone location system with high capacity
EP2065726A3 (en) * 2007-11-13 2009-06-17 Universitetet I Oslo Ultrasound zone location system with high capacity
WO2009062956A2 (en) * 2007-11-13 2009-05-22 Universitetet I Oslo Ultrasound zone location system with high capacity
DE102009056642A1 (de) * 2009-12-02 2011-06-09 Eads Deutschland Gmbh RFID System, damit durchführbares Verfahren zur Bestimmung von Position und/oder Bewegung eines RFID-Etiketts und Zugangsüberwachungssystem
WO2013077961A1 (en) * 2011-11-22 2013-05-30 Motorola Solutions, Inc. Method and apparatus for determining a location of an item attached to a radio frequency identification tag

Also Published As

Publication number Publication date
AU6940200A (en) 2001-03-19
US6456239B1 (en) 2002-09-24
WO2001015070A3 (en) 2002-01-17

Similar Documents

Publication Publication Date Title
US6456239B1 (en) Method and apparatus for locating mobile tags
CN109829429B (zh) 基于YOLOv3的监控场景下的安防敏感物品检测方法
US10641604B1 (en) Method of tracking moveable objects by combining data obtained from multiple sensor types
US7053830B2 (en) System and methods for determining the location dynamics of a portable computing device
US9536215B2 (en) Real-time and offline location tracking using passive RFID technologies
Zhang et al. Modeling pedestrians’ near-accident events at signalized intersections using gated recurrent unit (GRU)
JP5410446B2 (ja) Rfid検知に基づき物体の位置特定および通路識別をするシステムおよび方法
US20210042689A1 (en) Inventory control
Thrun Learning occupancy grid maps with forward sensor models
CN101965598B (zh) 最小化虚假警报和去激活失败的电子物品监视系统神经网络
KR20110133476A (ko) 비정상 거동 탐지의 정밀도 및 강건성을 향상시키기 위한 시스템 및 방법
EP2290595A1 (en) Planogram compliance using automated item-tracking
CN105190655A (zh) 物品管理系统、信息处理设备及其控制方法和控制程序
US11925446B2 (en) Radar-based classification of vehicle occupants
US20210100451A1 (en) Systems and methods of remote extraction of skeletal information using millimeter wave radar
CN110135278A (zh) 一种障碍物检测方法、装置及电子设备
JP5273291B2 (ja) 判定装置、判定システム、判定方法及びコンピュータプログラム
EP3545476B1 (en) Robotic generation of a marker data mapping for use inventorying processes
Mehrabi et al. A gaussian process-based ground segmentation for sloped terrains
Dai et al. Trajectory outlier detection based on dbscan and velocity entropy
Pramanik et al. Video surveillance-based fall detection system using object-level feature thresholding and Z− numbers
EP4162456B1 (en) Controlling frame rate of active reflected wave detector
Vorst Mapping, localization, and trajectory estimation with mobile robots using long-range passive RFID
Soltani Neighborhood localization method for locating construction resources based on RFID and BIM
Ma An investigation of indoor positioning systems and their applications

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP