1 / 25

Event Processing for RFID & Sensor Driven Environments

Event Processing for RFID & Sensor Driven Environments. Thoughts on Roundtable Agenda Wednesday March 15 th. Agenda. Presentations Dr In K. Mun, Director, Hospital Research HRI, MIT RFID for Hospital Asset Tracking Mark Tsimelzon, President and CTO, Coral8

jamese
Télécharger la présentation

Event Processing for RFID & Sensor Driven Environments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15th

  2. Agenda • Presentations • Dr In K. Mun, Director, Hospital Research HRI, MIT • RFID for Hospital Asset Tracking • Mark Tsimelzon, President and CTO, Coral8 • RFID for Personal Security in Theme Parks • Tom Abraham, Director of Solutions, Xterprise • Multiple Event Streams in Supply Chain Applications • Dieter Gawlick, Architect, Oracle • ChemSecure Use Case • Tao Lin, Director AutoID Infrastructure, SAP Labs • RFID, Event Processing and Business Applications

  3. Goals • Define use cases where event processing can be applied to RFID • Identify weaknesses in event processing concepts and technologies with respect to RFID • Identify opportunities for RFID with event processing concepts • Are sensor applications the next Event Processing sweet spot?

  4. RFID Concepts (relevant to EP) • Serialized identifier for assets • Identifier structure (tag content) • No line of sight requirement • Filtering & Collection • Event Granularity • Other types of Sensors and event input

  5. Event Processing & RFID Events • Event Collection • Raw Read • Reader Controller/Management • Capture Applications • Correlate • Retrieve and apply context • To other events (same tag) • To different asset class • To other event streams • React • Event Report/Analysis • Higher level business messages to application ecosystem • Higher level event correlation • Event Repository • Archive/Consolidate • Support track and trace with required level of detail

  6. Asset Maintenance Manufacture Execution Transportation Planning Analytics Logistics Printer Scale Digital I/O EPC Data Management RFID Mobile Device Device Middleware Data Store Optical Device PLC Profibus DeviceNet - Tag - - EPC - Tag &EPC 21.203D2A9.16E8B8.719BAE03C Counter Lightstack

  7. Applications Supply Chain Inventory tracking Surveillance Asset Management Security Locating Pedigree Tracking Industries CP Retailer Health Aerospace and defense Utility Pharma RFID/EPC Applications

  8. Use Case 1: Cold Chain Compliance in Supply Chain

  9. Sample Business Cases • Warehousing / Supply Chain / Transportation • Creates a chain of custody to determine where in the cold chain a temperature breach has occurred if at all • With integration, this solution can tell operators in real time, to accept, reject, or accelerate the product through the supply chain (dynamic queuing—not limited to FIFO or Expiration Date) • Disaster Planning and Recovery • Allows companies to understand the temperature changes in products when an anticipated power outage takes place. Executed at retail stores with a handheld and tags in the coolers / freezers.

  10. Web Based Reporting (Secured)

  11. Sample Business Case Benefits Accountability / Profitability • Financial obligation for refused product is placed on the correct source in the chain of custody because there is a correlation between the cold chain breach and the time it took place Quality • The shelf life of temperature sensitive products is impacted in a negative manner by variations in temperature. • In understanding the impact temperature has on shelf life, the amount of time that the product was in an unacceptable temperature range must be known (degree minutes).

  12. Sample Business Case Benefits, cont’d In-stock Position • Cold chain breaches are identified immediately versus when the recipient opens the product and determines that it is unacceptable. That product must be immediately reordered and increases the safety stock levels. Food Safety Liability • Microbial activity starts at an exponential rate at temperatures over 40°F • The consequences of infecting a customer with this type of illness are detrimental, not only from a financial sense but a company’s reputation is tarnished.

  13. Use Case 2: Asset Management (Hospital)

  14. RFID Applications At Hospitals • Patient Wristband • Blood Product Management • ER, OR, ICU Management • Point of Care • Pharmaceutical Pedigree • Combating Counterfeit Drugs • Asset Management

  15. Why Asset Management? • National average utilization of mobile equipment is 45% - Universal Hospital Services • Hospitals can lose nearly $1 million a year in medical equipment thefts alone - HCPro Healthcare Marketplace • Five to fifteen percent of hospital inventory is written off each year since it can no longer be located or more importantly serviced - Frost & Sullivan • “Equipment moving from patient to patient without going through decontamination in between has become a significant issue to JCAHO in regard to infection control in hospitals” - JCAHO Sentinel Alert • To prevent infant mix-up • To build an infrastructure

  16. RFID Positioning System • Location Identification • Security • Inventory Management • Utilization • Requisition / Distribution • Rentals • Safety / Risk Management • Transport • Equipment Cleaning • Regulatory Compliance • Clinical Engineering • Financing / Accounting Equipment Management Asset Tracking Business Process Management RFID-Enabled Equipment Management Application

  17. Use Case 3 – People Tracking/Security

  18. Losing a Child is a HUGE Problem • Kids get lost everywhere: amusement parks, shopping malls, stadiums, skiing areas, etc. • Kids tend to wander away • Kids are sometimes kidnapped • If a child is missing, EVERY SECOND COUNTS

  19. Solution Overview • Enrich RFID data by doing a DB subquery • Reader locations • Family information • Split the enriched stream into Parents and Children streams • Join Parents and Children streams and select the pairs that are far apart

  20. Location-based RFID Applications: Lessons Learned • Must analyze large volumes of data at high data rates • Must provide real-time response • Must enrich real-time data with reference data from databases • Must provide functionality to make distance-based correlation easy

  21. Summary

  22. Common Themes for Sensors & EP • Interfacing with Real World • Volumes, incomplete data, out of order • Temporal Horizons • Some short • Some longer term • Deriving Higher Level Events • At different levels in the information chain • Environments with Multiple Streams • Event Processing Driving Process Management in Dynamic Environments

  23. Goals • Define use cases where event processing can be applied to RFID • Identify weaknesses in event processing concepts and technologies with respect to RFID • Identify opportunities for RFID with event processing concepts • Are sensor applications the next Event Processing sweet spot?

  24. Challenges for EP in RFID • Cost • Is there COTS opportunity? • It’s a hardware world … • Do enterprises realize that they have an event based problem? • Implementing hierarchical filtering and correlation

  25. Event Processing for RFID & Sensor Driven Environments Thoughts on Roundtable Agenda Wednesday March 15th

More Related