2. Reference
Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu “Identifying
RFID-embedded objects in pervasive healthcare
applications” , Decision Support Systems Volume 46 , Issue 2
(January 2009)
2
3. Outline
Introduction
RFID tags and healthcare
Related literature on improving RFID tag identification
accuracy
Proposed methods
Discussion
3
4. Introduction
The primary goal of pervasive healthcare is to be able to
deliver necessary quality healthcare service anytime to
anyone regardless of location and other constraints.
The underlying principle in most of these intelligent
information systems are rather similar to the extent that
they all utilize knowledge in some form to enable
decision making in the healthcare environment.
Clinical Decision Support Systems (CDSS)
Intelligent Decision Support Systems (IDSS)
Healthcare Information Systems (HIS)
4
5. Introduction
RFID tags are used in scenarios
an object needs to be identified
tracked
when ambient condition surrounding an object is captured
stored
Although it is generally assumed that data read from
RFID tags are highly accurate, variations in accuracy
can and do occur due to several reasons.
5
6. RFID tags and healthcare
One of the largest volumes of RFID application has been in
the healthcare industry, where about 4.5 million tags have
been used every year on Diprivan drug syringes by
AstraZeneca since 1999.
Asset tracking is a prime candidate for RFID applications
A typical hospital is unable to locate about 15–20% of its assetswhen
needed
Cost and privacy concerns have generally been recognized
as major factors in the success of RFID applications
6
7. RFID tags and healthcare
Three main areas benefit from RFID technology in the
healthcare industry:
(1) asset management
(2) patient care
(3) inventory management
7
8. Related literature on improving RFID tag
identification accuracy
Bai et al. propose means to filter and clean data streams
from RFID applications that contain false (e.g., false
positive, false negative) readings and duplicates
To improve RFID tag detection reliability, Agarwal et al.
let the reader sample every 2 s
Data reliability and ambiguity are two major issues in
extraction of information from RFID data
Khoussainova et al. use probabilistic method to provide
the application with the flexibility to build its own
balance between detection and precision rate
8
9. Proposed methods
False positives and false negatives can be a problem in
RFID-embedded systems, especially when signal from a
given tag is blocked by an impenetrable object (e.g.,
metal shielding) or when corrupted signal is read
Algorithm 1 (the base case)
Algorithm 2
Algorithm 3
Algorithm 4
Results
9
15. Results
We simulated the four algorithms presented above 10
times with 1000 readings per run with the following
assumptions: The tag T (or, T1 in Algorithm 4) is always
present (or, absent) during both the reads in a reader's
field
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm sliding window
15
24. Discussion
The algorithms to reduce false positives and false negatives
while identifying the presence/absence of an RFID tag in the
field of a reader, and illustrated these algorithms by means
of an example scenario (Although our results are based on
simplified assumptions)
Any successful attempt at improving true (positive and
negative) readings would ultimately increase the
performance and efficiency of RFID tag-enabled systems
This is even more salient given that the methods proposed in
this paper can be implemented with minimal resources and
effort
24