Design Report
-
Upload
petersam67 -
Category
Business
-
view
194 -
download
0
description
Transcript of Design Report
Local Area Tracking and Monitoring System
Design ReportTemp Dec01-0816 April, 2001
Faculty Advisors:John W. Lamont
Ralph Patterson III
Team Members:Brent Gill
Eric JacksonMuhammad Umar Sheikh
Shih-Hau KuanHui Liu
Abstract
The project is to locate and track a moving object in a confined area e.g. a patient in a
nursing home or a forklift in a factory, or to track computers or other assets. Various
technologies were considered including a cell-based tracking system using radio
frequency identification (RFID), asset tracking system using detectors, micropower
impulse radar tracking system using electromagnetic pulses, infrared beacon tracking
system, and radio triangulation and telemetry tracking system. The results of this project
could have many applications in domestic and commercial products. It was found that
the most practical technology for the implementation of this application would be RFID.
Definition of Terms
Triangulation: Measuring distance using the travel time of radio signals propagating
within a combination of two or more receivers (satellites) and a transmitter
Telemetry: The transference of data over a wireless channel
RFID: Radio frequency identification
LOS: Line of sight
LED: Light emitting diode
LCD: Liquid crystal display
MIR: Micropower impulse radar
Transponder: A device that responds to a signal received from an external source
Reader: A device that is able to interpret signals received from a source
AIDC: Automatic identification and data capture
PROJECT DESIGN
Introduction
General Background
The project involves developing a local area tracking and monitoring system. The system
is to be designed to track residents of a nursing home or other care facility, in order to
ensure that they stay on the premises. This application would require tracking to
determine perimeter violation, along with the location of that perimeter violation. A
central computer would be used to display location information. This computer system
should be simple enough to be monitored by the normal staff of the institution. Two
other applications were also considered and they are listed below.
To track forklifts and/or other mobile machinery in a large industrial complex, such
as a warehouse. This application would require on-demand tracking of the exact
location of the entity. A central computer would be used to display location
information.
To deter computer or equipment theft. A perimeter violation system would be
implemented to trigger alarms should any protected piece of equipment break the
perimeter. Periodic location resolution is sufficient for this application.
Technical Problem
In order to implement this system, radio frequency identification will be used. This
technology would require radio frequency transponders on each tracked object, radio
frequency reading units to be placed strategically throughout the tracking area, and a
central computer to manage all the collected data. The central computer would be used
to display location information, and could be either a PC or a microcontroller and LCD
display. The software would be written in C or Assembly. Below is a graphic depicting
common RFID technologies.
Figure 1 - RFID Technologies
http://home.att.net/~randall.j.jackson/rfid.htm
Several other technologies were also considered, but were eliminated due to cost and/or
complexity. These technologies are detailed below.
Radio triangulation and telemetry . This technology would require two or more
receiving antennas, a transmitter located on the tracked object, extremely accurate
time synchronization equipment, and a central computer (PC). The central computer
would be used to display location information, as needed. The software for this
system would be programmed in C++ or Visual Basic. This technology was rejected
due to cost and accuracy issues.
Micropower impulse radar . This technology would require the radar device and a
central computer (PC). The central computer would be required to do several tasks
such as filtering, imaging, and identifying tracked objects. Thus, the central computer
would need to be quite fast. The software for this system would be programmed in
Matlab and C++/Visual Basic. This system was rejected due to the fact that it can not
distinguish between multiple targets. Also, very costly, sophisticated equipment
would need to be used.
Infrared beacon . This technology would require an infrared source (such as an LED),
to be carried by each tracked object, two rotating infrared receivers, and a central
computer (PC). The central computer would used for location resolution and display.
The software for this system would be programmed in Visual Basic. This
technology was rejected due to its inefficiency in an unclean environment. Also, it
required line of sight operation, which is not always practical in with this application.
Frequency detection unit . This technology would require a transmitter on each
tracked object, and strategically placed receivers. This system would not be able to
discriminate between objects. The output would simply be whether or not a signal is
detected. This technology was rejected due to its inability to discriminate between
different objects.
Operating Environment
The operating environment for the human tracking system would be both indoors and
outdoors. The system should not be affected by electronic equipment commonly found in
offices. Temperature range of operation is expected to be approximately between 0-120
degrees Fahrenheit. Operating environments for the discarded applications are included
below.
For the forklift application, the technology would be operating in an industrial setting.
The system should then be able to function in a fairly dirty environment, as dust and
other contaminants may be present. The system should also be resistant to any
electrical interference caused by operating machinery, within reason. Some
resistance to both high and low temperatures would be needed, with an operating
range approximately between 0-110 degrees Fahrenheit.
For the computer security application, the technology would operate in an office or
lab setting. The system should be adequately shielded from electronic emissions
from such sources as computer components and power supplies. Temperature range
of operation is expected to be approximately between 60-80 degrees Fahrenheit.
Intended User/Uses
The intended user of the human tracking system would be the staff of a nursing home or
medical care facility. The system would be used to detect entry to or exit from certain
areas to protect patients or residents. An example would be to detect the exit of an
Alzheimer’s patient from the facility, in order to protect them from wandering away. For
completeness, the intended user and uses of the two discarded applications is included
below.
The forklift application is intended for use by plant employees. It is to be used to
track the locations of mobile equipment uniquely, so that a particular piece of
equipment can be found on demand.
The computer security system is intended to be used by IT or equipment staff. The
system would be used for security purposes to detect the removal of computers or
other valuable equipment from the facility.
Assumptions
Assumptions are listed below, also included are assumptions from discarded applications.
Human Tracking Application
The tracked person shall not remove a transmitter or transponder, or subject
them to adverse conditions.
Transponders will be small enough to “hide” on patient or resident.
Wideband noise will not be sufficiently powerful to disrupt communication
between the reader and transponders.
Forklift Application
Technology will not operate in a hazardous environment (IR sensitivity to
dust and contaminants).
Computer Security Application
Tracked materials shall only be removed from the building via doors or
windows (perimeter monitoring only).
Limitations
Limitations are listed below, by technology. Also included are eliminated technologies.
Radio Frequency Identification
Continuous tracking is impossible due to cost considerations.
Transponders must not be blocked or enclosed in radio frequency dampening
materials.
Only entities with transponders can be tracked.
If an active system is used, transponders may require periodic maintenance.
Radio Triangulation
All transmitted signals must be low power to reduce interference.
Micropower Impulse Radar
Unique identification of two or more of the same type of entity, such as two
identical forklifts, is not possible with this technology.
Multiple radar sites can only be implemented if the central computer is of
sufficient speed to handle the extra load, due to cost considerations.
Infrared Beacon
Line of sight is necessary for this technology to determine position.
Continuous tracking of entities is not possible.
Beacons and receivers must be kept clean.
Frequency Detection Unit
Unique identification of tracked objects is not possible.
Transmitters must not be blocked or enclosed in radio frequency dampening
materials.
Design Requirements
Figure 2 - RFID System Graphic
http://www.axsi.comIn designing this system, the team has considered three main applications and several
technologies to use in implementing the system. Among the applications were asset
monitoring, machinery tracking, and human tracking. It was finally chosen to proceed
with human tracking. However, the other two applications will be discussed as well.
Human Tracking
Design Objectives
The project will use an RFID system to track and monitor people. This system must
include:
A passive transponder card with a unique identification code to be carried by all
persons to allow identification.
An antenna to transmit pulses of power to the transponder and to receive a signal
back from it.
A reading unit that reads the signal from the antenna, processes its identification
code and sends it out a serial link to a central computer.
A central computer to receive data by networking all of the readers together.
A software application to process and keep track of all movement within the
covered range.
Functional Requirements
The components of this project must be combined to perform several necessary tasks.
These tasks are listed below.
The transponder cards must each have a unique identification code and must stay
with the person that they were issued to.
This antenna must have sufficient range (>1.5 meters) to allow easy and
guaranteed detection from a normal operating range at all locations where a
reading unit is being used.
The antenna must be able to read more than one signal simultaneously.
The antenna must be able to interface with the reading unit.
The reading unit must be able to distinguish between each identification code.
The reading unit must be able to read and distinguish between more than one
identification code simultaneously.
The reading unit must be able to communicate with a central computer.
The central computer must be able to take input from each reading unit and
update the positions of people based on the input.
The software application must be able to display current information in an easy to
use manner.
Machinery Tracking
The second application would be to track objects such as forklifts in a warehouse setting.
This system must be able to uniquely distinguish between each vehicle to be tracked.
This system would involve several requirements.
Design Objectives
The design must include
An active beacon device attached to each vehicle wishing to be tracked.
Multiple detectors located strategically throughout the warehouse depending on
warehouse dimensions to allow for triangulation throughout the warehouse or
manufacturing facility.
A central computer that receives signals from all the detectors to compute and
display the location of all vehicles.
Functional Requirements
The beacon would need to be powered and would need to have a sufficient range
for the signals to propagate to the detectors, through walls if need be.
The beacon would need to send out an unique identification code at short intervals
that would be detectable by multiple detectors.
The detectors would need to be able to process multiple signals at once coming
from all vehicles.
The detectors would need to be networked in some way to allow for the
triangulation calculations.
The detectors would need a very short latency to allow for fast calculations.
The detectors would need a very accurate timing mechanism to heighten the
precision of the system.
The computer would need to be know the location of all the detectors.
The computer would need to be able to quickly process all incoming data.
The computer would need to display location information in a meaningful way.
Asset monitoring
The third application considered is asset monitoring and protection. An example of such
an application would be to track computers and peripherals making sure that they did not
violate an arbitrary perimeter, thus ensuring they would not be stolen. This system would
not need to distinguish between different components. To implement this system, many
objectives must be met.
Design Objectives
The design must include
A frequency detection unit that could detect radio signals from tags
attached to assets.
A tag attached to each asset that sends out radiation to be picked up by the
detector.
Functional Requirements
The detectors would have to be placed at all possible exits from the room to
ensure maximum security. Leaving out such things as windows would greatly
undermine the value of the system.
The detectors would need to set off an alarm when the perimeter is breached by
an asset.
The detectors would work by reading a tag attached to each item being tracked.
The detectors would need a source of power and would need to be relatively small
so as to fit in areas such as doorways and windows.
The tags would be very small and passive in nature. They would be very small
and inconspicuous and could easily fit inside computers without affecting the
operation of the tags or the computers.
The tags would all be identical thus making it impossible to distinguish between
each item.
Design Constraints
Cost
The end product should be made inexpensive and affordable for all applications without
compromising on the performance and reliability. However, the unavailability of a
sponsor has posed a financial constraint for the team.
Size
The size of the transponders should be kept as small as possible for convenient
installation and handling. The desired dimensions of a transponder are 5” * 2” * 0.75”,
which are scalable for small, medium, and large enterprises.
Power consumption
Keeping in mind the requirement of continuous tracking of the patients in a nursing
home, the team wants to keep the power consumption of the end product as low as
possible. Passive transponders do not require any power. Therefore, the transceiver’s
power requirement is the only concern. In such an environment, power would be readily
available to the transceiver.
Capture Area
Larger coverage area means lesser number of transponders per unit area. The transceiver
should be able to detect the reader within 120 of symmetric sweep. The size and power
consumption of the unit has to be compromised for enhanced coverage area.
Target Visibility
RF tags do not need to be seen to be read. However, a thick metal or similar radio
frequency obstructing material can affect the performance of the system.
Temperature
Temperature range of the system is expected to be 0-120 F. Extreme temperatures are
expected to affect the performance of the system.
Interference
The system should be adequately shielded from the electronic emission and fields of
other computers and power supplies.
Measurable Milestones
Final Design
Final design should contain all functions and fulfill design criteria.
Prototype Implementation
A prototype should be successfully constructed.
Successful Testing
All proposed tests should be satisfied.
Demonstration of a working prototype
A scalable working prototype should be demonstrated that will determine the success of
the project.
End Product Description
The end product will be a human monitoring system for use in managed care facilities. It
will consist of a central computer to monitor the movements of tagged individuals past
checkpoints set with RFID readers. An example of its use would be to track patients in a
nursing home to ensure that they stay on the premises, thus reducing the risk of injury.
Approaches and Design
Technical approaches
Five types of technologies were considered, as listed below.
Radio frequency identification (RFID)
Radio frequency identification (RFID) is a relative new automatic identification and data
capture (AIDC) system. The wireless AIDC system allows for non-contact reading and
consequently is effective in some environments where barcode labels could not survive.
System will use transponders with a range of at least 1 meter.
System will use transceivers that can incorporate multiple inputs.
System will use bar antennas for desired coverage area.
Asset tracking system using detectors
Asset tracking system could be used for simple and advantage applications.
System will use passive modules, simple detectors, and alarm system.
System will use transceivers that can incorporate multiple inputs.
Passive modules are attached on each asset (such as television, computer, etc).
Detectors are located on each door or window.
Micropower impulse radar tracking system
Micropower impulse radar (MIR) tracking system uses very short electromagnetic pulses,
so it can detect objects at much shorter range.
System will use MIR concealable sensors and alarm system.
The effective range of MIR concealable sensor is 6 meters.
The system detects motion by repeatedly monitoring the echo pattern to see if it
changes.
Infrared Beacon tracking system
Infrared beacon tracking system uses infrared technology to track move object.
System has inside-in, inside-out, and outside-in three kinds.
System uses sensor(s), source(s), and computer control system.
The sensors are attached on object, sources attached to the reference.
Radio triangular and telemetry tracking system
Radio triangular and telemetry tracking system is to measure the distance and angle of a
wanted source with given at least two measurements. It has radio generator, signal
receiver and transmitter, computer control system, and alarm system.
System will use radio generator generate signals.
System will receive and transmit the object reflects signal.
Computer control system deal the data and gets the accurate position of the object.
Technical design
After comparing five technologies, finally, the project will use radio frequency
identification (RFID). RFID was chosen because it has a low cost (<$600 US) and it
fulfills the requirements of the monitoring system, despite its less complex nature. The
advantages and disadvantages of the five different technologies are discussed below.
Radio frequency identification (RFID)
Radio frequency identification (RFID) system would require some main parts:
transponder, antenna, transceiver, and computer.
Advantages:
Easy installation and using
Lower cost transponders offering multi-read capabilities
Wide range of data transfer rates
High (64Kbits) data storage capabilities
Without the need for line-of-sight interrogation
Allowing use in reasonable harsh conditions
Security
Disadvantages:
System will operate in enclosed area only
Each tracked entity will carry a transponder
Entry and exit will be monitored at predefined locations only
Asset tracking system using detectors
Asset tracking system would have passive modules, simple detectors, and alarm system.
Advantages:
Easy installation
It can be easily implemented
Have many more uses
Reasons for Discarding (Disadvantages):
Expensive to implement
Impossible to distinguish between unique targets, thus not useable for the human
tracking application
Micropower impulse radar tracking system
Micropower impulse radar (MIR) tracking system has two parts: MIR concealable
sensors and alarm system.
Advantages:
Easy installation
It can be easily used
Security
Reasons for Discarding (Disadvantages):
The penetration of MIR signals through a material decreases as that material’s
electrical conductivity increases.
Extensive signal processing is required to uniquely identify targets. This is
beyond the scope of the project.
Infrared Beacon tracking system
Infrared beacon tracking system has inside-in, inside-out, and outside-in three kinds
system. It has sensor(s), source(s), and computer control system.
Advantages:
Easy installation
Convenient use
Security
Reasons for Discarding (Disadvantages):
Difficult or impossible to uniquely distinguish different targets, a requirement for
the application.
Prepare the map of area will being monitored.
Radio triangular and telemetry tracking system
The radio triangular and telemetry tracking system has radio generator, signal receiver
and transmitter, computer control system, and alarm system.
Advantages:
Reliable and effective
Security
Reasons for Discarding (Disadvantages):
Very expensive (many thousands of dollars).
Very technologically intensive, requiring advanced synchronization equipment.
Testing Description
The testing procedure will consist of software and hardware testing. The software test
will include module and performance testing.
Each component of the hardware must be tested individually as well as in connection
with the other components.
Risks and risk management
Technical Failure
The team may encounter technical or design failures due to unforeseen events.
Shortage of Financial assets
The team is expecting a financial constraint due to the unavailability of a sponsor.
Increasing efforts are being made to locate a suitable sponsor.
Unable to counter problems
The team may encounter certain unavoidable circumstances that may hinder the progress
of the project.
Time shortage
Running out of time can have drastic effects on the project.
Conflict between team members
In the process of doing the project, there may be conflicts between team members. This
may result in unaccomplished milestones. Therefore, the team must work in a
cooperative manner.
Recommendation for continued work
In the event that a suitable sponsor is found, the project shall be completed as designed.
If no sponsor can be found, the project will be restricted to a theoretical design.
Financial Budget
Table 1 - Financial Budget
Item Original Estimated Cost Revised Estimated CostLabor $0 $0Equipment/Parts $1500 $50Telephone/Postage $0 $15Printing $150 $37Total Estimated Cost $1650 $102
No labor costs were estimated as the team will complete the required tasks.
Personnel Effort Budget
The estimated personal effort budged for the project is outlined below.
Table 2 - Personnel Effort budget
Personnel Original Estimated Effort(hrs)Revised Estimated Effort(hrs)
Brent Gill 107 104Eric Jackson 99 101Muhammad Umar Sheikh 102 103Shih-Hau Kuan 106 107Hui Liu 97 99Total 511 514
The team members have tried to utilize their time efficiently in order to meet the project
requirements.