999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An Access Detection Method Based on LF RFID

2023-02-15 08:38:48FENGYanlingMAXinyiBAOJunCHENZhumingandLIUPeng
電子科技大學學報 2023年1期

FENG Yanling, MA Xinyi, BAO Jun, CHEN Zhuming*, and LIU Peng

(1. School of Information and Communication Engineering, University of Electronic Science and Technology of China Chengdu 611731;2. China Mobile (Chengdu) Industry Research Institute Chengdu 610054)

Abstract The low frequency radio frequency identification (LF RFID)-based detection technology is popular for access detection systems because it is convenient and low-cost. However, the performance of LF RFID technology is easily affected by complex environmental factors, especially in the metal environment, leading to low detection accuracy and poor stability. To tackle this problem, we propose an access detection method with an accurate positioning algorithm based on improved maximum likelihood in this paper. The positioning algorithm consists of two stages: training stage and positioning stage. In the training stage, a correction fingerprint database is established. The database is used to correct the ranging error due to environmental factors. In the positioning stage,after correcting the ranging measurement error, the maximum likelihood algorithm is used to locate tags carried by subjects for detecting the entry/exit status. Some experimental results show that the detection accuracy can reach 3 cm and the accuracy of detecting entering/exiting status under two walk strategies is up to 99% or more, which is enough for application.

Key words access detection; fingerprint correction database; LF RFID; maximum likelihood

With the development of the Internet of things and intelligent technology, automatic access detection has attracted more and more attention in real life due to its commercial and social values[1], such as security places[2], business offices[3], and school[4-5]. Currently,the existing access detection technology consists of video surveillance, infrared, ultrasonic, WIFI (wireless fidelity), RFID (radio frequency identification), and other wireless sensors methods[6]. The detection technology based on video monitoring is limited by observation angle and external environment[7]. This method will not work if the target is covered by other objects or the information is insufficient. Although the infrared technology has high accuracy, it is expensive to set up and short-range[8]. Similarly, the ultrasonic technology is also high-cost and strongly affected by unnecessary objects such as a puppy[9]. Wi-Fi is easy to expand and has a wide application field. However, it would bring about high energy consumption[10]and is affected by obstacles and the multipath effect. The RFID technology can be applied in the access control system because of low cost and low power consumption[11], which uses received signal strength indicator (RSSI) for location[12]. UHF RFID signals are easily reflected by objects to generate multipath signals, and they are strongly attenuated during propagation. Therefore, UHF signals are not a reliable choice in complex indoor environments. In addition,low frequency (LF) signal in the 125 kHz is less influenced by multipath and has the characteristics of high reliability and low positioning latency, and LF RFID has been used on a large scale in many scenarios[13-16].

In recent years, scholars have studied many detection algorithms and localization algorithms based on LF RFID in various applications. Ref. [17]designed an LF RFID-based attendance management system. The system manages student attendance records and tracks student absences. Ref. [18]proposed an access detection algorithm based on LF RFID in the vehicle keyless entry system. The algorithm detects the location of the key based on the RSSI. Ref. [19] studied a localization and tracking algorithm based on RFID. Then, the estimate position of the RFID reader is obtained by compensating for the artifacts of multipath propagation and nonisotropic antenna pattern. Ref. [20] designed an indoor location system based on RFID. The effectiveness of this system is verified in static positioning and dynamic positioning scenarios. Ref. [21] proposed a new Mobile RFID (M-RFID)-based Localization approach for indoor human tracking. RFID readers are equipped on the moving objects and RFID tags are fixed deployed in the monitoring area[21]. Ref. [22]presented the RFID-based indoor inventory localization method in multi-stacking racks for warehousing. It was noted that there was no significant location difference between the estimate location information and the actual location of the item in the rack. Ref. [23] proposed the localization method based on maximum likelihood estimation with the help of RFID tags and RFID receiving antennas. The target position is estimated by the maximum likelihood algorithm and real-time localization is implemented by using an extended Kalman filter. Ref. [24]demonstrates that it is difficult to avoid the RSSI ranging error due to environmental disturbances,especially in metallic environments. These RSSI-based localization methods suffer from poor stability and low accuracy because of the ranging error. In the real detection environment, metal doors are one of the most common environmental interferences for RSSI ranging. Other factors include: electronic equipment,metal objects, and uneven magnetic field distribution,etc[25-26]. The angles of the metal doors often change dynamically as people enter and exit, and this dynamic metal environment usually results in inaccurate RSSI and thus indirectly causes positioning errors and detection errors.

Positioning is the basis of access detection technology. Furthermore, the positioning accuracy in the entry/exit is the key to the detection accuracy for access detection systems. The real-time detection systems in entry/exit require high localization accuracy in the order of a few centimeters[27]. In order to improve the positioning accuracy and algorithm stability near the entrance/exit, an access detection(entry and exit) method based on RFID is proposed in this paper, including a corresponding positioning algorithm using improved maximum likelihood estimation. The positioning method consists of the training stage and positioning stage. In the training stage, at first, the RSSIs ranging from the environment-aware tag to the main base station (BS)and from the reference tag to all BSs are collected in a dynamic metal environment. Secondly, the ranging dataset is fitted by the least square algorithm to obtain the fitting parameters. Finally, the correction fingerprint database is built. In the positioning stage,the correction fingerprint database is used to correct the RSSI ranging error due to the dynamic metal environment. Then, the maximum likelihood algorithm is used for positioning. The optimized maximum likelihood algorithm can eliminate the impact of metal interference, thereby improving the positioning accuracy and detection accuracy.

1 Principle of LF RFID

The LF RFID technology depends on near-field magneto inductive communication (NFMIC) in Fig. 1,which is achieved by magnetic coupling between the receiver and the transmitter[28]. By inductive coupling,it is possible to convert the electromagnetic field energy into an induced electric potential to generate a voltage on the tag. When the voltage is greater than a certain level, the tag is activated (wake-up) and the tag can obtain energy from the radiated near field of the transmitter. When transmitting data between the tag and the reader, the low-frequency tag needs to be located in the near-field region radiated by the reader antenna. The magnetic field strength decays rapidly with increasing distance between transmitter and receiver[29].

Fig. 1 Near-field magneto inductive coupling

2 Materials and Methods

Firstly, to clarify the structure of the access detection method, there is a flowchart of this detection method in Fig. 2 .

Then, the top view diagram of entrance/exit is shown in Fig. 3, whereais half of the length of the entrance/exit,bis half of the width of the entrance/exit, and α is the opening and closing angle of the metal door.

Fig. 2 Flowchart of the detection algorithm

Fig. 3 Scene diagram of exit/entrance

At the beginning of the detection algorithm, the tag needs to be confirmed to be activated. The positioning algorithm will only work when the tag is active. Then, the estimated position of the subject is compared with the position of the entrance/exit to confirm the entry and exit status of the subject. When?a

Moreover, since LF RFID is based on RSSI for position estimation, then the RSSI ranging model needs to be found. Some RSSI with distance was measured at predefined locations in the environment.Then, a mathematical relationship between distance and RSSI was obtained by data fitting based on RSSI and distance, which converted the RSSI to the distance between the tag and BSs. Finally, the positioning algorithm was described, which is the core of the entry/exit detection algorithm.

2.1 Traditional maximum likelihood method

The basic idea of the maximum likelihood (ML)positioning method is based on the RSSI ranging[23], in which there are some base stationsBSi(i=1,2,···,m)as depicted in Fig. 4. The real location of each BS is(xi,yi) and the location of the blind tag is (x,y). A blind tag indicates a tag whose position is not clear and needs to be located. The distances between the blind tag and BSs ared1,d2,···dm.

Fig. 4 Distribution of tag and base stations

Generally, equation (1) is converted toAX=B,where the matrixA,BandXare shown below.

By solving above equations with the least square method, the mean square error can be minimized. If the equation has a solution, then the position of the blind tag isX=(AAT)?1AB.

The principle of the traditional ML algorithm is simple. However, the algorithm is instable and is susceptible to metal interference because of α. The reason is that the metal door with different α will affect the distribution of the electromagnetic field,which will cause the inaccurate RSSI received by the blind tag. The positioning effects will be affected by inaccurate RSSI. Therefore, the traditional ML algorithm has a problem with low accuracy and poor stability in the metal environment.

2.2 Optimized maximum likelihood method

To solve the problem of the traditional ML method, this paper designs an optimized ML algorithm, which contains the training stage and the positioning stage. The process of the algorithm is shown in Fig. 5.

Fig. 5 Process of the accurate positioning algorithm

Compared with the traditional ML, this improved algorithm takes into account the influence of metal interference, which uses the correction fingerprint database to correct the ranging error. Accurate RSSI enhances the positioning accuracy, thus improving detection accuracy. There are three main steps in the training stage, including data collection, data fitting,and calculation of the correction fingerprint database.

1) The data collection

The effective detection area is divided into p raster areas, and the center of each raster area is used as a reference point. For every reference point, a reference tag is placed on a reference point to collect distance.

The metal door opens from the fully closed according to a certain angle interval, which is divided into n angles. The distance measurement vector from the environment-aware tag to the main BS (any one of the BSs) is as follows.

3) The calculation of the correction fingerprint database.

These parameters of the above fitting curves are combined into the fingerprint of the reference point.

and then repeating 1), the correction fingerprint is established for each reference point, and thus the correction fingerprint database is obtained.

In the positioning stage, there are two main steps,including error correction and position estimation.Firstly, according to the distancedenfrom the environment-aware tag to the main BS and the fingerprint FPiof the reference point, the distance measurement from the reference tag to BSs is:

Comparing the distance measurement with the real distanceDi, the ranging errord?mof the reference tag can be calculated as:

According to the consistency of local field strength measurement error, it can be considered that the ranging error of the blind tag is the same as that of the reference tag. Then the measurement distance vector of the blind tag to BSs after ranging correction is below:

whereDmis the distance measurement before ranging correction, andDcis the distance measurement after ranging correction.

Secondly, based on the corrected distance measurement, the position of the blind tag can be estimated by using equation (2) to equation (4).

3 Experiment

To verify the effectiveness of the access detection method proposed in this paper, the positioning method was tested in the detection area. Then, subjects carried the RFID tag and passed through the detection area at any speed for determining the access status of subjects.

3.1 Environment

The experiment was carried on near the door of a laboratory in the school, and the size of the door is 80 cm × 25 cm × 200 cm. The position of the 4 BSs is shown in Fig. 6a. All BSs are 125 kHz low-frequency transmitting antennas and RFID tags are semi-active,Semi-active tags only work in the active area (i.e. near the detection area), which reduces power consumption and improves tag endurance. The type of RFID tag used in this paper is the ATA5702 tag.

Fig. 6 Experimental environment

To verify the accuracy and stability of this detection algorithm under metal interference,especially in the middle area of the entrance/exit, the experiment selected five different angles α, and α=[0°,45°, 60°, 90°, 120°] respectively, where α=0° indicates that the metal door is completely closed. Then, 9 test points are chosen in the middle of the entry/exit. The top view of test points is shown in Fig. 6b. Among them, the 5th test point is the origin and is located in the exact middle of the detection area. Then, the blind tag will be placed on every test point.

3.2 Positioning performance testing

3.2.1 Performance comparison

For each test point, five results under five different angles have been obtained. The experiment focuses on comparing the performance between the traditional ML and the improved ML in a dynamic environment. The comparison is shown in Fig. 7.

Fig. 7 Comparison of the two algorithms in different α

It can be seen from Fig. 7 that for all test points,the result of the improved ML is more focused and consistent with the real position of test points than that of the traditional ML. The three rectangular boxes in Fig. 7 represent the range of the estimated positions of a test point. This indicates that the improved positioning algorithm has a better position effect. For test points 7~9, the reason for the dispersion of the positioning accuracy is that there are some errors in the fitting curves of the nearby reference tags (fi,m(dev) in section 2.2), resulting in incomplete ranging correction.

Moreover, the above positioning results are used for access detection to obtain the access status of the blind tags at different test points (in Fig. 8).

Fig. 8 The detection results

For the 9 test points, the detection accuracy of the improved ML algorithm is higher than that of the traditional ML algorithm.

In this paper, RMSE (root mean square error) is chosen as the performance index of the positioning algorithm, which is defined as follows:

whereLis the number of test points, and (xi,yi) is the real position, and (x?i,y?i) is the estimated position.

The comparison of the positioning error between the traditional ML method and the improved ML method based on RMSE is shown in Fig. 9.

Fig. 9 The comparison of algorithm errors

Due to metal interference, the average RMSE of the traditional ML algorithm is 20 cm, and the RMSE even reaches 52 cm when α=0?. A positioning error with a few tens of centimeters near the entrance/exit will result in a large detection error. The algorithm in this paper can effectively eliminate the influence of the metal environment on the RSSI ranging, thus indirectly improving the localization effect and stability. After ranging correction, the RMSE of the algorithm is controlled within 3 cm and the localization accuracy is improved by 85%. Compared with the traditional ML algorithm, the improved positioning algorithm has significantly improved both the positioning accuracy and the stability, resulting in stable and accurate detection.

3.2.2 Dynamic positioning experiment

Furthermore, the positioning algorithm is applied to dynamic positioning, and a person carries the RFID tag to enter and exit the door according to the planned trajectory when α=90° (in Fig. 10).Compared with the traditional ML algorithm, the estimation trajectory of the improved ML algorithm is closer to the actual trajectory of the person from an overall perspective, especially in the middle area of the entry/exit, e.g. at (0,0). The positioning effect of this area is the key to the detection effect for the access detection system. Table 1 shows the positioning performance of all sampling points under the RMSE criterion. Compared with the traditional ML algorithm, the improved ML algorithm in this paper is with smaller positioning errors and higher accuracy in real-time position.

Table 1 Positioning performance of traditional ML and improved ML

Fig. 10 Comparison of real-time position.

3.3 Detection performance testing

The effectiveness of the detection technology will be verified in the access detection system. Meanwhile,two entry and exit strategies are designed as shown in Table 2.

Table 2 Entry and exit strategies

In this experiment, the subject is required to walk 100 times for every strategy when α=90°. Therefore,two types of walk strategies are performed 200 times for each subject. Moreover, the tag ID of the first subject is 1, and so on. The red tag represents the outside of the detection area, and the blue tag represents the inside of the detection area. The detection performance is demonstrated in Fig. 11 and Fig. 12. The average detecting accuracy under α=[60°,90°,120° ] is shown in Table 3.

Fig. 11 Detection performance on the outside

Fig. 12 Detection performance on the inside

Table 3 Entry and exit strategies %

It can be seen from Fig. 11 and Fig. 12 that when the subject is outside of the detection area, the tag is also on the outside and shows a red state, and when the subject enters the inside, the tag also enters the inside of the detection area at the same time and the state of the tag converts into blue. This indicates that the detection results are as expected.

For the two common entry and exit strategies, the accuracy of detecting people entering /exiting is up to 99% or more. This verifies that the access detection technology has a high detection accuracy and it is enough for application.

4 Conclusions

The existing RSSI-based positioning algorithms have the disadvantages of low positioning accuracy and poor stability due to the metal interferce, resulting in detection errors. An access detection method with an accurate positioning algorithm based on LF RFID is proposed in this paper. The correction fingerprint database is established, which can correct the ranging error in the positioning stage, and then the positioning effect is better. In the positioning experiment,compared with the traditional ML, the improved ML method has higher positioning accuracy and better algorithm stability, which can reach 3 cm and achieve an 85% improvement in localization accuracy generally. In the detection experiment, the proposed access detection technology is also able to accurately detect the real access status of the experimental subject under two walk strategies, which is enough for application because of the detection accuracy of up to 99%. However, considering the spatial inhomogeneity of RSSI and different walk actions, in the future, the accuracy and stability of the detection method will need to be further enhanced.

主站蜘蛛池模板: 亚洲无码日韩一区| 亚洲欧美精品一中文字幕| 免费播放毛片| 日本午夜精品一本在线观看| 在线色国产| 91精品最新国内在线播放| 欧美影院久久| 亚洲中文字幕久久精品无码一区 | jizz在线观看| 久久九九热视频| 精品久久蜜桃| 亚国产欧美在线人成| 日韩a在线观看免费观看| 欧美一区国产| 久久精品aⅴ无码中文字幕| 亚洲最大看欧美片网站地址| 91精品伊人久久大香线蕉| 一级做a爰片久久毛片毛片| 国产精品成人一区二区不卡| 精品人妻AV区| 日韩在线播放中文字幕| 六月婷婷激情综合| 国产视频自拍一区| 精品综合久久久久久97超人| 亚洲日韩精品欧美中文字幕| 精品国产美女福到在线不卡f| 免费高清a毛片| 波多野结衣中文字幕久久| 国产精品永久不卡免费视频 | 最新国产高清在线| 亚洲国产精品美女| 久久国产精品波多野结衣| 911亚洲精品| 成人亚洲天堂| 中文字幕亚洲综久久2021| 国产高清不卡| 手机在线国产精品| 国产精品久久久久鬼色| 国外欧美一区另类中文字幕| 国产视频 第一页| 国产精品香蕉在线| a级毛片毛片免费观看久潮| 动漫精品中文字幕无码| 日韩人妻少妇一区二区| 国产亚洲第一页| 亚洲欧美日韩成人高清在线一区| 亚洲成综合人影院在院播放| 欧美日本中文| 超碰精品无码一区二区| 国产在线专区| 久久精品人人做人人综合试看| 国产在线观看精品| 久久6免费视频| 久久综合色视频| 欧美亚洲欧美| 波多野一区| 日本三级欧美三级| 91久久精品日日躁夜夜躁欧美| 久久香蕉国产线看精品| a级毛片免费播放| 久久综合伊人 六十路| 玖玖免费视频在线观看| 在线观看的黄网| 欧美成人精品高清在线下载| h网址在线观看| 综合色天天| 黄色网页在线播放| 久久精品无码一区二区国产区| 国产精品视频第一专区| 999精品色在线观看| 国产中文一区二区苍井空| 国产美女在线免费观看| 欧美日韩va| 国产亚洲精品精品精品| 九九热视频在线免费观看| 91亚洲视频下载| 国产SUV精品一区二区| 精品成人一区二区三区电影 | 综合人妻久久一区二区精品 | jizz亚洲高清在线观看| 国产亚洲精品97在线观看| 日本在线国产|