{"id":159736,"date":"2007-05-01T00:00:00","date_gmt":"2007-05-01T00:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/assessing-and-optimizing-the-range-of-uhf-rfid-to-enable-real-world-pervasive-computing-applications\/"},"modified":"2020-03-16T13:24:57","modified_gmt":"2020-03-16T20:24:57","slug":"assessing-and-optimizing-the-range-of-uhf-rfid-to-enable-real-world-pervasive-computing-applications","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/assessing-and-optimizing-the-range-of-uhf-rfid-to-enable-real-world-pervasive-computing-applications\/","title":{"rendered":"Assessing and Optimizing the Range of UHF RFID to Enable Real-World Pervasive Computing Applications"},"content":{"rendered":"<div class=\"asset-content\">\n<p>Radio frequency identification (RFID) may be used to automatically detect, locate and\/or identify objects, making it an ideal candidate for many pervasive computing applications. As RFID technology improves in terms of cost and performance, it is increasingly being explored in a variety of applications, ranging from eldercare through to the smart supply chain. However, while passive UHF RFID has many benefits over other RFID variants, reliable operation as the tag moves in the environment is inherently difficult to predict and can represent a significant challenge. In this paper, we present a novel and practical experimental method called attenuation-thresholding which may be used to characterize the operating range of such RFID systems. The results presented demonstrate the advantages of our method over the conventional read-rate approach. We also demonstrate a novel approach to collecting the measurements in range characterization experiments using robotic automation. Finally, we show how the application of attenuation-thresholding in combination with robotic automation can be used to optimize tag placement on an object. In addition to the clear relevance of this work to the many RFID-based pervasive computing applications reported in the literature and currently under development, it also has broad applicability in other RFID application domains. We conclude with a number of ideas for future extensions to this work.<\/p>\n<\/div>\n<p><!-- .asset-content --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Radio frequency identification (RFID) may be used to automatically detect, locate and\/or identify objects, making it an ideal candidate for many pervasive computing applications. As RFID technology improves in terms of cost and performance, it is increasingly being explored in a variety of applications, ranging from eldercare through to the smart supply chain. However, while [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":null,"msr_publishername":"Springer Verlag","msr_publisher_other":"","msr_booktitle":"","msr_chapter":"","msr_edition":"","msr_editors":"","msr_how_published":"","msr_isbn":"","msr_issue":"","msr_journal":"","msr_number":"","msr_organization":"","msr_pages_string":"","msr_page_range_start":"","msr_page_range_end":"","msr_series":"","msr_volume":"","msr_copyright":"","msr_conference_name":"Proceedings of Pervasive 2007","msr_doi":"","msr_arxiv_id":"","msr_s2_paper_id":"","msr_mag_id":"","msr_pubmed_id":"","msr_other_authors":"","msr_other_contributors":"","msr_speaker":"","msr_award":"","msr_affiliation":"","msr_institution":"","msr_host":"","msr_version":"","msr_duration":"","msr_original_fields_of_study":"","msr_release_tracker_id":"","msr_s2_match_type":"","msr_citation_count_updated":"","msr_published_date":"2007-5-1","msr_highlight_text":"","msr_notes":"","msr_longbiography":"","msr_publicationurl":"","msr_external_url":"","msr_secondary_video_url":"","msr_conference_url":"","msr_journal_url":"","msr_s2_pdf_url":"","msr_year":0,"msr_citation_count":0,"msr_influential_citations":0,"msr_reference_count":0,"msr_s2_match_confidence":0,"msr_microsoftintellectualproperty":true,"msr_s2_open_access":false,"msr_s2_author_ids":[],"msr_pub_ids":[],"msr_hide_image_in_river":0,"footnotes":""},"msr-research-highlight":[],"research-area":[13552],"msr-publication-type":[193716],"msr-publisher":[],"msr-focus-area":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-159736","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-hardware-devices","msr-locale-en_us"],"msr_publishername":"Springer Verlag","msr_edition":"","msr_affiliation":"","msr_published_date":"2007-5-1","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"","msr_isbn":"","msr_journal":"","msr_volume":"","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"226642","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"file","viewUrl":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2007\/05\/pervasive-2007-tag-testing.pdf","id":"226642","title":"pervasive 2007 tag testing.pdf","label_id":"243132","label":0}],"msr_related_uploader":"","msr_citation_count":0,"msr_citation_count_updated":"","msr_s2_paper_id":"","msr_influential_citations":0,"msr_reference_count":0,"msr_arxiv_id":"","msr_s2_author_ids":[],"msr_s2_open_access":false,"msr_s2_pdf_url":null,"msr_attachments":[{"id":226642,"url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2007\/05\/pervasive-2007-tag-testing.pdf"}],"msr-author-ordering":[{"type":"user_nicename","value":"Steve Hodges","user_id":33628,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=Steve Hodges"},{"type":"text","value":"Alan Thorne","user_id":0,"rest_url":false},{"type":"text","value":"Hugo Mallinson","user_id":0,"rest_url":false},{"type":"text","value":"Christian Floerkemeier","user_id":0,"rest_url":false}],"msr_impact_theme":[],"msr_research_lab":[],"msr_event":[],"msr_group":[144767],"msr_project":[642765,237759],"publication":[],"video":[],"msr-tool":[],"msr_publication_type":"inproceedings","related_content":{"projects":[{"ID":642765,"post_title":"Energy harvesting and wireless power transfer","post_name":"energy-harvesting-and-wireless-power-transfer","post_type":"msr-project","post_date":"2020-09-05 13:36:25","post_modified":"2023-11-28 10:45:17","post_status":"publish","permalink":"https:\/\/www.microsoft.com\/en-us\/research\/project\/energy-harvesting-and-wireless-power-transfer\/","post_excerpt":"The continuing growth of connected devices, many of which are mobile and wireless, brings with it a practical challenge: how can we power these devices without placing the burden of recharging or replacing batteries onto users? We are exploring different ways of harvesting energy that is naturally available in the operating environment and also energy that explicitly provided by nearby sources in the form of wireless power transfer emitters. We are also developing devices with&hellip;","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/642765"}]}},{"ID":237759,"post_title":"RFID Performance Testing","post_name":"rfid-performance-testing","post_type":"msr-project","post_date":"2016-06-10 09:10:42","post_modified":"2020-03-16 13:23:46","post_status":"publish","permalink":"https:\/\/www.microsoft.com\/en-us\/research\/project\/rfid-performance-testing\/","post_excerpt":"Radio frequency identification (RFID) may be used to automatically detect, locate and\/or identify objects, making it an ideal candidate for many pervasive computing applications. As RFID technology improves in terms of cost and performance, it is increasingly being explored in a variety of applications, ranging from eldercare through to the smart supply chain. However, while passive UHF RFID has many benefits over other RFID variants, reliable operation as the tag moves in the environment is&hellip;","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/237759"}]}}]},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/159736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/159736\/revisions"}],"predecessor-version":[{"id":514763,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/159736\/revisions\/514763"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=159736"}],"wp:term":[{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=159736"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=159736"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=159736"},{"taxonomy":"msr-publisher","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publisher?post=159736"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=159736"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=159736"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=159736"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=159736"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=159736"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=159736"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=159736"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=159736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}