Deep learning assisted robust detection techniques for a chipless RFID
sensor tag
- URL: http://arxiv.org/abs/2308.13944v1
- Date: Sat, 26 Aug 2023 19:20:35 GMT
- Title: Deep learning assisted robust detection techniques for a chipless RFID
sensor tag
- Authors: Nadeem Rather, Roy B. V. B. Simorangkir, John L. Buckley, Brendan
O'Flynn, Salvatore Tedesco
- Abstract summary: We present a new approach for robust reading of identification and sensor data from chipless RFID sensor tags.
For the first time, Machine Learning (ML) and Deep Learning (DL) regression modelling techniques are applied to a dataset of Radar Cross Section (RCS) data.
We report, for the first time, the effect of varying tag surface shapes, tilt angles, and read ranges that were incorporated into the training of models for robust detection of ID and sensing values.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: In this paper, we present a new approach for robust reading of identification
and sensor data from chipless RFID sensor tags. For the first time, Machine
Learning (ML) and Deep Learning (DL) regression modelling techniques are
applied to a dataset of measured Radar Cross Section (RCS) data that has been
derived from large-scale robotic measurements of custom-designed, 3-bit
chipless RFID sensor tags. The robotic system is implemented using the
first-of-its-kind automated data acquisition method using an ur16e
industry-standard robot. A large data set of 9,600 Electromagnetic (EM) RCS
signatures collected using the automated system is used to train and validate
four ML models and four 1-dimensional Convolutional Neural Network (1D CNN)
architectures. For the first time, we report an end-to-end design and
implementation methodology for robust detection of identification (ID) and
sensing data using ML/DL models. Also, we report, for the first time, the
effect of varying tag surface shapes, tilt angles, and read ranges that were
incorporated into the training of models for robust detection of ID and sensing
values. The results show that all the models were able to generalise well on
the given data. However, the 1D CNN models outperformed the conventional ML
models in the detection of ID and sensing values. The best 1D CNN model
architectures performed well with a low Root Mean Square Error (RSME) of 0.061
(0.87%) for tag ID and 0.0241 (3.44%) error for the capacitive sensing.
Related papers
- Unsupervised Domain Adaptation for Self-Driving from Past Traversal
Features [69.47588461101925]
We propose a method to adapt 3D object detectors to new driving environments.
Our approach enhances LiDAR-based detection models using spatial quantized historical features.
Experiments on real-world datasets demonstrate significant improvements.
arXiv Detail & Related papers (2023-09-21T15:00:31Z) - Object Size-Driven Design of Convolutional Neural Networks: Virtual Axle
Detection based on Raw Data [0.0]
This paper presents a new approach for detecting axles, enabling real-time application of Bridge Weigh-In-Motion (BWIM) systems without dedicated axle detectors.
The proposed Virtual Axle Detector with Enhanced Receptive Field (VADER) is independent of bridge type and sensor placement.
By using raw data instead of spectograms as input, the receptive field can be enhanced without increasing the number of parameters.
arXiv Detail & Related papers (2023-09-04T12:53:54Z) - VR-LENS: Super Learning-based Cybersickness Detection and Explainable
AI-Guided Deployment in Virtual Reality [1.9642496463491053]
This work presents an explainable artificial intelligence (XAI)-based framework VR-LENS for developing cybersickness detection ML models.
We first develop a novel super learning-based ensemble ML model for cybersickness detection.
Our proposed method identified eye tracking, player position, and galvanic skin/heart rate response as the most dominant features for the integrated sensor, gameplay, and bio-physiological datasets.
arXiv Detail & Related papers (2023-02-03T20:15:51Z) - The Tags Are Alright: Robust Large-Scale RFID Clone Detection Through
Federated Data-Augmented Radio Fingerprinting [11.03108444237374]
We propose a novel training framework based on federated machine learning (FML) and data augmentation (DAG) to boost the accuracy of RFID clone detection.
To the best of our knowledge, this is the first paper experimentally demonstrating the efficacy of FML and DA on a large device population.
arXiv Detail & Related papers (2021-05-08T10:48:02Z) - ALT-MAS: A Data-Efficient Framework for Active Testing of Machine
Learning Algorithms [58.684954492439424]
We propose a novel framework to efficiently test a machine learning model using only a small amount of labeled test data.
The idea is to estimate the metrics of interest for a model-under-test using Bayesian neural network (BNN)
arXiv Detail & Related papers (2021-04-11T12:14:04Z) - Graph Neural Networks Based Detection of Stealth False Data Injection
Attacks in Smart Grids [6.188609547699017]
False data injection attacks (FDIAs) aim to break the integrity of measurements by injecting false data into the smart metering devices in power grids.
We present a generic, localized, and stealth (unobservable) attack generation methodology and publicly accessible datasets for researchers to develop and test their algorithms.
We propose a Graph Neural Network (GNN) based, scalable and real-time detector of FDIAs that efficiently combines model-driven and data-driven approaches.
arXiv Detail & Related papers (2021-04-05T17:02:48Z) - Self-Supervised Person Detection in 2D Range Data using a Calibrated
Camera [83.31666463259849]
We propose a method to automatically generate training labels (called pseudo-labels) for 2D LiDAR-based person detectors.
We show that self-supervised detectors, trained or fine-tuned with pseudo-labels, outperform detectors trained using manual annotations.
Our method is an effective way to improve person detectors during deployment without any additional labeling effort.
arXiv Detail & Related papers (2020-12-16T12:10:04Z) - A data-set of piercing needle through deformable objects for Deep
Learning from Demonstrations [0.21096737598952847]
This paper presents a dataset of inserting/piercing a needle with two arms of da Vinci Research Kit in/through soft tissues.
We implement several deep RLfD architectures, including simple feed-forward CNNs and different Recurrent Convolutional Networks (RCNs)
Our study indicates RCNs improve the prediction accuracy of the model despite that the baseline feed-forward CNNs successfully learns the relationship between the visual information and the next step control actions of the robot.
arXiv Detail & Related papers (2020-12-04T08:27:06Z) - Manual-Label Free 3D Detection via An Open-Source Simulator [50.74299948748722]
We propose a manual-label free 3D detection algorithm that leverages the CARLA simulator to generate a large amount of self-labeled training samples.
Domain Adaptive VoxelNet (DA-VoxelNet) can cross the distribution gap from the synthetic data to the real scenario.
Experimental results show that the proposed unsupervised DA 3D detector can achieve 76.66% and 56.64% mAP on KITTI evaluation set.
arXiv Detail & Related papers (2020-11-16T08:29:01Z) - Contextual-Bandit Anomaly Detection for IoT Data in Distributed
Hierarchical Edge Computing [65.78881372074983]
IoT devices can hardly afford complex deep neural networks (DNN) models, and offloading anomaly detection tasks to the cloud incurs long delay.
We propose and build a demo for an adaptive anomaly detection approach for distributed hierarchical edge computing (HEC) systems.
We show that our proposed approach significantly reduces detection delay without sacrificing accuracy, as compared to offloading detection tasks to the cloud.
arXiv Detail & Related papers (2020-04-15T06:13:33Z) - Radioactive data: tracing through training [130.2266320167683]
We propose a new technique, emphradioactive data, that makes imperceptible changes to this dataset such that any model trained on it will bear an identifiable mark.
Given a trained model, our technique detects the use of radioactive data and provides a level of confidence (p-value)
Our method is robust to data augmentation and backdoority of deep network optimization.
arXiv Detail & Related papers (2020-02-03T18:41:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.