Dynamic indoor localization based on active RFID for healthcare applications: A shape constraint approach

Wei Hong Chen, Herbert H. Chang, T. H. Lin, P. C. Chen, L. K. Chen, S. J. Hwang, D. H.J. Yen, Hanna S. Yuan, Woei C. Chu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

RFID-based localization has received considerable attention within the healthcare industry and has made a major impact on the healthcare system in hospitals. In this paper, we propose a new location tracking algorithm that aims to improve the accuracy of indoor localization for healthcare applications. In our approach, a cost function associated with a shape constraint factor is used to find the optimal reference tag positions that enclose the tracking tag. The cost function consists of the similarity and disparity of signal strength between the tracking and reference tags, as well as geometrical correlation properties. The experimental results indicate that the proposed shape constraint algorithm provides considerable improvement in average estimation error as compared with existing methods. We believe that this new algorithm is of potential value in dynamic location tracking of objects for healthcare applications.

Original languageEnglish
Title of host publicationProceedings of the 2009 2nd International Conference on Biomedical Engineering and Informatics, BMEI 2009
DOIs
StatePublished - 2009
Event2009 2nd International Conference on Biomedical Engineering and Informatics, BMEI 2009 - Tianjin, China
Duration: 17 Oct 200919 Oct 2009

Publication series

NameProceedings of the 2009 2nd International Conference on Biomedical Engineering and Informatics, BMEI 2009

Conference

Conference2009 2nd International Conference on Biomedical Engineering and Informatics, BMEI 2009
Country/TerritoryChina
CityTianjin
Period17/10/0919/10/09

Fingerprint

Dive into the research topics of 'Dynamic indoor localization based on active RFID for healthcare applications: A shape constraint approach'. Together they form a unique fingerprint.

Cite this