Design and Implementation of Electronic ID System for...
Transcript of Design and Implementation of Electronic ID System for...
Design and Implementation of Electronic ID
System for Inventory ManagementFirst Semester Report
Fall Semester 2012
– Full Report –Rev. 2
byC. Melissa Vetterling
Luke Engelbert-Fenton
Prepared to partially fulfill the requirements for ECE401
Department of Electrical and Computer EngineeringColorado State University
Fort Collins, CO 80526
Project adviser: Dr. Ali Pezeshki
Approved by: Dr. Ali Pezeshki
i
ABSTRACT
This report presents the interim results of a remote sensing solution to managing the status of liveanimals in laboratory setting. Lab Animal Resources (LAR) is a facility on the Colorado StateUniversity Campus, which houses and cares for animals that are to be part of scientific studies. LARfaces a challenge in periodically reviewing the count and location of occupied cages, tracking the careand location history in each of those cages, and maintaining all the collected information and history ina database format. Manual data collection is labor intensive and time consuming, as well as introducinga greater risk of human error. LAR desires a remote sensing solution in order to reduce the labor andcost as well as reducing the risk of human transcription errors.
Commercially available wireless solutions exist, but these are all a magnitude of order more expensivethan the budget LAR has for this application. In addition the commercial solutions do not supportimplementation in incremental quantities. Our team analyzed various concepts for wirelesscommunication in order to design a solution that balances the coupled dynamics of budget constraintsand physical, functional, and environmental requirements. The best system configuration wasdetermined to be passive RFID tags on the cages, with a mobile hand-held RFID reader with wirelessinternet capabilities, control software and database structure both written in C++ language, with cablesavailable for hard-wire transfer of information. This system concept must be validated prior toimplementation, with emphasis on the attenuation due to operational environment, and softwarereliability. Testing and validation will begin December 2012, and is expected to last through March2013. Delivery of Proof of Concept will occur May 1, 2013.
ii
Table of Contents
1. INTRODUCTION.................................................................................................................................11.1 Lab Function:..................................................................................................................................11.2 Facility Construction and Layout....................................................................................................11.3 Granite Database.............................................................................................................................11.4 Census and Billing:.........................................................................................................................11.5 Investigation Life Cycle..................................................................................................................21.6 Needs for LAR................................................................................................................................3
2. REQUIREMENTS.................................................................................................................................42.1 List of Requirements.......................................................................................................................42.2 Ethics...............................................................................................................................................8
3. ANALYSIS OF PREDECESSOR SYSTEMS.....................................................................................104. SYSTEM DESIGN..............................................................................................................................10
4.1 Applications of Systems Engineering............................................................................................104.2 Candidate Concepts.......................................................................................................................12
5. SYSTEM DEVELOPMENT...............................................................................................................145.1 System Map...................................................................................................................................155.2 Elements of the System.................................................................................................................17
6. Plans for Testing...................................................................................................................................226.1. Geometric Parameters for Testing Hardware ..............................................................................22 6.2. Environmental Parameters for Testing Hardware.......................................................................236.3. Criteria For Successful Hardware Tests.......................................................................................246.4. Software Planned Testing Strategy...............................................................................................24
7. Future Work..........................................................................................................................................258. Conclusion...........................................................................................................................................259. References............................................................................................................................................2610. Appendix A: Abbreviations................................................................................................................2711. Appendix B: Budget...........................................................................................................................28
10.1 Funding........................................................................................................................................2810.2 Cost - Proof of Concept:..............................................................................................................2810.3 Cost - Initial System Wide Deployment:.....................................................................................28
12. APPENDIX C (i): Project Schedule, Rev 1.......................................................................................29 APPENDIX C (ii): Project Schedule, Rev 2......................................................................................32
Illustration Index
Illustration 1: Rack of Cages......................................................................................................................1Illustration 2: FY 13 CSU Faculty Animal Care Per Diem Rates..............................................................2Illustration 3: Sample Cage Card in Holder...............................................................................................3Illustration 4: Hearing Ranges, Heffner & Heffner, 2007..........................................................................9Illustration 5: EID System Map...............................................................................................................15Illustration 6: Graphical Representation of Max Lateral Offset..............................................................22Illustration 7: Graphical Representation of Max Read Distance.............................................................22Illustration 8: Graphical Representation of Max Angular Deflection......................................................23
iii
Index of Tables
Table 1: List of Requirements....................................................................................................................4Table 2: Cost – Proof of Concept.............................................................................................................28Table 3: Cost – Initial System-Wide Deployment....................................................................................28Table 4: Cost – Additional Monthly Cost................................................................................................28
iv
1. INTRODUCTION
1.1 Lab Function:
Laboratory Animal Resources (LAR) strives “to use our expertise to provide the highest standard of
care for laboratory animals in support of the Colorado State University research community.” They
maintain over 3500 cages, housing animals such as calves, pigs, cats, dogs, rodents, etc. These cages
are spread across two facilities – one at Colorado State University (CSU) main campus, and one at the
CSU Foothills Campus. LAR maintains these animals as clients, referred to as private investigators,
perform research studies.
1.2 Facility Construction and Layout
As stated previously, LAR consists of two facilities which
jointly comprise about 20,000 sq ft. These two facilities
house all the cages in rooms that are approximately 16’ x 25’
along corridors with several rooms in each facility. The
majority of rooms contain metal racks which hold the cages
as shown in Illustration 1.
1.3 Granite Database
Granite is a database management system currently used by
Laboratory Animal Resources to track all of their cage
information and billing procedures. This includes contact
information for the investigators, billing rates, animals
associated to each investigator, protocol information, and
cage information.
Support for the version of Granite currently being used by
LAR will expire within the next 5 years. Upgrading to a
newer version of Granite is expensive, so LAR is looking to
alternate solutions.
1.4 Census and Billing:
Census
Currently LAR performs a monthly census. This entails a staff member printing out the cage numbers
that should be in each room based on the database information. They take these printouts and go into
each room and manually read each cage card number and make sure it belongs in the room. After going
1
Illustration 1: Rack of Cages
through each room, the data then needs to be compiled by hand to identify the discrepancies found.
Staff then has to go and remedy each of the problems that arose. Over the course of a month, many
private investigators will move cages, start using new cages, and remove some cages. This means that
the information LAR has in their database can differ drastically from what is actually in each room
within a month. This then leads to significant loss in revenue for LAR.
Billing
Laboratory Animal Resources
bills their customers on a per day
basis. Rates differ based on the
type of animal and other factors.
Figure X is some example of
these rates.
In order to bill a client accurately,
LAR needs to have information
on exactly how many days a
client has used a cage. This is
where the information is not exact
and LAR has seen loss in
revenue. Because LAR only does
a monthly census and private
investigators have the ability to
add cages when they need, LAR
does not have a good idea of when a cage was added. Currently they start billing from the date of the
census, which means they don’t bill for the amount of days the cage was used before the census was
taken. This is where the primary need for a new system process arose.
1.5 Investigation Life Cycle
This sequence offers insight into the current process employed at Lab Animal Resources.
New Protocol – Entry in the system
1. The first step is a private investigator generates a new protocol (request).
2. A staff member from LAR then takes that information and creates a new Animal Order within
the Granite database. The Animal Order details all the needs of the investigator such as the
animal desired, for what purpose, special restrictions, etc. as well as details LAR uses such as
facility location, room location, etc.
2
Illustration 2: FY 13 CSU Faculty Animal Care Per Diem Rates
3. After the account information has been approved, LAR contacts
certain animal vendors to purchase the animals necessary for the
private investigator.
4. Cage cards are then generated to put on all the cages the private
investigator will be using.
5. The animals arrive and are then put in the appropriate cages and put
in the rooms that were assigned.
Upkeep – Census Capture
6. Staff member prints out room reports from Granite database.
7. Staff member goes into a room and checks off all cages that are seen
on the report, while recording all cages in the room that are not on the
report as well as noting the cages that are missing from the room
when they are listed on the report.
8. Staff repeats step 7 for every room.
9. Staff compiles data from reports and addresses all irregularities: moving cages where they need
to go, adding new cages to database (beginning billing cycle), removing cages from database
(see step 10)
Cage Termination – Removal from the system
10. Once a private investigator has finished using a cage, they put the cage card in a box designated
for cages that need termination.
11. An LAR staff member collects cage cards from termination box and manually stops the billing
cycle for that cage.
1.6 Needs for LAR
This project arose from two different issues. One being that Granite will soon not be supported, and the
other that LAR is losing money based on the inability of their current system process to facilitate
weekly billing. This prompted the desire for a full system overhaul. Such an effort would include
replacing the current database with a new updated database and incorporate a new census gathering
system and new billing process.
The main needs of LAR is to create a new database with the same functionality (with a few
modifications) as Granite currently has, and also to implement a new tracking system to quickly and
3
Illustration 3: Sample
Cage Card in Holder
reliably take a census of each room and compare the results with the database information. This new
tracking system is meant to significantly reduce the census time so it can be done on a weekly basis,
thereby cutting down on profit losses.
Specific needs identifies included:
� LAR has a need to have a complete and correct census,
� LAR, as part of the census, needs to have traceable cage locations,
� LAR has a need to generate periodic billing statements, supported by the census.
� LAR desires to generate billing summaries on a weekly basis,
� LAR seeks a system to facilitate maintaining adequate training of staff,
� LAR requires a secure system facility,
� LAR requires a solution to be maintainable,
� LAR requires continuous database function with minimal interruption,
� LAR requires a solution that can function within the constraints placed on them as an operating
animal laboratory.
2. REQUIREMENTS
This project entails 17 functional requirements and five physical requirements that derive from the
project needs, the intended operational environment, and the intended use. These requirements have
evolved over the course of the semester, and therefore now include information specific to the use of
RFID for identifying cages.
2.1 List of Requirements
1 FUNCTIONAL
1.1 Link RFID to Cage Card Number in Database.
Need: Derives from the fundamental need of the system to track cages.
Notes: Database is currently Granite, but will be replaced.
1.2 Maintain a Database with Same Field Information Currently Stored byGranite.
4
Need: Derives from the need to facilitate the functions of LaboratoryAnimal Resources.
1.3 Cross-Check to Identify any Cage Card Records that are Not Linked toRFID.
Need: Derives from the need to have a complete and correct census.
Notes: This relates specifically to the use of census data for billing.
1.4 Administrator and User Login Functionality.
Need: Derives from the need to maintain a secure facility system.
Notes: It will be necessary that only authorized users make certainchanges.
1.5 Ability to remove RFID / Cage Card From the System Both Manually & ViaScan.
Need: Derives from the need to have a complete and correct census.
Notes: Serves to remove duplicate entries & cages no longer occupied.
1.6 Ability to Track Errors Due to RFIDs Without Cage Card Assignments andGenerate Error Report.
Need: Derives from the need to have a complete & correct census.
Derives from the need to maintain a secure facility system.
Notes: Serves to ensure new cage assignments are only generated byauthorized users.
1.7 Ability to Track History of RFID and Cage Card System
Need: Derives from the need to maintain adequate training of staff.
Notes: Serves as a means to identify staff potentially in need of additionaltraining, once errors - such as improper cage transfers - are found.
1.8 Ability to Prevent Double-Reads
Need: Derives from the need to have a complete & correct census.
Notes: Serves to ensure only unique RFID tags are reported on census,removing the need for compilation by a staff member.
1.9 Ability to Generate a Census Report Listing the Location & Cage CardInformation.
Need: Derives from the need to have a complete & correct census.
Derives from the need to have traceable locations of cages.
Notes: Due to constraints on animal care, and changing environmentconditions between rooms, Laboratory Animal Resources intendsto track room location of specific RFIDs, in addition to tracking thetotal count of RFIDs.
1.10 Generate an Alert if Mismatch Occurs Between Number of Cages Allocated
5
to a Location & Number of RFIDs Reported on Census of that Location.
Need: Derives from the need to have a complete & correct census.
Derives from the need to have traceable locations of cages.
1.11 Database Information Editable by User
Need: Derives from the need to have a complete & correct census.
Derives from the need to have maintainability.
Notes: User, as referred to here, is not necessarily the same “User”
referred to in Requirement 1.4
1.12 Generate Warnings if Census Dates are Set for “Future”
Need: Derives from the need to have a complete & correct census.
Notes: Serves to reduce incorrect census due to human error.Example: “This will end census in 11 months, do you wish toproceed?”
1.13 Ability to Start & Stop Census
Need: Derives from the need to have a complete & correct census.
Notes: Allows staff to make adjustments to billing procedures, amounts,etc., based on arrangements with investigators.“Start Census” and “Stop Census” indicate a beginning and end toa billable period for a given investigator. Relates to Requirement 1.11.
1.14 Calculate the Total Number of Care-Days for Each Investigator & theCorresponding Charges Following a Census
Need: Derives from the need to generate periodic billing statements.
Notes: The necessary information for generation of a billing summary willbe drawn from the census results, and information stored in thedatabase.
1.15 Ability to Feed Billing Information to Database.
Need: Derives from the need to generate periodic billing statements.
Notes: Database is currently Granite, but will be replaced.There is an inherent unstated need that billing statements becorrect.
1.16 System Must be Amenable to Modular Implementation.
Need: Derives from the need to maintain continuous database functionwith minimal interruption.
Notes: As a 24-hour facility, it is necessary that Laboratory AnimalResources be able to continue business operations at all times
6
throughout the period of system development and deployment.
1.17 Minimum Read Distance Must be at Least 12 Inches.
Need: Derives from the need to conduct a full census on a weekly basis.
Notes: It is estimated that census scan time per room be 5 min at theoutside to facilitate this need.It is estimated that a read distance shorter than 12” will not resultin a measurable net benefit to Laboratory Animal Resources overthe current system.
2 PHYSICAL
2.1 Units Must be Hand-Held and Mobile
Need: Derives from the need to conduct a full census on a weekly basis.
Notes: This requirements is additionally related to the constraints of theoperational environment. Cages are located among several rooms,and metal shelves within the room lower expectations for scans at adistance greater than 3 feet.
2.2 Units Must Perform Wireless Scan of Cage IDs
Need: Derives from Requirement 2.1
2.3 Units Must be Capable of Performing Wireless Updates From & To theDatabase
Need: Derives from the need to conduct a full census on a weekly basis.
Notes: This is an additional requirement to reduce the time required toconduct a full census.This requirement has the lowest priority of all requirements under1 and 2.
2.4 Any Parts that are Not Disposable Must Be Autoclavable
Need: Derives from external requirements placed on Laboratory AnimalResources, based on standards of care in animal laboratories.
Notes: Laboratory Animal Resources would prefer disposable RFID tagsdue to internal customary procedures.
2.5 All Elements Used for Physically Identifying Cages and Reading RFIDsMust be Safe for Use in the Proximity of Laboratory Animals.
Need: Derives from “Guide for the Care and Use of Laboratory Animals”,8th ed., Office of Laboratory Animal Welfare, National Institute ofHealth
Derives from IEEE Policies Section 7.8, Code of Ethics
Notes: For further detail, see following section on ethics.
– End of Requirements –
7
2.2 Ethics
We are instructed on ethics by two sources:
IEEE Code of Ethics
We... [hereby agree]...
to accept responsibility in making decisions consistent with the safety,health, and welfare of the public, and to disclose promptly factors thatmight endanger the public or the environment.
IEEE Policies, Section 7.8-1
While this does not instruct us directly on the safety, health, or welfare of animals, we find two
compelling implications of this policy on our system.
1. We cannot find it logical that Section 7.8 can by satisfied by engineering designs that do not
take into account the safety, health, and welfare of the laboratory animals, when Laboratory
Animal Resources themselves are required to do so by the regulating bodies.
2. The results of animal studies are often used to determine safety for use in humans. It follows
that any system that endangers the safety, health or welfare of the laboratory animals may
impact, in unknown ways, the outcomes of studies, and thereby indirectly impact the safety,
health, and welfare of the public.
Our maximum factor of safety is achieved, therefore, when we take into consideration the
safety, health, and welfare of the laboratory animals, in so far as they would be affected by
our system.
Office of Laboratory Animal Welfare
The Office of Laboratory Animal Welfare (OLAW), a division of NIH, through “Guide for the Care
and Use of Laboratory Animals”, 8th ed, offers instructions regarding hazards, and environmental
conditions appropriate in animal laboratories.
Radiation
OLAW instructs that hazards should be identified, and risk assessment conducted. Radiation is
specifically cited as one such potential hazard. Since any wireless device operates on principles of
radiation, we are obligated to consider minimization of incidental radiation in our design, and to make
the customer aware of such radiation so that they may conduct the appropriate risk assessment.
8
Noise
OLAW, through “Guide for the Care and Use of Laboratory Animals”, also offers instruction on
ambient noise:
The potential effects of equipment (such as video display terminals; Sales
1991; Sales et al. 1999) and materials that produce noise in the hearing
range of nearby animals can thus become an uncontrolled variable for
research experiments and should therefore be carefully considered (Turner
et al. 2007; Willott 2007). To the greatest extent possible, activities that
generate noise should be conducted in rooms or areas separate from those
used for animal housing.
Analysis
It is important to note that the hearing range of
animals extends well beyond that of humans. As
noted in Illustration 1, the hearing range of mice
can extend up to approximately 128 kHz. When
compared to the frequency of LF RFID, which is
30 kHz to 300 kHz, it is apparent that many
bandwidths in this region would potentially
expose the laboratory animals to unnecessary
noise. Such noise, in addition to being counter-
indicted by OLAW, has the potential to interfere
with animal communications.
Additionally, the use of active RFID tags would
expose the animals to ambient radiation.
Whether an RFID reader is present or not, active
tags periodically broadcast their ID. As
mentioned, we do not know the effect of RF
radiation on laboratory animals, but in the interest
of maintaining a high factor of safety, have
elected to minimize the exposure of the animals
to unnecessary radiation.
9
Illustration 4: Hearing Ranges, Heffner &
Heffner, 2007
3. ANALYSIS OF PREDECESSOR SYSTEMS
Commercially available alternatives currently exist on the market. The most common implementation
of these alternatives are systems of RFID Readers, which have a wireless link to the RFID database.
Options are available that work in LF, HF, and UHF frequency ranges. Additionally, the purchaser of a
commercial system has the option of selecting active or passive RFID tags. Most systems, however, do
not implement disposable RFID tags.
Much of the technical specifications of the commercial systems were not available without serious
intent of purchase, therefore it is unknown what the read range of such systems would be. However,
the demonstration videos and brochures seem to indicate a read range consistent with Requirement
1.17.
Two coupled factors underlie Laboratory Animal Resources' decision to pursue a solution in lieu of a
commercially available alternative, though both are financial. The first is the fact that commercial
solutions have a start-up cost well in excess of $100,000, and – while the specific numbers vary
between companies – the magnitude continuing support cost are in the $10,000 x range. Additionally,
commercially available solutions are not typically amendable for phased implementation due to the
magnitude of the fixed cost of the system as compared to the incremental cost of additional units.
A solution was sought that allows Laboratory Animal Resources to obtain an inventory system at a
smaller cost than commercially available alternatives, and whose cost is driven primarily by the
incremental cost of units.
4. SYSTEM DESIGN
4.1 Applications of Systems Engineering
As the requirements of the system were developed, it became clear that this project would involve
design in line with systems engineering, more so than components engineering. The initial
understanding of the client needs was that an RFID reader would be the primary result. However, the
need to replace the current database system, as well as the need to feed into the billing procedures,
warranted a more extensive solution.
The architecture of the solution was, therefore, designed to eventually include a wireless system for
tracking inventory, a replacement database system, and software to control the read session of the RFID
census, implement error correction, and interface with the database on both the front and back ends of
the census scan. While this neither involves the level of diversity or complexity of, for instance, a
space-craft, it has presented an undergraduate-level exposure to the principles of systems engineering.
10
Design of a System versus Design of a Component
Engineering of a system “bridges the traditional engineering disciplines.” (Kossiakoff, 2003) Design
of a system differs from design of a component primarily in the number and complexity of the
interfaces, as well as the diversity of the subsystems.
When one is designing a component, there may be many interfaces between like sub-components (for
instance, MOSFET transistor), but these are usually known and available to the circuit designer as they
develop. Additionally, the external interfaces are usually limited (i.e. Power, Ground, Signal In, Signal
Out). Furthermore, the external interfaces often join like components (for instance, adjacent circuit
boards).
Without trivializing the complexity of component design, there are clearly different dynamics an
engineer encounters when designing a system. As with component design, the interfaces may be the
site of significant difficulties that require troubleshooting. However, the interfaces a systems engineer
develops often do not exist until the system is assembled. Therefore a systems engineer may place
higher priority on better interfaces that increase the likelihood of system success, rather than the
optimization of individual components.
Similar to the above, the optimization criteria a components engineer may address are different from
those a systems engineer may address. The components engineer is often focused primarily on their
component. They are likely to be concerned with criteria such as power consumption, gain, component
performance, etc. Conversely, a systems engineer is ultimately concerned that the system works, and is
often willing to accept sub-optimal components to do so.
This is analogous to a 120-hour drivers' education course, in which each student wants as much
instructor time as possible – ultimately 120 hours. However, as with any resource, instructor time is a
limited resource, and the best drivers' education system is best achieved when each student receives
some instruction, even though this leaves no student with 'optimized instructor time.'
Modular Implementation
A systems engineer will often focus on modular implementation. This entails the separation of large
functions into modular groups, which can be interchanged, and connected, without significantly
affecting the system performance. This ties back to the system's engineering focus on interfaces –
which must be reliable and somewhat standardized – in order to facilitate the performance of a modular
system.
As part of the emphasis on modular design, a systems engineer will often seek to use validated
Commercial Off-the-Shelf components rather than using new technology, which has not been
thoroughly tested and validated.
The benefit of this emphasis is the ability to replace parts that go bad with new parts, without the need
11
to redesign the system. For our application, this seemed a necessary approach, given the desire of LAR
to implement this system in incremental steps, along with the need to maintain database functionality
throughout. (See Needs, Requirement 1.16)
Criteria for Success
The criteria for success, as a systems engineer is concerned, are addressed at the system level. For
instance, if each component comes in on-budget, but the interfacing of the components is so expensive
that the system is abandoned, the systems engineer is not satisfied. With that paradigm in mind, the
criteria for success include cost of the system, system reliability, and the system's satisfaction of the
requirements.
Our system must present a solution whose cost is lower than that of the commercially available
alternative. Similarly, it must be reliable; this is especially the case since the design team has finite
duration and we will not be available for product support during the operations phase. Lastly, in
satisfying the requirements, our system must be able to handle the quantity of data anticipated. This
includes several fields (such as census start data, billing rate, and PI) pertaining to thousands of cages.
4.2 Candidate Concepts
Our team considered several candidate concepts as potential solutions prior to commencing system
design. The most costly part of any conceptual system is the RFID reader. Therefore, that was the
main determining consideration among various candidate concepts. The RFID reader is the entire unit
that scans an RFID. It includes transmit and receive antennas, an RF module (to generate the RF
signals and process the incoming response), microcomputer and I/O ports. We selected the concept that
had the best indications for success based on the aforementioned criteria (cost, reliability, satisfaction
of requirements). The primary candidate concepts are discussed below.
Bar-code Scanner
Bar-code scanners are simple technology, which promised to have a low system cost if implemented.
In such a design, bar codes would be affixed to the cage cards. Using a bar-code scanner, an LAR staff
member could conduct a census of the room by scanning the bar-codes. This information would
interface with a database system via USB connections.
Concerns that led to the decision not to pursue this concept include:
� Often PI's will place information, such as small notes, in the cage card holder, in front of the
cage card. This would obscure a bar-code, which is estimated to increase the scan time beyond
the 5 minute target.
12
� Bar-codes are cheap technology when they are printed on paper. However, the ink and paper
could be subject to damage (such as from a spilled water container), which could obscure the
bar-code.
� Wire-free bar-code arrangements did not appear to be readily available, and therefore this
concept did not appear promising in light of requirements 2.1, 2.2.
Internal Design of RFID Reader
Our team considered the possibility of designing an RFID reader for use with the system. However,
several considerations led to the decision not to pursue this concept:
� Consultation with Stephen Hicks, an Electrical Engineer with experience in RF design informed
us that the design of the RFID Reader Module involves concepts that were beyond the
experience of our team, such as the design of inductors from micro-strip line, and which were
likely to entail significant learning time, and likely many non-functioning prototypes. This
underpinned our second consideration, and concerns about time.
� As the requirements were developed, it became clear that the software elements – particularly
the database, were at least as important to the client than the ability to conduct wireless census
scans.
Given limited resources in the way of time and man-power, our team determined these resources would
not be efficiently spent if used to develop an RFID Reader, which would necessarily prevent us from
significant software development.
Segmented RF System
While in-house design of the RFID Reader appeared ill-suited to this system, it is possible to acquire
COTS versions of all the elements – transmit and receive antennas, RF module, etc. Our team
considered systems that implemented RFID technology, but through an assembly of COTS
components. Like bar-code scanners, this approach has some financial benefit. The technology
components of an RFID reader can be purchased for approximately $1000 altogether, which is well
below the cost of COTS RFID readers. However, several considerations led to our dismissal of this
concept as well.
� While the elements of technology cost less than a COTS reader, they do not come connected,
nor do they have any housing. Therefore there is an additional cost of manufacturing a housing
for the reader.
� COTS RFID readers have been validated for tough environmental situations – for instance,
drops from 4' onto a concrete floor. This team is not able to provide the same level of
mechanical engineering, and would not be able to promise the same of an in-house design.
13
� Being designed in-house, such a system would not include any warranty or support usable by
the customer once our team is no longer available.
COTS RFID System
COTS RFID readers would allow our system to make use of the benefits of RF technology, provide the
customer with some level of ongoing support, and the ability to expand the system on their own, or
replace parts as needed. Several considerations led to our decision to select this candidate concept for
system development, including:
� Through the vendor, LAR would have access to some amount of ongoing customer support.
While this is not substantial support, and only applies to the reader, it is more support than our
team is able to provide through the other candidate concepts.
� As a purchase from a vendor, the RFID read, which is the most expensive of the system
components, would have be under warranty for 1 year.
� COTS readers are reliable – they have been tested for extreme conditions including
temperature variations, voltage surges, and drops onto concrete.
� COTS readers are replaceable. As a pseudo-standardized product, if LAR wishes to replace or
purchase additional readers, they can do so through the vendor, without need of an additional
design team.
The ability to provide our client with a reliable, maintainable product, and one that would allow us to
dedicate resources toward meeting their software needs as well, was of high value to the team.
Ultimately we selected the COTS RFID System as the candidate system for development.
5. SYSTEM DEVELOPMENT
Our team elected to use RFID technology, with a COTS RFID reader with WiFi capabilities (802.11
b/g), Generation 2 passive tags, and software written in C++, to implement this solution. RFID
technology has several advantages for this application. The RFID tag does not have line-of-sight
requirements such as a bar-code reader would, and they tend to be more resistant to damage, such as
from spilled water. Additionally, because they operate on proximity to the reader (within a given
beamwidth), it is not necessary for the staff member conducting a census scan to perform incremental
scans of each unit. Rather, it is only necessary that the reader pass within the required proximity of
each RFID tag.
14
5.1 System Map
Below we have provided a system map to illustrate some of the operational functions of the system.
Primary operational functions are indicated in blue circles. For the purpose of this section, user refers
uniformly to LAR staff. Reader Module is the RF Module located on the RFID reader.
Software
The system software performs several of the fundamental operations. These have been grouped in the
pale yellow box in the System Map, which indicates the software-intensive subsystem.
Create Card
As indicated in section 1, this process occurs when new protocols have been generated by investigators.
The user inputs account information into the software, and scans an RFID tag that will be placed on the
cage card. A cage card is then generated, the RFID tag affixed, and the card placed in the appropriate
cage card holder.
15
Illustration 5: EID System Map
Run Census
On a weekly basis the user will run a census. This entails inputting a census request (for instance, the
room number of each room as it is scanned), and performing the scan with the RFID reader, which
transmits the census data to the software program, which in turn generates a census report.
Delete Card
When a card is no longer needed, whether because of some error, or because the investigation is
complete and the cage is no longer needed, the user will remove the cage card from the system. This
entails performing a check-out procedure, to indicate to the software that a check-out is requested, and
using the RFID reader to scan the card for which the RFID is to be removed. The software then marks
the census end date in the account history, and removes the RFID from those allocated as occupied
cages. The RFID tag is discarded with the spent card.
Hardware
The process of scanning the RFID tags, and handling some of the errors that occur with RFID
technology are primarily performed with hardware. COTS RFID readers typically contain micro-
controllers and memory, and some of this function is technically embedded software. However, for the
purpose of understanding the system, they can be thought of as part of the hardware elements, since
they are fully contained on the reader.
Get Tag ID
When an ID or set of IDs needs to be scanned, the reader module sends out an interrogator signal. This
is an RF signal from the transmitting antenna, which excites an antenna in the RFID tag, causing it to
emit a signal in response to the excitation. This excitation response contains the RFID for that tag, and
is picked up by the receiving antenna in the RF module.
With RF technology, when an excitation signal is sent out, any RFID tag that received that signal, at
sufficient power, will send an excitation response. Therefore, the RFID reader may receive hundreds of
responses at the same time, though it can only process one response at a time. Therefore, error
handling is an important part of the reader.
Error Handling
As mentioned, an RFID reader must have mechanisms for handling errors that occur during a read. Of
particular significance to LAR, is the comparison of what is found in the room to what should be in the
room, per the database. Therefore it is necessary for the RFID reader to retrieve the tag assignments
from the Database, and compare that against the tags that were found by the RF Module.
16
5.2 Elements of the System
This section will go into further detail on the elements of the system solution and the characteristics
that present challenges or provide an advantage in our application.
RFID Reader
The ability of an RFID reader to excite, and receive the response from, an RFID tag depends on several
characteristics of both the reader and the tags. The relevant criteria of the reader are the polarization,
the read distance, the write distance, the memory, and the RF frequency. These are someone
interrelated variables, but collectively they determine the performance of an RFID reader.
We are currently recommending the Motorola MC9090-Z. It has linear polarization, which we
anticipate being sufficient for a 12” read distance, given the 70-degree cone. It supports the 802.11
a/b/g wireless standards, operates at nominally 915 MHz, and has expandable memory through an
SD/MMC card slot. Additionally, it has a nominal write distance of 1-2' and a read distance of 20'. We
anticipate adjusting the power on the transmit antenna to bring the read distance down to the half-width
of the laboratory rooms.
Additional benefits of the MC9090-Z are a 126 degree range in operating temperature, it withstands
multiple drops to concrete from 6' and 2000 1-m tumbles. It is powered by a rechargeable lithium
battery pack, and the base module operates on Windows Mobile, with is amenable to C++
development. The one year warranty is from the date of shipment, so no orders will be completed until
initial testing and validation of the concept have been completed. The cost of these readers is
approximately $3500 per unit, depending on the selected vendor.
Polarization
The two options for polarization are linear polarization and circular polarization. The effect of these is
best understand by analogy to a game of Marco Polo. Linear polarization requires that the RFID tag be
located facing, and along a line perpendicular to the RFID reader, within a given tolerance
('beamwidth', 'angular tolerance'). This would be analogous to playing Marco Polo with someone who
cannot hear, and can only read lips. Circular polarization is the RFID equivalent to a fully-audible
game of Marco Polo – the tag need only be within a specific radius of the reader ('read distance').
Read Distance
Read distance is a measure of how far the RFID tag can be from the reader, for the reader to still be
able to identify the tag. It is primarily a function of the polarization, antenna power, and antenna type.
On most COTS readers, this range is between 1 and 10cm. In order to achieve a minimum read
distance of 12”, we will need well-powered readers.
17
Write Distance
Some RFID tags contain a stored state that can be set by the reader (typically 7 available states, total).
When the RFID reader sends out an excitation signal, it also causes the RFID tag to switch to an
indicated state (for instance, 'logged'). The maximum distance a reader can be from the tag and still
write a state to RFID tags is the write distance.
Memory
COTS RFID readers come with varying amounts of memory available on the reader itself. This
memory can be used for custom programming, or for storage. In our application, it will be necessary to
store the RFID tags and room allocations, so that mis-located cages can be identified and alerted to as
the census is in progress. There must also be sufficient memory for the error-handling software to be
installed on the reader.
Frequency
COTS RFID readers can operate in a range of frequencies. In large terms, these are referred to as low
frequency (LF), 30 – 300 kHz, high frequency (HF), 3-30 MHz, and UHF, 30 MHz – 3 GHz. There are
implications of frequency selection in terms of both noise floor and ethics.
Low frequencies will not be used for this project because of the possible risk to the animals (see
Section 2.2). However, the public WiFi band is 2.4 GHz. The concern with using frequencies in that
range is the increased noise floor due to cell phones, internet modems and routers, and other devices in
the public spectrum.
Frequency also has an effect on how quickly data can be transmitted. To complete a census scan, an
LAR staff member will indicate the current room, start the read session, and then pass the RFID reader
in front of each cage, though there is no need to make a discrete read of each cage, nor to make any
contact. In order to ensure that all IDs through this process, we are selecting a high frequency, which
increases the rate of data transmission, and increases the likelihood of a successful read of all cages.
In particular, we are selecting a reader that occupies the 900 MHz – 1 GHz band, nominally located
around 915 MHz. This is above the range that would expose laboratory animals to unnecessary noise,
and below the range that would encounter excessive interference from the public WiFi band.
RFID Tags
RFID tags come in three possible generations, and can be either passive or active, and either disposable
or permanent. We are selecting to use passive, disposable, Generation 2 tags. While slightly more
expensive, these tags are more amenable to error correction, do not emit period radiation which might
otherwise pose a hazard to the laboratory animals, and the cost of permanent tags does not outweigh the
benefit, since ultimately all cage cards are terminated.
18
Generation 0
Generation 0 tags are write-once tags, which are written when they are made. They can be read, but
cannot be changed. These are very simple technology, in the larger realm of RFID technology.
Generation 1
Generation 1 tags are write-once at the time of 'printing'. This gives the consumer some choice over
the information that is written on each RFID, but they cannot in any way be altered after writing.
These tags represent mid to low-level sophistication of RFID technology.
Generation 2
Generation 2 (Gen 2) tags have features that are not available on either of the aforementioned tag
generations. One frequent problem in multiple-read RFID sessions is that the reader may register
'ghost IDs' - RFID numbers that have no physical tag, but are merely an occurrence of interference
from so many tags responding. While this can be addressed in part by reducing the read time, Gen 2
tags have secure communications with the reader that reduce the occurrence of ghost reads.
Gen 2 tags first transmit a 'preamble' – therefore the software on the reader can dismiss any tag ID that
was not preceded by a preamble. Additionally, Gen 2 tags have 7 states that can be set. This allows
readers to selectively address only RFID tags with the selected state. Lastly, Gen 2 tags can be assured
to never be re-used after termination, due to the 'Killed' state. This would prevent the possibility of
previously used RFID tags ending up back in the database but attributable to multiple investigators.
Passive Tags
Passive tags are RFID tags that do not emit any identification signal until they are excited by the signal
from an RFID reader. In some cases they may respond to signals from other devices that are the right
frequency. However, choosing a frequency below the public WiFi band, and making use of Gen 2 tag
technology will help to prevent this occurrence. The primary motivation for choosing passive tags is
that they will not expose the laboratory animals to periodic radiation, except during the census scans.
Active Tags
Active tags are RFID tags that periodically transmit their identification, whether or not a reader is
present, and whether or not they have been excited by a signal. Active tags increase the read range,
nonetheless there are many compelling reasons against using active technology.
Radiation is listed as a hazard to laboratory animals, therefore we do not want to unnecessarily increase
their exposure. In comparison to a weekly scan, RFID transmission every few seconds is more
radiation that the animals are exposed to, by several orders of magnitude.
19
Additionally, active tags rely on internal batteries to operate. This poses two problems. The first is that
a cage card may be deemed to be missing, when in fact the battery is just low, and the second is the
ramifications of discarding thousands of batteries every year, one for each spent cage card.
Control Software for Reader
One of the software packages that will be part of the final system is the control software for the reader.
This software is installed on the reader itself, rather than on a PC, and is responsible for several tasks.
This package will be developed in C++, for implementation on a Windows Mobile platform. Because
this platform, and some of the necessary tasks – such as handling preambles – depend on reader and tag
selection, software development has lagged hardware development.
Read Session
The read session is the period during which the transmit and receive antennas in the RFID reader are
active, and RFID tags are responding, and being recorded. When the read session is not active, even if
a tag were somehow excited, the response would not be recorded.
The read session will be controlled by the software on the RFID reader. This controls the duration of a
read session (whether it is timed, or waits for the user to indicate completion), the power that is
delivered to the transmitting antenna, processing of the preamble information, and storing of the RFID
information.
Comparison & Alert Generation
Because of the requirement to know which cages are in a given room, and identify those that are mis-
located, there will be a software package to handle database comparison and alert generation. The
relevant database information (room, RFID number, total count expected) will be saved to memory on
the reader. Software will compile a list of unique RFID tags responding, and will compare it against
these data. The same package will then generate alerts for:
� Missing cages,
� Cages that responded to the census scan but should not be in the current room,
� Mis-count.
This serves as a secondary measure, to ensure no mis-located cages go undiscovered.
Additionally, the software will need to accept user input in response to these alerts, and handle the data
accordingly (i.e. 'Ignore', 'Add to Room'), and at the end of the census, transmit the necessary changes
to the database software. Finally, because the RFID readers may also be used to remove cage cards
from the system, this software will also control whether specific cards, only, should be recorded, and
whether they will be removed from the database, or just recorded as present in the room.
20
Error Handling
Additional software will be necessary on the reader to implement error-handling. This software will
handle the receipt of preambles, and filter accordingly, eliminate RFID tags that did not respond with
the correct state, and process the received RFID information to ensure a correct census.
Database Software
The database software, which will be developed and implemented beginning in 2013, will need to serve
several purposes. These tasks, generically, are:
� Output RFID data for comparison during census,
� Track Account Information
� This includes census start and stop dates, PI contact information, etc.
� Track Account History
� This is the history of animal care / cage operations. For instance, transferring of animals
from one cage to another.
� Facilitate Two Levels of Access
� For when an administrator is logged in,
� For when a user is logged in.
� Allow RFID / Cage Cards to be Removed
� By manual access,
� By scan with RFID reader.
Software Interface to Link Control Package and Database Package
This software package will be implemented to provide a bridge between the software package located
on the reader ('control package') and the database software package. Some of the features of this
software will be providing a means to actually transmit the comparison data, prior to census, to the
reader for memory storage, and ensuring the delivering of transmissions from the reader. While this
feature could be integrated into the two software packages. However, designing a separate interfacing
software element will allow for modular implementation, since Granite will remain in use for the
interim, and will allow the potential use of alternate database programs in the future, without need of a
system redesign.
21
Remaining Stages of System Development
Over the course of the next 6 months, the team will conduct
testing and validation of the hardware, and will demonstrate
the use of the hardware in proof-of-concept form. Software
development will begin in 2013, with some elements to be
delivered with proof of concept, and the remaining portions to
be developed Jan 2013-May 2014.
6. Plans for Testing
Due to the high cost of the recommended hardware
configuration, and the fact that the warranty counts from the time of delivery, several smaller
development packages will be tested for conformance with advertized specifications as well as against
the physical requirements for the final system. By characterizing several development packages, we
hope to achieve a probabilistic estimate of the expected relative performance of the chosen commercial
reader, the Motorola MC9090-Z.
The physical parameters that require testing include geometric criteria, such as distance and alignment,
as well as environmental criteria, particularly those modeling metal objects in the environment which
could interfere with signal transmission and reception. These parameters are described in greater detail
below.
6.1. Geometric Parameters for Testing Hardware
Read Distance
A key criteria for the system is the maximum distance the
reader can activate and receive the signal from the RFID tag.
To perform this test the reader will be placed initially at a
distance of 12 inches from the tag, aligned on an axis
extending from the geometric center of the tag, perpendicular
to the tag face. The distance will be increased in increments of
6 inches. At each interval three readings will be taken and
recorded. The test will end when the reader fails to record the
tag for all three readings, or when a distance of 10 feet is
reached, whichever is sooner.
22
Illustration 7: Graphical
Representation of Max Read Distance
Illustration 6: Graphical
Representation of Max Lateral Offset
Lateral Offset
The second geometric criteria relates to how close to the central axis of the tag the reader must be to
generate a correct read. To perform this test the reader will be place at the middle distance of the
acceptable read distances from the test above, aligned on an axis centered and perpendicular to the tag.
With the reader still aligned along the same axis, it will be shifted parallel to the axis in 3 cm
increments. At each interval three readings will be taken and recorded. The test will end when the
reader fails to record the tag for all three readings.
Angular Deflection
The third geometric criteria relates to how much the reader can be
deflected from the central axis of the tag. To perform this test the
reader will again be place at the middle distance of the acceptable
read distances from the test above, aligned on an axis centered
and perpendicular to the tag. With the reader still sitting the same
axis, it will be rotated off of the axis in 2 degree increments. At
each interval three readings will be taken and recorded. The test
will end when the reader fails to record the tag for all three
readings.
6.2. Environmental Parameters for Testing Hardware
The Lab Animal Resources facility presents a challenging environment for wireless data transmission.
Much of the laboratory equipment, such as the cages, and the tag holders, are constructed out of metal.
This presents challenges for any form a radio transmission since the metal will absorb and conduct
radio waves, attenuating the signal strength that reaches the tags. The three tests of geometric criteria
described above will be performed for each of the environmental conditions described below. These
will be done to characterize the effects of these environmental conditions before the final system is
deployed. Each of the different factors will be addressed, then in the collective one at a time in order to
quantify the individual effects as well as the cumulative effects of the environmental factors.
Neutral Test to Compare to Specs
The first test is to establish a baseline for comparison with the other tests, and to assess the
performance relative to the advertised specs. This will consist of operating the RFID tag and reader
under controlled conditions, in the absence of any metal object that could present interference or
attenuation. The three geometric parameters will be tested as described above. Units will be compared
to their advertized specifications as well as establishing a baseline for comparison.
23
Illustration 8: Graphical
Representation of Max Angular
Deflection
Attenuation Due to Tag Placed on Metal Shelf
Once a baseline has been established, the tag will be attached to a non-conducting material, such as an
index card, and placed on a metal shelf similar to the shelves in the LAR facility. The geometric
parameters will be tested and compared to the baseline.
Attenuation Due to Tag Placed on Wire Cage
The next comparison test will consist of placing the RFID tag on one of the wire animal cages and
measuring the geometric parameters. Because of the grate structure of cages, we expected the
individual attenuation due to the cages to differ from that due to the shelves.
Attenuation Due to Tag Placed on Cage Card in Holder
In the facility, the RFID tags will be placed on cards in a metal card holder. This, therefore, is also
expected to attenuate the performance of the RFID system. This test will measure the effect of placing
the tags in the card holders, attached to the cage.
Attenuation of Tag on Cage Card in Holder, Separated by Foam Tape
One possible mitigation for attenuation would be to insulate the card holders from the cage by attaching
them with foam tape. This test will be identical to the test immediately preceding this, except that the
RFID will be separated from the card by a layer of foam tape, providing it some offset from the cage
card holder.
6.3. Criteria For Successful Hardware Tests
For each testing increment, three reads will be attempted. A successful test would consist of two or
more successful read attempts. Less than two successful reads would be deemed a failure. However, for
completeness, each testing protocol will be continued until there are zero successful read attempts. A
successful testing strategy will result in characterization results, with high confidence interval, and
performance within the requirements.
6.4. Software Planned Testing Strategy
Since the software must be customized for the selected set of hardware, a software testing plan cannot
be fully developed at this time. Once the hardware has been successfully tested and selected, a software
testing plan will be developed with assistance from Justin Fritzler, and input from the LAR staff.
24
7. Future Work
Our scheduled plan for integration and testing of phase 1 is as follows:
Dec 10, 2012 to Jan 3, 2013
Test: Cage Card Scan Function
Develop preliminary I/O software
Jan 3, 2013 to Feb 1, 2013
Test: Comparison to Database, Multiple Cards
Develop Software Package (will be ongoing)
Demo: census capture [01/31/2013]
Mar 1, 2013 to May 1, 2013
Integration
Proof of Concept Delivery [05/01/2013]
Subsequent phases will continue beyond May 2013, but have not yet been scheduled due to expected
fluctuations in the team membership, and dependencies on the testing and validation results.
8. Conclusion
This is a complex project, but the research so far indicates a promising outcome. The requirements are
moderate enough, with respect to the current state of the art, that they are likely to be achievable. It
will be challenging to design a mechanism for overcoming attenuation, as the effect of all the metal
equipment is expected to be quite extreme, but a rigorous testing schedule and thorough
characterization will contribute to the success of such an effort.
In continuing next semester, this project is likely to deliver proof of concept, demonstrating a design
that meets requirements, addresses the needs of the client, and reduces the cost of implementing such a
system by 60%.
25
9. References
1. A. Kossiakoff and W. N. Sweet, “Systems Engineering and the World of Modem Systems,” in
Systems Engineering Principles and Practice, Hoboken, New Jersey: Wiley, 2003, ch.1
2. Guide for the Care and Use of Laboratory Animals, 8th ed., National Research Council of The
National Academies, Washington, D.C., 2011
3. H. E. Heffner and R. S. Heffner, “Hearing Ranges of Laboratory Animals,” JAALAS, Memphis, TN,
2007
4. Lab Animal Resources, Colorado State University [Online]. Available:
http://web.research.colostate.edu/LAR/
5. UHF Gen-2 System Overview, Texas Instruments, September 2005.
6. Understanding Gen 2: What It Is, How You Will Benefit And Criteria For Vendor Assessment,
Symbol Technologies, Motorola, May 2007.
26
10. Appendix A: Abbreviations
COTS – Commercial off-the-Shelf
CSU – Colorado State University
EPC – Electronic Product Code
Gen2 – Generation 2 (type of passive RFID tag)
HF – High Frequency
HW – Hardware
ID – Identification
IEEE – Institute of Electrical and Electronics Engineers
I/O – Input/output
IP – Internet Protocol
ISO - International Organization for Standardization
LF – Low Frequency
LAR – Laboratory Animal Resources
NIH – National Institutes of Health
PI – Private Investigator (Client performing research on lab animals)
RF – Radio Frequency
RFID – Radio Frequency Identification
SW – Software
UHF – Ultra High Frequency
WIFI – Wireless Fidelity (Commonly known as Wireless Internet)
27
11. Appendix B: Budget
10.1 Funding
All funding will be provided by Laboratory Animal Resources. We have $200 from the CSU ECE
department to use for miscellaneous items as well. To be delivered in May 2013 is Proof of Concept.
For this we have agreed on a budget of $5000.
10.2 Cost - Proof of Concept:
Item Item Cost Quantity Total Estimated Cost
RFID Reader $4,000 1 $4,000
RFID Tags $0.50 400 $200
Database Development $300 1 $300
Check-Out Station $500 1 $500
Final Cost $5,000
For continuing years, a full system-wide deployment is required with an anticipated cost of around
$53,000.
10.3 Cost - Initial System Wide Deployment:
Item Item Cost Quantity Total Estimated Cost
Proof of Concept $5,000 1 $5,000
RFID Reader $4,000 10 $40,000
RFID Tags $0.50 5000 $2,500
Database Development $300 2 $600
Check-Out Station $500 2 $1,000
Final Cost $49,100
There will also be a monthly maintenance cost for new RFID tags. We estimate this cost to be:
Item Item Cost Quantity Total Estimated Cost
Proof of Concept $0.50 1000 $500
Total Maintenance Cost per Month $500
**These costs are not inclusive of internal costs to LAR, such as the labor cost for affixed new RFID tags. **
28
������������������
��
�������������������
��
�������� �����
����������
��
��� ��������
��
���� ��������������� ������
������
!�
���� ��"#��$������%��%
���
&�
������ ������� ���
'�
�(�)� �$$���
����������
*�
�����(������
������
�+
��(������� ��������
��
�����������������
��
�����������������
�'
�,�$�����%�)����"��(��
����������
�*
�������-����%���-��$���������)��
����������
�+
���(���%���.�������(�/��������
����������
��
� ����0�1���2����-�.���-�������.�������(�
����������
��
���������������
��
��#���1�����%���������������
����������
��
��3 "��34�.,�"4
��
��5�������� �$$����6��������
����������
�!
��������
�&
�(�)�� �$$�������������%��������2� �
����������
�'
��5�������� �$$����6��������
����������
�*
���������(������
����������
�+
����$
�����%��$$��%����%��%
/���)������
��
1�4.���3,3���4.,�"4
��
�,����%�0������$������
��
����������������
��
������������������
��
����� �� ��������!��������������
�!
�7%���81/�9����� ��������� ��(��#$��
�&
�/ ���������%�)�7�����%��,
���
�'
�/ ��������� ����)����� ���/�##���
������
�*
����$
����-����%����������� �
/���)������
�+
�� ���1��)����%��$���������� �
/���)������
4�$
����� �4�$�.�%
/#
" �
:����;��+��
4�(
�
<��
:����;��+��
12
���
.#�
:����;��+��
��-
<��
������
���
��
����
����
������
���
����
���� ������
���
����
������
���
������
���
������
���
�����
������
���
������
���
������
���
������
���
��� �
����
�����
����
����
����
�����������
�����������
3 3�+���6��#�%�
��
�(��#������� �
,7�
��
��#�����$��-�/���)���1��) ����
/���)������
��
����(����$��-�/���)���1��) ����
/���)������
��
�������-�/�2�������
����������
��
��(�)�/�2�������
/���)������
�!
�(��#�/�2�������1��) �����
����������
�&
����(��/�2�������1��) �����
�'
�.���%������� ������/�2�������0������/��� �����(��#$��
���
�*
/�2��������(��#$��
����������
�+
�"������ ���� ������������������/��� ���
/���)������
��
��(��#������������
/���)������
��
��(��#���
=���)������
��
"��������
���������
��
��#����������� ���1��)����%��$
����������
��
����(���������� ���1��)����%��$
�!
���$
����5�������������
=���)������
�&
�"������������
=���)������
�'
��#�������,������%������
=���)������
�*
,���=�9/��������
!+
#�������$�������%��������
!�
�������-����6��� �������3�$���
����������
!�
���%��/��������
����������
!�
�� ��#������(������
!�
��#���1�������(��2��
!�
������1�������(��2��
!!
��#�����%�����#���
!&
���%�����#���
!'
�� �� ����� ���1�� �����)>�/���)����(��#$��
!*
���-�������������/-��$
&+
��-��������/-��$�������(������
&�
�36��-��?��@
&�
����(��2������?��@
&�
�1������#�����?��@
&�
�����������$������%�&�����
&�
��(�����7��%��0�/ ����
4�$
����� �4�$�.�%
/#
" �
:����;��+��
4�(
�
<��
:����;��+��
12
���
.#�
:����;��+��
��-
<��
���
�����������
���� ������
���
����� ������
���
�����
����
������
���
����������� �����������
����������
������
���
�����
����������
����
����������
����
������
���
������
���
����
�� �
��
���
�� ���� ���
���
3 3�+���6��#�%�
&!
��(�����7��%��0�/ ����
&&
��(�����7��%��0�/ ����
&'
��(�����7��%��0�/ ����
&*
��(�����7����0�/ ����
'+
��(�����7��%��0�/ ����
'�
��(�����7��%��0�/ ����
'�
'���������$�����
4�$
����� �4�$�.�%
/#
" �
:����;��+��
4�(
�
<��
:����;��+��
12
���
.#�
:����;��+��
��-
<��
3 3�+���6��#�%�
������������������
��
�������������������
��
�������� �����
����������
��
��� ��������
��
���� ��������������� ������
������
!�
���� ��"#��$������%��%
���
&�
������ ������� ���
'�
�(�)� �$$���
����������
*�
�����(������
���
�+
��(������� ��������
��
�����������������
��
��,�����(��#$��
���
��
��,�����
������#
��
��,����%�����(
��
�����������������
�!
��#���-��%�������$
��������������%
.������%
�&
�-��%������%
/�$
�'
�/�$�����%�)����"��(��
/�$
�*
�������0����%���0��$���������)��
/�$
�+
���(���%���1�������(�2��������
/�$
��
� ����3�4���,����0�1���0�������1�������(�
/�$
��
�" ��,������%
/�$
��
��#���4�����%���������������
/�$
��
��5 "��56�1/�"6
/�$
��
��7�������� �$$����8��������
/�$
�!
��������
�&
�(�)�� �$$�������������%��������,� �
/�$
�'
��7�������� �$$����8��������
/�$
�*
���������(������
/�$
�+
����$
�����%��$$��%����%��%
5�%�,��84����
��
4�61���5/5���61/�"6
/�$
��
�/����%�3������$������
/�$
��
����������������
��
������������ ���������������
��
����� �� ��������!��������������
�!
�-%���942�:����� ��������� ��(��#$��
/�$
�&
����$
����0����%����������� �
/�$
6�$
����� �6�$�
12
"6
�;<�����=��+��
4�
1�
;;<�����=��+��
12
"6
�;<�����=��+��
4
���������
��
����
����
���������
����
����
����
��� ����
����������
���
���
����
���
���
���
���
�����
���
���
���
���
��� �
����
�����
�� ���
5 5�+���8��#�%�
�'
�� ���4��)����%��$���������� �
/�$
�*
�(��#������� �
/�$
�+
"������������!
��#����
��
��#����������� ���4��)����%��$
/�$
��
����(���������� ���4��)����%��$
/�$
��
���%����������������
/�$
��
�"������������
/�$
��
�2�$�����������2��%�8 �%����
/�$
�!
�2�$������������� �����8���
/�$
�&
�2�$������������
����#�� �����)������ �����
/�$
�'
�$�������"�������%����������� "�������
��
����(�0�8�����"�
/�$
��
"����$&������!
��������
��
��#�����$��0�2���)���4��) ����
/�$
��
����(����$��0�2���)���4��) ����
/�$
�!
�������0�2�,�������
/�$
�&
��(�)�2�,�������
.������%
�'
�(��#�2�,�������4��) �����
/�$
�*
����(��2�,�������4��) �����
/�$
!+
�1���%������� ������2�,�������3������2��� �����(��#$��
5�%�,��84����
!�
2�,��������(��#$��
/�$
!�
�"������ ���� ������������������2��� ���
5�%�,��84����
!�
��(��#������������
/�$
!�
��(��#���
/�$
!�
�$�������"�������%����������� "����$&�
!*
����(�0�8�����/)�
/�$
&+
"����$"�����������!����������
&�
� ����>����������,��������$
������������$�������
/�$
&�
��(��#�����0����%�������������
/�$
&�
�$�������"�������%����������� "����$"���
&&
����(�0�8�����/)�
/�$
&'
������$&�����#���������#����
&*
2��%�/)���(��#$��
'+
2��%�/)��/���,��������%�3��(�����
'�
��#���4�������(��,��
/�$
'�
������4�������(��,��
/�$
'�
��#�����%�����#���
/�$
6�$
����� �6�$�
12
"6
�;<�����=��+��
4�
1�
;;<�����=��+��
12
"6
�;<�����=��+��
4
��� ���
���
�����
���
�����
���
��� ��� �� �
���
���
���
��� ���
���
�������������� �
���
�������������� �
���
���
���
��� ���
����
���
���
���
5 5�+���8��#�%�
'�
���%�����#���
/�$
'�
�� �� ����� ���4�� �����)?�2���)����(��#$��
/�$
'!
���0�������������20��$
/�$
'&
��0��������20��$�������(������
/�$
''
�58��0��@��A
/�$
'*
����(��,������@��A
/�$
*+
�4������#�����@��A
/�$
*�
�����������"������%�'�����
*�
��(�����-��%��3�2 ����
/�$
*�
��(�����-��%��3�2 ����
/�$
*�
��(�����-��%��3�2 ����
/�$
*�
��(�����-��%��3�2 ����
/�$
*!
��(�����-����3�2 ����
/�$
*&
��(�����-��%��3�2 ����
/�$
*'
��(�����-��%��3�2 ����
/�$
**
(���������"�����
6�$
����� �6�$�
12
"6
�;<�����=��+��
4�
1�
;;<�����=��+��
12
"6
�;<�����=��+��
4
�� �
���
���
!���
����
����
���
��� ��� ��� ���
��� ��� ���
5 5�+���8��#�%�