US20180060619A1 - Implicitly confirming item movement - Google Patents
Implicitly confirming item movement Download PDFInfo
- Publication number
- US20180060619A1 US20180060619A1 US15/252,642 US201615252642A US2018060619A1 US 20180060619 A1 US20180060619 A1 US 20180060619A1 US 201615252642 A US201615252642 A US 201615252642A US 2018060619 A1 US2018060619 A1 US 2018060619A1
- Authority
- US
- United States
- Prior art keywords
- item
- storage location
- rfid
- agent
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Definitions
- a materials handling facility such as a fulfillment center, has a multitude of item storage locations for storing an inventory of items.
- the exact locations of specific items in the inventory of items may be assigned via a computing system.
- the computing system may assign item X to be stored in bin Y.
- an agent directed to store item X in bin Y may accidentally store item X in bin Z due to human error.
- the other agent may be unable to find the item because it is not in the assigned bin.
- the computing system later directs another agent to store item Q in bin Z, the agent may discover that space in bin Z is unavailable.
- FIGS. 1A-1H are drawings depicting of an example scenario in which an item movement is confirmed implicitly according to embodiments of the present disclosure.
- FIG. 2 is a schematic block diagram of a networked environment according to various embodiments of the present disclosure.
- FIG. 3 is a flowchart illustrating one example of functionality implemented as portions of a facility management application executed in a computing environment in the networked environment of FIG. 2 according to various embodiments of the present disclosure.
- FIG. 4 is a schematic block diagram that provides one example illustration of a computing environment employed in the networked environment of FIG. 2 according to various embodiments of the present disclosure.
- the present disclosure relates to approaches for implicitly confirming item movements in a materials handling facility, such as a fulfillment center. Due to simple human error, assignments of items to storage locations as directed by a computing system may not match the actual placement of the items by human agents. Agents are required to work with great speed, so it is unsurprising that occasionally items may be placed in or picked from the wrong locations. Thus, the computer-based data representation of the materials handling facility may be consistent with reality.
- Some approaches to handle this inconsistency may involve having the agents explicitly confirm the storage location from which an item has been picked or to which an item has been stowed. For example, the agent may scan a barcode on the storage location. However, the agent may accidentally scan the wrong location. Also, retrieving a barcode scanner could delay the agent. As another example, each storage location could be instrumented with a button that would trigger an indication of access to be sent to a computing system. Nonetheless, the agent could still forget to press the button, and even the extra step of pressing a button would potentially slow down the agent. Moreover, instrumenting every unique storage location in a materials handling facility with active technology could be cost prohibitive.
- RFID radio-frequency identifier
- An RFID scanner could be placed proximate to a storage unit with multiple storage locations.
- the agents When picking or stowing the items, the agents would wear a glove, ring, watch, wristband, or another similar item made of a particular material designed to impact the electromagnetic signal emanating from the RFID of the currently accessed storage location. The impact may be one of attenuation or amplification.
- the storage location accessed by the user would be the most strongly impacted RFID signal determined by the RFID scanner.
- FIGS. 1A-1H are drawings depicting an example scenario in which an item movement is confirmed implicitly according to embodiments of the present disclosure.
- an item storage location 100 a is shown.
- the item storage location 100 a has an RFID 103 a , which is emitting a signal 106 in response to being activated by an RFID scanner (not pictured).
- an agent 109 wearing a glove 112 made of a radio-frequency attenuation material, reaches into the item storage location 100 a looking for a desired item, with the glove 112 thereby interfering with or attenuating the signal 106 emanated from the RFID 103 a .
- the glove 112 may be made of a material that reflects and/or amplifies the signal 106 in other embodiments.
- the agent 109 recognizes that the desired item is not actually stored in the item storage location 100 a
- the agent 109 has withdrawn his or her hand from the item storage location 100 a , and the signal 106 from the RFID 103 a is no longer interfered with or attenuated.
- the system knows that the agent 109 has accessed the item storage location 100 a and may assume that the desired item has been retrieved from the item storage location 100 a.
- the agent 109 reaches into another item storage location 100 b , which has another RFID 103 b that emanates a signal 106 .
- the glove 112 again interferes with or attenuates the signal 106 of the RFID 103 b , thereby indicating to the system that the item storage location 100 b is being accessed.
- the agent 109 is shown retrieving the desired item 115 from the item storage location 100 b .
- the glove 112 has been withdrawn, thereby restoring the signal 106 of the RFID 103 b to the RFID scanner.
- the agent 109 deposits the desired item 115 into a container 118 such as a tote or a unit used for collation or sortation, thereby completing the item retrieval task.
- the system knows that the agent 109 has accessed two item storage locations 100 a and 100 b consecutively, and a failure to subsequently access another item storage location 100 while looking for the desired item 115 may implicitly indicate that the desired item 115 was found in the latter location, item storage location 100 b instead of item storage location 100 a .
- item storage location 100 b instead of item storage location 100 a .
- the networked environment 200 includes a computing environment 203 , an RFID scanner 206 in a materials handling facility 209 , and one or more agent devices 212 , which are in data communication with each other via a network 215 .
- the network 215 includes, for example, the Internet, intranets, extranets, wide area networks (WANs), local area networks (LANs), wired networks, wireless networks, cable networks, satellite networks, or other suitable networks, etc., or any combination of two or more such networks.
- a materials handling facility 209 may include, but is not limited to, a warehouse, distribution center, cross-docking facility, order fulfillment center (also referred to as a “fulfillment facility”), packaging facility, shipping facility, or other facility or combination of facilities for performing one or more functions of material or inventory handling.
- order fulfillment center also referred to as a “fulfillment facility”
- packaging facility shipping facility
- shipping facility or other facility or combination of facilities for performing one or more functions of material or inventory handling.
- the materials handling facility 209 may comprise, for example, a large warehouse or other structure that includes an inventory storage area having a plurality of item storage locations 100 .
- the item storage locations 100 may comprise, for example, bins, slots, shelves, containers, receptacles, crates, stalls, cribs, cordoned areas, hooks, racks, or other locations in a storage unit 218 .
- Zero or more items 221 are stored in each item storage location 100 , and each item storage location 100 has one or more corresponding RFIDs 103 .
- the storage unit 218 may comprise a fixed shelving unit or a mobile shelving unit. In some embodiments, the storage unit 218 may be transported to an agent 109 by a mobile, robotic drive unit.
- the RFID scanner 206 is located proximate to the storage unit 218 , such as on top of the storage unit 218 as shown, at the bottom of the storage unit 218 , or at some other location. In some cases, the RFID scanner 206 may be at a fixed location to which, or through which, a mobile drive unit brings the storage unit 218 .
- the materials handling facility 209 may be configured to provide fulfillment of orders received for the items 221 that are purchased, rented, leased or otherwise consumed or requested, as will be described.
- the computing environment 203 may comprise, for example, a server computer or any other system providing computing capability.
- the computing environment 203 may employ a plurality of computing devices that may be arranged, for example, in one or more server banks or computer banks or other arrangements. Such computing devices may be located in a single installation or may be distributed among many different geographical locations.
- the computing environment 203 may include a plurality of computing devices that together may comprise a hosted computing resource, a grid computing resource, and/or any other distributed computing arrangement.
- the computing environment 203 may correspond to an elastic computing resource where the allotted capacity of processing, network, storage, or other computing-related resources may vary over time.
- Various applications and/or other functionality may be executed in the computing environment 203 according to various embodiments.
- various data is stored in a data store 224 that is accessible to the computing environment 203 .
- the data store 224 may be representative of a plurality of data stores 224 as can be appreciated.
- the data stored in the data store 224 is associated with the operation of the various applications and/or functional entities described below.
- the components executed on the computing environment 203 include a facility management application 227 and other applications, services, processes, systems, engines, or functionality not discussed in detail herein.
- the facility management application 227 is executed to direct the operation of a materials handling facility 209 .
- the facility management application 227 may maintain a data representation of all of the items 221 and item storage locations 100 within the facility.
- the facility management application 227 may track the current locations of items 221 and then assign the items 221 to item storage locations 100 using algorithms, for example, that solve or approximately solve the generalized assignment problem or the knapsack problem.
- the facility management application 227 may receive notifications of inbound items 221 , assign the inbound items 221 to specific item storage locations 100 , receive notifications of item orders or shipments, cause items 221 to be retrieved from their item storage locations 100 , collated and sorted, and ultimately packaged for shipment.
- the facility management application 227 may instruct or direct agents and/or automated equipment to carry out various item movements within the facility.
- the facility management application 227 may direct agents to walk to various item storage locations 100 to pick or stow items 221 in an optimal order.
- the facility management application 227 may direct robotic drive units to bring storage units 218 to a location of an agent so that the agent may retrieve an item 221 from an item storage location 100 .
- the data stored in the data store 224 includes, for example, item data 230 , inventory data 233 , storage location data 236 , agent data 239 , item movement verification rules 242 , and potentially other data.
- the item data 230 contains various characteristic information about items 221 , which may include title, weight, handling requirements (e.g., orientation requirements, fragility management requirements, hazardous handling requirements, and so forth), dimensions, expiration information, temperature requirements, humidity requirements, value, and/or other information.
- the inventory data 233 contains data regarding an inventory of items 221 at one or more materials handling facilities 100 , inbound items 221 in transit or to be shipped to the materials handling facilities 100 in the future, outbound items 221 to be shipped to customers, and other information.
- the inventory data 233 may track items 221 across various business processes and areas in the materials handling facility 209 , including receiving, stowing, picking, sorting, packing, and so forth.
- the storage location data 236 contains information about item storage locations 100 and storage units 218 in a materials handling facility 209 .
- the item storage locations 100 may include staging areas, sortation areas, as well as long-term storage areas with storage units 218 .
- Information in the storage location data 236 may include a capacity 245 , assigned items 248 , RFID data 251 , and/or other data.
- the capacity 245 may define a dimensional capacity as well as a weight capacity for an item storage location 100 . For example, a shelf may allow for storage of up to fifty pounds in an area two feet wide by one foot tall by one foot deep.
- the assigned items 248 track the assignments of items 221 to an item storage location 100 .
- the assignment may be tentative, confirmed, or invalidated. As will be described, sometimes the assignments as recorded as a data record in the assigned items 248 may be inconsistent with the way that items 221 are actually stored in the materials handling facility 209 .
- the RFID data 251 provides information about one or more RFIDs 103 situated in a respective item storage location 100 .
- the RFIDs 103 for a given item storage location 100 may have a globally unique identifier, or at least an identifier that is unique within a given area in the range of an RFID scanner 206 (e.g., unique within a storage unit 218 ). Thus, the RFID scanner 206 is able to recognize whether the signals 106 emanating from respective RFIDs 103 are amplified, blocked, or attenuated.
- the agent data 239 provides information about agents 109 operating in the materials handling facility 209 .
- the information may include their current locations, their assigned current activities, their capabilities, their associated agent devices 212 , and/or other information.
- the item movement verification rules 242 specify how an item movement (e.g., storing an item 221 in an item storage location 100 or removing an item 221 from an item storage location 100 ) can be confirmed or verified, specifically with reference to the approaches described herein using RFID tracking of agent accesses to item storage locations 100 .
- the item movement verification rules 242 may specify thresholds for signal strengths and/or relative thresholds for an observed attenuation to be considered an access to a respective item storage location 100 .
- Time periods of accesses may also be predefined (e.g., an observed attenuation must be greater than two seconds or some other length to be recognized).
- the item movement verification rules 242 may take into account how accesses to multiple item storage locations 100 are to be interpreted. For example, if an agent 109 reaches into multiple item storage locations 100 when picking an item 221 , it may be determined implicitly that the last item storage location 100 actually contained the item 221 , while the previous item storage locations 100 did not.
- the item movement verification rules 242 may also specify situations where explicit feedback from agents 109 is required in order to confirm or deny implicitly determined information that lacks certainty within a confidence threshold.
- the agent devices 212 are representative of a plurality of client devices that may be coupled to the network 215 .
- the agent devices 212 may comprise, for example, a processor-based system such as a computer system.
- a computer system may be embodied in the form of a desktop computer, a laptop computer, personal digital assistants, cellular telephones, smartphones, set-top boxes, music players, web pads, tablet computer systems, game consoles, electronic book readers, smartwatches, head mounted displays, voice interface devices, or other devices.
- the agent devices 212 may include a display 254 .
- the display 254 may comprise, for example, one or more devices such as liquid crystal display (LCD) displays, gas plasma-based flat panel displays, organic light emitting diode (OLED) displays, electrophoretic ink (E ink) displays, LCD projectors, or other types of display devices, etc.
- LCD liquid crystal display
- OLED organic light emitting diode
- E ink electrophoretic ink
- the agent devices 212 may be configured to execute various applications such as a client application 257 and/or other applications.
- the client application 257 may be executed in an agent device 212 , for example, to access network content served up by the computing environment 203 and/or other servers, thereby rendering a user interface 260 on the display 254 .
- the client application 257 may comprise, for example, a browser, a dedicated application, etc.
- the user interface 260 may comprise a network page, an application screen, etc.
- the client application 257 may render a user interface 260 that directs the agent 109 to perform a certain task, like retrieving an item 221 from a particular item storage location 100 or storing an item 221 to a particular storage location 100 , as well as confirming that the task has been performed, or reporting exceptions, such as the lack of an item 221 in a given item storage location 100 .
- the agent devices 212 may be configured to execute applications beyond the client application 257 such as, for example, email applications, social networking applications, word processors, spreadsheets, and/or other applications.
- FIG. 3 shown is a flowchart that provides one example of the operation of a portion of the facility management application 227 according to various embodiments. It is understood that the flowchart of FIG. 3 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of the facility management application 227 as described herein. As an alternative, the flowchart of FIG. 3 may be viewed as depicting an example of elements of a method implemented in the computing environment 203 ( FIG. 2 ) according to one or more embodiments.
- the facility management application 227 determines that an item 221 ( FIG. 2 ) is to be stored or retrieved. For example, the facility management application 227 may process an inbound manifest of items 221 to be received at a materials handling facility 100 ( FIG. 2 ). Alternatively, the facility management application 227 may receive information indicating that orders for items 221 have been placed by customers, or otherwise information indicating that items 221 are to be retrieved for transfer to another facility or to a different location within the same facility.
- the facility management application 227 determines a particular item storage location 100 at which the item 221 is to be stored or retrieved. In the case of a storage movement, the facility management application 227 may execute an algorithm that determines an optimal assignment of the item 221 to an item storage location 100 based at least in part on item data 230 ( FIG. 2 ) indicating weight, dimensions, fragility, hazardousness, and/or other characteristics and on storage location data 236 ( FIG. 2 ) including capacity 245 ( FIG. 2 ) (e.g., is free space in the item storage location 100 available?), location (e.g., difficulty of an agent 109 ( FIG. 1B ) to travel to or access the location), and/or other characteristics.
- the algorithm may take into account the current assigned items 248 ( FIG. 2 ), which may include tentative assignments, confirmed assignments, invalidated assignments, and/or assignments having a different status.
- the facility management application 227 may take into account ease of access of the agent 109 to the item storage location 100 and/or the feasibility of the item storage location 100 to be delivered to an agent 109 via activation of a robotic drive unit. It may be the case that inventory of the item 221 is located only in one item storage location 100 , thereby making the decision a simple one. In other scenarios, the facility management application 227 may choose a most easily accessible one of several item storage locations 100 that store inventory of the item 221 (e.g., a low shelf may be preferred over a shelf requiring a ladder to access).
- the facility management application 227 identifies an agent 109 to perform the item movement based at least in part on the agent data 239 ( FIG. 2 ). Where multiple agents 109 are available, the facility management application 227 may select an agent 109 based at least in part on proximity of the agent 109 to the item storage location 100 selected in box 306 , the capability of the agent 109 to access or handle the item 221 , reliability of the agent 109 , speed of the agent 109 , and/or other factors.
- the facility management application 227 directs the selected agent 109 to either store the item 221 in, or retrieve the item 221 from, the particular item storage location 100 .
- the facility management application 227 may send a notification or direction to the agent 109 via a user interface 260 ( FIG. 2 ) of the agent device 212 ( FIG. 2 ).
- the notification may comprise a text message, an email message, a telephone call, a voice notification, and/or other types of communications.
- the facility management application 227 may command a robotic drive unit to bring a storage unit 218 ( FIG. 2 ) including the item storage location 100 to a location proximate to the agent 109 .
- the facility management application 227 activates an RFID scanner 206 ( FIG. 2 ).
- the RFID scanner 206 may be at a fixed position at the location of the agent 109 , a fixed position on the storage unit 218 , or at some other location in the materials handling facility 209 ( FIG. 2 ).
- the RFID scanner 206 is capable of scanning and receiving signals 106 ( FIG. 1A ) from one or more RFIDs 103 ( FIG. 1A ) of item storage locations 100 of a particular storage unit 218 .
- the RFID scanner 206 is always active and scanning.
- the RFID scanner 206 is activated based at least in part on motion of the agent 109 .
- an antenna of the RFID scanner 206 is disposed at or near the top of a storage unit 218 , with a downward facing antenna pattern (e.g., a planar pattern), while the RFIDs 103 are disposed on the bottom of their corresponding item storage locations 100 .
- a downward facing antenna pattern e.g., a planar pattern
- an antenna of the RFID scanner 206 is disposed at or near the bottom of a storage unit 218 , with an upward facing antenna pattern (e.g., a planar pattern), while the RFIDs 103 are disposed on the bottom of their corresponding item storage locations 100 .
- a storage unit 218 may have multiple faces, e.g. four faces, and the antenna of an RFID scanner 206 may be directed at a single face of the storage unit 218 .
- the facility management application 227 observes, via the RFID scanner 206 , an impact to or change in a signal 106 from an RFID 103 over a predefined time period. For instance, at time T, RFID 103 may be observed to have a signal strength S, while at time T+1, RFID 103 may be observed to have a signal strength S ⁇ n.
- This attenuation is caused by an agent 109 reaching into an item storage location 100 with a hand while wearing something that interferes with or attenuates the signal 106 emanating from the RFID 103 .
- the agent 109 may wear a glove, watch, ring, wristband, and/or other item that is made of a specially chosen material to attenuate electromagnetic radio-frequency signals.
- a material may comprise a liquid gel, fabric with metal threads, urethane foam, and so on.
- the radio-frequency attenuating material becomes thereby interposed between the RFID 103 and the RFID scanner 206 .
- RFID 103 may be observed to have a signal strength S, while at time T+1, RFID 103 may be observed to have a signal strength S+n.
- This amplification is caused by an agent 109 reaching into an item storage location 100 with a hand while wearing something that reflects or strengthens the signal 106 emanating from the RFID 103 .
- the agent 109 may wear a glove, watch, ring, wristband, and/or other item that is made of a specially chosen material to reflect electromagnetic radio-frequency signals.
- a material may comprise a liquid gel, fabric with metal threads, urethane foam, and so on.
- the radio-frequency reflecting material thereby reflects signals 106 from the RFID 103 back to the RFID scanner 206 .
- Attenuation or amplification of signals 106 from multiple RFIDs 103 may be observed via the RFID scanner 206 .
- item storage locations 100 may be vertically stacked, and a glove 112 ( FIG. 1B ) may block signals 106 from an entire column of RFIDs 103 and item storage locations 100 .
- signals 106 may tend to refract, reflect, and bypass the obstruction caused by the glove 112 , so as to reach or emanate from the RFIDs 103 below the one most directly blocked by the glove 112 .
- the facility management application 227 may choose the RFID 103 associated with the maximum observed impact over a time period, or the RFID 103 with the signal 106 that has been most impacted.
- the glove 112 or other item may block signals sent to the RFID 103 by the RFID scanner 206 as well as the signals 106 emanating from the RFID 103 . Nonetheless, the effect would be similar, as blocking the signals sent to the RFID 103 would reduce the signals emanating from the RFID 103 . More likely, the signal 106 from the RFID 103 (as opposed to the signal from the RFID scanner 206 ) would be more significantly attenuated as it would be weaker.
- the facility management application 227 identifies the item storage location 100 associated with the RFID 103 using the RFID data 251 ( FIG. 2 ) and an identifier decoded from the signal 106 of the RFID 103 .
- the facility management application 227 determines whether impact is observed from another RFID 103 over a subsequent time period while the agent 109 is still performing the task. If so, the facility management application 227 returns to box 318 and observes the impacts. In such cases, the agent 109 may be accessing multiple item storage locations 100 in an attempt to find the item 221 .
- the item movement verification rules 242 ( FIG. 2 ) may govern when the item 221 is deemed to have been finally stored or retrieved from a particular item storage location 100 , where multiple accesses are observed. In some cases, an explicit confirmation from the agent 109 may be required.
- the facility management application 227 determines whether the item 221 has been retrieved from the correct location or stored in the correct location, where the correct location is the expected location. To make this determination, the facility management application 227 may compare the location identified in box 321 with the location determined in box 306 . If they do not match, the item 221 has been stored in a different location, the item 221 has been retrieved from a different location, the item 221 has not been found (e.g., not in assigned bin), the item 221 has not been stored (e.g., no space available), or another exception has occurred.
- the facility management application 227 moves from box 327 to box 330 and updates a data record in the assigned items 248 ( FIG. 2 ) to indicate that the tentative item movement has been confirmed. Thereafter, the operation of the portion of the facility management application 227 ends.
- the facility management application 227 initiates one or more corrective actions in box 333 .
- the facility management application 227 may simply update the records in the data store 224 ( FIG. 2 ) to show where the item 221 is actually stored. If the item 221 has been retrieved from a different item storage location 100 , the item 221 may have been incorrectly stored or moved previously, and the space available in the item storage location 100 from which it was actually retrieved may be updated.
- the facility management application 227 may notify the agent 109 via the agent device 212 to move the item 221 to the correct item storage location 100 , or to return the picked item 221 and to retrieve the item 221 from the correct item storage location 100 . Thereafter, the operation of the portion of the facility management application 227 ends.
- the computing environment 203 includes one or more computing devices 400 .
- Each computing device 400 includes at least one processor circuit, for example, having a processor 403 and a memory 406 , both of which are coupled to a local interface 409 .
- each computing device 400 may comprise, for example, at least one server computer or like device.
- the local interface 409 may comprise, for example, a data bus with an accompanying address/control bus or other bus structure as can be appreciated.
- Stored in the memory 406 are both data and several components that are executable by the processor 403 .
- stored in the memory 406 and executable by the processor 403 are the facility management application 227 and potentially other applications.
- Also stored in the memory 406 may be a data store 224 and other data.
- an operating system may be stored in the memory 406 and executable by the processor 403 .
- any one of a number of programming languages may be employed such as, for example, C, C++, C#, Objective C, Java®, JavaScript®, Perl, PHP, Visual Basic®, Python®, Ruby, Flash®, or other programming languages.
- executable means a program file that is in a form that can ultimately be run by the processor 403 .
- Examples of executable programs may be, for example, a compiled program that can be translated into machine code in a format that can be loaded into a random access portion of the memory 406 and run by the processor 403 , source code that may be expressed in proper format such as object code that is capable of being loaded into a random access portion of the memory 406 and executed by the processor 403 , or source code that may be interpreted by another executable program to generate instructions in a random access portion of the memory 406 to be executed by the processor 403 , etc.
- An executable program may be stored in any portion or component of the memory 406 including, for example, random access memory (RAM), read-only memory (ROM), hard drive, solid-state drive, USB flash drive, memory card, optical disc such as compact disc (CD) or digital versatile disc (DVD), floppy disk, magnetic tape, or other memory components.
- RAM random access memory
- ROM read-only memory
- hard drive solid-state drive
- USB flash drive USB flash drive
- memory card such as compact disc (CD) or digital versatile disc (DVD), floppy disk, magnetic tape, or other memory components.
- CD compact disc
- DVD digital versatile disc
- the memory 406 is defined herein as including both volatile and nonvolatile memory and data storage components. Volatile components are those that do not retain data values upon loss of power. Nonvolatile components are those that retain data upon a loss of power.
- the memory 406 may comprise, for example, random access memory (RAM), read-only memory (ROM), hard disk drives, solid-state drives, USB flash drives, memory cards accessed via a memory card reader, floppy disks accessed via an associated floppy disk drive, optical discs accessed via an optical disc drive, magnetic tapes accessed via an appropriate tape drive, and/or other memory components, or a combination of any two or more of these memory components.
- the RAM may comprise, for example, static random access memory (SRAM), dynamic random access memory (DRAM), or magnetic random access memory (MRAM) and other such devices.
- the ROM may comprise, for example, a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other like memory device.
- the processor 403 may represent multiple processors 403 and/or multiple processor cores and the memory 406 may represent multiple memories 406 that operate in parallel processing circuits, respectively.
- the local interface 409 may be an appropriate network that facilitates communication between any two of the multiple processors 403 , between any processor 403 and any of the memories 406 , or between any two of the memories 406 , etc.
- the local interface 409 may comprise additional systems designed to coordinate this communication, including, for example, performing load balancing.
- the processor 403 may be of electrical or of some other available construction.
- facility management application 227 and other various systems described herein may be embodied in software or code executed by general purpose hardware as discussed above, as an alternative the same may also be embodied in dedicated hardware or a combination of software/general purpose hardware and dedicated hardware. If embodied in dedicated hardware, each can be implemented as a circuit or state machine that employs any one of or a combination of a number of technologies. These technologies may include, but are not limited to, discrete logic circuits having logic gates for implementing various logic functions upon an application of one or more data signals, application specific integrated circuits (ASICs) having appropriate logic gates, field-programmable gate arrays (FPGAs), or other components, etc. Such technologies are generally well known by those skilled in the art and, consequently, are not described in detail herein.
- each block may represent a module, segment, or portion of code that comprises program instructions to implement the specified logical function(s).
- the program instructions may be embodied in the form of source code that comprises human-readable statements written in a programming language or machine code that comprises numerical instructions recognizable by a suitable execution system such as a processor 403 in a computer system or other system.
- the machine code may be converted from the source code, etc.
- each block may represent a circuit or a number of interconnected circuits to implement the specified logical function(s).
- FIG. 3 shows a specific order of execution, it is understood that the order of execution may differ from that which is depicted. For example, the order of execution of two or more blocks may be scrambled relative to the order shown. Also, two or more blocks shown in succession in FIG. 3 may be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the blocks shown in FIG. 3 may be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure.
- any logic or application described herein, including the facility management application 227 , that comprises software or code can be embodied in any non-transitory computer-readable medium for use by or in connection with an instruction execution system such as, for example, a processor 403 in a computer system or other system.
- the logic may comprise, for example, statements including instructions and declarations that can be fetched from the computer-readable medium and executed by the instruction execution system.
- a “computer-readable medium” can be any medium that can contain, store, or maintain the logic or application described herein for use by or in connection with the instruction execution system.
- the computer-readable medium can comprise any one of many physical media such as, for example, magnetic, optical, or semiconductor media. More specific examples of a suitable computer-readable medium would include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium may be a random access memory (RAM) including, for example, static random access memory (SRAM) and dynamic random access memory (DRAM), or magnetic random access memory (MRAM).
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- MRAM magnetic random access memory
- the computer-readable medium may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other type of memory device.
- ROM read-only memory
- PROM programmable read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- any logic or application described herein, including the facility management application 227 may be implemented and structured in a variety of ways.
- one or more applications described may be implemented as modules or components of a single application.
- one or more applications described herein may be executed in shared or separate computing devices or a combination thereof.
- a plurality of the applications described herein may execute in the same computing device 400 , or in multiple computing devices 400 in the same computing environment 203 .
- Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Operations Research (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Warehouses Or Storage Devices (AREA)
Abstract
Description
- A materials handling facility, such as a fulfillment center, has a multitude of item storage locations for storing an inventory of items. The exact locations of specific items in the inventory of items may be assigned via a computing system. For instance, the computing system may assign item X to be stored in bin Y. However, an agent directed to store item X in bin Y may accidentally store item X in bin Z due to human error. When another agent is later directed by the computing system to pick item X from bin Y, the other agent may be unable to find the item because it is not in the assigned bin. Also, when the computing system later directs another agent to store item Q in bin Z, the agent may discover that space in bin Z is unavailable.
- Many aspects of the present disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, with emphasis instead being placed upon clearly illustrating the principles of the disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
-
FIGS. 1A-1H are drawings depicting of an example scenario in which an item movement is confirmed implicitly according to embodiments of the present disclosure. -
FIG. 2 is a schematic block diagram of a networked environment according to various embodiments of the present disclosure. -
FIG. 3 is a flowchart illustrating one example of functionality implemented as portions of a facility management application executed in a computing environment in the networked environment ofFIG. 2 according to various embodiments of the present disclosure. -
FIG. 4 is a schematic block diagram that provides one example illustration of a computing environment employed in the networked environment ofFIG. 2 according to various embodiments of the present disclosure. - The present disclosure relates to approaches for implicitly confirming item movements in a materials handling facility, such as a fulfillment center. Due to simple human error, assignments of items to storage locations as directed by a computing system may not match the actual placement of the items by human agents. Agents are required to work with great speed, so it is unsurprising that occasionally items may be placed in or picked from the wrong locations. Thus, the computer-based data representation of the materials handling facility may be consistent with reality.
- Some approaches to handle this inconsistency may involve having the agents explicitly confirm the storage location from which an item has been picked or to which an item has been stowed. For example, the agent may scan a barcode on the storage location. However, the agent may accidentally scan the wrong location. Also, retrieving a barcode scanner could delay the agent. As another example, each storage location could be instrumented with a button that would trigger an indication of access to be sent to a computing system. Nonetheless, the agent could still forget to press the button, and even the extra step of pressing a button would potentially slow down the agent. Moreover, instrumenting every unique storage location in a materials handling facility with active technology could be cost prohibitive.
- Various embodiments of the present disclosure introduce technologies for implicitly confirming item movements, without requiring agents to perform any additional actions beyond stowing or retrieving the items. As will be discussed, a radio-frequency identifier (RFID) may be added to each storage location. RFIDs are considerably lower in cost than active technology. An RFID scanner could be placed proximate to a storage unit with multiple storage locations. When picking or stowing the items, the agents would wear a glove, ring, watch, wristband, or another similar item made of a particular material designed to impact the electromagnetic signal emanating from the RFID of the currently accessed storage location. The impact may be one of attenuation or amplification. The storage location accessed by the user would be the most strongly impacted RFID signal determined by the RFID scanner.
-
FIGS. 1A-1H are drawings depicting an example scenario in which an item movement is confirmed implicitly according to embodiments of the present disclosure. Beginning withFIG. 1A , anitem storage location 100 a is shown. Theitem storage location 100 a has anRFID 103 a, which is emitting asignal 106 in response to being activated by an RFID scanner (not pictured). InFIG. 1B , anagent 109, wearing aglove 112 made of a radio-frequency attenuation material, reaches into theitem storage location 100 a looking for a desired item, with theglove 112 thereby interfering with or attenuating thesignal 106 emanated from theRFID 103 a. Although the scenario described in connection withFIGS. 1A-1H involves a radio-frequency attenuation material, theglove 112 may be made of a material that reflects and/or amplifies thesignal 106 in other embodiments. InFIG. 1C , theagent 109 recognizes that the desired item is not actually stored in theitem storage location 100 a, and inFIG. 1D , theagent 109 has withdrawn his or her hand from theitem storage location 100 a, and thesignal 106 from theRFID 103 a is no longer interfered with or attenuated. At this point, the system knows that theagent 109 has accessed theitem storage location 100 a and may assume that the desired item has been retrieved from theitem storage location 100 a. - Nonetheless, in
FIG. 1E , theagent 109 reaches into anotheritem storage location 100 b, which has anotherRFID 103 b that emanates asignal 106. Theglove 112 again interferes with or attenuates thesignal 106 of theRFID 103 b, thereby indicating to the system that theitem storage location 100 b is being accessed. InFIG. 1F , theagent 109 is shown retrieving the desireditem 115 from theitem storage location 100 b. InFIG. 1G , theglove 112 has been withdrawn, thereby restoring thesignal 106 of theRFID 103 b to the RFID scanner. InFIG. 1H , theagent 109 deposits the desireditem 115 into acontainer 118 such as a tote or a unit used for collation or sortation, thereby completing the item retrieval task. - By now, the system knows that the
agent 109 has accessed two 100 a and 100 b consecutively, and a failure to subsequently access anotheritem storage locations item storage location 100 while looking for the desireditem 115 may implicitly indicate that the desireditem 115 was found in the latter location,item storage location 100 b instead ofitem storage location 100 a. In the following discussion, a general description of the system and its components is provided, followed by a discussion of the operation of the same. - With reference to
FIG. 2 , shown is anetworked environment 200 according to various embodiments. Thenetworked environment 200 includes acomputing environment 203, anRFID scanner 206 in amaterials handling facility 209, and one ormore agent devices 212, which are in data communication with each other via anetwork 215. Thenetwork 215 includes, for example, the Internet, intranets, extranets, wide area networks (WANs), local area networks (LANs), wired networks, wireless networks, cable networks, satellite networks, or other suitable networks, etc., or any combination of two or more such networks. - A
materials handling facility 209 may include, but is not limited to, a warehouse, distribution center, cross-docking facility, order fulfillment center (also referred to as a “fulfillment facility”), packaging facility, shipping facility, or other facility or combination of facilities for performing one or more functions of material or inventory handling. Although thematerials handling facility 209 is described herein with specific reference to a fulfillment center, it is understood that amaterials handling facility 209 provides one example of many other types of environments to which the principles described herein apply. - The
materials handling facility 209 may comprise, for example, a large warehouse or other structure that includes an inventory storage area having a plurality ofitem storage locations 100. To this end, theitem storage locations 100 may comprise, for example, bins, slots, shelves, containers, receptacles, crates, stalls, cribs, cordoned areas, hooks, racks, or other locations in astorage unit 218. Zero ormore items 221 are stored in eachitem storage location 100, and eachitem storage location 100 has one or morecorresponding RFIDs 103. - The
storage unit 218 may comprise a fixed shelving unit or a mobile shelving unit. In some embodiments, thestorage unit 218 may be transported to anagent 109 by a mobile, robotic drive unit. TheRFID scanner 206 is located proximate to thestorage unit 218, such as on top of thestorage unit 218 as shown, at the bottom of thestorage unit 218, or at some other location. In some cases, theRFID scanner 206 may be at a fixed location to which, or through which, a mobile drive unit brings thestorage unit 218. Thematerials handling facility 209 may be configured to provide fulfillment of orders received for theitems 221 that are purchased, rented, leased or otherwise consumed or requested, as will be described. - The
computing environment 203 may comprise, for example, a server computer or any other system providing computing capability. Alternatively, thecomputing environment 203 may employ a plurality of computing devices that may be arranged, for example, in one or more server banks or computer banks or other arrangements. Such computing devices may be located in a single installation or may be distributed among many different geographical locations. For example, thecomputing environment 203 may include a plurality of computing devices that together may comprise a hosted computing resource, a grid computing resource, and/or any other distributed computing arrangement. In some cases, thecomputing environment 203 may correspond to an elastic computing resource where the allotted capacity of processing, network, storage, or other computing-related resources may vary over time. - Various applications and/or other functionality may be executed in the
computing environment 203 according to various embodiments. Also, various data is stored in adata store 224 that is accessible to thecomputing environment 203. Thedata store 224 may be representative of a plurality ofdata stores 224 as can be appreciated. The data stored in thedata store 224, for example, is associated with the operation of the various applications and/or functional entities described below. - The components executed on the
computing environment 203, for example, include afacility management application 227 and other applications, services, processes, systems, engines, or functionality not discussed in detail herein. Thefacility management application 227 is executed to direct the operation of amaterials handling facility 209. To this end, thefacility management application 227 may maintain a data representation of all of theitems 221 anditem storage locations 100 within the facility. Thefacility management application 227 may track the current locations ofitems 221 and then assign theitems 221 toitem storage locations 100 using algorithms, for example, that solve or approximately solve the generalized assignment problem or the knapsack problem. Thefacility management application 227 may receive notifications ofinbound items 221, assign theinbound items 221 to specificitem storage locations 100, receive notifications of item orders or shipments, causeitems 221 to be retrieved from theiritem storage locations 100, collated and sorted, and ultimately packaged for shipment. - The
facility management application 227 may instruct or direct agents and/or automated equipment to carry out various item movements within the facility. In one embodiment, thefacility management application 227 may direct agents to walk to variousitem storage locations 100 to pick orstow items 221 in an optimal order. In another embodiment, thefacility management application 227 may direct robotic drive units to bringstorage units 218 to a location of an agent so that the agent may retrieve anitem 221 from anitem storage location 100. - The data stored in the
data store 224 includes, for example,item data 230, inventory data 233,storage location data 236,agent data 239, item movement verification rules 242, and potentially other data. Theitem data 230 contains various characteristic information aboutitems 221, which may include title, weight, handling requirements (e.g., orientation requirements, fragility management requirements, hazardous handling requirements, and so forth), dimensions, expiration information, temperature requirements, humidity requirements, value, and/or other information. The inventory data 233 contains data regarding an inventory ofitems 221 at one or morematerials handling facilities 100,inbound items 221 in transit or to be shipped to thematerials handling facilities 100 in the future,outbound items 221 to be shipped to customers, and other information. The inventory data 233 may trackitems 221 across various business processes and areas in thematerials handling facility 209, including receiving, stowing, picking, sorting, packing, and so forth. - The
storage location data 236 contains information aboutitem storage locations 100 andstorage units 218 in amaterials handling facility 209. Theitem storage locations 100 may include staging areas, sortation areas, as well as long-term storage areas withstorage units 218. Information in thestorage location data 236 may include a capacity 245, assigned items 248,RFID data 251, and/or other data. The capacity 245 may define a dimensional capacity as well as a weight capacity for anitem storage location 100. For example, a shelf may allow for storage of up to fifty pounds in an area two feet wide by one foot tall by one foot deep. - The assigned items 248 track the assignments of
items 221 to anitem storage location 100. The assignment may be tentative, confirmed, or invalidated. As will be described, sometimes the assignments as recorded as a data record in the assigned items 248 may be inconsistent with the way thatitems 221 are actually stored in thematerials handling facility 209. TheRFID data 251 provides information about one ormore RFIDs 103 situated in a respectiveitem storage location 100. TheRFIDs 103 for a givenitem storage location 100 may have a globally unique identifier, or at least an identifier that is unique within a given area in the range of an RFID scanner 206 (e.g., unique within a storage unit 218). Thus, theRFID scanner 206 is able to recognize whether thesignals 106 emanating fromrespective RFIDs 103 are amplified, blocked, or attenuated. - The
agent data 239 provides information aboutagents 109 operating in thematerials handling facility 209. The information may include their current locations, their assigned current activities, their capabilities, their associatedagent devices 212, and/or other information. - The item
movement verification rules 242 specify how an item movement (e.g., storing anitem 221 in anitem storage location 100 or removing anitem 221 from an item storage location 100) can be confirmed or verified, specifically with reference to the approaches described herein using RFID tracking of agent accesses toitem storage locations 100. The itemmovement verification rules 242 may specify thresholds for signal strengths and/or relative thresholds for an observed attenuation to be considered an access to a respectiveitem storage location 100. - Time periods of accesses may also be predefined (e.g., an observed attenuation must be greater than two seconds or some other length to be recognized). Also, the item
movement verification rules 242 may take into account how accesses to multipleitem storage locations 100 are to be interpreted. For example, if anagent 109 reaches into multipleitem storage locations 100 when picking anitem 221, it may be determined implicitly that the lastitem storage location 100 actually contained theitem 221, while the previousitem storage locations 100 did not. The itemmovement verification rules 242 may also specify situations where explicit feedback fromagents 109 is required in order to confirm or deny implicitly determined information that lacks certainty within a confidence threshold. - The
agent devices 212 are representative of a plurality of client devices that may be coupled to thenetwork 215. Theagent devices 212 may comprise, for example, a processor-based system such as a computer system. Such a computer system may be embodied in the form of a desktop computer, a laptop computer, personal digital assistants, cellular telephones, smartphones, set-top boxes, music players, web pads, tablet computer systems, game consoles, electronic book readers, smartwatches, head mounted displays, voice interface devices, or other devices. Theagent devices 212 may include adisplay 254. Thedisplay 254 may comprise, for example, one or more devices such as liquid crystal display (LCD) displays, gas plasma-based flat panel displays, organic light emitting diode (OLED) displays, electrophoretic ink (E ink) displays, LCD projectors, or other types of display devices, etc. - The
agent devices 212 may be configured to execute various applications such as aclient application 257 and/or other applications. Theclient application 257 may be executed in anagent device 212, for example, to access network content served up by thecomputing environment 203 and/or other servers, thereby rendering a user interface 260 on thedisplay 254. To this end, theclient application 257 may comprise, for example, a browser, a dedicated application, etc., and the user interface 260 may comprise a network page, an application screen, etc. For example, theclient application 257 may render a user interface 260 that directs theagent 109 to perform a certain task, like retrieving anitem 221 from a particularitem storage location 100 or storing anitem 221 to aparticular storage location 100, as well as confirming that the task has been performed, or reporting exceptions, such as the lack of anitem 221 in a givenitem storage location 100. Theagent devices 212 may be configured to execute applications beyond theclient application 257 such as, for example, email applications, social networking applications, word processors, spreadsheets, and/or other applications. - Referring next to
FIG. 3 , shown is a flowchart that provides one example of the operation of a portion of thefacility management application 227 according to various embodiments. It is understood that the flowchart ofFIG. 3 provides merely an example of the many different types of functional arrangements that may be employed to implement the operation of the portion of thefacility management application 227 as described herein. As an alternative, the flowchart ofFIG. 3 may be viewed as depicting an example of elements of a method implemented in the computing environment 203 (FIG. 2 ) according to one or more embodiments. - Beginning with
box 303, thefacility management application 227 determines that an item 221 (FIG. 2 ) is to be stored or retrieved. For example, thefacility management application 227 may process an inbound manifest ofitems 221 to be received at a materials handling facility 100 (FIG. 2 ). Alternatively, thefacility management application 227 may receive information indicating that orders foritems 221 have been placed by customers, or otherwise information indicating thatitems 221 are to be retrieved for transfer to another facility or to a different location within the same facility. - In
box 306, thefacility management application 227 determines a particularitem storage location 100 at which theitem 221 is to be stored or retrieved. In the case of a storage movement, thefacility management application 227 may execute an algorithm that determines an optimal assignment of theitem 221 to anitem storage location 100 based at least in part on item data 230 (FIG. 2 ) indicating weight, dimensions, fragility, hazardousness, and/or other characteristics and on storage location data 236 (FIG. 2 ) including capacity 245 (FIG. 2 ) (e.g., is free space in theitem storage location 100 available?), location (e.g., difficulty of an agent 109 (FIG. 1B ) to travel to or access the location), and/or other characteristics. The algorithm may take into account the current assigned items 248 (FIG. 2 ), which may include tentative assignments, confirmed assignments, invalidated assignments, and/or assignments having a different status. - In the case of a retrieval movement, the
facility management application 227 may take into account ease of access of theagent 109 to theitem storage location 100 and/or the feasibility of theitem storage location 100 to be delivered to anagent 109 via activation of a robotic drive unit. It may be the case that inventory of theitem 221 is located only in oneitem storage location 100, thereby making the decision a simple one. In other scenarios, thefacility management application 227 may choose a most easily accessible one of severalitem storage locations 100 that store inventory of the item 221 (e.g., a low shelf may be preferred over a shelf requiring a ladder to access). - In
box 309, thefacility management application 227 identifies anagent 109 to perform the item movement based at least in part on the agent data 239 (FIG. 2 ). Wheremultiple agents 109 are available, thefacility management application 227 may select anagent 109 based at least in part on proximity of theagent 109 to theitem storage location 100 selected inbox 306, the capability of theagent 109 to access or handle theitem 221, reliability of theagent 109, speed of theagent 109, and/or other factors. - In
box 312, thefacility management application 227 directs the selectedagent 109 to either store theitem 221 in, or retrieve theitem 221 from, the particularitem storage location 100. For example, thefacility management application 227 may send a notification or direction to theagent 109 via a user interface 260 (FIG. 2 ) of the agent device 212 (FIG. 2 ). The notification may comprise a text message, an email message, a telephone call, a voice notification, and/or other types of communications. Also, where robotic drive units are employed, thefacility management application 227 may command a robotic drive unit to bring a storage unit 218 (FIG. 2 ) including theitem storage location 100 to a location proximate to theagent 109. - In
box 315, thefacility management application 227 activates an RFID scanner 206 (FIG. 2 ). TheRFID scanner 206 may be at a fixed position at the location of theagent 109, a fixed position on thestorage unit 218, or at some other location in the materials handling facility 209 (FIG. 2 ). TheRFID scanner 206 is capable of scanning and receiving signals 106 (FIG. 1A ) from one or more RFIDs 103 (FIG. 1A ) ofitem storage locations 100 of aparticular storage unit 218. In one scenario, theRFID scanner 206 is always active and scanning. In another scenario, theRFID scanner 206 is activated based at least in part on motion of theagent 109. - In one embodiment, an antenna of the
RFID scanner 206 is disposed at or near the top of astorage unit 218, with a downward facing antenna pattern (e.g., a planar pattern), while theRFIDs 103 are disposed on the bottom of their correspondingitem storage locations 100. Such an embodiment may be best suited for detecting an attenuation in thesignals 106 from theRFIDs 103 caused by the agent's reach. In another embodiment, an antenna of theRFID scanner 206 is disposed at or near the bottom of astorage unit 218, with an upward facing antenna pattern (e.g., a planar pattern), while theRFIDs 103 are disposed on the bottom of their correspondingitem storage locations 100. Such an embodiment may be best suited for detecting a reflection or amplification in thesignals 106 from theRFIDs 103 caused by the agent's reach. In some cases, astorage unit 218 may have multiple faces, e.g. four faces, and the antenna of anRFID scanner 206 may be directed at a single face of thestorage unit 218. - In
box 318, thefacility management application 227 observes, via theRFID scanner 206, an impact to or change in asignal 106 from anRFID 103 over a predefined time period. For instance, at time T,RFID 103 may be observed to have a signal strength S, while attime T+ 1,RFID 103 may be observed to have a signal strength S−n. This attenuation is caused by anagent 109 reaching into anitem storage location 100 with a hand while wearing something that interferes with or attenuates thesignal 106 emanating from theRFID 103. For example, theagent 109 may wear a glove, watch, ring, wristband, and/or other item that is made of a specially chosen material to attenuate electromagnetic radio-frequency signals. Such a material may comprise a liquid gel, fabric with metal threads, urethane foam, and so on. The radio-frequency attenuating material becomes thereby interposed between theRFID 103 and theRFID scanner 206. - In another embodiment, at time T,
RFID 103 may be observed to have a signal strength S, while attime T+ 1,RFID 103 may be observed to have a signal strength S+n. This amplification is caused by anagent 109 reaching into anitem storage location 100 with a hand while wearing something that reflects or strengthens thesignal 106 emanating from theRFID 103. For example, theagent 109 may wear a glove, watch, ring, wristband, and/or other item that is made of a specially chosen material to reflect electromagnetic radio-frequency signals. Such a material may comprise a liquid gel, fabric with metal threads, urethane foam, and so on. The radio-frequency reflecting material thereby reflectssignals 106 from theRFID 103 back to theRFID scanner 206. - It is noted that attenuation or amplification of
signals 106 frommultiple RFIDs 103 may be observed via theRFID scanner 206. For example,item storage locations 100 may be vertically stacked, and a glove 112 (FIG. 1B ) may blocksignals 106 from an entire column ofRFIDs 103 anditem storage locations 100. However, signals 106 may tend to refract, reflect, and bypass the obstruction caused by theglove 112, so as to reach or emanate from theRFIDs 103 below the one most directly blocked by theglove 112. Thefacility management application 227 may choose theRFID 103 associated with the maximum observed impact over a time period, or theRFID 103 with thesignal 106 that has been most impacted. - Also, by blocking electromagnetic signals, the
glove 112 or other item may block signals sent to theRFID 103 by theRFID scanner 206 as well as thesignals 106 emanating from theRFID 103. Nonetheless, the effect would be similar, as blocking the signals sent to theRFID 103 would reduce the signals emanating from theRFID 103. More likely, thesignal 106 from the RFID 103 (as opposed to the signal from the RFID scanner 206) would be more significantly attenuated as it would be weaker. - In
box 321, thefacility management application 227 identifies theitem storage location 100 associated with theRFID 103 using the RFID data 251 (FIG. 2 ) and an identifier decoded from thesignal 106 of theRFID 103. Inbox 324, thefacility management application 227 determines whether impact is observed from anotherRFID 103 over a subsequent time period while theagent 109 is still performing the task. If so, thefacility management application 227 returns tobox 318 and observes the impacts. In such cases, theagent 109 may be accessing multipleitem storage locations 100 in an attempt to find theitem 221. The item movement verification rules 242 (FIG. 2 ) may govern when theitem 221 is deemed to have been finally stored or retrieved from a particularitem storage location 100, where multiple accesses are observed. In some cases, an explicit confirmation from theagent 109 may be required. - If multiple accesses or serial maximum signal changes are not observed, the
facility management application 227 continues tobox 327. Inbox 327, thefacility management application 227 determines whether theitem 221 has been retrieved from the correct location or stored in the correct location, where the correct location is the expected location. To make this determination, thefacility management application 227 may compare the location identified inbox 321 with the location determined inbox 306. If they do not match, theitem 221 has been stored in a different location, theitem 221 has been retrieved from a different location, theitem 221 has not been found (e.g., not in assigned bin), theitem 221 has not been stored (e.g., no space available), or another exception has occurred. - If the
item 221 has been stored in or retrieved from the expected location, thefacility management application 227 moves frombox 327 tobox 330 and updates a data record in the assigned items 248 (FIG. 2 ) to indicate that the tentative item movement has been confirmed. Thereafter, the operation of the portion of thefacility management application 227 ends. - If the
item 221 has not been stored in or retrieved from the expected location, thefacility management application 227 initiates one or more corrective actions inbox 333. In one example where theitem 221 is stored in a differentitem storage location 100, thefacility management application 227 may simply update the records in the data store 224 (FIG. 2 ) to show where theitem 221 is actually stored. If theitem 221 has been retrieved from a differentitem storage location 100, theitem 221 may have been incorrectly stored or moved previously, and the space available in theitem storage location 100 from which it was actually retrieved may be updated. In other cases, thefacility management application 227 may notify theagent 109 via theagent device 212 to move theitem 221 to the correctitem storage location 100, or to return the pickeditem 221 and to retrieve theitem 221 from the correctitem storage location 100. Thereafter, the operation of the portion of thefacility management application 227 ends. - With reference to
FIG. 4 , shown is a schematic block diagram of thecomputing environment 203 according to an embodiment of the present disclosure. Thecomputing environment 203 includes one ormore computing devices 400. Eachcomputing device 400 includes at least one processor circuit, for example, having aprocessor 403 and amemory 406, both of which are coupled to alocal interface 409. To this end, eachcomputing device 400 may comprise, for example, at least one server computer or like device. Thelocal interface 409 may comprise, for example, a data bus with an accompanying address/control bus or other bus structure as can be appreciated. - Stored in the
memory 406 are both data and several components that are executable by theprocessor 403. In particular, stored in thememory 406 and executable by theprocessor 403 are thefacility management application 227 and potentially other applications. Also stored in thememory 406 may be adata store 224 and other data. In addition, an operating system may be stored in thememory 406 and executable by theprocessor 403. - It is understood that there may be other applications that are stored in the
memory 406 and are executable by theprocessor 403 as can be appreciated. Where any component discussed herein is implemented in the form of software, any one of a number of programming languages may be employed such as, for example, C, C++, C#, Objective C, Java®, JavaScript®, Perl, PHP, Visual Basic®, Python®, Ruby, Flash®, or other programming languages. - A number of software components are stored in the
memory 406 and are executable by theprocessor 403. In this respect, the term “executable” means a program file that is in a form that can ultimately be run by theprocessor 403. Examples of executable programs may be, for example, a compiled program that can be translated into machine code in a format that can be loaded into a random access portion of thememory 406 and run by theprocessor 403, source code that may be expressed in proper format such as object code that is capable of being loaded into a random access portion of thememory 406 and executed by theprocessor 403, or source code that may be interpreted by another executable program to generate instructions in a random access portion of thememory 406 to be executed by theprocessor 403, etc. An executable program may be stored in any portion or component of thememory 406 including, for example, random access memory (RAM), read-only memory (ROM), hard drive, solid-state drive, USB flash drive, memory card, optical disc such as compact disc (CD) or digital versatile disc (DVD), floppy disk, magnetic tape, or other memory components. - The
memory 406 is defined herein as including both volatile and nonvolatile memory and data storage components. Volatile components are those that do not retain data values upon loss of power. Nonvolatile components are those that retain data upon a loss of power. Thus, thememory 406 may comprise, for example, random access memory (RAM), read-only memory (ROM), hard disk drives, solid-state drives, USB flash drives, memory cards accessed via a memory card reader, floppy disks accessed via an associated floppy disk drive, optical discs accessed via an optical disc drive, magnetic tapes accessed via an appropriate tape drive, and/or other memory components, or a combination of any two or more of these memory components. In addition, the RAM may comprise, for example, static random access memory (SRAM), dynamic random access memory (DRAM), or magnetic random access memory (MRAM) and other such devices. The ROM may comprise, for example, a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other like memory device. - Also, the
processor 403 may representmultiple processors 403 and/or multiple processor cores and thememory 406 may representmultiple memories 406 that operate in parallel processing circuits, respectively. In such a case, thelocal interface 409 may be an appropriate network that facilitates communication between any two of themultiple processors 403, between anyprocessor 403 and any of thememories 406, or between any two of thememories 406, etc. Thelocal interface 409 may comprise additional systems designed to coordinate this communication, including, for example, performing load balancing. Theprocessor 403 may be of electrical or of some other available construction. - Although the
facility management application 227 and other various systems described herein may be embodied in software or code executed by general purpose hardware as discussed above, as an alternative the same may also be embodied in dedicated hardware or a combination of software/general purpose hardware and dedicated hardware. If embodied in dedicated hardware, each can be implemented as a circuit or state machine that employs any one of or a combination of a number of technologies. These technologies may include, but are not limited to, discrete logic circuits having logic gates for implementing various logic functions upon an application of one or more data signals, application specific integrated circuits (ASICs) having appropriate logic gates, field-programmable gate arrays (FPGAs), or other components, etc. Such technologies are generally well known by those skilled in the art and, consequently, are not described in detail herein. - The flowchart of
FIG. 3 shows the functionality and operation of an implementation of portions of thefacility management application 227. If embodied in software, each block may represent a module, segment, or portion of code that comprises program instructions to implement the specified logical function(s). The program instructions may be embodied in the form of source code that comprises human-readable statements written in a programming language or machine code that comprises numerical instructions recognizable by a suitable execution system such as aprocessor 403 in a computer system or other system. The machine code may be converted from the source code, etc. If embodied in hardware, each block may represent a circuit or a number of interconnected circuits to implement the specified logical function(s). - Although the flowchart of
FIG. 3 shows a specific order of execution, it is understood that the order of execution may differ from that which is depicted. For example, the order of execution of two or more blocks may be scrambled relative to the order shown. Also, two or more blocks shown in succession inFIG. 3 may be executed concurrently or with partial concurrence. Further, in some embodiments, one or more of the blocks shown inFIG. 3 may be skipped or omitted. In addition, any number of counters, state variables, warning semaphores, or messages might be added to the logical flow described herein, for purposes of enhanced utility, accounting, performance measurement, or providing troubleshooting aids, etc. It is understood that all such variations are within the scope of the present disclosure. - Also, any logic or application described herein, including the
facility management application 227, that comprises software or code can be embodied in any non-transitory computer-readable medium for use by or in connection with an instruction execution system such as, for example, aprocessor 403 in a computer system or other system. In this sense, the logic may comprise, for example, statements including instructions and declarations that can be fetched from the computer-readable medium and executed by the instruction execution system. In the context of the present disclosure, a “computer-readable medium” can be any medium that can contain, store, or maintain the logic or application described herein for use by or in connection with the instruction execution system. - The computer-readable medium can comprise any one of many physical media such as, for example, magnetic, optical, or semiconductor media. More specific examples of a suitable computer-readable medium would include, but are not limited to, magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memory cards, solid-state drives, USB flash drives, or optical discs. Also, the computer-readable medium may be a random access memory (RAM) including, for example, static random access memory (SRAM) and dynamic random access memory (DRAM), or magnetic random access memory (MRAM). In addition, the computer-readable medium may be a read-only memory (ROM), a programmable read-only memory (PROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), or other type of memory device.
- Further, any logic or application described herein, including the
facility management application 227, may be implemented and structured in a variety of ways. For example, one or more applications described may be implemented as modules or components of a single application. Further, one or more applications described herein may be executed in shared or separate computing devices or a combination thereof. For example, a plurality of the applications described herein may execute in thesame computing device 400, or inmultiple computing devices 400 in thesame computing environment 203. - Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
- It should be emphasized that the above-described embodiments of the present disclosure are merely possible examples of implementations set forth for a clear understanding of the principles of the disclosure. Many variations and modifications may be made to the above-described embodiment(s) without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.
Claims (22)
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/252,642 US9904826B1 (en) | 2016-08-31 | 2016-08-31 | Implicitly confirming item movement |
| PCT/US2017/048615 WO2018044716A1 (en) | 2016-08-31 | 2017-08-25 | Implicitly confirming item movement |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/252,642 US9904826B1 (en) | 2016-08-31 | 2016-08-31 | Implicitly confirming item movement |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US9904826B1 US9904826B1 (en) | 2018-02-27 |
| US20180060619A1 true US20180060619A1 (en) | 2018-03-01 |
Family
ID=59930757
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/252,642 Active US9904826B1 (en) | 2016-08-31 | 2016-08-31 | Implicitly confirming item movement |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US9904826B1 (en) |
| WO (1) | WO2018044716A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2021005452A1 (en) * | 2019-07-05 | 2021-01-14 | Coupang Corp. | Stowing worker user interface |
| WO2021014237A1 (en) * | 2019-07-22 | 2021-01-28 | Coupang Corp. | Systems and methods for scheduling inbound products, stowing inbound products, and monitoring inbound error |
| WO2021019324A1 (en) * | 2019-07-26 | 2021-02-04 | Coupang Corp. | Systems and methods for providing stowing location recommendation |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170147967A1 (en) * | 2015-11-20 | 2017-05-25 | Tata Consultancy Services Limited | Real-time pallet allocation |
| US20180285808A1 (en) * | 2017-04-03 | 2018-10-04 | Amazon Technologies, Inc. | Using proximity sensors for bin association and detection |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8369981B2 (en) * | 2005-12-14 | 2013-02-05 | Ncr Corporation | Methods and apparatus for managing location information for movable objects |
| US8890684B2 (en) | 2011-06-17 | 2014-11-18 | Checkpoint Systems, Inc. | Background object sensor |
| EP2930680A4 (en) | 2012-12-04 | 2016-08-03 | Nec Corp | Product management system, product management method, and non-temporary computer-readable medium for storing product management program |
| TWI486886B (en) * | 2013-03-27 | 2015-06-01 | Wistron Neweb Corp | System and method for positioning |
-
2016
- 2016-08-31 US US15/252,642 patent/US9904826B1/en active Active
-
2017
- 2017-08-25 WO PCT/US2017/048615 patent/WO2018044716A1/en not_active Ceased
Cited By (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TWI743867B (en) * | 2019-07-05 | 2021-10-21 | 南韓商韓領有限公司 | System and method for stowing products |
| TWI831051B (en) * | 2019-07-05 | 2024-02-01 | 南韓商韓領有限公司 | System and method for stowing products |
| US11667470B2 (en) | 2019-07-05 | 2023-06-06 | Coupang Corp. | Stowing worker user interface |
| US11046516B2 (en) | 2019-07-05 | 2021-06-29 | Coupang Corp. | Stowing worker user interface |
| JP7187587B2 (en) | 2019-07-05 | 2022-12-12 | クーパン コーポレイション | Storage operator user interface |
| JP2021525934A (en) * | 2019-07-05 | 2021-09-27 | クーパン コーポレイション | Storage worker user interface |
| WO2021005452A1 (en) * | 2019-07-05 | 2021-01-14 | Coupang Corp. | Stowing worker user interface |
| JP2021528739A (en) * | 2019-07-22 | 2021-10-21 | クーパン コーポレイション | Systems and methods for scheduling inbound products, storing inbound products, and monitoring inbound errors |
| JP7036951B2 (en) | 2019-07-22 | 2022-03-15 | クーパン コーポレイション | Systems and methods for scheduling inbound products, storing inbound products, and monitoring inbound errors |
| US11055663B2 (en) | 2019-07-22 | 2021-07-06 | Coupang Corp. | Systems and methods for scheduling inbound products, stowing inbound products, and monitoring inbound error |
| US11783290B2 (en) | 2019-07-22 | 2023-10-10 | Coupang Corp. | Systems and methods for scheduling inbound products, stowing inbound products, and monitoring inbound error |
| WO2021014237A1 (en) * | 2019-07-22 | 2021-01-28 | Coupang Corp. | Systems and methods for scheduling inbound products, stowing inbound products, and monitoring inbound error |
| US11392893B2 (en) | 2019-07-26 | 2022-07-19 | Coupang Corp. | Systems and methods for providing stowing location recommendation |
| WO2021019324A1 (en) * | 2019-07-26 | 2021-02-04 | Coupang Corp. | Systems and methods for providing stowing location recommendation |
| US12147945B2 (en) | 2019-07-26 | 2024-11-19 | Coupang Corp. | Systems and methods for providing stowing location recommendation |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2018044716A1 (en) | 2018-03-08 |
| US9904826B1 (en) | 2018-02-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9904826B1 (en) | Implicitly confirming item movement | |
| US11397915B2 (en) | Ex-warehousing method and device | |
| US8463659B2 (en) | Protection of privacy in connection with shipment of products | |
| US8024064B1 (en) | Placement of inventory in a materials handling facility | |
| US8626548B2 (en) | Access point triangulation for task assignment of warehouse employees | |
| CA2934328C (en) | Systems and methods for replenishment of products in multiple locations | |
| CA2761180C (en) | Processing shipment status events | |
| CN111784240B (en) | Method, device, equipment and storage medium for goods delivery | |
| US9818002B1 (en) | Non-binding placement of inventory in a materials handling facility | |
| CN111738656A (en) | Distribution method, device, equipment and storage medium in internal distribution warehouse | |
| US10332058B1 (en) | Real time communication for carrier operations | |
| US10892836B2 (en) | Automated RFID tag profiling at application | |
| KR102745222B1 (en) | Computer-implemented method for detecting fraudulent transactions using locality sensitive hashing and locality outlier factor algorithms | |
| US7756902B2 (en) | Auto-id simulator | |
| US10442087B1 (en) | Applying fluorescent markings to items to aid robotic handling | |
| US11960401B2 (en) | Systems and methods for dynamic in-memory caching of mappings into partitions | |
| US9342063B1 (en) | Determining capacities of work buffers | |
| KR102554831B1 (en) | Electronic apparatus for providing picking information of item and method thereof | |
| US12026635B1 (en) | Event image information retention | |
| TWI899125B (en) | Electronic apparatus for providing picking information of item and method thereof | |
| US9824318B1 (en) | Generating labor requirements | |
| US10579956B1 (en) | Verifying user-provided data feeds | |
| KR102912507B1 (en) | Methods, devices, equipment and storage media for issuing goods | |
| JP2014051331A (en) | Stocktaking support method using rfid reader | |
| JP5826061B2 (en) | Entry / exit management system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: AMAZON TECHNOLOGIES, INC., WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BATHURST, ALLAN SCOTT;REEL/FRAME:040043/0813 Effective date: 20160828 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |