WorldWideScience

Sample records for band rfid neutron

  1. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Nekoogar, F; Dowla, F; Wang, T

    2010-01-27

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable {sup 3}He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  2. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    International Nuclear Information System (INIS)

    Nekoogar, F.; Dowla, F.; Wang, T.

    2010-01-01

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable 3 He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  3. RFID antenna design for circular polarization in UHF band

    Science.gov (United States)

    Shahid, Hamza; Khan, Muhammad Talal Ali; Tayyab, Umais; Irshad, Usama Bin; Alkhazraji, Emad; Javaid, Muhammad Sharjeel

    2017-05-01

    A miniature half cross dipole antenna for defense and aerospace RFID applications in UHF band is presented. The dipole printed line arms are half crossed shape on top of dielectric substrate backed by reactive impedance surface. The antenna fed by a coaxial cable at the gap separating the dipole arms. Our design is intended to work at 2.42 GHz for RFID readers. The radiation pattern obtained has HPBW of 112, return loss of 22.24 dB and 90 MHz bandwidth.

  4. Design of an HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization.

    Science.gov (United States)

    Mi, Jian; Takahashi, Yasutake

    2016-07-29

    Radio frequency identification (RFID) technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL) method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF)-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot.

  5. An Design of HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization

    Directory of Open Access Journals (Sweden)

    Jian Mi

    2016-07-01

    Full Text Available Radio frequency identification (RFID technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot.

  6. A Compact Dual-Band RFID Tag Antenna Mountable on Metallic Objects

    Directory of Open Access Journals (Sweden)

    Byeonggwi Mun

    2015-01-01

    Full Text Available A compact (50 × 50 × 4 mm3 dual-band radio frequency identification (RFID tag antenna mountable on metallic objects is proposed for the ultra-high frequency (UHF band (917∼923.5 MHz and the microwave (MW band (2.4∼2.45 GHz. With the proximity-coupled feed loop, the proposed antenna consists of two symmetric planar inverted-F antenna (PIFA elements for the UHF band passive tag and a meander microstrip patch antenna for the MW band active tag. The performance of the proposed antenna is verified by mounting it on the different sizes of the metallic object. Furthermore, the passive tag antenna in the UHF band furthermore may be used for energy harvesting techniques to improve the lifetime of the active tag in the MW band. The measured maximum read range is 5.50 m in the UHF band and 14.15 m in the MW band when the proposed tag antenna is mounted on the metallic objects. The total efficiency for all operating frequency bands is higher than 50%. High isolation (>12 dB between tag antennas in the UHF band and the MW band is achieved.

  7. Reduced size dual band pass filters for RFID applications with excellent bandpass/bandstop characteristics

    Science.gov (United States)

    Abdalla, M. A.; Choudhary, D. Kumar; Chaudhary, R. Kumar

    2018-02-01

    This paper presents the design of two reduced size dual-band metamaterial bandpass filters and its simulation followed by measurements of proposed filters. These filters are supporting different frequency bands and primarily could be utilize in radio frequency identification (RFID) application. The filter includes three cells in which two are symmetrical and both inductively coupled with the third cell which is present in between them. In the proposed designs, three different metamaterial composite right/left handed (CRLH) cell resonators have been analysed for compactness. The CRLH cell consists of an interdigital capacitor, a stub/meander line/spiral inductor and a via to connect the top of the structure and ground plane. Finally, the proposed dual band bandpass filters (using meander line and spiral inductor) are showing size reduction by 65% and 50% (with 25% operating frequency reduction), respectively, in comparison with reference filter using stub inductor. More than 30 dB attenuation has been achieved between the two passbands.

  8. Technologie RFID

    OpenAIRE

    Černý, Tomáš

    2007-01-01

    Práce poskytuje přehled o problematice RFID technologií. Analyzuje historický vývoj RFID technologií, popisuje základní komponenty RFID systémů, normy spojené s RFID, bezpečnost RFID a trh RFID technologií. Dále se práce věnuje možnostem využití RFID technologií v různých oborech, zařazení RFID systémů do rámce podnikové informatiky a hodnotí efekty, které RFID technologie přináší. Práce také definuje doporučený postup pro zavádění RFID technologií do firmy....

  9. A dual-band near-field focused reflectarray antenna for RFID applications at 0.9 and 2.4 GHz

    Science.gov (United States)

    Chou, Hsi-Tseng; Hsueh, Pai-Han; Hung, Tso-Ming; Kuo, Li-Ruei; Chou, Hsi-Hsir

    2011-12-01

    This paper presents a dual-band reflectarray antenna which operates at 0.915 and 2.4 GHz to radiate electromagnetic fields focused in the near-zone of array aperture. The design uses two stacked feed antennas operated at 0.915 and 2.4 GHz, respectively, so that the currently available RFID systems in the market can be simultaneously used in an independent fashion. Numerical investigations on the radiation characteristics of this reflectarray, as well as an experimental validation, are presented to demonstrate its feasibility.

  10. Study of the Mercury M6e RFID reader for Ultra High Frequency band and testing operations

    OpenAIRE

    Gonzalez García, Alvaro

    2017-01-01

    Pg. 6 Report 1 Introduction 1.1 Abstract In order to sum up the whole work done here, we must begin explaining with a fast overview of the contents that are going to appear below. At the beginning of the semester, the UPC bought the M6e RFID for UHF reader from mercury in the interest of make some research at experimental level and stating constancy of the knowhow of the equipment operation. This project defines not only the operation but also the scope...

  11. Observation of rotational bands in neutron-rich sup 1 sup 0 sup 6 Mo nucleus

    CERN Document Server

    Xu Rui Qing; Li Ke; Yang Li Ming; Zhu Ling Yan; Gan Cui Yun; Zhang Zheng; Jiang Zhuo; Xiao Shu Dong; Hamilton, J H; Ramayya, A V; Hwang, J K; Zhang, X Q; Kormicki, J; Jones, E F; Ma, W C; Cole, J D; Aryaeinejad, R; Drigert, M W; Lee, I Y; Rasmussen, J O; Stoyer, M A; Ter-Akopian, G M; Daniel, A V

    2002-01-01

    The rotational bands up to a spin of 16 Planck constant in the neutron-rich sup 1 sup 0 sup 6 Mo nucleus have been investigated by measuring high-fold prompt gamma-ray coincidence events following spontaneous fission of sup 2 sup 5 sup 2 Cf with a Gamma-sphere detector array. The ground-state band, the one-phonon and two-phonon gamma-vibrational bands, as well as a quasi-particle band have been confirmed and expanded. The other four collective rotational bands, three proposed as two quasi-particle bands and one proposed as a beta-vibrational band, have been newly observed. The characteristics of these collective bands and the possible configurations for the quasi-particle bands are discussed

  12. Use of RFID Technology for Identification, Traceability Monitoring and the Checking of Product Authenticity

    OpenAIRE

    Adriana Alexandru; Eleonora Tudora; Ovidiu Bica

    2010-01-01

    This paper is an overview of the structure of Radio Frequency Identification (RFID) systems and radio frequency bands used by RFID technology. It also presents a solution based on the application of RFID for brand authentication, traceability and tracking, by implementing a production management system and extending its use to traders.

  13. Direct interaction of fast neutrons with β and γ vibrational band levels of tungsten even isotopes

    International Nuclear Information System (INIS)

    Delaroche, J.P.

    1982-09-01

    As an extension of a previous report on fast neutron scattering from the first and second excited states of 182 W, 184 W, 186 W, we have investigated the question of the importance of direct interaction of neutrons with β- and γ-band levels of these nuclei. For that purpose we have performed new coupled channel calculations using extended coupling bases and collective functions from the Rotation-Vibration and Kumar and Baranger Models. The predictions are compared with recent scattering data obtained at incident energies below 4 MeV [fr

  14. Saturation of Deformation and Identical Bands in Very-Neutron Rich Sr Isotopes

    CERN Multimedia

    2002-01-01

    The present proposal aims at establishing nuclear properties in an isotopic chain showing unique features. These features include the saturation of ground state deformation at its onset and the existence of ground state identical bands in neighbouring nuclei with the same deformation. The measurements should help to elucidate the role played by the proton-neutron residual interaction between orbitals with large spatial overlap, i.e. $\\pi g _{9/2} \

  15. Chipless RFID reader architecture

    CERN Document Server

    Karmakar, Nemai Chandra; Kalansuriya, Prasanna

    2013-01-01

    In the era of information communication technology (ICT), radio frequency identification (RFID) has been going through tremendous development. RFID technology has the potential of replacing barcodes due to its large information carrying capacity, flexibility in operations, and applications. The deployment of RFID has been hindered by its cost. However, with the advent of low powered ICs, energy scavenging techniques, and low-cost chipless tags, RFID technology has achieved significant development. This book addresses the new reader architecture, presents fundamentals of chipless RFID systems,

  16. Study of the structure of yrast bands of neutron-rich 114-124Pd isotopes

    Science.gov (United States)

    Chaudhary, Ritu; Devi, Rani; Khosa, S. K.

    2018-02-01

    The projected shell model calculations have been carried out in the neutron-rich 114-124Pd isotopic mass chain. The results have been obtained for the deformation systematics of E(2+1) and E(4+1)/E({2}+1) values, BCS subshell occupation numbers, yrast spectra, backbending phenomena, B( E2) transition probabilities and g-factors in these nuclei. The observed systematics of E(2+1) values and R_{42} ratios in the 114-124Pd isotopic mass chain indicate that there is a decrease of collectivity as the neutron number increases from 68 to 78. The occurrence of backbending in these nuclei as well as the changes in the calculated B( E2) transition probabilities and g -factors predict that there are changes in the structure of yrast bands in these nuclei. These changes occur at the spin where there is crossing of g-band by 2-qp bands. The predicted backbendings and predicted values of B( E2)s and g-factors in some of the isotopes need to be confirmed experimentally.

  17. RFID-tekniikka kirjastoissa

    OpenAIRE

    Kivimäki, Petteri

    2010-01-01

    Tässä opinnäytetyössä tutustuttiin RFID-tekniikan toimintaperiaatteisiin ja sen käyttöön kirjastoympäristössä. Työssä käytiin läpi kirjastojen keskeisimmät tietojärjestelmät sekä niiden yhteistoiminta RFID-järjestelmän kanssa. Osana työtä kehitettiin RFID-järjestelmän ja kirjastojärjestelmän yhteiskäyttöä tehostava RFID Plugin -sovellus. RFID on radiotaajuuksiin perustuva langaton tekniikka tiedon etälukuun ja tallentamiseen. RFID-järjestelmät koostuvat neljästä peruskomponentista: tunnist...

  18. Chipless RFID transponder design

    OpenAIRE

    Balbin, Isaac

    2017-01-01

    Radio Frequency Identification (RFID) is a wireless data transmission and reception technology for automatic identification, asset tracking and security surveillance. RFID technology has gained momentum in market penetration, with both the US Department of Defense and retail giant Wal-Mart introducing mandatory tagging of goods in their supply chain. However, for large-scale RFID implementation, the cost of the systems cannot compete with optical barcodes. The main hindrance is the cost of th...

  19. RFID design principles

    CERN Document Server

    Lehpamer, Harvey

    2012-01-01

    This revised edition of the Artech House bestseller, RFID Design Principles, serves as an up-to-date and comprehensive introduction to the subject. The second edition features numerous updates and brand new and expanded material on emerging topics such as the medical applications of RFID and new ethical challenges in the field. This practical book offers you a detailed understanding of RFID design essentials, key applications, and important management issues. The book explores the role of RFID technology in supply chain management, intelligent building design, transportation systems, military

  20. RFID Malware: Truth vs. Myth

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The issues related to RFID malware along with proof-of-concept RFID virus are discussed. RFID exploits are traditionally hacking attacks that are identical to those found on Internet, such as buffer overflow, code insertion, and SQL injection attack. RFID warms copy the original exploit code to

  1. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  2. RFID Location Algorithm

    Directory of Open Access Journals (Sweden)

    Wang Zi Min

    2016-01-01

    Full Text Available With the development of social services, people’s living standards improve further requirements, there is an urgent need for a way to adapt to the complex situation of the new positioning technology. In recent years, RFID technology have a wide range of applications in all aspects of life and production, such as logistics tracking, car alarm, security and other items. The use of RFID technology to locate, it is a new direction in the eyes of the various research institutions and scholars. RFID positioning technology system stability, the error is small and low-cost advantages of its location algorithm is the focus of this study.This article analyzes the layers of RFID technology targeting methods and algorithms. First, RFID common several basic methods are introduced; Secondly, higher accuracy to political network location method; Finally, LANDMARC algorithm will be described. Through this it can be seen that advanced and efficient algorithms play an important role in increasing RFID positioning accuracy aspects.Finally, the algorithm of RFID location technology are summarized, pointing out the deficiencies in the algorithm, and put forward a follow-up study of the requirements, the vision of a better future RFID positioning technology.

  3. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin

    2011-07-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without an integrated negative impedance converter designed to cancel out the antenna\\'s input capacitance at resonance frequency was designed, simulated, constructed and measured for implementation in RFID applications. © 2011 IEEE.

  4. RFID Malware: Design Principles and Examples

    NARCIS (Netherlands)

    Rieback, M.R.; Simpson, P.N.D.; Crispo, B.; Tanenbaum, A.S.

    2006-01-01

    This paper explores the concept of malware for Radio Frequency Identification (RFID) systems - including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID

  5. Object Tracking with RFID

    Science.gov (United States)

    Yamada, Kou; Uchida, Seiichi; Taniguchi, Rin-Ichiro

    This paper reports a new method for visual tracking of humans using active RFID technology. Previous studies were based on the assumption that the radio intensity from an RFID tag will be linearly proportional to the distance between the tag and the antenna or will remain unchanged; however, in reality, the intensity fluctuates significantly and changes drastically with a small change in the environment. The proposed method helps to overcome this problem by using only accurate binary information that reveals whether the target person is close to the antenna. Several experimental results have shown that the information from the RFID tag was useful for reliable tracking of humans.

  6. RFID system in warehouse management

    OpenAIRE

    Stipančič, Vedran

    2014-01-01

    The goal of the thesis was to create an RFID system that enables traceability of products, tagged with RFID stickers or tags and overview of data on desktop or mobile devices. In the implementation of the RFID system, two applications were developed, called RFID Portal and SCM Portal. RFID Portal is a desktop application that operates an RFID door, which detects products, that arrive at a warehouse and leave it and temperatures in which they were kept. All the collected data is sent to the we...

  7. RFID system in warehouse management

    OpenAIRE

    STIPANČIČ, VEDRAN

    2014-01-01

    Cilj diplomske naloge je bila izdelava RFID sistema, ki v skladišču omogoča sledljivost produktov, označenih z RFID nalepkami oz. značkami in pregled na namiznih ali mobilnih napravah. Za izdelavo RFID sistema sta bili razviti dve aplikaciji, imenovani RFID Portal in SCM Portal. RFID Portal je namizna aplikacija, ki upravlja z RFID vrati. Ta zaznavajo produkte, ki prihajajo v skladišče in ga zapuščajo ter temperature v katerih so bili shranjeni. Vsi tako zbrani podatki so poslani spletni apli...

  8. Determination of the neutron star mass-radii relation using narrow-band gravitational wave detector

    Energy Technology Data Exchange (ETDEWEB)

    Lenzi, C H; Malheiro, M; Marinho, R M [Departamento de Fisica, Instituto Tecnologico de Aeronautica, Sao Jose dos Campos/SP (Brazil); Marranghello, G F [Universidade Federal do Pampa, Bage/RS (Brazil); Providencia, C, E-mail: chlenzi@ita.b [Centro de Fisica Computacional, Departamento de Fisica, Universidade de Coimbra, Coimbra (Portugal)

    2009-03-01

    The direct detection of gravitational waves will provide valuable astrophysical information about many celestial objects. The most promising sources of gravitational waves are neutron stars and black holes. These objects emit waves in a very wide spectrum of frequencies determined by their quasi-normal modes oscillations. In this work we are concerned with the information we can extract from f and pI-modes when a candidate leaves its signature in the resonant mass detectors ALLEGRO, EXPLORER, NAUTILUS, MiniGrail and SCHENBERG. Using the empirical equations, that relate the gravitational wave frequency and damping time with the mass and radii of the source, we have calculated the radii of the stars for a given interval of masses M in the range of frequencies that include the bandwidth of all resonant mass detectors. With these values we obtain diagrams of mass-radii for different frequencies that have allowed to determine the better candidates to future detection taking in account the compactness of the source. Finally, to determine which are the models of compact stars that emit gravitational waves in the frequency band of the mass resonant detectors, we compare the mass-radii diagrams obtained by different neutron stars sequences from several relativistic hadronic equations of state (GM1, GM3, TM1, NL3) and quark matter equations of state (NJL, MTI bag model). We verify that quark stars obtained from MIT bag model with bag constant equal to 170 MeV and quark matter in color-superconductivity phase are the best candidates for mass resonant detectors.

  9. The Evolution of RFID Security

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home

  10. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  11. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  12. Managing RFID sensors networks with a general purpose RFID middleware.

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  13. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  14. Miniaturizing RFID for magnamosis.

    Science.gov (United States)

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag.

  15. RFID design fundamentals and applications

    CERN Document Server

    Lozano-Nieto, Albert

    2010-01-01

    RFID is an increasingly pervasive tool that is now used in a wide range of fields. It is employed to substantiate adherence to food preservation and safety standards, combat the circulation of counterfeit pharmaceuticals, and verify authenticity and history of critical parts used in aircraft and other machinery-and these are just a few of its uses. Goes beyond deployment, focusing on exactly how RFID actually worksRFID Design Fundamentals and Applications systematically explores the fundamental principles involved in the design and characterization of RFID technologies. The RFID market is expl

  16. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  17. RFID added value sensing capabilities

    DEFF Research Database (Denmark)

    Anggorjati, B.; Çetin, K.; Mihovska, A.

    2010-01-01

    Radio frequency identification (RFID) is a key technology for Europe. Since the initial emergence of the technology, there has been a noticeable shift away from RFID pilot projects of the early days, towards a broad deployment of RFID in order to increase the efficiency and innovation of processes....... Even though Europe is a leading player in the world of RFID technology, several challenges need to be addressed in order for RFID to reach its full potential. The funded under FP7 ICT project ASPIRE is one of the coordinated European efforts to further the advancement of this technology, in the areas...... of enabling technology development for RFID. In particular, the focus of ASPIRE is on design, development and adoption of an innovative, programmable, royalty-free, lightweight and privacy friendly RFID middleware....

  18. Slip-band formation and dislocation kinetics in the stage I deformation of neutron-irradiated copper single crystals

    International Nuclear Information System (INIS)

    Kitajima, Sadakichi; Shinohara, Kazutoshi; Kutsuwada, Masanori

    1995-01-01

    The velocity of edge and screw dislocations moving in primary slip bands and the formation rate of primary slip bands were measured in stage I deformation of neutron-irradiated copper single crystals at different strain rates at room temperature using micro-cinematography and optical micrography. The average velocity of edge dislocations was larger at least by one order than that of screw ones, and that of screw dislocations did not depend so strongly on strain rate. The formation rate of primary slip bands was proportional to strain rate. From these results, it is concluded that (1) jogs produced on moving dislocations by cutting dislocation loops result in the difference in velocity between edge and screw dislocations and (2) the change in the density of mobile dislocations as well as velocity of dislocations is responsible for the change of plastic strain rate of a crystal. (author)

  19. Band crossings in mercury nuclei: effect of occupation of i13/2 neutron orbits

    International Nuclear Information System (INIS)

    Khadkikar, S.B.; Praharaj, C.R.

    1984-04-01

    The K=0 + ground band and two rotation-aligned bands (K=1 + or K2 + two quasi-particle band and K=2 + four quasi-particle band) are studied in 198 Hg, 194 Hg and 190 Hg by angular momentum projection from Hartree-Fock and particle-hole intrinsic states. There is a first anomaly in these three nuclei around 8(h/2π) due to the crossing of the ground band and the two quasi-particle band. Because of the nature of occupation of i13/2 orbitals the four quasi-particle band is too highlying in 198 Hg and does not cross the two quasi-particle bands, while such a second crossing occurs in 194 Hg and 190 Hg near 20 (h/2π). (author)

  20. Radio frequency identification and sensors from rfid to chipless RFID

    CERN Document Server

    Perret, Etienne

    2014-01-01

    This book deals with the field of identification and sensors, more precisely the possibility of collecting information remotely with RF waves (RFID). The book introduces the technology of chipless RFID starting from classical RFID and barcode, and explores the field of identification and sensors without wire, without batteries, without chip, and with tags that can even be printed on paper. A technique for automatic design of UHF RFID tags is presented , aiming at making the tags as insensitive as possible to the environment (with the ability to increase the reading range reliability), or, co

  1. RFID solution benefits Cambridge hospital.

    Science.gov (United States)

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals.

  2. RATT: RFID Assisted Tracking Tile. Preliminary results.

    Science.gov (United States)

    Quinones, Dario R; Cuevas, Aaron; Cambra, Javier; Canals, Santiago; Moratal, David

    2017-07-01

    Behavior is one of the most important aspects of animal life. This behavior depends on the link between animals, their nervous systems and their environment. In order to study the behavior of laboratory animals several tools are needed, but a tracking tool is essential to perform a thorough behavioral study. Currently, several visual tracking tools are available. However, they have some drawbacks. For instance, when an animal is inside a cave, or is close to other animals, the tracking cameras cannot always detect the location or movement of this animal. This paper presents RFID Assisted Tracking Tile (RATT), a tracking system based on passive Radio Frequency Identification (RFID) technology in high frequency band according to ISO/IEC 15693. The RATT system is composed of electronic tiles that have nine active RFID antennas attached; in addition, it contains several overlapping passive coils to improve the magnetic field characteristics. Using several tiles, a large surface can be built on which the animals can move, allowing identification and tracking of their movements. This system, that could also be combined with a visual tracking system, paves the way for complete behavioral studies.

  3. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  4. Indoor localization using passive RFID

    Science.gov (United States)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Segou, Olga E.; Mitilineos, Stelios A.; Thomopoulos, Stelios C. A.

    2011-06-01

    Radio frequency identification (RFID) systems based on passive tags are used successfully in a wide range of object identification applications. However, the increasing needs to meet new demands on applications of localization and tracking create a new field for evolution of the RFID technology. This paper presents the design, implementation, and evaluation of a cost-effective localization system for in-building usage that is able to localize objects that carry passive RFID tags. The RFID reading is performed by a single Reader and an array of directional antennas through multiplexing. Evaluation and experimental results from three localization algorithms based on RSSI are presented.

  5. Coherent band excitations in CePd 3 : A comparison of neutron scattering and ab initio theory

    Energy Technology Data Exchange (ETDEWEB)

    Goremychkin, Eugene A.; Park, Hyowon; Osborn, Raymond; Rosenkranz, Stephan; Castellan, John-Paul; Fanelli, Victor R.; Christianson, Andrew D.; Stone, Matthew B.; Bauer, Eric D.; McClellan, Kenneth J.; Byler, Darrin D.; Lawrence, Jon M.

    2018-01-11

    In common with many strongly correlated electron systems, intermediate valence compounds are believed to display a crossover from a high-temperature regime of incoherently fluctuating local moments to a low-temperature regime of coherent hybridized bands. We show that inelastic neutron scattering measurements of the dynamic magnetic susceptibility of CePd3 provides a benchmark for ab initio calculations based on dynamical mean field theory. The magnetic response is strongly momentum dependent thanks to the formation of coherent f-electron bands at low temperature, with an amplitude that is strongly enhanced by local particle-hole interactions. The agreement between experiment and theory shows that we have a robust first-principles understanding of the temperature dependence of f-electron coherence.

  6. Coherent band excitations in CePd3: A comparison of neutron scattering and ab initio theory

    Science.gov (United States)

    Goremychkin, Eugene A.; Park, Hyowon; Osborn, Raymond; Rosenkranz, Stephan; Castellan, John-Paul; Fanelli, Victor R.; Christianson, Andrew D.; Stone, Matthew B.; Bauer, Eric D.; McClellan, Kenneth J.; Byler, Darrin D.; Lawrence, Jon M.

    2018-01-01

    In common with many strongly correlated electron systems, intermediate valence compounds are believed to display a crossover from a high-temperature regime of incoherently fluctuating local moments to a low-temperature regime of coherent hybridized bands. We show that inelastic neutron scattering measurements of the dynamic magnetic susceptibility of CePd3 provides a benchmark for ab initio calculations based on dynamical mean field theory. The magnetic response is strongly momentum dependent thanks to the formation of coherent f-electron bands at low temperature, with an amplitude that is strongly enhanced by local particle-hole interactions. The agreement between experiment and theory shows that we have a robust first-principles understanding of the temperature dependence of f-electron coherence.

  7. Coherent band excitations in CePd3: A comparison of neutron scattering and ab initio theory.

    Science.gov (United States)

    Goremychkin, Eugene A; Park, Hyowon; Osborn, Raymond; Rosenkranz, Stephan; Castellan, John-Paul; Fanelli, Victor R; Christianson, Andrew D; Stone, Matthew B; Bauer, Eric D; McClellan, Kenneth J; Byler, Darrin D; Lawrence, Jon M

    2018-01-12

    In common with many strongly correlated electron systems, intermediate valence compounds are believed to display a crossover from a high-temperature regime of incoherently fluctuating local moments to a low-temperature regime of coherent hybridized bands. We show that inelastic neutron scattering measurements of the dynamic magnetic susceptibility of CePd 3 provides a benchmark for ab initio calculations based on dynamical mean field theory. The magnetic response is strongly momentum dependent thanks to the formation of coherent f-electron bands at low temperature, with an amplitude that is strongly enhanced by local particle-hole interactions. The agreement between experiment and theory shows that we have a robust first-principles understanding of the temperature dependence of f-electron coherence. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  8. 3-D transponder antennas for future SHF RFID applications

    Science.gov (United States)

    Zichner, R.; Baumann, R. R.

    2011-12-01

    The radio frequency identification (RFID) technology is omnipresent since a few years. Some of the most popular fields of application are the use for security tasks, for logistics and for the consumer segment. For example, chip card or key ring sized RFID transponders can allow wireless access to secured rooms. The number of applications for wireless data transmission for the identification and tracking of objects increases every year. There is a large development need for highly functional and inexpensive RFID transponders due to the ever-increasing demand on improved reliability, higher data rates and read and write ranges of the RFID systems. Therefore, research was performed on new 3-D transponder antennas for the Super High Frequency Band around 5.8 GHz. Additionally, wave propagation effects and the influence of different dielectric environments were considered. Parallel to the design of the novel antenna structures, the printing process for inexpensive manufacturing was investigated. The gained results are the basis for prospective RFID applications.

  9. Untangling RFID Privacy Models

    Directory of Open Access Journals (Sweden)

    Iwen Coisel

    2013-01-01

    Full Text Available The rise of wireless applications based on RFID has brought up major concerns on privacy. Indeed nowadays, when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of the RFID application with a model. However, if the chosen model does not reflect the assumptions and requirements of the analyzed application, it may misevaluate its privacy level. Therefore, selecting the most appropriate model among all the existing ones is not an easy task. This paper investigates the eight most well-known RFID privacy models and thoroughly examines their advantages and drawbacks in three steps. Firstly, five RFID authentication protocols are analyzed with these models. This discloses a main worry: although these protocols intuitively ensure different privacy levels, no model is able to accurately distinguish them. Secondly, these models are grouped according to their features (e.g., tag corruption ability. This classification reveals the most appropriate candidate model(s to be used for a privacy analysis when one of these features is especially required. Furthermore, it points out that none of the models are comprehensive. Hence, some combinations of features may not match any model. Finally, the privacy properties of the eight models are compared in order to provide an overall view of their relations. This part highlights that no model globally outclasses the other ones. Considering the required properties of an application, the thorough study provided in this paper aims to assist system designers to choose the best suited model.

  10. RFID TECHNOLOGY: AN OVERVIEW

    OpenAIRE

    Amit Kumar Pal; Akanksha Tripathi; Anupam Saigal

    2017-01-01

    The information technology has changed the way library professional to interact, communicate, share and acquire knowledge. However, when the computer was created it did not have features and facilities for users to interact. With the evaluation of Internet and Communication Technology, manual library has evolved into a dynamic, interactive and collaborative platform that facilitates exchange of knowledge and information among its users. RFID is the latest technology to be used in libraries an...

  11. Cutting Edge RFID Technologies for NASA Applications

    Science.gov (United States)

    Fink, Patrick W.

    2007-01-01

    This viewgraph document reviews the use of Radio-frequency identification (RFID) for NASA applications. Some of the uses reviewed are: inventory management in space; potential RFID uses in a remote human outpost; Ultra-Wideband RFID for tracking; Passive, wireless sensors in NASA applications such as Micrometeoroid impact detection and Sensor measurements in environmental facilities; E-textiles for wireless and RFID.

  12. RFID Application in the Supply Chain

    Directory of Open Access Journals (Sweden)

    Evelin Vatovec Krmac

    2006-11-01

    Full Text Available This paper analyses the possibilities and ways of utilizingRFID as a tool for more effective supply and logistics chainmanagement. It focuses on RFID technology used within andacross logistics processes and it looks to RFID as one of thepossibilities for automating logistics processes. The benefitsand implications of RFID technology implementation in thesupply chain are illumined.

  13. Dairy cow monitoring by RFID

    Directory of Open Access Journals (Sweden)

    Stevan Stankovski

    2012-02-01

    Full Text Available Dairy cows identification and monitoring on small cattle farms are usually based on the utilization of barcode technology. This kind of identification technology is unsuitable for dairy cows milking and feeding process automation. Radio Frequency Identification (RFID technology is a better solution in this case. This paper describes the research and implementation of the milking cycle´s automated monitoring with the use of RFID tags conducted on a small cattle farm in the Republic of Serbia. This solution is based on RFID system which consists of two parts. First part includes control box, two Ultra High Frequency (UHF RFID readers operating at frequency of 915 MHz and RFID tags glued onto the dairy cow ear labels. Second part includes software modules for acquisition and collecting data from RFID tags to build up an archive due to supervision and analysis of the milking cycle. Reading accuracy of RFID system in the observed period was 99.8 % in average. A group of dairy cows having a settled milking cycle within an interval of 12h ± 5 % had a 1.5 % better yield and a 0.08 better quality in comparison with a group of dairy cows having a milking cycle variance higher than 20 %. RFID system implemented in described way can be easily integrated into a new or existing farm management system in order to have better production results which depend on several factors including settled milking cycles.

  14. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  15. A systematic study of band structure and electromagnetic properties of neutron rich odd mass Eu isotopes in the projected shell model framework

    Energy Technology Data Exchange (ETDEWEB)

    Pandit, Rakesh K.; Devi, Rani [University of Jammu, Department of Physics and Electronics, Jammu (India); Khosa, S.K. [Central University of Jammu, Department of Physics and Astronomical Sciences, Jammu (India); Bhat, G.H.; Sheikh, J.A. [University of Kashmir, Department of Physics, Srinagar (India)

    2017-10-15

    The positive and negative parity rotational band structure of the neutron rich odd mass Eu isotopes with neutron numbers ranging from 90 to 96 are investigated up to the high angular momentum. In the theoretical analysis of energy spectra, transition energies and electromagnetic transition probabilities we employ the projected shell model. The calculations successfully describe the formation of the ground and excited band structures from the single particle and multi quasiparticle configurations. Calculated excitation energy spectra, transition energies, exact quantum mechanically calculated B(E2) and B(M1) transition probabilities are compared with experimental data wherever available and a reasonably good agreement is obtained with the observed data. The change in deformation in the ground state band with the increase in angular momentum and the increase in neutron number has also been established. (orig.)

  16. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  17. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  18. Commercial Product Activation Using RFID

    Science.gov (United States)

    Jedrey, Thomas

    2008-01-01

    Radio-frequency identification (RFID) would be used for commercial product activation, according to a proposal. What is new here is the concept of combining RFID with activation - more specifically, using RFID for activating commercial products (principally, electronic ones) and for performing such ancillary functions as tracking individual product units on production lines, tracking shipments, and updating inventories. According to the proposal, an RFID chip would be embedded in each product. The information encoded in the chip would include a unique number for identifying the product. An RFID reader at the point of sale would record the number of the product and would write digital information to the RFID chip for either immediate activation of the product or for later interrogation and processing. To be practical, an RFID product-activation system should satisfy a number of key requirements: the system should be designed to be integrable into the inventory-tracking and the data-processing and -communication infrastructures of businesses along the entire supply chain from manufacture to retail; the system should be resistant to sophisticated hacking; activation codes should be made sufficiently complexity to minimize the probability of activating stolen products; RFID activation equipment at points of sale must be capable to two-way RF communication for the purposes of reading information from, and writing information to, embedded RFID chips; the equipment at points of sale should be easily operable by sales clerks with little or no training; the point-of-sale equipment should verify activation and provide visible and/or audible signals indicating verification or lack thereof; and, the system should be able to handle millions of products per year with minimal human intervention, among other requirements.

  19. Gas Identification Using Passive UHF RFID Sensor Platform

    Directory of Open Access Journals (Sweden)

    Muhammad Ali AKBAR

    2015-11-01

    Full Text Available The concept of passive Radio Frequency Identification (RFID sensor tag is introduced to remove the dependency of current RFID platforms on battery life. In this paper, a gas identification system is presented using passive RFID sensor tag along with the processing unit. The RFID system is compliant to Electronics Product Code Generation 2 (EPC-Gen2 protocol in 902-928 MHz ISM band. Whereas the processing unit is implemented and analyzed in software and hardware platforms. The software platform uses MATLAB, whereas a High Level Synthesis (HLS tool is used to implement the processing unit on a Zynq platform. Moreover, two sets of different gases are used along with Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA based feature reduction approaches to analyze in detail the best feature reduction approach for efficient classification of gas data. It is found that for the first set of gases, 90 % gases are identified using first three principal components, which is 7 % more efficient than LDA. However in terms of hardware overhead, LDA requires 50 % less hardware resources than PCA. The classification results for the second set of gases reveal that 91 % of gas classification is obtained using LDA and first four PCA, while LDA requires 52 % less hardware resources than PCA. The RFID tag used for transmission is implemented in 0.13 µm CMOS process, with simulated average power consumption of 2.6 µW from 1.2 V supply. ThingMagic M6e embedded reader is used for RFID platform implementation. It shows an output power of 31.5 dBm which allows a read range up to 9 meters.

  20. Introduction of circuit design on RFID system

    International Nuclear Information System (INIS)

    Pak, Sunho

    2007-06-01

    This is a case of research of Fujitsu company and design of basic circuit of electronic technique. It is composed of two parts. The first part deals with introduction of RFID system design, which lists basic knowledge of ubiquitous, glossary of high frequency, design of impedance matching circuit, RFID system, sorts and design of filter, modulator and a transmission and RFID system design. The second part deals with research and development of Fujitsu company, including RFID middle ware RFID CONNECT of Fujitsu, sensor network of Fujitsu and high handing technique of RFID system.

  1. Potentials of RFID Application in Retailing

    DEFF Research Database (Denmark)

    Foscht, Thomas; Kotzab, Herbert; Maloles III, Cesar

    2008-01-01

    The willingness of retailers to adopt RFID systems, as well as finding optimal RFID applications has yet not been investigated. This paper examines the issues associated with the RFID adoption based on the results of a conjoint analysis. The conjoint measurement looked at the trade-off decisions...... among different possible set-ups of RFID applications in retailing companies. Considerable willingness to adopt, but low diffusion and a structure of preferences with respect to RFID features was shown throughout the examined retailing companies. Furthermore, differences were shown among different types...... of retailers in their preferences for RFID system features and clusters were implied....

  2. Security in RFID and sensor networks

    CERN Document Server

    Kitsos, Paris

    2009-01-01

    Security in RFIDMulti-Tag RFID Systems, L. Bolotnyy and G. RobinsAttacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. RibagordaRFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. NevinsPhysical Privacy and Security in RFID Systems, L. Bolotnyy and G. RobinsAuthentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. TomaševicLightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C.

  3. Fast neutron excitation of the ground-state rotational band of 238U

    International Nuclear Information System (INIS)

    Guenther, P.; Havel, D.; Smith, A.

    1975-09-01

    The differential neutron cross sections for the excitation of the 2+(45 keV), 4+(148 keV) and 6+(308 keV) states of 238 U are measured for scattered neutron energies in the range 0.1 to 3.0 MeV. The observed excitation cross sections vary smoothly with energy with no significant fluctuations. The experimental results are correlated with the predictions of compound-nucleus and direct-reaction models. At lower energies (less than or approximately equal to 0.8 MeV) the observed inelastic scattering cross sections are consistent in shape and magnitude with the predictions of compound-nucleus theory. Above approximately or equal to 1.0 MeV comparison of measured and calculated values indicates large direct-reaction contributions. The experimental and computational results are compared with the evaluated nuclear data file, ENDF/B-IV, and significant discrepancies are noted. The present results and selected values from the literature are used to deduce an evaluated set of 238 U inelastic scattering cross sections. 11 figures, 4 tables

  4. Study of yrast bands and electromagnetic properties in neutron-rich 114-128Cd isotopes

    Science.gov (United States)

    Chaudhary, Ritu; Pandit, Rakesh K.; Devi, Rani; Khosa, S. K.

    2018-02-01

    The projected shell model framework has been employed to carry out a systematic study on the deformation systematics of E (21+) and E (41+) / E (21+) values, BCS subshell occupation numbers, yrast spectra, backbending phenomena and electromagnetic quantities in 114-128Cd isotopes. Present calculations reproduce the observed systematics of the E (21+), R42 and B (E 2 ;2+ →0+) values for 114-128Cd isotopic mass chain and give the evidence that deformation increases as one moves from 114Cd to 118Cd, thereafter it decreases up to 126Cd. This in turn confirms 118Cd to be the most deformed nucleus in this set of isotopic mass chain. The emergence of backbending, decrease in B (E 2) values and change in g-factors in all these isotopes are intimately related to the crossing of g-band by 2-qp bands.

  5. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  6. Fully Printed Flexible Single-Chip RFID Tag with Light Detection Capabilities

    Directory of Open Access Journals (Sweden)

    Aniello Falco

    2017-03-01

    Full Text Available A printed passive radiofrequency identification (RFID tag in the ultra-high frequency band for light and temperature monitoring is presented. The whole tag has been manufactured by printing techniques on a flexible substrate. Antenna and interconnects are realized with silver nanoparticles via inkjet printing. A sprayed photodetector performs the light monitoring, whereas temperature measurement comes from an in-built sensor in the silicon RFID chip. One of the advantages of this system is the digital read-out and transmission of the sensors information on the RFID tag that ensures reliability. Furthermore, the use of printing techniques allows large-scale manufacturing and the direct fabrication of the tag on the desired surface. This work proves for the first time the feasibility of the embedment of large-scale organic photodetectors onto inkjet printed RFID tags. Here, we solve the problem of integration of different manufacturing techniques to develop an optimal final sensor system.

  7. Active RFID Technology for Asset Tracking and Management System

    Directory of Open Access Journals (Sweden)

    Tharek Abdul Rahman

    2013-03-01

    Full Text Available Asset is one of valuable item in the industry or institution, missing or lose of asset may have problem in asset management system. The advantages of Radio Frequency Identification (RFID technology have made this technology useful for asset management and tracking system. The use of active RFID technology for asset tracking is by attaching the tag at the asset or item with assigned a unique ID for identification. A few of active RFID readers install at strategic points or location to track asset movement and collect information when anyone of item pass by in reader coverage area, reader collect information with in reading range and send to backend system. Integration every single system by using wires or wireless methods to keep centralize data processing system. Alert message will be send to representative department to give warning. This asset tracking and management system that use active type of RFID technology is working at ISM band frequency of 433 MHz. The backend systems consist of application software, middleware and database. All the information have been sent from every single system recorded in one central database.

  8. Small Form Factor RFID Applicator, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed development of a small form factor Astrobee dedicated RFID label applicator will allow current and future free flying vehicles to place RFID labels...

  9. RFID in Libraries: Standards and Interoperability

    OpenAIRE

    Hopkinson, Alan

    2007-01-01

    RFID needs standards to ensure interoperability so that systems can survive a change in library system and use RFID in inter-library lending between libraries with different systems. Efforts are under way to develop ISO standards to achieve this.

  10. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We

  11. Super-Eddington accretion on to the neutron star NGC 7793 P13: Broad-band X-ray spectroscopy and ultraluminous X-ray sources

    Science.gov (United States)

    Walton, D. J.; Fürst, F.; Harrison, F. A.; Stern, D.; Bachetti, M.; Barret, D.; Brightman, M.; Fabian, A. C.; Middleton, M. J.; Ptak, A.; Tao, L.

    2018-02-01

    We present a detailed, broad-band X-ray spectral analysis of the ultraluminous X-ray source (ULX) pulsar NGC 7793 P13, a known super-Eddington source, utilizing data from the XMM-Newton, NuSTAR and Chandra observatories. The broad-band XMM-Newton+NuSTAR spectrum of P13 is qualitatively similar to the rest of the ULX sample with broad-band coverage, suggesting that additional ULXs in the known population may host neutron star accretors. Through time-averaged, phase-resolved and multi-epoch studies, we find that two non-pulsed thermal blackbody components with temperatures ∼0.5 and 1.5 keV are required to fit the data below 10 keV, in addition to a third continuum component which extends to higher energies and is associated with the pulsed emission from the accretion column. The characteristic radii of the thermal components appear to be comparable, and are too large to be associated with the neutron star itself, so the need for two components likely indicates the accretion flow outside the magnetosphere is complex. We suggest a scenario in which the thick inner disc expected for super-Eddington accretion begins to form, but is terminated by the neutron star's magnetic field soon after its onset, implying a limit of B ≲ 6 × 1012 G for the dipolar component of the central neutron star's magnetic field. Evidence of similar termination of the disc in other sources may offer a further means of identifying additional neutron star ULXs. Finally, we examine the spectrum exhibited by P13 during one of its unusual 'off' states. These data require both a hard power-law component, suggesting residual accretion on to the neutron star, and emission from a thermal plasma, which we argue is likely associated with the P13 system.

  12. Long range ultra-high frequency (UHF) radio frequency identification (RFID) antenna design

    Science.gov (United States)

    Reynolds, Nathan D.

    There is an ever-increasing demand for radio frequency identification (RFID) tags that are passive, long range, and mountable on multiple surfaces. Currently, RFID technology is utilized in numerous applications such as supply chain management, access control, and public transportation. With the combination of sensory systems in recent years, the applications of RFID technology have been extended beyond tracking and identifying. This extension includes applications such as environmental monitoring and healthcare applications. The available sensory systems usually operate in the medium or high frequency bands and have a low read range. However, the range limitations of these systems are being overcome by the development of RFID sensors focused on utilizing tags in the ultra-high frequency (UHF) band. Generally, RFID tags have to be mounted to the object that is being identified. Often the objects requiring identification are metallic. The inherent properties of metallic objects have substantial effects on nearby electromagnetic radiation; therefore, the operation of the tag antenna is affected when mounted on a metallic surface. This outlines one of the most challenging problems for RFID systems today: the optimization of tag antenna performance in a complex environment. In this research, a novel UHF RFID tag antenna, which has a low profile, long range, and is mountable on metallic surfaces, is designed analytically and simulated using a 3-D electromagnetic simulator, ANSYS HFSS. A microstrip patch antenna is selected as the antenna structure, as patch antennas are low profile and suitable for mounting on metallic surfaces. Matching and theoretical models of the microstrip patch antenna are investigated. Once matching and theory of a microstrip patch antenna is thoroughly understood, a unique design technique using electromagnetic band gap (EBG) structures is explored. This research shows that the utilization of an EBG structure in the patch antenna design yields

  13. Indoor Robot Localisation with Active RFID

    Directory of Open Access Journals (Sweden)

    Wei Wei

    2012-07-01

    Full Text Available Radio Frequency Identification (RFID is a technology of location determination and data capture. An RFID based system relies on the interaction between readers (also known as interrogator and tags (transponders. Active RFID technology is suitable for tracking costly assets or moving objects such as mobile robots. Once affixed with RFID tags, a robot can be localised. However, there is a tendency for accuracy to vary greatly as well as delay in readings. Those problems may be enlarged in real time applications. This paper provides an overview of implementing RFID in precision tracking of mobile robots.

  14. A Detailed Survey on Various Tracking Methods Using RFID

    OpenAIRE

    S. Arivarasi; S. Krishna Anand

    2013-01-01

    RFID, a wide range of technology is replaced instead of barcode. When multiple RFID readers find a single RFID tag at same time, duplicates occur. The main objective is to eliminate duplicates in RFID data. Designing an exact duplicate elimination method is very difficult. This paper presented a detailed analysis of tracking, monitoring, managing and filtering mechanisms for RFID data.

  15. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  16. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  17. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  18. IRCICA Library UHF RFID Solutions

    Directory of Open Access Journals (Sweden)

    Abdullah Topaloğlu

    2011-03-01

    Full Text Available This article was written with the intention of informing our fellow colleagues about the implementation of UHF RFID (Ultra High Frequency Radio-Frequency Identification which, we think, will be used by libraries all around the world in the future and sharing applications and findings of the archival and documentation section of IRCICA on the subject. IRCICA library has formed the UHF RFID system to find various materials in a reliable and expedient way, to do its counting in a consistent and rapid manner, as well as labeling and controlling various items, controlling and documenting the check-ins and check-outs from the library and setting up a secure and effective circulation of materials within the library. The application of UHF RFID technology has become widespread in the libraries around the world since 2006. As we can surmise from this, the application of UHF RFID technologies is a relatively new step. It would be safe to say that our country has sufficient experience in the application of the mentioned technology and it is even ahead of some library applications in many developed countries.

  19. RFID gaat belangrijke rol spelen

    NARCIS (Netherlands)

    Luitjes, H.

    2004-01-01

    Radio Frequency Identification technology (RFID), de opvolger van de streepjescode, gaat in de verslogistiek een belangrijke rol spelen. Dat stelt dr. Henri Luitjes, hoofd van de afdeling verpakken, transport en logistiek van Wageningen UR. Ingegaan wordt op begrippen als shell life, derving,

  20. Group Management Method of RFID Passwords for Privacy Protection

    Science.gov (United States)

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.

  1. Luminescence of neutron irradiated amorphous SiO2. The 1.9 and 2.2 eV emission bands

    International Nuclear Information System (INIS)

    Mervic, A.; Guzzi, M.; Lucchini, G.; Spinolo, G.

    1992-01-01

    Experimental results on the 1.9 and 2.2 eV luminescence bands in neutron irradiated amorphous silica are reported. All the four types in which silicas are usually classified (natural and synthetic, both dry and wet) are considered. Photoluminescence spectra in the 80 to 650 K temperature range, photoluminescence excitation spectra at 80 and 300 K, and spectrally resolved thermally stimulated luminescence are measured. The comparison of the intensity of the 1.9 eV band in the different types of silicas allows us to support one of the models recently proposed for the structure of the emitting center. A first systematic description of the main properties of the 2.2 eV emission band is given. (orig.)

  2. RFID Applications: An Introductory and Exploratory Study

    OpenAIRE

    Hanifa Shah; Kamran Ahsan; Paul Kingston

    2010-01-01

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes,...

  3. Pemanfaatan Sistem RFID sebagai Pembatas Akses Ruangan

    Directory of Open Access Journals (Sweden)

    HENDI HANDIAN RACHMAT

    2016-02-01

    Full Text Available ABSTRAK Pada penelitian ini, sistem RFID (Radio Frequency Identification dimanfaatkan sebagai kartu identifikasi personal pada sistem akses ruangan. Keberadaan sistem ini ditujukan untuk menjaga keamanan dan privasi ruangan dari seseorang yang tidak memiliki otoritas untuk memasuki ruangan tersebut. Melalui perancangan dan implementasi sistem akses ruangan ini, dilakukan evaluasi sistem kerja kunci elektrik berbasis komponen solenoid serta jarak dan posisi optimal pembacaan RFID tag guna memberikan kenyamanan pada pengguna ketika mengakses ruangan. RFID tag yang dipergunakan dalam sistem ini berbentuk kartu tipe EM4001 dan menyimpan kode unik yang digunakan sebagai identifikasi personal. Kode ini dibaca oleh RFID reader tipe ID-12 dan divalidasi otoritasnya dengan mikrokontroler ATMega32 untuk mengatur sistem kerja kunci elektrik yang dirancang sendiri menggunakan solenoid. Sistem ini dilengkapi pula dengan sistem database untuk pencatatan pengguna yang mengakses ruangan. Dari hasil pengujian, seluruh (100% RFID tag dapat dikenali oleh RFID reader dalam tiga posisi berbeda dengan jarak optimal sejauh 5 cm (vertikal dan 2 cm (horisontal. Keseluruhan (100% aktifitas pengguna yang mengakses ruangan dapat tercatat dalam sistem database. Hasil penelitian ini dapat disimpulkan bahwa teknologi RFID dapat digunakan secara nyaman dan aman sebagai alternatif sistem identifikasi personal untuk sistem akses ruangan. Kata Kunci : kunci elektrik, RFID, sistem akses ruangan, sistem database, solenoid. ABSTRACT In this research, RFID system was utilized as a personal identification security card in access room system. This system was aimed to secure a room and to have privacy from unauthorized person to enter the room. By designing and implementing the system, a solenoid based electric key system as well as an optimal distance and position of RFID tag were evaluated to know the most convenience condition for all users during accessing the room. RFID tag used in

  4. Handbook of smart antennas for RFID systems

    CERN Document Server

    2010-01-01

    The Handbook of Smart Antennas for RFID Systems is a single comprehensive reference on the smart antenna technologies applied to RFID. This book will provide a timely reference book for researchers and students in the areas of both smart antennas and RFID technologies. It is the first book to combine two of the most important wireless technologies together in one book. The handbook will feature chapters by leading experts in both academia and industry offering an in-depth description of terminologies and concepts related to smart antennas in various RFID systems applications.

  5. Compact broadband circularly polarised slot antenna for universal UHF RFID readers

    DEFF Research Database (Denmark)

    Xu, Bo; Zhang, Shuai; Liu, Yusha

    2015-01-01

    A compact broadband circularly polarised (CP) slot antenna is designed for universal ultra-high-frequency (UHF) radio frequency identification (RFID) readers. The antenna consists of an L-shaped metal strip and a square-slot-loaded ground plane with four tuning stubs. The total size is 100 mm×100mm......×1.6 mm. The measured –10 dB impedance bandwidth is 40.7% (772–1166 MHz) and the measured 3 dB axial ratio (AR) bandwidth is 13.9% (840–965 MHz). Both the impedance and AR bandwidth cover the worldwide UHF RFID band....

  6. Octupole correlations in neutron-rich {sup 143,145}Ba and a type of superdeformed band in {sup 145}Ba

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, S.J.; Wang, M.G.; Long, G.L.; Zhu, L.Y.; Gan, C.Y.; Yang, L.M.; Sakhaee, M.; Li, M.; Deng, J.K. [Physics Department, Tsinghua University, Beijing 100084, Peoples Republic of (China); Zhu, S.J.; Hamilton, J.H.; Ramayya, A.V.; Jones, E.F.; Hwang, J.K.; Zhang, X.Q.; Gore, P.M.; Peker, L.K.; Drafta, G.; Babu, B.R.; Deng, J.K.; Ginter, T.N.; Beyer, C.J.; Kormicki, J.; Ter-Akopian, G.M.; Daniel, A.V. [Physics Department, Vanderbilt University, Nashville, Tennessee 37235 (United States); Zhu, S.J.; Ter-Akopian, G.M.; Daniel, A.V. [Joint Institute for Heavy Ion Research, Oak Ridge, Tennessee 37831 (United States); Ma, W.C. [Physics Department, Mississippi State University, Mississippi 39762 (United States); Cole, J.D.; Aryaeinejad, R.; Drigert, M.W. [Idaho National Engineering Laboratory, Idaho Falls, Idaho 83415 (United States); Rasmussen, J.O.; Asztalos, S.; Lee, I.Y.; Macchiavelli, A.O.; Chu, S.Y.; Gregorich, K.E.; Mohar, M.F. [Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States); Ter-Akopian, G.M.; Daniel, A.V.; Oganessian, Y.T.; Kliman, J. [Flerov Laboratory for Nuclear Reactions, Joint Institute for Nuclear Research, Dubna (Russia); Donangelo, R. [Universidade Federal do Rio de Janeiro, Caixa Postal 68528, RG (Brazil); Stoyer, M.A.; Lougheed, R.W.; Moody, K.J.; Wild, J.F. [Lawrence Livermore National Laboratory, Livermore, California 94550 (United States); Prussin, S.G. [Nuclear Engineering Department, University of California at Berkeley, Berkeley, California 94720 (United States); Kliman, J. [Institute of Physics, SASc, Dubravskacesta 9, 84228 Bratislava (Slovakia); Griffin, H.C. [University of Michigan, Ann Arbor, Michigan 48104 (United States)

    1999-11-01

    High spin states in neutron-rich odd-{ital Z} {sup 143,145}Ba nuclei have been investigated from the study of prompt {gamma} rays in the spontaneous fission of {sup 252}Cf by using {gamma}-{gamma}- and {gamma}-{gamma}-{gamma}- coincidence techniques. Alternating parity bands are identified for the first time in {sup 145}Ba and extended in {sup 143}Ba. A new side band, with equal, constant dynamic, and kinetic moments of inertia equal to the rigid body value, as found in superdeformed bands, is discovered in {sup 145}Ba. Enhanced E1 transitions between the negative- and positive-parity bands in these nuclei give evidence for strong octupole deformation in {sup 143}Ba and in {sup 145}Ba. These collective bands show competition and coexistence between symmetric and asymmetric shapes in {sup 145}Ba. Evidence is found for crossing M1 and E1 transitions between the s=+i and s={minus}i doublets in {sup 143}Ba. {copyright} {ital 1999} {ital The American Physical Society}

  7. A Compact RFID Reader Antenna for UHF Near-Field and Far-Field Operations

    Directory of Open Access Journals (Sweden)

    Lai Xiao zheng

    2013-01-01

    Full Text Available A compact loop antenna is presented for mobile ultrahigh frequency (UHF radio frequency identification (RFID application. This antenna, printed on a 0.8 mm thick FR4 substrate with a small size of 31 mm × 31 mm, achieves good impedance bandwidth from 897 to 928 MHz, which covers USA RFID Band (902–928 MHz. The proposed loop configuration, with a split-ring resonator (SRR coupled inside it, demonstrates strong and uniform magnetic field distribution in the near-field antenna region. Its linearly polarized radiation pattern provides available far-field gain. Finally, the reading capabilities of antenna are up to 56 mm for near-field and 1.05 m for far-field UHF RFID operations, respectively.

  8. Theory and application on RFID

    International Nuclear Information System (INIS)

    Cho, Dae Jin

    2005-02-01

    This book tells of definition, system, operation method and classification of RFID, prospect of market, tag such as types, making process of tag, operation way and structure of tag, store of tag data and tag price, chip less tag like leader, antenna ; EPC global such as appearance of Auto-ID center, introduction of EPC system, middle ware, ONS, EPC IS and PML, a manufacturer, standardization, frequency, application cases abroad home, problems and labeling.

  9. RFID: the security for library

    OpenAIRE

    Pattanaik, Bibhuti-Bhusan; Pattnaik, Babita

    2007-01-01

    Radio frequency identification (RFID) technology, a surveillance system promises to relieve repetitive strain injury, and improving safety, security, productivity, accuracy and convenience for communities working in various sectors. This Dedicated short-range communication (DSRC) system has been used in library for multiple purposes; such as automatic identification, tracking and management of material flow. It has also provided an additional advantage to Bar-code technology. In this article ...

  10. Evaluation of Group Management of RFID Passwords for Privacy Protection

    OpenAIRE

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    2010-01-01

    RFID privacy problems will have to be solved before items with RFID tags can be safely provided to consumers on a large scale. Here, we considered the location privacy problem of unauthorized persons or agents being able to trail a person by tracing a unique ID recorded in an attached RFID tag. We proposed a method for using RFID tags that include an interrogator with an algorithm to generate RFID passwords. This method groups RFID passwords for RFID tags in a way that protects consumer priva...

  11. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  12. RFID in Retail: New approaches, new viewpoints

    NARCIS (Netherlands)

    Sander de Ridder; Jan Kroon; drs. Frans van den Reep; Christian Vrijlandt

    2008-01-01

    RFID technology is a promising technology currently finding its way into the field of customer interaction strategy, supply chain accuracy and inventory management. Primarily, RFID tags are seen as substitutes of traditional barcodes, yet they can add a lot of value and functionality. Where barcodes

  13. Orientation Sensing Using Multiple Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    Knowing the inclination of an object can be valuable information in a supply chain application, e.g. when handling orientation sensitive objects. In this work we present a method for sensing the inclination using Radio Frequency IDentification (RFID) technology. The method requires standard RFID...

  14. Optimalization of selected RFID systems Parameters

    Directory of Open Access Journals (Sweden)

    Peter Vestenicky

    2004-01-01

    Full Text Available This paper describes procedure for maximization of RFID transponder read range. This is done by optimalization of magnetics field intensity at transponder place and by optimalization of antenna and transponder coils coupling factor. Results of this paper can be used for RFID with inductive loop, i.e. system working in near electromagnetic field.

  15. Smart Idlers : RFID in conveyor belt monitoring

    NARCIS (Netherlands)

    Pang, Y.

    2012-01-01

    Radio Frequency Identifi cation (RFID) is a technology that offers unique identifi cation of objects and processes. It can actively or passively communicate and, in combination with sensors, it can capture more detailed physical information. RFID technology has been integrated into our daily life.

  16. Temporal and Location Based RFID Event Data Management and Processing

    Science.gov (United States)

    Wang, Fusheng; Liu, Peiya

    Advance of sensor and RFID technology provides significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management. RFID data are temporal and history oriented, multi-dimensional, and carrying implicit semantics. Moreover, RFID applications are heterogeneous. RFID data management or data warehouse systems need to support generic and expressive data modeling for tracking and monitoring physical objects, and provide automated data interpretation and processing. We develop a powerful temporal and location oriented data model for modeling and queryingRFID data, and a declarative event and rule based framework for automated complex RFID event processing. The approach is general and can be easily adapted for different RFID-enabled applications, thus significantly reduces the cost of RFID data integration.

  17. KUNCI PINTU OTOMATIS MENGGUNAKAN APLIKASI RFID CARD

    Directory of Open Access Journals (Sweden)

    Dewa Made Wiharta

    2009-05-01

    Full Text Available Aplikasi Radio Frequency Identification (RFID banyak dikembangkan dewasa ini. Salah satu  aplikasi RFID yang dikembangkan disini adalah sebagai kunci pintu otomatis. RFID Reader digunakan untuk membaca ID yang terdapat pada kartu EM4100. Reader bekerja pada level tegangan 5V DC dengan frekuensi 125 KHz. Koneksi RFID Reader menggunakan media udara (wireless. Saat RFID tag didekatkan pada Reader maka reader akan membaca ID yang terdapat pada kartu. Output Reader merupakan input pada microcontroller AT89C51. Format data keluaran yang digunakan adalah ABA Track2 10 Desimal. Input data dari RFID  Reader akan dibaca, disimpan, dan dibandingkan. Output dari microcontroller dihubungkan pada transistor PNP 9012 yang digunakan sebagai saklar dan  terhubung dengan relay untuk menggerakkan kunci. Keadaan awal relay dan transistor adalah normally close dan cut-off, dan bekerja secara flip – flop sesuai dengan input dari microcontroller.

  18. RFID Data Cleaning for Shop Floor Applications

    Science.gov (United States)

    Ziekow, Holger; Ivantysynova, Lenka; Günter, Oliver

    In several case studies we found that shop-floor applications in manufacturing pose special challenges to cleaning RFID data. The underlying problem in many scenarios is the uncertainty about the exact location of observed RFID tags. Simple filter s provided in common middleware solutions do not cope well with these challenges. Therefore we have developed an approach based on maximum-likelihood estimation to infer a tag's location within the reader range. This enables improved RFID data cleaning in a number of application scenarios. We stress the benefits of our approach along exemplary application scenarios that we found in manufacturing. In simulations and experiments with real world data we show that our approach outperforms existing solutions. Our approach can extend RFID middleware or reader firmware, to improve the use of RFID in a range of shop-floor applications.

  19. RFID reader immunity test against electrostatic discharge

    Directory of Open Access Journals (Sweden)

    Pospisilik Martin

    2016-01-01

    Full Text Available This paper provides a description of an immunity test against the electrostatic discharge according to the standard EN 61000-4-2 that was applied to an RFID reader. The RFID reader was primarily developed for access systems, employing the on-board recognition of the RFID tags. The results obtained by the test are described hereby as well as the discussion on the security of this solution. The results of this experiment are beneficial for the developers of RFID devices, as these devices are endangered by the electrostatic discharge brought by their users. The hereby described results also shown a security hole in a simple access system based on the RFID technology. Details can be found in the paper.

  20. Localization and tracking of passive RFID tags

    Science.gov (United States)

    Zhang, Yimin; Amin, Moeness G.

    2006-05-01

    Radio frequency identification (RFID) is poised for growth as businesses and governments explore applications implementing RFID. The RFID technology will continue to evolve to meet new demands for human and target location and tracking. In particular, there are increasing needs to find and track the positions of multiple RFID tagged items that are closely spaced. As a result, localization and tracking techniques with higher accuracy, yet low implementation complexity are required. This paper examines the applicability of direction-of-arrival (DOA) estimation methods to the localization and tracking problems of passive RFID tags. Different scenarios of stationary and moving targets are considered. It is shown through performance analysis and simulations that simple DOA estimation methods can be used to provide satisfactory localization performance.

  1. RFID technology for human implant devices

    Science.gov (United States)

    Aubert, Hervé

    2011-09-01

    This article presents an overview on Radio Frequency Identification (RFID) technology for human implants and investigates the technological feasibility of such implants for locating and tracking persons or for remotely controlling human biological functions. Published results on the miniaturization of implantable passive RFID devices are reported as well as a discussion on the choice of the transmission frequency in wireless communication between a passive RFID device implanted inside human body and an off-body interrogator. The two techniques (i.e., inductive coupling and electromagnetic coupling) currently used for wirelessly supplying power to and read data from a passive implantable RFID device are described and some documented biomedical and therapeutic applications of human RFID-implant devices are finally reported.

  2. A Study on Pig Slaughter Traceability Solution Based on RFID

    OpenAIRE

    Luo, Qingyao; Xiong, Benhai; Geng, Zhi; Yang, Liang; Pan, Jiayi

    2010-01-01

    International audience; Due to an assembly line production and poor environment conditions in pig slaughterhouses, collection of slaughter tracing information is not a simple thing. Based on the UHF radio frequency identification (RFID) technologies, this study designed a RFID tag for carcass, a RS232-PS2 data conversion line and some data norms such as the RFID carcass tag and partition meat label norm, and developed online reading and writing system for RFID tags, accomplished RFID identifi...

  3. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    OpenAIRE

    Iwan Vanany; Awaluddin Bin Mohamed Shaharoun

    2009-01-01

    This paper explores the benefit and barriers of RFID (Radio Frequency Identification) technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and...

  4. A lattice based authentication for low-cost RFID

    OpenAIRE

    EL MOUSTAINE, Ethmane; LAURENT, Maryline

    2012-01-01

    International audience; Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical chal...

  5. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  6. Multiport Circular Polarized RFID-Tag Antenna for UHF Sensor Applications.

    Science.gov (United States)

    Zaid, Jamal; Abdulhadi, Abdulhadi; Kesavan, Arun; Belaizi, Yassin; Denidni, Tayeb A

    2017-07-05

    A circular polarized patch antenna for UHF RFID tag-based sensor applications is presented, with the circular polarization (CP) generated by a new antenna shape, an asymmetric stars shaped slotted microstrip patch antenna (CP-ASSSMP). Four stars etched on the patch allow the antenna's size to be reduced by close to 20%. The proposed antenna is matched with two RFID chips via inductive-loop matching. The first chip is connected to a resistive sensor and acts as a sensor node, and the second is used as a reference node. The proposed antenna is used for two targets, serving as both reference and sensor simultaneously, thereby eliminating the need for a second antenna. Its reader can read the RFID chips at any orientation of the tag due to the CP. The measured reading range is about 25 m with mismatch polarization. The operating frequency band is 902-929 MHz for the two ports, which is covered by the US RFID band, and the axial-ratio bandwidth is about 7 MHz. In addition, the reader can also detect temperature, based on the minimum difference in the power required by the reference and sensor.

  7. The State of RFID Applications in Libraries

    Directory of Open Access Journals (Sweden)

    Jay Sing

    2006-03-01

    Full Text Available The adoption of Radio Frequency Identification (RFID technology by libraries promises a solution that could make it possible to inventory hundreds of thousands of items in their collections in days instead of months. In addition, it would allow patrons to check out and return library property automatically at any time of the day. Besides speeding up checkouts, keeping collections in better order, and alleviating repetitive strain injuries among librarians, RFID promises to provide a better control on theft, nonreturns, and misfiling of a library’s assets. With an estimated 35 million library items tagged worldwide in more than three hundred libraries, this technology is generating ever-increasing interest. In October and November 2004, the industrial technology department and the Robert E. Kennedy Library at Cal Poly State University, San Luis Obispo, surveyed participating libraries, RFID electronic discussion groups, and Library and Information Technology Association (LITA-L electronic discussion group subscribers to collect information with regards to the implementation of RFID systems in libraries. Opinions were gathered regarding such topics, actual or estimated, as RFID implementation costs and time; the impact of the technology on operations such as handling of volumes and security; and RFID system features adopted such as conversion stations, self-checkout units, and security systems. Information on the various RFID library components and the results from the survey are presented in this paper.

  8. Review on security issues in RFID systems

    Directory of Open Access Journals (Sweden)

    Mohamed El Beqqal

    2017-12-01

    Full Text Available Radio frequency Identification (RFID is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology brings out many challenges and concerns still not being attracting more and more researchers especially the security and privacy issues. In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify for each work which part of the RFID system is being secured, the solutions and the techniques used besides the conformity to RFID standards. Finally, we present briefly a solution that consists of combining RFID with smartcard based biometric to enhance security especially in access control scenarios. Hence the result of our study aims to give a clear vision of available solutions and techniques used to prevent and secure the RFID system from specific threats and attacks.

  9. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  10. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  11. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear w

  12. RFID Security: Tradeoffs between Security and Efficiency

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Michael Østergaard

    2008-01-01

    We propose a model and definition for anonymous (group) identification that is well suited for RFID systems. This is based on the definition of Juels and Weis of strong privacy for RFID tags, where we add requirements for completeness and soundness. We also propose a weaker and more realistic...... definition of privacy. For the case where tags hold independent keys, we prove a conjecture by Juels and Weis, namely in a strongly private and sound RFID system using only symmetric cryptography, a reader must access virtually all keys in the system when reading a tag. It was already known from work...

  13. USING OF RFID TECHNOLOGY IN MAINTENANCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2015-06-01

    Full Text Available Automated data collection helps to improve the precision of decision-making processes. Currently, the radio frequency identification technology belongs to the most common application in the field of identification technology. In the world, the implementation of RFID technology is used in almost all areas of industry. RFID tags allow to use of the different products and materials applications. The article provides an overview of using this technology to record and register maintenance intervals of railway wagons. The application of RFID technology helps to avoid huge disasters and accidents caused by lack of information about the technical state of rail freight wagons.

  14. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  15. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2014-06-01

    Full Text Available In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for traceability applications made with rewritable passive RFID tags. This paper aims to examine how RFID technology can be useful for traceability applications and will submit a diligent search regarding the degree of knowledge of RFID technology and the acceptance of an empirical model by the employees of Romanian companies.

  16. Applying RFID technology in nuclear materials management

    International Nuclear Information System (INIS)

    Tsai, H.; Chen, K.; Liu, Y.; Norair, J.P.; Bellamy, S.; Shuler, J.

    2008-01-01

    The Packaging Certification Program (PCP) of US Department of Energy (DOE) Environmental Management (EM), Office of Safety Management and Operations (EM-60), has developed a radio frequency identification (RFID) system for the management of nuclear materials. Argonne National Laboratory, a PCP supporting laboratory, and Savi Technology, a Lockheed Martin Company, are collaborating in the development of the RFID system, a process that involves hardware modification (form factor, seal sensor and batteries), software development and irradiation experiments. Savannah River National Laboratory and Argonne will soon field test the active RFID system on Model 9975 drums, which are used for storage and transportation of fissile and radioactive materials. Potential benefits of the RFID system are enhanced safety and security, reduced need for manned surveillance, real time access of status and history data, and overall cost effectiveness

  17. Lightweight Cryptography for Passive RFID Tags

    DEFF Research Database (Denmark)

    David, Mathieu

    2012-01-01

    In 2011, we are entering a decade where Radio Frequency IDentification (RFID) systems will become ubiquitous, slowly but surely replacing its old ancestor: the barcode. With the RFID technology come many advantages such as faster retailing, continuous control along the supply chain, real...... of a global adoption. In the past few years, an increasing number of researchers concentrates their efforts into providing secure solutions for RFID systems. After several attempts to integrate traditional cryptographic primitives into small, embedded, and extremely resource constrained devices, the results...... among the smallest in the published literature and aims at being implemented on printed electronics RFID tags. Then, we compare different cryptographic primitives based on their key parameters: throughput, area, power consumption and level of security. Our main concern is the integrability...

  18. Chipless RFID design procedure and detection techniques

    CERN Document Server

    Rezaiesarlak, Reza

    2015-01-01

    This book examines the design of chipless RFID systems. The authors begin with the historical development of wireless identification systems and finally arrive at a representation of the chipless RFID system as a block diagram illustration. Chapter 2 is devoted to the theoretical bases for the design of chipless RFID tags and detection techniques in the reader. A rigorous mathematical formulation is presented based on the singularity expansion method (SEM) and characteristic mode theory (CMT) in order to study the scattered fields from an object in a general form. Th e authors attempt to explain some physical concepts behind the mathematical descriptions of the theories in this chapter. In Chapter 3, two design procedures based on complex natural resonance and CMT are presented for the design of the chipless RFID tag. By studying the effects of structural parameters on radiation and resonant behaviors of the tag, some design conclusions are presented in this chapter. Chapter 4 is dedicated to the time-frequen...

  19. RFID Torque Sensing Tag System for Fasteners

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2016-01-01

    The present invention provides an RFID-based torque sensor that can be used to quickly monitor off the shelf fasteners including fasteners that are used in expensive satellites or other uses where fastener failure can be very costly. In one embodiment, an antenna, RFID ring and spring comprise a sensor tag that can be interrogated with an interrogation signal produced by an interrogator device. When sufficient torque is applied to the fastener, an RFID circuit is connected, and produces a radio frequency (RF) signal that can be read by the interrogator. In one embodiment, the RFID circuit does not transmit when the spring member is not compressed, thereby indicating insufficient tensioning of the fastener. The present invention offers the ability to remotely, quickly, and inexpensively verify that any number of fasteners are torqued properly upon initial installation. Where applicable, the present invention allows low cost monitoring over the life of the fastener.

  20. GNSS/RFID Active Transponder Design

    Directory of Open Access Journals (Sweden)

    Lukas Vojtech

    2015-01-01

    Full Text Available The paper describes a design of global navigation satellite system (GNSS/Radio frequency identification (RFID active transponder which is primarily designed for localization of objects as a part of localization system designated for efficient handling of situations with mass casualties. The precise localization is improved by differential GNSS. The block diagram of such GNSS/RFID active transponder is described including main operation procedures of the firmware. Measurement of the localization by algorithms of RTKLIB library and by algorithms of GNSS module is compared. Dynamic tests, i.e. GNSS/RFID active transponder placed in the moving car (50~kmph, and static tests, i.e. GNSS/RFID active transponder placed in the position for 15~min, are performed.

  1. Quasielastic neutron scattering and infra-red band contour study of H2O reorientations in [Ni(H2O)6] (ClO4)2

    International Nuclear Information System (INIS)

    Janik, J.A.; Janik, J.M.; Otnes, K.; Stanek, T.

    1980-01-01

    IR band contour measurements carried out for [Ni(H 2 O) 6 ] (ClO 4 ) 2 revealed an existence of fast H 2 O 180 deg flips around Ni-O axes at room temperatures. These flips were subjected to a more accurate study by the quasielastic neutron scattering method. Correlation times of the order of picosecond were obtained for room temperatures and the barrier to rotation of ca. 7 kcal/mole. The results are compared to those previously obtained for [Mg(H 2 O) 6 ] (ClO 4 ) 2 and also to those for [Ni(NH 3 ) 6 ] (ClO 4 ) 2 and [Mg(NH 3 ) 6 ] (ClO 4 ) 2 . (author)

  2. GNSS/RFID Active Transponder Design

    OpenAIRE

    Lukas Vojtech; Jiri Skapa; Radoslav Bortel; Tomas Korinek; Marek Neruda; Jiri Hajek; Daniel Lopour

    2015-01-01

    The paper describes a design of global navigation satellite system (GNSS)/Radio frequency identification (RFID) active transponder which is primarily designed for localization of objects as a part of localization system designated for efficient handling of situations with mass casualties. The precise localization is improved by differential GNSS. The block diagram of such GNSS/RFID active transponder is described including main operation procedures of the firmware. Measurement of the localiza...

  3. Underground navigation and localisation using RFID tags

    CSIR Research Space (South Africa)

    James, S

    2012-10-01

    Full Text Available their locations. The paper will build on previous work done by Forster[8] and Vorst et al.[9] by implementing the proposed hybrid SLAM method on the mining safety platform, which will eventually be used in an underground environment. II. NAVIGATION... AND LOCALISATION SCHEME A. Exploration and clustering The algorithm used for exploring the RFID environment is shown in Figure 1. Figure 1: Algorithm used for exploring RFID environment Given sufficient (more than 500 steps per 25 square metres) simulation...

  4. RFID UHF i HF w bibliotekach

    Directory of Open Access Journals (Sweden)

    Gładysz Bartłomiej

    2015-06-01

    Full Text Available The potential of the innovative Radio Frequency Identification (RFID technology to be applied for support, acceleration and automation of the circulation process of library collection is presented. Technology basics, and hardware and software components are described. Two different radio standards used in libraries are compared. The goal is to present the potential of RFID technology for libraries, to highlight the differences and to build a basis for further consideration of UHF and HF alternatives.

  5. Development of RFID Library Management Information System

    OpenAIRE

    Keshinro K. K1 ., Balogun W. A; Oyetola J. B3 ., Omogoye S. O4

    2016-01-01

    : RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling. This technology helps librarians reduce valuable staff time spent scanning barcodes while charging and discharging items. RFID is a combination of radio -frequency-based technology and microchip technologyThe methodology used was serial com...

  6. Inkjet-Printed Paper-Based RFID and Nanotechnology-Based Ultrasensitive Sensors: The "Green" Ultimate Solution for an Ever Improving Life Quality and Safety?

    Science.gov (United States)

    Tentzeris, Manos; Yang, Li

    The paper introduces the integration of conformal paper-based RFID's with a Single Walled Carbon Nanotube (SW-CNT) composite for the development of a chipless RFID-enabled wireless sensor node for toxic gas detection and breathing-gas-content estimation. The electrical performance of the inkjet-printed SWCNT-based ultra-sensitive sensor if reported up to 1GHz. The whole module is realized by inkjet-printing on a low-cost "green" paper-based substrate designed to operate in the European UHF RFID band. The electrical conductivity of the SWCNT film changes in the presence of ultra-small quantities of gases like ammonia and nitrogen dioxide, resulting in the variation of the backscattered power level which can be easily detected by the RFID reader to realize reliable early-warning toxic gas detection or breathing monitoring with potentially profound effects on ubiquitous low-cost "green" quality-of-life applications.

  7. Reverse Logistics: RFID the key to optimality

    Directory of Open Access Journals (Sweden)

    Rezwan Asif

    2011-07-01

    Full Text Available Purpose: The purpose of this paper is to find ways to reduce uncertainties in Reverse logistic supply chain (RLSC through the use of Radio-frequency identification (RFID technology.Design/methodology/approach: This paper reviews literature and builds model to relate RFID with uncertainties in order to optimize Reverse Logistics. Findings: RFID is really efficient to determine and detect quantity, variety and cycle times of returns; however it's not as convenient to determine quality of the returns. The collected information from RFID can be used to standardize the RLSC.Research limitations: Though it’s several and unique advantages some limitations of RFID have been identified in quality and processing sequence, collecting points and different standards, and in global usage.Originality/value: Previous studies in the area of Reverse Logistics and RFID don’t cover all impacts of this technology on RLSC. This review paper has investigated these impacts and offers a model for optimizing the Reverse Logistics Supply Chain.

  8. Illustration of the Impedance Behaviour of Extremely Low-Profile Coupled Shorted-Patches Antennas for UHF RFID of People

    Directory of Open Access Journals (Sweden)

    Milan Svanda

    2014-01-01

    Full Text Available The recently introduced coupled shorted-patches technique for the design of extremely low-profile UHF RFID tag antennas is used to illustrate the flexibility of selected feeding methods for tuning the antenna input impedance for the complex values required for matching with typical RFID chips. We present parametric studies of the impedance behaviour of dipole-excited and directly excited antennas designed for radiofrequency identification of people in the European UHF frequency band. Our study can significantly facilitate the design of this class of on-body tag antennas.

  9. Behavior-based cleaning for unreliable RFID data sets.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  10. RFID applications in transportation operation and intelligent transportation systems (ITS).

    Science.gov (United States)

    2009-06-01

    Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...

  11. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  12. Investigating RFID for Roadside Identification Involving Freight Commercial Vehicle Operators

    Science.gov (United States)

    2010-01-01

    Radio Frequency Identification (RFID) is an emerging technology to track commercial vehicles. This transcript describes research that investigates the ability for RFID technologies to work in license plates. Mile markers are common fixtures on the ro...

  13. Privacy of RFID Systems: Security of Personal Data for End-Users

    OpenAIRE

    Firoz Khan

    2016-01-01

    Privacy of RFID systems is receiving increasing attention in the RFID community. RFID privacy is important as the RFID tags will be attached to all kinds of products and physical objects including people. The possible abuse or excessive use of RFID tracking capability by malicious users can lead to potential privacy violations. In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries. Altho...

  14. Development of Wireless RFID Glove for Various Applications

    Science.gov (United States)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  15. Efficient and Timely Mutual Authentication Scheme for RFID Systems

    OpenAIRE

    Hesham A. El Zouka; Mustafa M. Hosni

    2015-01-01

    The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an impo...

  16. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    Directory of Open Access Journals (Sweden)

    Iwan Vanany

    2009-01-01

    Full Text Available This paper explores the benefit and barriers of RFID (Radio Frequency Identification technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and technology aspects. The results of this study suggest that the benefits of RFID technology adoption are dominated of intangible benefit. Most of the respondents believed that the main barriers of RFID technology adoption are (1 the complexity of RFID technology (2 the lack of complete and valid information, and (3 there is no sufficient budget available. The detail of the outcomes and the implications of this reasarch are also discussed. Abstract in Bahasa Indonesia: Makalah ini berupaya mengeksplorasi manfaat dan hambatan dari pengadopsian teknologi RFID (Radio Frequency Identification dalam konteks rumah sakit di Indonesia. Metode investigasi dari penelitian ini menggunakan wawancara dan kuesioner semi-struktur untuk konsultan, peneliti teknologi RFID dan manajer rumah sakit berkatagori besar di Pulau Jawa. Manfaat-manfaat dan hambatan-hambatan dari pengadopsian teknologi RFID telah diidentifikasi dari studi literatur. Hambatan dari pengadopsian teknologi RFID dibagi menjadi dua (2 aspek yaitu hambatan dari aspek bisnis dan teknologi. Temuan dari studi ini meyakini bahwa manfaat dari pengadopsian teknologi RFID didominasi oleh manfaat yang bersifat intangible. Sebagian besar responden meyakini bahwa hambatan utama dari pengadopsian teknologi RFID adalah: (1 kompleksnya teknologi RFID, (2 ketiadaan informasi yang lengkap dan valid, (3 tidak tersedianya anggaran yang cukup. Detail dari hasil studi dan implikasinya akan didiskusikan selanjutnya. Kata kunci

  17. Effects of RFID Technology on the Logistics Innovation

    OpenAIRE

    金, 双鴿; Shuangge, JIN

    2010-01-01

    An advanced automatic identification technology based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. RFID tag is a microchip combined with an antenna in a compact package and is called also IC tag. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies. This paper aims to analyse the effects of RFID technology on the logistics innovation.

  18. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability.......This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  19. Architecture Design of the Vehicle Tracking System Based on RFID

    OpenAIRE

    Jianxin Deng

    2013-01-01

    Vehicle tracking plays more important roles in modern transportation and logistics operation. This paper deals with a new approach to track vehicles based on RFID (Radio Frequency Identification) technology. The vehicle tracking system is designed overallly  supported by Axiomatic Design theory.The basic steps of vehicle tracking based on RFID are developed and a six-layered architecture for the vehicle tracking system integrating databases, RFID tags, RFID readers, data centers, networks an...

  20. Uniting Legislation with RFID Privacy-Enhancing Technologies

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon the actual security and privacy needs of people in RFID-enabled environments, while technology helps to ensure legal compliance. This paper examines the main aims of RFID

  1. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  2. Filtering Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hazalila Kamaludin

    2016-01-01

    Full Text Available Radio Frequency Identification (RFID enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and storage resources as well as delaying decision-making, filtering duplicate data from RFID data stream is an important and challenging problem. Existing Bloom Filter-based approaches for filtering duplicate RFID data streams are complex and slow as they use multiple hash functions. In this paper, we propose an approach for filtering duplicate data from RFID data streams. The proposed approach is based on modified Bloom Filter and uses only a single hash function. We performed extensive empirical study of the proposed approach and compared it against the Bloom Filter, d-Left Time Bloom Filter, and the Count Bloom Filter approaches. The results show that the proposed approach outperforms the baseline approaches in terms of false positive rate, execution time, and true positive rate.

  3. Enhanced UHF RFID tags for drug tracing.

    Science.gov (United States)

    Catarinucci, Luca; Colella, Riccardo; De Blasi, Mario; Patrono, Luigi; Tarricone, Luciano

    2012-12-01

    Radio Frequency Identification (RFID) technology is playing a crucial role for item-level tracing systems in healthcare scenarios. The pharmaceutical supply chain is a fascinating application context, where RFID can guarantee transparency in the drug flow, supporting both suppliers and consumers against the growing counterfeiting problem. In such a context, the choice of the most adequate RFID tag, in terms of shape, frequency, size and reading range, is crucial. The potential presence of items containing materials hostile to the electromagnetic propagation exasperates the problem. In addition, the peculiarities of the different RFID-based checkpoints make even more stringent the requirements for the tag. In this work, the performance of several commercial UHF RFID tags in each step of the pharmaceutical supply chain has been evaluated, confirming the expected criticality. On such basis, a guideline for the electromagnetic design of new high-performance tags capable to overcome such criticalities has been defined. Finally, driven by such guidelines, a new enhanced tag has been designed, realized and tested. Due to patent pending issues, the antenna shape is not shown. Nevertheless, the optimal obtained results do not lose their validity. Indeed, on the one hand they demonstrate that high performance item level tracing systems can actually be implemented also in critical operating conditions. On the other hand, they encourage the tag designer to follow the identified guidelines so to realize enhanced UHF tags.

  4. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  5. The Value of RFID Benefits vs Costs

    CERN Document Server

    2013-01-01

    RFID technology presents a great potential for creating competitive advantage. By automating and simplifying data collection, it lets users more accurately track assets and monitor key indicators, which in turn gives greater visibility to the operations. However, the benefits received from this technology will be determined by how well it is integrated with the business processes and overall information flow. Because of the fact that the decision to deploy RFID technology in an enterprise is a business decision instead of a technology decision, cost-benefit analysis is a key component of this decision. If an RFID deployment cannot be justified in terms of its economic value to the company, it is not likely to help the company; and consequently, it is not likely to remain a viable deployment over the long term.   The Value of RFID describes the business value of RFID and explains the costs and benefits of this technology comprehensively. Different investment evaluation models are proposed to use in various ap...

  6. RFID: A key technology for Humanity

    Science.gov (United States)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  7. An Approach for Removing Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hairulnizam Mahdin

    2011-10-01

    Full Text Available Radio frequency identification (RFID systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches.

  8. An Approach for Removing Redundant Data from RFID Data Streams

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  9. A Novel RFID EMSICC-based Chipless Tag

    Directory of Open Access Journals (Sweden)

    S. Sakouhi

    2017-04-01

    Full Text Available A new Radio Frequency Identification (RFID chipless tag based on the Substrate Integrated Waveguide (SIW technology is proposed in this paper. The tag highlights the importance of using such technologies allowing a surface miniaturization, a high Q-factor and an original shape. Thus, the novel design consists of an Eight-Mode Substrate Integrated Circular Cavity (EMSICC associated to an Ultra Wideband (UWB bowtie-shaped antenna. The EMSICC is realized by bisecting the Quarter Mode Substrate Integrated Circular Cavity (QMSICC into two parts, while preserving the same resonant frequency and the original electric field distribution. Further, the operating frequency band is from 5 GHz to 8 GHz within a compact area of 4.97 × 1.05 cm2. The proposed design is experimentally validated in the frequency domain.

  10. Passive UHF RFID Tag with Multiple Sensing Capabilities

    Directory of Open Access Journals (Sweden)

    José Fernández-Salmerón

    2015-10-01

    Full Text Available This work presents the design, fabrication, and characterization of a printed radio frequency identification tag in the ultra-high frequency band with multiple sensing capabilities. This passive tag is directly screen printed on a cardboard box with the aim of monitoring the packaging conditions during the different stages of the supply chain. This tag includes a commercial force sensor and a printed opening detector. Hence, the force applied to the package can be measured as well as the opening of the box can be detected. The architecture presented is a passive single-chip RFID tag. An electronic switch has been implemented to be able to measure both sensor magnitudes in the same access without including a microcontroller or battery. Moreover, the chip used here integrates a temperature sensor and, therefore, this tag provides three different parameters in every reading.

  11. High Security Chipless RFID Tags Using Frequency Shift Coding Technique

    Directory of Open Access Journals (Sweden)

    M. Sumi

    2017-09-01

    Full Text Available A high security chipless RFID tag designed using E shaped resonator is presented in this paper. The tag identity is encoded using Frequency Shift Coding technique. 144 different code words are possible in 2.78 to 3.85 GHz band using two E shaped resonators. The tag identity can be decoded from either amplitude or group delay information. The resonators are designed and fabricated on substrate C-MET LK4.3 of dielectric constant 4.3 and loss tangent 0.0018. Different tag combinations are designed and tested using bistatic measurement setup. Measurement results on realized prototypes are provided to ensure the reliability of the proposed design.

  12. Study of Development for RFID System to Hospital Environment.

    Science.gov (United States)

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system.

  13. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  14. Semantic-Based RFID Data Management

    Science.gov (United States)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  15. A Novel Security Method For RFID Tags

    Directory of Open Access Journals (Sweden)

    Imran Ali Jokhio

    2012-07-01

    Full Text Available RFID (Radio Frequency Identification tags use light weighted security methods because of cost constraints. In this paper a lightweight security method is investigated and proved that it significantly lacks in protecting RFID tags against simple cloning attack. In order to protect RFID tag from cloning attacks a novel security method is proposed in this paper. The proposed security method provides high level computational difficulty against the three basic attacking techniques, i.e. eavesdropping, replay and man in the middle. In order to clone a tag, attacker eavesdrops the tag responses and creates a replica of the tag. The novel security method presented in this paper increases the hardness to avoid guessing tag secrets resulting in a conditional none clone able tags. The proposed security method is also evaluated using propositional logic proofs to demonstrate the level of security it can provide.

  16. Pharmaceutical counterfeiting and the RFID technology intervention.

    Science.gov (United States)

    Coustasse, Alberto; Arvidson, Cody; Rutsohn, Phil

    2010-07-01

    Both nationally and internationally, pharmaceutical counterfeiting has become a problem that is threatening economic stability and public health. The purpose of the present research study review was to analyze the scope and severity of pharmaceutical counterfeiting and to establish if the implantation of the Radio Frequency Identification Device (RFID) model can more efficiently be used within the pharmaceutical supply chain to reduce the problem counterfeit drugs impose on public health and international economic stability. Results indicated that implementing the RFID model for tracking drugs at the item level in the pharmaceutical supply chain has potential to alleviate the scope of the counterfeit drug problem. Recommendations for how the pharmaceutical industry may sooner adopt the RFID model are made.

  17. A Broadband UHF Tag Antenna For Near-Field and Far-Field RFID Communications

    Directory of Open Access Journals (Sweden)

    M. Dhaouadi

    2014-12-01

    Full Text Available The paper deals with the design of passive broadband tag antenna for Ultra-High Frequency (UHF band. The antenna is intended for both near and far fields Radio Frequency Identification (RFID applications. The meander dipole tag antenna geometry modification is designed for frequency bandwidth increasing. The measured bandwidth of the proposed broadband Tag antenna is more than 140 MHz (820–960 MHz, which can cover the entire UHF RFID band. A comparison between chip impedance of datasheet and the measured chip impedance has been used in our simulations. The proposed progressive meandered antenna structure, with an overall size of 77 mm × 14 mm × 0.787 mm, produces strong and uniform magnetic field distribution in the near-field zone. The antenna impedance is matched to common UHF chips in market simply by tuning its capacitive and inductive values since a perfect matching is required in the antenna design in order to enhance the near and the far field communications. Measurements confirm that the designed antenna exhibits good performance of Tag identification for both near-field and far-field UHF RFID applications.

  18. RFID in libraries a step toward interoperability

    CERN Document Server

    Ayre, Lori Bowen

    2012-01-01

    The approval by The National Information Standards Organization (NISO) of a new standard for RFID in libraries is a big step toward interoperability among libraries and vendors. By following this set of practices and procedures, libraries can ensure that an RFID tag in one library can be used seamlessly by another, assuming both comply, even if they have different suppliers for tags, hardware, and software. In this issue of Library Technology Reports, Lori Bowen Ayre, an experienced implementer of automated materials handling systems, Provides background on the evolution of the standard

  19. UHF RFID technologies for identification and traceability

    CERN Document Server

    Laheurte, Jean-Marc; Paret, Dominique; Loussert, Christophe

    2014-01-01

    UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or person to be automatically identified at a distance without a direct line-of-sight using a radio wave exchange. Applications include inventory tracking, prescription medication tracking and authentication, secure automobile keys, and access control for secure facilities. This book begins with an overview of UHF RFID challenges describing the applications, markets, trades and basic technologies. It follows this by highlighting the main features distinguishing UHF (860MHz-960MHz) and HF

  20. Using Interference to Block RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag.......We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag....

  1. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  2. Characterization of inkjet-printing HF and UHF antennas for RFID applications

    Science.gov (United States)

    Tarapata, Grzegorz; Paczesny, Daniel; Kawecki, Krzysztof

    2013-10-01

    The aim of this work was to perform a set of RFID antennas on flexible plastic substrates designed for range of HF and UHF band. The samples was fabricated using inkjet printing technology and conductive material base on silver nanopartilces ink. Fabricated antennas have been characterized, and the results were compared with the parameters of antennas made with usage of classical PCB technology on FR4 laminate with copper metallization. The paper presents studies on the impact of elastic substrates and conductive materials on antennas electrical parameters, as well as the communication range of the resulting RFID tags. During the experiment two patterns of HF and three patterns of UHF antennas was examined and the antennas was realized on different types of substrates, such as PET, Kapton® and FR4.

  3. Applications of RFID into Nuclear Power Plant Maintenance System

    International Nuclear Information System (INIS)

    Lee, Seung Min; Seong, Poong Hyun

    2008-01-01

    RFID (Radio Frequency Identification) system, one of the most anticipated ubiquitous technologies is an automatic identification method using devices called RFID tags. RFID antenna detects each approach of RFID tags and recognizes the tags' ID and transfer to reader to do information processing. Since first introduced in the logistics industry, production management and maintenance organization in various fields of domestic and foreign enterprises introduce the RFID. Nuclear power plants are also using RFID to manage materials lately. However, the current status on the use of RFID is just a little more advanced on the use of bar code. Therefore, it seems that the important characteristic of RFID is not enough actualized to keep seeing. In point of Maintenance Information Field based on ubiquitous technology, the most important concept is real-time information processing. And RFID is quite proper to develop this information field system because it satisfies for the matter of that concept. The leading content in ubiquitous maintenance system is that maintenance personnel can get information what he needs and he can also transfer information what he gets whenever and wherever he is. In this paper, some examples of applying RFID in development of ubiquitous maintenance system are suggested

  4. Radio frequency identification and time-driven activity based costing:RFID-TDABC application in warehousing

    OpenAIRE

    Bahr, Witold; Price, Brian J

    2016-01-01

    Purpose: This paper extends the use of Radio Frequency Identification (RFID) data for accounting of warehouse costs and services. Time Driven Activity Based Costing (TDABC) methodology is enhanced with the real-time collected RFID data about duration of warehouse activities. This allows warehouse managers to have accurate and instant calculations of costs. The RFID enhanced TDABC (RFID-TDABC) is proposed as a novel application of the RFID technology. Research Approach: Application of RFID-TDA...

  5. Radio Frequency Identification (RFID) in Space

    Science.gov (United States)

    Bacon, John B.

    2011-01-01

    The ISS has some significant inventory management challenges. RFID solves many of these, and was deployed 8/2011. Significant issues (some unique to spacecraft) remain. NASA is interested and investing in technologies that will help to overcome the remaining issues.

  6. Introducing RFID at Middlesex University Learning Resources

    Science.gov (United States)

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  7. Exploring RFID adoption in South African industries

    NARCIS (Netherlands)

    van der Sijde, P.C.; de Boer, S.J.; McGowan, P.C.; Korteweg, B.

    2012-01-01

    This paper explores technology adoption based on the ‘technology – organisation – environment’ framework to study radio frequency identification (RFID) adoption in South African industries. It operationalises the framework using innovation-adoption theory, ‘organisational capitals’, and ‘societal

  8. Energy-balanced algorithm for RFID estimation

    Science.gov (United States)

    Zhao, Jumin; Wang, Fangyuan; Li, Dengao; Yan, Lijuan

    2016-10-01

    RFID has been widely used in various commercial applications, ranging from inventory control, supply chain management to object tracking. It is necessary for us to estimate the number of RFID tags deployed in a large area periodically and automatically. Most of the prior works use passive tags to estimate and focus on designing time-efficient algorithms that can estimate tens of thousands of tags in seconds. But for a RFID reader to access tags in a large area, active tags are likely to be used due to their longer operational ranges. But these tags use their own battery as energy supplier. Hence, conserving energy for active tags becomes critical. Some prior works have studied how to reduce energy expenditure of a RFID reader when it reads tags IDs. In this paper, we study how to reduce the amount of energy consumed by active tags during the process of estimating the number of tags in a system and make the energy every tag consumed balanced approximately. We design energy-balanced estimation algorithm that can achieve our goal we mentioned above.

  9. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  10. Enhancing Business Process Automation by Integrating RFID Data and Events

    Science.gov (United States)

    Zhao, Xiaohui; Liu, Chengfei; Lin, Tao

    Business process automation is one of the major benefits for utilising Radio Frequency Identification (RFID) technology. Through readers to RFID middleware systems, the information and the movements of tagged objects can be used to trigger business transactions. These features change the way of business applications for dealing with the physical world from mostly quantity-based to object-based. Aiming to facilitate business process automation, this paper introduces a new method to model and incorporate business logics into RFID edge systems from an object-oriented perspective with emphasises on RFID's event-driven characteristics. A framework covering business rule modelling, event handling and system operation invocations is presented on the basis of the event calculus. In regard to the identified delayed effects in RFID-enabled applications, a two-block buffering mechanism is proposed to improve RFID query efficiency within the framework. The performance improvements are analysed with related experiments.

  11. RFID - based Staff Control System (SCS) in Kazakhstan

    Science.gov (United States)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  12. RFID Continuance Usage Intention in Health Care Industry.

    Science.gov (United States)

    Iranmanesh, Mohammad; Zailani, Suhaiza; Nikbin, Davoud

    Radio-frequency identification (RFID) has been proved to be an effective tool both for improving operational efficiency and for gaining competitive advantage in the health care industry despite its relatively low-usage rate in hospitals. The sustained use of RFID by health care professionals will promote its development in the long term. This study evaluates the acceptance continuance of RFID among health care professionals through technology continuance theory (TCT). Data were collected from 178 medical professionals in Malaysia and were then analyzed using the partial least squares technique. The analysis showed that the TCT model provided not only a thorough understanding of the continuance behavior of health care professionals toward RFID but also the attitudes, satisfaction, and perceived usefulness of professionals toward it. The results of this study are expected to assist policy makers and managers in the health care industry in implementing the RFID technology in hospitals by understanding the determinants of continuance of RFID usage intention.

  13. Assessment of RFID Read Accuracy for ISS Water Kit

    Science.gov (United States)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  14. A Framework for RFID Survivability Requirement Analysis and Specification

    Science.gov (United States)

    Zuo, Yanjun; Pimple, Malvika; Lande, Suhas

    Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.

  15. Object Oriented Business Process Modelling in RFID Applied Computing Environments

    Science.gov (United States)

    Zhao, Xiaohui; Liu, Chengfei; Lin, Tao

    As a tracking technology, Radio Frequency Identification (RFID) is now widely applied to enhance the context awareness of enterprise information systems. Such awareness provides great opportunities to facilitate business process automation and thereby improve operation efficiency and accuracy. With the aim to incorporate business logics into RFID-enabled applications, this book chapter addresses how RFID technologies impact current business process management and the characteristics of object-oriented business process modelling. This chapter first discusses the rationality and advantages of applying object-oriented process modelling in RFID applications, then addresses the requirements and guidelines for RFID data management and process modelling. Two typical solutions are introduced to further illustrate the modelling and incorporation of business logics/business processes into RFID edge systems. To demonstrate the applicability of these two approaches, a detailed case study is conducted within a distribution centre scenario.

  16. The impact of RFID on management of returnable containers

    OpenAIRE

    Thoroe, Lars; Melski, Adam; Schumann, Matthias

    2009-01-01

    Inventory shrinkage is a common problem in the management of returnable containers. RFID-based container tracking systems have been proposed as a possible solution. Benefits of RFID-based tracking of returnable transport items such as pallets, kegs and boxes are documented in several case studies, but have so far hardly been analyzed from a theoretical perspective. In this article, we analyze the impact of RFID on container management using a deterministic inventory model. The analysis focuse...

  17. Evaluation of Efficiency Improvement in Vital Documentation Using RFID Devices.

    Science.gov (United States)

    Kimura, Eizen; Nakai, Miho; Ishihara, Ken

    2016-01-01

    We introduced medical devices with RFID tags and the terminal with RFID reader in our hospital. Time study was conducted in two phases. In phase I, nurses round as usual, and in phase II, the nurse round the ward with a terminal installed on a cart. This study concluded that RFID system shortens the time for vital sign documentation. However, deploying the terminals at every bedside did not contribute the more time reduction.

  18. RFID Demystified: Part 2. Applications within the supply chain.

    OpenAIRE

    Wilding, Richard D.; Delgardo, Tiago

    2004-01-01

    In our previous article we discussed the technology, benefits and barriers to implementations of Radio Frequency Identification (RFID). In this article we discuss where this technology can be applied. Essentially, it is argued that RFID systems help companies to cut costs, improve customer service, reduce labour, increase accuracy and improve supply chain throughput. RFID systems applications can be used by different industry sectors like the military, retail, industrial, life sciences, logis...

  19. Improvement of Supply Chain Performances Using RFID Technology

    OpenAIRE

    Turcu, Cornel; Turcu, Cristina; Graur, Adrian

    2009-01-01

    This chapter helps to improve readers understanding of the RFID and EPC potential for business processes. RFID technology is classified as a wireless AIDC technology that uses digital data encoded into a radio tag embedding a microchip with an antenna. The data stored on the tag is collected by a reader using radio waves. There are a large variety of RFID tags designs; they also have many different functional characteristics such as power source, carrier frequency, read range, data storage ca...

  20. Flexible ultra-wideband antenna incorporated with metamaterial structures: multiple notches for chipless RFID application

    Science.gov (United States)

    Jalil, M. E.; Rahim, M. K. A.; Samsuri, N. A.; Dewan, R.; Kamardin, K.

    2017-01-01

    A coplanar waveguide (CPW) ultra-wideband (UWB) antenna incorporated with metamaterial—split ring resonator structure—that operates from 3.0 to 12.0 GHz is proposed for chipless RFID tag. The 30 mm × 40 mm flexible chipless RFID tag is designed on the fleece substrate ( ɛ r = 1.35, thickness = 1 mm and tan δ = 0.025). A six-slotted modified complementary split ring resonator (MCSRR) is introduced into the ultra-wideband antenna to produce multiple band notches at 3.0, 4.0, 5.0, 6.0 and 7.0 GHz. The frequency shifting technique is introduced for designing a high-capacity chipless RFID tag with compact size. Each MCSRR is able to code in four different allocations (00, 01, 10 and 11). To achieve encoding of 10-bits data (10,234 number), six MCSRRs are proposed with three-slotted MCSRR in the radiator and three-slotted MCSRR in the ground plane.

  1. Ethical implications of implantable radiofrequency identification (RFID) tags in humans.

    Science.gov (United States)

    Foster, Kenneth R; Jaeger, Jan

    2008-08-01

    This article reviews the use of implantable radiofrequency identification (RFID) tags in humans, focusing on the VeriChip (VeriChip Corporation, Delray Beach, FL) and the associated VeriMed patient identification system. In addition, various nonmedical applications for implanted RFID tags in humans have been proposed. The technology offers important health and nonhealth benefits, but raises ethical concerns, including privacy and the potential for coercive implantation of RFID tags in individuals. A national discussion is needed to identify the limits of acceptable use of implantable RFID tags in humans before their use becomes widespread and it becomes too late to prevent misuse of this useful but ethically problematic technology.

  2. Embedded RFID Recorder in short-range wireless devices

    DEFF Research Database (Denmark)

    2010-01-01

    range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...

  3. Towards an Effective Management Strategy for Passive RFID Implementation

    National Research Council Canada - National Science Library

    Fisch, John N; Koch, David M

    2004-01-01

    .... However, many issues central to passive RFID implementation remain unresolved. First and foremost, a comprehensive management strategy, including a complete redesign of business practices, must be developed...

  4. Logistics Reduction: RFID Enabled Autonomous Logistics Management (REALM)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Advanced Exploration Systems (AES) Logistics Reduction (LR) project Radio-frequency identification (RFID) Enabled Autonomous Logistics Management (REALM) task...

  5. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  6. Integrated solutions for libraries: implementation of RFID system

    Directory of Open Access Journals (Sweden)

    Simona Gheorghe

    2011-01-01

    Full Text Available Currently, an innovative technology is implemented in the Romanian libraries, based on radio frequency identification, in other words RFID technology. This technology has been developed into many areas of activity both in our country and abroad. In 2008, Central Library of “Lucian Blaga” University from Sibiu has implemented the system and Central University Library “Carol I” from Bucharest is in the process of RFID implementation. There are presented the components of an RFID library system, what is involving the application of this system, the advantages and disadvantages of RFID technology.

  7. Rfid Based Traceability System For Sheepbreeding

    Science.gov (United States)

    Xing, Yan; Li, Hui; Zhang, Jian; Fu, Zetian

    As China's meat production is growing, the quality safety of meat food as an important human food sources has increasingly become a major issue which related to the national economy and people's livelihood. Using early warning technique, tracking and tracing techniques and so on in the key link of meat food production in order to fulfill quality control is an important method which can effectively guarantee the food quality and safety. The use of RFID techniques and handhelds can automatically collect information about sheep breeding. Meanwhile this information could be inquired conveniently through Internet. This study uses C/S (Client/Server) model structure, and builds the sheep breeding traceability system based on RFID.

  8. Reliable Food Traceability Using RFID Tagging

    Science.gov (United States)

    Azuara, Guillermo; Salazar, José L.; Tornos, José L.; Piles, Joan J.

    Radio Frequency IDentification (RFID) technology has numerous potential applications in various industries. One important use is for complete traceability of a specific product with the added advantage of being able to verify that quality controls have been passed, with all the necessary steps complied with and for the time required. The aim of this work is to present a food traceability system using RFID tags with contents guaranteed secure by the use of public-key cryptography and at an affordable cost without the need for substantial investment in infrastructure. Aggregate signatures are used so that all the steps can be signed in a reduced memory space. This type of signature is a cryptographic primitive that "consolidates" several signatures into one in such a way that if n users sign n messages, all the signatures can be grouped into one single signature.

  9. Secure passive RFID tag with seal

    Energy Technology Data Exchange (ETDEWEB)

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2017-11-14

    A secure passive RFID tag system comprises at least one base station and at least one passive RFID tag. The tag includes a fiber optic cable with the cable ends sealed within the tag and the middle portion forming an external loop. The loop may be secured to at least portions of an object. The tag transmits and receives an optical signal through the fiber optic cable, and the cable is configured to be damaged or broken in response to removal or tampering attempts, wherein the optical signal is significantly altered if the cable is damaged or broken. The tag transmits the optical signal in response to receiving a radio signal from the base station and compares the transmitted optical signal to the received optical signal. If the transmitted optical signal and the received optical signal are identical, the tag transmits an affirmative radio signal to the base station.

  10. Mobile 3D Viewer Supporting RFID System

    International Nuclear Information System (INIS)

    Kim, J. J.; Yang, S. W.; Choi, Y.

    2007-01-01

    As hardware capabilities of mobile devices are being rapidly enhanced, applications based upon mobile devices are also being developed in wider areas. In this paper, a prototype mobile 3D viewer with the object identification through RFID system is presented. To visualize 3D engineering data such as CAD data, we need a process to compute triangulated data from boundary based surface like B-rep solid or trimmed surfaces. Since existing rendering engines on mobile devices do not provide triangulation capability, mobile 3D programs have focused only on an efficient handling with pre-tessellated geometry. We have developed a light and fast triangulation process based on constrained Delaunay triangulation suitable for mobile devices in the previous research. This triangulation software is used as a core for the mobile 3D viewer on a PDA with RFID system that may have potentially wide applications in many areas

  11. ISS Asset Tracking Using SAW RFID Technology

    Science.gov (United States)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  12. Degenerate RFID Channel Modeling for Positioning Applications

    Directory of Open Access Journals (Sweden)

    A. Povalac

    2012-12-01

    Full Text Available This paper introduces the theory of channel modeling for positioning applications in UHF RFID. It explains basic parameters for channel characterization from both the narrowband and wideband point of view. More details are given about ranging and direction finding. Finally, several positioning scenarios are analyzed with developed channel models. All the described models use a degenerate channel, i.e. combined signal propagation from the transmitter to the tag and from the tag to the receiver.

  13. RFID- Application in Info-Documentary Systems

    OpenAIRE

    Repanovici, Angela; Cristea, Luciana

    2011-01-01

    The automatization process in all industrial and social fields requires large amounts of data processing. Data Acquisition and Control Solutions can be improved by collecting and processing data in real-time without human involvement through Automatic Identification or Auto ID. Radio Frequency Identification (RFID - Radio Frequency Identification) or proximity is the latest and most advanced method automatic data collection technology, gaining a wide acceptance as people understand and use...

  14. RFID Reconsidered : what you need to know before investing in the latest self-check

    OpenAIRE

    Featherstone, Robin

    2006-01-01

    Radio Frequency Identification (RFID) Technology has the potential to revolutionize library services. However - not unlike the internet - RFID technology is evolving faster than the guidelines to guard against misuse. What effect will eventual RFID legislation have on North American libraries? Will potential benefits be overshadowed by security and privacy concerns? Is RFID technology a blessing or a curse?

  15. Application of RFID technology in Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat

    OpenAIRE

    Ghosh, T. B.

    2007-01-01

    RFID (Radio Frequency Identification) is the latest technology to be used in different industries for security and theft detection. In this paper the concept of RFID is defined. Components of RFID Systems used by the SVNIT library are discussed. Advantages, shortcomings and remedies of RFID systems, and financial implications are explained with special reference to SVNIT library, Surat.

  16. Stage implementation of RFID in hospitals.

    Science.gov (United States)

    Kumar, Sameer; Livermont, Gregory; McKewan, Gregory

    2010-01-01

    The use of radio frequency identification device (RFID) technology within the healthcare industry was researched and specific instances of implementation of this technology in the hospital environment were examined. The study primarily makes use of ideas from operations and supply chain management, such as work flow diagrams, value stream mapping, and poka-yokes (mistake proofing measures) for investigations of processes, failures, and solutions. This study presents a step-by-step approach of how to implement the use of RFID tracking systems within the entire hospital. A number of poka-yokes were also devised for improving the safety of the patient and cost effectiveness of the hospital to insure the success of the hospital health care delivery system. Many players in the hospital environment may be impacted. This includes patients, doctors, nurses, technicians, administrators, and other hospital personnel. Insurance and government agencies may be impacted as well. Different levels of training of hospital personnel will be required based on the degree of interaction with the RFID system. References to costs, Return On Investment, change management, ethical and legal considerations are also made to help the reader understand the benefits and implications of the technology in the hospital environment.

  17. Passive RFID Rotation Dimension Reduction via Aggregation

    Science.gov (United States)

    Matthews, Eric

    Radio Frequency IDentification (RFID) has applications in object identification, position, and orientation tracking. RFID technology can be applied in hospitals for patient and equipment tracking, stores and warehouses for product tracking, robots for self-localisation, tracking hazardous materials, or locating any other desired object. Efficient and accurate algorithms that perform localisation are required to extract meaningful data beyond simple identification. A Received Signal Strength Indicator (RSSI) is the strength of a received radio frequency signal used to localise passive and active RFID tags. Many factors affect RSSI such as reflections, tag rotation in 3D space, and obstacles blocking line-of-sight. LANDMARC is a statistical method for estimating tag location based on a target tag's similarity to surrounding reference tags. LANDMARC does not take into account the rotation of the target tag. By either aggregating multiple reference tag positions at various rotations, or by determining a rotation value for a newly read tag, we can perform an expected value calculation based on a comparison to the k-most similar training samples via an algorithm called K-Nearest Neighbours (KNN) more accurately. By choosing the average as the aggregation function, we improve the relative accuracy of single-rotation LANDMARC localisation by 10%, and any-rotation localisation by 20%.

  18. Development of a RFID Based Library Management System and ...

    African Journals Online (AJOL)

    The device consists majorly of a RFID reader, a Bluetooth module, a microcontroller and the materials to be tracked are tagged with a RFID (a transponder).B The unique IDs are stored in a PC running an application with other information on the materials into a database.B Through these processes, books, library users with ...

  19. Sistem Parkir Berbasis RFID dan Pengenalan Citra Pelat Nomor Kendaraan

    Directory of Open Access Journals (Sweden)

    Eko Didik Widianto

    2017-07-01

    Full Text Available The length of time in manually recording vehicle license plates in the parking system leads to long vehicle queues. This research developed automatic parking system based on RFID and vehicle plate number recognition. Authentication used a camera and Arduino Uno as the controller for RFID reading, feedback and gatekeeper control. The system will compare the characters image and RFID in the record of database to authorize a vehicle. Image processing was done by contour analysis method and had 91% in accuracy at 60 cm of distance and 131.89 milliseconds of reading speed. The system had been able to work to automatically open and close gates based on the match of RFID and vehicle plate number recognition. Waktu yang lama saat pencatatan pelat nomor kendaraan secara manual di sistem parkir menimbulkan antrean. Penelitian ini mengembangkan sistem parkir otomatis berbasis RFID dan pengolahan citra pelat nomor kendaraan. Autentikasi menggunakan kamera untuk pengambil gambar pelat nomor dan Arduino Uno sebagai kontroler untuk pembaca RFID, pemberi umpan balik dan pembuka gerbang. Sistem akan membandingkan karakter citra dan RFID pada database untuk menentukan izin penggunaan kendaraan. Pengolahan citra menggunakan metode analisis kontur dan memiliki akurasi sebesar 91 % di jarak 60 cm dan kecepatan baca 131,89 milidetik. Sistem telah dapat bekerja untuk secara otomatis membuka dan menutup gerbang berdasarkan kecocokan kartu RFID dan pelat kendaraan.

  20. Design and Optimization of Passive UHF RFID Tag Antenna for Mounting on or inside Material Layers

    Science.gov (United States)

    Shao, Shuai

    proximity and designing broad band and mechanically robust RFID tag antennas for elastic materials. As a first step, the effects of dielectric materials on an antenna's impedance match and radiation pattern are investigated. The detuning effect is quantified based on the theoretical frequency scaling and effective permittivity of a dielectric material of finite thickness. Using simple formulas, the operational range of a tag can be predicted without intensive full-wave simulations of different materials. Next, a spectral domain Green's function is applied to compute the antenna pattern when the tag is mounted on or inside a layered medium. The optimal placement of the tag is found based on the focusing effect that the material has on the gain pattern of the antenna. For tires, the steel ply in the sidewall of a tire looks like a periodic wire grating. The performance of an antenna placed close to a wire grating is predicted using Floquet theory. The results indicate that steel plies embedded in the tire can be utilized as a reflector to further focus the gain pattern and increase the read range of a tag. Using these design tools and theoretical analysis, several broadband RFID tag antennas are designed for multi-layered materials. A novel stretchable conductive textile (E-fiber) based tag antenna is also developed for placement in elastic materials. Prototype antennas are fabricated and embedded in a tire during the tire manufacturing process. Experimental results indicate that tags with the new antennas achieve significant improvement compared with commercially available tags.

  1. An Exploratory Study of RFID Adoption in the Paperboard Packaging Industry

    Directory of Open Access Journals (Sweden)

    Bindiganavale Vijayaraman

    2008-12-01

    Full Text Available Some experts predict RFID will be the next big technology to revolutionize supply chain management. The RFID mandates by the Department of Defense (DOD, Federal Drug Administration (FDA, and retail companies have required organizations to implement RFID technology. Other companies are evaluating the potential costs and benefits of such adoption. In order to establish benchmark on RFID adoption, this study surveyed readers of Paperboard Packaging magazine and members of the European Federation of Corrugated Board Manufacturers (FEFCO to see if they are implementing RFID technology and challenges they may face. The results indicate about 52% of responding companies are not currently considering RFID technology because of the cost concerns. Companies that are implementing or considering RFID are doing it because of their customer requirements although they are concerned about the cost of RFID tags and cost of implementation. Companies that are implementing RFID are somewhat satisfied with RFID implementation.

  2. Evolution of RFID Applications in Construction: A Literature Review

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2015-07-01

    Full Text Available Radio frequency identification (RFID technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper.

  3. RFID-tekniikan hyödyntäminen hoivakodissa

    OpenAIRE

    Pesonen, Miia

    2008-01-01

    Tutkimuksen tavoitteena on selvittää RFID-tekniikan tarjoamat hyödyt ja haasteet Hoivakoti X:ssä. Lisäksi tavoitteena on selvittää, voitaisiinko hoivakodin toimintaa tehostaa ja asukastyytyväisyyttä lisätä, mikäli RFID-tunnisteet otettaisiin käyttöön. Tutkimuksen teoriaosuudessa käsitellään RFID-tekniikan historiaa ja kehittymistä. Lisäksi perehdytään yleisimpiin RFID-järjestelmiin, tunnisteisiin, standardointiin, taustajärjestelmiin ja lukijoihin. Työssä käsitellään RFID-tekniikan mahdol...

  4. RFID Application of Smart Grid for Asset Management

    Directory of Open Access Journals (Sweden)

    Xiwei Wang

    2013-01-01

    Full Text Available RFID technology research has resolved practical application issues of the power industry such as assets management, working environment control, and vehicle networking. Also it provides technical reserves for the convergence of ERP and CPS. With the development of RFID and location-based services technology, RFID is converging with a variety of sensing, communication, and information technologies. Indoor positioning applications are under rapid development. Micromanagement environment of the assets is a useful practice for the RFID and positioning. In this paper, the model for RFID applications has been analyzed in the microenvironment management of the data center and electric vehicle batteries, and the optimization scheme of enterprise asset management is also proposed.

  5. System and Method for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  6. Evolution of RFID Applications in Construction: A Literature Review

    Science.gov (United States)

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  7. Preliminary Study of RFID System for the LILW Transportation

    International Nuclear Information System (INIS)

    Kim, Dohyung; Lee, Unjang; Choi, Kyusup

    2008-01-01

    Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. In Korea, Low-to-Intermediate Level Radioactive Wastes (LILW) are planed to be disposed at Kyeonju disposal repository, and 100,000 LILW drums will be disposed for the first 10 years of disposal. Tracking of these LILW drums is one of the important parts for safe transportation. To track the LILW drums during the transport as well as storage and disposal, RFID can be the prospective method for tracking the LILW drums. In this report, RFID system is introduced to the LILW transport from the generation site to disposal site, and one possible RFID system is suggested as a preliminary study

  8. Systems and Methods for RFID-Enabled Dispenser

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  9. Evolution of RFID Applications in Construction: A Literature Review.

    Science.gov (United States)

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-07-03

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper.

  10. Review on SAW RFID tags.

    Science.gov (United States)

    Plessky, Victor P; Reindl, Leonhard M

    2010-03-01

    SAW tags were invented more than 30 years ago, but only today are the conditions united for mass application of this technology. The devices in the 2.4-GHz ISM band can be routinely produced with optical lithography, high-resolution radar systems can be built up using highly sophisticated, but low-cost RF-chips, and the Internet is available for global access to the tag databases. The "Internet of Things," or I-o-T, will demand trillions of cheap tags and sensors. The SAW tags can overcome semiconductor-based analogs in many aspects: they can be read at a distance of a few meters with readers radiating power levels 2 to 3 orders lower, they are cheap, and they can operate in robust environments. Passive SAW tags are easily combined with sensors. Even the "anti-collision" problem (i.e., the simultaneous reading of many nearby tags) has adequate solutions for many practical applications. In this paper, we discuss the state-of-the-art in the development of SAW tags. The design approaches will be reviewed and optimal tag designs, as well as encoding methods, will be demonstrated. We discuss ways to reduce the size and cost of these devices. A few practical examples of tags using a time-position coding with 10(6) different codes will be demonstrated. Phase-coded devices can additionally increase the number of codes at the expense of a reduction of reading distance. We also discuss new and exciting perspectives of using ultra wide band (UWB) technology for SAW-tag systems. The wide frequency band available for this standard provides a great opportunity for SAW tags to be radically reduced in size to about 1 x 1 mm(2) while keeping a practically infinite number of possible different codes. Finally, the reader technology will be discussed, as well as detailed comparison made between SAW tags and IC-based semiconductor device.

  11. RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, they will allow smart washing machines to check for incompatible clothes (e.g., white shirts and red socks) and smart

  12. Investigating RFIDs in the retail industry of South Africa: RFIDs friend or foe?

    CSIR Research Space (South Africa)

    Mashiane, T

    2012-10-01

    Full Text Available The main objective of this study is to evaluate existing literature in order to determine whether the South African retail industry will benefit or be put at risk by implementing RFID technology. The study analysed both scholarly and non...

  13. Novel “Enhanced-Cognition” RFID Architectures on Organic/Paper Low-Cost Substrates Utilizing Inkjet Technologies

    Directory of Open Access Journals (Sweden)

    Li Yang

    2007-01-01

    Full Text Available The purpose of this paper is to present an overview of novel design and integration approaches for improved performance “enhanced-cognition” UHF passive and active radio frequency identification (RFID tags. Antenna design rules are explained for a variety of applications. A strategy that is currently under development for embedding power sources and integration of sensors and integrated circuits (ICs on low-cost organic substrates, such as liquid crystal polymer (LCP and paper, enabling the use of inkjet-printing capability for the UHF frequency band, is discussed in the paper. The proposed technologies could potentially revolutionize RFID tags allowing for integrated sensing capabilities for various applications such as security, military, logistics, automotion, and pharmaceutics.

  14. Design of Compact Trapezoidal Bow-Tie Chipless RFID Tag

    Directory of Open Access Journals (Sweden)

    Lei Xu

    2015-01-01

    Full Text Available This paper presents a novel compact design of a low cost fully printable slot-loaded bowtie chipless RFID tag. The tag consists of two trapezoidal metallic patches loaded with multiple slot resonators. Slots with similar size or adjacent frequencies are loaded alternately on two bow-tie patches to double the number of data bits within the UWB frequency band without increasing the mutual coupling between slots. A coding capacity of 12 bits is obtained with 12 slots within a reasonable size of 35 mm × 33 mm. RCS of the tag has been given by simulation. Measurements have been done using a bistatic radar configuration in the frequency domain and transmission coefficient is measured. The agreement between the simulation and measurement validates this new concept of design. This tag has high data capacity and low cost and can be directly printed on product such as personal ID, credit cards, paper, and textile because it needs only one conductive layer.

  15. RFID Tag Helix Antenna Sensors for Wireless Drug Dosage Monitoring

    Science.gov (United States)

    Huang, Haiyu; Zhao, Peisen; Chen, Pai-Yen; Ren, Yong; Liu, Xuewu; Ferrari, Mauro; Hu, Ye; Akinwande, Deji

    2014-01-01

    Miniaturized helix antennas are integrated with drug reservoirs to function as RFID wireless tag sensors for real-time drug dosage monitoring. The general design procedure of this type of biomedical antenna sensors is proposed based on electromagnetic theory and finite element simulation. A cost effective fabrication process is utilized to encapsulate the antenna sensor within a biocompatible package layer using PDMS material, and at the same time form a drug storage or drug delivery unit inside the sensor. The in vitro experiment on two prototypes of antenna sensor-drug reservoir assembly have shown the ability to monitor the drug dosage by tracking antenna resonant frequency shift from 2.4–2.5-GHz ISM band with realized sensitivity of 1.27 \\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$\\mu~{\\rm l}/{\\rm MHz}$\\end{document} for transdermal drug delivery monitoring and 2.76-\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$\\mu~{\\rm l}/{\\rm MHz}$\\end{document} sensitivity for implanted drug delivery monitoring. PMID:27170865

  16. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    Science.gov (United States)

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction. Copyright © 2011 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  17. Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System

    Science.gov (United States)

    2008-12-01

    65 1. Traceability for Asset Visibility........................................................65 2. Purposes of RFID and IUID... Traceability Matrix for Asset Visibility...........................................................66 Table 7. IUID vs. RFID ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT Feasibility of Radio Frequency Identification ( RFID ) and

  18. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    OpenAIRE

    Zoltan KATO

    2014-01-01

    In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for tr...

  19. A Review of Implementing ADC in RFID Sensor

    Directory of Open Access Journals (Sweden)

    M. Zurita

    2016-01-01

    Full Text Available The general considerations to design a sensor interface for passive RFID tags are discussed. This way, power and timing constraints imposed by ISO/IEC 15693 and ISO/IEC 14443 standards to HF RFID tags are explored. A generic multisensor interface is proposed and a survey analysis on the most suitable analog-to-digital converters for passive RFID sensing applications is reported. The most appropriate converter type and architecture are suggested. At the end, a specific sensor interface for carbon nanotube gas sensors is proposed and a brief discussion about its implemented circuits and preliminary results is made.

  20. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    Science.gov (United States)

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity.

  1. Penerapan RFID (Radio Frequency Identification di Perpustakaan: Kelebihan dan Kekurangannya

    Directory of Open Access Journals (Sweden)

    Fadhilatul Hamdani

    2014-06-01

    Full Text Available Library is a dynamic organization and always change according to the times. With the development of information technology, libraries must change the way it works to be more advanced, efficient and effective. One application of the latest technology in libraries is using RFID technology, which has two main functions, namely identification and security of library materials. In addition to having several advantages, RFID also has some shortcomings when it will be implemented in the library. Application of RFID in libraries is expected to maximize the performance and service libraries.

  2. RFID in der Hauptbücherei Wien

    OpenAIRE

    Wenzl, Bernhard

    2006-01-01

    In 2003, the Vienna Central Public Library moved to its new building at the Urban-Loritz-Platz. Since than Radio Frequency Identification (RFID) has been used in order to process, charge, and secure media items. The RFID-system consists of 300.000 tags, more than two dozens of reading machines, and a software connection to other systems. The librarians process new books which contain an RFID-tag into the catalogue. The readers charge the books at open access charging systems. Security gates a...

  3. An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network

    Science.gov (United States)

    2005-03-01

    encouraging. Alien Technology, an RFID developer, “does predict that in quantities 12 of 1 billion, RFID tags will approach 10 cents each, and in lots...much greater threat to the retail market for changing prices , should RFID become the primary means of check out at a store. This is still possible...from http://java.sun.com/developer/technicalArticles/ Ecommerce /rfid/ Michelin Embeds RFID Tags in Tires. (2003). RFID Journal. Article

  4. Investigation of Interference Models for RFID Systems

    Directory of Open Access Journals (Sweden)

    Linchao Zhang

    2016-02-01

    Full Text Available The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

  5. An RFID middleware for supply chain management

    Directory of Open Access Journals (Sweden)

    Artur Pinto Carneiro

    2011-12-01

    Full Text Available RFID (Radio Frequency Identification systems for identification and tracking of products and equipments have been progressively adopted as an essential tool for supply chain management, a production environment where the members usually share with each other their own logistic and management systems. Therefore, the development of supply chain RFID systems can be strongly simplified through the inclusion of an intermediate software layer – the middleware – responsible for the creation of interfaces to integrate all the heterogeneous software components. In this article we present a case study developed at IPT (Instituto de Pesquisas Tecnológicas do Estado de São Paulo which gave rise to a middleware prototype able to implement the required software integration on the supply chain of an electric power distribution company. The developed middleware is used to manage the interactions with a heterogeneous group of mobile devices  cell phones, handhelds and data colectors,  operated by different supply chain agents that grab data associated to various processes executed by a given electric power distribution equipment during its life cycle and transfer those data to a central database in order to share them with all the logistic and management corporation systems.

  6. Arduino Based RFID Line Switching Using SSR

    Directory of Open Access Journals (Sweden)

    Michael E.

    2017-10-01

    Full Text Available The importance of line switching cannot be overemphasized as they are used to connect and disconnect substations to and from a distribution grid. At the cradle of technology line switching was achieved via the use of manual switches or fuses which could endanger life as a result of electrocution when expose during maintenance. This ill prompted the development of automated line switching using relays and contactors. With time this tends to fail as a result of wearing of the contact which is as a result of arcing and low voltage. To avert all these ills this paper presents Arduino based Radio Frequency Identification RFID line switching using Solid State Relay SSR. This is to ensure the safety of operators or technologist and to also avert the problem associated with relays and contactors using SSR. This was achieved using RFID RC-522 reader ardriuno Uno SSR and other discrete components. The system was tested and worked perfectly reducing the risk of electrocution and eliminating damage wearing of the contacts common with contactors and relays.

  7. Low Cost Writeable RFID Tag With MRAM Memory

    National Research Council Canada - National Science Library

    Beech, Russell

    1998-01-01

    This program's goal was to develop a writeable RFID tag using an integrated, permeable core coil as the inductor/antenna for communication and power transfer and MRAM as the low write energy, nonvolatile memory...

  8. A study of RFID application impacts on medical safety.

    Science.gov (United States)

    Chang, She-I; Ou, Chin-Shyh; Ku, Cheng-Yuan; Yang, Morris

    2008-01-01

    With the international reform in medical management systems gaining ground worldwide, hospital management has gradually begun to shift its focus from providing expensive medical treatment to improving medical service quality and patient safety. In this study, we discuss the application of Radio Frequency Identification (RFID) and data integrating technology with the medical service, and examine whether or not this technology can enhance medical safety. We also discuss the possible benefits following the application of the RFID system. The findings show that the application of RFID to hospitals can actually generate benefits, which can be further divided into operational structure benefits, users' structure benefits, and organisational and environmental benefits. However, not all these benefits can achieve medical safety. Among them, only the operator and environmental benefits can play such roles. Nevertheless, the application of RFID can bring hospitals towards the integration of technology benefits and improved medical safety.

  9. The design and simulation of UHF RFID microstrip antenna

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Liu, Liping; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Renheng, Xu

    2018-02-01

    At present, China has delineated UHF RFID communicating frequency range which is 840 ∼ 845 MHz and 920 ∼ 925 MHz, but most UHF microstrip antenna don’t carry out this standard, that leads to radio frequency pollution. In order to solve the problems above, a method combining theory and simulation is adopted. Combining with a new ceramic material, a 925.5 MHz RFID microstrip antenna is designed, which is optimized and simulated by HFSS software. The results show that the VSWR of this RFID microstrip antenna is relatively small in the vicinity of 922.5 MHz, the gain is 2.1 dBi, which can be widely used in China’s UHF RFID communicating equipments.

  10. RFID Supply Chain Management System for Naval Logistics

    National Research Council Canada - National Science Library

    McCredie, Alexander

    2005-01-01

    ...) embodied in the structure of a Dynamic Smart Box (DSB). A middle-ware called Inteliware interfaces with the RFID components and computers in the DSB and inputs the requisite data into the Dynamic Smart Manifest...

  11. Investigation of RFID Based Sensors for Sustainable Transportation Applications

    Science.gov (United States)

    2011-01-21

    Through support of a University Transportation Research Center Faculty Development Minigrant an investigation was made into the use of RFID based sensing technologies for transportation purposes. Transportation applications would potentially include ...

  12. A Graph Summarization Algorithm Based on RFID Logistics

    Science.gov (United States)

    Sun, Yan; Hu, Kongfa; Lu, Zhipeng; Zhao, Li; Chen, Ling

    Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will generate a complete history of all the individual locations that it occupied at every point in time. The movement trails of such RFID data form gigantic commodity flowgraph representing the locations and durations of the path stages traversed by each item. In this paper, we use graph to construct a warehouse of RFID commodity flows, and introduce a database-style operation to summarize graphs, which produces a summary graph by grouping nodes based on user-selected node attributes, further allows users to control the hierarchy of summaries. It can cut down the size of graphs, and provide convenience for users to study just on the shrunk graph which they interested. Through extensive experiments, we demonstrate the effectiveness and efficiency of the proposed method.

  13. Securing the Use of RFID-Enabled Banknotes

    Science.gov (United States)

    Martínez, Santi; Roig, Concepció; Valls, Magda

    The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.

  14. A Secure RFID Authentication Protocol Adopting Error Correction Code

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2014-01-01

    Full Text Available RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  15. A secure RFID authentication protocol adopting error correction code.

    Science.gov (United States)

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  16. Privacy implications of RFID: An assessment of threats and opportunites

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2008-01-01

    European citizens consider Radio Frequency Identification (RFID) to be the most intrusive technology of the past two decades. Safeguarding privacy requires specific action that needs attention of all parties involved. European citizens consider legal instruments to offer insufficient guarantees for

  17. Tracking the social dimensions of RFID systems in hospitals.

    Science.gov (United States)

    Fisher, Jill A; Monahan, Torin

    2008-03-01

    Radio frequency identification (RFID) is an emerging technology that is rapidly becoming the standard for hospitals to track inventory, identify patients, and manage personnel. Research involved qualitative methods including participant observation and interviews with hospital staff members and industry consultants in the United States. Hospital staff, especially nurses, expressed concern about the surveillance potential of these tracking technologies. Additionally, nursing staff frequently experience an intensification of labor as a result of the implementation of RFID systems because the task of keeping the systems operational often falls upon them. The social and organizational factors that contribute to the success or failure of RFID systems in hospitals must be further analyzed. The implications of RFID systems, such as privacy concerns and work intensification for nursing and other hospital staff, should be taken into account from the outset, especially during the design and implementation of the technology.

  18. Keeping track. Barcodes and RFID tags make inroads in hospitals.

    Science.gov (United States)

    Degaspari, John

    2011-03-01

    Barcodes are a proven technology for reducing medication administration errors, while RFID tags show promise for tracking of assets as well as personnel and patients. Yet implementation has been slow, as hospitals struggle with cost and complexity issues.

  19. AN OVERVIEW OF ETHICAL CONSIDERATIONS WHEN USING RFID WITH CONSUMERS

    Directory of Open Access Journals (Sweden)

    Harold Boeck

    2014-12-01

    Full Text Available RFID has recently garnered significant interest in the area of customer relationship management by tagging consumers wirelessly and automatically identifying them at a distance. Through a descriptive meta-analysis, this article provides results that indicate that the use of RFID technology in consumer applications raises relatively important ethical and moral concerns, particularly in terms of privacy. The results of our descriptive meta-analysis reveal little empirical research and therefore highlight the need to deepen our knowledge on the ethical considerations brought forth from using RFID. The most important ethical considerations were in terms of privacy, which includes capturing shopping habits, consumer demographic information, and tracking of a person's movements. Literature emphasized technological solutions to counter RFID ethical issues, leaving industry normative procedures and regulatory frameworks in the background.

  20. Neutron physics

    International Nuclear Information System (INIS)

    Beckurts, K.H.; Wirtz, K.

    1974-01-01

    This textbook consists of four sections which deal with the following subjects: 1. Production of neutrons and their interactions with the nuclei; neutron sources; neutron detectors; cross-section measurements. 2. Theory of neutron interactions with macroscopic media; neutron slowing down; space distribution of moderated neutrons; neutron thermalization; neutron scattering. 3. Radioactive probe measurements of thermal neutron fluxes; activation by means of epithermal neutrons; threshold detectors of fast neutrons; neutron calibration. 4. Neutron energy; slowing down kernels; neutron age; diffusion length and absorption of neutrons

  1. A Hybrid Collision Resolution Protocol for Passive RFID Tag Identification

    OpenAIRE

    Xin-qing, Yan; Zhou-ping, Yin; You-lun, Xiong

    2009-01-01

    Wireless communication channel collision of RFID system is a key issue that affects the pervasive application of the system, especially for passive RFID system due to the constrained communication ability and energy supply of tags. The collision resolution protocols suggested can be categorized into deterministic tree based protocols and probabilistic frame slot ALOHA based protocols. A hybrid protocol, which combines the query tree protocol and dynamic framed slotted ALOHA protocol, is prese...

  2. The role of RFID in agriculture: Applications, limitations and challenges

    OpenAIRE

    Ruiz García, Luis; Lunadei, Loredana

    2011-01-01

    The recent advances in RFID offer vast opportunities for research, development and innovation in agriculture. The aim of this paper is to give readers a comprehensive view of current applications and new possibilities, but also explain the limitations and challenges of this technology. RFID has been used for years in animal identification and tracking, being a common practice in many farms. Also it has been used in the food chain for traceability control. The implementation of sen...

  3. Mining Risk Factors in RFID Baggage Tracking Data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Calders, Toon; Pedersen, Torben Bach

    2015-01-01

    and frustration to the passengers. To remedy these problems we propose a detailed methodology for mining risk factors from Radio Frequency Identification (RFID) baggage tracking data. The factors should identify potential issues in the baggage management. However, the baggage tracking data are low level...... experimental study with real RFID baggage tracking data and it shows that the proposed methodology results in a strong classifier, and can find interesting concrete patterns and reveal useful insights of the data....

  4. Aspects for the Utilisation of Radio Frecquency Identification RFID

    Directory of Open Access Journals (Sweden)

    Ionut Balan

    2007-01-01

    Full Text Available The project presents some aspects about theutilisation of the RFID technology, the latest objectidentification technology and data collection practice. Hereare presented the advantages and the limits of this technologyusage relative to the barcodes, the defined standards for thistechnology and some practicability domains. It is achieved ashort presentation about the mini-computers (a newachievement of IT technology. For the application wepresent a micro-system for good identification, using theRFID technology, and a PDA (mobile computer.

  5. Radio Frequency Identification (RFID): its usage and libraries

    OpenAIRE

    Rafiq, Muhammad

    2004-01-01

    Radio Frequency Identification (RFID) is one of the most exciting technologies that revolutionize the working practices by increasing efficiencies, and improving profitability. The article provides details about RFID, its components, how it works, and its usage in different sectors i.e. retail sales and supply chains, livestock industry, courier services, military and prisons, automobiles and logistics, entertainment industry, publishing industry, wireless transaction, and, especially, in...

  6. Is the RFID technology ready to integrate supplychain activities?

    OpenAIRE

    Chan, Hing Kai; Chan, Felix T.S.

    2008-01-01

    Radio Frequency Identification (RFID) is not a new technology andhas been introduced for military applications for a long time. Nevertheless, ithas been recognised as a device that may soon change the mode of operationsthroughout the supply chain. There is no question that the technology willreduce labour and improve accuracy in inventory management by improvinginventory visibility. However, a review of recent research and the developmentof RFID technology in supply chain related applications...

  7. Processing Uncertain RFID Data in Traceability Supply Chains

    Directory of Open Access Journals (Sweden)

    Dong Xie

    2014-01-01

    Full Text Available Radio Frequency Identification (RFID is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  8. Processing uncertain RFID data in traceability supply chains.

    Science.gov (United States)

    Xie, Dong; Xiao, Jie; Guo, Guangjun; Jiang, Tong

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  9. The Study on Using Passive RFID Tags for Indoor Positioning

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2011-02-01

    Full Text Available Radio frequency identification (RFID is the technology that put an RFID tag on objects or people, so that they can be identified, tracked, and managed automatically. With its wide application in the automobile assembly industry, warehouse management and the supply chain network, RFID has been recognized as the next promising technology in serving the positioning purpose. Existing positioning technologies such as GPS are not available indoors as the terminal cannot get the signal from satellites. To enhance the availability of the positioning systems for indoors, the development of RFID positioning system for locating objects or people have became a hot topic in recent research. Compared with conventional active and high‐cost solutions, this paper studied the feasibility of using passive RFID tags for indoor positioning and object location detection to provide real time information for tracking movement. Results of experiment show that readability of the passive RFID positioning system is satisfactory, and it is a more cost effective solution when compared with other positioning technologies.

  10. Electromagnetic compatibility of implantable neurostimulators to RFID emitters.

    Science.gov (United States)

    Pantchenko, Oxana S; Seidman, Seth J; Guag, Joshua W; Witters, Donald M; Sponberg, Curt L

    2011-06-09

    The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz. The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  11. RFID - based Staff Control System (SCS) in Kazakhstan

    International Nuclear Information System (INIS)

    Saparkhojayev, N

    2015-01-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS. (paper)

  12. A Qualitative Approach to Mobile Robot Navigation Using RFID

    International Nuclear Information System (INIS)

    Hossain, M; Rashid, M M; Bhuiyan, M M I; Ahmed, S; Akhtaruzzaman, M

    2013-01-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot

  13. An Integrated Conceptual Framework for RFID Enabled Healthcare

    Directory of Open Access Journals (Sweden)

    Gaurav Gupta

    2015-12-01

    Full Text Available Radio frequency identification (RFID technology is a wireless communication technology that facilitates automatic identification and data capture without human intervention. Since 2000s, RFID applications in the health care industry are increasing.  RFID has brought many improvements in areas like patient care, patient safety, equipment tracking, resource utilization, processing time reduction and so on. On the other hand, often deployment of RFID is questioned on the issues like high capital investment, technological complexity, and privacy concerns. Exploration of existing literature indicates the presence of works on the topics like asset management, patient management, staff management, institutional advantages, and organizational issues. However, most of the works are focused on a particular issue. Still now, scholarly attempts to integrate all the facades of RFID-enabled healthcare are limited. In this paper, we propose a conceptual framework that represents the scope for implementation of this technology and the various dimensions of RFID-enabled healthcare and demonstrate them in detail. Also, we have discussed the critical issues that can prove to be potential barriers to its successful implementation and current approaches to resolving these. We also discuss some of the regulatory initiatives encouraging its adoption in the healthcare industry. Also, we have highlighted the future research opportunities in this domain.

  14. Designing tangible interaction using short-range RFID

    Directory of Open Access Journals (Sweden)

    Kjetil Nordby

    2010-12-01

    Full Text Available Short-range Radio Frequency IDentification (SR-RFID technology embedded in mobile phones offers interaction design practitioners the potential to design new forms of mobile experiences. The article presents a design oriented research study that seeks to develop affordances specifically in support of such practice. To do so the authors draw on Activity Theory. They present three levels of SR-RFID related design affordances: need related design affordances, instrumental design affordances and operational design affordances. Included also is what they label ‘RFID based Tap and Hold’; a term used so as to frame tangible interaction on SR-RFID. A generative and descriptive model of Tap and Hold is proposed, as is a set of input techniques derived from the Tap and Hold model. Overall, the study suggests opening out from functional views of SR-RFID to ones that view it as a technology applicable for designers exploring potential new interactions. This is important since such work may be used to support the generation of new designs, an area often overlooked in research on RFID.

  15. Analysis of Tobyhanna Army Depot's Radio Frequency Identification (RFID) Pilot Program: RFID as an Asset Management Tool

    National Research Council Canada - National Science Library

    Miertschin, Keith W; Forrest, Brian D

    2005-01-01

    ...) used for inventory and asset management at the Tobyhanna Army Maintenance Depot. Tobyhanna Army Depot recently partnered with WhereNet Corporation for a pilot program to incorporate a real-time locating system that uses RFID...

  16. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  17. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  18. Decommissioning support system, using RFID and USN

    International Nuclear Information System (INIS)

    Cho, W. H.; Park, S. K.; Choi, Y. D.; Lee, K. I.; Moon, J. K.

    2012-01-01

    RFID and USN are key technology in the ubiquitous computing systems. Actual physical environmental information can be used to remote control systems and management using various sensor technology and wireless network. These are used to managing physical distribution systems, complex monitoring environments such as fire detecting and various environments in the field of u-healthcare. Recently, decontamination and dismantling for nuclear plant have increasing interest after Fucushima nuclear accident. In this paper, a decommissioning support system is suggested for an effective management and control of work efficiency and of worker's status. This system makes effective real-time monitoring worker's location, work status and radiation exposure and effective response for worker's safety and emergency situation

  19. Enhanced-Bivium Algorithm for RFID System

    Directory of Open Access Journals (Sweden)

    Shiyong Zhang

    2015-01-01

    Full Text Available RFID (radio frequency identification is an emerging technology for automatic identification of physical objects using radio frequency. The security and privacy of the system is increasingly concerned and some light-weight encryption schemes such as Trivium and Bivium have been proposed. In this paper, the internal structure of Bivium is exploited and generalized to an algorithm called Bivium-Model. It is shown that the original Bivium has its inherent imperfections due to the improper parameter selection. A set of better parameters are given out to fix the security vulnerability of original Bivium. Emulation results also show that the Enhanced-Bivium algorithm achieves lower power consumption and lower die size.

  20. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    OpenAIRE

    Isabel Expósito; Iñigo Cuiñas

    2013-01-01

    The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a...

  1. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chao Chen

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  2. Assessment of RFID Investment in the Military Logistics Systems Through The Life Cycle Cost (LCC) Model

    OpenAIRE

    Ozdemir, Ahmet; Bayrak, Mustafa

    2015-01-01

    Radio Frequency Identification (RFID) is an emerging technology that has been recently used in numerous business and public fields. Most military applications of RFID have focused on logistics systems. Since RFID investment requires high initial cost and its benefits are hard to see in the short term, it needs an appropriate investment decision model. The purpose of this research is to propose a Life Cycle Cost (LCC) model for RFID integration into the Military Logistics System (MLS). The stu...

  3. Assessment of RFID investment in the military logistics systems through the Cost of Ownership Model (COO)

    OpenAIRE

    Ozdemir, Ahmet; Bayrak, Mustafa Ali

    2010-01-01

    MBA Professional Report Radio Frequency Identification (RFID) is an emerging technology that has been recently used in numerous business and public fields. Most military applications of RFID have focused on logistics systems. Since RFID investment requires high initial cost and its benefits are hard to see in the short term, it needs an appropriate investment decision model. The purpose of this research is to propose a Cost of Ownership (COO) model for RFID integration into the Military ...

  4. RFID in the healthcare supply chain: usage and application.

    Science.gov (United States)

    Kumar, Sameer; Swanson, Eric; Tran, Thuy

    2009-01-01

    The purposes of this study are to first, determine the most efficient and cost effective portions of the healthcare supply chain in which radio frequency identification devices (RFID) can be implemented. Second, provide specific examples of RFID implementation and show how these business applications will add to the effectiveness of the healthcare supply chain. And third, to describe the current state of RFID technology and to give practical information for managers in the healthcare sector to make sound decisions about the possible implementation of RFID technology within their organizations. Healthcare industry literature was reviewed and examples of specific instances of RFID implementation were examined using an integrated simulation model developed with Excel, @Risk and Visio software tools. Analysis showed that the cost of implementing current RFID technology is too expensive for broad and sweeping implementation within the healthcare sector at this time. However, several example applications have been identified in which this technology can be effectively leveraged in a cost-effective way. This study shows that RFID technology has come a long way in the recent past and has potential to improve healthcare sector productivity and efficiency. Implementation by large companies such as Wal-mart has helped to make the technology become much more economical in its per unit cost as well as its supporting equipment and training costs. The originality of this study lies in the idea that few practical and pragmatic approaches have been taken within the academic field of study for the implementation of RFID into the healthcare supply chain. Much of the research has focused on specific companies or portions of the supply chain and not the entire supply chain. Also, many of the papers have discussed the future of the supply chain that is heavily dependent on advances in RFID technology. A few viable applications of how RFID technology can be implemented in the healthcare

  5. Circularly Polarized Low-Profile Antenna for Radiating Parallel to Ground Plane for RFID Reader Applications

    Directory of Open Access Journals (Sweden)

    Kittima Lertsakwimarn

    2013-01-01

    Full Text Available This paper presents a low-profile printed antenna with double U-shaped arms radiating circular polarization for the UHF RFID readers. The proposed antenna consists of double U-shaped strip structures and a capacitive feeding line to generate circular polarization. A part of the U-shaped arms is bent by 90° to direct the main beam parallel to the ground plane. From the results, -10 dB |S11| and 3 dB axial ratio of the antenna cover a typical UHF RFID band from 920 MHz to 925 MHz. The bidirectional beam is obtained with the maximum gain of 1.8 dBic in the parallel direction to the ground plane at the 925 MHz. The overall size of the proposed antenna including ground plane is 107 mm × 57 mm × 12.8 mm (0.33λ0 × 0.17λ0 × 0.04λ0.

  6. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Science.gov (United States)

    2010-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  7. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    Science.gov (United States)

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  8. Implications of RFID in Location-Aware Wi-Fi Networks

    Science.gov (United States)

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  9. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Defense Microelectronics Activity (DMEA)

    Science.gov (United States)

    2011-12-01

    23). New York: Springer. 100 Jung, B. M., & Baek, D. H. (2009). Estimating the ROI on implementation of RFID at the ammunition storage warehouse ...ANALYSIS OF RADIO FREQUENCY IDENTIFICATION ( RFID ) IMPLEMENTATION AT THE DEFENSE MICROELECTRONICS ACTIVITY (DMEA) by James B. Gerber December...Identification ( RFID ) Implementation at the Defense Microelectronics Activity (DMEA) 5. FUNDING NUMBERS 6. AUTHOR(S) James B. Gerber 7

  10. RFID tags for cryogenic applications: xxperimental and numerical analysis of thermo-mechanical behaviour

    NARCIS (Netherlands)

    Cauchois, R.; Yin, M.S.; Gouantes, A.; Boddaert, X.

    2013-01-01

    RFID solutions will improve the traceability of biological samples stored at low temperature (77 K) in biobanks. To achieve this goal, the reliability of RFID tags is essential. In this paper, we focus on the reliability aspect of RFID tags in harsh environment and more specifically to assembly

  11. Neutron flux monitor

    International Nuclear Information System (INIS)

    Oda, Naotaka.

    1993-01-01

    The device of the present invention greatly saves an analog processing section such as an analog filter and an analog processing circuit. That is, the device of the present invention comprises (1) a neutron flux detection means for detecting neutron fluxed in the reactor, (2) a digital filter means for dividing signals corresponding to the detected neutron fluxes into predetermined frequency band regions, (3) a calculation processing means for applying a calculation processing corresponding to the frequency band regions to the neutron flux detection signals divided by the digital filter means. With such a constitution, since the neutron detection signals are processed by the digital filter means, the accuracy is improved and the change for the property of the filter is facilitated. Further, when a neutron flux level is obtained, a calculation processing corresponding to the frequency band region can be conducted without the analog processing circuit. Accordingly, maintenance and accuracy are improved by greatly decreasing the number of parts. Further, since problems inherent to the analog circuit are solved, neutron fluxes are monitored at high reliability. (I.S.)

  12. PHASE II VAULT TESTING OF THE ARGONNE RFID SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-06-25

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step

  13. Phase II Vault Testing of the Argonne RFID System

    International Nuclear Information System (INIS)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-01-01

    The U.S. Department of Energy (DOE) (Environmental Management (EM), Office of Packaging and Transportation (EM-45)) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase

  14. Two-Way Communication Using RFID Equipment and Techniques

    Science.gov (United States)

    Jedry, Thomas; Archer, Eric

    2007-01-01

    Equipment and techniques used in radio-frequency identification (RFID) would be extended, according to a proposal, to enable short-range, two-way communication between electronic products and host computers. In one example of a typical contemplated application, the purpose of the short-range radio communication would be to transfer image data from a user s digital still or video camera to the user s computer for recording and/or processing. The concept is also applicable to consumer electronic products other than digital cameras (for example, cellular telephones, portable computers, or motion sensors in alarm systems), and to a variety of industrial and scientific sensors and other devices that generate data. Until now, RFID has been used to exchange small amounts of mostly static information for identifying and tracking assets. Information pertaining to an asset (typically, an object in inventory to be tracked) is contained in miniature electronic circuitry in an RFID tag attached to the object. Conventional RFID equipment and techniques enable a host computer to read data from and, in some cases, to write data to, RFID tags, but they do not enable such additional functions as sending commands to, or retrieving possibly large quantities of dynamic data from, RFID-tagged devices. The proposal would enable such additional functions. The figure schematically depicts an implementation of the proposal for a sensory device (e.g., a digital camera) that includes circuitry that converts sensory information to digital data. In addition to the basic sensory device, there would be a controller and a memory that would store the sensor data and/or data from the controller. The device would also be equipped with a conventional RFID chipset and antenna, which would communicate with a host computer via an RFID reader. The controller would function partly as a communication interface, implementing two-way communication protocols at all levels (including RFID if needed) between the

  15. Precise RFID localization in impaired environment through sparse signal recovery

    Science.gov (United States)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  16. RFID Data Loggers in Fish Supply Chain Traceability

    Directory of Open Access Journals (Sweden)

    Mira Trebar

    2013-01-01

    Full Text Available Radio frequency identification (RFID is an innovative and well-recognized technology that supports all kinds of traceability systems in many areas. It becomes very important in the food industry where the electronic systems are used to capture the data in the supply chain. Additionally, RFID data loggers with sensors are available to perform a cold chain optimization for perishable foods. This paper presents the temperature monitoring solution at the box level in the fish supply chain as part of the traceability system implemented with RFID technology. RFID data loggers are placed inside the box to measure the temperature of the product and on the box for measuring ambient temperature. The results show that the system is very helpful during the phases of storage and transportation of fish to provide the quality control. The sensor data is available immediately at the delivery to be checked on the mobile RFID reader and afterwards stored in the traceability systems database to be presented on a web to stakeholders and private consumers.

  17. Radio Frequency Identification (RFID) technology and patient safety

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors. PMID:24381626

  18. Theory and experiments on Peano and Hilbert curve RFID tags

    Science.gov (United States)

    McVay, John; Hoorfar, Ahmad; Engheta, Nader

    2006-05-01

    Recently, there has been considerable interest in the area of Radio Frequency Identification (RFID) and Radio Frequency Tagging (RFTAG). This emerging area of interest can be applied for inventory control (commercial) as well as friend/foe identification (military) to name but a few. The current technology can be broken down into two main groups, namely passive and active RFID tags. Utilization of Space-Filling Curve (SFC) geometries, such as the Peano and Hilbert curves, has been recently investigated for use in completely passive RFID applications [1, 2]. In this work, we give an overview of our work on the space-filling curves and the potential for utilizing the electrically small, resonant characteristics of these curves for use in RFID technologies with an emphasis on the challenging issues involved when attempting to tag conductive objects. In particular, we investigate the possible use of these tags in conjunction with high impedance ground-planes made of Hilbert or Peano curve inclusions [3, 4] to develop electrically small RFID tags that may also radiate efficiently, within close proximity of large conductive objects [5].

  19. Two RFID-based solutions for secure inpatient medication administration.

    Science.gov (United States)

    Yen, Yi-Chung; Lo, Nai-Wei; Wu, Tzong-Chen

    2012-10-01

    Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using RFID technology, such administration system provides automated medication verification for inpatient's medicine doses and generates corresponding medication evidence, which may be audited later for medical dispute. Recently, Peris-Lopez et al. (Int. J. Med. Inform., 2011) proposed an IS-RFID system to enhance inpatient medication safety. Nevertheless, IS-RFID system does not detect the denial of proof attack efficiently and the generated medication evidence cannot defend against counterfeit evidence generated from the hospital. That is, the hospital possesses enough privilege from the design of IS-RFID system to modify generated medication evidence whenever it is necessary. Hence, we design two lightweight RFID-based solutions for secure inpatient medication administration, one for online verification environment and the other for offline validation situation, to achieve system security on evidence generation and provide early detection on denial of proof attack.

  20. VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Directory of Open Access Journals (Sweden)

    He Xu

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is one of the key technologies of the Internet of Things (IoT and is used in many areas, such as mobile payments, public transportation, smart lock, and environment protection. However, the performance of RFID equipment can be easily affected by the surrounding environment, such as electronic productions and metal appliances. These can impose an impact on the RF signal, which makes the collection of RFID data unreliable. Usually, the unreliability of RFID source data includes three aspects: false negatives, false positives, and dirty data. False negatives are the key problem, as the probability of false positives and dirty data occurrence is relatively small. This paper proposes a novel sliding window cleaning algorithm called VSMURF, which is based on the traditional SMURF algorithm which combines the dynamic change of tags and the value analysis of confidence. Experimental results show that VSMURF algorithm performs better in most conditions and when the tag’s speed is low or high. In particular, if the velocity parameter is set to 2 m/epoch, our proposed VSMURF algorithm performs better than SMURF. The results also show that VSMURF algorithm has better performance than other algorithms in solving the problem of false negatives for RFID networks.

  1. Radio Frequency Identification (RFID technology and patient safety

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2013-01-01

    Full Text Available Background: Radio frequency identification (RFID systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS and electronic health records (EHRs and support it by clinical decision support systems (CDSS, it facilitates processes and reduce medical, medication and diagnosis errors.

  2. Radio Frequency Identification (RFID) technology and patient safety.

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-09-01

    Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors.

  3. Design of Dual Mode RFID Antenna for Inventory Management and IV Fluid Level Warning System

    Directory of Open Access Journals (Sweden)

    Ssu-Han Ting

    2017-01-01

    Full Text Available Radio frequency identification (RFID readers are powered RF devices that communicate with an RFID tag to read necessary information. Using this capability, a dual use system for short distance inventory management and moderate distance automatic warning system for low intravenous (IV fluid levels is designed. The RFID is affixed on the IV drip bag; the fluid in bag affects the antenna transmission distance by fluid dielectric conditions. This allows for two different operational modes (moderate and short distance. For pharmaceutical management, a handheld RFID reader can be used for short distance application. Another stationary RFID system can serve as a warning system for long distance application such as hospital care.

  4. RFID-enabled healthcare applications, issues and benefits: an archival analysis (1997-2011).

    Science.gov (United States)

    Fosso Wamba, Samuel

    2012-12-01

    In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.

  5. Design of housing file box of fire academy based on RFID

    Science.gov (United States)

    Li, Huaiyi

    2018-04-01

    This paper presents a design scheme of intelligent file box based on RFID. The advantages of RFID file box and traditional file box are compared and analyzed, and the feasibility of RFID file box design is analyzed based on the actual situation of our university. After introducing the shape and structure design of the intelligent file box, the paper discusses the working process of the file box, and explains in detail the internal communication principle of the RFID file box and the realization of the control system. The application of the RFID based file box will greatly improve the efficiency of our school's archives management.

  6. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Qingkuan Dong; Jiaqing Tong; Yuan Chen

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  7. Small Size and Low Cost UHF RFID Tag Antenna Mountable on Metallic Objects

    Directory of Open Access Journals (Sweden)

    Sergio López-Soriano

    2015-01-01

    Full Text Available Reducing tag size while maintaining good performance is one of the major challenges in radio-frequency identification applications (RFID, in particular when labeling metallic objects. In this contribution, a small size and low cost tag antenna for identifying metal objects in the European UHF band (865–868 MHz is presented. The antenna consists of a transmission line mounted on an inexpensive thin dielectric which is proximity-coupled to a short-ended patch mounted on FR4 substrate. The overall dimensions of the tag are 33.5 × 30 × 3.1 mm. Experimental results show that, for an EIRP of 3.2 W (European regulations, such a small and cheap tag attains read ranges of about 5 m when attached to a metallic object.

  8. 3.56-bits/cm Compact Inkjet Printed and Application Specific Chipless RFID Tag

    KAUST Repository

    Khan, Munawar M.

    2015-10-26

    © 2002-2011 IEEE. In this letter, a 28.5-bit chipless RFID tag, based on paper substrate and realized using inkjet printing technique is presented. Operating within ultrawideband, the tag occupies a compact size of 2 × 4 cm2. Focusing on applications requiring time and date identification, a novel encoding technique is presented that allows efficient frequency band allocation based on the number of required instances of time and date variables. A figure of merit (FOM) relating coding capacity and tag dimensions coined as code density is also introduced. A systematic design process followed by simulations and verified through measurements reveal a high code density of 3.56 bits/cm2 for the presented chipless tag.

  9. The adoption and implementation of RFID technologies in healthcare: a literature review.

    Science.gov (United States)

    Yao, Wen; Chu, Chao-Hsien; Li, Zang

    2012-12-01

    Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use of RFID in healthcare/hospitals following a formal innovation-decision framework. We aim to identify the common applications, potential benefits, barriers, and critical success factors. Our study facilitates quick assessment and provides guidance for researchers and practitioners in adopting RFID in medical arenas. Many earlier adopters in healthcare found RFID to be functional and useful in such areas as asset tracking and patient identification. Major barriers to adoption include technological limitations, interference concerns, prohibitive costs, lack of global standards and privacy concerns. Better designed RFID systems with low cost and privacy issues addressed are needed to increase acceptance of RFID in healthcare.

  10. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    Science.gov (United States)

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  11. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    Science.gov (United States)

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.

  12. Overview of RFID technology and its applications in the food industry.

    Science.gov (United States)

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.

  13. Miniaturized Blood Pressure Telemetry System with RFID Interface

    Directory of Open Access Journals (Sweden)

    Michele Caldara

    2016-08-01

    Full Text Available This work deals with the development and characterization of a potentially implantable blood pressure telemetry system, based on an active Radio-Frequency IDentification (RFID tag, International Organization for Standardization (ISO 15693 compliant. This approach aims to continuously measure the average, systolic and diastolic blood pressure of the small/medium animals. The measured pressure wave undergoes embedded processing and results are stored onboard in a non-volatile memory, providing the data under interrogation by an external RFID reader. In order to extend battery lifetime, RFID energy harvesting has been investigated. The paper presents the experimental characterization in a laboratory and preliminary in-vivo tests. The device is a prototype mainly intended, in a future engineered version, for monitoring freely moving test animals for pharmaceutical research and drug safety assessment purposes, but it could have multiple uses in environmental and industrial applications.

  14. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  15. RFID Timing Antenna for Open Water Swimming Competitions

    Directory of Open Access Journals (Sweden)

    Helmut Woellik

    2018-03-01

    Full Text Available RFID timing is the common method for processing results in mass sport events. Typically, it is used in running, cycling and triathlon events, but with some modifications even swimming athletes in water can be detected. In open water swimming competitions, the distance between the athletes and the RFID antenna must be larger so that escort boats or small ships can pass the gate without getting into dangerous situations. In this paper a design of an underwater RFID antenna is presented which was used during swimming events, It could span a distance up to 12 m width inside a swimming channel or offshore. The whole construction was completely immerged under the water line. The electronic components were housed in some meter distance on the beach, in a boat or in a buoy. With a reading range up to 1.5 m distance a detection rate between 94.6% and 100% could be achieved.

  16. Passive RFID Localisation Framework in Smart Homes Healthcare Settings.

    Science.gov (United States)

    Alsinglawi, Belal; Liu, Tony; Nguyen, Quang Vinh; Gunawardana, Upul; Maeder, Anthony; Simoff, Simeon

    2016-01-01

    In recent years, Smart Homes have become a solution to benefit impaired individuals and elderly in their daily life settings. In healthcare applications, pervasive technologies have enabled the practicality of personal monitoring using Indoor positioning technologies. Radio-Frequency Identification (RFID) is a promising technology, which is useful for non-invasive tracking of activities of daily living. Many implementations have focused on using battery-enabled tags like in RFID active tags, which require frequent maintenance and they are costly. Other systems can use wearable sensors requiring individuals to wear tags which may be inappropriate for elders. Successful implementations of a tracking system are dependent on multiple considerations beyond the physical performance of the solution, such as affordability and human acceptance. This paper presents a localisation framework using passive RFID sensors. It aims to provide a low cost solution for subject location in Smart Homes healthcare.

  17. Healthcare in Disasters and the Role of RFID.

    Science.gov (United States)

    Madanian, Samaneh; Parry, David; Norris, Tony

    2015-01-01

    Disasters either natural or man-made are inevitable, and therefore disaster management has always been an important function of government. Since during a disaster healthcare is often adversely affected, a lot of effort has been made in terms of researching effective responses and ways of improving the quality of delivered care to direct casualties and the rest of the community. In this regard, information technology plays an important role to help healthcare systems achieve this goal. One of these technologies that has become popular recently is Radio-Frequency Identification (RFID). This paper explores the relationship between emergency management and disaster healthcare and examines the role of RFID. It is suggested that RFID will become an integral part of disaster healthcare and a means of improving response performance.

  18. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  19. Analisis dan Perancangan Aplikasi Inventori Berbasiskan Rfid Pada PT. ABC

    Directory of Open Access Journals (Sweden)

    Herwin Herwin

    2010-12-01

    Full Text Available The purpose of this research is to reduce the damaged material, applying the concept of FIFO for retrieval of row materials, and accelerate the search and also to simplify the detection of raw materials. Software development method used involves three main parts namely the method of analysis, design and literature. Analysis methods including survey of the running system, an analysis of survey findings, identify information needs, identify system requirenments. The design method approach to Unified Modelling Language (UML. The results is an inventory application that uses Radio Frequency Identification (RFID tags as a replacement label where RFID tags can store data. Conslusions from this research is minimizing the company’s financial losses due to storage of raw materials and minimizing time to search raw materials using RFID that also can provide actual and accurate information for the company. 

  20. RFID-tunnistus vaatetuslogistiikassa : L-Fashion Group Oy varastotoiminnot

    OpenAIRE

    Nöjd, Henri

    2015-01-01

    Vaatetusalalta tunnetussa L-Fashion Group Oy:ssä otettiin käyttöön RFID-tekniikka osassa konsernin varastoista. RFID-tunnistusta käytetään varastoprosesseissa, joissa hyötyjä pyritään saamaan tunnistuksen tarkkuudesta ja nopeudesta. Opinnäytetyö syventyy varaston osalta prosesseihin, jotka ovat uuden tekniikan kannalta olennaisimmassa osassa. Työssä tutkitaan RFID:n lisäksi nykyistä viivakooditekniikkaa, johon vertaamalla päästään näkemään tekniikoiden väliset erot sekä hyödyt ja haitat....

  1. Soluţii integrate pentru biblioteci: implementarea sistemului RFID

    Directory of Open Access Journals (Sweden)

    Simona Gheorghe

    2011-01-01

    Full Text Available În prezent, în bibliotecile româneşti este implementată o tehnologie inovatoare, bazată pe identificarea prin frecvenţă radio, altfel spus tehnologia RFID. Această tehnologie a pătruns în multe domenii de activitate atât la noi în ţară, cât şi în străinătate. Biblioteca Centrală a Universităţii “Lucian Blaga” din Sibiu a implementat sistemul din 2008, iar Biblioteca Centrală Universitară “Carol I” din Bucureşti se află în plin proces de implementare a sistemului. Sunt prezentate componentele unui sistem RFID de bibliotecă, ce presupune aplicarea acestui sistem, avantajele şi dezavantajele tehnologiei RFID.

  2. Two RFID-based solutions to enhance inpatient medication safety.

    Science.gov (United States)

    Chien, Hung-Yu; Yang, Chia-Chuan; Wu, Tzong-Chen; Lee, Chin-Feng

    2011-06-01

    Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneously present. Recently, Huang and Ku (J. Med. Syst, 2009) proposed an efficient grouping protocol to enhance medication safety for inpatients based on low-cost tags. However, the Huang-Ku scheme is not secure; an attacker can easily make up fake grouping records to cheat the verifier. This weakness would seriously endanger the safety of inpatient medication safety. This paper will show the weaknesses, and then propose two RFID-based solutions to enhance medication safety for two different scenarios. The proposed schemes are practical, secure and efficient for medication applications.

  3. A new specimen management system using RFID technology.

    Science.gov (United States)

    Shim, Hun; Uh, Young; Lee, Seung Hwan; Yoon, Young Ro

    2011-12-01

    The specimen management system with barcode needs to be improved in order to solve inherent problems in work performance. This study describes the application of Radio Frequency Identification (RFID) which is the solution for the problems associated with specimen labeling and management. A new specimen management system and architecture with RFID technology for clinical laboratory was designed. The suggested system was tested in various conditions such as durability to temperature and aspect of effective utilization of new work flow under a virtual hospital clinical laboratory environment. This system demonstrates its potential application in clinical laboratories for improving work flow and specimen management. The suggested specimen management system with RFID technology has advantages in comparison to the traditional specimen management system with barcode in the aspect of mass specimen processing, robust durability of temperature, humidity changes, and effective specimen tracking.

  4. Control de acceso usando FPGA y RFID

    Directory of Open Access Journals (Sweden)

    Dora Luz Almanza Ojeda

    2012-10-01

    Full Text Available Este trabajo presenta el diseño e implementación de un sistema de control de acceso mediante Identificación por Radiofrecuencia (RFID, Radio Frequency Identification controlado por una Matriz de compuertas programables (FPGA, Field Programmable Gate Array. El sistema está constituido por un par de dispositivos de adquisición de radiofrecuencia, una FPGA, un juego de etiquetas y tarjetas pasivas de identificación. Mediante una interfaz gráfica de usuario es posible controlar todo movimiento dentro de una zona determinada, desde los accesos hasta la disponibilidad de equipo; utilizando los dispositivos de adquisición de radiofrecuencia se puede acceder a la información de los usuarios autorizados, así como al control del equipo. Con este sistema es posible monitorear, administrar y reportar todo acceso de personal, movimiento de equipo o plagio de manera eficiente y evitando un gran número de errores humanos.  

  5. A survey on barcode RFID and NFC

    Science.gov (United States)

    Thanapal, P.; Prabhu, J.; Jakhar, Mridula

    2017-11-01

    Over the recent years, many industries have started implementing new technologies for tracing and tracking their products. These technologies are a kind of blessing to their management system. The technology and management system has to work in parallel to avoid loopholes in the system. We can see so many technologies around us and the most difficult and important part is to choose best out of all these new technologies. The important point which we need to take care while choosing a technology for the system is to make sure the technology can integrate properly with the other parameters in the management system. The industry management system consists of many levels such as initial level, intermediate level, final level and tracking. Nowadays tracking a product from its initial stage is becoming a trend. To cope up with this upcoming trend and also with the company demand, integrating the product with Barcode, RFID tags, NFC tag or any other traceable technology. Many supply chain Management system are also adopting this techniques.

  6. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  7. Control de trazabilidad de fruta mediante un sistema RFID

    OpenAIRE

    Asensio Nácher, Sergi

    2015-01-01

    En este proyecto se ha desarrollado una aplicación para realizar la trazabilidad de la fruta en un almacén utilizando dispositivos de radiofrecuencia RFID. El sistema ha sido desarrollado en C\\# y ha permitido automatizar todo el proceso de control de la fruta en un almacén. In this project, has been developed an application for making the traceability of fruit in a warehause by using radiofrequency systems RFID. The system was developed in C\\# and permits to control de processes of the fr...

  8. Application of metamaterial concepts to sensors and chipless RFID

    Science.gov (United States)

    Martín, F.; Herrojo, C.; Vélez, P.; Su, L.; Mata-Contreras, J.; Paredes, F.

    2018-02-01

    Several strategies for the implementation of microwave sensors based on the use of metamaterial-inspired resonators are pointed out, and examples of applications, including sensors for dielectric characterization and sensors for the measurement of spatial variables, are provided. It will be also shown that novel microwave encoders for chipless RFID systems with very high data capacity can be implemented. The fields of applications of the devices discussed in this talk include dielectric characterization of solids and liquids, angular velocity sensors for space applications, and near-field chipless RFID systems for secure paper applications, among others.

  9. Radio Frequency Identification (RFID) in healthcare: a literature review.

    Science.gov (United States)

    Kolokathi, Aikaterini; Rallis, Panagiotis

    2013-01-01

    Creating and maintaining a safe and high-quality health care environment is of great importance for global community. New technologies and their applications can help us achieve this goal. Radio-Frequency Identification (RIFD) technology is considered one of those technologies and even today there are some interesting deployments in the health industry. As a result, this work aims to present the basic idea behind RFID solutions, problems that can be addressed with the adoption of RFID and the benefits of relative applications.

  10. Research on pipe welding information management system basedon RFID

    Directory of Open Access Journals (Sweden)

    Liu Xun

    2016-01-01

    Full Text Available This paper introduces the construction background, construction target and construction principle of the pipe welding management system based on RFID. Then, describes the specific requirements of the system. The basic principle and key technology of the system are introduced. The structure of the system (including the system design, the selections of handheld devices and high frequency passive RFID tags is described .Then the system management software designs (including software structure, the main functions of the management center system and the main functions of the handheld detection system are described in detail. Finally, the management system is implemented, and it is deployed to several Gas Co, which has chieved good results.

  11. Optimization of the Document Placement in the RFID Cabinet

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study is devoted to the issue of optimization of the document placement in a single RFID cabinet. It has been assumed that the optimization problem means the reduction of archivization time with respect to the information on all documents with RFID tags. Since the explicit form of the criterion function remains unknown, for the purpose of its approximation, the regression analysis method has been used. The method uses data from a computer simulation of the process of archiving data about documents. To solve the optimization problem, the modified gradient projection method has been used.

  12. Design of a Secure RFID Authentication Scheme Preceding Market Transactions

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2011-01-01

    Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

  13. RFID authentication protocol to enhance patient medication safety.

    Science.gov (United States)

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  14. GUI Simulation Platform for RFID Indoor Tracking System

    Directory of Open Access Journals (Sweden)

    Bei-Bei Miao

    2014-07-01

    Full Text Available This paper gives a platform of simulation data for RFID indoor tracking system, i.e., tracking system graphical user interface. The platform contains input and output interface, and the former includes the radius settings, data generation module and the user guide. The corresponding output interface includes system parameters display and the saving image function, etc. The default parameters are also given for the graphical user interface (GUI of the RFID indoor tracking system. The analysis of the user’s use shows that the developed platform is practical and feasible.

  15. Mass measurements on neutron-deficient nuclides at SHIPTRAP and commissioning of a cryogenic narrow-band FT-ICR mass spectrometer

    International Nuclear Information System (INIS)

    Ferrer Garcia, R.

    2007-01-01

    The dissertation presented here deals with high-precision Penning trap mass spectrometry on short-lived radionuclides. Owed to the ability of revealing all nucleonic interactions, mass measurements far off the line of β-stability are expected to bring new insight to the current knowledge of nuclear properties and serve to test the predictive power of mass models and formulas. In nuclear astrophysics, atomic masses are fundamental parameters for the understanding of the synthesis of nuclei in the stellar environments. This thesis presents ten mass values of radionuclides around A=90 interspersed in the predicted rp-process pathway. Six of them have been experimentally determined for the first time. The measurements have been carried out at the Penning-trap mass spectrometer SHIPTRAP using the destructive time-of-flight ion-cyclotron-resonance (TOF-ICR) detection technique. Given the limited performance of the TOF-ICR detection when trying to investigate heavy/superheavy species with small production cross sections (σ <1 μb), a new detection system is found to be necessary. Thus, the second part of this thesis deals with the commissioning of a cryogenic double-Penning trap system for the application of a highly-sensitive, narrow-band Fourier-transform ion-cyclotron-resonance (FT-ICR) detection technique. With the non-destructive FT-ICR detection method a single singly-charged trapped ion will provide the required information to determine its mass. First off-line tests of a new detector system based on a channeltron with an attached conversion dynode, of a cryogenic pumping barrier, to guarantee ultra-high vacuum conditions during mass determination, and of the detection electronics for the required single-ion sensitivity are reported. (orig.)

  16. Mass measurements on neutron-deficient nuclides at SHIPTRAP and commissioning of a cryogenic narrow-band FT-ICR mass spectrometer

    Energy Technology Data Exchange (ETDEWEB)

    Ferrer Garcia, R.

    2007-07-01

    The dissertation presented here deals with high-precision Penning trap mass spectrometry on short-lived radionuclides. Owed to the ability of revealing all nucleonic interactions, mass measurements far off the line of {beta}-stability are expected to bring new insight to the current knowledge of nuclear properties and serve to test the predictive power of mass models and formulas. In nuclear astrophysics, atomic masses are fundamental parameters for the understanding of the synthesis of nuclei in the stellar environments. This thesis presents ten mass values of radionuclides around A=90 interspersed in the predicted rp-process pathway. Six of them have been experimentally determined for the first time. The measurements have been carried out at the Penning-trap mass spectrometer SHIPTRAP using the destructive time-of-flight ion-cyclotron-resonance (TOF-ICR) detection technique. Given the limited performance of the TOF-ICR detection when trying to investigate heavy/superheavy species with small production cross sections ({sigma} <1 {mu}b), a new detection system is found to be necessary. Thus, the second part of this thesis deals with the commissioning of a cryogenic double-Penning trap system for the application of a highly-sensitive, narrow-band Fourier-transform ion-cyclotron-resonance (FT-ICR) detection technique. With the non-destructive FT-ICR detection method a single singly-charged trapped ion will provide the required information to determine its mass. First off-line tests of a new detector system based on a channeltron with an attached conversion dynode, of a cryogenic pumping barrier, to guarantee ultra-high vacuum conditions during mass determination, and of the detection electronics for the required single-ion sensitivity are reported. (orig.)

  17. Traceability System For Agricultural Productsbased on Rfid and Mobile Technology

    Science.gov (United States)

    Sugahara, Koji

    In agriculture, it is required to establish and integrate food traceability systems and risk management systems in order to improve food safety in the entire food chain. The integrated traceability system for agricultural products was developed, based on innovative technology of RFID and mobile computing. In order to identify individual products on the distribution process efficiently,small RFID tags with unique ID and handy RFID readers were applied. On the distribution process, the RFID tags are checked by using the readers, and transit records of the products are stored to the database via wireless LAN.Regarding agricultural production, the recent issues of pesticides misuse affect consumer confidence in food safety. The Navigation System for Appropriate Pesticide Use (Nouyaku-navi) was developed, which is available in the fields by Internet cell-phones. Based on it, agricultural risk management systems have been developed. These systems collaborate with traceability systems and they can be applied for process control and risk management in agriculture.

  18. Two RFID standard-based security protocols for healthcare environments.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  19. Compact Public-Key Implementations for RFID and Sensor Nodes

    Science.gov (United States)

    Batina, Lejla; Sakiyama, Kazuo; Verbauwhede, Ingrid M. R.

    Embedded systems have become extremely important and new applications are taking a larger portion of the market every day. Radio frequency identification (RFID) tags and sensor nodes are recent and challenging examples and they imply very low budgets for the number of gates, power, bandwidth, etc. while they often require security solutions.

  20. Indoor Navigation Design Integrated with Smart Phones and Rfid Devices

    Science.gov (United States)

    Ortakci, Y.; Demiral, E.; Atila, U.; Karas, I. R.

    2015-10-01

    High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification) device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  1. The Value of RFID Technology Enabled Information to Manage Perishables

    NARCIS (Netherlands)

    M.E. Ketzenberg (Michael); J.M. Bloemhof-Ruwaard (Jacqueline)

    2009-01-01

    textabstractWe address the value of RFID technology enabled information to manage perishables in the context of a supplier that sells a random lifetime product subject to stochastic demand and lost sales. The product's lifetime is largely determined by the time and temperature history in the supply

  2. Applicability of RFID in the prognostics of logistic systems

    NARCIS (Netherlands)

    Lopez De La Cruz, A.M.; Veeke, H.P.M.; Lodewijks, G.

    2007-01-01

    The objective of this paper is to investigate the applicability of RFID in prognostic logistics. Starting from a general introduction of prognostic logistics, the system structure, and technical requirements are discussed. Based on this discussion the issues and concerns regarding the applicability

  3. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  4. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    Science.gov (United States)

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  5. Feasibility Study of RFID Technology for Construction Load Tracking

    Science.gov (United States)

    2011-12-31

    RFID technology was proven to be successful in tracking dump trucks from loading plant to a paver location on a highway project. The average roundtrip time was 1 hour and 4 minutes. However, 3% of this data has truck delivery times in excess of 2 hou...

  6. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  7. Interaktion mit RFID Ausleih- und Rückgabeautomaten

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Heyroth, Melanie; Klingbeil, Karin

    2011-01-01

    Der Artikel untersucht mittels Beobachtung die Interaktion zwischen RFID-Ausleih- und Rückgabeautomaten sowie Bibliotheksbenutzern in vier deutschen Bibliotheken. Die Ergebnisse belegen, dass die Interaktion grundsätzlich funktioniert. Die Benutzer zeigten Gelassenheit und Routine im Umgang mit den...

  8. Potential of RFID Systems to Detect Object Orientation

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2011-01-01

    In this paper we present a novel method for estimating the inclination of passive UHF RFID tags, for use in supply chains to monitor the handling of tagged items. Based on observations of the polarization, a Bayesian estimator of the tag inclination is constructed. The Bayesian estimator has been...

  9. Invoering van RFID : De bibliotheekcollectie geïdentificeerd

    NARCIS (Netherlands)

    den Hollander, Frank; Bokdam, Gert Jan

    De nieuwe ontwikkelingen in de Universiteitsbibliotheek volgen elkaar in snel tempo op. Parallel aan de grootscheepse renovatie van het UB-gebouw, wordt bijvoorbeeld ook een nieuw identificatiesysteem voor de collectie ingevoerd, op basis van RFID. Pictogram sprak met Teijo Doornkamp over het

  10. Exploiting phase measurements of EPC Gen2 RFID tags

    NARCIS (Netherlands)

    Huiting, J.; Flisijn, Hubert; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2013-01-01

    This paper presents a 2d localization system for UHF RFID tags. By measuring the phase between the transmitted continuous wave and received backscatter from the tag at different frequencies, it is possible to estimate the distance between the reader and tag. By determining distance estimates to

  11. Perishable inventory management and dynamic pricing using RFID ...

    Indian Academy of Sciences (India)

    Monitoring and control of time-sensitive products can be facilitated by the application of radio frequency identification (RFID) technology, which enables non-contact, real-time data collection and efficient interfacing with the management control system in the supply chain. This paper describes an integrated framework for ...

  12. Multiresonator-Based Chipless RFID Barcode of the Future

    CERN Document Server

    Preradovic, Stevan

    2012-01-01

    This vital new resource offers engineers and researchers a window on important new technology that will supersede the barcode and is destined to change the face of logistics and product data handling. In the last two decades, radio-frequency identification has grown fast, with accelerated take-up of RFID into the mainstream through its adoption by key users such as Wal-Mart, K-Mart and the US Department of Defense. RFID has many potential applications due to its flexibility, capability to operate out of line of sight, and its high data-carrying capacity. Yet despite optimistic projections of a market worth $25 billion by 2018, potential users are concerned about costs and investment returns. Clearly demonstrating the need for a fully printable chipless RFID tag as well as a powerful and efficient reader to assimilate the tag’s data, this book moves on to describe both. Introducing the general concepts in the field including technical data, it then describes how a chipless RFID tag can be made using a planar...

  13. INDOOR NAVIGATION DESIGN INTEGRATED WITH SMART PHONES AND RFID DEVICES

    Directory of Open Access Journals (Sweden)

    Y. Ortakci

    2015-10-01

    Full Text Available High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  14. A Salient Missing Link in RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Anarim Emin

    2011-01-01

    Full Text Available In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless deployments of "secure" RFID authentication protocols are not exceptions and subject to side channel attacks. Focusing on lightweight RFID security protocols; we examine the server responses for several RFID tags and realize that if the database querying is performed through a static process, the RFID system is subject to timing attacks that could easily jeopardize the system's untraceability criteria. We demonstrate our attack on some well-known protocols and outline a countermeasure by precisely describing the database query mechanism. Furthermore, we analyze the success probability of the attack in terms of the system parameters such as the number of tags, number of cryptographic operations that have to be carried out, and server's computational power.

  15. Designated Attribute-Based Proofs for RFID Applications

    NARCIS (Netherlands)

    Alpár, G.; Batina, L.; Lueks, W.

    2013-01-01

    Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures

  16. A Sensing Platform For A UHF RFID System

    Directory of Open Access Journals (Sweden)

    Young Ho Lee

    2017-02-01

    Full Text Available As the read range of passive UHF RFID broadens up to 11 meters compared to 1-meter range of HF RFID passive tags have been used for many applications such as tracking medical devices and objects of daily living. The RF communication link between the reader antenna and tags for indoors exhibits intermittent loss of signal reception due to antenna orientation mismatch and breakpoints within the antenna coverage area. We propose a design of a sensing platform for tracking objects using a UHF RFID system with passive tags that provides continuous signal reception over the coverage area. We first investigated causes of power loss for passive tags and then designed a sensing platform solution using antenna diversity. The causes of tags power loss were eliminated with angle and spatial diversity methods that can cover an arbitrary area of interest. We implemented this design in an indoor setting of a trauma resuscitation room and evaluated it by experimental measurement of signal strength at different points and angles in the area of interest. Our sensing platform supported complete coverage and uninterrupted interrogation of tags as they moved in the area of interest. We conclude that this sensing platform will be suitable for uninterrupted object tracking with UHF RFID technology in generic indoor spaces.

  17. Students Attendance Management System Based On RFID And Fingerprint Reader

    Directory of Open Access Journals (Sweden)

    Moth Moth Myint Thein

    2015-07-01

    Full Text Available Abstract Today students class attendance is become more important part for any organizationsinstitutions. The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure hence inefficient. This paper presents the manual students attendance management into computerized system for convenience or data reliability. So the system is developed by the integration of ubiquitous computing systems into classroom for managing the students attendance using RFID and fingerprint reader. The system is designed to implement an attendance management system based on RFID and fingerprint reader which students need to use their student identification card ID and their finger ID to success the attendance where only authentic student can be recorded the attendance during the class. In this system passive RFID tag and reader pairs are used to register the student ID cards individually and fingerprint reader is used for attendance. This system takes attendance electronically with the help of the RFID and finger print device and the records of the attendance are stored in a database. Students roll call percentages and their details are easily seenvia Graphical User Interface GUI. This system will have the required databases for students attendance teachers subjects and students details. This application is implemented by Microsoft Visual Studio and Microsoft SQL Server as IDE. C language is used to implement this system.

  18. Intellectual Production Supervision Perform based on RFID Smart Electricity Meter

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    This topic develops the RFID intelligent electricity meter production supervision project management system. The system is designed for energy meter production supervision in the management of the project schedule, quality and cost information management requirements in RFID intelligent power, and provide quantitative information more comprehensive, timely and accurate for supervision engineer and project manager management decisions, and to provide technical information for the product manufacturing stage file. From the angle of scheme analysis, design, implementation and test, the system development of production supervision project management system for RFID smart meter project is discussed. Focus on the development of the system, combined with the main business application and management mode at this stage, focuses on the energy meter to monitor progress information, quality information and cost based information on RFID intelligent power management function. The paper introduces the design scheme of the system, the overall client / server architecture, client oriented graphical user interface universal, complete the supervision of project management and interactive transaction information display, the server system of realizing the main program. The system is programmed with C# language and.NET operating environment, and the client and server platforms use Windows operating system, and the database server software uses Oracle. The overall platform supports mainstream information and standards and has good scalability.

  19. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    Science.gov (United States)

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  20. Development of the RFID System for nuclear materials management

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.; Liu, Y.Y.

    2008-01-01

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclear materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field

  1. A Model of Traceability for Equipments Using RFID Tehnologies within an Integrated System

    Directory of Open Access Journals (Sweden)

    Radu LIXANDROIU

    2006-01-01

    Full Text Available Radio Frequency Identification (RFID is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tagss or transponders. An advanced automatic identification technology such as the Auto-ID system based on the Radio Frequency Identification (RFID technology has two values for inventory systems. First, the visibility provided by this technology allows an accurate knowledge on the inventory level by eliminating the discrepancy between inventory record and physical inventory. Second, the RFID technology can prevent or reduce the sources of errors. Benefits of using RFID include the reduction of labor costs, the simplification of business processes and the reduction of inventory inaccuracies. Also, RFID technology allows an knowledge on the traceability of equipments in a organization.

  2. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  3. Comparison of RFID systems for tracking clinical interventions at the bedside.

    Science.gov (United States)

    Ohashi, Kumiko; Ota, Sakiko; Ohno-Machado, Lucila; Tanaka, Hiroshi

    2008-11-06

    In recent years, there have been high expectations for RFID technologies applied in the medical field, particularly for automatic identification and location of patients and medical supplies. However, few studies have measured the applicability of currently available RFID technologies in a medical environment. To determine the technical factors that affect the performance of RFID systems, we examined the performance of different types of tags for medications, medical equipment, nurses, and patients under different experimental conditions. Three kinds of passive RFID tags and one active RFID tag were used in our study. Passive tags were affected by materials such as liquid and metal. Tags based on 13.56MHz were most suited for identifying medications. Tag placement was one of the main factors involved in correct identification of nurses, patients, and medical equipment. The results of this study may help decision makers decide whether (which) RFID technologies are useful for tracking clinical workflow.

  4. Neutron flux monitoring device

    International Nuclear Information System (INIS)

    Shimazu, Yoichiro.

    1995-01-01

    In a neutron flux monitoring device, there are disposed a neutron flux measuring means for outputting signals in accordance with the intensity of neutron fluxes, a calculation means for calculating a self power density spectrum at a frequency band suitable to an object to be measured based on the output of the neutron flux measuring means, an alarm set value generation means for outputting an alarm set value as a comparative reference, and an alarm judging means for comparing the alarm set value with the outputted value of the calculation means to judge requirement of generating an alarm and generate an alarm in accordance with the result of the judgement. Namely, the time-series of neutron flux signals is put to fourier transformation for a predetermined period of time by the calculation means, and from each of square sums for real number component and imaginary number component for each of the frequencies, a self power density spectrum in the frequency band suitable to the object to be measured is calculated. Then, when the set reference value is exceeded, an alarm is generated. This can reliably prevent generation of erroneous alarm due to neutron flux noises and can accurately generate an alarm at an appropriate time. (N.H.)

  5. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    OpenAIRE

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    2009-01-01

    International audience; GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal fo...

  6. A Study on Watt-hour Meter Data Acquisition Method Based on RFID Technology

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    Considering that traditional watt-hour meter data acquisition was subjected to the influence of distance and occlusion, a watt-hour meter data acquisition method based on RFID technology was proposed in this paper. In detail, RFID electronic tag was embedded in the watt-hour meter to identify the meter and record electric energy information, which made RFID based wireless data acquisition for watt-hour meter come true. Eventually, overall lifecycle management of watt-hour meter is realized.

  7. ECRI audio conference focuses on RFID: the possible benefits are significant, but proceed slowly.

    Science.gov (United States)

    2005-07-01

    This article highlights key points raised during ECRI's May 18, 2005, audio conference, "Radio-Frequency Identification (RFID) for Tracking Medical Devices: Planning for Today and Tomorrow." The conference gave attendees the opportunity to hear the experiences of two healthcare professionals managing RFID pilot programs at healthcare facilities. Information on ordering a recording of the event, including presentation materials and our recent Health Devices article on RFID, is provided at the end of this article.

  8. Roadmap for RFID Implementation in Central library, PEC University of Technology

    OpenAIRE

    Vasishta, Seema

    2009-01-01

    This paper gives brief idea about the emerging Radio Frequency Identification (RFID) technology, its importance in the library management system and its working. It also describes about the basic and optional components required for smooth working of the exercise. The aim is to consider how to extend RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. The article also illustrates a vivid picture about how RFID technology is acting...

  9. RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis

    Science.gov (United States)

    Zhang, Min; Li, Peichong

    Agri-food supply chain management (SCM), a management method to optimize internal costs and productivities, has evolved as an application of e-business technologies. These days, RFID has been widely used in many fields. In this paper, we analyze the characteristics of agri-food supply chain. Then the disadvantages of RFID are discussed. After that, we study the application strategies of RFID based on benefit and safety degree.

  10. Engineering e deployment of an RFID pilot in the apparel supply chain

    OpenAIRE

    Tizzi, Massimo

    2011-01-01

    Il progetto descritto nel presente lavoro di tesi nasce dagli studi iniziati nel 2008 presso il centro di ricerca RFID Lab dell’Università degli Studi di Parma riguardanti l’uso della tecnologia RFID nel settore dell’abbigliamento. I risultati ottenuti hanno fornito ai membri del Board of Advisors Fashion, composta da diverse aziende del settore, di conoscere i benefici e le problematiche insite nell’implementazione di un sistema RFID applicato alla Supply Chain dell’abbigliamento, ottenendo ...

  11. A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash

    OpenAIRE

    Mujahid, Umar; Najam-ul-Islam, M.; Jafri, Atif Raza; Qurat-ul-Ain; Ali Shami, M.

    2016-01-01

    RFID is one of the most prominent identification schemes in the field of pervasive systems. Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs...

  12. Self Circulation using RFID Technology with KOHA Software at St. Xavier’s College, Kolkata.

    OpenAIRE

    Chattopadhyay, Sougata; Savarimuthu, Xavier

    2017-01-01

    St. Xavier’s College Central Library has installed Radio Frequency IDentification (RFID) technology based kiosk for self circulation through open source library management software KOHA. This technology is also improved library annual stock taking, ensure foolproof security and access control i.e. circulation management. This articles briefly describes why our library switch over from barcode based circulation to RFID based circulation, SWOT analysis of RFID technology, self-circulation using...

  13. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    Directory of Open Access Journals (Sweden)

    Isabel Expósito

    2013-01-01

    Full Text Available The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a winery, a brewery, or any other beverage factory.

  14. Justification of RFID Implementation. A Case Study of White Goods Manufacturer

    Directory of Open Access Journals (Sweden)

    Gladysz Bartlomiej

    2017-12-01

    Full Text Available Radio Frequency Identification (RFID is a rapidly emerging technology with a wide range of impact and still not fully exploited potential applications. The impact of RFID is not limited to the area of its direct application. There are many possible benefits to be gained from RFID application, but it must be preceded with careful analysis as its implementation is not always reasonable. A new method for an assessment of RFID technology was presented and explained on the case of a white goods manufacturer. There was a lack of such a method allowing for relatively quick and flexible assessment, which is important for decision makers, who do not want to become involved in very sophisticated and time-consuming analysis at the early stage of decision making. The method supports early phases of decision making related to RFID implementation. Conclusions derived from the analysis of the case study confirmed that the method applied allows for rationalizing decision making and answers whether RFID could generate strategic advantage, in which area RFID should be applied, how RFID-supported processes will be executed and what benefits would be expected. previous papers focused only on answering specific questions from the above list, without showing a holistic approach. the approach to answer questions about execution of processes and benefits was not considered earlier at all. The paper illustrates details of using a new method of an assessment of RFID technology (ART using a real industrial example.

  15. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Directory of Open Access Journals (Sweden)

    Herman Vermaak

    2012-03-01

    Full Text Available Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach.

  16. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Science.gov (United States)

    Massawe, Libe Valentine; Kinyua, Johnson D. M.; Vermaak, Herman

    2012-01-01

    Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach. PMID:22666027

  17. RFID of next generation network for enhancing customer relationship management in healthcare industries.

    Science.gov (United States)

    Alzahrani, Ahmed; Qureshi, Muhammad Shuaib; Thayananthan, Vijey

    2017-10-23

    This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in healthcare industries. Customer relationship and its management techniques in a specific healthcare industry are considered in this development. The key objective of using NGN-RFID scheme is to enhance the handling of patients' data to improve the CRM efficiency in healthcare industries. The proposed NGN-RFID system is one of the valid points to improve the ability of CRM by analyzing different prior and current traditional approaches. The legacy of customer relationship management will be improved by using this modern NGN-RFID technology without affecting the novelty.

  18. Design of a Child Localization System on RFID and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chao Chen

    2010-01-01

    Full Text Available Radio Frequency Identification (RFID and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate children within a certain range near some landmarks in the park. The design experience in this project can be exported to other applications such as object tracking and surveillance.

  19. ECC-based grouping-proof RFID for inpatient medication safety.

    Science.gov (United States)

    Lin, Qiping; Zhang, Fangguo

    2012-12-01

    Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.

  20. Array processing for RFID tag localization exploiting multi-frequency signals

    Science.gov (United States)

    Zhang, Yimin; Li, Xin; Amin, Moeness G.

    2009-05-01

    RFID is an increasingly valuable business and technology tool for electronically identifying, locating, and tracking products, assets, and personnel. As a result, precise positioning and tracking of RFID tags and readers have received considerable attention from both academic and industrial communities. Finding the position of RFID tags is considered an important task in various real-time locating systems (RTLS). As such, numerous RFID localization products have been developed for various applications. The majority of RFID positioning systems is based on the fusion of pieces of relevant information, such as the range and the direction-of-arrival (DOA). For example, trilateration can determine the tag position by using the range information of the tag estimated from three or more spatially separated reader antennas. Triangulation is another method to locate RFID tags that use the direction-of-arrival (DOA) information estimated at multiple spatially separated locations. The RFID tag positions can also be determined through hybrid techniques that combine the range and DOA information. The focus of this paper to study the design and performance of the localization of passive RFID tags using array processing techniques in a multipath environment, and exploiting multi-frequency CW signals. The latter are used to decorrelate the coherent multipath signals for effective DOA estimation and for the purpose of accurate range estimation. Accordingly, the spatial and frequency dimensionalities are fully utilized for robust and accurate positioning of RFID tags.

  1. Properties and Printability of Inkjet and Screen-Printed Silver Patterns for RFID Antennas

    Science.gov (United States)

    Salmerón, José F.; Molina-Lopez, Francisco; Briand, Danick; Ruan, Jason J.; Rivadeneyra, Almudena; Carvajal, Miguel A.; Capitán-Vallvey, L. F.; de Rooij, Nico F.; Palma, Alberto J.

    2014-02-01

    We report the modeling, and geometrical and electrical characterization, of inkjet and screen-printed patterns on different polymeric substrates for use as antennas in radio-frequency identification (RFID) applications. We compared the physical and electrical characteristics of two silver nanoparticle-based commercial inkjet-printable inks and one screen-printable silver paste, when deposited on polyimide (PI), polyethylene terephthalate (PET), and polyetherimide (PEI) substrates. First, the thickness of the inkjet-printed patterns was predicted by use of an analytical model based on printing conditions and ink composition. The predicted thickness was confirmed experimentally, and geometrical characterization of the lines was completed by measuring the root-mean-square roughness of the patterns. Second, direct-current electrical characterization was performed to identify the printing conditions yielding the lowest resistivity and sheet resistance. The minimum resistivity for the inkjet-printing method was 8.6 ± 0.8 μΩ cm, obtained by printing four stacked layers of one of the commercial inks on PEI, whereas minimum resistivity of 44 ± 7 μΩ cm and 39 ± 4 μΩ cm were obtained for a single layer of screen-printed ink on polyimide (PI) with 140 threads/cm mesh and 90 threads/cm mesh, respectively. In every case, these minimum values of resistivity were obtained for the largest tested thickness. Coplanar waveguide transmission lines were then designed and characterized to analyze the radio-frequency (RF) performance of the printed patterns; minimum transmission losses of 0.0022 ± 0.0012 dB/mm and 0.0016 ± 0.0012 dB/mm measured at 13.56 MHz, in the high-frequency (HF) band, were achieved by inkjet printing on PEI and screen printing on PI, respectively. At 868 MHz, in the ultra-high-frequency band, the minimum values of transmission loss were 0.0130 ± 0.0014 dB/mm for inkjet printing on PEI and 0.0100 ± 0.0014 dB/mm for screen printing on PI. Although the

  2. Determination of the exposure to electromagnetic fields arising from radiofrequency identification technology (RFID) application. Final report

    International Nuclear Information System (INIS)

    Schmid, Gernot; Ueberbacher, Richard; Cecil, Stefan; Escorihuela-Navarro, Ana; Sainitzer, David; Weinfurter, Andreas

    2012-01-01

    In the frame of this project the extent of personal exposure against electromagnetic fields caused by various types of RFID equipment has been analyzed based on measurements on selected devices and numerical computations considering practically relevant exposure scenarios. The obtained results were assessed according to the ICNIRP guidelines published in 1998. Moreover, numerical computations were carried out in order to estimate disturbance voltages induced at the input of cardiac pacemakers. All relevant frequency bands used by present RFID devices were considered. With respect to RFID transponders it was shown that they do not cause relevant exposure. Exposure figures caused by typical active RFID transponders can be expected several orders of magnitude below the corresponding basic restrictions according to ICNIRP 1998. For the assessment of exposure caused by RFID reader devices a differentiation of device categories and operating frequencies is necessary. Small reader devices or handheld readers with operating ranges less than approximately 10 cm, e.g., for reading from or writing to electronic passports, tickets, etc., are based on inductive coupling at operating frequencies 13,56 MHz and 120 kHz. From the obtained results it can be concluded that these devices cause exposure well below the ICNIRP 1998 basic restrictions. Similarly, also measurement and computational results for inductively coupled RF access control and identification systems (13,56 MHz) with even higher operating ranges up to approximately 80 cm indicate that exposure above the basic restrictions is not to be expected for such devices under usual conditions in practice. In contrast, the obtained results for inductively coupled LF reading devices with operating ranges up to approximately 80 cm (operating frequency 120-125 kHz) showed that induced current densities in the central nervous tissue above the basic restrictions are possible for particular devices if a person approaches the

  3. RFID in the warehouse:a literature analysis (1995-2010) of its applications, benefits, challenges and future trends

    OpenAIRE

    Lim, Ming K.; Bahr, W.; Leung, Stephen C.H.

    2013-01-01

    Radio Frequency Identification (RFID) has been identified as a crucial technology for the modern 21st century knowledge-based economy. Some businesses have realised benefits of RFID adoption through improvements in operational efficiency, additional cost savings, and opportunities for higher revenues. RFID research in warehousing operations has been less prominent than in other application domains. To investigate how RFID technology has had an impact in warehousing, a comprehensive analysis o...

  4. A study on RFID adoption for vehicle tracking in container terminal

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2012-06-01

    Full Text Available Purpose: Numerous studies discuss that Radio Frequency Identification (RFID technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring the movement of vehicle in the container terminal environment. Thus, this study aims at discussing the feasibility of applying RFID for vehicle tracking purpose in a container terminal. Design/methodology/approach: This study makes use of a series of experiments in a container terminal to discuss the factors that affect the use of RFID in the terminal. The possibility and accuracy of using RFID in such challenging environment is also investigated. These propositions are investigated by a case study. Findings: The experimental results indicate that the RFID communication is good at the containers area which occupies nearly all the area in the container terminal. However, in other area such as sea side and free area, the performance is not good and 100% readability only achieved in 5m and 10m in free area and sea side respectively. Originality/value: The container terminal environment, which consists of different transport vehicles for onward transportation, will affect the performance of RFID readability. Poor setup of the RFID reader and tag will lower the feasibility of RFID adoption as well as increase the cost. In order to address the challenges of implementing RFID in the container terminal environment, this paper provides a series of real site testing experiments to study the RFID performance in the container terminal environment. This represents an original contribution of value to future research and practice in the RFID adoptions in container terminal environment.

  5. Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the analysis of Nano RFID (Radio Frequency Identification) systems. We have shown the modeling and simulation and demonstrated some novel ideas and library development for Nano RFID. Multi scale modeling plays a very important role in nanotech enabled devices properties of which cannot be explained sometimes by abstraction level theories. Reliability and packaging still remains one the major hindrances in practical implementation of Nano RFID based devices. And to work on them modeling and simulation will play a very important role. CNTs is the future low power material that will replace CMOS and its integration with CMOS, MEMS circuitry will play an important role in realizing the true power in Nano RFID systems. RFID based on innovations in nanotechnology has been shown. MEMS modeling of Antenna, sensors and its integration in the circuitry has been shown. Thus incorporating this we can design a Nano-RFID which can be used in areas like human implantation and complex banking applications. We have proposed modeling of RFID using the concept of multi scale modeling to accurately predict its properties. Also we give the modeling of MEMS devices that are proposed recently that can see possible application in RFID. We have also covered the applications and the advantages of Nano RFID in various areas. RF MEMS has been matured and its devices are being successfully commercialized but taking it to limits of nano domains and integration with singly chip RFID needs a novel approach which is being proposed. We have modeled MEMS based transponder and shown the distribution for multi scale modeling for Nano RFID.

  6. Quantifying detection performance of a passive low-frequency RFID system in an environmental preference chamber for laying hens

    Science.gov (United States)

    Radio Frequency Identification (RFID) systems have been widely used in production livestock systems for identifying, tracing, and registering animals and improving subsidy management. Adaptations have been made to extend RFID technology to animal behavior and welfare research. An RFID system was imp...

  7. Research on Positioning Algorithm of Forklift-mounted RFID Reader

    Directory of Open Access Journals (Sweden)

    Hongjin Wang

    2014-07-01

    Full Text Available To conduct real-time and accurate positioning of the forklifts (people and goods in the warehouse is an effective means for improving warehouse management efficiency. To this end, this article puts forward the active positioning system with the forklift installed with RFID reader and the ground passageway embedded with RFID tag. In the running process, the position of forklift can be determined through recognition of the reference tags which are embedded at both sides of the passageway based on the three-side layout at right angle principle and their RSSI value. The positional accuracy can be improved by adjusting the layout distance of those reference tags. The experimental results show that this system can realize the positioning function of forklift, and it can be used in practical situations.

  8. Extended-Range Passive RFID and Sensor Tags

    Science.gov (United States)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  9. RFID based TLD monitoring system - a prospective development

    International Nuclear Information System (INIS)

    Jeevanram, S.S.; Pawar, S.T.; Mahule, K.N.; Rath, D.P.

    2008-01-01

    Thermo Luminescence Dosimetry (TLD) is an established method of monitoring the radiation dose received by workers in radiation environments. In Radiometallurgy Laboratory, BARC, the TLD movement inside a nuclear facility is completely carried out by a radiation worker. However, there is a chance that the TLDs may get lost in laboratories or some places without the knowledge of the concerned TLD user or health physicist. It may later lead to a false effective dose. Effort is being done to initiate a RFID based TLD monitoring system so that the use of TLD can be acknowledged through a self operating software which can prevent misuse of the detector. A novel method of improving the administrative control through Radio Frequency Identification (RFID) based monitoring to avoid such inadvertent misplacement of TLD, is in progress. This paper discusses the method and techniques through which administrative control can be exercised to reduce the number of such in explainable exposures. (author)

  10. Development of advanced RFID application system for nuclear power plant

    International Nuclear Information System (INIS)

    Onda, Kimiharu; Wakabayashi, Eisuke; Arai, Ryota; Shigemi, Ryosuke; Muro, Keiro; Yuda, Shinya

    2008-01-01

    In late years there comes to be close request for traceability of the information such as production control, construction and maintenance record and work history of nuclear power plants. On the other hand, the Radio-frequency identification (RFID) technology that can specify a product and personnel by an electric wave has raised the functionality and versatility as the base technology that can support ubiquitous information society around the mass production industry. In such a background, this article described the developed system, which applied the RFID to nuclear power plants in the areas of production control of the piping manufacture, the construction management and condition monitoring for maintenance works in order to improve their quality and reliability. (T. Tanaka)

  11. Applications of Health Management Using Android and RFID

    Directory of Open Access Journals (Sweden)

    Young-Long Chen

    2012-07-01

    Full Text Available Health management has become increasingly important in personal health care in modern life. The system we have designed provides a method to help facilitate health management through an associated smart phone with Radio Frequency Identification (RFID, which is a new type of application. This system consists of medical knowledge and health management. In the application of medical knowledge, we use the human model as well as the operation of RFID to obtain medical knowledge concerning human organs. The two main functions of the health management system are medication reminders and drug identification. The feature of medication reminders allows users to set the time for taking medication so that patients do not miss taking their medication. The feature of drug identification allows the operators to identify the drugs and can let the users know who needs to take drugs. In addition, we have designed a web page that allows users to understand their health status.

  12. USING RFID AND GIS TECHNOLOGIES FOR ADVANCED LUGGAGE TRACKING

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2015-06-01

    Full Text Available By purchasing a plane ticket or a cargo service, the passenger or the customer signs a contract with the airline company. From that moment on the airline company is responsible for all aspects of air travel, including the passenger' luggage (recording, handling to / from the aircraft etc.. Safe transport of passengers' luggage or cargo packages on airlines raises numerous problems for airlines and requires flexible, efficient solutions, appropriate to the specific requirements of each client. Annually millions of luggages get lost in airports around the world. This causes inconvenience to passengers and loss of resources and additional costs for the airlines. The aim of this paper is to examine how RFID(Radio Frequency Identification technology could be useful for advanced shipment tracking (Track and Trace in the airlines industry, by using rewritable passive RFID tags.

  13. An Application of RFID in Monitoring Agricultural Material Products

    Science.gov (United States)

    Du, Jianhui; Li, Peipei; Gao, Wanlin; Wang, Dezhong; Wang, Qing; Zhu, Yilong

    With the development of modern agriculture, more and more agricultural material products are used in it. While how to keep these things safe is a big problem at present, which needs to be paid more attention. This article develops an agricultural material products monitor system based on RFID which gives alarm as soon as possible if there is anything unmoral. Every warehouse exit is equipped with a RFID reader, while each agricultural material product has a tag on them. When passing though, the reader identifies the tag's information and transfer it to the PC, The PC inquiries the database storing all tags' information, and tells which one is not taken out legally by alarming aloud.

  14. Tecnologia RFID e seus benefícios

    Directory of Open Access Journals (Sweden)

    Claudia Boechat Seufitelli

    2010-05-01

    Full Text Available Radio Frequency Identification (RFID - é um sistema de identificação através de indução de ondas eletromagnéticas. Esta tecnologia tem se mostrado útil e promissora, e ao se comparar com código de barras, é mais ágil e flexível. Hoje, pode-se perceber que são muitas as aplicações desse sistema como por exemplo: controle de acesso de pessoas e veículos; controle de processos de fabricação industrial; rastreamento animal; controle de estoque etc. Pesquisas apontam um crescimento substancial no emprego da RFID visto que seu custo está reduzindo, fazendo com que o número de possíveis aplicações aumente.

  15. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  16. Considerations for RFID-Based Indoor Simultaneous Tracking

    Science.gov (United States)

    Papapostolou, Apostolia; Chaouchi, Hakima

    Context-aware applications is not just a vision. Advances in wireless communications and mobile capabilities have revolutionized the way services are brought to users, i.e. adapted to their context. Location is a key attribute of the term context and thus, an accurate location determination system is of paramount importance. RFID (Radio Frequency IDentification) is an emerging technology and recently has been explored for its applicability in location sensing systems. In this paper, we focus on an RFID-based localization approach in an indoor multi-user environment and model its most adverse implicating factors, that is collisions among its main components and interference from indoor characteristics. Extensive simulations are conducted to characterize and evaluate the performance behavior of the proposed scheme in environments with different levels of severity.

  17. RFID-Based Asset Management for Space Habitats

    Science.gov (United States)

    Fink, Patrick W.

    2013-01-01

    Remote habitats are often densely packed - items necessary to sustain life - items necessary to conduct work center dot Inhabitant's time is often quite valuable, if not priceless. Resupply shipments can be infrequent and expensive. Inaccurate inventory knowledge can lead to unnecessary overstocking, which can lead to insufficient work and/or living volume. Not being able to find items when they are needed can present: - safety issues - morale issues. RFID technology has the potential solve a lot of these issues.

  18. Applied Ethics and eHealth: Principles, Identity, and RFID

    Science.gov (United States)

    Whitehouse, Diane; Duquenoy, Penny

    The social and ethical implications of contemporary technologies are becoming an issue of steadily growing importance. This paper offers an overview in terms of identity and the field of ethics, and explores how these apply to eHealth in both theory and practice. The paper selects a specific circumstance in which these ethical issues can be explored. It focuses particularly on radio-frequency identifiers (RFID). It ends by discussing ethical issues more generally, and the practice of ethical consideration.

  19. Implementation and extension of a GNU-Radio RFID reader

    OpenAIRE

    G. Smietanka; S. Brato; M. Freudenberg; J. Götze

    2013-01-01

    The development of a flexible software defined RFID is discused. Commercial reader systems only allow a top level view on the communication and restrict the variation for many transmission parameters. Recently a software reader from the CGran project was proposed which uses the GNU Radio environment in combination with an USRP front end. Because most of the signal processing is done on a common host PC, this reader offers high flexibility, but also has several disadvantages. One ...

  20. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  1. Patient safety through RFID: vulnerabilities in recently proposed grouping protocols.

    Science.gov (United States)

    Wickboldt, Anne-Katrin; Piramuthu, Selwyn

    2012-04-01

    As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.

  2. Radio Frequency Identification (RFID) Based Employee Attendance Management System

    Science.gov (United States)

    Maramis, G. D. P.; Rompas, P. T. D.

    2018-02-01

    Manually recorded attendance of all the employees has produced some problems such as the data accuracy and staff performance efficiency. The objective of this research is to design and develop a software of RFID attendance system which is integrated with database system. This RFID attendance system was developed using several main components such as tags that will be used as a replacement of ID cards and a reader device that will read the information related to the employee attendance. The result of this project is a software of RFID attendance system that is integrated with the database and has a function to store the data or information of every single employee. This system has a maximum reading range of 2 cm with success probability of 1 and requires a minimum interval between readings of 2 seconds in order to achieve an optimal functionality. By using the system, the discipline attitude of the employees and also the performance of the staff will be improved instantly.

  3. Design of the RFID for Storage of Biological Information

    Directory of Open Access Journals (Sweden)

    Sang-Hee Son

    2009-02-01

    Full Text Available Recent advances in RFID (radio frequency identification technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stores vital biological information such as body temperature and blood pressure and heartbeat in accordance with the EPC global Class-1 standard. Biological data is obtained from a sensor technology that is based on resistance deviation-to-pulse width converter. The integrated chip consists of an analog front end, command interpreter, collision avoidance block, data storage, sensors, and interface circuitry. The system is capable of supporting heartbeats in the range of 40~200 beats per a minute and blood pressure 0~300mmHg. The proposed system employs collision free algorithm that supports access to single tag within a multiple tag environment. The approach facilitates intelligent management of patients in hospitals as part of an integrated healthcare management system.

  4. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  5. Interrogation zone determination in HF RFID systems with multiplexed antennas*

    Directory of Open Access Journals (Sweden)

    Jankowski-Mihułowicz Piotr

    2015-09-01

    Full Text Available The operation of an anti-collision RFID system is characterized by the interrogation zone which should be estimated in any direction of 3D space for a group of electronic transponders. The interrogation zone should be as large as possible. However, the many problems in this area are due to the fact that energy can be transferred to transponders only on a limited distance. The greatest flexibility in developing RFID applications and shaping the interrogation zone can be achieved using the system with an antenna multiplexer. Therefore the problem of the interrogation zone determination in HF RFID systems with two orthogonal RWD antennas is presented in the paper. The perceived issues have been effectively dealt with and the solution has been proposed on the basis of the elaborated model. Conducted studies have been used to develop the software tool JankoRFIDmuxHF in the Mathcad environment. The research results are analysed in an example system configuration. The specialized measuring stand has been used for experimental verification of the identification efficiency. The convergence of the measurements and calculations confirms a practical usefulness of the presented concept of interrogation zone determination in anti-collision systems. It also shows the practical utility of the developed model and software tools.

  6. A reliable RFID mutual authentication scheme for healthcare environments.

    Science.gov (United States)

    Wu, Zhen-Yu; Chen, Lichin; Wu, Ju-Chuan

    2013-04-01

    Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments.

  7. A comprehensive RFID solution to enhance inpatient medication safety.

    Science.gov (United States)

    Peris-Lopez, Pedro; Orfila, Agustin; Mitrokotsa, Aikaterini; van der Lubbe, Jan C A

    2011-01-01

    Errors involving medication administration can be costly, both in financial and in human terms. Indeed, there is much potential for errors due to the complexity of the medication administration process. Nurses are often singled out as the only responsible of these errors because they are in charge of drug administration. Nevertheless, the interventions of every actor involved in the process and the system design itself contribute to errors (Wakefield et al. (1998). Proper inpatient medication safety systems can help to reduce such errors in hospitals. In this paper, we review in depth two recent proposals (Chien et al. (2010); Huang and Ku (2009)) that pursue the aforementioned objective. Unfortunately, they fail in their attempt mainly due to their security faults but interesting ideas can be drawn from both. These security faults refer to impersonation and replay attacks that could produce the generation of a forged proof stating that certain medication was administered to an inpatient when it was not. We propose a leading-edge solution to enhance inpatient medication safety based on RFID technology that overcomes these weaknesses. Our solution, named Inpatient Safety RFID system (IS-RFID), takes into account the Information Technology (IT) infrastructure of a hospital and covers every phase of the drug administration process. From a practical perspective, our system can be easily integrated within hospital IT infrastructures, has a moderate cost, is very ease to use and deals with security aspects as a key point. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  8. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  9. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

    Directory of Open Access Journals (Sweden)

    Joon Heo

    2009-06-01

    Full Text Available Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space.

  10. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Science.gov (United States)

    Meng, Zhaozong; Li, Zhen

    2016-12-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC), ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  11. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol

  12. RFID-based vehicle positioning and its applications in connected vehicles.

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-03-04

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  13. High-level managers' considerations for RFID adoption in hospitals: an empirical study in Taiwan.

    Science.gov (United States)

    Lai, Hui-Min; Lin, I-Chun; Tseng, Ling-Tzu

    2014-02-01

    Prior researches have indicated that an appropriate adoption of information technology (IT) can help hospitals significantly improve services and operations. Radio Frequency Identification (RFID) is believed to be the next generation innovation technology for automatic data collection and asset/people tracking. Based on the Technology-Organization-Environment (TOE) framework, this study investigated high-level managers' considerations for RFID adoption in hospitals. This research reviewed literature related IT adoption in business and followed the results of a preliminary survey with 37 practical experts in hospitals to theorize a model for the RFID adoption in hospitals. Through a field survey of 102 hospitals and hypotheses testing, this research identified key factors influencing RFID adoption. Follow-up in-depth interviews with three high-level managers of IS department from three case hospitals respectively also presented an insight into the decision of RFID's adoption. Based on the research findings, cost, ubiquity, compatibility, security and privacy risk, top management support, hospital scale, financial readiness and government policy were concluded to be the key factors influencing RFID adoption in hospitals. For practitioners, this study provided a comprehensive overview of government policies able to promote the technology, while helping the RFID solution providers understand how to reduce the IT barriers in order to enhance hospitals' willingness to adopt RFID.

  14. Interference Helps to Equalize the Read Range and Reduce False Positives of Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    In various applications of RFID systems a reader should reliably get the ID of the tags that are within a bounded proximity region, termed the interrogation zone. This gives rise to two types of errors 1) False Negative Detections (FNDs), when tags within the intended interrogation zone cannot...... interference enables design of well-defined interrogation zones for passive RFID systems....

  15. Fast Capture­-Recapture Approach for Mitigating the Problem of Missing RFID Tags

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Jacobsen, Rasmus; Popovski, Petar

    2012-01-01

    The technology of Radio Frequency IDentification (RFID) enables many applications that rely on passive, battery-less wireless devices. If a RFID reader needs to gather the ID from multiple tags in its range, then it needs to run an anticollision protocol. Due to errors on the wireless link...

  16. Impact of RFID on Retail Value Chain: A Mixed Method Study

    Science.gov (United States)

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  17. Design of a covert RFID tag network for target discovery and target information routing.

    Science.gov (United States)

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  18. Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains

    Science.gov (United States)

    Mo, John P. T.; Li, Xue

    Radio Frequency Identification (RFID) is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight. This creates tremendous opportunities for linking real world objects into a world of "Internet of things". Application of RFID to Fast Moving Consumer Goods sector will introduce billions of RFID tags in the world. Almost everything is tagged for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of processing of RFID events and data. This chapter uses two national demonstrator projects in Australia as case studies to introduce an event managementframework to process high volume RFID data streams in real time and automatically transform physical RFID observations into business-level events. The model handles various temporal event patterns, both simple and complex, with temporal constraints. The model can be implemented in a data management architecture that allows global RFID item tracking and enables fast, large-scale RFID deployment.

  19. A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol

    NARCIS (Netherlands)

    Barrero, D.F.; Hernandez-Castro, J.C.; Peris-Lopez, P.; Camacho, D.; Moreno, M.D.R.

    2012-01-01

    Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously

  20. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    Science.gov (United States)

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  1. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    Science.gov (United States)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  2. Design of a Covert RFID Tag Network for Target Discovery and Target Information Routing

    Directory of Open Access Journals (Sweden)

    Qihe Pan

    2011-09-01

    Full Text Available Radio frequency identification (RFID tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag’s location is saved at command center, which can determine where a RFID tag is located based on each RFID tag’s ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  3. Documentation pckage for the RFID temperature monitoring system (Of Model 9977 packages at NTS).

    Energy Technology Data Exchange (ETDEWEB)

    Chen, K.; Tsai, H.; Decision and Information Sciences

    2009-02-20

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  4. Documentation package for the RFID temperature monitoring system (Model 9977 packages at NTS)

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.

    2009-01-01

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  5. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    Science.gov (United States)

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal food safety traceability using GS1 and RFID. This framework uses RFID tags encoding with EPCglobal tag data standards. Each information server has access tier, business tier and resource tier. These servers are heterogeneous and distributed, providing user access interfaces by SOAP or HTTP protocols. For sharing dynamic data, discovery service and object name service are used to locate dynamic distributed information servers.

  6. Impact of RFID on the Retail Value Chain: An Exploratory Study Using a Mixed Method Approach

    Directory of Open Access Journals (Sweden)

    Mithu Bhattacharya

    2012-12-01

    Full Text Available While several large retailers have mandated RFID deployment across their value chains, the case for RFID adoption in retail still remains uncertain. This paper aims at providing a realistic perspective of the immense potential of RFID, taking adoption drivers, potential benefits, and implementation challenges into account. In this paper, a mixed methodological approach is used that caters to the exploratory nature of the work to quantitatively analyze RFID adoption drivers, benefits, and implementation challenges. First content analysis is applied to analyze academic and trade articles to come up with key issues and concepts. The results from the content analysis acted as input for a Delphi study which is the second methodology. The combined results from the two methods provide deep insights and enhance understanding of important implementation issues related to RFID adoption in the retail sector and also aid in drawing meaningful managerial conclusions.

  7. RFID technology in health environment opportunities and challenges for modern cancer care.

    Science.gov (United States)

    Safdari, Reza; Maserat, Elham; Maserat, Elnaz

    2012-01-01

    Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

  8. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  9. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  10. Experimental Assessment of Orientation Sensing and Constructive Interference in Passive RFID Systems

    DEFF Research Database (Denmark)

    Krigslund, Rasmus

    2012-01-01

    This thesis focus on passive Radio Frequency IDentication (RFID), a tech- nology designed for automated identication of tagged objects. The tags are small passive devices powered by the wireless signal from the reader. Their simple operation thus solely allows them to reply with their unique ID...... when requested by the reader, which is a high power handheld or stationary transceiver. The RFID technology has matured over the past two decades, but still there exist ambiguities regarding the reading, or interrogation, of tags. Due to the passive nature of the tags, they are severely aected...... experience. Moreover, this thesis proposes to use passive RFID tags as orientation sensors. This is an innovative application for RFID technology in itself, but orientation sensing can also help existing RFID applications that relies on the Received Signal Strength (RSS) in the tag reply. Many Ultra High...

  11. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  12. Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong; Chatterjee, Mainak

    2015-03-01

    With the growing use of RFID (Radio Frequency Identification), it is becoming important to devise ways to read RFID tags in real time. Access points (APs) of IEEE 802.11-based wireless Local Area Networks (LANs) are being integrated with RFID networks that can efficiently collect real-time RFID data. Several schemes, such as multipolling methods based on the dynamic search algorithm and random sequencing, have been proposed. However, as the number of RFID readers associated with an AP increases, it becomes difficult for the dynamic search algorithm to derive the multipolling sequence in real time. Though multipolling methods can eliminate the polling overhead, we still need to enhance the performance of the multipolling methods based on random sequencing. To that extent, we propose a real-time cluster-based multipolling sequencing algorithm that drastically eliminates more than 90% of the polling overhead, particularly so when the dynamic search algorithm fails to derive the multipolling sequence in real time.

  13. Impact of radio-frequency identification (RFID) technologies on the hospital supply chain: a literature review.

    Science.gov (United States)

    Coustasse, Alberto; Tomblin, Shane; Slack, Chelsea

    2013-01-01

    Supply costs account for more than one-third of the average operating budget and constitute the second largest expenditure in hospitals. As hospitals have sought to reduce these costs, radio-frequency identification (RFID) technology has emerged as a solution. This study reviews existing literature to gauge the recent and potential impact and direction of the implementation of RFID in the hospital supply chain to determine current benefits and barriers of adoption. Findings show that the application of RFID to medical equipment and supplies tracking has resulted in efficiency increases in hospitals with lower costs and increased service quality. RFID technology can reduce costs, improve patient safety, and improve supply chain management effectiveness by increasing the ability to track and locate equipment, as well as monitoring theft prevention, distribution management, and patient billing. Despite ongoing RFID implementation in the hospital supply chain, barriers to widespread and rapid adoption include significant total expenditures, unclear return on investment, and competition with other strategic imperatives.

  14. A multi-domain trust management model for supporting RFID applications of IoT.

    Science.gov (United States)

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  15. Reflection and photoemission studies of neutron-irradiated graphite

    International Nuclear Information System (INIS)

    Fukutani, Hirohito; Yamada, Akio; Yagi, Kazutoshi; Ooe, Satoshi; Higashiyama, Kazuyuki; Kato, Hiroo; Iwata, Tadao.

    1990-01-01

    Neutron-irradiated graphites were studied by reflectivity and photoemission (UPS, ARUPS, XPS) measurements. The π-band reflectivity peak of graphite, located at 5 eV, changed significantly and a small absorption band ascribed to vacancies produced by neutron bombardment was found to grow around 3 eV. Modification of the valence band by neutron irradiation was studied by ARUPS. The π-valence band shifts to lower binding energy towards the Fermi level and its band width becomes smaller. These results were also confirmed by the optical joint density of states obtained from K-K analysis of the reflectivity. (author)

  16. Measuring the drinking behaviour of individual pigs housed in group using radio frequency identification (RFID).

    Science.gov (United States)

    Maselyne, J; Adriaens, I; Huybrechts, T; De Ketelaere, B; Millet, S; Vangeyte, J; Van Nuffel, A; Saeys, W

    2016-09-01

    Changes in the drinking behaviour of pigs may indicate health, welfare or productivity problems. Automated monitoring and analysis of drinking behaviour could allow problems to be detected, thus improving farm productivity. A high frequency radio frequency identification (HF RFID) system was designed to register the drinking behaviour of individual pigs. HF RFID antennas were placed around four nipple drinkers and connected to a reader via a multiplexer. A total of 55 growing-finishing pigs were fitted with radio frequency identification (RFID) ear tags, one in each ear. RFID-based drinking visits were created from the RFID registrations using a bout criterion and a minimum and maximum duration criterion. The HF RFID system was successfully validated by comparing RFID-based visits with visual observations and flow meter measurements based on visit overlap. Sensitivity was at least 92%, specificity 93%, precision 90% and accuracy 93%. RFID-based drinking duration had a high correlation with observed drinking duration (R 2=0.88) and water usage (R 2=0.71). The number of registrations after applying the visit criteria had an even higher correlation with the same two variables (R 2=0.90 and 0.75, respectively). There was also a correlation between number of RFID visits and number of observed visits (R 2=0.84). The system provides good quality information about the drinking behaviour of individual pigs. As health or other problems affect the pigs' drinking behaviour, analysis of the RFID data could allow problems to be detected and signalled to the farmer. This information can help to improve the productivity and economics of the farm as well as the health and welfare of the pigs.

  17. WiFi RFID demonstration for resource tracking in a statewide disaster drill.

    Science.gov (United States)

    Cole, Stacey L; Siddiqui, Javeed; Harry, David J; Sandrock, Christian E

    2011-01-01

    To investigate the capabilities of Radio Frequency Identification (RFID) tracking of patients and medical equipment during a simulated disaster response scenario. RFID infrastructure was deployed at two small rural hospitals, in one large academic medical center and in two vehicles. Several item types from the mutual aid equipment list were selected for tracking during the demonstration. A central database server was installed at the UC Davis Medical Center (UCDMC) that collected RFID information from all constituent sites. The system was tested during a statewide disaster drill. During the drill, volunteers at UCDMC were selected to locate assets using the traditional method of locating resources and then using the RFID system. This study demonstrated the effectiveness of RFID infrastructure in real-time resource identification and tracking. Volunteers at UCDMC were able to locate assets substantially faster using RFID, demonstrating that real-time geolocation can be substantially more efficient and accurate than traditional manual methods. A mobile, Global Positioning System (GPS)-enabled RFID system was installed in a pediatric ambulance and connected to the central RFID database via secure cellular communication. This system is unique in that it provides for seamless region-wide tracking that adaptively uses and seamlessly integrates both outdoor cellular-based mobile tracking and indoor WiFi-based tracking. RFID tracking can provide a real-time picture of the medical situation across medical facilities and other critical locations, leading to a more coordinated deployment of resources. The RFID system deployed during this study demonstrated the potential to improve the ability to locate and track victims, healthcare professionals, and medical equipment during a region-wide disaster.

  18. A framework for performance and data quality assessment of Radio Frequency IDentification (RFID) systems in health care settings.

    Science.gov (United States)

    van der Togt, Remko; Bakker, Piet J M; Jaspers, Monique W M

    2011-04-01

    RFID offers great opportunities to health care. Nevertheless, prior experiences also show that RFID systems have not been designed and tested in response to the particular needs of health care settings and might introduce new risks. The aim of this study is to present a framework that can be used to assess the performance of RFID systems particularly in health care settings. We developed a framework describing a systematic approach that can be used for assessing the feasibility of using an RFID technology in a particular healthcare setting; more specific for testing the impact of environmental factors on the quality of RFID generated data and vice versa. This framework is based on our own experiences with an RFID pilot implementation in an academic hospital in The Netherlands and a literature review concerning RFID test methods and current insights of RFID implementations in healthcare. The implementation of an RFID system within the blood transfusion chain inside a hospital setting was used as a show case to explain the different phases of the framework. The framework consists of nine phases, including an implementation development plan, RFID and medical equipment interference tests, data accuracy- and data completeness tests to be run in laboratory, simulated field and real field settings. The potential risks that RFID technologies may bring to the healthcare setting should be thoroughly evaluated before they are introduced into a vital environment. The RFID performance assessment framework that we present can act as a reference model to start an RFID development, engineering, implementation and testing plan and more specific, to assess the potential risks of interference and to test the quality of the RFID generated data potentially influenced by physical objects in specific health care environments. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. Passive UHF RFID Tag for Multispectral Assessment

    Directory of Open Access Journals (Sweden)

    Pablo Escobedo

    2016-07-01

    Full Text Available This work presents the design, fabrication, and characterization of a passive printed radiofrequency identification tag in the ultra-high-frequency band with multiple optical sensing capabilities. This tag includes five photodiodes to cover a wide spectral range from near-infrared to visible and ultraviolet spectral regions. The tag antenna and circuit connections have been screen-printed on a flexible polymeric substrate. An ultra-low-power microcontroller-based switch has been included to measure the five magnitudes issuing from the optical sensors, providing a spectral fingerprint of the incident electromagnetic radiation from ultraviolet to infrared, without requiring energy from a battery. The normalization procedure has been designed applying illuminants, and the entire system was tested by measuring cards from a colour chart and sensing fruit ripening.

  20. Design and implementation of a high sensitivity fully integrated passive UHF RFID tag

    International Nuclear Information System (INIS)

    Li Shoucheng; Wang Xin'an; Lin Ke; Shen Jinpeng; Zhang Jinhai

    2014-01-01

    A fully integrated passive UHF RFID tag complying with the ISO18000-6B protocol is presented, which includes an analog front-end, a baseband processor, and an EEPROM memory. To extend the communication range, a high efficiency differential-drive CMOS rectifier is adopted. A novel high performance voltage limiter is used to provide a stable limiting voltage, with a 172 mV voltage variation against temperature variation and process dispersion. The dynamic band-enhancement technique is used in the regulator circuit to improve the regulating capacity. A rail-to-rail hysteresis comparator is adopted to demodulate the signal correctly in any condition. The whole transponder chip is implemented in a 0.18 μm CMOS process, with a die size of 900 × 800 μm 2 . Our measurement results show that the total power consumption of the tag chip is only 6.8 μW, with a sensitivity of −13.5 dBm (semiconductor integrated circuits)

  1. A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Jianfeng Zhang

    2013-05-01

    Full Text Available In modern supply chain management systems, Radio Frequency IDentification (RFID technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance.

  2. Determinants of RFID adoption in Malaysia's healthcare industry: occupational level as a moderator.

    Science.gov (United States)

    Zailani, Suhaiza; Iranmanesh, Mohammad; Nikbin, Davoud; Beng, Jameson Khoo Cheong

    2015-01-01

    With today's highly competitive market in the healthcare industry, Radio Frequency Identification (RFID) is a technology that can be applied by hospitals to improve operational efficiency and to gain a competitive advantage over their competitors. The purpose of this study is to investigate the factors that may effect RFID adoption in Malaysia's healthcare industry. In addition, the moderating role of occupational level was tested. Data was collected from 223 managers as well as healthcare and supporting staffs. This data was analyzed using the partial least squares technique. The results show that perceived ease of use and usefulness, government policy, top management support, and security and privacy concerns have an effect on the intent to adopt RFID in hospitals. There is a wide gap between managers and healthcare staff in terms of the factors that influence RFID adoption. The results of this study will help decision makers as well as managers in the healthcare industry to better understand the determinants of RFID adoption. Additionally, it will assist in the process of RFID adoption, and therefore, spread the usage of RFID technology in more hospitals.

  3. Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic.

    Science.gov (United States)

    Min, Daiki; Yih, Yuehwern

    2011-06-01

    This study is motivated by the observations on the data collected by radio frequency identification (RFID) readers in a pilot study, which was used to investigate the feasibility of implementing an RFID-based monitoring system in an outpatient eye clinic. The raw RFID data collected from RFID readers contain noise and missing reads, which prevent us from determining the tag location. In this paper, fuzzy logic-based algorithms are proposed to interpret the raw RFID data to extract accurate information. The proposed algorithms determine the location of an RFID tag by evaluating its possibility of presence and absence. To evaluate the performance of the proposed algorithms, numerical experiments are conducted using the data observed in the outpatient eye clinic. Experiments results showed that the proposed algorithms outperform existing static smoothing method in terms of minimizing both false positives and false negatives. Furthermore, the proposed algorithms are applied to a set of simulated data to show the robustness of the proposed algorithms at various levels of RFID reader reliability.

  4. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  5. THE APPLICATION OF RFID IN WAREHOUSE PROCESS: CASE STUDY OF CONSUMER PRODUCT MANUFACTURER IN THAILAND

    Directory of Open Access Journals (Sweden)

    Natanaree Sooksaksun

    2014-12-01

    Full Text Available Background: This warehouse has three main problems: poor accuracy of inventory location, long cycle time of receiving process and non-real time empty storage location. Therefore, the objective of this research is to improve the process in the warehouse by applying radio frequency identification (RFID technology. Methods: There are four steps in this research. First of all, the current of the receiving process and the picking process are studied. Second is to give the guideline for RFID application. Third is to implement of RFID system in this warehouse. The last one is to compare the result of the current process and the proposed process. Results and conclusions:  The passive ultra high frequency (UHF RFID is selected for used in this warehouse. The RFID readers are attached on forklift trucks, the warehouse entrance and loading dock area. The system used RFID tags in two forms: one form used to identify pallets and another to indicate the locations of shelves on which pallets are stored. After using RFID system in this warehouse, the results showed that the accuracy of inventory location increased from 78.2% to 100%. The cycle time reduces from 66 minutes to 47 minutes which is down to 28.79%. . Moreover, the empty storage location are known real time. 

  6. Factors affecting RFID adoption in the agricultural product distribution industry: empirical evidence from China.

    Science.gov (United States)

    Shi, Ping; Yan, Bo

    2016-01-01

    We conducted an exploratory investigation of factors influencing the adoption of radio frequency identification (RFID) methods in the agricultural product distribution industry. Through a literature review and field research, and based on the technology-organization-environment (TOE) theoretical framework, this paper analyzes factors influencing RFID adoption in the agricultural product distribution industry in reference to three contexts: technological, organizational, and environmental contexts. An empirical analysis of the TOE framework was conducted by applying structural equation modeling based on actual data from a questionnaire survey on the agricultural product distribution industry in China. The results show that employee resistance and uncertainty are not supported by the model. Technological compatibility, perceived effectiveness, organizational size, upper management support, trust between enterprises, technical knowledge, competitive pressure and support from the Chinese government, which are supported by the model, have significantly positive effects on RFID adoption. Meanwhile, organizational size has the strongest positive effect, while competitive pressure levels have the smallest effect. Technological complexities and costs have significantly negative effects on RFID adoption, with cost being the most significantly negative influencing factor. These research findings will afford enterprises in the agricultural products supply chain with a stronger understanding of the factors that influence RFID adoption in the agricultural product distribution industry. In addition, these findings will help enterprises remain aware of how these factors affect RFID adoption and will thus help enterprises make more accurate and rational decisions by promoting RFID application in the agricultural product distribution industry.

  7. Development of corrosion condition sensing and monitoring system using radio-frequency identification devices (RFID)

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Zheng, W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-05-15

    This study discussed the development of a corrosion sensing and monitoring system for military land vehicles. Radio-frequency identification device (RFID) technology uses radio waves to identify individual masses with RFID tags attached. A corrosion-sensing element was integrated with the RFID technology, which incorporated a galvanic corrosion cell designed to trigger RFID tags. Corrosion severity was then related to the galvanic current. The tag recorded the sensor reading and transmitted the data to an RFID reader. The tags consisted of a microchip and an antenna. A software development kit has also been developed to interface RFID data with existing applications. While it is currently not possible to modify the RFID tags to prevent security risks, further research is being conducted to assemble a data-logger system with corrosion probes to measure humidity, electrical resistance, and linear polarization resistance. Studies will also be conducted to assemble an active tag reader system and investigate potential modifications. 4 refs., 1 fig., 1 appendix.

  8. A Security Mechanism for library management system using low cost RFID tags

    Directory of Open Access Journals (Sweden)

    V. Nagalakshmi

    2007-02-01

    Full Text Available Radio Frequency Identification (RFID systems will become pervasive in our daily lives due to their low cost and easy to use characteristics[1]. This paper presents a methodology of using low cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC and issues the book to the user depending on his identity in the database. If any unauthorized person intends to take the book the RFID reader will immediately respond to that and make sure that it was not issued. If any body tries to remove the tag it can be traced with the help of location device. Keywords: RFID, OPAC, Unauthorized user, tag, Reader.

  9. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  10. Survey of RFID and Its Application to International Ocean/Air Container Tracking

    Science.gov (United States)

    Katayama, Minoru; Nakada, Hiroshi; Hayashi, Hitoshi; Shimizu, Masashi

    “Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Active RFID is more advantageous than passive RFID and enables higher data reading performance over longer distances. This paper surveys active RFID systems, the services they currently promise to provide, technical problems common to these services, and the direction in which research should head in the future. It also reports the results of EPCglobal (EPC: Electronic Product Code) pilot tests conducted on global logistics for tracking ocean/air container transportation using active RFID systems for which we developed several new types of active RFID tags. The test results confirm that our active RFID tags have sufficient capability and low power consumption to well support ocean/air transportation and logistics service.

  11. An RFID-based luggage and passenger tracking system for airport security control applications

    Science.gov (United States)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  12. Target tracking and surveillance by fusing stereo and RFID information

    Science.gov (United States)

    Raza, Rana H.; Stockman, George C.

    2012-06-01

    Ensuring security in high risk areas such as an airport is an important but complex problem. Effectively tracking personnel, containers, and machines is a crucial task. Moreover, security and safety require understanding the interaction of persons and objects. Computer vision (CV) has been a classic tool; however, variable lighting, imaging, and random occlusions present difficulties for real-time surveillance, resulting in erroneous object detection and trajectories. Determining object ID via CV at any instance of time in a crowded area is computationally prohibitive, yet the trajectories of personnel and objects should be known in real time. Radio Frequency Identification (RFID) can be used to reliably identify target objects and can even locate targets at coarse spatial resolution, while CV provides fuzzy features for target ID at finer resolution. Our research demonstrates benefits obtained when most objects are "cooperative" by being RFID tagged. Fusion provides a method to simplify the correspondence problem in 3D space. A surveillance system can query for unique object ID as well as tag ID information, such as target height, texture, shape and color, which can greatly enhance scene analysis. We extend geometry-based tracking so that intermittent information on ID and location can be used in determining a set of trajectories of N targets over T time steps. We show that partial-targetinformation obtained through RFID can reduce computation time (by 99.9% in some cases) and also increase the likelihood of producing correct trajectories. We conclude that real-time decision-making should be possible if the surveillance system can integrate information effectively between the sensor level and activity understanding level.

  13. Setups for in vitro assessment of RFID interference on pacemakers

    International Nuclear Information System (INIS)

    Mattei, E; Censi, F; Delogu, A; Ferrara, A; Calcagnini, G

    2013-01-01

    The aim of this study is to propose setups for in vitro assessment of RFID (radiofrequency identification) interference on pacemakers (PM). The voltage induced at the input stage of the PM by low-frequency (LF) and high-frequency (HF) RFID transmitters has been used to quantify the amount of the interference. A commercial PM was modified in order to measure the voltage at its input stage when exposed to a sinusoidal signal at 125 kHz and 13.56 MHz. At both frequencies, two antennas with different dimensions (diameter = 10 cm and 30 cm, respectively) were used to generate the interfering field, and the induced voltage was measured between the lead tip and the PM case (unipolar voltage), and between the tip and ring electrodes (bipolar voltage). The typical lead configurations adopted in similar studies or proposed by international standards, as well as lead paths closer to actual physiological implants were tested. At 125 kHz, the worst-case condition differs for the two antennas: the 10 cm antenna induced the highest voltage in the two-loop spiral configuration, whereas the 30 cm antenna in the 225 cm 2 loop configuration. At 13.56 MHz, the highest voltage was observed for both the antennas in the 225 cm 2 loop configuration. Bipolar voltages were found to be lower than the unipolar voltages induced in the same configurations, this difference being not as high as one could expect from theoretical considerations. The worst-case scenario, in terms of the induced voltage at the PM input stage, has been identified both for LF and HF readers, and for two sizes of transmitting antennas. These findings may provide the basis for the definition of a standard implant configuration and a lead path to test the EMI effects of LF and HF RFID transmitters on active implantable devices. (paper)

  14. Track star : Merrick's RFID system tracks oilpatch equipment

    International Nuclear Information System (INIS)

    Louie, J.

    2006-01-01

    Designed by Merrick Systems, the new Rig-Hand system uses radio frequency identification (RFID) in conjunction with downhole components to manage both surface and downhole equipment. The Rig-Hand system consists of RFID tags which can either be installed to new pipe or retrofitted to existing components; handheld or fixed RFID tag readers; and, software modules. The tags can be mounted to a wide range of surface and downhole components. The system can be used by rig personnel to scan tags with handheld computers, or can be used by a designated reader for greater automation and efficiency. The software modules have been designed for typical rig, pipeyard and service company users. The system provides essential drillstring information that helps to reduce pipe failures, fishing costs and downtime. Component tracking may also impact on both personnel safety and operational risks, as a recent survey has suggested that 14 per cent of catastrophic drillstring failures are due to pipe fatigue. When drilling deviated wells, operators typically have difficulty tracking which pipe may have become fatigued. It is anticipated that the system will also allow for improved logistics management, as it is currently estimated that 70 per cent of casing returned from the wellsite to a pipe yard goes to rust. The tagged components will also demand a higher resale or salvage value than untagged components with limited traceability. The system has gone through extensive testing, and to date has provided extensive savings in both onshore and offshore rigs. Commercialization is expected by the end of 2006. 1 fig

  15. RFID technology for environmental remediation and radioactive waste management

    International Nuclear Information System (INIS)

    Tsai, Hanchung; Liu, Yung Y.; Shuler, James

    2011-01-01

    An advanced Radio Frequency Identification (RFID) system capable of tracking and monitoring a wide range of materials and components - from fissionable stocks to radioactive wastes - has been developed. The system offers a number of advantages, including enhanced safety, security and safeguards, reduced personnel exposure to radiation, and improved inventory control and cost-effectiveness. Using sensors, RFID tags can monitor the state of health of the tracked items and trigger alarms instantly when the normal ranges are violated. Nonvolatile memories in the tags can store sensor data, event records, as well as a contents manifest. Gamma irradiation tests showed that the tag components possess significant radiation resistance. Long-life batteries and smart management circuitries permit the tags to operate for up to 10 years without battery replacement. The tags have a near universal form factor, i.e., they can fit different package types. The read range is up to >100 m with no line-of-sight required. With careful implementation, even a large-size processing or storage facility with a complex configuration can be monitored with a handful of readers in a network. In transportation, by incorporating Global Positioning System (GPS), satellite/cellular communication technology, and secure Internet, situation awareness is assured continuously. The RFID system, when integrated with Geographic Information System (GIS) technology, can promptly provide content- and event-specific information to first responders and emergency management teams in case of incidents. In stand-alone applications, the monitoring and tracking data are contained within the local computer. With a secure Internet, information can be shared within the complex or even globally in real time. As with the deployment of any new technology, overcoming the cultural resistance is part of the developmental process. With a strong institutional support and multiple successful live demonstrations, the cultural

  16. A Guide Management System Based on RFID and Bluetooth Technology

    Science.gov (United States)

    Li, Han-Sheng; Wang, Jun-Jun

    The most fundamental and important requirement of the tour guide in the tour process is to ensure the safety of tourists. In this paper, a portable guide management system is designed based on RFID technology, the Android software and blue-tooth communication technology. Through this system, the guide can get real-time information if some tourists are l behind, and send text message or dial to those tourists who are l behind immediately. The system reduces the roll-calling time on the tourists, improves the tour guide work efficiency and service quality.

  17. RFID explained a primer on radio frequency identification technologies

    CERN Document Server

    Want, Roy

    2006-01-01

    This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive tags); the focus here is on passive tags. An overview of the principles of the technology divides passive tags into devices that use either near field or far field coupling to communicate with a tag reader. The strengths and weaknesses of the approaches a

  18. Neutron guide

    Science.gov (United States)

    Greene, Geoffrey L.

    1999-01-01

    A neutron guide in which lengths of cylindrical glass tubing have rectangular glass plates properly dimensioned to allow insertion into the cylindrical glass tubing so that a sealed geometrically precise polygonal cross-section is formed in the cylindrical glass tubing. The neutron guide provides easier alignment between adjacent sections than do the neutron guides of the prior art.

  19. Interoperation of an UHF RFID Reader and a TCP/IP Device via Wired and Wireless Links

    Directory of Open Access Journals (Sweden)

    Ik Soo Jin

    2011-11-01

    Full Text Available A main application in radio frequency identification (RFID sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4 interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device.

  20. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  1. XRFID: Design of an XML Based Efficient Middleware for RFID Systems

    Directory of Open Access Journals (Sweden)

    Indrajit Bhattacharya

    2012-11-01

    existing middleware solutions show dramatic degradation in their performance when the number of simultaneously working readers increases. Our proposed solution tries to recover from that situation also. One of the major issues for large scale deployment of RFID systems is the design of a robust and flexible middleware system to interface various applications to the RFID readers. Most of the existing RFID middleware systems are costly, bulky, non‐portable and heavily dependent on the support software. Our work also provides flexibility for easy addition and removal of applications and hardware.

  2. RFID:n käyttö huoltotöiden seuraamisessa

    OpenAIRE

    Penttilä, Annika

    2015-01-01

    RFID on teknologia, joka mahdollistaa esineiden ja henkilöiden tunnistamisen langattomasti. Teknologiaa on käytetty jo vuodesta 1935 asti ja tällä hetkellä sen käyttö on yleistymässä logistiikan ja kaupallisen alan apuvälineenä ja tehostamiskeinona. Tämän työn tarkoitus oli tutustua RFID-teknologiaan ja sen tuomiin etuihin. Työssä verrattiin RFID-teknologiaa samankaltaisiin muihin järjestelmiin. Työssä kerättiin tietoa ja selvitettiin, kuinka huoltoyritys mcare Oy voisi kehittää ja tehost...

  3. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  4. A Data Warehouse Solution for Analyzing RFID-Based Baggage Tracking Data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Pedersen, Torben Bach; Lu, Hua

    2013-01-01

    spatio-temporal Radio Frequency Identification (RFID) baggage tracking data. Analysis of this data can yield interesting results on baggage flow, the causes of baggage mishandling, and the parties responsible for the mishandling(airline, airport, handler,...), which can ultimately lead to improved...... with the appropriate tracking data from the data sources. The presented concepts are generalizable to other types of multi-site indoor tracking systems based on Bluetooth and RFID. The system has been tested with large amount of real-world RFID-based baggage tracking data from a major industry initiative...

  5. Research and design on system of asset management based on RFID

    Science.gov (United States)

    Guan, Peng; Du, HuaiChang; Jing, Hua; Zhang, MengYue; Zhang, Meng; Xu, GuiXian

    2011-10-01

    By analyzing the problems in the current assets management, this thesis proposing RFID technology will be applied to asset management in order to improve the management level of automation and information. This paper designed the equipment identification based on 433MHz RFID tag and reader which was deeply studied on the basis of RFID tag and card reader circuits, and this paper also illustrates the system of asset management. The RS232 converts Ethernet is a innovative technology to transfer data to PC monitor software, and implement system of asset management based on WEB techniques (PHP and MySQL).

  6. Introduction to the RFID Technology in the Application of the Smart Supermarket

    Directory of Open Access Journals (Sweden)

    Fu Binbin

    2016-01-01

    Full Text Available RFID technology is no stranger to more or less have contacted various of industries in nowadays. Premier wen Jiabao put forward the “experience China” in 2009, after the application of IOT (Internet of things is rocketed development and RFID technology is absolutely necessary as the core of IOT. On the experiment background of campus supermarket, this paper briefly introduces the application of RFID technology in the intelligent supermarket that mainly included four parts. Through analysis of system, it detailed interpretation that IOT bring changes to campus supermarket.

  7. Neutron physics

    CERN Document Server

    Reuss, Paul

    2008-01-01

    Originally just an offshoot of nuclear physics, neutron physics soon became a branch of physics in its own right. It deals with the movement of neutrons in nuclear reactors and ail the nuclear reactions they trigger there, particularly the fission of heavy nuclei which starts a chain reaction to produce energy. Neutron Physics covers the whole range of knowledge of this complex science, discussing the basics of neutron physics and some principles of neutron physics calculations. Because neutron physics is the essential part of reactor physics, it is the main subject taught to students of Nuclear Engineering. This book takes an instructional approach for that purpose. Neutron Physics is also intended for ail physicists and engineers involved in development or operational aspects of nuclear power.

  8. Identification of surgical instruments using UHF-RFID technology

    Directory of Open Access Journals (Sweden)

    Bourouah Mohamed

    2015-09-01

    Full Text Available The paper presents research, development and advantage of Radio Frequency IDentification (RFID technology based system for medical instrument management and safe usage. The system is developed for two scenarios. In the first scenario, a Ultra High Frequency (UHF is used and the UHF–interrogator system with UHF-antennas is constructed to work as conveyor-belt and instruments are placed between two antennas. Second scenario, suitable for the operating rooms, includes four antennas, placed under the table with instruments, system’s phase shifter, inserted between the antenna and reader in order to reduce the effect of dead spots, caused by the electromagnetic reflections. High reliable identification rate is achieved by synchronizing phase shifters with particular interrogator. The system is software calibrated and can be re-calibrated at run-time to achieve high efficiency of power transmission to the antenna and in order to enable the receiver to decode the tag signals. With currently on the market available RFID tags and previously mentioned technology approaches, detection rate of 87.5% can be achieved.

  9. Implementing RFID in a hospital library: a scoping study.

    Science.gov (United States)

    Norwood, Joseph; Skinner, Ben

    2012-06-01

    This article discusses a scoping study on implementing radio frequency identification device (RFID) in a hospital library context, conducted by Joseph Norwood for his MA dissertation at the University of Brighton. The study was carried out during the summer of 2011 to support possible RFID implementation at the Brighton and Sussex University Hospitals (BSUH) Trust, and the library staff were able to use the findings to good effect to create a business plan. This article also acts as the template for the new Dissertations into Practice feature, which was introduced in the March issue (Marshall, A. Health Information and Libraries Journal 2012, 29, 72). The dissertation highlighted here is very practical in nature and had immediate and quantifiable benefits for the Trust library. Future feature articles are likely to reflect the range of health-related dissertation topics which students choose and will include studies on user information behaviour, information services related to mental health and well-being, as well as the impact of technology on health-related library or information services.AM. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group.

  10. Zeroth order resonator (ZOR) based RFID antenna design

    Science.gov (United States)

    Masud, Muhammad Mubeen

    Meander-line and multi-layer antennas have been used extensively to design compact UHF radio frequency identification (RFID) tags; however the overall size reduction of meander-line antennas is limited by the amount of parasitic inductance that can be introduced by each meander-line segment, and multi-layer antennas can be too costly. In this study, a new compact antenna topology for passive UHF RFID tags based on zeroth order resonant (ZOR) design techniques is presented. The antenna consists of lossy coplanar conductors and either inter-connected inter-digital capacitor (IDC) or shunt inductor unit-cells with a ZOR frequency near the operating frequency of the antenna. Setting the ZOR frequency near the operating frequency is a key component in the design process because the unit-cells chosen for the design are inductive at the operating frequency. This makes the unit-cells very useful for antenna miniaturization. These new designs in this work have several benefits: the coplanar layout can be printed on a single layer, matching inductive loops that reduce antenna efficiency are not required and ZOR analysis can be used for the design. Finally, for validation, prototype antennas are designed, fabricated and tested.

  11. Bit Level Synchronized MAC Protocol for Multireader RFID Networks

    Directory of Open Access Journals (Sweden)

    Namboodiri Vinod

    2010-01-01

    Full Text Available The operation of multiple RFID readers in close proximity results in interference between the readers. This issue is termed the reader collision problem and cannot always be solved by assigning them to different frequency channels due to technical and regulatory limitations. The typical solution is to separate the operation of such readers across time. This sequential operation, however, results in a long delay to identify all tags. We present a bit level synchronized (BLSync MAC protocol for multi-reader RFID networks that allows multiple readers to operate simultaneously on the same frequency channel. The BLSync protocol solves the reader collision problem by allowing all readers to transmit the same query at the same time. We analyze the performance of using the BLSync protocol and demonstrate benefits of 40%–50% in terms of tag reading delay for most settings. The benefits of BLSync, first demonstrated through analysis, are then validated and quantified through simulations on realistic reader-tag layouts.

  12. RMAIS: RFID-based medication Adherence Intelligence System.

    Science.gov (United States)

    McCall, Corey; Maynes, Branden; Zou, Cliff C; Zhang, Ning J

    2010-01-01

    There has been compelling evidence that outpatients, especially those who are elderly or taking multiple complexly scheduled drugs, are not taking their medicines as directed, leading to unnecessary disease progression, complications, functional disabilities, lower quality of life, and even mortality. Existing technologies for monitoring and improving drug adherence are either costly or too complicated for general patients to use. In this paper, we introduce the detailed design and the complete prototype of a marketable Radio-Frequency Identification (RFID)-based Medication Adherence Intelligence System (RMAIS) that can be conveniently used at a residential home by ordinary patients. RMAIS is designed to maintain patients' independence and enable them to take multiple daily medicine dosages of the right amount at the right time. The system is patient-centered and user-friendly by reminding a patient of the prescribed time for medication and dispensing it in a fully automatic and fool-proof way. This is achieved mainly due to its novel design of a motorized rotation platform and the smooth integration of a scale, an RFID reader, and the rotation platform. In addition, this system has an Internet-based notification function that is used to alert the patient when it is time to take medicine as well as report deviations from the prescribed schedule to the primary care physicians or pharmacists.

  13. Radioactive source monitoring system based on RFID and GPRS

    International Nuclear Information System (INIS)

    He Haiyang; Zhou Hongliang; Zhang Hongjian; Zhang Sheng; Zhou Junru; Weng Guojie

    2011-01-01

    Nuclear radiation produced by radioactive source is harmful to the health of human body, and the lost and theft of radioactive source will cause environmental pollution and social panic. In order to solve the abnormal leaks, accidental loss, theft and other problems of the radioactive source, a radioactive source monitoring system based on RFID, GPS, GPRS and GSM technology is put forward. Radiation dose detector and GPS wireless location module are used to obtain the information of radiation dose and location respectively, RFID reader reads the status of a tag fixed on the bottom of the radioactive source. All information is transmitted to the remote monitoring center via GPRS wireless transmission. There will be an audible and visual alarm when radiation dose is out of limits or the state of radioactive source is abnormal, and the monitoring center will send alarming text messages to the managers through GSM Modem at the same time. Thus, the functions of monitoring and alarming are achieved. The system has already been put into operation and is being kept in functional order. It can provide stable statistics as well as accurate alarm, improving the supervision of radioactive source effectively. (authors)

  14. Copper thin film for RFID UHF antenna on flexible substrate

    International Nuclear Information System (INIS)

    Tran, Nhan Ai; Tran, Huy Nam; Dang, Mau Chien; Fribourg-Blanc, Eric

    2010-01-01

    A process flow using photolithography and sputtering was studied for copper antenna fabrication on thin poly(ethylene terephthalate) (PET) substrate. The lift-off route was chosen for its flexibility at laboratory scale. It was clarified that the cleaning of PET is an important step that necessitates mild oxygen plasma etching. Then copper is sputter deposited after photolithographic definition of the antenna. Care is necessary since PET, as a very flexible substrate, is temperature sensitive. The temperature increase generated by the impact of deposited copper should be maintained below the glass transition temperature of the polymer to avoid detrimental deformation. dc power of 40 to 50 W was found to be the maximum possible sputtering power for commercial PET. It was found that the resistivity of the thin film is below two times the bulk resistivity of copper for a deposition pressure below 4×10 −3  mbar and thickness above 450 nm. These results enable the reliable fabrication of copper RFID UHF antennae on a PET substrate for further testing of new tag designs. The present paper summarizes the effort to test new designs of antennae for RadioFrequency IDentification (RFID) Ultra High Frequency (UHF) tags, for use in various applications (e.g. object tracking and environment monitoring) in Vietnam

  15. A Minkowski Fractal Circularly Polarized Antenna for RFID Reader

    Directory of Open Access Journals (Sweden)

    Yanzhong Yu

    2014-11-01

    Full Text Available A design of fractal-like antenna with circular polarization for radio frequency identification (RFID reader applications is presented in this article. The modified Minkowski fractal structure is adopted as radiating patch for size reduction and broadband operation. A corner-truncated technology and a slot-opened method are employed to realize circular polarization and improve the gain of the proposed antenna, respectively. The proposed antenna is analyzed and optimized by HFSS. Return loss and maximum gain of the optimized antenna achieve to -22.2 dB and 1.12 dB at 920 MHz, respectively. The optimized design has an axial ratio (AR of 1.2 dB at central frequency of 920 MHz and impedance bandwidth (S11<=-10 dB of 40 MHz (4.3 %. Its input impedance is (57.9-j2.6 W that is close to input impedance of coaxial line (50 W. Numerical results demonstrate that the optimized antenna exhibits acceptable performances and may satisfy requirements of RFID reader applications.

  16. A Key Establishment Protocol for RFID User in IPTV Environment

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  17. DEVELOPING A WIRELESS SENSOR NETWORD WITH RFID CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Dan LICA

    2016-05-01

    Full Text Available The concept underlying the pervasive communications systems is Internet of Objects, defined as a global network of smart objects, resulting in "attachment" of communication functions, data acquisition, data processing objects we interact with daily. Internet of Objects will be based on 4th generation of Internet systems. In such systems, each intelligent networked device must offer its users a number of services, which constitute a development of the current model of Web services. Such services will result from aggregation of micro services offered by each pervasive device connected to the Internet. Aggregating these micro services requires that each node in the network has the opportunity to present / expose its capabilities (so-called "advertising" in a standard way for client applications to be integrated into complex services. Therefore there appears the need to introduce a coding scheme to identity the nodes in the network, enabling the identification of their capabilities. An alternative to implementing such a system of encoding / identifying characteristics of network nodes is active RFID technology. The aim of this chapter is to develop a method to ensure the convergence of wireless sensor networks with active RFID systems within a pervasive hybrid network based on the IEEE 802.15.4 standard, which satisfies the Internet of Objects network.

  18. Equipment location in hospitals using RFID-based positioning system.

    Science.gov (United States)

    Shirehjini, Ali Asghar Nazari; Yassine, Abdulsalam; Shirmohammadi, Shervin

    2012-11-01

    Throughout various complex processes within hospitals, context-aware services and applications can help to improve the quality of care and reduce costs. For example, sensors and radio frequency identification (RFID) technologies for e-health have been deployed to improve the flow of material, equipment, personal, and patient. Bed tracking, patient monitoring, real-time logistic analysis, and critical equipment tracking are famous applications of real-time location systems (RTLS) in hospitals. In fact, existing case studies show that RTLS can improve service quality and safety, and optimize emergency management and time critical processes. In this paper, we propose a robust system for position and orientation determination of equipment. Our system utilizes passive (RFID) technology mounted on flooring plates and several peripherals for sensor data interpretation. The system is implemented and tested through extensive experiments. The results show that our system's average positioning and orientation measurement outperforms existing systems in terms of accuracy. The details of the system as well as the experimental results are presented in this paper.

  19. Active Shop Scheduling Of Production Process Based On RFID Technology

    Directory of Open Access Journals (Sweden)

    Cuihua Chao

    2016-01-01

    Full Text Available In industry 4.0 environment, intelligent technology is almost applied to all parts of the manufacturing process, such as process design, job shop scheduling, etc.. This paper presents an efficient approach to job shop scheduling actively by using RFID to collect real-time manufacturing data. Identified the workpiece by RFID which needs to be machined, it can “ask for” the resource actively for the following process. With these active asking-for strategy, a double genetically encoded improved genetic algorithm is proposed for achieving active job shop scheduling solution during the actual manufacturing process. A case was used to evaluate its effectiveness. Meanwhile, , it can effectively and actively carry out job shop scheduling and has much better convergence effect comparing with basic genetic algorithm. And the job shop scheduler in management center can use the proposed algorithm to get the satisfied scheduling result timely by reducing waiting time and making begin time earlier during transmission between manufacturing process, which makes the scheduling result feasible and accurate.

  20. Studying RFID Consumer Acceptance Using TAM: the Case of IUST Students

    Directory of Open Access Journals (Sweden)

    Ahad Zare Ravasan

    2012-02-01

    Full Text Available Radio frequency identification (RFID technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigated the factors that affect consumer acceptance of RFID technology using the technology acceptance model (TAM. To this end, a questionnaire was prepared and distributed among Iran University of Science and Technology (IUST students and gathered data were analyzed using multivariable linear regression method. The results proposed that convenience, culture, and regulation were the principal factors influencing the consumers’ acceptance of RFID. The results of the paper can provide insight to organizations in providing RFID enabled products to their customers and also facilitated its development in the society.

  1. A Numerical Estimation of a RFID Reader Field and SAR inside a Blood Bag at UHF

    Directory of Open Access Journals (Sweden)

    Alessandro Fanti

    2016-11-01

    Full Text Available In this paper, the effects of UHF electromagnetic fields produced by a RFID reader on a blood bag are evaluated numerically in several configurations. The results of the simulation, field level and distribution, specific absorption rate (SAR, and heating time show that an exposure to a typical reader field leads to a temperature increase smaller than 0.1 C and to a SAR smaller than 1 W/kg. As a consequence, no adverse biological effects occur during a typical UHF RFID reading cycle on a blood bag. Therefore, the blood contained in a bag traced using UHF-RFID is as safe as those traced using barcodes. The proposed analysis supports the use of UHF RFID in the blood transfusion supply chain.

  2. A Novel RFID Sensing System Using Enhanced Surface Wave Technology for Battery Exchange Stations

    Directory of Open Access Journals (Sweden)

    Yeong-Lin Lai

    2014-01-01

    Full Text Available This paper presents a novel radio-frequency identification (RFID sensing system using enhanced surface wave technology for battery exchange stations (BESs of electric motorcycles. Ultrahigh-frequency (UHF RFID technology is utilized to automatically track and manage battery and user information without manual operation. The system includes readers, enhanced surface wave leaky cable antennas (ESWLCAs, coupling cable lines (CCLs, and small radiation patches (SRPs. The RFID sensing system overcomes the electromagnetic interference in the metallic environment of a BES cabinet. The developed RFID sensing system can effectively increase the efficiency of BES operation and promote the development of electric vehicles which solve the problem of air pollution as well as protect the environment of the Earth.

  3. Application studies of RFID technology in the process of coal logistics transport

    Science.gov (United States)

    Qiao, Bingqin; Chang, Xiaoming; Hao, Meiyan; Kong, Dejin

    2012-04-01

    For quality control problems in coal transport, RFID technology has been proposed to be applied to coal transportation process. The whole process RFID traceability system from coal production to consumption has been designed and coal supply chain logistics tracking system integration platform has been built, to form the coal supply chain traceability and transport tracking system and providing more and more transparent tracking and monitoring of coal quality information for consumers of coal. Currently direct transport and combined transport are the main forms of coal transportation in China. The means of transport are cars, trains and ships. In the booming networking environment of RFID technology, the RFID technology will be applied to coal logistics and provide opportunity for the coal transportation tracking in the process transportation.

  4. Indoor localization using pedestrian dead reckoning updated with RFID-based fiducials.

    Science.gov (United States)

    House, Samuel; Connell, Sean; Milligan, Ian; Austin, Daniel; Hayes, Tamara L; Chiang, Patrick

    2011-01-01

    We describe a low-cost wearable system that tracks the location of individuals indoors using commonly available inertial navigation sensors fused with radio frequency identification (RFID) tags placed around the smart environment. While conventional pedestrian dead reckoning (PDR) calculated with an inertial measurement unit (IMU) is susceptible to sensor drift inaccuracies, the proposed wearable prototype fuses the drift-sensitive IMU with a RFID tag reader. Passive RFID tags placed throughout the smart-building then act as fiducial markers that update the physical locations of each user, thereby correcting positional errors and sensor inaccuracy. Experimental measurements taken for a 55 m × 20 m 2D floor space indicate an over 1200% improvement in average error rate of the proposed RFID-fused system over dead reckoning alone.

  5. Design and Development of an RFID-based HIS - A Case Study

    Directory of Open Access Journals (Sweden)

    C.H. Wu

    2011-02-01

    Full Text Available The Healthcare industry involves critical activities where small mistakes could cause huge loss of life and incur massive financial losses. Improving operational efficiency and enhancing data correctness of patients are the prime targets of using hospital information system (HIS. Radio Frequency Identification (RFID technology, with a unique ability to perform automatic data collection without any human intervention, has gained great interest in the healthcare industry. In this research, an RFID-enabled HIS is proposed for improving operations in a hospital. This research presents the fundamentals of RFID, the benefits and its challenges, and also demonstrates three improved signature applications. It aims at providing the healthcare industry with a comprehensive understanding of RFID and its suitability for healthcare applications. The proposed system is considered to be suitably operational, practical, and affordable for healthcare organizations not only in China and Hong Kong, but also in other countries

  6. SAW passive wireless sensor-RFID tags with enhanced range, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes the development of passive wireless surface acoustic wave (SAW) RFID sensor-tags with enhanced range for remote monitoring of large groups of...

  7. RFID-Enabled Navigation and Communication Networks for Long-Duration Space Missions, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Virtual EM Inc. proposes a system that employs semi-passive RFID sensors with carbon nanotube inkjet-printed antenna and solar powered mesh-networked beacons. The...

  8. An RFID-Enabled Sensor Interface for the EV Modular Instrumentation System

    Data.gov (United States)

    National Aeronautics and Space Administration — Development of a passive radio-frequency identification (RFID) communication module, compliant with the EPCglobal class1, generation 2 air-interface standard, that...

  9. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    International Nuclear Information System (INIS)

    Kiama, J W; Patrick, T H H; Raman, V

    2014-01-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity

  10. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  11. User Feedback on RFID and Integrated Flightline Data for Maintenance Decisions

    National Research Council Canada - National Science Library

    Gallimore, Jennie J; Quill, Laurie; Cagle, Ron; Gruenke, Jessica; Hosman, Chris; Matthews, Elizabeth; Faas, Paul; Seyba, Jason; Young, Ian

    2006-01-01

    .... Real time sensing technologies are being investigated to improve logistics support. The purpose of this study was to investigate integrated Radio Frequency Identification/Real Time Location System (RFID/RTLS...

  12. The design of radioactive source tracking management system based on RFID

    International Nuclear Information System (INIS)

    Yan Yongjun; Zhou Jianliang

    2008-01-01

    The paper introduces a solution of safety and security management system of radioactive source in storage and use by employing advanced RFID technology and computer database technology. And make some suggestions for further improvement. (authors)

  13. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  14. RFID sensors as the common sensing platform for single-use biopharmaceutical manufacturing

    International Nuclear Information System (INIS)

    Potyrailo, Radislav A; Surman, Cheryl; Monk, David; Morris, William G; Wortley, Timothy; Vincent, Mark; Diana, Rafael; Pizzi, Vincent; Carter, Jeffrey; Gach, Gerard; Klensmeden, Staffan; Ehring, Hanno

    2011-01-01

    The lack of reliable single-use sensors prevents the biopharmaceutical industry from fully embracing single-use biomanufacturing processes. Sensors based on the same detection platform for all critical parameters in single-use bioprocess components would be highly desirable to significantly simplify their installation, calibration and operation. We review here our approach for passive radio-frequency identification (RFID)-based sensing that does not rely on costly proprietary RFID memory chips with an analog input but rather implements ubiquitous passive 13.56 MHz RFID tags as inductively coupled sensors with at least 16 bit resolution provided by a sensor reader. The developed RFID sensors combine several measured parameters from the resonant sensor antenna with multivariate data analysis and deliver unique capability of multiparameter sensing and rejection of environmental interferences with a single sensor. This general sensing approach provides an elegant solution for both analytical measurement and identification and documentation of the measured location. (topical review)

  15. Passively Powered and Programmable Sensor-RFID for ISHM Systems, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — To date there are several approaches for incorporating sensing capabilities into RFID. Active tags use batteries to power their communication circuitry, sensors, and...

  16. Passively Powered and Programmable Sensor-RFID for ISHM Systems, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — To date there are several approaches for incorporating sensing capabilities into RFID. Active tags use batteries to power their communication circuitry, sensors, and...

  17. Characterization of polymer silver pastes for screen printed flexible RFID antennas

    Science.gov (United States)

    Janeczek, Kamil; Jakubowska, Małgorzata; Futera, Konrad; MłoŻniak, Anna; Kozioł, GraŻyna; Araźna, Aneta

    Radio Frequency Identification (RFID) systems have become more and more popular in the last few years because of their wide application fields, such as supply chain management and logistics. To continue their development further investigations of new conductive materials for fabrication of RFID transponders' antennas are necessary to be carried out. These materials should provide high flexibility and good radiation performance of printed antennas. In this paper, two polymer silver pastes based on silver flakes were characterized with regard to manufacturing of flexible RFID antennas with screen printing technique. Foil and paper were used as a substrate materials. Surface profile of the printed antennas was measured using an optical profilometer and their resistance was measured with a four-point-probe method. Antenna flexibility was evaluated in cyclic bending tests and its performance with reflection coefficient measurements with the use of differential probe connected to a vector network analyzer. In addition, a maximum read distance of a fabricated RFID transponder was measured.

  18. Feasibility and applications of RFID technologies to support Right-of-Way functions : technical report

    Science.gov (United States)

    2010-08-01

    Radio frequency identification device (RFID) technology provides the capability to store a unique identification : number and some basic attribute information, which can be retrieved wirelessly. This research project studied : the feasibility of usin...

  19. Multi-use Passive RFID Sensor Tag System for NASA, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal will provide NASA with a family of UHF RFID sensor tags and system components supporting very reliable, robust, convenient and economical deployment...

  20. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    Science.gov (United States)

    Kiama, J. W.; Raman, V.; Patrick, T. H. H.

    2014-02-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity.

  1. Introducing RFID technology in dynamic and time-critical medical settings: requirements and challenges.

    Science.gov (United States)

    Parlak, Siddika; Sarcevic, Aleksandra; Marsic, Ivan; Burd, Randall S

    2012-10-01

    We describe the process of introducing RFID technology in the trauma bay of a trauma center to support fast-paced and complex teamwork during resuscitation. We analyzed trauma resuscitation tasks, photographs of medical tools, and videos of simulated resuscitations to gain insight into resuscitation tasks, work practices and procedures. Based on these data, we discuss strategies for placing RFID tags on medical tools and for placing antennas in the environment for optimal tracking and activity recognition. Results from our preliminary RFID deployment in the trauma bay show the feasibility of our approach for tracking tools and for recognizing trauma team activities. We conclude by discussing implications for and challenges to introducing RFID technology in other similar settings characterized by dynamic and collocated collaboration. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. RFID Meets GWOT: Considering a New Technology for a New Kind of War

    National Research Council Canada - National Science Library

    Kirby, Kevin L

    2006-01-01

    ...) technology may provide USSOCOM and other commands in the Global War on Terror. This thesis will explain the basic concept behind RFID, and cite some of the current day applications of today that are revolutionizing the civilian sector...

  3. Performance Evaluation of RTLS Based on Active RFID Power Measurement for Dense Moving Objects

    Science.gov (United States)

    Kim, Taekyu; Lee, Jin; Lee, Seungbeom; Park, Sin-Chong

    Tracking a large quantity of moving target tags simultaneously is essential for the localization and guidance of people in welfare facilities like hospitals and sanatoriums for the aged. The locating system using active RFID technology consists of a number of fixed RFID readers and tags carried by the target objects, or senior people. We compare the performances of several determination algorithms which use the power measurement of received signals emitted by the moving active RFID tags. This letter presents a study on the effect of collision in tracking large quantities of objects based on active RFID real time location system (RTLS). Traditional trilateration, fingerprinting, and well-known LANDMARC algorithm are evaluated and compared with varying number of moving tags through the SystemC-based computer simulation. From the simulation, we show the tradeoff relationship between the number of moving tags and estimation accuracy.

  4. Applications of Fast-Moving RFID Tags in High-speed Railway Systems

    Directory of Open Access Journals (Sweden)

    Xiaoqiang Zhang

    2011-02-01

    Full Text Available RFID technology has been widely utilized for the tracking and identification of numerous stationary and moving objects. One of the most challenging RFID applications has to do with the improvement in reliability, scheduling and efficiency of large‐scale transportation infrastructure. As an example, Radio Frequency Identification (RFID technology in Ultra High Friency (UHF frequencies (840‐845MHz and 920‐925MHz is one of several technologies currently being utilized in China to monitor and regulate the railway system. Despite the very successful performance of ATIS RFID‐based system for conventional trains with speeds up to 150kph, numerous challenges have to be resolved for the extension of this technology to modern high‐speed and ultra high‐speed railway systems with speeds up to 500kph. This paper identifies these issues, such as collision and insufficient reading time, and proposes various ways to alleviate their effect in UHF‐RFID enabled railway systems

  5. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  6. Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine.

    Science.gov (United States)

    Coustasse, Alberto; Cunningham, Brian; Deslich, Stacie; Willson, Eric; Meadows, Pamela

    2015-01-01

    Radio-frequency identification (RFID) technology is used by hospital supply chains to track medical products and monitor inventories. Hospitals have also begun incorporating RFID technology as part of their transfusion processes. The purpose of this review was to analyze how healthcare organization supply chains can benefit from the utilization of RFID systems in transfusion service departments. The methodology for this study was a literature review following the steps of a systematic review with a total of 52 sources referenced. RFID technology is used to manage and track blood products from the initial donor phlebotomy to final disposition or product transfusion. RFID-enabled transfusion practices have successfully increased provider productivity and product quality through work-time reduction and error reduction. Findings of this research study suggest that RFID has provided improvements in quality of care and efficiency, while initial costs, security, and privacy appear to be the principal barriers to adoption.

  7. Neutron radiography

    International Nuclear Information System (INIS)

    Hiraoka, Eiichi

    1988-01-01

    The thermal neutron absorption coefficient is essentially different from the X-ray absorption coefficient. Each substance has a characteristic absorption coefficient regardless of its density. Neutron deams have the following features: (1) neutrons are not transmitted efficiently by low molecular weight substances, (2) they are transmitted efficiently by heavy metals, and (3) the transmittance differs among isotopes. Thus, neutron beams are suitable for cheking for foreign matters in heavy metals and testing of composites consisting of both heavy and light materials. A neutron source generates fast neutrons, which should be converted into thermal neutrons by reducing their energy. Major neutron souces include nuclear reactors, radioisotopes and particle accelerators. Photographic films and television systems are mainly used to observe neutron transmission images. Computers are employed for image processing, computerized tomography and three-dimensional analysis. The major applications of neutron radiography include inspection of neclear fuel; evaluation of material for airplane; observation of fuel in the engine and oil in the hydraulic systems in airplanes; testing of composite materials; etc. (Nogami, K.)

  8. Applied Research of IOT and RFID Technology in Agricultural Product Traceability System

    OpenAIRE

    Zhao, Guogang; Yu, Haiye; Wang, Guowei; Sui, Yuanyuan; Zhang, Lei

    2014-01-01

    International audience; In recent years, more and more attention has been given to the safety of agricultural products, whose demands for the traceability system are increasingly urgent. This paper, in response to the demands, by using the C# programming language, database technology, IOT technology and RFID technology, realized the traceability system of agricultural products, and explained the implementation of network technology and RFID technology in detail. The traceability system can co...

  9. Investigation of Using Radio Frequency Identification (RFID) System for Gear Tooth Crack Detection

    Science.gov (United States)

    2014-06-01

    on a conveyor belt at a certain speed. When compared to the static application, moving tags spend less time in the read field and require a higher...UNCLASSIFIED UNCLASSIFIED Investigation of using Radio Frequency Identification (RFID) System for Gear Tooth Crack Detection Eric...using passive low frequency (LF) and high frequency (HF) radio frequency identification (RFID) systems as embedded sensors for early gear tooth

  10. EDMC: An enhanced distributed multi-channel anti-collision algorithm for RFID reader system

    Science.gov (United States)

    Zhang, YuJing; Cui, Yinghua

    2017-05-01

    In this paper, we proposes an enhanced distributed multi-channel reader anti-collision algorithm for RFID environments which is based on the distributed multi-channel reader anti-collision algorithm for RFID environments (called DiMCA). We proposes a monitor method to decide whether reader receive the latest control news after it selected the data channel. The simulation result shows that it improves interrogation delay.

  11. RFID based Anti-theft System for Metropolia UAS Electronics laboratories

    OpenAIRE

    Weldemedhin, Desta

    2016-01-01

    The aim of this thesis is to study different types of RFID based anti-Theft system implementation suitable for Metropolia Electronics laboratory environment to deter theft taking into account several installation requirements. The operating frequencies of the RFID anti-theft system are from low frequency to High frequencies range and governed by different standards based on the region it is going to be implemented. The introduction of this thesis will go through Radio Frequency Identifica...

  12. Selected Issues in DoD’s Radio Frequency Identification (RFID) Implementation

    Science.gov (United States)

    2006-04-01

    and training is especially important for passive RFID where some problems that have been encountered , for example, poor tag read rates, are affected...successfully tested in recent transpacific field trials. The Savi container security tag was examined in another demonstration conducted from July 2002...VIII medical product, and so most issues that may occur are likely to be encountered , as well as all potential benefits. The MEMS-enabled RFID tags

  13. Integrated algorithms for RFID-based multi-sensor indoor/outdoor positioning solutions

    Science.gov (United States)

    Zhu, Mi.; Retscher, G.; Zhang, K.

    2011-12-01

    Position information is very important as people need it almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques but these techniques are difficult to be used indoors since GPS signal reception is limited. The alternative techniques that can be used for indoor positioning include, to name a few, Wireless Local Area Network (WLAN), bluetooth and Ultra Wideband (UWB) etc.. However, all of these have limitations. The main objectives of this paper are to investigate and develop algorithms for a low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) and its integration with other positioning systems. An RFID system consists of three components, namely a control unit, an interrogator and a transponder that transmits data and communicates with the reader. An RFID tag can be incorporated into a product, animal or person for the purpose of identification and tracking using radio waves. In general, for RFID positioning in urban and indoor environments three different methods can be used, including cellular positioning, trilateration and location fingerprinting. In addition, the integration of RFID with other technologies is also discussed in this paper. A typical combination is to integrate RFID with relative positioning technologies such as MEMS INS to bridge the gaps between RFID tags for continuous positioning applications. Experiments are shown to demonstrate the improvements of integrating multiple sensors with RFID which can be employed successfully for personal positioning.

  14. Maximum Likelihood Approach for RFID Tag Set Cardinality Estimation with Detection Errors

    DEFF Research Database (Denmark)

    Nguyen, Chuyen T.; Hayashi, Kazunori; Kaneko, Megumi

    2013-01-01

    Abstract Estimation schemes of Radio Frequency IDentification (RFID) tag set cardinality are studied in this paper using Maximum Likelihood (ML) approach. We consider the estimation problem under the model of multiple independent reader sessions with detection errors due to unreliable radio...... is evaluated under dierent system parameters and compared with that of the conventional method via computer simulations assuming flat Rayleigh fading environments and framed-slotted ALOHA based protocol. Keywords RFID tag cardinality estimation maximum likelihood detection error...

  15. Integrated management platform of nuclear fuel storage and transportation based on RFID

    International Nuclear Information System (INIS)

    Song Yafeng; Ma Yanqin; Chen Liyu; Jiang Yong; Wu Jianlei; Yang Haibo; Zhang Haiyan

    2012-01-01

    This paper describes integrated system model to improve work efficiency and optimize control measures of nuclear fuel storage and transportation, RFID and information integration technology is introduced, traditional management processes are innovated in data acquisition and monitoring fields as well, system solutions and design model are given by emphasizing on the following key technologies: cascade protection of information system, security protocol of RFID information, algorithm of collision. (authors)

  16. Development and Evaluation of Automated System for RFID Tag Performance Measurements

    Directory of Open Access Journals (Sweden)

    Pavel Stasa

    2017-01-01

    Full Text Available The paper discusses the development of a device for directional characteristics measurements of RFID tags marked objects. Current procedures for carrying out laboratory tests of UHF RFID devices rely on relatively high involvement of human labour associated with higher risk of measurements errors. The newly developed system that performs great part of manual operations autonomously reduces the risk of measurement errors and enables experiments to be performed faster, more accurate and in repeatable manner.

  17. Radio frequency identification (RFID) technologies for locating warehouse resources: A conceptual framework

    OpenAIRE

    Hassan, M; Ali, M; Aktas, E

    2012-01-01

    Copyright @ 2012 Information Technology Society In the supply chain, a warehouse is a crucial component for linking all chain parties. It is necessary to track the real time resource location and status to support warehouse operations effectively. Therefore, RFID technology has been adopted to facilitate the collection and sharing of data in a warehouse environment. However, an essential decision should be made on the type of RFID tags the warehouse managers should adopt, because it is ver...

  18. THE APPLICATION OF RFID IN WAREHOUSE PROCESS: CASE STUDY OF CONSUMER PRODUCT MANUFACTURER IN THAILAND

    OpenAIRE

    Natanaree Sooksaksun; Sriyos Sudsertsin

    2014-01-01

    Background: This warehouse has three main problems: poor accuracy of inventory location, long cycle time of receiving process and non-real time empty storage location. Therefore, the objective of this research is to improve the process in the warehouse by applying radio frequency identification (RFID) technology. Methods: There are four steps in this research. First of all, the current of the receiving process and the picking process are studied. Second is to give the guideline for RFID ...

  19. Medical equipment management through the use of radio frequency identification (RFID)

    OpenAIRE

    Sanchez, Joaquin A.; Nixon, Richard A.; Chávez, Sergio

    2004-01-01

    MBA Professional Report Approved for public release, distribution is unlimited The purpose of this MBA project is to identify the potential value of Radio Frequency Identification (RFID) use in the management of medical equipment at Naval Medical Center San Diego (NMCSD). In doing so, our project seeks to derive potential benefits through the use of RFID technology by comparing a group of medical equipment items that are tracked within NMCSD. The project includes a discussion of additio...

  20. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    toothbrush . (Moore, 2002) pRFID and UID technologies are two types of discontinuous innovations DoD is attempting to implement within its supply chain... Technology Adoption By: Jonathan Gray Sylvester Brown Jr. Terrell Hood December 2007 Advisors: Nicholas Dew Mark Eitelberg...Second Chasm in RFID-UID Technology Adoption 6. AUTHOR(S) Jonathan Gray, Sylvester Brown Jr., and Terrell Hood 5. FUNDING NUMBERS 7