WorldWideScience

Sample records for exploratory rfid patent

  1. RFID Applications: An Introductory and Exploratory Study

    OpenAIRE

    Hanifa Shah; Kamran Ahsan; Paul Kingston

    2010-01-01

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes,...

  2. Impact of RFID on the Retail Value Chain: An Exploratory Study Using a Mixed Method Approach

    Directory of Open Access Journals (Sweden)

    Mithu Bhattacharya

    2012-12-01

    Full Text Available While several large retailers have mandated RFID deployment across their value chains, the case for RFID adoption in retail still remains uncertain. This paper aims at providing a realistic perspective of the immense potential of RFID, taking adoption drivers, potential benefits, and implementation challenges into account. In this paper, a mixed methodological approach is used that caters to the exploratory nature of the work to quantitatively analyze RFID adoption drivers, benefits, and implementation challenges. First content analysis is applied to analyze academic and trade articles to come up with key issues and concepts. The results from the content analysis acted as input for a Delphi study which is the second methodology. The combined results from the two methods provide deep insights and enhance understanding of important implementation issues related to RFID adoption in the retail sector and also aid in drawing meaningful managerial conclusions.

  3. Title Epidemic Model of a Concept within the Subject Classes of Patents: A Case Study on the Term RFID

    Directory of Open Access Journals (Sweden)

    Mohammad Tavakolizade Ravari

    2016-12-01

    Full Text Available The current research aims at studying the epidemic model of the term RFID within the classes of patents. Methodology: The research is descriptive and has been conducted based on the mathematical models of diseases. Research population consists of 35,627 granted patents from the USPTO database those which the terms RFID or Radio Frequency Identification occur in their titles or abstracts. Data analysis was performed through software like Excel, SPSS, and Ravar-Matrix. Findings show that the cumulative growth of sub-classes with the term RFID follows an S-logistic model. This is an evidence of natural growth rate for assigning the term RFID to the USPTO sub-classes over the years.  Other finding reveals that the term RFID has been entered into and exited from the sub-classes of patents like the SIS epidemic model of diseases. As a final conclusion, the most technical fields those that are susceptible for RFID technology, have been met this technology. On the base of SIS model, the epidemic of RFID technology has been reached a balance.

  4. An Exploratory Study of RFID Adoption in the Paperboard Packaging Industry

    Directory of Open Access Journals (Sweden)

    Bindiganavale Vijayaraman

    2008-12-01

    Full Text Available Some experts predict RFID will be the next big technology to revolutionize supply chain management. The RFID mandates by the Department of Defense (DOD, Federal Drug Administration (FDA, and retail companies have required organizations to implement RFID technology. Other companies are evaluating the potential costs and benefits of such adoption. In order to establish benchmark on RFID adoption, this study surveyed readers of Paperboard Packaging magazine and members of the European Federation of Corrugated Board Manufacturers (FEFCO to see if they are implementing RFID technology and challenges they may face. The results indicate about 52% of responding companies are not currently considering RFID technology because of the cost concerns. Companies that are implementing or considering RFID are doing it because of their customer requirements although they are concerned about the cost of RFID tags and cost of implementation. Companies that are implementing RFID are somewhat satisfied with RFID implementation.

  5. Applied patent RFID systems for building reacting HEPA air ventilation system in hospital operation rooms.

    Science.gov (United States)

    Lin, Jesun; Pai, Jar-Yuan; Chen, Chih-Cheng

    2012-12-01

    RFID technology, an automatic identification and data capture technology to provide identification, tracing, security and so on, was widely applied to healthcare industry in these years. Employing HEPA ventilation system in hospital is a way to ensure healthful indoor air quality to protect patients and healthcare workers against hospital-acquired infections. However, the system consumes lots of electricity which cost a lot. This study aims to apply the RFID technology to offer a unique medical staff and patient identification, and reacting HEPA air ventilation system in order to reduce the cost, save energy and prevent the prevalence of hospital-acquired infection. The system, reacting HEPA air ventilation system, contains RFID tags (for medical staffs and patients), sensor, and reacting system which receives the information regarding the number of medical staff and the status of the surgery, and controls the air volume of the HEPA air ventilation system accordingly. A pilot program was carried out in a unit of operation rooms of a medical center with 1,500 beds located in central Taiwan from Jan to Aug 2010. The results found the air ventilation system was able to function much more efficiently with less energy consumed. Furthermore, the indoor air quality could still keep qualified and hospital-acquired infection or other occupational diseases could be prevented.

  6. Technologie RFID

    OpenAIRE

    Černý, Tomáš

    2007-01-01

    Práce poskytuje přehled o problematice RFID technologií. Analyzuje historický vývoj RFID technologií, popisuje základní komponenty RFID systémů, normy spojené s RFID, bezpečnost RFID a trh RFID technologií. Dále se práce věnuje možnostem využití RFID technologií v různých oborech, zařazení RFID systémů do rámce podnikové informatiky a hodnotí efekty, které RFID technologie přináší. Práce také definuje doporučený postup pro zavádění RFID technologií do firmy....

  7. Patenting Productivity and Intellectual Property Policies at Research I Universities: An Exploratory Comparative Study

    Science.gov (United States)

    Mendoza, Pilar; Berger, Joseph B.

    2005-01-01

    In the 1980s, the US government encouraged the cooperation of industries with universities in order to bridge funding gaps and cope with global competitive markets through legislations that allow universities to start spin-off businesses and to generate profits from patents. At the turn of the century, university partnerships with the private…

  8. Patenting productivity and intellectual property policies at Research I universities: An exploratory comparative study.

    Directory of Open Access Journals (Sweden)

    Pilar Mendoza

    2005-01-01

    Full Text Available In the 1980s, the US government encouraged the cooperation of industries with universities in order to bridge funding gaps and cope with global competitive markets through legislations that allow universities to start spin-off businesses and to generate profits from patents. At the turn of the century, university partnerships with the private sector have greatly increased through research grants, licensing patents, and in some cases, the formation of new firms'mainly at research universities and in the hard sciences. In response to these entrepreneurial opportunities, university administrators developed intellectual property policies to facilitate the commercialization of research. The purpose of this study is to explore the differences across IP policies among nine research universities as potential sources of influence on faculty engagement in for-profit research ventures according to existing models of faculty role performance and achievement.

  9. An Exploratory Comparison Study of Inventor-authors with Their Non-patenting Peers in Research Productivity and Influence

    Directory of Open Access Journals (Sweden)

    Szu-chia Scarlett Lo

    2014-12-01

    Full Text Available The aim of this study is to explore the possible link between industrial technology development and scientific research, with specific focus on the development of industrial technology influences the inventor-authors’ performance on scientific research. In this study, patenting activity was seen as representation of output of industrial technology; advised theses, funded research projects and journal articles were used as indicators of scientific research outcome. The author tried to examine the patents granted to and research output generated by members affiliated with Taiwanese Universities to reveal the productivity distribution and research performances of inventor-authors and non-patenting peers by taking bibliometrics approach. Patenting Activity Index and Academic Activity Index were used for presenting research output. Results showed that Inventor-authors performed above average both in technology development and research activities. However, it is worth a closer look at the impact of collaboration and research strategies for future researches.

  10. Enhanced UHF RFID tags for drug tracing.

    Science.gov (United States)

    Catarinucci, Luca; Colella, Riccardo; De Blasi, Mario; Patrono, Luigi; Tarricone, Luciano

    2012-12-01

    Radio Frequency Identification (RFID) technology is playing a crucial role for item-level tracing systems in healthcare scenarios. The pharmaceutical supply chain is a fascinating application context, where RFID can guarantee transparency in the drug flow, supporting both suppliers and consumers against the growing counterfeiting problem. In such a context, the choice of the most adequate RFID tag, in terms of shape, frequency, size and reading range, is crucial. The potential presence of items containing materials hostile to the electromagnetic propagation exasperates the problem. In addition, the peculiarities of the different RFID-based checkpoints make even more stringent the requirements for the tag. In this work, the performance of several commercial UHF RFID tags in each step of the pharmaceutical supply chain has been evaluated, confirming the expected criticality. On such basis, a guideline for the electromagnetic design of new high-performance tags capable to overcome such criticalities has been defined. Finally, driven by such guidelines, a new enhanced tag has been designed, realized and tested. Due to patent pending issues, the antenna shape is not shown. Nevertheless, the optimal obtained results do not lose their validity. Indeed, on the one hand they demonstrate that high performance item level tracing systems can actually be implemented also in critical operating conditions. On the other hand, they encourage the tag designer to follow the identified guidelines so to realize enhanced UHF tags.

  11. Chipless RFID reader architecture

    CERN Document Server

    Karmakar, Nemai Chandra; Kalansuriya, Prasanna

    2013-01-01

    In the era of information communication technology (ICT), radio frequency identification (RFID) has been going through tremendous development. RFID technology has the potential of replacing barcodes due to its large information carrying capacity, flexibility in operations, and applications. The deployment of RFID has been hindered by its cost. However, with the advent of low powered ICs, energy scavenging techniques, and low-cost chipless tags, RFID technology has achieved significant development. This book addresses the new reader architecture, presents fundamentals of chipless RFID systems,

  12. RFID-tekniikka kirjastoissa

    OpenAIRE

    Kivimäki, Petteri

    2010-01-01

    Tässä opinnäytetyössä tutustuttiin RFID-tekniikan toimintaperiaatteisiin ja sen käyttöön kirjastoympäristössä. Työssä käytiin läpi kirjastojen keskeisimmät tietojärjestelmät sekä niiden yhteistoiminta RFID-järjestelmän kanssa. Osana työtä kehitettiin RFID-järjestelmän ja kirjastojärjestelmän yhteiskäyttöä tehostava RFID Plugin -sovellus. RFID on radiotaajuuksiin perustuva langaton tekniikka tiedon etälukuun ja tallentamiseen. RFID-järjestelmät koostuvat neljästä peruskomponentista: tunnist...

  13. Chipless RFID transponder design

    OpenAIRE

    Balbin, Isaac

    2017-01-01

    Radio Frequency Identification (RFID) is a wireless data transmission and reception technology for automatic identification, asset tracking and security surveillance. RFID technology has gained momentum in market penetration, with both the US Department of Defense and retail giant Wal-Mart introducing mandatory tagging of goods in their supply chain. However, for large-scale RFID implementation, the cost of the systems cannot compete with optical barcodes. The main hindrance is the cost of th...

  14. RFID design principles

    CERN Document Server

    Lehpamer, Harvey

    2012-01-01

    This revised edition of the Artech House bestseller, RFID Design Principles, serves as an up-to-date and comprehensive introduction to the subject. The second edition features numerous updates and brand new and expanded material on emerging topics such as the medical applications of RFID and new ethical challenges in the field. This practical book offers you a detailed understanding of RFID design essentials, key applications, and important management issues. The book explores the role of RFID technology in supply chain management, intelligent building design, transportation systems, military

  15. RFID Malware: Truth vs. Myth

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The issues related to RFID malware along with proof-of-concept RFID virus are discussed. RFID exploits are traditionally hacking attacks that are identical to those found on Internet, such as buffer overflow, code insertion, and SQL injection attack. RFID warms copy the original exploit code to

  16. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  17. RFID Location Algorithm

    Directory of Open Access Journals (Sweden)

    Wang Zi Min

    2016-01-01

    Full Text Available With the development of social services, people’s living standards improve further requirements, there is an urgent need for a way to adapt to the complex situation of the new positioning technology. In recent years, RFID technology have a wide range of applications in all aspects of life and production, such as logistics tracking, car alarm, security and other items. The use of RFID technology to locate, it is a new direction in the eyes of the various research institutions and scholars. RFID positioning technology system stability, the error is small and low-cost advantages of its location algorithm is the focus of this study.This article analyzes the layers of RFID technology targeting methods and algorithms. First, RFID common several basic methods are introduced; Secondly, higher accuracy to political network location method; Finally, LANDMARC algorithm will be described. Through this it can be seen that advanced and efficient algorithms play an important role in increasing RFID positioning accuracy aspects.Finally, the algorithm of RFID location technology are summarized, pointing out the deficiencies in the algorithm, and put forward a follow-up study of the requirements, the vision of a better future RFID positioning technology.

  18. RFID Malware: Design Principles and Examples

    NARCIS (Netherlands)

    Rieback, M.R.; Simpson, P.N.D.; Crispo, B.; Tanenbaum, A.S.

    2006-01-01

    This paper explores the concept of malware for Radio Frequency Identification (RFID) systems - including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID

  19. Object Tracking with RFID

    Science.gov (United States)

    Yamada, Kou; Uchida, Seiichi; Taniguchi, Rin-Ichiro

    This paper reports a new method for visual tracking of humans using active RFID technology. Previous studies were based on the assumption that the radio intensity from an RFID tag will be linearly proportional to the distance between the tag and the antenna or will remain unchanged; however, in reality, the intensity fluctuates significantly and changes drastically with a small change in the environment. The proposed method helps to overcome this problem by using only accurate binary information that reveals whether the target person is close to the antenna. Several experimental results have shown that the information from the RFID tag was useful for reliable tracking of humans.

  20. RFID system in warehouse management

    OpenAIRE

    Stipančič, Vedran

    2014-01-01

    The goal of the thesis was to create an RFID system that enables traceability of products, tagged with RFID stickers or tags and overview of data on desktop or mobile devices. In the implementation of the RFID system, two applications were developed, called RFID Portal and SCM Portal. RFID Portal is a desktop application that operates an RFID door, which detects products, that arrive at a warehouse and leave it and temperatures in which they were kept. All the collected data is sent to the we...

  1. RFID system in warehouse management

    OpenAIRE

    STIPANČIČ, VEDRAN

    2014-01-01

    Cilj diplomske naloge je bila izdelava RFID sistema, ki v skladišču omogoča sledljivost produktov, označenih z RFID nalepkami oz. značkami in pregled na namiznih ali mobilnih napravah. Za izdelavo RFID sistema sta bili razviti dve aplikaciji, imenovani RFID Portal in SCM Portal. RFID Portal je namizna aplikacija, ki upravlja z RFID vrati. Ta zaznavajo produkte, ki prihajajo v skladišče in ga zapuščajo ter temperature v katerih so bili shranjeni. Vsi tako zbrani podatki so poslani spletni apli...

  2. The Evolution of RFID Security

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home

  3. Attacks on RFID Identification Systems

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-09-01

    Full Text Available This article is about attacks on RFID systems. Currently antivirus developers are not developing systems that protect from viruses that could exist on RFID tags. Such viruses are considered as not existing because the RFID tag memory is very small. Unfortunately such viruses exist. This article is concerned to such viruses and attacks that hackers could do using such viruses. Based on this article methods to prevent RFID-viruses attacks could be developed.

  4. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  5. Managing RFID sensors networks with a general purpose RFID middleware.

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  6. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  7. Miniaturizing RFID for magnamosis.

    Science.gov (United States)

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag.

  8. RFID design fundamentals and applications

    CERN Document Server

    Lozano-Nieto, Albert

    2010-01-01

    RFID is an increasingly pervasive tool that is now used in a wide range of fields. It is employed to substantiate adherence to food preservation and safety standards, combat the circulation of counterfeit pharmaceuticals, and verify authenticity and history of critical parts used in aircraft and other machinery-and these are just a few of its uses. Goes beyond deployment, focusing on exactly how RFID actually worksRFID Design Fundamentals and Applications systematically explores the fundamental principles involved in the design and characterization of RFID technologies. The RFID market is expl

  9. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  10. RFID added value sensing capabilities

    DEFF Research Database (Denmark)

    Anggorjati, B.; Çetin, K.; Mihovska, A.

    2010-01-01

    Radio frequency identification (RFID) is a key technology for Europe. Since the initial emergence of the technology, there has been a noticeable shift away from RFID pilot projects of the early days, towards a broad deployment of RFID in order to increase the efficiency and innovation of processes....... Even though Europe is a leading player in the world of RFID technology, several challenges need to be addressed in order for RFID to reach its full potential. The funded under FP7 ICT project ASPIRE is one of the coordinated European efforts to further the advancement of this technology, in the areas...... of enabling technology development for RFID. In particular, the focus of ASPIRE is on design, development and adoption of an innovative, programmable, royalty-free, lightweight and privacy friendly RFID middleware....

  11. Radio frequency identification and sensors from rfid to chipless RFID

    CERN Document Server

    Perret, Etienne

    2014-01-01

    This book deals with the field of identification and sensors, more precisely the possibility of collecting information remotely with RF waves (RFID). The book introduces the technology of chipless RFID starting from classical RFID and barcode, and explores the field of identification and sensors without wire, without batteries, without chip, and with tags that can even be printed on paper. A technique for automatic design of UHF RFID tags is presented , aiming at making the tags as insensitive as possible to the environment (with the ability to increase the reading range reliability), or, co

  12. RFID solution benefits Cambridge hospital.

    Science.gov (United States)

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals.

  13. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  14. Indoor localization using passive RFID

    Science.gov (United States)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Segou, Olga E.; Mitilineos, Stelios A.; Thomopoulos, Stelios C. A.

    2011-06-01

    Radio frequency identification (RFID) systems based on passive tags are used successfully in a wide range of object identification applications. However, the increasing needs to meet new demands on applications of localization and tracking create a new field for evolution of the RFID technology. This paper presents the design, implementation, and evaluation of a cost-effective localization system for in-building usage that is able to localize objects that carry passive RFID tags. The RFID reading is performed by a single Reader and an array of directional antennas through multiplexing. Evaluation and experimental results from three localization algorithms based on RSSI are presented.

  15. Decoding Patent Information Using Patent Maps

    OpenAIRE

    Liu, Chen-Yuan; Yang, James Chingyu

    2008-01-01

    Patent information is a derivative product from the legal patent system. This information, which includes patent applications, patent descriptions, patent gazettes, patent abstracts, and patent data, is prepared in exact compliance with the regulations and specifications of the patent acts. Patent information, different from other published circulating information, is legally well protected. For convenience, this study classifies patent information into bibliographic and numeric data to creat...

  16. Factors affecting RFID adoption in the agricultural product distribution industry: empirical evidence from China.

    Science.gov (United States)

    Shi, Ping; Yan, Bo

    2016-01-01

    We conducted an exploratory investigation of factors influencing the adoption of radio frequency identification (RFID) methods in the agricultural product distribution industry. Through a literature review and field research, and based on the technology-organization-environment (TOE) theoretical framework, this paper analyzes factors influencing RFID adoption in the agricultural product distribution industry in reference to three contexts: technological, organizational, and environmental contexts. An empirical analysis of the TOE framework was conducted by applying structural equation modeling based on actual data from a questionnaire survey on the agricultural product distribution industry in China. The results show that employee resistance and uncertainty are not supported by the model. Technological compatibility, perceived effectiveness, organizational size, upper management support, trust between enterprises, technical knowledge, competitive pressure and support from the Chinese government, which are supported by the model, have significantly positive effects on RFID adoption. Meanwhile, organizational size has the strongest positive effect, while competitive pressure levels have the smallest effect. Technological complexities and costs have significantly negative effects on RFID adoption, with cost being the most significantly negative influencing factor. These research findings will afford enterprises in the agricultural products supply chain with a stronger understanding of the factors that influence RFID adoption in the agricultural product distribution industry. In addition, these findings will help enterprises remain aware of how these factors affect RFID adoption and will thus help enterprises make more accurate and rational decisions by promoting RFID application in the agricultural product distribution industry.

  17. Untangling RFID Privacy Models

    Directory of Open Access Journals (Sweden)

    Iwen Coisel

    2013-01-01

    Full Text Available The rise of wireless applications based on RFID has brought up major concerns on privacy. Indeed nowadays, when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of the RFID application with a model. However, if the chosen model does not reflect the assumptions and requirements of the analyzed application, it may misevaluate its privacy level. Therefore, selecting the most appropriate model among all the existing ones is not an easy task. This paper investigates the eight most well-known RFID privacy models and thoroughly examines their advantages and drawbacks in three steps. Firstly, five RFID authentication protocols are analyzed with these models. This discloses a main worry: although these protocols intuitively ensure different privacy levels, no model is able to accurately distinguish them. Secondly, these models are grouped according to their features (e.g., tag corruption ability. This classification reveals the most appropriate candidate model(s to be used for a privacy analysis when one of these features is especially required. Furthermore, it points out that none of the models are comprehensive. Hence, some combinations of features may not match any model. Finally, the privacy properties of the eight models are compared in order to provide an overall view of their relations. This part highlights that no model globally outclasses the other ones. Considering the required properties of an application, the thorough study provided in this paper aims to assist system designers to choose the best suited model.

  18. RFID TECHNOLOGY: AN OVERVIEW

    OpenAIRE

    Amit Kumar Pal; Akanksha Tripathi; Anupam Saigal

    2017-01-01

    The information technology has changed the way library professional to interact, communicate, share and acquire knowledge. However, when the computer was created it did not have features and facilities for users to interact. With the evaluation of Internet and Communication Technology, manual library has evolved into a dynamic, interactive and collaborative platform that facilitates exchange of knowledge and information among its users. RFID is the latest technology to be used in libraries an...

  19. Cutting Edge RFID Technologies for NASA Applications

    Science.gov (United States)

    Fink, Patrick W.

    2007-01-01

    This viewgraph document reviews the use of Radio-frequency identification (RFID) for NASA applications. Some of the uses reviewed are: inventory management in space; potential RFID uses in a remote human outpost; Ultra-Wideband RFID for tracking; Passive, wireless sensors in NASA applications such as Micrometeoroid impact detection and Sensor measurements in environmental facilities; E-textiles for wireless and RFID.

  20. RFID Application in the Supply Chain

    Directory of Open Access Journals (Sweden)

    Evelin Vatovec Krmac

    2006-11-01

    Full Text Available This paper analyses the possibilities and ways of utilizingRFID as a tool for more effective supply and logistics chainmanagement. It focuses on RFID technology used within andacross logistics processes and it looks to RFID as one of thepossibilities for automating logistics processes. The benefitsand implications of RFID technology implementation in thesupply chain are illumined.

  1. Dairy cow monitoring by RFID

    Directory of Open Access Journals (Sweden)

    Stevan Stankovski

    2012-02-01

    Full Text Available Dairy cows identification and monitoring on small cattle farms are usually based on the utilization of barcode technology. This kind of identification technology is unsuitable for dairy cows milking and feeding process automation. Radio Frequency Identification (RFID technology is a better solution in this case. This paper describes the research and implementation of the milking cycle´s automated monitoring with the use of RFID tags conducted on a small cattle farm in the Republic of Serbia. This solution is based on RFID system which consists of two parts. First part includes control box, two Ultra High Frequency (UHF RFID readers operating at frequency of 915 MHz and RFID tags glued onto the dairy cow ear labels. Second part includes software modules for acquisition and collecting data from RFID tags to build up an archive due to supervision and analysis of the milking cycle. Reading accuracy of RFID system in the observed period was 99.8 % in average. A group of dairy cows having a settled milking cycle within an interval of 12h ± 5 % had a 1.5 % better yield and a 0.08 better quality in comparison with a group of dairy cows having a milking cycle variance higher than 20 %. RFID system implemented in described way can be easily integrated into a new or existing farm management system in order to have better production results which depend on several factors including settled milking cycles.

  2. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  3. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  4. Outdoor Education Support System with Location Awareness Using RFID and Symbology Tags

    Science.gov (United States)

    Osawa, Noritaka; Noda, Katsuji; Tsukagoshi, Satoru; Noma, Yutaka; Ando, Akikazu; Shibuya, Tomoharu; Kondo, Kimio

    2007-01-01

    A support system for outdoor learning using exploratory observation was developed. The system uses radio frequency identification (RFID) tags and two-dimensional (2D) symbology tags to locate positions on a horticultural farm and its surrounding forests. Students were able to get a location-dependent description and an educational hint for…

  5. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  6. Commercial Product Activation Using RFID

    Science.gov (United States)

    Jedrey, Thomas

    2008-01-01

    Radio-frequency identification (RFID) would be used for commercial product activation, according to a proposal. What is new here is the concept of combining RFID with activation - more specifically, using RFID for activating commercial products (principally, electronic ones) and for performing such ancillary functions as tracking individual product units on production lines, tracking shipments, and updating inventories. According to the proposal, an RFID chip would be embedded in each product. The information encoded in the chip would include a unique number for identifying the product. An RFID reader at the point of sale would record the number of the product and would write digital information to the RFID chip for either immediate activation of the product or for later interrogation and processing. To be practical, an RFID product-activation system should satisfy a number of key requirements: the system should be designed to be integrable into the inventory-tracking and the data-processing and -communication infrastructures of businesses along the entire supply chain from manufacture to retail; the system should be resistant to sophisticated hacking; activation codes should be made sufficiently complexity to minimize the probability of activating stolen products; RFID activation equipment at points of sale must be capable to two-way RF communication for the purposes of reading information from, and writing information to, embedded RFID chips; the equipment at points of sale should be easily operable by sales clerks with little or no training; the point-of-sale equipment should verify activation and provide visible and/or audible signals indicating verification or lack thereof; and, the system should be able to handle millions of products per year with minimal human intervention, among other requirements.

  7. Introduction of circuit design on RFID system

    International Nuclear Information System (INIS)

    Pak, Sunho

    2007-06-01

    This is a case of research of Fujitsu company and design of basic circuit of electronic technique. It is composed of two parts. The first part deals with introduction of RFID system design, which lists basic knowledge of ubiquitous, glossary of high frequency, design of impedance matching circuit, RFID system, sorts and design of filter, modulator and a transmission and RFID system design. The second part deals with research and development of Fujitsu company, including RFID middle ware RFID CONNECT of Fujitsu, sensor network of Fujitsu and high handing technique of RFID system.

  8. Potentials of RFID Application in Retailing

    DEFF Research Database (Denmark)

    Foscht, Thomas; Kotzab, Herbert; Maloles III, Cesar

    2008-01-01

    The willingness of retailers to adopt RFID systems, as well as finding optimal RFID applications has yet not been investigated. This paper examines the issues associated with the RFID adoption based on the results of a conjoint analysis. The conjoint measurement looked at the trade-off decisions...... among different possible set-ups of RFID applications in retailing companies. Considerable willingness to adopt, but low diffusion and a structure of preferences with respect to RFID features was shown throughout the examined retailing companies. Furthermore, differences were shown among different types...... of retailers in their preferences for RFID system features and clusters were implied....

  9. Security in RFID and sensor networks

    CERN Document Server

    Kitsos, Paris

    2009-01-01

    Security in RFIDMulti-Tag RFID Systems, L. Bolotnyy and G. RobinsAttacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. RibagordaRFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. NevinsPhysical Privacy and Security in RFID Systems, L. Bolotnyy and G. RobinsAuthentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. TomaševicLightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C.

  10. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  11. Patent office Governance and Patent System Quality

    OpenAIRE

    Bruno Van Pottelsberghe; Pierre M. Picard

    2011-01-01

    The present paper discusses the role of quality in patent systems from the perspective of patent offices' behavior and organization. After documenting original stylized facts, the paper presents a model in which patent offices set patent fees and the quality level of their examination processes. Various objectives of patent offices' governors are considered. We show that the quality of the patent system is maximal for the patent offices that maximises either the social welfare or its own prof...

  12. Small Form Factor RFID Applicator, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed development of a small form factor Astrobee dedicated RFID label applicator will allow current and future free flying vehicles to place RFID labels...

  13. RFID in Libraries: Standards and Interoperability

    OpenAIRE

    Hopkinson, Alan

    2007-01-01

    RFID needs standards to ensure interoperability so that systems can survive a change in library system and use RFID in inter-library lending between libraries with different systems. Efforts are under way to develop ISO standards to achieve this.

  14. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We

  15. Explorando los Impactos de la RFID en los Procesos de Negocios de una Cadena de Suministro

    Directory of Open Access Journals (Sweden)

    Ygal Bendavid

    2006-10-01

    Full Text Available The main purpose of this exploratory study is to improve our understanding of the potential of RFID technology in the context of selected activities in one specific supply chain in the utility industry. Empirical data was gathered from two closely inter-related firms from three layers of the supply chain. A research approach is proposed where we aim to identify RFID opportunities, build potential scenarios and validate these scenarios through laboratory simulation. Results indicate that the adoption of RFID technology allows i the development of new business models, ii the integration of processes, and iii the reengineering and automation of existing processes, facilitating supply chain integration and B-to-B e-commerce activities.

  16. Indoor Robot Localisation with Active RFID

    Directory of Open Access Journals (Sweden)

    Wei Wei

    2012-07-01

    Full Text Available Radio Frequency Identification (RFID is a technology of location determination and data capture. An RFID based system relies on the interaction between readers (also known as interrogator and tags (transponders. Active RFID technology is suitable for tracking costly assets or moving objects such as mobile robots. Once affixed with RFID tags, a robot can be localised. However, there is a tendency for accuracy to vary greatly as well as delay in readings. Those problems may be enlarged in real time applications. This paper provides an overview of implementing RFID in precision tracking of mobile robots.

  17. A Detailed Survey on Various Tracking Methods Using RFID

    OpenAIRE

    S. Arivarasi; S. Krishna Anand

    2013-01-01

    RFID, a wide range of technology is replaced instead of barcode. When multiple RFID readers find a single RFID tag at same time, duplicates occur. The main objective is to eliminate duplicates in RFID data. Designing an exact duplicate elimination method is very difficult. This paper presented a detailed analysis of tracking, monitoring, managing and filtering mechanisms for RFID data.

  18. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  19. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  20. Extended-Range Passive RFID and Sensor Tags

    Science.gov (United States)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  1. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  2. IRCICA Library UHF RFID Solutions

    Directory of Open Access Journals (Sweden)

    Abdullah Topaloğlu

    2011-03-01

    Full Text Available This article was written with the intention of informing our fellow colleagues about the implementation of UHF RFID (Ultra High Frequency Radio-Frequency Identification which, we think, will be used by libraries all around the world in the future and sharing applications and findings of the archival and documentation section of IRCICA on the subject. IRCICA library has formed the UHF RFID system to find various materials in a reliable and expedient way, to do its counting in a consistent and rapid manner, as well as labeling and controlling various items, controlling and documenting the check-ins and check-outs from the library and setting up a secure and effective circulation of materials within the library. The application of UHF RFID technology has become widespread in the libraries around the world since 2006. As we can surmise from this, the application of UHF RFID technologies is a relatively new step. It would be safe to say that our country has sufficient experience in the application of the mentioned technology and it is even ahead of some library applications in many developed countries.

  3. RFID gaat belangrijke rol spelen

    NARCIS (Netherlands)

    Luitjes, H.

    2004-01-01

    Radio Frequency Identification technology (RFID), de opvolger van de streepjescode, gaat in de verslogistiek een belangrijke rol spelen. Dat stelt dr. Henri Luitjes, hoofd van de afdeling verpakken, transport en logistiek van Wageningen UR. Ingegaan wordt op begrippen als shell life, derving,

  4. Group Management Method of RFID Passwords for Privacy Protection

    Science.gov (United States)

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.

  5. Pemanfaatan Sistem RFID sebagai Pembatas Akses Ruangan

    Directory of Open Access Journals (Sweden)

    HENDI HANDIAN RACHMAT

    2016-02-01

    Full Text Available ABSTRAK Pada penelitian ini, sistem RFID (Radio Frequency Identification dimanfaatkan sebagai kartu identifikasi personal pada sistem akses ruangan. Keberadaan sistem ini ditujukan untuk menjaga keamanan dan privasi ruangan dari seseorang yang tidak memiliki otoritas untuk memasuki ruangan tersebut. Melalui perancangan dan implementasi sistem akses ruangan ini, dilakukan evaluasi sistem kerja kunci elektrik berbasis komponen solenoid serta jarak dan posisi optimal pembacaan RFID tag guna memberikan kenyamanan pada pengguna ketika mengakses ruangan. RFID tag yang dipergunakan dalam sistem ini berbentuk kartu tipe EM4001 dan menyimpan kode unik yang digunakan sebagai identifikasi personal. Kode ini dibaca oleh RFID reader tipe ID-12 dan divalidasi otoritasnya dengan mikrokontroler ATMega32 untuk mengatur sistem kerja kunci elektrik yang dirancang sendiri menggunakan solenoid. Sistem ini dilengkapi pula dengan sistem database untuk pencatatan pengguna yang mengakses ruangan. Dari hasil pengujian, seluruh (100% RFID tag dapat dikenali oleh RFID reader dalam tiga posisi berbeda dengan jarak optimal sejauh 5 cm (vertikal dan 2 cm (horisontal. Keseluruhan (100% aktifitas pengguna yang mengakses ruangan dapat tercatat dalam sistem database. Hasil penelitian ini dapat disimpulkan bahwa teknologi RFID dapat digunakan secara nyaman dan aman sebagai alternatif sistem identifikasi personal untuk sistem akses ruangan. Kata Kunci : kunci elektrik, RFID, sistem akses ruangan, sistem database, solenoid. ABSTRACT In this research, RFID system was utilized as a personal identification security card in access room system. This system was aimed to secure a room and to have privacy from unauthorized person to enter the room. By designing and implementing the system, a solenoid based electric key system as well as an optimal distance and position of RFID tag were evaluated to know the most convenience condition for all users during accessing the room. RFID tag used in

  6. Handbook of smart antennas for RFID systems

    CERN Document Server

    2010-01-01

    The Handbook of Smart Antennas for RFID Systems is a single comprehensive reference on the smart antenna technologies applied to RFID. This book will provide a timely reference book for researchers and students in the areas of both smart antennas and RFID technologies. It is the first book to combine two of the most important wireless technologies together in one book. The handbook will feature chapters by leading experts in both academia and industry offering an in-depth description of terminologies and concepts related to smart antennas in various RFID systems applications.

  7. How patent experts create patent breadth

    DEFF Research Database (Denmark)

    Beukel, Karin

    2018-01-01

    Science as an input to patented inventions is a fundamental of economic growth. However, our understanding of how science is transformed into patents is limited. In the present paper I seek to fill this gap by examining the micro-foundations of science-patent transformations. Using an inductive......, grounded theory approach to study the transformation of 12 scientific discoveries into patents I recast the relationship between science and patents: I show it as a particular process that affects patent breadth. Exploiting surplus patent breadth depends on the processes of abstraction and cognitive...... variety, which can be mobilized by patenting experts. The theory is tested using a recently published algebraic interpretive method for examining causal relationships in small-N studies....

  8. How patent experts create patent breadth

    DEFF Research Database (Denmark)

    Beukel, Karin

    2014-01-01

    Science as an input to patented inventions is a fundamental of economic growth. However, our understanding of how science is transformed into patents is limited. In the present paper I seek to fill this gap by examining the micro-foundations of science-patent transformations. Using an inductive......, grounded theory approach to study the transformation of 12 scientific discoveries into patents I recast the relationship between science and patents: I show it as a particular process that affects patent breadth. Exploiting surplus patent breadth depends on the processes of abstraction and cognitive...... variety, which can be mobilized by patenting experts. The theory is tested using a recently published algebraic interpretive method for examining causal relationships in small-N studies....

  9. Theory and application on RFID

    International Nuclear Information System (INIS)

    Cho, Dae Jin

    2005-02-01

    This book tells of definition, system, operation method and classification of RFID, prospect of market, tag such as types, making process of tag, operation way and structure of tag, store of tag data and tag price, chip less tag like leader, antenna ; EPC global such as appearance of Auto-ID center, introduction of EPC system, middle ware, ONS, EPC IS and PML, a manufacturer, standardization, frequency, application cases abroad home, problems and labeling.

  10. RFID: the security for library

    OpenAIRE

    Pattanaik, Bibhuti-Bhusan; Pattnaik, Babita

    2007-01-01

    Radio frequency identification (RFID) technology, a surveillance system promises to relieve repetitive strain injury, and improving safety, security, productivity, accuracy and convenience for communities working in various sectors. This Dedicated short-range communication (DSRC) system has been used in library for multiple purposes; such as automatic identification, tracking and management of material flow. It has also provided an additional advantage to Bar-code technology. In this article ...

  11. Evaluation of Group Management of RFID Passwords for Privacy Protection

    OpenAIRE

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    2010-01-01

    RFID privacy problems will have to be solved before items with RFID tags can be safely provided to consumers on a large scale. Here, we considered the location privacy problem of unauthorized persons or agents being able to trail a person by tracing a unique ID recorded in an attached RFID tag. We proposed a method for using RFID tags that include an interrogator with an algorithm to generate RFID passwords. This method groups RFID passwords for RFID tags in a way that protects consumer priva...

  12. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  13. RFID in Retail: New approaches, new viewpoints

    NARCIS (Netherlands)

    Sander de Ridder; Jan Kroon; drs. Frans van den Reep; Christian Vrijlandt

    2008-01-01

    RFID technology is a promising technology currently finding its way into the field of customer interaction strategy, supply chain accuracy and inventory management. Primarily, RFID tags are seen as substitutes of traditional barcodes, yet they can add a lot of value and functionality. Where barcodes

  14. Orientation Sensing Using Multiple Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    Knowing the inclination of an object can be valuable information in a supply chain application, e.g. when handling orientation sensitive objects. In this work we present a method for sensing the inclination using Radio Frequency IDentification (RFID) technology. The method requires standard RFID...

  15. Optimalization of selected RFID systems Parameters

    Directory of Open Access Journals (Sweden)

    Peter Vestenicky

    2004-01-01

    Full Text Available This paper describes procedure for maximization of RFID transponder read range. This is done by optimalization of magnetics field intensity at transponder place and by optimalization of antenna and transponder coils coupling factor. Results of this paper can be used for RFID with inductive loop, i.e. system working in near electromagnetic field.

  16. Smart Idlers : RFID in conveyor belt monitoring

    NARCIS (Netherlands)

    Pang, Y.

    2012-01-01

    Radio Frequency Identifi cation (RFID) is a technology that offers unique identifi cation of objects and processes. It can actively or passively communicate and, in combination with sensors, it can capture more detailed physical information. RFID technology has been integrated into our daily life.

  17. Temporal and Location Based RFID Event Data Management and Processing

    Science.gov (United States)

    Wang, Fusheng; Liu, Peiya

    Advance of sensor and RFID technology provides significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management. RFID data are temporal and history oriented, multi-dimensional, and carrying implicit semantics. Moreover, RFID applications are heterogeneous. RFID data management or data warehouse systems need to support generic and expressive data modeling for tracking and monitoring physical objects, and provide automated data interpretation and processing. We develop a powerful temporal and location oriented data model for modeling and queryingRFID data, and a declarative event and rule based framework for automated complex RFID event processing. The approach is general and can be easily adapted for different RFID-enabled applications, thus significantly reduces the cost of RFID data integration.

  18. KUNCI PINTU OTOMATIS MENGGUNAKAN APLIKASI RFID CARD

    Directory of Open Access Journals (Sweden)

    Dewa Made Wiharta

    2009-05-01

    Full Text Available Aplikasi Radio Frequency Identification (RFID banyak dikembangkan dewasa ini. Salah satu  aplikasi RFID yang dikembangkan disini adalah sebagai kunci pintu otomatis. RFID Reader digunakan untuk membaca ID yang terdapat pada kartu EM4100. Reader bekerja pada level tegangan 5V DC dengan frekuensi 125 KHz. Koneksi RFID Reader menggunakan media udara (wireless. Saat RFID tag didekatkan pada Reader maka reader akan membaca ID yang terdapat pada kartu. Output Reader merupakan input pada microcontroller AT89C51. Format data keluaran yang digunakan adalah ABA Track2 10 Desimal. Input data dari RFID  Reader akan dibaca, disimpan, dan dibandingkan. Output dari microcontroller dihubungkan pada transistor PNP 9012 yang digunakan sebagai saklar dan  terhubung dengan relay untuk menggerakkan kunci. Keadaan awal relay dan transistor adalah normally close dan cut-off, dan bekerja secara flip – flop sesuai dengan input dari microcontroller.

  19. RFID Data Cleaning for Shop Floor Applications

    Science.gov (United States)

    Ziekow, Holger; Ivantysynova, Lenka; Günter, Oliver

    In several case studies we found that shop-floor applications in manufacturing pose special challenges to cleaning RFID data. The underlying problem in many scenarios is the uncertainty about the exact location of observed RFID tags. Simple filter s provided in common middleware solutions do not cope well with these challenges. Therefore we have developed an approach based on maximum-likelihood estimation to infer a tag's location within the reader range. This enables improved RFID data cleaning in a number of application scenarios. We stress the benefits of our approach along exemplary application scenarios that we found in manufacturing. In simulations and experiments with real world data we show that our approach outperforms existing solutions. Our approach can extend RFID middleware or reader firmware, to improve the use of RFID in a range of shop-floor applications.

  20. RFID reader immunity test against electrostatic discharge

    Directory of Open Access Journals (Sweden)

    Pospisilik Martin

    2016-01-01

    Full Text Available This paper provides a description of an immunity test against the electrostatic discharge according to the standard EN 61000-4-2 that was applied to an RFID reader. The RFID reader was primarily developed for access systems, employing the on-board recognition of the RFID tags. The results obtained by the test are described hereby as well as the discussion on the security of this solution. The results of this experiment are beneficial for the developers of RFID devices, as these devices are endangered by the electrostatic discharge brought by their users. The hereby described results also shown a security hole in a simple access system based on the RFID technology. Details can be found in the paper.

  1. Localization and tracking of passive RFID tags

    Science.gov (United States)

    Zhang, Yimin; Amin, Moeness G.

    2006-05-01

    Radio frequency identification (RFID) is poised for growth as businesses and governments explore applications implementing RFID. The RFID technology will continue to evolve to meet new demands for human and target location and tracking. In particular, there are increasing needs to find and track the positions of multiple RFID tagged items that are closely spaced. As a result, localization and tracking techniques with higher accuracy, yet low implementation complexity are required. This paper examines the applicability of direction-of-arrival (DOA) estimation methods to the localization and tracking problems of passive RFID tags. Different scenarios of stationary and moving targets are considered. It is shown through performance analysis and simulations that simple DOA estimation methods can be used to provide satisfactory localization performance.

  2. RFID technology for human implant devices

    Science.gov (United States)

    Aubert, Hervé

    2011-09-01

    This article presents an overview on Radio Frequency Identification (RFID) technology for human implants and investigates the technological feasibility of such implants for locating and tracking persons or for remotely controlling human biological functions. Published results on the miniaturization of implantable passive RFID devices are reported as well as a discussion on the choice of the transmission frequency in wireless communication between a passive RFID device implanted inside human body and an off-body interrogator. The two techniques (i.e., inductive coupling and electromagnetic coupling) currently used for wirelessly supplying power to and read data from a passive implantable RFID device are described and some documented biomedical and therapeutic applications of human RFID-implant devices are finally reported.

  3. A Study on Pig Slaughter Traceability Solution Based on RFID

    OpenAIRE

    Luo, Qingyao; Xiong, Benhai; Geng, Zhi; Yang, Liang; Pan, Jiayi

    2010-01-01

    International audience; Due to an assembly line production and poor environment conditions in pig slaughterhouses, collection of slaughter tracing information is not a simple thing. Based on the UHF radio frequency identification (RFID) technologies, this study designed a RFID tag for carcass, a RS232-PS2 data conversion line and some data norms such as the RFID carcass tag and partition meat label norm, and developed online reading and writing system for RFID tags, accomplished RFID identifi...

  4. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    OpenAIRE

    Iwan Vanany; Awaluddin Bin Mohamed Shaharoun

    2009-01-01

    This paper explores the benefit and barriers of RFID (Radio Frequency Identification) technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and...

  5. A lattice based authentication for low-cost RFID

    OpenAIRE

    EL MOUSTAINE, Ethmane; LAURENT, Maryline

    2012-01-01

    International audience; Security and privacy are major threats for the RFID technology today. First, the RFID passive tags prevailing in most of the RFID applications are very limited in processing power, so they cannot perform complex computations. Second, there are no RFID authentication protocols that can support both scalability and privacy at low complexity cost. In this paper, we present an adaptation of NTRU public cryptosystem for low-cost RFID tags and new efficient asymmetrical chal...

  6. Critical elements and lessons learnt from the implementation of an RFID-enabled healthcare management system in a medical organization.

    Science.gov (United States)

    Ting, S L; Kwok, S K; Tsang, Albert H C; Lee, W B

    2011-08-01

    Healthcare services are complex and life-critical. One mistake in any procedure may lead to irremediable consequences; numerous researchers, thus, introduce information and communication technology to improve quality of services and enhance patient safety by reducing the medical errors. Radio frequency identification (RFID) is considered as one of the emerging tool assist in meeting the challenges of the present situation. In recent years, RFID has been applied in medical organizations for the purpose of managing and tracking medical equipment, monitoring and identifying patients, ensuring that the right medication is given to the right patient, and preventing the use of counterfeit medicine. However, most of the existing literature focuses on demonstrating how RFID can benefit the healthcare industry, whereas little attention has been given to the management issues involved in constructing an RFID project in medical organizations. In this paper, an exploratory case study is conducted in a medical organization to illustrate the development framework and critical issues that should be taken into consideration in the preparation, implementation and maintenance stage of constructing such a project. All the experiences and results discussed in this paper offer valuable and useful insights to steer those who would like to start their journey using RFID in medical organizations.

  7. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  8. The State of RFID Applications in Libraries

    Directory of Open Access Journals (Sweden)

    Jay Sing

    2006-03-01

    Full Text Available The adoption of Radio Frequency Identification (RFID technology by libraries promises a solution that could make it possible to inventory hundreds of thousands of items in their collections in days instead of months. In addition, it would allow patrons to check out and return library property automatically at any time of the day. Besides speeding up checkouts, keeping collections in better order, and alleviating repetitive strain injuries among librarians, RFID promises to provide a better control on theft, nonreturns, and misfiling of a library’s assets. With an estimated 35 million library items tagged worldwide in more than three hundred libraries, this technology is generating ever-increasing interest. In October and November 2004, the industrial technology department and the Robert E. Kennedy Library at Cal Poly State University, San Luis Obispo, surveyed participating libraries, RFID electronic discussion groups, and Library and Information Technology Association (LITA-L electronic discussion group subscribers to collect information with regards to the implementation of RFID systems in libraries. Opinions were gathered regarding such topics, actual or estimated, as RFID implementation costs and time; the impact of the technology on operations such as handling of volumes and security; and RFID system features adopted such as conversion stations, self-checkout units, and security systems. Information on the various RFID library components and the results from the survey are presented in this paper.

  9. Review on security issues in RFID systems

    Directory of Open Access Journals (Sweden)

    Mohamed El Beqqal

    2017-12-01

    Full Text Available Radio frequency Identification (RFID is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology brings out many challenges and concerns still not being attracting more and more researchers especially the security and privacy issues. In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify for each work which part of the RFID system is being secured, the solutions and the techniques used besides the conformity to RFID standards. Finally, we present briefly a solution that consists of combining RFID with smartcard based biometric to enhance security especially in access control scenarios. Hence the result of our study aims to give a clear vision of available solutions and techniques used to prevent and secure the RFID system from specific threats and attacks.

  10. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  11. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  12. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear w

  13. RFID Security: Tradeoffs between Security and Efficiency

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Michael Østergaard

    2008-01-01

    We propose a model and definition for anonymous (group) identification that is well suited for RFID systems. This is based on the definition of Juels and Weis of strong privacy for RFID tags, where we add requirements for completeness and soundness. We also propose a weaker and more realistic...... definition of privacy. For the case where tags hold independent keys, we prove a conjecture by Juels and Weis, namely in a strongly private and sound RFID system using only symmetric cryptography, a reader must access virtually all keys in the system when reading a tag. It was already known from work...

  14. USING OF RFID TECHNOLOGY IN MAINTENANCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2015-06-01

    Full Text Available Automated data collection helps to improve the precision of decision-making processes. Currently, the radio frequency identification technology belongs to the most common application in the field of identification technology. In the world, the implementation of RFID technology is used in almost all areas of industry. RFID tags allow to use of the different products and materials applications. The article provides an overview of using this technology to record and register maintenance intervals of railway wagons. The application of RFID technology helps to avoid huge disasters and accidents caused by lack of information about the technical state of rail freight wagons.

  15. 37 CFR 1.5 - Identification of patent, patent application, or patent-related proceeding.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Identification of patent, patent application, or patent-related proceeding. 1.5 Section 1.5 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL RULES OF PRACTICE IN PATENT...

  16. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  17. Patent Assessment Quality

    DEFF Research Database (Denmark)

    Burke, Paul F.; Reitzig, Markus

    2006-01-01

    of the patent office is one important dimension, particularly in new patenting areas (emerging technologies). In order to understand whether patent offices appear capable of providing consistent assessments of a patent's technological quality in such novel industries from the beginning, we study the concordance...... of the European Patent Office's (EPO's) granting and opoposition decisions for individual patents. We use the historical example of biotech patens filed between 1978 until 1986, the early stage of the industry. Our results indicate that the EPO shows systematically different assessments of technological quality...

  18. Litigation-proof patents: avoiding the most common patent mistakes

    National Research Council Canada - National Science Library

    Goldstein, Larry M

    2014-01-01

    "Litigation-Proof Patents: Avoiding the Most Common Patent Mistakes explains the principles of excellent patents, presents the ten most common errors in patents, and details a step-by-step method for avoiding these common errors...

  19. Modern evaluation of patents

    Science.gov (United States)

    Ignat, V.

    2016-08-01

    The number of patents is not so important as the market value. The market value is especially important for licensing of patents, make-or-buy decisions for technology procurement, corporate finance. Patents can be used as collateral for financing. Patents and credit approvals: without patents only 46% and with patents 54%. The value share of knowledge-based components to industrial products already reached 50% and it is still rising. OECD called these developments under the slogan "knowledge economy”. German Norm-DIN 77100 provides a working method for monetary evaluation of a patent. The value of a patent arises from its use. A patent can be used to protect or to earn licensing revenues. An evaluation expertise is required in areas, such as marketing, finance, R & D and strategic planning. As an indicator of the value of a patent is often used the number of citations. The number of a patent citation refers to its meaning and value. Other indicators would be: size of the patent family, validity of the patent, result of objections against patent application, number and quality of claims. The analysis of 9.000 patents resulted that only 7.2% worth over 10 million euro and 68% below 1 million euro. The cost method: it is considered the cost that would be incurred for the development and patenting of a similar invention. The market method: are used the prices that have been achieved in comparable with recently transactions. The Income method: the potential reward is measured, which can arise from a patent. The evaluation will be in the following areas: legal status, technology, market conditions, finance and strategy. Each question relates to a different parameter of a value.

  20. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2014-06-01

    Full Text Available In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for traceability applications made with rewritable passive RFID tags. This paper aims to examine how RFID technology can be useful for traceability applications and will submit a diligent search regarding the degree of knowledge of RFID technology and the acceptance of an empirical model by the employees of Romanian companies.

  1. Applying RFID technology in nuclear materials management

    International Nuclear Information System (INIS)

    Tsai, H.; Chen, K.; Liu, Y.; Norair, J.P.; Bellamy, S.; Shuler, J.

    2008-01-01

    The Packaging Certification Program (PCP) of US Department of Energy (DOE) Environmental Management (EM), Office of Safety Management and Operations (EM-60), has developed a radio frequency identification (RFID) system for the management of nuclear materials. Argonne National Laboratory, a PCP supporting laboratory, and Savi Technology, a Lockheed Martin Company, are collaborating in the development of the RFID system, a process that involves hardware modification (form factor, seal sensor and batteries), software development and irradiation experiments. Savannah River National Laboratory and Argonne will soon field test the active RFID system on Model 9975 drums, which are used for storage and transportation of fissile and radioactive materials. Potential benefits of the RFID system are enhanced safety and security, reduced need for manned surveillance, real time access of status and history data, and overall cost effectiveness

  2. Lightweight Cryptography for Passive RFID Tags

    DEFF Research Database (Denmark)

    David, Mathieu

    2012-01-01

    In 2011, we are entering a decade where Radio Frequency IDentification (RFID) systems will become ubiquitous, slowly but surely replacing its old ancestor: the barcode. With the RFID technology come many advantages such as faster retailing, continuous control along the supply chain, real...... of a global adoption. In the past few years, an increasing number of researchers concentrates their efforts into providing secure solutions for RFID systems. After several attempts to integrate traditional cryptographic primitives into small, embedded, and extremely resource constrained devices, the results...... among the smallest in the published literature and aims at being implemented on printed electronics RFID tags. Then, we compare different cryptographic primitives based on their key parameters: throughput, area, power consumption and level of security. Our main concern is the integrability...

  3. Chipless RFID design procedure and detection techniques

    CERN Document Server

    Rezaiesarlak, Reza

    2015-01-01

    This book examines the design of chipless RFID systems. The authors begin with the historical development of wireless identification systems and finally arrive at a representation of the chipless RFID system as a block diagram illustration. Chapter 2 is devoted to the theoretical bases for the design of chipless RFID tags and detection techniques in the reader. A rigorous mathematical formulation is presented based on the singularity expansion method (SEM) and characteristic mode theory (CMT) in order to study the scattered fields from an object in a general form. Th e authors attempt to explain some physical concepts behind the mathematical descriptions of the theories in this chapter. In Chapter 3, two design procedures based on complex natural resonance and CMT are presented for the design of the chipless RFID tag. By studying the effects of structural parameters on radiation and resonant behaviors of the tag, some design conclusions are presented in this chapter. Chapter 4 is dedicated to the time-frequen...

  4. RFID Torque Sensing Tag System for Fasteners

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2016-01-01

    The present invention provides an RFID-based torque sensor that can be used to quickly monitor off the shelf fasteners including fasteners that are used in expensive satellites or other uses where fastener failure can be very costly. In one embodiment, an antenna, RFID ring and spring comprise a sensor tag that can be interrogated with an interrogation signal produced by an interrogator device. When sufficient torque is applied to the fastener, an RFID circuit is connected, and produces a radio frequency (RF) signal that can be read by the interrogator. In one embodiment, the RFID circuit does not transmit when the spring member is not compressed, thereby indicating insufficient tensioning of the fastener. The present invention offers the ability to remotely, quickly, and inexpensively verify that any number of fasteners are torqued properly upon initial installation. Where applicable, the present invention allows low cost monitoring over the life of the fastener.

  5. GNSS/RFID Active Transponder Design

    Directory of Open Access Journals (Sweden)

    Lukas Vojtech

    2015-01-01

    Full Text Available The paper describes a design of global navigation satellite system (GNSS/Radio frequency identification (RFID active transponder which is primarily designed for localization of objects as a part of localization system designated for efficient handling of situations with mass casualties. The precise localization is improved by differential GNSS. The block diagram of such GNSS/RFID active transponder is described including main operation procedures of the firmware. Measurement of the localization by algorithms of RTKLIB library and by algorithms of GNSS module is compared. Dynamic tests, i.e. GNSS/RFID active transponder placed in the moving car (50~kmph, and static tests, i.e. GNSS/RFID active transponder placed in the position for 15~min, are performed.

  6. GNSS/RFID Active Transponder Design

    OpenAIRE

    Lukas Vojtech; Jiri Skapa; Radoslav Bortel; Tomas Korinek; Marek Neruda; Jiri Hajek; Daniel Lopour

    2015-01-01

    The paper describes a design of global navigation satellite system (GNSS)/Radio frequency identification (RFID) active transponder which is primarily designed for localization of objects as a part of localization system designated for efficient handling of situations with mass casualties. The precise localization is improved by differential GNSS. The block diagram of such GNSS/RFID active transponder is described including main operation procedures of the firmware. Measurement of the localiza...

  7. Underground navigation and localisation using RFID tags

    CSIR Research Space (South Africa)

    James, S

    2012-10-01

    Full Text Available their locations. The paper will build on previous work done by Forster[8] and Vorst et al.[9] by implementing the proposed hybrid SLAM method on the mining safety platform, which will eventually be used in an underground environment. II. NAVIGATION... AND LOCALISATION SCHEME A. Exploration and clustering The algorithm used for exploring the RFID environment is shown in Figure 1. Figure 1: Algorithm used for exploring RFID environment Given sufficient (more than 500 steps per 25 square metres) simulation...

  8. RFID UHF i HF w bibliotekach

    Directory of Open Access Journals (Sweden)

    Gładysz Bartłomiej

    2015-06-01

    Full Text Available The potential of the innovative Radio Frequency Identification (RFID technology to be applied for support, acceleration and automation of the circulation process of library collection is presented. Technology basics, and hardware and software components are described. Two different radio standards used in libraries are compared. The goal is to present the potential of RFID technology for libraries, to highlight the differences and to build a basis for further consideration of UHF and HF alternatives.

  9. Development of RFID Library Management Information System

    OpenAIRE

    Keshinro K. K1 ., Balogun W. A; Oyetola J. B3 ., Omogoye S. O4

    2016-01-01

    : RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling. This technology helps librarians reduce valuable staff time spent scanning barcodes while charging and discharging items. RFID is a combination of radio -frequency-based technology and microchip technologyThe methodology used was serial com...

  10. Reverse Logistics: RFID the key to optimality

    Directory of Open Access Journals (Sweden)

    Rezwan Asif

    2011-07-01

    Full Text Available Purpose: The purpose of this paper is to find ways to reduce uncertainties in Reverse logistic supply chain (RLSC through the use of Radio-frequency identification (RFID technology.Design/methodology/approach: This paper reviews literature and builds model to relate RFID with uncertainties in order to optimize Reverse Logistics. Findings: RFID is really efficient to determine and detect quantity, variety and cycle times of returns; however it's not as convenient to determine quality of the returns. The collected information from RFID can be used to standardize the RLSC.Research limitations: Though it’s several and unique advantages some limitations of RFID have been identified in quality and processing sequence, collecting points and different standards, and in global usage.Originality/value: Previous studies in the area of Reverse Logistics and RFID don’t cover all impacts of this technology on RLSC. This review paper has investigated these impacts and offers a model for optimizing the Reverse Logistics Supply Chain.

  11. Patent ductus arteriosus

    Science.gov (United States)

    ... htm Patent ductus arteriosus To use the sharing features on this page, please enable JavaScript. Patent ductus arteriosus (PDA) is a condition in which the ductus arteriosus does not close. The word "patent" means open. The ductus arteriosus is a ...

  12. Licensing and Patent Protection

    OpenAIRE

    Aniruddha Bagchi; Arijit Mukherjee

    2010-01-01

    We show the impact of technology licensing on optimal patent policy. Strong patent protection that eliminates imitation may not be the equilibrium outcome in the presence of licensing. Depending on the cost of innovation, licensing may either increase or reduce the strength of the patent protection.

  13. Universities That Litigate Patents

    Science.gov (United States)

    Rooksby, Jacob H.

    2012-01-01

    American research universities frequently obtain and license patents to their faculty members' inventions. While university licensing is carefully tracked and thoroughly studied, little is known about university decisions to assertively litigate their patents through filing patent infringement lawsuits in federal court. Which universities…

  14. Behavior-based cleaning for unreliable RFID data sets.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  15. RFID applications in transportation operation and intelligent transportation systems (ITS).

    Science.gov (United States)

    2009-06-01

    Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...

  16. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  17. Investigating RFID for Roadside Identification Involving Freight Commercial Vehicle Operators

    Science.gov (United States)

    2010-01-01

    Radio Frequency Identification (RFID) is an emerging technology to track commercial vehicles. This transcript describes research that investigates the ability for RFID technologies to work in license plates. Mile markers are common fixtures on the ro...

  18. AN EMPIRICAL STUDY FOR RADIO FREQUENCY IDENTIFICATION (RFID ADOPTION BY SMEs IN THE TAIWANESE INFORMATION TECHNOLOGY (IT INDUSTRY

    Directory of Open Access Journals (Sweden)

    Hsin Chen

    2012-07-01

    Full Text Available Radio Frequency Identification (RFID technology represents a common standard for data storage and retrieval that could improve collaboration and data sharing between non-competing organisations. With the advent of RFID, organisations have the opportunity to rethink how their organisation will operate and integrate in the supply chain. Especially for Small to Medium Sized Enterprises (SMEs, that they have limited resources adopting such an innovative technology (i.e. RFID the adoption decision can be daunting. Literature indicates that SMEs that decide to go on with implementation have so far only a few guidelines from either private companies or public authorities regarding awareness on specific opportunities and risks. This research is therefore trying to explore in detail the factors that affect SMEs' RFID adoption in the Taiwan Information Technology (IT manufacturing industry. We are employing Exploratory Factor Analysis (EFA techniques and utilising a questionnaire survey in order to collect and analyse our data. After classifying the responding SMEs into three different adopters categories named ready adopter, initiator adopter and unprepared adopter using EFA technique our results show that each category has some specific adoption factors related to their unique situation. These are for ready adopters: cost and management, for initiator adopters: competitiveness and process efficiency and unprepared adopters: IT management difficulties, IT implementation difficulties and cost of implementation. A SMEs RFID adoption model is then proposed. It is anticipated that the findings of this research will not only enhance the research in RFID adoption in SMEs, but can also act as a reference for practitioners in the industry and researchers in the academic field.

  19. Privacy of RFID Systems: Security of Personal Data for End-Users

    OpenAIRE

    Firoz Khan

    2016-01-01

    Privacy of RFID systems is receiving increasing attention in the RFID community. RFID privacy is important as the RFID tags will be attached to all kinds of products and physical objects including people. The possible abuse or excessive use of RFID tracking capability by malicious users can lead to potential privacy violations. In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries. Altho...

  20. Development of Wireless RFID Glove for Various Applications

    Science.gov (United States)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  1. Efficient and Timely Mutual Authentication Scheme for RFID Systems

    OpenAIRE

    Hesham A. El Zouka; Mustafa M. Hosni

    2015-01-01

    The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an impo...

  2. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    Directory of Open Access Journals (Sweden)

    Iwan Vanany

    2009-01-01

    Full Text Available This paper explores the benefit and barriers of RFID (Radio Frequency Identification technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and technology aspects. The results of this study suggest that the benefits of RFID technology adoption are dominated of intangible benefit. Most of the respondents believed that the main barriers of RFID technology adoption are (1 the complexity of RFID technology (2 the lack of complete and valid information, and (3 there is no sufficient budget available. The detail of the outcomes and the implications of this reasarch are also discussed. Abstract in Bahasa Indonesia: Makalah ini berupaya mengeksplorasi manfaat dan hambatan dari pengadopsian teknologi RFID (Radio Frequency Identification dalam konteks rumah sakit di Indonesia. Metode investigasi dari penelitian ini menggunakan wawancara dan kuesioner semi-struktur untuk konsultan, peneliti teknologi RFID dan manajer rumah sakit berkatagori besar di Pulau Jawa. Manfaat-manfaat dan hambatan-hambatan dari pengadopsian teknologi RFID telah diidentifikasi dari studi literatur. Hambatan dari pengadopsian teknologi RFID dibagi menjadi dua (2 aspek yaitu hambatan dari aspek bisnis dan teknologi. Temuan dari studi ini meyakini bahwa manfaat dari pengadopsian teknologi RFID didominasi oleh manfaat yang bersifat intangible. Sebagian besar responden meyakini bahwa hambatan utama dari pengadopsian teknologi RFID adalah: (1 kompleksnya teknologi RFID, (2 ketiadaan informasi yang lengkap dan valid, (3 tidak tersedianya anggaran yang cukup. Detail dari hasil studi dan implikasinya akan didiskusikan selanjutnya. Kata kunci

  3. Effects of RFID Technology on the Logistics Innovation

    OpenAIRE

    金, 双鴿; Shuangge, JIN

    2010-01-01

    An advanced automatic identification technology based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. RFID tag is a microchip combined with an antenna in a compact package and is called also IC tag. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies. This paper aims to analyse the effects of RFID technology on the logistics innovation.

  4. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability.......This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  5. Architecture Design of the Vehicle Tracking System Based on RFID

    OpenAIRE

    Jianxin Deng

    2013-01-01

    Vehicle tracking plays more important roles in modern transportation and logistics operation. This paper deals with a new approach to track vehicles based on RFID (Radio Frequency Identification) technology. The vehicle tracking system is designed overallly  supported by Axiomatic Design theory.The basic steps of vehicle tracking based on RFID are developed and a six-layered architecture for the vehicle tracking system integrating databases, RFID tags, RFID readers, data centers, networks an...

  6. Uniting Legislation with RFID Privacy-Enhancing Technologies

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon the actual security and privacy needs of people in RFID-enabled environments, while technology helps to ensure legal compliance. This paper examines the main aims of RFID

  7. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  8. Invention note and patent note

    International Nuclear Information System (INIS)

    Chang, Sung Su

    1997-09-01

    This book deals with origin of invention and term related patent and invention, making idea, brain storming, 10 laws of invention skill, attitude of inventors, invention order, making good inventions, patent system, preparation of application, procedure and method of patent, management of patent, patent and trademark office, patent lawyer, copyright, new intellectual property right, industrial property right, trademark, invasion of industrial property right, patent, Judgment, preparation of items, application of industrial property right and effect of inventor and related people.

  9. Filtering Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hazalila Kamaludin

    2016-01-01

    Full Text Available Radio Frequency Identification (RFID enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and storage resources as well as delaying decision-making, filtering duplicate data from RFID data stream is an important and challenging problem. Existing Bloom Filter-based approaches for filtering duplicate RFID data streams are complex and slow as they use multiple hash functions. In this paper, we propose an approach for filtering duplicate data from RFID data streams. The proposed approach is based on modified Bloom Filter and uses only a single hash function. We performed extensive empirical study of the proposed approach and compared it against the Bloom Filter, d-Left Time Bloom Filter, and the Count Bloom Filter approaches. The results show that the proposed approach outperforms the baseline approaches in terms of false positive rate, execution time, and true positive rate.

  10. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  11. The Value of RFID Benefits vs Costs

    CERN Document Server

    2013-01-01

    RFID technology presents a great potential for creating competitive advantage. By automating and simplifying data collection, it lets users more accurately track assets and monitor key indicators, which in turn gives greater visibility to the operations. However, the benefits received from this technology will be determined by how well it is integrated with the business processes and overall information flow. Because of the fact that the decision to deploy RFID technology in an enterprise is a business decision instead of a technology decision, cost-benefit analysis is a key component of this decision. If an RFID deployment cannot be justified in terms of its economic value to the company, it is not likely to help the company; and consequently, it is not likely to remain a viable deployment over the long term.   The Value of RFID describes the business value of RFID and explains the costs and benefits of this technology comprehensively. Different investment evaluation models are proposed to use in various ap...

  12. RFID: A key technology for Humanity

    Science.gov (United States)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  13. An Approach for Removing Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hairulnizam Mahdin

    2011-10-01

    Full Text Available Radio frequency identification (RFID systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches.

  14. An Approach for Removing Redundant Data from RFID Data Streams

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  15. Patent Deployment Strategies and Patent Value in LED Industry.

    Science.gov (United States)

    Wu, Ming-Fu; Chang, Keng-Wei; Zhou, Wei; Hao, Juan; Yuan, Chien-Chung; Chang, Ke-Chiun

    2015-01-01

    This study applies two variables in the measurement of company patent deployment strategies: patent family depth and earn plan ratio. Patent family depth represents the degree to which certain fields and markets are valued by the patent owner. Earn plan ratio defined as the ratio of the number of patent forward citations to patent family size. Earn plan ratio indicates the degree to which a patent family could be cited by later innovators and competitors. This study applies a logistic regression model in the analysis LED industry data. The results demonstrate that patent value has a positive relationship with the patent family depth, and earn plan ratio.

  16. Study of Development for RFID System to Hospital Environment.

    Science.gov (United States)

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system.

  17. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  18. Semantic-Based RFID Data Management

    Science.gov (United States)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  19. A Novel Security Method For RFID Tags

    Directory of Open Access Journals (Sweden)

    Imran Ali Jokhio

    2012-07-01

    Full Text Available RFID (Radio Frequency Identification tags use light weighted security methods because of cost constraints. In this paper a lightweight security method is investigated and proved that it significantly lacks in protecting RFID tags against simple cloning attack. In order to protect RFID tag from cloning attacks a novel security method is proposed in this paper. The proposed security method provides high level computational difficulty against the three basic attacking techniques, i.e. eavesdropping, replay and man in the middle. In order to clone a tag, attacker eavesdrops the tag responses and creates a replica of the tag. The novel security method presented in this paper increases the hardness to avoid guessing tag secrets resulting in a conditional none clone able tags. The proposed security method is also evaluated using propositional logic proofs to demonstrate the level of security it can provide.

  20. Pharmaceutical counterfeiting and the RFID technology intervention.

    Science.gov (United States)

    Coustasse, Alberto; Arvidson, Cody; Rutsohn, Phil

    2010-07-01

    Both nationally and internationally, pharmaceutical counterfeiting has become a problem that is threatening economic stability and public health. The purpose of the present research study review was to analyze the scope and severity of pharmaceutical counterfeiting and to establish if the implantation of the Radio Frequency Identification Device (RFID) model can more efficiently be used within the pharmaceutical supply chain to reduce the problem counterfeit drugs impose on public health and international economic stability. Results indicated that implementing the RFID model for tracking drugs at the item level in the pharmaceutical supply chain has potential to alleviate the scope of the counterfeit drug problem. Recommendations for how the pharmaceutical industry may sooner adopt the RFID model are made.

  1. Data anonymization patent landscape

    OpenAIRE

    Mirjana Pejić Bach; Jasmina Pivar; Ksenija Dumičić

    2017-01-01

    The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i) the trend in data anonymization patenting, (ii) the type of technical content protected in data anonymization, (iii) the organizations and countries most active in patenting data anonymization know-how; and...

  2. Patent Landscape for Nanotechnology

    OpenAIRE

    Alexey Streletskiy; Vladimir Zabavnikov; Emil Aslanov; Dmitriy Kotlov

    2015-01-01

    This paper investigates the methodological aspects of nanotechnology patent landscaping. The authors suggest that nanotechnologies take precedence over other technological trends, an assertion that is confirmed by current assessments and forecasts regarding the size of the nanotechnology product market. In this paper the authors analyse patent activity within the Russian Federation and globally by building a patent map of nanotechnology and the associated field of metallurgy. Using this as a ...

  3. Patent Licensing Networks

    OpenAIRE

    Doh-Shin Jeon; Yassine Lefouili

    2014-01-01

    This paper investigates the patent licensing networks formed by competing firms. Assuming that licensing agreements can involve the payment of fixed fees only and that firms compete à la Cournot, we show that the complete network is always bilaterally efficient and that the monopoly network is bilaterally efficient if the patents are complementary enough. In the case of independent patents, we fully characterize the bilaterally efficient networks and find that when the cost reduction resultin...

  4. Nanofiber patent landscape.

    Science.gov (United States)

    Ngiam, Michelle; Ramakrishna, Seeram; Raghunath, Michael; Chan, Casey K

    2007-01-01

    Despite the large number of publications in peer review literature in the field of nanofibers, there is still uncertainty as to what aspects of these research results have commercial applications. In an effort to better understand the technological progress made in the field of nanofibers, we surveyed the patents issued in the United States from 1976 up to end 2006. The present review will provide an overall view of the current patent landscape including trends and key applications. Key assignees and key inventors were identified and their contributions were discussed. Patents were identified using keywords such as nanofibers, ultrafine, and electrospinning. After patents were downloaded, we reviewed each patent for relevancy and identified 100 patents to be related to nanofibers. 75% of the current issued patents on nanofibers are directed at either fabrication methods or the use of nanofibers in filtration systems. The patent data indicates that medical applications and medical products using nanofibers appear to be the emerging application for nanofibers. We anticipate a growing number of patents on novel applications for nanofiber would originate from academic centers in the future.

  5. Patenting Nanomedicine in Europe:

    DEFF Research Database (Denmark)

    Nordberg, Ana

    Patenting Nanomedicine in Europe: Applying the ‘medical methods exception’ to emerging technologies is based on the authors PhD dissertation, defended in March 2014, at the University of Copenhagen. The book debates restrictions on the patentability of medical methods in European Patent Law....... The main question addressed is whether it is viable and advisable the reinterpretation, reformulation or replacement of Article 53 (c) EPC – a provision restricting the patenting of medical methods. The subject is approached by reference to emerging technologies, and using nanomedicine innovation...

  6. Performance of Patenting Firms

    DEFF Research Database (Denmark)

    Madsen, Erik Strøjer; Smith, Valdemar; Nielsen, Anders Østergaard

    2000-01-01

    Most countries focus on industries with high technology and the governments grant subsidies to innovating firms. However, there has been remarkable few studies of the performance of innovative firms or industries. This study examines the performance of patent active firms compared to the non-patenting...... firms within the manufacturing sector in Denmark. Performance is measured both by growth in employment as well as in the return on equity and profit share in turnover. The results suggest that differences in performance of patenting and non-patenting firms are very small, which questions the political...

  7. RFID in libraries a step toward interoperability

    CERN Document Server

    Ayre, Lori Bowen

    2012-01-01

    The approval by The National Information Standards Organization (NISO) of a new standard for RFID in libraries is a big step toward interoperability among libraries and vendors. By following this set of practices and procedures, libraries can ensure that an RFID tag in one library can be used seamlessly by another, assuming both comply, even if they have different suppliers for tags, hardware, and software. In this issue of Library Technology Reports, Lori Bowen Ayre, an experienced implementer of automated materials handling systems, Provides background on the evolution of the standard

  8. UHF RFID technologies for identification and traceability

    CERN Document Server

    Laheurte, Jean-Marc; Paret, Dominique; Loussert, Christophe

    2014-01-01

    UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or person to be automatically identified at a distance without a direct line-of-sight using a radio wave exchange. Applications include inventory tracking, prescription medication tracking and authentication, secure automobile keys, and access control for secure facilities. This book begins with an overview of UHF RFID challenges describing the applications, markets, trades and basic technologies. It follows this by highlighting the main features distinguishing UHF (860MHz-960MHz) and HF

  9. Using Interference to Block RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag.......We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag....

  10. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  11. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  12. Applications of RFID into Nuclear Power Plant Maintenance System

    International Nuclear Information System (INIS)

    Lee, Seung Min; Seong, Poong Hyun

    2008-01-01

    RFID (Radio Frequency Identification) system, one of the most anticipated ubiquitous technologies is an automatic identification method using devices called RFID tags. RFID antenna detects each approach of RFID tags and recognizes the tags' ID and transfer to reader to do information processing. Since first introduced in the logistics industry, production management and maintenance organization in various fields of domestic and foreign enterprises introduce the RFID. Nuclear power plants are also using RFID to manage materials lately. However, the current status on the use of RFID is just a little more advanced on the use of bar code. Therefore, it seems that the important characteristic of RFID is not enough actualized to keep seeing. In point of Maintenance Information Field based on ubiquitous technology, the most important concept is real-time information processing. And RFID is quite proper to develop this information field system because it satisfies for the matter of that concept. The leading content in ubiquitous maintenance system is that maintenance personnel can get information what he needs and he can also transfer information what he gets whenever and wherever he is. In this paper, some examples of applying RFID in development of ubiquitous maintenance system are suggested

  13. Radio frequency identification and time-driven activity based costing:RFID-TDABC application in warehousing

    OpenAIRE

    Bahr, Witold; Price, Brian J

    2016-01-01

    Purpose: This paper extends the use of Radio Frequency Identification (RFID) data for accounting of warehouse costs and services. Time Driven Activity Based Costing (TDABC) methodology is enhanced with the real-time collected RFID data about duration of warehouse activities. This allows warehouse managers to have accurate and instant calculations of costs. The RFID enhanced TDABC (RFID-TDABC) is proposed as a novel application of the RFID technology. Research Approach: Application of RFID-TDA...

  14. Biotechnology: interferon patent contested.

    Science.gov (United States)

    Earl, C; Beardsley, T

    Biogen, a biotechnology company based in Cambridge, Mass., and Geneva, Switzerland, has been notified by the European Patent Office that it will receive a product patent for its alpha interferon synthesized by recombinant DNA technology. Genentech, a San Francisco company which claims priority for producing mature interferon, is planning a vigorous appeal of the decision.

  15. Environmentally conscious patent histories

    Science.gov (United States)

    Crouch, Dennis D.; Crouch, Henry L.

    2004-02-01

    There is a need for investigators, legislators, and business leaders to understand the magnitude of innovation and discovery in the field of environmentally conscious technologies (ECTs). Knowledge of the "big picture" is important to providing a national and global account of actual environmental stewardship over the last twenty-five years. A recitation of the Environmental Protection Agency (EPA) supported Acts which have been enacted into law reveals one facet of the multifaceted dynamic of environmental consciousness. The popular discussion and debate, as well as partisan lobbying, which created the political forces leading to environmentally conscious legislation is another facet. A third facet is the corporate response to the threats and opportunities predicted by CEO"s and others through environmental scanning. This paper examines changes in environmentally conscious inventive effort by comparing data from United States Patents issued from 1976 through 2003. Patents are useful tool for measuring technological innovation because they are publicly available records of innovative activity. Although not all inventions result in patent applications, the monopoly rights granted on the invention give the inventor a strong incentive to obtain patents on any viable product or process. Among the results, we found a significant increase in patents relating to environmentally conscious products and processes during the period in question. Specifically, a dramatic increase in patent activity was seen for the decade of the 1990"s. Surprisingly, the patenting rate from 2000 to 2003 seems to have stabilized. Additionally public discussion of ECTs appears to have a positive impact on patent filings.

  16. Patenting Nanomedicine in Europe

    DEFF Research Database (Denmark)

    Nordberg, Ana

    This work addresses the question of determining whether reinterpretation, reformulation or replacement of article 53 (c) of the European Patent Convention is viable and advisable. It does so by reference to novel or resurfacing interpretative concerns connected with emerging technologies exemplif......This work addresses the question of determining whether reinterpretation, reformulation or replacement of article 53 (c) of the European Patent Convention is viable and advisable. It does so by reference to novel or resurfacing interpretative concerns connected with emerging technologies...... in the patent system in order to allow for the protection of core ethical values of society. Nanotechnology inventions blur the lines between patentable subject matter and what may fall under the exception from patentability. It is a good example of how in recent years, emerging technologies have been...

  17. Truth and falsity of patent

    International Nuclear Information System (INIS)

    Park, Gum Jin

    2006-10-01

    This book describes the process of the effect to build the business of patent strongly in difficult situation. The titles of this contents are finally, lawsuit if formed, the task of patent application introduction of tasks of patent negotiation, negotiation with Fujitsu, Mitsubishi, Oki and NEC, amalgamation between LG semiconductor and Hyundai Electronic Industry, life in incorporated company, current condition of application for a patent, the method to process strategy patent, how to make strong patent and effective negotiation strategy for a patent and strategy of patent application.

  18. Radio Frequency Identification (RFID) in Space

    Science.gov (United States)

    Bacon, John B.

    2011-01-01

    The ISS has some significant inventory management challenges. RFID solves many of these, and was deployed 8/2011. Significant issues (some unique to spacecraft) remain. NASA is interested and investing in technologies that will help to overcome the remaining issues.

  19. Introducing RFID at Middlesex University Learning Resources

    Science.gov (United States)

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  20. Exploring RFID adoption in South African industries

    NARCIS (Netherlands)

    van der Sijde, P.C.; de Boer, S.J.; McGowan, P.C.; Korteweg, B.

    2012-01-01

    This paper explores technology adoption based on the ‘technology – organisation – environment’ framework to study radio frequency identification (RFID) adoption in South African industries. It operationalises the framework using innovation-adoption theory, ‘organisational capitals’, and ‘societal

  1. Energy-balanced algorithm for RFID estimation

    Science.gov (United States)

    Zhao, Jumin; Wang, Fangyuan; Li, Dengao; Yan, Lijuan

    2016-10-01

    RFID has been widely used in various commercial applications, ranging from inventory control, supply chain management to object tracking. It is necessary for us to estimate the number of RFID tags deployed in a large area periodically and automatically. Most of the prior works use passive tags to estimate and focus on designing time-efficient algorithms that can estimate tens of thousands of tags in seconds. But for a RFID reader to access tags in a large area, active tags are likely to be used due to their longer operational ranges. But these tags use their own battery as energy supplier. Hence, conserving energy for active tags becomes critical. Some prior works have studied how to reduce energy expenditure of a RFID reader when it reads tags IDs. In this paper, we study how to reduce the amount of energy consumed by active tags during the process of estimating the number of tags in a system and make the energy every tag consumed balanced approximately. We design energy-balanced estimation algorithm that can achieve our goal we mentioned above.

  2. Virtual Exploratories

    DEFF Research Database (Denmark)

    Jensen, Sisse Siggaard

    2006-01-01

    -systems, the paper introduces the designing strategy referred to as virtual exploratories. Some of the advanced virtual worlds may inspire the design of such provoking and challenging virtual exploratories, and especially the Massively Multi-User Online Role-Playing Games (MMORPGS). However, if we have to learn from...... the design and activity of the advanced virtual worlds and role-playing games, then the empirical research on the actors’ activity, while they are acting, is an important precondition to it. A step towards the conception of such a designing strategy for virtual exploratories is currently pursued......, the sense-making ontology and triangle (Dervin et al., 2003), the video-interaction analysis (Henderson & Jordan, 1994), and the method of videoviews (Jensen, 2001, 2005). Also the two analytical concepts ‘intermediaries’ and ‘mediators’ that come from the actor-network theory (Latour, 2005) are introduced...

  3. Searching bioremediation patents through Cooperative Patent Classification (CPC).

    Science.gov (United States)

    Prasad, Rajendra

    2016-03-01

    Patent classification systems have traditionally evolved independently at each patent jurisdiction to classify patents handled by their examiners to be able to search previous patents while dealing with new patent applications. As patent databases maintained by them went online for free access to public as also for global search of prior art by examiners, the need arose for a common platform and uniform structure of patent databases. The diversity of different classification, however, posed problems of integrating and searching relevant patents across patent jurisdictions. To address this problem of comparability of data from different sources and searching patents, WIPO in the recent past developed what is known as International Patent Classification (IPC) system which most countries readily adopted to code their patents with IPC codes along with their own codes. The Cooperative Patent Classification (CPC) is the latest patent classification system based on IPC/European Classification (ECLA) system, developed by the European Patent Office (EPO) and the United States Patent and Trademark Office (USPTO) which is likely to become a global standard. This paper discusses this new classification system with reference to patents on bioremediation.

  4. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  5. Enhancing Business Process Automation by Integrating RFID Data and Events

    Science.gov (United States)

    Zhao, Xiaohui; Liu, Chengfei; Lin, Tao

    Business process automation is one of the major benefits for utilising Radio Frequency Identification (RFID) technology. Through readers to RFID middleware systems, the information and the movements of tagged objects can be used to trigger business transactions. These features change the way of business applications for dealing with the physical world from mostly quantity-based to object-based. Aiming to facilitate business process automation, this paper introduces a new method to model and incorporate business logics into RFID edge systems from an object-oriented perspective with emphasises on RFID's event-driven characteristics. A framework covering business rule modelling, event handling and system operation invocations is presented on the basis of the event calculus. In regard to the identified delayed effects in RFID-enabled applications, a two-block buffering mechanism is proposed to improve RFID query efficiency within the framework. The performance improvements are analysed with related experiments.

  6. RFID - based Staff Control System (SCS) in Kazakhstan

    Science.gov (United States)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  7. RFID Continuance Usage Intention in Health Care Industry.

    Science.gov (United States)

    Iranmanesh, Mohammad; Zailani, Suhaiza; Nikbin, Davoud

    Radio-frequency identification (RFID) has been proved to be an effective tool both for improving operational efficiency and for gaining competitive advantage in the health care industry despite its relatively low-usage rate in hospitals. The sustained use of RFID by health care professionals will promote its development in the long term. This study evaluates the acceptance continuance of RFID among health care professionals through technology continuance theory (TCT). Data were collected from 178 medical professionals in Malaysia and were then analyzed using the partial least squares technique. The analysis showed that the TCT model provided not only a thorough understanding of the continuance behavior of health care professionals toward RFID but also the attitudes, satisfaction, and perceived usefulness of professionals toward it. The results of this study are expected to assist policy makers and managers in the health care industry in implementing the RFID technology in hospitals by understanding the determinants of continuance of RFID usage intention.

  8. Assessment of RFID Read Accuracy for ISS Water Kit

    Science.gov (United States)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  9. A Framework for RFID Survivability Requirement Analysis and Specification

    Science.gov (United States)

    Zuo, Yanjun; Pimple, Malvika; Lande, Suhas

    Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.

  10. Object Oriented Business Process Modelling in RFID Applied Computing Environments

    Science.gov (United States)

    Zhao, Xiaohui; Liu, Chengfei; Lin, Tao

    As a tracking technology, Radio Frequency Identification (RFID) is now widely applied to enhance the context awareness of enterprise information systems. Such awareness provides great opportunities to facilitate business process automation and thereby improve operation efficiency and accuracy. With the aim to incorporate business logics into RFID-enabled applications, this book chapter addresses how RFID technologies impact current business process management and the characteristics of object-oriented business process modelling. This chapter first discusses the rationality and advantages of applying object-oriented process modelling in RFID applications, then addresses the requirements and guidelines for RFID data management and process modelling. Two typical solutions are introduced to further illustrate the modelling and incorporation of business logics/business processes into RFID edge systems. To demonstrate the applicability of these two approaches, a detailed case study is conducted within a distribution centre scenario.

  11. Patentability of inventions under the Nigeria's patents and designs act

    African Journals Online (AJOL)

    The nature of invention, the reason(s) for protecting invention and the requirements for the patentability of invention under the Nigerian Patents and Designs Act are the main thrust of this paper. It is now trite that the global standard or criterion for granting a patent is that the invention must be patentable. The paper therefore ...

  12. The impact of RFID on management of returnable containers

    OpenAIRE

    Thoroe, Lars; Melski, Adam; Schumann, Matthias

    2009-01-01

    Inventory shrinkage is a common problem in the management of returnable containers. RFID-based container tracking systems have been proposed as a possible solution. Benefits of RFID-based tracking of returnable transport items such as pallets, kegs and boxes are documented in several case studies, but have so far hardly been analyzed from a theoretical perspective. In this article, we analyze the impact of RFID on container management using a deterministic inventory model. The analysis focuse...

  13. Evaluation of Efficiency Improvement in Vital Documentation Using RFID Devices.

    Science.gov (United States)

    Kimura, Eizen; Nakai, Miho; Ishihara, Ken

    2016-01-01

    We introduced medical devices with RFID tags and the terminal with RFID reader in our hospital. Time study was conducted in two phases. In phase I, nurses round as usual, and in phase II, the nurse round the ward with a terminal installed on a cart. This study concluded that RFID system shortens the time for vital sign documentation. However, deploying the terminals at every bedside did not contribute the more time reduction.

  14. RFID Demystified: Part 2. Applications within the supply chain.

    OpenAIRE

    Wilding, Richard D.; Delgardo, Tiago

    2004-01-01

    In our previous article we discussed the technology, benefits and barriers to implementations of Radio Frequency Identification (RFID). In this article we discuss where this technology can be applied. Essentially, it is argued that RFID systems help companies to cut costs, improve customer service, reduce labour, increase accuracy and improve supply chain throughput. RFID systems applications can be used by different industry sectors like the military, retail, industrial, life sciences, logis...

  15. Improvement of Supply Chain Performances Using RFID Technology

    OpenAIRE

    Turcu, Cornel; Turcu, Cristina; Graur, Adrian

    2009-01-01

    This chapter helps to improve readers understanding of the RFID and EPC potential for business processes. RFID technology is classified as a wireless AIDC technology that uses digital data encoded into a radio tag embedding a microchip with an antenna. The data stored on the tag is collected by a reader using radio waves. There are a large variety of RFID tags designs; they also have many different functional characteristics such as power source, carrier frequency, read range, data storage ca...

  16. Ethical implications of implantable radiofrequency identification (RFID) tags in humans.

    Science.gov (United States)

    Foster, Kenneth R; Jaeger, Jan

    2008-08-01

    This article reviews the use of implantable radiofrequency identification (RFID) tags in humans, focusing on the VeriChip (VeriChip Corporation, Delray Beach, FL) and the associated VeriMed patient identification system. In addition, various nonmedical applications for implanted RFID tags in humans have been proposed. The technology offers important health and nonhealth benefits, but raises ethical concerns, including privacy and the potential for coercive implantation of RFID tags in individuals. A national discussion is needed to identify the limits of acceptable use of implantable RFID tags in humans before their use becomes widespread and it becomes too late to prevent misuse of this useful but ethically problematic technology.

  17. Embedded RFID Recorder in short-range wireless devices

    DEFF Research Database (Denmark)

    2010-01-01

    range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...

  18. Towards an Effective Management Strategy for Passive RFID Implementation

    National Research Council Canada - National Science Library

    Fisch, John N; Koch, David M

    2004-01-01

    .... However, many issues central to passive RFID implementation remain unresolved. First and foremost, a comprehensive management strategy, including a complete redesign of business practices, must be developed...

  19. Logistics Reduction: RFID Enabled Autonomous Logistics Management (REALM)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Advanced Exploration Systems (AES) Logistics Reduction (LR) project Radio-frequency identification (RFID) Enabled Autonomous Logistics Management (REALM) task...

  20. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  1. Integrated solutions for libraries: implementation of RFID system

    Directory of Open Access Journals (Sweden)

    Simona Gheorghe

    2011-01-01

    Full Text Available Currently, an innovative technology is implemented in the Romanian libraries, based on radio frequency identification, in other words RFID technology. This technology has been developed into many areas of activity both in our country and abroad. In 2008, Central Library of “Lucian Blaga” University from Sibiu has implemented the system and Central University Library “Carol I” from Bucharest is in the process of RFID implementation. There are presented the components of an RFID library system, what is involving the application of this system, the advantages and disadvantages of RFID technology.

  2. Used, Blocking and Sleeping Patents

    DEFF Research Database (Denmark)

    Torrisi, Salvatore; Gambardella, Alfonso; Giuri, Paola

    2016-01-01

    patents are being utilized. A substantial share of patents is neither used internally nor for market transactions, which confirms the importance of strategic patenting and inefficiency in the management of intellectual property. We investigate different types of unused patents—unused blocking patents...... and sleeping patents. We also examine the association between used and unused patents and their characteristics such as family size, scope, generality and overlapping claims, technology area, type of applicant, and the competitive environment from where these patents originate. We discuss our results...

  3. How Important are Noncorporate Patents?

    DEFF Research Database (Denmark)

    Schneider, Cédric

    2011-01-01

    This article analyses the innovative performances of noncorporate inventors using patent citations data from the European Patent Office. The results show that inventions patented outside an established corporate framework are on average less ‘important’ than corporate patents, but with large...... variations across technology classes. Patents applied for by independent inventors, start-ups and corporate firms are of comparable ‘quality’ in emerging technologies. The results also highlight that in these fields noncorporate patents are more ‘radical’ than corporate patents....

  4. FTTA Hightlighted Patents

    Science.gov (United States)

    This page highlights patented EPA-developed technologies that are available for licensing. FTTA staff contacts (link) can provide more information on any of these technologies, as well as information on licensing.

  5. How to find patents, september 2010

    OpenAIRE

    Bonich, Mònica; Cervera-Farré, Albert; Santos-Hermosa, Gema

    2010-01-01

    Com es poden trobar les patents: què són les patents?, què es pot patentar?, qui assigna les patents? i com es poden trobar patents? Cómo encontrar patentes: ¿qué son las patentes?, ¿qué se puede patentar?, ¿quién asigna las patentes? y ¿cómo se pueden encontrar patentes? How to find patents: what are patents?, what can be patented?, who awards the patents? and how can patents be found?

  6. Cómo encontrar patentes, setiembre 2010

    OpenAIRE

    Bonich, Mònica; Cervera-Farré, Albert; Santos-Hermosa, Gema

    2010-01-01

    Com es poden trobar les patents: què són les patents?, què es pot patentar?, qui assigna les patents? i com es poden trobar patents? Cómo encontrar patentes: ¿qué son las patentes?, ¿qué se puede patentar?, ¿quién asigna las patentes? y ¿cómo se pueden encontrar patentes? How to find patents: what are patents?, what can be patented?, who awards the patents? and how can patents be found?

  7. Patent law for the dermatologist.

    Science.gov (United States)

    Mei, Dan Feng; Liu, Josephine

    2013-12-01

    An exciting discovery in the laboratory may translate to a commercial product. How does the patent system fit into the picture? We first discuss the circumstances under which an invention is granted a patent. What is the purpose of a patent and what are the functions of the patent system? Who can apply for a patent? What makes an invention patentable? A patent does not automatically grant a right to make or sell a product. This is because multiple patents can cover a single pharmaceutical product. Understanding the patent landscape covering a product of interest is key to evaluating the risk of infringing another's exclusivity rights. We use a hypothetical example relating to skin cancer to guide a discussion of patent law.

  8. Patent protection strategies

    Directory of Open Access Journals (Sweden)

    Himanshu Gupta

    2010-01-01

    Full Text Available It is widely recognized that the pharmaceutical industry faces serious financial challenges. Large numbers of blockbuster drugs are losing patent protection and going generic. The pipeline of new drugs is too sparse to fill the gap and generate a platform for future growth. Moreover, many of the new products are biologics with much narrower target patient populations and comparatively higher prices relative to traditional pharmaceuticals. So now the time has come for pharmaceutical scientists to have a better understanding of patent fundamentals. This need is illustrated by analyses of key scientific and legal issues that arose during recent patent infringement cases involving Prozac, Prilosec, and Buspar. Facing this scenario, the pharmaceutical industry has moved to accelerate drug development process and to adopt at the same time different strategies to extend the life time of the patent monopoly to provide the economic incentives and utilizing it for drug discovery and development. This review covers the need of patent protection and various strategies to extend the patent.

  9. Evolution and acceptability of medical applications of RFID implants among early users of technology.

    Science.gov (United States)

    Smith, Alan D

    2007-01-01

    RFID as a wireless identification technology that may be combined with microchip implants have tremendous potential in today's market. Although these implants have their advantages and disadvantages, recent improvements how allowed for implants designed for humans. Focus was given to the use of RFID tags and its effects on technology and CRM through a case study on VeriChip, the only corporation to hold the rights and the patent to the implantable chip for humans, and an empirically based study on working professionals to measure perceptions by early adopters of such technology. Through hypotheses-testing procedures, it was found that although some resistance to accept microchip implants was found in several applications, especially among gender, it was totally expected that healthcare and medical record keeping activities would be universally treated in a positive light and the use of authorities (namely governmental agencies) would be equally treated in a negative light by both sexes. Future trends and recommendations are presented along with statistical results collected through personal interviews.

  10. Rfid Based Traceability System For Sheepbreeding

    Science.gov (United States)

    Xing, Yan; Li, Hui; Zhang, Jian; Fu, Zetian

    As China's meat production is growing, the quality safety of meat food as an important human food sources has increasingly become a major issue which related to the national economy and people's livelihood. Using early warning technique, tracking and tracing techniques and so on in the key link of meat food production in order to fulfill quality control is an important method which can effectively guarantee the food quality and safety. The use of RFID techniques and handhelds can automatically collect information about sheep breeding. Meanwhile this information could be inquired conveniently through Internet. This study uses C/S (Client/Server) model structure, and builds the sheep breeding traceability system based on RFID.

  11. Reliable Food Traceability Using RFID Tagging

    Science.gov (United States)

    Azuara, Guillermo; Salazar, José L.; Tornos, José L.; Piles, Joan J.

    Radio Frequency IDentification (RFID) technology has numerous potential applications in various industries. One important use is for complete traceability of a specific product with the added advantage of being able to verify that quality controls have been passed, with all the necessary steps complied with and for the time required. The aim of this work is to present a food traceability system using RFID tags with contents guaranteed secure by the use of public-key cryptography and at an affordable cost without the need for substantial investment in infrastructure. Aggregate signatures are used so that all the steps can be signed in a reduced memory space. This type of signature is a cryptographic primitive that "consolidates" several signatures into one in such a way that if n users sign n messages, all the signatures can be grouped into one single signature.

  12. Secure passive RFID tag with seal

    Energy Technology Data Exchange (ETDEWEB)

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2017-11-14

    A secure passive RFID tag system comprises at least one base station and at least one passive RFID tag. The tag includes a fiber optic cable with the cable ends sealed within the tag and the middle portion forming an external loop. The loop may be secured to at least portions of an object. The tag transmits and receives an optical signal through the fiber optic cable, and the cable is configured to be damaged or broken in response to removal or tampering attempts, wherein the optical signal is significantly altered if the cable is damaged or broken. The tag transmits the optical signal in response to receiving a radio signal from the base station and compares the transmitted optical signal to the received optical signal. If the transmitted optical signal and the received optical signal are identical, the tag transmits an affirmative radio signal to the base station.

  13. Mobile 3D Viewer Supporting RFID System

    International Nuclear Information System (INIS)

    Kim, J. J.; Yang, S. W.; Choi, Y.

    2007-01-01

    As hardware capabilities of mobile devices are being rapidly enhanced, applications based upon mobile devices are also being developed in wider areas. In this paper, a prototype mobile 3D viewer with the object identification through RFID system is presented. To visualize 3D engineering data such as CAD data, we need a process to compute triangulated data from boundary based surface like B-rep solid or trimmed surfaces. Since existing rendering engines on mobile devices do not provide triangulation capability, mobile 3D programs have focused only on an efficient handling with pre-tessellated geometry. We have developed a light and fast triangulation process based on constrained Delaunay triangulation suitable for mobile devices in the previous research. This triangulation software is used as a core for the mobile 3D viewer on a PDA with RFID system that may have potentially wide applications in many areas

  14. The lifespan of semiconductor patents by assignee and patent characteristics

    Directory of Open Access Journals (Sweden)

    Chang Shu-Hao

    2017-01-01

    Full Text Available Evaluating the values of patents is critical for both managers and investors. Patent maintenance time is an ideal proxy indicator for evaluating commercial patent value. This study investigated the survival rates of patents in the semiconductor industry by using a survival analysis and incorporated a predictive model for patent maintenance times. The technical characteristics of the patents, the assignee factors, and the statuses of the patents were used as the predictive factors for patent maintenance time. The results revealed a small entity size and the number of assignees are the risk factors that increase the likelihood of the maintenance time of a patent decreasing. The litigation status of a patent and the number of its international patent classifications, claims, forward citations, and assignments were determined to be the protection factors that raise the likelihood of its maintenance time extending. Additionally, substantial differences were noted between small entities and nonsmall entities and between being litigated and not in their effects on the survival rates of patents. This study examined the factors that affect the survival rates of patents and provides a reference for the managers and investors of intellectual property rights to use when assessing technical and commercial patent values.

  15. ISS Asset Tracking Using SAW RFID Technology

    Science.gov (United States)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  16. Degenerate RFID Channel Modeling for Positioning Applications

    Directory of Open Access Journals (Sweden)

    A. Povalac

    2012-12-01

    Full Text Available This paper introduces the theory of channel modeling for positioning applications in UHF RFID. It explains basic parameters for channel characterization from both the narrowband and wideband point of view. More details are given about ranging and direction finding. Finally, several positioning scenarios are analyzed with developed channel models. All the described models use a degenerate channel, i.e. combined signal propagation from the transmitter to the tag and from the tag to the receiver.

  17. RFID- Application in Info-Documentary Systems

    OpenAIRE

    Repanovici, Angela; Cristea, Luciana

    2011-01-01

    The automatization process in all industrial and social fields requires large amounts of data processing. Data Acquisition and Control Solutions can be improved by collecting and processing data in real-time without human involvement through Automatic Identification or Auto ID. Radio Frequency Identification (RFID - Radio Frequency Identification) or proximity is the latest and most advanced method automatic data collection technology, gaining a wide acceptance as people understand and use...

  18. RFID Reconsidered : what you need to know before investing in the latest self-check

    OpenAIRE

    Featherstone, Robin

    2006-01-01

    Radio Frequency Identification (RFID) Technology has the potential to revolutionize library services. However - not unlike the internet - RFID technology is evolving faster than the guidelines to guard against misuse. What effect will eventual RFID legislation have on North American libraries? Will potential benefits be overshadowed by security and privacy concerns? Is RFID technology a blessing or a curse?

  19. Application of RFID technology in Sardar Vallabhbhai National Institute of Technology (SVNIT), Surat

    OpenAIRE

    Ghosh, T. B.

    2007-01-01

    RFID (Radio Frequency Identification) is the latest technology to be used in different industries for security and theft detection. In this paper the concept of RFID is defined. Components of RFID Systems used by the SVNIT library are discussed. Advantages, shortcomings and remedies of RFID systems, and financial implications are explained with special reference to SVNIT library, Surat.

  20. Stage implementation of RFID in hospitals.

    Science.gov (United States)

    Kumar, Sameer; Livermont, Gregory; McKewan, Gregory

    2010-01-01

    The use of radio frequency identification device (RFID) technology within the healthcare industry was researched and specific instances of implementation of this technology in the hospital environment were examined. The study primarily makes use of ideas from operations and supply chain management, such as work flow diagrams, value stream mapping, and poka-yokes (mistake proofing measures) for investigations of processes, failures, and solutions. This study presents a step-by-step approach of how to implement the use of RFID tracking systems within the entire hospital. A number of poka-yokes were also devised for improving the safety of the patient and cost effectiveness of the hospital to insure the success of the hospital health care delivery system. Many players in the hospital environment may be impacted. This includes patients, doctors, nurses, technicians, administrators, and other hospital personnel. Insurance and government agencies may be impacted as well. Different levels of training of hospital personnel will be required based on the degree of interaction with the RFID system. References to costs, Return On Investment, change management, ethical and legal considerations are also made to help the reader understand the benefits and implications of the technology in the hospital environment.

  1. Passive RFID Rotation Dimension Reduction via Aggregation

    Science.gov (United States)

    Matthews, Eric

    Radio Frequency IDentification (RFID) has applications in object identification, position, and orientation tracking. RFID technology can be applied in hospitals for patient and equipment tracking, stores and warehouses for product tracking, robots for self-localisation, tracking hazardous materials, or locating any other desired object. Efficient and accurate algorithms that perform localisation are required to extract meaningful data beyond simple identification. A Received Signal Strength Indicator (RSSI) is the strength of a received radio frequency signal used to localise passive and active RFID tags. Many factors affect RSSI such as reflections, tag rotation in 3D space, and obstacles blocking line-of-sight. LANDMARC is a statistical method for estimating tag location based on a target tag's similarity to surrounding reference tags. LANDMARC does not take into account the rotation of the target tag. By either aggregating multiple reference tag positions at various rotations, or by determining a rotation value for a newly read tag, we can perform an expected value calculation based on a comparison to the k-most similar training samples via an algorithm called K-Nearest Neighbours (KNN) more accurately. By choosing the average as the aggregation function, we improve the relative accuracy of single-rotation LANDMARC localisation by 10%, and any-rotation localisation by 20%.

  2. RATT: RFID Assisted Tracking Tile. Preliminary results.

    Science.gov (United States)

    Quinones, Dario R; Cuevas, Aaron; Cambra, Javier; Canals, Santiago; Moratal, David

    2017-07-01

    Behavior is one of the most important aspects of animal life. This behavior depends on the link between animals, their nervous systems and their environment. In order to study the behavior of laboratory animals several tools are needed, but a tracking tool is essential to perform a thorough behavioral study. Currently, several visual tracking tools are available. However, they have some drawbacks. For instance, when an animal is inside a cave, or is close to other animals, the tracking cameras cannot always detect the location or movement of this animal. This paper presents RFID Assisted Tracking Tile (RATT), a tracking system based on passive Radio Frequency Identification (RFID) technology in high frequency band according to ISO/IEC 15693. The RATT system is composed of electronic tiles that have nine active RFID antennas attached; in addition, it contains several overlapping passive coils to improve the magnetic field characteristics. Using several tiles, a large surface can be built on which the animals can move, allowing identification and tracking of their movements. This system, that could also be combined with a visual tracking system, paves the way for complete behavioral studies.

  3. Strategic management and utilization of patents

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Gyeong Go; Yun, Gwon Jun

    1993-11-15

    This book deals with why does management of patents need?, system of management of patents with function and site of management of patents and system and composition, what does management of patents department do?, task like technical development, management regulation, patent information, management of patents in small business with technical development of small business, how does business manage the patents in real, introduction of management of patents in the U.S, Europe, Japan, and Korea, and management of patents as strategic management.

  4. Strategic management and utilization of patents

    International Nuclear Information System (INIS)

    Kim, Gyeong Go; Yun, Gwon Jun

    1993-11-01

    This book deals with why does management of patents need?, system of management of patents with function and site of management of patents and system and composition, what does management of patents department do?, task like technical development, management regulation, patent information, management of patents in small business with technical development of small business, how does business manage the patents in real, introduction of management of patents in the U.S, Europe, Japan, and Korea, and management of patents as strategic management.

  5. Development of a RFID Based Library Management System and ...

    African Journals Online (AJOL)

    The device consists majorly of a RFID reader, a Bluetooth module, a microcontroller and the materials to be tracked are tagged with a RFID (a transponder).B The unique IDs are stored in a PC running an application with other information on the materials into a database.B Through these processes, books, library users with ...

  6. Sistem Parkir Berbasis RFID dan Pengenalan Citra Pelat Nomor Kendaraan

    Directory of Open Access Journals (Sweden)

    Eko Didik Widianto

    2017-07-01

    Full Text Available The length of time in manually recording vehicle license plates in the parking system leads to long vehicle queues. This research developed automatic parking system based on RFID and vehicle plate number recognition. Authentication used a camera and Arduino Uno as the controller for RFID reading, feedback and gatekeeper control. The system will compare the characters image and RFID in the record of database to authorize a vehicle. Image processing was done by contour analysis method and had 91% in accuracy at 60 cm of distance and 131.89 milliseconds of reading speed. The system had been able to work to automatically open and close gates based on the match of RFID and vehicle plate number recognition. Waktu yang lama saat pencatatan pelat nomor kendaraan secara manual di sistem parkir menimbulkan antrean. Penelitian ini mengembangkan sistem parkir otomatis berbasis RFID dan pengolahan citra pelat nomor kendaraan. Autentikasi menggunakan kamera untuk pengambil gambar pelat nomor dan Arduino Uno sebagai kontroler untuk pembaca RFID, pemberi umpan balik dan pembuka gerbang. Sistem akan membandingkan karakter citra dan RFID pada database untuk menentukan izin penggunaan kendaraan. Pengolahan citra menggunakan metode analisis kontur dan memiliki akurasi sebesar 91 % di jarak 60 cm dan kecepatan baca 131,89 milidetik. Sistem telah dapat bekerja untuk secara otomatis membuka dan menutup gerbang berdasarkan kecocokan kartu RFID dan pelat kendaraan.

  7. Comprehension and application of patent information

    International Nuclear Information System (INIS)

    Lee, Sang Nam

    2004-05-01

    This book gives descriptions of conception of patent information such as the meaning, characteristic, function, investigation and map of patent information, pro-patent period and patent strategy of the business. It also deals with comprehension of patent information like publication of nations, patent document, patent procedure in Korea, patent procedure in Japan, the U.S, and Europe, article and function of patent document, patent information survey such as writing of search keyword, procedure of the survey and search site of other countries, patent analysis and patent map.

  8. Patenting human genes: Chinese academic articles' portrayal of gene patents.

    Science.gov (United States)

    Du, Li

    2018-04-24

    The patenting of human genes has been the subject of debate for decades. While China has gradually come to play an important role in the global genomics-based testing and treatment market, little is known about Chinese scholars' perspectives on patent protection for human genes. A content analysis of academic literature was conducted to identify Chinese scholars' concerns regarding gene patents, including benefits and risks of patenting human genes, attitudes that researchers hold towards gene patenting, and any legal and policy recommendations offered for the gene patent regime in China. 57.2% of articles were written by law professors, but scholars from health sciences, liberal arts, and ethics also participated in discussions on gene patent issues. While discussions of benefits and risks were relatively balanced in the articles, 63.5% of the articles favored gene patenting in general and, of the articles (n = 41) that explored gene patents in the Chinese context, 90.2% supported patent protections for human genes in China. The patentability of human genes was discussed in 33 articles, and 75.8% of these articles reached the conclusion that human genes are patentable. Chinese scholars view the patent regime as an important legal tool to protect the interests of inventors and inventions as well as the genetic resources of China. As such, many scholars support a gene patent system in China. These attitudes towards gene patents remain unchanged following the court ruling in the Myriad case in 2013, but arguments have been raised about the scope of gene patents, in particular that the increasing numbers of gene patents may negatively impact public health in China.

  9. Are biosimilars patentable?

    Science.gov (United States)

    Rolfe, Damian; Parker, Jayson; Morgan, Max

    2016-08-01

    This paper explores whether, and under what circumstances, a biosimilar approved in the United States under the Biologics Price Competition and Innovation Act (hereafter 'BPCIA') can be patented. The possibility that a biosimilar product could have meaningful patent protection arises from specific requirements for biosimilarity under the BPCIA, which account for the fact that manufacturing processes of biologics are inherently imprecise. The requirements for biosimilar approval may provide sufficient leeway to a biosimilar applicant to patent structural or formulation differences that provide non-clinical but business-relevant advantages over the reference molecule, such as improved shelf-life or ease of manufacture, without compromising clinical biosimilarity. Examination of the BPCIA and related Acts, Food and Drug Administration (FDA) guidance papers, case law, patent database searching, and relevant scholarly articles. Legislative and regulatory requirements for the approval of a biosimilar under the BPCIA are focused on clinical results and allow a degree of leeway for differences to exist between a biosimilar's structure and non-clinical components and those of the biosimilar's reference molecule. This leeway can be exploited to provide the biosimilar with potentially patentable business-relevant advantages over its reference product while maintaining clinical biosimilarity to the reference product.

  10. Patents on Endophytic Fungi.

    Science.gov (United States)

    Gokhale, M; Gupta, D; Gupta, U; Faraz, R; Sandhu, S S

    2017-01-01

    Endophytic fungi are taxonomically and ecologically heterogeneous group of organisms, mainly belonging to the Ascomycotina and Deuteromycotina. Endophytes usually produce the enzymes necessary for the colonization of plant tissues. Endophytes are able to utilize components of plant cells without disturbing host metabolism, which is confirmed by isozyme analysis and studies on substrate utilization. The patents related to enzymes and metabolites produced by endophytic fungi are associated with their ecological significance. Application of metabolites and growth promoting factors produced from endophytic fungi, in the pharmaceutical and agricultural industries, is now well established. The patents on secretion of extracellular enzymes in vitro by endophytic fungi needed for cell wall degradation, support the hypothesis that fungal endophytes represent a group of organisms specialized to live within plant tissue. This review presents the patents granted on different aspects of endophytic fungi for the last 11 years. This expresses the scenario and impact of these patents regarding significance in human society. In the last few years, research and inventions regarding the different aspects of endophytic fungi beneficial for host plant as well as for human beings have been carried out, which is supported by the increasing number of patents granted on endophytic fungi. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  11. Evolution of RFID Applications in Construction: A Literature Review

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2015-07-01

    Full Text Available Radio frequency identification (RFID technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper.

  12. RFID-tekniikan hyödyntäminen hoivakodissa

    OpenAIRE

    Pesonen, Miia

    2008-01-01

    Tutkimuksen tavoitteena on selvittää RFID-tekniikan tarjoamat hyödyt ja haasteet Hoivakoti X:ssä. Lisäksi tavoitteena on selvittää, voitaisiinko hoivakodin toimintaa tehostaa ja asukastyytyväisyyttä lisätä, mikäli RFID-tunnisteet otettaisiin käyttöön. Tutkimuksen teoriaosuudessa käsitellään RFID-tekniikan historiaa ja kehittymistä. Lisäksi perehdytään yleisimpiin RFID-järjestelmiin, tunnisteisiin, standardointiin, taustajärjestelmiin ja lukijoihin. Työssä käsitellään RFID-tekniikan mahdol...

  13. RFID Application of Smart Grid for Asset Management

    Directory of Open Access Journals (Sweden)

    Xiwei Wang

    2013-01-01

    Full Text Available RFID technology research has resolved practical application issues of the power industry such as assets management, working environment control, and vehicle networking. Also it provides technical reserves for the convergence of ERP and CPS. With the development of RFID and location-based services technology, RFID is converging with a variety of sensing, communication, and information technologies. Indoor positioning applications are under rapid development. Micromanagement environment of the assets is a useful practice for the RFID and positioning. In this paper, the model for RFID applications has been analyzed in the microenvironment management of the data center and electric vehicle batteries, and the optimization scheme of enterprise asset management is also proposed.

  14. System and Method for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  15. Evolution of RFID Applications in Construction: A Literature Review

    Science.gov (United States)

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  16. Preliminary Study of RFID System for the LILW Transportation

    International Nuclear Information System (INIS)

    Kim, Dohyung; Lee, Unjang; Choi, Kyusup

    2008-01-01

    Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. In Korea, Low-to-Intermediate Level Radioactive Wastes (LILW) are planed to be disposed at Kyeonju disposal repository, and 100,000 LILW drums will be disposed for the first 10 years of disposal. Tracking of these LILW drums is one of the important parts for safe transportation. To track the LILW drums during the transport as well as storage and disposal, RFID can be the prospective method for tracking the LILW drums. In this report, RFID system is introduced to the LILW transport from the generation site to disposal site, and one possible RFID system is suggested as a preliminary study

  17. Systems and Methods for RFID-Enabled Dispenser

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  18. Evolution of RFID Applications in Construction: A Literature Review.

    Science.gov (United States)

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-07-03

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper.

  19. RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, they will allow smart washing machines to check for incompatible clothes (e.g., white shirts and red socks) and smart

  20. Investigating RFIDs in the retail industry of South Africa: RFIDs friend or foe?

    CSIR Research Space (South Africa)

    Mashiane, T

    2012-10-01

    Full Text Available The main objective of this study is to evaluate existing literature in order to determine whether the South African retail industry will benefit or be put at risk by implementing RFID technology. The study analysed both scholarly and non...

  1. Patent Races and Market Value

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Hussinger, Katrin; Leten, Bart

    Patent races are models of strategic interactions between firms competing to develop an invention. The winning firm secures a patent, protecting the invention from imitation. This paper tests the assumption made about the reward structure in patent races, both in discrete and complex industries. We...... identify patent race winners using detailed information from the patent examination reports at the European Patent Office (EPO). Estimates of a market value equation featuring large, R&D-intensive U.S., European and Japanese firms, show that if firms win patent races, their market value increases...... significantly. We further show that the gain in market value is significantly larger for patent race winners in discrete industries than for firms in complex industries....

  2. The fallacy of Software Patents

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Software patents are usually used as argument for innovation but do they really promote innovation? Who really benefits from software patents? This talk attempts to show the problems with software patents and how they can actually harm innovation having little value for software users and our society in general.

  3. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    Science.gov (United States)

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction. Copyright © 2011 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  4. Patent pools: Intellectual property rights and competition.

    NARCIS (Netherlands)

    Rodriguez, V.F.

    2010-01-01

    Patent pools do not correct all problems associated with patent thickets. In this respect, patent pools might not stop the outsider problem from striking pools. Moreover, patent pools can be expensive to negotiate, can exclude patent holders with smaller numbers of patents or enable a group of major

  5. Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System

    Science.gov (United States)

    2008-12-01

    65 1. Traceability for Asset Visibility........................................................65 2. Purposes of RFID and IUID... Traceability Matrix for Asset Visibility...........................................................66 Table 7. IUID vs. RFID ...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT Feasibility of Radio Frequency Identification ( RFID ) and

  6. METRICS DEVELOPMENT FOR PATENTS.

    Science.gov (United States)

    Veiga, Daniela Francescato; Ferreira, Lydia Masako

    2015-01-01

    To develop a proposal for metrics for patents to be applied in assessing the postgraduate programs of Medicine III - Capes. From the reading and analysis of the 2013 area documents of all the 48 areas of Capes, a proposal for metrics for patents was developed to be applied in Medicine III programs. Except for the areas Biotechnology, Food Science, Biological Sciences III, Physical Education, Engineering I, III and IV and Interdisciplinary, most areas do not adopt a scoring system for patents. The proposal developed was based on the criteria of Biotechnology, with adaptations. In general, it will be valued, in ascending order, the deposit, the granting and licensing/production. It will also be assigned higher scores to patents registered abroad and whenever there is a participation of students. This proposal can be applied to the item Intellectual Production of the evaluation form, in subsection Technical Production/Patents. The percentage of 10% for academic programs and 40% for Masters Professionals should be maintained. The program will be scored as Very Good when it reaches 400 points or over; Good, between 200 and 399 points; Regular, between 71 and 199 points; Weak up to 70 points; Insufficient, no punctuation. Desenvolver uma proposta de métricas para patentes a serem aplicadas na avaliação dos Programas de Pós-Graduação da Área Medicina III - Capes. A partir da leitura e análise dos documentos de área de 2013 de todas as 48 Áreas da Capes, desenvolveu-se uma proposta de métricas para patentes, a ser aplicada na avaliação dos programas da área. Constatou-se que, com exceção das áreas Biotecnologia, Ciência de Alimentos, Ciências Biológicas III, Educação Física, Engenharias I, III e IV e Interdisciplinar, a maioria não adota sistema de pontuação para patentes. A proposta desenvolvida baseou-se nos critérios da Biotecnologia, com adaptações. De uma forma geral, foi valorizado, em ordem crescente, o depósito, a concessão e o

  7. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    OpenAIRE

    Zoltan KATO

    2014-01-01

    In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for tr...

  8. A Review of Implementing ADC in RFID Sensor

    Directory of Open Access Journals (Sweden)

    M. Zurita

    2016-01-01

    Full Text Available The general considerations to design a sensor interface for passive RFID tags are discussed. This way, power and timing constraints imposed by ISO/IEC 15693 and ISO/IEC 14443 standards to HF RFID tags are explored. A generic multisensor interface is proposed and a survey analysis on the most suitable analog-to-digital converters for passive RFID sensing applications is reported. The most appropriate converter type and architecture are suggested. At the end, a specific sensor interface for carbon nanotube gas sensors is proposed and a brief discussion about its implemented circuits and preliminary results is made.

  9. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    Science.gov (United States)

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity.

  10. Penerapan RFID (Radio Frequency Identification di Perpustakaan: Kelebihan dan Kekurangannya

    Directory of Open Access Journals (Sweden)

    Fadhilatul Hamdani

    2014-06-01

    Full Text Available Library is a dynamic organization and always change according to the times. With the development of information technology, libraries must change the way it works to be more advanced, efficient and effective. One application of the latest technology in libraries is using RFID technology, which has two main functions, namely identification and security of library materials. In addition to having several advantages, RFID also has some shortcomings when it will be implemented in the library. Application of RFID in libraries is expected to maximize the performance and service libraries.

  11. RFID in der Hauptbücherei Wien

    OpenAIRE

    Wenzl, Bernhard

    2006-01-01

    In 2003, the Vienna Central Public Library moved to its new building at the Urban-Loritz-Platz. Since than Radio Frequency Identification (RFID) has been used in order to process, charge, and secure media items. The RFID-system consists of 300.000 tags, more than two dozens of reading machines, and a software connection to other systems. The librarians process new books which contain an RFID-tag into the catalogue. The readers charge the books at open access charging systems. Security gates a...

  12. An Analysis of Information Assurance Relating to the Department of Defense Radio Frequency Identification (RFID) Passive Network

    Science.gov (United States)

    2005-03-01

    encouraging. Alien Technology, an RFID developer, “does predict that in quantities 12 of 1 billion, RFID tags will approach 10 cents each, and in lots...much greater threat to the retail market for changing prices , should RFID become the primary means of check out at a store. This is still possible...from http://java.sun.com/developer/technicalArticles/ Ecommerce /rfid/ Michelin Embeds RFID Tags in Tires. (2003). RFID Journal. Article

  13. 37 CFR 3.21 - Identification of patents and patent applications.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Identification of patents and patent applications. 3.21 Section 3.21 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... for Recording § 3.21 Identification of patents and patent applications. An assignment relating to a...

  14. Lovely but dangerous: The impact of patent citations on patent duration

    OpenAIRE

    Maurseth, Per Botolf

    2001-01-01

    - What is the impact of patent citations on patent renewal behaviour? Patent citations are commonly used as an indicator of technology spillovers. For cited patents therefore, patent citations have a potentially ambiguous impact. On the one hand, patent citations may indicate a scientific breakthrough, a high value of the cited patent and therefore a long survival period. On the other hand, patent citations may indicate competing innovations that render the cited patent obsolete. By discri...

  15. Investigation of Interference Models for RFID Systems

    Directory of Open Access Journals (Sweden)

    Linchao Zhang

    2016-02-01

    Full Text Available The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

  16. An RFID middleware for supply chain management

    Directory of Open Access Journals (Sweden)

    Artur Pinto Carneiro

    2011-12-01

    Full Text Available RFID (Radio Frequency Identification systems for identification and tracking of products and equipments have been progressively adopted as an essential tool for supply chain management, a production environment where the members usually share with each other their own logistic and management systems. Therefore, the development of supply chain RFID systems can be strongly simplified through the inclusion of an intermediate software layer – the middleware – responsible for the creation of interfaces to integrate all the heterogeneous software components. In this article we present a case study developed at IPT (Instituto de Pesquisas Tecnológicas do Estado de São Paulo which gave rise to a middleware prototype able to implement the required software integration on the supply chain of an electric power distribution company. The developed middleware is used to manage the interactions with a heterogeneous group of mobile devices  cell phones, handhelds and data colectors,  operated by different supply chain agents that grab data associated to various processes executed by a given electric power distribution equipment during its life cycle and transfer those data to a central database in order to share them with all the logistic and management corporation systems.

  17. Arduino Based RFID Line Switching Using SSR

    Directory of Open Access Journals (Sweden)

    Michael E.

    2017-10-01

    Full Text Available The importance of line switching cannot be overemphasized as they are used to connect and disconnect substations to and from a distribution grid. At the cradle of technology line switching was achieved via the use of manual switches or fuses which could endanger life as a result of electrocution when expose during maintenance. This ill prompted the development of automated line switching using relays and contactors. With time this tends to fail as a result of wearing of the contact which is as a result of arcing and low voltage. To avert all these ills this paper presents Arduino based Radio Frequency Identification RFID line switching using Solid State Relay SSR. This is to ensure the safety of operators or technologist and to also avert the problem associated with relays and contactors using SSR. This was achieved using RFID RC-522 reader ardriuno Uno SSR and other discrete components. The system was tested and worked perfectly reducing the risk of electrocution and eliminating damage wearing of the contacts common with contactors and relays.

  18. Recent patents on flavonoids.

    Science.gov (United States)

    Mamta, Gokhale; Bansal, Y K; Sandhu, S S

    2013-12-01

    Flavonoids are substances which are widely distributed in the plant kingdom. They occur in considerable quantities in common food products, spices and beverages. Interest of researchers has been greatly enhanced towards therapeutic potential of flavonoids in last some years. This review summarizes important patents pertaining to recent biotechnological techniques applied for the production, analysis of biosynthetic pathways, effects and applications of different flavonoids. For systematic studies investigations which have been published in the form of patents, are classified in different sectors like biosynthesis, medical application, antimicrobial activity, alteration of flower color, industrial application, cosmetics, food and plant tissue culture. A number of activities have been observed in each sector with vast area of research on flavonoids.

  19. Science of invention patent

    International Nuclear Information System (INIS)

    Park, Yeong Taek; Park, Su Dong

    1999-02-01

    This book tells science of invention patent about new way of invention and creative solution for problems, basic conception of TRIZ, resolution of physical contradictory and technical contradictory, development of system and types of evolution, change of thinking for solving the problems, analysis of structure for problem solution, problem solution using scientific phenomenon and effect, use of standard solution and algorithm of creative problem solution.

  20. Low Cost Writeable RFID Tag With MRAM Memory

    National Research Council Canada - National Science Library

    Beech, Russell

    1998-01-01

    This program's goal was to develop a writeable RFID tag using an integrated, permeable core coil as the inductor/antenna for communication and power transfer and MRAM as the low write energy, nonvolatile memory...

  1. A study of RFID application impacts on medical safety.

    Science.gov (United States)

    Chang, She-I; Ou, Chin-Shyh; Ku, Cheng-Yuan; Yang, Morris

    2008-01-01

    With the international reform in medical management systems gaining ground worldwide, hospital management has gradually begun to shift its focus from providing expensive medical treatment to improving medical service quality and patient safety. In this study, we discuss the application of Radio Frequency Identification (RFID) and data integrating technology with the medical service, and examine whether or not this technology can enhance medical safety. We also discuss the possible benefits following the application of the RFID system. The findings show that the application of RFID to hospitals can actually generate benefits, which can be further divided into operational structure benefits, users' structure benefits, and organisational and environmental benefits. However, not all these benefits can achieve medical safety. Among them, only the operator and environmental benefits can play such roles. Nevertheless, the application of RFID can bring hospitals towards the integration of technology benefits and improved medical safety.

  2. The design and simulation of UHF RFID microstrip antenna

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Liu, Liping; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Renheng, Xu

    2018-02-01

    At present, China has delineated UHF RFID communicating frequency range which is 840 ∼ 845 MHz and 920 ∼ 925 MHz, but most UHF microstrip antenna don’t carry out this standard, that leads to radio frequency pollution. In order to solve the problems above, a method combining theory and simulation is adopted. Combining with a new ceramic material, a 925.5 MHz RFID microstrip antenna is designed, which is optimized and simulated by HFSS software. The results show that the VSWR of this RFID microstrip antenna is relatively small in the vicinity of 922.5 MHz, the gain is 2.1 dBi, which can be widely used in China’s UHF RFID communicating equipments.

  3. RFID Supply Chain Management System for Naval Logistics

    National Research Council Canada - National Science Library

    McCredie, Alexander

    2005-01-01

    ...) embodied in the structure of a Dynamic Smart Box (DSB). A middle-ware called Inteliware interfaces with the RFID components and computers in the DSB and inputs the requisite data into the Dynamic Smart Manifest...

  4. Investigation of RFID Based Sensors for Sustainable Transportation Applications

    Science.gov (United States)

    2011-01-21

    Through support of a University Transportation Research Center Faculty Development Minigrant an investigation was made into the use of RFID based sensing technologies for transportation purposes. Transportation applications would potentially include ...

  5. A Graph Summarization Algorithm Based on RFID Logistics

    Science.gov (United States)

    Sun, Yan; Hu, Kongfa; Lu, Zhipeng; Zhao, Li; Chen, Ling

    Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will generate a complete history of all the individual locations that it occupied at every point in time. The movement trails of such RFID data form gigantic commodity flowgraph representing the locations and durations of the path stages traversed by each item. In this paper, we use graph to construct a warehouse of RFID commodity flows, and introduce a database-style operation to summarize graphs, which produces a summary graph by grouping nodes based on user-selected node attributes, further allows users to control the hierarchy of summaries. It can cut down the size of graphs, and provide convenience for users to study just on the shrunk graph which they interested. Through extensive experiments, we demonstrate the effectiveness and efficiency of the proposed method.

  6. Securing the Use of RFID-Enabled Banknotes

    Science.gov (United States)

    Martínez, Santi; Roig, Concepció; Valls, Magda

    The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.

  7. A Secure RFID Authentication Protocol Adopting Error Correction Code

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2014-01-01

    Full Text Available RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  8. A secure RFID authentication protocol adopting error correction code.

    Science.gov (United States)

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.

  9. Privacy implications of RFID: An assessment of threats and opportunites

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2008-01-01

    European citizens consider Radio Frequency Identification (RFID) to be the most intrusive technology of the past two decades. Safeguarding privacy requires specific action that needs attention of all parties involved. European citizens consider legal instruments to offer insufficient guarantees for

  10. Tracking the social dimensions of RFID systems in hospitals.

    Science.gov (United States)

    Fisher, Jill A; Monahan, Torin

    2008-03-01

    Radio frequency identification (RFID) is an emerging technology that is rapidly becoming the standard for hospitals to track inventory, identify patients, and manage personnel. Research involved qualitative methods including participant observation and interviews with hospital staff members and industry consultants in the United States. Hospital staff, especially nurses, expressed concern about the surveillance potential of these tracking technologies. Additionally, nursing staff frequently experience an intensification of labor as a result of the implementation of RFID systems because the task of keeping the systems operational often falls upon them. The social and organizational factors that contribute to the success or failure of RFID systems in hospitals must be further analyzed. The implications of RFID systems, such as privacy concerns and work intensification for nursing and other hospital staff, should be taken into account from the outset, especially during the design and implementation of the technology.

  11. Keeping track. Barcodes and RFID tags make inroads in hospitals.

    Science.gov (United States)

    Degaspari, John

    2011-03-01

    Barcodes are a proven technology for reducing medication administration errors, while RFID tags show promise for tracking of assets as well as personnel and patients. Yet implementation has been slow, as hospitals struggle with cost and complexity issues.

  12. AN OVERVIEW OF ETHICAL CONSIDERATIONS WHEN USING RFID WITH CONSUMERS

    Directory of Open Access Journals (Sweden)

    Harold Boeck

    2014-12-01

    Full Text Available RFID has recently garnered significant interest in the area of customer relationship management by tagging consumers wirelessly and automatically identifying them at a distance. Through a descriptive meta-analysis, this article provides results that indicate that the use of RFID technology in consumer applications raises relatively important ethical and moral concerns, particularly in terms of privacy. The results of our descriptive meta-analysis reveal little empirical research and therefore highlight the need to deepen our knowledge on the ethical considerations brought forth from using RFID. The most important ethical considerations were in terms of privacy, which includes capturing shopping habits, consumer demographic information, and tracking of a person's movements. Literature emphasized technological solutions to counter RFID ethical issues, leaving industry normative procedures and regulatory frameworks in the background.

  13. Patents and Antitrust: Application to Adjacent Markets

    OpenAIRE

    Nicholas Economides; William N. Hebert

    2007-01-01

    We examine the intersection of patents and antitrust where a patent holder uses the monopoly power it possesses in the market for a patented product to exclude competitors in an adjacent market and attempt to monopolize or monopolize the adjacent market. The present scheme for awarding patents cannot judge when the issuance of a patent will lead to the appropriate balance between innovation and efficiency. Where a patent holder’s invention uses an interface with adjacent products, the patent ...

  14. A Hybrid Collision Resolution Protocol for Passive RFID Tag Identification

    OpenAIRE

    Xin-qing, Yan; Zhou-ping, Yin; You-lun, Xiong

    2009-01-01

    Wireless communication channel collision of RFID system is a key issue that affects the pervasive application of the system, especially for passive RFID system due to the constrained communication ability and energy supply of tags. The collision resolution protocols suggested can be categorized into deterministic tree based protocols and probabilistic frame slot ALOHA based protocols. A hybrid protocol, which combines the query tree protocol and dynamic framed slotted ALOHA protocol, is prese...

  15. The role of RFID in agriculture: Applications, limitations and challenges

    OpenAIRE

    Ruiz García, Luis; Lunadei, Loredana

    2011-01-01

    The recent advances in RFID offer vast opportunities for research, development and innovation in agriculture. The aim of this paper is to give readers a comprehensive view of current applications and new possibilities, but also explain the limitations and challenges of this technology. RFID has been used for years in animal identification and tracking, being a common practice in many farms. Also it has been used in the food chain for traceability control. The implementation of sen...

  16. Mining Risk Factors in RFID Baggage Tracking Data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Calders, Toon; Pedersen, Torben Bach

    2015-01-01

    and frustration to the passengers. To remedy these problems we propose a detailed methodology for mining risk factors from Radio Frequency Identification (RFID) baggage tracking data. The factors should identify potential issues in the baggage management. However, the baggage tracking data are low level...... experimental study with real RFID baggage tracking data and it shows that the proposed methodology results in a strong classifier, and can find interesting concrete patterns and reveal useful insights of the data....

  17. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin

    2011-07-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without an integrated negative impedance converter designed to cancel out the antenna\\'s input capacitance at resonance frequency was designed, simulated, constructed and measured for implementation in RFID applications. © 2011 IEEE.

  18. Aspects for the Utilisation of Radio Frecquency Identification RFID

    Directory of Open Access Journals (Sweden)

    Ionut Balan

    2007-01-01

    Full Text Available The project presents some aspects about theutilisation of the RFID technology, the latest objectidentification technology and data collection practice. Hereare presented the advantages and the limits of this technologyusage relative to the barcodes, the defined standards for thistechnology and some practicability domains. It is achieved ashort presentation about the mini-computers (a newachievement of IT technology. For the application wepresent a micro-system for good identification, using theRFID technology, and a PDA (mobile computer.

  19. Radio Frequency Identification (RFID): its usage and libraries

    OpenAIRE

    Rafiq, Muhammad

    2004-01-01

    Radio Frequency Identification (RFID) is one of the most exciting technologies that revolutionize the working practices by increasing efficiencies, and improving profitability. The article provides details about RFID, its components, how it works, and its usage in different sectors i.e. retail sales and supply chains, livestock industry, courier services, military and prisons, automobiles and logistics, entertainment industry, publishing industry, wireless transaction, and, especially, in...

  20. Is the RFID technology ready to integrate supplychain activities?

    OpenAIRE

    Chan, Hing Kai; Chan, Felix T.S.

    2008-01-01

    Radio Frequency Identification (RFID) is not a new technology andhas been introduced for military applications for a long time. Nevertheless, ithas been recognised as a device that may soon change the mode of operationsthroughout the supply chain. There is no question that the technology willreduce labour and improve accuracy in inventory management by improvinginventory visibility. However, a review of recent research and the developmentof RFID technology in supply chain related applications...

  1. Processing Uncertain RFID Data in Traceability Supply Chains

    Directory of Open Access Journals (Sweden)

    Dong Xie

    2014-01-01

    Full Text Available Radio Frequency Identification (RFID is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  2. Processing uncertain RFID data in traceability supply chains.

    Science.gov (United States)

    Xie, Dong; Xiao, Jie; Guo, Guangjun; Jiang, Tong

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  3. The Study on Using Passive RFID Tags for Indoor Positioning

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2011-02-01

    Full Text Available Radio frequency identification (RFID is the technology that put an RFID tag on objects or people, so that they can be identified, tracked, and managed automatically. With its wide application in the automobile assembly industry, warehouse management and the supply chain network, RFID has been recognized as the next promising technology in serving the positioning purpose. Existing positioning technologies such as GPS are not available indoors as the terminal cannot get the signal from satellites. To enhance the availability of the positioning systems for indoors, the development of RFID positioning system for locating objects or people have became a hot topic in recent research. Compared with conventional active and high‐cost solutions, this paper studied the feasibility of using passive RFID tags for indoor positioning and object location detection to provide real time information for tracking movement. Results of experiment show that readability of the passive RFID positioning system is satisfactory, and it is a more cost effective solution when compared with other positioning technologies.

  4. Electromagnetic compatibility of implantable neurostimulators to RFID emitters.

    Science.gov (United States)

    Pantchenko, Oxana S; Seidman, Seth J; Guag, Joshua W; Witters, Donald M; Sponberg, Curt L

    2011-06-09

    The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz. The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  5. RFID - based Staff Control System (SCS) in Kazakhstan

    International Nuclear Information System (INIS)

    Saparkhojayev, N

    2015-01-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS. (paper)

  6. A Qualitative Approach to Mobile Robot Navigation Using RFID

    International Nuclear Information System (INIS)

    Hossain, M; Rashid, M M; Bhuiyan, M M I; Ahmed, S; Akhtaruzzaman, M

    2013-01-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot

  7. An Integrated Conceptual Framework for RFID Enabled Healthcare

    Directory of Open Access Journals (Sweden)

    Gaurav Gupta

    2015-12-01

    Full Text Available Radio frequency identification (RFID technology is a wireless communication technology that facilitates automatic identification and data capture without human intervention. Since 2000s, RFID applications in the health care industry are increasing.  RFID has brought many improvements in areas like patient care, patient safety, equipment tracking, resource utilization, processing time reduction and so on. On the other hand, often deployment of RFID is questioned on the issues like high capital investment, technological complexity, and privacy concerns. Exploration of existing literature indicates the presence of works on the topics like asset management, patient management, staff management, institutional advantages, and organizational issues. However, most of the works are focused on a particular issue. Still now, scholarly attempts to integrate all the facades of RFID-enabled healthcare are limited. In this paper, we propose a conceptual framework that represents the scope for implementation of this technology and the various dimensions of RFID-enabled healthcare and demonstrate them in detail. Also, we have discussed the critical issues that can prove to be potential barriers to its successful implementation and current approaches to resolving these. We also discuss some of the regulatory initiatives encouraging its adoption in the healthcare industry. Also, we have highlighted the future research opportunities in this domain.

  8. Designing tangible interaction using short-range RFID

    Directory of Open Access Journals (Sweden)

    Kjetil Nordby

    2010-12-01

    Full Text Available Short-range Radio Frequency IDentification (SR-RFID technology embedded in mobile phones offers interaction design practitioners the potential to design new forms of mobile experiences. The article presents a design oriented research study that seeks to develop affordances specifically in support of such practice. To do so the authors draw on Activity Theory. They present three levels of SR-RFID related design affordances: need related design affordances, instrumental design affordances and operational design affordances. Included also is what they label ‘RFID based Tap and Hold’; a term used so as to frame tangible interaction on SR-RFID. A generative and descriptive model of Tap and Hold is proposed, as is a set of input techniques derived from the Tap and Hold model. Overall, the study suggests opening out from functional views of SR-RFID to ones that view it as a technology applicable for designers exploring potential new interactions. This is important since such work may be used to support the generation of new designs, an area often overlooked in research on RFID.

  9. Analysis of Tobyhanna Army Depot's Radio Frequency Identification (RFID) Pilot Program: RFID as an Asset Management Tool

    National Research Council Canada - National Science Library

    Miertschin, Keith W; Forrest, Brian D

    2005-01-01

    ...) used for inventory and asset management at the Tobyhanna Army Maintenance Depot. Tobyhanna Army Depot recently partnered with WhereNet Corporation for a pilot program to incorporate a real-time locating system that uses RFID...

  10. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  11. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  12. 43 CFR 6.52 - Patents.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Patents. 6.52 Section 6.52 Public Lands: Interior Office of the Secretary of the Interior PATENT REGULATIONS Licenses § 6.52 Patents. Patents in... sublicenses, are classified as follows: (a) Class A. Patents, other than those referred to in paragraph (c) of...

  13. Decommissioning support system, using RFID and USN

    International Nuclear Information System (INIS)

    Cho, W. H.; Park, S. K.; Choi, Y. D.; Lee, K. I.; Moon, J. K.

    2012-01-01

    RFID and USN are key technology in the ubiquitous computing systems. Actual physical environmental information can be used to remote control systems and management using various sensor technology and wireless network. These are used to managing physical distribution systems, complex monitoring environments such as fire detecting and various environments in the field of u-healthcare. Recently, decontamination and dismantling for nuclear plant have increasing interest after Fucushima nuclear accident. In this paper, a decommissioning support system is suggested for an effective management and control of work efficiency and of worker's status. This system makes effective real-time monitoring worker's location, work status and radiation exposure and effective response for worker's safety and emergency situation

  14. Enhanced-Bivium Algorithm for RFID System

    Directory of Open Access Journals (Sweden)

    Shiyong Zhang

    2015-01-01

    Full Text Available RFID (radio frequency identification is an emerging technology for automatic identification of physical objects using radio frequency. The security and privacy of the system is increasingly concerned and some light-weight encryption schemes such as Trivium and Bivium have been proposed. In this paper, the internal structure of Bivium is exploited and generalized to an algorithm called Bivium-Model. It is shown that the original Bivium has its inherent imperfections due to the improper parameter selection. A set of better parameters are given out to fix the security vulnerability of original Bivium. Emulation results also show that the Enhanced-Bivium algorithm achieves lower power consumption and lower die size.

  15. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    OpenAIRE

    Isabel Expósito; Iñigo Cuiñas

    2013-01-01

    The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a...

  16. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chao Chen

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  17. Assessment of RFID Investment in the Military Logistics Systems Through The Life Cycle Cost (LCC) Model

    OpenAIRE

    Ozdemir, Ahmet; Bayrak, Mustafa

    2015-01-01

    Radio Frequency Identification (RFID) is an emerging technology that has been recently used in numerous business and public fields. Most military applications of RFID have focused on logistics systems. Since RFID investment requires high initial cost and its benefits are hard to see in the short term, it needs an appropriate investment decision model. The purpose of this research is to propose a Life Cycle Cost (LCC) model for RFID integration into the Military Logistics System (MLS). The stu...

  18. Assessment of RFID investment in the military logistics systems through the Cost of Ownership Model (COO)

    OpenAIRE

    Ozdemir, Ahmet; Bayrak, Mustafa Ali

    2010-01-01

    MBA Professional Report Radio Frequency Identification (RFID) is an emerging technology that has been recently used in numerous business and public fields. Most military applications of RFID have focused on logistics systems. Since RFID investment requires high initial cost and its benefits are hard to see in the short term, it needs an appropriate investment decision model. The purpose of this research is to propose a Cost of Ownership (COO) model for RFID integration into the Military ...

  19. RFID in the healthcare supply chain: usage and application.

    Science.gov (United States)

    Kumar, Sameer; Swanson, Eric; Tran, Thuy

    2009-01-01

    The purposes of this study are to first, determine the most efficient and cost effective portions of the healthcare supply chain in which radio frequency identification devices (RFID) can be implemented. Second, provide specific examples of RFID implementation and show how these business applications will add to the effectiveness of the healthcare supply chain. And third, to describe the current state of RFID technology and to give practical information for managers in the healthcare sector to make sound decisions about the possible implementation of RFID technology within their organizations. Healthcare industry literature was reviewed and examples of specific instances of RFID implementation were examined using an integrated simulation model developed with Excel, @Risk and Visio software tools. Analysis showed that the cost of implementing current RFID technology is too expensive for broad and sweeping implementation within the healthcare sector at this time. However, several example applications have been identified in which this technology can be effectively leveraged in a cost-effective way. This study shows that RFID technology has come a long way in the recent past and has potential to improve healthcare sector productivity and efficiency. Implementation by large companies such as Wal-mart has helped to make the technology become much more economical in its per unit cost as well as its supporting equipment and training costs. The originality of this study lies in the idea that few practical and pragmatic approaches have been taken within the academic field of study for the implementation of RFID into the healthcare supply chain. Much of the research has focused on specific companies or portions of the supply chain and not the entire supply chain. Also, many of the papers have discussed the future of the supply chain that is heavily dependent on advances in RFID technology. A few viable applications of how RFID technology can be implemented in the healthcare

  20. The role of patent and non-patent databases in patent research in universities

    Science.gov (United States)

    Tolstaya, A. M.; Suslina, I. V.; Tolstaya, P. M.

    2017-01-01

    This studies deal with the description and systematization of the popular patent retrieval resources. The importance of the non-patent information when conducting patent research for the intellectual property created in educational and scientific activity of the university is highlighted. The differences in the patent and non-patent information are found out. Based on the databases` analysis the authors conducted the patent research on "Wireless endoscopic capsules" (development of the NRNU MEPhI). This study can be used to facilitate the university work on the new product development in order to improve the efficiency of the process of the commercialization of the intellectual activity results, including the entering the international market.

  1. 37 CFR 1.710 - Patents subject to extension of the patent term.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Patents subject to extension of the patent term. 1.710 Section 1.710 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL RULES OF PRACTICE IN PATENT CASES Adjustment and Extension...

  2. How Patent Function Integration with R&D Influence the Value of Patents

    DEFF Research Database (Denmark)

    Beukel, Karin; Valentin, Finn

    with no in-house patent function mitigates and generate valuable patents by focusing on broader patents. The findings emphasize that managerial decisions on organizational setup of patent functions are critical for firm success in creating valuable patents and adds to the literature on how patenting...

  3. Use of RFID Technology for Identification, Traceability Monitoring and the Checking of Product Authenticity

    OpenAIRE

    Adriana Alexandru; Eleonora Tudora; Ovidiu Bica

    2010-01-01

    This paper is an overview of the structure of Radio Frequency Identification (RFID) systems and radio frequency bands used by RFID technology. It also presents a solution based on the application of RFID for brand authentication, traceability and tracking, by implementing a production management system and extending its use to traders.

  4. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Science.gov (United States)

    2010-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  5. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    Science.gov (United States)

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  6. Implications of RFID in Location-Aware Wi-Fi Networks

    Science.gov (United States)

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  7. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Defense Microelectronics Activity (DMEA)

    Science.gov (United States)

    2011-12-01

    23). New York: Springer. 100 Jung, B. M., & Baek, D. H. (2009). Estimating the ROI on implementation of RFID at the ammunition storage warehouse ...ANALYSIS OF RADIO FREQUENCY IDENTIFICATION ( RFID ) IMPLEMENTATION AT THE DEFENSE MICROELECTRONICS ACTIVITY (DMEA) by James B. Gerber December...Identification ( RFID ) Implementation at the Defense Microelectronics Activity (DMEA) 5. FUNDING NUMBERS 6. AUTHOR(S) James B. Gerber 7

  8. RFID tags for cryogenic applications: xxperimental and numerical analysis of thermo-mechanical behaviour

    NARCIS (Netherlands)

    Cauchois, R.; Yin, M.S.; Gouantes, A.; Boddaert, X.

    2013-01-01

    RFID solutions will improve the traceability of biological samples stored at low temperature (77 K) in biobanks. To achieve this goal, the reliability of RFID tags is essential. In this paper, we focus on the reliability aspect of RFID tags in harsh environment and more specifically to assembly

  9. Recent patents and patented technology platforms for pharmaceutical taste masking.

    Science.gov (United States)

    Kaushik, Deepak; Dureja, Harish

    2014-04-01

    Taste masking is an important factor in the development of oral dosage forms containing bitter active pharmaceutical ingredients. Currently numerous techniques are being applied to overcome this problem. Realizing this, several researchers and pharmaceutical companies are now engaged in developing novel techniques to address the problem of taste masking evident by numerous patents filed in this area in recent times. In this review the most recent patents for taste masking are discussed and how these patents overcome the limitations of conventional approaches of taste masking is also highlighted. Novel techniques based on some recent patents such as nanohybrid, melt extrusion, non-complex cyclodextrin compositions and off taste masking are providing new realms to taste masking of bitter drugs. The present article also provides an overview of various patented platform technologies based on different techniques/mechanisms employed for taste masking. The unique features and principles of taste-masking approaches used in various patented technologies are also discussed. A better understanding of these new patents and patented technologies will help researchers and pharmaceutical industries to select the appropriate platform, or to develop innovative products with improved taste masking properties.

  10. Patents to "treat me", no patents to "test me": an analysis of the 2009 Senate inquiry into gene patents.

    Science.gov (United States)

    Triffett, Damian

    2010-05-01

    This article critically analyses the submissions to the Senate Community Affairs Committee Inquiry into Gene Patents. It argues that gene patents are essential for attracting the investment required to ensure therapeutics based on gene technology reach the patient (patents to "treat me"). However, due to the lower costs of development, it argues that gene patent incentive is not required to ensure patient access to genetic testing services (no patents to "test me"). The article recommends that gene patents should not be prohibited by an amendment of the Patents Act 1990 (Cth), rather that regulation should occur post-grant to ensure patented technology is broadly licensed.

  11. Patent and product piracy

    Science.gov (United States)

    Ignat, V.

    2016-08-01

    Advanced industrial countries are affected by technology theft. German industry annually loses more than 50 billion euros. The main causes are industrial espionage and fraudulent copying patents and industrial products. Many Asian countries are profiteering saving up to 65% of production costs. Most affected are small medium enterprises, who do not have sufficient economic power to assert themselves against some powerful countries. International organizations, such as Interpol and World Customs Organization - WCO - work together to combat international economic crime. Several methods of protection can be achieved by registering patents or specific technical methods for recognition of product originality. They have developed more suitable protection, like Hologram, magnetic stripe, barcode, CE marking, digital watermarks, DNA or Nano-technologies, security labels, radio frequency identification, micro color codes, matrix code, cryptographic encodings. The automotive industry has developed the method “Manufactures against Product Piracy”. A sticker on the package features original products and it uses a Data Matrix verifiable barcode. The code can be recorded with a smartphone camera. The smartphone is connected via Internet to a database, where the identification numbers of the original parts are stored.

  12. The Academic Advantage: Gender Disparities in Patenting

    OpenAIRE

    Sugimoto, Cassidy R.; Ni, Chaoqun; West, Jevin D.; Larivi?re, Vincent

    2015-01-01

    We analyzed gender disparities in patenting by country, technological area, and type of assignee using the 4.6 million utility patents issued between 1976 and 2013 by the United States Patent and Trade Office (USPTO). Our analyses of fractionalized inventorships demonstrate that women's rate of patenting has increased from 2.7% of total patenting activity to 10.8% over the nearly 40-year period. Our results show that, in every technological area, female patenting is proportionally more likely...

  13. Pesticides and the Patent Bargain

    NARCIS (Netherlands)

    Timmermann, C.A.

    2015-01-01

    In order to enlarge the pool of knowledge available in the public domain, temporary exclusive rights (i.e. patents) are granted to innovators who are willing to fully disclose the information needed to reproduce their invention. After the 20-year patent protection period elapses, society should be

  14. Optimal patent policies: A survey

    DEFF Research Database (Denmark)

    Poulsen, Odile

    2002-01-01

    , the government uses two policy tools, the optimal breadth and length. We show that theoretical models give very different answers to what is the optimal patent policy. In particular, we show that the optimal patent policy depends among othet things on the price elasticity of demand, the intersectoral elasticity...

  15. Wacky Patents Meet Economic Indicators

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Hussinger, Katrin; Schneider, Cédric

    2011-01-01

    We investigate whether standard indicators can distinguish between “wacky” patents and a control group. Forward citations are good predictors of importance. However, “wacky” patents have higher originality, generality and citation lags, suggesting that these indicators should be interpreted...

  16. Proteasome inhibitor patents (2010 - present).

    Science.gov (United States)

    Metcalf, Rainer; Scott, Latanya M; Daniel, Kenyon G; Dou, Q Ping

    2014-04-01

    Over the past 3 years, numerous patents and patent applications have been submitted and published involving compounds designed to inhibit the proteasome. Proteasome inhibition has been of great interest in cancer research since disruption of proteolysis leads to a significant buildup of cytotoxic proteins and activation of apoptotic pathways, particularly in rapidly proliferating cells. The current standards in proteasome inhibition are the only FDA-approved inhibitors, bortezomib and carfilzomib. Although these drugs are quite effective in treating multiple myeloma and other blood tumors, there are shortcomings, including toxicities and resistance. Most of the current patents attempt to improve on existing compounds, by increasing bioavailability and selectivity, while attempting to reduce toxicity. A general categorization of similar compounds was employed to evaluate and compare drug design strategies. This review focuses on novel compounds and subsequent analogs developed for proteasome inhibition, used in preventing and treating human cancers. A comprehensive description and categorization of patents related to each type of compound and its derivatives, as well as their uses and efficacies as anticancer agents is included. A review of combination therapy patents has also been included. Although there are many diverse chemical scaffolds being published, there are few patented proteasome inhibitors whose method of inhibition is genuinely novel. Most patents utilize a destructive chemical warhead to attack the catalytic threonine residue of the proteasome active sites. Few patents try to depart from this, emphasizing the need for developing new mechanisms of action and specific targeting.

  17. Text mining factor analysis (TFA) in green tea patent data

    Science.gov (United States)

    Rahmawati, Sela; Suprijadi, Jadi; Zulhanif

    2017-03-01

    Factor analysis has become one of the most widely used multivariate statistical procedures in applied research endeavors across a multitude of domains. There are two main types of analyses based on factor analysis: Exploratory Factor Analysis (EFA) and Confirmatory Factor Analysis (CFA). Both EFA and CFA aim to observed relationships among a group of indicators with a latent variable, but they differ fundamentally, a priori and restrictions made to the factor model. This method will be applied to patent data technology sector green tea to determine the development technology of green tea in the world. Patent analysis is useful in identifying the future technological trends in a specific field of technology. Database patent are obtained from agency European Patent Organization (EPO). In this paper, CFA model will be applied to the nominal data, which obtain from the presence absence matrix. While doing processing, analysis CFA for nominal data analysis was based on Tetrachoric matrix. Meanwhile, EFA model will be applied on a title from sector technology dominant. Title will be pre-processing first using text mining analysis.

  18. A metodologia criativa TRIZ analisada por meio de um estudo em patentes

    Directory of Open Access Journals (Sweden)

    Alexsandro Cardoso Carvalho

    2016-01-01

    Full Text Available This article discusses creativity, specifically, the Theory of Inventive Problem Solving (TRIZ, as a methodology. It is an exploratory study based on a bibliometric analysis of patents. Quantitative and qualitative analyses were performed on these patents aiming to identify how TRIZ has been used in technological innovation and, specifically, to determine the existence of innovative contributions attributable to TRIZ. Initially, 57 patent documents available in the Espacenet database were analyzed; after separating, filtering, and normalizing, 27 documents remained. These documents were summarized, grouped into categories and analyzed in the following manner: country of origin, most-used words, year of filing, and applicant. As a result, we obtained data pointing to TRIZ as an important support methodology to the inventive process and identified the interactions of TRIZ with other support methodologies leading to creativity. Updates in TRIZ have been also found, regarding the use of basic patents, clustering inventive principles, and zero matrix solutions.

  19. PHASE II VAULT TESTING OF THE ARGONNE RFID SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-06-25

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step

  20. Phase II Vault Testing of the Argonne RFID System

    International Nuclear Information System (INIS)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-01-01

    The U.S. Department of Energy (DOE) (Environmental Management (EM), Office of Packaging and Transportation (EM-45)) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase

  1. Two-Way Communication Using RFID Equipment and Techniques

    Science.gov (United States)

    Jedry, Thomas; Archer, Eric

    2007-01-01

    Equipment and techniques used in radio-frequency identification (RFID) would be extended, according to a proposal, to enable short-range, two-way communication between electronic products and host computers. In one example of a typical contemplated application, the purpose of the short-range radio communication would be to transfer image data from a user s digital still or video camera to the user s computer for recording and/or processing. The concept is also applicable to consumer electronic products other than digital cameras (for example, cellular telephones, portable computers, or motion sensors in alarm systems), and to a variety of industrial and scientific sensors and other devices that generate data. Until now, RFID has been used to exchange small amounts of mostly static information for identifying and tracking assets. Information pertaining to an asset (typically, an object in inventory to be tracked) is contained in miniature electronic circuitry in an RFID tag attached to the object. Conventional RFID equipment and techniques enable a host computer to read data from and, in some cases, to write data to, RFID tags, but they do not enable such additional functions as sending commands to, or retrieving possibly large quantities of dynamic data from, RFID-tagged devices. The proposal would enable such additional functions. The figure schematically depicts an implementation of the proposal for a sensory device (e.g., a digital camera) that includes circuitry that converts sensory information to digital data. In addition to the basic sensory device, there would be a controller and a memory that would store the sensor data and/or data from the controller. The device would also be equipped with a conventional RFID chipset and antenna, which would communicate with a host computer via an RFID reader. The controller would function partly as a communication interface, implementing two-way communication protocols at all levels (including RFID if needed) between the

  2. Precise RFID localization in impaired environment through sparse signal recovery

    Science.gov (United States)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  3. RFID Data Loggers in Fish Supply Chain Traceability

    Directory of Open Access Journals (Sweden)

    Mira Trebar

    2013-01-01

    Full Text Available Radio frequency identification (RFID is an innovative and well-recognized technology that supports all kinds of traceability systems in many areas. It becomes very important in the food industry where the electronic systems are used to capture the data in the supply chain. Additionally, RFID data loggers with sensors are available to perform a cold chain optimization for perishable foods. This paper presents the temperature monitoring solution at the box level in the fish supply chain as part of the traceability system implemented with RFID technology. RFID data loggers are placed inside the box to measure the temperature of the product and on the box for measuring ambient temperature. The results show that the system is very helpful during the phases of storage and transportation of fish to provide the quality control. The sensor data is available immediately at the delivery to be checked on the mobile RFID reader and afterwards stored in the traceability systems database to be presented on a web to stakeholders and private consumers.

  4. Radio Frequency Identification (RFID) technology and patient safety

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors. PMID:24381626

  5. Theory and experiments on Peano and Hilbert curve RFID tags

    Science.gov (United States)

    McVay, John; Hoorfar, Ahmad; Engheta, Nader

    2006-05-01

    Recently, there has been considerable interest in the area of Radio Frequency Identification (RFID) and Radio Frequency Tagging (RFTAG). This emerging area of interest can be applied for inventory control (commercial) as well as friend/foe identification (military) to name but a few. The current technology can be broken down into two main groups, namely passive and active RFID tags. Utilization of Space-Filling Curve (SFC) geometries, such as the Peano and Hilbert curves, has been recently investigated for use in completely passive RFID applications [1, 2]. In this work, we give an overview of our work on the space-filling curves and the potential for utilizing the electrically small, resonant characteristics of these curves for use in RFID technologies with an emphasis on the challenging issues involved when attempting to tag conductive objects. In particular, we investigate the possible use of these tags in conjunction with high impedance ground-planes made of Hilbert or Peano curve inclusions [3, 4] to develop electrically small RFID tags that may also radiate efficiently, within close proximity of large conductive objects [5].

  6. Two RFID-based solutions for secure inpatient medication administration.

    Science.gov (United States)

    Yen, Yi-Chung; Lo, Nai-Wei; Wu, Tzong-Chen

    2012-10-01

    Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using RFID technology, such administration system provides automated medication verification for inpatient's medicine doses and generates corresponding medication evidence, which may be audited later for medical dispute. Recently, Peris-Lopez et al. (Int. J. Med. Inform., 2011) proposed an IS-RFID system to enhance inpatient medication safety. Nevertheless, IS-RFID system does not detect the denial of proof attack efficiently and the generated medication evidence cannot defend against counterfeit evidence generated from the hospital. That is, the hospital possesses enough privilege from the design of IS-RFID system to modify generated medication evidence whenever it is necessary. Hence, we design two lightweight RFID-based solutions for secure inpatient medication administration, one for online verification environment and the other for offline validation situation, to achieve system security on evidence generation and provide early detection on denial of proof attack.

  7. VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Directory of Open Access Journals (Sweden)

    He Xu

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is one of the key technologies of the Internet of Things (IoT and is used in many areas, such as mobile payments, public transportation, smart lock, and environment protection. However, the performance of RFID equipment can be easily affected by the surrounding environment, such as electronic productions and metal appliances. These can impose an impact on the RF signal, which makes the collection of RFID data unreliable. Usually, the unreliability of RFID source data includes three aspects: false negatives, false positives, and dirty data. False negatives are the key problem, as the probability of false positives and dirty data occurrence is relatively small. This paper proposes a novel sliding window cleaning algorithm called VSMURF, which is based on the traditional SMURF algorithm which combines the dynamic change of tags and the value analysis of confidence. Experimental results show that VSMURF algorithm performs better in most conditions and when the tag’s speed is low or high. In particular, if the velocity parameter is set to 2 m/epoch, our proposed VSMURF algorithm performs better than SMURF. The results also show that VSMURF algorithm has better performance than other algorithms in solving the problem of false negatives for RFID networks.

  8. 3-D transponder antennas for future SHF RFID applications

    Science.gov (United States)

    Zichner, R.; Baumann, R. R.

    2011-12-01

    The radio frequency identification (RFID) technology is omnipresent since a few years. Some of the most popular fields of application are the use for security tasks, for logistics and for the consumer segment. For example, chip card or key ring sized RFID transponders can allow wireless access to secured rooms. The number of applications for wireless data transmission for the identification and tracking of objects increases every year. There is a large development need for highly functional and inexpensive RFID transponders due to the ever-increasing demand on improved reliability, higher data rates and read and write ranges of the RFID systems. Therefore, research was performed on new 3-D transponder antennas for the Super High Frequency Band around 5.8 GHz. Additionally, wave propagation effects and the influence of different dielectric environments were considered. Parallel to the design of the novel antenna structures, the printing process for inexpensive manufacturing was investigated. The gained results are the basis for prospective RFID applications.

  9. Radio Frequency Identification (RFID technology and patient safety

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2013-01-01

    Full Text Available Background: Radio frequency identification (RFID systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS and electronic health records (EHRs and support it by clinical decision support systems (CDSS, it facilitates processes and reduce medical, medication and diagnosis errors.

  10. Radio Frequency Identification (RFID) technology and patient safety.

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-09-01

    Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors.

  11. Design of Dual Mode RFID Antenna for Inventory Management and IV Fluid Level Warning System

    Directory of Open Access Journals (Sweden)

    Ssu-Han Ting

    2017-01-01

    Full Text Available Radio frequency identification (RFID readers are powered RF devices that communicate with an RFID tag to read necessary information. Using this capability, a dual use system for short distance inventory management and moderate distance automatic warning system for low intravenous (IV fluid levels is designed. The RFID is affixed on the IV drip bag; the fluid in bag affects the antenna transmission distance by fluid dielectric conditions. This allows for two different operational modes (moderate and short distance. For pharmaceutical management, a handheld RFID reader can be used for short distance application. Another stationary RFID system can serve as a warning system for long distance application such as hospital care.

  12. RFID-enabled healthcare applications, issues and benefits: an archival analysis (1997-2011).

    Science.gov (United States)

    Fosso Wamba, Samuel

    2012-12-01

    In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.

  13. Design of housing file box of fire academy based on RFID

    Science.gov (United States)

    Li, Huaiyi

    2018-04-01

    This paper presents a design scheme of intelligent file box based on RFID. The advantages of RFID file box and traditional file box are compared and analyzed, and the feasibility of RFID file box design is analyzed based on the actual situation of our university. After introducing the shape and structure design of the intelligent file box, the paper discusses the working process of the file box, and explains in detail the internal communication principle of the RFID file box and the realization of the control system. The application of the RFID based file box will greatly improve the efficiency of our school's archives management.

  14. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Qingkuan Dong; Jiaqing Tong; Yuan Chen

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  15. Patent arterial duct

    Directory of Open Access Journals (Sweden)

    Martin Robin P

    2009-07-01

    Full Text Available Abstract Patent arterial duct (PAD is a congenital heart abnormality defined as persistent patency in term infants older than three months. Isolated PAD is found in around 1 in 2000 full term infants. A higher prevalence is found in preterm infants, especially those with low birth weight. The female to male ratio is 2:1. Most patients are asymptomatic when the duct is small. With a moderate-to-large duct, a characteristic continuous heart murmur (loudest in the left upper chest or infraclavicular area is typical. The precordium may be hyperactive and peripheral pulses are bounding with a wide pulse pressure. Tachycardia, exertional dyspnoea, laboured breathing, fatigue or poor growth are common. Large shunts may lead to failure to thrive, recurrent infection of the upper respiratory tract and congestive heart failure. In the majority of cases of PAD there is no identifiable cause. Persistence of the duct is associated with chromosomal aberrations, asphyxia at birth, birth at high altitude and congenital rubella. Occasional cases are associated with specific genetic defects (trisomy 21 and 18, and the Rubinstein-Taybi and CHARGE syndromes. Familial occurrence of PAD is uncommon and the usual mechanism of inheritance is considered to be polygenic with a recurrence risk of 3%. Rare families with isolated PAD have been described in which the mode of inheritance appears to be dominant or recessive. Familial incidence of PAD has also been linked to Char syndrome, familial thoracic aortic aneurysm/dissection associated with patent arterial duct, and familial patent arterial duct and bicuspid aortic valve associated with hand abnormalities. Diagnosis is based on clinical examination and confirmed with transthoracic echocardiography. Assessment of ductal blood flow can be made using colour flow mapping and pulsed wave Doppler. Antenatal diagnosis is not possible, as PAD is a normal structure during antenatal life. Conditions with signs and symptoms of

  16. Riociguat for the treatment of pulmonary arterial hypertension: a long-term extension study (PATENT-2).

    Science.gov (United States)

    Rubin, Lewis J; Galiè, Nazzareno; Grimminger, Friedrich; Grünig, Ekkehard; Humbert, Marc; Jing, Zhi-Cheng; Keogh, Anne; Langleben, David; Fritsch, Arno; Menezes, Flavia; Davie, Neil; Ghofrani, Hossein-Ardeschir

    2015-05-01

    Riociguat is a soluble, guanylate cyclase stimulator, approved for pulmonary arterial hypertension. In the 12-week PATENT-1 study, riociguat was well tolerated and improved several clinically relevant end-points in patients with pulmonary arterial hypertension who were treatment naïve or had been pretreated with endothelin-receptor antagonists or prostanoids. The PATENT-2 open-label extension evaluated the long-term safety and efficacy of riociguat. Eligible patients from the PATENT-1 study received riociguat individually adjusted up to a maximum dose of 2.5 mg three times daily. The primary objective was to assess the safety and tolerability of riociguat; exploratory efficacy assessments included 6-min walking distance and World Health Organization (WHO) functional class. Overall, 396 patients entered the PATENT-2 study and 324 (82%) were ongoing at this interim analysis (March 2013). The safety profile of riociguat in PATENT-2 was similar to that observed in PATENT-1, with cases of haemoptysis and pulmonary haemorrhage also being observed in PATENT-2. Improvements in the patients', 6-min walking distance and WHO functional class observed in PATENT-1 persisted for up to 1 year in PATENT-2. In the observed population at the 1-year time point, mean±sd 6-min walking distance had changed by 51±74 m and WHO functional class had improved in 33%, stabilised in 61% and worsened in 6% of the patients versus the PATENT-1 baseline. Long-term riociguat was well tolerated in patients with pulmonary arterial hypertension, and led to sustained improvements in exercise capacity and functional capacity for up to 1 year. Copyright ©ERS 2015.

  17. The adoption and implementation of RFID technologies in healthcare: a literature review.

    Science.gov (United States)

    Yao, Wen; Chu, Chao-Hsien; Li, Zang

    2012-12-01

    Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use of RFID in healthcare/hospitals following a formal innovation-decision framework. We aim to identify the common applications, potential benefits, barriers, and critical success factors. Our study facilitates quick assessment and provides guidance for researchers and practitioners in adopting RFID in medical arenas. Many earlier adopters in healthcare found RFID to be functional and useful in such areas as asset tracking and patient identification. Major barriers to adoption include technological limitations, interference concerns, prohibitive costs, lack of global standards and privacy concerns. Better designed RFID systems with low cost and privacy issues addressed are needed to increase acceptance of RFID in healthcare.

  18. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    Science.gov (United States)

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  19. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    Science.gov (United States)

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.

  20. Overview of RFID technology and its applications in the food industry.

    Science.gov (United States)

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.

  1. Miniaturized Blood Pressure Telemetry System with RFID Interface

    Directory of Open Access Journals (Sweden)

    Michele Caldara

    2016-08-01

    Full Text Available This work deals with the development and characterization of a potentially implantable blood pressure telemetry system, based on an active Radio-Frequency IDentification (RFID tag, International Organization for Standardization (ISO 15693 compliant. This approach aims to continuously measure the average, systolic and diastolic blood pressure of the small/medium animals. The measured pressure wave undergoes embedded processing and results are stored onboard in a non-volatile memory, providing the data under interrogation by an external RFID reader. In order to extend battery lifetime, RFID energy harvesting has been investigated. The paper presents the experimental characterization in a laboratory and preliminary in-vivo tests. The device is a prototype mainly intended, in a future engineered version, for monitoring freely moving test animals for pharmaceutical research and drug safety assessment purposes, but it could have multiple uses in environmental and industrial applications.

  2. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  3. RFID Timing Antenna for Open Water Swimming Competitions

    Directory of Open Access Journals (Sweden)

    Helmut Woellik

    2018-03-01

    Full Text Available RFID timing is the common method for processing results in mass sport events. Typically, it is used in running, cycling and triathlon events, but with some modifications even swimming athletes in water can be detected. In open water swimming competitions, the distance between the athletes and the RFID antenna must be larger so that escort boats or small ships can pass the gate without getting into dangerous situations. In this paper a design of an underwater RFID antenna is presented which was used during swimming events, It could span a distance up to 12 m width inside a swimming channel or offshore. The whole construction was completely immerged under the water line. The electronic components were housed in some meter distance on the beach, in a boat or in a buoy. With a reading range up to 1.5 m distance a detection rate between 94.6% and 100% could be achieved.

  4. Passive RFID Localisation Framework in Smart Homes Healthcare Settings.

    Science.gov (United States)

    Alsinglawi, Belal; Liu, Tony; Nguyen, Quang Vinh; Gunawardana, Upul; Maeder, Anthony; Simoff, Simeon

    2016-01-01

    In recent years, Smart Homes have become a solution to benefit impaired individuals and elderly in their daily life settings. In healthcare applications, pervasive technologies have enabled the practicality of personal monitoring using Indoor positioning technologies. Radio-Frequency Identification (RFID) is a promising technology, which is useful for non-invasive tracking of activities of daily living. Many implementations have focused on using battery-enabled tags like in RFID active tags, which require frequent maintenance and they are costly. Other systems can use wearable sensors requiring individuals to wear tags which may be inappropriate for elders. Successful implementations of a tracking system are dependent on multiple considerations beyond the physical performance of the solution, such as affordability and human acceptance. This paper presents a localisation framework using passive RFID sensors. It aims to provide a low cost solution for subject location in Smart Homes healthcare.

  5. Healthcare in Disasters and the Role of RFID.

    Science.gov (United States)

    Madanian, Samaneh; Parry, David; Norris, Tony

    2015-01-01

    Disasters either natural or man-made are inevitable, and therefore disaster management has always been an important function of government. Since during a disaster healthcare is often adversely affected, a lot of effort has been made in terms of researching effective responses and ways of improving the quality of delivered care to direct casualties and the rest of the community. In this regard, information technology plays an important role to help healthcare systems achieve this goal. One of these technologies that has become popular recently is Radio-Frequency Identification (RFID). This paper explores the relationship between emergency management and disaster healthcare and examines the role of RFID. It is suggested that RFID will become an integral part of disaster healthcare and a means of improving response performance.

  6. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  7. Analisis dan Perancangan Aplikasi Inventori Berbasiskan Rfid Pada PT. ABC

    Directory of Open Access Journals (Sweden)

    Herwin Herwin

    2010-12-01

    Full Text Available The purpose of this research is to reduce the damaged material, applying the concept of FIFO for retrieval of row materials, and accelerate the search and also to simplify the detection of raw materials. Software development method used involves three main parts namely the method of analysis, design and literature. Analysis methods including survey of the running system, an analysis of survey findings, identify information needs, identify system requirenments. The design method approach to Unified Modelling Language (UML. The results is an inventory application that uses Radio Frequency Identification (RFID tags as a replacement label where RFID tags can store data. Conslusions from this research is minimizing the company’s financial losses due to storage of raw materials and minimizing time to search raw materials using RFID that also can provide actual and accurate information for the company. 

  8. RFID-tunnistus vaatetuslogistiikassa : L-Fashion Group Oy varastotoiminnot

    OpenAIRE

    Nöjd, Henri

    2015-01-01

    Vaatetusalalta tunnetussa L-Fashion Group Oy:ssä otettiin käyttöön RFID-tekniikka osassa konsernin varastoista. RFID-tunnistusta käytetään varastoprosesseissa, joissa hyötyjä pyritään saamaan tunnistuksen tarkkuudesta ja nopeudesta. Opinnäytetyö syventyy varaston osalta prosesseihin, jotka ovat uuden tekniikan kannalta olennaisimmassa osassa. Työssä tutkitaan RFID:n lisäksi nykyistä viivakooditekniikkaa, johon vertaamalla päästään näkemään tekniikoiden väliset erot sekä hyödyt ja haitat....

  9. Soluţii integrate pentru biblioteci: implementarea sistemului RFID

    Directory of Open Access Journals (Sweden)

    Simona Gheorghe

    2011-01-01

    Full Text Available În prezent, în bibliotecile româneşti este implementată o tehnologie inovatoare, bazată pe identificarea prin frecvenţă radio, altfel spus tehnologia RFID. Această tehnologie a pătruns în multe domenii de activitate atât la noi în ţară, cât şi în străinătate. Biblioteca Centrală a Universităţii “Lucian Blaga” din Sibiu a implementat sistemul din 2008, iar Biblioteca Centrală Universitară “Carol I” din Bucureşti se află în plin proces de implementare a sistemului. Sunt prezentate componentele unui sistem RFID de bibliotecă, ce presupune aplicarea acestui sistem, avantajele şi dezavantajele tehnologiei RFID.

  10. Two RFID-based solutions to enhance inpatient medication safety.

    Science.gov (United States)

    Chien, Hung-Yu; Yang, Chia-Chuan; Wu, Tzong-Chen; Lee, Chin-Feng

    2011-06-01

    Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneously present. Recently, Huang and Ku (J. Med. Syst, 2009) proposed an efficient grouping protocol to enhance medication safety for inpatients based on low-cost tags. However, the Huang-Ku scheme is not secure; an attacker can easily make up fake grouping records to cheat the verifier. This weakness would seriously endanger the safety of inpatient medication safety. This paper will show the weaknesses, and then propose two RFID-based solutions to enhance medication safety for two different scenarios. The proposed schemes are practical, secure and efficient for medication applications.

  11. A new specimen management system using RFID technology.

    Science.gov (United States)

    Shim, Hun; Uh, Young; Lee, Seung Hwan; Yoon, Young Ro

    2011-12-01

    The specimen management system with barcode needs to be improved in order to solve inherent problems in work performance. This study describes the application of Radio Frequency Identification (RFID) which is the solution for the problems associated with specimen labeling and management. A new specimen management system and architecture with RFID technology for clinical laboratory was designed. The suggested system was tested in various conditions such as durability to temperature and aspect of effective utilization of new work flow under a virtual hospital clinical laboratory environment. This system demonstrates its potential application in clinical laboratories for improving work flow and specimen management. The suggested specimen management system with RFID technology has advantages in comparison to the traditional specimen management system with barcode in the aspect of mass specimen processing, robust durability of temperature, humidity changes, and effective specimen tracking.

  12. Gas Identification Using Passive UHF RFID Sensor Platform

    Directory of Open Access Journals (Sweden)

    Muhammad Ali AKBAR

    2015-11-01

    Full Text Available The concept of passive Radio Frequency Identification (RFID sensor tag is introduced to remove the dependency of current RFID platforms on battery life. In this paper, a gas identification system is presented using passive RFID sensor tag along with the processing unit. The RFID system is compliant to Electronics Product Code Generation 2 (EPC-Gen2 protocol in 902-928 MHz ISM band. Whereas the processing unit is implemented and analyzed in software and hardware platforms. The software platform uses MATLAB, whereas a High Level Synthesis (HLS tool is used to implement the processing unit on a Zynq platform. Moreover, two sets of different gases are used along with Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA based feature reduction approaches to analyze in detail the best feature reduction approach for efficient classification of gas data. It is found that for the first set of gases, 90 % gases are identified using first three principal components, which is 7 % more efficient than LDA. However in terms of hardware overhead, LDA requires 50 % less hardware resources than PCA. The classification results for the second set of gases reveal that 91 % of gas classification is obtained using LDA and first four PCA, while LDA requires 52 % less hardware resources than PCA. The RFID tag used for transmission is implemented in 0.13 µm CMOS process, with simulated average power consumption of 2.6 µW from 1.2 V supply. ThingMagic M6e embedded reader is used for RFID platform implementation. It shows an output power of 31.5 dBm which allows a read range up to 9 meters.

  13. Economic Justification of Patents and Exceptions to Patentability

    DEFF Research Database (Denmark)

    Nordberg, Ana

    2012-01-01

    The present article is the conclusion of a review of economic justifications for patent rights conducted with the objective of determining whether such arguments are per se capable of sustaining the existence of a different patentability regime for inventions of methods for treatment and diagnostic...... methods (art.53 (c) European Patent Convention). It starts by exploring the normative background and summarily describes the different types of claims allowed under the current legal framework and their differences. The following sections will describe and apply the main economic arguments sustaining...... patent rights inventions of methods for treatment and diagnostic methods. These reasoning will be later confronted with contra-arguments. This piece will finalize with the formulation of conclusions extracted from the previous debate, inter-alia that economic reasoning does not per se sustain...

  14. Technology Clusters Exploration for Patent Portfolio through Patent Abstract Analysis

    Directory of Open Access Journals (Sweden)

    Gabjo Kim

    2016-12-01

    Full Text Available This study explores technology clusters through patent analysis. The aim of exploring technology clusters is to grasp competitors’ levels of sustainable research and development (R&D and establish a sustainable strategy for entering an industry. To achieve this, we first grouped the patent documents with similar technologies by applying affinity propagation (AP clustering, which is effective while grouping large amounts of data. Next, in order to define the technology clusters, we adopted the term frequency-inverse document frequency (TF-IDF weight, which lists the terms in order of importance. We collected the patent data of Korean electric car companies from the United States Patent and Trademark Office (USPTO to verify our proposed methodology. As a result, our proposed methodology presents more detailed information on the Korean electric car industry than previous studies.

  15. Patenting Biotechnological Inventions in Europe

    Directory of Open Access Journals (Sweden)

    Peter Raspor

    2002-01-01

    Full Text Available The patent system has been able to provide the protection for the achievements of different technologies and in that way it has supported further development and growth of the industry where those achievements were implemented. Modern technologies like information technology and biotechnology with genetic engineering that appeared in the 70s have overgrown the frames of the existing patent system because of their exponential development during the last thirty years. Industry that invests a huge amount of money in these technologies, especially in the field of biotechnology, where the results are very uncertain, has started to claim changes in the patent system.

  16. Control de acceso usando FPGA y RFID

    Directory of Open Access Journals (Sweden)

    Dora Luz Almanza Ojeda

    2012-10-01

    Full Text Available Este trabajo presenta el diseño e implementación de un sistema de control de acceso mediante Identificación por Radiofrecuencia (RFID, Radio Frequency Identification controlado por una Matriz de compuertas programables (FPGA, Field Programmable Gate Array. El sistema está constituido por un par de dispositivos de adquisición de radiofrecuencia, una FPGA, un juego de etiquetas y tarjetas pasivas de identificación. Mediante una interfaz gráfica de usuario es posible controlar todo movimiento dentro de una zona determinada, desde los accesos hasta la disponibilidad de equipo; utilizando los dispositivos de adquisición de radiofrecuencia se puede acceder a la información de los usuarios autorizados, así como al control del equipo. Con este sistema es posible monitorear, administrar y reportar todo acceso de personal, movimiento de equipo o plagio de manera eficiente y evitando un gran número de errores humanos.  

  17. A survey on barcode RFID and NFC

    Science.gov (United States)

    Thanapal, P.; Prabhu, J.; Jakhar, Mridula

    2017-11-01

    Over the recent years, many industries have started implementing new technologies for tracing and tracking their products. These technologies are a kind of blessing to their management system. The technology and management system has to work in parallel to avoid loopholes in the system. We can see so many technologies around us and the most difficult and important part is to choose best out of all these new technologies. The important point which we need to take care while choosing a technology for the system is to make sure the technology can integrate properly with the other parameters in the management system. The industry management system consists of many levels such as initial level, intermediate level, final level and tracking. Nowadays tracking a product from its initial stage is becoming a trend. To cope up with this upcoming trend and also with the company demand, integrating the product with Barcode, RFID tags, NFC tag or any other traceable technology. Many supply chain Management system are also adopting this techniques.

  18. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  19. Control de trazabilidad de fruta mediante un sistema RFID

    OpenAIRE

    Asensio Nácher, Sergi

    2015-01-01

    En este proyecto se ha desarrollado una aplicación para realizar la trazabilidad de la fruta en un almacén utilizando dispositivos de radiofrecuencia RFID. El sistema ha sido desarrollado en C\\# y ha permitido automatizar todo el proceso de control de la fruta en un almacén. In this project, has been developed an application for making the traceability of fruit in a warehause by using radiofrequency systems RFID. The system was developed in C\\# and permits to control de processes of the fr...

  20. Application of metamaterial concepts to sensors and chipless RFID

    Science.gov (United States)

    Martín, F.; Herrojo, C.; Vélez, P.; Su, L.; Mata-Contreras, J.; Paredes, F.

    2018-02-01

    Several strategies for the implementation of microwave sensors based on the use of metamaterial-inspired resonators are pointed out, and examples of applications, including sensors for dielectric characterization and sensors for the measurement of spatial variables, are provided. It will be also shown that novel microwave encoders for chipless RFID systems with very high data capacity can be implemented. The fields of applications of the devices discussed in this talk include dielectric characterization of solids and liquids, angular velocity sensors for space applications, and near-field chipless RFID systems for secure paper applications, among others.

  1. Radio Frequency Identification (RFID) in healthcare: a literature review.

    Science.gov (United States)

    Kolokathi, Aikaterini; Rallis, Panagiotis

    2013-01-01

    Creating and maintaining a safe and high-quality health care environment is of great importance for global community. New technologies and their applications can help us achieve this goal. Radio-Frequency Identification (RIFD) technology is considered one of those technologies and even today there are some interesting deployments in the health industry. As a result, this work aims to present the basic idea behind RFID solutions, problems that can be addressed with the adoption of RFID and the benefits of relative applications.

  2. RFID antenna design for circular polarization in UHF band

    Science.gov (United States)

    Shahid, Hamza; Khan, Muhammad Talal Ali; Tayyab, Umais; Irshad, Usama Bin; Alkhazraji, Emad; Javaid, Muhammad Sharjeel

    2017-05-01

    A miniature half cross dipole antenna for defense and aerospace RFID applications in UHF band is presented. The dipole printed line arms are half crossed shape on top of dielectric substrate backed by reactive impedance surface. The antenna fed by a coaxial cable at the gap separating the dipole arms. Our design is intended to work at 2.42 GHz for RFID readers. The radiation pattern obtained has HPBW of 112, return loss of 22.24 dB and 90 MHz bandwidth.

  3. Research on pipe welding information management system basedon RFID

    Directory of Open Access Journals (Sweden)

    Liu Xun

    2016-01-01

    Full Text Available This paper introduces the construction background, construction target and construction principle of the pipe welding management system based on RFID. Then, describes the specific requirements of the system. The basic principle and key technology of the system are introduced. The structure of the system (including the system design, the selections of handheld devices and high frequency passive RFID tags is described .Then the system management software designs (including software structure, the main functions of the management center system and the main functions of the handheld detection system are described in detail. Finally, the management system is implemented, and it is deployed to several Gas Co, which has chieved good results.

  4. Optimization of the Document Placement in the RFID Cabinet

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study is devoted to the issue of optimization of the document placement in a single RFID cabinet. It has been assumed that the optimization problem means the reduction of archivization time with respect to the information on all documents with RFID tags. Since the explicit form of the criterion function remains unknown, for the purpose of its approximation, the regression analysis method has been used. The method uses data from a computer simulation of the process of archiving data about documents. To solve the optimization problem, the modified gradient projection method has been used.

  5. Design of a Secure RFID Authentication Scheme Preceding Market Transactions

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2011-01-01

    Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

  6. RFID authentication protocol to enhance patient medication safety.

    Science.gov (United States)

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  7. GUI Simulation Platform for RFID Indoor Tracking System

    Directory of Open Access Journals (Sweden)

    Bei-Bei Miao

    2014-07-01

    Full Text Available This paper gives a platform of simulation data for RFID indoor tracking system, i.e., tracking system graphical user interface. The platform contains input and output interface, and the former includes the radius settings, data generation module and the user guide. The corresponding output interface includes system parameters display and the saving image function, etc. The default parameters are also given for the graphical user interface (GUI of the RFID indoor tracking system. The analysis of the user’s use shows that the developed platform is practical and feasible.

  8. Annual patents review, January-December 2004

    Science.gov (United States)

    Roland Gleisner; Karen Scallon; Michael Fleischmann; Julie Blankenburg; Marguerite Sykes

    2005-01-01

    This review summarizes patents related to paper recycling that first appeared in patent databases during the 2004. Two on-line databases, Claims/U.S. Patents Abstracts and Derwent World Patents Index, were searched for this review. This feature is intended to inform readers about recent developments in equipment design, chemicals, and process technologies for recycling...

  9. Patent classifications as indicators of intellectual organization

    NARCIS (Netherlands)

    Leydesdorff, L.

    2008-01-01

    Using the 138,751 patents filed in 2006 under the Patent Cooperation Treaty, co-classification analysis is pursued on the basis of three- and four-digit codes in the International Patent Classification (IPC, 8th ed.). The co-classifications among the patents enable us to analyze and visualize the

  10. 78 FR 31885 - Patent Term Extension

    Science.gov (United States)

    2013-05-28

    ... DEPARTMENT OF COMMERCE Patent and Trademark Office Patent Term Extension ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and Trademark Office (USPTO), as part of its... States Patent and Trademark Office, P.O. Box 1450, Alexandria, VA 22313-1450. Federal Rulemaking Portal...

  11. 76 FR 72000 - Patent, Trademark & Copyright Acts

    Science.gov (United States)

    2011-11-21

    ... DEPARTMENT OF THE INTERIOR Geological Survey Patent, Trademark & Copyright Acts AGENCY: U.S... Consultants, 1255 Roberts Boulevard NW., Suite 200, Kennesaw, GA 30144, on U.S. Patent Application Serial No. 12/133,666, and a divisional patent application to be filed shortly at the Patent and Trademark...

  12. 78 FR 7759 - Patent Cooperation Treaty

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF COMMERCE Patent and Trademark Office Patent Cooperation Treaty ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and Trademark Office (USPTO), as part of its... States Patent and Trademark Office, P.O. Box 1450, Alexandria, VA 22313-1450. Federal Rulemaking Portal...

  13. 77 FR 16813 - Patent Processing (Updating)

    Science.gov (United States)

    2012-03-22

    ... DEPARTMENT OF COMMERCE United States Patent and Trademark Office Patent Processing (Updating) ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and Trademark Office... the Chief Information Officer, United States Patent and Trademark Office, P.O. Box 1450, Alexandria...

  14. 22 CFR 92.72 - Services in connection with patents and patent applications.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Services in connection with patents and patent... RELATED SERVICES Miscellaneous Notarial Services § 92.72 Services in connection with patents and patent applications. (a) Affidavit of applicant. The form of the affidavit of an applicant for a United States patent...

  15. Religious coalition opposes gene patents.

    Science.gov (United States)

    James, J S

    1995-05-19

    The biotechnology industry is concerned about a coalition of mainstream religious leaders, working with Jeremy Rifkin of the Foundation of Economic Trends, who oppose the patenting of human and animal life forms, body parts, and genes. The coalition called a press conference on May 18 to ask the government to prohibit the current patenting practices for genetic engineering. The biotechnology industry argues that patents indicate that a company's research tool has significant value, and encourages capitalists to invest their dollars in the development of new treatments for diseases. They also argue that the 29 biotech drugs that are on the market have been developed as a result of patents on genes. Although most business leaders are united in opposing restrictions, many scientists are divided, citing both religious and scientific reasons.

  16. Com es poden trobar les patents, setembre 2010

    OpenAIRE

    Bonich, Mònica; Cervera-Farré, Albert; Santos-Hermosa, Gema

    2010-01-01

    Com es poden trobar les patents: què són les patents?, què es pot patentar?, qui assigna les patents? i com es poden trobar patents? Cómo encontrar patentes: ¿qué son las patentes?, ¿qué se puede patentar?, ¿quién asigna las patentes? y ¿cómo se pueden encontrar patentes? How to find patents: what are patents?, what can be patented?, who awards the patents? and how can patents be found?

  17. The academic advantage: gender disparities in patenting.

    Science.gov (United States)

    Sugimoto, Cassidy R; Ni, Chaoqun; West, Jevin D; Larivière, Vincent

    2015-01-01

    We analyzed gender disparities in patenting by country, technological area, and type of assignee using the 4.6 million utility patents issued between 1976 and 2013 by the United States Patent and Trade Office (USPTO). Our analyses of fractionalized inventorships demonstrate that women's rate of patenting has increased from 2.7% of total patenting activity to 10.8% over the nearly 40-year period. Our results show that, in every technological area, female patenting is proportionally more likely to occur in academic institutions than in corporate or government environments. However, women's patents have a lower technological impact than that of men, and that gap is wider in the case of academic patents. We also provide evidence that patents to which women--and in particular academic women--contributed are associated with a higher number of International Patent Classification (IPC) codes and co-inventors than men. The policy implications of these disparities and academic setting advantages are discussed.

  18. Supporting exploratory information seeking

    OpenAIRE

    Haraty, Monasadat

    2010-01-01

    Exploratory search is a sensemaking activity that involves information seeking and iterative development of mental model of the domain under exploration. It often begins with a vague and evolving information need that is multidimensional. We designed and developed a web-browser extension to facilitate exploratory web search aiming at transforming the search activity into a meaningful learning activity. The design is based on the proposed multi-threaded model of exploratory search. According t...

  19. Patent Law for Computer Scientists

    Science.gov (United States)

    Closa, Daniel; Gardiner, Alex; Giemsa, Falk; Machek, Jörg

    More than five centuries ago the first patent statute was passed by the Venetian senate. It already had most of the features of modern patent law, recognizing the public interest in innovation and granting exclusive right in exchange for a full disclosure. Some 350 years later the industrial revolution led to globalisation. The wish to protect intellectual property on a more international level evolved and supranational treaties were negotiated. Patent laws are still different in many countries, however, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices. The procedures at the USPTO, JPO and EPO and, in particular, the differences in the treatment of applications centring on software are briefly explained. In later sections of this book, a wealth of examples will be presented. The methodology behind the treatment of these examples is explained.

  20. Constructing an Intelligent Patent Network Analysis Method

    Directory of Open Access Journals (Sweden)

    Chao-Chan Wu

    2012-11-01

    Full Text Available Patent network analysis, an advanced method of patent analysis, is a useful tool for technology management. This method visually displays all the relationships among the patents and enables the analysts to intuitively comprehend the overview of a set of patents in the field of the technology being studied. Although patent network analysis possesses relative advantages different from traditional methods of patent analysis, it is subject to several crucial limitations. To overcome the drawbacks of the current method, this study proposes a novel patent analysis method, called the intelligent patent network analysis method, to make a visual network with great precision. Based on artificial intelligence techniques, the proposed method provides an automated procedure for searching patent documents, extracting patent keywords, and determining the weight of each patent keyword in order to generate a sophisticated visualization of the patent network. This study proposes a detailed procedure for generating an intelligent patent network that is helpful for improving the efficiency and quality of patent analysis. Furthermore, patents in the field of Carbon Nanotube Backlight Unit (CNT-BLU were analyzed to verify the utility of the proposed method.

  1. Traceability System For Agricultural Productsbased on Rfid and Mobile Technology

    Science.gov (United States)

    Sugahara, Koji

    In agriculture, it is required to establish and integrate food traceability systems and risk management systems in order to improve food safety in the entire food chain. The integrated traceability system for agricultural products was developed, based on innovative technology of RFID and mobile computing. In order to identify individual products on the distribution process efficiently,small RFID tags with unique ID and handy RFID readers were applied. On the distribution process, the RFID tags are checked by using the readers, and transit records of the products are stored to the database via wireless LAN.Regarding agricultural production, the recent issues of pesticides misuse affect consumer confidence in food safety. The Navigation System for Appropriate Pesticide Use (Nouyaku-navi) was developed, which is available in the fields by Internet cell-phones. Based on it, agricultural risk management systems have been developed. These systems collaborate with traceability systems and they can be applied for process control and risk management in agriculture.

  2. Two RFID standard-based security protocols for healthcare environments.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  3. Compact Public-Key Implementations for RFID and Sensor Nodes

    Science.gov (United States)

    Batina, Lejla; Sakiyama, Kazuo; Verbauwhede, Ingrid M. R.

    Embedded systems have become extremely important and new applications are taking a larger portion of the market every day. Radio frequency identification (RFID) tags and sensor nodes are recent and challenging examples and they imply very low budgets for the number of gates, power, bandwidth, etc. while they often require security solutions.

  4. Indoor Navigation Design Integrated with Smart Phones and Rfid Devices

    Science.gov (United States)

    Ortakci, Y.; Demiral, E.; Atila, U.; Karas, I. R.

    2015-10-01

    High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification) device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  5. The Value of RFID Technology Enabled Information to Manage Perishables

    NARCIS (Netherlands)

    M.E. Ketzenberg (Michael); J.M. Bloemhof-Ruwaard (Jacqueline)

    2009-01-01

    textabstractWe address the value of RFID technology enabled information to manage perishables in the context of a supplier that sells a random lifetime product subject to stochastic demand and lost sales. The product's lifetime is largely determined by the time and temperature history in the supply

  6. Applicability of RFID in the prognostics of logistic systems

    NARCIS (Netherlands)

    Lopez De La Cruz, A.M.; Veeke, H.P.M.; Lodewijks, G.

    2007-01-01

    The objective of this paper is to investigate the applicability of RFID in prognostic logistics. Starting from a general introduction of prognostic logistics, the system structure, and technical requirements are discussed. Based on this discussion the issues and concerns regarding the applicability

  7. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  8. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    Science.gov (United States)

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  9. Feasibility Study of RFID Technology for Construction Load Tracking

    Science.gov (United States)

    2011-12-31

    RFID technology was proven to be successful in tracking dump trucks from loading plant to a paver location on a highway project. The average roundtrip time was 1 hour and 4 minutes. However, 3% of this data has truck delivery times in excess of 2 hou...

  10. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  11. Interaktion mit RFID Ausleih- und Rückgabeautomaten

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Heyroth, Melanie; Klingbeil, Karin

    2011-01-01

    Der Artikel untersucht mittels Beobachtung die Interaktion zwischen RFID-Ausleih- und Rückgabeautomaten sowie Bibliotheksbenutzern in vier deutschen Bibliotheken. Die Ergebnisse belegen, dass die Interaktion grundsätzlich funktioniert. Die Benutzer zeigten Gelassenheit und Routine im Umgang mit den...

  12. Potential of RFID Systems to Detect Object Orientation

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2011-01-01

    In this paper we present a novel method for estimating the inclination of passive UHF RFID tags, for use in supply chains to monitor the handling of tagged items. Based on observations of the polarization, a Bayesian estimator of the tag inclination is constructed. The Bayesian estimator has been...

  13. Invoering van RFID : De bibliotheekcollectie geïdentificeerd

    NARCIS (Netherlands)

    den Hollander, Frank; Bokdam, Gert Jan

    De nieuwe ontwikkelingen in de Universiteitsbibliotheek volgen elkaar in snel tempo op. Parallel aan de grootscheepse renovatie van het UB-gebouw, wordt bijvoorbeeld ook een nieuw identificatiesysteem voor de collectie ingevoerd, op basis van RFID. Pictogram sprak met Teijo Doornkamp over het

  14. Exploiting phase measurements of EPC Gen2 RFID tags

    NARCIS (Netherlands)

    Huiting, J.; Flisijn, Hubert; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2013-01-01

    This paper presents a 2d localization system for UHF RFID tags. By measuring the phase between the transmitted continuous wave and received backscatter from the tag at different frequencies, it is possible to estimate the distance between the reader and tag. By determining distance estimates to

  15. Perishable inventory management and dynamic pricing using RFID ...

    Indian Academy of Sciences (India)

    Monitoring and control of time-sensitive products can be facilitated by the application of radio frequency identification (RFID) technology, which enables non-contact, real-time data collection and efficient interfacing with the management control system in the supply chain. This paper describes an integrated framework for ...

  16. Multiresonator-Based Chipless RFID Barcode of the Future

    CERN Document Server

    Preradovic, Stevan

    2012-01-01

    This vital new resource offers engineers and researchers a window on important new technology that will supersede the barcode and is destined to change the face of logistics and product data handling. In the last two decades, radio-frequency identification has grown fast, with accelerated take-up of RFID into the mainstream through its adoption by key users such as Wal-Mart, K-Mart and the US Department of Defense. RFID has many potential applications due to its flexibility, capability to operate out of line of sight, and its high data-carrying capacity. Yet despite optimistic projections of a market worth $25 billion by 2018, potential users are concerned about costs and investment returns. Clearly demonstrating the need for a fully printable chipless RFID tag as well as a powerful and efficient reader to assimilate the tag’s data, this book moves on to describe both. Introducing the general concepts in the field including technical data, it then describes how a chipless RFID tag can be made using a planar...

  17. INDOOR NAVIGATION DESIGN INTEGRATED WITH SMART PHONES AND RFID DEVICES

    Directory of Open Access Journals (Sweden)

    Y. Ortakci

    2015-10-01

    Full Text Available High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  18. A Salient Missing Link in RFID Security Protocols

    Directory of Open Access Journals (Sweden)

    Anarim Emin

    2011-01-01

    Full Text Available In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless deployments of "secure" RFID authentication protocols are not exceptions and subject to side channel attacks. Focusing on lightweight RFID security protocols; we examine the server responses for several RFID tags and realize that if the database querying is performed through a static process, the RFID system is subject to timing attacks that could easily jeopardize the system's untraceability criteria. We demonstrate our attack on some well-known protocols and outline a countermeasure by precisely describing the database query mechanism. Furthermore, we analyze the success probability of the attack in terms of the system parameters such as the number of tags, number of cryptographic operations that have to be carried out, and server's computational power.

  19. Designated Attribute-Based Proofs for RFID Applications

    NARCIS (Netherlands)

    Alpár, G.; Batina, L.; Lueks, W.

    2013-01-01

    Recent research has shown that using public-key cryptography in order to meet privacy requirements for RFID tags is not only necessary, but also now practically feasible. This has led to the development of new protocols like the Randomized Schnorr [6] identification protocol. This protocol ensures

  20. Active RFID Technology for Asset Tracking and Management System

    Directory of Open Access Journals (Sweden)

    Tharek Abdul Rahman

    2013-03-01

    Full Text Available Asset is one of valuable item in the industry or institution, missing or lose of asset may have problem in asset management system. The advantages of Radio Frequency Identification (RFID technology have made this technology useful for asset management and tracking system. The use of active RFID technology for asset tracking is by attaching the tag at the asset or item with assigned a unique ID for identification. A few of active RFID readers install at strategic points or location to track asset movement and collect information when anyone of item pass by in reader coverage area, reader collect information with in reading range and send to backend system. Integration every single system by using wires or wireless methods to keep centralize data processing system. Alert message will be send to representative department to give warning. This asset tracking and management system that use active type of RFID technology is working at ISM band frequency of 433 MHz. The backend systems consist of application software, middleware and database. All the information have been sent from every single system recorded in one central database.

  1. A Sensing Platform For A UHF RFID System

    Directory of Open Access Journals (Sweden)

    Young Ho Lee

    2017-02-01

    Full Text Available As the read range of passive UHF RFID broadens up to 11 meters compared to 1-meter range of HF RFID passive tags have been used for many applications such as tracking medical devices and objects of daily living. The RF communication link between the reader antenna and tags for indoors exhibits intermittent loss of signal reception due to antenna orientation mismatch and breakpoints within the antenna coverage area. We propose a design of a sensing platform for tracking objects using a UHF RFID system with passive tags that provides continuous signal reception over the coverage area. We first investigated causes of power loss for passive tags and then designed a sensing platform solution using antenna diversity. The causes of tags power loss were eliminated with angle and spatial diversity methods that can cover an arbitrary area of interest. We implemented this design in an indoor setting of a trauma resuscitation room and evaluated it by experimental measurement of signal strength at different points and angles in the area of interest. Our sensing platform supported complete coverage and uninterrupted interrogation of tags as they moved in the area of interest. We conclude that this sensing platform will be suitable for uninterrupted object tracking with UHF RFID technology in generic indoor spaces.

  2. Students Attendance Management System Based On RFID And Fingerprint Reader

    Directory of Open Access Journals (Sweden)

    Moth Moth Myint Thein

    2015-07-01

    Full Text Available Abstract Today students class attendance is become more important part for any organizationsinstitutions. The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure hence inefficient. This paper presents the manual students attendance management into computerized system for convenience or data reliability. So the system is developed by the integration of ubiquitous computing systems into classroom for managing the students attendance using RFID and fingerprint reader. The system is designed to implement an attendance management system based on RFID and fingerprint reader which students need to use their student identification card ID and their finger ID to success the attendance where only authentic student can be recorded the attendance during the class. In this system passive RFID tag and reader pairs are used to register the student ID cards individually and fingerprint reader is used for attendance. This system takes attendance electronically with the help of the RFID and finger print device and the records of the attendance are stored in a database. Students roll call percentages and their details are easily seenvia Graphical User Interface GUI. This system will have the required databases for students attendance teachers subjects and students details. This application is implemented by Microsoft Visual Studio and Microsoft SQL Server as IDE. C language is used to implement this system.

  3. Intellectual Production Supervision Perform based on RFID Smart Electricity Meter

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    This topic develops the RFID intelligent electricity meter production supervision project management system. The system is designed for energy meter production supervision in the management of the project schedule, quality and cost information management requirements in RFID intelligent power, and provide quantitative information more comprehensive, timely and accurate for supervision engineer and project manager management decisions, and to provide technical information for the product manufacturing stage file. From the angle of scheme analysis, design, implementation and test, the system development of production supervision project management system for RFID smart meter project is discussed. Focus on the development of the system, combined with the main business application and management mode at this stage, focuses on the energy meter to monitor progress information, quality information and cost based information on RFID intelligent power management function. The paper introduces the design scheme of the system, the overall client / server architecture, client oriented graphical user interface universal, complete the supervision of project management and interactive transaction information display, the server system of realizing the main program. The system is programmed with C# language and.NET operating environment, and the client and server platforms use Windows operating system, and the database server software uses Oracle. The overall platform supports mainstream information and standards and has good scalability.

  4. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    Science.gov (United States)

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  5. Economics of Patent Pools When Some (but not all) Patents are Essential

    OpenAIRE

    Daniel Quint

    2006-01-01

    Patent pools are agreements by multiple patent owners to license certain patents to third parties as a package, and often in conjunction with the development of a technological standard. A key distinction made by regulators—between patents essential to a standard and patents that are suitable substitutes—has not been captured in existing economic models. I present a model of competition among differentiated technologies, in which some patents are essential and some are not. I show that pools ...

  6. Development of the RFID System for nuclear materials management

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.; Liu, Y.Y.

    2008-01-01

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclear materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field

  7. Patents, Inducement Prizes, and Contestant Strategy

    DEFF Research Database (Denmark)

    Davis, Jerome; Davis, Lee N.

    2006-01-01

    Debate over the merits of patents versus inducement prizes has tended to ignore the signaling roles of patents, and totally ignores the impact of patent signaling on prize contests. This paper asks: How does patent signaling affect the strategic choices of firms considering entering prize contests......? First, we consider contests that do not allow patenting, then contests that do. If patenting is not allowed, we argue, patent-holders, both internal and external to the contest, can adversely impact prize contests by claiming prize winner violation of their patents, and suing for damages. The likelihood...... of such challenges being made can deter entry, particularly in contests requiring large sunk costs. Furthermore, the firm's decisionmaking process will discriminate against entering prize contests and favor R&D projects with patentable outcomes. Together, these problems may circumscribe any future wider role...

  8. A Model of Traceability for Equipments Using RFID Tehnologies within an Integrated System

    Directory of Open Access Journals (Sweden)

    Radu LIXANDROIU

    2006-01-01

    Full Text Available Radio Frequency Identification (RFID is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tagss or transponders. An advanced automatic identification technology such as the Auto-ID system based on the Radio Frequency Identification (RFID technology has two values for inventory systems. First, the visibility provided by this technology allows an accurate knowledge on the inventory level by eliminating the discrepancy between inventory record and physical inventory. Second, the RFID technology can prevent or reduce the sources of errors. Benefits of using RFID include the reduction of labor costs, the simplification of business processes and the reduction of inventory inaccuracies. Also, RFID technology allows an knowledge on the traceability of equipments in a organization.

  9. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  10. Comparison of RFID systems for tracking clinical interventions at the bedside.

    Science.gov (United States)

    Ohashi, Kumiko; Ota, Sakiko; Ohno-Machado, Lucila; Tanaka, Hiroshi

    2008-11-06

    In recent years, there have been high expectations for RFID technologies applied in the medical field, particularly for automatic identification and location of patients and medical supplies. However, few studies have measured the applicability of currently available RFID technologies in a medical environment. To determine the technical factors that affect the performance of RFID systems, we examined the performance of different types of tags for medications, medical equipment, nurses, and patients under different experimental conditions. Three kinds of passive RFID tags and one active RFID tag were used in our study. Passive tags were affected by materials such as liquid and metal. Tags based on 13.56MHz were most suited for identifying medications. Tag placement was one of the main factors involved in correct identification of nurses, patients, and medical equipment. The results of this study may help decision makers decide whether (which) RFID technologies are useful for tracking clinical workflow.

  11. Marketing of Patents for Innovation: A Study in Brazilian Multicase Universities

    Directory of Open Access Journals (Sweden)

    Felipe de Almeida Malvezzi

    2014-11-01

    Full Text Available Ways to make patents Brazilian universities in innovation has been discussed both by academia and by the funding agencies in order to generate, in addition to knowledge, social and economic benefits to the university and to society in general. In this sense, this research aimed to understand the strategies and marketing practices developed by Brazilian universities for the promotion and commercialization of patent records, aiming at innovation. The assumption for this research is that the use of marketing strategies is a necessary and fundamental for the successful transfer of patents when it sees technological innovation. The research is exploratory qualitative approach based on references, interviews and multi case study. After gathering and analyzing data involving UNICAMP, USP and UFMG in promoting and marketing your patents, it was observed that the main marketing practices identified were: inventory and classification of patents, agents of innovation, integrated marketing communication, technological showcase, executive summary of patents, event promotion and institutional visits. We also conclude, in the context of marketing innovation management at the university, the biggest challenge is to work radical and incremental innovation differently and simultaneously, since both are necessary for scientific and technological development in the short and long term. 

  12. Individual Ranging Behaviour Patterns in Commercial Free-Range Layers as Observed through RFID Tracking.

    Science.gov (United States)

    Larsen, Hannah; Cronin, Greg M; Gebhardt-Henrich, Sabine G; Smith, Carolynn L; Hemsworth, Paul H; Rault, Jean-Loup

    2017-03-09

    In this exploratory study, we tracked free-range laying hens on two commercial flocks with Radio Frequency Identification (RFID) technology with the aim to examine individual hen variation in range use. Three distinct outdoor zones were identified at increasing distances from the shed; the veranda [0-2.4 m], close range [2.4-11.4 m], and far range [>11.4 m]. Hens' movements between these areas were tracked using radio frequency identification technology. Most of the hens in both flocks (68.6% in Flock A, and 82.2% in Flock B) accessed the range every day during the study. Of the hens that accessed the range, most hens accessed all three zones (73.7% in Flock A, and 84.5% in Flock B). Hens spent half of their time outdoors in the veranda area. Within-individual consistency of range use (daily duration and frequency) varied considerably, and hens which were more consistent in their daily range use spent more time on the range overall ( p < 0.001). Understanding variation within and between individuals in ranging behaviour may help elucidate the implications of ranging for laying hens.

  13. Labor Mobility and Patenting Activity

    DEFF Research Database (Denmark)

    Kaiser, Ulrich; Kongsted, Hans Christian; Rønde, Thomas

    We measure the quantitative importance of labor mobility as a vehicle for the transmission of knowledge and skills across firms. For this purpose we create a unique data set that matches all applications of Danish firms at the European Patent Office to linked employer-employee register data...... for the years 1999-2002. The Danish workforce is split into "R&D workers", who hold a bachelor's or a master's degree in a technical field, and "non{R&D workers". We find that mobile R&D workers ("R&D joiners"') contribute more to patenting activity than immobile R&D workers. Furthermore, R&D workers who have...... relates to an increase in the number of patent applications of the new employer by 0.0646. This corresponds to a 14 percent increase in the mean number of yearly patent applications. We also find that mobility of R&D workers increases the joint patenting activity of the donor and recipient firms...

  14. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    OpenAIRE

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    2009-01-01

    International audience; GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal fo...

  15. A Study on Watt-hour Meter Data Acquisition Method Based on RFID Technology

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    Considering that traditional watt-hour meter data acquisition was subjected to the influence of distance and occlusion, a watt-hour meter data acquisition method based on RFID technology was proposed in this paper. In detail, RFID electronic tag was embedded in the watt-hour meter to identify the meter and record electric energy information, which made RFID based wireless data acquisition for watt-hour meter come true. Eventually, overall lifecycle management of watt-hour meter is realized.

  16. ECRI audio conference focuses on RFID: the possible benefits are significant, but proceed slowly.

    Science.gov (United States)

    2005-07-01

    This article highlights key points raised during ECRI's May 18, 2005, audio conference, "Radio-Frequency Identification (RFID) for Tracking Medical Devices: Planning for Today and Tomorrow." The conference gave attendees the opportunity to hear the experiences of two healthcare professionals managing RFID pilot programs at healthcare facilities. Information on ordering a recording of the event, including presentation materials and our recent Health Devices article on RFID, is provided at the end of this article.

  17. Roadmap for RFID Implementation in Central library, PEC University of Technology

    OpenAIRE

    Vasishta, Seema

    2009-01-01

    This paper gives brief idea about the emerging Radio Frequency Identification (RFID) technology, its importance in the library management system and its working. It also describes about the basic and optional components required for smooth working of the exercise. The aim is to consider how to extend RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. The article also illustrates a vivid picture about how RFID technology is acting...

  18. RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis

    Science.gov (United States)

    Zhang, Min; Li, Peichong

    Agri-food supply chain management (SCM), a management method to optimize internal costs and productivities, has evolved as an application of e-business technologies. These days, RFID has been widely used in many fields. In this paper, we analyze the characteristics of agri-food supply chain. Then the disadvantages of RFID are discussed. After that, we study the application strategies of RFID based on benefit and safety degree.

  19. Engineering e deployment of an RFID pilot in the apparel supply chain

    OpenAIRE

    Tizzi, Massimo

    2011-01-01

    Il progetto descritto nel presente lavoro di tesi nasce dagli studi iniziati nel 2008 presso il centro di ricerca RFID Lab dell’Università degli Studi di Parma riguardanti l’uso della tecnologia RFID nel settore dell’abbigliamento. I risultati ottenuti hanno fornito ai membri del Board of Advisors Fashion, composta da diverse aziende del settore, di conoscere i benefici e le problematiche insite nell’implementazione di un sistema RFID applicato alla Supply Chain dell’abbigliamento, ottenendo ...

  20. A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash

    OpenAIRE

    Mujahid, Umar; Najam-ul-Islam, M.; Jafri, Atif Raza; Qurat-ul-Ain; Ali Shami, M.

    2016-01-01

    RFID is one of the most prominent identification schemes in the field of pervasive systems. Nonline of sight capability makes RFID systems much better choice than its contended systems (such as barcode, magnetic tape, etc.). Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs...

  1. Self Circulation using RFID Technology with KOHA Software at St. Xavier’s College, Kolkata.

    OpenAIRE

    Chattopadhyay, Sougata; Savarimuthu, Xavier

    2017-01-01

    St. Xavier’s College Central Library has installed Radio Frequency IDentification (RFID) technology based kiosk for self circulation through open source library management software KOHA. This technology is also improved library annual stock taking, ensure foolproof security and access control i.e. circulation management. This articles briefly describes why our library switch over from barcode based circulation to RFID based circulation, SWOT analysis of RFID technology, self-circulation using...

  2. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    Directory of Open Access Journals (Sweden)

    Isabel Expósito

    2013-01-01

    Full Text Available The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a winery, a brewery, or any other beverage factory.

  3. Justification of RFID Implementation. A Case Study of White Goods Manufacturer

    Directory of Open Access Journals (Sweden)

    Gladysz Bartlomiej

    2017-12-01

    Full Text Available Radio Frequency Identification (RFID is a rapidly emerging technology with a wide range of impact and still not fully exploited potential applications. The impact of RFID is not limited to the area of its direct application. There are many possible benefits to be gained from RFID application, but it must be preceded with careful analysis as its implementation is not always reasonable. A new method for an assessment of RFID technology was presented and explained on the case of a white goods manufacturer. There was a lack of such a method allowing for relatively quick and flexible assessment, which is important for decision makers, who do not want to become involved in very sophisticated and time-consuming analysis at the early stage of decision making. The method supports early phases of decision making related to RFID implementation. Conclusions derived from the analysis of the case study confirmed that the method applied allows for rationalizing decision making and answers whether RFID could generate strategic advantage, in which area RFID should be applied, how RFID-supported processes will be executed and what benefits would be expected. previous papers focused only on answering specific questions from the above list, without showing a holistic approach. the approach to answer questions about execution of processes and benefits was not considered earlier at all. The paper illustrates details of using a new method of an assessment of RFID technology (ART using a real industrial example.

  4. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Directory of Open Access Journals (Sweden)

    Herman Vermaak

    2012-03-01

    Full Text Available Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach.

  5. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Science.gov (United States)

    Massawe, Libe Valentine; Kinyua, Johnson D. M.; Vermaak, Herman

    2012-01-01

    Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach. PMID:22666027

  6. RFID of next generation network for enhancing customer relationship management in healthcare industries.

    Science.gov (United States)

    Alzahrani, Ahmed; Qureshi, Muhammad Shuaib; Thayananthan, Vijey

    2017-10-23

    This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in healthcare industries. Customer relationship and its management techniques in a specific healthcare industry are considered in this development. The key objective of using NGN-RFID scheme is to enhance the handling of patients' data to improve the CRM efficiency in healthcare industries. The proposed NGN-RFID system is one of the valid points to improve the ability of CRM by analyzing different prior and current traditional approaches. The legacy of customer relationship management will be improved by using this modern NGN-RFID technology without affecting the novelty.

  7. Design of a Child Localization System on RFID and Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chao Chen

    2010-01-01

    Full Text Available Radio Frequency Identification (RFID and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate children within a certain range near some landmarks in the park. The design experience in this project can be exported to other applications such as object tracking and surveillance.

  8. ECC-based grouping-proof RFID for inpatient medication safety.

    Science.gov (United States)

    Lin, Qiping; Zhang, Fangguo

    2012-12-01

    Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.

  9. Array processing for RFID tag localization exploiting multi-frequency signals

    Science.gov (United States)

    Zhang, Yimin; Li, Xin; Amin, Moeness G.

    2009-05-01

    RFID is an increasingly valuable business and technology tool for electronically identifying, locating, and tracking products, assets, and personnel. As a result, precise positioning and tracking of RFID tags and readers have received considerable attention from both academic and industrial communities. Finding the position of RFID tags is considered an important task in various real-time locating systems (RTLS). As such, numerous RFID localization products have been developed for various applications. The majority of RFID positioning systems is based on the fusion of pieces of relevant information, such as the range and the direction-of-arrival (DOA). For example, trilateration can determine the tag position by using the range information of the tag estimated from three or more spatially separated reader antennas. Triangulation is another method to locate RFID tags that use the direction-of-arrival (DOA) information estimated at multiple spatially separated locations. The RFID tag positions can also be determined through hybrid techniques that combine the range and DOA information. The focus of this paper to study the design and performance of the localization of passive RFID tags using array processing techniques in a multipath environment, and exploiting multi-frequency CW signals. The latter are used to decorrelate the coherent multipath signals for effective DOA estimation and for the purpose of accurate range estimation. Accordingly, the spatial and frequency dimensionalities are fully utilized for robust and accurate positioning of RFID tags.

  10. Argonne National Laboratory patent portfolio

    International Nuclear Information System (INIS)

    Huguelet, B.C.

    1976-01-01

    This booklet contains the abstracts of all active U. S. patents on technology items that originated at ANL, the applicability of which is not limited to nuclear reactors. Also listed are the titles of all ANL-originated nuclear-related U. S. patents that are still in force. Selected technology items for which patent applications have been filed and are available for licensing are included in several categories. Categories included in this booklet are as follows: atmospheric and earth sciences; biological and medical sciences; chemistry and chemical engineering; cryogenics and superconductivity; electronics and electrical engineering; energy conversion; measurements and controls; methods and devices; materials and fabrication; physics, accelerators and fusion; and selected nuclear-related technology

  11. Flexibility features in patent writing

    Directory of Open Access Journals (Sweden)

    Carmen Sancho-Guinda

    2012-10-01

    Full Text Available International patents are increasingly demanded in academic circles as a sign of excellence and compete with situated genres such as projects, grants, PhD supervisions, books and journal articles, especially in hard science environments. The scarce modelling and dissemination of the genre so far, however, together with some wrong assumptions about the technical register, have helped propagate a series of “genre fallacies” that contribute to perpetuating undesirable writing practices and make the case for explicit instruction. In this paper I advocate a pedagogy of patent writing based on the deconstruction of such myths, which are basically concerned with a notion of the genre as rigid and static, highly impersonal, and exclusively descriptive. My study, based on a qualitative and corpus methodology, revolves around the crucial role of metadiscourse as evidence of flexibility in patent texts.

  12. Patents and the supply of therapeutic products.

    Science.gov (United States)

    Hayhurst, W L

    1992-01-01

    In some countries protests against the grant of exclusive rights in developments that benefit humanity have caused limits to be placed on the scope of patent rights. A characteristic of all modern patent systems is that the invention that one seeks to patent must have some practical utility and be new. The US is making patent protection available even for methods of medical treatment and for non human living things. A patent will expire in most developed countries 20 years from the filing of the application except in the US which grants patents from 17 years. India, China, and Brazil grant patents for shorter terms. In Australia and New Zealand, the term of a patent may be extended. In France and the US; extensions of term are possible only for medically related inventions. A patent grants to the owner of the patent the right, during its term, to exclude others from making, using, or selling the patented inventions. A patent grants to the owner of the patent the rights, during its term, to exclude others from making, using, or selling the patented invention. A patent owner who attempts to enforce a patent may be faced with a challenge that the patentee has misbehaved. In the US an alleged infringer may argue that the patentee misled the Patent Office when applying for the patent. The Patent laws of many countries enable the government to use patented inventions but compensate patent owners. Under sections 37 and 38 of the French patent legislation the government may decree that licenses are available in the interests of public health. In connection with Roussel-Uclaf's mifepristone, RU-486 it has been reported that such a decree cannot be made for a medicine that has not been approved by the government for distribution. The Canadian government has announced its intention to cancel the provisions in the Canadian Patent Act relating to compulsory licensing of medicines. Negotiations are continuing under the General Agreement on Tariffs and Trade that may lead to an

  13. Patent quality and incentives at the patent office

    NARCIS (Netherlands)

    Schuett, F.

    2013-01-01

    Patent examination is a problem of moral hazard followed by adverse selection: examiners must have incentives to exert effort, but also to truthfully reveal the evidence they find. I develop a theoretical model to study the design of incentives for examiners. The model can explain the puzzling

  14. Fundamentals of patenting and licensing for scientists and engineers

    National Research Council Canada - National Science Library

    Ma, M. Y. (Matthew Y.)

    2009-01-01

    ... ...28 3.2 Types of Patents...28 3.3 Patent Dates ...29 viiviii Fundamentals of Patenting and Licensing for Scientists and Engineers 3.4 Eligibility of Priority Date ...30 3.5 Patentability ...32...

  15. 48 CFR 27.201 - Patent and copyright infringement liability.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Patent and copyright... REGULATION GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Patents and Copyrights 27.201 Patent and copyright infringement liability. ...

  16. 7 CFR 1210.367 - Patents, copyrights, inventions, and publications.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Patents, copyrights, inventions, and publications....367 Patents, copyrights, inventions, and publications. Any patents, copyrights, inventions, product... such patents, copyrights, inventions, product formulations, or publications shall be considered income...

  17. Current challenges in patent information retrieval

    CERN Document Server

    Lupu, Mihai; Kando, Noriko; Trippe, Anthony J

    2017-01-01

    Intellectual property in the form of patents plays a vital role in today's increasingly knowledge-based economy. This book assembles state-of-the art research and is intended to illustrate innovative approaches to patent information retrieval.

  18. Impact of bioethics on patentability of inventions.

    Science.gov (United States)

    Devaiah, Vishwas H

    2010-01-01

    This paper examines the impact of bioethics on patent claims. The increase in research activities involving human biological materials, and the rush to commercialise inventions derived from such biological materials, can at times result in unethical conduct of research. Questions arise as to whether patent law should concern itself with tainted research that has resulted in an invention or whether it should grant patent rights solely on the basis of the technical improvements resulting from such research. This paper highlights the significance of ethical practice in biomedical research, an issue that may influence the decision to grant patents on inventions. It explores the relation between morality, bioethics and patents from the perspective of the objectives of the patent system and current developments in the law on patents. The inclusion of the morality provision in patent law introduces a mechanism through which inventions derived from tainted research can be filtered at an early stage.

  19. RFID in the warehouse:a literature analysis (1995-2010) of its applications, benefits, challenges and future trends

    OpenAIRE

    Lim, Ming K.; Bahr, W.; Leung, Stephen C.H.

    2013-01-01

    Radio Frequency Identification (RFID) has been identified as a crucial technology for the modern 21st century knowledge-based economy. Some businesses have realised benefits of RFID adoption through improvements in operational efficiency, additional cost savings, and opportunities for higher revenues. RFID research in warehousing operations has been less prominent than in other application domains. To investigate how RFID technology has had an impact in warehousing, a comprehensive analysis o...

  20. Can this kind of idea be a patent?

    International Nuclear Information System (INIS)

    Yu, Jae Bok

    2004-08-01

    This book mentions patent such as application, what is patents, patent law, procedure and patent attorney, which includes business idea is patent. Is internet domain name or name-brand? We can make a big money with others idea, the difference among patent, trademark, utility model rights and registration of design, priority system, new weapon in digital period, patent is a knife and a shield, the cost from application to registration, what is hunting of patent information, writing document for patent, patent examination and patent lawyer.

  1. 77 FR 4509 - Patent Public Advisory Committee Public Hearings on the Proposed Patent Fee Schedule

    Science.gov (United States)

    2012-01-30

    ... currently is planning to set or adjust patent fees pursuant to its Section 10 fee setting authority. As part... DEPARTMENT OF COMMERCE United States Patent and Trademark Office 37 CFR Chapter I [Docket No.: PTO-P-2012-0002] Patent Public Advisory Committee Public Hearings on the Proposed Patent Fee Schedule...

  2. Exploring gender differences in patenting in Spain

    OpenAIRE

    Elba Mauleón; Cinzia Daraio; Maria Bordons

    2013-01-01

    The under-representation of women in science and technology is a matter of current great concern. Obtaining patent-based indicators by gender is crucial to analyse the situation of women in innovation, identify potential cases of gender inequalities, and support policy measures to promote gender balance. In this article we analyse men and women involvement in Spanish patents applied to the European Patent Office during 1990--2004. At least one female inventor is present in 18% of the patents;...

  3. 14 CFR 1260.28 - Patent rights.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Patent rights. 1260.28 Section 1260.28... Provisions § 1260.28 Patent rights. Patent Rights May 2006 As stated at § 1260.136, this award is subject to... “Patent Rights (Small Business Firms and Nonprofit Organizations)” and the following: (a) Where the term...

  4. A study on RFID adoption for vehicle tracking in container terminal

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2012-06-01

    Full Text Available Purpose: Numerous studies discuss that Radio Frequency Identification (RFID technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring the movement of vehicle in the container terminal environment. Thus, this study aims at discussing the feasibility of applying RFID for vehicle tracking purpose in a container terminal. Design/methodology/approach: This study makes use of a series of experiments in a container terminal to discuss the factors that affect the use of RFID in the terminal. The possibility and accuracy of using RFID in such challenging environment is also investigated. These propositions are investigated by a case study. Findings: The experimental results indicate that the RFID communication is good at the containers area which occupies nearly all the area in the container terminal. However, in other area such as sea side and free area, the performance is not good and 100% readability only achieved in 5m and 10m in free area and sea side respectively. Originality/value: The container terminal environment, which consists of different transport vehicles for onward transportation, will affect the performance of RFID readability. Poor setup of the RFID reader and tag will lower the feasibility of RFID adoption as well as increase the cost. In order to address the challenges of implementing RFID in the container terminal environment, this paper provides a series of real site testing experiments to study the RFID performance in the container terminal environment. This represents an original contribution of value to future research and practice in the RFID adoptions in container terminal environment.

  5. Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the analysis of Nano RFID (Radio Frequency Identification) systems. We have shown the modeling and simulation and demonstrated some novel ideas and library development for Nano RFID. Multi scale modeling plays a very important role in nanotech enabled devices properties of which cannot be explained sometimes by abstraction level theories. Reliability and packaging still remains one the major hindrances in practical implementation of Nano RFID based devices. And to work on them modeling and simulation will play a very important role. CNTs is the future low power material that will replace CMOS and its integration with CMOS, MEMS circuitry will play an important role in realizing the true power in Nano RFID systems. RFID based on innovations in nanotechnology has been shown. MEMS modeling of Antenna, sensors and its integration in the circuitry has been shown. Thus incorporating this we can design a Nano-RFID which can be used in areas like human implantation and complex banking applications. We have proposed modeling of RFID using the concept of multi scale modeling to accurately predict its properties. Also we give the modeling of MEMS devices that are proposed recently that can see possible application in RFID. We have also covered the applications and the advantages of Nano RFID in various areas. RF MEMS has been matured and its devices are being successfully commercialized but taking it to limits of nano domains and integration with singly chip RFID needs a novel approach which is being proposed. We have modeled MEMS based transponder and shown the distribution for multi scale modeling for Nano RFID.

  6. Semiannual patents review, January-June 1998

    Science.gov (United States)

    Marguerite. Sykes; Julie J. Blankenburg

    1998-01-01

    This review summarizes patents in the area of paper recycling that appeared during the first half of 1998 in either of two on-line data bases: Derwent World Patent Index or Claims/U.S.Patents Abstracts. The information in these data bases is intended to keep readers informed about the latest equipment, chemicals, and technology in this field. The abstracts provide only...

  7. Semiannual patents review, July-December 1998

    Science.gov (United States)

    Matthew. Stroika; Marguerite. Sykes; Julie. Blankenburg

    1999-01-01

    This review summarizes patents related to paper recycling issued during the last 6 months of 1998. The two online databases used for this search are Claim/US. Patents Abstracts and Derwent World Patents Index. This semiannual feature is intended to inform readers about the latest developments in equipment, chemicals, and technology in the field of paper recycling. This...

  8. Semiannual patents review, July 2001-December 2001

    Science.gov (United States)

    Roland Gleisner; Marguerite Sykes; Julie Blankenburg

    2002-01-01

    This review summarizes patents related to paper recycling that were issued during the last six months of 2001. Two on-line databases, Claims/U.S. Patents Abstracts and Derwent World Patents Index, were searched for this review. This semiannual feature is intended to inform readers about recent developments in equipment design, chemicals and process technology for...

  9. Semiannual patents review, January-June 1999

    Science.gov (United States)

    Marguerite Sykes; Julie Blankenburg

    1999-01-01

    This review summarizes patents related to paper recycling that were issued during the first 6 months of 1999. The two on-line databases used for this search were C1aims/U.S. Patents Abstracts and Derwent World Patents Index. This semiannual feature is intended to inform readers about the latest developments in equipment design, chemicals, and process technology for...

  10. Semiannual patents review, January — June 2001.

    Science.gov (United States)

    Marguerite S. Sykes; Julie. Blankenburg

    2001-01-01

    This review summarizes patents related to paper recycling that were issued during the first 6 months of 2001. Two online databases, Claims/U.S. Patents Abstracts and Derwent World Patents Index, were searched for this review. This semiannual feature is intended to inform readers about recent developments in equipment design, chemicals, and process technology for...

  11. Analyzing Patents Generated by SBIR Firms

    Science.gov (United States)

    2014-04-30

    OECD). The national IPO measures typically issue annual reports on patenting trends by type of patent, geographic location of inventor, technology...class of the invention, assignee organization and by inventor. Because the national IPO offices primary missions are for patent data storage and

  12. On Sharks, Trolls, and Other Patent Animals

    DEFF Research Database (Denmark)

    Reitzig, Markus; Henkel, Joachim; Heath, Christopher

    2007-01-01

    Patent trolls (or sharks) are small patent holding individuals or firms who trap R&D intense manufacturers in patent infringement situations in order to receive damage awards for the illegitimate use of their technology. While of great concern to management, their existence and impact for both...

  13. 48 CFR 970.2703 - Patent rights.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Patent rights. 970.2703 Section 970.2703 Federal Acquisition Regulations System DEPARTMENT OF ENERGY AGENCY SUPPLEMENTARY REGULATIONS DOE MANAGEMENT AND OPERATING CONTRACTS Patents, Data, and Copyrights 970.2703 Patent rights. ...

  14. 48 CFR 35.012 - Patent rights.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Patent rights. 35.012 Section 35.012 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING RESEARCH AND DEVELOPMENT CONTRACTING 35.012 Patent rights. For a discussion of patent rights, see...

  15. 43 CFR 402.10 - Patent.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Patent. 402.10 Section 402.10 Public Lands... LANDS IN FEDERAL RECLAMATION PROJECTS Public Lands § 402.10 Patent. When a purchaser has complied fully... and patent and shall state the statutory authority for such liens. The receipt shall be submitted to...

  16. Patentability aspects of computational cancer models

    Science.gov (United States)

    Lishchuk, Iryna

    2017-07-01

    Multiscale cancer models, implemented in silico, simulate tumor progression at various spatial and temporal scales. Having the innovative substance and possessing the potential of being applied as decision support tools in clinical practice, patenting and obtaining patent rights in cancer models seems prima facie possible. What legal hurdles the cancer models need to overcome for being patented we inquire from this paper.

  17. Quantifying detection performance of a passive low-frequency RFID system in an environmental preference chamber for laying hens

    Science.gov (United States)

    Radio Frequency Identification (RFID) systems have been widely used in production livestock systems for identifying, tracing, and registering animals and improving subsidy management. Adaptations have been made to extend RFID technology to animal behavior and welfare research. An RFID system was imp...

  18. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Nekoogar, F; Dowla, F; Wang, T

    2010-01-27

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable {sup 3}He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  19. Research on Positioning Algorithm of Forklift-mounted RFID Reader

    Directory of Open Access Journals (Sweden)

    Hongjin Wang

    2014-07-01

    Full Text Available To conduct real-time and accurate positioning of the forklifts (people and goods in the warehouse is an effective means for improving warehouse management efficiency. To this end, this article puts forward the active positioning system with the forklift installed with RFID reader and the ground passageway embedded with RFID tag. In the running process, the position of forklift can be determined through recognition of the reference tags which are embedded at both sides of the passageway based on the three-side layout at right angle principle and their RSSI value. The positional accuracy can be improved by adjusting the layout distance of those reference tags. The experimental results show that this system can realize the positioning function of forklift, and it can be used in practical situations.

  20. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    International Nuclear Information System (INIS)

    Nekoogar, F.; Dowla, F.; Wang, T.

    2010-01-01

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable 3 He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  1. RFID based TLD monitoring system - a prospective development

    International Nuclear Information System (INIS)

    Jeevanram, S.S.; Pawar, S.T.; Mahule, K.N.; Rath, D.P.

    2008-01-01

    Thermo Luminescence Dosimetry (TLD) is an established method of monitoring the radiation dose received by workers in radiation environments. In Radiometallurgy Laboratory, BARC, the TLD movement inside a nuclear facility is completely carried out by a radiation worker. However, there is a chance that the TLDs may get lost in laboratories or some places without the knowledge of the concerned TLD user or health physicist. It may later lead to a false effective dose. Effort is being done to initiate a RFID based TLD monitoring system so that the use of TLD can be acknowledged through a self operating software which can prevent misuse of the detector. A novel method of improving the administrative control through Radio Frequency Identification (RFID) based monitoring to avoid such inadvertent misplacement of TLD, is in progress. This paper discusses the method and techniques through which administrative control can be exercised to reduce the number of such in explainable exposures. (author)

  2. Development of advanced RFID application system for nuclear power plant

    International Nuclear Information System (INIS)

    Onda, Kimiharu; Wakabayashi, Eisuke; Arai, Ryota; Shigemi, Ryosuke; Muro, Keiro; Yuda, Shinya

    2008-01-01

    In late years there comes to be close request for traceability of the information such as production control, construction and maintenance record and work history of nuclear power plants. On the other hand, the Radio-frequency identification (RFID) technology that can specify a product and personnel by an electric wave has raised the functionality and versatility as the base technology that can support ubiquitous information society around the mass production industry. In such a background, this article described the developed system, which applied the RFID to nuclear power plants in the areas of production control of the piping manufacture, the construction management and condition monitoring for maintenance works in order to improve their quality and reliability. (T. Tanaka)

  3. Applications of Health Management Using Android and RFID

    Directory of Open Access Journals (Sweden)

    Young-Long Chen

    2012-07-01

    Full Text Available Health management has become increasingly important in personal health care in modern life. The system we have designed provides a method to help facilitate health management through an associated smart phone with Radio Frequency Identification (RFID, which is a new type of application. This system consists of medical knowledge and health management. In the application of medical knowledge, we use the human model as well as the operation of RFID to obtain medical knowledge concerning human organs. The two main functions of the health management system are medication reminders and drug identification. The feature of medication reminders allows users to set the time for taking medication so that patients do not miss taking their medication. The feature of drug identification allows the operators to identify the drugs and can let the users know who needs to take drugs. In addition, we have designed a web page that allows users to understand their health status.

  4. USING RFID AND GIS TECHNOLOGIES FOR ADVANCED LUGGAGE TRACKING

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2015-06-01

    Full Text Available By purchasing a plane ticket or a cargo service, the passenger or the customer signs a contract with the airline company. From that moment on the airline company is responsible for all aspects of air travel, including the passenger' luggage (recording, handling to / from the aircraft etc.. Safe transport of passengers' luggage or cargo packages on airlines raises numerous problems for airlines and requires flexible, efficient solutions, appropriate to the specific requirements of each client. Annually millions of luggages get lost in airports around the world. This causes inconvenience to passengers and loss of resources and additional costs for the airlines. The aim of this paper is to examine how RFID(Radio Frequency Identification technology could be useful for advanced shipment tracking (Track and Trace in the airlines industry, by using rewritable passive RFID tags.

  5. An Application of RFID in Monitoring Agricultural Material Products

    Science.gov (United States)

    Du, Jianhui; Li, Peipei; Gao, Wanlin; Wang, Dezhong; Wang, Qing; Zhu, Yilong

    With the development of modern agriculture, more and more agricultural material products are used in it. While how to keep these things safe is a big problem at present, which needs to be paid more attention. This article develops an agricultural material products monitor system based on RFID which gives alarm as soon as possible if there is anything unmoral. Every warehouse exit is equipped with a RFID reader, while each agricultural material product has a tag on them. When passing though, the reader identifies the tag's information and transfer it to the PC, The PC inquiries the database storing all tags' information, and tells which one is not taken out legally by alarming aloud.

  6. Tecnologia RFID e seus benefícios

    Directory of Open Access Journals (Sweden)

    Claudia Boechat Seufitelli

    2010-05-01

    Full Text Available Radio Frequency Identification (RFID - é um sistema de identificação através de indução de ondas eletromagnéticas. Esta tecnologia tem se mostrado útil e promissora, e ao se comparar com código de barras, é mais ágil e flexível. Hoje, pode-se perceber que são muitas as aplicações desse sistema como por exemplo: controle de acesso de pessoas e veículos; controle de processos de fabricação industrial; rastreamento animal; controle de estoque etc. Pesquisas apontam um crescimento substancial no emprego da RFID visto que seu custo está reduzindo, fazendo com que o número de possíveis aplicações aumente.

  7. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  8. Considerations for RFID-Based Indoor Simultaneous Tracking

    Science.gov (United States)

    Papapostolou, Apostolia; Chaouchi, Hakima

    Context-aware applications is not just a vision. Advances in wireless communications and mobile capabilities have revolutionized the way services are brought to users, i.e. adapted to their context. Location is a key attribute of the term context and thus, an accurate location determination system is of paramount importance. RFID (Radio Frequency IDentification) is an emerging technology and recently has been explored for its applicability in location sensing systems. In this paper, we focus on an RFID-based localization approach in an indoor multi-user environment and model its most adverse implicating factors, that is collisions among its main components and interference from indoor characteristics. Extensive simulations are conducted to characterize and evaluate the performance behavior of the proposed scheme in environments with different levels of severity.

  9. Patents - Overlooked Source of Information

    Czech Academy of Sciences Publication Activity Database

    Matějíček, Jiří; Ilavský, J.

    2004-01-01

    Roč. 13, č. 4 (2004), s. 473-476 ISSN 1059-9630 Institutional research plan: CEZ:AV0Z2043910 Keywords : patent * database * thermal spraying Subject RIV: JK - Corrosion ; Surface Treatment of Materials Impact factor: 1.068, year: 2004

  10. Patentering af det humane genom

    DEFF Research Database (Denmark)

    Sommer, Tine

    2004-01-01

    Direktiv 98/44/EF om retlig beskyttelse af bioteknologiske opfindelser blev gennemført i dansk ret med ikrafttrædelse den 30. juli 2000. Direktivet indeholder i artikel 5 en central bestemmelse som giver adgang til patent på humane gener. I artikel 5, stk. 3, er indføjet et skærpet krav til...

  11. Patenting Human Genes in Europe

    DEFF Research Database (Denmark)

    Minssen, Timo

    2017-01-01

    In accordance with the concept of the book and the assigned scope of the contribution, this chapter describes the European law with respect to the patent-eligibility of isolated DNA sequences. This chapter will further include a brief comparison with recent developments from the US and Australia....

  12. 37 CFR 1.705 - Patent term adjustment determination.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Patent term adjustment determination. 1.705 Section 1.705 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND TRADEMARK OFFICE, DEPARTMENT OF COMMERCE GENERAL RULES OF PRACTICE IN PATENT CASES Adjustment and Extension of Patent Term...

  13. RFID-Based Asset Management for Space Habitats

    Science.gov (United States)

    Fink, Patrick W.

    2013-01-01

    Remote habitats are often densely packed - items necessary to sustain life - items necessary to conduct work center dot Inhabitant's time is often quite valuable, if not priceless. Resupply shipments can be infrequent and expensive. Inaccurate inventory knowledge can lead to unnecessary overstocking, which can lead to insufficient work and/or living volume. Not being able to find items when they are needed can present: - safety issues - morale issues. RFID technology has the potential solve a lot of these issues.

  14. Applied Ethics and eHealth: Principles, Identity, and RFID

    Science.gov (United States)

    Whitehouse, Diane; Duquenoy, Penny

    The social and ethical implications of contemporary technologies are becoming an issue of steadily growing importance. This paper offers an overview in terms of identity and the field of ethics, and explores how these apply to eHealth in both theory and practice. The paper selects a specific circumstance in which these ethical issues can be explored. It focuses particularly on radio-frequency identifiers (RFID). It ends by discussing ethical issues more generally, and the practice of ethical consideration.

  15. Implementation and extension of a GNU-Radio RFID reader

    OpenAIRE

    G. Smietanka; S. Brato; M. Freudenberg; J. Götze

    2013-01-01

    The development of a flexible software defined RFID is discused. Commercial reader systems only allow a top level view on the communication and restrict the variation for many transmission parameters. Recently a software reader from the CGran project was proposed which uses the GNU Radio environment in combination with an USRP front end. Because most of the signal processing is done on a common host PC, this reader offers high flexibility, but also has several disadvantages. One ...

  16. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  17. Patient safety through RFID: vulnerabilities in recently proposed grouping protocols.

    Science.gov (United States)

    Wickboldt, Anne-Katrin; Piramuthu, Selwyn

    2012-04-01

    As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.

  18. Cross-Border Patent Disputes: Unified Patent Court or International Commercial Arbitration?

    OpenAIRE

    Alba Betancourt, Ana

    2016-01-01

    Currently, the enforcement of a patent that is registered in several countries involves the risk of getting different and conflicting decisions from the national courts. In 2013, 25 European countries entered in an agreement that aims to homogenise the patent system by creating the European patent with unitary effect and a Unified Patent Court (UPC). This article focuses on the UPC, which aims to have a single court proceeding for cross-border patent conflicts. Does the UPC system represent a...

  19. Radio Frequency Identification (RFID) Based Employee Attendance Management System

    Science.gov (United States)

    Maramis, G. D. P.; Rompas, P. T. D.

    2018-02-01

    Manually recorded attendance of all the employees has produced some problems such as the data accuracy and staff performance efficiency. The objective of this research is to design and develop a software of RFID attendance system which is integrated with database system. This RFID attendance system was developed using several main components such as tags that will be used as a replacement of ID cards and a reader device that will read the information related to the employee attendance. The result of this project is a software of RFID attendance system that is integrated with the database and has a function to store the data or information of every single employee. This system has a maximum reading range of 2 cm with success probability of 1 and requires a minimum interval between readings of 2 seconds in order to achieve an optimal functionality. By using the system, the discipline attitude of the employees and also the performance of the staff will be improved instantly.

  20. Design of the RFID for Storage of Biological Information

    Directory of Open Access Journals (Sweden)

    Sang-Hee Son

    2009-02-01

    Full Text Available Recent advances in RFID (radio frequency identification technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stores vital biological information such as body temperature and blood pressure and heartbeat in accordance with the EPC global Class-1 standard. Biological data is obtained from a sensor technology that is based on resistance deviation-to-pulse width converter. The integrated chip consists of an analog front end, command interpreter, collision avoidance block, data storage, sensors, and interface circuitry. The system is capable of supporting heartbeats in the range of 40~200 beats per a minute and blood pressure 0~300mmHg. The proposed system employs collision free algorithm that supports access to single tag within a multiple tag environment. The approach facilitates intelligent management of patients in hospitals as part of an integrated healthcare management system.

  1. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  2. Interrogation zone determination in HF RFID systems with multiplexed antennas*

    Directory of Open Access Journals (Sweden)

    Jankowski-Mihułowicz Piotr

    2015-09-01

    Full Text Available The operation of an anti-collision RFID system is characterized by the interrogation zone which should be estimated in any direction of 3D space for a group of electronic transponders. The interrogation zone should be as large as possible. However, the many problems in this area are due to the fact that energy can be transferred to transponders only on a limited distance. The greatest flexibility in developing RFID applications and shaping the interrogation zone can be achieved using the system with an antenna multiplexer. Therefore the problem of the interrogation zone determination in HF RFID systems with two orthogonal RWD antennas is presented in the paper. The perceived issues have been effectively dealt with and the solution has been proposed on the basis of the elaborated model. Conducted studies have been used to develop the software tool JankoRFIDmuxHF in the Mathcad environment. The research results are analysed in an example system configuration. The specialized measuring stand has been used for experimental verification of the identification efficiency. The convergence of the measurements and calculations confirms a practical usefulness of the presented concept of interrogation zone determination in anti-collision systems. It also shows the practical utility of the developed model and software tools.

  3. A reliable RFID mutual authentication scheme for healthcare environments.

    Science.gov (United States)

    Wu, Zhen-Yu; Chen, Lichin; Wu, Ju-Chuan

    2013-04-01

    Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments.

  4. A comprehensive RFID solution to enhance inpatient medication safety.

    Science.gov (United States)

    Peris-Lopez, Pedro; Orfila, Agustin; Mitrokotsa, Aikaterini; van der Lubbe, Jan C A

    2011-01-01

    Errors involving medication administration can be costly, both in financial and in human terms. Indeed, there is much potential for errors due to the complexity of the medication administration process. Nurses are often singled out as the only responsible of these errors because they are in charge of drug administration. Nevertheless, the interventions of every actor involved in the process and the system design itself contribute to errors (Wakefield et al. (1998). Proper inpatient medication safety systems can help to reduce such errors in hospitals. In this paper, we review in depth two recent proposals (Chien et al. (2010); Huang and Ku (2009)) that pursue the aforementioned objective. Unfortunately, they fail in their attempt mainly due to their security faults but interesting ideas can be drawn from both. These security faults refer to impersonation and replay attacks that could produce the generation of a forged proof stating that certain medication was administered to an inpatient when it was not. We propose a leading-edge solution to enhance inpatient medication safety based on RFID technology that overcomes these weaknesses. Our solution, named Inpatient Safety RFID system (IS-RFID), takes into account the Information Technology (IT) infrastructure of a hospital and covers every phase of the drug administration process. From a practical perspective, our system can be easily integrated within hospital IT infrastructures, has a moderate cost, is very ease to use and deals with security aspects as a key point. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  5. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  6. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

    Directory of Open Access Journals (Sweden)

    Joon Heo

    2009-06-01

    Full Text Available Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space.

  7. Patent data mining method and apparatus

    Science.gov (United States)

    Boyack, Kevin W.; Grafe, V. Gerald; Johnson, David K.; Wylie, Brian N.

    2002-01-01

    A method of data mining represents related patents in a multidimensional space. Distance between patents in the multidimensional space corresponds to the extent of relationship between the patents. The relationship between pairings of patents can be expressed based on weighted combinations of several predicates. The user can select portions of the space to perceive. The user also can interact with and control the communication of the space, focusing attention on aspects of the space of most interest. The multidimensional spatial representation allows more ready comprehension of the structure of the relationships among the patents.

  8. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Science.gov (United States)

    Meng, Zhaozong; Li, Zhen

    2016-12-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC), ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  9. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol

  10. RFID-based vehicle positioning and its applications in connected vehicles.

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-03-04

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  11. High-level managers' considerations for RFID adoption in hospitals: an empirical study in Taiwan.

    Science.gov (United States)

    Lai, Hui-Min; Lin, I-Chun; Tseng, Ling-Tzu

    2014-02-01

    Prior researches have indicated that an appropriate adoption of information technology (IT) can help hospitals significantly improve services and operations. Radio Frequency Identification (RFID) is believed to be the next generation innovation technology for automatic data collection and asset/people tracking. Based on the Technology-Organization-Environment (TOE) framework, this study investigated high-level managers' considerations for RFID adoption in hospitals. This research reviewed literature related IT adoption in business and followed the results of a preliminary survey with 37 practical experts in hospitals to theorize a model for the RFID adoption in hospitals. Through a field survey of 102 hospitals and hypotheses testing, this research identified key factors influencing RFID adoption. Follow-up in-depth interviews with three high-level managers of IS department from three case hospitals respectively also presented an insight into the decision of RFID's adoption. Based on the research findings, cost, ubiquity, compatibility, security and privacy risk, top management support, hospital scale, financial readiness and government policy were concluded to be the key factors influencing RFID adoption in hospitals. For practitioners, this study provided a comprehensive overview of government policies able to promote the technology, while helping the RFID solution providers understand how to reduce the IT barriers in order to enhance hospitals' willingness to adopt RFID.

  12. Interference Helps to Equalize the Read Range and Reduce False Positives of Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    In various applications of RFID systems a reader should reliably get the ID of the tags that are within a bounded proximity region, termed the interrogation zone. This gives rise to two types of errors 1) False Negative Detections (FNDs), when tags within the intended interrogation zone cannot...... interference enables design of well-defined interrogation zones for passive RFID systems....

  13. Fast Capture­-Recapture Approach for Mitigating the Problem of Missing RFID Tags

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Jacobsen, Rasmus; Popovski, Petar

    2012-01-01

    The technology of Radio Frequency IDentification (RFID) enables many applications that rely on passive, battery-less wireless devices. If a RFID reader needs to gather the ID from multiple tags in its range, then it needs to run an anticollision protocol. Due to errors on the wireless link...

  14. Impact of RFID on Retail Value Chain: A Mixed Method Study

    Science.gov (United States)

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  15. Design of a covert RFID tag network for target discovery and target information routing.

    Science.gov (United States)

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  16. Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains

    Science.gov (United States)

    Mo, John P. T.; Li, Xue

    Radio Frequency Identification (RFID) is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight. This creates tremendous opportunities for linking real world objects into a world of "Internet of things". Application of RFID to Fast Moving Consumer Goods sector will introduce billions of RFID tags in the world. Almost everything is tagged for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of processing of RFID events and data. This chapter uses two national demonstrator projects in Australia as case studies to introduce an event managementframework to process high volume RFID data streams in real time and automatically transform physical RFID observations into business-level events. The model handles various temporal event patterns, both simple and complex, with temporal constraints. The model can be implemented in a data management architecture that allows global RFID item tracking and enables fast, large-scale RFID deployment.

  17. A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol

    NARCIS (Netherlands)

    Barrero, D.F.; Hernandez-Castro, J.C.; Peris-Lopez, P.; Camacho, D.; Moreno, M.D.R.

    2012-01-01

    Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously

  18. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    Science.gov (United States)

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  19. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    Science.gov (United States)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  20. Design of a Covert RFID Tag Network for Target Discovery and Target Information Routing

    Directory of Open Access Journals (Sweden)

    Qihe Pan

    2011-09-01

    Full Text Available Radio frequency identification (RFID tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag’s location is saved at command center, which can determine where a RFID tag is located based on each RFID tag’s ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  1. Analysis of US patents on spacer grids

    International Nuclear Information System (INIS)

    Kim, Hyung Kyu; Song, Kee Nam; Yoon, Kyung Ho; Kang, Hong Seok; Kim, Hyung Kyu; Jeon, Tae Hyun; Oh, Dong Seok; In, Wang Ki; Bang, Jae Keun; Oh, Seung Eun; Seo, Jeong Min; Lee, Jin Seok; Park, Seong Keun

    1997-06-01

    The total of 137 US patents on spacer grids patented from 1968 through 1993 are analyzed and summarized. Database is constituted with designing the appropriate fields by which each patent can be identified. The fields consist of patent number, inventor, assignee, date of patent, title and major foci of the patent. The major foci are again classified by detailed subjects such as the fretting failure and fuel rod support-related, the strength-related, the fabrication-related as for mechanical subjects, while the cooling performance-related and the pressure drop-related as for thermal-hydraulic one. The 92% of the patents analyzed were issued form nuclear companies of USA, France and Germany. Among the patents dealing with mechanical subjects, the fretting failure and fuel rod support-related is more than the pressure drop-related among the patents of thermal-hydraulic subjects. The number of patents issued from Japan ranks just after Germany i.e., the 4th country. It is thought that much concern as well as investment should be increased in this field, the patent of nuclear components. (author). 2 tabs., 5 figs

  2. Documentation pckage for the RFID temperature monitoring system (Of Model 9977 packages at NTS).

    Energy Technology Data Exchange (ETDEWEB)

    Chen, K.; Tsai, H.; Decision and Information Sciences

    2009-02-20

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  3. Documentation package for the RFID temperature monitoring system (Model 9977 packages at NTS)

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.

    2009-01-01

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  4. US photovoltaic patents: 1991--1993

    Energy Technology Data Exchange (ETDEWEB)

    Pohle, L

    1995-03-01

    This document contains US patents on terrestrial photovoltaic (PV) power applications, including systems, components, and materials as well as manufacturing and support functions. The patent entries in this document were issued from 1991 to 1993. The entries were located by searching USPA, the database of the US Patent Office. The final search retrieved all patents under the class ``Batteries, Thermoelectric and Photoelectric`` and the subclasses ``Photoelectric,`` ``Testing,`` and ``Applications.`` The search also located patents that contained the words ``photovoltaic(s)`` or ``solar cell(s)`` and their derivatives. After the initial list was compiled, most of the patents on the following subjects were excluded: space photovoltaic technology, use of the photovoltaic effect for detectors, and subjects only peripherally concerned with photovoltaic. Some patents on these three subjects were included when ft appeared that those inventions might be of use in terrestrial PV power technologies.

  5. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    Science.gov (United States)

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal food safety traceability using GS1 and RFID. This framework uses RFID tags encoding with EPCglobal tag data standards. Each information server has access tier, business tier and resource tier. These servers are heterogeneous and distributed, providing user access interfaces by SOAP or HTTP protocols. For sharing dynamic data, discovery service and object name service are used to locate dynamic distributed information servers.

  6. RFID technology in health environment opportunities and challenges for modern cancer care.

    Science.gov (United States)

    Safdari, Reza; Maserat, Elham; Maserat, Elnaz

    2012-01-01

    Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

  7. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  8. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  9. Experimental Assessment of Orientation Sensing and Constructive Interference in Passive RFID Systems

    DEFF Research Database (Denmark)

    Krigslund, Rasmus

    2012-01-01

    This thesis focus on passive Radio Frequency IDentication (RFID), a tech- nology designed for automated identication of tagged objects. The tags are small passive devices powered by the wireless signal from the reader. Their simple operation thus solely allows them to reply with their unique ID...... when requested by the reader, which is a high power handheld or stationary transceiver. The RFID technology has matured over the past two decades, but still there exist ambiguities regarding the reading, or interrogation, of tags. Due to the passive nature of the tags, they are severely aected...... experience. Moreover, this thesis proposes to use passive RFID tags as orientation sensors. This is an innovative application for RFID technology in itself, but orientation sensing can also help existing RFID applications that relies on the Received Signal Strength (RSS) in the tag reply. Many Ultra High...

  10. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  11. Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong; Chatterjee, Mainak

    2015-03-01

    With the growing use of RFID (Radio Frequency Identification), it is becoming important to devise ways to read RFID tags in real time. Access points (APs) of IEEE 802.11-based wireless Local Area Networks (LANs) are being integrated with RFID networks that can efficiently collect real-time RFID data. Several schemes, such as multipolling methods based on the dynamic search algorithm and random sequencing, have been proposed. However, as the number of RFID readers associated with an AP increases, it becomes difficult for the dynamic search algorithm to derive the multipolling sequence in real time. Though multipolling methods can eliminate the polling overhead, we still need to enhance the performance of the multipolling methods based on random sequencing. To that extent, we propose a real-time cluster-based multipolling sequencing algorithm that drastically eliminates more than 90% of the polling overhead, particularly so when the dynamic search algorithm fails to derive the multipolling sequence in real time.

  12. Impact of radio-frequency identification (RFID) technologies on the hospital supply chain: a literature review.

    Science.gov (United States)

    Coustasse, Alberto; Tomblin, Shane; Slack, Chelsea

    2013-01-01

    Supply costs account for more than one-third of the average operating budget and constitute the second largest expenditure in hospitals. As hospitals have sought to reduce these costs, radio-frequency identification (RFID) technology has emerged as a solution. This study reviews existing literature to gauge the recent and potential impact and direction of the implementation of RFID in the hospital supply chain to determine current benefits and barriers of adoption. Findings show that the application of RFID to medical equipment and supplies tracking has resulted in efficiency increases in hospitals with lower costs and increased service quality. RFID technology can reduce costs, improve patient safety, and improve supply chain management effectiveness by increasing the ability to track and locate equipment, as well as monitoring theft prevention, distribution management, and patient billing. Despite ongoing RFID implementation in the hospital supply chain, barriers to widespread and rapid adoption include significant total expenditures, unclear return on investment, and competition with other strategic imperatives.

  13. A multi-domain trust management model for supporting RFID applications of IoT.

    Science.gov (United States)

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  14. Measuring the drinking behaviour of individual pigs housed in group using radio frequency identification (RFID).

    Science.gov (United States)

    Maselyne, J; Adriaens, I; Huybrechts, T; De Ketelaere, B; Millet, S; Vangeyte, J; Van Nuffel, A; Saeys, W

    2016-09-01

    Changes in the drinking behaviour of pigs may indicate health, welfare or productivity problems. Automated monitoring and analysis of drinking behaviour could allow problems to be detected, thus improving farm productivity. A high frequency radio frequency identification (HF RFID) system was designed to register the drinking behaviour of individual pigs. HF RFID antennas were placed around four nipple drinkers and connected to a reader via a multiplexer. A total of 55 growing-finishing pigs were fitted with radio frequency identification (RFID) ear tags, one in each ear. RFID-based drinking visits were created from the RFID registrations using a bout criterion and a minimum and maximum duration criterion. The HF RFID system was successfully validated by comparing RFID-based visits with visual observations and flow meter measurements based on visit overlap. Sensitivity was at least 92%, specificity 93%, precision 90% and accuracy 93%. RFID-based drinking duration had a high correlation with observed drinking duration (R 2=0.88) and water usage (R 2=0.71). The number of registrations after applying the visit criteria had an even higher correlation with the same two variables (R 2=0.90 and 0.75, respectively). There was also a correlation between number of RFID visits and number of observed visits (R 2=0.84). The system provides good quality information about the drinking behaviour of individual pigs. As health or other problems affect the pigs' drinking behaviour, analysis of the RFID data could allow problems to be detected and signalled to the farmer. This information can help to improve the productivity and economics of the farm as well as the health and welfare of the pigs.

  15. WiFi RFID demonstration for resource tracking in a statewide disaster drill.

    Science.gov (United States)

    Cole, Stacey L; Siddiqui, Javeed; Harry, David J; Sandrock, Christian E

    2011-01-01

    To investigate the capabilities of Radio Frequency Identification (RFID) tracking of patients and medical equipment during a simulated disaster response scenario. RFID infrastructure was deployed at two small rural hospitals, in one large academic medical center and in two vehicles. Several item types from the mutual aid equipment list were selected for tracking during the demonstration. A central database server was installed at the UC Davis Medical Center (UCDMC) that collected RFID information from all constituent sites. The system was tested during a statewide disaster drill. During the drill, volunteers at UCDMC were selected to locate assets using the traditional method of locating resources and then using the RFID system. This study demonstrated the effectiveness of RFID infrastructure in real-time resource identification and tracking. Volunteers at UCDMC were able to locate assets substantially faster using RFID, demonstrating that real-time geolocation can be substantially more efficient and accurate than traditional manual methods. A mobile, Global Positioning System (GPS)-enabled RFID system was installed in a pediatric ambulance and connected to the central RFID database via secure cellular communication. This system is unique in that it provides for seamless region-wide tracking that adaptively uses and seamlessly integrates both outdoor cellular-based mobile tracking and indoor WiFi-based tracking. RFID tracking can provide a real-time picture of the medical situation across medical facilities and other critical locations, leading to a more coordinated deployment of resources. The RFID system deployed during this study demonstrated the potential to improve the ability to locate and track victims, healthcare professionals, and medical equipment during a region-wide disaster.

  16. The Coordination of Independently-Owned Vacuum Tube Patents in the Alleged Early Radio Patent Thicket

    DEFF Research Database (Denmark)

    Howells, John; Ron D, Katznelson

    -examines the legal trajectories and entrepreneurial exploitation of these patents with a focus on vacuum tube technology where Fleming’s diode patent ‘overlapped’ with earlier prior art and, dependent on court decisions, with later commercial implementations of De Forest’s triode patents. We show, by means...... of the relevant historical record, patent claims, litigation records and other relevant law, how the ‘overlapping’ patent rights were resolved by the courts and by the immunity of suppliers to the Government from patent infringement liability. We trace the cross-licensing agreements between the different radio...

  17. The academic advantage: gender disparities in patenting.

    Directory of Open Access Journals (Sweden)

    Cassidy R Sugimoto

    Full Text Available We analyzed gender disparities in patenting by country, technological area, and type of assignee using the 4.6 million utility patents issued between 1976 and 2013 by the United States Patent and Trade Office (USPTO. Our analyses of fractionalized inventorships demonstrate that women's rate of patenting has increased from 2.7% of total patenting activity to 10.8% over the nearly 40-year period. Our results show that, in every technological area, female patenting is proportionally more likely to occur in academic institutions than in corporate or government environments. However, women's patents have a lower technological impact than that of men, and that gap is wider in the case of academic patents. We also provide evidence that patents to which women--and in particular academic women--contributed are associated with a higher number of International Patent Classification (IPC codes and co-inventors than men. The policy implications of these disparities and academic setting advantages are discussed.

  18. A framework for performance and data quality assessment of Radio Frequency IDentification (RFID) systems in health care settings.

    Science.gov (United States)

    van der Togt, Remko; Bakker, Piet J M; Jaspers, Monique W M

    2011-04-01

    RFID offers great opportunities to health care. Nevertheless, prior experiences also show that RFID systems have not been designed and tested in response to the particular needs of health care settings and might introduce new risks. The aim of this study is to present a framework that can be used to assess the performance of RFID systems particularly in health care settings. We developed a framework describing a systematic approach that can be used for assessing the feasibility of using an RFID technology in a particular healthcare setting; more specific for testing the impact of environmental factors on the quality of RFID generated data and vice versa. This framework is based on our own experiences with an RFID pilot implementation in an academic hospital in The Netherlands and a literature review concerning RFID test methods and current insights of RFID implementations in healthcare. The implementation of an RFID system within the blood transfusion chain inside a hospital setting was used as a show case to explain the different phases of the framework. The framework consists of nine phases, including an implementation development plan, RFID and medical equipment interference tests, data accuracy- and data completeness tests to be run in laboratory, simulated field and real field settings. The potential risks that RFID technologies may bring to the healthcare setting should be thoroughly evaluated before they are introduced into a vital environment. The RFID performance assessment framework that we present can act as a reference model to start an RFID development, engineering, implementation and testing plan and more specific, to assess the potential risks of interference and to test the quality of the RFID generated data potentially influenced by physical objects in specific health care environments. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. Of patents and patent disputes - The TNFα patent files. Part 2: Enbrel, Remicade, Cimzia and Simponi.

    Science.gov (United States)

    Storz, Ulrich

    2018-02-05

    This article is the second part of a trilogy that discusses IP issues related to anti-Tumor Necrosis factor α (TNFα) biologics. TNFα is the world's most valuable target, with accumulated sales of TNFα biologics of 34 bn USD in 2014. While in the first part of this trilogy, Humira was discussed, this second parts discusses the patent strategies of Enbrel, Remicade, Cimzia and Simponi.

  20. Electronic individual identification of zebrafish using radio frequency identification (RFID) microtags.

    Science.gov (United States)

    Cousin, Xavier; Daouk, Tarek; Péan, Samuel; Lyphout, Laura; Schwartz, Marie-Elise; Bégout, Marie-Laure

    2012-08-15

    Although individual electronic tagging using passive integrated acoustic (PIT) tags is established, it is mainly for fish >60 mm in length and is unsuitable for fish of RFID) microtags (1 mm in diameter and 6 mm in length, with a mass of ~10 mg) to individually identify juvenile zebrafish (length 16-42 mm, mass 138-776 mg) for the first time, and studied the effects of intracoelomic implantation on fish survival and microtag loss, growth, spawning and exploratory behaviour. After 5.5 months, both high survival (82%) and low microtag loss (11%) were achieved. The smallest surviving fish weighed 178 mg, and success in microtag reading was 73% for the size class 350-450 mg (26 mm). Greater success was achieved when fish were larger at the time of tagging but no negative effects on growth were observed for any size class and some tagged fish spawned. No significant differences in behavioural responses could be detected between tagged fish and untagged controls after 2 months. Overall, the results suggest that the tagging method is highly suitable for fish as small as zebrafish juveniles. We think this method will provide significant advances for researchers of the ever-growing fish model community and more generally for all small-fish users. Tagging is essential when one needs to identify fish (e.g. particular genotypes with no external cue), to run longitudinal monitoring of individual biological traits (e.g. growth) or to repeat assays with the same individual at discrete points in time (e.g. behaviour studies). Such a method will find applications in physiology, genetics, behaviour and (eco)toxicology fields.