WorldWideScience

Sample records for santa teresa rfid

  1. Santa Teresa y sus cartas, historia de los sentimientos

    Directory of Open Access Journals (Sweden)

    Egido, Teófanes

    2015-12-01

    Full Text Available Historical reflection on a peculiar dimension of St. Teresa of Jesus: the expression of her feelings in her writings, particularly in her abundant letters. The article focuses on the sense of humor, the joyfulness, and the importance of laughter in St. Teresa language, and also on the feeling of endearment with her family, with her order, with fray Juan de la Cruz. Ample space is dedicated to the tenderness towards girls in her convents. St. Teresa of Jesus appears as transgressor of 16th century social behaviours.Reflexión histórica sobre una dimensión peculiar de santa Teresa de Jesús: la expresión de sus sentimientos en sus escritos, de forma más especial en sus cartas abundantes. El artículo se centra en el sentido del humor, de la alegría, en la importancia de la risa en el lenguaje de santa Teresa y en el sentimiento de ternura con su familia, con su orden, con fray Juan de la Cruz. Se dedica un espacio amplio a la ternura hacia las niñas en sus conventos. Aparece santa Teresa de Jesús como trasgresora de los comportamientos sociales del siglo XVI.

  2. Insect galls from Atlantic Forest areas of Santa Teresa, Espírito Santo, Brazil: characterization and occurrence

    Directory of Open Access Journals (Sweden)

    Valéria Cid Maia

    2014-01-01

    Full Text Available Galhas de insetos de areas de Mata Atlântica de Santa Teresa, Espírito Santo, Brasil: caracterização e ocorrência. Três áreas protegidas de Mata atlântica foram investigadas em  Santa Teresa, Espírito Santo, de junho de 2007 a agosto de 2009: Estação Biológica de Santa Lúcia, Reserva Biológica Augusto Ruschi e Parque Natural Municipal São Lourenço. A vegetação local foi examinada à procura de galhas de insetos. Foram encontrados 265 morfotipos de galhas em 141 espécies de plantas (104 gêneros e 49 famílias. Asteraceae, Fabaceae, Myrtaceae, Melastomataceae e Rubiaceae foram as famílias de planta com maior riqueza de galhas. Os gêneros super-hospedeiros foram Mikania Willd. (Asteraceae, Myrcia DC. ex. Guill. (Myrtaceae e Inga Mill. (Fabaceae. A espécie super-hospedeira foi Guapira opposita (Vell. Reitz. (Nyctaginaceae. As galhas foram encontradas em folhas, caules, botões, raízes e gavinhas. As folhas foram o órgão vegetal mais galhado, seguidas pelos caules e botões. Os indutores pertencem a quatro ordens de insetos: Diptera, Lepidoptera, Hemiptera e Thysanoptera, sendo Cecidomyiidae (Diptera os mais frequentes e diversificados galhadores. Inquilinos foram obtidos de seis morfotipos de galhas, estando representados por Cecidomyiidae and Muscomorpha. Nove species galhadoras são registradas pela primeira vez no Estado do Espírito Santo, e Cordiamyia globosa Maia, 1996 é assinalada pela primeira vez para o município de Santa Teresa. O presente estudo indica Santa Teresa (ES como a área de Mata Atlântica com maior riqueza de galhas de insetos.

  3. The petrographic district of Santa Teresa 1st. communication

    International Nuclear Information System (INIS)

    Giglio, M.; Oyhantcabal, P.

    1984-01-01

    Abstract.it was possible to found the existence of a potas sic rocks petrographic province as a first stage of the geological, petrographic and geochemical study of the Sta. Teresa granitic complex of cambric age.The Or/Ab/An ratio of most of this rocks lies on the orthoclase field of the 'Diagram of Higazy', while the K2/Na20tCaO ratio is bigger than 1 .This da tta are preliminary and the investigation needs to be continued.This inform is about the geological conditions study carried out in Paso Severino zone of the Santa Lucia small river to make a dam to provide water to Montevideo. The techniques used were photo interpretation and general geological studies.

  4. Santa Teresa of Jesus as Example for the Novo Hispanic Mystics. The Work of Alonso Ramos about Catarina de San Juan

    Directory of Open Access Journals (Sweden)

    Gisela von Wobeser

    2016-11-01

    Full Text Available The life and work of Santa Teresa of Jesus had a great influence on the New Spain spiritual atmosphere by enabling a more intimate and direct relationship of women with God and contribute to the proliferation of nuns and beatified. In the Wonders of the Omnipotence and Miracles of the Grace in the life of the Venerable Servant of God Catharina of San Joan, Alonso Ramos writes the biography of Catarina of San Juan, a free slave considered saint, to whom in many passages compares with Santa Teresa. The purpose of Ramos was to create a female life model based on Teresian spirituality and values.

  5. 77 FR 14058 - Santa Teresa Southern Railroad, LLC-Operation Exemption-Rail Line of Verde Logistics Railroad...

    Science.gov (United States)

    2012-03-08

    ... Southern Railroad, LLC--Operation Exemption--Rail Line of Verde Logistics Railroad, LLC at Santa Teresa... notice of exemption under 49 CFR 1150.31 to operate approximately 12,000 feet of rail line owned by Verde Logistics Railroad, LLC (Verde). The rail line extends between a point of connection with Union Pacific...

  6. La restauración del convento de Santa Teresa en Avila, España

    Directory of Open Access Journals (Sweden)

    de la Quintana Gordon, José Luis

    1989-10-01

    Full Text Available The Convent of Santa Teresa, Avila's third National Monument, has been in restoration since 1982. Its previous state was not good due to the unfavourable physical conditions of the site, to some un fortunate interventions suffered by its structure and to prolonged lack of use of many of its rooms. This paper describes the works of restoration of the building, which have been made applying contemporary intervention concepts but bearing in mind the modesty and firmness of style of Barefoot Carmelitans construction

    A partir de 1982, se desarrolló la restauración del Convento de Santa Teresa, tercer Monumento Nacional de la ciudad de Avila, en muy mal estado de conservación a causa de las desfavorables condiciones físicas de su emplazamiento, de algunas obras desafortunadas sufridas por sus estructuras y a la prolongada falta de uso de muchas de sus dependencias. Las páginas siguientes repasan los recientes trabajos de rehabilitación del edificio, en los cuales se aceptó el reto de aplicar criterios contemporáneos de intervención, sin alejarse del espíritu severo, sencillo y sólido propios de los edificios de la Regla Reformada

  7. Put in value of the Santa Teresa Park as a cultural landscape. Project and Ordinance of the Landscape in the General Guidelines of its Master Plan

    Directory of Open Access Journals (Sweden)

    Nair Rosana Sommaruga Montiel

    2018-03-01

    Full Text Available The paper is a summary of the landscape studies developed in the framework of 'Lineamientos generales para el Plan Director del Parque Santa Teresa' (General guidelines for Santa Teresa Park Master Plan, agreement made between the Ministry of Tourism, and the Faculty of Architecture, Design And Urbanism of the University of the Republic between August 2015 and July 2016. The purpose of the Convention is to position the Santa Teresa Park as a "model park" for Uruguay, putting in value its patrimonial, landscape and Environmental characteristics, thus contributing to its tourism and sociocultural promotion. The entire project includes and combines different disciplinary studies as well as external contributions. The Research program “Landscape and Public Space” from the Institute of Design in collaboration with VIDIALAB develops the Characterization and Landscape Assessment of the Park, through studies and proposals on its landscape structures, sociocultural perceptions and the qualification of the visual landscape.

  8. Between the Ecstasy and the Writing – Santa Teresa de los Andes’s Intimate Diary

    Directory of Open Access Journals (Sweden)

    Leandro Garcia Rodrigues

    2015-04-01

    Full Text Available Lives, trajectories, frustrations, discoveries and verifications.  These are some of the several sensations perceived when we research the daily writing.  These narratives cannot been read as truth because we can feel the fictional intention in some of the autobiographical writings.  Some of them were written during times of suffering, that’s why these reading bring to light some unspoken ghosts and pains, spread into the paper through a desperate writing.  This situation tends to get worse when God himself participates in this dialogue, as we can read in the mystical diaries of some saints.  In this paper, we want to deal with these questions looking inside Santa Teresa de los Andes Intimate Diary, a Chilean carmelite nun, canonized by Pope John Paul II in 1993.  Teresa left an interesting personal archive compound of letters, notes and the most important – her Spiritual Diary.  Published in Brazil only in 2000, we are going to use this publication in order to do our study theoretic conclusions. 

  9. Estudo preliminar do uso de plantas medicinais por benzedores e outros informantes de Santa Teresa, Espírito Santo, Brasil

    Directory of Open Access Journals (Sweden)

    M.F.T Medeiros

    Full Text Available O presente trabalho foi realizado na área urbana e rural da cidade de Santa Teresa, localizada no município de Santa Teresa, Estado do Espírito Santo, Brasil, com o objetivo de identificar as espécies vegetais medicinais utilizadas por benzedores e outros informantes. Um levantamento qualitativo, por meio de conversas informais e do método de observação participante foi desenvolvido junto à 14 moradores locais, escolhidos de forma aleatória ou pelo método "bola de neve". Considerou-se cinco destes moradores como colaboradores-chave por serem usuários de plantas medicinais, aos quais foram conduzidas entrevistas estruturadas e semi-estruturadas. O material botânico coletado foi depositado no Herbário do Departamento de Botânica do Museu Nacional (R. Registrou-se o uso de 62 etnoespécies, sendo todas Angiospermas e, em sua maioria, de porte herbáceo. Para a cura de enfermidades os benzedores fazem orações e indicam espécies vegetais, cuja forma de preparo mais comum foi a decocção e a parte da planta mais utilizada foram as folhas.

  10. El tiempo y los tiempos en la obra de Santa Teresa de Jesús: un acercamiento narratológico

    Directory of Open Access Journals (Sweden)

    Tomaž Šmid

    2012-12-01

    Full Text Available Aunque el estilo de los textos teresianos está marcado por el tono de la conversación oral esto no excluye su preocupación por la forma. El lenguaje se orienta en la narración hacia procesos que tienen su fundamento en la temporalidad. El tiempo se convierte así en una de las dimensiones fundamentales de cualquier narración. En el artículo nos interesa el tiempo en su doble dimensión: como componente de la historia y su manifestación al nivel del discurso. Analizamos primero lo que atañe al acto de narrar la historia en la obra de Santa Teresa (si en su mayoría es ulterior, anterior, simultáneo o intercalado y después las relaciones y las discordancias que se producen en su obra entre el tiempo del relato y el tiempo de la historia, utilizando para ello tres parámetros: el orden, la duración y la frecuencia (Genette, 1972. Contrastando el tiempo de la historia y el tiempo del discurso en la obra de Santa Teresa constatamos la agilidad de su estilo literario y su capacidad para organizar una sintaxis narrativa.

  11. Santa Teresa en los conventos de monjas de Nueva España

    Directory of Open Access Journals (Sweden)

    Lavrin, Asuncion

    2015-12-01

    Full Text Available The transfer of the spiritual message of Saint Teresa to the viceregal court of New Spain tested the ability of Teresa’s teachings to adapt to new societies within the Spanish empire. Although the Carmelites founded only seven convents in Mexico, the Order succeeded in following the key precepts of the Teresian charisma, although nuanced by a baroque style of observance that insisted on spiritual and corporal mortification, complete humility and obedience, visionary experiences, and the imitation of Christ to achieve God’s love. Despite their small numbers, Carmelite nuns earned the respect of colonial society for their dedication to an ascetic way of life, personal poverty and the centrality of prayer.El trasplante de la espiritualidad teresiana a Nueva España fue una experiencia que puso a prueba la capacidad de adaptar su mensaje reformista a las circunstancias de nuevas sociedades en formación en el imperio español. Con sólo siete conventos femeninos en el nuevo virreinato, la Orden logró seguir los preceptos esenciales de Santa Teresa aunque matizados por una religiosidad barroca que insistía en mortificaciones espirituales y corporales, completa humildad y obediencia, experiencias visionarias, e imitatio Christi para acceder al amor de Dios. A pesar de su corto número las Carmelitas ganaron el respeto de la sociedad colonial por su dedicación a la vida ascética, la pobreza personal y la centralidad de la práctica de la oración.

  12. La racionalidad apasionada. Acercamiento a la relación razón y amor en la obra "Camino de Perfección" de Santa Teresa de ávila (1515-1582

    Directory of Open Access Journals (Sweden)

    Agustina Serrano P.

    2005-01-01

    Full Text Available Santa Teresa de ávila es una de las grandes figuras de la mística del Siglo de Oro Español. Pablo VI la declara Doctora de la Iglesia el 27 de septiembre de 1970. Este hecho supone que el puesto y la función de la mujer en la Iglesia quedaron afectados cuando se declaró a Santa Teresa Doctora de la Iglesia. Camino de Perfección es la primera obra impresa de Santa Teresa, en el año 1583 quiere ser un libro guía para las comunidades. Es un itinerario de conversión recorrido con una determinada "racionalidad apasionada" que desenmascara todo lo que no está al servicio del Reino. El presente estudio pretende ayudar a detectar la racionalidad teológica de Teresa desde la relación razón y amor en su obra Camino de perfección. En él se comienza a descubrir la propia sistematicidad del pensar de esta autora. Teresa ha ido vertiendo sus ideas respecto a la realidad de todo lo humano. Lo hace de un modo experiencial y sin atenerse, demasiado, a las normas de uso de los grandes conceptos en su épocaSt. Theresa of Avila is one of the great figures of the mysticism of the Spanish "Golden Age". Paul VI declared her a Doctor of the Church on September 27th, 1970. This fact presupposes that the place and function of women in the Church were influenced when St. Theresa was declared Doctor of the Church. Road of Perfection is the first printed work of St. Theresa's, in the year 1583, and was intended to be a guide for communities. It is an itinerary of conversion traveled through with a determined "passionate rationality" that unmasks everything not at the service of the Kingdom. The present study intends to help detect the theological rationality of Theresa from the reason-love relationship in her work Road of Perfection. In it the author's own systematic thought begins to be discovered, depositing her ideas in relation to the reality of all that is human. She does this in an experiential way and without overly depending upon the norms of the

  13. En permanente construcción. La recreación de la figura de santa Teresa en las semblanzas biográficas de sus hijas

    Directory of Open Access Journals (Sweden)

    Atienza López, Ángela

    2015-12-01

    conventos y a sus proyectos reformistas, la mujer que se relacionaba con el resto del mundo social, que lidiaba con los poderes eclesiásticos y seculares… En definitiva, una Teresa alejada de las concepciones establecidas sobre las mujeres en aquella época y de los papeles que se les asignaban también se cuela en las páginas de los cronistas, aunque muchos de los teresianistas lo han ignorado a lo largo del tiempo en beneficio de una imagen de santa Teresa adaptada a la hagiografía.

  14. Del Adaja al Almendares. Santa Teresa de Jesús y Dulce María Loynaz: versos compartidos. Del misticismo renacentista al pietismo barroco y al panteísmo tropical

    Directory of Open Access Journals (Sweden)

    Alejandro González Acosta

    2018-06-01

    Full Text Available Este estudio intenta una comparación entre dos autoras geográfica y cronológicamente distantes, como la española Santa Teresa de Jesús (siglo XVI y la cubana Dulce María Loynaz (siglo XX en cuanto a un motivo poético dentro de una antigua tradición, en dos variantes, la divina y la profana: «la muerte es vida».

  15. Inventory and valuation of flora used by the village Santa Teresa, Palmira (Valle del Cauca

    Directory of Open Access Journals (Sweden)

    Miguel Macgayver Bonilla Morales

    2013-05-01

    Full Text Available The diversity of plants cultivated is associated with food security as well as special benefits for different human communities around the world. The objective of this paper was to determine the plant species used by a rural community formed five years ago, hence values categories were established to learn more about the use value, the number of species per family, the part used and the distribution of species among farms. Among the results obtained, 113 species grouped into 52 families were reported, of which the most representative were Asteraceae and Lamiaceae and Apiaceae with 8 and 7 respectively, all of them associated with medicinal plants. Meanwhile corn corn and bananas have the highest use values (6, corresponding to 28% of the species of food grade. With the fruit (28% and the leaf (26% being the parts most often utilized. The farms of Limonar and Encanto, colectively, contain 47% of species of the studied area. The study permits the establishment of the interfamily and interspecific richness and the the use value of the diversity of plants cultivated by the inhabitants of the village of Santa Teresa, Palmira, Valle del Cauca, Colombia.

  16. Una propuesta de antropología teológica en castillo interior de Santa Teresa de Ávila

    Directory of Open Access Journals (Sweden)

    Agustina Serrano Pérez

    2011-01-01

    Full Text Available El artículo presenta a Santa Teresa de Ávila (1515-1582 en un contexto histórico marcado por la apertura y el resurgimiento teológico, junto con un giro a posturas rígidas. En ese tiempo ella funda 17 conventos y escribe todas sus obras. Castillo Interior es el último eslabón de su proceso de autocomunicación, en que codifica su pensamiento teológico, estructurado en siete moradas que dan cuenta de la relación entre Dios y la respuesta humana. Este trabajo muestra la antropología de una Teología mística, como la autora deine su obra Castillo Interior, y trata de sintetizar la antropología teológica teresiana como un proceso salvíico desde el origen hasta la consumación. Finalmente se ofrecen unos rasgos característicos de la antropología teresiana en la que el misterio del ser humano se esclarece en Dios trinitario, es decir en la sabiduría amorosa del Espíritu.The a presents Saint Teresa of Ávila (1515-1582 in an historical context marked by theological resurgence and opening, together with a shift to rigid positions. In this period, she founds 17 convents and writes all her work. Interior Castle is the last link in her process of self-communication, and in which she encodes her theological thinking, structured in seven mansions that account for the relationship between God and the human response. This work shows the anthropology of a Mystical theology, as the author deines her work Interior Castle, and tries to synthesize Teresian theological anthropology as a salvific process from origin to consummation. Finally, the articles gives some characteristic features of Teresian anthropology, in which the mystery of human beings is illuminated in the Trinitarian God, i.e., in the loving wisdom of the Spirit.

  17. Teresa y Luis, Luis y Teresa. Dos santos en tiempos recios

    Directory of Open Access Journals (Sweden)

    Emilio Callado Estela

    2016-06-01

    Full Text Available El presente artículo analiza la relación entre dos grandes santos españoles de la Contrarreforma Católica, Teresa de Jesús y el dominico fray Luis Bertrán. The present article analyses the relation between two big Spanish saints of the Catholic Counterreformation, Teresa de Jesus and the Dominican monk Luis Bertrán.

  18. Assessment and management of debris-flow risk in a tropical high-mountain catchment in Santa Teresa, Peru

    Science.gov (United States)

    Frey, Holger; Buis, Daniel; Huggel, Christian; Bühler, Yves; Choquevilca, Walter; Fernandez, Felipe; García, Javier; Giráldez, Claudia; Loarte, Edwin; Masias, Paul; Portocarreo, César; Price, Karen; Walser, Marco

    2015-04-01

    The local center of Santa Teresa (Cusco Region, Peru, 7 km northwest of the ruins of Machu Picchu) has been affected by several large debris-flow events in the recent past. In January and February 1998, three events of extreme magnitudes with estimated total volumes of several tens of millions cubic meters each, caused the destruction of most parts of the municipality and resulted in a resettlement of the town on higher grounds. Additionally, several settlements further upstream, as well valuable infrastructure such as bridges, a railway, and a hydropower plant, were destroyed. Some events were related to large-scale slope instabilities and landslide processes in glacial sediments that transformed into highly mobile debris flows. However, the exact trigger mechanisms are still not entirely clear, and the potential role of glacial lakes for past and future mass flows remains to be analyzed. Here we applied RAMMS (RApid Mass Movement System), a physically based dynamic model, to reconstruct one of the 1998 events in the Sacsara catchment using the ASTER Global Digital Elevation Model (ASTER GDEM) with 30 m spatial resolution and a photogrammetric DEM compiled from ALOS PRISM data with 6 m spatial resolution. A sensitivity analysis for various model parameters such as friction and starting conditions was performed, along with an assessment of potential trigger factors. Based on these results, further potential debris-flows for this catchment were modeled, including outburst scenarios of several glacial lakes. In combination with a vulnerability analysis, these hazard scenarios were then incorporated in a qualitative risk analysis. To further reduce the risk for the local communities, technical risk sheets were elaborated for each of the 17 local settlements in the catchment. Furthermore an Early Warning System (EWS) has been designed. The modular structure of the EWS aims at a first step to install an inexpensive but efficient system to detect debris-flow type mass

  19. Teresa Urrea: ¿Una Prechicana? Retos de memoria social,historia, nacionalismo de los chicanos de los Estados Unidos

    Directory of Open Access Journals (Sweden)

    Gillian Newell

    2002-01-01

    Full Text Available Las comunidades usan su pasado para construir su presente y futuro. Al mismo tiempo, el presente y el futuro de la gente constituyen su pasado. Esta investigación examina qué papel simbólico jugó la curandera y santa popular mexicana de finales del siglo XIX, Teresa Urrea, en el movimiento chicano de los años sesenta y setenta. Mediante un análisis de la política de formación de la identidad colectiva se comprende la construcción de una memoria social determinada y el uso del pasado en el presente. Examinando la historia del movimiento chicano y los trabajos relacionados, he investigado las maneras en las que se ha representado a Teresa, qué símbolos ha atribuido el chicanismo a su persona y el papel que ella jugó y continúa representando en la memoria social. Descubrí que la memoria de Teresa es de origen académico y que los chicanos intelectuales nunca lograron vincular esta construcción con la memoria popular.

  20. Teresa of Avila Data Repository

    DEFF Research Database (Denmark)

    Geertz, Armin W.; Nielbo, Kristoffer Laigaard

    2018-01-01

    En database som på sigt bliver offentliggjort som open source. Der er tale om en digitalisering af Teresa af Avilas værker i kritisk udgave: Collected Works of St. Teresa of Avila (translations by Kieran Kavanaugh, OCD and Otilio Rodriquez, OCD) 1987-2001, copyright ICS Publications, Washington, ...

  1. Teresa of Avila Data Repository

    DEFF Research Database (Denmark)

    Geertz, Armin W.; Nielbo, Kristoffer Laigaard

    2018-01-01

    En database som på sigt bliver offentliggjort som open source. Der er tale om en digitalisering af Teresa af Avilas værker i kritisk udgave: Collected Works of St. Teresa of Avila (translations by Kieran Kavanaugh, OCD and Otilio Rodriquez, OCD) 1987-2001, copyright ICS Publications, Washington, D...

  2. Espécies de cigarrinhas em cultivo de café no Município de Santa Teresa, Espírito Santo, Brasil (Hemiptera, Cicadellidae, Cicadellinae

    Directory of Open Access Journals (Sweden)

    Rachel A. Carvalho

    2015-01-01

    Full Text Available As cigarrinhas da subfamília Cicadellinae são importantes vetores de patógenos de plantas cultivadas, dentre eles, a bactéria Xylella fastidiosa, que, no Brasil, ataca cultivos de citros, café e também de ameixa. Pouca informação é conhecida sobre a ocorrência, distribuição e biologia de cicadelíneos em plantações de café. Este trabalho apresenta uma lista de 141 espécimes, coletados em meses alternados, no período entre junho de 2009 e abril de 2010, em plantação de café no Município de Santa Teresa no Estado do Espírito Santo, Brasil. Esses espécimes estão distribuídos em 16 gêneros e 21 espécies pertencentes às duas tribos de Cicadellinae: Cicadellini e Proconiini. Dentre os Cicadellini listados, o gênero Graphocephala é, pela primeira vez, registrado para o Brasil.

  3. Technologie RFID

    OpenAIRE

    Černý, Tomáš

    2007-01-01

    Práce poskytuje přehled o problematice RFID technologií. Analyzuje historický vývoj RFID technologií, popisuje základní komponenty RFID systémů, normy spojené s RFID, bezpečnost RFID a trh RFID technologií. Dále se práce věnuje možnostem využití RFID technologií v různých oborech, zařazení RFID systémů do rámce podnikové informatiky a hodnotí efekty, které RFID technologie přináší. Práce také definuje doporučený postup pro zavádění RFID technologií do firmy....

  4. Need samad maastikud / Teresa Gali-Izard

    Index Scriptorium Estoniae

    Gali-Izard, Teresa

    2006-01-01

    Hispaania maastikuarhitekti ja põllumajandusinseneri Teresa Gali-Izardi (sünd. 1968) tekst tema 2005. a. Barcelonas Land & Scape'i seerias ilmunud raamatu "The Same Landscapes. Ideas and Interpretations" (Editorial Gustavo Gili) sissejuhatusest

  5. Pietro Filippo Bernini, son of Gianlorenzo, and the mediation of the courts of Madrid and Paris for the concession of his prebend in Santa Maria Maggiore of Rome

    Directory of Open Access Journals (Sweden)

    Margarita de Alfonso Caffarena

    2017-06-01

    Full Text Available The intervention of queen Maria Teresa of Austria at the court of Madrid resulted in the concession of a prebend to Pietro Filippo Bernini, the eldest son of Gianlorenzo and canon of Santa Maria Maggiore in Rome.

  6. Olhando Teresa e pensando parâmetrosp.51-67

    OpenAIRE

    Sztajn, Paola

    2009-01-01

    O presente trabalho pretende enriquecer a discussão sobre Parâmetros Curriculares Nacionais através do estudo de caso de uma professora que se depara com um documento curricular e tenta implementá-lo em sua sala de aula. O documento em questão é o Curriculum and Evaluation Standards for School Mathematics (NCTM, 1989) e Teresa, a professora, leciona na terceira série primária. Apesar das diferenças entre o caso americano e a realidade brasileira, olhando as dificuldade enfrentadas por Teresa,...

  7. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  8. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  9. St. Teresa van Avila: sentrale figuur in die werk van Cussons en Van Wyk Louw

    Directory of Open Access Journals (Sweden)

    H. van Vuuren

    1989-05-01

    Full Text Available A central poem in Van Wyk Louw’s Tristia (1962, is “H. Teresa van Avila flap uit” (literally translated: “Saint Teresa of Avila talks too much/babbles uncontrollably”. This article illustrates how intertextual reading helped to clarify the poem. Teresa of Avila’s The way of perfection (a translation of the Spanish work El Camino de la Perfección, 1573 is the intertext of the Van Wyk Louw poem. In the last section of the article it is shown how the figure of St. Teresa of Avila is central not only to Van Wyk Louw’s Tristia (1962, but also to the oeuvre of Sheila Cussons, which underlines a strong intertextuality between these two Afrikaans oeuvres.

  10. RFID Location Algorithm

    Directory of Open Access Journals (Sweden)

    Wang Zi Min

    2016-01-01

    Full Text Available With the development of social services, people’s living standards improve further requirements, there is an urgent need for a way to adapt to the complex situation of the new positioning technology. In recent years, RFID technology have a wide range of applications in all aspects of life and production, such as logistics tracking, car alarm, security and other items. The use of RFID technology to locate, it is a new direction in the eyes of the various research institutions and scholars. RFID positioning technology system stability, the error is small and low-cost advantages of its location algorithm is the focus of this study.This article analyzes the layers of RFID technology targeting methods and algorithms. First, RFID common several basic methods are introduced; Secondly, higher accuracy to political network location method; Finally, LANDMARC algorithm will be described. Through this it can be seen that advanced and efficient algorithms play an important role in increasing RFID positioning accuracy aspects.Finally, the algorithm of RFID location technology are summarized, pointing out the deficiencies in the algorithm, and put forward a follow-up study of the requirements, the vision of a better future RFID positioning technology.

  11. Radio frequency identification and sensors from rfid to chipless RFID

    CERN Document Server

    Perret, Etienne

    2014-01-01

    This book deals with the field of identification and sensors, more precisely the possibility of collecting information remotely with RF waves (RFID). The book introduces the technology of chipless RFID starting from classical RFID and barcode, and explores the field of identification and sensors without wire, without batteries, without chip, and with tags that can even be printed on paper. A technique for automatic design of UHF RFID tags is presented , aiming at making the tags as insensitive as possible to the environment (with the ability to increase the reading range reliability), or, co

  12. Chipless RFID reader architecture

    CERN Document Server

    Karmakar, Nemai Chandra; Kalansuriya, Prasanna

    2013-01-01

    In the era of information communication technology (ICT), radio frequency identification (RFID) has been going through tremendous development. RFID technology has the potential of replacing barcodes due to its large information carrying capacity, flexibility in operations, and applications. The deployment of RFID has been hindered by its cost. However, with the advent of low powered ICs, energy scavenging techniques, and low-cost chipless tags, RFID technology has achieved significant development. This book addresses the new reader architecture, presents fundamentals of chipless RFID systems,

  13. RFID design principles

    CERN Document Server

    Lehpamer, Harvey

    2012-01-01

    This revised edition of the Artech House bestseller, RFID Design Principles, serves as an up-to-date and comprehensive introduction to the subject. The second edition features numerous updates and brand new and expanded material on emerging topics such as the medical applications of RFID and new ethical challenges in the field. This practical book offers you a detailed understanding of RFID design essentials, key applications, and important management issues. The book explores the role of RFID technology in supply chain management, intelligent building design, transportation systems, military

  14. Visual RFID solution optimizes maintenance process; Visuelle RFID-Label. Optimierung des Instandhaltungsprozesses

    Energy Technology Data Exchange (ETDEWEB)

    Stephan, Martin [Evonik Energy Services GmbH, Essen (Germany)

    2010-09-06

    Evonik Energy Services GmbH has combined the established technology of RFID labels without battery (passive transponders) with bistable displays (based on e-paper technology), to a passive V-RFID label (visual RFID). Thus, the information which is stored invisible on conventional RFID tags will become readable for everybody. Both, the advantages as well as the chances of this innovative technology for prospective applications become obvious in an example application. (orig.)

  15. RFID Malware: Design Principles and Examples

    NARCIS (Netherlands)

    Rieback, M.R.; Simpson, P.N.D.; Crispo, B.; Tanenbaum, A.S.

    2006-01-01

    This paper explores the concept of malware for Radio Frequency Identification (RFID) systems - including RFID exploits, RFID worms, and RFID viruses. We present RFID malware design principles together with concrete examples; the highlight is a fully illustrated example of a self-replicating RFID

  16. RFID Malware: Truth vs. Myth

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The issues related to RFID malware along with proof-of-concept RFID virus are discussed. RFID exploits are traditionally hacking attacks that are identical to those found on Internet, such as buffer overflow, code insertion, and SQL injection attack. RFID warms copy the original exploit code to

  17. Reverse engineering of RFID devices

    NARCIS (Netherlands)

    Bokslag, W.

    2015-01-01

    This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID

  18. A METRÓPOLE E A PATRIMONIALIZAÇÃO DO TERRITÓRIO: A ANÁLISE DOS BAIRROS DE SANTA TERESA (RIO DE JANEIRO E ALFAMA(LISBOA

    Directory of Open Access Journals (Sweden)

    Fabio Costa Peixoto

    2010-07-01

    Full Text Available Normal 0 21 MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabela normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman";} A representação do passado das cidades, percebida na prática discursiva dos agentes sociais promotores e gestores do patrimônio histórico, tem sido construída em meio às disputas pelo sentido da história. O principal resultado desta associação permite constatar que a identidade local funciona como um elemento aglutinador na estruturação dos elos que criam um sentimento coletivo de pertencimento a uma comunidade frente aos processos desestabilizadores da globalização da sociedade contemporânea. Selecionamos o bairro de Santa Teresa na cidade do Rio de Janeiro e o bairro de Alfama, na cidade de Lisboa para tratar das questões atuais referentes à preservação do patrimônio urbano no que diz respeito às invenções das tradições, a criação de símbolos e às transformações identitárias, ou seja, na sua função de estratégia representacional. O imaginário instituinte que identifica o bairro com um nome, uma comunidade e quase um monumento histórico, é tensionado pela emergência de novas territorialidades e sociabilidades decorrentes de projetos de modernização das cidades. Palavras-chave: memória, patrimônio, Lisboa e Rio de Janeiro

  19. RFID added value sensing capabilities

    DEFF Research Database (Denmark)

    Anggorjati, B.; Çetin, K.; Mihovska, A.

    2010-01-01

    Radio frequency identification (RFID) is a key technology for Europe. Since the initial emergence of the technology, there has been a noticeable shift away from RFID pilot projects of the early days, towards a broad deployment of RFID in order to increase the efficiency and innovation of processes....... Even though Europe is a leading player in the world of RFID technology, several challenges need to be addressed in order for RFID to reach its full potential. The funded under FP7 ICT project ASPIRE is one of the coordinated European efforts to further the advancement of this technology, in the areas...... of enabling technology development for RFID. In particular, the focus of ASPIRE is on design, development and adoption of an innovative, programmable, royalty-free, lightweight and privacy friendly RFID middleware....

  20. Teaching RFID Information Systems Security

    Science.gov (United States)

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  1. TERESA: a socially intelligent semi-autonomous telepresence system

    NARCIS (Netherlands)

    Shiarlis, Kyriacos; Messias, Joao; van Someren, Maarten; Whiteson, Shimon; Kim, Jaebok; Vroon, Jered Hendrik; Englebienne, Gwenn; Truong, Khiet Phuong; Pérez-Higueras, Noé; Pérez-Hurtado, Ignacio; Ramon-Vigo, Rafael; Caballero, Fernando; Merino, Luis; Shen, Jie; Petridis, Stavros; Pantic, Maja; Hedman, Lasse; Scherlund, Marten; Koster, Raphaël; Michel, Hervé

    2015-01-01

    TERESA is a socially intelligent semi-autonomous telepresence system that is currently being developed as part of an FP7-STREP project funded by the European Union. The ultimate goal of the project is to deploy this system in an elderly day centre to allow elderly people to participate in social

  2. Amor meus, Cruxifixus est! / Teresa Perciaccante ; tõlk. Anne Kalling

    Index Scriptorium Estoniae

    Perciaccante, Teresa

    2002-01-01

    Kevadisest kriisist Petlemmas, mil Iisraeli armee piiras Jeesus Kristuse sünnikirikut. Ema Teresa Perciaccante kiri Pühima Päästja Püha Birgitta ordu ülemaabtissile Ema Tekla Famigliettile Rooma

  3. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  4. RFID design fundamentals and applications

    CERN Document Server

    Lozano-Nieto, Albert

    2010-01-01

    RFID is an increasingly pervasive tool that is now used in a wide range of fields. It is employed to substantiate adherence to food preservation and safety standards, combat the circulation of counterfeit pharmaceuticals, and verify authenticity and history of critical parts used in aircraft and other machinery-and these are just a few of its uses. Goes beyond deployment, focusing on exactly how RFID actually worksRFID Design Fundamentals and Applications systematically explores the fundamental principles involved in the design and characterization of RFID technologies. The RFID market is expl

  5. Security in RFID and sensor networks

    CERN Document Server

    Kitsos, Paris

    2009-01-01

    Security in RFIDMulti-Tag RFID Systems, L. Bolotnyy and G. RobinsAttacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. RibagordaRFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. NevinsPhysical Privacy and Security in RFID Systems, L. Bolotnyy and G. RobinsAuthentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. TomaševicLightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C.

  6. Potentials of RFID Application in Retailing

    DEFF Research Database (Denmark)

    Foscht, Thomas; Kotzab, Herbert; Maloles III, Cesar

    2008-01-01

    The willingness of retailers to adopt RFID systems, as well as finding optimal RFID applications has yet not been investigated. This paper examines the issues associated with the RFID adoption based on the results of a conjoint analysis. The conjoint measurement looked at the trade-off decisions...... among different possible set-ups of RFID applications in retailing companies. Considerable willingness to adopt, but low diffusion and a structure of preferences with respect to RFID features was shown throughout the examined retailing companies. Furthermore, differences were shown among different types...... of retailers in their preferences for RFID system features and clusters were implied....

  7. RFID vs.Wi-Fi ID

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Wireless networks and Radio Frequency Identification(RFID) have always been closely linked.One of Wi-Fi’s first applications was transferring data from portable RFID readers.But the popularity of RFID has led some to envision whole networks of readers embed- ded throughout a building’s infrastructure.Reva Systems had an- nounced what it calls a Tag Acquisition Network(TAN),an array of RFID readers that work with passive,batteryless tags.Meanwhile,

  8. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  9. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  10. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  11. Teresa Amabile L'influence de l'environnement social sur la créativité

    OpenAIRE

    SIMON , FANNY

    2016-01-01

    International audience; Les travaux de Teresa Amabile sont précurseurs, à la fois dans leurs approches méthodologiques et dans les thématiques abordées. Tout d'abord, Teresa Amabile s'est démarqué des approches traditionnelles qui s'intéressaient essentiellement aux traits de personnalité et profil des personnes créatives. Elle souhaite comprendre comment favoriser la créativité dans les organisations et identifier des facteurs qui la facilitent ou contraignent. Elle étudie ainsi des projets ...

  12. Introduction of circuit design on RFID system

    International Nuclear Information System (INIS)

    Pak, Sunho

    2007-06-01

    This is a case of research of Fujitsu company and design of basic circuit of electronic technique. It is composed of two parts. The first part deals with introduction of RFID system design, which lists basic knowledge of ubiquitous, glossary of high frequency, design of impedance matching circuit, RFID system, sorts and design of filter, modulator and a transmission and RFID system design. The second part deals with research and development of Fujitsu company, including RFID middle ware RFID CONNECT of Fujitsu, sensor network of Fujitsu and high handing technique of RFID system.

  13. Introduction of circuit design on RFID system

    Energy Technology Data Exchange (ETDEWEB)

    Pak, Sunho

    2007-06-15

    This is a case of research of Fujitsu company and design of basic circuit of electronic technique. It is composed of two parts. The first part deals with introduction of RFID system design, which lists basic knowledge of ubiquitous, glossary of high frequency, design of impedance matching circuit, RFID system, sorts and design of filter, modulator and a transmission and RFID system design. The second part deals with research and development of Fujitsu company, including RFID middle ware RFID CONNECT of Fujitsu, sensor network of Fujitsu and high handing technique of RFID system.

  14. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  15. An Assessment of RFID Applications in Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Gładysz Bartłomiej

    2015-12-01

    Full Text Available The meaning of Cyber Physical Systems and an Internet of Things with indication of RFID position in those concepts was outlined. Research program related to assessment of RFID technology was presented. Author deducted on problems related to RFID implementations and RFID essentially for logistics of manufacturing companies. Research goals and problems were formulated. Tools, techniques, models and methods that could be utilized were proposed and discussed. Research was focused on design of a new method to support early decision making phases for RFID application in logistics of manufacturing companies. Author stated that literature and practice lacks of complex method to answer if RFID is strategically important for the company, which processes should be RFID-supported, how RFID-supported processes should be designed and if RFID-support is rational. Framework for assessment of RFID technology with illustrative example was discussed.

  16. USE OF RFID AT LARGE-SCALE EVENTS

    Directory of Open Access Journals (Sweden)

    Yuusuke KAWAKITA

    2005-01-01

    Full Text Available Radio Frequency Identification (RFID devices and related technologies have received a great deal of attention for their ability to perform non-contact object identification. Systems incorporating RFID have been evaluated from a variety of perspectives. The authors constructed a networked RFID system to support event management at NetWorld+Interop 2004 Tokyo, an event that received 150,000 visitors. The system used multiple RFID readers installed at the venue and RFID tags carried by each visitor to provide a platform for running various management and visitor support applications. This paper presents the results of this field trial of RFID readability rates. It further addresses the applicability of RFID systems to visitor management, a problematic aspect of large-scale events.

  17. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M Paul

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear what sort of return on investment (ROI) it provides. While it is common for libraries to now have information technology expertise within their organizations, RFID may appear unfamiliar. RFID for Libraries: A practical guide examines what RFID technology is and how it works. The book reviews the development of computer technology and its effects on library operations over the last couple of decades. Further examination fe...

  18. RFID solution benefits Cambridge hospital.

    Science.gov (United States)

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals.

  19. Pemanfaatan Sistem RFID sebagai Pembatas Akses Ruangan

    Directory of Open Access Journals (Sweden)

    HENDI HANDIAN RACHMAT

    2016-02-01

    Full Text Available ABSTRAK Pada penelitian ini, sistem RFID (Radio Frequency Identification dimanfaatkan sebagai kartu identifikasi personal pada sistem akses ruangan. Keberadaan sistem ini ditujukan untuk menjaga keamanan dan privasi ruangan dari seseorang yang tidak memiliki otoritas untuk memasuki ruangan tersebut. Melalui perancangan dan implementasi sistem akses ruangan ini, dilakukan evaluasi sistem kerja kunci elektrik berbasis komponen solenoid serta jarak dan posisi optimal pembacaan RFID tag guna memberikan kenyamanan pada pengguna ketika mengakses ruangan. RFID tag yang dipergunakan dalam sistem ini berbentuk kartu tipe EM4001 dan menyimpan kode unik yang digunakan sebagai identifikasi personal. Kode ini dibaca oleh RFID reader tipe ID-12 dan divalidasi otoritasnya dengan mikrokontroler ATMega32 untuk mengatur sistem kerja kunci elektrik yang dirancang sendiri menggunakan solenoid. Sistem ini dilengkapi pula dengan sistem database untuk pencatatan pengguna yang mengakses ruangan. Dari hasil pengujian, seluruh (100% RFID tag dapat dikenali oleh RFID reader dalam tiga posisi berbeda dengan jarak optimal sejauh 5 cm (vertikal dan 2 cm (horisontal. Keseluruhan (100% aktifitas pengguna yang mengakses ruangan dapat tercatat dalam sistem database. Hasil penelitian ini dapat disimpulkan bahwa teknologi RFID dapat digunakan secara nyaman dan aman sebagai alternatif sistem identifikasi personal untuk sistem akses ruangan. Kata Kunci : kunci elektrik, RFID, sistem akses ruangan, sistem database, solenoid. ABSTRACT In this research, RFID system was utilized as a personal identification security card in access room system. This system was aimed to secure a room and to have privacy from unauthorized person to enter the room. By designing and implementing the system, a solenoid based electric key system as well as an optimal distance and position of RFID tag were evaluated to know the most convenience condition for all users during accessing the room. RFID tag used in

  20. The Application of RFID Technologies in Construction

    Institute of Scientific and Technical Information of China (English)

    LIAN Meng

    2009-01-01

    RFID technologies have advanced greatly and deployed successfully in many industry sectors in recent years. Construction industry could benefit from the applications of RFID technologies but as yet has not found sufficient application areas. This project gives a comprehensive awareness of the RFID technologies, which focus on the investigation on the UK construction industry. The current status of RFID in construction and its potentials are specified in the analysis of questionnaires and case studies. Finally, basing on the investigations, some further tasks in developing RFID technologies are carried, including some recommendations, for the construction industry.

  1. RTLS vs RFID partnership or competition?

    Directory of Open Access Journals (Sweden)

    2011-09-01

    Full Text Available The constant technological development entails increasing needs of a precise identification and location of objects. A natural and proved way of fulfilling identification needs is using Optical Character Recognition (OMR, mostly bar codes or Radio Frequency Identification (RFID. However, applying RFID to locate objects is a big challenge. In applications, which require both identification and location of objects, RTLS (Real-Time Location Systems can be very helpful. Apart from the identification, RTLS ensures also the real-time objects' location. A range of possible RTLS applications coincides with the ones of RFID. Does that mean that RTLS is a next stage of RFID development? In the following paper, the authors are pursuing to answer a question, if RTLS is complementary or competitive towards RFID?

  2. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  3. The Design of a Lightweight RFID Middleware

    Directory of Open Access Journals (Sweden)

    Fengqun Lin

    2009-10-01

    Full Text Available Radio Frequency Identification (RFID middleware is often regarded as the central nervous system of RFID systems. In this paper, a lightweight RFID middleware is designed and implemented without the need of an Application Level Events (ALE structure, and its implementation process is described using a typical commerical enterprise. A short review of the current RFID middleware research and development is also included. The characteristics of RFID middleware are presented with a two-centric framework. The senarios of RFID data integration based on the simplified structure are provided to illuminats the design and implementation of the lightweight middleware structure and its development process. The lightweight middleware is easy to maintain and extend because of the simplified and streamlined structure and the short development cycle.

  4. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  5. Miniaturizing RFID for magnamosis.

    Science.gov (United States)

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag.

  6. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  7. The RFID-Based Manufacturing and Inventory Revolution

    Institute of Scientific and Technical Information of China (English)

    HAMIDULLHKhanNiazi; SUNHou-fang; RIAZAhmed; SHAHIDIkramullahButt

    2005-01-01

    Radio frequency identification (RFID) is a contactless form of automatic identification and data capture (AIDC) technology. This paper explores the use of RFID in the new field of manufacturing automation and quality control. This paper consists of five parts. The first part gives a brief background and introduction of technology. The proposed use of RFID technology in the field of manufacturing automation and quality control is discussed in second part. The third part covers its use in the field of warehouse management system. Part four is a local review and analysis of RFID technology in manufacturing and warehousing which would support the potential use of this technology locally at China. The last part of paper gives concluding remarks about the RFID technology with recommendations of RFID use in these areas.

  8. Behavior-based cleaning for unreliable RFID data sets.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  9. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  10. Analisis Semiotika Terhadap Puisi Rabi’atul Adawiyah dan Kalimat Suci Mother Teresa

    Directory of Open Access Journals (Sweden)

    Betty Mauli Rosa Bustam

    2014-12-01

    Full Text Available AbstractLove of God is a doctrine that’s very popular either in Sufism or the Catholic Church. Women who believe in this doctrine tend to hand over all their life and their love to God, ignoring their worldly life along with the happiness. Love of God is the highest stage in the spiritual way of Sufism, and also of the Catholic’s. Love of God is a loyalty vow that could not be fulfilled except by some one who sincerely leaves his/her personal life in order to become the attendant of God.In the Sufism circle, Rabi’ah al-Adawiyah was the first woman who introduced this doctrine and Mother Teresa was one of the Catholic women who succeeded in her life showing the holy love to God. By using the theories of semiotic, this writing revealed the deep meanings of Adawiyah’s poetries and Teresa’s utterences which were impossible for them to be be understood normally. The interpretation could be carried out firstly by knowing the life of the two women throughlibrary research, and continued then by knowing the character both women. The results of this research reveals both women chose God as the only purpose of life, although they have differentimplementations. Rabi’ah expressed her love through her personal spirituality and otherwiseTeresa through social attitudes.Keywords: love of god, sufism, chatolic, semiotic AbstrakCinta terhadap Tuhan adalah sebuah doktrin yang sangat populer di kalangan kaum sufi dan gereja Katolik. Perempuan yang meyakini doktrin ini cenderung menyerahkan seluruh hidup dan cintanya pada Tuhan hingga mengabaikan kehidupan duniawi berikut kesenangan yang menyertainya. Cinta pada Tuhan adalah tingkatan tertinggi di dalam perjalanan spiritual seorang sufi, begitu pula pada penganut Katolik Cinta pada Tuhan adalah sebuah kaul kesetiaan yang tidak dapat dipenuhi kecuali oleh seseorang yang dengan ikhlas meninggalkan kehidupan pribadinya demi menjadi pelayan Tuhan. Di kalangan sufi, perempuan pertama

  11. RFID-BASED Prepaid Power Meter

    OpenAIRE

    Teymourzadeh, Rozita

    2013-01-01

    An Electric power meter is an important component in electric energy service. In the past, many consumers have complained about reading inaccurate of the electric meter. This research presents the development of an electrical power meter equipped with RFID reader. The RFID reader reads a valid RFID card and activates the power meter so that it can supply electricity. When the credit is about low or before the electricity is auto cut off, an SMS message will be sent to the user’s handphone to ...

  12. Teresa Andrés y la organización Cultura Popular: una propuesta de coordinación bibliotecaria (1936-1938

    Directory of Open Access Journals (Sweden)

    Seguí i Francés, Romà

    2011-12-01

    Full Text Available Teresa Andrés Zamora es conocida por su actividad al frente de la Sección de Bibliotecas de Cultura Popular. Este trabajo describe las relaciones que se establecieron entre Teresa Andrés y Cultura Popular, tras hacerse cargo de las responsabilidades del Ministerio de Instrucción Pública.

  13. Uniting Legislation with RFID Privacy-Enhancing Technologies

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID is a popular identification and automation technology with serious security and privacy threats. Legislation expounds upon the actual security and privacy needs of people in RFID-enabled environments, while technology helps to ensure legal compliance. This paper examines the main aims of RFID

  14. Review on security issues in RFID systems

    Directory of Open Access Journals (Sweden)

    Mohamed El Beqqal

    2017-12-01

    Full Text Available Radio frequency Identification (RFID is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology brings out many challenges and concerns still not being attracting more and more researchers especially the security and privacy issues. In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify for each work which part of the RFID system is being secured, the solutions and the techniques used besides the conformity to RFID standards. Finally, we present briefly a solution that consists of combining RFID with smartcard based biometric to enhance security especially in access control scenarios. Hence the result of our study aims to give a clear vision of available solutions and techniques used to prevent and secure the RFID system from specific threats and attacks.

  15. The Evolution of RFID Security

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    The advantages and drawbacks associated with the use of RFID technology, are discussed. The RFID functions as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, supporting automated checkout, developing smart home

  16. Reverse Logistics: RFID the key to optimality

    Directory of Open Access Journals (Sweden)

    Rezwan Asif

    2011-07-01

    Full Text Available Purpose: The purpose of this paper is to find ways to reduce uncertainties in Reverse logistic supply chain (RLSC through the use of Radio-frequency identification (RFID technology.Design/methodology/approach: This paper reviews literature and builds model to relate RFID with uncertainties in order to optimize Reverse Logistics. Findings: RFID is really efficient to determine and detect quantity, variety and cycle times of returns; however it's not as convenient to determine quality of the returns. The collected information from RFID can be used to standardize the RLSC.Research limitations: Though it’s several and unique advantages some limitations of RFID have been identified in quality and processing sequence, collecting points and different standards, and in global usage.Originality/value: Previous studies in the area of Reverse Logistics and RFID don’t cover all impacts of this technology on RLSC. This review paper has investigated these impacts and offers a model for optimizing the Reverse Logistics Supply Chain.

  17. The soundscape of the ceremonies held for the beatification of St Teresa of Ávila in the Crown of Aragon, 1614

    Directory of Open Access Journals (Sweden)

    Tess Knighton

    2015-12-01

    Full Text Available The beatification of Saint Teresa of Ávila in October 1614 gave rise to widespread celebrations in many of the cities and towns of the Iberian Peninsula. Printed relaciones describing these celebrations, despite their limitations —in terms of political agenda, propaganda, rivalry and literary style— can nevertheless provide information about musical experience and can help to recreate the ephemeral soundscapes of these events. This article will focus on the ceremonies held in the Crown of Aragon, especially Saragossa and Barcelona, taking into consideration the typology of different musics —heraldic, divine and festive— and factors such as the moment in time, function, dynamic, urban spaces and blurring of boundaries, public (listeners, musical resources and performance practice, repertories and genres, signifiers and associations for listeners, and impact. La beatificació de Santa Teresa d’Àvila a l’octubre de 1614 va donar lloc a celebracions generalitzades en moltes de les ciutats i pobles de la Península Ibèrica. Les relacions impreses que descriuen aquestes celebracions, malgrat les seues limitacions —en termes d’agenda política, propaganda, rivalitat i estil— literàries, poden, tanmateix, proporcionar informació sobre l’experiència musical i poden ajudar a recrear els paisatges sonors efímers d’aquests esdeveniments. Aquest article se centrarà en les cerimònies celebrades a la Corona d’Aragó, sobretot a Saragossa i a Barcelona, tenint en compte la tipologia de les diferents músiques -heràldiques, divines i festives- i factors com ara el moment en el temps, la funció, els espais dinàmics, urbans i difuminació de fronteres, el públic (els oients, recursos musicals i pràctica interpretativa, repertoris i gèneres, significants i associacions per als oients, i l’impacte.

  18. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  19. Temporal and Location Based RFID Event Data Management and Processing

    Science.gov (United States)

    Wang, Fusheng; Liu, Peiya

    Advance of sensor and RFID technology provides significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management. RFID data are temporal and history oriented, multi-dimensional, and carrying implicit semantics. Moreover, RFID applications are heterogeneous. RFID data management or data warehouse systems need to support generic and expressive data modeling for tracking and monitoring physical objects, and provide automated data interpretation and processing. We develop a powerful temporal and location oriented data model for modeling and queryingRFID data, and a declarative event and rule based framework for automated complex RFID event processing. The approach is general and can be easily adapted for different RFID-enabled applications, thus significantly reduces the cost of RFID data integration.

  20. Handbook of smart antennas for RFID systems

    CERN Document Server

    2010-01-01

    The Handbook of Smart Antennas for RFID Systems is a single comprehensive reference on the smart antenna technologies applied to RFID. This book will provide a timely reference book for researchers and students in the areas of both smart antennas and RFID technologies. It is the first book to combine two of the most important wireless technologies together in one book. The handbook will feature chapters by leading experts in both academia and industry offering an in-depth description of terminologies and concepts related to smart antennas in various RFID systems applications.

  1. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    Directory of Open Access Journals (Sweden)

    Iwan Vanany

    2009-01-01

    Full Text Available This paper explores the benefit and barriers of RFID (Radio Frequency Identification technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and technology aspects. The results of this study suggest that the benefits of RFID technology adoption are dominated of intangible benefit. Most of the respondents believed that the main barriers of RFID technology adoption are (1 the complexity of RFID technology (2 the lack of complete and valid information, and (3 there is no sufficient budget available. The detail of the outcomes and the implications of this reasarch are also discussed. Abstract in Bahasa Indonesia: Makalah ini berupaya mengeksplorasi manfaat dan hambatan dari pengadopsian teknologi RFID (Radio Frequency Identification dalam konteks rumah sakit di Indonesia. Metode investigasi dari penelitian ini menggunakan wawancara dan kuesioner semi-struktur untuk konsultan, peneliti teknologi RFID dan manajer rumah sakit berkatagori besar di Pulau Jawa. Manfaat-manfaat dan hambatan-hambatan dari pengadopsian teknologi RFID telah diidentifikasi dari studi literatur. Hambatan dari pengadopsian teknologi RFID dibagi menjadi dua (2 aspek yaitu hambatan dari aspek bisnis dan teknologi. Temuan dari studi ini meyakini bahwa manfaat dari pengadopsian teknologi RFID didominasi oleh manfaat yang bersifat intangible. Sebagian besar responden meyakini bahwa hambatan utama dari pengadopsian teknologi RFID adalah: (1 kompleksnya teknologi RFID, (2 ketiadaan informasi yang lengkap dan valid, (3 tidak tersedianya anggaran yang cukup. Detail dari hasil studi dan implikasinya akan didiskusikan selanjutnya. Kata kunci

  2. RFID-tekniikan hyödyntäminen hoivakodissa

    OpenAIRE

    Pesonen, Miia

    2008-01-01

    Tutkimuksen tavoitteena on selvittää RFID-tekniikan tarjoamat hyödyt ja haasteet Hoivakoti X:ssä. Lisäksi tavoitteena on selvittää, voitaisiinko hoivakodin toimintaa tehostaa ja asukastyytyväisyyttä lisätä, mikäli RFID-tunnisteet otettaisiin käyttöön. Tutkimuksen teoriaosuudessa käsitellään RFID-tekniikan historiaa ja kehittymistä. Lisäksi perehdytään yleisimpiin RFID-järjestelmiin, tunnisteisiin, standardointiin, taustajärjestelmiin ja lukijoihin. Työssä käsitellään RFID-tekniikan mahdol...

  3. Applications of RFID into Nuclear Power Plant Maintenance System

    International Nuclear Information System (INIS)

    Lee, Seung Min; Seong, Poong Hyun

    2008-01-01

    RFID (Radio Frequency Identification) system, one of the most anticipated ubiquitous technologies is an automatic identification method using devices called RFID tags. RFID antenna detects each approach of RFID tags and recognizes the tags' ID and transfer to reader to do information processing. Since first introduced in the logistics industry, production management and maintenance organization in various fields of domestic and foreign enterprises introduce the RFID. Nuclear power plants are also using RFID to manage materials lately. However, the current status on the use of RFID is just a little more advanced on the use of bar code. Therefore, it seems that the important characteristic of RFID is not enough actualized to keep seeing. In point of Maintenance Information Field based on ubiquitous technology, the most important concept is real-time information processing. And RFID is quite proper to develop this information field system because it satisfies for the matter of that concept. The leading content in ubiquitous maintenance system is that maintenance personnel can get information what he needs and he can also transfer information what he gets whenever and wherever he is. In this paper, some examples of applying RFID in development of ubiquitous maintenance system are suggested

  4. Delivering an Intelligent Foundation for RFID: Maximizing Network Efficiency with Cisco RFID Solutions

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Radio frequency identification (RFID) is one of today s most anticipated technologies for a broad range of enterprises. Based on the promise of lower operating costs combined with more accurate product and asset information, organizations .Rfrom manufacturers to government agencies, retailers to healthcare providers , Rare introducing RFID technologies in the supply chain, for asset tracking and management, and for security and regulatory purposes.

  5. RFID-Enabled Smart Government

    OpenAIRE

    Fatima Al Shamsi; Noura Al Shamsi; Al Anoud Al Kendi; Latifa Al Darmaki; Al Yazia Aldhaheri; Dr. Muhammad Khan

    2015-01-01

    Abstract Radio frequency identification is a technology that allows user to identify people. In this research work you will understand the concept of RFID and E-wallet. To know the advantages and disadvantage of Emirates ID connected with the E-wallet. In This Research we will identify the problems and risks of connecting RFID E-wallet with Emirates ID. Also recognize and recommend the possible solutions.

  6. Effects of RFID Technology on the Logistics Innovation

    OpenAIRE

    金, 双鴿; Shuangge, JIN

    2010-01-01

    An advanced automatic identification technology based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. RFID tag is a microchip combined with an antenna in a compact package and is called also IC tag. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies. This paper aims to analyse the effects of RFID technology on the logistics innovation.

  7. RFID Data Cleaning for Shop Floor Applications

    Science.gov (United States)

    Ziekow, Holger; Ivantysynova, Lenka; Günter, Oliver

    In several case studies we found that shop-floor applications in manufacturing pose special challenges to cleaning RFID data. The underlying problem in many scenarios is the uncertainty about the exact location of observed RFID tags. Simple filter s provided in common middleware solutions do not cope well with these challenges. Therefore we have developed an approach based on maximum-likelihood estimation to infer a tag's location within the reader range. This enables improved RFID data cleaning in a number of application scenarios. We stress the benefits of our approach along exemplary application scenarios that we found in manufacturing. In simulations and experiments with real world data we show that our approach outperforms existing solutions. Our approach can extend RFID middleware or reader firmware, to improve the use of RFID in a range of shop-floor applications.

  8. Study of Development for RFID System to Hospital Environment.

    Science.gov (United States)

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system.

  9. Teresa Andrés Zamora (1907-1946: el compromiso social y político como arma de cultura

    Directory of Open Access Journals (Sweden)

    Seguí i Francés, Romà

    2010-12-01

    Full Text Available La biografía de Teresa Andrés Zamora (Villalba de los Alcores, 1907- París, 1946 es un claro ejemplo de cómo el compromiso de una mujer republicana a través de la cultura se transformó en beligerancia política. Este artículo quiere mostrar una imagen de Teresa Andrés más profunda que la de una bibliotecaria que militó en el PCE, pretendiendo reconstruir su recorrido vital tanto en la faceta académica como profesional y política, con el objetivo de presentar una evolución que va desde su paso por la Residencia de Señoritas hasta su prematura muerte en París. Teresa Andrés Zamora representa una generación de mujeres republicanas que fue leal a la II República, trabajando incansablemente durante la Guerra Civil, y que padeció el exilio en una Francia ocupada.

  10. RFID-Enabled Smart Government

    Directory of Open Access Journals (Sweden)

    Fatima Al Shamsi

    2015-08-01

    Full Text Available Abstract Radio frequency identification is a technology that allows user to identify people. In this research work you will understand the concept of RFID and E-wallet. To know the advantages and disadvantage of Emirates ID connected with the E-wallet. In This Research we will identify the problems and risks of connecting RFID E-wallet with Emirates ID. Also recognize and recommend the possible solutions.

  11. RFID Application of Smart Grid for Asset Management

    Directory of Open Access Journals (Sweden)

    Xiwei Wang

    2013-01-01

    Full Text Available RFID technology research has resolved practical application issues of the power industry such as assets management, working environment control, and vehicle networking. Also it provides technical reserves for the convergence of ERP and CPS. With the development of RFID and location-based services technology, RFID is converging with a variety of sensing, communication, and information technologies. Indoor positioning applications are under rapid development. Micromanagement environment of the assets is a useful practice for the RFID and positioning. In this paper, the model for RFID applications has been analyzed in the microenvironment management of the data center and electric vehicle batteries, and the optimization scheme of enterprise asset management is also proposed.

  12. Systems and Methods for RFID-Enabled Dispenser

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  13. Antón Perulero: Un cuento inédito de María Teresa León

    Directory of Open Access Journals (Sweden)

    Marina Bedia, Marta

    2002-12-01

    Full Text Available This article offers a short story, apparently unpublished, by Maria Teresa León: «Antón Perulero», wich was not collected in any book of stories. Probably written in Argentina, at the beginning of the 40's, it has been found in a notebook of this authoress, wich is kept in the National Library (Madrid. The story is destined to a readership of children, and its characters (Maricastaña, Mátalas Callando, Antón Perulero himself are taken from the world of proverbs, set phrases and children's songs; the interest in children's literature and in folklore had been present in Maria Teresa Leon's writing from its beginning.Este artículo presenta un cuento, al parecer inédito, de María Teresa León: «Antón Perulero», no recogido en ninguna de sus colecciones de relatos. Escrito probablemente en Argentina, a principios de los años 40, ha sido encontrado en un cuaderno manuscrito de la autora, que se conserva en la Biblioteca Nacional de Madrid. El relato está destinado al público infantil, y sus personajes (Maricastaña, Mátalas Callando o el propio Antón Perulero están extraídos del mundo de los refranes, las frases hechas y las canciones para niños; el interés por la literatura infantil y por el folklore había estado presente en la escritura de María Teresa León desde sus inicios.

  14. Development of Wireless RFID Glove for Various Applications

    Science.gov (United States)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  15. RFID - based Staff Control System (SCS) in Kazakhstan

    Science.gov (United States)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  16. RFID - based Staff Control System (SCS) in Kazakhstan

    International Nuclear Information System (INIS)

    Saparkhojayev, N

    2015-01-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS. (paper)

  17. RFID Continuance Usage Intention in Health Care Industry.

    Science.gov (United States)

    Iranmanesh, Mohammad; Zailani, Suhaiza; Nikbin, Davoud

    Radio-frequency identification (RFID) has been proved to be an effective tool both for improving operational efficiency and for gaining competitive advantage in the health care industry despite its relatively low-usage rate in hospitals. The sustained use of RFID by health care professionals will promote its development in the long term. This study evaluates the acceptance continuance of RFID among health care professionals through technology continuance theory (TCT). Data were collected from 178 medical professionals in Malaysia and were then analyzed using the partial least squares technique. The analysis showed that the TCT model provided not only a thorough understanding of the continuance behavior of health care professionals toward RFID but also the attitudes, satisfaction, and perceived usefulness of professionals toward it. The results of this study are expected to assist policy makers and managers in the health care industry in implementing the RFID technology in hospitals by understanding the determinants of continuance of RFID usage intention.

  18. Assessment of RFID Read Accuracy for ISS Water Kit

    Science.gov (United States)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  19. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  20. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    OpenAIRE

    Iwan Vanany; Awaluddin Bin Mohamed Shaharoun

    2009-01-01

    This paper explores the benefit and barriers of RFID (Radio Frequency Identification) technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and...

  1. An Exploratory Study of RFID Adoption in the Paperboard Packaging Industry

    Directory of Open Access Journals (Sweden)

    Bindiganavale Vijayaraman

    2008-12-01

    Full Text Available Some experts predict RFID will be the next big technology to revolutionize supply chain management. The RFID mandates by the Department of Defense (DOD, Federal Drug Administration (FDA, and retail companies have required organizations to implement RFID technology. Other companies are evaluating the potential costs and benefits of such adoption. In order to establish benchmark on RFID adoption, this study surveyed readers of Paperboard Packaging magazine and members of the European Federation of Corrugated Board Manufacturers (FEFCO to see if they are implementing RFID technology and challenges they may face. The results indicate about 52% of responding companies are not currently considering RFID technology because of the cost concerns. Companies that are implementing or considering RFID are doing it because of their customer requirements although they are concerned about the cost of RFID tags and cost of implementation. Companies that are implementing RFID are somewhat satisfied with RFID implementation.

  2. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  3. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear w

  4. Compact RFID Enabled Moisture Sensor

    Directory of Open Access Journals (Sweden)

    U. H. Khan

    2016-09-01

    Full Text Available This research proposes a novel, low-cost RFID tag sensor antenna implemented using commercially available Kodak photo-paper. The aim of this paper is to investigate the possibility of stable, RFID centric communication under varying moisture levels. Variation in the frequency response of the RFID tag in presence of moisture is used to detect different moisture levels. Combination of unique jaw shaped contours and T-matching network is used for impedance matching which results in compact size and minimal ink consumption. Proposed tag is 1.4 × 9.4 cm2 in size and shows optimum results for various moisture levels upto 45% in FCC band with a bore sight read range of 12.1 m.

  5. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  6. The Value of RFID Benefits vs Costs

    CERN Document Server

    2013-01-01

    RFID technology presents a great potential for creating competitive advantage. By automating and simplifying data collection, it lets users more accurately track assets and monitor key indicators, which in turn gives greater visibility to the operations. However, the benefits received from this technology will be determined by how well it is integrated with the business processes and overall information flow. Because of the fact that the decision to deploy RFID technology in an enterprise is a business decision instead of a technology decision, cost-benefit analysis is a key component of this decision. If an RFID deployment cannot be justified in terms of its economic value to the company, it is not likely to help the company; and consequently, it is not likely to remain a viable deployment over the long term.   The Value of RFID describes the business value of RFID and explains the costs and benefits of this technology comprehensively. Different investment evaluation models are proposed to use in various ap...

  7. RFID Applications: An Introductory and Exploratory Study

    OpenAIRE

    Hanifa Shah; Kamran Ahsan; Paul Kingston

    2010-01-01

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes,...

  8. On the move with RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Scanology is an independent automatic identification specialist providing state of the art barcode and RFID solutions to our European customer base. Our knowledge of the present and what is yet to come allows us to provide honest, practical advice to clients transitioning from barcode to RFID. Scanology designs, builds, installs and services end-to-end sup-

  9. Embedded RFID Recorder in short-range wireless devices

    DEFF Research Database (Denmark)

    2010-01-01

    range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...

  10. Love from attitudes of two Muslim and Christian mystics (Rabia Adaviye and Teresa Avila

    Directory of Open Access Journals (Sweden)

    Dr. Maryam Bakhtyar

    2013-06-01

    Full Text Available Love is an affection which is the extreme and peak. In this extreme love, lover (mystic loves his/her beloved (God with all of his/her own and he/she burns in his parting, mystical lover in fact will survive with the destruction (join to lover in true lover. Love of God is essential issue in Rabia Adaviye and Teresa Avila works. Rabia believes that in the bond of true love must be absolutely no contamination as a lover not ask for reward in turn his/her love not even waiting for an answer to his/her love. Also Teresa believes that original love is only for God and all loves along this love are justified and interpreted. Other friendships should not be an obstacle in the way God’s love or their ending should lead to divine love.

  11. Processing Uncertain RFID Data in Traceability Supply Chains

    Directory of Open Access Journals (Sweden)

    Dong Xie

    2014-01-01

    Full Text Available Radio Frequency Identification (RFID is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  12. Processing uncertain RFID data in traceability supply chains.

    Science.gov (United States)

    Xie, Dong; Xiao, Jie; Guo, Guangjun; Jiang, Tong

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  13. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability.......This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  14. Semantic-Based RFID Data Management

    Science.gov (United States)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  15. RFID: A key technology for Humanity

    Science.gov (United States)

    Duroc, Yvan; Tedjini, Smail

    2018-01-01

    The RFID (Radio Frequency IDentification) technology is a well-known wireless application for traceability, logistics, and access control. It became ubiquitous in industry and our daily life (ticketing, payment, passports, car keys, etc.). RFID is nowadays a standardized technology; its inherent advantages, which are unitary, identification, wireless communication, and low cost of tags, provide it with decisive practical benefits that drive new developments in terms of concepts and applications. This trend is largely confirmed by the market forecast, but also by its implementation in the area of health (smart hospital), assistance to persons, anti-counterfeiting, as well as by its perspective in terms of new paradigms for distributed ambient intelligence and the Internet of Things. The first part of this paper briefly reviews the fundamental concepts of the RFID technology, and shows its link with the radio science. A state of the art including the presentation of current performance and developments is also summarized. The second part illustrates the impact of RFID to the service of our society with a focus of applications in the field of autonomy and handicap. Finally, the last part highlights a panorama of perspectives and the future directions of RFID applications dedicated to the service of Humanity. xml:lang="fr"

  16. Small Form Factor RFID Applicator, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed development of a small form factor Astrobee dedicated RFID label applicator will allow current and future free flying vehicles to place RFID labels...

  17. RFID-based vehicle positioning and its applications in connected vehicles.

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-03-04

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  18. Filtering Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hazalila Kamaludin

    2016-01-01

    Full Text Available Radio Frequency Identification (RFID enabled systems are evolving in many applications that need to know the physical location of objects such as supply chain management. Naturally, RFID systems create large volumes of duplicate data. As the duplicate data wastes communication, processing, and storage resources as well as delaying decision-making, filtering duplicate data from RFID data stream is an important and challenging problem. Existing Bloom Filter-based approaches for filtering duplicate RFID data streams are complex and slow as they use multiple hash functions. In this paper, we propose an approach for filtering duplicate data from RFID data streams. The proposed approach is based on modified Bloom Filter and uses only a single hash function. We performed extensive empirical study of the proposed approach and compared it against the Bloom Filter, d-Left Time Bloom Filter, and the Count Bloom Filter approaches. The results show that the proposed approach outperforms the baseline approaches in terms of false positive rate, execution time, and true positive rate.

  19. Occurrence of Temnocephala (Platyhelminthes: Temnocephalida in Immatures of Kempnyia reticulata (Enderlein (Insecta: Plecoptera: Perlidae

    Directory of Open Access Journals (Sweden)

    Fernanda Avelino-Capistrano

    2013-04-01

    Full Text Available First register of Temnocephala (Platyhelminthes: Temnocephalida in immature of Kempnyia reticulata (Enderlein (Plecoptera: Perlidae. The insects were collected in rivers of Estação Biológica de Santa Lúcia, Santa Teresa, Espirito Santo, Brazil.

  20. Antenna for passive RFID tags

    Science.gov (United States)

    Schiopu, Paul; Manea, Adrian; Cristea, Ionica; Grosu, Neculai; Vladescu, Marian; Craciun, Anca-Ileana; Craciun, Alexandru

    2015-02-01

    Minuscule devices, called RFID tags are attached to objects and persons and emit information which positioned readers may capture wirelessly. Many methods of identification have been used, but that of most common is to use a unique serial number for identification of person or object. RFID tags can be characterized as either active or passive [1,2]. Traditional passive tags are typically in "sleep" state until awakened by the reader's emitted field. In passive tags, the reader's field acts to charge the capacitor that powers the badge and this can be a combination of antenna and barcodes obtained with SAW( Surface Acoustic Wave) devices [1,2,3] . The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader. The paper contribution are targeted to antenna for passive RFID tags. The electromagnetic field generated by the reader is somehow oriented by the reader antenna and power is induced in the tag only if the orientation of the tag antenna is appropriate. A tag placed orthogonal to the reader yield field will not be read. This is the reason that guided manufacturers to build circular polarized antenna capable of propagating a field that is alternatively polarized on all planes passing on the diffusion axis. Passive RFID tags are operated at the UHF frequencies of 868MHz (Europe) and 915MHz (USA) and at the microwave frequencies of 2,45 GHz and 5,8 GHz . Because the tags are small dimensions, in paper, we present the possibility to use circular polarization microstrip antenna with fractal edge [2].

  1. Wireless Smart Systems Beyond RFID

    OpenAIRE

    Vermesan, Ovidiu

    2008-01-01

    It is expected that in the coming 20 years the IoT will be pervasive, and ubiquitous: smart devices, embedded in smart materials, will work in synergy to improve the quality of our lives. In this context wireless smart systems will play an essential role that is far beyond the ID information that is part of RFID devices today. Wireless Smart Systems Beyond RFID

  2. Applying RFID technology in nuclear materials management

    International Nuclear Information System (INIS)

    Tsai, H.; Chen, K.; Liu, Y.; Norair, J.P.; Bellamy, S.; Shuler, J.

    2008-01-01

    The Packaging Certification Program (PCP) of US Department of Energy (DOE) Environmental Management (EM), Office of Safety Management and Operations (EM-60), has developed a radio frequency identification (RFID) system for the management of nuclear materials. Argonne National Laboratory, a PCP supporting laboratory, and Savi Technology, a Lockheed Martin Company, are collaborating in the development of the RFID system, a process that involves hardware modification (form factor, seal sensor and batteries), software development and irradiation experiments. Savannah River National Laboratory and Argonne will soon field test the active RFID system on Model 9975 drums, which are used for storage and transportation of fissile and radioactive materials. Potential benefits of the RFID system are enhanced safety and security, reduced need for manned surveillance, real time access of status and history data, and overall cost effectiveness

  3. Securing the Use of RFID-Enabled Banknotes

    Science.gov (United States)

    Martínez, Santi; Roig, Concepció; Valls, Magda

    The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.

  4. System and Method for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  5. A Framework for RFID Survivability Requirement Analysis and Specification

    Science.gov (United States)

    Zuo, Yanjun; Pimple, Malvika; Lande, Suhas

    Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.

  6. RFID Technologies : emerging issues and challenges

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2007-01-01

    In this paper we will present the results of a technology and policy assessment we have performed on emerging issues and policy challenges of RFID technologies. RFID is a basic component of the future internet of things. A balanced view on opportunities and threats, on drivers and barriers is needed

  7. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-01-01

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control. PMID:24599188

  8. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles

    Directory of Open Access Journals (Sweden)

    Jianqiang Wang

    2014-03-01

    Full Text Available This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  9. Preliminary Study of RFID System for the LILW Transportation

    International Nuclear Information System (INIS)

    Kim, Dohyung; Lee, Unjang; Choi, Kyusup

    2008-01-01

    Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. In Korea, Low-to-Intermediate Level Radioactive Wastes (LILW) are planed to be disposed at Kyeonju disposal repository, and 100,000 LILW drums will be disposed for the first 10 years of disposal. Tracking of these LILW drums is one of the important parts for safe transportation. To track the LILW drums during the transport as well as storage and disposal, RFID can be the prospective method for tracking the LILW drums. In this report, RFID system is introduced to the LILW transport from the generation site to disposal site, and one possible RFID system is suggested as a preliminary study

  10. 欧盟RFID标准体系架构和关键RFID标准分析%Analysis on EU RFID Standard System Architecture and the Key RFID Standards

    Institute of Scientific and Technical Information of China (English)

    黄娟; 段新颖

    2011-01-01

    无线射频识别(RFID)技术被誉为最具发展潜力和变革力的信息高新技术之一.随着RFID技术的发展,RFID应用规模的不断扩大,RFID标准在RFID技术应用和产业发展中的作用和战略地位日益显现.文章详细描述了欧盟"RFID标准化发展现状报告"中提出的RFID标准体系架构和相关RFID标准和法规,为我国开展RFID标准化研究提供了借鉴.%The technology of radio frequency identification( RFID )is hailed as one of the most potential development and change of information technology.Recently, along with the development of RFID technology and RFID application scale expands unceasingly, RFID standards play a more important role in RFID technology application and industry development.This paper describes the RFID standard system architecture which presented in “European Global RFID Forum for Standards”and RFID related standards and regulations in detailed.Its purpose tries to provide references for the development of RFID standardization in China.

  11. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  12. Overview of RFID technology and its applications in the food industry.

    Science.gov (United States)

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.

  13. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2014-06-01

    Full Text Available In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for traceability applications made with rewritable passive RFID tags. This paper aims to examine how RFID technology can be useful for traceability applications and will submit a diligent search regarding the degree of knowledge of RFID technology and the acceptance of an empirical model by the employees of Romanian companies.

  14. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    Science.gov (United States)

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction. Copyright © 2011 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  15. Implications of RFID in Location-Aware Wi-Fi Networks

    Science.gov (United States)

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  16. RFID in the healthcare supply chain: usage and application.

    Science.gov (United States)

    Kumar, Sameer; Swanson, Eric; Tran, Thuy

    2009-01-01

    The purposes of this study are to first, determine the most efficient and cost effective portions of the healthcare supply chain in which radio frequency identification devices (RFID) can be implemented. Second, provide specific examples of RFID implementation and show how these business applications will add to the effectiveness of the healthcare supply chain. And third, to describe the current state of RFID technology and to give practical information for managers in the healthcare sector to make sound decisions about the possible implementation of RFID technology within their organizations. Healthcare industry literature was reviewed and examples of specific instances of RFID implementation were examined using an integrated simulation model developed with Excel, @Risk and Visio software tools. Analysis showed that the cost of implementing current RFID technology is too expensive for broad and sweeping implementation within the healthcare sector at this time. However, several example applications have been identified in which this technology can be effectively leveraged in a cost-effective way. This study shows that RFID technology has come a long way in the recent past and has potential to improve healthcare sector productivity and efficiency. Implementation by large companies such as Wal-mart has helped to make the technology become much more economical in its per unit cost as well as its supporting equipment and training costs. The originality of this study lies in the idea that few practical and pragmatic approaches have been taken within the academic field of study for the implementation of RFID into the healthcare supply chain. Much of the research has focused on specific companies or portions of the supply chain and not the entire supply chain. Also, many of the papers have discussed the future of the supply chain that is heavily dependent on advances in RFID technology. A few viable applications of how RFID technology can be implemented in the healthcare

  17. Energy-balanced algorithm for RFID estimation

    Science.gov (United States)

    Zhao, Jumin; Wang, Fangyuan; Li, Dengao; Yan, Lijuan

    2016-10-01

    RFID has been widely used in various commercial applications, ranging from inventory control, supply chain management to object tracking. It is necessary for us to estimate the number of RFID tags deployed in a large area periodically and automatically. Most of the prior works use passive tags to estimate and focus on designing time-efficient algorithms that can estimate tens of thousands of tags in seconds. But for a RFID reader to access tags in a large area, active tags are likely to be used due to their longer operational ranges. But these tags use their own battery as energy supplier. Hence, conserving energy for active tags becomes critical. Some prior works have studied how to reduce energy expenditure of a RFID reader when it reads tags IDs. In this paper, we study how to reduce the amount of energy consumed by active tags during the process of estimating the number of tags in a system and make the energy every tag consumed balanced approximately. We design energy-balanced estimation algorithm that can achieve our goal we mentioned above.

  18. An Integrated Conceptual Framework for RFID Enabled Healthcare

    Directory of Open Access Journals (Sweden)

    Gaurav Gupta

    2015-12-01

    Full Text Available Radio frequency identification (RFID technology is a wireless communication technology that facilitates automatic identification and data capture without human intervention. Since 2000s, RFID applications in the health care industry are increasing.  RFID has brought many improvements in areas like patient care, patient safety, equipment tracking, resource utilization, processing time reduction and so on. On the other hand, often deployment of RFID is questioned on the issues like high capital investment, technological complexity, and privacy concerns. Exploration of existing literature indicates the presence of works on the topics like asset management, patient management, staff management, institutional advantages, and organizational issues. However, most of the works are focused on a particular issue. Still now, scholarly attempts to integrate all the facades of RFID-enabled healthcare are limited. In this paper, we propose a conceptual framework that represents the scope for implementation of this technology and the various dimensions of RFID-enabled healthcare and demonstrate them in detail. Also, we have discussed the critical issues that can prove to be potential barriers to its successful implementation and current approaches to resolving these. We also discuss some of the regulatory initiatives encouraging its adoption in the healthcare industry. Also, we have highlighted the future research opportunities in this domain.

  19. Dampak RFID pada Stok Barang Retailer

    Directory of Open Access Journals (Sweden)

    I Gusti Made Karmawan

    2012-06-01

    Full Text Available The development of RFID technology (Radio Frequency Identification offers some advantages, especially in goods distribution, supply chain and logistics. This technology works by putting a chip on an item as a replacement for barcodes that are widely used today. With the RFID technology, the process of goodsidentification becomes very easy and fast. Therefore, some large companies have started implementing and trust the system, especially the supermarket retailers although there are still some problems encountered in the application of this system, related to issues of privacy and data integrity problems. This paper discusses how RFID works and the impacts to the company related to profits and problems encountered during the application of this system.

  20. Design and Implementation of User-Created Information Systems with Mobile RFID

    Science.gov (United States)

    Lee, Jae Kwoen; Chin, Sungho; Kim, Hee Cheon; Chung, Kwang Sik

    RFID (Radio Frequency Identification) has been usually applied at physical distribution field. The Mobile RFID can be the only technology that we can lead the market. In our country, ETRI standardizes MOBION (MOBile Identification ON), and the mobile-telecommunication companies provide the trial-mobile RFID service from 2006. In the trial-mobile RFID services, the Broker model is used to decode the mobile RFID code. However, the Broker model has some problems, such as communication overhead caused by the frequent ODS query, service performance, and various services for users. In this paper, we developed device application that is capable for filtering unrelated code from RFID service to improve the decoding performance. We also improve the performance through simplifying connection process between device application and the broker. Finally, we propose and develop the user-created information system to widely distribute the Mobile RFID service.

  1. An Approach for Removing Redundant Data from RFID Data Streams

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  2. An Approach for Removing Redundant Data from RFID Data Streams

    Directory of Open Access Journals (Sweden)

    Hairulnizam Mahdin

    2011-10-01

    Full Text Available Radio frequency identification (RFID systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches.

  3. Optimalization of selected RFID systems Parameters

    Directory of Open Access Journals (Sweden)

    Peter Vestenicky

    2004-01-01

    Full Text Available This paper describes procedure for maximization of RFID transponder read range. This is done by optimalization of magnetics field intensity at transponder place and by optimalization of antenna and transponder coils coupling factor. Results of this paper can be used for RFID with inductive loop, i.e. system working in near electromagnetic field.

  4. Radio Frequency Identification (RFID) technology and patient safety

    OpenAIRE

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID techno...

  5. Signal and array processing techniques for RFID readers

    Science.gov (United States)

    Wang, Jing; Amin, Moeness; Zhang, Yimin

    2006-05-01

    Radio Frequency Identification (RFID) has recently attracted much attention in both the technical and business communities. It has found wide applications in, for example, toll collection, supply-chain management, access control, localization tracking, real-time monitoring, and object identification. Situations may arise where the movement directions of the tagged RFID items through a portal is of interest and must be determined. Doppler estimation may prove complicated or impractical to perform by RFID readers. Several alternative approaches, including the use of an array of sensors with arbitrary geometry, can be applied. In this paper, we consider direction-of-arrival (DOA) estimation techniques for application to near-field narrowband RFID problems. Particularly, we examine the use of a pair of RFID antennas to track moving RFID tagged items through a portal. With two antennas, the near-field DOA estimation problem can be simplified to a far-field problem, yielding a simple way for identifying the direction of the tag movement, where only one parameter, the angle, needs to be considered. In this case, tracking of the moving direction of the tag simply amounts to computing the spatial cross-correlation between the data samples received at the two antennas. It is pointed out that the radiation patterns of the reader and tag antennas, particularly their phase characteristics, have a significant effect on the performance of DOA estimation. Indoor experiments are conducted in the Radar Imaging and RFID Labs at Villanova University for validating the proposed technique for target movement direction estimations.

  6. RuBee and RFID A confidential summary,May 2009

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The letters"RFID"have become a negative to many of our end-customers,so we have had to distance RuBee from the entire category and discourage any attempt to characterize RuBee as just another RFID technology.We never engage in pilots or trials where RFID is seen as a competing technology to RuBee.Most

  7. Evolution of RFID Applications in Construction: A Literature Review

    Science.gov (United States)

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  8. Enhancing Business Process Automation by Integrating RFID Data and Events

    Science.gov (United States)

    Zhao, Xiaohui; Liu, Chengfei; Lin, Tao

    Business process automation is one of the major benefits for utilising Radio Frequency Identification (RFID) technology. Through readers to RFID middleware systems, the information and the movements of tagged objects can be used to trigger business transactions. These features change the way of business applications for dealing with the physical world from mostly quantity-based to object-based. Aiming to facilitate business process automation, this paper introduces a new method to model and incorporate business logics into RFID edge systems from an object-oriented perspective with emphasises on RFID's event-driven characteristics. A framework covering business rule modelling, event handling and system operation invocations is presented on the basis of the event calculus. In regard to the identified delayed effects in RFID-enabled applications, a two-block buffering mechanism is proposed to improve RFID query efficiency within the framework. The performance improvements are analysed with related experiments.

  9. RFID in Retail: New approaches, new viewpoints

    NARCIS (Netherlands)

    Sander de Ridder; Jan Kroon; drs. Frans van den Reep; Christian Vrijlandt

    2008-01-01

    RFID technology is a promising technology currently finding its way into the field of customer interaction strategy, supply chain accuracy and inventory management. Primarily, RFID tags are seen as substitutes of traditional barcodes, yet they can add a lot of value and functionality. Where barcodes

  10. Smart Idlers : RFID in conveyor belt monitoring

    NARCIS (Netherlands)

    Pang, Y.

    2012-01-01

    Radio Frequency Identifi cation (RFID) is a technology that offers unique identifi cation of objects and processes. It can actively or passively communicate and, in combination with sensors, it can capture more detailed physical information. RFID technology has been integrated into our daily life.

  11. Orientation Sensing Using Multiple Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    Knowing the inclination of an object can be valuable information in a supply chain application, e.g. when handling orientation sensitive objects. In this work we present a method for sensing the inclination using Radio Frequency IDentification (RFID) technology. The method requires standard RFID...

  12. A study on RFID adoption for vehicle tracking in container terminal

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2012-06-01

    Full Text Available Purpose: Numerous studies discuss that Radio Frequency Identification (RFID technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring the movement of vehicle in the container terminal environment. Thus, this study aims at discussing the feasibility of applying RFID for vehicle tracking purpose in a container terminal. Design/methodology/approach: This study makes use of a series of experiments in a container terminal to discuss the factors that affect the use of RFID in the terminal. The possibility and accuracy of using RFID in such challenging environment is also investigated. These propositions are investigated by a case study. Findings: The experimental results indicate that the RFID communication is good at the containers area which occupies nearly all the area in the container terminal. However, in other area such as sea side and free area, the performance is not good and 100% readability only achieved in 5m and 10m in free area and sea side respectively. Originality/value: The container terminal environment, which consists of different transport vehicles for onward transportation, will affect the performance of RFID readability. Poor setup of the RFID reader and tag will lower the feasibility of RFID adoption as well as increase the cost. In order to address the challenges of implementing RFID in the container terminal environment, this paper provides a series of real site testing experiments to study the RFID performance in the container terminal environment. This represents an original contribution of value to future research and practice in the RFID adoptions in container terminal environment.

  13. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  14. Theopathic Experience and Theophanic Language. The Boundary Condition of Aesthetic Beauty in Teresa of Avila

    Directory of Open Access Journals (Sweden)

    Cecilia Inés Avenatti de Palumbo

    2015-04-01

    Full Text Available The aim of this article is to suggest that beyond the explicit source Augustinian Patristic figures of Beauty and the interior Master and the hypothetical influence of Sufi poetry of pure love that dwells in the hearts, Teresa of Avila constructed as writer, a record that has a symbolic own paradoxical tension between the “apophatic way” of indifference and silence of all that is not God and the affirmation of the soul as a castle whose concentric crystalline inhabits interiority “Beauty theophanic”. So Teresian proposal is considered near-mystical poetic languages of waiting and emptiness of our time, to the extent that through the symbolic language provides tracing and mystical aesthetics of nudity, in which the Master inside reveal the pristine beauty of pure light as the goal of man’s way to the encounter with God.Keywords: aesthetic - Teresa of Avila - Interior Master - theophanic language.

  15. RFID Data Loggers in Fish Supply Chain Traceability

    Directory of Open Access Journals (Sweden)

    Mira Trebar

    2013-01-01

    Full Text Available Radio frequency identification (RFID is an innovative and well-recognized technology that supports all kinds of traceability systems in many areas. It becomes very important in the food industry where the electronic systems are used to capture the data in the supply chain. Additionally, RFID data loggers with sensors are available to perform a cold chain optimization for perishable foods. This paper presents the temperature monitoring solution at the box level in the fish supply chain as part of the traceability system implemented with RFID technology. RFID data loggers are placed inside the box to measure the temperature of the product and on the box for measuring ambient temperature. The results show that the system is very helpful during the phases of storage and transportation of fish to provide the quality control. The sensor data is available immediately at the delivery to be checked on the mobile RFID reader and afterwards stored in the traceability systems database to be presented on a web to stakeholders and private consumers.

  16. Sistem Parkir Berbasis RFID dan Pengenalan Citra Pelat Nomor Kendaraan

    Directory of Open Access Journals (Sweden)

    Eko Didik Widianto

    2017-07-01

    Full Text Available The length of time in manually recording vehicle license plates in the parking system leads to long vehicle queues. This research developed automatic parking system based on RFID and vehicle plate number recognition. Authentication used a camera and Arduino Uno as the controller for RFID reading, feedback and gatekeeper control. The system will compare the characters image and RFID in the record of database to authorize a vehicle. Image processing was done by contour analysis method and had 91% in accuracy at 60 cm of distance and 131.89 milliseconds of reading speed. The system had been able to work to automatically open and close gates based on the match of RFID and vehicle plate number recognition. Waktu yang lama saat pencatatan pelat nomor kendaraan secara manual di sistem parkir menimbulkan antrean. Penelitian ini mengembangkan sistem parkir otomatis berbasis RFID dan pengolahan citra pelat nomor kendaraan. Autentikasi menggunakan kamera untuk pengambil gambar pelat nomor dan Arduino Uno sebagai kontroler untuk pembaca RFID, pemberi umpan balik dan pembuka gerbang. Sistem akan membandingkan karakter citra dan RFID pada database untuk menentukan izin penggunaan kendaraan. Pengolahan citra menggunakan metode analisis kontur dan memiliki akurasi sebesar 91 % di jarak 60 cm dan kecepatan baca 131,89 milidetik. Sistem telah dapat bekerja untuk secara otomatis membuka dan menutup gerbang berdasarkan kecocokan kartu RFID dan pelat kendaraan.

  17. Electromagnetic compatibility of implantable neurostimulators to RFID emitters.

    Science.gov (United States)

    Pantchenko, Oxana S; Seidman, Seth J; Guag, Joshua W; Witters, Donald M; Sponberg, Curt L

    2011-06-09

    The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz. The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  18. RFID Torque Sensing Tag System for Fasteners

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2016-01-01

    The present invention provides an RFID-based torque sensor that can be used to quickly monitor off the shelf fasteners including fasteners that are used in expensive satellites or other uses where fastener failure can be very costly. In one embodiment, an antenna, RFID ring and spring comprise a sensor tag that can be interrogated with an interrogation signal produced by an interrogator device. When sufficient torque is applied to the fastener, an RFID circuit is connected, and produces a radio frequency (RF) signal that can be read by the interrogator. In one embodiment, the RFID circuit does not transmit when the spring member is not compressed, thereby indicating insufficient tensioning of the fastener. The present invention offers the ability to remotely, quickly, and inexpensively verify that any number of fasteners are torqued properly upon initial installation. Where applicable, the present invention allows low cost monitoring over the life of the fastener.

  19. Chipless RFID design procedure and detection techniques

    CERN Document Server

    Rezaiesarlak, Reza

    2015-01-01

    This book examines the design of chipless RFID systems. The authors begin with the historical development of wireless identification systems and finally arrive at a representation of the chipless RFID system as a block diagram illustration. Chapter 2 is devoted to the theoretical bases for the design of chipless RFID tags and detection techniques in the reader. A rigorous mathematical formulation is presented based on the singularity expansion method (SEM) and characteristic mode theory (CMT) in order to study the scattered fields from an object in a general form. Th e authors attempt to explain some physical concepts behind the mathematical descriptions of the theories in this chapter. In Chapter 3, two design procedures based on complex natural resonance and CMT are presented for the design of the chipless RFID tag. By studying the effects of structural parameters on radiation and resonant behaviors of the tag, some design conclusions are presented in this chapter. Chapter 4 is dedicated to the time-frequen...

  20. Improvement of Supply Chain Performances Using RFID Technology

    OpenAIRE

    Turcu, Cornel; Turcu, Cristina; Graur, Adrian

    2009-01-01

    This chapter helps to improve readers understanding of the RFID and EPC potential for business processes. RFID technology is classified as a wireless AIDC technology that uses digital data encoded into a radio tag embedding a microchip with an antenna. The data stored on the tag is collected by a reader using radio waves. There are a large variety of RFID tags designs; they also have many different functional characteristics such as power source, carrier frequency, read range, data storage ca...

  1. A Qualitative Approach to Mobile Robot Navigation Using RFID

    International Nuclear Information System (INIS)

    Hossain, M; Rashid, M M; Bhuiyan, M M I; Ahmed, S; Akhtaruzzaman, M

    2013-01-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot

  2. USING OF RFID TECHNOLOGY IN MAINTENANCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2015-06-01

    Full Text Available Automated data collection helps to improve the precision of decision-making processes. Currently, the radio frequency identification technology belongs to the most common application in the field of identification technology. In the world, the implementation of RFID technology is used in almost all areas of industry. RFID tags allow to use of the different products and materials applications. The article provides an overview of using this technology to record and register maintenance intervals of railway wagons. The application of RFID technology helps to avoid huge disasters and accidents caused by lack of information about the technical state of rail freight wagons.

  3. Address for the Beginning Issue of “RFID Technologies and Applicationsn”

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Recently RFID technology got a widely attentions. As a result of this, RFID Technology and Application is published as the first professional RFID publication mainly issuing in the China and Hong Kong, Macao and Taiwan. This article summarizes the RFID characteristic, suitable applied field and its development situation and its developing reason in Asia-Pacific area. The article also presents the Magazine’s target and goal, column and the future perspective.

  4. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  5. Holiness as friendship with Christ: Teresa of Avila

    Directory of Open Access Journals (Sweden)

    Tara K. Soughers

    2016-09-01

    Full Text Available Teresa of Avila, writing in the 16th century when ideas of holiness often excluded women and lay people, developed a radically inclusive understanding of holiness as friendship with Christ. Her idea also allowed for degrees of holiness, from those who completed only the necessary church requirements of confession and absolution all the way up to those who had a friendship that was modelled upon the relationship in the Song of Songs. It was a definition of holiness applicable to men and women, clergy, members of religious orders, and lay people. In addition, her understanding of holiness did not distinguish the holiness of ordinary lay people from that of the great saints of previous generations, for friendship with Christ was open to all.

  6. RFID Demystified: Part 2. Applications within the supply chain.

    OpenAIRE

    Wilding, Richard D.; Delgardo, Tiago

    2004-01-01

    In our previous article we discussed the technology, benefits and barriers to implementations of Radio Frequency Identification (RFID). In this article we discuss where this technology can be applied. Essentially, it is argued that RFID systems help companies to cut costs, improve customer service, reduce labour, increase accuracy and improve supply chain throughput. RFID systems applications can be used by different industry sectors like the military, retail, industrial, life sciences, logis...

  7. Justification of RFID Implementation. A Case Study of White Goods Manufacturer

    Directory of Open Access Journals (Sweden)

    Gladysz Bartlomiej

    2017-12-01

    Full Text Available Radio Frequency Identification (RFID is a rapidly emerging technology with a wide range of impact and still not fully exploited potential applications. The impact of RFID is not limited to the area of its direct application. There are many possible benefits to be gained from RFID application, but it must be preceded with careful analysis as its implementation is not always reasonable. A new method for an assessment of RFID technology was presented and explained on the case of a white goods manufacturer. There was a lack of such a method allowing for relatively quick and flexible assessment, which is important for decision makers, who do not want to become involved in very sophisticated and time-consuming analysis at the early stage of decision making. The method supports early phases of decision making related to RFID implementation. Conclusions derived from the analysis of the case study confirmed that the method applied allows for rationalizing decision making and answers whether RFID could generate strategic advantage, in which area RFID should be applied, how RFID-supported processes will be executed and what benefits would be expected. previous papers focused only on answering specific questions from the above list, without showing a holistic approach. the approach to answer questions about execution of processes and benefits was not considered earlier at all. The paper illustrates details of using a new method of an assessment of RFID technology (ART using a real industrial example.

  8. Electromagnetic compatibility of implantable neurostimulators to RFID emitters

    Directory of Open Access Journals (Sweden)

    Guag Joshua W

    2011-06-01

    Full Text Available Abstract Background The objective of this study is to investigate electromagnetic compatibility (EMC of implantable neurostimulators with the emissions from radio frequency identification (RFID emitters. Methods Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz Results The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. Conclusions The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  9. The design and simulation of UHF RFID microstrip antenna

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Liu, Liping; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Renheng, Xu

    2018-02-01

    At present, China has delineated UHF RFID communicating frequency range which is 840 ∼ 845 MHz and 920 ∼ 925 MHz, but most UHF microstrip antenna don’t carry out this standard, that leads to radio frequency pollution. In order to solve the problems above, a method combining theory and simulation is adopted. Combining with a new ceramic material, a 925.5 MHz RFID microstrip antenna is designed, which is optimized and simulated by HFSS software. The results show that the VSWR of this RFID microstrip antenna is relatively small in the vicinity of 922.5 MHz, the gain is 2.1 dBi, which can be widely used in China’s UHF RFID communicating equipments.

  10. Design of housing file box of fire academy based on RFID

    Science.gov (United States)

    Li, Huaiyi

    2018-04-01

    This paper presents a design scheme of intelligent file box based on RFID. The advantages of RFID file box and traditional file box are compared and analyzed, and the feasibility of RFID file box design is analyzed based on the actual situation of our university. After introducing the shape and structure design of the intelligent file box, the paper discusses the working process of the file box, and explains in detail the internal communication principle of the RFID file box and the realization of the control system. The application of the RFID based file box will greatly improve the efficiency of our school's archives management.

  11. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    Science.gov (United States)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  12. Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains

    Science.gov (United States)

    Mo, John P. T.; Li, Xue

    Radio Frequency Identification (RFID) is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight. This creates tremendous opportunities for linking real world objects into a world of "Internet of things". Application of RFID to Fast Moving Consumer Goods sector will introduce billions of RFID tags in the world. Almost everything is tagged for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of processing of RFID events and data. This chapter uses two national demonstrator projects in Australia as case studies to introduce an event managementframework to process high volume RFID data streams in real time and automatically transform physical RFID observations into business-level events. The model handles various temporal event patterns, both simple and complex, with temporal constraints. The model can be implemented in a data management architecture that allows global RFID item tracking and enables fast, large-scale RFID deployment.

  13. RFID-tunnisteiden havaitseminen liikkuvasta ajoneuvosta : case: Fidera Oy

    OpenAIRE

    Artukka, Riku

    2016-01-01

    Tämän opinnäytetyön tarkoituksena on testata ja dokumentoida suoritettuja RFID- ajoneuvomittauksia eli ajoneuvojen ja henkilöiden automaattista tunnistusta hyödyntämällä RFID-tunnisteita. Opinnäytetyö on tehty toimeksiantona Fidera Oy:lle. Yrityksellä on jo käytössä automaattinen henkilötunnistusjärjestelmä, tarve olikin soveltaa samaa tekniikkaa ajoneuvojen ja niiden sisällä olevien henkilöiden tunnistukseen. Opinnäytetyön tavoitteena on luoda kuva RFID-tekniikan perusteista ja toimia s...

  14. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  15. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  16. The Study on Using Passive RFID Tags for Indoor Positioning

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2011-02-01

    Full Text Available Radio frequency identification (RFID is the technology that put an RFID tag on objects or people, so that they can be identified, tracked, and managed automatically. With its wide application in the automobile assembly industry, warehouse management and the supply chain network, RFID has been recognized as the next promising technology in serving the positioning purpose. Existing positioning technologies such as GPS are not available indoors as the terminal cannot get the signal from satellites. To enhance the availability of the positioning systems for indoors, the development of RFID positioning system for locating objects or people have became a hot topic in recent research. Compared with conventional active and high‐cost solutions, this paper studied the feasibility of using passive RFID tags for indoor positioning and object location detection to provide real time information for tracking movement. Results of experiment show that readability of the passive RFID positioning system is satisfactory, and it is a more cost effective solution when compared with other positioning technologies.

  17. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  18. RFID-enabled healthcare applications, issues and benefits: an archival analysis (1997-2011).

    Science.gov (United States)

    Fosso Wamba, Samuel

    2012-12-01

    In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.

  19. Radio frequency identification and time-driven activity based costing:RFID-TDABC application in warehousing

    OpenAIRE

    Bahr, Witold; Price, Brian J

    2016-01-01

    Purpose: This paper extends the use of Radio Frequency Identification (RFID) data for accounting of warehouse costs and services. Time Driven Activity Based Costing (TDABC) methodology is enhanced with the real-time collected RFID data about duration of warehouse activities. This allows warehouse managers to have accurate and instant calculations of costs. The RFID enhanced TDABC (RFID-TDABC) is proposed as a novel application of the RFID technology. Research Approach: Application of RFID-TDA...

  20. Teresa Zweifel, Medir lo inconmensurable. Los cambios en los procedimientos para relevar la pampa anterior (1796-1895

    Directory of Open Access Journals (Sweden)

    Sandra Szir

    2015-09-01

    Full Text Available Reseña bibliográfica del libro de Teresa Zweifel, Medir lo inconmensurable. Los cambios en los procedimientos para relevar la pampa anterior (1796-1895, Rosario, Prohistoria Ediciones, 2014, 191 pp.

  1. Aproximación a la revista TERESA (1954 – 1975)

    OpenAIRE

    Durón Muniz, Virginia M.

    2016-01-01

    En el presente estudio se desarrollará un análisis de la revista publicada por Sección Femenina entre 1954 y 1975, TERESA. Revista Para Todas Las Mujeres. A través de diversos contenidos principalmente, la moda y la política, aunque también otros como la ciencia o el cine, llegaba mensualmente a un amplio sector de mujeres españolas. Transmitía un modelo de mujer ideal, moral e intelectual, austera y elegante, a través de un discurso didáctico y un lenguaje emocional, cargado de simbolismo. C...

  2. The adoption and implementation of RFID technologies in healthcare: a literature review.

    Science.gov (United States)

    Yao, Wen; Chu, Chao-Hsien; Li, Zang

    2012-12-01

    Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use of RFID in healthcare/hospitals following a formal innovation-decision framework. We aim to identify the common applications, potential benefits, barriers, and critical success factors. Our study facilitates quick assessment and provides guidance for researchers and practitioners in adopting RFID in medical arenas. Many earlier adopters in healthcare found RFID to be functional and useful in such areas as asset tracking and patient identification. Major barriers to adoption include technological limitations, interference concerns, prohibitive costs, lack of global standards and privacy concerns. Better designed RFID systems with low cost and privacy issues addressed are needed to increase acceptance of RFID in healthcare.

  3. The impact of RFID on management of returnable containers

    OpenAIRE

    Thoroe, Lars; Melski, Adam; Schumann, Matthias

    2009-01-01

    Inventory shrinkage is a common problem in the management of returnable containers. RFID-based container tracking systems have been proposed as a possible solution. Benefits of RFID-based tracking of returnable transport items such as pallets, kegs and boxes are documented in several case studies, but have so far hardly been analyzed from a theoretical perspective. In this article, we analyze the impact of RFID on container management using a deterministic inventory model. The analysis focuse...

  4. Design of the RFID for Storage of Biological Information

    OpenAIRE

    Sang-Hee Son; Seok-Man Kim; Yu-Lee Choi; Kyoung-Rok Cho

    2009-01-01

    Recent advances in RFID (radio frequency identification) technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stor...

  5. Efficient DFSA Algorithm in RFID Systems for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Hsing-Wen Wang

    2015-01-01

    Full Text Available Radio Frequency IDentification (RFID used in business applications and international business management fields can create and sustain the competitive advantage, which is also one of the wireless telecommunication techniques for recognizing objects to realize Internet of Things (IoT technologies. In construction of IoT network, the RFID technologies play the role of the front-end data collection via tag identification, as the basis of IoT. Hence, the adoption of RFID technologies is spurring innovation and the development of the IoT. However, in RFID system, one of the most important challenges is the collision resolution between the tags when these tags transmit their data to the reader simultaneously. Hence, in this paper I develop an efficient scheme to estimate the number of unidentified tags for Dynamic Framed Slotted Aloha (DFSA based RFID system, with the view of increasing system performance. In addition to theoretical analysis, simulations are conducted to evaluate the performance of proposed scheme. The simulation results reveal the proposed scheme works very well in providing a substantial performance improvement in RFID system. The proposed algorithm promotes business effectiveness and efficiency while applying the RFID technologies to IoT.

  6. A Review of Implementing ADC in RFID Sensor

    Directory of Open Access Journals (Sweden)

    M. Zurita

    2016-01-01

    Full Text Available The general considerations to design a sensor interface for passive RFID tags are discussed. This way, power and timing constraints imposed by ISO/IEC 15693 and ISO/IEC 14443 standards to HF RFID tags are explored. A generic multisensor interface is proposed and a survey analysis on the most suitable analog-to-digital converters for passive RFID sensing applications is reported. The most appropriate converter type and architecture are suggested. At the end, a specific sensor interface for carbon nanotube gas sensors is proposed and a brief discussion about its implemented circuits and preliminary results is made.

  7. Radio Frequency Identification (RFID) technology and patient safety.

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-09-01

    Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors.

  8. Evaluation and Justification of an RFID Implementation : Pilot at IKEA Customer Distribution Centre

    OpenAIRE

    Larsson, Björn; Qviberg, Ola

    2004-01-01

    The purpose of this final thesis isto develop a model for justification and evaluation of RFID technology. RFID is a new, relatively untested, technology using radio signals for automatic identification of different objects. Our theoretical frame of references focuses on research about RFID and implementation iss ues, we also conducted case studies and interviews in order to learn about RFID. Most RFID installations of today are Pilots or early adopters wanting to try new technology. A lot of...

  9. RFID technology for reading of electricity measurements; RFID-lukumoduli saehkoeenergiamittaustietojen luentaan

    Energy Technology Data Exchange (ETDEWEB)

    Vehvilaeinen, T [MX Electrix Oy, Paelkaene (Finland)

    2006-12-19

    In the project is developed a reading module for electricity energy meters. The module saves and transmits the meter's energy measurement and power quality data. The project is based on RFID technology, which is a new application in reading of electricity measurements. The reading module of the meter is read via the customers GSM-telephone, which has a RFID- interface. The reading data is transmitted automatically from the module to the GSM hone, when the customer visits the meter. The utility sends the reading request and needed identifier to the customers GSM. After the reading the measured data is transferred to the utility's data base automatically. The utility can send information to the customer of used energy, pricing, make offers etc. The customer can transfer the data to his/hers own computer or get the information via the internet. (orig.)

  10. A Middleware Architecture for RFID-enabled traceability of air baggage

    Directory of Open Access Journals (Sweden)

    Bouhouche T.

    2017-01-01

    Full Text Available 1980 marked the start of a boom in radiofrequency identification (RFID technology, initially associated with a growing need for traceability. In view of the technological progress and lower costs, RFID’s area of application became much broader and, today, multiple business sectors take advantage of this technology. However, in order to achieve the maximum benefits of RFID technology, the data collected should be delivered in the best conditions to the whole applications that have need of its exploitation. For that, a dedicated middleware solution is required to ensure the collection of RFID data and their integration in information systems. The issues and key points of this integration as the description of the RFID technology will be summarized in the present paper, with a new middleware architecture. We focus mainly on components and the design of our middleware MedRFID, solution developed in our Lab, and which integrates mobility and provides extensibility, scalability, abstraction, ease of deployment and compatibility with IATA standards and EPCglobal standards. Moreover, we have developed an application (FindLuggage allowing a real time tracking of luggage in the airport, based on the proposed middleware MedRFID.

  11. SOA-based RFID public services infrastructure: architecture and its core services

    Institute of Scientific and Technical Information of China (English)

    Zeng Junfang; Li Ran; Luo Jin; Liu Yu

    2009-01-01

    Radio frequency identification (RFID) has prominent advantages compared with other auto-identification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.

  12. Ethical implications of implantable radiofrequency identification (RFID) tags in humans.

    Science.gov (United States)

    Foster, Kenneth R; Jaeger, Jan

    2008-08-01

    This article reviews the use of implantable radiofrequency identification (RFID) tags in humans, focusing on the VeriChip (VeriChip Corporation, Delray Beach, FL) and the associated VeriMed patient identification system. In addition, various nonmedical applications for implanted RFID tags in humans have been proposed. The technology offers important health and nonhealth benefits, but raises ethical concerns, including privacy and the potential for coercive implantation of RFID tags in individuals. A national discussion is needed to identify the limits of acceptable use of implantable RFID tags in humans before their use becomes widespread and it becomes too late to prevent misuse of this useful but ethically problematic technology.

  13. Increased operational range for implantable UHF RFID antennas

    NARCIS (Netherlands)

    Dubok, A.; Smolders, A.B.

    2014-01-01

    This paper discusses the main design challenges of implantable UHF RFID antennas in lossy environments. A novel cylindrical implantable antenna concept is presented. The proposed antenna shows good performance inside lossy environments, like a human body. The RFID tag is able to work in a range up

  14. A Graph Summarization Algorithm Based on RFID Logistics

    Science.gov (United States)

    Sun, Yan; Hu, Kongfa; Lu, Zhipeng; Zhao, Li; Chen, Ling

    Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will generate a complete history of all the individual locations that it occupied at every point in time. The movement trails of such RFID data form gigantic commodity flowgraph representing the locations and durations of the path stages traversed by each item. In this paper, we use graph to construct a warehouse of RFID commodity flows, and introduce a database-style operation to summarize graphs, which produces a summary graph by grouping nodes based on user-selected node attributes, further allows users to control the hierarchy of summaries. It can cut down the size of graphs, and provide convenience for users to study just on the shrunk graph which they interested. Through extensive experiments, we demonstrate the effectiveness and efficiency of the proposed method.

  15. Legal Regulation and Consumers: The RFID Industry's Perspective

    Science.gov (United States)

    Ronzani, Daniel

    Many journal articles have presented research on the adoption and diffusion of Radio Frequency Identification (RFID) from a regulatory or consumer perspective. This research takes a reverse viewpoint. It researches the industry's experience with regulation by law and its experience with consumers. First, semi-structured interviews with RFID industry stakeholders are conducted on the topics of (UHF) frequency law, database law, and privacy law. Second, the industry's experience with (i) regulation by law and (ii) the consumers is collected in a worldwide online survey with companies and organisations that research, produce, sell, and consult on RFID technology. Third, empirical data is evaluated by different territories and industries to discuss four observations about legal regulation and consumers made by the authors with four feedback observations from the online survey. Given the evaluation of the empirical data, this article recommends that the RFID industry engage in better constructive dialogue with the legal regulator , strengthen its knowledge on applicable legislation, and re-evaluate its information policy to the consumer.

  16. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Dong, Qingkuan; Tong, Jiaqing; Chen, Yuan

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  17. WiFi RFID demonstration for resource tracking in a statewide disaster drill.

    Science.gov (United States)

    Cole, Stacey L; Siddiqui, Javeed; Harry, David J; Sandrock, Christian E

    2011-01-01

    To investigate the capabilities of Radio Frequency Identification (RFID) tracking of patients and medical equipment during a simulated disaster response scenario. RFID infrastructure was deployed at two small rural hospitals, in one large academic medical center and in two vehicles. Several item types from the mutual aid equipment list were selected for tracking during the demonstration. A central database server was installed at the UC Davis Medical Center (UCDMC) that collected RFID information from all constituent sites. The system was tested during a statewide disaster drill. During the drill, volunteers at UCDMC were selected to locate assets using the traditional method of locating resources and then using the RFID system. This study demonstrated the effectiveness of RFID infrastructure in real-time resource identification and tracking. Volunteers at UCDMC were able to locate assets substantially faster using RFID, demonstrating that real-time geolocation can be substantially more efficient and accurate than traditional manual methods. A mobile, Global Positioning System (GPS)-enabled RFID system was installed in a pediatric ambulance and connected to the central RFID database via secure cellular communication. This system is unique in that it provides for seamless region-wide tracking that adaptively uses and seamlessly integrates both outdoor cellular-based mobile tracking and indoor WiFi-based tracking. RFID tracking can provide a real-time picture of the medical situation across medical facilities and other critical locations, leading to a more coordinated deployment of resources. The RFID system deployed during this study demonstrated the potential to improve the ability to locate and track victims, healthcare professionals, and medical equipment during a region-wide disaster.

  18. Survey of RFID and Its Application to International Ocean/Air Container Tracking

    Science.gov (United States)

    Katayama, Minoru; Nakada, Hiroshi; Hayashi, Hitoshi; Shimizu, Masashi

    “Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Active RFID is more advantageous than passive RFID and enables higher data reading performance over longer distances. This paper surveys active RFID systems, the services they currently promise to provide, technical problems common to these services, and the direction in which research should head in the future. It also reports the results of EPCglobal (EPC: Electronic Product Code) pilot tests conducted on global logistics for tracking ocean/air container transportation using active RFID systems for which we developed several new types of active RFID tags. The test results confirm that our active RFID tags have sufficient capability and low power consumption to well support ocean/air transportation and logistics service.

  19. Gas Identification Using Passive UHF RFID Sensor Platform

    Directory of Open Access Journals (Sweden)

    Muhammad Ali AKBAR

    2015-11-01

    Full Text Available The concept of passive Radio Frequency Identification (RFID sensor tag is introduced to remove the dependency of current RFID platforms on battery life. In this paper, a gas identification system is presented using passive RFID sensor tag along with the processing unit. The RFID system is compliant to Electronics Product Code Generation 2 (EPC-Gen2 protocol in 902-928 MHz ISM band. Whereas the processing unit is implemented and analyzed in software and hardware platforms. The software platform uses MATLAB, whereas a High Level Synthesis (HLS tool is used to implement the processing unit on a Zynq platform. Moreover, two sets of different gases are used along with Principal Component Analysis (PCA and Linear Discriminant Analysis (LDA based feature reduction approaches to analyze in detail the best feature reduction approach for efficient classification of gas data. It is found that for the first set of gases, 90 % gases are identified using first three principal components, which is 7 % more efficient than LDA. However in terms of hardware overhead, LDA requires 50 % less hardware resources than PCA. The classification results for the second set of gases reveal that 91 % of gas classification is obtained using LDA and first four PCA, while LDA requires 52 % less hardware resources than PCA. The RFID tag used for transmission is implemented in 0.13 µm CMOS process, with simulated average power consumption of 2.6 µW from 1.2 V supply. ThingMagic M6e embedded reader is used for RFID platform implementation. It shows an output power of 31.5 dBm which allows a read range up to 9 meters.

  20. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    Science.gov (United States)

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  1. Efficient Key Management System for Large-scale Smart RFID Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  2. Documentation package for the RFID temperature monitoring system (Model 9977 packages at NTS)

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.

    2009-01-01

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  3. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  4. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  5. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin

    2011-07-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without an integrated negative impedance converter designed to cancel out the antenna\\'s input capacitance at resonance frequency was designed, simulated, constructed and measured for implementation in RFID applications. © 2011 IEEE.

  6. PHASE II VAULT TESTING OF THE ARGONNE RFID SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-06-25

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step

  7. Phase II Vault Testing of the Argonne RFID System

    International Nuclear Information System (INIS)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-01-01

    The U.S. Department of Energy (DOE) (Environmental Management (EM), Office of Packaging and Transportation (EM-45)) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase

  8. RAC-Multi: Reader Anti-Collision Algorithm for Multichannel Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Kwangcheol Shin

    2009-12-01

    Full Text Available At present, RFID is installed on mobile devices such as mobile phones or PDAs and provides a means to obtain information about objects equipped with an RFID tag over a multi-channeled telecommunication networks. To use mobile RFIDs, reader collision problems should be addressed given that readers are continuously moving. Moreover, in a multichannel environment for mobile RFIDs, interference between adjacent channels should be considered. This work first defines a new concept of a reader collision problem between adjacent channels and then suggests a novel reader anti-collision algorithm for RFID readers that use multiple channels. To avoid interference with adjacent channels, the suggested algorithm separates data channels into odd and even numbered channels and allocates odd-numbered channels first to readers. It also sets an unused channel between the control channel and data channels to ensure that control messages and the signal of the adjacent channel experience no interference. Experimental results show that suggested algorithm shows throughput improvements ranging from 29% to 46% for tag identifications compared to the GENTLE reader anti-collision algorithm for multichannel RFID networks.

  9. Radio Frequency Identification (RFID technology and patient safety

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2013-01-01

    Full Text Available Background: Radio frequency identification (RFID systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS and electronic health records (EHRs and support it by clinical decision support systems (CDSS, it facilitates processes and reduce medical, medication and diagnosis errors.

  10. Radio Frequency Identification (RFID) technology and patient safety

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors. PMID:24381626

  11. Design of a Child Localization System on RFID and Wireless Sensor Networks

    OpenAIRE

    Chen, Chao

    2010-01-01

    Radio Frequency Identification (RFID) and wireless sensor networks are wireless technologies that rapidly emerge and show great potential. Combining RFID and wireless sensor networks provides a cost-efficient way to expand the RFID system's range and to enable an RFID system in areas without a network infrastructure. These two technologies are employed to build a wireless localization system in a children's theme park. The main purpose of this child localization system is to track and locate ...

  12. Integrated algorithms for RFID-based multi-sensor indoor/outdoor positioning solutions

    Science.gov (United States)

    Zhu, Mi.; Retscher, G.; Zhang, K.

    2011-12-01

    Position information is very important as people need it almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques but these techniques are difficult to be used indoors since GPS signal reception is limited. The alternative techniques that can be used for indoor positioning include, to name a few, Wireless Local Area Network (WLAN), bluetooth and Ultra Wideband (UWB) etc.. However, all of these have limitations. The main objectives of this paper are to investigate and develop algorithms for a low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) and its integration with other positioning systems. An RFID system consists of three components, namely a control unit, an interrogator and a transponder that transmits data and communicates with the reader. An RFID tag can be incorporated into a product, animal or person for the purpose of identification and tracking using radio waves. In general, for RFID positioning in urban and indoor environments three different methods can be used, including cellular positioning, trilateration and location fingerprinting. In addition, the integration of RFID with other technologies is also discussed in this paper. A typical combination is to integrate RFID with relative positioning technologies such as MEMS INS to bridge the gaps between RFID tags for continuous positioning applications. Experiments are shown to demonstrate the improvements of integrating multiple sensors with RFID which can be employed successfully for personal positioning.

  13. A Model of Traceability for Equipments Using RFID Tehnologies within an Integrated System

    Directory of Open Access Journals (Sweden)

    Radu LIXANDROIU

    2006-01-01

    Full Text Available Radio Frequency Identification (RFID is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tagss or transponders. An advanced automatic identification technology such as the Auto-ID system based on the Radio Frequency Identification (RFID technology has two values for inventory systems. First, the visibility provided by this technology allows an accurate knowledge on the inventory level by eliminating the discrepancy between inventory record and physical inventory. Second, the RFID technology can prevent or reduce the sources of errors. Benefits of using RFID include the reduction of labor costs, the simplification of business processes and the reduction of inventory inaccuracies. Also, RFID technology allows an knowledge on the traceability of equipments in a organization.

  14. Evaluation of Efficiency Improvement in Vital Documentation Using RFID Devices.

    Science.gov (United States)

    Kimura, Eizen; Nakai, Miho; Ishihara, Ken

    2016-01-01

    We introduced medical devices with RFID tags and the terminal with RFID reader in our hospital. Time study was conducted in two phases. In phase I, nurses round as usual, and in phase II, the nurse round the ward with a terminal installed on a cart. This study concluded that RFID system shortens the time for vital sign documentation. However, deploying the terminals at every bedside did not contribute the more time reduction.

  15. RFID technology in health environment opportunities and challenges for modern cancer care.

    Science.gov (United States)

    Safdari, Reza; Maserat, Elham; Maserat, Elnaz

    2012-01-01

    Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

  16. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    Science.gov (United States)

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  17. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    Science.gov (United States)

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.

  18. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Science.gov (United States)

    Meng, Zhaozong; Li, Zhen

    2016-12-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC), ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  19. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Directory of Open Access Journals (Sweden)

    Meng Zhaozong

    2016-12-01

    Full Text Available The Radio Frequency Identification (RFID technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC, ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  20. A Security Mechanism for library management system using low cost RFID tags

    Directory of Open Access Journals (Sweden)

    V. Nagalakshmi

    2007-02-01

    Full Text Available Radio Frequency Identification (RFID systems will become pervasive in our daily lives due to their low cost and easy to use characteristics[1]. This paper presents a methodology of using low cost RFID tags for a library management system to protect the books from unauthorized capturing and usage. Every object to be identified in the RFID system is physically labeled with a tag. In the proposed method a book or a magazine or a CD is identified with the RFID tag. Whenever a book is issued to any user of the library, the RFID reader will capture the information of that book and compares it with the related information of the book in the Online Public Access Catalogue (OPAC and issues the book to the user depending on his identity in the database. If any unauthorized person intends to take the book the RFID reader will immediately respond to that and make sure that it was not issued. If any body tries to remove the tag it can be traced with the help of location device. Keywords: RFID, OPAC, Unauthorized user, tag, Reader.

  1. Multiresonator-Based Chipless RFID Barcode of the Future

    CERN Document Server

    Preradovic, Stevan

    2012-01-01

    This vital new resource offers engineers and researchers a window on important new technology that will supersede the barcode and is destined to change the face of logistics and product data handling. In the last two decades, radio-frequency identification has grown fast, with accelerated take-up of RFID into the mainstream through its adoption by key users such as Wal-Mart, K-Mart and the US Department of Defense. RFID has many potential applications due to its flexibility, capability to operate out of line of sight, and its high data-carrying capacity. Yet despite optimistic projections of a market worth $25 billion by 2018, potential users are concerned about costs and investment returns. Clearly demonstrating the need for a fully printable chipless RFID tag as well as a powerful and efficient reader to assimilate the tag’s data, this book moves on to describe both. Introducing the general concepts in the field including technical data, it then describes how a chipless RFID tag can be made using a planar...

  2. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Science.gov (United States)

    2010-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  3. Incorporating business process management into RFID-enabled application systems

    NARCIS (Netherlands)

    Zhao, X.; Liu, C.; Lin, T.

    2010-01-01

    Purpose – The emergence of radio frequency identification (RFID) technology promises enormous opportunities to shift business process automation up to the wire level. The purpose of this paper is to explore the methodology of incorporating business logics into RFID edge systems, and thereby

  4. A study of RFID application impacts on medical safety.

    Science.gov (United States)

    Chang, She-I; Ou, Chin-Shyh; Ku, Cheng-Yuan; Yang, Morris

    2008-01-01

    With the international reform in medical management systems gaining ground worldwide, hospital management has gradually begun to shift its focus from providing expensive medical treatment to improving medical service quality and patient safety. In this study, we discuss the application of Radio Frequency Identification (RFID) and data integrating technology with the medical service, and examine whether or not this technology can enhance medical safety. We also discuss the possible benefits following the application of the RFID system. The findings show that the application of RFID to hospitals can actually generate benefits, which can be further divided into operational structure benefits, users' structure benefits, and organisational and environmental benefits. However, not all these benefits can achieve medical safety. Among them, only the operator and environmental benefits can play such roles. Nevertheless, the application of RFID can bring hospitals towards the integration of technology benefits and improved medical safety.

  5. New IoT proximity service based heterogeneous RFID readers collision control

    Directory of Open Access Journals (Sweden)

    Jose Ignacio Tamayo Segarra

    2017-08-01

    Full Text Available Purpose – Internet of Things’ (IoT’s first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation. Design/methodology/approach – In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces

  6. Theory and experiments on Peano and Hilbert curve RFID tags

    Science.gov (United States)

    McVay, John; Hoorfar, Ahmad; Engheta, Nader

    2006-05-01

    Recently, there has been considerable interest in the area of Radio Frequency Identification (RFID) and Radio Frequency Tagging (RFTAG). This emerging area of interest can be applied for inventory control (commercial) as well as friend/foe identification (military) to name but a few. The current technology can be broken down into two main groups, namely passive and active RFID tags. Utilization of Space-Filling Curve (SFC) geometries, such as the Peano and Hilbert curves, has been recently investigated for use in completely passive RFID applications [1, 2]. In this work, we give an overview of our work on the space-filling curves and the potential for utilizing the electrically small, resonant characteristics of these curves for use in RFID technologies with an emphasis on the challenging issues involved when attempting to tag conductive objects. In particular, we investigate the possible use of these tags in conjunction with high impedance ground-planes made of Hilbert or Peano curve inclusions [3, 4] to develop electrically small RFID tags that may also radiate efficiently, within close proximity of large conductive objects [5].

  7. Group-ID based RFID Mutual Authentication

    Directory of Open Access Journals (Sweden)

    LEE, Y.

    2013-11-01

    Full Text Available For passive type RFID tags, EPCglobal Class 1 Generation-2 Revision is used widely as a de facto standard. As it was designed for low cost, it is quite vulnerable to security issues, such as privacy concerns. This paper presents a new RFID mutual authentication protocol, which is designed to be configured on EPC Gen2 platform and to meet various security requirements while providing efficiency using PRNG (Pseudo Random Number Generator. Group-ID is used to minimize the authentication time. Security analysis of the proposed protocol is discussed.

  8. Using Interference to Block RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag.......We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag....

  9. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    Science.gov (United States)

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity.

  10. Design of a covert RFID tag network for target discovery and target information routing.

    Science.gov (United States)

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  11. Determinants of RFID adoption in Malaysia's healthcare industry: occupational level as a moderator.

    Science.gov (United States)

    Zailani, Suhaiza; Iranmanesh, Mohammad; Nikbin, Davoud; Beng, Jameson Khoo Cheong

    2015-01-01

    With today's highly competitive market in the healthcare industry, Radio Frequency Identification (RFID) is a technology that can be applied by hospitals to improve operational efficiency and to gain a competitive advantage over their competitors. The purpose of this study is to investigate the factors that may effect RFID adoption in Malaysia's healthcare industry. In addition, the moderating role of occupational level was tested. Data was collected from 223 managers as well as healthcare and supporting staffs. This data was analyzed using the partial least squares technique. The results show that perceived ease of use and usefulness, government policy, top management support, and security and privacy concerns have an effect on the intent to adopt RFID in hospitals. There is a wide gap between managers and healthcare staff in terms of the factors that influence RFID adoption. The results of this study will help decision makers as well as managers in the healthcare industry to better understand the determinants of RFID adoption. Additionally, it will assist in the process of RFID adoption, and therefore, spread the usage of RFID technology in more hospitals.

  12. RFID applications in transportation operation and intelligent transportation systems (ITS).

    Science.gov (United States)

    2009-06-01

    Radio frequency identification (RFID) transmits the identity of an object or a person wirelessly. It is grouped under : the broad category of automatic identification technologies with corresponding standards and established protocols. : RFID is suit...

  13. RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, they will allow smart washing machines to check for incompatible clothes (e.g., white shirts and red socks) and smart

  14. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    Directory of Open Access Journals (Sweden)

    Isabel Expósito

    2013-01-01

    Full Text Available The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a winery, a brewery, or any other beverage factory.

  15. RFID Reconsidered : what you need to know before investing in the latest self-check

    OpenAIRE

    Featherstone, Robin

    2006-01-01

    Radio Frequency Identification (RFID) Technology has the potential to revolutionize library services. However - not unlike the internet - RFID technology is evolving faster than the guidelines to guard against misuse. What effect will eventual RFID legislation have on North American libraries? Will potential benefits be overshadowed by security and privacy concerns? Is RFID technology a blessing or a curse?

  16. Documentation pckage for the RFID temperature monitoring system (Of Model 9977 packages at NTS).

    Energy Technology Data Exchange (ETDEWEB)

    Chen, K.; Tsai, H.; Decision and Information Sciences

    2009-02-20

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  17. Healthcare in Disasters and the Role of RFID.

    Science.gov (United States)

    Madanian, Samaneh; Parry, David; Norris, Tony

    2015-01-01

    Disasters either natural or man-made are inevitable, and therefore disaster management has always been an important function of government. Since during a disaster healthcare is often adversely affected, a lot of effort has been made in terms of researching effective responses and ways of improving the quality of delivered care to direct casualties and the rest of the community. In this regard, information technology plays an important role to help healthcare systems achieve this goal. One of these technologies that has become popular recently is Radio-Frequency Identification (RFID). This paper explores the relationship between emergency management and disaster healthcare and examines the role of RFID. It is suggested that RFID will become an integral part of disaster healthcare and a means of improving response performance.

  18. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  19. development of a development of a rfid and rfid based library

    African Journals Online (AJOL)

    eobe

    This system use RFID technology to track books ..... The total power requirements for safe operation of the design is 5V at 1.7A, ... Using a 12V, 2A battery with the aid of LM7805, the 5V required ..... But with this system adopted and used, time.

  20. Development of corrosion condition sensing and monitoring system using radio-frequency identification devices (RFID)

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Zheng, W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-05-15

    This study discussed the development of a corrosion sensing and monitoring system for military land vehicles. Radio-frequency identification device (RFID) technology uses radio waves to identify individual masses with RFID tags attached. A corrosion-sensing element was integrated with the RFID technology, which incorporated a galvanic corrosion cell designed to trigger RFID tags. Corrosion severity was then related to the galvanic current. The tag recorded the sensor reading and transmitted the data to an RFID reader. The tags consisted of a microchip and an antenna. A software development kit has also been developed to interface RFID data with existing applications. While it is currently not possible to modify the RFID tags to prevent security risks, further research is being conducted to assemble a data-logger system with corrosion probes to measure humidity, electrical resistance, and linear polarization resistance. Studies will also be conducted to assemble an active tag reader system and investigate potential modifications. 4 refs., 1 fig., 1 appendix.

  1. Ni ofelias ni amazonas, sino seres completos: aproximación a Teresa de Escoriaza

    Directory of Open Access Journals (Sweden)

    Palenque, Marta

    2006-06-01

    Full Text Available Teresa de Escoriaza is one of the first foreign correspondent in the spanish journalism history and was a reporter in the Melilla war in 1921. She was an active defending counsel of women rights too. Also as a professor of Spanish in EE.UU. she was a pioneer. She lived in New York during a lot of years and around it wrote some articles and a novel: El crisol de las razas (1929. This essay research about her life and work as writer and professor.Teresa de Escoriaza es una de las primeras corresponsales en el extranjero de la historia del periodismo español y ejerció como reportera en la Guerra de África, en 1921. También fue una activa defensora de los derechos de la mujer. Su labor como pionera se observa, además, en su trabajo como profesora de español en los EE.UU. Vivió muchos años en Nueva York, ciudad en torno a la que escribió varias crónicas y una novela: El crisol de las razas (1929. Este ensayo investiga acerca de su biografía y su labor como escritora y docente.

  2. Radio Frequency Identification (RFID): its usage and libraries

    OpenAIRE

    Rafiq, Muhammad

    2004-01-01

    Radio Frequency Identification (RFID) is one of the most exciting technologies that revolutionize the working practices by increasing efficiencies, and improving profitability. The article provides details about RFID, its components, how it works, and its usage in different sectors i.e. retail sales and supply chains, livestock industry, courier services, military and prisons, automobiles and logistics, entertainment industry, publishing industry, wireless transaction, and, especially, in...

  3. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Science.gov (United States)

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  4. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Myong-Soon Park

    2011-07-01

    Full Text Available RFID (Radio frequency identification and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  5. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  6. Experimental Assessment of Orientation Sensing and Constructive Interference in Passive RFID Systems

    DEFF Research Database (Denmark)

    Krigslund, Rasmus

    2012-01-01

    This thesis focus on passive Radio Frequency IDentication (RFID), a tech- nology designed for automated identication of tagged objects. The tags are small passive devices powered by the wireless signal from the reader. Their simple operation thus solely allows them to reply with their unique ID...... when requested by the reader, which is a high power handheld or stationary transceiver. The RFID technology has matured over the past two decades, but still there exist ambiguities regarding the reading, or interrogation, of tags. Due to the passive nature of the tags, they are severely aected...... experience. Moreover, this thesis proposes to use passive RFID tags as orientation sensors. This is an innovative application for RFID technology in itself, but orientation sensing can also help existing RFID applications that relies on the Received Signal Strength (RSS) in the tag reply. Many Ultra High...

  7. A split-path schema-based RFID data storage model in supply chain management.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong; Zhang, Jianfeng

    2013-05-03

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance.

  8. A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Jianfeng Zhang

    2013-05-01

    Full Text Available In modern supply chain management systems, Radio Frequency IDentification (RFID technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance.

  9. Tunable Platform Tolerant Antenna Design for RFID and IoT Applications Using Characteristic Mode Analysis

    Directory of Open Access Journals (Sweden)

    Abubakar Sharif

    2018-01-01

    Full Text Available Radio frequency identification (RFID is a key technology to realize IoT (Internet of Things dreams. RFID technology has been emerging in sensing, identification, tracking, and localization of goods. In order to tag a huge number of things, it is cost-effective to use one RFID antenna for tagging different things. Therefore, in this paper a platform tolerant RFID tag antenna with tunable capability is proposed. The proposed tag antenna is designed and optimized using characteristic mode analysis (CMA. Moreover, this tag antenna consists of a folded patch wrapped around FR 4 substrate and a feeding loop element printed on a paper substrate. The inductive feeding loop is stacked over folded patch and it provides impedance match with RFID chip. Because of separate radiating and feeding element, this tag antenna has a versatility of impedance matching with any RFID chip. Furthermore, this tag is able to cover American RFID band (902–928 MHz and can be tuned to European RFID band (865–868 MHz by adding tunable strips. In order to demonstrate platform tolerant operation, the read range of RFID tag is measured by mounting it on different materials. The maximum read range of RFID tag is 4.5 m in free space or on dielectrics and 6.5 m above 200 × 200 mm2 metal plate, respectively.

  10. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    International Nuclear Information System (INIS)

    Kiama, J W; Patrick, T H H; Raman, V

    2014-01-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity

  11. Studying RFID Consumer Acceptance Using TAM: the Case of IUST Students

    Directory of Open Access Journals (Sweden)

    Ahad Zare Ravasan

    2012-02-01

    Full Text Available Radio frequency identification (RFID technology is used in numerous applications and offers a plethora of interesting potential new applications. However, this potential raises issues that require addressing to achieve its widespread acceptance by consumers. This paper investigated the factors that affect consumer acceptance of RFID technology using the technology acceptance model (TAM. To this end, a questionnaire was prepared and distributed among Iran University of Science and Technology (IUST students and gathered data were analyzed using multivariable linear regression method. The results proposed that convenience, culture, and regulation were the principal factors influencing the consumers’ acceptance of RFID. The results of the paper can provide insight to organizations in providing RFID enabled products to their customers and also facilitated its development in the society.

  12. Roadmap for RFID Implementation in Central library, PEC University of Technology

    OpenAIRE

    Vasishta, Seema

    2009-01-01

    This paper gives brief idea about the emerging Radio Frequency Identification (RFID) technology, its importance in the library management system and its working. It also describes about the basic and optional components required for smooth working of the exercise. The aim is to consider how to extend RFID applications in an academic library keeping in view the scantiness of funds and scarcity of supporting staff. The article also illustrates a vivid picture about how RFID technology is acting...

  13. UHF RFID tag implementation on cork substrate for wine bottle monitoring

    OpenAIRE

    Rima Martí, Sergi; Georgiadis, Apostolos

    2013-01-01

    Wine industry is starting to deploy RFID technology for production control, logistics or innovative marketing. However, identifying wine bottles is difficult due to the unfavorable material content for the operation of the antennas. The thesis consists on the implementation of a UHF RFID tag placed on cork substrate in order to provide a feasible way of identifying wine packaged bottle. The proposed RFID tag consists on a meandered line dipole antenna, designed to be conformed so that it can ...

  14. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  15. High-level managers' considerations for RFID adoption in hospitals: an empirical study in Taiwan.

    Science.gov (United States)

    Lai, Hui-Min; Lin, I-Chun; Tseng, Ling-Tzu

    2014-02-01

    Prior researches have indicated that an appropriate adoption of information technology (IT) can help hospitals significantly improve services and operations. Radio Frequency Identification (RFID) is believed to be the next generation innovation technology for automatic data collection and asset/people tracking. Based on the Technology-Organization-Environment (TOE) framework, this study investigated high-level managers' considerations for RFID adoption in hospitals. This research reviewed literature related IT adoption in business and followed the results of a preliminary survey with 37 practical experts in hospitals to theorize a model for the RFID adoption in hospitals. Through a field survey of 102 hospitals and hypotheses testing, this research identified key factors influencing RFID adoption. Follow-up in-depth interviews with three high-level managers of IS department from three case hospitals respectively also presented an insight into the decision of RFID's adoption. Based on the research findings, cost, ubiquity, compatibility, security and privacy risk, top management support, hospital scale, financial readiness and government policy were concluded to be the key factors influencing RFID adoption in hospitals. For practitioners, this study provided a comprehensive overview of government policies able to promote the technology, while helping the RFID solution providers understand how to reduce the IT barriers in order to enhance hospitals' willingness to adopt RFID.

  16. Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic.

    Science.gov (United States)

    Min, Daiki; Yih, Yuehwern

    2011-06-01

    This study is motivated by the observations on the data collected by radio frequency identification (RFID) readers in a pilot study, which was used to investigate the feasibility of implementing an RFID-based monitoring system in an outpatient eye clinic. The raw RFID data collected from RFID readers contain noise and missing reads, which prevent us from determining the tag location. In this paper, fuzzy logic-based algorithms are proposed to interpret the raw RFID data to extract accurate information. The proposed algorithms determine the location of an RFID tag by evaluating its possibility of presence and absence. To evaluate the performance of the proposed algorithms, numerical experiments are conducted using the data observed in the outpatient eye clinic. Experiments results showed that the proposed algorithms outperform existing static smoothing method in terms of minimizing both false positives and false negatives. Furthermore, the proposed algorithms are applied to a set of simulated data to show the robustness of the proposed algorithms at various levels of RFID reader reliability.

  17. UHF RFID technologies for identification and traceability

    CERN Document Server

    Laheurte, Jean-Marc; Paret, Dominique; Loussert, Christophe

    2014-01-01

    UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or person to be automatically identified at a distance without a direct line-of-sight using a radio wave exchange. Applications include inventory tracking, prescription medication tracking and authentication, secure automobile keys, and access control for secure facilities. This book begins with an overview of UHF RFID challenges describing the applications, markets, trades and basic technologies. It follows this by highlighting the main features distinguishing UHF (860MHz-960MHz) and HF

  18. Design and optimization of an RFID-enabled passport tracking system

    Directory of Open Access Journals (Sweden)

    Abdulsalam Dukyil

    2018-01-01

    Full Text Available The implementation of RFID technology has been subject to ever-increasing popularity in relation to the traceability of products as one of the most cutting edge technologies. Implementing such a technology leads to an increase in the visibility management of products. Notwithstanding this, RFID communication performance is potentially affected by interference between the RFID devices. It is also subject to additional costs in investment that should be taken into account. Consequently, seeking a cost-effective design with a desired communication performance for RFID-enabled systems has become a key factor in order to be competitive in today’s markets. This study presents a cost and performance-effective design for a proposed RFID-enabled passport tracking system through the development of a multi-objective model that takes in account economic, performance and social criteria. The developed model is aimed at solving the design problem by (i allocating the optimal numbers of related facilities that should be established and (ii obtaining trade-offs among three objectives: minimising implementation and operational costs; minimising RFID reader interference; and maximising the social impact measured in the number of created jobs. To come closer to real design in terms of considering the uncertain parameters, the developed multi-objective model was developed in terms of a fuzzy multi-objective model (FMOM. To solve the fuzzy multi-objective optimization problem, two solution methods were used and a decision-making method was employed to select the final trade-off solution. A case study was applied to examine the applicability of the developed model and the proposed solution methods.

  19. Stage implementation of RFID in hospitals.

    Science.gov (United States)

    Kumar, Sameer; Livermont, Gregory; McKewan, Gregory

    2010-01-01

    The use of radio frequency identification device (RFID) technology within the healthcare industry was researched and specific instances of implementation of this technology in the hospital environment were examined. The study primarily makes use of ideas from operations and supply chain management, such as work flow diagrams, value stream mapping, and poka-yokes (mistake proofing measures) for investigations of processes, failures, and solutions. This study presents a step-by-step approach of how to implement the use of RFID tracking systems within the entire hospital. A number of poka-yokes were also devised for improving the safety of the patient and cost effectiveness of the hospital to insure the success of the hospital health care delivery system. Many players in the hospital environment may be impacted. This includes patients, doctors, nurses, technicians, administrators, and other hospital personnel. Insurance and government agencies may be impacted as well. Different levels of training of hospital personnel will be required based on the degree of interaction with the RFID system. References to costs, Return On Investment, change management, ethical and legal considerations are also made to help the reader understand the benefits and implications of the technology in the hospital environment.

  20. RFID:n käyttö huoltotöiden seuraamisessa

    OpenAIRE

    Penttilä, Annika

    2015-01-01

    RFID on teknologia, joka mahdollistaa esineiden ja henkilöiden tunnistamisen langattomasti. Teknologiaa on käytetty jo vuodesta 1935 asti ja tällä hetkellä sen käyttö on yleistymässä logistiikan ja kaupallisen alan apuvälineenä ja tehostamiskeinona. Tämän työn tarkoitus oli tutustua RFID-teknologiaan ja sen tuomiin etuihin. Työssä verrattiin RFID-teknologiaa samankaltaisiin muihin järjestelmiin. Työssä kerättiin tietoa ja selvitettiin, kuinka huoltoyritys mcare Oy voisi kehittää ja tehost...

  1. Exploring the Perceived Measures of Privacy: RFID in Public Applications

    Directory of Open Access Journals (Sweden)

    Mohammad Alamgir Hossain

    2014-06-01

    Full Text Available The purpose of this study is to explore the measures that may protect privacy of the users - in the context of RFID use in public applications. More specifically, this study investigates what the users perceive to have securing their privacy, particularly for the RFID applications in public uses. Qualitative research approach has been utilised for this study. The author conducted two focus-group discussion sessions and eight in-depth interviews in two countries: one from Australasia region (Australia and the other from Asia (Bangladesh, assuming that the status, and the perceptions and tolerance of the citizens on privacy issues are different in the stated regions. The explored factors have been analysed from privacy perspectives. The findings show that, in developed and developing countries, the basic perceptions of the users on privacy protection are complimentary; however, privacy is a more serious concern in Australia than in Bangladesh. Data analysis proposed some attributes that may improve users’ privacy perceptions when RFID is used in public applications. This study is the single initiative that focuses on privacy of RFID users from national-use context. As practical implication, the proposed attributes can be exercised by the deploying agencies that implement RFID technology for citizens’ use.

  2. VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Directory of Open Access Journals (Sweden)

    He Xu

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is one of the key technologies of the Internet of Things (IoT and is used in many areas, such as mobile payments, public transportation, smart lock, and environment protection. However, the performance of RFID equipment can be easily affected by the surrounding environment, such as electronic productions and metal appliances. These can impose an impact on the RF signal, which makes the collection of RFID data unreliable. Usually, the unreliability of RFID source data includes three aspects: false negatives, false positives, and dirty data. False negatives are the key problem, as the probability of false positives and dirty data occurrence is relatively small. This paper proposes a novel sliding window cleaning algorithm called VSMURF, which is based on the traditional SMURF algorithm which combines the dynamic change of tags and the value analysis of confidence. Experimental results show that VSMURF algorithm performs better in most conditions and when the tag’s speed is low or high. In particular, if the velocity parameter is set to 2 m/epoch, our proposed VSMURF algorithm performs better than SMURF. The results also show that VSMURF algorithm has better performance than other algorithms in solving the problem of false negatives for RFID networks.

  3. RFID protocol design, optimization, and security for the Internet of Things

    CERN Document Server

    Liu, Alex X; Liu, Xiulong; Li, Keqiu

    2017-01-01

    This book covers the topic of RFID protocol design and optimization and the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

  4. Miniaturized Blood Pressure Telemetry System with RFID Interface

    Directory of Open Access Journals (Sweden)

    Michele Caldara

    2016-08-01

    Full Text Available This work deals with the development and characterization of a potentially implantable blood pressure telemetry system, based on an active Radio-Frequency IDentification (RFID tag, International Organization for Standardization (ISO 15693 compliant. This approach aims to continuously measure the average, systolic and diastolic blood pressure of the small/medium animals. The measured pressure wave undergoes embedded processing and results are stored onboard in a non-volatile memory, providing the data under interrogation by an external RFID reader. In order to extend battery lifetime, RFID energy harvesting has been investigated. The paper presents the experimental characterization in a laboratory and preliminary in-vivo tests. The device is a prototype mainly intended, in a future engineered version, for monitoring freely moving test animals for pharmaceutical research and drug safety assessment purposes, but it could have multiple uses in environmental and industrial applications.

  5. Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs

    Science.gov (United States)

    Choi, Woo-Yong; Chatterjee, Mainak

    2015-03-01

    With the growing use of RFID (Radio Frequency Identification), it is becoming important to devise ways to read RFID tags in real time. Access points (APs) of IEEE 802.11-based wireless Local Area Networks (LANs) are being integrated with RFID networks that can efficiently collect real-time RFID data. Several schemes, such as multipolling methods based on the dynamic search algorithm and random sequencing, have been proposed. However, as the number of RFID readers associated with an AP increases, it becomes difficult for the dynamic search algorithm to derive the multipolling sequence in real time. Though multipolling methods can eliminate the polling overhead, we still need to enhance the performance of the multipolling methods based on random sequencing. To that extent, we propose a real-time cluster-based multipolling sequencing algorithm that drastically eliminates more than 90% of the polling overhead, particularly so when the dynamic search algorithm fails to derive the multipolling sequence in real time.

  6. Abnormal Condition Monitoring of Workpieces Based on RFID for Wisdom Manufacturing Workshops

    Directory of Open Access Journals (Sweden)

    Cunji Zhang

    2015-12-01

    Full Text Available Radio Frequency Identification (RFID technology has been widely used in many fields. However, previous studies have mainly focused on product life cycle tracking, and there are few studies on real-time status monitoring of workpieces in manufacturing workshops. In this paper, a wisdom manufacturing model is introduced, a sensing-aware environment for a wisdom manufacturing workshop is constructed, and RFID event models are defined. A synthetic data cleaning method is applied to clean the raw RFID data. The Complex Event Processing (CEP technology is adopted to monitor abnormal conditions of workpieces in real time. The RFID data cleaning method and data mining technology are examined by simulation and physical experiments. The results show that the synthetic data cleaning method preprocesses data well. The CEP based on the Rifidi® Edge Server technology completed abnormal condition monitoring of workpieces in real time. This paper reveals the importance of RFID spatial and temporal data analysis in real-time status monitoring of workpieces in wisdom manufacturing workshops.

  7. Abnormal Condition Monitoring of Workpieces Based on RFID for Wisdom Manufacturing Workshops

    Science.gov (United States)

    Zhang, Cunji; Yao, Xifan; Zhang, Jianming

    2015-01-01

    Radio Frequency Identification (RFID) technology has been widely used in many fields. However, previous studies have mainly focused on product life cycle tracking, and there are few studies on real-time status monitoring of workpieces in manufacturing workshops. In this paper, a wisdom manufacturing model is introduced, a sensing-aware environment for a wisdom manufacturing workshop is constructed, and RFID event models are defined. A synthetic data cleaning method is applied to clean the raw RFID data. The Complex Event Processing (CEP) technology is adopted to monitor abnormal conditions of workpieces in real time. The RFID data cleaning method and data mining technology are examined by simulation and physical experiments. The results show that the synthetic data cleaning method preprocesses data well. The CEP based on the Rifidi® Edge Server technology completed abnormal condition monitoring of workpieces in real time. This paper reveals the importance of RFID spatial and temporal data analysis in real-time status monitoring of workpieces in wisdom manufacturing workshops. PMID:26633418

  8. RFID in libraries a step toward interoperability

    CERN Document Server

    Ayre, Lori Bowen

    2012-01-01

    The approval by The National Information Standards Organization (NISO) of a new standard for RFID in libraries is a big step toward interoperability among libraries and vendors. By following this set of practices and procedures, libraries can ensure that an RFID tag in one library can be used seamlessly by another, assuming both comply, even if they have different suppliers for tags, hardware, and software. In this issue of Library Technology Reports, Lori Bowen Ayre, an experienced implementer of automated materials handling systems, Provides background on the evolution of the standard

  9. Extended-Range Passive RFID and Sensor Tags

    Science.gov (United States)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  10. Isolation and maintenance at Evonik using RFID technology; Freischaltung und Wartung mit Einsatz der RFID-Technologie bei Evonik

    Energy Technology Data Exchange (ETDEWEB)

    Rall, Hueseyin [Evonik Steag GmbH, Herne (Germany). Kraftwerksgruppe Ruhr-Ost; Stephan, Martin [Evonik Energy Services GmbH, Essen (Germany). Betriebsmanagement

    2010-07-01

    Work orders or permits of maintenance and/or control systems are partly dealt with manually. The benefit that is achieved by introducing mobile devices to display all required information at the work place will further be increased by use of the RFID-technology. This is achieved through better work assistance, reduced probability for errors and a significantly reduced amount of working hours. Evonik has developed several RFID-supported applications for mobile maintenance that support different backend-systems (e.g. SAP). This article concentrates on applications for work permit and maintenance that have been introduced at several power plant sites. (orig.)

  11. RFID in the blood supply chain--increasing productivity, quality and patient safety.

    Science.gov (United States)

    Briggs, Lynne; Davis, Rodeina; Gutierrez, Alfonso; Kopetsky, Matthew; Young, Kassandra; Veeramani, Raj

    2009-01-01

    As part of an overall design of a new, standardized RFID-enabled blood transfusion medicine supply chain, an assessment was conducted for two hospitals: the University of Iowa Hospital and Clinics (UIHC) and Mississippi Baptist Health System (MBHS). The main objectives of the study were to assess RFID technological and economic feasibility, along with possible impacts to productivity, quality and patient safety. A step-by-step process analysis focused on the factors contributing to process "pain points" (errors, inefficiency, product losses). A process re-engineering exercise produced blueprints of RFID-enabled processes to alleviate or eliminate those pain-points. In addition, an innovative model quantifying the potential reduction in adverse patient effects as a result of RFID implementation was created, allowing improvement initiatives to focus on process areas with the greatest potential impact to patient safety. The study concluded that it is feasible to implement RFID-enabled processes, with tangible improvements to productivity and safety expected. Based on a comprehensive cost/benefit model, it is estimated for a large hospital (UIHC) to recover investment from implementation within two to three years, while smaller hospitals may need longer to realize ROI. More importantly, the study estimated that RFID technology could reduce morbidity and mortality effects substantially among patients receiving transfusions.

  12. Tag-to-Tag Interference Suppression Technique Based on Time Division for RFID

    Directory of Open Access Journals (Sweden)

    Grishma Khadka

    2017-01-01

    Full Text Available Radio-frequency identification (RFID is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is already well established in technical areas, and many companies have developed corresponding standards and measurement techniques. In the construction industry, effective monitoring of materials and equipment is an important task, and RFID helps to improve monitoring and controlling capabilities, in addition to enabling automation for construction projects. However, on construction sites, there are many tagged objects and multiple RFID tags that may interfere with each other’s communications. This reduces the reliability and efficiency of the RFID system. In this paper, we propose an anti-collision algorithm for communication between multiple tags and a reader. In order to suppress interference signals from multiple neighboring tags, the proposed algorithm employs the time-division (TD technique, where tags in the interrogation zone are assigned a specific time slot so that at every instance in time, a reader communicates with tags using the specific time slot. We present representative computer simulation examples to illustrate the performance of the proposed anti-collision technique for multiple RFID tags.

  13. EVALUATION OF RFID APPLICATION IN APPAREL RETAIL IN SUPPLIER AND CUSTOMER CHAINS

    Directory of Open Access Journals (Sweden)

    Ribeiro, P. C. C.

    2015-12-01

    Full Text Available This article aims to evaluate the application of RFID in retail apparel stock. The use of RFID in Brazil has been limited to large enterprises and supply operations, not in the retail supply chain link. Therefore, this article brings interesting findings about RFID and its application in retail. The case study was used such as qualitative research approach and semi-structured interview. For this method, a roadmap of open and closed questions was used. Data were analyzed by checking all the points of the questionnaires from the literature review, which were organized with field research to complete the discussion of the case. Both interviewers agreed as to the advantages of RFID: an average return; new opportunities; high contribution to the company; reduction of time taken for inventory. With regard to disadvantages, the first interviewer noted the interference of RFID tag, and the second interviewer disagreed. The research revealed that RFID takes greater accuracy and better inventory management; fewer out-of-stock events; timely replenishment; maintenance costs reduction of inventory; level of high customer service; agility of payment in cashiers; best shopping experience; and better prevention of losses. One of the problems identified was the registration of products on the client.

  14. RFID tags as a direct tracer for water and sediment dynamics

    Science.gov (United States)

    Sommerer, Erik; Plate, Simon; Güntner, Andreas

    2014-05-01

    RFID (Radio Frequency IDentification) is a wireless automatic identification system to track objects with widespread application in industrial operations, but also selected applications in ecological research (animal tracking) and for hydro-sedimentological studies (sediment transport with RFID tags embedded in bedload material). In this study, for the first time, we test and apply RFID tags as a direct tracer to track water pathways, erosion patterns and sediment transport on the surface at the hillslope and headwater scale. The RFID system used here consists of tags with a size of 12 x 2 mm and a combination of mobile and stationary antennas. The transport pathways and velocities of the RFID tags can be individually assessed due to their unique identification numbers. The study area is a badland of easily erodible marls and carbonates located in the Villacarli catchment (42 km²) in the Central Spanish Pyrenees. The badlands have been identified as one of the main sediment sources for siltation of the downstream Barasona Reservoir. More than 700 tags were placed in different terrain units using three experimental setups, including lab experiments: (i) intensive feasibility tests ranging from laboratory flume experiments to tracer studies under natural channel and slope conditions to compare the transport of RFID tags relative to colored particles of the natural sediment; (ii) several transects across the badland to investigate sediment transfer characteristics on different morphological units (i.e. channel, rills, slopes); (iii) a raster of 99 RFID tags covering a slope flank with vegetated and unvegetated parts to reveal the influence of vegetation to erosion and transport processes. The detection of transported tags was carried out with a mobile antenna system to map the spatial distribution of tags after selected rainfall events and with two stationary antennas in channel cross-sections for time-continuous observation of tag passage. From the observations, we

  15. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    Science.gov (United States)

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  16. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  17. A New Ultra-lightweight Authentication Protocol for Low Cost RFID Tags

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2013-05-01

    Full Text Available The Radio Frequency Identification (RFID system has been widely used in almost every aspects of the society. At present, the problem of security and privacy become a key factor of severely blocking the widespread of its usage. However, due to restraints on RFID tag’s manufacturing cost, the traditional methods of encryption are not good candidate to defend the security of wireless communication channel between reader and tag. Designing lightweight or ultra-lightweight RFID authentication protocol has become a hot research topic recently. This paper proposes a new ultra-lightweight RFID authentication protocol with high robustness and execution efficiency. The proposed protocol requires only simple bit-wise operations, it has the characteristics of low storage requirement and communication cost. At the same time, through elaborate mechanism design, avoid the vulnerability of the existing ultra-lightweight authentication protocols.

  18. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  19. Muscidae, Sarcophagidae, Calliphoridae e Mesembrinellidae (Diptera da Estação Biológica de Santa Lúcia (Santa Teresa, Espírito Santo, Brasil

    Directory of Open Access Journals (Sweden)

    Leandro Silva Barbosa

    2014-01-01

    Full Text Available O primeiro registro de dípteros das famílias Muscidae, Sarcophagidae, Calliphoridae e Mesembrinellidae da Estação Biológica de Santa Lúcia (EBSL é apresentado e discutido, baseado em coletas realizadas no ano de 2007. Os exemplares foram capturados com o auxílio de armadilha adaptada de modelo proposto para lepidópteros, utilizando sardinha como isca e Malaise, além de coleta ativa com rede entomológica. Como resultado foram obtidos 1.253 espécimes, com destaque para as famílias Calliphoridae, Muscidae, Sarcophagidae e Mesembrinellidae. É discutida a dualidade gerada pela presença de espécies com baixo grau de sinantropia e outras altamente sinantrópicas, caracterizando a área de coleta como uma região de transição entre áreas rural e florestal. A observação de espécies sinantrópicas está provavelmente correlacionada ao efeito de borda. Os resultados evidenciam a importância da criação de uma zona de amortecimento no entorno da EBSL com intuito de minimizar os impactos gerados às espécies nativas.

  20. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  1. XRFID: Design of an XML Based Efficient Middleware for RFID Systems

    Directory of Open Access Journals (Sweden)

    Indrajit Bhattacharya

    2012-11-01

    existing middleware solutions show dramatic degradation in their performance when the number of simultaneously working readers increases. Our proposed solution tries to recover from that situation also. One of the major issues for large scale deployment of RFID systems is the design of a robust and flexible middleware system to interface various applications to the RFID readers. Most of the existing RFID middleware systems are costly, bulky, non‐portable and heavily dependent on the support software. Our work also provides flexibility for easy addition and removal of applications and hardware.

  2. A Data Warehouse Solution for Analyzing RFID-Based Baggage Tracking Data

    DEFF Research Database (Denmark)

    Ahmed, Tanvir; Pedersen, Torben Bach; Lu, Hua

    2013-01-01

    spatio-temporal Radio Frequency Identification (RFID) baggage tracking data. Analysis of this data can yield interesting results on baggage flow, the causes of baggage mishandling, and the parties responsible for the mishandling(airline, airport, handler,...), which can ultimately lead to improved...... with the appropriate tracking data from the data sources. The presented concepts are generalizable to other types of multi-site indoor tracking systems based on Bluetooth and RFID. The system has been tested with large amount of real-world RFID-based baggage tracking data from a major industry initiative...

  3. An Design of HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization

    Directory of Open Access Journals (Sweden)

    Jian Mi

    2016-07-01

    Full Text Available Radio frequency identification (RFID technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot.

  4. Measuring the drinking behaviour of individual pigs housed in group using radio frequency identification (RFID).

    Science.gov (United States)

    Maselyne, J; Adriaens, I; Huybrechts, T; De Ketelaere, B; Millet, S; Vangeyte, J; Van Nuffel, A; Saeys, W

    2016-09-01

    Changes in the drinking behaviour of pigs may indicate health, welfare or productivity problems. Automated monitoring and analysis of drinking behaviour could allow problems to be detected, thus improving farm productivity. A high frequency radio frequency identification (HF RFID) system was designed to register the drinking behaviour of individual pigs. HF RFID antennas were placed around four nipple drinkers and connected to a reader via a multiplexer. A total of 55 growing-finishing pigs were fitted with radio frequency identification (RFID) ear tags, one in each ear. RFID-based drinking visits were created from the RFID registrations using a bout criterion and a minimum and maximum duration criterion. The HF RFID system was successfully validated by comparing RFID-based visits with visual observations and flow meter measurements based on visit overlap. Sensitivity was at least 92%, specificity 93%, precision 90% and accuracy 93%. RFID-based drinking duration had a high correlation with observed drinking duration (R 2=0.88) and water usage (R 2=0.71). The number of registrations after applying the visit criteria had an even higher correlation with the same two variables (R 2=0.90 and 0.75, respectively). There was also a correlation between number of RFID visits and number of observed visits (R 2=0.84). The system provides good quality information about the drinking behaviour of individual pigs. As health or other problems affect the pigs' drinking behaviour, analysis of the RFID data could allow problems to be detected and signalled to the farmer. This information can help to improve the productivity and economics of the farm as well as the health and welfare of the pigs.

  5. ISS Asset Tracking Using SAW RFID Technology

    Science.gov (United States)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  6. A multi-domain trust management model for supporting RFID applications of IoT.

    Directory of Open Access Journals (Sweden)

    Xu Wu

    Full Text Available The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  7. RFID of next generation network for enhancing customer relationship management in healthcare industries.

    Science.gov (United States)

    Alzahrani, Ahmed; Qureshi, Muhammad Shuaib; Thayananthan, Vijey

    2017-10-23

    This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in healthcare industries. Customer relationship and its management techniques in a specific healthcare industry are considered in this development. The key objective of using NGN-RFID scheme is to enhance the handling of patients' data to improve the CRM efficiency in healthcare industries. The proposed NGN-RFID system is one of the valid points to improve the ability of CRM by analyzing different prior and current traditional approaches. The legacy of customer relationship management will be improved by using this modern NGN-RFID technology without affecting the novelty.

  8. Performance and Benchmarking of Multisurface UHF RFID Tags for Readability and Reliability

    Directory of Open Access Journals (Sweden)

    Joshua Bolton

    2017-01-01

    Full Text Available As the price of passive radio frequency identification (RFID tags continues to decrease, more and more companies are considering item-level tagging. Although the use of RFID is simple, its proper application should be studied to achieve maximum efficiency and utilization in the industry. This paper is intended to demonstrate the test results of various multisurface UHF tags from different manufacturers for their readability under varying conditions such as orientation of tags with respect to reader, distance of tag from the reader, and materials used for embedding tags. These conditions could affect the reliability of RFID systems used for varied applications. In this paper, we implement a Design for Six Sigma Research (DFSS-R methodology that allows for reliability testing of RFID systems. In this paper, we have showcased our results about the benchmarking of UHF RFID tags and have put forward an important observation about the blind spots observed at different distances and orientations along different surfaces, which is primarily due to the polarity of the antenna chosen.

  9. RFID and IOT for Attendance Monitoring System

    Directory of Open Access Journals (Sweden)

    Dedy Irawan Joseph

    2018-01-01

    Full Text Available In recent years, RFID technology has been widely used in various sectors, such as in-education, transportation, agriculture, animal husbandry, store sales and other sectors. RFID utilization in education is student attendance monitoring system, by using Internet of Things (IoT and Cloud technology, it will produce a real time attendance monitoring system that can be accessed by various parties, such as lecturer, campus administration and parents. With this monitoring system if there are students who are not present can be immediately discovered and can be taken immediate action and the learning process can run smoothly.

  10. Design and Development of an RFID-based HIS - A Case Study

    Directory of Open Access Journals (Sweden)

    C.H. Wu

    2011-02-01

    Full Text Available The Healthcare industry involves critical activities where small mistakes could cause huge loss of life and incur massive financial losses. Improving operational efficiency and enhancing data correctness of patients are the prime targets of using hospital information system (HIS. Radio Frequency Identification (RFID technology, with a unique ability to perform automatic data collection without any human intervention, has gained great interest in the healthcare industry. In this research, an RFID-enabled HIS is proposed for improving operations in a hospital. This research presents the fundamentals of RFID, the benefits and its challenges, and also demonstrates three improved signature applications. It aims at providing the healthcare industry with a comprehensive understanding of RFID and its suitability for healthcare applications. The proposed system is considered to be suitably operational, practical, and affordable for healthcare organizations not only in China and Hong Kong, but also in other countries

  11. Application of RFID to High-Reliability Nuclear Power Plant Construction

    International Nuclear Information System (INIS)

    Kenji Akagi; Masayuki Ishiwata; Kenji Araki; Jun-ichi Kawahata

    2006-01-01

    In nuclear power plant construction, countless variety of parts, products, and jigs more than one million are treated under construction. Furthermore, strict traceability to the history of material, manufacturing, and installation is required for all products from the start to finish of the construction, which enforce much workforce and many costs at every project. In an addition, the operational efficiency improvement is absolutely essential for the effective construction to reduce the initial investment for construction. As one solution, RFID (Radio Frequent Identification) application technology, one of the fundamental technologies to realize a ubiquitous society, currently expands its functionality and general versatility at an accelerating pace in mass-production industry. Hitachi believes RFID technology can be useful of one of the key solutions for the issues in non-mass production industry as well. Under this situation, Hitachi initiated the development of next generation plant concept (ubiquitous plant construction technology) which utilizes information and RFID technologies. In this paper, our application plans of RFID technology to nuclear power is described. (authors)

  12. Application of RFID to High-Reliability Nuclear Power Plant Construction

    Energy Technology Data Exchange (ETDEWEB)

    Akagi, Kenji; Ishiwata, Masayuki; Araki, Kenji; Kawahata, Jun-ichi [Hitachi, Ltd. (Japan)

    2006-07-01

    In nuclear power plant construction, countless variety of parts, products, and jigs more than one million are treated under construction. Furthermore, strict traceability to the history of material, manufacturing, and installation is required for all products from the start to finish of the construction, which enforce much workforce and many costs at every project. In an addition, the operational efficiency improvement is absolutely essential for the effective construction to reduce the initial investment for construction. As one solution, RFID (Radio Frequent Identification) application technology, one of the fundamental technologies to realize a ubiquitous society, currently expands its functionality and general versatility at an accelerating pace in mass-production industry. Hitachi believes RFID technology can be useful of one of the key solutions for the issues in non-mass production industry as well. Under this situation, Hitachi initiated the development of next generation plant concept (ubiquitous plant construction technology) which utilizes information and RFID technologies. In this paper, our application plans of RFID technology to nuclear power is described. (authors)

  13. RFID in healthcare: a Six Sigma DMAIC and simulation case study.

    Science.gov (United States)

    Southard, Peter B; Chandra, Charu; Kumar, Sameer

    2012-01-01

    The purpose of this paper is to develop a business model to generate quantitative evidence of the benefits of implementing radio frequency identification (RFID) technology, limiting the scope to outpatient surgical processes in hospitals. The study primarily uses the define-measure-analyze-improve-control (DMAIC) approach, and draws on various analytical tools such as work flow diagrams, value stream mapping, and discrete event simulation to examine the effect of implementing RFID technology on improving effectiveness (quality and timeliness) and efficiency (cost reduction) of outpatient surgical processes. The analysis showed significant estimated annual cost and time savings in carrying out patients' surgical procedures with RFID technology implementation for the outpatient surgery processes in a hospital. This is largely due to the elimination of both non-value added activities of locating supplies and equipment and also the elimination of the "return" loop created by preventable post operative infections. Several poka-yokes developed using RFID technology were identified to eliminate those two issues. Several poka-yokes developed using RFID technology were identified for improving the safety of the patient and cost effectiveness of the operation to ensure the success of the outpatient surgical process. Many stakeholders in the hospital environment will be impacted including patients, physicians, nurses, technicians, administrators and other hospital personnel. Different levels of training of hospital personnel will be required, based on the degree of interaction with the RFID system. Computations of costs and savings will help decision makers understand the benefits and implications of the technology in the hospital environment.

  14. An RFID-based luggage and passenger tracking system for airport security control applications

    Science.gov (United States)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  15. Tunable Platform Tolerant Antenna Design for RFID and IoT Applications Using Characteristic Mode Analysis

    OpenAIRE

    Sharif, Abubakar; Ouyang, Jun; Yang, Feng; Long, Rui; Ishfaq, Muhammad Kamran

    2018-01-01

    Radio frequency identification (RFID) is a key technology to realize IoT (Internet of Things) dreams. RFID technology has been emerging in sensing, identification, tracking, and localization of goods. In order to tag a huge number of things, it is cost-effective to use one RFID antenna for tagging different things. Therefore, in this paper a platform tolerant RFID tag antenna with tunable capability is proposed. The proposed tag antenna is designed and optimized using characteristic mode anal...

  16. MATLAB Simulation of RFID Communication Protocol for Sensor Data Acquisition

    Directory of Open Access Journals (Sweden)

    Soumen GHOSH

    2015-05-01

    Full Text Available Data acquisition processes the sampling and conditioning the signals that measure real world physical conditions such as temperature, pressure, flow etc. and convert the signal into in appropriate format for displaying and transmission to remote end. Now a days RFID i.e. Radio Frequency Identification plays a vital role in Data acquisition system. The present article proposes a smart DAS scheme containing RFID reader and Active tag. The data acquisition system is interfaced with tag through I2C bus. The reader communicates with tag following RFID communication protocol requesting to send the logged data which are refreshed and stored into tag memory periodically. The communication is simulated using MATLAB software successfully.

  17. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  18. A framework for performance and data quality assessment of Radio Frequency IDentification (RFID) systems in health care settings.

    Science.gov (United States)

    van der Togt, Remko; Bakker, Piet J M; Jaspers, Monique W M

    2011-04-01

    RFID offers great opportunities to health care. Nevertheless, prior experiences also show that RFID systems have not been designed and tested in response to the particular needs of health care settings and might introduce new risks. The aim of this study is to present a framework that can be used to assess the performance of RFID systems particularly in health care settings. We developed a framework describing a systematic approach that can be used for assessing the feasibility of using an RFID technology in a particular healthcare setting; more specific for testing the impact of environmental factors on the quality of RFID generated data and vice versa. This framework is based on our own experiences with an RFID pilot implementation in an academic hospital in The Netherlands and a literature review concerning RFID test methods and current insights of RFID implementations in healthcare. The implementation of an RFID system within the blood transfusion chain inside a hospital setting was used as a show case to explain the different phases of the framework. The framework consists of nine phases, including an implementation development plan, RFID and medical equipment interference tests, data accuracy- and data completeness tests to be run in laboratory, simulated field and real field settings. The potential risks that RFID technologies may bring to the healthcare setting should be thoroughly evaluated before they are introduced into a vital environment. The RFID performance assessment framework that we present can act as a reference model to start an RFID development, engineering, implementation and testing plan and more specific, to assess the potential risks of interference and to test the quality of the RFID generated data potentially influenced by physical objects in specific health care environments. Copyright © 2010 Elsevier Inc. All rights reserved.

  19. Is the RFID technology ready to integrate supplychain activities?

    OpenAIRE

    Chan, Hing Kai; Chan, Felix T.S.

    2008-01-01

    Radio Frequency Identification (RFID) is not a new technology andhas been introduced for military applications for a long time. Nevertheless, ithas been recognised as a device that may soon change the mode of operationsthroughout the supply chain. There is no question that the technology willreduce labour and improve accuracy in inventory management by improvinginventory visibility. However, a review of recent research and the developmentof RFID technology in supply chain related applications...

  20. Research and design on system of asset management based on RFID

    Science.gov (United States)

    Guan, Peng; Du, HuaiChang; Jing, Hua; Zhang, MengYue; Zhang, Meng; Xu, GuiXian

    2011-10-01

    By analyzing the problems in the current assets management, this thesis proposing RFID technology will be applied to asset management in order to improve the management level of automation and information. This paper designed the equipment identification based on 433MHz RFID tag and reader which was deeply studied on the basis of RFID tag and card reader circuits, and this paper also illustrates the system of asset management. The RS232 converts Ethernet is a innovative technology to transfer data to PC monitor software, and implement system of asset management based on WEB techniques (PHP and MySQL).

  1. Precise RFID localization in impaired environment through sparse signal recovery

    Science.gov (United States)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  2. Fully Printed Flexible Single-Chip RFID Tag with Light Detection Capabilities

    Directory of Open Access Journals (Sweden)

    Aniello Falco

    2017-03-01

    Full Text Available A printed passive radiofrequency identification (RFID tag in the ultra-high frequency band for light and temperature monitoring is presented. The whole tag has been manufactured by printing techniques on a flexible substrate. Antenna and interconnects are realized with silver nanoparticles via inkjet printing. A sprayed photodetector performs the light monitoring, whereas temperature measurement comes from an in-built sensor in the silicon RFID chip. One of the advantages of this system is the digital read-out and transmission of the sensors information on the RFID tag that ensures reliability. Furthermore, the use of printing techniques allows large-scale manufacturing and the direct fabrication of the tag on the desired surface. This work proves for the first time the feasibility of the embedment of large-scale organic photodetectors onto inkjet printed RFID tags. Here, we solve the problem of integration of different manufacturing techniques to develop an optimal final sensor system.

  3. Characterization of polymer silver pastes for screen printed flexible RFID antennas

    Science.gov (United States)

    Janeczek, Kamil; Jakubowska, Małgorzata; Futera, Konrad; MłoŻniak, Anna; Kozioł, GraŻyna; Araźna, Aneta

    Radio Frequency Identification (RFID) systems have become more and more popular in the last few years because of their wide application fields, such as supply chain management and logistics. To continue their development further investigations of new conductive materials for fabrication of RFID transponders' antennas are necessary to be carried out. These materials should provide high flexibility and good radiation performance of printed antennas. In this paper, two polymer silver pastes based on silver flakes were characterized with regard to manufacturing of flexible RFID antennas with screen printing technique. Foil and paper were used as a substrate materials. Surface profile of the printed antennas was measured using an optical profilometer and their resistance was measured with a four-point-probe method. Antenna flexibility was evaluated in cyclic bending tests and its performance with reflection coefficient measurements with the use of differential probe connected to a vector network analyzer. In addition, a maximum read distance of a fabricated RFID transponder was measured.

  4. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

    Directory of Open Access Journals (Sweden)

    Joon Heo

    2009-06-01

    Full Text Available Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space.

  5. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  6. RFID Presenter: A New Way to Feel a Talk

    Directory of Open Access Journals (Sweden)

    Jonathan Ruiz-de-Garibay

    2014-01-01

    Full Text Available RFID is a key which enables technology for the Internet of Things paradigm, allowing the virtualization of the physical objects into the Internet. There are uncountable applications whereby these connected objects can be a breakthrough for new business models, and this work shows a good example of that. We present the RFID Presenter as the evolution of a classical consumer electronic product to a novel connected Internet product with the addition of the RFID technology. It supposes a new way to manage the conference talks in a personalization way, improving the end-user interaction and providing services that were impossible before. The design, implementation, and validation of a real gadget are well explained in order to give a real example of how the Internet of Things can be integrated into daily objects and enhance the end-user experiences.

  7. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  8. Psychoanalysis, religion and enculturation: reflections through the life of mother Teresa.

    Science.gov (United States)

    Mahmood, Kaif

    2015-04-01

    This paper explores the question of whether psychoanalysis can help those who adhere to a worldview that is non-psychoanalytic or even anti-psychoanalytic. It answers this question by comparing the psychoanalytic understanding of suffering with that of the Catholic faith, through the latter's idea of the 'dark night of the soul'. The life of Mother Teresa is taken as an illustration of the dark night and how it may be responded to by the faithful. Similarities and differences between the two approaches are pointed out. Finally, it is suggested that psychoanalytic perspectives may enrich the inner lives of those living by a religious worldview, without necessarily diluting that worldview. Further, religious counsellors too may benefit from an understanding of psychoanalytic perspectives.

  9. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    OpenAIRE

    Meng, Zhaozong; Li, Zhen

    2016-01-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims ...

  10. Proposed prediction algorithms based on hybrid approach to deal with anomalies of RFID data in healthcare

    Directory of Open Access Journals (Sweden)

    A. Anny Leema

    2013-07-01

    Full Text Available The RFID technology has penetrated the healthcare sector due to its increased functionality, low cost, high reliability, and easy-to-use capabilities. It is being deployed for various applications and the data captured by RFID readers increase according to timestamp resulting in an enormous volume of data duplication, false positive, and false negative. The dirty data stream generated by the RFID readers is one of the main factors limiting the widespread adoption of RFID technology. In order to provide reliable data to RFID application, it is necessary to clean the collected data and this should be done in an effective manner before they are subjected to warehousing. The existing approaches to deal with anomalies are physical, middleware, and deferred approach. The shortcomings of existing approaches are analyzed and found that robust RFID system can be built by integrating the middleware and deferred approach. Our proposed algorithms based on hybrid approach are tested in the healthcare environment which predicts false positive, false negative, and redundant data. In this paper, healthcare environment is simulated using RFID and the data observed by RFID reader consist of anomalies false positive, false negative, and duplication. Experimental evaluation shows that our cleansing methods remove errors in RFID data more accurately and efficiently. Thus, with the aid of the planned data cleaning technique, we can bring down the healthcare costs, optimize business processes, streamline patient identification processes, and improve patient safety.

  11. Introduction to the RFID Technology in the Application of the Smart Supermarket

    Directory of Open Access Journals (Sweden)

    Fu Binbin

    2016-01-01

    Full Text Available RFID technology is no stranger to more or less have contacted various of industries in nowadays. Premier wen Jiabao put forward the “experience China” in 2009, after the application of IOT (Internet of things is rocketed development and RFID technology is absolutely necessary as the core of IOT. On the experiment background of campus supermarket, this paper briefly introduces the application of RFID technology in the intelligent supermarket that mainly included four parts. Through analysis of system, it detailed interpretation that IOT bring changes to campus supermarket.

  12. A Study on Watt-hour Meter Data Acquisition Method Based on RFID Technology

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; Chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    Considering that traditional watt-hour meter data acquisition was subjected to the influence of distance and occlusion, a watt-hour meter data acquisition method based on RFID technology was proposed in this paper. In detail, RFID electronic tag was embedded in the watt-hour meter to identify the meter and record electric energy information, which made RFID based wireless data acquisition for watt-hour meter come true. Eventually, overall lifecycle management of watt-hour meter is realized.

  13. Improved Kalman Filter Method for Measurement Noise Reduction in Multi Sensor RFID Systems

    OpenAIRE

    Eom, Ki Hwan; Lee, Seung Joon; Kyung, Yeo Sun; Lee, Chang Won; Kim, Min Chul; Jung, Kyung Kwon

    2011-01-01

    Recently, the range of available Radio Frequency Identification (RFID) tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Perf...

  14. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Directory of Open Access Journals (Sweden)

    Herman Vermaak

    2012-03-01

    Full Text Available Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach.

  15. A Framework for Mining Actionable Navigation Patterns from In-Store RFID Datasets via Indoor Mapping

    Science.gov (United States)

    Shen, Bin; Zheng, Qiuhua; Li, Xingsen; Xu, Libo

    2015-01-01

    With the quick development of RFID technology and the decreasing prices of RFID devices, RFID is becoming widely used in various intelligent services. Especially in the retail application domain, RFID is increasingly adopted to capture the shopping tracks and behavior of in-store customers. To further enhance the potential of this promising application, in this paper, we propose a unified framework for RFID-based path analytics, which uses both in-store shopping paths and RFID-based purchasing data to mine actionable navigation patterns. Four modules of this framework are discussed, which are: (1) mapping from the physical space to the cyber space, (2) data preprocessing, (3) pattern mining and (4) knowledge understanding and utilization. In the data preprocessing module, the critical problem of how to capture the mainstream shopping path sequences while wiping out unnecessary redundant and repeated details is addressed in detail. To solve this problem, two types of redundant patterns, i.e., loop repeat pattern and palindrome-contained pattern are recognized and the corresponding processing algorithms are proposed. The experimental results show that the redundant pattern filtering functions are effective and scalable. Overall, this work builds a bridge between indoor positioning and advanced data mining technologies, and provides a feasible way to study customers’ shopping behaviors via multi-source RFID data. PMID:25751076

  16. Aspects for the Utilisation of Radio Frecquency Identification RFID

    Directory of Open Access Journals (Sweden)

    Ionut Balan

    2007-01-01

    Full Text Available The project presents some aspects about theutilisation of the RFID technology, the latest objectidentification technology and data collection practice. Hereare presented the advantages and the limits of this technologyusage relative to the barcodes, the defined standards for thistechnology and some practicability domains. It is achieved ashort presentation about the mini-computers (a newachievement of IT technology. For the application wepresent a micro-system for good identification, using theRFID technology, and a PDA (mobile computer.

  17. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    Science.gov (United States)

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  18. Passive RFID Localisation Framework in Smart Homes Healthcare Settings.

    Science.gov (United States)

    Alsinglawi, Belal; Liu, Tony; Nguyen, Quang Vinh; Gunawardana, Upul; Maeder, Anthony; Simoff, Simeon

    2016-01-01

    In recent years, Smart Homes have become a solution to benefit impaired individuals and elderly in their daily life settings. In healthcare applications, pervasive technologies have enabled the practicality of personal monitoring using Indoor positioning technologies. Radio-Frequency Identification (RFID) is a promising technology, which is useful for non-invasive tracking of activities of daily living. Many implementations have focused on using battery-enabled tags like in RFID active tags, which require frequent maintenance and they are costly. Other systems can use wearable sensors requiring individuals to wear tags which may be inappropriate for elders. Successful implementations of a tracking system are dependent on multiple considerations beyond the physical performance of the solution, such as affordability and human acceptance. This paper presents a localisation framework using passive RFID sensors. It aims to provide a low cost solution for subject location in Smart Homes healthcare.

  19. Assessment of RFID Investment in the Military Logistics Systems Through The Life Cycle Cost (LCC) Model

    OpenAIRE

    Ozdemir, Ahmet; Bayrak, Mustafa

    2015-01-01

    Radio Frequency Identification (RFID) is an emerging technology that has been recently used in numerous business and public fields. Most military applications of RFID have focused on logistics systems. Since RFID investment requires high initial cost and its benefits are hard to see in the short term, it needs an appropriate investment decision model. The purpose of this research is to propose a Life Cycle Cost (LCC) model for RFID integration into the Military Logistics System (MLS). The stu...

  20. Assessment of RFID investment in the military logistics systems through the Cost of Ownership Model (COO)

    OpenAIRE

    Ozdemir, Ahmet; Bayrak, Mustafa Ali

    2010-01-01

    MBA Professional Report Radio Frequency Identification (RFID) is an emerging technology that has been recently used in numerous business and public fields. Most military applications of RFID have focused on logistics systems. Since RFID investment requires high initial cost and its benefits are hard to see in the short term, it needs an appropriate investment decision model. The purpose of this research is to propose a Cost of Ownership (COO) model for RFID integration into the Military ...

  1. Impact of RFID on Retail Value Chain: A Mixed Method Study

    Science.gov (United States)

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  2. Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine.

    Science.gov (United States)

    Coustasse, Alberto; Cunningham, Brian; Deslich, Stacie; Willson, Eric; Meadows, Pamela

    2015-01-01

    Radio-frequency identification (RFID) technology is used by hospital supply chains to track medical products and monitor inventories. Hospitals have also begun incorporating RFID technology as part of their transfusion processes. The purpose of this review was to analyze how healthcare organization supply chains can benefit from the utilization of RFID systems in transfusion service departments. The methodology for this study was a literature review following the steps of a systematic review with a total of 52 sources referenced. RFID technology is used to manage and track blood products from the initial donor phlebotomy to final disposition or product transfusion. RFID-enabled transfusion practices have successfully increased provider productivity and product quality through work-time reduction and error reduction. Findings of this research study suggest that RFID has provided improvements in quality of care and efficiency, while initial costs, security, and privacy appear to be the principal barriers to adoption.

  3. Implementation of an RFID-Based Sequencing-Error-Proofing System for Automotive Manufacturing Logistics

    Directory of Open Access Journals (Sweden)

    Yong-Shin Kang

    2018-01-01

    Full Text Available Serialized tracing provides the ability to track and trace the lifecycle of the products and parts. Unlike barcodes, Radio frequency identification (RFID, which is an important building block for internet of things (IoT, does not require a line of sight and has the advantages of recognizing many objects simultaneously and rapidly, and storing more information than barcodes. Therefore, RFID has been used in a variety of application domains such as logistics, distributions, and manufacturing, significantly improving traceability and process efficiency. In this study, we applied RFID to improve the just-in-sequence operation of an automotive inbound logistics process. First, we implemented an RFID-based visibility system for real-time traceability and control of part supply from the production lines of suppliers to the assembly line of a car manufacturer. Second, we developed an RFID-based sequence-error proofing system to avoid accidental line stops due to incorrect part sequencing. The whole system has been successfully installed in a rear-axle inbound logistics process of GM Korea. We achieved a significant amount of cost savings, especially due to the prevention of sequencing errors and part shortages, and the reduction of manual operations. Thorough cost-benefit analysis demonstrates the clear economic feasibility of using RFID technologies for the just-in-sequence inbound logistics in an automobile manufacturing environment.

  4. Factors affecting RFID adoption in the agricultural product distribution industry: empirical evidence from China.

    Science.gov (United States)

    Shi, Ping; Yan, Bo

    2016-01-01

    We conducted an exploratory investigation of factors influencing the adoption of radio frequency identification (RFID) methods in the agricultural product distribution industry. Through a literature review and field research, and based on the technology-organization-environment (TOE) theoretical framework, this paper analyzes factors influencing RFID adoption in the agricultural product distribution industry in reference to three contexts: technological, organizational, and environmental contexts. An empirical analysis of the TOE framework was conducted by applying structural equation modeling based on actual data from a questionnaire survey on the agricultural product distribution industry in China. The results show that employee resistance and uncertainty are not supported by the model. Technological compatibility, perceived effectiveness, organizational size, upper management support, trust between enterprises, technical knowledge, competitive pressure and support from the Chinese government, which are supported by the model, have significantly positive effects on RFID adoption. Meanwhile, organizational size has the strongest positive effect, while competitive pressure levels have the smallest effect. Technological complexities and costs have significantly negative effects on RFID adoption, with cost being the most significantly negative influencing factor. These research findings will afford enterprises in the agricultural products supply chain with a stronger understanding of the factors that influence RFID adoption in the agricultural product distribution industry. In addition, these findings will help enterprises remain aware of how these factors affect RFID adoption and will thus help enterprises make more accurate and rational decisions by promoting RFID application in the agricultural product distribution industry.

  5. RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis

    Science.gov (United States)

    Zhang, Min; Li, Peichong

    Agri-food supply chain management (SCM), a management method to optimize internal costs and productivities, has evolved as an application of e-business technologies. These days, RFID has been widely used in many fields. In this paper, we analyze the characteristics of agri-food supply chain. Then the disadvantages of RFID are discussed. After that, we study the application strategies of RFID based on benefit and safety degree.

  6. ASAP: A MAC Protocol for Dense and Time-Constrained RFID Systems

    Directory of Open Access Journals (Sweden)

    Kyounghwan Lee

    2007-08-01

    Full Text Available We introduce a novel medium access control (MAC protocol for radio frequency identification (RFID systems which exploits the statistical information collected at the reader. The protocol, termed adaptive slotted ALOHA protocol (ASAP, is motivated by the need to significantly improve the total read time performance of the currently suggested MAC protocols for RFID systems. In order to accomplish this task, ASAP estimates the dynamic tag population and adapts the frame size in the subsequent round via a simple policy that maximizes an appropriately defined efficiency function. We demonstrate that ASAP provides significant improvement in total read time performance over the current RFID MAC protocols. We next extend the design to accomplish reliable performance of ASAP in realistic scenarios such as the existence of constraints on frame size, and mobile RFID systems where tags move at constant velocity in the reader's field. We also consider the case where tags may fail to respond because of a physical breakdown or a temporary malfunction, and show the robustness in those scenarios as well.

  7. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  8. RFID antenna design for circular polarization in UHF band

    Science.gov (United States)

    Shahid, Hamza; Khan, Muhammad Talal Ali; Tayyab, Umais; Irshad, Usama Bin; Alkhazraji, Emad; Javaid, Muhammad Sharjeel

    2017-05-01

    A miniature half cross dipole antenna for defense and aerospace RFID applications in UHF band is presented. The dipole printed line arms are half crossed shape on top of dielectric substrate backed by reactive impedance surface. The antenna fed by a coaxial cable at the gap separating the dipole arms. Our design is intended to work at 2.42 GHz for RFID readers. The radiation pattern obtained has HPBW of 112, return loss of 22.24 dB and 90 MHz bandwidth.

  9. Radio Frequency Identification (RFID) in healthcare: a literature review.

    Science.gov (United States)

    Kolokathi, Aikaterini; Rallis, Panagiotis

    2013-01-01

    Creating and maintaining a safe and high-quality health care environment is of great importance for global community. New technologies and their applications can help us achieve this goal. Radio-Frequency Identification (RIFD) technology is considered one of those technologies and even today there are some interesting deployments in the health industry. As a result, this work aims to present the basic idea behind RFID solutions, problems that can be addressed with the adoption of RFID and the benefits of relative applications.

  10. RFID sensor-tags feeding a context-aware rule-based healthcare monitoring system.

    Science.gov (United States)

    Catarinucci, Luca; Colella, Riccardo; Esposito, Alessandra; Tarricone, Luciano; Zappatore, Marco

    2012-12-01

    Along with the growing of the aging population and the necessity of efficient wellness systems, there is a mounting demand for new technological solutions able to support remote and proactive healthcare. An answer to this need could be provided by the joint use of the emerging Radio Frequency Identification (RFID) technologies and advanced software choices. This paper presents a proposal for a context-aware infrastructure for ubiquitous and pervasive monitoring of heterogeneous healthcare-related scenarios, fed by RFID-based wireless sensors nodes. The software framework is based on a general purpose architecture exploiting three key implementation choices: ontology representation, multi-agent paradigm and rule-based logic. From the hardware point of view, the sensing and gathering of context-data is demanded to a new Enhanced RFID Sensor-Tag. This new device, de facto, makes possible the easy integration between RFID and generic sensors, guaranteeing flexibility and preserving the benefits in terms of simplicity of use and low cost of UHF RFID technology. The system is very efficient and versatile and its customization to new scenarios requires a very reduced effort, substantially limited to the update/extension of the ontology codification. Its effectiveness is demonstrated by reporting both customization effort and performance results obtained from validation in two different healthcare monitoring contexts.

  11. RFID in the warehouse:a literature analysis (1995-2010) of its applications, benefits, challenges and future trends

    OpenAIRE

    Lim, Ming K.; Bahr, W.; Leung, Stephen C.H.

    2013-01-01

    Radio Frequency Identification (RFID) has been identified as a crucial technology for the modern 21st century knowledge-based economy. Some businesses have realised benefits of RFID adoption through improvements in operational efficiency, additional cost savings, and opportunities for higher revenues. RFID research in warehousing operations has been less prominent than in other application domains. To investigate how RFID technology has had an impact in warehousing, a comprehensive analysis o...

  12. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  13. A Novel RFID Sensing System Using Enhanced Surface Wave Technology for Battery Exchange Stations

    Directory of Open Access Journals (Sweden)

    Yeong-Lin Lai

    2014-01-01

    Full Text Available This paper presents a novel radio-frequency identification (RFID sensing system using enhanced surface wave technology for battery exchange stations (BESs of electric motorcycles. Ultrahigh-frequency (UHF RFID technology is utilized to automatically track and manage battery and user information without manual operation. The system includes readers, enhanced surface wave leaky cable antennas (ESWLCAs, coupling cable lines (CCLs, and small radiation patches (SRPs. The RFID sensing system overcomes the electromagnetic interference in the metallic environment of a BES cabinet. The developed RFID sensing system can effectively increase the efficiency of BES operation and promote the development of electric vehicles which solve the problem of air pollution as well as protect the environment of the Earth.

  14. Analysis of Tobyhanna Army Depot's Radio Frequency Identification (RFID) Pilot Program: RFID as an Asset Management Tool

    National Research Council Canada - National Science Library

    Miertschin, Keith W; Forrest, Brian D

    2005-01-01

    ...) used for inventory and asset management at the Tobyhanna Army Maintenance Depot. Tobyhanna Army Depot recently partnered with WhereNet Corporation for a pilot program to incorporate a real-time locating system that uses RFID...

  15. RFID Label Tag Design for Metallic Surface Environments

    Directory of Open Access Journals (Sweden)

    Ki Hwan Eom

    2011-01-01

    Full Text Available This paper describes a metal mount RFID tag that works reliably on metallic surfaces. The method proposes the use of commercial label type RFID tags with 2.5 mm thick Styrofoam103.7 with a relative permittivity of 1.03 attached on the back of the tag. In order to verify the performance of the proposed method, we performed experiments on an electric transformer supply chain system. The experimental results showed that the proposed tags can communicate with readers from a distance of 2 m. The recognition rates are comparable to those of commercial metallic mountable tags.

  16. A Framework for Mining Actionable Navigation Patterns from In-Store RFID Datasets via Indoor Mapping

    Directory of Open Access Journals (Sweden)

    Bin Shen

    2015-03-01

    Full Text Available With the quick development of RFID technology and the decreasing prices of RFID devices, RFID is becoming widely used in various intelligent services. Especially in the retail application domain, RFID is increasingly adopted to capture the shopping tracks and behavior of in-store customers. To further enhance the potential of this promising application, in this paper, we propose a unified framework for RFID-based path analytics, which uses both in-store shopping paths and RFID-based purchasing data to mine actionable navigation patterns. Four modules of this framework are discussed, which are: (1 mapping from the physical space to the cyber space, (2 data preprocessing, (3 pattern mining and (4 knowledge understanding and utilization. In the data preprocessing module, the critical problem of how to capture the mainstream shopping path sequences while wiping out unnecessary redundant and repeated details is addressed in detail. To solve this problem, two types of redundant patterns, i.e., loop repeat pattern and palindrome-contained pattern are recognized and the corresponding processing algorithms are proposed. The experimental results show that the redundant pattern filtering functions are effective and scalable. Overall, this work builds a bridge between indoor positioning and advanced data mining technologies, and provides a feasible way to study customers’ shopping behaviors via multi-source RFID data.

  17. Passive RFID Rotation Dimension Reduction via Aggregation

    Science.gov (United States)

    Matthews, Eric

    Radio Frequency IDentification (RFID) has applications in object identification, position, and orientation tracking. RFID technology can be applied in hospitals for patient and equipment tracking, stores and warehouses for product tracking, robots for self-localisation, tracking hazardous materials, or locating any other desired object. Efficient and accurate algorithms that perform localisation are required to extract meaningful data beyond simple identification. A Received Signal Strength Indicator (RSSI) is the strength of a received radio frequency signal used to localise passive and active RFID tags. Many factors affect RSSI such as reflections, tag rotation in 3D space, and obstacles blocking line-of-sight. LANDMARC is a statistical method for estimating tag location based on a target tag's similarity to surrounding reference tags. LANDMARC does not take into account the rotation of the target tag. By either aggregating multiple reference tag positions at various rotations, or by determining a rotation value for a newly read tag, we can perform an expected value calculation based on a comparison to the k-most similar training samples via an algorithm called K-Nearest Neighbours (KNN) more accurately. By choosing the average as the aggregation function, we improve the relative accuracy of single-rotation LANDMARC localisation by 10%, and any-rotation localisation by 20%.

  18. Radio Frequency Identification (RFID) Based Employee Attendance Management System

    Science.gov (United States)

    Maramis, G. D. P.; Rompas, P. T. D.

    2018-02-01

    Manually recorded attendance of all the employees has produced some problems such as the data accuracy and staff performance efficiency. The objective of this research is to design and develop a software of RFID attendance system which is integrated with database system. This RFID attendance system was developed using several main components such as tags that will be used as a replacement of ID cards and a reader device that will read the information related to the employee attendance. The result of this project is a software of RFID attendance system that is integrated with the database and has a function to store the data or information of every single employee. This system has a maximum reading range of 2 cm with success probability of 1 and requires a minimum interval between readings of 2 seconds in order to achieve an optimal functionality. By using the system, the discipline attitude of the employees and also the performance of the staff will be improved instantly.

  19. RFID sensors as the common sensing platform for single-use biopharmaceutical manufacturing

    International Nuclear Information System (INIS)

    Potyrailo, Radislav A; Surman, Cheryl; Monk, David; Morris, William G; Wortley, Timothy; Vincent, Mark; Diana, Rafael; Pizzi, Vincent; Carter, Jeffrey; Gach, Gerard; Klensmeden, Staffan; Ehring, Hanno

    2011-01-01

    The lack of reliable single-use sensors prevents the biopharmaceutical industry from fully embracing single-use biomanufacturing processes. Sensors based on the same detection platform for all critical parameters in single-use bioprocess components would be highly desirable to significantly simplify their installation, calibration and operation. We review here our approach for passive radio-frequency identification (RFID)-based sensing that does not rely on costly proprietary RFID memory chips with an analog input but rather implements ubiquitous passive 13.56 MHz RFID tags as inductively coupled sensors with at least 16 bit resolution provided by a sensor reader. The developed RFID sensors combine several measured parameters from the resonant sensor antenna with multivariate data analysis and deliver unique capability of multiparameter sensing and rejection of environmental interferences with a single sensor. This general sensing approach provides an elegant solution for both analytical measurement and identification and documentation of the measured location. (topical review)

  20. Accurate Vehicle Location System Using RFID, an Internet of Things Approach

    Science.gov (United States)

    Prinsloo, Jaco; Malekian, Reza

    2016-01-01

    Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID) technology in combination with GPS and the Global system for Mobile communication (GSM) technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz). The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved. PMID:27271638

  1. Accurate Vehicle Location System Using RFID, an Internet of Things Approach.

    Science.gov (United States)

    Prinsloo, Jaco; Malekian, Reza

    2016-06-04

    Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID) technology in combination with GPS and the Global system for Mobile communication (GSM) technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz). The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved.

  2. Accurate Vehicle Location System Using RFID, an Internet of Things Approach

    Directory of Open Access Journals (Sweden)

    Jaco Prinsloo

    2016-06-01

    Full Text Available Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID technology in combination with GPS and the Global system for Mobile communication (GSM technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz. The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved.

  3. ECRI audio conference focuses on RFID: the possible benefits are significant, but proceed slowly.

    Science.gov (United States)

    2005-07-01

    This article highlights key points raised during ECRI's May 18, 2005, audio conference, "Radio-Frequency Identification (RFID) for Tracking Medical Devices: Planning for Today and Tomorrow." The conference gave attendees the opportunity to hear the experiences of two healthcare professionals managing RFID pilot programs at healthcare facilities. Information on ordering a recording of the event, including presentation materials and our recent Health Devices article on RFID, is provided at the end of this article.

  4. Long range ultra-high frequency (UHF) radio frequency identification (RFID) antenna design

    Science.gov (United States)

    Reynolds, Nathan D.

    There is an ever-increasing demand for radio frequency identification (RFID) tags that are passive, long range, and mountable on multiple surfaces. Currently, RFID technology is utilized in numerous applications such as supply chain management, access control, and public transportation. With the combination of sensory systems in recent years, the applications of RFID technology have been extended beyond tracking and identifying. This extension includes applications such as environmental monitoring and healthcare applications. The available sensory systems usually operate in the medium or high frequency bands and have a low read range. However, the range limitations of these systems are being overcome by the development of RFID sensors focused on utilizing tags in the ultra-high frequency (UHF) band. Generally, RFID tags have to be mounted to the object that is being identified. Often the objects requiring identification are metallic. The inherent properties of metallic objects have substantial effects on nearby electromagnetic radiation; therefore, the operation of the tag antenna is affected when mounted on a metallic surface. This outlines one of the most challenging problems for RFID systems today: the optimization of tag antenna performance in a complex environment. In this research, a novel UHF RFID tag antenna, which has a low profile, long range, and is mountable on metallic surfaces, is designed analytically and simulated using a 3-D electromagnetic simulator, ANSYS HFSS. A microstrip patch antenna is selected as the antenna structure, as patch antennas are low profile and suitable for mounting on metallic surfaces. Matching and theoretical models of the microstrip patch antenna are investigated. Once matching and theory of a microstrip patch antenna is thoroughly understood, a unique design technique using electromagnetic band gap (EBG) structures is explored. This research shows that the utilization of an EBG structure in the patch antenna design yields

  5. Energy efficient cooperation in underlay RFID cognitive networks for a water smart home.

    Science.gov (United States)

    Nasir, Adnan; Hussain, Syed Imtiaz; Soong, Boon-Hee; Qaraqe, Khalid

    2014-09-30

    Shrinking water resources all over the world and increasing costs of water consumption have prompted water users and distribution companies to come up with water conserving strategies. We have proposed an energy-efficient smart water monitoring application in [1], using low power RFIDs. In the home environment, there exist many primary interferences within a room, such as cell-phones, Bluetooth devices, TV signals, cordless phones and WiFi devices. In order to reduce the interference from our proposed RFID network for these primary devices, we have proposed a cooperating underlay RFID cognitive network for our smart application on water. These underlay RFIDs should strictly adhere to the interference thresholds to work in parallel with the primary wireless devices [2]. This work is an extension of our previous ventures proposed in [2,3], and we enhanced the previous efforts by introducing a new system model and RFIDs. Our proposed scheme is mutually energy efficient and maximizes the signal-to-noise ratio (SNR) for the RFID link, while keeping the interference levels for the primary network below a certain threshold. A closed form expression for the probability density function (pdf) of the SNR at the destination reader/writer and outage probability are derived. Analytical results are verified through simulations. It is also shown that in comparison to non-cognitive selective cooperation, this scheme performs better in the low SNR region for cognitive networks. Moreover, the hidden Markov model's (HMM) multi-level variant hierarchical hidden Markov model (HHMM) approach is used for pattern recognition and event detection for the data received for this system [4]. Using this model, a feedback and decision algorithm is also developed. This approach has been applied to simulated water pressure data from RFID motes, which were embedded in metallic water pipes.

  6. Intellectual Production Supervision Perform based on RFID Smart Electricity Meter

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    This topic develops the RFID intelligent electricity meter production supervision project management system. The system is designed for energy meter production supervision in the management of the project schedule, quality and cost information management requirements in RFID intelligent power, and provide quantitative information more comprehensive, timely and accurate for supervision engineer and project manager management decisions, and to provide technical information for the product manufacturing stage file. From the angle of scheme analysis, design, implementation and test, the system development of production supervision project management system for RFID smart meter project is discussed. Focus on the development of the system, combined with the main business application and management mode at this stage, focuses on the energy meter to monitor progress information, quality information and cost based information on RFID intelligent power management function. The paper introduces the design scheme of the system, the overall client / server architecture, client oriented graphical user interface universal, complete the supervision of project management and interactive transaction information display, the server system of realizing the main program. The system is programmed with C# language and.NET operating environment, and the client and server platforms use Windows operating system, and the database server software uses Oracle. The overall platform supports mainstream information and standards and has good scalability.

  7. Analisis dan Perancangan Aplikasi Inventori Berbasiskan Rfid Pada PT. ABC

    Directory of Open Access Journals (Sweden)

    Herwin Herwin

    2010-12-01

    Full Text Available The purpose of this research is to reduce the damaged material, applying the concept of FIFO for retrieval of row materials, and accelerate the search and also to simplify the detection of raw materials. Software development method used involves three main parts namely the method of analysis, design and literature. Analysis methods including survey of the running system, an analysis of survey findings, identify information needs, identify system requirenments. The design method approach to Unified Modelling Language (UML. The results is an inventory application that uses Radio Frequency Identification (RFID tags as a replacement label where RFID tags can store data. Conslusions from this research is minimizing the company’s financial losses due to storage of raw materials and minimizing time to search raw materials using RFID that also can provide actual and accurate information for the company. 

  8. Increasing Supply-Chain Visibility with Rule-Based RFID Data Analysis

    DEFF Research Database (Denmark)

    Ilic, A.; Andersen, Thomas; Michahelles, F.

    2009-01-01

    RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data, the Sup......RFID technology tracks the flow of physical items and goods in supply chains to help users detect inefficiencies, such as shipment delays, theft, or inventory problems. An inevitable consequence, however, is that it generates huge numbers of events. To exploit these large amounts of data......, the Supply Chain Visualizer increases supply-chain visibility by analyzing RFID data, using a mix of automated analysis techniques and human effort. The tool's core concepts include rule-based analysis techniques and a map-based representation interface. With these features, it lets users visualize...

  9. Applying RFID technology in the retail industry – benefits and concerns from the consumer’s perspective

    Directory of Open Access Journals (Sweden)

    Ádám Novotny

    2015-05-01

    Full Text Available This paper discusses the benefits and costs of RFID (Radio Frequency Identification technology in the retail sector. RFID is an enabling technology for the Internet of Things (IoT concept, which constitutes a new vision of the Internet as a medium and forum that expands into our everyday lives and connects us virtually to all of the objects that surround us. This paper gives a balanced view of RFID in retailing by showing its current and potential benefits and costs, in particular from the consumer’s perspective. The authors also present the findings of a survey that examined the attitudes of Hungarian consumers towards the potential threats of RFID, and conclude that these attitudes are part of a larger psychological construct, which embraces opinions and attitudes towards new information and communications technologies in general. Significant relationships between consumer demography and attitudes towards RFID applications were also revealed. The paper suggests a solution to the privacy problem of current RFID applications, which has been elaborated by researchers of the IoT Research Institute at the Eszterházy Károly College in Hungary: if RFID technology were integrated with NFC-enabled mobile phones that included a user interface, consumers would be able to gain control over radio frequency communication.

  10. Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    OpenAIRE

    White, Jonathan; Banerjee, Nilanjan

    2010-01-01

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is corporate espionage, where attackers through illicit inventorying infer sales and restocking trends for products. In this paper, we first present plausible aftermaths of corporate espio...

  11. Analysis of required investment and benefits using RFID in supply chains

    Directory of Open Access Journals (Sweden)

    Atanasković Predrag

    2012-06-01

    Full Text Available Strengthening competition, short product life cycles and technological development of information technology (IT has changed the ways companies operate. Radio frequency identification technology (RFID is one of the technologies whose use is being rapidly tested in many fields. At the beginning of this century, the leading retail companies, in cooperation with their suppliers, began the testing of RFID systems application in supply chains. An important component of these studies, besides the effects achieved in the supply chains, is determining the required investments. The approach for the feasibility assessment of investments in RFID systems from the aspect of logistics is presented in this paper, and the results obtained for a realistic two-stage supply chain are given as an example.

  12. Software simulator for property investigation of document management system with RFID tags

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study outlines the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged doc-uments was installed. Furthermore, the system cooperates with many other elements of the secret office (cabinets, sluices, photocopiers, desks. The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examination scenarios. The simulation method for examining the system properties was proposed. It allows to conduct the examination of the properties in a short period of time for numerous testing scenarios.

  13. Principles of Selection, Implementation and Utilization of RFID in Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Juraj Vaculik

    2009-01-01

    Full Text Available The paper deals with RFID (Radio Frequency Identificationimplementation and utilization within supply chain managementand also includes the economic feasibility of rollingout RFID. The members of the supply chain networks- suppliers,manufacturers and distributors - will operate independentlyfrom one another and according to their own agendas.This type of unmanaged network, howeve1; results in inefficiencies.The manufacturer might have a goal of maximizing productionin order to minimize unit costs. Clearly, all members ofthe supply chain stand to gain by coordinating their efforts toimprove efficiency and overall supply chain performance. Thisarticle is divided into three parts: Supply chain, Economic feasibilityof rolling out RFID and Processes of Supply chain management.

  14. Radio Frequency Identification (RFID) in Space

    Science.gov (United States)

    Bacon, John B.

    2011-01-01

    The ISS has some significant inventory management challenges. RFID solves many of these, and was deployed 8/2011. Significant issues (some unique to spacecraft) remain. NASA is interested and investing in technologies that will help to overcome the remaining issues.

  15. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  16. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  17. Application of metamaterial concepts to sensors and chipless RFID

    Science.gov (United States)

    Martín, F.; Herrojo, C.; Vélez, P.; Su, L.; Mata-Contreras, J.; Paredes, F.

    2018-02-01

    Several strategies for the implementation of microwave sensors based on the use of metamaterial-inspired resonators are pointed out, and examples of applications, including sensors for dielectric characterization and sensors for the measurement of spatial variables, are provided. It will be also shown that novel microwave encoders for chipless RFID systems with very high data capacity can be implemented. The fields of applications of the devices discussed in this talk include dielectric characterization of solids and liquids, angular velocity sensors for space applications, and near-field chipless RFID systems for secure paper applications, among others.

  18. Control de trazabilidad de fruta mediante un sistema RFID

    OpenAIRE

    Asensio Nácher, Sergi

    2015-01-01

    En este proyecto se ha desarrollado una aplicación para realizar la trazabilidad de la fruta en un almacén utilizando dispositivos de radiofrecuencia RFID. El sistema ha sido desarrollado en C\\# y ha permitido automatizar todo el proceso de control de la fruta en un almacén. In this project, has been developed an application for making the traceability of fruit in a warehause by using radiofrequency systems RFID. The system was developed in C\\# and permits to control de processes of the fr...

  19. Design of an Elliptic Curve Cryptography processor for RFID tag chips.

    Science.gov (United States)

    Liu, Zilong; Liu, Dongsheng; Zou, Xuecheng; Lin, Hui; Cheng, Jian

    2014-09-26

    Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an efficient architecture of Elliptic Curve Cryptography (ECC) Processor for RFID tag chip is presented. We adopt a new inversion algorithm which requires fewer registers to store variables than the traditional schemes. A new method for coordinate swapping is proposed, which can reduce the complexity of the controller and shorten the time of iterative calculation effectively. A modified circular shift register architecture is presented in this paper, which is an effective way to reduce the area of register files. Clock gating and asynchronous counter are exploited to reduce the power consumption. The simulation and synthesis results show that the time needed for one elliptic curve scalar point multiplication over GF(2163) is 176.7 K clock cycles and the gate area is 13.8 K with UMC 0.13 μm Complementary Metal Oxide Semiconductor (CMOS) technology. Moreover, the low power and low cost consumption make the Elliptic Curve Cryptography Processor (ECP) a prospective candidate for application in the RFID tag chip.

  20. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    Science.gov (United States)

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  1. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Directory of Open Access Journals (Sweden)

    Tiago M. Fernández-Caramés

    2016-12-01

    Full Text Available The Internet of Things (IoT is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification, which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3 to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  2. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    Science.gov (United States)

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  3. Impact of radio-frequency identification (RFID) technologies on the hospital supply chain: a literature review.

    Science.gov (United States)

    Coustasse, Alberto; Tomblin, Shane; Slack, Chelsea

    2013-01-01

    Supply costs account for more than one-third of the average operating budget and constitute the second largest expenditure in hospitals. As hospitals have sought to reduce these costs, radio-frequency identification (RFID) technology has emerged as a solution. This study reviews existing literature to gauge the recent and potential impact and direction of the implementation of RFID in the hospital supply chain to determine current benefits and barriers of adoption. Findings show that the application of RFID to medical equipment and supplies tracking has resulted in efficiency increases in hospitals with lower costs and increased service quality. RFID technology can reduce costs, improve patient safety, and improve supply chain management effectiveness by increasing the ability to track and locate equipment, as well as monitoring theft prevention, distribution management, and patient billing. Despite ongoing RFID implementation in the hospital supply chain, barriers to widespread and rapid adoption include significant total expenditures, unclear return on investment, and competition with other strategic imperatives.

  4. Impact of Radio-Frequency Identification (RFID) Technologies on the Hospital Supply Chain: A Literature Review

    Science.gov (United States)

    Coustasse, Alberto; Tomblin, Shane; Slack, Chelsea

    2013-01-01

    Supply costs account for more than one-third of the average operating budget and constitute the second largest expenditure in hospitals. As hospitals have sought to reduce these costs, radio-frequency identification (RFID) technology has emerged as a solution. This study reviews existing literature to gauge the recent and potential impact and direction of the implementation of RFID in the hospital supply chain to determine current benefits and barriers of adoption. Findings show that the application of RFID to medical equipment and supplies tracking has resulted in efficiency increases in hospitals with lower costs and increased service quality. RFID technology can reduce costs, improve patient safety, and improve supply chain management effectiveness by increasing the ability to track and locate equipment, as well as monitoring theft prevention, distribution management, and patient billing. Despite ongoing RFID implementation in the hospital supply chain, barriers to widespread and rapid adoption include significant total expenditures, unclear return on investment, and competition with other strategic imperatives. PMID:24159272

  5. Determinants of RFID Adoption in Supply Chain among Manufacturing Companies in China: A Discriminant Analysis

    Directory of Open Access Journals (Sweden)

    Suhaiza Zailani

    2009-05-01

    Full Text Available The growth of China’s economy hinges to a large extent on the ability of the industry to operate more efficiently and effectively in the global supply chain system. China’s manufacturing companies should pay attention to adopt more efficient supply chain technologies to provide better services for their customers. China has initially carried out research and development and industrialization of technology related to RFID and begun to apply in some areas in recent years. This article studies the determinant factors of the RFID adoption by manufacturing companies in China. The population of this study is manufacturing companies in China that are registered under Federation of China Manufacturers. A questionnaire survey is conducted to study the adoption of RFID by China’s manufacturing industry. This study reveals that the environment, organization, technology and product have the impact on the adoption of RFID in China. Organization should be given strategic attention to improve employee participation in adopting RFID as a strategic tool.

  6. Development of the RFID System for nuclear materials management

    International Nuclear Information System (INIS)

    Chen, K.; Tsai, H.; Liu, Y.Y.

    2008-01-01

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclear materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field

  7. 9 CFR 93.303 - Ports designated for the importation of horses.

    Science.gov (United States)

    2010-01-01

    ... PRODUCTS IMPORTATION OF CERTAIN ANIMALS, BIRDS, FISH, AND POULTRY, AND CERTAIN ANIMAL, BIRD, AND POULTRY... land border ports are designated for the entry of horses from Mexico: Brownsville, Hidalgo, Laredo...; Calexico and San Ysidro, California; and Antelope Wells, Columbus, and Santa Teresa, New Mexico. (d...

  8. Secure passive RFID tag with seal

    Science.gov (United States)

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2017-11-14

    A secure passive RFID tag system comprises at least one base station and at least one passive RFID tag. The tag includes a fiber optic cable with the cable ends sealed within the tag and the middle portion forming an external loop. The loop may be secured to at least portions of an object. The tag transmits and receives an optical signal through the fiber optic cable, and the cable is configured to be damaged or broken in response to removal or tampering attempts, wherein the optical signal is significantly altered if the cable is damaged or broken. The tag transmits the optical signal in response to receiving a radio signal from the base station and compares the transmitted optical signal to the received optical signal. If the transmitted optical signal and the received optical signal are identical, the tag transmits an affirmative radio signal to the base station.

  9. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol

  10. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  11. RFID in the Apparel Retail Industry: A Case Study from Galeria Kaufhof

    Science.gov (United States)

    Al-Kassab, Jasser; Blome, Philipp; Wolfram, Gerd; Thiesse, Frédéric; Fleisch, Elgar

    This contribution deals with the business valueof radio frequency identification (RFID) technology in the apparel retail industry. We present a case study of an RFID project at Galeria Kaufhof, a subsidiary of Metro Group and one of the largest department store chains in Europe. The trial shows that operational efficiency gains through the automation of logistical in-store processes, such as inventory counting or goods receipt, are possible. Moreover, RFID enables new customer applications on the sales floor, which allow for a redesign of the customer interface, and thus an improvement of the service processes and the service quality. In addition, the analyses of the gathered data on the sales floor help to close the "data void" between the goods receipt and the point of sales of the department store, thus offering the opportunity to directly observe and analyze physical in-store processes. The RFID data analyses allow for deriving valuable information for the department store management in the areas of inventory management, category management, store layout management, and department store processes.

  12. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System.

    Science.gov (United States)

    Xiao, Changjiang; Chen, Nengcheng; Li, Dandan; Lv, You; Gong, Jianya

    2016-12-30

    Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web-enabled smart cultural relics management system (SCRMS). In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID) is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  13. Effects of radiation from a radiofrequency identification (RFID) microchip on human cancer cells.

    Science.gov (United States)

    Lai, Henry C; Chan, Ho Wing; Singh, Narendra P

    2016-01-01

    Radiofrequency identification (RFID) microchips are used to remotely identify objects, e.g. an animal in which a chip is implanted. A passive RFID microchip absorbs energy from an external source and emits a radiofrequency identification signal which is then decoded by a detector. In the present study, we investigated the effect of the radiofrequency energy emitted by a RFID microchip on human cancer cells. Molt-4 leukemia, BT474 breast cancer, and HepG2 hepatic cancer cells were exposed in vitro to RFID microchip-emitted radiofrequency field for 1 h. Cells were counted before and after exposure. Effects of pretreatment with the spin-trap compound N-tert-butyl-alpha-phenylnitrone or the iron-chelator deferoxamine were also investigated. Results We found that the energy effectively killed/retarded the growth of the three different types of cancer cells, and the effect was blocked by the spin-trap compound or the iron-chelator, whereas an inactive microchip and energy from the external source had no significant effect on the cells. Conclusions Data of the present study suggest that radiofrequency field from the microchip affects cancer cells via the Fenton Reaction. Implantation of RFID microchips in tumors may provide a new method for cancer treatment.

  14. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    Science.gov (United States)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  15. Near Field UHF RFID Antenna System Enabling the Tracking of Small Laboratory Animals

    Directory of Open Access Journals (Sweden)

    Luca Catarinucci

    2013-01-01

    Full Text Available Radio frequency identification (RFID technology is more and more adopted in a wide range of applicative scenarios. In many cases, such as the tracking of small-size living animals for behaviour analysis purposes, the straightforward use of commercial solutions does not ensure adequate performance. Consequently, both RFID hardware and the control software should be tailored for the particular application. In this work, a novel RFID-based approach enabling an effective localization and tracking of small-sized laboratory animals is proposed. It is mainly based on a UHF Near Field RFID multiantenna system, to be placed under the animals’ cage, and able to rigorously identify the NF RFID tags implanted in laboratory animals (e.g., mice. Once the requirements of the reader antenna have been individuated, the antenna system has been designed and realized. Moreover, an algorithm based on the measured Received Signal Strength Indication (RSSI aiming at removing potential ambiguities in data captured by the multiantenna system has been developed and integrated. The animal tracking system has been largely tested on phantom mice in order to verify its ability to precisely localize each subject and to reconstruct its path. The achieved and discussed results demonstrate the effectiveness of the proposed tracking system.

  16. Indoor Navigation Design Integrated with Smart Phones and Rfid Devices

    Science.gov (United States)

    Ortakci, Y.; Demiral, E.; Atila, U.; Karas, I. R.

    2015-10-01

    High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification) device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  17. Students Attendance Management System Based On RFID And Fingerprint Reader

    Directory of Open Access Journals (Sweden)

    Moth Moth Myint Thein

    2015-07-01

    Full Text Available Abstract Today students class attendance is become more important part for any organizationsinstitutions. The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure hence inefficient. This paper presents the manual students attendance management into computerized system for convenience or data reliability. So the system is developed by the integration of ubiquitous computing systems into classroom for managing the students attendance using RFID and fingerprint reader. The system is designed to implement an attendance management system based on RFID and fingerprint reader which students need to use their student identification card ID and their finger ID to success the attendance where only authentic student can be recorded the attendance during the class. In this system passive RFID tag and reader pairs are used to register the student ID cards individually and fingerprint reader is used for attendance. This system takes attendance electronically with the help of the RFID and finger print device and the records of the attendance are stored in a database. Students roll call percentages and their details are easily seenvia Graphical User Interface GUI. This system will have the required databases for students attendance teachers subjects and students details. This application is implemented by Microsoft Visual Studio and Microsoft SQL Server as IDE. C language is used to implement this system.

  18. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  19. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  20. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWER PLANT-DERIVED PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2006-03-01

    TERESA (Toxicological Evaluation of Realistic Emissions of Source Aerosols) involves exposing laboratory rats to realistic coal-fired power plant and mobile source emissions to help determine the relative toxicity of these PM sources. There are three coal-fired power plants in the TERESA program; this report describes the results of fieldwork conducted at the first plant, located in the Upper Midwest. The project was technically challenging by virtue of its novel design and requirement for the development of new techniques. By examining aged, atmospherically transformed aerosol derived from power plant stack emissions, we were able to evaluate the toxicity of PM derived from coal combustion in a manner that more accurately reflects the exposure of concern than existing methodologies. TERESA also involves assessment of actual plant emissions in a field setting--an important strength since it reduces the question of representativeness of emissions. A sampling system was developed and assembled to draw emissions from the stack; stack sampling conducted according to standard EPA protocol suggested that the sampled emissions are representative of those exiting the stack into the atmosphere. Two mobile laboratories were then outfitted for the study: (1) a chemical laboratory in which the atmospheric aging was conducted and which housed the bulk of the analytical equipment; and (2) a toxicological laboratory, which contained animal caging and the exposure apparatus. Animal exposures were carried out from May-November 2004 to a number of simulated atmospheric scenarios. Toxicological endpoints included (1) pulmonary function and breathing pattern; (2) bronchoalveolar lavage fluid cytological and biochemical analyses; (3) blood cytological analyses; (4) in vivo oxidative stress in heart and lung tissue; and (5) heart and lung histopathology. Results indicated no differences between exposed and control animals in any of the endpoints examined. Exposure concentrations for the

  1. Toxicological Evaluation of Realistic Emissions of Source Aerosols (TERESA): Application to Power Plant-Derived PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2007-02-28

    This report documents progress made on the subject project during the period of September 1, 2007 through February 28, 2007. The TERESA Study is designed to investigate the role played by specific emissions sources and components in the induction of adverse health effects by examining the relative toxicity of coal combustion and mobile source (gasoline and/or diesel engine) emissions and their oxidative products. The study involves on-site sampling, dilution, and aging of coal combustion emissions at three coal-fired power plants, as well as mobile source emissions, followed by animal exposures incorporating a number of toxicological endpoints. The DOE-EPRI Cooperative Agreement (henceforth referred to as ''the Agreement'') for which this technical progress report has been prepared covers the performance and analysis of field experiments at the first TERESA plant, located in the Upper Midwest and henceforth referred to as Plant 0, and at two additional coal-fired power plants (Plants 1 and 2) utilizing different coal types and with different plant configurations. During this reporting period, fieldwork was completed at Plant 2, located in the Midwest. The following scenarios were completed: (1) July 19-22: POS (oxidized + SOA); (2) July 25-28: PONS (oxidized + neutralized + SOA); (3) August 8-13: P (primary); (4) August 14-15: POS; (5) August 16-17: POS (MI rats); (6) August 28-31: OS (oxidized + SOA, without primary particles); (7) September 1-4: O (oxidized, no primary particles); (8) September 6-9: S (SOA, no primary particles); and (9) September 19-22: PO (oxidized). Results indicated some biological effects with some scenarios. Also during this reporting period, the annual meeting of the TERESA Technical Advisory Committee was held at the Harvard School of Public Health in Boston. During the next reporting period, data analyses will continue for Plant 2 as well as for pooled data from all three plants. Manuscripts documenting the overall

  2. Improving RF Transmit Power and Received Signal Strength in 2.4 GHz ZigBee Based Active RFID System with Embedded Method

    Science.gov (United States)

    Po'ad, F. A.; Ismail, W.; Jusoh, J. F.

    2017-08-01

    This paper describes the experiments and analysis conducted on 2.4 GHz embedded active Radio Frequency Identification (RFID) - Wireless Sensor Network (WSN) based system that has been developed for the purposes of location tracking and monitoring in indoor and outdoor environments. Several experiments are conducted to test the effectiveness and performance of the developed system and two of them is by measuring the Radio Frequency (RF) transmitting power and Received Signal Strength (RSS) to prove that the embedded active RFID tag is capable to generate higher transmit power during data transmission and able to provide better RSS reading compared to standalone RFID tag. Experiments are carried out on two RFID tags which are active RFID tag embedded with GPS and GSM (ER2G); and standalone RFID tag communicating with the same active RFID reader. The developed ER2G contributes 12.26 % transmit power and 6.47 % RSS reading higher than standalone RFID tag. The results conclude that the ER2G gives better performance compared to standalone RFID tag and can be used as guidelines for future design improvements.

  3. Logistics Reduction: RFID Enabled Autonomous Logistics Management (REALM)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Advanced Exploration Systems (AES) Logistics Reduction (LR) project Radio-frequency identification (RFID) Enabled Autonomous Logistics Management (REALM) task...

  4. Perancangan Sistem Pintu Gerbang dengan Sensor Radio Frequency Identification (RFID menggunakan Metode Waterfall

    Directory of Open Access Journals (Sweden)

    Heru Adi Prasetyo

    2013-11-01

    Full Text Available Sistem monitoring pada pintu gerbang merupakan bagian yang penting dalam meningkatkan sistem keamanan. Teknologi yang cocok untuk diaplikasikan dipintu gerbang adalah teknologi RFID (Radio Frequency Identification, karena komunikasi antar tag  dengan RFID reader tidak memerlukan kontak langsung, sehingga cocok digunakan pada sistem yang berjalan secara otomatis. Tag RFID dipasang di kendaraan penghuni sebagai kendaraan yang terdaftar di sistem monitoring, sedangkan kendaraan tamu tidak memiliki tag. Model pengembangan perangkat lunak yang dipakai adalah model waterfall, yang terdiri atas analisis kebutuhan sistem, spesifikasi kebutuhan perangkat lunak, desain perangkat lunak (use case, diagram activity, class diagram, danentity relationship diagram, implementasi perangkat lunak (berupa penulisan kode dan implementasi client server, dan pengujian (pengujian alat, pengujian client server, pengujian user requirement, dan pengujian aplikasi. Hasil akhir penelitian ini adalah sistem pintu gerbang yang menggunakan RFID sebagai sensor kendaraan untuk memonitor kendaraan yang keluar masuk. Data kendaraan yang keluar masuk dikelola secara client server dengan antarmuka pengguna berupa aplikasi client server berbasis JAVA

  5. Quantifying detection performance of a passive low-frequency RFID system in an environmental preference chamber for laying hens

    Science.gov (United States)

    Radio Frequency Identification (RFID) systems have been widely used in production livestock systems for identifying, tracing, and registering animals and improving subsidy management. Adaptations have been made to extend RFID technology to animal behavior and welfare research. An RFID system was imp...

  6. Energy Efficient Cooperation in Underlay RFID Cognitive Networks for a Water Smart Home

    Directory of Open Access Journals (Sweden)

    Adnan Nasir

    2014-09-01

    Full Text Available Shrinking water  resources all over the world and increasing  costs of water consumption  have prompted  water users  and distribution companies  to come up with water conserving strategies. We have proposed an energy-efficient  smart water monitoring application in [1], using low power RFIDs. In the home environment,  there exist many primary interferences within a room, such as cell-phones,  Bluetooth  devices, TV signals, cordless phones and WiFi devices.  In order to reduce the interference  from our proposed RFID network for these primary  devices, we have proposed a cooperating  underlay  RFID cognitive network for our smart application on water.  These underlay  RFIDs should strictly adhere to the interference thresholds to work in parallel with the primary wireless devices [2].  This work is an extension of our previous  ventures proposed in [2,3], and we enhanced the previous efforts by introducing  a new system model and RFIDs.  Our proposed scheme is mutually energy efficient and maximizes the signal-to-noise ratio (SNR for the RFID link, while keeping the interference levels for the primary  network below a certain threshold. A closed form expression for the probability density function (pdf of the SNR at the destination reader/writer and outage probability are derived. Analytical results are verified through simulations. It is also shown that in comparison to non-cognitive selective cooperation,  this scheme performs  better in the low SNR region for cognitive networks. Moreover, the hidden Markov model’s (HMM multi-level variant hierarchical hidden Markov model (HHMM approach is used for pattern recognition and event detection for the data received for this system [4]. Using this model, a feedback and decision algorithm is also developed.  This approach has been applied  to simulated water pressure data from RFID motes, which were embedded in metallic water pipes.

  7. Evaluation of MRI issues for an access port with a radiofrequency identification (RFID) tag.

    Science.gov (United States)

    Titterington, Blake; Shellock, Frank G

    2013-10-01

    A medical implant that contains metal, such as an RFID tag, must undergo proper MRI testing to ensure patient safety and to determine that the function of the RFID tag is not compromised by exposure to MRI conditions. Therefore, the objective of this investigation was to assess MRI issues for a new access port that incorporates an RFID tag. Samples of the access port with an RFID tag (Medcomp Power Injectable Port with CertainID; Medcomp, Harleysville, PA) were evaluated using standard protocols to assess magnetic field interactions (translational attraction and torque; 3-T), MRI-related heating (3-T), artifacts (3-T), and functional changes associated with different MRI conditions (nine samples, exposed to different MRI conditions at 1.5-T and 3-T). Magnetic field interactions were not substantial and will pose no hazards to patients. MRI-related heating was minimal (highest temperature change, 1.7°C; background temperature rise, 1.6°C). Artifacts were moderate in size in relation to the device. Exposures to MRI conditions at 1.5-T and 3-T did not alter or damage the functional aspects of the RFID tag. Based on the findings of the test, this new access port with an RFID tag is acceptable (or, MR conditional, using current MRI labeling terminology) for patients undergoing MRI examinations at 1.5-T/64-MHz and 3-T/128-MHz. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. Impact of RFID on the Retail Value Chain: An Exploratory Study Using a Mixed Method Approach

    Directory of Open Access Journals (Sweden)

    Mithu Bhattacharya

    2012-12-01

    Full Text Available While several large retailers have mandated RFID deployment across their value chains, the case for RFID adoption in retail still remains uncertain. This paper aims at providing a realistic perspective of the immense potential of RFID, taking adoption drivers, potential benefits, and implementation challenges into account. In this paper, a mixed methodological approach is used that caters to the exploratory nature of the work to quantitatively analyze RFID adoption drivers, benefits, and implementation challenges. First content analysis is applied to analyze academic and trade articles to come up with key issues and concepts. The results from the content analysis acted as input for a Delphi study which is the second methodology. The combined results from the two methods provide deep insights and enhance understanding of important implementation issues related to RFID adoption in the retail sector and also aid in drawing meaningful managerial conclusions.

  9. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin; Niver, Edip

    2011-01-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without

  10. Fast Capture­-Recapture Approach for Mitigating the Problem of Missing RFID Tags

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Jacobsen, Rasmus; Popovski, Petar

    2012-01-01

    The technology of Radio Frequency IDentification (RFID) enables many applications that rely on passive, battery-less wireless devices. If a RFID reader needs to gather the ID from multiple tags in its range, then it needs to run an anticollision protocol. Due to errors on the wireless link...

  11. Optimization of the Document Placement in the RFID Cabinet

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study is devoted to the issue of optimization of the document placement in a single RFID cabinet. It has been assumed that the optimization problem means the reduction of archivization time with respect to the information on all documents with RFID tags. Since the explicit form of the criterion function remains unknown, for the purpose of its approximation, the regression analysis method has been used. The method uses data from a computer simulation of the process of archiving data about documents. To solve the optimization problem, the modified gradient projection method has been used.

  12. Locatable-body temperature monitoring based on semi-active UHF RFID tags.

    Science.gov (United States)

    Liu, Guangwei; Mao, Luhong; Chen, Liying; Xie, Sheng

    2014-03-26

    This paper presents the use of radio-frequency identification (RFID) technology for the real-time remote monitoring of body temperature, while an associated program can determine the location of the body carrying the respective sensor. The RFID chip's internal integrated temperature sensor is used for both the human-body temperature detection and as a measurement device, while using radio-frequency communication to broadcast the temperature information. The adopted RFID location technology makes use of reference tags together with a nearest neighbor localization algorithm and a multiple-antenna time-division multiplexing location system. A graphical user interface (GUI) was developed for collecting temperature and location data for the data fusion by using RFID protocols. With a puppy as test object, temperature detection and localization experiments were carried out. The measured results show that the applied method, when using a mercury thermometer for comparison in terms of measuring the temperature of the dog, has a good consistency, with an average temperature error of 0.283 °C. When using the associated program over the area of 12.25 m2, the average location error is of 0.461 m, which verifies the feasibility of the sensor-carrier location by using the proposed program.

  13. Locatable-Body Temperature Monitoring Based on Semi-Active UHF RFID Tags

    Directory of Open Access Journals (Sweden)

    Guangwei Liu

    2014-03-01

    Full Text Available This paper presents the use of radio-frequency identification (RFID technology for the real-time remote monitoring of body temperature, while an associated program can determine the location of the body carrying the respective sensor. The RFID chip’s internal integrated temperature sensor is used for both the human-body temperature detection and as a measurement device, while using radio-frequency communication to broadcast the temperature information. The adopted RFID location technology makes use of reference tags together with a nearest neighbor localization algorithm and a multiple-antenna time-division multiplexing location system. A graphical user interface (GUI was developed for collecting temperature and location data for the data fusion by using RFID protocols. With a puppy as test object, temperature detection and localization experiments were carried out. The measured results show that the applied method, when using a mercury thermometer for comparison in terms of measuring the temperature of the dog, has a good consistency, with an average temperature error of 0.283 °C. When using the associated program over the area of 12.25 m2, the average location error is of 0.461 m, which verifies the feasibility of the sensor-carrier location by using the proposed program.

  14. Multiobjective RFID Network Optimization Using Multiobjective Evolutionary and Swarm Intelligence Approaches

    Directory of Open Access Journals (Sweden)

    Hanning Chen

    2014-01-01

    Full Text Available The development of radio frequency identification (RFID technology generates the most challenging RFID network planning (RNP problem, which needs to be solved in order to operate the large-scale RFID network in an optimal fashion. RNP involves many objectives and constraints and has been proven to be a NP-hard multi-objective problem. The application of evolutionary algorithm (EA and swarm intelligence (SI for solving multiobjective RNP (MORNP has gained significant attention in the literature, but these algorithms always transform multiple objectives into a single objective by weighted coefficient approach. In this paper, we use multiobjective EA and SI algorithms to find all the Pareto optimal solutions and to achieve the optimal planning solutions by simultaneously optimizing four conflicting objectives in MORNP, instead of transforming multiobjective functions into a single objective function. The experiment presents an exhaustive comparison of three successful multiobjective EA and SI, namely, the recently developed multiobjective artificial bee colony algorithm (MOABC, the nondominated sorting genetic algorithm II (NSGA-II, and the multiobjective particle swarm optimization (MOPSO, on MORNP instances of different nature, namely, the two-objective and three-objective MORNP. Simulation results show that MOABC proves to be more superior for planning RFID networks than NSGA-II and MOPSO in terms of optimization accuracy and computation robustness.

  15. Research Algorithm on Building Intelligent Transportation System based on RFID Technology

    Directory of Open Access Journals (Sweden)

    Chuanqi Chen

    2013-05-01

    Full Text Available Intelligent transportation system to all aspects of organic integration of human, vehicle, road and environment of the transport system, so that the operation of functional integration and intelligent vehicle, road. Intelligent transportation system (ITS to improve the efficiency of traffic system by increasing the effective use and management of traffic information is mainly composed of information collection and input, output, control strategy, implementation of the subsystems of data transmission and communication subsystem. The RFID reader to wireless communication through the antenna and RFID tag can achieve a write operation on the tag identification codes and memory read data. The paper proposes research on building intelligent transportation system based on RFID technology. Experimental results show that ITS system can effectively improve the traffic situation, improve the utilization rate of the existing road resource and save social cost.

  16. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  17. Business processes in the RFID-equipped restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents business processes in the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  18. Title Epidemic Model of a Concept within the Subject Classes of Patents: A Case Study on the Term RFID

    Directory of Open Access Journals (Sweden)

    Mohammad Tavakolizade Ravari

    2016-12-01

    Full Text Available The current research aims at studying the epidemic model of the term RFID within the classes of patents. Methodology: The research is descriptive and has been conducted based on the mathematical models of diseases. Research population consists of 35,627 granted patents from the USPTO database those which the terms RFID or Radio Frequency Identification occur in their titles or abstracts. Data analysis was performed through software like Excel, SPSS, and Ravar-Matrix. Findings show that the cumulative growth of sub-classes with the term RFID follows an S-logistic model. This is an evidence of natural growth rate for assigning the term RFID to the USPTO sub-classes over the years.  Other finding reveals that the term RFID has been entered into and exited from the sub-classes of patents like the SIS epidemic model of diseases. As a final conclusion, the most technical fields those that are susceptible for RFID technology, have been met this technology. On the base of SIS model, the epidemic of RFID technology has been reached a balance.

  19. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System

    Directory of Open Access Journals (Sweden)

    Changjiang Xiao

    2016-12-01

    Full Text Available Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web–enabled smart cultural relics management system (SCRMS. In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics.

  20. Experience of foreign armies in the application of RFID technology in logistics

    Directory of Open Access Journals (Sweden)

    Velibor V. Jovanović

    2012-04-01

    Full Text Available RFID technology has found a wide application in both civilian and military systems with very different purposes; moreover, a tremendous growth of its application is predicted in the future. As a support to core activities, both in the Army and business systems, logistics must provide the conditions for a continuous system optimization, which can be achieved by RFID technology. It provides data collecting, processing, automated identification and storage. The most important factors of logistics information systems are satisfied with this technology. The main feature of the logistics of controlling - that data is always to be collected at a source - is also present. Managing supply chains is almost inconceivable without modern information systems. This technology enables automated data processing thus creating conditions which facilitate decision making. Military applications of RFID technology include monitoring codified items to the extent required by competent commanders, as well as documenting changes in business processes within provided logistic functions of supply. This work gives an analytical approach to the methods of RFID technology application in foreign armies with regard to its possible introduction into the practice of the Serbian Army.

  1. RFID tag tester calibration%RFID标签专用测试系统的校准

    Institute of Scientific and Technical Information of China (English)

    邢荣欣

    2011-01-01

    目前,我国对RFID标签的应用非常广泛.然而,对于RFID测试设备/读卡器还没有成熟的校准方法,这不利于RFID标签的质量控制.以典型RFID测试系统MP300TCL1为例,介绍了RFID测试系统的校准方法,并对测量不确定度进行了分析.%RFID tags are widely used in China. However, there's no published calibration method for RFID testing equipments/card readers. This is a threat to the quality of RFID tags. Presents a calibration process for MP300TCL1,one of typical RFID testing equipment. Measurement uncertainties are also laid out.

  2. Divergência genética e subcoleção representativa de populações da traça-do-tomateiro Genetic divergence and representative tomato pinworm populations subcollection

    Directory of Open Access Journals (Sweden)

    Gisele Rodrigues Moreira

    2004-05-01

    Full Text Available O objetivo deste trabalho foi estudar a divergência genética e propor uma subcoleção representativa da traça-do-tomateiro, Tuta absoluta (TDT. O experimento foi conduzido com quatro populações do inseto procedentes de Uberlândia, MG, Viçosa, MG, Camocim de São Félix, PE, e Santa Teresa, ES, e cinco acessos de tomateiro, 'Santa Clara', 'Moneymaker', TOM-601, PI 126445 (Lycopersicon hirsutum f. typicum e PI 134417 (L. hirsutum f. glabratum. Foi realizada análise de agrupamento (método de Tocher, usando a distância de Mahalanobis como medida de dissimilaridade e verificada a importância relativa dos caracteres da TDT para a divergência genética entre populações por meio do método de Singh. As populações de cada grupo obtido pela análise de agrupamento foram combinadas e, para cada caráter, foi realizado o teste t de Student para uma média. Existe variabilidade genética entre populações da TDT provenientes de diferentes localidades do Brasil, quando estão infestando Lycopersicon spp. A mortalidade larval teve maior contribuição para a divergência genética entre as populações, com exceção de PI 134417, cujo caráter de maior contribuição foi o número de pupas fêmeas. Propõe-se uma subcoleção da TDT tomando-se por base a combinação das populações de Santa Teresa e Uberlândia.This work aimed to study the genetic diversity and to propose a representative tomato pinworm, Tuta absoluta (TDT, subcollection. Populations of insect originally from Uberlândia, MG, Viçosa (MG, Camocim de São Félix, PE, and Santa Teresa, ES, Brazil, and five tomato accessions, 'Santa Clara', 'Moneymaker', TOM-601, PI 126445 (Lycopersicon hirsutum f. typicum and PI 134417 (L. hirsutum f. glabratum were used. Grouping analysis (Tocher method, using the Mahalanobis distance as dissimilarity measurement was performed and the relative importance of TDT characters to the genetic divergence among populations was evaluated by Singh

  3. Interaktion mit RFID Ausleih- und Rückgabeautomaten

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Heyroth, Melanie; Klingbeil, Karin

    2011-01-01

    Der Artikel untersucht mittels Beobachtung die Interaktion zwischen RFID-Ausleih- und Rückgabeautomaten sowie Bibliotheksbenutzern in vier deutschen Bibliotheken. Die Ergebnisse belegen, dass die Interaktion grundsätzlich funktioniert. Die Benutzer zeigten Gelassenheit und Routine im Umgang mit den...

  4. Design of the RFID for Storage of Biological Information

    Directory of Open Access Journals (Sweden)

    Sang-Hee Son

    2009-02-01

    Full Text Available Recent advances in RFID (radio frequency identification technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stores vital biological information such as body temperature and blood pressure and heartbeat in accordance with the EPC global Class-1 standard. Biological data is obtained from a sensor technology that is based on resistance deviation-to-pulse width converter. The integrated chip consists of an analog front end, command interpreter, collision avoidance block, data storage, sensors, and interface circuitry. The system is capable of supporting heartbeats in the range of 40~200 beats per a minute and blood pressure 0~300mmHg. The proposed system employs collision free algorithm that supports access to single tag within a multiple tag environment. The approach facilitates intelligent management of patients in hospitals as part of an integrated healthcare management system.

  5. RFID security : cryptography and physics perspectives

    NARCIS (Netherlands)

    Guajardo, J.; Tuyls, P.T.; Bird, N.; Conrado, C.; Maubach, S.; Schrijen, G.J.; Skoric, B.; Tombeur, A.M.H.; Thueringer, P.; Kitsos, P.; Zhang, Y.

    2008-01-01

    In this chapter, we provide an overview of mechanisms that are cheap to implement or integrate into RFID tags and that at the same time enhance their security and privacy properties. We emphasize solutions that make use of existing (or expected) functionality on the tag or that are inherently cheap

  6. Medical equipment management through the use of radio frequency identification (RFID)

    OpenAIRE

    Sanchez, Joaquin A.; Nixon, Richard A.; Chávez, Sergio

    2004-01-01

    MBA Professional Report Approved for public release, distribution is unlimited The purpose of this MBA project is to identify the potential value of Radio Frequency Identification (RFID) use in the management of medical equipment at Naval Medical Center San Diego (NMCSD). In doing so, our project seeks to derive potential benefits through the use of RFID technology by comparing a group of medical equipment items that are tracked within NMCSD. The project includes a discussion of additio...

  7. Simulator for testing hardware and software of the office system with RFID tags

    Directory of Open Access Journals (Sweden)

    Nowicki Tadeusz

    2017-01-01

    Full Text Available This paper presents the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged documents was installed. Furthermore, the system cooperates with many other elements of the office (cabinets, sluices, copiers, try rider, end so one. The examination of the properties of the RFID-tagged document management system is, in this case, complex due to the number of a possible examination scenarios. The simulator method for examining the system properties was design and implemented. It allows to conduct the examination of the properties in a short period of time for numerous testing scenarios.

  8. RFID Technology Application and Research%RFID技术的应用与研究

    Institute of Scientific and Technical Information of China (English)

    李琰

    2011-01-01

    RFID(radio frequency identification)technology is a new automatic identification technology, this paper outlines the basic concepts of RFID,system components and working principle and practical application, and then understand that although RFID technology is not mature,and confident in the development of RFID.%RFID(射频识别)技术是一种全新的自动识别技术,本文概述RFID的基本概念、系统组成及工作原理和实际应用,进而了解了虽然RFID技术没有成熟,并对RFID的发展充满信心。

  9. The occupational health of Santa Claus

    OpenAIRE

    Straube, Sebastian; Fan, Xiangning

    2015-01-01

    Previous publications in the field of Santa studies have not focused on health and safety issues arising from Santa?s workplace activities. However, it should be acknowledged that unique occupational hazards exist for Santa Claus. Major occupational health issues affecting Santa are discussed, along with suggestions for future research directions.

  10. A Numerical Estimation of a RFID Reader Field and SAR inside a Blood Bag at UHF

    Directory of Open Access Journals (Sweden)

    Alessandro Fanti

    2016-11-01

    Full Text Available In this paper, the effects of UHF electromagnetic fields produced by a RFID reader on a blood bag are evaluated numerically in several configurations. The results of the simulation, field level and distribution, specific absorption rate (SAR, and heating time show that an exposure to a typical reader field leads to a temperature increase smaller than 0.1 C and to a SAR smaller than 1 W/kg. As a consequence, no adverse biological effects occur during a typical UHF RFID reading cycle on a blood bag. Therefore, the blood contained in a bag traced using UHF-RFID is as safe as those traced using barcodes. The proposed analysis supports the use of UHF RFID in the blood transfusion supply chain.

  11. Teaching Management System with Applications of RFID and IoT Technology

    Directory of Open Access Journals (Sweden)

    Ping Tan

    2018-02-01

    Full Text Available Currently, Internet of Things (IoT technologies are used in many areas, such as intelligent transportation, smart city, hospital, games, education. Earlier interactive response system uses infrared or radio frequency (RF wireless communication technologies to transmit the students’ answer to teachers’ managerment system, where there exists high cost, inconvenient usage, difficult deployment. How to use IoT to improve the quality of higher education becomes a very important topic in the researh area of teaching. Radio Frequency Identification (RFID is one of key technologies to implement IoT applications, and most of universities use the High Frequency (HF RFID card as the students’ identification devices in China. In this paper, a kind of WiFi supported RFID reader (WiRF is implemented using open source hardware platforms, such as Node MCU and RFID-RC522. Then the proposed WiRF system is used to assist teacher to perform automatic attendance record and students’ behavior record. In addition, Quick Response (QR code is another technology to enable IoT. In this paper, QR code is designed to quickly access course video and perform real-time interactive response in the classroom, which will provide multidimensional learning and strengthen the motivation of students’ learning. This IoT system can improve the attendance of students, and give a positive impact on students’ learning process for higher education.

  12. Motion direction estimation based on active RFID with changing environment

    Science.gov (United States)

    Jie, Wu; Minghua, Zhu; Wei, He

    2018-05-01

    The gate system is used to estimate the direction of RFID tags carriers when they are going through the gate. Normally, it is difficult to achieve and keep a high accuracy in estimating motion direction of RFID tags because the received signal strength of tag changes sharply according to the changing electromagnetic environment. In this paper, a method of motion direction estimation for RFID tags is presented. To improve estimation accuracy, the machine leaning algorithm is used to get the fitting function of the received data by readers which are deployed inside and outside gate respectively. Then the fitted data are sampled to get the standard vector. We compare the stand vector with template vectors to get the motion direction estimation result. Then the corresponding template vector is updated according to the surrounding environment. We conducted the simulation and implement of the proposed method and the result shows that the proposed method in this work can improve and keep a high accuracy under the condition of the constantly changing environment.

  13. Integrated management platform of nuclear fuel storage and transportation based on RFID

    International Nuclear Information System (INIS)

    Song Yafeng; Ma Yanqin; Chen Liyu; Jiang Yong; Wu Jianlei; Yang Haibo; Zhang Haiyan

    2012-01-01

    This paper describes integrated system model to improve work efficiency and optimize control measures of nuclear fuel storage and transportation, RFID and information integration technology is introduced, traditional management processes are innovated in data acquisition and monitoring fields as well, system solutions and design model are given by emphasizing on the following key technologies: cascade protection of information system, security protocol of RFID information, algorithm of collision. (authors)

  14. Design of Solar Harvested Semi Active RFID Transponder with Supercapacitor Storage

    OpenAIRE

    Gary Valentine; Lukas Vojtech; Marek Neruda

    2015-01-01

    This paper presents the analysis, design and manufacture of a low cost, low maintenance and long-range prototype of RFID transponder with continuous operability. A prototype of semi-active RFID transponder is produced with a range that can be extended via a DC input to allow all of the readers signal power to be reflected via backscatter modulation. The transponder is powered via solar harvested power which is selected over other energy harvesting technologies as it provides a greater energy ...

  15. Mobile 3D Viewer Supporting RFID System

    International Nuclear Information System (INIS)

    Kim, J. J.; Yang, S. W.; Choi, Y.

    2007-01-01

    As hardware capabilities of mobile devices are being rapidly enhanced, applications based upon mobile devices are also being developed in wider areas. In this paper, a prototype mobile 3D viewer with the object identification through RFID system is presented. To visualize 3D engineering data such as CAD data, we need a process to compute triangulated data from boundary based surface like B-rep solid or trimmed surfaces. Since existing rendering engines on mobile devices do not provide triangulation capability, mobile 3D programs have focused only on an efficient handling with pre-tessellated geometry. We have developed a light and fast triangulation process based on constrained Delaunay triangulation suitable for mobile devices in the previous research. This triangulation software is used as a core for the mobile 3D viewer on a PDA with RFID system that may have potentially wide applications in many areas

  16. Mobile 3D Viewer Supporting RFID System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, J J; Yang, S W; Choi, Y [Chungang Univ., Seoul (Korea, Republic of)

    2007-07-01

    As hardware capabilities of mobile devices are being rapidly enhanced, applications based upon mobile devices are also being developed in wider areas. In this paper, a prototype mobile 3D viewer with the object identification through RFID system is presented. To visualize 3D engineering data such as CAD data, we need a process to compute triangulated data from boundary based surface like B-rep solid or trimmed surfaces. Since existing rendering engines on mobile devices do not provide triangulation capability, mobile 3D programs have focused only on an efficient handling with pre-tessellated geometry. We have developed a light and fast triangulation process based on constrained Delaunay triangulation suitable for mobile devices in the previous research. This triangulation software is used as a core for the mobile 3D viewer on a PDA with RFID system that may have potentially wide applications in many areas.

  17. Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers

    Directory of Open Access Journals (Sweden)

    Kwang Cheol Shin

    2009-02-01

    Full Text Available In the fields of production, manufacturing and supply chain management, Radio Frequency Identification (RFID is regarded as one of the most important technologies. Nowadays, Mobile RFID, which is often installed in carts or forklift trucks, is increasingly being applied to the search for and checkout of items in warehouses, supermarkets, libraries and other industrial fields. In using Mobile RFID, since the readers are continuously moving, they can interfere with each other when they attempt to read the tags. In this study, we suggest a Time Division Multiple Access (TDMA based anti-collision algorithm for Mobile RFID readers. Our algorithm automatically adjusts the frame size of each reader without using manual parameters by adopting the dynamic frame size adjustment strategy when collisions occur at a reader. Through experiments on a simulated environment for Mobile RFID readers, we show that the proposed method improves the number of successful transmissions by about 228% on average, compared with Colorwave, a representative TDMA based anti-collision algorithm.

  18. Enhanced TDMA Based Anti-Collision Algorithm with a Dynamic Frame Size Adjustment Strategy for Mobile RFID Readers.

    Science.gov (United States)

    Shin, Kwang Cheol; Park, Seung Bo; Jo, Geun Sik

    2009-01-01

    In the fields of production, manufacturing and supply chain management, Radio Frequency Identification (RFID) is regarded as one of the most important technologies. Nowadays, Mobile RFID, which is often installed in carts or forklift trucks, is increasingly being applied to the search for and checkout of items in warehouses, supermarkets, libraries and other industrial fields. In using Mobile RFID, since the readers are continuously moving, they can interfere with each other when they attempt to read the tags. In this study, we suggest a Time Division Multiple Access (TDMA) based anti-collision algorithm for Mobile RFID readers. Our algorithm automatically adjusts the frame size of each reader without using manual parameters by adopting the dynamic frame size adjustment strategy when collisions occur at a reader. Through experiments on a simulated environment for Mobile RFID readers, we show that the proposed method improves the number of successful transmissions by about 228% on average, compared with Colorwave, a representative TDMA based anti-collision algorithm.

  19. A novel method of robot location using RFID and stereo vision

    Science.gov (United States)

    Chen, Diansheng; Zhang, Guanxin; Li, Zhen

    2012-04-01

    This paper proposed a new global localization method for mobile robot based on RFID (Radio Frequency Identification Devices) and stereo vision, which makes the robot obtain global coordinates with good accuracy when quickly adapting to unfamiliar and new environment. This method uses RFID tags as artificial landmarks, the 3D coordinate of the tags under the global coordinate system is written in the IC memory. The robot can read it through RFID reader; meanwhile, using stereo vision, the 3D coordinate of the tags under the robot coordinate system is measured. Combined with the robot's attitude coordinate system transformation matrix from the pose measuring system, the translation of the robot coordinate system to the global coordinate system is obtained, which is also the coordinate of the robot's current location under the global coordinate system. The average error of our method is 0.11m in experience conducted in a 7m×7m lobby, the result is much more accurate than other location method.

  20. Using RFID Positioning Technology to Construct an Automatic Rehabilitation Scheduling Mechanism.

    Science.gov (United States)

    Wang, Ching-Sheng; Hung, Lun-Ping; Yen, Neil Y

    2016-01-01

    Accurately and efficiently identifying the location of patients during the course of rehabilitation is an important issue. Wireless transmission technology can reach this goal. Tracking technologies such as RFID (Radio frequency identification) can support process improvement and improve efficiencies of rehabilitation. There are few published models or methods to solve the problem of positioning and apply this technology in the rehabilitation center. We propose a mechanism to enhance the accuracy of positioning technology and provide information about turns and obstacles on the path; and user-centered services based on location-aware to enhanced quality care in rehabilitation environment. This paper outlines the requirements and the role of RFID in assisting rehabilitation environment. A prototype RFID hospital support tool is established. It is designed to provide assistance for monitoring rehabilitation patients. It can simultaneously calculate the rehabilitant's location and the duration of treatment, and automatically record the rehabilitation course of the rehabilitant, so as to improve the management efficiency of the rehabilitation program.

  1. Improved Nondestructive Disassembly Process using Augmented Reality and RFID Product/Part Tracking

    Directory of Open Access Journals (Sweden)

    Ile Mircheski

    2017-11-01

    Full Text Available The waste from electric and electronic equipment and discarded automobiles in the past grew rapidly and resulted with waste in billions of tones. The aim of this paper is to present an improved non-destructive disassembly process of electromechanical products using augmented reality based devices, such as glasses, tablets or mobile phones, and RFID technology for valuable product/part tracking. The proposed method includes tagging of components of interest in the product assembly by using a RFID tag. The valuable product is marked with specific ID number written in the RFID tag, in order to declare the product. The relevant data such as material and weight of components, guidelines for non-destructive disassembly for the valuable product and removing of component of interest will be obtained with the assistance of RFID tag and a centralized database. This modular system offers guidelines for the non-destructive disassembly process for obtaining valuable component of interest intended for easy repairs, remanufacture, reuse or recycling. The guidelines are in video presentation format using augmented reality for easy visualization of non-destructive disassembly process. The benefits of proposed modular system includes biggest percentage of reuse of the valuable components, easy maintaining, improved material recycling, environmental protection and greater total return form end of life products.

  2. RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy

    OpenAIRE

    Li, Peng; Xu, Chao; Chen, Long; Wang, Ruchuan

    2015-01-01

    Evaluation of security risks in radio frequency identification (RFID) systems is a challenging problem in Internet of Things (IoT). This paper proposes an extended attack tree (EAT) model to identify RFID system’s flaws and vulnerabilities. A corresponding formal description of the model is described which adds a probability SAND node together with the probability attribute of the node attack. In addition, we model the process of an RFID data privacy attack based on EAT, taking a sensitive in...

  3. A meta-analysis of determinants of RFID adoption around the world: Organization, technology, and public policy

    Directory of Open Access Journals (Sweden)

    Sabinne Lee

    2017-01-01

    Full Text Available Purpose - This paper aims to explore various factors associated with radio frequency identification (RFID adoption with quantitative meta-analysis. More specifically, this paper attempts to measure key variables of RFID adoption derived from Rogers’ innovation theory and further examines how state intervention influences the process of RFID adoption. First, this paper compares, relying on a meta-analysis, various mean effect sizes among technological, organizational and environmental factors (i.e. government-driven policies that Rogers suggested in his innovation model. Design/methodology/approach - In mean effect size analysis, this paper finds that the technological factor is the most powerful factor that affects the RFID adoption. The technological factor is statistically significant across all regions, including North America, Europe and Asia. The organizational factor is significant only in developing countries like Southeast Asian countries and East Asian countries. Environmental factors like government intervention for facilitating RFID adoption are strong enough only in Southeast Asia and Europe. Findings - This paper finds that government’s supportive policy is more effective in Europe but not in America, while external pressure is still more effective in Southeast Asia. These results implicate that developmentalism or government-driven policy can be effective not only in developing countries but also in the case of developed countries. In addition, this paper conducts a seemingly unrelated regression (SUR analysis based on Fisher’s standardized score. Originality/value - In SUR analysis, this paper finds that the correlations between RFID adoption intention and three innovation factors vary across industrial areas. More specifically, the manufacturing area shows negative moderating effect on all three equations where correlations between Rogers’ innovation factors and RFID adoption intention are meta-dependent variables. Also

  4. A Compact RFID Reader Antenna for UHF Near-Field and Far-Field Operations

    Directory of Open Access Journals (Sweden)

    Lai Xiao zheng

    2013-01-01

    Full Text Available A compact loop antenna is presented for mobile ultrahigh frequency (UHF radio frequency identification (RFID application. This antenna, printed on a 0.8 mm thick FR4 substrate with a small size of 31 mm × 31 mm, achieves good impedance bandwidth from 897 to 928 MHz, which covers USA RFID Band (902–928 MHz. The proposed loop configuration, with a split-ring resonator (SRR coupled inside it, demonstrates strong and uniform magnetic field distribution in the near-field antenna region. Its linearly polarized radiation pattern provides available far-field gain. Finally, the reading capabilities of antenna are up to 56 mm for near-field and 1.05 m for far-field UHF RFID operations, respectively.

  5. Low Cost Writeable RFID Tag With MRAM Memory

    National Research Council Canada - National Science Library

    Beech, Russell

    1998-01-01

    This program's goal was to develop a writeable RFID tag using an integrated, permeable core coil as the inductor/antenna for communication and power transfer and MRAM as the low write energy, nonvolatile memory...

  6. The Anti-RFI Design of Intelligent Electric Energy Meters with UHF RFID

    Science.gov (United States)

    Chen, Xiangqun; Huang, Rui; Shen, Liman; chen, Hao; Xiong, Dezhi; Xiao, Xiangqi; Liu, Mouhai; Xu, Renheng

    2018-03-01

    In order to solve the existing artificial meter reading watt-hour meter industry is still slow and inventory of common problems, using the uhf radio frequency identification (RFID) technology and intelligent watt-hour meter depth fusion, which has a one-time read multiple tags, identification distance, high transmission rate, high reliability, etc, while retaining the original asset management functions, in order to ensure the uhf RFID and minimum impact on the operation of the intelligent watt-hour meter, proposed to improve the stability of the electric meter system while working at the same time, this paper designs the uhf RFID intelligent watt-hour meter radio frequency interference resistance, put forward to improve intelligent watt-hour meter electromagnetic compatibility design train of thought, and introduced its power and the hardware circuit design of printed circuit board, etc.

  7. Pouvoir et sexe : La favorita del Señor, roman de Ana Teresa Torres

    OpenAIRE

    Delprat, François

    2015-01-01

    La favorita del Señor (2001), roman de Ana Teresa Torres, se caractérise à la fois comme roman érotique et comme roman historique : la belle mauresque Aisa doit à une initiation précoce à l’art du sexe, dans son île natale méditerranéenne, d’accéder, devenue captive, à une exceptionnelle destinée en terre chrétienne. Éduquée par une esclave dans l’exultation des corps (danse érotique), elle est tour à tour bonne élève, adolescente passionnée, victime soumise et conquérante. La contradictoire ...

  8. Implementasi Sistem Perparkiran Otomatis dengan Menentukan Posisi Parkir Berbasis RFId

    Directory of Open Access Journals (Sweden)

    FREEON ALKAPON IMBIRI

    2016-02-01

    Full Text Available ABSTRAK Apartemen merupakan salah satu tempat tinggal yang ideal di kota metropolitan yang menyediakan banyak fasilitas bagi penghuninya. Salah satu fasilitas tersebut adalah tersedianya area parkir yang memadai dan nyaman bagi penghuni yang memiliki kendaraan, pada kenyataannya saat ini sistem perparkiran yang digunakan masih bermasalah. Masalah yang ditimbulkan dalam sistem perparkiran adalah kurangnya informasi mengenai lahan parkir yang kosong serta penempatan kendaraan yang tidak sesuai sehingga sering kali pemilik kendaraan membutuhkan waktu yang lama untuk sekedar menemukan tempat parkir yang kosong. Berdasarkan hal itu diperlukan sebuah sistem monitoring parkir yang memudahkan pengendara kendaraan yang hendak parkir. Tujuan penelitian ini adalah merancang dan merealisasikan model sistem monitoring perparkiran dengan fasilitas pemilihan area parkir menggunakan Teknologi RFId. Perangkat lunak yang digunakan pada sistem ini dirancang dengan menggunakan bahasa C#. Pada sistem ini proses pengambilan data secara kontinyu menggunakan mikrokontroler Atmega16 sebagai komponen kendali utamanya. Pengujian dilakukan secara simulasi pada miniatur perparkiran. Hasil pengujian model sistem perparkiran dapat menampilkan kondisi dari masing-masing area parkir yang ditampilkan pada display. Sistem pengambilan data secara kontinyu menggunakan kartu RFId sistem ini dapat menggantikan operator. Sensor cahaya (LED dan LDR akan berlogika 1 jika ada mobil yang lewat. Kata kunci: Parkir, RFId, LED, LDR, Mikrokontroler, Atmega16, Microsoft Acess, C#. ABSTRACT Apartment is an ideal place of living in a big city ,it provides a lot of facilities .One of apartment facilities is a parking lot that are adequate and comfortable for its occupants who have vehicles . Problems caused in the parking system is the lack of information regarding the parking lot is empty and the placement of the vehicle that is not in accordance with the wishes so that often the owner of the

  9. Research on pipe welding information management system basedon RFID

    Directory of Open Access Journals (Sweden)

    Liu Xun

    2016-01-01

    Full Text Available This paper introduces the construction background, construction target and construction principle of the pipe welding management system based on RFID. Then, describes the specific requirements of the system. The basic principle and key technology of the system are introduced. The structure of the system (including the system design, the selections of handheld devices and high frequency passive RFID tags is described .Then the system management software designs (including software structure, the main functions of the management center system and the main functions of the handheld detection system are described in detail. Finally, the management system is implemented, and it is deployed to several Gas Co, which has chieved good results.

  10. RFID-lukijaa hyödyntävä Android-pohjainen esittelysovellus

    OpenAIRE

    Kare, Lauri

    2012-01-01

    Tässä opinnäytetyössä suunniteltiin ja toteutettiin Nordic ID Sampo RFID -lukijaa hyödyntävä Android-verkkosovellus, verkkopohjainen käyttöliittymä ja tietokanta. Projektin tarkoituksena oli luoda esittelysovellus messutapahtumiin, jolla havainnollistetaan sitä, että Nordic ID Sampo RFID -lukijaa voidaan hyödyntää myös Android-taulutietokoneessa. Android-verkkosovellus ohjelmoitiin Javalla ja täydennettiin XML-tekniikalla. Verkkopohjainen käyttöliittymä ohjelmoitiin käyttäen HTML-, CSS-, ...

  11. Misplaced Inventory and Lead-Time in the Supply Chain: Analysis of Decision-Making on RFID Investment with Service Level

    Directory of Open Access Journals (Sweden)

    Li-Hao Zhang

    2014-01-01

    Full Text Available Radio-frequency identification (RFID, as the key technology of Internet of Things (IoT, has been hailed as a major innovation to solve misplaced inventory and reduce lead-time. Many retailers have been pushing their suppliers to invest this technology. However, its associated costs seem to prohibit its widespread application. This paper analyzes the situation of service level in a retail supply chain, which has resulted from misplaced inventory and lead-time. By newsvendor model, we analyze the difference between with- and without-RFID technologies in service level of centralized and decentralized supply chains, respectively. Then with different service levels, we determine the tag cost thresholds at which RFID technology investment becomes profitable in centralized and decentralized supply chains, respectively. Furthermore, we apply a linear transfer payment coefficient strategy to coordinate with the decentralized supply chain. It is found that whether the adoption of RFID technology improves the service level depends on the cost of RFID tag in the centralized system, but it improves the service level in the decentralized system when only the supplier bears the cost of RFID tag. Moreover, the same cost thresholds of RFID tag with different service levels exist in both the centralized and the decentralized cases.

  12. RFID Supply Chain Management System for Naval Logistics

    National Research Council Canada - National Science Library

    McCredie, Alexander

    2005-01-01

    ...) embodied in the structure of a Dynamic Smart Box (DSB). A middle-ware called Inteliware interfaces with the RFID components and computers in the DSB and inputs the requisite data into the Dynamic Smart Manifest...

  13. An Effective Scheduling-Based RFID Reader Collision Avoidance Model and Its Resource Allocation via Artificial Immune Network

    OpenAIRE

    Wang, Shanjin; Li, Zhonghua; He, Chunhui; Li, Jianming

    2016-01-01

    Radio frequency identification, that is, RFID, is one of important technologies in Internet of Things. Reader collision does impair the tag identification efficiency of an RFID system. Many developed methods, for example, the scheduling-based series, that are used to avoid RFID reader collision, have been developed. For scheduling-based methods, communication resources, that is, time slots, channels, and power, are optimally assigned to readers. In this case, reader collision avoidance is equ...

  14. Rancang Bangun Keanggotaan Perpustakaan STT Telematika Telkom Menggunakan RFID Berbasis Java 2 Standard Edition Dengan Konsep Client Server

    Directory of Open Access Journals (Sweden)

    Yana Yuniarsyah

    2013-05-01

    Full Text Available RFID technology is a new technology that hasn’t been widely applied. The existence of this technology can reduce the disadvantages of barcode technology. One application of RFID technology is used for a library card. STT Telematika Library is a library that uses a membership card to borrow and return transactions only. The existence of RFID technology in the card member can create a multifunctional card, in addition to borrow and return books transactions, membership cards can be used for visitor attendance too. Distribution of visitor attendance and report library using client-server concept, thus make it easier for librarians in data management. The programming language used in the design of Library Information System is a Java 2 Standard Edition (J2SE using NetBeans 7.0 as IDE. Storage Library using the MySQL database. Software design method using waterfall or linear sequential models. Model design to make information sistem using Unified Modeling Language (UML like usecase diagram, activity diagram, and class diagram. Database design model using Entity Relationship Diagram (ERD for development information library system. Testing library information system have form with testing user requirements, test the program using blacbox testing, and testing the user. RFID used for library information systems have form such as RFID reader which used to read the information carried by the RFID tag and RFID tag used to transmit information to the RFID reader. The success of the client-server concept comes from the success of visitor attendance and show a report from the client, and the success of server to store visitor attendance data.

  15. Towards an Effective Management Strategy for Passive RFID Implementation

    National Research Council Canada - National Science Library

    Fisch, John N; Koch, David M

    2004-01-01

    .... However, many issues central to passive RFID implementation remain unresolved. First and foremost, a comprehensive management strategy, including a complete redesign of business practices, must be developed...

  16. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains

    Directory of Open Access Journals (Sweden)

    Xunjun Chen

    2015-06-01

    Full Text Available One of the major applications of Radio Frequency Identification (RFID technology is in supply chain management as it promises to provide real-time visibility based on the function of track and trace. However, such an RFID-based track and trace system raises new security and privacy challenges due to the restricted resource of tags. In this paper, we refine three privacy related models (i.e., the privacy, path unlinkability, and tag unlinkability of RFID-based track and trace systems, and clarify the relations among these privacy models. Specifically, we have proven that privacy is equivalent to path unlinkability and tag unlinkability implies privacy. Our results simplify the privacy concept and protocol design for RFID-based track and trace systems. Furthermore, we propose an efficient track and trace scheme, Tracker+, which allows for authentic and private identification of RFID-tagged objects in supply chains. In the Tracker+, no computational ability is required for tags, but only a few bytes of storage (such as EPC Class 1 Gen 2 tags are needed to store the tag state. Indeed, Tracker+ reduces the memory requirements for each tag by one group element compared to the Tracker presented in other literature. Moreover, Tracker+ provides privacy against supply chain inside attacks.

  17. Experimental assessment of an RFID-based crack sensor for steel structures

    Science.gov (United States)

    E Martínez-Castro, R.; Jang, S.; Nicholas, J.; Bansal, R.

    2017-08-01

    The use of welded steel cover plates had been a common design practice to increase beam section capacity in regions of high moment for decades. Many steel girder bridges with cover plates are still in service. Steel girder bridges are subject to cyclic loading, which can initiate crack formation at the toe of the weld and reduce beam capacity. Thus, timely detection of fatigue cracks is of utmost importance in steel girder bridge monitoring. To date, crack monitoring methods using in-house radio frequency identification (RFID)-based sensors have been developed to complement visual inspection and provide quantitative information of damage level. Offering similar properties at a reduced cost, commercial ultra-high frequency (UHF) passive RFID tags have been identified as a more financially viable option for pervasive crack monitoring using a dense array of sensors. This paper presents a study on damage sensitivity of low-cost commercial UHF RFID tags for crack detection and monitoring on metallic structures. Using backscatter power as a parameter for damage identification, a crack sensing system has been developed for single and multiple tag configurations for increased sensing pervasiveness. The effect on backscatter power of the existence and stage of crack propagation has been successfully characterized. For further automation of crack detection, a damage index based on the variation of backscatter power has also been established. The tested commercial RFID-based crack sensor contributes to the usage of this technology on steel girder bridges.

  18. Introducing RFID at Middlesex University Learning Resources

    Science.gov (United States)

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  19. Jamming protection of spread spectrum RFID system

    Science.gov (United States)

    Mazurek, Gustaw

    2006-10-01

    This paper presents a new transform-domain processing algorithm for rejection of narrowband interferences in RFID/DS-CDMA systems. The performance of the proposed algorithm has been verified via computer simulations. Implementation issues have been discussed. The algorithm can be implemented in the FPGA or DSP technology.

  20. EDMC: An enhanced distributed multi-channel anti-collision algorithm for RFID reader system

    Science.gov (United States)

    Zhang, YuJing; Cui, Yinghua

    2017-05-01

    In this paper, we proposes an enhanced distributed multi-channel reader anti-collision algorithm for RFID environments which is based on the distributed multi-channel reader anti-collision algorithm for RFID environments (called DiMCA). We proposes a monitor method to decide whether reader receive the latest control news after it selected the data channel. The simulation result shows that it improves interrogation delay.

  1. Investigation of Interference Models for RFID Systems

    Directory of Open Access Journals (Sweden)

    Linchao Zhang

    2016-02-01

    Full Text Available The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

  2. Maximum Likelihood Approach for RFID Tag Set Cardinality Estimation with Detection Errors

    DEFF Research Database (Denmark)

    Nguyen, Chuyen T.; Hayashi, Kazunori; Kaneko, Megumi

    2013-01-01

    Abstract Estimation schemes of Radio Frequency IDentification (RFID) tag set cardinality are studied in this paper using Maximum Likelihood (ML) approach. We consider the estimation problem under the model of multiple independent reader sessions with detection errors due to unreliable radio...... is evaluated under dierent system parameters and compared with that of the conventional method via computer simulations assuming flat Rayleigh fading environments and framed-slotted ALOHA based protocol. Keywords RFID tag cardinality estimation maximum likelihood detection error...

  3. A Novel Technology for Motion Capture Using Passive UHF RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2013-01-01

    Although there are several existing methods for human motion capture, they all have important limitations and hence there is the need to explore fundamentally new approaches. Here we present a method based on a Radio Frequency IDentification (RFID) system with passive Ultra High Frequency (UHF...... walking. The reference joint angles for the validation were obtained by an optoelectronic system. Although the method is in its initial phase of development, the results of the validation are promising and show that the movement information can be extracted from the RFID response signals....

  4. Tecnología RFID en Colombia, un negocio con muchas oportunidades

    OpenAIRE

    León Fajardo, Federico

    2013-01-01

    Este trabajo busca identificar y definir porque la tecnología RFID puede ser un buen negocio de oportunidad en el mercado Colombiano, cada vez esté, está más enfocado en generar procesos de mejora continua que produzcan eficiencia al interior de las organizaciones, actualmente el uso de la tecnología es una herramienta clave para que las organizaciones se mantengan a la vanguardia. Con base en el estudio vemos que la tecnología RFID, genera eficiencia en el flujo de la información, mejora el ...

  5. Implanting inequality: empirical evidence of social and ethical risks of implantable radio-frequency identification (RFID) devices.

    Science.gov (United States)

    Monahan, Torin; Fisher, Jill A

    2010-10-01

    The aim of this study was to assess empirically the social and ethical risks associated with implantable radio-frequency identification (RFID) devices. Qualitative research included observational studies in twenty-three U.S. hospitals that have implemented new patient identification systems and eighty semi-structured interviews about the social and ethical implications of new patient identification systems, including RFID implants. The study identified three primary social and ethical risks associated with RFID implants: (i) unfair prioritization of patients based on their participation in the system, (ii) diminished trust of patients by care providers, and (iii) endangerment of patients who misunderstand the capabilities of the systems. RFID implants may aggravate inequalities in access to care without any clear health benefits. This research underscores the importance of critically evaluating new healthcare technologies from the perspective of both normative ethics and empirical ethics.

  6. Comparative Method for Indirect Sensitivity Measurement of UHF RFID Reader with Respect to Interoperability and Conformance Requirements

    Directory of Open Access Journals (Sweden)

    Lukas Kypus

    2014-01-01

    Full Text Available There is never-ending race for the competitive advantage that forces RFID technology service integrators to focus more on used technology qualitative aspects and theirs impacts inside RFID ecosystem. This paper contributes to UHF RFID reader qualitative parameters evaluation and assessment problematic. It presents and describes in details indirect method and procedure of sensitivity measurement created for UHF RFID readers. We applied this method on RFID readers within prepared test environment and confirmed long term intention and recognized trend. Due to regulations limitations, there is not possible to increase output power over defined limits, but there are possibilities to influence reader sensitivity. Our proposal is to use customized comparative measurement method with insertion loss compensation for return link. Beside the main goal achievement, results show as well the qualitative status of development snapshot of reader. Method and following experiment helped us to gain an external view, current values of important parameters and motivation we want to follow up on as well as compared developed reader with its commercial competitors.

  7. Theory and application on RFID

    International Nuclear Information System (INIS)

    Cho, Dae Jin

    2005-02-01

    This book tells of definition, system, operation method and classification of RFID, prospect of market, tag such as types, making process of tag, operation way and structure of tag, store of tag data and tag price, chip less tag like leader, antenna ; EPC global such as appearance of Auto-ID center, introduction of EPC system, middle ware, ONS, EPC IS and PML, a manufacturer, standardization, frequency, application cases abroad home, problems and labeling.

  8. Theory and application on RFID

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Dae Jin

    2005-02-15

    This book tells of definition, system, operation method and classification of RFID, prospect of market, tag such as types, making process of tag, operation way and structure of tag, store of tag data and tag price, chip less tag like leader, antenna ; EPC global such as appearance of Auto-ID center, introduction of EPC system, middle ware, ONS, EPC IS and PML, a manufacturer, standardization, frequency, application cases abroad home, problems and labeling.

  9. An RFID-Based Smart Nest Box: An Experimental Study of Laying Performance and Behavior of Individual Hens

    Directory of Open Access Journals (Sweden)

    Ying-Ren Chien

    2018-03-01

    Full Text Available This study designed a radio-frequency identification (RFID-based Internet of Things (IoT platform to create the core of a smart nest box. At the sensing level, we have deployed RFID-based sensors and egg detection sensors. A low-frequency RFID reader is installed in the bottom of the nest box and a foot ring RFID tag is worn on the leg of individual hens. The RFID-based sensors detect when a hen enters or exits the nest box. The egg-detection sensors are implemented with a resistance strain gauge pressure sensor, which weights the egg in the egg-collection tube. Thus, the smart nest box makes it possible to analyze the laying performance and behavior of individual hens. An evaluative experiment was performed using an enriched cage, a smart nest box, web camera, and monitoring console. The hens were allowed 14 days to become accustomed to the experimental environment before monitoring began. The proposed IoT platform makes it possible to analyze the egg yield of individual hens in real time, thereby enabling the replacement of hens with egg yield below a pre-defined level in order to meet the overall target egg yield rate. The results of this experiment demonstrate the efficacy of the proposed RFID-based smart nest box in monitoring the egg yield and laying behavior of individual hens.

  10. El espíritu de la verdad en Teresa de Jesús y Edith Stein. Testimonio y mística

    Directory of Open Access Journals (Sweden)

    Silvia Julia Campana

    2015-04-01

    Full Text Available Teresa de Jesús y Edith Stein son testigos del Amor desbordante, embriagadas en el perfume de la Verdad que las reúne en una búsqueda común. “Cuando venga el Espíritu de la Verdad, él los introducirá en toda la verdad”. Ambas son transformadas, desde la hondura del Espíritu que las habita, en testimonio de la libertad que brota de la Verdad que sale al encuentro; en testimonio de la autenticidad de una vida entregada al Otro/otros; en testimonio de un secreto que las habita, las transforma y las conduce hasta la ofrenda de la propia vida. Porque el testimonio, como afirma Ricoeur, “es también el compromiso de un corazón puro y un compromiso hasta la muerte. Pertenece al destino trágico de la verdad”. Teresa de Jesús ingresa a la vida de la joven filósofa Edith Stein a través de la palabra, del “poema” que relata su propia vida y le descubre un mundo nuevo. Biografía que transforma otra biografía y nos permite hoy reunirlas en la comunidad del testimonio y la mística.

  11. Swarm size and iteration number effects to the performance of PSO algorithm in RFID tag coverage optimization

    Science.gov (United States)

    Prathabrao, M.; Nawawi, Azli; Sidek, Noor Azizah

    2017-04-01

    Radio Frequency Identification (RFID) system has multiple benefits which can improve the operational efficiency of the organization. The advantages are the ability to record data systematically and quickly, reducing human errors and system errors, update the database automatically and efficiently. It is often more readers (reader) is needed for the installation purposes in RFID system. Thus, it makes the system more complex. As a result, RFID network planning process is needed to ensure the RFID system works perfectly. The planning process is also considered as an optimization process and power adjustment because the coordinates of each RFID reader to be determined. Therefore, algorithms inspired by the environment (Algorithm Inspired by Nature) is often used. In the study, PSO algorithm is used because it has few number of parameters, the simulation time is fast, easy to use and also very practical. However, PSO parameters must be adjusted correctly, for robust and efficient usage of PSO. Failure to do so may result in disruption of performance and results of PSO optimization of the system will be less good. To ensure the efficiency of PSO, this study will examine the effects of two parameters on the performance of PSO Algorithm in RFID tag coverage optimization. The parameters to be studied are the swarm size and iteration number. In addition to that, the study will also recommend the most optimal adjustment for both parameters that is, 200 for the no. iterations and 800 for the no. of swarms. Finally, the results of this study will enable PSO to operate more efficiently in order to optimize RFID network planning system.

  12. An intelligent IoT emergency vehicle warning system using RFID and Wi-Fi technologies for emergency medical services.

    Science.gov (United States)

    Lai, Yeong-Lin; Chou, Yung-Hua; Chang, Li-Chih

    2018-01-01

    Collisions between emergency vehicles for emergency medical services (EMS) and public road users have been a serious problem, impacting on the safety of road users, emergency medical technicians (EMTs), and the patients on board. The aim of this study is to develop a novel intelligent emergency vehicle warning system for EMS applications. The intelligent emergency vehicle warning system is developed by Internet of Things (IoT), radio-frequency identification (RFID), and Wi-Fi technologies. The system consists of three major parts: a system trigger tag, an RFID system in an emergency vehicle, and an RFID system at an intersection. The RFID system either in an emergency vehicle or at an intersection contains a controller, an ultrahigh-frequency (UHF) RFID reader module, a Wi-Fi module, and a 2.4-GHz antenna. In addition, a UHF ID antenna is especially designed for the RFID system in an emergency vehicle. The IoT system provides real-time visual warning at an intersection and siren warning from an emergency vehicle in order to effectively inform road users about an emergency vehicle approaching. The developed intelligent IoT emergency vehicle warning system demonstrates the capabilities of real-time visual and siren warnings for EMS safety.

  13. RFID-Based Human Behavior Modeling and Anomaly Detection for Elderly Care

    Directory of Open Access Journals (Sweden)

    Hui-Huang Hsu

    2010-01-01

    Full Text Available This research aimed at building an intelligent system that can detect abnormal behavior for the elderly at home. Active RFID tags can be deployed at home to help collect daily movement data of the elderly who carries an RFID reader. When the reader detects the signals from the tags, RSSI values that represent signal strength are obtained. The RSSI values are reversely related to the distance between the tags and the reader and they are recorded following the movement of the user. The movement patterns, not the exact locations, of the user are the major concern. With the movement data (RSSI values, the clustering technique is then used to build a personalized model of normal behavior. After the model is built, any incoming datum outside the model can be viewed as abnormal and an alarm can be raised by the system. In this paper, we present the system architecture for RFID data collection and preprocessing, clustering for anomaly detection, and experimental results. The results show that this novel approach is promising.

  14. Investigation of RFID Based Sensors for Sustainable Transportation Applications

    Science.gov (United States)

    2011-01-21

    Through support of a University Transportation Research Center Faculty Development Minigrant an investigation was made into the use of RFID based sensing technologies for transportation purposes. Transportation applications would potentially include ...

  15. Achievable Performance and Effective Interrogator Design for SAW RFID Sensor Tags

    Science.gov (United States)

    Barton Richard J.

    2012-01-01

    For many NASA missions, remote sensing is a critical application that supports activities such as environmental monitoring, planetary science, structural shape and health monitoring, non-destructive evaluation, etc. The utility of the remote sensing devices themselves is greatly increased if they are passive V that is, they do not require any on-board power supply such as batteries V and if they can be identified uniquely during the sensor interrogation process. Additional passive sensor characteristics that enable greater utilization in space applications are small size and weight, long read ranges with low interrogator power, ruggedness, and operability in extreme environments (vacuum, extreme high/low temperature, high radiation, etc.) In this paper, we consider one very promising passive sensor technology, called surface acoustic wave (SAW) radio-frequency identification (RFID), that satisfies all of these criteria. In general, RFID is a method of identifying items using radio waves to interrogate tags encoded with a unique identifier that are affixed to the items of interest. In the case of passive tags, only the interrogator, which transmits power to the tags in the form of radio-frequency electromagnetic radiation, requires access to a power supply. Passive RFID technologies are used today in many applications, including asset tracking and management, security and access control, and remote sensing. To date, most of the development and application in RFID technology has focused on either asset/inventory tracking and control or security and access control because these are the largest commercial application areas. Recently however, there has been growing interest in using passive RFID technology for remote sensing applications, and SAW devices are at the forefront of RFID sensing technology development. Although SAW RFID tags have great potential for use in numerous space-based remote sensing applications, the limited collision resolution capability of

  16. A Low-Cost Collaborative Location Scheme with GNSS and RFID for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Changfeng Jing

    2018-05-01

    Full Text Available The emergence and development of the Internet of Things (IoT has attracted growing attention to low-cost location systems when facing the dramatically increased number of public infrastructure assets in smart cities. Various radio frequency identification (RFID-based locating systems have been developed. However, most of them are impractical for infrastructure asset inspection and management on a large scale due to their high cost, inefficient deployment, and complex environments such as emergencies or high-rise buildings. In this paper, we proposed a novel locating system by combing the Global Navigation Satellite System (GNSS with RFID, in which a target tag was located with one RFID reader and one GNSS receiver with sufficient accuracy for infrastructure asset management. To overcome the cost challenge, one mobile RFID reader-mounted GNSS receiver is used to simulate multiple location known reference tags. A vast number of reference tags are necessary for current RFID-based locating systems, which means higher cost. To achieve fine-grained location accuracy, we utilize a distance-based power law weight algorithm to estimate the exact coordinates. Our experiment demonstrates the effectiveness and advantages of the proposed scheme with sufficient accuracy, low cost and easy deployment on a large scale. The proposed scheme has potential applications for location-based services in smart cities.

  17. New species of Zygoclistron Rehn, 1905 (Insecta: Orthoptera: Acrididae: Copiocerinae) in the central corridor of the Atlantic Forest biome.

    Science.gov (United States)

    Silva, Daniela Santos Martins; Pereira, Marcelo Ribeiro; Domenico, Fernando Campos De; Sperber, Carlos Frankl

    2016-06-17

    Herein we describe a new species of Copiocerinae, Zygoclistron ruschii Silva n. sp., from Atlantic Forest remnants in southeastern Brazil, collected from the Reserva Biológica Augusto Ruschi in the Santa Teresa municipality, Espírito Santo state, Brazil. The diagnosis of this new species is based on phallic complex and terminalia characters.

  18. The design of RFID convey or belt gate systems using an antenna control unit.

    Science.gov (United States)

    Park, Chong Ryol; Lee, Seung Joon; Eom, Ki Hwan

    2011-01-01

    This paper proposes an efficient management system utilizing a Radio Frequency Identification (RFID) antenna control unit which is moving along with the path of boxes of materials on the conveyor belt by manipulating a motor. The proposed antenna control unit, which is driven by a motor and is located on top of the gate, has an array structure of two antennas with parallel connection. The array structure helps improve the directivity of antenna beam pattern and the readable RFID distance due to its configuration. In the experiments, as the control unit follows moving materials, the reading time has been improved by almost three-fold compared to an RFID system employing conventional fixed antennas. The proposed system also has a recognition rate of over 99% without additional antennas for detecting the sides of a box of materials. The recognition rate meets the conditions recommended by the Electronic Product Code glbal network (EPC)global for commercializing the system, with three antennas at a 20 dBm power of reader and a conveyor belt speed of 3.17 m/s. This will enable a host of new RFID conveyor belt gate systems with increased performance.

  19. The Design of RFID Conveyor Belt Gate Systems Using an Antenna Control Unit

    Directory of Open Access Journals (Sweden)

    Ki Hwan Eom

    2011-09-01

    Full Text Available This paper proposes an efficient management system utilizing a Radio Frequency Identification (RFID antenna control unit which is moving along with the path of boxes of materials on the conveyor belt by manipulating a motor. The proposed antenna control unit, which is driven by a motor and is located on top of the gate, has an array structure of two antennas with parallel connection. The array structure helps improve the directivity of antenna beam pattern and the readable RFID distance due to its configuration. In the experiments, as the control unit follows moving materials, the reading time has been improved by almost three-fold compared to an RFID system employing conventional fixed antennas. The proposed system also has a recognition rate of over 99% without additional antennas for detecting the sides of a box of materials. The recognition rate meets the conditions recommended by the Electronic Product Code glbal network (EPCglobal for commercializing the system, with three antennas at a 20 dBm power of reader and a conveyor belt speed of 3.17 m/s. This will enable a host of new RFID conveyor belt gate systems with increased performance.

  20. A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2015-08-01

    Radio Frequency Identification (RFID) based solutions are widely used for providing many healthcare applications include patient monitoring, object traceability, drug administration system and telecare medicine information system (TMIS) etc. In order to reduce malpractices and ensure patient privacy, in 2015, Srivastava et al. proposed a hash based RFID tag authentication protocol in TMIS. Their protocol uses lightweight hash operation and synchronized secret value shared between back-end server and tag, which is more secure and efficient than other related RFID authentication protocols. Unfortunately, in this paper, we demonstrate that Srivastava et al.'s tag authentication protocol has a serious security problem in that an adversary may use the stolen/lost reader to connect to the medical back-end server that store information associated with tagged objects and this privacy damage causing the adversary could reveal medical data obtained from stolen/lost readers in a malicious way. Therefore, we propose a secure and efficient RFID tag authentication protocol to overcome security flaws and improve the system efficiency. Compared with Srivastava et al.'s protocol, the proposed protocol not only inherits the advantages of Srivastava et al.'s authentication protocol for TMIS but also provides better security with high system efficiency.

  1. ISO 15693-compatible high frequency passive RFID transponder with mixed-signal ESD protection circuit

    International Nuclear Information System (INIS)

    Khaw, M.K.; Mohd-Yasin, F.; Reaz, M.B.I.

    2009-06-01

    Radio Frequency Identification (RFID) tags have long been in existence since the 1950's. But not until two decades ago have they found important usage in areas where the need for enhanced and secured data handling is highly concerned. For example, RFID tags are embedded with passports in countries like US and Malaysia since the September 11th incident. RFID tag used in smart card such as passport is constantly exposed to a lot of human touches, thus requiring a very good Electrostatic Discharge (ESD) protection. Normally the protection is done at the pad level, but the protection is usually small dimensioned to reduce input capacitance. Therefore, in advanced process with thinner gate oxide, internal protection is necessary. This work presents the design of an ISO 15693-compatible 13.56 MHz passive RFID tag with internal ESD protection. VDD-to-ground ESD clamp circuits are strategically placed in the chip architecture. Each clamp has a capability to sustain 2-KV Human Body Model (HBM) positive mode ESD voltage, to produce robust tag. The protection circuit adds 15.12nW to the total power consumption, which is very minimal. (author)

  2. Design of RFID Mesh Network for Electric Vehicle Smart Charging Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Ching-Yen; Shepelev, Aleksey; Qiu, Charlie; Chu, Chi-Cheng; Gadh, Rajit

    2013-09-04

    With an increased number of Electric Vehicles (EVs) on the roads, charging infrastructure is gaining an ever-more important role in simultaneously meeting the needs of the local distribution grid and of EV users. This paper proposes a mesh network RFID system for user identification and charging authorization as part of a smart charging infrastructure providing charge monitoring and control. The Zigbee-based mesh network RFID provides a cost-efficient solution to identify and authorize vehicles for charging and would allow EV charging to be conducted effectively while observing grid constraints and meeting the needs of EV drivers

  3. Compact broadband circularly polarised slot antenna for universal UHF RFID readers

    DEFF Research Database (Denmark)

    Xu, Bo; Zhang, Shuai; Liu, Yusha

    2015-01-01

    A compact broadband circularly polarised (CP) slot antenna is designed for universal ultra-high-frequency (UHF) radio frequency identification (RFID) readers. The antenna consists of an L-shaped metal strip and a square-slot-loaded ground plane with four tuning stubs. The total size is 100 mm×100mm......×1.6 mm. The measured –10 dB impedance bandwidth is 40.7% (772–1166 MHz) and the measured 3 dB axial ratio (AR) bandwidth is 13.9% (840–965 MHz). Both the impedance and AR bandwidth cover the worldwide UHF RFID band....

  4. Invoering van RFID : De bibliotheekcollectie geïdentificeerd

    NARCIS (Netherlands)

    den Hollander, Frank; Bokdam, Gert Jan

    De nieuwe ontwikkelingen in de Universiteitsbibliotheek volgen elkaar in snel tempo op. Parallel aan de grootscheepse renovatie van het UB-gebouw, wordt bijvoorbeeld ook een nieuw identificatiesysteem voor de collectie ingevoerd, op basis van RFID. Pictogram sprak met Teijo Doornkamp over het

  5. Una biografía novelada de María Teresa León: «Cervantes, el soldado que nos enseñó a hablar»

    Directory of Open Access Journals (Sweden)

    Carla Perugini

    2013-11-01

    Full Text Available En la biografía novelada se juntan, aparentemente contradictorios, el aspecto documental y científico de la historia con el subjetivismo y lo imaginativo de la ficción.Las cinco biografías noveladas de María Teresa León son, en el orden: El gran amor de Gustavo Adolfo Bécquer (Buenos Aires 1946; Rodrigo Díaz de Vivar el Cid Campeador (Buenos Aires 1954; Doña Jimena Díaz del Vivar. Gran señora de todos los deberes (Buenos Aires 1960; Menesteos, marinero de abril (México 1965; Cervantes, el soldado que nos enseñó a hablar (Madrid 1978. Llaman la atención inmediatamente dos elementos comunes: el haber sido escritas todas en el exilio, incluso la de Cervantes, última obra de la autora todavía exiliada en Roma, y su dedicación a figuras marcadas por un destino malhadado y heróico, y, cada una a su manera, ejemplares.La atención hacia los clásicos, y hacia Cervantes en particular, fue una constante en la generación de intelectuales que salieron de España después de la derrota. En la biografía de María Teresa se nota una fuerte compenetración entre escritores, la moderna y el antiguo, que llegará hasta la invención de detalles existenciales del biografiado, al que la autora ofrece su voz, su manera de pensar, sus ideales.Palabras clave: María Teresa León, biografía novelada, Cervantes

  6. RFID technology for environmental remediation and radioactive waste management

    International Nuclear Information System (INIS)

    Tsai, Hanchung; Liu, Yung Y.; Shuler, James

    2011-01-01

    An advanced Radio Frequency Identification (RFID) system capable of tracking and monitoring a wide range of materials and components - from fissionable stocks to radioactive wastes - has been developed. The system offers a number of advantages, including enhanced safety, security and safeguards, reduced personnel exposure to radiation, and improved inventory control and cost-effectiveness. Using sensors, RFID tags can monitor the state of health of the tracked items and trigger alarms instantly when the normal ranges are violated. Nonvolatile memories in the tags can store sensor data, event records, as well as a contents manifest. Gamma irradiation tests showed that the tag components possess significant radiation resistance. Long-life batteries and smart management circuitries permit the tags to operate for up to 10 years without battery replacement. The tags have a near universal form factor, i.e., they can fit different package types. The read range is up to >100 m with no line-of-sight required. With careful implementation, even a large-size processing or storage facility with a complex configuration can be monitored with a handful of readers in a network. In transportation, by incorporating Global Positioning System (GPS), satellite/cellular communication technology, and secure Internet, situation awareness is assured continuously. The RFID system, when integrated with Geographic Information System (GIS) technology, can promptly provide content- and event-specific information to first responders and emergency management teams in case of incidents. In stand-alone applications, the monitoring and tracking data are contained within the local computer. With a secure Internet, information can be shared within the complex or even globally in real time. As with the deployment of any new technology, overcoming the cultural resistance is part of the developmental process. With a strong institutional support and multiple successful live demonstrations, the cultural

  7. Modeling of RFID-Enabled Real-Time Manufacturing Execution System in Mixed-Model Assembly Lines

    Directory of Open Access Journals (Sweden)

    Zhixin Yang

    2015-01-01

    Full Text Available To quickly respond to the diverse product demands, mixed-model assembly lines are well adopted in discrete manufacturing industries. Besides the complexity in material distribution, mixed-model assembly involves a variety of components, different process plans and fast production changes, which greatly increase the difficulty for agile production management. Aiming at breaking through the bottlenecks in existing production management, a novel RFID-enabled manufacturing execution system (MES, which is featured with real-time and wireless information interaction capability, is proposed to identify various manufacturing objects including WIPs, tools, and operators, etc., and to trace their movements throughout the production processes. However, being subject to the constraints in terms of safety stock, machine assignment, setup, and scheduling requirements, the optimization of RFID-enabled MES model for production planning and scheduling issues is a NP-hard problem. A new heuristical generalized Lagrangian decomposition approach has been proposed for model optimization, which decomposes the model into three subproblems: computation of optimal configuration of RFID senor networks, optimization of production planning subjected to machine setup cost and safety stock constraints, and optimization of scheduling for minimized overtime. RFID signal processing methods that could solve unreliable, redundant, and missing tag events are also described in detail. The model validity is discussed through algorithm analysis and verified through numerical simulation. The proposed design scheme has important reference value for the applications of RFID in multiple manufacturing fields, and also lays a vital research foundation to leverage digital and networked manufacturing system towards intelligence.

  8. Development of advanced RFID application system for nuclear power plant

    International Nuclear Information System (INIS)

    Onda, Kimiharu; Wakabayashi, Eisuke; Arai, Ryota; Shigemi, Ryosuke; Muro, Keiro; Yuda, Shinya

    2008-01-01

    In late years there comes to be close request for traceability of the information such as production control, construction and maintenance record and work history of nuclear power plants. On the other hand, the Radio-frequency identification (RFID) technology that can specify a product and personnel by an electric wave has raised the functionality and versatility as the base technology that can support ubiquitous information society around the mass production industry. In such a background, this article described the developed system, which applied the RFID to nuclear power plants in the areas of production control of the piping manufacture, the construction management and condition monitoring for maintenance works in order to improve their quality and reliability. (T. Tanaka)

  9. RFiD tracking af brugeres adfærd i bygningsrum

    DEFF Research Database (Denmark)

    Suenson, Valinka; Harder, Henrik

    2011-01-01

    dette felt. Forude venter derfor flere forsøg, førend forskningsfeltet kan siges at være metodisk veletableret. Radio Frequency Identification (RFID), videoovervågning og Bluetooth er alle metoder, der bliver forsket i. Adfærdsanalyser i bygninger er med andre ord et både levende og dynamisk felt, og...... metoderne fornyr sig i takt med, nye teknologier opstår. I nærværende artikel vil det blive belyst hvordan RFID teknologien kan bruges til at gennemføre en adfærdsanalyse af et eller flere bygningsrum. Forskningen anvender teknologien til at sige noget om brugen af bygningen. Hvordan bruges den? Hvem bruger...

  10. Miniaturization design and implementation of magnetic field coupled RFID antenna

    Science.gov (United States)

    Hu, Tiling

    2013-03-01

    The development of internet of things has brought new opportunities and challenges to the application of RFID tags. Moreover, the Miniaturization application trend of tags at present has become the mainstream of development. In this paper, the double-layer design is to reduce the size of HF antenna, and the magnetic null point of magnetic reconnection region between the RLC resonant circuit and the reader provides sufficient energy to the miniaturization of antenna. The calculated and experimental results show that the miniaturization of HF antennas can meet the reading and writing requirement of the international standard ISO/IEC14443 standard. The results of this paper may make a positive contribution to the applications of RFID technology.

  11. Track star : Merrick's RFID system tracks oilpatch equipment

    Energy Technology Data Exchange (ETDEWEB)

    Louie, J

    2006-10-15

    Designed by Merrick Systems, the new Rig-Hand system uses radio frequency identification (RFID) in conjunction with downhole components to manage both surface and downhole equipment. The Rig-Hand system consists of RFID tags which can either be installed to new pipe or retrofitted to existing components; handheld or fixed RFID tag readers; and, software modules. The tags can be mounted to a wide range of surface and downhole components. The system can be used by rig personnel to scan tags with handheld computers, or can be used by a designated reader for greater automation and efficiency. The software modules have been designed for typical rig, pipeyard and service company users. The system provides essential drillstring information that helps to reduce pipe failures, fishing costs and downtime. Component tracking may also impact on both personnel safety and operational risks, as a recent survey has suggested that 14 per cent of catastrophic drillstring failures are due to pipe fatigue. When drilling deviated wells, operators typically have difficulty tracking which pipe may have become fatigued. It is anticipated that the system will also allow for improved logistics management, as it is currently estimated that 70 per cent of casing returned from the wellsite to a pipe yard goes to rust. The tagged components will also demand a higher resale or salvage value than untagged components with limited traceability. The system has gone through extensive testing, and to date has provided extensive savings in both onshore and offshore rigs. Commercialization is expected by the end of 2006. 1 fig.

  12. Track star : Merrick's RFID system tracks oilpatch equipment

    International Nuclear Information System (INIS)

    Louie, J.

    2006-01-01

    Designed by Merrick Systems, the new Rig-Hand system uses radio frequency identification (RFID) in conjunction with downhole components to manage both surface and downhole equipment. The Rig-Hand system consists of RFID tags which can either be installed to new pipe or retrofitted to existing components; handheld or fixed RFID tag readers; and, software modules. The tags can be mounted to a wide range of surface and downhole components. The system can be used by rig personnel to scan tags with handheld computers, or can be used by a designated reader for greater automation and efficiency. The software modules have been designed for typical rig, pipeyard and service company users. The system provides essential drillstring information that helps to reduce pipe failures, fishing costs and downtime. Component tracking may also impact on both personnel safety and operational risks, as a recent survey has suggested that 14 per cent of catastrophic drillstring failures are due to pipe fatigue. When drilling deviated wells, operators typically have difficulty tracking which pipe may have become fatigued. It is anticipated that the system will also allow for improved logistics management, as it is currently estimated that 70 per cent of casing returned from the wellsite to a pipe yard goes to rust. The tagged components will also demand a higher resale or salvage value than untagged components with limited traceability. The system has gone through extensive testing, and to date has provided extensive savings in both onshore and offshore rigs. Commercialization is expected by the end of 2006. 1 fig

  13. Research on Positioning Algorithm of Forklift-mounted RFID Reader

    Directory of Open Access Journals (Sweden)

    Hongjin Wang

    2014-07-01

    Full Text Available To conduct real-time and accurate positioning of the forklifts (people and goods in the warehouse is an effective means for improving warehouse management efficiency. To this end, this article puts forward the active positioning system with the forklift installed with RFID reader and the ground passageway embedded with RFID tag. In the running process, the position of forklift can be determined through recognition of the reference tags which are embedded at both sides of the passageway based on the three-side layout at right angle principle and their RSSI value. The positional accuracy can be improved by adjusting the layout distance of those reference tags. The experimental results show that this system can realize the positioning function of forklift, and it can be used in practical situations.

  14. RFID与物联网%RFID and Internet of Things

    Institute of Scientific and Technical Information of China (English)

    华镕

    2013-01-01

    数字企业实现了供应商和消费者之间实时信息的自由流动与交换。RFID把物品信息转换成数据,成为物联网一种推荐的支持技术。我们这里展示了一幅使用RFID连接现实世界与数字世界的图画。%Digital Enterprise is the free flow of real-time information to be exchanged between suppliers and consumers. RFID transforms the things information into data, and it is suggested as an enabling technology of the Internet of Things. We present a view linking real world processes with the digital ones using RFID.

  15. Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone

    Directory of Open Access Journals (Sweden)

    Mohamed Hamdy Eldefrawy

    2015-01-01

    Full Text Available With the new, state-of-the-art printing devices and equipment, there has been rapid growth in the counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, and they can easily imitate the original banknotes with fake ones. Conventional methods for validating currency require specialized devices for the authentication of banknotes. However, cost and lack of mobility of sophisticated banknote validation devices are big problems for general consumers. Modern digital solutions are attempting to complement the traditional security features through embedding radio frequency identification (RFID chips in the banknotes, for example, Euro currency. Unfortunately, the requirement of specialized RFID readers for banknote validation impedes their widespread proliferation among consumers. To overcome this problem, a new method of banknote validation using an RFID chip and an NFC-enabled smartphone is presented. The consumer sends a banknote validation request to the Monetary Agency (MA using her or his smartphone and an Internet connection. The MA replies by sending a random challenge to the consumer’s smartphone. The RFID chip in the banknote receives the challenge, via the NFC, and calculates an equivalent response to the MA’s challenge. If any of the messages are incorrect, authentication is denied. By the proposed method, consumers can easily and instantly check the originality of currency notes with the MA using their smartphones and an Internet connection. The proposed system is less expensive, computationally, than regular methods and preserves the privacy of people who carry banknotes.

  16. An Operator Perspective from a Facility Evaluation of an RFID-Based UF6 Cylinder Accounting and Tracking System

    International Nuclear Information System (INIS)

    Martyn, Rose; Fitzgerald, Peter; Stehle, Nicholas D.; Rowe, Nathan C.; Younkin, James R.

    2011-01-01

    An operational field test of a Radio-Frequency Identification (RFID) system for tracking and accounting UF6 cylinders was conducted at the Global Nuclear Fuel Americas (GNF) fuel fabrication plant in 2009. The Cylinder Accountability and Tracking System (CATS) was designed and deployed by Oak Ridge National Laboratory (ORNL) and evaluated in cooperation with GNF. The system required that passive RFID be attached to several UF6 30B cylinders as they were received at the site; then the cylinders were tracked as they proceeded to interim storage, to processing in an autoclave, and eventually to disposition from the site. This CATS deployment also provided a direct integration of scale data from the site accountability scales. The integration of this information into the tracking data provided an attribute for additional safeguards for evaluation. The field test provided insight into the advantages and challenges of using RFID at an operating nuclear facility. The RFID system allowed operators to interact with the technology and demonstrated the survivability of the tags and reader equipment in the process environment. This paper will provide the operator perspective on utilizing RFID technology for locating cylinders within the facility, thereby tracking the cylinders for process and for Material Control and Accounting functions. The paper also will present the operator viewpoint on RFID implemented as an independent safeguards system.

  17. Research on the Development and Trends of RFID Middleware%RFID中间件发展与趋势研究

    Institute of Scientific and Technical Information of China (English)

    陈阳

    2015-01-01

    This paper describes the concepts and characteristics of RFID middleware, reviews the development of RFID middle-ware, analyzes RFID middleware products that are developed by domestic and foreign research institutions and corporations. This paper also gives an overview of the current research status and development trends of RFID middleware.%本文阐述了RFID中间件的概念、特点,回顾了RFID中间件的发展历程,分析了国内外科研机构及企业研发的RFID中间件产品,阐述了RFID中间件的研究现状与发展趋势。

  18. RFID- TEKNIIKAN MAHDOLLISTAMAT TYÖAIKASÄÄSTÖT HUONEKALUTEOLLISUUDESSA : - CASE INCAP FURNITURE OY

    OpenAIRE

    Taskinen, Jarkko

    2009-01-01

    Opinnäytetyön tarkoituksena oli selvittää RFID- tekniikan eli radiotaajuudella toimivan etätunnistamisen mahdollistamia työaikasäästöjä huonekaluteollisuudessa. Toimeksiantaja oli Incap Furniture Oy. Incap Furniture Oy on yksi suurimmista mäntyhuonekalusopimusvalmistajista maailmassa. Pääasiakas on Ikea. Incap Furniture Oy on aloittanut projektin, jonka tarkoitus on tutkia RFID- tekniikan mahdollisuuksia ja hyötyjä tehtaiden toiminnassa. Opinnäytetyö oli osa projektia. Opinnäyt...

  19. Arduino Based RFID Line Switching Using SSR

    Directory of Open Access Journals (Sweden)

    Michael E.

    2017-10-01

    Full Text Available The importance of line switching cannot be overemphasized as they are used to connect and disconnect substations to and from a distribution grid. At the cradle of technology line switching was achieved via the use of manual switches or fuses which could endanger life as a result of electrocution when expose during maintenance. This ill prompted the development of automated line switching using relays and contactors. With time this tends to fail as a result of wearing of the contact which is as a result of arcing and low voltage. To avert all these ills this paper presents Arduino based Radio Frequency Identification RFID line switching using Solid State Relay SSR. This is to ensure the safety of operators or technologist and to also avert the problem associated with relays and contactors using SSR. This was achieved using RFID RC-522 reader ardriuno Uno SSR and other discrete components. The system was tested and worked perfectly reducing the risk of electrocution and eliminating damage wearing of the contacts common with contactors and relays.

  20. Data flow between RFID devices in a modern restricted access administrative office

    Directory of Open Access Journals (Sweden)

    Robert Waszkowski

    2016-01-01

    Full Text Available The paper presents models of data flow between RFID devices in a modern restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the fact that the facilities in the secret office (cabinet, sluice, photocopier, desks are equipped with the RFID reader, which allows to immediately read the documents that are within their reach.

  1. A note on the security of IS-RFID, an inpatient medication safety.

    Science.gov (United States)

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2014-01-01

    In this paper we investigate the security level of a comprehensive RFID solution to enhance inpatient medication safety, named IS-RFID, which has been recently proposed by Peris-Lopez et al. We analyses the security of the protocol against the known attacks in the context. The main target of this paper is to determine whether the new protocol provides the confidentiality property, which is expected to be provided by such a protocol. It was found that IS-RFID has critical weaknesses. The presented security investigations show that a passive adversary can retrieve secret parameters of patient's tag in cost of O(2(16)) off-line PRNG evaluations. Given the tag's secret parameters, any security claims are ruined. In this paper we presented an efficient passive secret disclosure attack which retrieves the main secret parameters related to the patient which shows that IS-RFID may put the patient safety on risk. The proposed attacking technique is in light of two vulnerabilities of the protocol: (1) the short length of the used PRNG, which is urged by the target technology, EPC C1 Gen2 ; (2) the message-generating mechanism utilizing PRNG was not carefully scrutinized. While the later point can be fixed by careful designing of the transferred messages between the protocol's party, the earlier point, i.e., the short length of the available PRNG for EPC C1 Gen2 tags, is a limitation which is forced by the technology. In addition, over the last years, schemes based solely on using simple operations or short PRNG (such as IS-RFID) have been shown to offer very low or no security at all. Recent advances in lightweight ciphers, such as PRESENT or Grain , seem a much more appropriate solution rather than relying on short PRNGs. However, such solutions breaks the EPC C1 Gen2 compatibility. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  2. Examining the Effectiveness of Hacked, Commercial, Self-Tuning RFID Tags to Passively Sense the Volumetric Water Content of Soil

    Science.gov (United States)

    Stoddard, B. S.; Udell, C.; Selker, J. S.

    2017-12-01

    Currently available soil volumetric water content (VWC) sensors have several drawbacks that pose certain challenges for implementation on large scale for farms. Such issues include cost, scalability, maintenance, wires running through fields, and single-spot resolution. The development of a passive soil moisture sensing system utilizing Radio Frequency Identification (RFID) would allay many of these issues. The type of passive RFID tags discussed in this paper currently cost between 8 to 15 cents retail per tag when purchased in bulk. An incredibly cheap, scalable, low-maintenance, wireless, high-resolution system for sensing soil moisture would be possible if such tags were introduced into the agricultural world. This paper discusses both the use cases as well as examines one implementation of the tags. In 2015, RFID tag manufacturer SmarTrac started selling RFID moisture sensing tags for use in the automotive industry to detect leaks during quality assurance. We place those tags in soil at a depth of 4 inches and compared the moisture levels sensed by the RFID tags with the relative permittivity (ɛr) of the soil as measured by an industry-standard probe. Using an equation derived by Topp et al, we converted to VWC. We tested this over a wide range of moisture conditions and found a statistically significant, correlational relationship between the sensor values from the RFID tags and the probe's measurement of ɛr. We also identified a possible function for mapping vales from the RFID tag to the probe bounded by a reasonable margin of error.

  3. Improved Kalman Filter Method for Measurement Noise Reduction in Multi Sensor RFID Systems

    Directory of Open Access Journals (Sweden)

    Min Chul Kim

    2011-10-01

    Full Text Available Recently, the range of available Radio Frequency Identification (RFID tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Performance of Kalman filter is determined by a measurement and system noise covariance which are usually called the R and Q variables in the Kalman filter algorithm. Choosing a correct R and Q variable is one of the most important design factors for better performance of the Kalman filter. For this reason, we proposed an improved Kalman filter to advance an ability of noise reduction of the Kalman filter. The measurement noise covariance was only considered because the system architecture is simple and can be adjusted by the neural network. With this method, more accurate data can be obtained with smart RFID tags. In a simulation the proposed improved Kalman filter has 40.1%, 60.4% and 87.5% less Mean Squared Error (MSE than the conventional Kalman filter method for a temperature sensor, humidity sensor and oxygen sensor, respectively. The performance of the proposed method was also verified with some experiments.

  4. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  5. Design and testing of RFID sensor tag fabricated using inkjet-printing and electrodeposition

    Science.gov (United States)

    Chien Dang, Mau; Son Nguyen, Dat; Dung Dang, Thi My; Tedjini, Smail; Fribourg-Blanc, Eric

    2014-06-01

    The passive RFID tag with an added sensing function is of interest to many applications. In particular, applications where RFID tagging is already considered to be the next step, such as food items, are a specific target. This paper demonstrates a flexible RFID tag sensor fabricated using a low cost technique with an added zero-cost sensing function. It is more specifically applied to the sensing of degradable food, in particular beef meat in our demonstrated example. To reach this, the antenna is designed in such a way to be sensitive to the variation of the dielectric permittivity of the meat over time. The design of the sensing tag as well as its fabrication process are described. The fabrication involves inkjet printing of a silver nanoparticle based ink on a commercial low cost PET film to create a seed layer. It is followed by a copper electrodeposition step on top of the silver pattern to complete the tag to obtain the desired thickness and conductivity of the tag antenna. The results of the electrical tests showed that with the inkjet printing-electrodeposition combination it is possible to produce flexible electrically conductive patterns for practical RFID applications. The tag was then tested in close-to-real-world conditions and it is demonstrated that it can provide a sensing function to detect the consumption limit of the packaged beef.

  6. Improved Kalman filter method for measurement noise reduction in multi sensor RFID systems.

    Science.gov (United States)

    Eom, Ki Hwan; Lee, Seung Joon; Kyung, Yeo Sun; Lee, Chang Won; Kim, Min Chul; Jung, Kyung Kwon

    2011-01-01

    Recently, the range of available radio frequency identification (RFID) tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Performance of Kalman filter is determined by a measurement and system noise covariance which are usually called the R and Q variables in the Kalman filter algorithm. Choosing a correct R and Q variable is one of the most important design factors for better performance of the Kalman filter. For this reason, we proposed an improved Kalman filter to advance an ability of noise reduction of the Kalman filter. The measurement noise covariance was only considered because the system architecture is simple and can be adjusted by the neural network. With this method, more accurate data can be obtained with smart RFID tags. In a simulation the proposed improved Kalman filter has 40.1%, 60.4% and 87.5% less mean squared error (MSE) than the conventional Kalman filter method for a temperature sensor, humidity sensor and oxygen sensor, respectively. The performance of the proposed method was also verified with some experiments.

  7. Agency and Otherness in Teresa Margolles’ Aesthetic of Death

    Directory of Open Access Journals (Sweden)

    Julia Banwell

    2010-10-01

    Full Text Available Teresa Margolles (b. 1963 is Mexico's foremost proponent of corpse art. Her work meditates upon her obsessions with the dead body and the processes that occur after death, and shows death as a direct result of violence. Employing a range of techniques of representation, Margolles implicates the spectator into potentially uncomfortably close contemplation of the artwork, sometimes through direct physical contact with the raw materials used in its creation. She transgresses the boundaries between the interior and the exterior of the body, and between life and death, occupying an artistic space where the minimalist and internationally accessible language of conceptual art interacts with her method of commenting upon a specifically Mexican set of circumstances, at times disguising unsettling realities behind deceptively subtle artistic techniques of representation. Drawing on theories of spectatorship and the problematics of looking at death, this essay will explore aspects of agency, eroticism and otherness in examples of Margolles' artwork, also paying attention to the question of ethics. The bodies and body parts the artist places at the centre of her works, witness the unsettlingly direct relation between violence enacted upon the body, and its result, death. The removal of these physical entities from social space leaves behind traces and residues that now, by means of the artist's intervention, metonymically evidence their former lives and erase the distance between dead and living bodies.

  8. RFID based TLD monitoring system - a prospective development

    International Nuclear Information System (INIS)

    Jeevanram, S.S.; Pawar, S.T.; Mahule, K.N.; Rath, D.P.

    2008-01-01

    Thermo Luminescence Dosimetry (TLD) is an established method of monitoring the radiation dose received by workers in radiation environments. In Radiometallurgy Laboratory, BARC, the TLD movement inside a nuclear facility is completely carried out by a radiation worker. However, there is a chance that the TLDs may get lost in laboratories or some places without the knowledge of the concerned TLD user or health physicist. It may later lead to a false effective dose. Effort is being done to initiate a RFID based TLD monitoring system so that the use of TLD can be acknowledged through a self operating software which can prevent misuse of the detector. A novel method of improving the administrative control through Radio Frequency Identification (RFID) based monitoring to avoid such inadvertent misplacement of TLD, is in progress. This paper discusses the method and techniques through which administrative control can be exercised to reduce the number of such in explainable exposures. (author)

  9. Applications of Health Management Using Android and RFID

    Directory of Open Access Journals (Sweden)

    Young-Long Chen

    2012-07-01

    Full Text Available Health management has become increasingly important in personal health care in modern life. The system we have designed provides a method to help facilitate health management through an associated smart phone with Radio Frequency Identification (RFID, which is a new type of application. This system consists of medical knowledge and health management. In the application of medical knowledge, we use the human model as well as the operation of RFID to obtain medical knowledge concerning human organs. The two main functions of the health management system are medication reminders and drug identification. The feature of medication reminders allows users to set the time for taking medication so that patients do not miss taking their medication. The feature of drug identification allows the operators to identify the drugs and can let the users know who needs to take drugs. In addition, we have designed a web page that allows users to understand their health status.

  10. Interference Helps to Equalize the Read Range and Reduce False Positives of Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    In various applications of RFID systems a reader should reliably get the ID of the tags that are within a bounded proximity region, termed the interrogation zone. This gives rise to two types of errors 1) False Negative Detections (FNDs), when tags within the intended interrogation zone cannot...... interference enables design of well-defined interrogation zones for passive RFID systems....

  11. A RFID specific participatory design approach to support design and implementation of real-time location systems in the operating room.

    Science.gov (United States)

    Guédon, A C P; Wauben, L S G L; de Korne, D F; Overvelde, M; Dankelman, J; van den Dobbelsteen, J J

    2015-01-01

    Information technology, such as real-time location (RTL) systems using Radio Frequency IDentification (RFID) may contribute to overcome patient safety issues and high costs in healthcare. The aim of this work is to study if a RFID specific Participatory Design (PD) approach supports the design and the implementation of RTL systems in the Operating Room (OR). A RFID specific PD approach was used to design and implement two RFID based modules. The Device Module monitors the safety status of OR devices and the Patient Module tracks the patients' locations during their hospital stay. The PD principles 'multidisciplinary team', 'participation users (active involvement)' and 'early adopters' were used to include users from the RFID company, the university and the hospital. The design and implementation process consisted of two 'structured cycles' ('iterations'). The effectiveness of this approach was assessed by the acceptance in terms of level of use, continuity of the project and purchase. The Device Module included eight strategic and twelve tactical actions and the Patient Module included six strategic and twelve tactical actions. Both modules are now used on a daily basis and are purchased by the hospitals for continued use. The RFID specific PD approach was effective in guiding and supporting the design and implementation process of RFID technology in the OR. The multidisciplinary teams and their active participation provided insights in the social and the organizational context of the hospitals making it possible to better fit the technology to the hospitals' (future) needs.

  12. RFID Platform as a Service, Containerized Ecosystem, Feasibility and Security Impact Analysis

    Directory of Open Access Journals (Sweden)

    Lukas Kypus

    2015-01-01

    Full Text Available This paper presents a new concept as a special type of virtualization of particular event based communication components in RFID ecosystems. The new approach is containers based virtualization, and it is applied and tested on the container of Object name service. The results of the experiment allowed us to do the preliminary analysis of security consequences on the isolated containerized DNS-based RFID sub-service. We confirmed feasibility with this sandboxing technology represented by the special container. They bring the benefits in terms of efficient software component life-cycle management and integrity improvements. Experiments results of the containerization are discussed to show the possible isolation ways of other components like EPCis and middleware. There is present evaluation towards external threats and vulnerabilities. The result is a higher level of integrity, availability of whole ecosystem and resiliency against external threats. This gives a new opportunity to build robust RFID as Platform as a service, and it proves the ability to achieve a positive impact on the end to end service Quality of service.

  13. Estimating Human Physical States from Chronological Gait Features Acquired with RFID Technology

    Directory of Open Access Journals (Sweden)

    Yoshihiro UEMURA

    2015-11-01

    Full Text Available This paper proposes a method to estimate the state of the user to provide proactive hospitality from features of their gait pattern acquired with a Radio Frequency Identifier (RFID system. This method uses RFID readers on each shoe, as well as RFID tags installed on the floor. The ID of each tag is organized as a map, to show the precise position of the user. The reader and tags communicate while the user is walking. We extract feature components which represents gait patterns. Two-way ANOVA test and correlation analysis are conducted to find significant features. We classify the state of the user from these components with the Naȉve Bayes, the Support Vector Machine, and the Random Forest. Compared with each combination of the analysis and the machine learning method, the most efficient way is found to identify the state of the user. The experimental results show that different state of users can be classified appropriately. Finally, variable importance and the feasibility of proposed method are discussed to show potential implications of the proposed approach.

  14. A novel method for inferring RFID tag reader recordings into clinical events.

    Science.gov (United States)

    Chang, Yung-Ting; Syed-Abdul, Shabbir; Tsai, Chung-You; Li, Yu-Chuan

    2011-12-01

    Nosocomial infections (NIs) are among the important indicators used for evaluating patients' safety and hospital performance during accreditation of hospitals. NI rate is higher in Intensive Care Units (ICUs) than in the general wards because patients require intense care involving both invasive and non-invasive clinical procedures. The emergence of Superbugs is motivating health providers to enhance infection control measures. Contact behavior between health caregivers and patients is one of the main causes of cross infections. In this technology driven era remote monitoring of patients and caregivers in the hospital setting can be performed reliably, and thus is in demand. Proximity sensing using radio frequency identification (RFID) technology can be helpful in capturing and keeping track on all contact history between health caregivers and patients for example. This study intended to extend the use of proximity sensing of radio frequency identification technology by proposing a model for inferring RFID tag reader recordings into clinical events. The aims of the study are twofold. The first aim is to set up a Contact History Inferential Model (CHIM) between health caregivers and patients. The second is to verify CHIM with real-time observation done at the ICU ward. A pre-study was conducted followed by two study phases. During the pre-study proximity sensing of RFID was tested, and deployment of the RFID in the Clinical Skill Center in one of the medical centers in Taiwan was done. We simulated clinical events and developed CHIM using variables such as duration of time, frequency, and identity (tag) numbers assigned to caregivers. All clinical proximity events are classified into close-in events, contact events and invasive events. During the first phase three observers were recruited to do real time recordings of all clinical events in the Clinical Skill Center with the deployed automated RFID interaction recording system. The observations were used to verify

  15. Experimental Study on Inkjet-Printed Passive UHF RFID Tags on Versatile Paper-Based Substrates

    Directory of Open Access Journals (Sweden)

    Han He

    2016-01-01

    Full Text Available We present the possibilities and challenges of passive UHF RFID tag antennas manufactured by inkjet printing silver nanoparticle ink on versatile paper-based substrates. The most efficient manufacturing parameters, such as the pattern resolution, were determined and the optimal number of printed layers was evaluated for each substrate material. Next, inkjet-printed passive UHF RFID tags were fabricated on each substrate with the optimized parameters and number of layers. According to our measurements, the tags on different paper substrates showed peak read ranges of 4–6.5 meters and the tags on different cardboard substrates exhibited peak read ranges of 2–6 meters. Based on their wireless performance, these inkjet-printed paper-based passive UHF RFID tags are sufficient for many future wireless applications and comparable to tags fabricated on more traditional substrates, such as polyimide.

  16. USING RFID AND GIS TECHNOLOGIES FOR ADVANCED LUGGAGE TRACKING

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2015-06-01

    Full Text Available By purchasing a plane ticket or a cargo service, the passenger or the customer signs a contract with the airline company. From that moment on the airline company is responsible for all aspects of air travel, including the passenger' luggage (recording, handling to / from the aircraft etc.. Safe transport of passengers' luggage or cargo packages on airlines raises numerous problems for airlines and requires flexible, efficient solutions, appropriate to the specific requirements of each client. Annually millions of luggages get lost in airports around the world. This causes inconvenience to passengers and loss of resources and additional costs for the airlines. The aim of this paper is to examine how RFID(Radio Frequency Identification technology could be useful for advanced shipment tracking (Track and Trace in the airlines industry, by using rewritable passive RFID tags.

  17. Code-division multiple-access protocol for active RFID systems

    Science.gov (United States)

    Mazurek, Gustaw; Szabatin, Jerzy

    2008-01-01

    Most of the Radio Frequency Identification (RFID) systems operating in HF and UHF bands employ narrowband modulations (FSK or ASK) with Manchester coding. However, these simple transmission schemes are vulnerable to narrowband interference (NBI) generated by other radio systems working in the same frequency band, and also suffer from collision problem and need special anti-collision procedures. This becomes especially important when operating in a noisy, crowded industrial environment. In this paper we show the performance of RFID system with DS-CDMA transmission in comparison to a standard system with FSK modulation defined in ISO 18000-7. Our simulation results show that without any bandwidth expansion the immunity against NBI can be improved by 8 dB and the system capacity can be 7 times higher when using DS-CDMA transmission instead of FSK modulation with Manchester coding.

  18. Potential of RFID Systems to Detect Object Orientation

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2011-01-01

    In this paper we present a novel method for estimating the inclination of passive UHF RFID tags, for use in supply chains to monitor the handling of tagged items. Based on observations of the polarization, a Bayesian estimator of the tag inclination is constructed. The Bayesian estimator has been...

  19. Teresa Wilms Montt: la visceralidad como activismo

    Directory of Open Access Journals (Sweden)

    Cecilia Macon

    2017-07-01

    Full Text Available Es usual señalar que el debate sobre las emociones solo pasó a formar parte del feminismo en los últimos años. Sin embargo, es notoria la referencia en la literatura feminista de la primera ola al espacio de lo íntimo en términos de una colisión de emociones profundamente política que puede ser definida en términos de “visceralidad”. El presente trabajo se enmarca en un proyecto que tiene como objetivo final señalar el modo en que la transmisión de los afectos formó parte fundamental de la constitución del feminismo en América Latina. Este artículo se ocupa analizar la producción de la escritora chilena Teresa Wilms Montt, muy particularmente su primera obra, “Inquietudes sentimentales” (1917. No se trata meramente de argumentar la presencia de la dimensión emocional, sino de indagar en la especificidad de ese momento de su escritura donde la categoría de ‘intimidad” se torna central a la hora de establecer principios feministas. Son las características de su recorrido -donde entran en colisión las emociones más diversas - y el vínculo que establece con las luchas políticas del feminismo de corte anarquista las que abren la posibilidad de entender esta etapa, dando cuenta de la constitución de una geografía afectiva para el activismo latinoamericano. Una geografía marcada, centralmente por el desafío a “estructuras del sentir” patriarcales a través de intervenciones que sacan a la luz el papel politico de la visceralidad en tanto acción.

  20. Estudio de un sistema RFID para el control de inventarios y seguridad de libros en bibliotecas

    Directory of Open Access Journals (Sweden)

    Marlón Altamirano

    2016-11-01

    Full Text Available El estudio del sistema Identificación por radiofrecuencia (RFID en bibliotecas da a conocer los aspectos técnicos y el funcionamiento de la tecnología, para lo cual se analizó y realizó los estudios necesarios para determinar la factibilidad  de este sistema en los establecimientos bibliotecarios, con esto facilitar la gestión bibliotecaria, además de evitar la constante pérdida de los textos. Se detalla los principales usos, ventajas y desventajas que se tiene en este sistema, además de mostrar las características técnicas que deben de tener los equipos RFID. Abstract   The study system Radio Frequency Identification (RFID in libraries disclosed the technical aspects and operation of the technology, which was analyzed and conducted the necessary studies to determine the feasibility of this system in library facilities, with this easy library management , and avoid the constant loss of texts. the main uses , advantages and disadvantages have in this system , besides the technical features that must have detailed the RFID equipment .