WorldWideScience

Sample records for santa teresa rfid

  1. Santa Teresa y sus cartas, historia de los sentimientos

    Directory of Open Access Journals (Sweden)

    Egido, Teófanes

    2015-12-01

    Full Text Available Historical reflection on a peculiar dimension of St. Teresa of Jesus: the expression of her feelings in her writings, particularly in her abundant letters. The article focuses on the sense of humor, the joyfulness, and the importance of laughter in St. Teresa language, and also on the feeling of endearment with her family, with her order, with fray Juan de la Cruz. Ample space is dedicated to the tenderness towards girls in her convents. St. Teresa of Jesus appears as transgressor of 16th century social behaviours.Reflexión histórica sobre una dimensión peculiar de santa Teresa de Jesús: la expresión de sus sentimientos en sus escritos, de forma más especial en sus cartas abundantes. El artículo se centra en el sentido del humor, de la alegría, en la importancia de la risa en el lenguaje de santa Teresa y en el sentimiento de ternura con su familia, con su orden, con fray Juan de la Cruz. Se dedica un espacio amplio a la ternura hacia las niñas en sus conventos. Aparece santa Teresa de Jesús como trasgresora de los comportamientos sociales del siglo XVI.

  2. Santa Teresa de Jesús, su guion de vida

    OpenAIRE

    2015-01-01

    En este artículo se estudia la niñez, adolescencia y juventud de San - ta Teresa de Jesús, Santa Teresa de Ávila, la fundadora de las carmelitas descalzas, mística, escritora, doctora de la Iglesia católica, y patrona de los escritores en lengua española. El objetivo principal del trabajo es sa- ber porque decidió hacerse religiosa, y cómo cuando rondaba los 40 años y tras la muerte de su padre, decide comenzar su gran obra, fundando las carmelitas descalzas y extendiendo su congregación por ...

  3. Santa Teresa de Jesús, su guion de vida

    Directory of Open Access Journals (Sweden)

    Carmen Thous Tuset

    2015-01-01

    Full Text Available En este artículo se estudia la niñez, adolescencia y juventud de San - ta Teresa de Jesús, Santa Teresa de Ávila, la fundadora de las carmelitas descalzas, mística, escritora, doctora de la Iglesia católica, y patrona de los escritores en lengua española. El objetivo principal del trabajo es sa- ber porque decidió hacerse religiosa, y cómo cuando rondaba los 40 años y tras la muerte de su padre, decide comenzar su gran obra, fundando las carmelitas descalzas y extendiendo su congregación por toda España. Para ello la analizaremos desde la metodología humanística de su guion de vida, de acuerdo a la teoría del Análisis Transaccional del doctor Eric Berne. Los resultados demuestran que Teresa tuvo un guion marcado por la religiosidad de su madre y también condicionado por su padre. El re- sultado es que sólo pudo crear su propio guion de vida de triunfadora tras la muerte de ambos, naciendo entonces Teresa de Jesús y expandiendo su fecundidad espiritual, mística y literaria.

  4. 77 FR 14058 - Santa Teresa Southern Railroad, LLC-Operation Exemption-Rail Line of Verde Logistics Railroad...

    Science.gov (United States)

    2012-03-08

    ... Logistics Railroad, LLC at Santa Teresa, Dona Ana County, NM Santa Teresa Southern Railroad, LLC (STSR), a... feet of rail line owned by Verde Logistics Railroad, LLC (Verde). The rail line extends between a point... to shippers and receivers located in the Santa Teresa Logistics Industrial Park. \\1\\ STSR states that...

  5. Santa Teresa y sus cartas, historia de los sentimientos

    OpenAIRE

    Egido, Teófanes

    2015-01-01

    Historical reflection on a peculiar dimension of St. Teresa of Jesus: the expression of her feelings in her writings, particularly in her abundant letters. The article focuses on the sense of humor, the joyfulness, and the importance of laughter in St. Teresa language, and also on the feeling of endearment with her family, with her order, with fray Juan de la Cruz. Ample space is dedicated to the tenderness towards girls in her convents. St. Teresa of Jesus appears as transgressor of 16th cen...

  6. Decay control of "Femminello Santa Teresa" lemon fruits by prestorage high temperature conditioning

    OpenAIRE

    D'Aquino, Salvatore; Piga, Antonio; Agabbio, Mario Carlo Salvatore; Molinu, Maria Giovanna

    1998-01-01

    Marketing quality and juice chemical parameters of late harvested "Femminello Santa Teresa" lemon fruits (Citrus limon Burm), wrapped with a 15 mm heat shrinkable film or left unwrapped, and then either conditioned at 36°C for 72 hours in a 85-90%, relative humidity (RH) atmosphere or not conditioned, were determined over 3 months storage at 6°C and 95% RH or after 1 week at 20°C and 75% RH following each month of storage. Conditioning significantly reduced the incidence of decay caused by...

  7. La restauración del convento de Santa Teresa en Avila, España

    Directory of Open Access Journals (Sweden)

    de la Quintana Gordon, José Luis

    1989-10-01

    Full Text Available The Convent of Santa Teresa, Avila's third National Monument, has been in restoration since 1982. Its previous state was not good due to the unfavourable physical conditions of the site, to some un fortunate interventions suffered by its structure and to prolonged lack of use of many of its rooms. This paper describes the works of restoration of the building, which have been made applying contemporary intervention concepts but bearing in mind the modesty and firmness of style of Barefoot Carmelitans construction

    A partir de 1982, se desarrolló la restauración del Convento de Santa Teresa, tercer Monumento Nacional de la ciudad de Avila, en muy mal estado de conservación a causa de las desfavorables condiciones físicas de su emplazamiento, de algunas obras desafortunadas sufridas por sus estructuras y a la prolongada falta de uso de muchas de sus dependencias. Las páginas siguientes repasan los recientes trabajos de rehabilitación del edificio, en los cuales se aceptó el reto de aplicar criterios contemporáneos de intervención, sin alejarse del espíritu severo, sencillo y sólido propios de los edificios de la Regla Reformada

  8. Trigger Analysis and Modelling of Very Large Debris Flows in Santa Teresa, Cusco, Southern Peru

    Science.gov (United States)

    Buis, Daniel; Huggel, Christian; Frey, Holger; Giráldez, Claudia; Rohrer, Mario; Christen, Marc; Portocarrero, César

    2014-05-01

    The Peruvian Andes have repeatedly been affected by large mass movements such as landslides, avalanches and debris flows. In 1998, two very large debris flows in the region of Machu Picchu (Sacsara and Ahobamba), southern Peru, destroyed the town of Santa Teresa, an important hydropower scheme and further infrastructure. The debris flows on the order of 5 to 25 million m3 volume rank among the largest recently observed events of this type worldwide. Despite their extreme dimensions, these events have not been studied in detail. An important limitation for more insight studies is the remote location of the mass flows and the very sparse information and data available for the study region. Neither triggering processes nor mass flow process characteristics have been understood to date. This study tries to fill some of these gaps in understanding that are critical to improved assessment of hazards and eventual risk reduction measures. For the trigger analysis we used data and information from field work, a limited number of ground based meteorological data, and complementary satellite derived data. Results indicate that in the case of the Sacsara event, heavy rainfall likely was a main trigger. For Ahobamba, antecedent rainfall as well as snow and ice melt leading to saturation of glacial sediments must have played an important role. Simulations with a dynamic debris flow model (RAMMS) allowed us to constrain a number of flow parameters such as flow height and velocity, runout distance and flow and deposition volumes. Strong surging flow behavior was detected, resulting in very large runout distance (exceeding 20 km); which rather depends on the largest single surge volume, not the total event volume. Based on the identification of potential mass flow sources we modeled a number of scenarios. The assessment of related hazards, including a preliminary hazard map, showed that several communities in catchments draining towards Santa Teresa are endangered by mass movements

  9. Santa Teresa en los conventos de monjas de Nueva España

    Directory of Open Access Journals (Sweden)

    Lavrin, Asuncion

    2015-12-01

    Full Text Available The transfer of the spiritual message of Saint Teresa to the viceregal court of New Spain tested the ability of Teresa’s teachings to adapt to new societies within the Spanish empire. Although the Carmelites founded only seven convents in Mexico, the Order succeeded in following the key precepts of the Teresian charisma, although nuanced by a baroque style of observance that insisted on spiritual and corporal mortification, complete humility and obedience, visionary experiences, and the imitation of Christ to achieve God’s love. Despite their small numbers, Carmelite nuns earned the respect of colonial society for their dedication to an ascetic way of life, personal poverty and the centrality of prayer.El trasplante de la espiritualidad teresiana a Nueva España fue una experiencia que puso a prueba la capacidad de adaptar su mensaje reformista a las circunstancias de nuevas sociedades en formación en el imperio español. Con sólo siete conventos femeninos en el nuevo virreinato, la Orden logró seguir los preceptos esenciales de Santa Teresa aunque matizados por una religiosidad barroca que insistía en mortificaciones espirituales y corporales, completa humildad y obediencia, experiencias visionarias, e imitatio Christi para acceder al amor de Dios. A pesar de su corto número las Carmelitas ganaron el respeto de la sociedad colonial por su dedicación a la vida ascética, la pobreza personal y la centralidad de la práctica de la oración.

  10. Modelos para una santa. El necesario icono en la vida de Teresa de Ávila

    Directory of Open Access Journals (Sweden)

    Cea Gutiérrez, Antonio

    2006-06-01

    Full Text Available From the binomial consisting of cult images and devotional world, the author analyzes post-Tridentine personal spirituality in women’s convents of the 16th century. By looking into St. Theresa’s ascetico-mystical texts and extensive epistolary correspondence from an ethnoliterary perspective, the analyst can unveil the inside of this extraordinary woman and her social context. In her struggle for spiritual ascension, the Saint oscillated between austerity and hedonism, between privation and pleasure-seeking, between good and evil, holding Jesus Himself, Mary and the saints of her devotion as materialized target in the images of her.

    Desde el binomio imagen de culto y mundo devocional, se analiza el fenómeno de la espiritualidad personal, ya tridentino, en el espacio conventual femenino del siglo XVI. Bajo una perspectiva etnoliteraria y a través de los textos ascético-místicos de Teresa de Jesús y de su copiosa correspondencia epistolar, descubrimos el interior de esta extraordinaria mujer y su entorno social. En su lucha ascensional se debate la Santa entre la austeridad y el hedonismo, entre la privación y lo que le causa placer, entre el bien y el mal, teniendo al propio Cristo, a la Virgen y a los santos de su devoción como diana materializada en sus imágenes.

  11. Birds of Santa Teresa, Espírito Santo, Brazil: do humans add or subtract species?

    Directory of Open Access Journals (Sweden)

    Edwin O. Willis

    2002-11-01

    Full Text Available In uplands and lowlands of Santa Teresa, central Espírito Santo State, Brazil, 405 bird species were confirmed by field, museum, and literature studies. Of these, 16 seem to have disappeared, while 67 other species seem to have been lost from the lowlands (where no large biological reserves exist. Due to a suggestion that human areas add species to beta-diversity, we verified that up to 79 species now present have perhaps "invaded" with human activity (and 10 others are likely to invade, a total similar to that for lost species. However, lost species are often rare and invading species often widespread, resulting in exchange of "Picassos for Coca-Cola bottles." Furthermore, gains exceed losses only when large biological reserves are present, as in the uplands (Nova Lombardia, Santa Lúcia Reserves, each with over 250 species. Small or irregular reserves usually lose well over half their species, and these are only partly replaced by the invaders, resulting in net losses of up to half the local avifaunas. If one lists only 31 probable invaders, rather than a possible 79, things are even worse; net losses occur even in the entire township and near reserves, reaching over 200 species around lowland private reserves. Future "productive" development of human areas can eliminate or maltreat many invading species, too. While approving taxes on improductive use of land, as it leaves other areas free, we suggest that many current local "uses," such as for coffee, are "luxury" production and could be taxed.Nas terras altas e baixas de Santa Teresa, região central do Estado de Espírito Santo, Brasil, 405 espécies de aves foram confirmadas por estudos de campo, museu e de literatura. Destas, 16 parecem ter desaparecido, enquanto outras 67 espécies parecem ter sido perdidas nas baixadas (onde não existem reservas biológicas de grande extensão. Baseado na sugestão de que as áreas humanas adicionam espécies à beta diversidade, nós verificamos que

  12. Santa Teresa of Jesus as Example for the Novo Hispanic Mystics. The Work of Alonso Ramos about Catarina de San Juan

    Directory of Open Access Journals (Sweden)

    Gisela von Wobeser

    2016-11-01

    Full Text Available The life and work of Santa Teresa of Jesus had a great influence on the New Spain spiritual atmosphere by enabling a more intimate and direct relationship of women with God and contribute to the proliferation of nuns and beatified. In the Wonders of the Omnipotence and Miracles of the Grace in the life of the Venerable Servant of God Catharina of San Joan, Alonso Ramos writes the biography of Catarina of San Juan, a free slave considered saint, to whom in many passages compares with Santa Teresa. The purpose of Ramos was to create a female life model based on Teresian spirituality and values.

  13. Santa Teresa of Jesus as Example for the Novo Hispanic Mystics. The Work of Alonso Ramos about Catarina de San Juan

    OpenAIRE

    Gisela von Wobeser

    2016-01-01

    The life and work of Santa Teresa of Jesus had a great influence on the New Spain spiritual atmosphere by enabling a more intimate and direct relationship of women with God and contribute to the proliferation of nuns and beatified. In the Wonders of the Omnipotence and Miracles of the Grace in the life of the Venerable Servant of God Catharina of San Joan, Alonso Ramos writes the biography of Catarina of San Juan, a free slave considered saint, to whom in many passages compares with Santa Ter...

  14. AVALIAÇÃO FENÓTIPICA E PRODUTIVA DE CULTIVARES CRIOULAS DE MILHO PARA A REGIÃO DE SÃO JOÃO DE PETRÓPOLIS, SANTA TERESA-ES

    Directory of Open Access Journals (Sweden)

    Renan Garcia Malikouski

    2016-10-01

    Full Text Available O cultivo intenso de milho híbrido vem provocando o fenômeno conhecido como erosão genética, tornando-se importante a realização de trabalhos que visem caracterizar cultivares crioulas de milho a fim de indicar aos agricultores de cada região as variedades que mais se adaptem a sua realidade, além de fornecer informações relevantes aos programas de melhoramento. Sendo assim, o presente trabalho teve como objetivo caracterizar quatro cultivares crioulas de milho para a região de São João de Petrópolis, município de Santa Teresa - ES. O experimento foi realizado no Instituto Federal do Espirito Santo campus Santa Teresa, as variedades crioulas utilizadas foram: Aliança, Fortaleza, Cateto e Cunha, incluindo também o híbrido AG 1051 e a cultivar Incaper 203. Foram avaliadas as seguintes variáveis: altura de planta, altura de inserção de espiga, número de espigas por planta, ângulo foliar, diâmetro de colmo e produtividade. Observou-se que as cultivares crioulas apresentaram desempenho semelhante ou até superior em muitos parâmetros, evidenciando a possibilidade de cultivo dessas variedades crioulas atualmente.

  15. Assessment and management of debris-flow risk in a tropical high-mountain catchment in Santa Teresa, Peru

    Science.gov (United States)

    Frey, Holger; Buis, Daniel; Huggel, Christian; Bühler, Yves; Choquevilca, Walter; Fernandez, Felipe; García, Javier; Giráldez, Claudia; Loarte, Edwin; Masias, Paul; Portocarreo, César; Price, Karen; Walser, Marco

    2015-04-01

    The local center of Santa Teresa (Cusco Region, Peru, 7 km northwest of the ruins of Machu Picchu) has been affected by several large debris-flow events in the recent past. In January and February 1998, three events of extreme magnitudes with estimated total volumes of several tens of millions cubic meters each, caused the destruction of most parts of the municipality and resulted in a resettlement of the town on higher grounds. Additionally, several settlements further upstream, as well valuable infrastructure such as bridges, a railway, and a hydropower plant, were destroyed. Some events were related to large-scale slope instabilities and landslide processes in glacial sediments that transformed into highly mobile debris flows. However, the exact trigger mechanisms are still not entirely clear, and the potential role of glacial lakes for past and future mass flows remains to be analyzed. Here we applied RAMMS (RApid Mass Movement System), a physically based dynamic model, to reconstruct one of the 1998 events in the Sacsara catchment using the ASTER Global Digital Elevation Model (ASTER GDEM) with 30 m spatial resolution and a photogrammetric DEM compiled from ALOS PRISM data with 6 m spatial resolution. A sensitivity analysis for various model parameters such as friction and starting conditions was performed, along with an assessment of potential trigger factors. Based on these results, further potential debris-flows for this catchment were modeled, including outburst scenarios of several glacial lakes. In combination with a vulnerability analysis, these hazard scenarios were then incorporated in a qualitative risk analysis. To further reduce the risk for the local communities, technical risk sheets were elaborated for each of the 17 local settlements in the catchment. Furthermore an Early Warning System (EWS) has been designed. The modular structure of the EWS aims at a first step to install an inexpensive but efficient system to detect debris-flow type mass

  16. En permanente construcción. La recreación de la figura de santa Teresa en las semblanzas biográficas de sus hijas

    Directory of Open Access Journals (Sweden)

    Atienza López, Ángela

    2015-12-01

    conventos y a sus proyectos reformistas, la mujer que se relacionaba con el resto del mundo social, que lidiaba con los poderes eclesiásticos y seculares… En definitiva, una Teresa alejada de las concepciones establecidas sobre las mujeres en aquella época y de los papeles que se les asignaban también se cuela en las páginas de los cronistas, aunque muchos de los teresianistas lo han ignorado a lo largo del tiempo en beneficio de una imagen de santa Teresa adaptada a la hagiografía.

  17. Publicidad ilustrada y secularización. El caso del convento de Santa Teresa en la Ciudad de Guatemala, 1816-1826

    Directory of Open Access Journals (Sweden)

    Selvin Johany Chiquín Enriquez

    2016-12-01

    Full Text Available El trabajo busca aproximarse a los conceptos de Publicidad ilustrada y secularización a partir de la experiencia que vivió el convento de Santa Teresa a inicios del siglo XIX en la Ciudad de Guatemala. Así, el principal objetivo es mostrar las discordancias de la fe en una época de cambios, impulsados por instituciones civiles recién creadas. Para esto, el trabajo se basa en fuentes documentales que abordan, en específico, a una monja del convento: María Teresa Aycinena, debido a que su figura se convirtió en relevante para la vida pública de la ciudad y, más específicamente, para el clima de religiosidad popular. De tal cuenta, el discurso de las instituciones civiles fue desplazándose de publicidad ilustrada de Antiguo Régimen a un proceso de secularización, como síntoma del advenimiento liberal.

  18. Mística e profecia na espiritualidade cristã. O testemunho de Santa Teresa de Jesus (Mysticism and prophecy in Christian spirituality. The testimony of Saint Teresa of Jesus - DOI: 10.5752/P.2175-5841.2012v10n27p757

    Directory of Open Access Journals (Sweden)

    Lúcia Pedrosa-Pádua

    2012-10-01

    Full Text Available O presente artigo trata da inter-relação entre mística e profecia na espiritualidade cristã. Pretende enfrentar dualismos, encontrados no passado e também no presente do cristianismo, entre ambos os termos. Apresenta o testemunho de Santa Teresa de Ávila como caminho de superação da dicotomia entre mística e profecia através de uma integração processual. O fundamento da necessária relação entre os termos em questão é a própria existência de Jesus de Nazaré, que pode ser considerada profético-mística. Isto significa que há uma inter-relação entre oração e ação, contemplação e missão. No entanto, o sujeito moderno e pós-moderno apresenta dificuldades nesta integração, como o deixar-se transformar pela oração, superando a tendência ao controle e à eficácia. Santa Teresa de Jesus, neste contexto, é testemunho de mística e profecia, mediadas por um discernimento que passa por percepções cotidianas. O livro das Fundações é privilegiado para ilustrar este discernimento. Palavras-chave: Mística, profecia, discernimento, Santa Teresa de Jesus. Abstract This article deals with the interrelationship between mysticism and prophecy in Christian spirituality. It intends to face the dualism between both terms, present not only in early, but also in present-day Christianity. It presents Saint Teresa of Ávila as a testimony of how to overcome the dichotomy between mysticism and prophecy by means of step by step integration. The basis for the necessary relationship between the terms being studied is the actual existence of Jesus of Nazareth, which can be considered prophetic and mystic. In other words, prayer and action, contemplation and mission are strictly related. However, the modern and postmodern person has difficulties in dealing with this type of integration, such as opening himself to transformation by prayer, then overcoming the tendency to be in control and to be efficient. Saint Teresa of Jesus, in this

  19. Conventualización de la escritura en las Vidas de Santa Teresa de Jesús y Francisca Josefa de Castillo

    Directory of Open Access Journals (Sweden)

    Diego Fabián Arévalo Viveros

    2017-01-01

    Full Text Available El presente trabajo explora la existencia de la larga duración de las expresiones de obediencia de las monjas, paralelas y simultáneas a expresiones de subversión de lo masculino, presentes tanto en El libro de su vida de Santa Teresa de Jesús como en Su vida de Francisca Josefa de Castillo. ¿Cómo entender este complejo despliegue de estrategias de obediencia y subversión de tal manera que las veamos inseparables? Proponemos que, junto con el perfil de la monja que elabora una imagen de sí misma basada en un yo-obedezco, se manifiesta un yo-subvierto-el-orden-impuesto por el confesor. Estas dos proyecciones del yo recorren el texto y lo pueblan; le dan una fluctuación ambigua. En sus obras se produce una conventualización de la escritura, en la que escribir en el convento implica obedecerlo pero a su vez implica manifestarlo en la escritura como espacio de autonomía para descubrir el lenguaje.

  20. Una propuesta de antropología teológica en castillo interior de Santa Teresa de Ávila

    Directory of Open Access Journals (Sweden)

    Agustina Serrano Pérez

    2011-01-01

    Full Text Available El artículo presenta a Santa Teresa de Ávila (1515-1582 en un contexto histórico marcado por la apertura y el resurgimiento teológico, junto con un giro a posturas rígidas. En ese tiempo ella funda 17 conventos y escribe todas sus obras. Castillo Interior es el último eslabón de su proceso de autocomunicación, en que codifica su pensamiento teológico, estructurado en siete moradas que dan cuenta de la relación entre Dios y la respuesta humana. Este trabajo muestra la antropología de una Teología mística, como la autora deine su obra Castillo Interior, y trata de sintetizar la antropología teológica teresiana como un proceso salvíico desde el origen hasta la consumación. Finalmente se ofrecen unos rasgos característicos de la antropología teresiana en la que el misterio del ser humano se esclarece en Dios trinitario, es decir en la sabiduría amorosa del Espíritu.The a presents Saint Teresa of Ávila (1515-1582 in an historical context marked by theological resurgence and opening, together with a shift to rigid positions. In this period, she founds 17 convents and writes all her work. Interior Castle is the last link in her process of self-communication, and in which she encodes her theological thinking, structured in seven mansions that account for the relationship between God and the human response. This work shows the anthropology of a Mystical theology, as the author deines her work Interior Castle, and tries to synthesize Teresian theological anthropology as a salvific process from origin to consummation. Finally, the articles gives some characteristic features of Teresian anthropology, in which the mystery of human beings is illuminated in the Trinitarian God, i.e., in the loving wisdom of the Spirit.

  1. La racionalidad apasionada. Acercamiento a la relación razón y amor en la obra "Camino de Perfección" de Santa Teresa de ávila (1515-1582

    Directory of Open Access Journals (Sweden)

    Agustina Serrano P.

    2005-01-01

    Full Text Available Santa Teresa de ávila es una de las grandes figuras de la mística del Siglo de Oro Español. Pablo VI la declara Doctora de la Iglesia el 27 de septiembre de 1970. Este hecho supone que el puesto y la función de la mujer en la Iglesia quedaron afectados cuando se declaró a Santa Teresa Doctora de la Iglesia. Camino de Perfección es la primera obra impresa de Santa Teresa, en el año 1583 quiere ser un libro guía para las comunidades. Es un itinerario de conversión recorrido con una determinada "racionalidad apasionada" que desenmascara todo lo que no está al servicio del Reino. El presente estudio pretende ayudar a detectar la racionalidad teológica de Teresa desde la relación razón y amor en su obra Camino de perfección. En él se comienza a descubrir la propia sistematicidad del pensar de esta autora. Teresa ha ido vertiendo sus ideas respecto a la realidad de todo lo humano. Lo hace de un modo experiencial y sin atenerse, demasiado, a las normas de uso de los grandes conceptos en su épocaSt. Theresa of Avila is one of the great figures of the mysticism of the Spanish "Golden Age". Paul VI declared her a Doctor of the Church on September 27th, 1970. This fact presupposes that the place and function of women in the Church were influenced when St. Theresa was declared Doctor of the Church. Road of Perfection is the first printed work of St. Theresa's, in the year 1583, and was intended to be a guide for communities. It is an itinerary of conversion traveled through with a determined "passionate rationality" that unmasks everything not at the service of the Kingdom. The present study intends to help detect the theological rationality of Theresa from the reason-love relationship in her work Road of Perfection. In it the author's own systematic thought begins to be discovered, depositing her ideas in relation to the reality of all that is human. She does this in an experiential way and without overly depending upon the norms of the

  2. “Mujeres en el Brasil Colonial: El caso del Recogimiento de la Santa Casa de la Misericórdia de Bahia a través de la Depositada Teresa de Jesus”

    OpenAIRE

    Beites Manso, Maria de Deus

    2007-01-01

    Dado el elevado número de fuentes posibles, hemos seleccionado para este trabajo el núcleo documental relacionado con D. Teresa de Jesús María que, en el seguimiento del proceso de divorcio (1751) fue “encarcelada” en el recogimiento de la Santa Casa de la Misericordia, contra su voluntad. Durante años, aunque encarcelada, mantuvo un contencioso contra su marido y los poderes locales que la quisieron castigar y alejar de la sociedad en la que siempre había vivido. La documen...

  3. Clarice com Teresa

    Directory of Open Access Journals (Sweden)

    Gustavo Fujarra Carmona

    2015-04-01

    Full Text Available Pretendemos com o presente artigo, revelar as possíveis convergências e divergências a respeito do caráter místico das obras de Clarice Lispector e de Santa Teresa d'Ávila. Para tanto, estabeleceremos um diálogo entre a obra e a vida destas duas autoras, além de trazer à discussão, os estudos de Lacan, Millot e Kristeva acerca da relação entre o gozo (outro e a escritura. Acreditamos, deste modo, ser possível dar nova luz às suas obras e perceber como estas duas se correlacionam, no que diz respeito à dimensão mística de suas escrituras, na busca do Real e do Gozo Outro, cada uma, à sua maneira.

  4. Muscidae, Sarcophagidae, Calliphoridae e Mesembrinellidae (Diptera da Estação Biológica de Santa Lúcia (Santa Teresa, Espírito Santo, Brasil

    Directory of Open Access Journals (Sweden)

    Leandro Silva Barbosa

    2014-01-01

    Full Text Available O primeiro registro de dípteros das famílias Muscidae, Sarcophagidae, Calliphoridae e Mesembrinellidae da Estação Biológica de Santa Lúcia (EBSL é apresentado e discutido, baseado em coletas realizadas no ano de 2007. Os exemplares foram capturados com o auxílio de armadilha adaptada de modelo proposto para lepidópteros, utilizando sardinha como isca e Malaise, além de coleta ativa com rede entomológica. Como resultado foram obtidos 1.253 espécimes, com destaque para as famílias Calliphoridae, Muscidae, Sarcophagidae e Mesembrinellidae. É discutida a dualidade gerada pela presença de espécies com baixo grau de sinantropia e outras altamente sinantrópicas, caracterizando a área de coleta como uma região de transição entre áreas rural e florestal. A observação de espécies sinantrópicas está provavelmente correlacionada ao efeito de borda. Os resultados evidenciam a importância da criação de uma zona de amortecimento no entorno da EBSL com intuito de minimizar os impactos gerados às espécies nativas.

  5. El jesuita y confesor de Santa Teresa de Jesús, Rodrigo Álvarez: características y genealogía de su espiritualidad

    Directory of Open Access Journals (Sweden)

    González Polvillo, Antonio

    2012-06-01

    Full Text Available We will study to one of the most influential personages of the Sevillan spirituality of first half of century XVI: the Jesuit confessor of Teresa de Avila Rodrigo Alvarez. In this period a group of evangelical spirituality, paulina, visionary and prophetic organizes itself that has its origin in the axis Jerez-Lebrija and that soon will connect, through Rodrigo de Valer, with the evangelical ideas and from return to a primitive Church of the skillful canon of the cathedral of Seville Egidio, and through Rodrigo Alvarez with the Congregation of Granada, a species of school of hermetic spirituality composed by artists (Juan Bautista Vázquez, Vasco Pereira, Juan Martínez Montañés, clergymen and nuns whom its descendants in important personages in the eventful journeys of the definition of the dogma of the Immaculate Conception will have as they were Hernando de Mata and Bernardo de Toro.

    Se estudia a uno de los personajes más influyentes de la espiritualidad sevillana de la primera mitad del siglo XVI: el jesuita confesor de Teresa de Ávila Rodrigo Álvarez. En este periodo se organiza un conventículo de espiritualidad evangélica, paulina, visionaria y profética que tiene su origen en el eje Jerez-Lebrija y que pronto entroncará, a través de Rodrigo de Valer, con las ideas evangélicas y de vuelta a una Iglesia primitiva del canónigo magistral de la catedral de Sevilla Egidio, y a través de Rodrigo Álvarez con la Congregación de la Granada, una especie de escuela de espiritualidad hermética compuesta por artistas (Juan Bautista Vázquez, Vasco Pereira, Juan Martínez Montañés, clérigos seculares y monjas que tendrá su descendencia en personajes importantes en las peripecias de la definición del dogma de la Inmaculada Concepción como fueron Hernando de Mata y Bernardo de Toro.

  6. Espécies de cigarrinhas em cultivo de café no Município de Santa Teresa, Espírito Santo, Brasil (Hemiptera, Cicadellidae, Cicadellinae

    Directory of Open Access Journals (Sweden)

    Rachel A. Carvalho

    2015-01-01

    Full Text Available As cigarrinhas da subfamília Cicadellinae são importantes vetores de patógenos de plantas cultivadas, dentre eles, a bactéria Xylella fastidiosa, que, no Brasil, ataca cultivos de citros, café e também de ameixa. Pouca informação é conhecida sobre a ocorrência, distribuição e biologia de cicadelíneos em plantações de café. Este trabalho apresenta uma lista de 141 espécimes, coletados em meses alternados, no período entre junho de 2009 e abril de 2010, em plantação de café no Município de Santa Teresa no Estado do Espírito Santo, Brasil. Esses espécimes estão distribuídos em 16 gêneros e 21 espécies pertencentes às duas tribos de Cicadellinae: Cicadellini e Proconiini. Dentre os Cicadellini listados, o gênero Graphocephala é, pela primeira vez, registrado para o Brasil.

  7. Fiel reproducción de Santa Teresa de Jesús y Cristo "El Amarrado" de Gregorio Fernández a base de Tecnologías 3D

    Directory of Open Access Journals (Sweden)

    Marteyn van Gasteren

    2013-05-01

    Saint Teresa at Ávila. The reproduction is carried out according a very innovative process of 3D digitization with two scanners combined with CNC robot milling, complemented by traditional techniques. This process results in a very high degree of faithfulness of the replicas.

  8. Messa in estasi: sguardi sul corpo di Teresa

    Directory of Open Access Journals (Sweden)

    Elena Bonelli

    2010-06-01

    Full Text Available Elena Bonelli analiza, a través de elementos de semiótica, estética y gender criticism, el juego de miradas que se crea en la Iglesia de Santa Maria della Vittoria (Roma entre la estatua de Santa Teresa de G. Bernini, el simulacro de Santa Vittora, un icono de la Virgen María y los visitadores de la capilla romana. Según la autora, la disposición espacial de las tres figuras religiosas no sólo acentúa la curiosidad escópica de espectador situándole en el lugar de voyeur, sino que sugiere también una interesante lectura sobre los modos de inscripción del cuerpo femenino en el discurso artístico y, más en general, en toda la cultura occidental.

  9. Technologie RFID

    OpenAIRE

    Černý, Tomáš

    2007-01-01

    Práce poskytuje přehled o problematice RFID technologií. Analyzuje historický vývoj RFID technologií, popisuje základní komponenty RFID systémů, normy spojené s RFID, bezpečnost RFID a trh RFID technologií. Dále se práce věnuje možnostem využití RFID technologií v různých oborech, zařazení RFID systémů do rámce podnikové informatiky a hodnotí efekty, které RFID technologie přináší. Práce také definuje doporučený postup pro zavádění RFID technologií do firmy....

  10. Technologie RFID

    OpenAIRE

    Černý, Tomáš

    2007-01-01

    Práce poskytuje přehled o problematice RFID technologií. Analyzuje historický vývoj RFID technologií, popisuje základní komponenty RFID systémů, normy spojené s RFID, bezpečnost RFID a trh RFID technologií. Dále se práce věnuje možnostem využití RFID technologií v různých oborech, zařazení RFID systémů do rámce podnikové informatiky a hodnotí efekty, které RFID technologie přináší. Práce také definuje doporučený postup pro zavádění RFID technologií do firmy....

  11. Alienata da’ sensi: reframing Bernini’s S. Teresa

    Directory of Open Access Journals (Sweden)

    Andrea Bolland

    2015-02-01

    Full Text Available Gian Lorenzo Bernini’s Ecstasy of St Teresa for the Cornaro Chapel (1647–52 is perhaps the artist’s most sensually charged creation, and the apparently physical nature of Teresa’s ecstasy is today even acknowledged in survey textbooks. Teresa herself opened the door to this reading when, in describing her spiritual ecstasy, she admitted that ‘the body doesn’t fail to share in some of it, and even a great deal’. Yet the balance between sense and spirit in the sculpture emerges somewhat differently if it is viewed (literally and figuratively in context: as an altarpiece in a chapel where its presentation is structured as a ‘performance’, complete with spectators or witnesses, and as the central image of the left transept of Santa Maria della Vittoria – a church whose dedication derives from the power of the image (the Madonna della vittoria displayed above the main altar. If the statue group is read as a divine ecstasy witnessed, rather than a mystic encounter experienced, it engages another discourse, with its own metaphors and meanings. The saint’s swoon has less to do with the erotic capacity of the senses than with their absence, presenting a rather different challenge to an artist celebrated for his ability to transform insensate stone into vulnerable flesh.

  12. Need samad maastikud / Teresa Gali-Izard

    Index Scriptorium Estoniae

    Gali-Izard, Teresa

    2006-01-01

    Hispaania maastikuarhitekti ja põllumajandusinseneri Teresa Gali-Izardi (sünd. 1968) tekst tema 2005. a. Barcelonas Land & Scape'i seerias ilmunud raamatu "The Same Landscapes. Ideas and Interpretations" (Editorial Gustavo Gili) sissejuhatusest

  13. Need samad maastikud / Teresa Gali-Izard

    Index Scriptorium Estoniae

    Gali-Izard, Teresa

    2006-01-01

    Hispaania maastikuarhitekti ja põllumajandusinseneri Teresa Gali-Izardi (sünd. 1968) tekst tema 2005. a. Barcelonas Land & Scape'i seerias ilmunud raamatu "The Same Landscapes. Ideas and Interpretations" (Editorial Gustavo Gili) sissejuhatusest

  14. [The ecstatic epilepsy of Teresa of Jesus].

    Science.gov (United States)

    Garcia Albea, E

    Our aim is to define the ecstasies (raptures) of Teresa de Ahumada (Teresa of Jesus) and to link them with ecstasies recently identified as convulsive seizures (Dostoevsky s epilepsy, Saint Paul s disease, ecstatic epilepsy). We review the Carmelite nun's pathography, with special attention given to the excellent detailed descriptions of her ecstasies. The stereotypic movements and comparison with similar cases leads us to consider them as being epileptic, possibly secondary to neurocysticercosis.

  15. O êxtase de Teresas: o sacro e o profano na Literatura e nas Artes (The ecstasy of Teresas: the sacred and the profane in the Literature and in the Arts - DOI: 10.5752/P.2175-5841.2013v11n31p843

    Directory of Open Access Journals (Sweden)

    Flávia Vieira da Silva do Amparo

    2013-09-01

    Full Text Available No altar da Igreja de Santa Maria della Vittoria (Roma, encontramos a bela escultura de Bernini, denominada “O êxtase de Santa Teresa”. Símbolo da entrega ao gozo espiritual, a escultura do artista italiano representa Santa Teresa de Ávila recebendo do anjo a seta do amor divino, reprodução perfeita do êxtase místico e religioso. Esse trabalho tem como objetivo analisar a ocorrência de Teresas na literatura brasileira, como heroínas divididas entre o sacro e o profano. Propomos o estudo do romance Tereza Batista: cansada de guerra, de Jorge Amado, a partir da intertextualidade com a tradição literária baiana, de Gregório de Matos e Castro Alves, e em contraponto ao pensamento religioso da obra lírica de Santa Teresa de Ávila, em diálogo com a escultura extática da santa, criada por Gian Lorenzo Bernini. Palavras-chaves: Santa Teresa de Ávila. Jorge Amado. Castro Alves. Gregório de Matos. Sagrado. Profano.   Abstract At the altar of the Church of Santa Maria della Vittoria (Rome, is located the Bernini’s sculpture, called "The Ecstasy of St. Teresa." Symbol of surrender to spiritual joy, the sculpture by the Italian artist represents St. Teresa of Avila affected by the arrow of the Angel, perfect reproduction of the religious and mystical ecstasy. This article aims to analyze the occurrence of Teresas in Brazilian literature, as heroines divided between the sacred and the profane. We propose to study of the novel Tereza Batista: cansada de guerra, by Jorge Amado, from the intertextuality with the literary tradition of Bahia, of Gregorio de Mattos and Castro Alves, and in opposition to the religious thought of the lyrical work of St. Teresa de Ávila, in dialogue with the ecstatic sculpture of St. Tereza, by Gian Lorenzo Bernini. Keywords: St. Teresa of Ávila. Jorge Amado. Castro Alves. Gregório de Mattos. Sacred. Profane. 

  16. Teresa y Luis, Luis y Teresa. Dos santos en tiempos recios

    Directory of Open Access Journals (Sweden)

    Emilio Callado Estela

    2016-06-01

    Full Text Available El presente artículo analiza la relación entre dos grandes santos españoles de la Contrarreforma Católica, Teresa de Jesús y el dominico fray Luis Bertrán. The present article analyses the relation between two big Spanish saints of the Catholic Counterreformation, Teresa de Jesus and the Dominican monk Luis Bertrán.

  17. Últimas tardes con Teresa

    Directory of Open Access Journals (Sweden)

    Hugo Ruiz Rojas

    1966-08-01

    Full Text Available Ultimas tardes con Teresa, del escritor español Juan Marsé, viene a llamar la atención sobre este joven autor, que ya en sus libros anteriores, Esta cara de la luna y Encerrados con un solo juguete, había demostrado claras dotes de novelista, puesto que no solo tenía algo que decir sino que sabía también cómo decirlo.

  18. Pietro Filippo Bernini, son of Gianlorenzo, and the mediation of the courts of Madrid and Paris for the concession of his prebend in Santa Maria Maggiore of Rome

    Directory of Open Access Journals (Sweden)

    Margarita de Alfonso Caffarena

    2017-06-01

    Full Text Available The intervention of queen Maria Teresa of Austria at the court of Madrid resulted in the concession of a prebend to Pietro Filippo Bernini, the eldest son of Gianlorenzo and canon of Santa Maria Maggiore in Rome.

  19. Teresa Urrea: ¿Una Prechicana? Retos de memoria social,historia, nacionalismo de los chicanos de los Estados Unidos

    Directory of Open Access Journals (Sweden)

    Gillian Newell

    2002-01-01

    Full Text Available Las comunidades usan su pasado para construir su presente y futuro. Al mismo tiempo, el presente y el futuro de la gente constituyen su pasado. Esta investigación examina qué papel simbólico jugó la curandera y santa popular mexicana de finales del siglo XIX, Teresa Urrea, en el movimiento chicano de los años sesenta y setenta. Mediante un análisis de la política de formación de la identidad colectiva se comprende la construcción de una memoria social determinada y el uso del pasado en el presente. Examinando la historia del movimiento chicano y los trabajos relacionados, he investigado las maneras en las que se ha representado a Teresa, qué símbolos ha atribuido el chicanismo a su persona y el papel que ella jugó y continúa representando en la memoria social. Descubrí que la memoria de Teresa es de origen académico y que los chicanos intelectuales nunca lograron vincular esta construcción con la memoria popular.

  20. Chipless RFID reader architecture

    CERN Document Server

    Karmakar, Nemai Chandra; Kalansuriya, Prasanna

    2013-01-01

    In the era of information communication technology (ICT), radio frequency identification (RFID) has been going through tremendous development. RFID technology has the potential of replacing barcodes due to its large information carrying capacity, flexibility in operations, and applications. The deployment of RFID has been hindered by its cost. However, with the advent of low powered ICs, energy scavenging techniques, and low-cost chipless tags, RFID technology has achieved significant development. This book addresses the new reader architecture, presents fundamentals of chipless RFID systems,

  1. RFID design principles

    CERN Document Server

    Lehpamer, Harvey

    2012-01-01

    This revised edition of the Artech House bestseller, RFID Design Principles, serves as an up-to-date and comprehensive introduction to the subject. The second edition features numerous updates and brand new and expanded material on emerging topics such as the medical applications of RFID and new ethical challenges in the field. This practical book offers you a detailed understanding of RFID design essentials, key applications, and important management issues. The book explores the role of RFID technology in supply chain management, intelligent building design, transportation systems, military

  2. NASA RFID Applications

    Science.gov (United States)

    Fink, Patrick, Ph.D.; Kennedy, Timothy, Ph.D; Powers, Anne; Haridi, Yasser; Chu, Andrew; Lin, Greg; Yim, Hester; Byerly, Kent, Ph.D.; Barton, Richard, Ph.D.; Khayat, Michael, Ph.D.; Studor, George; Brocato, Robert; Ngo, Phong; Arndt, G. D., Ph.D.; Gross, Julia; Phan, Chau; Ni, David, Ph.D.; Dusl, John; Dekome, Kent

    2007-01-01

    This viewgraph document reviews some potential uses for Radio Frequency Identification in space missions. One of these is inventory management in space, including the methods used in Apollo, the Space Shuttle, and Space Station. The potential RFID uses in a remote human outpost are reviewed. The use of Ultra-Wideband RFID for tracking are examined such as that used in Sapphire DART The advantages of RFID in passive, wireless sensors in NASA applications are shown such as: Micrometeoroid impact detection and Sensor measurements in environmental facilities The potential for E-textiles for wireless and RFID are also examined.

  3. Teresa Uzeda e i suoi Maîtres

    Directory of Open Access Journals (Sweden)

    Rosalba Galvagno

    2013-12-01

    Full Text Available La biografia diTeresa Uzeda narrata da Federico De Roberto nell’Illusione (1891, il primo grande romanzo del ciclo degli Uzedainsieme a I Viceré (1894 e a L’imperio (1929, comprende anche l’istruzionedella giovane eroina, che comincia a studiare dapprima - ha 10 anni all’iniziodel romanzo - sotto la direzione di Miss, per essere poi seguita da altriprofessori di lettere, di storia, di disegno, di canto, fino all’età di 17 annicirca. Ma, accanto all’istruzione ‘scolastica’, Teresa avrà accesso, graziealla sua devotissima serva Stefana, all’universo incantato e perturbante dellefiabe, e quindi, spinta dalla sua trasgressiva curiositas, all’universo altrettanto incantato e periglioso deiromanzi e del teatro, il melodramma innanzitutto.Quale Bildung si prefigura allora per ildestino di Teresa, questa infelice, incompresa e originalissima Bovarysiciliana?

  4. Reverse Engineering of RFID devices

    OpenAIRE

    Bokslag, Wouter

    2015-01-01

    This paper discusses the relevance and potential impact of both RFID and reverse engineering of RFID technology, followed by a discussion of common protocols and internals of RFID technology. The focus of the paper is on providing an overview of the different approaches to reverse engineering RFID technology and possible countermeasures that could limit the potential of such reverse engineering attempts.

  5. RFID Location Algorithm

    Directory of Open Access Journals (Sweden)

    Wang Zi Min

    2016-01-01

    Full Text Available With the development of social services, people’s living standards improve further requirements, there is an urgent need for a way to adapt to the complex situation of the new positioning technology. In recent years, RFID technology have a wide range of applications in all aspects of life and production, such as logistics tracking, car alarm, security and other items. The use of RFID technology to locate, it is a new direction in the eyes of the various research institutions and scholars. RFID positioning technology system stability, the error is small and low-cost advantages of its location algorithm is the focus of this study.This article analyzes the layers of RFID technology targeting methods and algorithms. First, RFID common several basic methods are introduced; Secondly, higher accuracy to political network location method; Finally, LANDMARC algorithm will be described. Through this it can be seen that advanced and efficient algorithms play an important role in increasing RFID positioning accuracy aspects.Finally, the algorithm of RFID location technology are summarized, pointing out the deficiencies in the algorithm, and put forward a follow-up study of the requirements, the vision of a better future RFID positioning technology.

  6. RFID as an infrastructure

    CERN Document Server

    Qiao, Yan; Li, Tao

    2014-01-01

    RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current application model treats tags simply as ID carriers and deals with each tag individually for the purpose of identifying the object that the tag is attached to. The uniqueness of RFID as an Infrastructure is to change the traditional individual view to a collective view that treats universally-deployed tags as a new infrastructure, a new wireless platform on which novel applications can be developed. The book begins with an introduction to the problems of tag estimation and information collection from RFID systems, and explains the challenges. It discusses how to efficiently estimate the number of tags in a large RFID system, considering both energy cost and execution time. It then gives a detailed account on how to collect information from a sensor-augmented RFID network with new designs that significantly reduce execution time.

  7. Hybrid 95: Software for the design of hybrid systems, Potrerillo of Santa Teresa; Hybrid 95: Software de diseno de sistemas hibridos, Potrerillo de Santa Teresa

    Energy Technology Data Exchange (ETDEWEB)

    Casaravilla, G.; Chaer, R. [Instituto de Ingenieria Electrica, Facultad de Ingenieria, Universidad de la Republica, Montevideo (Uruguay)

    1997-12-31

    This paper describes the software Hybrid 95 and how it is used for the design of hybrid systems. As an application example some of the design stages are looked over (determination of the wind resource, simulations for sizing generation/storage and topology) of the Potrerillo installation. Taking into account the site clear ecological connotations, during the design consideration is made of the visual impact that represents the possible wind-generator, therefore several locations and wind-generator heights are studied, even arriving to the wind-generation elimination. [Espanol] Este trabajo describe el software Hybrid 95 y como se utiliza a los efectos del diseno de sistemas hibridos. Como ejemplo de aplicacion se recorren algunas de las etapas del diseno (determinacion del recurso eolico, simulaciones para el dimensionado de generacion/acumulacion y topologia) de la instalacion de Potrerillo. Teniendo en cuenta las claras connotaciones ecologistas del lugar, durante el diseno se tiene presente el impacto visual que representa el eventual aerogenerador por lo que se estudian diversas ubicaciones y alturas de aerogenerador, llegandose incluso a estudiar la eliminacion de la generacion eolica.

  8. ESPACIO, AFECTO Y SUBJETIVIDAD FEMENINA EN ARBOLEDA DE LOS ENFERMOS DE TERESA DE CARTAGENA/SPACE, AFFECT AND FEMALE SUBJECTIVITY IN TERESA DE CARTAGENA'S ARBOLEDA DE LOS ENFERMOS

    National Research Council Canada - National Science Library

    Juan E Villegas-Restrepo

    2015-01-01

    ... femenino. Palabras clave: dinámicas espaciales, subjetividad femenina, afectos, Teresa de Cartagena, Medioevo tardío. ABSTRACT This work analyzes Teresa de Cartagena's treatise on spiritual counseling Arboleda de los enfermos based on a dialectical breakdown between the spatial dynamics (be them textual, public, private or symbolic) that appear in ...

  9. The Magic of RFID

    Institute of Scientific and Technical Information of China (English)

    Roy; Want

    2008-01-01

    1 Introduction Many modern technologies give the impression that they work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (radio frequency identification), which is relatively new to the mass market

  10. Teaching of Astronomy at Teresa Martin College. (Breton Title: Ensino de Astronomia Nas Faculdades Teresa Martin.) Enseñanza de la Astronomia en la Facultad Teresa Martin

    Science.gov (United States)

    Azevedo Sobreira, Paulo Henrique

    2005-12-01

    Courses with exclusive Astronomy contents did not exist at (FATEMA) Teresa Martin College's program until the end of 2002. In 2001, a series of educational experiments started in courses and classes of Astronomy at Mathematics and Geography departments. This actions culminated with the insertion of Teaching of Astronomy as a study theme in the course of Independent Studies for Mathematics professors in 2005. Até o final de 2002 inexistiam na grade curricular das Faculdades Integradas Teresa Martin (FATEMA) cadeiras com conteúdos exclusivos de Astronomia. A partir do ano de 2001 iniciou-se uma série de experiências educacionais através de modelos de cursos e de aulas de Astronomia nos Departamentos de Matemática e de Geografia, o que culminou com a inserção do Ensino de Astronomia como temática da disciplina de Estudos Independentes para o curso de Licenciatura em Matemática, em 2005. Hasta el final de 2002 no había en el currículo dela Facultad TeresaMartín (FATEMA) en San Pablo - SP, Brasil, disciplinas con contenidos exclusivos de Astronomía. A partir del año 2001 comenzó una secuencia de experimentos educacionales de carrera y de clases de Astronomía en los Departamentos de Matemática y Geografía, culminando en la implantación de clases de Enseñanza dela Astronomíaenla Licenciaturaen Matemática, en el año de 2003, y de la cátedra de extensión en Cosmografía parala Licenciaturaen Geografía.

  11. Country western singer Teresa is congratulated by Daniel Goldin

    Science.gov (United States)

    1999-01-01

    After her performance at the Apollo/Saturn V Center, country western recording artist Teresa gets a congratulatory hug from NASA Administrator Daniel Goldin. Teresa performed a song, 'Brave New Girls,' written for astronaut Catherine 'Cady' Coleman, mission specialist on STS-93. She entertained participants and attendees of a women's forum held in the center earlier in the day. The attendees are planning to view the launch of STS-93 at the Banana Creek viewing sight. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. Liftoff is scheduled for July 20 at 12:36 a.m. EDT.

  12. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  13. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  14. RFID design fundamentals and applications

    CERN Document Server

    Lozano-Nieto, Albert

    2010-01-01

    RFID is an increasingly pervasive tool that is now used in a wide range of fields. It is employed to substantiate adherence to food preservation and safety standards, combat the circulation of counterfeit pharmaceuticals, and verify authenticity and history of critical parts used in aircraft and other machinery-and these are just a few of its uses. Goes beyond deployment, focusing on exactly how RFID actually worksRFID Design Fundamentals and Applications systematically explores the fundamental principles involved in the design and characterization of RFID technologies. The RFID market is expl

  15. Miniaturizing RFID for magnamosis.

    Science.gov (United States)

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag.

  16. RFID added value sensing capabilities

    DEFF Research Database (Denmark)

    Anggorjati, B.; Çetin, K.; Mihovska, A.

    2010-01-01

    Radio frequency identification (RFID) is a key technology for Europe. Since the initial emergence of the technology, there has been a noticeable shift away from RFID pilot projects of the early days, towards a broad deployment of RFID in order to increase the efficiency and innovation of processes....... Even though Europe is a leading player in the world of RFID technology, several challenges need to be addressed in order for RFID to reach its full potential. The funded under FP7 ICT project ASPIRE is one of the coordinated European efforts to further the advancement of this technology, in the areas...... of enabling technology development for RFID. In particular, the focus of ASPIRE is on design, development and adoption of an innovative, programmable, royalty-free, lightweight and privacy friendly RFID middleware....

  17. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  18. Radio frequency identification and sensors from rfid to chipless RFID

    CERN Document Server

    Perret, Etienne

    2014-01-01

    This book deals with the field of identification and sensors, more precisely the possibility of collecting information remotely with RF waves (RFID). The book introduces the technology of chipless RFID starting from classical RFID and barcode, and explores the field of identification and sensors without wire, without batteries, without chip, and with tags that can even be printed on paper. A technique for automatic design of UHF RFID tags is presented , aiming at making the tags as insensitive as possible to the environment (with the ability to increase the reading range reliability), or, co

  19. Santa Teresa en los conventos de monjas de Nueva España

    National Research Council Canada - National Science Library

    Lavrin, Asuncion

    2015-01-01

    ... prayer.El trasplante de la espiritualidad teresiana a Nueva España fue una experiencia que puso a prueba la capacidad de adaptar su mensaje reformista a las circunstancias de nuevas sociedades...

  20. RFID solution benefits Cambridge hospital.

    Science.gov (United States)

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals.

  1. Wireless Power in Passive RFID

    OpenAIRE

    Wu, Shen

    2010-01-01

    Radio-frequency Identification (RFID) technology has many applications in various fields. Compared to a traditional Auto-ID system, the RFID technology has many advantages. Firstly, the identification of tags is more accurate and the distance is more flexible. Secondly, the maximum memory capacity of RFID tags can be several megabytes which is much more than that of the traditional Auto-ID’s. Thirdly, RFID has better performance in anti-pollution, because the data is saved in a chip wrapped b...

  2. RFID identity theft and countermeasures

    Science.gov (United States)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  3. Cutting Edge RFID Technologies for NASA Applications

    Science.gov (United States)

    Fink, Patrick W.

    2007-01-01

    This viewgraph document reviews the use of Radio-frequency identification (RFID) for NASA applications. Some of the uses reviewed are: inventory management in space; potential RFID uses in a remote human outpost; Ultra-Wideband RFID for tracking; Passive, wireless sensors in NASA applications such as Micrometeoroid impact detection and Sensor measurements in environmental facilities; E-textiles for wireless and RFID.

  4. LA PERFORMANCE DE MARÍA TERESA HINCAPIÉ

    Directory of Open Access Journals (Sweden)

    Constanza Ramírez Molano

    2006-01-01

    Full Text Available En este artículo la autora da cuenta de la historia de María Teresa Hincapié, la maestra, la investigadora, la artista, la performer, la peregrina. La historia narra cómo comenzó en las tablas, cómo descubrió el arte a través de la investigación y la realización plástica y cómo terminó en la performance convencida de que su mejor propuesta artística es trabajar sobre su propia vida, propuesta que le ha merecido un gran reconocimiento nacional e internacional.

  5. Dairy cow monitoring by RFID

    Directory of Open Access Journals (Sweden)

    Stevan Stankovski

    2012-02-01

    Full Text Available Dairy cows identification and monitoring on small cattle farms are usually based on the utilization of barcode technology. This kind of identification technology is unsuitable for dairy cows milking and feeding process automation. Radio Frequency Identification (RFID technology is a better solution in this case. This paper describes the research and implementation of the milking cycle´s automated monitoring with the use of RFID tags conducted on a small cattle farm in the Republic of Serbia. This solution is based on RFID system which consists of two parts. First part includes control box, two Ultra High Frequency (UHF RFID readers operating at frequency of 915 MHz and RFID tags glued onto the dairy cow ear labels. Second part includes software modules for acquisition and collecting data from RFID tags to build up an archive due to supervision and analysis of the milking cycle. Reading accuracy of RFID system in the observed period was 99.8 % in average. A group of dairy cows having a settled milking cycle within an interval of 12h ± 5 % had a 1.5 % better yield and a 0.08 better quality in comparison with a group of dairy cows having a milking cycle variance higher than 20 %. RFID system implemented in described way can be easily integrated into a new or existing farm management system in order to have better production results which depend on several factors including settled milking cycles.

  6. RFID receiver apparatus and method

    Science.gov (United States)

    Scott, Jeffrey Wayne

    2006-12-26

    An RFID backscatter interrogator for transmitting data to an RFID tag, generating a carrier for the tag, and receiving data from the tag modulated onto the carrier, the interrogator including a single grounded-coplanar wave-guide circuit board and at least one surface mount integrated circuit supported by the circuit board.

  7. On the move with RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Scanology is an independent automatic identification specialist providing state of the art barcode and RFID solutions to our European customer base. Our knowledge of the present and what is yet to come allows us to provide honest, practical advice to clients transitioning from barcode to RFID. Scanology designs, builds, installs and services end-to-end sup-

  8. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  9. St. Teresa van Avila: sentrale figuur in die werk van Cussons en Van Wyk Louw

    Directory of Open Access Journals (Sweden)

    H. van Vuuren

    1989-05-01

    Full Text Available A central poem in Van Wyk Louw’s Tristia (1962, is “H. Teresa van Avila flap uit” (literally translated: “Saint Teresa of Avila talks too much/babbles uncontrollably”. This article illustrates how intertextual reading helped to clarify the poem. Teresa of Avila’s The way of perfection (a translation of the Spanish work El Camino de la Perfección, 1573 is the intertext of the Van Wyk Louw poem. In the last section of the article it is shown how the figure of St. Teresa of Avila is central not only to Van Wyk Louw’s Tristia (1962, but also to the oeuvre of Sheila Cussons, which underlines a strong intertextuality between these two Afrikaans oeuvres.

  10. Amor meus, Cruxifixus est! / Teresa Perciaccante ; tõlk. Anne Kalling

    Index Scriptorium Estoniae

    Perciaccante, Teresa

    2002-01-01

    Kevadisest kriisist Petlemmas, mil Iisraeli armee piiras Jeesus Kristuse sünnikirikut. Ema Teresa Perciaccante kiri Pühima Päästja Püha Birgitta ordu ülemaabtissile Ema Tekla Famigliettile Rooma

  11. Amor meus, Cruxifixus est! / Teresa Perciaccante ; tõlk. Anne Kalling

    Index Scriptorium Estoniae

    Perciaccante, Teresa

    2002-01-01

    Kevadisest kriisist Petlemmas, mil Iisraeli armee piiras Jeesus Kristuse sünnikirikut. Ema Teresa Perciaccante kiri Pühima Päästja Püha Birgitta ordu ülemaabtissile Ema Tekla Famigliettile Rooma

  12. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2012-06-01

    Full Text Available RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc… inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command and RRTL (RFID Reader Topology Language. MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster.

  13. Commercial Product Activation Using RFID

    Science.gov (United States)

    Jedrey, Thomas

    2008-01-01

    Radio-frequency identification (RFID) would be used for commercial product activation, according to a proposal. What is new here is the concept of combining RFID with activation - more specifically, using RFID for activating commercial products (principally, electronic ones) and for performing such ancillary functions as tracking individual product units on production lines, tracking shipments, and updating inventories. According to the proposal, an RFID chip would be embedded in each product. The information encoded in the chip would include a unique number for identifying the product. An RFID reader at the point of sale would record the number of the product and would write digital information to the RFID chip for either immediate activation of the product or for later interrogation and processing. To be practical, an RFID product-activation system should satisfy a number of key requirements: the system should be designed to be integrable into the inventory-tracking and the data-processing and -communication infrastructures of businesses along the entire supply chain from manufacture to retail; the system should be resistant to sophisticated hacking; activation codes should be made sufficiently complexity to minimize the probability of activating stolen products; RFID activation equipment at points of sale must be capable to two-way RF communication for the purposes of reading information from, and writing information to, embedded RFID chips; the equipment at points of sale should be easily operable by sales clerks with little or no training; the point-of-sale equipment should verify activation and provide visible and/or audible signals indicating verification or lack thereof; and, the system should be able to handle millions of products per year with minimal human intervention, among other requirements.

  14. Santa Muerte

    OpenAIRE

    Fraser, A.; The Photographers' Gallery; Trolley Books; Bar-Tur Foundation; Arts Council England

    2015-01-01

    The origins of Santa Muerte - a religion/cult that has been denounced as satanic by the Mexican Catholic Church - can be dated back hundreds of years. It was developed through a syncretism between indigenous Mesoamerican and Spanish Catholic beliefs and practices. Only in the last decade however has it become more predominant in Mexican society, where many commentators have noted its rise with the killing and violence associated with the war between rival drug cartels and the Mexican Governme...

  15. A Review on Chipless RFID Tag Design

    Directory of Open Access Journals (Sweden)

    Ali Hashemi

    2013-06-01

    Full Text Available The demand for RFID tags has recently increased due to the development of the RFID. Over the past decade, great efforts have been devoted to the design of RFID tags without chip inside. The concept of chipless RFID tags appears to be a promising solution for low cost item tagging because the cost of active RFID tag depends mainly on the chip used in them. This paper presents the progress of the chipless RFID tag and introduces major studies in this filed. Advantages and disadvantages of these methods are pointed out.

  16. Security in RFID and sensor networks

    CERN Document Server

    Kitsos, Paris

    2009-01-01

    Security in RFIDMulti-Tag RFID Systems, L. Bolotnyy and G. RobinsAttacking RFID Systems, P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. RibagordaRFID Relay Attacks: System Analysis,Modeling, and Implementation, A. Lima, A. Miri, and M. NevinsPhysical Privacy and Security in RFID Systems, L. Bolotnyy and G. RobinsAuthentication Protocols in RFID Systems, G. Pantelic, S. Bojanic, and V. TomaševicLightweight Cryptography for Low-Cost RFID Tags, P. Peris-Lopez, J.C.

  17. Potentials of RFID Application in Retailing

    DEFF Research Database (Denmark)

    Foscht, Thomas; Kotzab, Herbert; Maloles III, Cesar

    2008-01-01

    The willingness of retailers to adopt RFID systems, as well as finding optimal RFID applications has yet not been investigated. This paper examines the issues associated with the RFID adoption based on the results of a conjoint analysis. The conjoint measurement looked at the trade-off decisions...... among different possible set-ups of RFID applications in retailing companies. Considerable willingness to adopt, but low diffusion and a structure of preferences with respect to RFID features was shown throughout the examined retailing companies. Furthermore, differences were shown among different types...... of retailers in their preferences for RFID system features and clusters were implied....

  18. Teresa Urrea: Mexican mystic, healer, and apocalyptic revolutionary.

    Science.gov (United States)

    Nava, Alex

    2005-01-01

    This article is a study of the mystical and apocalyptic dimensions of Teresa Urrea. As explained in this article, Urrea’s mystical experiences and visions are unique for their connection with a propheticapocalyptic and political worldview. This apocalyptic dimension is more than a communication of a hidden message or spiritual world; it also includes a reading of history that is catastrophic and discontinuous. The crisis and terror of history are given expression in Urrea’s mystical and apocalyptic pronouncements. In particular, the chaotic and oppressive circumstances of Mexican society during the dictatorship of Porfirio Diaz was confronted and denounced in Urrea’s mystical and apocalyptic ministry. This apocalyptic healer castigated those culpable or even complicit with the injustices affecting the indigenous communities of Mexico during the late nineteenth century. In the case of Urrea, the transformation and healing of Church and society was an important aspect of her spiritual, healing powers. Because Urrea possessed neither arms nor the weapon of the pen, her sole weapon became her mystical experiences and the insight and healing powers that flowed from them. People of Mexico—especially indigenous groups—began to flock to her hoping that she would bring God’s presence to the troubled and chaotic circumstances of their lives. Her compassion and tenderness for the afflicted as well as the apocalyptic expectations that she stirred up among the indigenous groups of Northern Mexico were enough to get this mystical-political Mexican mestiza exiled from her homeland.

  19. Agency and Otherness in Teresa Margolles’ Aesthetic of Death

    Directory of Open Access Journals (Sweden)

    Julia Banwell

    2010-10-01

    Full Text Available Teresa Margolles (b. 1963 is Mexico's foremost proponent of corpse art. Her work meditates upon her obsessions with the dead body and the processes that occur after death, and shows death as a direct result of violence. Employing a range of techniques of representation, Margolles implicates the spectator into potentially uncomfortably close contemplation of the artwork, sometimes through direct physical contact with the raw materials used in its creation. She transgresses the boundaries between the interior and the exterior of the body, and between life and death, occupying an artistic space where the minimalist and internationally accessible language of conceptual art interacts with her method of commenting upon a specifically Mexican set of circumstances, at times disguising unsettling realities behind deceptively subtle artistic techniques of representation. Drawing on theories of spectatorship and the problematics of looking at death, this essay will explore aspects of agency, eroticism and otherness in examples of Margolles' artwork, also paying attention to the question of ethics. The bodies and body parts the artist places at the centre of her works, witness the unsettlingly direct relation between violence enacted upon the body, and its result, death. The removal of these physical entities from social space leaves behind traces and residues that now, by means of the artist's intervention, metonymically evidence their former lives and erase the distance between dead and living bodies.

  20. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  1. RFID vs.Wi-Fi ID

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Wireless networks and Radio Frequency Identification(RFID) have always been closely linked.One of Wi-Fi’s first applications was transferring data from portable RFID readers.But the popularity of RFID has led some to envision whole networks of readers embed- ded throughout a building’s infrastructure.Reva Systems had an- nounced what it calls a Tag Acquisition Network(TAN),an array of RFID readers that work with passive,batteryless tags.Meanwhile,

  2. Towards EPC compatible plastic RFID tags

    NARCIS (Netherlands)

    Myny, K.; Steudel, S.; Vicca, P.; Smout, S.; Beenhakkers, M.J.; Aerle, N.A.J.M. van; Furthner, F.; Putten, B. van der; Tripathi, A.K.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2010-01-01

    A target application for plastic RFID tags is Electronic Product Coding (EPC). The EPC-specifications set some demanding requirements for RFID tags. In this work, we review the work that has been done to fulfill some of these specifications. We describe a complete 64-bit RFID tag that is inductively

  3. Towards EPC compatible plastic RFID tags

    NARCIS (Netherlands)

    Myny, K.; Steudel, S.; Vicca, P.; Smout, S.; Beenhakkers, M.J.; Aerle, N.A.J.M. van; Furthner, F.; Putten, B. van der; Tripathi, A.K.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2010-01-01

    A target application for plastic RFID tags is Electronic Product Coding (EPC). The EPC-specifications set some demanding requirements for RFID tags. In this work, we review the work that has been done to fulfill some of these specifications. We describe a complete 64-bit RFID tag that is inductively

  4. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  5. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  6. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We

  7. Towards EPC compatible plastic RFID tags

    NARCIS (Netherlands)

    Myny, K.; Steudel, S.; Vicca, P.; Smout, S.; Beenhakkers, M.J.; Aerle, N.A.J.M. van; Furthner, F.; Putten, B. van der; Tripathi, A.K.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2010-01-01

    A target application for plastic RFID tags is Electronic Product Coding (EPC). The EPC-specifications set some demanding requirements for RFID tags. In this work, we review the work that has been done to fulfill some of these specifications. We describe a complete 64-bit RFID tag that is

  8. The Unio Mystica of Teresa of Avila: two classical presentations in the light of psychology

    Directory of Open Access Journals (Sweden)

    Hans Åkerberg

    1982-01-01

    Full Text Available It is generally maintained within the Carmelite tradition that Teresa (1515-1582 showed an extraordinary facility in describing the stages of mysticism with experimential vigour and deep intensity, compared for example to John of the Cross, whose mystical presentation is of a more dogmatic and systematic nature. In this sense she would appear to be unsurpassed within the entire Roman Catholic mystic tradition. The author compares two classical presentations by Teresa of the significance of unio mystica, firstly her description of this in the Libro de la vida, and secondly her presentation of the same mystic element in the book Castillo interior o Las moradas.

  9. Wright, Teresa, Accepting Authoritarianism: State-society Relations in China’s Reform Era

    OpenAIRE

    Friedman, Edward

    2011-01-01

    Wright, Teresa, Accepting Authoritarianism: State-society Relations in China’s Reform Era, Stanford, Stanford UP, 2010, 254 pp. Teresa Wright contends that all China’s diverse economic strata succeed by relying on the state. Therefore, they are not about to turn against their government. They “accept” the CCP because of how late industrialisation, state-led development, and socialist legacies combine to shape opinion. Wright’s choice of strata leads to a vision of China as half an onion, with...

  10. The spiritual quest in “Los tres cantos” by Teresa Wilms Montt

    Directory of Open Access Journals (Sweden)

    Gabriela Jerez Garcés

    2015-04-01

    Full Text Available Analysis of the text “Los tres cantos” (1917 of the chilean writer Teresa Wilms Montt, understanding it as an exercise of spiritual search from the interior of the language, in which the poetry recovers her possibilities of extension of the spiritual conscience. The text is framed at the beginning of the vanguard will, which starts germinating in Chile about 1910, year in which there appears a trend named spiritualism of vanguard, aesthetic current based on the idea of that the spiritual life and experience of the soul constitute the axis of the human transcendence.Key words: Chilean Poetry, Teresa Wilms, spiritualism, vanguard.

  11. The Application of RFID Technologies in Construction

    Institute of Scientific and Technical Information of China (English)

    LIAN Meng

    2009-01-01

    RFID technologies have advanced greatly and deployed successfully in many industry sectors in recent years. Construction industry could benefit from the applications of RFID technologies but as yet has not found sufficient application areas. This project gives a comprehensive awareness of the RFID technologies, which focus on the investigation on the UK construction industry. The current status of RFID in construction and its potentials are specified in the analysis of questionnaires and case studies. Finally, basing on the investigations, some further tasks in developing RFID technologies are carried, including some recommendations, for the construction industry.

  12. INTENSIFYING THE SECURITY IN RFID SYSTEMS

    Directory of Open Access Journals (Sweden)

    Jose Reena

    2015-11-01

    Full Text Available Although promising, RFID is not without its challenges, which arise from both technological and usage point of View. A common concern with RFID is data security. Data Security is a key area in RFID usage; with a limited number of public key cryptosystems on passive RFID platforms, the proposed algorithm makes use of Montgomery multiplication primitives to reduce the amount of computation required on the power constrained tag therefore making the proposition viable. Public key cryptography is being suggested for next generation RFID systems to reduce the number of possible attack vectors native to this type of technology. By estimating the area, power and time constraints of the RFID platform, it was determined that the area constraint was the critical variable in determining the maximum implementable security variable. Although the application of this algorithm has been targeted for passive HF RFID platforms, the algorithm could be used in other low power, sized constrained applications.

  13. Compact RFID Enabled Moisture Sensor

    Directory of Open Access Journals (Sweden)

    U. H. Khan

    2016-09-01

    Full Text Available This research proposes a novel, low-cost RFID tag sensor antenna implemented using commercially available Kodak photo-paper. The aim of this paper is to investigate the possibility of stable, RFID centric communication under varying moisture levels. Variation in the frequency response of the RFID tag in presence of moisture is used to detect different moisture levels. Combination of unique jaw shaped contours and T-matching network is used for impedance matching which results in compact size and minimal ink consumption. Proposed tag is 1.4 × 9.4 cm2 in size and shows optimum results for various moisture levels upto 45% in FCC band with a bore sight read range of 12.1 m.

  14. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a nu

  15. RFID gaat belangrijke rol spelen

    NARCIS (Netherlands)

    Luitjes, H.

    2004-01-01

    Radio Frequency Identification technology (RFID), de opvolger van de streepjescode, gaat in de verslogistiek een belangrijke rol spelen. Dat stelt dr. Henri Luitjes, hoofd van de afdeling verpakken, transport en logistiek van Wageningen UR. Ingegaan wordt op begrippen als shell life, derving,

  16. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a nu

  17. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  18. RFID gaat belangrijke rol spelen

    NARCIS (Netherlands)

    Luitjes, H.

    2004-01-01

    Radio Frequency Identification technology (RFID), de opvolger van de streepjescode, gaat in de verslogistiek een belangrijke rol spelen. Dat stelt dr. Henri Luitjes, hoofd van de afdeling verpakken, transport en logistiek van Wageningen UR. Ingegaan wordt op begrippen als shell life, derving, ketens

  19. The Design of a Lightweight RFID Middleware

    Directory of Open Access Journals (Sweden)

    Fengqun Lin

    2009-10-01

    Full Text Available Radio Frequency Identification (RFID middleware is often regarded as the central nervous system of RFID systems. In this paper, a lightweight RFID middleware is designed and implemented without the need of an Application Level Events (ALE structure, and its implementation process is described using a typical commerical enterprise. A short review of the current RFID middleware research and development is also included. The characteristics of RFID middleware are presented with a two-centric framework. The senarios of RFID data integration based on the simplified structure are provided to illuminats the design and implementation of the lightweight middleware structure and its development process. The lightweight middleware is easy to maintain and extend because of the simplified and streamlined structure and the short development cycle.

  20. Integration of RFID and Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Miodrag; Bolic; Amiya; Nayak; Ivan; Stojmenovi.

    2007-01-01

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide limitless future potentials. However,RFID and sensor networks almost are under development in parallel way. Integration of RFID and wireless sensor networks attracts little attention from research community. This paper first presents a brief introduction on RFID,and then investigates recent research works,new products/patents and applications that integrate RFID with sensor networks. Four types of integration are discussed. They are integrating tags with sensors,integrating tags with wireless sensor nodes,integrating readers with wireless sensor nodes and wire-less devices,and mix of RFID and sensors. New challenges and future works are discussed in the end.

  1. RFID Spatio-Temporal Data Management

    Directory of Open Access Journals (Sweden)

    WANG Yonghui

    2013-01-01

    Full Text Available Radio-frequency Identification (RFID technology promises to revolutionize the way we track items in supply chain, retail store, and asset management applications. The size and different characteristics of RFID data pose many interesting challenges in the current data management systems. In this paper, we provide a brief overview of RFID technology and highlight a few of the spatio-temporal data management challenges that we believe are suitable topics for exploratory research.

  2. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  3. Implementasi RFID pada Perusahaan Penyewaan Mobil

    Directory of Open Access Journals (Sweden)

    I Gusti Made Karmawan

    2013-05-01

    Full Text Available Radio Frequency Identification (RFID is an identification technology based on radio waves. At this time, we will describe the application of RFID technology in a rental car company. The study discusses about information about how to implement RFID within the enterprise, the role of RFID in the enterprise, how to use RFID, and everything else related to RFID in the enterprise. The main purpose of writing this paper is to make easy for reader finding information about general description of RFID and its application to a car rental company. Furthermore, methodology components are type and source of Data, data collection technique, hypotheses and data analysis technique. Finally, a conclusion is made that that RFID is an identification technology that is relatively new and feasible at the car rental company which is an alternative to barcodes that have been widely used. The presence of RFID also provides a very beneficial effect to the company, as has been displayed through charts of various aspects of the company in the results section.

  4. Pemanfaatan Sistem RFID sebagai Pembatas Akses Ruangan

    Directory of Open Access Journals (Sweden)

    HENDI HANDIAN RACHMAT

    2016-02-01

    Full Text Available ABSTRAK Pada penelitian ini, sistem RFID (Radio Frequency Identification dimanfaatkan sebagai kartu identifikasi personal pada sistem akses ruangan. Keberadaan sistem ini ditujukan untuk menjaga keamanan dan privasi ruangan dari seseorang yang tidak memiliki otoritas untuk memasuki ruangan tersebut. Melalui perancangan dan implementasi sistem akses ruangan ini, dilakukan evaluasi sistem kerja kunci elektrik berbasis komponen solenoid serta jarak dan posisi optimal pembacaan RFID tag guna memberikan kenyamanan pada pengguna ketika mengakses ruangan. RFID tag yang dipergunakan dalam sistem ini berbentuk kartu tipe EM4001 dan menyimpan kode unik yang digunakan sebagai identifikasi personal. Kode ini dibaca oleh RFID reader tipe ID-12 dan divalidasi otoritasnya dengan mikrokontroler ATMega32 untuk mengatur sistem kerja kunci elektrik yang dirancang sendiri menggunakan solenoid. Sistem ini dilengkapi pula dengan sistem database untuk pencatatan pengguna yang mengakses ruangan. Dari hasil pengujian, seluruh (100% RFID tag dapat dikenali oleh RFID reader dalam tiga posisi berbeda dengan jarak optimal sejauh 5 cm (vertikal dan 2 cm (horisontal. Keseluruhan (100% aktifitas pengguna yang mengakses ruangan dapat tercatat dalam sistem database. Hasil penelitian ini dapat disimpulkan bahwa teknologi RFID dapat digunakan secara nyaman dan aman sebagai alternatif sistem identifikasi personal untuk sistem akses ruangan. Kata Kunci : kunci elektrik, RFID, sistem akses ruangan, sistem database, solenoid. ABSTRACT In this research, RFID system was utilized as a personal identification security card in access room system. This system was aimed to secure a room and to have privacy from unauthorized person to enter the room. By designing and implementing the system, a solenoid based electric key system as well as an optimal distance and position of RFID tag were evaluated to know the most convenience condition for all users during accessing the room. RFID tag used in

  5. Handbook of smart antennas for RFID systems

    CERN Document Server

    2010-01-01

    The Handbook of Smart Antennas for RFID Systems is a single comprehensive reference on the smart antenna technologies applied to RFID. This book will provide a timely reference book for researchers and students in the areas of both smart antennas and RFID technologies. It is the first book to combine two of the most important wireless technologies together in one book. The handbook will feature chapters by leading experts in both academia and industry offering an in-depth description of terminologies and concepts related to smart antennas in various RFID systems applications.

  6. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  7. RFID-Enabled Sensor Design and Applications

    CERN Document Server

    Rida, Amin; Tentzeris, Manos

    2010-01-01

    RFID (radio-frequency identification) is an emerging communication system technology and one of the most rapidly growing segments of today's automatic identification data collection industry. This cutting-edge resource offers you a solid understanding of the basic technical principles and applications of RFID-enabled sensor systems. The book provides you with a detailed description of RFID and it's operation, along with a fundamental overview of sensors and wireless sensor networks. Moreover, this practical reference gives you step-by-step guidance on how to design RFID-enabled sensors that fo

  8. La dualidad de Teresa de Jesús y el proyecto de “Jesuitas descalzos”

    Directory of Open Access Journals (Sweden)

    Rodríguez-San Pedro Bezares, Luis E.

    2016-06-01

    Full Text Available A duality based on her personality and her project coexisted in Teresa of Jesus. This duality is the origin of the later evolution (and misunderstandings of the Order of Discalced Carmelite; especially in the male section. From Teresa as a hermit, who is introspective and nostalgic for the primitive Rule, to the active founder woman concerned about the missions and the salvation of souls. Juan de la Cruz would be placed in the wake of the “first Teresa” and Jerónimo Gracián in the “second one”. In this regard, two possible ways of Carmelo lived together in the life of Teresa of Jesus, but much creativity, inner plurality and energy were not available to everyone. The understanding between “the second Teresa” and Jerónimo Gracián, did it not promote a tendency in Discalced Carmelites that we could call “Discalced Jesuits”? In other words: apostolic/missionaries and contemplative/penitents at the same time.En Teresa de Jesús parece coexistir una dualidad personal y de proyecto, que está en el origen de la evolución posterior (y los desencuentros de la Orden Carmelita Descalza; sobre todo en la rama masculina. Desde la Teresa ermitaña, interior y añorante de la Regla primitiva, a la activa fundadora con preocupación misional y salvación de almas. Juan de la Cruz se situaría en la estela de “la primera Teresa”, y Jerónimo Gracián en la de “la segunda”. En la vida de la propia Teresa de Jesús convivieron dos formas posibles de Carmelo; pero tanta creatividad, pluralidad interior y energía no estaba al alcance de todos. La sintonía entre “la segunda Teresa” y Jerónimo Gracián, ¿no propiciaba una tendencia de los Carmelitas descalzos que pudiéramos denominar de “Jesuitas descalzos”?: es decir, al tiempo apostólico/misioneros y contemplativo/penitentes.

  9. Love from attitudes of two Muslim and Christian mystics (Rabia Adaviye and Teresa Avila

    Directory of Open Access Journals (Sweden)

    Dr. Maryam Bakhtyar

    2013-06-01

    Full Text Available Love is an affection which is the extreme and peak. In this extreme love, lover (mystic loves his/her beloved (God with all of his/her own and he/she burns in his parting, mystical lover in fact will survive with the destruction (join to lover in true lover. Love of God is essential issue in Rabia Adaviye and Teresa Avila works. Rabia believes that in the bond of true love must be absolutely no contamination as a lover not ask for reward in turn his/her love not even waiting for an answer to his/her love. Also Teresa believes that original love is only for God and all loves along this love are justified and interpreted. Other friendships should not be an obstacle in the way God’s love or their ending should lead to divine love.

  10. Paisajes para Teresa Andrés, bibliotecaria en tiempos de guerra (1936-1938

    Directory of Open Access Journals (Sweden)

    Salaberria Lizarazu, Ramón

    2010-12-01

    Full Text Available El presente artículo quiere centrarse en la actividad bibliotecaria de Teresa Andrés Zamora (1907-1946 durante el tiempo que transcurre entre la sublevación militar de julio de 1936 y el segundo semestre de 1938, en que se desmantela la Sección de Bibliotecas del Consejo Central de Archivos, Bibliotecas y Tesoro Artístico. En ese período Teresa Andrés va a ejercer como responsable de bibliotecas de Cultura Popular y toma parte destacada en la Comisión Gestora del Cuerpo Facultativo de Archivos, Bibliotecas y Museos y en la Sección de Bibliotecas del Consejo Central de Archivos, Bibliotecas y Tesoro Artístico.

  11. Time and times in the work of Saint Teresa of Avila: a narratological approach

    Directory of Open Access Journals (Sweden)

    Tomaž Šmid

    2012-12-01

    Full Text Available Time as a narrative category arises from the temporary status of any narrative by which the narrative language is oriented towards processes that are based on temporality. Time thus becomes one of the fundamental aspects of any narrative. Although the style of Teresa’s texts is characterised by the tone of oral conversation, this does not exclude her concern with the form and organisation of her writings. Our main concern is time from two different perspectives; on the one hand, as a component of the story and on the other, as its manifestation on the level of discourse. First, we analyse the relationships and the discrepancies in the works of St. Teresa of Avila between the discourse time and the story time, using three parameters: order, duration and frequency (Genette, 1972. Secondly, we examine different kinds of narration in the works of Saint Teresa to establish whether the majority of them are subsequent (ulterior, prior (anterior, simultaneous or interpolated (intercalated. Contrasting story time and discourse time in the works of Saint Teresa, we note the agility of her literary style and her ability to organize narrative syntax.

  12. Hooglied, liggaam en die mistikus, Sint Teresa van Avila (1515–1582

    Directory of Open Access Journals (Sweden)

    H. Viviers

    2002-11-01

    Full Text Available Song of Songs, body and the mystic, St Teresa of Avila (1515 – 1582In this article the interaction between an allegorical (tropological understanding of the Song of Songs, the body and the internalized societal values of the sixteenth century Spanish mystic, St Teresa of Avila will be highlighted. Our bodies are central in our symbolizing activities and this confirms that we are (animated bodies. St Teresa cannot escape her body, not even in the elevated spiritual state of the unio mystica, utilizing the words of love in the Song to voice the soul’s glowing love for Christ. The body’s “voice” is always present, in spite of her societal dualistic values of prioritising the spirit at the expense of the body and it even subtly enhances self-realisation. The repressed body always returns. The “text” of the body onto which is “written” societal values becomes an important source of exposing a society’s hidden ideologies.

  13. Temporal and Location Based RFID Event Data Management and Processing

    Science.gov (United States)

    Wang, Fusheng; Liu, Peiya

    Advance of sensor and RFID technology provides significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management. RFID data are temporal and history oriented, multi-dimensional, and carrying implicit semantics. Moreover, RFID applications are heterogeneous. RFID data management or data warehouse systems need to support generic and expressive data modeling for tracking and monitoring physical objects, and provide automated data interpretation and processing. We develop a powerful temporal and location oriented data model for modeling and queryingRFID data, and a declarative event and rule based framework for automated complex RFID event processing. The approach is general and can be easily adapted for different RFID-enabled applications, thus significantly reduces the cost of RFID data integration.

  14. An Assessment of RFID Applications in Manufacturing Companies

    Directory of Open Access Journals (Sweden)

    Gładysz Bartłomiej

    2015-12-01

    Full Text Available The meaning of Cyber Physical Systems and an Internet of Things with indication of RFID position in those concepts was outlined. Research program related to assessment of RFID technology was presented. Author deducted on problems related to RFID implementations and RFID essentially for logistics of manufacturing companies. Research goals and problems were formulated. Tools, techniques, models and methods that could be utilized were proposed and discussed. Research was focused on design of a new method to support early decision making phases for RFID application in logistics of manufacturing companies. Author stated that literature and practice lacks of complex method to answer if RFID is strategically important for the company, which processes should be RFID-supported, how RFID-supported processes should be designed and if RFID-support is rational. Framework for assessment of RFID technology with illustrative example was discussed.

  15. Making the most of RFID in libraries

    CERN Document Server

    Palmer, Martin

    2009-01-01

    The advantage of radio frequency identification (RFID) over other technologies used in libraries is usually seen to be its ability to combine the functions of the barcode and the security tag, but with the added advantage of not needing line of sight. This book considers the benefits of installing RFID technology; and work with vendors.

  16. RFID biedt ook perspectief voor laanbomen

    NARCIS (Netherlands)

    Baltissen, A.H.M.C.; Sluis, van der B.J.

    2011-01-01

    Binnenkort zijn CC-karren elektronisch te registreren met RFID (Radio Frequency Identification) en deze technologie biedt ook mogelijkheden voor de laanbomenketen. Uit onderzoek door PPO blijkt dat zowel de kweker als de klant voordeel kan behalen met RFID. Er zijn echter nog veel praktische vragen

  17. RFID Technologies : emerging issues and challenges

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2007-01-01

    In this paper we will present the results of a technology and policy assessment we have performed on emerging issues and policy challenges of RFID technologies. RFID is a basic component of the future internet of things. A balanced view on opportunities and threats, on drivers and barriers is needed

  18. RFID in Retail: New approaches, new viewpoints

    NARCIS (Netherlands)

    Jan Kroon; Christian Vrijlandt; Sander de Ridder; drs. Frans van den Reep

    2008-01-01

    RFID technology is a promising technology currently finding its way into the field of customer interaction strategy, supply chain accuracy and inventory management. Primarily, RFID tags are seen as substitutes of traditional barcodes, yet they can add a lot of value and functionality. Where barcodes

  19. Optimalization of selected RFID systems Parameters

    Directory of Open Access Journals (Sweden)

    Peter Vestenicky

    2004-01-01

    Full Text Available This paper describes procedure for maximization of RFID transponder read range. This is done by optimalization of magnetics field intensity at transponder place and by optimalization of antenna and transponder coils coupling factor. Results of this paper can be used for RFID with inductive loop, i.e. system working in near electromagnetic field.

  20. Smart Idlers: RFID in conveyor belt monitoring

    NARCIS (Netherlands)

    Pang, Y.

    2012-01-01

    Radio Frequency Identifi cation (RFID) is a technology that offers unique identifi cation of objects and processes. It can actively or passively communicate and, in combination with sensors, it can capture more detailed physical information. RFID technology has been integrated into our daily life.

  1. Orientation Sensing Using Multiple Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    Knowing the inclination of an object can be valuable information in a supply chain application, e.g. when handling orientation sensitive objects. In this work we present a method for sensing the inclination using Radio Frequency IDentification (RFID) technology. The method requires standard RFID...

  2. RFID biedt ook perspectief voor laanbomen

    NARCIS (Netherlands)

    Baltissen, A.H.M.C.; Sluis, van der B.J.

    2011-01-01

    Binnenkort zijn CC-karren elektronisch te registreren met RFID (Radio Frequency Identification) en deze technologie biedt ook mogelijkheden voor de laanbomenketen. Uit onderzoek door PPO blijkt dat zowel de kweker als de klant voordeel kan behalen met RFID. Er zijn echter nog veel praktische vragen

  3. Smart Idlers: RFID in conveyor belt monitoring

    NARCIS (Netherlands)

    Pang, Y.

    2012-01-01

    Radio Frequency Identifi cation (RFID) is a technology that offers unique identifi cation of objects and processes. It can actively or passively communicate and, in combination with sensors, it can capture more detailed physical information. RFID technology has been integrated into our daily life.

  4. RFID Technologies : emerging issues and challenges

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2007-01-01

    In this paper we will present the results of a technology and policy assessment we have performed on emerging issues and policy challenges of RFID technologies. RFID is a basic component of the future internet of things. A balanced view on opportunities and threats, on drivers and barriers is needed

  5. RFID in Retail: New approaches, new viewpoints

    NARCIS (Netherlands)

    Kroon, Jan; Ridder, Sander de; Reep, Frans van der; Vrijlandt, Christian

    2008-01-01

    RFID technology is a promising technology currently finding its way into the field of customer interaction strategy, supply chain accuracy and inventory management. Primarily, RFID tags are seen as substitutes of traditional barcodes, yet they can add a lot of value and functionality. Where barcodes

  6. RFID Application in Global Container Transportation

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    This article introduces the problems of container transportation, then analyzes the RFID application in container transportation management. It gives some suggestions to improve the trade actuality, ensure the trade security and promote the efficiency of logistics. Although there are some limitations to generalize this technology, the cheap standardized RFID system will serve global ports with the development of the information technology.

  7. Symmetric Encryption Based Privacy using Lightweight Cryptography for RFID Tags

    OpenAIRE

    2015-01-01

    RFID technology emerged as the promising technology for its ease of use and implementation in the ubiquitous computing world. RFID is deployed widely in various applications that use automatic identification and processing for information retrieval. The primary components of an RFID system are the RFID tag (active and passive), the reader and the back-end server (database). Cost is the main factor that drove RFID tags to its immense utilization in which passive tags dominate in...

  8. RFID Applications: An Introductory and Exploratory Study

    CERN Document Server

    Ahsan, Kamran; Kingston, Paul

    2010-01-01

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes, and enhanced customer care, overall improvements in business operations and healthcare. Our research is part of a big project; its aim is to produce a model for mobile technology implementation of hospital patients' movement process. However, the focus of this paper is to explore the main RFID components, i.e. the tag, antenna and reader. The results of the investigations conducted on the three RFID components will be used to develop our research model.

  9. RFID reader immunity test against electrostatic discharge

    Directory of Open Access Journals (Sweden)

    Pospisilik Martin

    2016-01-01

    Full Text Available This paper provides a description of an immunity test against the electrostatic discharge according to the standard EN 61000-4-2 that was applied to an RFID reader. The RFID reader was primarily developed for access systems, employing the on-board recognition of the RFID tags. The results obtained by the test are described hereby as well as the discussion on the security of this solution. The results of this experiment are beneficial for the developers of RFID devices, as these devices are endangered by the electrostatic discharge brought by their users. The hereby described results also shown a security hole in a simple access system based on the RFID technology. Details can be found in the paper.

  10. RFID Data Cleaning for Shop Floor Applications

    Science.gov (United States)

    Ziekow, Holger; Ivantysynova, Lenka; Günter, Oliver

    In several case studies we found that shop-floor applications in manufacturing pose special challenges to cleaning RFID data. The underlying problem in many scenarios is the uncertainty about the exact location of observed RFID tags. Simple filter s provided in common middleware solutions do not cope well with these challenges. Therefore we have developed an approach based on maximum-likelihood estimation to infer a tag's location within the reader range. This enables improved RFID data cleaning in a number of application scenarios. We stress the benefits of our approach along exemplary application scenarios that we found in manufacturing. In simulations and experiments with real world data we show that our approach outperforms existing solutions. Our approach can extend RFID middleware or reader firmware, to improve the use of RFID in a range of shop-floor applications.

  11. KUNCI PINTU OTOMATIS MENGGUNAKAN APLIKASI RFID CARD

    Directory of Open Access Journals (Sweden)

    Dewa Made Wiharta

    2009-05-01

    Full Text Available Aplikasi Radio Frequency Identification (RFID banyak dikembangkan dewasa ini. Salah satu  aplikasi RFID yang dikembangkan disini adalah sebagai kunci pintu otomatis. RFID Reader digunakan untuk membaca ID yang terdapat pada kartu EM4100. Reader bekerja pada level tegangan 5V DC dengan frekuensi 125 KHz. Koneksi RFID Reader menggunakan media udara (wireless. Saat RFID tag didekatkan pada Reader maka reader akan membaca ID yang terdapat pada kartu. Output Reader merupakan input pada microcontroller AT89C51. Format data keluaran yang digunakan adalah ABA Track2 10 Desimal. Input data dari RFID  Reader akan dibaca, disimpan, dan dibandingkan. Output dari microcontroller dihubungkan pada transistor PNP 9012 yang digunakan sebagai saklar dan  terhubung dengan relay untuk menggerakkan kunci. Keadaan awal relay dan transistor adalah normally close dan cut-off, dan bekerja secara flip – flop sesuai dengan input dari microcontroller.

  12. A Amazônia e a floresta, de Teresa Isenburg L’Amazonie et la forêt, par Teresa Isenburg The Amazon and the forest, by Teresa Isenburg

    Directory of Open Access Journals (Sweden)

    Andrea Cavicchioli

    2012-11-01

    Full Text Available Essa leitura do novo livro, em italiano, de Teresa Isenburg L’Amazzonia e la foresta (A Amazônia e a floresta pode começar pela reprodução de um dos muitos e preciosos comentários contidos em notas de rodapé. Na página 72, está dito:Frigoríficos [em português no original] – Desconheço a palavra italiana equivalente para definir esse segmento da linha de produção da carne que gerencia a passagem do criador ao vendedor para o consumo e que incorpora na denominação portuguesa, parecida com a es...

  13. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  14. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  15. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  16. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  17. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  18. Research of RFID middleware model with CEP based on SOA

    Science.gov (United States)

    Wang, Zhao; Ma, Zhifeng

    2012-01-01

    RFID middleware is regarded as the nerve of RFID systems. Firstly this paper analysis and discuss relatively mature RFID middleware, and propose a RFID middleware which based on service-oriented architecture. Then in this paper we introduce the CEP (complex event processing), and it is a new technology for event and data processing. With the widespread usage of RFID technology, complex event processing becomes a very important part in RFID application. Through introducing its work, we indicate the basis of introducing CEP to RFID middleware. We focus on the complex event processing technology in RFID data processing, and present a based on CEP data processing model, and study cache, Event Filter and Complex Event Builder key technologies. Moreover, a query language for detecting RFID complex events is also introduced.

  19. Design and development of RFID and RFID-enabled sensors on flexible low cost substrates

    CERN Document Server

    Yang, Li

    2009-01-01

    This book presents a step-by-step discussion of the design and development of radio frequency identification (RFID) and RFID-enabled sensors on flexible low cost substrates for UHF frequency bands. Various examples of fully function building blocks (design and fabrication of antennas, integration with ICs and microcontrollers, power sources, as well as inkjet-printing techniques) demonstrate the revolutionary effect of this approach in low cost RFID and RFID-enabled sensors fields. This approach could be easily extended to other microwave and wireless applications as well. The first chapter de

  20. Santa and the Moon

    NARCIS (Netherlands)

    Barthel, P.

    2012-01-01

    This article reflects on the use of illustrations of the Moon in images of Santa Claus, on Christmas gift-wrapping paper and in children's books, in two countries which have been important in shaping the image of Santa Claus and his predecessor Sinterklaas: the USA and the Netherlands. The appearanc

  1. Santa and the Moon

    NARCIS (Netherlands)

    Barthel, P.

    This article reflects on the use of illustrations of the Moon in images of Santa Claus, on Christmas gift-wrapping paper and in children's books, in two countries which have been important in shaping the image of Santa Claus and his predecessor Sinterklaas: the USA and the Netherlands. The

  2. RFID for libraries a practical guide

    CERN Document Server

    Pandian, M

    2010-01-01

    Many modern technologies give the impression that they somehow work by magic, particularly when they operate automatically and their mechanisms are invisible. A technology called RFID (Radio Frequency Identification), which is relatively new, has exactly this characteristic. Librarians everywhere are closely watching RFID technology. Advances over using bar codes on library materials, RFID tags are being touted as a way to radically redesign how library materials are handled. But it is expensive. The tags are vulnerable to wear and tear and the technology is not fully developed. It's unclear w

  3. USING OF RFID TECHNOLOGY IN MAINTENANCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Michal Balog

    2015-06-01

    Full Text Available Automated data collection helps to improve the precision of decision-making processes. Currently, the radio frequency identification technology belongs to the most common application in the field of identification technology. In the world, the implementation of RFID technology is used in almost all areas of industry. RFID tags allow to use of the different products and materials applications. The article provides an overview of using this technology to record and register maintenance intervals of railway wagons. The application of RFID technology helps to avoid huge disasters and accidents caused by lack of information about the technical state of rail freight wagons.

  4. Privacy in rfid and mobile objects

    OpenAIRE

    Trujillo Rasúa, Rolando

    2012-01-01

    Los sistemas RFID permiten la identificación rápida y automática de etiquetas RFID a través de un canal de comunicación inalámbrico. Dichas etiquetas son dispositivos con cierto poder de cómputo y capacidad de almacenamiento de información. Es por ello que los objetos que contienen una etiqueta RFID adherida permiten la lectura de una cantidad rica y variada de datos que los describen y caracterizan, por ejemplo, un código único de identificación, el nombre, el modelo o la fecha de expiraci...

  5. Applications of Radio Frequency Identification (RFID) in Mining Industries

    Science.gov (United States)

    Khairul Nizam Mahmad, Mohd; Z, Mohd Remy Rozainy M. A.; Baharun, Norlia

    2016-06-01

    RFID technology has recently become a dream of many companies or organizations because of its strategic potential in transforming mining operations. Now is the perfect time, for RFID technology arise as the next revolution in mining industries. This paper will review regarding the application of RFID in mining industries and access knowledge regarding RFID technology and overseen the opportunity of this technology to become an importance element in mining industries. The application of Radio-Frequency Identification (RFID) in mining industries includes to control of Personal Protective Equipment (PPE), control of personnel to access mining sites and RFID solutions for tracking explosives.

  6. RFID-tunnistus- ja seurantajärjestelmä

    OpenAIRE

    Österman, Pasi

    2011-01-01

    Tämän opinnäytetyön aiheena on RFID ohjelmistokehitys. RFID-opinnot ovat jo jonkin aikaa olleet osa Satakunnan ammattikorkeakoulun tarjoamaa opetusta. Opetuksessa syntyi tarve käytännölliselle RFID-sovellukselle. Tämän opinnäytetyön tarkoituksena oli tutkia RFID-tekniikkaa ja yleisiä käyttökohteita, sekä tuottaa koulun tarpeita vastaava RFID-sovellus. RFID-seuranta- ja tunnistusjärjestelmä osoittautui opetuksen kannalta parhaimmaksi vaihtoehdoksi. Ohjelma suunniteltiin käyttämään kolmen ta...

  7. Teresa Andrés y la organización Cultura Popular: una propuesta de coordinación bibliotecaria (1936-1938

    Directory of Open Access Journals (Sweden)

    Seguí i Francés, Romà

    2011-12-01

    Full Text Available Teresa Andrés Zamora es conocida por su actividad al frente de la Sección de Bibliotecas de Cultura Popular. Este trabajo describe las relaciones que se establecieron entre Teresa Andrés y Cultura Popular, tras hacerse cargo de las responsabilidades del Ministerio de Instrucción Pública.

  8. ¿Herederas de un Nuevo Olimpo? : política e imagen en el escenario de las cortes de María Teresa y Margarita Teresa de Austria

    OpenAIRE

    Martínez Albero, Miquel

    2015-01-01

    Trabajo de final de máster del Máster en EEAA en Historia del Arte Español, sobre la importancia de la moda y el espectáculo a la hora de crear una imagen con fines políticos. El trabajo se constituye como un torneo figurado entre la Reina de Francia, María Teresa de Austria, y su medio hermana, Margarita Teresa, Emperatriz del Sacro Imperio, por la herencia de la monarquía hispánica en caso de un repentino fallecimiento de Carlos II.

  9. Country western singer Teresa entertains at the Apollo/Saturn V Center

    Science.gov (United States)

    1999-01-01

    At the Apollo/Saturn V Center, country music recording artist Teresa performs a song, 'Brave New Girls,' written for astronaut Catherine 'Cady' Coleman, mission specialist on STS-93. She entertains participants and attendees of a women's forum held in the center. The attendees are planning to view the launch of STS- 93 at the Banana Creek viewing sight. Much attention has been generated over the launch due to Commander Eileen M. Collins, the first woman to serve as commander of a Shuttle mission. Liftoff is scheduled for July 20 at 12:36 a.m. EDT.

  10. GNSS/RFID Active Transponder Design

    Directory of Open Access Journals (Sweden)

    Lukas Vojtech

    2015-01-01

    Full Text Available The paper describes a design of global navigation satellite system (GNSS/Radio frequency identification (RFID active transponder which is primarily designed for localization of objects as a part of localization system designated for efficient handling of situations with mass casualties. The precise localization is improved by differential GNSS. The block diagram of such GNSS/RFID active transponder is described including main operation procedures of the firmware. Measurement of the localization by algorithms of RTKLIB library and by algorithms of GNSS module is compared. Dynamic tests, i.e. GNSS/RFID active transponder placed in the moving car (50~kmph, and static tests, i.e. GNSS/RFID active transponder placed in the position for 15~min, are performed.

  11. Research on RFID Applications in Construction Industry

    Directory of Open Access Journals (Sweden)

    Chengshuang Sun

    2013-05-01

    Full Text Available As its relatively large storage capacity and the ability of identifying and tracking materials and equipment in real-time without any direct contact or line-of-sight compared to traditional bar codes, Radio frequency identification (RFID technology has been more and more adopted in many sectors and identified as one of the ten greatest contributory technologies of 21st century. To systematically shed light on potential applications of RFID for uninitiated readers, this paper first presents the principle and the brief history of RFID technology. Then the paper summarizes the RFID’s technical features which enable its popularity in industry. Finally, applications examples in construction industry are presented for highlighting its enabling employment. It is hoped that this paper will give a useful implications for RFID researchers and practitioners and provide a roadmap to guide future research.

  12. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2014-06-01

    Full Text Available In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for traceability applications made with rewritable passive RFID tags. This paper aims to examine how RFID technology can be useful for traceability applications and will submit a diligent search regarding the degree of knowledge of RFID technology and the acceptance of an empirical model by the employees of Romanian companies.

  13. Chipless RFID design procedure and detection techniques

    CERN Document Server

    Rezaiesarlak, Reza

    2015-01-01

    This book examines the design of chipless RFID systems. The authors begin with the historical development of wireless identification systems and finally arrive at a representation of the chipless RFID system as a block diagram illustration. Chapter 2 is devoted to the theoretical bases for the design of chipless RFID tags and detection techniques in the reader. A rigorous mathematical formulation is presented based on the singularity expansion method (SEM) and characteristic mode theory (CMT) in order to study the scattered fields from an object in a general form. Th e authors attempt to explain some physical concepts behind the mathematical descriptions of the theories in this chapter. In Chapter 3, two design procedures based on complex natural resonance and CMT are presented for the design of the chipless RFID tag. By studying the effects of structural parameters on radiation and resonant behaviors of the tag, some design conclusions are presented in this chapter. Chapter 4 is dedicated to the time-frequen...

  14. RFID Torque Sensing Tag System for Fasteners

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2016-01-01

    The present invention provides an RFID-based torque sensor that can be used to quickly monitor off the shelf fasteners including fasteners that are used in expensive satellites or other uses where fastener failure can be very costly. In one embodiment, an antenna, RFID ring and spring comprise a sensor tag that can be interrogated with an interrogation signal produced by an interrogator device. When sufficient torque is applied to the fastener, an RFID circuit is connected, and produces a radio frequency (RF) signal that can be read by the interrogator. In one embodiment, the RFID circuit does not transmit when the spring member is not compressed, thereby indicating insufficient tensioning of the fastener. The present invention offers the ability to remotely, quickly, and inexpensively verify that any number of fasteners are torqued properly upon initial installation. Where applicable, the present invention allows low cost monitoring over the life of the fastener.

  15. RFID Technology Based Attendance Management System

    Directory of Open Access Journals (Sweden)

    Sumita Nainan

    2013-01-01

    Full Text Available RFID is a nascent technology, deeply rooted by its early developments in using radar as a harbinger of adversary planes during World War II. A plethora of industries have leveraged the benefits of RFID technology for enhancements in sectors like military, sports, security, airline, animal farms, healthcare and other areas. Industry specific key applications of this technology include vehicle tracking, automated inventory management, animal monitoring, secure store checkouts, supply chain management, automatic payment, sport timing technologies, etc. This paper introduces the distinctive components of RFID technology and focuses on its core competencies: scalability and security. It will be then supplemented by a detailed synopsis of an investigation conducted to test the feasibility and practicality of RFID technology.

  16. Optimization Techniques for RFID Complex Event Processing

    Institute of Scientific and Technical Information of China (English)

    Hai-Long Liu; Qun Chen; Zhan-Huai Li

    2009-01-01

    One research crucial to wider adoption of Radio Frequency Identification (RFID) technology is how to efficiently transform sequences of RFID readings into meaningful business events. Contrary to traditional events, RFID readings are usually of high volume and velocity, and have the attributes representing their reading objects, occurrence times and spots. Based on these characteristics and the TVon-deterministic Finite Automata (NFA) implementation framework, this paper studies the performance issues of RFID complex event processing and proposes corresponding optimization techniques. Our techniques include: (1) taking advantage of negation events or exclusiveness between events to prune intermediate results, thus reduces memory consumption; (2) with different selectivities of complex events, purposefully reordering the join operations between events to improve overall efficiency, achieve higher stream throughput; (3) utilizing the slot-based or B+-tree-based approach to optimizing the processing performance with the time window constraint. We present the analytical results of these techniques and validate their effectiveness through experiments.

  17. KNOWLEDGE AND ACCEPTANCE OF RFID TRACEABILITY SOLUTIONS

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2014-06-01

    Full Text Available In recent years the food market has become highly dynamic. Food crises in the early 90's, or those of the recent years, such as avian flu pandemic, swine flu, the cucumber or horse meat crises all had a negative impact on the Romanian food industry. Food deficiencies have led not only to contamination but also to the illness or death of some consumers. The products traceability is a prerequisite for success in the food industry. As a modern solution, RFID technology can be useful for traceability applications made with rewritable passive RFID tags. This paper aims to examine how RFID technology can be useful for traceability applications and will submit a diligent search regarding the degree of knowledge of RFID technology and the acceptance of an empirical model by the employees of Romanian companies.

  18. Efficient Complex Event Processing over RFID Streams

    OpenAIRE

    2012-01-01

    RFID events are a large volume of stream data that continuously come out for tracking and monitoring objects. Many studies have been done to detect a complex event in the RFID stream. However, the existing studies have many problems which increase unnecessary operations when complex events do not satisfy minimum conditions. In this paper, we propose a new scheme to detect complex events when the minimum conditions are satisfied to remove unnecessary operations. To check the minimum conditions...

  19. RFID UHF i HF w bibliotekach

    Directory of Open Access Journals (Sweden)

    Gładysz Bartłomiej

    2015-06-01

    Full Text Available The potential of the innovative Radio Frequency Identification (RFID technology to be applied for support, acceleration and automation of the circulation process of library collection is presented. Technology basics, and hardware and software components are described. Two different radio standards used in libraries are compared. The goal is to present the potential of RFID technology for libraries, to highlight the differences and to build a basis for further consideration of UHF and HF alternatives.

  20. Overlapping Zone Partitioning Localisation Technique for RFID

    OpenAIRE

    Kavi K. Khedo; Dassen Sathan; Roushdat Elaheebocus; Raja K. Subramanian; Soonil D.D.V. Rughooputh

    2010-01-01

    Basically used for contactless identification, Radio Frequency Identification (RFID) technology was originallythought as a complement for the drawbacks of the Barcode. Due to its capabilities and on-going drop in cost,researchers have started to look into other areas where RFID can be employed. One such area of research isReal-Time Location Tracking (RTLT), especially for indoor environments. While technologies such as Ultra-Sound, Infrared, WiFi, Bluetooth and GSM have been considered for in...

  1. Vehicle Traffic Congestion Estimation Based on RFID

    OpenAIRE

    Al-Naima, Fawzi M.; Hamd, Hassan A.

    2012-01-01

    Due to the proliferation in the number of vehicles on the road, traffic problems are bound to exist. Therefore, the use of Intelligent Transportation Systems (ITS) has become mandatory for obtaining traffic information from roads. Radio Frequency Identification (RFID) technology has been used to obtain vehicles’ IDs (tag ID) from RFID readers and to collect traffic information in real‐time. This paper proposes a simulation system for the Vehicle Traffic Congestion Estimation (VTCE) based on R...

  2. IR-UWB RFID Circuits and Systems

    OpenAIRE

    Lee, Kin Keung

    2014-01-01

    Radio-frequency identification (RFID) technology has been applied extensively in logistic and supply chain applications. Long-range passive RFID systems offer higher reliability and flexibility compared to conventional bar-code systems. However, limitations such as sensitivity to multipath fading and diffraction grating exist due to the narrowband technologies used. Also, industries show interest in embedding precise localization ability in such systems which is difficult to achieve using nar...

  3. Reverse Logistics: RFID the key to optimality

    Directory of Open Access Journals (Sweden)

    Rezwan Asif

    2011-07-01

    Full Text Available Purpose: The purpose of this paper is to find ways to reduce uncertainties in Reverse logistic supply chain (RLSC through the use of Radio-frequency identification (RFID technology.Design/methodology/approach: This paper reviews literature and builds model to relate RFID with uncertainties in order to optimize Reverse Logistics. Findings: RFID is really efficient to determine and detect quantity, variety and cycle times of returns; however it's not as convenient to determine quality of the returns. The collected information from RFID can be used to standardize the RLSC.Research limitations: Though it’s several and unique advantages some limitations of RFID have been identified in quality and processing sequence, collecting points and different standards, and in global usage.Originality/value: Previous studies in the area of Reverse Logistics and RFID don’t cover all impacts of this technology on RLSC. This review paper has investigated these impacts and offers a model for optimizing the Reverse Logistics Supply Chain.

  4. ENHANCING BUILDING SECURITY with RFID and ZIGBEE

    Directory of Open Access Journals (Sweden)

    Hemalatha.M

    2013-02-01

    Full Text Available ZigBee and RFID based monitoring, protection and security system is proposed in this paper. The smart node used in this system measures parameters like power, current, voltage and temperature. To prevent electrical fires and overloading, a threshold value is set at each outlet. The power and temperature parameters assessed by the smart node are transmitted to the base node through ZigBee. If the temperature exceeds or an overload occurs, a set of remote control instructions are executed in the PC. The base node instructs the smart node to cut off the power to the corresponding branch circuit. The entire operation can be monitored from a remote station. In this proposed system, RFID technique is added to provide a theft control mechanism. To prevent theft of valuables from an unauthorized person,RFID tags are used. RFID reader senses the RFID labels (master/slave tags continuously and sends the information to a PC through ZigBee protocol. The database is checked in PC with the received information. If there is any mismatch in the RFID tags, it is considered to be an illegal input and a warning message is generated at the PC. The database is checked for the owner of that particular item and a confirming message is send to that owner. To search for that item the owner can login WEB. The valuable will be stopped by the entrance guard.

  5. Delivering an Intelligent Foundation for RFID: Maximizing Network Efficiency with Cisco RFID Solutions

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Radio frequency identification (RFID) is one of today s most anticipated technologies for a broad range of enterprises. Based on the promise of lower operating costs combined with more accurate product and asset information, organizations .Rfrom manufacturers to government agencies, retailers to healthcare providers , Rare introducing RFID technologies in the supply chain, for asset tracking and management, and for security and regulatory purposes.

  6. Behavior-based cleaning for unreliable RFID data sets.

    Science.gov (United States)

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  7. RFID:A Beacon of Light in the Banking System

    Institute of Scientific and Technical Information of China (English)

    Elizabeth; Wasserman

    2009-01-01

    Although RFID won’t fix the mortgage problem,banks are investing in the technology to improve other business practices-a move they believe will pay off in dollars and sense. By RFID Journal,used with pemission

  8. Espacio, afecto y subjetividad femenina en Arboleda de los enfermos de Teresa de Cartagena

    Directory of Open Access Journals (Sweden)

    Juan E. Villegas-Restrepo

    2015-12-01

    Full Text Available Este trabajo analiza el tratado de consuelo espiritual Arboleda de los enfermos de Teresa de Cartagena (c. 1415-1420a partir del desglose dialéctico entre las dinámicas espaciales (textuales, públicas, privadas, simbólicas que figuran en el texto y las cogniciones afectivas que dichas dinámicas propician. De manera más específica, el trabajo muestra cómo esta cognición afectiva, aunada a una serie de estrategias lingüísticas, le permiten a su autora ensamblar todo un espacio retórico femenino dentro del rígido andamiaje patriarcal de la época y, con ello, forjarse nuevas y más complejas maneras de pensarse a sí misma como sujeto femenino. This work analyzes Teresa de Cartagena’s treatise on spiritual counseling Arboleda de los enfermos based on a dialectical breakdown between the spatial dynamics (be them textual, public, private or symbolic that appear in the text and the affective cognitions that said dynamics elicit. More specifically, the work shows how this affective cognition, when coupled with a series of linguistic strategies, allow its author to assemble a female rhetorical space amidst the rigid patriarchal framework of the time and, with it, to forge new and more complex ways of imagining herself as a female subject.

  9. Ni ofelias ni amazonas, sino seres completos: aproximación a Teresa de Escoriaza

    Directory of Open Access Journals (Sweden)

    Palenque, Marta

    2006-06-01

    Full Text Available Teresa de Escoriaza is one of the first foreign correspondent in the spanish journalism history and was a reporter in the Melilla war in 1921. She was an active defending counsel of women rights too. Also as a professor of Spanish in EE.UU. she was a pioneer. She lived in New York during a lot of years and around it wrote some articles and a novel: El crisol de las razas (1929. This essay research about her life and work as writer and professor.Teresa de Escoriaza es una de las primeras corresponsales en el extranjero de la historia del periodismo español y ejerció como reportera en la Guerra de África, en 1921. También fue una activa defensora de los derechos de la mujer. Su labor como pionera se observa, además, en su trabajo como profesora de español en los EE.UU. Vivió muchos años en Nueva York, ciudad en torno a la que escribió varias crónicas y una novela: El crisol de las razas (1929. Este ensayo investiga acerca de su biografía y su labor como escritora y docente.

  10. PENGADOPSIAN TEKNOLOGI RFID DI RUMAH SAKIT INDONESIA, MANFAAT DAN HAMBATANNYA

    Directory of Open Access Journals (Sweden)

    Iwan Vanany

    2009-01-01

    Full Text Available This paper explores the benefit and barriers of RFID (Radio Frequency Identification technology adoption in Indonesian hospitals context. The investigation methods of this research used interview and semi-structured questionnaire on RFID consultants, RFID researchers, and big hospital managers in Java Island. The benefits and barriers of RFID technology adoption are identified from literature review. The barriers of RFID technology adoption are divided into two aspects, i.e., as business and technology aspects. The results of this study suggest that the benefits of RFID technology adoption are dominated of intangible benefit. Most of the respondents believed that the main barriers of RFID technology adoption are (1 the complexity of RFID technology (2 the lack of complete and valid information, and (3 there is no sufficient budget available. The detail of the outcomes and the implications of this reasarch are also discussed. Abstract in Bahasa Indonesia: Makalah ini berupaya mengeksplorasi manfaat dan hambatan dari pengadopsian teknologi RFID (Radio Frequency Identification dalam konteks rumah sakit di Indonesia. Metode investigasi dari penelitian ini menggunakan wawancara dan kuesioner semi-struktur untuk konsultan, peneliti teknologi RFID dan manajer rumah sakit berkatagori besar di Pulau Jawa. Manfaat-manfaat dan hambatan-hambatan dari pengadopsian teknologi RFID telah diidentifikasi dari studi literatur. Hambatan dari pengadopsian teknologi RFID dibagi menjadi dua (2 aspek yaitu hambatan dari aspek bisnis dan teknologi. Temuan dari studi ini meyakini bahwa manfaat dari pengadopsian teknologi RFID didominasi oleh manfaat yang bersifat intangible. Sebagian besar responden meyakini bahwa hambatan utama dari pengadopsian teknologi RFID adalah: (1 kompleksnya teknologi RFID, (2 ketiadaan informasi yang lengkap dan valid, (3 tidak tersedianya anggaran yang cukup. Detail dari hasil studi dan implikasinya akan didiskusikan selanjutnya. Kata kunci

  11. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability.......This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  12. Long Reach RFID-over-Fiber Distribution and Collection Network

    DEFF Research Database (Denmark)

    Madsen, Peter; Suhr, Lau Frejstrup; Vegas Olmos, Juan José

    This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability.......This paper presents an RFID-over-Fiber wireless track and trace system using active RFID tags. This paper demonstrates a system, operating over distances up to 30km of optical fiber and 50m of wireless readability....

  13. Effects of RFID Technology on the Logistics Innovation

    OpenAIRE

    金, 双鴿; Shuangge, JIN

    2010-01-01

    An advanced automatic identification technology based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. RFID tag is a microchip combined with an antenna in a compact package and is called also IC tag. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies. This paper aims to analyse the effects of RFID technology on the logistics innovation.

  14. Development of Wireless RFID Glove for Various Applications

    Science.gov (United States)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  15. Analisis Semiotika Terhadap Puisi Rabi’atul Adawiyah dan Kalimat Suci Mother Teresa

    Directory of Open Access Journals (Sweden)

    Betty Mauli Rosa Bustam

    2014-12-01

    Full Text Available AbstractLove of God is a doctrine that’s very popular either in Sufism or the Catholic Church. Women who believe in this doctrine tend to hand over all their life and their love to God, ignoring their worldly life along with the happiness. Love of God is the highest stage in the spiritual way of Sufism, and also of the Catholic’s. Love of God is a loyalty vow that could not be fulfilled except by some one who sincerely leaves his/her personal life in order to become the attendant of God.In the Sufism circle, Rabi’ah al-Adawiyah was the first woman who introduced this doctrine and Mother Teresa was one of the Catholic women who succeeded in her life showing the holy love to God. By using the theories of semiotic, this writing revealed the deep meanings of Adawiyah’s poetries and Teresa’s utterences which were impossible for them to be be understood normally. The interpretation could be carried out firstly by knowing the life of the two women throughlibrary research, and continued then by knowing the character both women. The results of this research reveals both women chose God as the only purpose of life, although they have differentimplementations. Rabi’ah expressed her love through her personal spirituality and otherwiseTeresa through social attitudes.Keywords: love of god, sufism, chatolic, semiotic AbstrakCinta terhadap Tuhan adalah sebuah doktrin yang sangat populer di kalangan kaum sufi dan gereja Katolik. Perempuan yang meyakini doktrin ini cenderung menyerahkan seluruh hidup dan cintanya pada Tuhan hingga mengabaikan kehidupan duniawi berikut kesenangan yang menyertainya. Cinta pada Tuhan adalah tingkatan tertinggi di dalam perjalanan spiritual seorang sufi, begitu pula pada penganut Katolik Cinta pada Tuhan adalah sebuah kaul kesetiaan yang tidak dapat dipenuhi kecuali oleh seseorang yang dengan ikhlas meninggalkan kehidupan pribadinya demi menjadi pelayan Tuhan. Di kalangan sufi, perempuan pertama

  16. Més enllà de l'ID en RFID: noves aplicacions de la tecnologia RFID

    OpenAIRE

    Armengol Urpí, Alexandre

    2016-01-01

    Radio Frequency Identification (RFID) is a technology that uses radio waves to read and capture information stored in a tag attached to an object or location. In this work, we further exploit this technology to find other applications that differ from its classic one and show how powerful RFID can become in the near future. We present three novel ways of taking advantage of RFID technology that go beyond object identification: an RFID-based anti-counterfeiting architecture for electronic comp...

  17. Hanseníase, exclusão e preconceito: histórias de vida de mulheres em Santa Catarina Hansen's disease, exclusion and prejudice: life histories of women at Santa Catarina State

    Directory of Open Access Journals (Sweden)

    Patrícia Vieira Martins

    2010-06-01

    Full Text Available Este artigo consta de notas históricas sobre a hanseníase, desde a descoberta do bacilo até o tratamento realizado nos dias atuais. Busca analisar a percepção de algumas mulheres, ex-pacientes de hanseníase, moradoras do Hospital Santa Teresa, localizado em São Pedro de Alcântara, Santa Catarina, sobre o estigma, preconceito e exclusão que elas sofreram e ainda sofrem nos dias atuais. Utilizamos a história oral de três mulheres para a realização dessa pesquisa e constatamos como a consequência deste tratamento "excludente" ao longo dos anos construiu um certo repúdio em torno da doença. A busca e a afirmação da identidade do sujeito estigmatizado tornou-se uma constante. O modelo de aceitação social almejado e o fato de ser reconhecido como diferente e não discriminado é a grande questão.This article describes historical notes about leprosy, from the discovery of the bacillus to the treatment done today. In this text we try to analyze the perception of some women, former leprosy patients, residents of Santa Teresa Hospital, located in the city of São Pedro de Alcântara, Santa Catarina State, on the stigma, prejudice and exclusion they suffered and still suffer today. We used the oral history of three women for research purposes and we found as a result of this "excluding" treatment over the years, that it built some kind of rejection about the disease. The search and affirmation of the identity of the stigmatized subject has become a constant. The model of social acceptance and the fact of being recognized as different and not discriminated is the main issue.

  18. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  19. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    Science.gov (United States)

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  20. An approach for removing redundant data from RFID data streams.

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches.

  1. An Approach for Removing Redundant Data from RFID Data Streams

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  2. The Value of RFID Benefits vs Costs

    CERN Document Server

    2013-01-01

    RFID technology presents a great potential for creating competitive advantage. By automating and simplifying data collection, it lets users more accurately track assets and monitor key indicators, which in turn gives greater visibility to the operations. However, the benefits received from this technology will be determined by how well it is integrated with the business processes and overall information flow. Because of the fact that the decision to deploy RFID technology in an enterprise is a business decision instead of a technology decision, cost-benefit analysis is a key component of this decision. If an RFID deployment cannot be justified in terms of its economic value to the company, it is not likely to help the company; and consequently, it is not likely to remain a viable deployment over the long term.   The Value of RFID describes the business value of RFID and explains the costs and benefits of this technology comprehensively. Different investment evaluation models are proposed to use in various ap...

  3. Enhanced UHF RFID tags for drug tracing.

    Science.gov (United States)

    Catarinucci, Luca; Colella, Riccardo; De Blasi, Mario; Patrono, Luigi; Tarricone, Luciano

    2012-12-01

    Radio Frequency Identification (RFID) technology is playing a crucial role for item-level tracing systems in healthcare scenarios. The pharmaceutical supply chain is a fascinating application context, where RFID can guarantee transparency in the drug flow, supporting both suppliers and consumers against the growing counterfeiting problem. In such a context, the choice of the most adequate RFID tag, in terms of shape, frequency, size and reading range, is crucial. The potential presence of items containing materials hostile to the electromagnetic propagation exasperates the problem. In addition, the peculiarities of the different RFID-based checkpoints make even more stringent the requirements for the tag. In this work, the performance of several commercial UHF RFID tags in each step of the pharmaceutical supply chain has been evaluated, confirming the expected criticality. On such basis, a guideline for the electromagnetic design of new high-performance tags capable to overcome such criticalities has been defined. Finally, driven by such guidelines, a new enhanced tag has been designed, realized and tested. Due to patent pending issues, the antenna shape is not shown. Nevertheless, the optimal obtained results do not lose their validity. Indeed, on the one hand they demonstrate that high performance item level tracing systems can actually be implemented also in critical operating conditions. On the other hand, they encourage the tag designer to follow the identified guidelines so to realize enhanced UHF tags.

  4. An RFID Based Smart Feeder for Hummingbirds.

    Science.gov (United States)

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  5. Thoracoscopic surgery support system using passive RFID marker.

    Science.gov (United States)

    Takahata, Hiromi; Kojima, Fumitsugu; Okada, Minoru; Sugiura, Tadao; Sato, Toshihiko; Oshiro, Osamu

    2012-01-01

    This paper proposes a RFID based thoracoscopic surgery support system, which is capable of marking a tumor inside organ tissue. The marker composed of small RFID-tags is implanted in the vicinity of tumor found in the endoscopy test. In the thoracoscopic surgery operation for removing the tumor, an RFID detector determines the accurate position of the implanted RFID-tag markers by measuring the strength of the signal emitted from the target tag. Due to limitation in the size of RFID-tag, the proposed system employs a passive RFID. To activate the passive tag implanted in the organ tissue, this paper designs a saddle-shape efficient power supply antenna. A sensitive and frequency-selective receiver is then designed for detecting the weak signal from the tag. The feasibility test confirms that the proposed method is capable of determining the accurate location of RFID tags implanted in the patient's organ tissue.

  6. Study of Development for RFID System to Hospital Environment.

    Science.gov (United States)

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system.

  7. Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    CERN Document Server

    Ahmed, Eslam Gamal; Hashem, Mohamed; 10.5121/ijnsa.2010.2203

    2010-01-01

    Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low cost RFID tags, a number of challenges arise due to the extremely limited computational, storage and communication abilities of Low-cost RFID tags. This paper proposes a real mutual authentication protocol for low cost RFID tags. The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags. However the implementation of the protocol meets the limited abilities of low cost RFID tags.

  8. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    Science.gov (United States)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  9. La performance de maría teresa hincapié

    Directory of Open Access Journals (Sweden)

    Constanza Ramírez Molano

    2006-04-01

    Full Text Available En este artículo la autora da cuenta de la historia de María Teresa Hincapié, la maestra, la investigadora, la artista, la performer, la peregrina. La historia narra cómo comenzó en las tablas, cómo descubrió el arte a través de la investigación y la realización plástica y cómo terminó en la performance convencida de que su mejor propuesta artística es trabajar sobre su propia vida, propuesta que le ha merecido un gran reconocimiento nacional e internacional.

  10. Psychoanalysis, religion and enculturation: reflections through the life of mother Teresa.

    Science.gov (United States)

    Mahmood, Kaif

    2015-04-01

    This paper explores the question of whether psychoanalysis can help those who adhere to a worldview that is non-psychoanalytic or even anti-psychoanalytic. It answers this question by comparing the psychoanalytic understanding of suffering with that of the Catholic faith, through the latter's idea of the 'dark night of the soul'. The life of Mother Teresa is taken as an illustration of the dark night and how it may be responded to by the faithful. Similarities and differences between the two approaches are pointed out. Finally, it is suggested that psychoanalytic perspectives may enrich the inner lives of those living by a religious worldview, without necessarily diluting that worldview. Further, religious counsellors too may benefit from an understanding of psychoanalytic perspectives.

  11. A Forgotten Short Story by Maria Teresa León

    Directory of Open Access Journals (Sweden)

    Ángeles Ezama Gil

    2012-05-01

    Full Text Available A short story titled “En los tentáculos de los siglos” and signed by Isabel Inghirami, pseudonym with which Maria Teresa Leon published his first writings, it appeared in the pages of the Revista de la Raza, in February and March of 1925. This story is similar to these included in La bella del mar amor. Cuentos castellanos (1930, that depends on the literary and the artistic tradition, specially on the last. In this forgotten story, is evident the influence of the images provided by the painting and the photography in the decades of 1910’s and 1920’s, and the influence of the Exhibition of regional customes celebrated in April of 1925, too.

  12. Theocentrism in Edith Stein’s (St. Teresa Benedicta of the Cross’s Late Anthropology

    Directory of Open Access Journals (Sweden)

    Jadwiga Guerrero van der Meijden

    2014-09-01

    Full Text Available This article proposes the thesis that Edith Stein’s late anthropology has a theocentric orientation. The threefold structure of a human being consisting of a body, soul and spirit is examined in order to validate the thesis. First of all, the finitude of a human being points out to the eternal being and – consequently – human beings are not conceivable by themselves, without the context of God. Moreover, the hylomorphic union of the body and soul adopted from Aristotelian and Thomistic philosophy is enriched in Stein’s anthropology by the concept of spirit. This results in a threefold structure and is reason enough to suggest man’s iconic similarity to the Trinity. Furthermore, Stein takes over St. Teresa of Avila’s concept of an internal center of the soul, which can be a meeting point between a person and God. The analysis of the soul’s center supports the main thesis.

  13. Teresa Wright, Accepting Authoritarianism. State-society relations in China’s reform era

    OpenAIRE

    Friedman, Edward

    2012-01-01

    Teresa Wright soutient que toutes les classes socioéconomiques chinoises, aussi variées soient-elles, dépendent de l’État pour accomplir leurs objectifs et qu’elles ne sont, par conséquent, pas prêtes à s’opposer au régime actuel. Pour l’auteur, l’industrialisation tardive, le développement dirigé par l’État et l’héritage socialiste sont autant de facteurs qui contribuent à influencer l’opinion publique. Aussi la population « accepte »-t-elle le Parti communiste chinois. La perspective défend...

  14. DAMPAK RFID PADA STOK BARANG RETAILER

    Directory of Open Access Journals (Sweden)

    I Gusti Made Karmawan

    2012-05-01

    Full Text Available The development of RFID technology (Radio Frequency Identification offers some advantages, especially in goods distribution, supply chain and logistics. This technology works by putting a chip on an item as a replacement for barcodes that are widely used today. With the RFID technology, the process of goods identification becomes very easy and fast. Therefore, some large companies have started implementing and trust the system, especially the supermarket retailers although there are still some problems encountered in the application of this system, related to issues of privacy and data integrity problems. This paper discusses how RFID works and the impacts to the company related to profits and problems encountered during the application of this system.

  15. Energy Efficient Approach in RFID Network

    Science.gov (United States)

    Mahdin, Hairulnizam; Abawajy, Jemal; Salwani Yaacob, Siti

    2016-11-01

    Radio Frequency Identification (RFID) technology is among the key technology of Internet of Things (IOT). It is a sensor device that can monitor, identify, locate and tracking physical objects via its tag. The energy in RFID is commonly being used unwisely because they do repeated readings on the same tag as long it resides in the reader vicinity. Repeated readings are unnecessary because it only generate duplicate data that does not contain new information. The reading process need to be schedule accordingly to minimize the chances of repeated readings to save the energy. This will reduce operational cost and can prolong the tag's battery lifetime that cannot be replaced. In this paper, we propose an approach named SELECT to minimize energy spent during reading processes. Experiments conducted shows that proposed algorithm contribute towards significant energy savings in RFID compared to other approaches.

  16. Pharmaceutical counterfeiting and the RFID technology intervention.

    Science.gov (United States)

    Coustasse, Alberto; Arvidson, Cody; Rutsohn, Phil

    2010-07-01

    Both nationally and internationally, pharmaceutical counterfeiting has become a problem that is threatening economic stability and public health. The purpose of the present research study review was to analyze the scope and severity of pharmaceutical counterfeiting and to establish if the implantation of the Radio Frequency Identification Device (RFID) model can more efficiently be used within the pharmaceutical supply chain to reduce the problem counterfeit drugs impose on public health and international economic stability. Results indicated that implementing the RFID model for tracking drugs at the item level in the pharmaceutical supply chain has potential to alleviate the scope of the counterfeit drug problem. Recommendations for how the pharmaceutical industry may sooner adopt the RFID model are made.

  17. Dampak RFID pada Stok Barang Retailer

    Directory of Open Access Journals (Sweden)

    I Gusti Made Karmawan

    2012-06-01

    Full Text Available The development of RFID technology (Radio Frequency Identification offers some advantages, especially in goods distribution, supply chain and logistics. This technology works by putting a chip on an item as a replacement for barcodes that are widely used today. With the RFID technology, the process of goodsidentification becomes very easy and fast. Therefore, some large companies have started implementing and trust the system, especially the supermarket retailers although there are still some problems encountered in the application of this system, related to issues of privacy and data integrity problems. This paper discusses how RFID works and the impacts to the company related to profits and problems encountered during the application of this system.

  18. Semantic-Based RFID Data Management

    Science.gov (United States)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  19. Security aspects of RFID communication systems

    Science.gov (United States)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  20. Design and Implementation of Embedded RFID Middleware

    Science.gov (United States)

    Zhen-xiang, Li.; Yu-xiang, Zhang

    An embedded RFID (Radio Frequency Identification) middleware based on ARM Linux operating system and S3C2410 hardware platform was designed and implemented. The system architecture and platform of software and hardware of this middleware were introduced. The key technology applied in some device management and tag data processing and the application of SQLite were specialized. Since its rich standard interfaces offered by the hardware platform, the middleware can connect with different kind of readers from different manufacturers without cosidering the diversity and complexity of RFID bottom layer hardware. So, it can supply upper layer application of system with a powerful, uniform platform, and lay a broader, richer foundation for the application of RFID.

  1. Ilha de Santa Catarina

    OpenAIRE

    Nopes, Adriano

    2007-01-01

    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Filosofia E Ciências Humanas. Programa de Pós-Graduação em Sociologia Política Este trabalho tem como foco de análise o processo de modernização na Praia dos Ingleses, um bairro atual situado no extremo norte da Ilha de Santa Catarina. Como referencial teórico da modernidade, utilizamos pensadores contemporâneos como Berman, Giddens e Habermas; para estes autores a modernização é compreendida como um fenômeno comple...

  2. UHF RFID technologies for identification and traceability

    CERN Document Server

    Laheurte, Jean-Marc; Paret, Dominique; Loussert, Christophe

    2014-01-01

    UHF Radio Frequency Identification (RFID) is an electronic tagging technology that allows an object, place or person to be automatically identified at a distance without a direct line-of-sight using a radio wave exchange. Applications include inventory tracking, prescription medication tracking and authentication, secure automobile keys, and access control for secure facilities. This book begins with an overview of UHF RFID challenges describing the applications, markets, trades and basic technologies. It follows this by highlighting the main features distinguishing UHF (860MHz-960MHz) and HF

  3. RFID in libraries a step toward interoperability

    CERN Document Server

    Ayre, Lori Bowen

    2012-01-01

    The approval by The National Information Standards Organization (NISO) of a new standard for RFID in libraries is a big step toward interoperability among libraries and vendors. By following this set of practices and procedures, libraries can ensure that an RFID tag in one library can be used seamlessly by another, assuming both comply, even if they have different suppliers for tags, hardware, and software. In this issue of Library Technology Reports, Lori Bowen Ayre, an experienced implementer of automated materials handling systems, Provides background on the evolution of the standard

  4. Using Interference to Block RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag.......We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag....

  5. Nutzenoptimierter RFID-Einsatz in der Logistik

    OpenAIRE

    Richter, Markus

    2013-01-01

    Zugleich gedruckt veröffentlicht im Universitätsverlag der TU Berlin unter der ISBN 978-3-7983-2523-4. Automatisierte Identifikationstechnologien spielen für effiziente logistische Prozesse eine entscheidende Rolle. Der Begriff "RFID" steht für eine innovative Auto-ID-Technologie, die aufgrund ihrer Leistungsmerkmale in der Logistik seit einigen Jahren für ein besonderes Interesse sorgt. Obwohl viele Entscheidungsträger in der Praxis gut über die technischen Fähigkeiten der RFID-Technologi...

  6. Using Interference to Block RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag.......We propose a novel method to block RFID tags from responding, using intentional interference. We focus on the experimental evaluation, where we impose interference on the download and uplink, respectively. The results are positive, where modulated CCI shows most effective to block a tag....

  7. Lightweight Cryptography for Passive RFID Tags

    DEFF Research Database (Denmark)

    David, Mathieu

    2012-01-01

    among the smallest in the published literature and aims at being implemented on printed electronics RFID tags. Then, we compare different cryptographic primitives based on their key parameters: throughput, area, power consumption and level of security. Our main concern is the integrability...... of an integrator for a particular application. Finally, we conclude that the research for finding robust cryptographic primitive in the branch of lightweight cryptography still has some nice days ahead, and that providing a secure cryptosystem for printed electronics RFID tags remains an open research topic....

  8. Bartolomé de las Casas en el siglo XIX: Fray Servando Teresa de Mier y Simón Bolívar

    OpenAIRE

    Barrera López, Trinidad

    2007-01-01

    El presente trabajo analiza el impacto de las ideas lascasianas en Fray Servando Teresa de Mier y su concepto de la independencia americana así como el eco bolivariano de la fama del sevillano. This article analyses the impact of La Casa’s ideas on Fray Servando Teresa de Mier and his concept of South American independence, along with the Bolivarian echo of the fame of the man from Seville.

  9. The Santa Ana Partnership

    Science.gov (United States)

    Cournoyer, David, Ed.

    2004-01-01

    One of the priority interests of the W.K. Kellogg Foundation is to connect the knowledge and resources of institutions with communities in order to improve the quality of life in community. Partnerships achieve uncommon results. In Santa Ana, California, an unusual partnership of public schools, community college, universities, community…

  10. Fauna del suelo en bosques y cafetales de la Sierra Nevada de Santa Marta, Colombia Soil fauna in forest and coffee plantations from the Sierra Nevada de Santa Marta, Colombia

    Directory of Open Access Journals (Sweden)

    Camero R. Edgar

    2002-11-01

    Full Text Available

    En la Sierra Nevada de Santa Marta se establecieron dos estaciones de muestreo en las localidades de Minca a 700 m de altitud y María Teresa a 790 m, para realizar comparaciones de la fauna asociada a los suelos de plantaciones de café y de bosques naturales. Las colecciones se realizaron tanto en la hojarasca como en los horizontes  subsuperficiales O, Ay B de las dos coberturas vegetales mediante el empleo de trampas Pitfall y Berlesse y se utilizaron índices de diversidad, abundancia relativa y frecuencia para comparar su composici6n biológica, la cual se determine a nivel de familia. Los resultados mostraron diferencias significativas, tanto en la composición como en la abundancia y frecuencia de los grupos colectados en los dos tipos de ecosistemas, así Como variaciones altitudinales significativas al comparar los resultados obtenidos en los bosques nativos con trabajos hechos en zonas de mayor altitud en este sistema montañoso.

    Two research stations (Minca, 700 m altitude and Marfa Teresa, 790 m altitude were established in the Sierra Nevada de Santa Marta in places to study the soil fauna associated with forest and coffee plantations. Soil fauna was collected using Pitfall and Berlesse traps. Samples were taken from litter as well as from horizons O, A and B. Individuals collected were identified to family level. Diversity, abundance and frequency indexes were used to compare fauna composition at both sites. Significant differences were found between the two research sites as well as with data from other high altitude forest in the Sierra Nevada de Santa Marta.

  11. Energy-balanced algorithm for RFID estimation

    Science.gov (United States)

    Zhao, Jumin; Wang, Fangyuan; Li, Dengao; Yan, Lijuan

    2016-10-01

    RFID has been widely used in various commercial applications, ranging from inventory control, supply chain management to object tracking. It is necessary for us to estimate the number of RFID tags deployed in a large area periodically and automatically. Most of the prior works use passive tags to estimate and focus on designing time-efficient algorithms that can estimate tens of thousands of tags in seconds. But for a RFID reader to access tags in a large area, active tags are likely to be used due to their longer operational ranges. But these tags use their own battery as energy supplier. Hence, conserving energy for active tags becomes critical. Some prior works have studied how to reduce energy expenditure of a RFID reader when it reads tags IDs. In this paper, we study how to reduce the amount of energy consumed by active tags during the process of estimating the number of tags in a system and make the energy every tag consumed balanced approximately. We design energy-balanced estimation algorithm that can achieve our goal we mentioned above.

  12. Studies on RFID Technology Making Progress

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    @@ Analyses and Testing of Radio Frequency Identifica tion (RFID) in Logistics,a research project carried out by researchers from the CAS Institute of Automation (IOA) with the support from the National High-tech Development Program (so called "863" Program), has passed the acceptance check recently.

  13. Radio Frequency Identification (RFID) in Space

    Science.gov (United States)

    Bacon, John B.

    2011-01-01

    The ISS has some significant inventory management challenges. RFID solves many of these, and was deployed 8/2011. Significant issues (some unique to spacecraft) remain. NASA is interested and investing in technologies that will help to overcome the remaining issues.

  14. Towards EPC-compatible organic RFID tags

    NARCIS (Netherlands)

    Myny, K.; Steudel, S.; Vicca, P.; Smout, S.; Beenhakkers, M.J.; Aerle, N.A.J.M. van; Furthner, F.; Putten, B. van der; Tripathi, A.K.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.L.

    2011-01-01

    In this chapter, fully integrated organic RFID tags are demonstrated. These tags are inductively-coupled at a base frequency of 13.56 MHz and can be read out at distances up to 10 cm, which is the expected readout distance for proximity readers. We also demonstrate next generation transponder chips,

  15. Synchronize Your Supply Chain with RFID

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    1 Executive Summary Driving efficiencies throughout your supply chain and increasing the velocity of items through the supply chain from creation to consumer is more than a business mandate today; it’s a matter of business survival. If your company doesn’t do it, your competition will. Radio Frequency Identification (RFID) is a true next-generation

  16. "Poner riquezas en mi entendimiento" sor Juana Inés de la Cruz y sor Teresa de Cartagena

    Directory of Open Access Journals (Sweden)

    Mª del Mar Cortés Timoner

    2004-01-01

    Full Text Available This article aims to show the resemblances that we can find between Admiraçión operum Dey written by Teresa de Cartagena in the mid-XVth century and Respuesta de sor Filotea de la Cruz written by sor Juana Inés de la Cruz two hundred years later. Both works are two epistles where the female´s intellectual capacity to know and to write is defended by a nun who was received critized for a former work. The religious Teresa de Cartagena –converse bishop Pablo Cartagena's granddaughter– wrote a moral essay that surprised male readers who considered that the text was a plagiarism. On the other hand, the hieronymite sister sor Juana Inés was reproached by a clergyman for having written the polemic treatise on theology Carta Atenagórica.

  17. An RFID Based Smart Feeder for Hummingbirds

    Directory of Open Access Journals (Sweden)

    Vicente Ibarra

    2015-12-01

    Full Text Available We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH by developing a Radio Frequency Identification (RFID based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird, the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  18. A Framework for RFID Survivability Requirement Analysis and Specification

    Science.gov (United States)

    Zuo, Yanjun; Pimple, Malvika; Lande, Suhas

    Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.

  19. RFID - based Staff Control System (SCS) in Kazakhstan

    Science.gov (United States)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  20. Assessment of RFID Read Accuracy for ISS Water Kit

    Science.gov (United States)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  1. The RFID-Based Manufacturing and Inventory Revolution

    Institute of Scientific and Technical Information of China (English)

    HAMIDULLHKhanNiazi; SUNHou-fang; RIAZAhmed; SHAHIDIkramullahButt

    2005-01-01

    Radio frequency identification (RFID) is a contactless form of automatic identification and data capture (AIDC) technology. This paper explores the use of RFID in the new field of manufacturing automation and quality control. This paper consists of five parts. The first part gives a brief background and introduction of technology. The proposed use of RFID technology in the field of manufacturing automation and quality control is discussed in second part. The third part covers its use in the field of warehouse management system. Part four is a local review and analysis of RFID technology in manufacturing and warehousing which would support the potential use of this technology locally at China. The last part of paper gives concluding remarks about the RFID technology with recommendations of RFID use in these areas.

  2. Internal Location Based System for Mobile Devices Using Passive RFID

    CERN Document Server

    Vhatkar, Kapil N

    2010-01-01

    We have explored our own innovative work about the design & development of internal location-identification system for mobile devices based on integration of RFID and wireless technology. The function of our system is based on strategically located passive RFID tags placed on objects around building which are identified using an RFID reader attached to a mobile device. The mobile device reads the RFID tag and through the wireless network, sends the request to the server. The server resolves the request and sends the desired location-based information back to the mobile device. We had addressed that we can go through the RFID technology for internal location identification (indoor), which provides us better location accuracy because of no contact between the tag and the reader, and the system requires no line of sight. In this paper we had also focused on the issues of RFID technologies i.e. Non-line-of-sight & High inventory speeds.

  3. The Application used RFID in Third Party Logistics*

    Science.gov (United States)

    Mingxiu, Zheng; Chunchang, Fu; Minggen, Yang

    RFID is a non-contact automatic identification technology, which will be the future information storage extraction and processing technology. In recent years the mainstream of the large-scale development has manifested the situation. RFID is the key technology of tripartite logistics information and automation. RFID-based logistics system can enlarge the logistics operation capacity, and improve labor productivity to reduce logistics operations mistakes.

  4. Low-cost inkjet antennas for RFID applications

    Science.gov (United States)

    Çiftçi, T.; Karaosmanoğlu, B.; Ergül, Ö.

    2016-03-01

    We present paper-based inkjet antennas that are fabricated by using silver-based cartridges in standard printers. In addition to their low costs, the produced antennas are flexible, environmentally friendly, and suitable for radio-frequency identification (RFID) applications. Among alternative choices, hybrid structures involving loop and parasitic meander parts are preferred and successfully combined with passive RFID chips. We also discuss main challenges in the design and fabrication of low-cost inkjet antennas and the related RFID tags.

  5. Application of PUF-Enabled RFID Tags in Electronic Banking

    Directory of Open Access Journals (Sweden)

    Saeed Mehmandoust

    2011-04-01

    Full Text Available Radio Frequency Identification (RFID tags have a variety of applications in e-banking. For effectiveutilization of the technology, this should be reinforced toward security holes and attacks. One of thecommon attacks on RFID systems is RFID tags cloning. In this paper we review cloning attacks in ebanking.We propose solutions based on physical unclonable functions (PUF and provide a suitablesecurity protocol for tag authentication in off-line environments.

  6. Santa and the moon

    CERN Document Server

    Barthel, Peter

    2011-01-01

    Happy end-of-the-year evening and night events provide good opportunities to explain the phases of the moon. The need for such moon phase education is once again demonstrated, through an investigation of illustrations on Santa Claus and Christmas gift wrap and in children's books, in two countries which have been important in shaping the image of Santa Claus and his predecessor Sinterklaas: The Netherlands and the USA. The moon on Halloween illustrations is also considered. The lack of knowledge concerning the physical origin of the moon phases, or lack of interest in understanding, is found to be widespread in The Netherlands but is also clearly present in the USA, and is quite possibly global. Definitely incomplete, but surely representative lists compiling both scientifically correct and scientifically incorrect gift wrap and children's books are also presented.

  7. 基于 RFID 的仓库管理系统研究%Warehouse Management System Based on RFID

    Institute of Scientific and Technical Information of China (English)

    王亚青; 凌翔; 白小波

    2015-01-01

    针对传统仓库管理和条形码仓库管理存在的问题,以 RFID 技术为核心,设计基于 RFID 的仓库管理系统。文中综合介绍了 RFID 仓库管理系统的系统架构,主要功能说明,以及关键操作,诸如入库、出库相关流程的设计。%The traditional warehouse management and warehouse management problems barcode to RFID technology as the core,designed RFID -based warehouse management system.Integrated system architecture introduces RFID warehouse management system,the main functional description,and critical operations,such as storage,a library related to process design.

  8. 24-Karat Protection: RFID and Retail Jewelry Marketing

    Directory of Open Access Journals (Sweden)

    David C. Wyld

    2010-01-01

    Full Text Available This article examines the unique value proposition presented by RFID (radio frequency identification forjewelry retailers’ inventory management. The article provides a general overview of RFID technology.The author then presents findings on its use in jewelry retailing to date by innovative companies aroundthe world. The research establishes that RFID-based inventory tracking is exceptionally well-suited to thejewelry industry due a variety of factors, including the values, origins, sizes and form factors of jewelryitems. Early adopting jewelry retailers have found that RFID-based inventory tracking can address theirneeds for better inventory management and control, heightened security, and improved businessintelligence.

  9. RFID and Auto-ID in planning and logistics

    CERN Document Server

    Jones, Erick C

    2011-01-01

    As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides

  10. Embedded RFID Recorder in short-range wireless devices

    DEFF Research Database (Denmark)

    2010-01-01

    range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...

  11. Systems, Apparatuses and Methods for Beamforming RFID Tags

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2017-01-01

    A radio frequency identification (RFID) system includes an RFID interrogator and an RFID tag having a plurality of information sources and a beamforming network. The tag receives electromagnetic radiation from the interrogator. The beamforming network directs the received electromagnetic radiation to a subset of the plurality of information sources. The RFID tag transmits a response to the received electromagnetic radiation, based on the subset of the plurality of information sources to which the received electromagnetic radiation was directed. Method and other embodiments are also disclosed.

  12. Embedded RFID Recorder in short-range wireless devices

    DEFF Research Database (Denmark)

    2010-01-01

    range communication devices. The problem is solved in that the portable communications device comprises a wireless communications interface for communicating with another device, a memory and an RFID-recorder for receiving an RFID-signal transmitted from an RFID-interrogator, wherein the device...... is adapted for storing individual received RFID-signals in the memory. An advantage of the invention is that it provides a relatively simple scheme for extracting information from a current environment of a portable communications device. The invention may e.g. be used for adapting listening devices, e...

  13. NISO RP-6 : RFID in U.S. libraries

    OpenAIRE

    National Information Standards Organization (Estados Unidos)

    2012-01-01

    El objetivo de esta recomendación es facilitar la interoperabilidad de sistemas o productos RFID trabajando con otros sistemas o productos RFID, sin un esfuerzo o intervención especial por parte del cliente de la cadena de distribución. La mayoría de los sistemas de RFID disponibles son propietarios lo que limita la potencia real de interoperabilidad. Este documento ofrece recomendaciones para implementar la aplicación de RFID en las bibliotecas de EE.UU. de forma que se promueva la inte...

  14. Analysis of Tobyhanna Army Depot’s Radio Frequency Identification (RFID) Pilot Program: RFID as an Asset Management Tool

    Science.gov (United States)

    2005-06-01

    Florian Lohff, Naree Tubpun, Lei Xu, and Zhisong Zhang, RFID in the Automotive Industry, Institut für Wirtschaftsinformatik Humboldt University Berlin...Xu, and Zhisong Zhang, RFID in the Automotive Industry, Institut für Wirtschaftsinformatik Humboldt University Berlin, July 2004, p. 7. 10 19 Dick... Wirtschaftsinformatik Humboldt University Berlin, July 2004. Buss, Dale. The Race to RFID. Chief Executive. New York: November 2004, Issue 203. Chase, Richard B

  15. RFID Reconsidered : what you need to know before investing in the latest self-check

    OpenAIRE

    Featherstone, Robin

    2006-01-01

    Radio Frequency Identification (RFID) Technology has the potential to revolutionize library services. However - not unlike the internet - RFID technology is evolving faster than the guidelines to guard against misuse. What effect will eventual RFID legislation have on North American libraries? Will potential benefits be overshadowed by security and privacy concerns? Is RFID technology a blessing or a curse?

  16. RFID Reconsidered : what you need to know before investing in the latest self-check

    OpenAIRE

    Featherstone, Robin

    2006-01-01

    Radio Frequency Identification (RFID) Technology has the potential to revolutionize library services. However - not unlike the internet - RFID technology is evolving faster than the guidelines to guard against misuse. What effect will eventual RFID legislation have on North American libraries? Will potential benefits be overshadowed by security and privacy concerns? Is RFID technology a blessing or a curse?

  17. Reliable Food Traceability Using RFID Tagging

    Science.gov (United States)

    Azuara, Guillermo; Salazar, José L.; Tornos, José L.; Piles, Joan J.

    Radio Frequency IDentification (RFID) technology has numerous potential applications in various industries. One important use is for complete traceability of a specific product with the added advantage of being able to verify that quality controls have been passed, with all the necessary steps complied with and for the time required. The aim of this work is to present a food traceability system using RFID tags with contents guaranteed secure by the use of public-key cryptography and at an affordable cost without the need for substantial investment in infrastructure. Aggregate signatures are used so that all the steps can be signed in a reduced memory space. This type of signature is a cryptographic primitive that "consolidates" several signatures into one in such a way that if n users sign n messages, all the signatures can be grouped into one single signature.

  18. Rfid Based Traceability System For Sheepbreeding

    Science.gov (United States)

    Xing, Yan; Li, Hui; Zhang, Jian; Fu, Zetian

    As China's meat production is growing, the quality safety of meat food as an important human food sources has increasingly become a major issue which related to the national economy and people's livelihood. Using early warning technique, tracking and tracing techniques and so on in the key link of meat food production in order to fulfill quality control is an important method which can effectively guarantee the food quality and safety. The use of RFID techniques and handhelds can automatically collect information about sheep breeding. Meanwhile this information could be inquired conveniently through Internet. This study uses C/S (Client/Server) model structure, and builds the sheep breeding traceability system based on RFID.

  19. RFID Key Establishment Against Active Adversaries

    CERN Document Server

    Bringer, Julien; Cohen, Gérard; Kindarji, Bruno

    2010-01-01

    We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity $(I)$-codes suggested by Cagalj et al. No preliminary key distribution is required.

  20. ISS Asset Tracking Using SAW RFID Technology

    Science.gov (United States)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  1. Degenerate RFID Channel Modeling for Positioning Applications

    Directory of Open Access Journals (Sweden)

    A. Povalac

    2012-12-01

    Full Text Available This paper introduces the theory of channel modeling for positioning applications in UHF RFID. It explains basic parameters for channel characterization from both the narrowband and wideband point of view. More details are given about ranging and direction finding. Finally, several positioning scenarios are analyzed with developed channel models. All the described models use a degenerate channel, i.e. combined signal propagation from the transmitter to the tag and from the tag to the receiver.

  2. Opportunities in Pharmaceutical RFID and Smart Packaging

    Institute of Scientific and Technical Information of China (English)

    Dr; Peter; Harrop

    2006-01-01

    RFID in healthcare is growing rapidly to become a $2.1 billion global business in 2016. Smart packaging for healthcare has additional value, for example in patient compliance recording blister packs that electronically record when each pill is taken - or more strictly when it is removed from the pack. Aardex has a different version where the plastic bottle of pills is continuously weighed by a load cell in the base. Thus recording when a pill is removed. These pack-

  3. ISS Asset Tracking Using SAW RFID Technology

    Science.gov (United States)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  4. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  5. Stage implementation of RFID in hospitals.

    Science.gov (United States)

    Kumar, Sameer; Livermont, Gregory; McKewan, Gregory

    2010-01-01

    The use of radio frequency identification device (RFID) technology within the healthcare industry was researched and specific instances of implementation of this technology in the hospital environment were examined. The study primarily makes use of ideas from operations and supply chain management, such as work flow diagrams, value stream mapping, and poka-yokes (mistake proofing measures) for investigations of processes, failures, and solutions. This study presents a step-by-step approach of how to implement the use of RFID tracking systems within the entire hospital. A number of poka-yokes were also devised for improving the safety of the patient and cost effectiveness of the hospital to insure the success of the hospital health care delivery system. Many players in the hospital environment may be impacted. This includes patients, doctors, nurses, technicians, administrators, and other hospital personnel. Insurance and government agencies may be impacted as well. Different levels of training of hospital personnel will be required based on the degree of interaction with the RFID system. References to costs, Return On Investment, change management, ethical and legal considerations are also made to help the reader understand the benefits and implications of the technology in the hospital environment.

  6. Passive RFID Rotation Dimension Reduction via Aggregation

    Science.gov (United States)

    Matthews, Eric

    Radio Frequency IDentification (RFID) has applications in object identification, position, and orientation tracking. RFID technology can be applied in hospitals for patient and equipment tracking, stores and warehouses for product tracking, robots for self-localisation, tracking hazardous materials, or locating any other desired object. Efficient and accurate algorithms that perform localisation are required to extract meaningful data beyond simple identification. A Received Signal Strength Indicator (RSSI) is the strength of a received radio frequency signal used to localise passive and active RFID tags. Many factors affect RSSI such as reflections, tag rotation in 3D space, and obstacles blocking line-of-sight. LANDMARC is a statistical method for estimating tag location based on a target tag's similarity to surrounding reference tags. LANDMARC does not take into account the rotation of the target tag. By either aggregating multiple reference tag positions at various rotations, or by determining a rotation value for a newly read tag, we can perform an expected value calculation based on a comparison to the k-most similar training samples via an algorithm called K-Nearest Neighbours (KNN) more accurately. By choosing the average as the aggregation function, we improve the relative accuracy of single-rotation LANDMARC localisation by 10%, and any-rotation localisation by 20%.

  7. RFID-based Information System for Patients and Medical Staff Identification and Tracking

    OpenAIRE

    Cerlinca, Tudor Ioan; Turcu, Cristina; Turcu, Cornel; Cerlinca, Marius

    2010-01-01

    RFID applications can provide significant benefits to the healthcare industry to ensure patient safety and also to improve supply chain efficiency. In fact, healthcare is predicted to be one of the major growth areas for RFID. An analysis (Frost & Sullivan, 2005) estimates that the RFID in healthcare and pharmaceutical applications markets will reach $2318.7 million in 2011. This chapter presents some applications that integrate RFID technology in healthcare domain. It also presents an RFID-b...

  8. Evaluation and Justification of an RFID Implementation : Pilot at IKEA Customer Distribution Centre

    OpenAIRE

    Larsson, Björn; Qviberg, Ola

    2004-01-01

    The purpose of this final thesis isto develop a model for justification and evaluation of RFID technology. RFID is a new, relatively untested, technology using radio signals for automatic identification of different objects. Our theoretical frame of references focuses on research about RFID and implementation iss ues, we also conducted case studies and interviews in order to learn about RFID. Most RFID installations of today are Pilots or early adopters wanting to try new technology. A lot of...

  9. Evolution of RFID Applications in Construction: A Literature Review

    Directory of Open Access Journals (Sweden)

    Enrique Valero

    2015-07-01

    Full Text Available Radio frequency identification (RFID technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper.

  10. Systems and Methods for RFID-Enabled Pressure Sensing Apparatus

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  11. System and Method for RFID-Enabled Information Collection

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  12. An Authentication Protocol for RFID Tag and Its Simulation

    Directory of Open Access Journals (Sweden)

    Shang-ping Wang

    2011-03-01

    Full Text Available RFID tag has limited calculation resources and small storage capacity, the wireless communication channel between RFID tag and reader is vulnerable to various malicious attacks. Aimed at these problems, a HMAC-based RFID lightweight authentication protocol is proposed in this paper, and some considerations about protocol implementation are made subsequently. In the new protocol, only the Hash function and XOR operation are used, so that the calculation capacity and storage space of RFID reader are utilized efficiently, the demand for the capacity of calculation and storage of tag are reduced. The protocol framework and the packet format are presented. The hardware implementation was done in Verilog HDL for an FPGA target device to get a fast prototype. The analysis of security and performance show that the new protocol can resist some malicious attacks, such as spoofing attack, replay attack, tracking, etc., and is suitable for low-cost RFID system.

  13. Systems and Methods for RFID-Enabled Dispenser

    Science.gov (United States)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  14. Evolution of RFID Applications in Construction: A Literature Review

    Science.gov (United States)

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  15. Integration of an RFID Reader to a Wireless Sensor Network and using it to Identify an Individual Carrying RFID Tags

    CERN Document Server

    Torres, Bolivar; Skelton, Gordon; Bridges, Scott; Meghanathan, Natarajan; 10.5121/ijasuc.2010.1401

    2011-01-01

    The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective was accomplished by integrating hardware and software. The hardware consisted of two WSN nodes - the RFID node connected to one of the WSN nodes, and a computer connected to the other WSN node. For the RFID equipment, we used the SM130-EK kit, which included the RFID reader and the RFID tags; and for the WSN, we used the Synapse Network Evaluation kit, which included the two sensor nodes. The software consisted of a program module developed in Python to control the microprocessors of the nodes; and a database controlled by a simple program to manage the tag IDs of people wearing them. The WSN and RFID nodes were connected through I2C interfacing. Also, the work of sending commands to the RFID node, to make it read a tag and send it back to the computer, was accomplished by the Python code developed which also ...

  16. [Guidelines for a prevalence survey of nosocomial infections in the University Hospital "Madre Teresa" in Tirana, Albania].

    Science.gov (United States)

    Sodano, L; Faria, S; Gjata, A; Kasneci, A; Byku, B; Schinaia, N

    2003-01-01

    The authors present guidelines for the first prevalence survey of nosocomial infections in the University Hospital "Madre Teresa" in Tirana (almost 1,600 beds), the only tertiary health-care centre in Albania. The survey is a joint project involving Italy and Albania, to be coordinated by the Italian National Health Institute. The paper describes goals, methodology and organization of the prevalence survey. The improvement of local expertise in epidemiology and microbiology is one of the most important goals. Therefore, Albanian personnel training and improvement of the infection microbiological diagnosis are fundamental aspects of the project.

  17. Versos ao amado: mística e erotismo na poesia de Teresa D'ávila

    OpenAIRE

    Lima, Maria Graciele de

    2014-01-01

    Esta pesquisa está centrada na obra poética de Teresa d Ávila, escritora e poetisa espanhola que viveu no século XVI e se tornou conhecida por ser a fundadora da Ordem das Carmelitas Descalças. O corpus escolhido para análise é composto pelos poemas Mi Amado para mí, Traspasada e Buscate en mí, retirados da coletânea de poesia publicada em suas Obras Completas (1974) a fim de serem analisados à luz da Mística e do Erotismo, considerando também as marcas da autoria feminina presentes nos refer...

  18. Cuerpos místicos, almas ascéticas. Regulaciones del espíritu en la experiencia de Teresa de Ávila (1515-1582).

    OpenAIRE

    Mònica Balltondre

    2009-01-01

    En esta tesis se investiga la antropología que subyace a la espiritualidad mística femenina de mediados del siglo XVI castellano, de la mano de Teresa de Ávila, conocida como Teresa de Jesús. Ella construyó una forma espiritual de vivirse que le permitió encuadrar sus experiencias a partir de tradiciones teológicas, como la mística, y de otros saberes como la filosofía natural y la medicina de su tiempo. Se examinan para ver cómo conceptualizó sus relaciones sobrenaturales y qué le aportaron ...

  19. Sor Teresa Juliana de Santo Domingo, «Chicaba», or Writing on the Other’s Skin Sor Teresa Juliana de Santo Domingo, «Chicaba» o escribir en la piel del otro

    Directory of Open Access Journals (Sweden)

    Beatriz FERRÚS ANTÓN

    2010-06-01

    Full Text Available Sor Teresa Juliana de Santo Domingo, Chicaba was the first Black writer in Spanish. She was a nun in Salamanca during the 18th Century who wrote about her religious life. Her text was used by Juan Carlos Paniagua to write a hagiography. The aim of this articvle is to comment on Paniagua’s text in relation to the religious tradition of the time, especially of women. The relationship between women-writing-skin is decisive.Sor Teresa Juliana de Santo Domingo, Chicaba, es la primera escritora negra conocida en español. Monja en Salamanca durante el siglo XVIII , escribió una vida religiosa a partir de la cual Juan Carlos Paniagua redactaría una hagiografía. El objetivo de este artículo es analizar el texto de Paniagua dentro de la tradición de escritura religiosa de este tiempo, en especial femenina, prestando especial atención a la asociación que entre mujer-escritura-color de la piel se construye en el mismo.

  20. Clara Schumann, Teresa Carreño, Rosita Renard: la condición de mujer en sus carreras musicales Clara Schumann, Teresa Carreño, Rosita Renard: Their Female Condition in their Musical Careers

    Directory of Open Access Journals (Sweden)

    Miguel Castillo Didier

    2010-06-01

    Full Text Available Clara Wieck, después Schumann, alemana, Teresa Carreño, venezolana, Rosita Renard, chilena, se distinguen como algunas de las más destacadas pianistas a lo largo de un poco más de una centuria, desde algo antes de mediados del siglo XIX a la mitad del XX. Hay paralelismos y también contrastes en sus vidas y sus carreras. Pero tanto el transcurrir de sus existencias como el del quehacer musical al que se dedicaron están marcados por hechos ligados a su condición de mujeres. Tratamos de hacer un paralelo entre sus vidas y entre el desarrollo de sus carreras destacando las particularidades y dificultades que en ambos planos les impuso la condición de mujeres.Clara Wieck, later Schumann, Germán, Teresa Carreño, Venezuelan, Rosita Renard, Chilean, have all of them distinguished as some ofthe most outstandingpianists along a little more than a century, from befare the mid 19th century fo the mid 20th. There are parallelisms and contrasts in their Uves and careers. Rut their Uves as well as their musical development were strongly affected by facts linked to their condition as women. We have tried to establish these parálisis, higlighting particularities and difficulties arisingfrom their condition of women.

  1. Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System

    Science.gov (United States)

    2008-12-01

    RFID VS. IUID MANAGEMENT DEFINITION AND PURPOSE FOR THE DOD...Corps. A. RFID VS. IUID MANAGEMENT DEFINITION AND PURPOSE FOR THE DOD The purpose and definition of RFID and UID technology throughout the DoD and

  2. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  3. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    Science.gov (United States)

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction. Copyright © 2011 The International Alliance for Biological Standardization. Published by Elsevier Ltd. All rights reserved.

  4. Detecting relay attacks on RFID communication systems using quantum bits

    Science.gov (United States)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-11-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  5. Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

    Directory of Open Access Journals (Sweden)

    M. Gireesh Kumar

    2014-07-01

    Full Text Available This is a very useful application of RFID (Radio-frequency identification and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc. and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.

  6. Traffic Monitoring and Control Using RFID

    Directory of Open Access Journals (Sweden)

    Gaurav Thakur

    2013-09-01

    Full Text Available Traffic congestion and tidal flow management were recognized as major problems in modern urban areas, which have caused much frustration and loss of man hours. The operation of standard traffic lights which are currently deployed in many junctions, are based on predetermined timing schemes, which are fixed during the installation and remain until further resetting. The timing is no more than a default setup to control what may be considered as normal traffic. Although every road junction by necessity requires different traffic light timing setup, many existing systems operate with a default sequence. To design an intelligent and efficient traffic control system, a number of parameters that represent the status of the road conditions must be identified and taken into consideration. Approach: In order to solve the problem an intelligent RFID traffic control has been developed. This project is based on monitoring the traffic density at the signal using RFID Reader. RFID tags which is placed (instead of number plate at each vehicle will serve as the unique number of vehicle .Reader will count the number of tags at the signal and take decision of increasing or decreasing the signal time .This reader is also use to find the violation(VIN of violator of the signal. Each passive tag will have certain number of bytes information will be different for different vehicles. Whenever any tag will approach any signal, reader will take that bytes of information and simultaneously will also increment the number of vehicles for making decision to change the signal timing. Each tag of data will be stored in main memory (database.This unique data will also help in determining the violator of the signal .Thus it will save human efforts and resources to a greater extent and reduce waiting of the people at the signal. After implementation of this project, now all people waiting at the signal will get proper time (green light according to the traffic density

  7. RFID Makes Common People an Uncommon Store

    Institute of Scientific and Technical Information of China (English)

    Mark; Roberti

    2010-01-01

    The Mexican retailer is using RFID to enhance the customer experience,and to provide supplierswith better inventory data. Dec.13,2010-Common People,an independent conceptstore that opened last month in Mexico City,is employing radiofrequency identification technology to enhance an already uncom-mon customer experience,as well as improve the management ofinventory."When we came up with the idea for a concept store,we knewwe wanted to bring in not just the most interesting products,but

  8. RFIDice - Augmenting Tabletop Dice with RFID

    Directory of Open Access Journals (Sweden)

    Marc Langheinrich

    2008-08-01

    Full Text Available Augmented dice allow players of tabletop games to have the result of a roll be automatically recorded by a computer, e.g., for supporting strategy games. We have built a set of three augmented-dice-prototypes based on radio frequency identification (RFID technology, which allows us to build robust, cheap, and small augmented dice. Using a corresponding readout infrastructure and a sample application, we have evaluated our approach and show its advantages over other dice augmentation methods discussed in the literature.

  9. Power Transmission of UHF Passive Embedded RFID in Tires

    OpenAIRE

    Shengbo Hu; Bing Si; Heng Shu; Jinrong Mo

    2014-01-01

    UHF passive RFID tags embedded in tires have a deep impact on tire life cycle management and tire monitoring. In this work, we present the power transmission of UHF passive embedded RFID in tires. In UHF passive embedded RFID systems in tires, the bidirectional radio link between reader and tags goes through air and tires. The total path loss contains reflection loss at tire-air boundaries and attenuation loss in the tires. The power transmission is based on the permittivity of tires and tire...

  10. The potential of RFID technology in Blood Center processes.

    Science.gov (United States)

    Kebo, V; Klement, P; Cermáková, Z; Gottfried, J; Sommerová, M; Palecek, A

    2010-01-01

    Current RFID technology deployment is limited by safety, procedural and physical limitations in healthcare field. It is important to define and ensure safe operation of technologies without actual deployment in real operation. Potential problems could arise due to the consequences of technical and physical characteristics of RFID technology and its improper location. This article deals with manipulation of blood products and the definition of suitable places for radio identification. Each suitable place must undergo laboratory experiments and tests. The results can provide a convenient base for defining efficient and safe deployment of RFID technology in Blood Centers with substantial financial savings for Czech healthcare.

  11. A Review of Implementing ADC in RFID Sensor

    Directory of Open Access Journals (Sweden)

    M. Zurita

    2016-01-01

    Full Text Available The general considerations to design a sensor interface for passive RFID tags are discussed. This way, power and timing constraints imposed by ISO/IEC 15693 and ISO/IEC 14443 standards to HF RFID tags are explored. A generic multisensor interface is proposed and a survey analysis on the most suitable analog-to-digital converters for passive RFID sensing applications is reported. The most appropriate converter type and architecture are suggested. At the end, a specific sensor interface for carbon nanotube gas sensors is proposed and a brief discussion about its implemented circuits and preliminary results is made.

  12. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    Science.gov (United States)

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity.

  13. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  14. Object Recognition Using a 3D RFID System

    OpenAIRE

    Roh, Se-gon; Choi, Hyouk Ryeol

    2009-01-01

    Up to now, object recognition in robotics has been typically done by vision, ultrasonic sensors, laser ranger finders etc. Recently, RFID has emerged as a promising technology that can strengthen object recognition. In this chapter, the 3D RFID system and the 3D tag were presented. The proposed RFID system can determine if an object as well as other tags exists, and also can estimate the orientation and position of the object. This feature considerably reduces the dependence of the robot on o...

  15. Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure

    Science.gov (United States)

    Desmedt, Yvo

    RFID is now in fashion. Exactly 20 years ago it was pointed out that identification based on electronic tokens suffer from the middleman attack. So, obviously RFIDs do too. Worse, the middleman attack is even easier to set up. Privacy advocates have expressed concerns about the use of RFIDs. Two implementations are compared: the use of RFID cards in the underground in Shanghai (similarly for Singapore) and the use in the London system. We conclude that privacy concerns can sometimes be addressed succesfully. We also address reliabilty concerns since RFID cards are easy to break. Finally we address the psychological issue that RFIDs are believed to be secure.

  16. Una mirada crítica sobre Lengua Madre Una conversación con María Teresa Andruetto (23 de diciembre de 2013

    Directory of Open Access Journals (Sweden)

    Costanza Borghi

    2014-06-01

    Full Text Available Una mirada crítica sobre Lengua MadreUna conversación con María Teresa Andruetto(23 de diciembre de 2013por Costanza Borghi, Serena Cappellini, Sara De Simone,Alma Martini, Valentina Paleari, Marco Pozzoni,Annamaria Rodio, Beatrice Tresoldi

  17. Investigation of Interference Models for RFID Systems

    Directory of Open Access Journals (Sweden)

    Linchao Zhang

    2016-02-01

    Full Text Available The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

  18. Global navigation system with RFID tags

    Science.gov (United States)

    Tsukiyama, Toshifumi

    2002-02-01

    A new navigation system is described for a mobile robot moving around in man-made environments such as hallways in a building. The system is based on a commercial three-wheel mobile platform with the addition of a Linux-based laptop computer, a Radio Frequency Identification (RDID) tag sensor and a vision system. At critical junctions such as the intersection of two passages the navigation system must identify the robot's location on a given map. We propose a method using RFID tags as landmarks. Each RFID tag has a unique ID number corresponding to its location on the map. The navigation system can decide the next movement (left-turn, right-turn and so on) toward a given goal based on this number. The navigation system also can automatically follow walls using the vision system. Since the equipment setup is very simple and the navigation system is easily combined with general mobile robot systems, our proposed technique would be useful for real-world robotic applications such as intelligent navigation for motorized wheelchairs.

  19. An RFID middleware for supply chain management

    Directory of Open Access Journals (Sweden)

    Artur Pinto Carneiro

    2011-12-01

    Full Text Available RFID (Radio Frequency Identification systems for identification and tracking of products and equipments have been progressively adopted as an essential tool for supply chain management, a production environment where the members usually share with each other their own logistic and management systems. Therefore, the development of supply chain RFID systems can be strongly simplified through the inclusion of an intermediate software layer – the middleware – responsible for the creation of interfaces to integrate all the heterogeneous software components. In this article we present a case study developed at IPT (Instituto de Pesquisas Tecnológicas do Estado de São Paulo which gave rise to a middleware prototype able to implement the required software integration on the supply chain of an electric power distribution company. The developed middleware is used to manage the interactions with a heterogeneous group of mobile devices  cell phones, handhelds and data colectors,  operated by different supply chain agents that grab data associated to various processes executed by a given electric power distribution equipment during its life cycle and transfer those data to a central database in order to share them with all the logistic and management corporation systems.

  20. Santa Maria Volcano, Guatemala

    Science.gov (United States)

    2002-01-01

    The eruption of Santa Maria volcano in 1902 was one of the largest eruptions of the 20th century, forming a large crater on the mountain's southwest flank. Since 1922, a lava-dome complex, Santiaguito, has been forming in the 1902 crater. Growth of the dome has produced pyroclastic flows as recently as the 2001-they can be identified in this image. The city of Quezaltenango (approximately 90,000 people in 1989) sits below the 3772 m summit. The volcano is considered dangerous because of the possibility of a dome collapse such as one that occurred in 1929, which killed about 5000 people. A second hazard results from the flow of volcanic debris into rivers south of Santiaguito, which can lead to catastrophic flooding and mud flows. More information on this volcano can be found at web sites maintained by the Smithsonian Institution, Volcano World, and Michigan Tech University. ISS004-ESC-7999 was taken 17 February 2002 from the International Space Station using a digital camera. The image is provided by the Earth Sciences and Image Analysis Laboratory at Johnson Space Center. Searching and viewing of additional images taken by astronauts and cosmonauts is available at the NASA-JSC Gateway to

  1. ciudad de Santa Marta

    Directory of Open Access Journals (Sweden)

    Javier Alfredo Ferreira Ospino

    2008-01-01

    Full Text Available Esta investigación evalúa los resultados de un programa de Formación en Derechos con madres comunitarias para la solución de conflictos en la Comuna Ocho de la ciudad de Santa Marta. El programa buscó el desarrollo de la capacidad de análisis y discernimiento para la toma de decisiones, que les permitan participar activamente en la solución de problemas de la comunidad, tendientes a mejorar las condiciones de vida de los miembros de la ésta. El proyecto se enmarca en un diseño de investigación cuasiexperimental con grupo control y medida pre y post, de forma que puedan medirse no sólo los resultados del programa, sino su efectividad para la resolución de conflictos en la comunidad. Se utilizó el cuestionario adaptado a la Teoría de Rahim y otros autores de la teoría del conflicto con el fin de determinar la manera como se resuelven los conflictos en la comunidad. Esta investigación se centró en demostrar objetivamente la efectividad del programa y las diferencias deliberativas y discursivas más relevantes entre los sujetos que recibieron formación en derechos.

  2. AN OVERVIEW OF ETHICAL CONSIDERATIONS WHEN USING RFID WITH CONSUMERS

    Directory of Open Access Journals (Sweden)

    Harold Boeck

    2014-12-01

    Full Text Available RFID has recently garnered significant interest in the area of customer relationship management by tagging consumers wirelessly and automatically identifying them at a distance. Through a descriptive meta-analysis, this article provides results that indicate that the use of RFID technology in consumer applications raises relatively important ethical and moral concerns, particularly in terms of privacy. The results of our descriptive meta-analysis reveal little empirical research and therefore highlight the need to deepen our knowledge on the ethical considerations brought forth from using RFID. The most important ethical considerations were in terms of privacy, which includes capturing shopping habits, consumer demographic information, and tracking of a person's movements. Literature emphasized technological solutions to counter RFID ethical issues, leaving industry normative procedures and regulatory frameworks in the background.

  3. LABELING OPTIONS FOR POSTAL SHIPMENTS BY PASSIVE RFID TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    Ondrej Maslák

    2015-09-01

    Full Text Available This article discusses the topic of labeling postal shipments by passive radio frequency identification (RFID tags. Every delivery company needs to have all necessary information for every single postal shipment package it carries. Shipment package labeling is essential for processing and tracking the postal shipments along its delivery process. Using RFID technology for the process brings advantages in more efficient delivery and data collection along with regular information updates of shipment status across complete delivery chain.In this article, we focused on the problem of logical log of key shipment package information into EPC memory of the RFID smart label. We have taken into account the National postal administrator and its current system of shipment labeling. In the end, we presented a design for conversion of contemporary labeling using bar codes into labeling using RFID tags.

  4. RFID: The Big Player in the Libraries of the Future

    Directory of Open Access Journals (Sweden)

    Dr. Venkatesh. J

    2012-06-01

    Full Text Available This paper suggest the idea of developing an automatic Radio Frequency Identification (RFID-based system for library search and to observe the current literature to define whether current technology and developed RFID-based systems are supportive for building that. To fully understand its key points, implementations, risks, and benefits, the fundamentals of radio frequency are to be recognized and revised. The paper recognizes key benefits and risks of radio frequency identification through analysis of library literature. To make library systems efficient and successfully operational RFID solutions can be used to reduce operating costs through reducing the labor costs, improving automation, refining tracking and tracing, and inhibiting the loss of resources under any conditions. The projected automated RFID-based system is a unique idea by itself. Due to the fact that enhanced organization of books and resources becomes possible, resources are not lost, stealing is avoided, and customers are served on time and correctly.

  5. Radio Frequency Identification (RFID) technology and patient safety

    National Research Council Canada - National Science Library

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    .... However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers...

  6. Tracking surgical day care patients using RFID technology

    National Research Council Canada - National Science Library

    Wauben, L.S.G.L; Guédon, A.C.P; Korne, Dirk; Dobbelsteen, John

    2015-01-01

    ... (RFID) technology was installed and patients were tracked during 52 weekdays. Length of hospital stay, length of stay and wait times per phase, and differences in wait times between the two types of administered anaesthesia were analysed...

  7. Privacy implications of RFID: An assessment of threats and opportunites

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2008-01-01

    European citizens consider Radio Frequency Identification (RFID) to be the most intrusive technology of the past two decades. Safeguarding privacy requires specific action that needs attention of all parties involved. European citizens consider legal instruments to offer insufficient guarantees for

  8. A Graph Summarization Algorithm Based on RFID Logistics

    Science.gov (United States)

    Sun, Yan; Hu, Kongfa; Lu, Zhipeng; Zhao, Li; Chen, Ling

    Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will generate a complete history of all the individual locations that it occupied at every point in time. The movement trails of such RFID data form gigantic commodity flowgraph representing the locations and durations of the path stages traversed by each item. In this paper, we use graph to construct a warehouse of RFID commodity flows, and introduce a database-style operation to summarize graphs, which produces a summary graph by grouping nodes based on user-selected node attributes, further allows users to control the hierarchy of summaries. It can cut down the size of graphs, and provide convenience for users to study just on the shrunk graph which they interested. Through extensive experiments, we demonstrate the effectiveness and efficiency of the proposed method.

  9. Lightweight Distance bound Protocol for Low Cost RFID Tags

    CERN Document Server

    Ahmed, Eslam Gamal; Hashem, Mohamed

    2010-01-01

    Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags. This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol. The implementation of the proposed protocol meets the limited abilities of low-cost RFID tags.

  10. Privacy implications of RFID: An assessment of threats and opportunites

    NARCIS (Netherlands)

    Lieshout, M.J. van; Kool, L.

    2008-01-01

    European citizens consider Radio Frequency Identification (RFID) to be the most intrusive technology of the past two decades. Safeguarding privacy requires specific action that needs attention of all parties involved. European citizens consider legal instruments to offer insufficient guarantees for

  11. Multi-tag content access control in RFID system

    OpenAIRE

    2010-01-01

    Radio Frequency Identification (RFID) makes great flexibility and high efficiency for data acquisition in industry and daily life. At the other side, it brings the privacy risks and multiple tags collision issue. Current research in RFID system focuses on the security and privacy issue which is based on authentication protocols between a tag and a Reader. There is a need to design a reasonable protocol which takes care of both multi-tag anti-collision and security issue. This thesis presen...

  12. Implementation of RFID Tracking across the Entire Supply Chain

    OpenAIRE

    Hinkka, Ville

    2013-01-01

    The use of RFID (Radio Frequency Identification) tracking to improve the supply chain management (SCM) of today’s complex and geographically dispersed supply networks has been highlighted in the past 10 years. Even if the use of RFID technology to smooth certain supply chain operations has grown rapidly, the number of supply chain-wide tracking systems, which would be highly integrated with the operations across the whole supply chain, has remained low. The aim of this thesis is threefold...

  13. Implementation of Application Layer Protocol for an Active RFID System

    OpenAIRE

    2011-01-01

    The emerging technology of active RFID tags has strong potential in the areas of real time health monitoring, sorting of cargo, and large scale inventory management because of their longer communication range and larger data storage capacity. The market of active RFID is growing very rapidly and therefore there has been an increase in the number of companies engaging in this field. But very often it is found that the products available in the market are not always suited to the application at...

  14. Real-Time RFID-Based Intelligent Healthcare Diagnosis System

    Science.gov (United States)

    Khosla, Rajiv; Chowdhury, Belal

    In a health care context, the use of RFID (Radio Frequency Identi- fication) technology can be employed for not only bringing down health care costs but also to facilitate automatic streamlining patient identification processes in health centers and assist medical practitioners in quick and accurate diagnosis and treatments. In this paper, we outline a describe design and application of RFID-based Real-time Intelligent Clinical Diagnosis and Treatment Support System (ICDTS) in health care.

  15. Optimised inductively coupled reader antennas for smart HF RFID systems.

    OpenAIRE

    Soodmand, Soheyl

    2015-01-01

    The Internet of things (IoT) refers to uniquely identifiable objects and their virtual representations in an Internet-like structure to be managed and inventoried by computers. Radio-frequency identification (RFID) - a prerequisite for the IoT - is an automatic way for data transaction in object identification and is used to improve automation, inventory control and checkout operations. An RFID system consists of a reader device and one or several tags. Smart reader systems are...

  16. Aspects for the Utilisation of Radio Frecquency Identification RFID

    Directory of Open Access Journals (Sweden)

    Ionut Balan

    2007-01-01

    Full Text Available The project presents some aspects about theutilisation of the RFID technology, the latest objectidentification technology and data collection practice. Hereare presented the advantages and the limits of this technologyusage relative to the barcodes, the defined standards for thistechnology and some practicability domains. It is achieved ashort presentation about the mini-computers (a newachievement of IT technology. For the application wepresent a micro-system for good identification, using theRFID technology, and a PDA (mobile computer.

  17. Thought on the RFID Technology Development in China

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In China,RFID technology has been applied to some extents,and also has a huge market and development margin. During this progress,the government will help to build up the basic information construction,then to make the basic informa- tion resource open,at the same time to avoid the policy management over-commercialized,and push RFID technology applica- tion forward and speed up its development.

  18. Non-foster matching of an RFID antenna

    KAUST Repository

    Mohamed Hassan Salem, Nedime Pelin

    2011-07-01

    Novel designs of radio-frequency identification (RFID) tag antennas with better matching characteristics to achieve extended range for passive tags are investigated in ultra-high frequency (UHF) band. A microstrip dipole antenna with or without an integrated negative impedance converter designed to cancel out the antenna\\'s input capacitance at resonance frequency was designed, simulated, constructed and measured for implementation in RFID applications. © 2011 IEEE.

  19. Accelerating Time to Value for RFID Solutions with Reusable Assets

    OpenAIRE

    Chen, Han; Chou, Paul; Dury, Sastry S.; Laredo, Jim A.

    2010-01-01

    RFID has been shown to deliver business benefits in supply chain management such as reducing stock-outs and improving on-shelf availability (Corsten, 2005) (Hargrave, 2006). Such benefits can only be realized by judiciously integrating the technology into related business processes. In this chapter, by using a pharmaceutical product track and trace application as an example and drilling down the manufacturer's product packing process, we examined the evolution of RFID projects and the emergen...

  20. Security and privacy threats in RFID traceability network

    Institute of Scientific and Technical Information of China (English)

    Chu; Chao-Hsien

    2008-01-01

    To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. ...

  1. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWER PLANT-DERIVED PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2006-03-01

    TERESA (Toxicological Evaluation of Realistic Emissions of Source Aerosols) involves exposing laboratory rats to realistic coal-fired power plant and mobile source emissions to help determine the relative toxicity of these PM sources. There are three coal-fired power plants in the TERESA program; this report describes the results of fieldwork conducted at the first plant, located in the Upper Midwest. The project was technically challenging by virtue of its novel design and requirement for the development of new techniques. By examining aged, atmospherically transformed aerosol derived from power plant stack emissions, we were able to evaluate the toxicity of PM derived from coal combustion in a manner that more accurately reflects the exposure of concern than existing methodologies. TERESA also involves assessment of actual plant emissions in a field setting--an important strength since it reduces the question of representativeness of emissions. A sampling system was developed and assembled to draw emissions from the stack; stack sampling conducted according to standard EPA protocol suggested that the sampled emissions are representative of those exiting the stack into the atmosphere. Two mobile laboratories were then outfitted for the study: (1) a chemical laboratory in which the atmospheric aging was conducted and which housed the bulk of the analytical equipment; and (2) a toxicological laboratory, which contained animal caging and the exposure apparatus. Animal exposures were carried out from May-November 2004 to a number of simulated atmospheric scenarios. Toxicological endpoints included (1) pulmonary function and breathing pattern; (2) bronchoalveolar lavage fluid cytological and biochemical analyses; (3) blood cytological analyses; (4) in vivo oxidative stress in heart and lung tissue; and (5) heart and lung histopathology. Results indicated no differences between exposed and control animals in any of the endpoints examined. Exposure concentrations for the

  2. Toxicological Evaluation of Realistic Emissions of Source Aerosols (TERESA): Application to Power Plant-Derived PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2007-02-28

    This report documents progress made on the subject project during the period of September 1, 2007 through February 28, 2007. The TERESA Study is designed to investigate the role played by specific emissions sources and components in the induction of adverse health effects by examining the relative toxicity of coal combustion and mobile source (gasoline and/or diesel engine) emissions and their oxidative products. The study involves on-site sampling, dilution, and aging of coal combustion emissions at three coal-fired power plants, as well as mobile source emissions, followed by animal exposures incorporating a number of toxicological endpoints. The DOE-EPRI Cooperative Agreement (henceforth referred to as ''the Agreement'') for which this technical progress report has been prepared covers the performance and analysis of field experiments at the first TERESA plant, located in the Upper Midwest and henceforth referred to as Plant 0, and at two additional coal-fired power plants (Plants 1 and 2) utilizing different coal types and with different plant configurations. During this reporting period, fieldwork was completed at Plant 2, located in the Midwest. The following scenarios were completed: (1) July 19-22: POS (oxidized + SOA); (2) July 25-28: PONS (oxidized + neutralized + SOA); (3) August 8-13: P (primary); (4) August 14-15: POS; (5) August 16-17: POS (MI rats); (6) August 28-31: OS (oxidized + SOA, without primary particles); (7) September 1-4: O (oxidized, no primary particles); (8) September 6-9: S (SOA, no primary particles); and (9) September 19-22: PO (oxidized). Results indicated some biological effects with some scenarios. Also during this reporting period, the annual meeting of the TERESA Technical Advisory Committee was held at the Harvard School of Public Health in Boston. During the next reporting period, data analyses will continue for Plant 2 as well as for pooled data from all three plants. Manuscripts documenting the overall

  3. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWDER PLANT-DERIVED PM 2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2006-08-31

    This report documents progress made on the subject project during the period of March 1, 2006 through August 31, 2006. The TERESA Study is designed to investigate the role played by specific emissions sources and components in the induction of adverse health effects by examining the relative toxicity of coal combustion and mobile source (gasoline and/or diesel engine) emissions and their oxidative products. The study involves on-site sampling, dilution, and aging of coal combustion emissions at three coal-fired power plants, as well as mobile source emissions, followed by animal exposures incorporating a number of toxicological endpoints. The DOE-EPRI Cooperative Agreement (henceforth referred to as ''the Agreement'') for which this technical progress report has been prepared covers the performance and analysis of field experiments at the first TERESA plant, located in the Upper Midwest and henceforth referred to as Plant 0, and at two additional coal-fired power plants (Plants 1 and 2) utilizing different coal types and with different plant configurations. During this reporting period, data processing and analyses were completed for exposure and toxicological data collected during the field campaign at Plant 1, located in the Southeast. Toxicological results indicate some pulmonary, oxidative stress, and cardiovascular responses to certain exposure scenarios. Fieldwork at Plant 2, located in the Midwest, began on July 19, 2006. The following scenarios were completed: July 19-22: POS (oxidized + SOA); July 25-28: PONS (oxidized + neutralized + SOA); August 8-13: P (primary); August 14-15: POS; August 16-17: POS (MI rats); August 28-31: OS (oxidized + SOA, without primary particles); September 1-4: O (oxidized, no primary particles); and September 6-9: S (SOA, no primary particles). During the next reporting period, we will report complete exposure and toxicological results for Plant 2. Planning will begin for the mobile source component of the

  4. Application of RFID technology-upper extremity rehabilitation training.

    Science.gov (United States)

    Chen, Chih-Chen; Chen, Yu-Luen; Chen, Shih-Ching

    2016-01-01

    [Purpose] Upper extremity rehabilitation after an injury is very important. This study proposes radio frequency identification (RFID) technology to improve and enhance the effectiveness of the upper extremity rehabilitation. [Subjects and Methods] People use their upper extremities to conduct daily activities. When recovering from injuries, many patients neglect the importance of rehabilitation, which results in degraded function. This study recorded the training process using the traditional rehabilitation hand gliding cart with a RFID reader, RFID tags in the panel, and a servo host computer. [Results] Clinical evidence, time taken to achieve a full score, counts of missing the specified spots, and Brunnstrom stage of aided recovery, the proximal part of the upper extremity show that the RFID-based upper extremity training significantly and reduce negative impacts of the disability in daily life and activities. [Conclusion] This study combined a hand-gliding cart with an RFID reader, and when patients moved the cart, the movement could be observed via the activated RFID tags. The training data was collected and quantified for a better understanding of the recovery status of the patients. Each of the participating patients made progress as expected.

  5. Power Transmission of UHF Passive Embedded RFID in Tires

    Directory of Open Access Journals (Sweden)

    Shengbo Hu

    2014-01-01

    Full Text Available UHF passive RFID tags embedded in tires have a deep impact on tire life cycle management and tire monitoring. In this work, we present the power transmission of UHF passive embedded RFID in tires. In UHF passive embedded RFID systems in tires, the bidirectional radio link between reader and tags goes through air and tires. The total path loss contains reflection loss at tire-air boundaries and attenuation loss in the tires. The power transmission is based on the permittivity of tires and tire-air boundary conditions. We give an OCP method for measuring the permittivity of tires. By analyzing the radio link for UHF passive RFID, we establish a model of wave propagation of UHF embedded RFID in tires and make numerical analyses. Numerical analyses show that the error of the OCP methods for measuring the permittivity of tires is small, the parallel polarization and normal incidence of wave are chosen for improving the performance of the UHF embedded RFID in tires, and distance is chosen to keep power transmission function from locating valley.

  6. An Anti-Counterfeiting RFID Privacy Protection Protocol

    Institute of Scientific and Technical Information of China (English)

    Xiaolan Zhang; Brian King

    2007-01-01

    The privacy problem of many RFID systems has been extensively studied. Yet integrity in RFID has notreceived much attention as regular computer systems. When we evaluate an identification protocol for an RFID system foranti-counterfeiting, it is important to consider integrity issues. Moreover, many RFID systems are accessed by multiple leveltrust parties, which makes comprehensive integrity protection even harder. In this paper, we first propose an integrity modelfor RFID protocols. Then we use the model to analyze the integrity problems in Squealing Euros protocol. Squealing Euroswas proposed by Juels and Pappu for RFID enabled banknotes that will support anti-forgery and lawful tracing yet preserveindividual's privacy. We analyze its integrity, we then discuss the problems that arise and propose some solutions to theseproblems. Then an improved protocol with integrity protection for the law enforcement is constructed, which includes anunforgeable binding between the banknote serial number and the RF ciphertext only readable to law enforcement. This sameprotocol can be applied in many other applications which require a privacy protecting anti-counterfeiting mechanism.

  7. An Integrated Conceptual Framework for RFID Enabled Healthcare

    Directory of Open Access Journals (Sweden)

    Gaurav Gupta

    2015-12-01

    Full Text Available Radio frequency identification (RFID technology is a wireless communication technology that facilitates automatic identification and data capture without human intervention. Since 2000s, RFID applications in the health care industry are increasing.  RFID has brought many improvements in areas like patient care, patient safety, equipment tracking, resource utilization, processing time reduction and so on. On the other hand, often deployment of RFID is questioned on the issues like high capital investment, technological complexity, and privacy concerns. Exploration of existing literature indicates the presence of works on the topics like asset management, patient management, staff management, institutional advantages, and organizational issues. However, most of the works are focused on a particular issue. Still now, scholarly attempts to integrate all the facades of RFID-enabled healthcare are limited. In this paper, we propose a conceptual framework that represents the scope for implementation of this technology and the various dimensions of RFID-enabled healthcare and demonstrate them in detail. Also, we have discussed the critical issues that can prove to be potential barriers to its successful implementation and current approaches to resolving these. We also discuss some of the regulatory initiatives encouraging its adoption in the healthcare industry. Also, we have highlighted the future research opportunities in this domain.

  8. Electromagnetic compatibility of implantable neurostimulators to RFID emitters

    Directory of Open Access Journals (Sweden)

    Guag Joshua W

    2011-06-01

    Full Text Available Abstract Background The objective of this study is to investigate electromagnetic compatibility (EMC of implantable neurostimulators with the emissions from radio frequency identification (RFID emitters. Methods Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz Results The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. Conclusions The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  9. Localization of pallets in warehouses using passive RFID system

    Institute of Scientific and Technical Information of China (English)

    周俊儒; 张宏建; 周洪亮

    2015-01-01

    Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification (RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival (AOA) measurement and received signal strength (RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.

  10. The Study on Using Passive RFID Tags for Indoor Positioning

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2011-02-01

    Full Text Available Radio frequency identification (RFID is the technology that put an RFID tag on objects or people, so that they can be identified, tracked, and managed automatically. With its wide application in the automobile assembly industry, warehouse management and the supply chain network, RFID has been recognized as the next promising technology in serving the positioning purpose. Existing positioning technologies such as GPS are not available indoors as the terminal cannot get the signal from satellites. To enhance the availability of the positioning systems for indoors, the development of RFID positioning system for locating objects or people have became a hot topic in recent research. Compared with conventional active and high‐cost solutions, this paper studied the feasibility of using passive RFID tags for indoor positioning and object location detection to provide real time information for tracking movement. Results of experiment show that readability of the passive RFID positioning system is satisfactory, and it is a more cost effective solution when compared with other positioning technologies.

  11. A Qualitative Approach to Mobile Robot Navigation Using RFID

    Science.gov (United States)

    Hossain, M.; Rashid, M. M.; Bhuiyan, M. M. I.; Ahmed, S.; Akhtaruzzaman, M.

    2013-12-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot.

  12. Electromagnetic compatibility of implantable neurostimulators to RFID emitters.

    Science.gov (United States)

    Pantchenko, Oxana S; Seidman, Seth J; Guag, Joshua W; Witters, Donald M; Sponberg, Curt L

    2011-06-09

    The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz. The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  13. RFID in cloud environment for Attendance monitoring system

    Directory of Open Access Journals (Sweden)

    A.Parvathy

    2013-06-01

    Full Text Available Radio Frequency Identification (RFID initially is of great use in the marketing field render billing easy. It came into effect since world war-II attained its wide spread recognition only when Walmart introduced it as ‘mandate’. An object within the range of 20 feet can be easily tracked with the aid of its unique barcode using RFID chip. It is sophisticated than the primitive barcode techniques as there is no need of positioning of the scanner. Cloud computing is a system which provides access to all soft ware’s without installation, for a desired time period, at a specific cost, only with the help of a single web browser.. Interfacing RFID with cloud computing would be more beneficiary in solving current issues. Technological updates can be done without any technical support. This paper presents theoverview of interfacing RFID with cloud computing for updating students’ attendance and updating it into the parents’ corner and faculty mails. By considering the present issue, providing unique RFID code to the students reduce malpractice and human error. Also Human resources can be saved by the application of cloud computing. Time management is the most effective advantage gained from the use ofRFID and cloud computing.

  14. Design and realization of confidential data management system RFID-based

    Science.gov (United States)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  15. The Mother Teresa Effect: the modulation of spirituality in using the CISM model with mental health service providers.

    Science.gov (United States)

    Newmeyer, Mark; Keyes, Benjamin; Gregory, Sonji; Palmer, Kamala; Buford, Daniel; Mondt, Priscilla; Okai, Benjamin

    2014-01-01

    Mental health service providers are at risk of experiencing compassion fatigue, burnout, and vicarious traumatization as a result of working in difficult contexts or when working with individuals who have experienced trauma. Numerous studies have examined the mitigating factors in professional caregivers' stress and related prevention strategies thought to be associated with professional self-care. This retrospective study examined the impact of debriefing strategies referred to as Critical Incident Stress Management (CISM) and spirituality in 22 mental health service providers working in a stressful, cross-cultural context. Quantitative analysis of pre and post self-report instruments suggests that training and utilization of CISM techniques may be important in preventing future problems. To the surprise of the researchers, spirituality may not only serve as a protective factor in moderating compassion fatigue, but also increases compassion satisfaction among professional caregivers. Thus, the "Mother Teresa Effect".

  16. Os Filmes (Descritos de Ana Teresa Pereira: Nightmare, de Alfred Hitchcock, e The Double, de David Cronenberg

    Directory of Open Access Journals (Sweden)

    Amândio Pereira Reis

    2014-03-01

    Full Text Available Starting with a comparative reading of an ekphrastic text by Callistratus (3rd century AD and taking support from various studies on ekphrasis as a literary practice, from antiquity to present times until its acceptance as an intermedial literary genre, it is our goal to analyze two short stories by Ana Teresa Pereira which invent non-existent films by Hitchcock and Cronenberg. Therefore, we will have to confront a range of problems associated with ekphrastic description – the dialectic between reality and fiction; truth and falsity; imagination and reading – and with the (impossibilities of representation through image and/or words, including a set of questions posed by the specific transmedial relation that A. T. Pereira’s texts establish between Literature and Cinema. We will also take into account the concept of Pavle Levi’s “written film” as one possibility, among others, of genre identification for these narratives.

  17. Address for the Beginning Issue of “RFID Technologies and Applicationsn”

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Recently RFID technology got a widely attentions. As a result of this, RFID Technology and Application is published as the first professional RFID publication mainly issuing in the China and Hong Kong, Macao and Taiwan. This article summarizes the RFID characteristic, suitable applied field and its development situation and its developing reason in Asia-Pacific area. The article also presents the Magazine’s target and goal, column and the future perspective.

  18. RFID in the healthcare supply chain: usage and application.

    Science.gov (United States)

    Kumar, Sameer; Swanson, Eric; Tran, Thuy

    2009-01-01

    The purposes of this study are to first, determine the most efficient and cost effective portions of the healthcare supply chain in which radio frequency identification devices (RFID) can be implemented. Second, provide specific examples of RFID implementation and show how these business applications will add to the effectiveness of the healthcare supply chain. And third, to describe the current state of RFID technology and to give practical information for managers in the healthcare sector to make sound decisions about the possible implementation of RFID technology within their organizations. Healthcare industry literature was reviewed and examples of specific instances of RFID implementation were examined using an integrated simulation model developed with Excel, @Risk and Visio software tools. Analysis showed that the cost of implementing current RFID technology is too expensive for broad and sweeping implementation within the healthcare sector at this time. However, several example applications have been identified in which this technology can be effectively leveraged in a cost-effective way. This study shows that RFID technology has come a long way in the recent past and has potential to improve healthcare sector productivity and efficiency. Implementation by large companies such as Wal-mart has helped to make the technology become much more economical in its per unit cost as well as its supporting equipment and training costs. The originality of this study lies in the idea that few practical and pragmatic approaches have been taken within the academic field of study for the implementation of RFID into the healthcare supply chain. Much of the research has focused on specific companies or portions of the supply chain and not the entire supply chain. Also, many of the papers have discussed the future of the supply chain that is heavily dependent on advances in RFID technology. A few viable applications of how RFID technology can be implemented in the healthcare

  19. Compact Miniaturized Antenna for 210 MHz RFID

    Science.gov (United States)

    Lee, Richard Q.; Chun, Kue

    2008-01-01

    This paper describes the design and simulation of a miniaturized square-ring antenna. The miniaturized antenna, with overall dimensions of approximately one tenth of a wavelength (0.1 ), was designed to operate at around 210 MHz, and was intended for radio-frequency identification (RFID) application. One unique feature of the design is the use of a parasitic element to improve the performance and impedance matching of the antenna. The use of parasitic elements to enhance the gain and bandwidth of patch antennas has been demonstrated and reported in the literature, but such use has never been applied to miniaturized antennas. In this work, we will present simulation results and discuss design parameters and their impact on the antenna performance.

  20. Enhanced-Bivium Algorithm for RFID System

    Directory of Open Access Journals (Sweden)

    Shiyong Zhang

    2015-01-01

    Full Text Available RFID (radio frequency identification is an emerging technology for automatic identification of physical objects using radio frequency. The security and privacy of the system is increasingly concerned and some light-weight encryption schemes such as Trivium and Bivium have been proposed. In this paper, the internal structure of Bivium is exploited and generalized to an algorithm called Bivium-Model. It is shown that the original Bivium has its inherent imperfections due to the improper parameter selection. A set of better parameters are given out to fix the security vulnerability of original Bivium. Emulation results also show that the Enhanced-Bivium algorithm achieves lower power consumption and lower die size.

  1. RFID tags for cryogenic applications: xxperimental and numerical analysis of thermo-mechanical behaviour

    NARCIS (Netherlands)

    Cauchois, R.; Yin, M.S.; Gouantes, A.; Boddaert, X.

    2013-01-01

    RFID solutions will improve the traceability of biological samples stored at low temperature (77 K) in biobanks. To achieve this goal, the reliability of RFID tags is essential. In this paper, we focus on the reliability aspect of RFID tags in harsh environment and more specifically to assembly desi

  2. Sistema de localización mediante tecnología RFID

    OpenAIRE

    Díaz Molinera, Sergio

    2016-01-01

    Desarrollo de un localizador de etiquetas RFID en entornos indoor, utilizando métodos basados a niveles de RSSI y fase. Desenvolupament d'un localitzador d'etiquetes RFID en entorns indoor, utilitzant mètodes basats a nivells de RSSI i fase. This work attempts to define and simulate an object location system, using RFID UHF tags.

  3. Implications of RFID in Location-Aware Wi-Fi Networks

    Science.gov (United States)

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  4. RuBee and RFID A confidential summary,May 2009

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The letters"RFID"have become a negative to many of our end-customers,so we have had to distance RuBee from the entire category and discourage any attempt to characterize RuBee as just another RFID technology.We never engage in pilots or trials where RFID is seen as a competing technology to RuBee.Most

  5. Implications of RFID in Location-Aware Wi-Fi Networks

    Science.gov (United States)

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  6. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Science.gov (United States)

    2010-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive...

  7. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    Science.gov (United States)

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  8. Position Statement in RFID S&P Panel: Contactless Smart Cards

    Science.gov (United States)

    Callas, Jon

    When considering the security and risks of RFID systems, we must be careful to consider the issues that are specific to the device being an RFID as opposed to the inherent security issues of the device itself. RFID devices fall into two main categories:

  9. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    Science.gov (United States)

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  10. Santa Claus ’Names

    Institute of Scientific and Technical Information of China (English)

    寒冰

    2005-01-01

    A ustria—Christkind Belgium and the N etherlands—N oel Saint Nicholas C hristkind and Black Pete Brazil—Papa;N oel D enm ark—Julinisse England—Father Christm as Finland—O ld M an C hristm asFrance—Pere N oel or le Petit Germ any—K riss Kringle Christkind or Saint N icholas Italy—B efana Japan—Santa K urohsu M exico—Three Kings Poland—Star M an or W ise M en Spain—Three Kings R ussia—B asbouschka ?Santa Claus ’Names@寒冰

  11. 欧盟RFID标准体系架构和关键RFID标准分析%Analysis on EU RFID Standard System Architecture and the Key RFID Standards

    Institute of Scientific and Technical Information of China (English)

    黄娟; 段新颖

    2011-01-01

    无线射频识别(RFID)技术被誉为最具发展潜力和变革力的信息高新技术之一.随着RFID技术的发展,RFID应用规模的不断扩大,RFID标准在RFID技术应用和产业发展中的作用和战略地位日益显现.文章详细描述了欧盟"RFID标准化发展现状报告"中提出的RFID标准体系架构和相关RFID标准和法规,为我国开展RFID标准化研究提供了借鉴.%The technology of radio frequency identification( RFID )is hailed as one of the most potential development and change of information technology.Recently, along with the development of RFID technology and RFID application scale expands unceasingly, RFID standards play a more important role in RFID technology application and industry development.This paper describes the RFID standard system architecture which presented in “European Global RFID Forum for Standards”and RFID related standards and regulations in detailed.Its purpose tries to provide references for the development of RFID standardization in China.

  12. PHASE II VAULT TESTING OF THE ARGONNE RFID SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-06-25

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step

  13. Two-Way Communication Using RFID Equipment and Techniques

    Science.gov (United States)

    Jedry, Thomas; Archer, Eric

    2007-01-01

    Equipment and techniques used in radio-frequency identification (RFID) would be extended, according to a proposal, to enable short-range, two-way communication between electronic products and host computers. In one example of a typical contemplated application, the purpose of the short-range radio communication would be to transfer image data from a user s digital still or video camera to the user s computer for recording and/or processing. The concept is also applicable to consumer electronic products other than digital cameras (for example, cellular telephones, portable computers, or motion sensors in alarm systems), and to a variety of industrial and scientific sensors and other devices that generate data. Until now, RFID has been used to exchange small amounts of mostly static information for identifying and tracking assets. Information pertaining to an asset (typically, an object in inventory to be tracked) is contained in miniature electronic circuitry in an RFID tag attached to the object. Conventional RFID equipment and techniques enable a host computer to read data from and, in some cases, to write data to, RFID tags, but they do not enable such additional functions as sending commands to, or retrieving possibly large quantities of dynamic data from, RFID-tagged devices. The proposal would enable such additional functions. The figure schematically depicts an implementation of the proposal for a sensory device (e.g., a digital camera) that includes circuitry that converts sensory information to digital data. In addition to the basic sensory device, there would be a controller and a memory that would store the sensor data and/or data from the controller. The device would also be equipped with a conventional RFID chipset and antenna, which would communicate with a host computer via an RFID reader. The controller would function partly as a communication interface, implementing two-way communication protocols at all levels (including RFID if needed) between the

  14. CNOOC Cooperates with Santa Fe

    Institute of Scientific and Technical Information of China (English)

    Cao Sanyong; Wang Keyu

    1997-01-01

    @@ China National Offshore Oil Corporatian (CNOOC) signed the Petroleum Contract for 15/34 Block in the Pearl River Mouth Basin of South China Sea and the Petroleum Contract for 23/28 Block in the Beibu Gulf of South China Sea with Santa Fe Resources Inc. of the United States in Beijing on January 16, 1997.

  15. RFID-enabled healthcare applications, issues and benefits: an archival analysis (1997-2011).

    Science.gov (United States)

    Fosso Wamba, Samuel

    2012-12-01

    In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.

  16. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud

    OpenAIRE

    Qingkuan Dong; Jiaqing Tong; Yuan Chen

    2015-01-01

    With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of cloud-based RFID systems are more serious than those of traditional RFID systems. In cloud-based RFID systems, the connection between the reader and the cloud database is not secure and cloud service provider is not trusted. Th...

  17. Radio Frequency Identification (RFID) technology and patient safety.

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-09-01

    Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors.

  18. Radio Frequency Identification (RFID technology and patient safety

    Directory of Open Access Journals (Sweden)

    Sima Ajami

    2013-01-01

    Full Text Available Background: Radio frequency identification (RFID systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS and electronic health records (EHRs and support it by clinical decision support systems (CDSS, it facilitates processes and reduce medical, medication and diagnosis errors.

  19. Applying RFID Technology to construct an Elegant Hospital Environment

    Directory of Open Access Journals (Sweden)

    A Anny Leema

    2011-05-01

    Full Text Available Radio frequency identification (RFID technology has seen increasing adoption rates in applications that range from supply chain management, asset tracking, Medical/Health Care applications, People tracking, Manufacturing, Retail, Warehouses, and Livestock Timing. Of these, Medical/Health care applications are of more importance because minute errors in it can cost heavy financial and personal losses. The success of these applications depends heavily on the quality of the data stream generated by the RFID readers. Efficient and accurate data cleaning is an essential task for the successful deployment of RFID systems. Hence this paper gives the brief introduction of RFID terminologies and cleaning methods to provide accurate RFID data to applications. It also outlines a patient management system which helps hospitals to build a better, more collaborative environment between different departments, such as the wards, medication, examination, and payment. Indeed used in hospital to bring down the health care costs, optimizing business processes, streamline patient identification processes and improve patient safety.

  20. Two RFID-based solutions for secure inpatient medication administration.

    Science.gov (United States)

    Yen, Yi-Chung; Lo, Nai-Wei; Wu, Tzong-Chen

    2012-10-01

    Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using RFID technology, such administration system provides automated medication verification for inpatient's medicine doses and generates corresponding medication evidence, which may be audited later for medical dispute. Recently, Peris-Lopez et al. (Int. J. Med. Inform., 2011) proposed an IS-RFID system to enhance inpatient medication safety. Nevertheless, IS-RFID system does not detect the denial of proof attack efficiently and the generated medication evidence cannot defend against counterfeit evidence generated from the hospital. That is, the hospital possesses enough privilege from the design of IS-RFID system to modify generated medication evidence whenever it is necessary. Hence, we design two lightweight RFID-based solutions for secure inpatient medication administration, one for online verification environment and the other for offline validation situation, to achieve system security on evidence generation and provide early detection on denial of proof attack.

  1. Radio Frequency Identification (RFID) technology and patient safety

    Science.gov (United States)

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors. PMID:24381626

  2. The Intelligent Video Playback System Based on RFID Technology

    Directory of Open Access Journals (Sweden)

    Jie Zeng

    2012-10-01

    Full Text Available With the rapid development of electronic information technology, traditional interpretation pattern in exhibition building and museum is developing towards digitization, information, intelligence, automation and multi functionality. A novel intelligent video playback system, which can be widely used in tourism and exhibition, is provided in this paper. The video playing system consists of radio frequency identification (RFID module and video playback module. The novel system integrates advanced RFID technology, embedded control technology, and video playing technology. The RFID module identifies visitors, and selects the language and other information. The main chip of the RFID module card reader is MF RC522 which is working in frequency bands of 13.56 MHz, and the microcontroller of the module is Atmega8. C programming language was used to program microcontroller in order to realize the function of automatically reading. The video playback module realizes the function of playing video files and controlling RFID module. On the hardware design of the video playback module, the S3C2440 chip with ARM920T core was selected as the main control chip. The video playback module was developed by WinCE developing platform. Related drivers and application software were developed to control card reader, select language and to play the video file. The intelligent video playback system has several advantages such as: good real-time property, high portability and easy in maintenance. The system has its application prospect in exhibition and tourism.

  3. 3-D transponder antennas for future SHF RFID applications

    Science.gov (United States)

    Zichner, R.; Baumann, R. R.

    2011-12-01

    The radio frequency identification (RFID) technology is omnipresent since a few years. Some of the most popular fields of application are the use for security tasks, for logistics and for the consumer segment. For example, chip card or key ring sized RFID transponders can allow wireless access to secured rooms. The number of applications for wireless data transmission for the identification and tracking of objects increases every year. There is a large development need for highly functional and inexpensive RFID transponders due to the ever-increasing demand on improved reliability, higher data rates and read and write ranges of the RFID systems. Therefore, research was performed on new 3-D transponder antennas for the Super High Frequency Band around 5.8 GHz. Additionally, wave propagation effects and the influence of different dielectric environments were considered. Parallel to the design of the novel antenna structures, the printing process for inexpensive manufacturing was investigated. The gained results are the basis for prospective RFID applications.

  4. RFID Data Loggers in Fish Supply Chain Traceability

    Directory of Open Access Journals (Sweden)

    Mira Trebar

    2013-01-01

    Full Text Available Radio frequency identification (RFID is an innovative and well-recognized technology that supports all kinds of traceability systems in many areas. It becomes very important in the food industry where the electronic systems are used to capture the data in the supply chain. Additionally, RFID data loggers with sensors are available to perform a cold chain optimization for perishable foods. This paper presents the temperature monitoring solution at the box level in the fish supply chain as part of the traceability system implemented with RFID technology. RFID data loggers are placed inside the box to measure the temperature of the product and on the box for measuring ambient temperature. The results show that the system is very helpful during the phases of storage and transportation of fish to provide the quality control. The sensor data is available immediately at the delivery to be checked on the mobile RFID reader and afterwards stored in the traceability systems database to be presented on a web to stakeholders and private consumers.

  5. Precise RFID localization in impaired environment through sparse signal recovery

    Science.gov (United States)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  6. Antón Perulero: Un cuento inédito de María Teresa León

    Directory of Open Access Journals (Sweden)

    Marina Bedia, Marta

    2002-12-01

    Full Text Available This article offers a short story, apparently unpublished, by Maria Teresa León: «Antón Perulero», wich was not collected in any book of stories. Probably written in Argentina, at the beginning of the 40's, it has been found in a notebook of this authoress, wich is kept in the National Library (Madrid. The story is destined to a readership of children, and its characters (Maricastaña, Mátalas Callando, Antón Perulero himself are taken from the world of proverbs, set phrases and children's songs; the interest in children's literature and in folklore had been present in Maria Teresa Leon's writing from its beginning.Este artículo presenta un cuento, al parecer inédito, de María Teresa León: «Antón Perulero», no recogido en ninguna de sus colecciones de relatos. Escrito probablemente en Argentina, a principios de los años 40, ha sido encontrado en un cuaderno manuscrito de la autora, que se conserva en la Biblioteca Nacional de Madrid. El relato está destinado al público infantil, y sus personajes (Maricastaña, Mátalas Callando o el propio Antón Perulero están extraídos del mundo de los refranes, las frases hechas y las canciones para niños; el interés por la literatura infantil y por el folklore había estado presente en la escritura de María Teresa León desde sus inicios.

  7. Overview of RFID technology and its applications in the food industry.

    Science.gov (United States)

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.

  8. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    Science.gov (United States)

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.

  9. The adoption and implementation of RFID technologies in healthcare: a literature review.

    Science.gov (United States)

    Yao, Wen; Chu, Chao-Hsien; Li, Zang

    2012-12-01

    Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use of RFID in healthcare/hospitals following a formal innovation-decision framework. We aim to identify the common applications, potential benefits, barriers, and critical success factors. Our study facilitates quick assessment and provides guidance for researchers and practitioners in adopting RFID in medical arenas. Many earlier adopters in healthcare found RFID to be functional and useful in such areas as asset tracking and patient identification. Major barriers to adoption include technological limitations, interference concerns, prohibitive costs, lack of global standards and privacy concerns. Better designed RFID systems with low cost and privacy issues addressed are needed to increase acceptance of RFID in healthcare.

  10. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    Science.gov (United States)

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  11. Design of loop antenna for near-field and far-field UHF RFID applications

    Directory of Open Access Journals (Sweden)

    Ms. Krupali Patil

    2016-02-01

    Full Text Available Radio-frequency-identification (RFID technology has received a lot of attention in warehouse, supply chain, industry, and commerce. As RFID deployment moves from pallet level to item level, it is necessary to identify and track objects by RFID tags at anytime and anywhere. Then, mobile RFID device has advantages in terms of cost, portability and wireless communication. By folded-dipole loop structure with parasitic element, a small antenna size can be achieved. The antenna with different parasitic element size can work on different UHF RFID bands. A novel type of radio frequency identification (RFID reader antenna is proposed for mobile ultrahigh frequency (UHF RFID device. Effects of geometrical length, effect of width of strip, effect of ground plane length on of the frequency verses S parameters and gain of antenna are analyzed.

  12. RFID 技术在逆向物流中的应用%Application of RFID in Reverse Logistics

    Institute of Scientific and Technical Information of China (English)

    管亚风; 陈琼

    2015-01-01

    Through the establishment of new inventory models, a study is conducted on the influence of ra-dio radio frequency identification RFID application on the returnable container management.Firstly, a brief overview of the use of RFID systems and related works on container management is presented.Sec-ondly, a model based on analysis is proposed.Then the profitability of a RFID-based container tracking system is assessed.Application of RFID container tracking system can reduce new container purchase, thus obtaining the optimal inventory.A numerical example confirms the necessity of using RFID container tracking system.%通过建立新的库存模型,研究了RFID的应用对回收容器管理的影响。首先对使用RFID系统的容器管理文献进行简要概述,然后,基于历史文献提出了本文模型,并分析了使用RFID系统的收益以及与成本的相关关系,发现应用RFID跟踪容器系统减少了新容器的采购数量,取得最优库存。通过算例证实了采用RFID容器跟踪系统的必要性。

  13. Teresa Andrés Zamora (1907-1946: el compromiso social y político como arma de cultura

    Directory of Open Access Journals (Sweden)

    Seguí i Francés, Romà

    2010-12-01

    Full Text Available La biografía de Teresa Andrés Zamora (Villalba de los Alcores, 1907- París, 1946 es un claro ejemplo de cómo el compromiso de una mujer republicana a través de la cultura se transformó en beligerancia política. Este artículo quiere mostrar una imagen de Teresa Andrés más profunda que la de una bibliotecaria que militó en el PCE, pretendiendo reconstruir su recorrido vital tanto en la faceta académica como profesional y política, con el objetivo de presentar una evolución que va desde su paso por la Residencia de Señoritas hasta su prematura muerte en París. Teresa Andrés Zamora representa una generación de mujeres republicanas que fue leal a la II República, trabajando incansablemente durante la Guerra Civil, y que padeció el exilio en una Francia ocupada.

  14. Robot Control System based on Web Application and RFID Technology

    Directory of Open Access Journals (Sweden)

    Barenji Ali Vatankhah

    2015-01-01

    Full Text Available This paper discusses an integration driven framework for enabling the RFID based identification of parts to perform robotic distributor operations in the random mix based parts control based on web application. The RFID technology senses newly arriving parts to be distribution robot, the robot is able to recognize them and perform cooperative distributing via web-based application. The developed web application control system is implemented in the educational robotic arm. RFID system sends real time information from parts to the web application and web based application makes a decision for control of the robot arm, controller of robot controls the robot as based on the decision from web application. The proposed control system has increases the reconfiguration and scalability of robot system.

  15. Miniaturized Blood Pressure Telemetry System with RFID Interface

    Directory of Open Access Journals (Sweden)

    Michele Caldara

    2016-08-01

    Full Text Available This work deals with the development and characterization of a potentially implantable blood pressure telemetry system, based on an active Radio-Frequency IDentification (RFID tag, International Organization for Standardization (ISO 15693 compliant. This approach aims to continuously measure the average, systolic and diastolic blood pressure of the small/medium animals. The measured pressure wave undergoes embedded processing and results are stored onboard in a non-volatile memory, providing the data under interrogation by an external RFID reader. In order to extend battery lifetime, RFID energy harvesting has been investigated. The paper presents the experimental characterization in a laboratory and preliminary in-vivo tests. The device is a prototype mainly intended, in a future engineered version, for monitoring freely moving test animals for pharmaceutical research and drug safety assessment purposes, but it could have multiple uses in environmental and industrial applications.

  16. Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems

    CERN Document Server

    Abyaneh, Mohammad Reza Sohizadeh

    2010-01-01

    Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems(UCS-RFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (nonce) secretly transmitted from a reader to tags. Our results show that, at the highest security level of the protocol (security parameter= 512), inferring a nonce is feasible with the probability of 0.99 by eavesdropping(observing) about 90 runs of the protocol. Finding a nonce enable a passive attacker to recover all five secret keys of the protocol. To do so, we propose a three-phase probabilistic approach in this paper. Our attack recovers the secret keys with a probability that increases by accessing to more protocol runs. We also show that tracing a tag using this protocol is also possible even with less runs of the protocol.

  17. Integrating RFID technique to design mobile handheld inventory management system

    Science.gov (United States)

    Huang, Yo-Ping; Yen, Wei; Chen, Shih-Chung

    2008-04-01

    An RFID-based mobile handheld inventory management system is proposed in this paper. Differing from the manual inventory management method, the proposed system works on the personal digital assistant (PDA) with an RFID reader. The system identifies electronic tags on the properties and checks the property information in the back-end database server through a ubiquitous wireless network. The system also provides a set of functions to manage the back-end inventory database and assigns different levels of access privilege according to various user categories. In the back-end database server, to prevent improper or illegal accesses, the server not only stores the inventory database and user privilege information, but also keeps track of the user activities in the server including the login and logout time and location, the records of database accessing, and every modification of the tables. Some experimental results are presented to verify the applicability of the integrated RFID-based mobile handheld inventory management system.

  18. Cryptanalysis and enhancement of two low cost rfid authentication protocols

    CERN Document Server

    Jannati, Hoda

    2012-01-01

    Widespread attention is recently paid upon RFID system structure considering its ease of deployment over an extensive range of applications. Due to its several advantages, many technical articles are published to improve its capabilities over specific system implementations. Recently, a lightweight anti-de-synchronization RFID authentication protocol and a lightweight binding proof protocol to guard patient safety are proposed. This contribution provides enough evidence to prove the first introduced protocol vulnerability to de-synchronization attack. It also provides the other protocol's suffering from de-synchronization attack as well as tracking the movements of the tags. This paper also addresses appropriate solutions to fix the security flaws concerning the two described protocols for secure RFID applications.

  19. An Authentication Protocol Based on Combined RFID-Biometric System

    Directory of Open Access Journals (Sweden)

    Mohamed Benmohammed

    2012-04-01

    Full Text Available Radio Frequency Identification (RFID and biometric technologies saw fast evolutions during the last years and which are used in several applications, such as access control. Among important characteristics in the RFID tags, we mention the limitation of resources (memory, energy, …. Our work focuses on the design of a RFID authentication protocol which uses biometric data and which confirms the secrecy, the authentication and the privacy. Our protocol requires a PRNG (Pseud-Random Number Generator, a robust hash function and Biometric hash function. The Biometric hash function is used to optimize and to protect biometric data. For Security analysis of protocol proposed, we will use AVISPA and SPAN tools to verify the authentication and the secrecy.

  20. A transportation security system applying RFID and GPS

    Directory of Open Access Journals (Sweden)

    Ruijian Zhang

    2013-03-01

    Full Text Available Purpose: This paper is about developing a centralized, internet based security tool which utilizes RFID and GPS technology to identify drivers and track the load integrity. Design/methodology/approach: The system will accomplish the security testing in real-time using the internet and the U.S. Customs’ database (ACE. A central database and the interfaces and communication between the database and ACE will be established. After the vehicle is loaded, all openings of the tanker are sealed with disposable RFID tag seals. Findings/value: An RFID reader and GPS tracker wirelessly connected with the databases will serve as testing grounds for the implementation of security measures that can help prevent future terrorist attacks and help in ensuring that the goods and products are not compromised while in transit. The system will also reduce the labor work of security check to its minimum. 

  1. A new specimen management system using RFID technology.

    Science.gov (United States)

    Shim, Hun; Uh, Young; Lee, Seung Hwan; Yoon, Young Ro

    2011-12-01

    The specimen management system with barcode needs to be improved in order to solve inherent problems in work performance. This study describes the application of Radio Frequency Identification (RFID) which is the solution for the problems associated with specimen labeling and management. A new specimen management system and architecture with RFID technology for clinical laboratory was designed. The suggested system was tested in various conditions such as durability to temperature and aspect of effective utilization of new work flow under a virtual hospital clinical laboratory environment. This system demonstrates its potential application in clinical laboratories for improving work flow and specimen management. The suggested specimen management system with RFID technology has advantages in comparison to the traditional specimen management system with barcode in the aspect of mass specimen processing, robust durability of temperature, humidity changes, and effective specimen tracking.

  2. Healthcare in Disasters and the Role of RFID.

    Science.gov (United States)

    Madanian, Samaneh; Parry, David; Norris, Tony

    2015-01-01

    Disasters either natural or man-made are inevitable, and therefore disaster management has always been an important function of government. Since during a disaster healthcare is often adversely affected, a lot of effort has been made in terms of researching effective responses and ways of improving the quality of delivered care to direct casualties and the rest of the community. In this regard, information technology plays an important role to help healthcare systems achieve this goal. One of these technologies that has become popular recently is Radio-Frequency Identification (RFID). This paper explores the relationship between emergency management and disaster healthcare and examines the role of RFID. It is suggested that RFID will become an integral part of disaster healthcare and a means of improving response performance.

  3. Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment

    CERN Document Server

    White, Jonathan

    2010-01-01

    Given its low dollar and maintenance cost, RFID is poised to become the enabling technology for inventory control and supply chain management. However, as an outcome of its low cost, RFID based inventory control is susceptible to pernicious security and privacy threats. A deleterious attack on such a system is corporate espionage, where attackers through illicit inventorying infer sales and restocking trends for products. In this paper, we first present plausible aftermaths of corporate espionage using real data from online sources. Second, to mitigate corporate espionage in a retail store environment, we present a simple lowcost system called Mirage. Mirage uses additional programmable low cost passive RFID tags called honeytokens to inject noise in retail store inven-torying. Using a simple history based algorithm that controls activation and de-activation of honeytokens, Mirage randomizes sales and restocking trends. We evaluate Mirage in a real warehouse environment using a commercial off-the-shelf Motoro...

  4. Object Authentication Using RFID Technology: A Multi-tag Approach

    Directory of Open Access Journals (Sweden)

    Subhasish Dhal

    2015-03-01

    Full Text Available Authentication is an important requirement in various applications to restrict the non-legitimate access to certain resources. Radio Frequency Identification (RFID technology helps to perform the authentication task. The detection probability of an object during the authentication process can be increased using multiple number of RFID tags in the object. However, many security risks such as eavesdropping, location privacy etc. are involved in this technology. This paper proposes a secure and lightweight authentication scheme assuming the objects are attached with multiple number of RFID tags. Proper analysis has been carried out to evaluate the security of the proposed scheme, including comparison with a few existing schemes in terms of computation, communication and storage requirements.

  5. ANALISIS DAN PERANCANGAN APLIKASI INVENTORI BERBASISKAN RFID PADA PT. ABC

    Directory of Open Access Journals (Sweden)

    Herwin

    2010-11-01

    Full Text Available The purpose of this research is to reduce the damaged material, applying the concept of FIFO for retrieval of row materials, and accelerate the search and also to simplify the detection of raw materials. Software development method used involves three main parts namely the method of analysis, design and literature. Analysis methods including survey of the running system, an analysis of survey findings, identify information needs, identify system requirements. The design method approach to Unified Modelling Language (UML. The results is an inventory application that uses Radio Frequency Identification (RFID tags as a replacement label where RFID tags can store data. Conclusions from this research is minimizing the companys financial losses due to storage of raw materials and minimizing time to search raw materials using RFID that also can provide actual and accurate information for the company.

  6. A RFID-based Campus Context-Aware Notification System

    CERN Document Server

    Haron, Nazleeni S; Hasan, Mohd H; Ariffin, Mazeyanti M; Aziz, Izzatdin A

    2010-01-01

    This paper presents the design and development of a context-aware notification system for university students using RFID technology. This system is leveraging on the student's matrix card as the RFID tag (sensor), RFID reader and server as the processors and screen monitor at the various locations in the campus as the actuator of the output. This system aims to deliver urgent notifications to the intended students immediately at their respective locations. In addition, the system is also able to display personalized information based on the students' preferences and current location when accessing the system. The background of the study, the design approaches for this system and the preliminary evaluation of the prototype are presented in this paper. The evaluation results have indicated that the the proposed system is useful and easy to use.

  7. RFID Presenter: A New Way to Feel a Talk

    Directory of Open Access Journals (Sweden)

    Jonathan Ruiz-de-Garibay

    2014-01-01

    Full Text Available RFID is a key which enables technology for the Internet of Things paradigm, allowing the virtualization of the physical objects into the Internet. There are uncountable applications whereby these connected objects can be a breakthrough for new business models, and this work shows a good example of that. We present the RFID Presenter as the evolution of a classical consumer electronic product to a novel connected Internet product with the addition of the RFID technology. It supposes a new way to manage the conference talks in a personalization way, improving the end-user interaction and providing services that were impossible before. The design, implementation, and validation of a real gadget are well explained in order to give a real example of how the Internet of Things can be integrated into daily objects and enhance the end-user experiences.

  8. Optimization of the Document Placement in the RFID Cabinet

    Directory of Open Access Journals (Sweden)

    Kiedrowicz Maciej

    2016-01-01

    Full Text Available The study is devoted to the issue of optimization of the document placement in a single RFID cabinet. It has been assumed that the optimization problem means the reduction of archivization time with respect to the information on all documents with RFID tags. Since the explicit form of the criterion function remains unknown, for the purpose of its approximation, the regression analysis method has been used. The method uses data from a computer simulation of the process of archiving data about documents. To solve the optimization problem, the modified gradient projection method has been used.

  9. Research on pipe welding information management system basedon RFID

    Directory of Open Access Journals (Sweden)

    Liu Xun

    2016-01-01

    Full Text Available This paper introduces the construction background, construction target and construction principle of the pipe welding management system based on RFID. Then, describes the specific requirements of the system. The basic principle and key technology of the system are introduced. The structure of the system (including the system design, the selections of handheld devices and high frequency passive RFID tags is described .Then the system management software designs (including software structure, the main functions of the management center system and the main functions of the handheld detection system are described in detail. Finally, the management system is implemented, and it is deployed to several Gas Co, which has chieved good results.

  10. RFID authentication protocol to enhance patient medication safety.

    Science.gov (United States)

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  11. Radio Frequency Identification (RFID) in healthcare: a literature review.

    Science.gov (United States)

    Kolokathi, Aikaterini; Rallis, Panagiotis

    2013-01-01

    Creating and maintaining a safe and high-quality health care environment is of great importance for global community. New technologies and their applications can help us achieve this goal. Radio-Frequency Identification (RIFD) technology is considered one of those technologies and even today there are some interesting deployments in the health industry. As a result, this work aims to present the basic idea behind RFID solutions, problems that can be addressed with the adoption of RFID and the benefits of relative applications.

  12. Design of a Secure RFID Authentication Scheme Preceding Market Transactions

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2011-01-01

    Full Text Available In recent years, as RFID reader equipment is ever more widely deployed in handled devices, the importance of security problems among RFID reader, tags and server have obviously gained increased attention. However, there are still many security issues preceding transactions; these issues are well worth discussing. In this paper, we propose a novel authentication scheme, conforming EPC C1G2 standards, at a low implementation cost for market application. In order to achieve mutual authentication, the proposed scheme integrates fingerprint biometrics, related cryptology and a hash function mechanism to ensure the security of the transmitted messages. The proposed scheme also can resist known attacks.

  13. RFID antenna design for circular polarization in UHF band

    Science.gov (United States)

    Shahid, Hamza; Khan, Muhammad Talal Ali; Tayyab, Umais; Irshad, Usama Bin; Alkhazraji, Emad; Javaid, Muhammad Sharjeel

    2017-05-01

    A miniature half cross dipole antenna for defense and aerospace RFID applications in UHF band is presented. The dipole printed line arms are half crossed shape on top of dielectric substrate backed by reactive impedance surface. The antenna fed by a coaxial cable at the gap separating the dipole arms. Our design is intended to work at 2.42 GHz for RFID readers. The radiation pattern obtained has HPBW of 112, return loss of 22.24 dB and 90 MHz bandwidth.

  14. Diseño de antenas UHF para aplicaciones RFID

    OpenAIRE

    Hernández Ripoll, José Vicente

    2009-01-01

    Aquest projecte es basa en l'estudi, disseny i avaluació d'antenes per a aplicacions RFID a la banda UHF. Les etiquetes RFID estan compostes per un xip i una antena que han de presentar una bona adaptació per a aconseguir màxima transferència de potència. Els dos objectius principals en els diferents fases de disseny de cada antena han estat optimitzar les seves dimensions, i incrementar l'ample de banda. Este proyecto se basa en el estudio, diseño y evaluación de antenas para aplicaciones...

  15. Control de acceso usando FPGA y RFID

    Directory of Open Access Journals (Sweden)

    Dora Luz Almanza Ojeda

    2012-10-01

    Full Text Available Este trabajo presenta el diseño e implementación de un sistema de control de acceso mediante Identificación por Radiofrecuencia (RFID, Radio Frequency Identification controlado por una Matriz de compuertas programables (FPGA, Field Programmable Gate Array. El sistema está constituido por un par de dispositivos de adquisición de radiofrecuencia, una FPGA, un juego de etiquetas y tarjetas pasivas de identificación. Mediante una interfaz gráfica de usuario es posible controlar todo movimiento dentro de una zona determinada, desde los accesos hasta la disponibilidad de equipo; utilizando los dispositivos de adquisición de radiofrecuencia se puede acceder a la información de los usuarios autorizados, así como al control del equipo. Con este sistema es posible monitorear, administrar y reportar todo acceso de personal, movimiento de equipo o plagio de manera eficiente y evitando un gran número de errores humanos.  

  16. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  17. Santa Paulina, reconquista a territorialidade

    OpenAIRE

    Nascimento, José do

    2006-01-01

    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Filosofia e Ciências Humanas. Programa de Pós-Graduação em História Esta dissertação trata de um estudo sobre a relação entre turismo e religiosidade a partir do estudo de caso do Santuário de Santa Paulina do Coração Agonizante de Jesus, em Nova Trento, no período de 1991 a 2005. Foi adotado o método de História Oral com a participação de diferentes atores, destacando-se os peregrinos ou passantes mais comumente de...

  18. Isolation and maintenance at Evonik using RFID technology; Freischaltung und Wartung mit Einsatz der RFID-Technologie bei Evonik

    Energy Technology Data Exchange (ETDEWEB)

    Rall, Hueseyin [Evonik Steag GmbH, Herne (Germany). Kraftwerksgruppe Ruhr-Ost; Stephan, Martin [Evonik Energy Services GmbH, Essen (Germany). Betriebsmanagement

    2010-07-01

    Work orders or permits of maintenance and/or control systems are partly dealt with manually. The benefit that is achieved by introducing mobile devices to display all required information at the work place will further be increased by use of the RFID-technology. This is achieved through better work assistance, reduced probability for errors and a significantly reduced amount of working hours. Evonik has developed several RFID-supported applications for mobile maintenance that support different backend-systems (e.g. SAP). This article concentrates on applications for work permit and maintenance that have been introduced at several power plant sites. (orig.)

  19. 2009 Santa Fe Bone symposium.

    Science.gov (United States)

    Lewiecki, E Michael; Bilezikian, John P; Laster, Andrew J; Miller, Paul D; Recker, Robert R; Russell, R Graham G; Whyte, Michael P

    2010-01-01

    Osteoporosis is a common skeletal disease with serious clinical consequences because of fractures. Despite the availability of clinical tools to diagnose osteoporosis and assess fracture risk, and drugs proven to reduce fracture risk, it remains a disease that is underdiagnosed and undertreated. When treatment is started, it is commonly not taken correctly or long enough to be effective. Recent advances in understanding of the regulators and mediators of bone remodeling have led to new therapeutic targets and the development of drugs that may offer advantages over current agents in reducing the burden of osteoporotic fractures. Many genetic factors that play a role in the pathogenesis of osteoporosis and metabolic bone disease have now been identified. At the 2009 Santa Fe Bone Symposium, held in Santa Fe, New Mexico, USA, the links between advances in genetics, basic bone science, recent clinical trials, and new and emerging therapeutic agents were presented and explored. Socioeconomic challenges and opportunities in the care of osteoporosis were discussed. This is a collection of medical essays based on key presentations at the 2009 Santa Fe Bone Symposium.

  20. Design and Implementation Of Hardware And Software Systems For Object Tracking Using RFID Technology

    Directory of Open Access Journals (Sweden)

    Dr. G.Venkateswara Rao

    2011-05-01

    Full Text Available Now a day’s mobile technology plays key role, in various environments identification of objects can be done manually, to improve the efficiency of an identification of objects we are using RFID tags. RFID tags track objects in supply chains, and are working their way into the pockets, belongings and even the bodies of consumers. Tag collision occurs while two or more than two tags deliver their unique identification (UID to the reader. Since collision, which would significantly affect the efficacy of RFID, has been one of the major study issues for RFID technology, we have developed a solution, bit competed algorithm (BCA, to solve the collision problem occurred in RFID system and consequently improve the efficacy of RFID .This paper briefly presents what are the components in RFID system, Architecture of a RFID system, what are the frequency ranges used in the RFID system and what are the problems occurred in the RFID system. Here we develop a system as a prototype for object identification. By using this technology objects can be tracks more efficiently, it provides more security, it save time and money.

  1. South Fork of the Santa Clara River, Santa Clarita Valley, California. Supplement.

    Science.gov (United States)

    1985-01-01

    Santa Eriodictyon trichocalyx Eucrypta Eucrypta chrysanthemifolia LAMIACEAE Purple Sage Salvia leucophylla PAEONIACEAE Peony Paeonia californica...Bush Lupine Lupinus ex-cubitus HYDROPHYLLACEAE Yerba Santa Eriodictyon trichocaLx Eucrypta Eucrypta chrysanthemifolia LAMIACEAE Purple Sage Salvia

  2. Entrevista: Teresa Ramos Interview: Teresa Ramos

    Directory of Open Access Journals (Sweden)

    2007-07-01

    Full Text Available A aula inaugural de Tereza Ramos, proferida no início do ano letivo na Escola Politécnica de Saúde Joaquim Venâncio/Fiocruz, no Rio de Janeiro, constituiu uma autêntica lição de participação política. Agente comunitário de saúde (ACS desde 1978, atualmente Tereza é a presidente da Confederação Nacional de Agentes Comunitários de Saúde, que reúne as federações estaduais, abrangendo dez estados brasileiros, algumas anteriores ao Programa de Agentes Comunitários de Saúde (Pacs. Nesta entrevista¹, concedida um dia antes da palestra, Tereza conta um pouco sobre a luta protagonizada pelos agentes comunitários de saúde em busca de 'desprecarização' de seu trabalho. Essa luta culminou na edição da emenda constitucional nº 51, de fevereiro de 2006, e da lei 11.350, de outubro de 2006, que regulamenta a emenda, marcos legais de amparo à profissão de agente comunitário de saúde e exemplo de exercício de cidadania de Tereza e do grupo de ACS liderado por ela. Militante histórica do setor saúde, que cruzou o caminho de Sergio Arouca na VIII Conferência Nacional de Saúde, também opina sobre a formação que os ACS vêm recebendo em curso técnico. Essa formação é considerada fundamental, junto com a 'desprecarização' dos vínculos e a regularização do acesso, para a efetiva profissionalização e reconhecimento dos direitos desses trabalhadores.The inaugural class given by Tereza Ramos to kick the school year off at the Joaquim Venâncio/Fiocruz Polytechnic Health School, in Rio de Janeiro, was a genuine lesson in political participation. A community health agent (CHA since 1978, Tereza is currently the president of the National Community Health Agent Confederation, which brings state federations from ten Brazilian states, a few of which existed before the Community Health Agent Program (CHAP, together. In this interview, granted a day before the lecture, Tereza talks a little about the community health agents' battle in search of reducing the precarious nature of their work. This battle culminated in constitutional amendment number 51, dated February 2006, and in law 11.350, dated October 2006, which regulates the amendment, the legal guidelines that support the community health agent's profession and is an example of the exercise of citizenship not only by Tereza, but of the group of CHAs she leads. A historical heath sector militant, who crossed paths with Servio Arouca in the 8th National Health Conference, Tereza also opines on the training the CHAs have been getting in technical courses. This training is considered as vitally important, alongside the elimination of the precarious nature of job ties and regularizing access, for these workers' actual professionalization and to the acknowledgement of their rights.

  3. The Value of RFID Technology Enabled Information to Manage Perishables

    NARCIS (Netherlands)

    M.E. Ketzenberg (Michael); J.M. Bloemhof-Ruwaard (Jacqueline)

    2009-01-01

    textabstractWe address the value of RFID technology enabled information to manage perishables in the context of a supplier that sells a random lifetime product subject to stochastic demand and lost sales. The product's lifetime is largely determined by the time and temperature history in the supply

  4. The Value of RFID Technology Enabled Information to Manage Perishables

    NARCIS (Netherlands)

    M.E. Ketzenberg (Michael); J.M. Bloemhof-Ruwaard (Jacqueline)

    2009-01-01

    textabstractWe address the value of RFID technology enabled information to manage perishables in the context of a supplier that sells a random lifetime product subject to stochastic demand and lost sales. The product's lifetime is largely determined by the time and temperature history in the supply

  5. Multiresonator-Based Chipless RFID Barcode of the Future

    CERN Document Server

    Preradovic, Stevan

    2012-01-01

    This vital new resource offers engineers and researchers a window on important new technology that will supersede the barcode and is destined to change the face of logistics and product data handling. In the last two decades, radio-frequency identification has grown fast, with accelerated take-up of RFID into the mainstream through its adoption by key users such as Wal-Mart, K-Mart and the US Department of Defense. RFID has many potential applications due to its flexibility, capability to operate out of line of sight, and its high data-carrying capacity. Yet despite optimistic projections of a market worth $25 billion by 2018, potential users are concerned about costs and investment returns. Clearly demonstrating the need for a fully printable chipless RFID tag as well as a powerful and efficient reader to assimilate the tag’s data, this book moves on to describe both. Introducing the general concepts in the field including technical data, it then describes how a chipless RFID tag can be made using a planar...

  6. RFID Reader Anticollision Protocols for Dense and Mobile Deployments

    Directory of Open Access Journals (Sweden)

    Abdoul Aziz Mbacke

    2016-11-01

    Full Text Available The rapid development of RFID (Radio Frequency IDentification technology has allowed its large adoption and led to increasing deployments of RFID solutions in diverse environments under varying scenarios and constraints. The nature of these constraints ranges from the amount to the mobility of the readers deployed, which in turn highly affects the quality of the RFID system, causing reading collisions. Although several solutions were proposed to engage the issue of reading collision, few were ever concerned with the densification and/or mobility of readers. This paper proposes two distributed TDMA (Time Division Multiple Access approaches designed to reduce these collisions through local coordination between neighboring devices for different scenarios tested here. The first proposal is based on a reservation phase organized between readers with different priority levels given to readers depending on their previous success. The second one takes advantage of the particular case of RFID collisions, allowing a local and mutual decision of each reader to access or not tags in their vicinity. Simulations were run over different stressful environments in terms of tag/reader density and mobility, proving that our proposals achieved the best performance in terms of throughput, collision avoidance and coverage delay when compared to other collision reducing schemes.

  7. Two RFID standard-based security protocols for healthcare environments.

    Science.gov (United States)

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  8. Invoering van RFID : De bibliotheekcollectie geïdentificeerd

    NARCIS (Netherlands)

    den Hollander, Frank; Bokdam, Gert Jan

    2016-01-01

    De nieuwe ontwikkelingen in de Universiteitsbibliotheek volgen elkaar in snel tempo op. Parallel aan de grootscheepse renovatie van het UB-gebouw, wordt bijvoorbeeld ook een nieuw identificatiesysteem voor de collectie ingevoerd, op basis van RFID. Pictogram sprak met Teijo Doornkamp over het projec

  9. Exploiting phase measurements of EPC Gen2 RFID tags

    NARCIS (Netherlands)

    Huiting, J.; Flisijn, Hubert; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2013-01-01

    This paper presents a 2d localization system for UHF RFID tags. By measuring the phase between the transmitted continuous wave and received backscatter from the tag at different frequencies, it is possible to estimate the distance between the reader and tag. By determining distance estimates to thre

  10. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  11. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    Science.gov (United States)

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  12. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  13. Implementation of RFID Technology in University of Pune Library

    Science.gov (United States)

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  14. Interaktion mit RFID Ausleih- und Rückgabeautomaten

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Heyroth, Melanie; Klingbeil, Karin

    2011-01-01

    Der Artikel untersucht mittels Beobachtung die Interaktion zwischen RFID-Ausleih- und Rückgabeautomaten sowie Bibliotheksbenutzern in vier deutschen Bibliotheken. Die Ergebnisse belegen, dass die Interaktion grundsätzlich funktioniert. Die Benutzer zeigten Gelassenheit und Routine im Umgang mit den...

  15. RFID Technology Implementation in Two Libraries in New Delhi

    Science.gov (United States)

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  16. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    Science.gov (United States)

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  17. Potential of RFID Systems to Detect Object Orientation

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2011-01-01

    In this paper we present a novel method for estimating the inclination of passive UHF RFID tags, for use in supply chains to monitor the handling of tagged items. Based on observations of the polarization, a Bayesian estimator of the tag inclination is constructed. The Bayesian estimator has been...

  18. Applicability of RFID in the prognostics of logistic systems

    NARCIS (Netherlands)

    Lopez De La Cruz, A.M.; Veeke, H.P.M.; Lodewijks, G.

    2007-01-01

    The objective of this paper is to investigate the applicability of RFID in prognostic logistics. Starting from a general introduction of prognostic logistics, the system structure, and technical requirements are discussed. Based on this discussion the issues and concerns regarding the applicability

  19. Invoering van RFID : De bibliotheekcollectie geïdentificeerd

    NARCIS (Netherlands)

    den Hollander, Frank; Bokdam, Gert Jan

    2016-01-01

    De nieuwe ontwikkelingen in de Universiteitsbibliotheek volgen elkaar in snel tempo op. Parallel aan de grootscheepse renovatie van het UB-gebouw, wordt bijvoorbeeld ook een nieuw identificatiesysteem voor de collectie ingevoerd, op basis van RFID. Pictogram sprak met Teijo Doornkamp over het projec

  20. Students Attendance Management System Based On RFID And Fingerprint Reader

    Directory of Open Access Journals (Sweden)

    Moth Moth Myint Thein

    2015-07-01

    Full Text Available Abstract Today students class attendance is become more important part for any organizationsinstitutions. The conventional method of taking attendance by calling names or signing on paper is very time consuming and insecure hence inefficient. This paper presents the manual students attendance management into computerized system for convenience or data reliability. So the system is developed by the integration of ubiquitous computing systems into classroom for managing the students attendance using RFID and fingerprint reader. The system is designed to implement an attendance management system based on RFID and fingerprint reader which students need to use their student identification card ID and their finger ID to success the attendance where only authentic student can be recorded the attendance during the class. In this system passive RFID tag and reader pairs are used to register the student ID cards individually and fingerprint reader is used for attendance. This system takes attendance electronically with the help of the RFID and finger print device and the records of the attendance are stored in a database. Students roll call percentages and their details are easily seenvia Graphical User Interface GUI. This system will have the required databases for students attendance teachers subjects and students details. This application is implemented by Microsoft Visual Studio and Microsoft SQL Server as IDE. C language is used to implement this system.

  1. Applicability of RFID in the prognostics of logistic systems

    NARCIS (Netherlands)

    Lopez De La Cruz, A.M.; Veeke, H.P.M.; Lodewijks, G.

    2007-01-01

    The objective of this paper is to investigate the applicability of RFID in prognostic logistics. Starting from a general introduction of prognostic logistics, the system structure, and technical requirements are discussed. Based on this discussion the issues and concerns regarding the applicability

  2. Exploiting phase measurements of EPC Gen2 RFID tags

    NARCIS (Netherlands)

    Huiting, J.; Flisijn, Hubert; Kokkeler, Andre B.J.; Smit, Gerardus Johannes Maria

    2013-01-01

    This paper presents a 2d localization system for UHF RFID tags. By measuring the phase between the transmitted continuous wave and received backscatter from the tag at different frequencies, it is possible to estimate the distance between the reader and tag. By determining distance estimates to

  3. Invoering van RFID : De bibliotheekcollectie geïdentificeerd

    NARCIS (Netherlands)

    den Hollander, Frank; Bokdam, Gert Jan

    De nieuwe ontwikkelingen in de Universiteitsbibliotheek volgen elkaar in snel tempo op. Parallel aan de grootscheepse renovatie van het UB-gebouw, wordt bijvoorbeeld ook een nieuw identificatiesysteem voor de collectie ingevoerd, op basis van RFID. Pictogram sprak met Teijo Doornkamp over het

  4. Interaktion mit RFID Ausleih- und Rückgabeautomaten

    DEFF Research Database (Denmark)

    Greifeneder, Elke; Heyroth, Melanie; Klingbeil, Karin

    2011-01-01

    Der Artikel untersucht mittels Beobachtung die Interaktion zwischen RFID-Ausleih- und Rückgabeautomaten sowie Bibliotheksbenutzern in vier deutschen Bibliotheken. Die Ergebnisse belegen, dass die Interaktion grundsätzlich funktioniert. Die Benutzer zeigten Gelassenheit und Routine im Umgang mit den...

  5. Traceability System For Agricultural Productsbased on Rfid and Mobile Technology

    Science.gov (United States)

    Sugahara, Koji

    In agriculture, it is required to establish and integrate food traceability systems and risk management systems in order to improve food safety in the entire food chain. The integrated traceability system for agricultural products was developed, based on innovative technology of RFID and mobile computing. In order to identify individual products on the distribution process efficiently,small RFID tags with unique ID and handy RFID readers were applied. On the distribution process, the RFID tags are checked by using the readers, and transit records of the products are stored to the database via wireless LAN.Regarding agricultural production, the recent issues of pesticides misuse affect consumer confidence in food safety. The Navigation System for Appropriate Pesticide Use (Nouyaku-navi) was developed, which is available in the fields by Internet cell-phones. Based on it, agricultural risk management systems have been developed. These systems collaborate with traceability systems and they can be applied for process control and risk management in agriculture.

  6. Indoor Navigation Design Integrated with Smart Phones and Rfid Devices

    Science.gov (United States)

    Ortakci, Y.; Demiral, E.; Atila, U.; Karas, I. R.

    2015-10-01

    High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification) device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  7. INDOOR NAVIGATION DESIGN INTEGRATED WITH SMART PHONES AND RFID DEVICES

    Directory of Open Access Journals (Sweden)

    Y. Ortakci

    2015-10-01

    Full Text Available High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  8. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    Science.gov (United States)

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  9. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    Science.gov (United States)

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  10. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  11. Analysis of Supply Chain Network Using RFID Technique with Hybrid Algorithm

    CERN Document Server

    Suresh, P

    2010-01-01

    Radio Frequency IDentification (RFID) is a dedicated short range communication technology. The term RFID is used to describe various technologies that use radio waves to automatically identify people or objects. RFID is a method of remotely storing and retrieving data using RFID tag. Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for consumer goods, apparel, and pharmaceutical manufacturers, as well as retailers and government procurement agencies. RFID technology is used today in many applications, including security and access control, transportation and supply chain tracking. Supply Chain Management (SCM) is now at the centre stage of Manufacturing and service organizations. According to the strategies in markets, supply chains and logistics are naturally being modelled as distributed systems. The economic importance has motivated both private companies and academic researchers to pursue the use of operati...

  12. A Novel Application of RFID in Hospitals for Involuntary Administering to Incorporate Authentication and Tracking

    OpenAIRE

    2014-01-01

    Today many hospitals use RFID system to monitor the health records for patient to update the patient information to doctors and patients relatives. In this system Customers can view and update their personal medical information via the web site, which seamlessly sync with one another. RFID is a total system, as opposed to a single product. It provides electronic identity to any object. Electronic information about the object is stored in RFID chip embedded of attached to the o...

  13. Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care

    OpenAIRE

    2013-01-01

    In recent years, many researches have demonstrated several RFID-based solutions to enhance patient medication safety and avoid human errors. Although RFID-based procedure is more efficient than traditional process, patient’s information may be attacked (or stolen) during the data transmission period. This will cause inappropriate medication use and medical errors. In this paper, we introduce a robust RFID-based e-Health system which strengthens the system security and protects the patient’s p...

  14. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Defense Microelectronics Activity (DMEA)

    Science.gov (United States)

    2011-12-01

    process must be considered. Whereas barcodes are read upon direct interaction with a scanner , RFID tags transmit sometimes indiscriminately. This can...grouped in the category of automatic identification technologies, along with barcodes , magnetic stripes, smart cards and biometrics. RFID uses...DISADVANTAGES The main rival technology to RFID is barcoding , which is very cheap, easy to use, and can have a high return on investment if the

  15. RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis

    Science.gov (United States)

    Zhang, Min; Li, Peichong

    Agri-food supply chain management (SCM), a management method to optimize internal costs and productivities, has evolved as an application of e-business technologies. These days, RFID has been widely used in many fields. In this paper, we analyze the characteristics of agri-food supply chain. Then the disadvantages of RFID are discussed. After that, we study the application strategies of RFID based on benefit and safety degree.

  16. Far-Field Testing Method of Spurious Emission Produced by HF RFID

    OpenAIRE

    Nikola Gvozdenovic; Ralph Prestros; Mecklenbräuker, Christoph F.

    2016-01-01

    We present measurements of spurious emission produced by high-frequency radio frequency identification (HF RFID) using carrier frequency of 13.56 MHz. HF RFID tags produce unwanted emission due to rectification and more generally due to nonlinearity of analog front end. Depending on the conducting material of an HF RFID coil and surrounding dielectric material, the coil behaves as more or less good antenna on some harmonic frequencies. Exact characterization and analysis of unwanted emission ...

  17. METHODOLOGY FOR THE DEVELOPMENT OF RFID VALUE ADDED SERVICES TO IMPROVE SUPPLY CHAIN OPERATIONS

    OpenAIRE

    Sobottka, Thomas; Leitner, René; Sihn, Wilfried

    2012-01-01

    Despite the potential of RFID technologies to improve supply chain operations and control, RFID projects – especially in production heavy sectors – are often restricted to basic recognition functionalities, leaving much of the vast potential to improve supply chain operations and control unharnessed. This paper aims at providing a procedure to identify advanced value added services based on the RFID technology, tailor made to companies’ specific requirements. Considering all relevant processe...

  18. Využívání RFID v logistice

    OpenAIRE

    Skála, Michal

    2011-01-01

    The Bachelor thesis focuses on two best-known technology automatic identification, barcodes and radio freguency identification (RFID). The goal is to acquaint readers with these technologies and describe a possible procedure implementating RFID to logistics warehouse. At the beginning of the work are presented theoretical information, that are important to understand these technologies. Using practical experience I am trying to outline the introduction of RFID to logistics warehouse. The main...

  19. The Design of Food Storage Guided Vehicle System Based on RFID Technology

    Directory of Open Access Journals (Sweden)

    Rui Xue

    2015-08-01

    Full Text Available According to the characteristics of the food transport system, RFID technology is integrated in the AGV automatic guided vehicle system in the food warehousing. The node RFID oriented method is chosen and the RFID note positioning function is used to realize more types and over horizon identification loading, handling and automatic storage function that improves the system flexibility through the design of tag oriented system.

  20. A Survey of RFID Authentication Protocols Based on Hash-Chain Method

    CERN Document Server

    Syamsuddin, Irfan; Chang, Elizabeth; Han, Song; 10.1109/ICCIT.2008.314

    2010-01-01

    Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

  1. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWER PLANT-DERIVED PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette C. Rohr; Petros Koutrakis; John Godleski

    2011-03-31

    Determining the health impacts of different sources and components of fine particulate matter (PM2.5) is an important scientific goal, because PM is a complex mixture of both inorganic and organic constituents that likely differ in their potential to cause adverse health outcomes. The TERESA (Toxicological Evaluation of Realistic Emissions of Source Aerosols) study focused on two PM sources - coal-fired power plants and mobile sources - and sought to investigate the toxicological effects of exposure to realistic emissions from these sources. The DOE-EPRI Cooperative Agreement covered the performance and analysis of field experiments at three power plants. The mobile source component consisted of experiments conducted at a traffic tunnel in Boston; these activities were funded through the Harvard-EPA Particulate Matter Research Center and will be reported separately in the peer-reviewed literature. TERESA attempted to delineate health effects of primary particles, secondary (aged) particles, and mixtures of these with common atmospheric constituents. The study involved withdrawal of emissions directly from power plant stacks, followed by aging and atmospheric transformation of emissions in a mobile laboratory in a manner that simulated downwind power plant plume processing. Secondary organic aerosol (SOA) derived from the biogenic volatile organic compound {alpha}-pinene was added in some experiments, and in others ammonia was added to neutralize strong acidity. Specifically, four scenarios were studied at each plant: primary particles (P); secondary (oxidized) particles (PO); oxidized particles + secondary organic aerosol (SOA) (POS); and oxidized and neutralized particles + SOA (PONS). Extensive exposure characterization was carried out, including gas-phase and particulate species. Male Sprague Dawley rats were exposed for 6 hours to filtered air or different atmospheric mixtures. Toxicological endpoints included (1) breathing pattern; (2) bronchoalveolar lavage

  2. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWER PLANT-DERIVED PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette C. Rohr; Petros Koutrakis; John Godleski

    2011-03-31

    Determining the health impacts of different sources and components of fine particulate matter (PM2.5) is an important scientific goal, because PM is a complex mixture of both inorganic and organic constituents that likely differ in their potential to cause adverse health outcomes. The TERESA (Toxicological Evaluation of Realistic Emissions of Source Aerosols) study focused on two PM sources - coal-fired power plants and mobile sources - and sought to investigate the toxicological effects of exposure to realistic emissions from these sources. The DOE-EPRI Cooperative Agreement covered the performance and analysis of field experiments at three power plants. The mobile source component consisted of experiments conducted at a traffic tunnel in Boston; these activities were funded through the Harvard-EPA Particulate Matter Research Center and will be reported separately in the peer-reviewed literature. TERESA attempted to delineate health effects of primary particles, secondary (aged) particles, and mixtures of these with common atmospheric constituents. The study involved withdrawal of emissions directly from power plant stacks, followed by aging and atmospheric transformation of emissions in a mobile laboratory in a manner that simulated downwind power plant plume processing. Secondary organic aerosol (SOA) derived from the biogenic volatile organic compound {alpha}-pinene was added in some experiments, and in others ammonia was added to neutralize strong acidity. Specifically, four scenarios were studied at each plant: primary particles (P); secondary (oxidized) particles (PO); oxidized particles + secondary organic aerosol (SOA) (POS); and oxidized and neutralized particles + SOA (PONS). Extensive exposure characterization was carried out, including gas-phase and particulate species. Male Sprague Dawley rats were exposed for 6 hours to filtered air or different atmospheric mixtures. Toxicological endpoints included (1) breathing pattern; (2) bronchoalveolar lavage

  3. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWER PLANT-DERIVED PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2005-09-30

    This report documents progress made on the subject project during the period of March 1, 2005 through August 31, 2005. The TERESA Study is designed to investigate the role played by specific emissions sources and components in the induction of adverse health effects by examining the relative toxicity of coal combustion and mobile source (gasoline and/or diesel engine) emissions and their oxidative products. The study involves on-site sampling, dilution, and aging of coal combustion emissions at three coal-fired power plants, as well as mobile source emissions, followed by animal exposures incorporating a number of toxicological endpoints. The DOE-EPRI Cooperative Agreement (henceforth referred to as ''the Agreement'') for which this technical progress report has been prepared covers the performance and analysis of field experiments at the first TERESA plant, located in the Upper Midwest and henceforth referred to as Plant 0, and at two additional coal-fired power plants (Plants 1 and 2) utilizing different coal types and with different plant configurations. During this reporting period, fieldwork was completed at Plant 1, located in the Southeast. Stage I toxicological assessments were carried out in normal Sprague-Dawley rats, and Stage II assessments were carried out in a compromised model (myocardial infarction-MI-model). Normal rats were exposed to the following atmospheric scenarios: (1) primary particles; (2) oxidized emissions; (3) oxidized emissions + secondary organic aerosol (SOA)--this scenario was repeated; and (4) oxidized emissions + ammonia + SOA. Compromised animals were exposed to oxidized emissions + SOA (this scenario was also conducted in replicate). Stage I assessment endpoints included breathing pattern/pulmonary function; in vivo chemiluminescence (an indicator of oxidative stress); blood cytology; bronchoalveolar lavage (BAL) fluid analysis; and histopathology. Stage II assessments included continuous ECG monitoring via

  4. TOXICOLOGICAL EVALUATION OF REALISTIC EMISSIONS OF SOURCE AEROSOLS (TERESA): APPLICATION TO POWER PLANT-DERIVED PM2.5

    Energy Technology Data Exchange (ETDEWEB)

    Annette Rohr

    2006-03-31

    This report documents progress made on the subject project during the period of September 1, 2005 through February 28, 2006. The TERESA Study is designed to investigate the role played by specific emissions sources and components in the induction of adverse health effects by examining the relative toxicity of coal combustion and mobile source (gasoline and/or diesel engine) emissions and their oxidative products. The study involves on-site sampling, dilution, and aging of coal combustion emissions at three coal-fired power plants, as well as mobile source emissions, followed by animal exposures incorporating a number of toxicological endpoints. The DOE-EPRI Cooperative Agreement (henceforth referred to as ''the Agreement'') for which this technical progress report has been prepared covers the performance and analysis of field experiments at the first TERESA plant, located in the Upper Midwest and henceforth referred to as Plant 0, and at two additional coal-fired power plants (Plants 1 and 2) utilizing different coal types and with different plant configurations. During this reporting period, data processing and analyses were completed for exposure and toxicological data collected during the field campaign at Plant 1, located in the Southeast. To recap from the previous progress report, Stage I toxicological assessments were carried out in normal Sprague-Dawley rats, and Stage II assessments were carried out in a compromised model (myocardial infarction-MI-model). Normal rats were exposed to the following atmospheric scenarios: (1) primary particles; (2) oxidized emissions; (3) oxidized emissions + SOA--this scenario was repeated; and (4) oxidized emissions + ammonia + SOA. Compromised animals were exposed to oxidized emissions + SOA (this scenario was also conducted in replicate). Mass concentrations in exposure atmospheres ranged from 13.9 {micro}g/m{sup 3} for the primary particle scenario (P) to 385 {micro}g/m{sup 3} for one of the oxidized

  5. The “Truth about White Slavery”. Présentation d’une enquête réalisée par Teresa Billington-Greig pour The English Review (juin 1913 The “Truth about White Slavery”. Presentation of an Investigation carried out by Teresa Billington-Greig for The English Review (June 1913

    Directory of Open Access Journals (Sweden)

    Christine Machiels

    2011-02-01

    Full Text Available En 1913, une féministe anglaise, Teresa Billington-Greig, publie dans The Eng­lish Review les résultats d’une enquête qu’elle a réalisée sur la traite des blan­ches. Alors que cette question suscite une agitation exceptionnelle (moral panic, sa recherche fait, à bien des égards, et au vu de la littérature de l’épo­que, figure d’exception. Symbole de toutes les angoisses d’une société victo­rienne en pleine mutation, la traite suscite de grandes émotions, auxquelles Teresa Billington-Greig oppose une réflexion basée sur l’étude des faits et la critique. Par son travail d’investigation inédit, qui répond aux critères de la re­cherche empirique, elle plaide plus largement pour une science sociale au ser­vice des réformes.In 1913, an English feminist, Teresa Billington-Greig, published the results of an enquiry she carried out on white slavery in The English Review. Whereas the question gave rise to moral panic, her research was, in many regards, and compared to the literature of the time, exceptional. The very symbol of all the anxieties of a Victorian society undergoing major changes, white slavery gave rise to high emotions, which Teresa Billington-Greig countered by reflection based on her study of the facts and criticism. By her unprecedented investigational work, which meets the criteria of empirical research, she launched a wider plea for a social science at the service of reforms.

  6. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    Directory of Open Access Journals (Sweden)

    Herman Vermaak

    2012-03-01

    Full Text Available Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach.

  7. The Improvement of RFID Authentication Protocols Based on R-RAPSE

    Directory of Open Access Journals (Sweden)

    QingLing Cai

    2014-01-01

    Full Text Available Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. We had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not offer sufficient security and privacy protection, and thereafter, proposes relevant solutions to fix the security holes based on R-RAPSE, which demonstrates how R-RAPSE can be used to verify and improve RFID authentication protocols.

  8. Exploring the Limitations on RFID Technology in Traceability Systems at Beverage Factories

    Directory of Open Access Journals (Sweden)

    Isabel Expósito

    2013-01-01

    Full Text Available The application of RFID in traceability of products in beverage factories is analyzed in terms of the electromagnetic conditions defined by the massive presence of metallic elements and liquids. Various experiments are reported to determine the maximum reading range from RFID tags installed on tanks or to read RFID information around bottles, both empty and full of wine, trying to put in context the possible problems that could appear when installing an RFID-based traceability system within a winery, a brewery, or any other beverage factory.

  9. Advancement in RFID security by proposed framework utilizing Random bit generator and sensor network

    Directory of Open Access Journals (Sweden)

    Rohit Sharma

    2015-09-01

    Full Text Available As we realize that, progression in innovation needs the progressions in security. The development of RFID innovation expands step by step. To give security to the RFID framework, new approach or new thoughts we require in the field of security. The fundamental thought of my examination is to coordinate RFID and Sensor innovation to assemble a keen RFID security framework. Two situations of mix have been executed. In the first, we not expanded the read scope of the RFID system by adding wireless facility to RFID reader. Each RFID reader is furnished with a few sensors modules which can transmit information to and from the reader. RFID reader goes about as sensor hub: it receives the distinguishing proof of an item and sends it to the host application through sensor system. The second situation of reconciliation furnishes RFID readers with detecting capacity [1]. A few movement sensors are introduced close to every reader to identify the vicinity of a labeled article and to charge the reader action.

  10. A Proposal of a Novel RFID Tag with Biomedical Signal Sensing Functions

    Science.gov (United States)

    Nakajima, Akira; Inoue, Takahiro; Tsuneda, Akio

    A novel RFID tag with sensing functions of biomedical signals is proposed in this paper. This RFID tag is developed for sensing heart rate, respiration, and body temperature of a human, which is intended for a secure and intensive health care of humans at hospital or at home. The features of this RFID tag are identification of indivisuals by ID call and collation, on-demand measurement of vital signals, and a medium-range(RFID tag works at ±1.5V supply voltage, and it was implemented on a PCB attached to a belt. Its performances were confirmed with experiments.

  11. A Novel Application of RFID in Hospitals for Involuntary Administering to Incorporate Authentication and Tracking

    Directory of Open Access Journals (Sweden)

    A.Mohamed Syed Ali

    2014-03-01

    Full Text Available Today many hospitals use RFID system to monitor the health records for patient to update the patient information to doctors and patients relatives. In this system Customers can view and update their personal medical information via the web site, which seamlessly sync with one another. RFID is a total system, as opposed to a single product. It provides electronic identity to any object. Electronic information about the object is stored in RFID chip embedded of attached to the object. With an RFID reader the electronic identity can be read wirelessly. We have analyzed completely about the various applications of the RFID and we have come to a conclusion that the RFID can be effectively implemented in the hospitals to manage and monitor various systems of the hospitals automatically. This project is too costly to be implemented now, but the rates of the RFID accessories are expected to come down in the near future. For this automated administering the project needs a Central Monitoring Unit which we have decided to be controlled by software made in a high level language (C. For the reference of the reader we have attached the implementation files with this paper. This paper explains the basics of RFID, its working and our contribution towards RFID.

  12. SOA-based RFID public services infrastructure: architecture and its core services

    Institute of Scientific and Technical Information of China (English)

    Zeng Junfang; Li Ran; Luo Jin; Liu Yu

    2009-01-01

    Radio frequency identification (RFID) has prominent advantages compared with other auto-identification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.

  13. RFID of next generation network for enhancing customer relationship management in healthcare industries.

    Science.gov (United States)

    Alzahrani, Ahmed; Qureshi, Muhammad Shuaib; Thayananthan, Vijey

    2017-07-25

    This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in healthcare industries. Customer relationship and its management techniques in a specific healthcare industry are considered in this development. The key objective of using NGN-RFID scheme is to enhance the handling of patients' data to improve the CRM efficiency in healthcare industries. The proposed NGN-RFID system is one of the valid points to improve the ability of CRM by analyzing different prior and current traditional approaches. The legacy of customer relationship management will be improved by using this modern NGN-RFID technology without affecting the novelty.

  14. Cryptanalysis of two mutual authentication protocols for low-cost RFID

    CERN Document Server

    Habibi, Mohammad Hassan; Alaghband, Mahdi R; 10.5121/ijdps.2011.2109

    2011-01-01

    Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.

  15. Research on RFID technology in medical temperature measurement system and anti-collision

    Science.gov (United States)

    Zhao, Wenge

    2012-04-01

    RFID is a new technology developed in the nineties, using the wireless technology to achieve the non-contact data reading. It has a great advantage compared with traditional technology in reading data by wireless. And it is widely used in transportation, material management system, and medical areas etc. In this paper, it mainly introduces the RFID application in the field of medical temperature measurement system which can real-timely get and trace patient's temperature. Firstly, it introduces the structure of RFID, and then study and realizes the patient's temperature gathering and storage, lastly, realizing the RFID anti-collision algorithm.

  16. Application of RFID in inventory management about experimental equipment%RFID 在实验设备库存管理中的应用研究

    Institute of Scientific and Technical Information of China (English)

    王艳; 孟勤; 刘昕; 王睿

    2015-01-01

    为了提高实验设备库存管理的工作效率和资源的合理化配置水平,对射频识别技术(RFID)在实验设备库存管理中的应用进行了研究。首先,对基于 RFID 的实验设备库存管理业务流程进行了分析与优化,接着,设计了基于 B/S 与 C/S 分层混合结构的 RFID 实验设备库存管理系统总体架构,然后,提出了 RFID 系统与现有实验设备库存管理系统的集成方案,最后,采用多读头单工作站网络系统模型完成对 RFID 数据采集系统的实施部署,并成功地应用于吉林大学实验设备管理中心。实践结果表明,RFID 系统的应用极大地提高了管理效率和设备资源的利用率。%In order to improve the efficiency of inventory management about the experimental equipment,the application of radio frequency identification (RFID)technology in inventory management is researched.First, the business process of the inventory management is analyzed and optimized based on RFID.Then,the overall architecture of layered hybrid structures about RFID inventory management system is designed based on C/S and B/S .Then the integration scheme is proposed about the RFID system and the inventory management system.Last,the network system model of multi read head and single workstation is adopted to implement the RFID data acquisition system,and the RFID system is successfully applied by the Experimental Equipment Management Center of Jilin University.The practice shows that the application of RFID system has improved the efficiency of management and utilization ratio of the experimental equipment.

  17. Servando Teresa de Mier y sus polémicas cartas a la Ilustración española

    OpenAIRE

    Mariana Rosetti

    2012-01-01

    El presente artículo analiza la particular modulación de la figura del letrado criollo que desplegó Servando Teresa de Mier en sus cartas dirigidas al historiador Juan Bautista Muñoz y al periodista sevillano José María Blanco White. Estas cartas configuraron un moderno locus de enunciación letrado que le permitió a Mier editar el saber ilustrado español tanto sobre la tradición religiosa novohispana como sobre la capacidad política de los americanos frente a la crisis institucional suscitada...

  18. Implementasi Sistem Perparkiran Otomatis dengan Menentukan Posisi Parkir Berbasis RFId

    Directory of Open Access Journals (Sweden)

    FREEON ALKAPON IMBIRI

    2016-02-01

    Full Text Available ABSTRAK Apartemen merupakan salah satu tempat tinggal yang ideal di kota metropolitan yang menyediakan banyak fasilitas bagi penghuninya. Salah satu fasilitas tersebut adalah tersedianya area parkir yang memadai dan nyaman bagi penghuni yang memiliki kendaraan, pada kenyataannya saat ini sistem perparkiran yang digunakan masih bermasalah. Masalah yang ditimbulkan dalam sistem perparkiran adalah kurangnya informasi mengenai lahan parkir yang kosong serta penempatan kendaraan yang tidak sesuai sehingga sering kali pemilik kendaraan membutuhkan waktu yang lama untuk sekedar menemukan tempat parkir yang kosong. Berdasarkan hal itu diperlukan sebuah sistem monitoring parkir yang memudahkan pengendara kendaraan yang hendak parkir. Tujuan penelitian ini adalah merancang dan merealisasikan model sistem monitoring perparkiran dengan fasilitas pemilihan area parkir menggunakan Teknologi RFId. Perangkat lunak yang digunakan pada sistem ini dirancang dengan menggunakan bahasa C#. Pada sistem ini proses pengambilan data secara kontinyu menggunakan mikrokontroler Atmega16 sebagai komponen kendali utamanya. Pengujian dilakukan secara simulasi pada miniatur perparkiran. Hasil pengujian model sistem perparkiran dapat menampilkan kondisi dari masing-masing area parkir yang ditampilkan pada display. Sistem pengambilan data secara kontinyu menggunakan kartu RFId sistem ini dapat menggantikan operator. Sensor cahaya (LED dan LDR akan berlogika 1 jika ada mobil yang lewat. Kata kunci : Parkir, RFId, LED, LDR, Mikrokontroler, Atmega16, Microsoft Acess, C#. ABSTRACT Apartment is an ideal place of living in a big city ,it provides a lot of facilities .One of apartment facilities is a parking lot that are adequate and comfortable for its occupants who have vehicles . Problems caused in the parking system is the lack of information regarding the parking lot is empty and the placement of the vehicle that is not in accordance with the wishes so that often the owner of the

  19. Quantifying detection performance of a passive low-frequency RFID system in an environmental preference chamber for laying hens

    Science.gov (United States)

    Radio Frequency Identification (RFID) systems have been widely used in production livestock systems for identifying, tracing, and registering animals and improving subsidy management. Adaptations have been made to extend RFID technology to animal behavior and welfare research. An RFID system was imp...

  20. A study on RFID adoption for vehicle tracking in container terminal

    Directory of Open Access Journals (Sweden)

    S.L. Ting

    2012-06-01

    Full Text Available Purpose: Numerous studies discuss that Radio Frequency Identification (RFID technology can provide better container handling efficiency; however, relative lack of research concerns the tracking and monitoring the movement of vehicle in the container terminal environment. Thus, this study aims at discussing the feasibility of applying RFID for vehicle tracking purpose in a container terminal. Design/methodology/approach: This study makes use of a series of experiments in a container terminal to discuss the factors that affect the use of RFID in the terminal. The possibility and accuracy of using RFID in such challenging environment is also investigated. These propositions are investigated by a case study. Findings: The experimental results indicate that the RFID communication is good at the containers area which occupies nearly all the area in the container terminal. However, in other area such as sea side and free area, the performance is not good and 100% readability only achieved in 5m and 10m in free area and sea side respectively. Originality/value: The container terminal environment, which consists of different transport vehicles for onward transportation, will affect the performance of RFID readability. Poor setup of the RFID reader and tag will lower the feasibility of RFID adoption as well as increase the cost. In order to address the challenges of implementing RFID in the container terminal environment, this paper provides a series of real site testing experiments to study the RFID performance in the container terminal environment. This represents an original contribution of value to future research and practice in the RFID adoptions in container terminal environment.

  1. Santa Barbara Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Hacker, Angela; Hansen, Sherman; Watkins, Ashley

    2013-11-30

    This report serves as the Final Report for Santa Barbara County’s Energy Efficiency and Conservation Block Grant (EECBG) BetterBuildings Neighborhood Program (BBNP) award from the U.S. Department of Energy (DOE). This report explains how DOE BBNP funding was invested to develop robust program infrastructure designed to help property owners complete energy improvements, thereby generating substantial outcomes for the local environment and economy. It provides an overview of program development and design within the grant period, program accomplishments and challenges to date, and a plan for the future sustainability of emPower, the County’s innovative clean energy and building efficiency program. During the grant period, Santa Barbara County’s emPower program primarily targeted 32,000 owner occupied, single family, detached residential homes over 25 years old within the County. In order to help these homeowners and their contractors overcome market barriers to completing residential energy improvements, the program developed and promoted six voluntary, market-based service areas: 1) low cost residential financing (loan loss reserve with two local credit unions), 2) residential rebates, 3) local customer service, 4) expert energy advising, 5) workforce development and training, and 6) marketing, education and outreach. The main goals of the program were to lower building energy use, create jobs and develop a lasting regional building performance market. These services have generated important early outcomes and lessons after the program’s first two years in service. The DOE BBNP funding was extended through October 2014 to enable Santa Barbara County to generate continued outcomes. In fact, funding related to residential financing remains wholly available for the foreseeable future to continue offering Home Upgrade Loans to approximately 1,300 homeowners. The County’s investment of DOE BBNP funding was used to build a lasting, effective, and innovative

  2. Temperature increase in the fetus exposed to UHF RFID readers.

    Science.gov (United States)

    Fiocchi, Serena; Parazzini, Marta; Liorni, Ilaria; Samaras, Theodoros; Ravazzani, Paolo

    2014-07-01

    Exposure to electromagnetic fields (EMFs) has prominently increased during the last decades due to the rapid development of new technologies. Among the various devices emitting EMFs, those based on Radio-frequency identification (RFID) technologies are used in all aspects of everyday life, and expose people unselectively. This scenario could pose a potential risk for some groups of the general population, such as pregnant women, who are expected to be possibly more sensitive to the thermal effects produced by EMF exposure. This is the first paper that addresses the estimation of temperature rise in two pregnant women models exposed to ultrahigh frequency RFID by computational techniques. Results show that the maximum temperature increase of the fetus and of the pregnancy-related tissues is relatively high (even about 0.7 °C), not too far from the known threshold of biological effects. However, this increase is confined to a small volume in the tissues.

  3. RFID Based Networked Gate Entry Control System (GECS

    Directory of Open Access Journals (Sweden)

    Jagdish Lal Raheja

    2009-10-01

    Full Text Available This paper is about an RFID based smart gate entry control system (GECS which is developed for theemployees of an organization to supervise and record their entry related activity. Entire system isdeveloped with low frequency RFID reader & passive tag at one end & network based applicationsoftware running at the other end. The developed application with back-end application softwareprovides solutions regarding employee presence in the organization, keep track their transaction, andcalculate total work duration within organization. Here we discussed data base technique & logic forautomatic report generation related to employee’s monthly presence activity. We also discussed aboutwhy & how SMTP code can be helpful to develop an auto E-mail delivery feature for the monthly reportto the concerned employee's institutional Head.

  4. Perishable inventory management and dynamic pricing using RFID technology

    Indian Academy of Sciences (India)

    A Chande; S Dhekane; N Hemachandra; N Rangaraj

    2005-04-01

    In price-sensitive markets, price promotions coupled with an appropriate item replenishment strategy can be effective in controlling the total costs of servicing the market. In supply chains that handle perishable products, inventory management is already a complex problem and the management of products in a dynamic-pricing environment is even more challenging. Monitoring and control of time-sensitive products can be facilitated by the application of radio frequency identification (RFID) technology, which enables non-contact, real-time data collection and efficient interfacing with the management control system in the supply chain. This paper describes an integrated framework for inventory management and pricing in a discrete time (periodic review and ordering) framework, and describes an efficient algorithm, including a new approximation, for the related optimization problem. We then propose a suitable architecture for the application of RFID technology in this context, to realize the potential benefits.

  5. FDA, companies test RFID tracking to prevent drug counterfeiting.

    Science.gov (United States)

    James, John S

    2005-12-01

    The U.S. has an apparently growing problem with fake, counterfeit drugs entering the mainstream drug supply, and being fraudulently sold at full price in regular pharmacies and hospitals; some have no active ingredient, or too little, or substitute a cheap drug for an expensive one. The FDA has asked drug manufacturers to develop technology to track all shipments electronically as they move through the distribution chain; currently, RFID (radio frequency identification) is the preferred method for doing so. This article explains what is happening, and why we do not believe that this use of RFID is a privacy threat--though other privacy issues are among the most important questions we face today.

  6. Integration of a RFID System in a Social Robot

    Science.gov (United States)

    Corrales, A.; Salichs, M. A.

    This article presents the integration of a system of detection and identification of RFID tags in a social robot, with the goal of improving its sensorial system and to accomplish several specific tasks, such as: recognition of objects or navigation. For this purpose, basic skills of reading and writing have been designed, following the pattern of the basic element skill of the robot software architecture. The system has been implemented physically adding two RFID interrogators with built-in antenna to the sensorial robot system. The application has been implemented and tested as a skill in the detection of products such as medicines and diverse objects in order to assist visually impaired people, users of the third age and people who cannot read.

  7. High resolution dynamical mapping of social interactions with active RFID

    CERN Document Server

    Barrat, Alain; Colizza, Vittoria; Pinton, Jean-Francois; Broeck, Wouter Van den; Vespignani, Alessandro

    2008-01-01

    In this paper we present an experimental framework to gather data on face-to-face social interactions between individuals, with a high spatial and temporal resolution. We use active Radio Frequency Identification (RFID) devices that assess contacts with one another by exchanging low-power radio packets. When individuals wear the beacons as a badge, a persistent radio contact between the RFID devices can be used as a proxy for a social interaction between individuals. We present the results of a pilot study %recently performed during a conference, and a subsequent preliminary data analysis, that provides an assessment of our method and highlights its versatility and applicability in many areas concerned with human dynamics.

  8. USING RFID AND GIS TECHNOLOGIES FOR ADVANCED LUGGAGE TRACKING

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2015-06-01

    Full Text Available By purchasing a plane ticket or a cargo service, the passenger or the customer signs a contract with the airline company. From that moment on the airline company is responsible for all aspects of air travel, including the passenger' luggage (recording, handling to / from the aircraft etc.. Safe transport of passengers' luggage or cargo packages on airlines raises numerous problems for airlines and requires flexible, efficient solutions, appropriate to the specific requirements of each client. Annually millions of luggages get lost in airports around the world. This causes inconvenience to passengers and loss of resources and additional costs for the airlines. The aim of this paper is to examine how RFID(Radio Frequency Identification technology could be useful for advanced shipment tracking (Track and Trace in the airlines industry, by using rewritable passive RFID tags.

  9. Enhanced automated platform for 2D characterization of RFID communications

    Science.gov (United States)

    Vuza, Dan Tudor; Vlǎdescu, Marian

    2016-12-01

    The characterization of the quality of communication between an RFID reader and a transponder at all expected positions of the latter on the reader antenna is of primal importance for the evaluation of performance of an RFID system. Continuing the line of instruments developed for this purpose by the authors, the present work proposes an enhanced version of a previously introduced automated platform for 2D evaluation. By featuring higher performance in terms of mechanical speed, the new version allows to obtain 2D maps of communication with a higher resolution that would have been prohibitive in terms of test duration with the previous version. The list of measurement procedures that can be executed with the platform is now enlarged with additional ones, such as the determination of the variation of the magnetic coupling between transponder and antenna across the antenna surface and the utilization of transponder simulators for evaluation of the quality of communication.

  10. Applications of Health Management Using Android and RFID

    Directory of Open Access Journals (Sweden)

    Young-Long Chen

    2012-07-01

    Full Text Available Health management has become increasingly important in personal health care in modern life. The system we have designed provides a method to help facilitate health management through an associated smart phone with Radio Frequency Identification (RFID, which is a new type of application. This system consists of medical knowledge and health management. In the application of medical knowledge, we use the human model as well as the operation of RFID to obtain medical knowledge concerning human organs. The two main functions of the health management system are medication reminders and drug identification. The feature of medication reminders allows users to set the time for taking medication so that patients do not miss taking their medication. The feature of drug identification allows the operators to identify the drugs and can let the users know who needs to take drugs. In addition, we have designed a web page that allows users to understand their health status.

  11. Extended-Range Passive RFID and Sensor Tags

    Science.gov (United States)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  12. Lighten Encryption Schemes for Secure and Private RFID Systems

    Science.gov (United States)

    Canard, Sébastien; Coisel, Iwen; Etrog, Jonathan

    We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precisely, we give the first instantiation of the Vaudenay's result by using the IND-CCA secure DHAES cryptosystem. Next we argue that weaker cryptosystems can also be used by recalling the WIPR RFID system and giving a new protocol based on the El Gamal encryption scheme. After that, we introduce a new generic construction based on the use of any IND-CPA secure public key cryptosystem together with a MAC scheme and describe a possibility using the Hash El Gamal cryptosystem. We finally compare all these schemes, both in terms of implementation and security, proving that, nowadays the DHAES and our Hash El Gamal based solutions appear as the most promising schemes.

  13. IDENTIFICATION OF EMPLOYEES USING RFID IN IE-NTUA

    Directory of Open Access Journals (Sweden)

    Rashid Ahmed

    2013-11-01

    Full Text Available During the last decade with the rapid increase in indoor wireless communications, location-aware services have received a great deal of attention for commercial, public-safety, and a military application, the greatest challenge associated with indoor positioning methods is moving object data and identification. Mobility tracking and localization are multifaceted problems, which have been studied for a long time in different contexts. Many potential applications in the domain of WSNs require such capabilities. The mobility tracking needs inherent in many surveillance, security and logistic applications. This paper presents the identification of employees in National Technical University in Athens (IE-NTUA, when the employees access to a certain area of the building (enters and leaves to/from the college, Radio Frequency Identification (RFID applied for identification by offering special badges containing RFID-tags.

  14. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Nekoogar, F; Dowla, F; Wang, T

    2010-01-27

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable {sup 3}He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  15. USING RFID AND GIS TECHNOLOGIES FOR ADVANCED LUGGAGE TRACKING

    Directory of Open Access Journals (Sweden)

    Zoltan KATO

    2015-06-01

    Full Text Available By purchasing a plane ticket or a cargo service, the passenger or the customer signs a contract with the airline company. From that moment on the airline company is responsible for all aspects of air travel, including the passenger' luggage (recording, handling to / from the aircraft etc.. Safe transport of passengers' luggage or cargo packages on airlines raises numerous problems for airlines and requires flexible, efficient solutions, appropriate to the specific requirements of each client. Annually millions of luggages get lost in airports around the world. This causes inconvenience to passengers and loss of resources and additional costs for the airlines. The aim of this paper is to examine how RFID(Radio Frequency Identification technology could be useful for advanced shipment tracking (Track and Trace in the airlines industry, by using rewritable passive RFID tags.

  16. A REVIEW on EFFICIENT MUTUAL AUTHENTICATION RFID SYSTEM SECURITY ANALYSIS

    Directory of Open Access Journals (Sweden)

    S.Vijay Anand

    2013-02-01

    Full Text Available This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, it addresses the security and privacy aspects of this relatively new and heterogeneous Radio Technology. It relates the security requirements, threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. This paper would be a useful reference article for beginners as well as experts.

  17. Radio Frequency Identification (RFID) for Naval Medical Treatment Facilities (MTF)

    Science.gov (United States)

    2006-09-01

    Internet of things ,” which may be further extended to the tracking of human beings. The United States’ Food and Drug Administration has already...Scientific American, January 2004. Retrieved September 2006 from http://www.sciam.com/article.cfm [15] “RFID and the Internet of Things ... B2B Business to Business CAGE Commercial and Government Entity CAT Computerized Axial Tomography CATSA Canadian Air Transport Authority CCS

  18. A Modular Integrated RFID System for Inventory Control Applications

    OpenAIRE

    Ross Bunker; Atef Elsherbeni

    2017-01-01

    Recent advances in single-board computer technology have allowed for lightweight, power-efficient devices, such as the Raspberry Pi, to take the place of desktop PCs in certain applications. This has the potential to disrupt the way many current systems are structured, particularly for inventory management and control applications. In this paper, we explore the design and topology of a modular Radio frequency identification (RFID) system for inventory management comprised of self-contained, a...

  19. RFID-Based Asset Management for Space Habitats

    Science.gov (United States)

    Fink, Patrick W.

    2013-01-01

    Remote habitats are often densely packed - items necessary to sustain life - items necessary to conduct work center dot Inhabitant's time is often quite valuable, if not priceless. Resupply shipments can be infrequent and expensive. Inaccurate inventory knowledge can lead to unnecessary overstocking, which can lead to insufficient work and/or living volume. Not being able to find items when they are needed can present: - safety issues - morale issues. RFID technology has the potential solve a lot of these issues.

  20. A Reliability Study of RFID Technology in a Fading Channel

    Science.gov (United States)

    2007-06-01

    systems. Bit and tag error probabilities are computed for various OOK and M-CSK modulation schemes in a varying Nakagami - m fading channel, and the best...performing schemes are identified for future employment. 15. NUMBER OF PAGES 69 14. SUBJECT TERMS RFID, Fading Channel, Nakagami , On-off...and tag error probabilities are computed for various OOK and M-CSK modulation schemes in a varying Nakagami - m fading channel, and the best performing

  1. Possible use of RFID technology in support of construction logistics

    OpenAIRE

    Mortensen, Jan Harald; Pedersen, Tom Are

    2004-01-01

    Radio Frequency Identification (RFID) is a relatively old technology that has gained enormous popularity in the later years, as more and more areas of business see it as a possible technology with which to improve their existing processes. It is often presented as a replacement for today’s barcodes, but the technology has much greater possibilities, such as individual serial numbers for each item, and the possibility to read these numbers at a distance of several metres. One of the areas t...

  2. Estudio morfotectónico del área enmarcada por las concesiones mineras La Delta, Cantarrana y Santa Teresita

    Directory of Open Access Journals (Sweden)

    Alina Rodríguez-Infante

    2010-03-01

    Full Text Available Los yacimientos ferroniquelíferos del noreste de Holguín están afectados por estructuras tectónicas disyuntivas que deben considerarse en la planificación minera; es por ello que se caracterizan las fallas existentes en las concesiones mineras La Delta, Cantarrana y Santa Teresita, de la empresa Moa Nickel S.A.-Pedro Sotto Alba. En el estudio se utilizaron métodos de fotointerpretación geológica y geomorfológica y el análisis morfométrico del relieve, tomando como base las cartas topográficas y el modelo digital del terreno (MDT. Como resultado se obtuvo el cartografiado de las estructuras disyuntivas del área asociadas a distintos eventos tectónicos que han afectado la región, incluyendo algunas no reportadas con anterioridad, como las fallas Arco Norte y Arco Sur, estructuras de bajo ángulo; Teresa, Potosí y La Caoba, vinculadas al proceso de colisión del arco volcánico del Cretácico sobre el paleomargen de Bahamas, y la estructura Yamanigüey, originada por el proceso de relajación de los bloques tectónicos.

  3. The SantaBot experiment

    DEFF Research Database (Denmark)

    Hansen, Søren Tranberg; Svenstrup, Mikael; Andersen, Hans Jørgen

    2009-01-01

    interactive mobile agents into public urban transit area. To investigate the hypothesis, an experiment was carried out using a robot capable of navigating autonomously based on the input of an onboard laser scanner. The robot would detect and follow random people, who afterwards were asked to fill out......The video shows how an autonomous mobile robot dressed as Santa Claus is interacting with people in a shopping mall. The underlying hypothesis is that it is possible to create interesting new living spaces and induce value in terms of experiences, information or economics, by putting socially...... a questionnaire for quantitative analysis of the experiment. The presented video is the corresponding video documentation of the experiment used in the evaluation. The results showed that people were generally positive towards having mobile robots in this type of environment where shopping is combined...

  4. El espíritu de la verdad en Teresa de Jesús y Edith Stein. Testimonio y mística

    Directory of Open Access Journals (Sweden)

    Silvia Julia Campana

    2015-04-01

    Full Text Available Teresa de Jesús y Edith Stein son testigos del Amor desbordante, embriagadas en el perfume de la Verdad que las reúne en una búsqueda común. “Cuando venga el Espíritu de la Verdad, él los introducirá en toda la verdad”. Ambas son transformadas, desde la hondura del Espíritu que las habita, en testimonio de la libertad que brota de la Verdad que sale al encuentro; en testimonio de la autenticidad de una vida entregada al Otro/otros; en testimonio de un secreto que las habita, las transforma y las conduce hasta la ofrenda de la propia vida. Porque el testimonio, como afirma Ricoeur, “es también el compromiso de un corazón puro y un compromiso hasta la muerte. Pertenece al destino trágico de la verdad”. Teresa de Jesús ingresa a la vida de la joven filósofa Edith Stein a través de la palabra, del “poema” que relata su propia vida y le descubre un mundo nuevo. Biografía que transforma otra biografía y nos permite hoy reunirlas en la comunidad del testimonio y la mística.

  5. Empowerment for Ladies: readings of Milady of Myself by Maria Teresa Horta and Milady of What? by Ana Luísa Amaral

    Directory of Open Access Journals (Sweden)

    Fabio Mario da Silva

    2013-10-01

    Full Text Available The reunion with the “self”, the “dressing up” of self, in an innermost representation of the “feminine/female soul”, bringing some aspects of everyday-life as important references, allows Maria Teresa Horta and Ana Luísa Amaral to construct poetry in which the feminine lyrical self takes not only possession of what she observes, but also the power to make decisions about her life, as “lady” and “owner” of herself, in a speech free of patriarchal oppression. In this article we will analyze how various “ladies” are built in these two works, underlining that Minha Senhora de Mim is configured as a milestone of Portuguese poetry by women, opening a rift to restore possession of the speech (and of the body to women without sociocultural impediments that might limit the work of the woman writer; and how Ana Luísa Amaral, paraphrasing Maria Teresa Horta in an obvious homage in Minha Senhora de Quê builds a work with its own identity within a different feminist perspective.

  6. Cuerpos místicos, almas ascéticas. Regulaciones del espíritu en la experiencia de Teresa de Ávila (1515-1582.

    Directory of Open Access Journals (Sweden)

    Mònica Balltondre

    2009-11-01

    Full Text Available En esta tesis se investiga la antropología que subyace a la espiritualidad mística femenina de mediados del siglo XVI castellano, de la mano de Teresa de Ávila, conocida como Teresa de Jesús. Ella construyó una forma espiritual de vivirse que le permitió encuadrar sus experiencias a partir de tradiciones teológicas, como la mística, y de otros saberes como la filosofía natural y la medicina de su tiempo. Se examinan para ver cómo conceptualizó sus relaciones sobrenaturales y qué le aportaron en la construcción de sí misma. Por ejemplo, analizo sus propuestas de oración y meditación para entender la construcción psíquica que había detrás; los significados teológicos que atribuyó a las enfermedades de su cuerpo; su uso del dolor, etc. Además, exploro cómo funcionó su programa espiritual en sus fundaciones. Al revisar las implicaciones que estos discursos espirituales tuvieron en la forma de determinar procesos vivenciales, dentro de su producción histórica, damos cuenta de algunas de las categorías y prácticas que configuraron un cierto sujeto moderno.

  7. Design of the RFID for Storage of Biological Information

    Directory of Open Access Journals (Sweden)

    Sang-Hee Son

    2009-02-01

    Full Text Available Recent advances in RFID (radio frequency identification technology promises to create a wireless circuitry capable of interfacing with biological systems for acquisition, identification and processing of biological data based on radio frequency interaction. Thus, the RFID tag can be attached not only to consumer products and form part of the supply chain, but also to animals, plants and in particular human body. This paper describes the strategy for the design of a novel RFID tag, which stores vital biological information such as body temperature and blood pressure and heartbeat in accordance with the EPC global Class-1 standard. Biological data is obtained from a sensor technology that is based on resistance deviation-to-pulse width converter. The integrated chip consists of an analog front end, command interpreter, collision avoidance block, data storage, sensors, and interface circuitry. The system is capable of supporting heartbeats in the range of 40~200 beats per a minute and blood pressure 0~300mmHg. The proposed system employs collision free algorithm that supports access to single tag within a multiple tag environment. The approach facilitates intelligent management of patients in hospitals as part of an integrated healthcare management system.

  8. A query index for continuous queries on RFID streaming data

    Institute of Scientific and Technical Information of China (English)

    Jaekwan PARK; Bonghee HONG; Chaehoon BAN

    2008-01-01

    RFID middleware collects and filters RFID streaming data to process applications' requests called continuous queries, because they are executed continuously during tag movement. Several approaches to building an index on queries rather than data records, called a query index, have been proposed to evaluate continuous queries over streaming data. EPCgiobal proposed an Event Cycle Specification (ECSpec) model, which is a de facto standard query interface for RFID applications. Continuous queries based on ECSpec consist of a large number of segments that represent the query conditions. The problem when using any of the existing query indexes on these continuous queries is that it takes a long time to build the index, because it is necessary to insert a large number of segments into the index. To solve this problem, we propose a transform method that converts a group of segments into compressed data. We also propose an efficient query index scheme for the transformed space. Comparing with existing query indexes, the performance of proposed index outperforms the others on various datasets.

  9. RFID based patient registration in mass casualty incidents

    Directory of Open Access Journals (Sweden)

    Nestler, Simon

    2011-01-01

    Full Text Available In MCIs (mass casualty incidents the EMC (emergency medical chief has to gain an overview on all patients at the scene. When using paper based patient tags the patient-related information remains at the patients themselves and the information relay is complex. We propose a mobile, RFID based solution, which makes the local patient-related information available to all relief workers at the scene. As a consequence all processes in an MCI are more transparent and the resulting medication and transport of the injured is more efficient. The introduction of RFID enhanced patient tags leads to various usability challenges which are discussed in this paper. Furthermore, three different implementations show, how these challenges can be solved in the future. These solutions have been evaluated in a disaster control exercise in order to get an impression of the practical suitability of the proposed solutions. The future introduction of RFID tags in rescue and emergency services can be based on this work.

  10. An Energy and Application Scenario Aware Active RFID Protocol

    Directory of Open Access Journals (Sweden)

    Nilsson Björn

    2010-01-01

    Full Text Available The communication protocol used is a key issue in order to make the most of the advantages of active RFID technologies. In this paper we introduce a carrier sense medium access data communication protocol that dynamically adjusts its back-off algorithm to best suit the actual application at hand. Based on a simulation study of the effect on tag energy cost, read-out delay, and message throughput incurred by some typical back-off algorithms in a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance active RFID protocol, we conclude that by dynamic tuning of the initial contention window size and back-off interval coefficient, tag energy consumption and read-out delay can be significantly lowered. We show that it is possible to decrease the energy consumption per tag payload delivery with more than 10 times, resulting in a 50% increase in tag battery lifetime. We also discuss the advantage of being able to predict the number of tags present at the RFID-reader as well as ways of doing it.

  11. Influence of RFID tags on recyclability of plastic packaging.

    Science.gov (United States)

    Aliaga, César; Ferreira, Beatriz; Hortal, Mercedes; Pancorbo, María Ángeles; López, José Manuel; Navas, Francisco Javier

    2011-06-01

    The use of Radio Frequency IDentification Technology (RFID) in the packaging sector is an important logistical improvement regarding the advantages offered by this technology in comparison with barcodes. Nevertheless, the presence of these devices in plastic packaging, and consequently in plastic waste, can cause several problems in the recycling plants due to the materials included in these devices. In this study, the mentioned recycling constraints have been experimentally identified in a pilot scale recycling study consisting in three recycling tests with an increasing presence of RFID tags. Differences in each test were evaluated. Furthermore, the quality of the recycled material of each test was studied through the injection and testing of tests probes. The results of the pilot scale recycling tests did not show a decrease in the quality of the recycled plastic due to the presence of RFID tags. Nevertheless, several operational problems during the recycling process were observed such as the obstruction of the screens, which lessened the process yield and created process interruptions, as well as the loss of extruded plastic during the process. These recycling constraints cannot be directly extrapolated to the industrial plants due to the different working scales. Nevertheless, technological solutions are proposed in order to avoid these recycling constraints if they appear.

  12. A Secure Code-Based Authentication Scheme for RFID Systems

    Directory of Open Access Journals (Sweden)

    Noureddine Chikouche

    2015-08-01

    Full Text Available Two essential problems are still posed in terms of Radio Frequency Identification (RFID systems, including: security and limitation of resources. Recently, Li et al.'s proposed a mutual authentication scheme for RFID systems in 2014, it is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC McEliece cryptosystem. This cryptosystem is designed to reducing the key sizes. In this paper, we found that this scheme does not provide untraceability and forward secrecy properties. Furthermore, we propose an improved version of this scheme to eliminate existing vulnerabilities of studied scheme. It is based on the QC-MDPC McEliece cryptosystem with padding the plaintext by a random bit-string. Our work also includes a security comparison between our improved scheme and different code-based RFID authentication schemes. We prove secrecy and mutual authentication properties by AVISPA (Automated Validation of Internet Security Protocols and Applications tools. Concerning the performance, our scheme is suitable for low-cost tags with resource limitation.

  13. Optimization of RFID network planning using Zigbee and WSN

    Science.gov (United States)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  14. ARQ Security in Wi-Fi and RFID Networks

    CERN Document Server

    Elsabagh, Mohamed; Youssef, Moustafa; Gamal, Hesham El

    2010-01-01

    In this paper, we present two practical ARQ-Based security schemes for Wi-Fi and RFID networks. Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. Both schemes build on the same idea; by exploiting the statistical independence between the multipath fading experienced by the legitimate nodes and potential adversaries, secret keys are established and then are continuously updated. The continuous key update property of both schemes makes them capable of defending against all of the passive eavesdropping attacks and most of the currently-known active attacks against either Wi-Fi or RFID networks. However, each scheme is tailored to best suit the requirements of its respective paradigm. In Wi-Fi networks, we overlay, rather than completely replace, the current Wi-Fi security protocols. Thus, our Wi-Fi scheme can be readily implemented via only minor modifications over the IEEE 802.11 standards. On the other hand, the proposed RFID scheme introduces the firs...

  15. Automatic Ration Material Distributions Based on GSM and RFID Technology

    Directory of Open Access Journals (Sweden)

    S.Valarmathy

    2013-10-01

    Full Text Available Now a day ration card is very important for every home and used for various field such as family members details, to get gas connection, it act as address proof for various purposes etc. All the people having a ration card to buy the various materials (sugar, rice, oil, kerosene, etc from the ration shops. But in this system having two draw backs, first one is weight of the material may be inaccurate due to human mistakes and secondly, if not buy the materials at the end of the month, they will sale to others without any intimation to the government and customers. In this paper, proposed an Automatic Ration Materials Distribution Based on GSM (Global System for Mobile and RFID (Radio Frequency Identification technology instead of ration cards. To get the materials in ration shops need to show the RFID tag into the RFID reader, then controller check the customer codes and details of amounts in the card. After verification, these systems show the amount details. Then customer need to enter they required materials by using keyboard, after receiving materials controller send the information to government office and customer through GSM technology. In this system provides the materials automatically without help of humans.

  16. Laboratory Testing of Active and Passive UHF RFID Tags

    Directory of Open Access Journals (Sweden)

    Kolarovszki Peter

    2016-06-01

    Full Text Available This article deals with research of laboratory testing by active and passive UHF tags and therefore mutual coexistence of active and passive RFID technology, which is a part of automatic identification and data capture. In this article we would like to describe an identification of transport unit based on passive technology and also by active technology. We would like to specify, how this technologies can work together and in which application focuses on postal and logistics. All results are verified by measurement in our AIDC laboratory, which is located at the University of Žilina. Our research contains different types of measurements in order to point out the possible influence of these two technologies. The results of our research bring the new point of view and indicate the ways using of UHF RFID technology in postal and logistics applications. At the end of this article is characterized the utilization of the RFID technology in postal logistics chain by using both passive and active technologies.

  17. Interrogation zone determination in HF RFID systems with multiplexed antennas*

    Directory of Open Access Journals (Sweden)

    Jankowski-Mihułowicz Piotr

    2015-09-01

    Full Text Available The operation of an anti-collision RFID system is characterized by the interrogation zone which should be estimated in any direction of 3D space for a group of electronic transponders. The interrogation zone should be as large as possible. However, the many problems in this area are due to the fact that energy can be transferred to transponders only on a limited distance. The greatest flexibility in developing RFID applications and shaping the interrogation zone can be achieved using the system with an antenna multiplexer. Therefore the problem of the interrogation zone determination in HF RFID systems with two orthogonal RWD antennas is presented in the paper. The perceived issues have been effectively dealt with and the solution has been proposed on the basis of the elaborated model. Conducted studies have been used to develop the software tool JankoRFIDmuxHF in the Mathcad environment. The research results are analysed in an example system configuration. The specialized measuring stand has been used for experimental verification of the identification efficiency. The convergence of the measurements and calculations confirms a practical usefulness of the presented concept of interrogation zone determination in anti-collision systems. It also shows the practical utility of the developed model and software tools.

  18. Position Statement in RFID S&P Panel: RFID and the Middleman

    Science.gov (United States)

    Anderson, Ross

    Existing bank-card payment systems, such as EMV, have two serious vulnerabilities: the user does not have a trustworthy interface, and the protocols are vulnerable in a number of ways to man-in-the-middle attacks. Moving to RFID payments may, on the one hand, let bank customers use their mobile phones to make payments, which will go a fair way towards fixing the interface problem; on the other hand, protocol vulnerabilities may become worse. By 2011 the NFC vendors hope there will be 500,000,000 NFC-enabled mobile phones in the world. If these devices can act as cards or terminals, can be programmed by their users, and can communicate with each other, then they will provide a platform for deploying all manner of protocol attacks. Designing the security protocols to mitigate such attacks may be difficult. First, it will include most of the hot topics of IT policy over the last ten years (from key escrow through DRM to platform trust and accessory control) as subproblems. Second, the incentives may lead the many players to try to dump the liability on each other, leading to overall system security that is equivalent to the weakest link rather than to sum-of-efforts and is thus suboptimal.

  19. SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC

    Directory of Open Access Journals (Sweden)

    Sabu Augustine

    2016-06-01

    Full Text Available In this fast developing period the use of RFID have become more significant in many application domaindue to drastic cut down in the price of the RFID tags. This technology is evolving as a means of tracking objects and inventory items. One such diversified application domain is in Supply Chain Management where RFID is being applied as the manufacturers and distributers need to analyse product and logistic information in order to get the right quantity of products arriving at the right time to the right locations. Usually the RFID tag information collected from RFID readers is stored in remote database and the RFID data is being analyzed by querying data from this database based on path encoding method by the property of prime numbers. In this paper we propose an improved encoding scheme that encodes the flows of objects in RFID tag movement. A Trajectory of moving RFID tags consists of a sequence of tagsthat changes over time. With the integration of wireless communications and positioning technologies, the concept of Trajectory Database has become increasingly important, and has posed great challenges to the data mining community.The support of efficient trajectory similarity techniques is indisputably very important for the quality of data analysis tasks in Supply Chain Traffic which will enable similar product movements.

  20. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol f

  1. The review of RFID applications in global postal and courier services

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiao-dan; YUE Shu-jie; WANG Wei-min

    2006-01-01

    On the basis of several practical applications in many countries, this article reviews the potential market scale of radio frequency identification (RFID) and its applications in global postal and courier services through studies and analyses.It gives some suggestions and options in the development of RFID and its application in postal and courier services.

  2. High-level managers' considerations for RFID adoption in hospitals: an empirical study in Taiwan.

    Science.gov (United States)

    Lai, Hui-Min; Lin, I-Chun; Tseng, Ling-Tzu

    2014-02-01

    Prior researches have indicated that an appropriate adoption of information technology (IT) can help hospitals significantly improve services and operations. Radio Frequency Identification (RFID) is believed to be the next generation innovation technology for automatic data collection and asset/people tracking. Based on the Technology-Organization-Environment (TOE) framework, this study investigated high-level managers' considerations for RFID adoption in hospitals. This research reviewed literature related IT adoption in business and followed the results of a preliminary survey with 37 practical experts in hospitals to theorize a model for the RFID adoption in hospitals. Through a field survey of 102 hospitals and hypotheses testing, this research identified key factors influencing RFID adoption. Follow-up in-depth interviews with three high-level managers of IS department from three case hospitals respectively also presented an insight into the decision of RFID's adoption. Based on the research findings, cost, ubiquity, compatibility, security and privacy risk, top management support, hospital scale, financial readiness and government policy were concluded to be the key factors influencing RFID adoption in hospitals. For practitioners, this study provided a comprehensive overview of government policies able to promote the technology, while helping the RFID solution providers understand how to reduce the IT barriers in order to enhance hospitals' willingness to adopt RFID.

  3. Impact of RFID on Retail Value Chain: A Mixed Method Study

    Science.gov (United States)

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  4. Fast Capture­-Recapture Approach for Mitigating the Problem of Missing RFID Tags

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Jacobsen, Rasmus; Popovski, Petar

    2012-01-01

    The technology of Radio Frequency IDentification (RFID) enables many applications that rely on passive, battery-less wireless devices. If a RFID reader needs to gather the ID from multiple tags in its range, then it needs to run an anticollision protocol. Due to errors on the wireless link...

  5. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol

  6. A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol

    NARCIS (Netherlands)

    Barrero, D.F.; Hernandez-Castro, J.C.; Peris-Lopez, P.; Camacho, D.; Moreno, M.D.R.

    2012-01-01

    Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously

  7. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Science.gov (United States)

    Meng, Zhaozong; Li, Zhen

    2016-12-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC), ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  8. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.-V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Putten, B. van der; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2012-01-01

    The ambition of printing item-level RFID tags is one of the driving forces behind printed electronics research. Organic RFID tags have been shown, initially using p-type organic semiconductors [1-4]. The introduction of n-type organic semiconductors with reasonable performance made organic CMOS

  9. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    Science.gov (United States)

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  10. Interference Helps to Equalize the Read Range and Reduce False Positives of Passive RFID Tags

    DEFF Research Database (Denmark)

    Krigslund, Rasmus; Popovski, Petar; Pedersen, Gert Frølund

    2012-01-01

    In various applications of RFID systems a reader should reliably get the ID of the tags that are within a bounded proximity region, termed the interrogation zone. This gives rise to two types of errors 1) False Negative Detections (FNDs), when tags within the intended interrogation zone cannot...... interference enables design of well-defined interrogation zones for passive RFID systems....

  11. Impact of RFID on Retail Value Chain: A Mixed Method Study

    Science.gov (United States)

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  12. RFID-based vehicle positioning and its applications in connected vehicles.

    Science.gov (United States)

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-03-04

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  13. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Van Putten, B.D.; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2014-01-01

    A bidirectional communication protocol allows radio-frequency identification (RFID) tags to have readout of multiple tags in the RF field without collision of data. In this paper, we realized bidirectional communication between a reader system and thin-film RFID tag by introducing a novel protocol f

  14. Design of a covert RFID tag network for target discovery and target information routing.

    Science.gov (United States)

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  15. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    Science.gov (United States)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  16. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    Directory of Open Access Journals (Sweden)

    Meng Zhaozong

    2016-12-01

    Full Text Available The Radio Frequency Identification (RFID technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC, ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  17. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    Science.gov (United States)

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  18. A genetic tango attack against the David–Prasad RFID ultra-lightweight authentication protocol

    NARCIS (Netherlands)

    Barrero, D.F.; Hernandez-Castro, J.C.; Peris-Lopez, P.; Camacho, D.; Moreno, M.D.R.

    2012-01-01

    Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited

  19. Bidirectional communication in an HF hybrid organic/solution-processed metal-oxide RFID tag

    NARCIS (Netherlands)

    Myny, K.; Rockelé, M.; Chasin, A.; Pham, D.-V.; Steiger, J.; Botnaras, S.; Weber, D.; Herold, B.; Ficker, J.; Putten, B. van der; Gelinck, G.H.; Genoe, J.; Dehaene, W.; Heremans, P.

    2012-01-01

    The ambition of printing item-level RFID tags is one of the driving forces behind printed electronics research. Organic RFID tags have been shown, initially using p-type organic semiconductors [1-4]. The introduction of n-type organic semiconductors with reasonable performance made organic CMOS conc

  20. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

    Directory of Open Access Journals (Sweden)

    Joon Heo

    2009-06-01

    Full Text Available Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space.