Science.gov

Sample records for rfid distance bounding

  1. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Adaptive signed distance transform for curves with guaranteed error bounds

    SciTech Connect

    Laney, D A; Duchaineau, M A; Max, N L

    2000-12-04

    We present an adaptive signed distance transform algorithm for curves in the plane. The algorithm provides guaranteed error bounds with a selective refinement approach. The domain over which the signed distance function is desired is adaptive triangulated and piecewise discontinuous linear approximations are constructed within each triangle. The resulting transform performs work only were requested and does not rely on a preset sampling rate or other constraints.

  4. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  5. Bounds for approximation in total variation distance by quantum circuits

    SciTech Connect

    Knill, E.

    1995-09-01

    It was recently shown that for reasonable notions of approximation of states and functions by quantum circuits, almost all states and,functions are exponentially hard to approximate. The bounds obtained are asymptotically tight except for the one based on total variation distance (TVD). TVD is the most relevant metric for the performance of a quantum circuit. In this paper we obtain asymptotically tight bounds for TVD. We show that in a natural sense, almost all states are hard to approximate to within a TVD of 2/e -- {epsilon} even for exponentially small {epsilon}. The quantity 2/e -- {epsilon} is asymptotically the average distance to the uniform distribution. Almost all states with probability amplitudes concentrated in a small fraction of the space are hard to approximate to within a TVD of 2 -- {epsilon}. These results imply that non-uniform quantum circuit complexity is non-trivial in any reasonable model. They also reinforce the notion that the relative information distance between states (which is based on the difficulty of transforming one state to another) fully reflects the dimensionality of the space of qubits, not the number of qubits.

  6. Distance bounded energy detecting ultra-wideband impulse radio secure protocol.

    PubMed

    Hedin, Daniel S; Kollmann, Daniel T; Gibson, Paul L; Riehle, Timothy H; Seifert, Gregory J

    2014-01-01

    We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority including devices that can be life threatening if controlled by a hacker. This protocol provides multiple levels of security including encryption and a distance bounding test to prevent long distance attacks. PMID:25571513

  7. Sensors closeness test based on an improved [0, 1] bounded Mahalanobis distance Δ2

    NASA Astrophysics Data System (ADS)

    Masnan, Maz Jamilah; Mahat, Nor Idayu; Shakaff, Ali Yeon Md; Abdullah, Abu Hassan

    2015-12-01

    Mahalanobis distance Δ2 values are commonly in the range of 0 to +∞ where higher values represent greater distance between class means or points. The increase in Mahalanobis distance is unbounded as the distance multiply. To certain extend, the unbounded distance values pose difficulties in the evaluation and decision for instance in the sensors closeness test. This paper proposes an approach to [0, 1] bounded Mahalanobis distance Δ2 that enable researcher to easily perform sensors closeness test. The experimental data of four different types of rice based on three different electronic nose sensors namely InSniff, PEN3, and Cyranose320 were analyzed and sensor closeness test seems successfully performed within the [0, 1] bound.

  8. Sensors closeness test based on an improved [0, 1] bounded Mahalanobis distance Δ{sup 2}

    SciTech Connect

    Masnan, Maz Jamilah; Mahat, Nor Idayu; Shakaff, Ali Yeon Md Abdullah, Abu Hassan

    2015-12-11

    Mahalanobis distance Δ{sup 2} values are commonly in the range of 0 to +∞ where higher values represent greater distance between class means or points. The increase in Mahalanobis distance is unbounded as the distance multiply. To certain extend, the unbounded distance values pose difficulties in the evaluation and decision for instance in the sensors closeness test. This paper proposes an approach to [0, 1] bounded Mahalanobis distance Δ{sup 2} that enable researcher to easily perform sensors closeness test. The experimental data of four different types of rice based on three different electronic nose sensors namely InSniff, PEN3, and Cyranose320 were analyzed and sensor closeness test seems successfully performed within the [0, 1] bound.

  9. Miniaturizing RFID for magnamosis.

    PubMed

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag. PMID:25570040

  10. Tight Uniform Continuity Bounds for Quantum Entropies: Conditional Entropy, Relative Entropy Distance and Energy Constraints

    NASA Astrophysics Data System (ADS)

    Winter, Andreas

    2016-03-01

    We present a bouquet of continuity bounds for quantum entropies, falling broadly into two classes: first, a tight analysis of the Alicki-Fannes continuity bounds for the conditional von Neumann entropy, reaching almost the best possible form that depends only on the system dimension and the trace distance of the states. Almost the same proof can be used to derive similar continuity bounds for the relative entropy distance from a convex set of states or positive operators. As applications, we give new proofs, with tighter bounds, of the asymptotic continuity of the relative entropy of entanglement, E R , and its regularization {E_R^{∞}} , as well as of the entanglement of formation, E F . Using a novel "quantum coupling" of density operators, which may be of independent interest, we extend the latter to an asymptotic continuity bound for the regularized entanglement of formation, aka entanglement cost, {E_C=E_F^{∞}} . Second, we derive analogous continuity bounds for the von Neumann entropy and conditional entropy in infinite dimensional systems under an energy constraint, most importantly systems of multiple quantum harmonic oscillators. While without an energy bound the entropy is discontinuous, it is well-known to be continuous on states of bounded energy. However, a quantitative statement to that effect seems not to have been known. Here, under some regularity assumptions on the Hamiltonian, we find that, quite intuitively, the Gibbs entropy at the given energy roughly takes the role of the Hilbert space dimension in the finite-dimensional Fannes inequality.

  11. On bounds for the Fisher-Rao distance between multivariate normal distributions

    NASA Astrophysics Data System (ADS)

    Strapasson, João E.; Porto, Julianna P. S.; Costa, Sueli I. R.

    2015-01-01

    Information geometry is approached here by considering the statistical model of multivariate normal distributions as a Riemannian manifold with the natural metric provided by the Fisher information matrix. Explicit forms for the Fisher-Rao distance associated to this metric and for the geodesics of general distribution models are usually very hard to determine. In the case of general multivariate normal distributions lower and upper bounds have been derived. We approach here some of these bounds and introduce a new one discussing their tightness in specific cases.

  12. Distance measurements between paramagnetic ligands bound to parallel stranded guanine quadruplexes.

    PubMed

    Donohue, M P; Szalai, V A

    2016-06-01

    Aside from a double helix, deoxyribonucleic acid (DNA) folds into non-canonical structures, one of which is the guanine quadruplex. Cationic porphyrins bind guanine quadruplexes, but the effects of ligand binding on the structure of guanine quadruplexes with more than four contiguous guanine quartets remains to be fully elucidated. Double electron-electron resonance (DEER) spectroscopy conducted at 9.5 GHz (X-band) using broadband, shaped inversion pulses was used to measure the distances between cationic copper porphyrins bound to model parallel-stranded guanine quadruplexes with increasing numbers of guanine quartets. A single Gaussian component was found to best model the time domain datasets, characteristic of a 2 : 1 binding stoichiometry between the porphyrins and each quadruplex. The measured Cu(2+)-Cu(2+) distances were found to be linearly proportional with the number of guanines. Rather unexpectedly, the ligand end-stacking distance was found to monotonically decreases the overall quadruplex length was extended, suggesting a conformational change in the quadruplex secondary structure dependent upon the number of successive guanine quartets. PMID:27218217

  13. Distance-Dependent Triplet Energy Transfer between CdSe Nanocrystals and Surface Bound Anthracene.

    PubMed

    Li, Xin; Huang, Zhiyuan; Zavala, Ramsha; Tang, Ming Lee

    2016-06-01

    We investigate triplet energy transfer (TET) across variable-length aromatic oligo-p-phenylene and aliphatic bridges in a covalently linked CdSe nanocrystal (NC)-bridge-anthracene hybrid system. Photon upconversion measurements in saturated 9,10-diphenylanthracene hexane solutions under air-free conditions at room temperature provided the steady-state rate of TET (ket) across this interface. For flexible transmitters, ket is similar for different lengths of aliphatic bridges, suggesting that the ligands bend backward. For the rigid phenylene spacer, triplet sensitization of anthracene transmitter molecules by CdSe NCs shows a strong distance dependence, with a Dexter damping coefficient of 0.43 ± 0.07 Å(-1). The anthracene transmitter bound closest to the NC surface gave the highest quantum yield of 14.3% for the conversion of green to violet light, the current record for a hybrid platform. PMID:27164056

  14. Neural Decoding and "Inner" Psychophysics: A Distance-to-Bound Approach for Linking Mind, Brain, and Behavior.

    PubMed

    Ritchie, J Brendan; Carlson, Thomas A

    2016-01-01

    A fundamental challenge for cognitive neuroscience is characterizing how the primitives of psychological theory are neurally implemented. Attempts to meet this challenge are a manifestation of what Fechner called "inner" psychophysics: the theory of the precise mapping between mental quantities and the brain. In his own time, inner psychophysics remained an unrealized ambition for Fechner. We suggest that, today, multivariate pattern analysis (MVPA), or neural "decoding," methods provide a promising starting point for developing an inner psychophysics. A cornerstone of these methods are simple linear classifiers applied to neural activity in high-dimensional activation spaces. We describe an approach to inner psychophysics based on the shared architecture of linear classifiers and observers under decision boundary models such as signal detection theory. Under this approach, distance from a decision boundary through activation space, as estimated by linear classifiers, can be used to predict reaction time in accordance with signal detection theory, and distance-to-bound models of reaction time. Our "neural distance-to-bound" approach is potentially quite general, and simple to implement. Furthermore, our recent work on visual object recognition suggests it is empirically viable. We believe the approach constitutes an important step along the path to an inner psychophysics that links mind, brain, and behavior. PMID:27199652

  15. NASA RFID Applications

    NASA Technical Reports Server (NTRS)

    Fink, Patrick, Ph.D.; Kennedy, Timothy, Ph.D; Powers, Anne; Haridi, Yasser; Chu, Andrew; Lin, Greg; Yim, Hester; Byerly, Kent, Ph.D.; Barton, Richard, Ph.D.; Khayat, Michael, Ph.D.; Studor, George; Brocato, Robert; Ngo, Phong; Arndt, G. D., Ph.D.; Gross, Julia; Phan, Chau; Ni, David, Ph.D.; Dusl, John; Dekome, Kent

    2007-01-01

    This viewgraph document reviews some potential uses for Radio Frequency Identification in space missions. One of these is inventory management in space, including the methods used in Apollo, the Space Shuttle, and Space Station. The potential RFID uses in a remote human outpost are reviewed. The use of Ultra-Wideband RFID for tracking are examined such as that used in Sapphire DART The advantages of RFID in passive, wireless sensors in NASA applications are shown such as: Micrometeoroid impact detection and Sensor measurements in environmental facilities The potential for E-textiles for wireless and RFID are also examined.

  16. Overview of RFID technology and its applications in the food industry.

    PubMed

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns. PMID:19799677

  17. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  18. Distance-dependent Schwarz-based integral estimates for two-electron integrals: Reliable tightness vs. rigorous upper bounds

    NASA Astrophysics Data System (ADS)

    Maurer, Simon A.; Lambrecht, Daniel S.; Flaig, Denis; Ochsenfeld, Christian

    2012-04-01

    A new integral estimate for four-center two-electron integrals is introduced that accounts for distance information between the bra- and ket-charge distributions describing the two electrons. The screening is denoted as QQR and combines the most important features of the conventional Schwarz screening by Häser and Ahlrichs published in 1989 [J. Comput. Chem. 10, 104 (1989), 10.1002/jcc.540100111] and our multipole-based integral estimates (MBIE) introduced in 2005 [D. S. Lambrecht and C. Ochsenfeld, J. Chem. Phys. 123, 184101 (2005), 10.1063/1.2079967]. At the same time the estimates are not only tighter but also much easier to implement, so that we recommend them instead of our MBIE bounds introduced first for accounting for charge-distance information. The inclusion of distance dependence between charge distributions is not only useful at the SCF level but is particularly important for describing electron-correlation effects, e.g., within AO-MP2 theory, where the decay behavior is at least 1/R4 or even 1/R6. In our present work, we focus on studying the efficiency of our QQR estimates within SCF theory and demonstrate the performance for a benchmark set of 44 medium to large molecules, where savings of up to a factor of 2 for exchange integrals are observed for larger systems. Based on the results of the benchmark set we show that reliable tightness of integral estimates is more important for the screening performance than rigorous upper bound properties.

  19. Neural Decoding and “Inner” Psychophysics: A Distance-to-Bound Approach for Linking Mind, Brain, and Behavior

    PubMed Central

    Ritchie, J. Brendan; Carlson, Thomas A.

    2016-01-01

    A fundamental challenge for cognitive neuroscience is characterizing how the primitives of psychological theory are neurally implemented. Attempts to meet this challenge are a manifestation of what Fechner called “inner” psychophysics: the theory of the precise mapping between mental quantities and the brain. In his own time, inner psychophysics remained an unrealized ambition for Fechner. We suggest that, today, multivariate pattern analysis (MVPA), or neural “decoding,” methods provide a promising starting point for developing an inner psychophysics. A cornerstone of these methods are simple linear classifiers applied to neural activity in high-dimensional activation spaces. We describe an approach to inner psychophysics based on the shared architecture of linear classifiers and observers under decision boundary models such as signal detection theory. Under this approach, distance from a decision boundary through activation space, as estimated by linear classifiers, can be used to predict reaction time in accordance with signal detection theory, and distance-to-bound models of reaction time. Our “neural distance-to-bound” approach is potentially quite general, and simple to implement. Furthermore, our recent work on visual object recognition suggests it is empirically viable. We believe the approach constitutes an important step along the path to an inner psychophysics that links mind, brain, and behavior. PMID:27199652

  20. Electromagnetic compatibility of implantable neurostimulators to RFID emitters

    PubMed Central

    2011-01-01

    Background The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Methods Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz Results The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. Conclusions The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters. PMID:21658266

  1. Panel: RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  2. Managing RFID sensors networks with a general purpose RFID middleware.

    PubMed

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  3. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    PubMed Central

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  4. RFID solution benefits Cambridge hospital.

    PubMed

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals. PMID:24341115

  5. Evaluation of RFID Tags to Permanently Mark Trees in Natural Populations

    PubMed Central

    Marczewski, Tobias; Ma, Yongpeng; Sun, Weibang

    2016-01-01

    Long-term ecological and genetic studies in natural populations of tree species require marking techniques so that individuals can be re-visited over time, even in difficult terrain. Both GPS coordinates and physical labels have disadvantages that can make re-finding trees difficult. We tested passive and semi-active radio frequency identification (RFID) tags and readers as a means to relocate individual trees. Passive RFID tags do not provide a good solution because of low transmission power of hand-held readers and strong directionality. Semi-active RFID tags provide detection over longer distances, but also suffer from strong directionality. Active RFID tags promise an improvement over semi-passive tags, and could be evaluated in a future study. We conclude that RFID technology has the potential to improve the ability of researchers to locate individual trees repeatedly under natural conditions, and can be used in conjunction with other marking techniques such as physical tags and GPS coordinates.

  6. An RFID-based on-lens sensor system for long-term IOP monitoring.

    PubMed

    Hsu, Shun-Hsi; Chiou, Jin-Chern; Liao, Yu-Te; Yang, Tzu-Sen; Kuei, Cheng-Kai; Wu, Tsung-Wei; Huang, Yu-Chieh

    2015-01-01

    In this paper, an RFID-based on-lens sensor system is proposed for noninvasive long-term intraocular pressure monitoring. The proposed sensor IC, fabricated in a 0.18um CMOS process, consists of capacitive sensor readout circuitry, RFID communication circuits, and digital processing units. The sensor IC is integrated with electroplating capacitive sensors and a receiving antenna on the contact lens. The sensor IC can be wirelessly powered, communicate with RFID compatible equipment, and perform IOP measurement using on-lens capacitive sensor continuously from a 2cm distance while the incident power from an RFID reader is 20 dBm. The proposed system is compatible to Gen2 RFID protocol, extending the flexibility and reducing the self-developed firmware efforts. PMID:26738033

  7. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  8. RFID Label Tag Design for Metallic Surface Environments

    PubMed Central

    Park, Chong Ryol; Eom, Ki Hwan

    2011-01-01

    This paper describes a metal mount RFID tag that works reliably on metallic surfaces. The method proposes the use of commercial label type RFID tags with 2.5 mm thick Styrofoam103.7 with a relative permittivity of 1.03 attached on the back of the tag. In order to verify the performance of the proposed method, we performed experiments on an electric transformer supply chain system. The experimental results showed that the proposed tags can communicate with readers from a distance of 2 m. The recognition rates are comparable to those of commercial metallic mountable tags. PMID:22346612

  9. Cutting Edge RFID Technologies for NASA Applications

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.

    2007-01-01

    This viewgraph document reviews the use of Radio-frequency identification (RFID) for NASA applications. Some of the uses reviewed are: inventory management in space; potential RFID uses in a remote human outpost; Ultra-Wideband RFID for tracking; Passive, wireless sensors in NASA applications such as Micrometeoroid impact detection and Sensor measurements in environmental facilities; E-textiles for wireless and RFID.

  10. Precise RFID localization in impaired environment through sparse signal recovery

    NASA Astrophysics Data System (ADS)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  11. RFID receiver apparatus and method

    DOEpatents

    Scott, Jeffrey Wayne

    2006-12-26

    An RFID backscatter interrogator for transmitting data to an RFID tag, generating a carrier for the tag, and receiving data from the tag modulated onto the carrier, the interrogator including a single grounded-coplanar wave-guide circuit board and at least one surface mount integrated circuit supported by the circuit board.

  12. Design considerations and tradeoffs for passive RFID tags

    NASA Astrophysics Data System (ADS)

    Hussien, Faisal A.; Turker, Didem Z.; Srinivasan, Rangakrishnan; Mobarak, Mohamed S.; Cortes, Fernando P.; Sanchez-Sinencio, Edgar

    2005-06-01

    Radio Frequency Identification (RFID) systems are widely used in a variety of tracking, security and tagging applications. Their operation in non line-of-sight environments makes them superior over similar devices such as barcode and infrared tags. RFID systems span a wide range of applications: medical history storage, dental prosthesis tracking, oil drilling pipe and concrete stress monitoring, toll ways services, animal tracking applications, etc. Passive RFID tags generate their power from the incoming signal; therefore, they do not require a power source. Accordingly, minimizing the power consumption and the implementation area are usually the main design considerations. This paper presents a complete analysis on designing a passive RFID tag. A system design methodology is introduced including the main issues and tradeoffs between different design parameters. The uplink modulation techniques used (ASK, PSK, FSK, and PWM) are illustrated showing how to choose the appropriate signaling scheme for a specific data rate, a certain distance of operation and a limited power consumption budget. An antenna system (transmitter and receiver) is proposed providing the maximum distance of operation with the transmitted power stated by FCC regulations. The backscatter modulation scheme used in the downlink is shown whether to be ASK-BM or PSK-BM and the differences between them are discussed. The key building blocks such as the charge pump, voltage reference, and the regulator used to generate the DC supply voltage from the incoming RF signal are discussed along with their design tradeoffs. A complete architecture for a passive RFID tag is provided as an example to illustrate the proposed RFID tag design methodology.

  13. Commercial Product Activation Using RFID

    NASA Technical Reports Server (NTRS)

    Jedrey, Thomas

    2008-01-01

    Radio-frequency identification (RFID) would be used for commercial product activation, according to a proposal. What is new here is the concept of combining RFID with activation - more specifically, using RFID for activating commercial products (principally, electronic ones) and for performing such ancillary functions as tracking individual product units on production lines, tracking shipments, and updating inventories. According to the proposal, an RFID chip would be embedded in each product. The information encoded in the chip would include a unique number for identifying the product. An RFID reader at the point of sale would record the number of the product and would write digital information to the RFID chip for either immediate activation of the product or for later interrogation and processing. To be practical, an RFID product-activation system should satisfy a number of key requirements: the system should be designed to be integrable into the inventory-tracking and the data-processing and -communication infrastructures of businesses along the entire supply chain from manufacture to retail; the system should be resistant to sophisticated hacking; activation codes should be made sufficiently complexity to minimize the probability of activating stolen products; RFID activation equipment at points of sale must be capable to two-way RF communication for the purposes of reading information from, and writing information to, embedded RFID chips; the equipment at points of sale should be easily operable by sales clerks with little or no training; the point-of-sale equipment should verify activation and provide visible and/or audible signals indicating verification or lack thereof; and, the system should be able to handle millions of products per year with minimal human intervention, among other requirements.

  14. Survey of RFID and Its Application to International Ocean/Air Container Tracking

    NASA Astrophysics Data System (ADS)

    Katayama, Minoru; Nakada, Hiroshi; Hayashi, Hitoshi; Shimizu, Masashi

    “Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Active RFID is more advantageous than passive RFID and enables higher data reading performance over longer distances. This paper surveys active RFID systems, the services they currently promise to provide, technical problems common to these services, and the direction in which research should head in the future. It also reports the results of EPCglobal (EPC: Electronic Product Code) pilot tests conducted on global logistics for tracking ocean/air container transportation using active RFID systems for which we developed several new types of active RFID tags. The test results confirm that our active RFID tags have sufficient capability and low power consumption to well support ocean/air transportation and logistics service.

  15. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  16. Characterization of polymer silver pastes for screen printed flexible RFID antennas

    NASA Astrophysics Data System (ADS)

    Janeczek, Kamil; Jakubowska, Małgorzata; Futera, Konrad; MłoŻniak, Anna; Kozioł, GraŻyna; Araźna, Aneta

    Radio Frequency Identification (RFID) systems have become more and more popular in the last few years because of their wide application fields, such as supply chain management and logistics. To continue their development further investigations of new conductive materials for fabrication of RFID transponders' antennas are necessary to be carried out. These materials should provide high flexibility and good radiation performance of printed antennas. In this paper, two polymer silver pastes based on silver flakes were characterized with regard to manufacturing of flexible RFID antennas with screen printing technique. Foil and paper were used as a substrate materials. Surface profile of the printed antennas was measured using an optical profilometer and their resistance was measured with a four-point-probe method. Antenna flexibility was evaluated in cyclic bending tests and its performance with reflection coefficient measurements with the use of differential probe connected to a vector network analyzer. In addition, a maximum read distance of a fabricated RFID transponder was measured.

  17. Experimental studies of high-accuracy RFID localization with channel impairments

    NASA Astrophysics Data System (ADS)

    Pauls, Eric; Zhang, Yimin D.

    2015-05-01

    Radio frequency identification (RFID) systems present an incredibly cost-effective and easy-to-implement solution to close-range localization. One of the important applications of a passive RFID system is to determine the reader position through multilateration based on the estimated distances between the reader and multiple distributed reference tags obtained from, e.g., the received signal strength indicator (RSSI) readings. In practice, the achievable accuracy of passive RFID reader localization suffers from many factors, such as the distorted RSSI reading due to channel impairments in terms of the susceptibility to reader antenna patterns and multipath propagation. Previous studies have shown that the accuracy of passive RFID localization can be significantly improved by properly modeling and compensating for such channel impairments. The objective of this paper is to report experimental study results that validate the effectiveness of such approaches for high-accuracy RFID localization. We also examine a number of practical issues arising in the underlying problem that limit the accuracy of reader-tag distance measurements and, therefore, the estimated reader localization. These issues include the variations in tag radiation characteristics for similar tags, effects of tag orientations, and reader RSS quantization and measurement errors. As such, this paper reveals valuable insights of the issues and solutions toward achieving high-accuracy passive RFID localization.

  18. Spatial and temporal analysis on the distribution of active radio-frequency identification (RFID) tracking accuracy with the Kriging method.

    PubMed

    Liu, Xin; Shannon, Jeremy; Voun, Howard; Truijens, Martijn; Chi, Hung-Lin; Wang, Xiangyu

    2014-01-01

    Radio frequency identification (RFID) technology has already been applied in a number of areas to facilitate the tracking process. However, the insufficient tracking accuracy of RFID is one of the problems that impedes its wider application. Previous studies focus on examining the accuracy of discrete points RFID, thereby leaving the tracking accuracy of the areas between the observed points unpredictable. In this study, spatial and temporal analysis is applied to interpolate the continuous distribution of RFID tracking accuracy based on the Kriging method. An implementation trial has been conducted in the loading and docking area in front of a warehouse to validate this approach. The results show that the weak signal area can be easily identified by the approach developed in the study. The optimum distance between two RFID readers and the effect of the sudden removal of readers are also presented by analysing the spatial and temporal variation of RFID tracking accuracy. This study reveals the correlation between the testing time and the stability of RFID tracking accuracy. Experimental results show that the proposed approach can be used to assist the RFID system setup process to increase tracking accuracy. PMID:25356648

  19. Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method

    PubMed Central

    Liu, Xin; Shannon, Jeremy; Voun, Howard; Truijens, Martijn; Chi, Hung-Lin; Wang, Xiangyu

    2014-01-01

    Radio frequency identification (RFID) technology has already been applied in a number of areas to facilitate the tracking process. However, the insufficient tracking accuracy of RFID is one of the problems that impedes its wider application. Previous studies focus on examining the accuracy of discrete points RFID, thereby leaving the tracking accuracy of the areas between the observed points unpredictable. In this study, spatial and temporal analysis is applied to interpolate the continuous distribution of RFID tracking accuracy based on the Kriging method. An implementation trial has been conducted in the loading and docking area in front of a warehouse to validate this approach. The results show that the weak signal area can be easily identified by the approach developed in the study. The optimum distance between two RFID readers and the effect of the sudden removal of readers are also presented by analysing the spatial and temporal variation of RFID tracking accuracy. This study reveals the correlation between the testing time and the stability of RFID tracking accuracy. Experimental results show that the proposed approach can be used to assist the RFID system setup process to increase tracking accuracy. PMID:25356648

  20. The Use of Mn(II) Bound to His-tags as Genetically Encodable Spin-Label for Nanometric Distance Determination in Proteins.

    PubMed

    Ching, H Y Vincent; Mascali, Florencia C; Bertrand, Hélène C; Bruch, Eduardo M; Demay-Drouhard, Paul; Rasia, Rodolfo M; Policar, Clotilde; Tabares, Leandro C; Un, Sun

    2016-03-17

    A genetically encodable paramagnetic spin-label capable of self-assembly from naturally available components would offer a means for studying the in-cell structure and interactions of a protein by electron paramagnetic resonance (EPR). Here, we demonstrate pulse electron-electron double resonance (DEER) measurements on spin-labels consisting of Mn(II) ions coordinated to a sequence of histidines, so-called His-tags, that are ubiquitously added by genetic engineering to facilitate protein purification. Although the affinity of His-tags for Mn(II) was low (800 μM), Mn(II)-bound His-tags yielded readily detectable DEER time traces even at concentrations expected in cells. We were able to determine accurately the distance between two His-tag Mn(II) spin-labels at the ends of a rigid helical polyproline peptide of known structure, as well as at the ends of a completely cell-synthesized 3-helix bundle. This approach not only greatly simplifies the labeling procedure but also represents a first step towards using self-assembling metal spin-labels for in-cell distance measurements. PMID:26938795

  1. Analysis and Design of a Long Range PTFE Substrate UHF RFID Tag for Cargo Container Identification

    NASA Astrophysics Data System (ADS)

    Petrariu, Adrian-Ioan; Popa, Valentin

    2016-01-01

    In this paper, a high-performances microstrip antenna for UHF (ultra high frequency) RFID (radio frequency identification) tag is designed, prototyped and tested. The antenna consists of two main components: a 1.52 mm RT/duroid 5880 laminate substrate on which the antenna is designed and a 10 mm polytetrafluoroethylene (PTFE) dielectric material placed as a separator between the antenna and the reference ground plane for the microstrip antenna. With this structure, the RFID tag can reach a maximum reading distance of 19 m, although the antenna has a compact size of 80 mm × 50 mm. The long reading distance is obtained by attaching to the antenna an RFID chip that can provide a reading sensitivity of -20.5 dBm. The high bandwidth from 677 MHz to 947 MHz measured at -10 dB, makes the tag being usable worldwide especially for cargo container identification, the main purpose of this research.

  2. Group Management Method of RFID Passwords for Privacy Protection

    NASA Astrophysics Data System (ADS)

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.

  3. A Framework for Sediment Particle Tracking via Radio Frequency IDentification (RFID)

    NASA Astrophysics Data System (ADS)

    Tsakiris, Achilleas; Papanicolaou, Thanos; Abban, Benjamin

    2016-04-01

    The study of sedimentary and morphodynamic processes in riverine environments has recently been shifting from the traditional Eulerian, static perspective to a Lagrangian perspective, which considers the movement characteristics of the individual transported particles, such as their travel and resting distance and time. The Lagrangian framework, in turn allows to better study processes such as bedload particle diffusion, erosion and deposition within a river reach, to more accurately predict bedload fluxes especially through the use of stochastic Discrete Particle models. A technology that goes hand-in-hand with this Lagrangian perspective is Radio Frequency IDentification (RFID), which has been recently applied for tracking the movement of tagged sediment particles within the river continuum. RFID allows the wireless, bidirectional exchange of information between a base station, known as the reader, with a typically large number of transponders (or tags) via an (excitation) antenna. RFID allows essentially the unique, wireless detection and identification of a transponder over a distance. The goal of this study is to further enhance the utility of RFID in riverine applications by developing a framework that allows extracting the 3D location of RFID tagged sediment particles in nearly real-time. To address the goal of this coupled theoretical and experimental study, a semi-theoretical approach based on antenna inductive coupling was combined with experimental measurements for developing a relationship that provides an estimate of the distance between a tagged particle and the antenna using the Return Signal Strength Indication (RSSI). The RSSI quantifies the magnetic energy transmitted from the transponder to the antenna. The RFID system used in this study was a passive, Low-Frequency (LF) system, which ensured that the LF radio waves could penetrate through the river bed material. The RSSI of the signal transmitted from each transponder was measured with an

  4. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm

    PubMed Central

    Han, Soohee; Kim, Junghwan; Park, Choung-Hwan; Yoon, Hee-Cheon; Heo, Joon

    2009-01-01

    Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN) algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space. PMID:22408540

  5. RFID Technology for Inventory Management

    ScienceCinema

    None

    2012-12-31

    The Pacific Northwest National Laboratory is leveraging the use and application of radio frequency identification (RFID) technology to a variety of markets. Tagging and tracking of individual items for inventory control is revealing rich rewards through increased time efficiency and reduced human intervention.

  6. RFID Technology for Inventory Management

    SciTech Connect

    2012-05-01

    The Pacific Northwest National Laboratory is leveraging the use and application of radio frequency identification (RFID) technology to a variety of markets. Tagging and tracking of individual items for inventory control is revealing rich rewards through increased time efficiency and reduced human intervention.

  7. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    NASA Technical Reports Server (NTRS)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  8. Antenna for passive RFID tags

    NASA Astrophysics Data System (ADS)

    Schiopu, Paul; Manea, Adrian; Cristea, Ionica; Grosu, Neculai; Vladescu, Marian; Craciun, Anca-Ileana; Craciun, Alexandru

    2015-02-01

    Minuscule devices, called RFID tags are attached to objects and persons and emit information which positioned readers may capture wirelessly. Many methods of identification have been used, but that of most common is to use a unique serial number for identification of person or object. RFID tags can be characterized as either active or passive [1,2]. Traditional passive tags are typically in "sleep" state until awakened by the reader's emitted field. In passive tags, the reader's field acts to charge the capacitor that powers the badge and this can be a combination of antenna and barcodes obtained with SAW( Surface Acoustic Wave) devices [1,2,3] . The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader. The paper contribution are targeted to antenna for passive RFID tags. The electromagnetic field generated by the reader is somehow oriented by the reader antenna and power is induced in the tag only if the orientation of the tag antenna is appropriate. A tag placed orthogonal to the reader yield field will not be read. This is the reason that guided manufacturers to build circular polarized antenna capable of propagating a field that is alternatively polarized on all planes passing on the diffusion axis. Passive RFID tags are operated at the UHF frequencies of 868MHz (Europe) and 915MHz (USA) and at the microwave frequencies of 2,45 GHz and 5,8 GHz . Because the tags are small dimensions, in paper, we present the possibility to use circular polarization microstrip antenna with fractal edge [2].

  9. Extended-Range Passive RFID and Sensor Tags

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  10. Small-scale Testing of RFID in a Hospital Setting: RFID as Bed Trigger

    PubMed Central

    Kannry, Joseph; Emro, Susan; Blount, Marion; Ebling, Maria

    2007-01-01

    RFID technology shows significant potential for transforming healthcare, yet few studies assess this potential. Our study measured the effectiveness of using RFID as a bed trigger: a tool to accelerate identification of empty beds. We made a small alteration in the discharge process to associate RFID tags with patients and created an RFID-based system that automatically determined discharge time. For each patient, we evaluated the difference in the discharge times recorded manually by the current process and the RFID-based system. The study was conducted on 86 patients over 2 months in 2 physically separate multi-specialty units. Compared to the preexisting process, the RFID-based system identified empty beds >20 minutes earlier 67% of the time with an average of 25 minutes and median of 9 minutes earlier. Hospital leadership defined an improvement of ~10 minutes as significant. With minimal investment, our small-scale study lead hospital leadership to begin planning RFID deployment. PMID:18693863

  11. Passive RFID tag based heart rate monitoring from an ECG signal.

    PubMed

    Vora, Shrenik; Dandekar, Kapil; Kurzweg, Timothy

    2015-08-01

    In this paper, we propose a monitoring system that employs a passive RFID tag to transmit heart rate using an ECG signal as its source. This system operates without a battery and has been constructed with easily available commercial components. Here, an RFID tag is used as an on-off keying device, wherein it is normally transmitting, but turns off every time a heart beat is detected. Heart beats ranging from 30BPM through 300BPM are successfully measured using our device. It is shown that the system is capable of providing accurate heart rate measurements up to a distance of ten feet with a standard deviation of less than one beat per minute without a local power source. The proposed system is also found to be resilient in the presence of an additional RFID tag. PMID:26737271

  12. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol.

    PubMed

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  13. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    PubMed Central

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  14. RFID tags as a direct tracer for water and sediment dynamics

    NASA Astrophysics Data System (ADS)

    Sommerer, Erik; Plate, Simon; Güntner, Andreas

    2014-05-01

    derived transport distances and velocities for a one year period. The transport behavior of the RFID tags was similar to the micrite limestone material of the badland. These results indicate the important role of terrain position and vegetation patches for erosion patterns, sediment transfer and the associated time scales along the catchment. We assess the potentials and limitations of the RFID technique as a direct tracer for assessing water and sediment connectivity along hillslopes to first order channels.

  15. Applications of Radio Frequency Identification (RFID) in Mining Industries

    NASA Astrophysics Data System (ADS)

    Khairul Nizam Mahmad, Mohd; Z, Mohd Remy Rozainy M. A.; Baharun, Norlia

    2016-06-01

    RFID technology has recently become a dream of many companies or organizations because of its strategic potential in transforming mining operations. Now is the perfect time, for RFID technology arise as the next revolution in mining industries. This paper will review regarding the application of RFID in mining industries and access knowledge regarding RFID technology and overseen the opportunity of this technology to become an importance element in mining industries. The application of Radio-Frequency Identification (RFID) in mining industries includes to control of Personal Protective Equipment (PPE), control of personnel to access mining sites and RFID solutions for tracking explosives.

  16. A Research on Issues Related to RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  17. Applying RFID technology in nuclear materials management.

    SciTech Connect

    Tsai, H.; Chen, K.; Liu, Y.; Norair, J. P.; Bellamy, S.; Shuler, J.; SRL; Savi Technology; DOE

    2008-01-01

    The Packaging Certification Program (PCP) of US Department of Energy (DOE) Environmental Management (EM), Office of Safety Management and Operations (EM-60), has developed a radio frequency identification (RFID) system for the management of nuclear materials. Argonne National Laboratory, a PCP supporting laboratory, and Savi Technology, a Lockheed Martin Company, are collaborating in the development of the RFID system, a process that involves hardware modification (form factor, seal sensor and batteries), software development and irradiation experiments. Savannah River National Laboratory and Argonne will soon field test the active RFID system on Model 9975 drums, which are used for storage and transportation of fissile and radioactive materials. Potential benefits of the RFID system are enhanced safety and security, reduced need for manned surveillance, real time access of status and history data, and overall cost effectiveness.

  18. A fractal circular polarized RFID tag antenna

    NASA Astrophysics Data System (ADS)

    Chaouki, Guesmi; Ferchichi, Abdelhak; Gharsallah, Ali

    2013-09-01

    In this paper, we present a novel fractal antenna for radiofrequency identification (RFID) tags. The proposed antenna has a resonant frequency equal to 2.45GHz and circular polarization. The fractal technique was very useful to obtain a miniaturization of antenna size by more than 30%. The gain and directivity of the antenna are acceptable for the desired RFID application. All the results are obtained using CST Microwave simulation tool.

  19. Behavior-based cleaning for unreliable RFID data sets.

    PubMed

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations. PMID:23112595

  20. Behavior-Based Cleaning for Unreliable RFID Data Sets

    PubMed Central

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations. PMID:23112595

  1. Development of Wireless RFID Glove for Various Applications

    NASA Astrophysics Data System (ADS)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  2. [Automatic tracking of cleaned dental instruments by means of the RFID technique].

    PubMed

    Krejci, Ivo; Ney, Hervé; Bonny, Diane; Bréhier, Céline; Massa, Nicole; Negrin, Nadège; Bovet, Marc

    2013-01-01

    For dental care professionals, the availability and cleanliness of reusable instruments is of major importance. In order to guarantee a proper reprocessing (cleaning, sterilization) of each instrument and ensure optimum safety for the patients, a single instrument traceability solution can be implemented. The RFID (Radio Frequency Identification) technology is the only approach that can provide a fully automated identification of instruments, and a precise monitoring throughout the reprocessing cycle. It consists in integrating a miniature electronic component (RFID tag) to each instrument able to communicate with a transmitter located at a relatively close distance and capable of uniquely identifying each element in any given container, even when closed. In 2011, a pilot project was implemented in collaboration with the Division of Dentistry (SMD) of the University of Geneva and the central sterilization of the Geneva University Hospitals (HUG). This project has demonstrated the applicability and usefulness of RFID technology for tracking reusable dental instruments. In particular, the time saved by the operators and the massive risk reduction when compared to the possible errors during the process of manual identification are two major elements that justify the implementation of an RFID-based instrument traceability solution. PMID:24554592

  3. The design of RFID convey or belt gate systems using an antenna control unit.

    PubMed

    Park, Chong Ryol; Lee, Seung Joon; Eom, Ki Hwan

    2011-01-01

    This paper proposes an efficient management system utilizing a Radio Frequency Identification (RFID) antenna control unit which is moving along with the path of boxes of materials on the conveyor belt by manipulating a motor. The proposed antenna control unit, which is driven by a motor and is located on top of the gate, has an array structure of two antennas with parallel connection. The array structure helps improve the directivity of antenna beam pattern and the readable RFID distance due to its configuration. In the experiments, as the control unit follows moving materials, the reading time has been improved by almost three-fold compared to an RFID system employing conventional fixed antennas. The proposed system also has a recognition rate of over 99% without additional antennas for detecting the sides of a box of materials. The recognition rate meets the conditions recommended by the Electronic Product Code glbal network (EPC)global for commercializing the system, with three antennas at a 20 dBm power of reader and a conveyor belt speed of 3.17 m/s. This will enable a host of new RFID conveyor belt gate systems with increased performance. PMID:22164119

  4. The Design of RFID Convey or Belt Gate Systems Using an Antenna Control Unit

    PubMed Central

    Park, Chong Ryol; Lee, Seung Joon; Eom, Ki Hwan

    2011-01-01

    This paper proposes an efficient management system utilizing a Radio Frequency Identification (RFID) antenna control unit which is moving along with the path of boxes of materials on the conveyor belt by manipulating a motor. The proposed antenna control unit, which is driven by a motor and is located on top of the gate, has an array structure of two antennas with parallel connection. The array structure helps improve the directivity of antenna beam pattern and the readable RFID distance due to its configuration. In the experiments, as the control unit follows moving materials, the reading time has been improved by almost three-fold compared to an RFID system employing conventional fixed antennas. The proposed system also has a recognition rate of over 99% without additional antennas for detecting the sides of a box of materials. The recognition rate meets the conditions recommended by the Electronic Product Code glbal network (EPC)global for commercializing the system, with three antennas at a 20 dBm power of reader and a conveyor belt speed of 3.17 m/s. This will enable a host of new RFID conveyor belt gate systems with increased performance. PMID:22164119

  5. A matrix lower bound

    SciTech Connect

    Grcar, Joseph F.

    2002-02-04

    A matrix lower bound is defined that generalizes ideas apparently due to S. Banach and J. von Neumann. The matrix lower bound has a natural interpretation in functional analysis, and it satisfies many of the properties that von Neumann stated for it in a restricted case. Applications for the matrix lower bound are demonstrated in several areas. In linear algebra, the matrix lower bound of a full rank matrix equals the distance to the set of rank-deficient matrices. In numerical analysis, the ratio of the matrix norm to the matrix lower bound is a condition number for all consistent systems of linear equations. In optimization theory, the matrix lower bound suggests an identity for a class of min-max problems. In real analysis, a recursive construction that depends on the matrix lower bound shows that the level sets of continuously differential functions lie asymptotically near those of their tangents.

  6. Implantation of an RFID-tag into human molars to reduce hard forensic identification labor. Part I: working principle.

    PubMed

    Thevissen, Patrick W; Poelman, Guy; De Cooman, Michel; Puers, Robert; Willems, Guy

    2006-05-15

    Recently the tsunami disaster, the London bombings and the landfall of hurricane Katrina demonstrated once more the need for an accurate, quick and easy to handle identification system. The implantation of a radio frequency identification (RFID) tag into a human tooth and the read-out of its information may give an answer to this problem. A description is given of the modification of an existing RFID-tag that was made for veterinary use. This modified system was implanted in human molars using directly bonded resin composites. A protocol for tooth preparation and tag implantation was developed. A study of tag read-out patterns, revealed their accurate read-out distance range, the optimal site of RFID-tag implantation, assemblage of its components, and dimensions of the primary coil. It was found that disassembling the commercial RFID-tags was practically feasible and resulted in a properly working set-up. Further research is needed to optimize the design and the stability of RFID-tags for human identification purposes. PMID:16563681

  7. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    ERIC Educational Resources Information Center

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  8. Preliminary exploration of the measurement of walking speed for the apoplectic people based on UHF RFID.

    PubMed

    Huang Hua-Lin; Mo Ling-Fei; Liu Ying-Jie; Li Cheng-Yang; Xu Qi-Meng; Wu Zhi-Tong

    2015-08-01

    The number of the apoplectic people is increasing while population aging is quickening its own pace. The precise measurement of walking speed is very important to the rehabilitation guidance of the apoplectic people. The precision of traditional measuring methods on speed such as stopwatch is relatively low, and high precision measurement instruments because of the high cost cannot be used widely. What's more, these methods have difficulty in measuring the walking speed of the apoplectic people accurately. UHF RFID tag has the advantages of small volume, low price, long reading distance etc, and as a wearable sensor, it is suitable to measure walking speed accurately for the apoplectic people. In order to measure the human walking speed, this paper uses four reader antennas with a certain distance to reads the signal strength of RFID tag. Because RFID tag has different RSSI (Received Signal Strength Indicator) in different distances away from the reader, researches on the changes of RSSI with time have been done by this paper to calculate walking speed. The verification results show that the precise measurement of walking speed can be realized by signal processing method with Gaussian Fitting-Kalman Filter. Depending on the variance of walking speed, doctors can predict the rehabilitation training result of the apoplectic people and give the appropriate rehabilitation guidance. PMID:26738158

  9. An Approach for Removing Redundant Data from RFID Data Streams

    PubMed Central

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  10. An approach for removing redundant data from RFID data streams.

    PubMed

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  11. An RFID Based Smart Feeder for Hummingbirds.

    PubMed

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-01-01

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future. PMID:26694402

  12. Enhanced UHF RFID tags for drug tracing.

    PubMed

    Catarinucci, Luca; Colella, Riccardo; De Blasi, Mario; Patrono, Luigi; Tarricone, Luciano

    2012-12-01

    Radio Frequency Identification (RFID) technology is playing a crucial role for item-level tracing systems in healthcare scenarios. The pharmaceutical supply chain is a fascinating application context, where RFID can guarantee transparency in the drug flow, supporting both suppliers and consumers against the growing counterfeiting problem. In such a context, the choice of the most adequate RFID tag, in terms of shape, frequency, size and reading range, is crucial. The potential presence of items containing materials hostile to the electromagnetic propagation exasperates the problem. In addition, the peculiarities of the different RFID-based checkpoints make even more stringent the requirements for the tag. In this work, the performance of several commercial UHF RFID tags in each step of the pharmaceutical supply chain has been evaluated, confirming the expected criticality. On such basis, a guideline for the electromagnetic design of new high-performance tags capable to overcome such criticalities has been defined. Finally, driven by such guidelines, a new enhanced tag has been designed, realized and tested. Due to patent pending issues, the antenna shape is not shown. Nevertheless, the optimal obtained results do not lose their validity. Indeed, on the one hand they demonstrate that high performance item level tracing systems can actually be implemented also in critical operating conditions. On the other hand, they encourage the tag designer to follow the identified guidelines so to realize enhanced UHF tags. PMID:22048779

  13. An RFID Based Smart Feeder for Hummingbirds

    PubMed Central

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F.; Tang, Wei

    2015-01-01

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future. PMID:26694402

  14. Study of Development for RFID System to Hospital Environment.

    PubMed

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system. PMID:26262206

  15. Thoracoscopic surgery support system using passive RFID marker.

    PubMed

    Takahata, Hiromi; Kojima, Fumitsugu; Okada, Minoru; Sugiura, Tadao; Sato, Toshihiko; Oshiro, Osamu

    2012-01-01

    This paper proposes a RFID based thoracoscopic surgery support system, which is capable of marking a tumor inside organ tissue. The marker composed of small RFID-tags is implanted in the vicinity of tumor found in the endoscopy test. In the thoracoscopic surgery operation for removing the tumor, an RFID detector determines the accurate position of the implanted RFID-tag markers by measuring the strength of the signal emitted from the target tag. Due to limitation in the size of RFID-tag, the proposed system employs a passive RFID. To activate the passive tag implanted in the organ tissue, this paper designs a saddle-shape efficient power supply antenna. A sensitive and frequency-selective receiver is then designed for detecting the weak signal from the tag. The feasibility test confirms that the proposed method is capable of determining the accurate location of RFID tags implanted in the patient's organ tissue. PMID:23365862

  16. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    NASA Astrophysics Data System (ADS)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  17. An expression of uncertainty and its application to positioning: a quality-metric and optimal ranges for the identification of cells with RFID.

    PubMed

    Del Rio, Eduardo; Ferreira, Luiz Felipe

    2015-01-01

    Here we devise an approach to model error and its propagation. Without approximations, we define the uncertainty of a measurement as its maximum possible error (maper). Thus, we propose and solve analytically two optimization problems. The one designed to determine the uncertainty of a measurement, the other specifically designed to optimize the accuracy of a RFID location system. The usefulness of this general approach is shown by applying it to the particular instance of estimating the coordinates of a person in real-time using RFID devices. This way, exact formulae to evaluate the quality of this measurement are mathematically deduced, which is useful, for example, to predict whether an inexpensive RFID location technology can meet a desired quality standard or not. The second optimization problem proposed here defines an optimal range (orange) for the RFID devices employed. Again, analytically, its exact formulae were derived. We propose an approach to distribute RFID tags for a positioning system based solely on RFID technology. In the light of the formulae, its quality is good enough as to locate emergency phone calls in real time. We found that key to an optimal performance is the range used and the distance between consecutive tags. PMID:26217551

  18. Pharmaceutical counterfeiting and the RFID technology intervention.

    PubMed

    Coustasse, Alberto; Arvidson, Cody; Rutsohn, Phil

    2010-07-01

    Both nationally and internationally, pharmaceutical counterfeiting has become a problem that is threatening economic stability and public health. The purpose of the present research study review was to analyze the scope and severity of pharmaceutical counterfeiting and to establish if the implantation of the Radio Frequency Identification Device (RFID) model can more efficiently be used within the pharmaceutical supply chain to reduce the problem counterfeit drugs impose on public health and international economic stability. Results indicated that implementing the RFID model for tracking drugs at the item level in the pharmaceutical supply chain has potential to alleviate the scope of the counterfeit drug problem. Recommendations for how the pharmaceutical industry may sooner adopt the RFID model are made. PMID:20582850

  19. Semantic-Based RFID Data Management

    NASA Astrophysics Data System (ADS)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  20. Design and Implementation of Embedded RFID Middleware

    NASA Astrophysics Data System (ADS)

    Zhen-xiang, Li.; Yu-xiang, Zhang

    An embedded RFID (Radio Frequency Identification) middleware based on ARM Linux operating system and S3C2410 hardware platform was designed and implemented. The system architecture and platform of software and hardware of this middleware were introduced. The key technology applied in some device management and tag data processing and the application of SQLite were specialized. Since its rich standard interfaces offered by the hardware platform, the middleware can connect with different kind of readers from different manufacturers without cosidering the diversity and complexity of RFID bottom layer hardware. So, it can supply upper layer application of system with a powerful, uniform platform, and lay a broader, richer foundation for the application of RFID.

  1. Design and evaluation of RFID deployments in a trauma resuscitation bay.

    PubMed

    Parlak, Siddika; Ayyer, Shriniwas; Liu, Ying Yu; Marsic, Ivan

    2014-05-01

    We examined configuring a radio frequency identification (RFID) equipment for the best object use detection in a trauma bay. Unlike prior work on RFID, we 1) optimized the accuracy of object use detection rather than just object detection; and 2) quantitatively assessed antenna placement while addressing issues specific to tag placement likely to occur in a trauma bay. Our design started with an analysis of the environment requirements and constraints. We designed several antenna setups with different number of components (RFID tags or antennas) and their orientations. Setups were evaluated under scenarios simulating a dynamic medical setting. We used three metrics with increasing complexity and bias: read rate, received signal strength indication distribution distance, and target application performance. Our experiments showed that antennas above the regions with high object density are most suitable for detecting object use. We explored tagging strategies for challenging objects so that sufficient readout rates are obtained for computing evaluation metrics. Among the metrics, distribution distance was correlated with target application performance, and also less biased and simpler to calculate, which made it an excellent metric for context-aware applications. We present experimental results obtained in the real trauma bay to validate our findings. PMID:24108484

  2. Introducing RFID at Middlesex University Learning Resources

    ERIC Educational Resources Information Center

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  3. Radio Frequency Identification (RFID) in Space

    NASA Technical Reports Server (NTRS)

    Bacon, John B.

    2011-01-01

    The ISS has some significant inventory management challenges. RFID solves many of these, and was deployed 8/2011. Significant issues (some unique to spacecraft) remain. NASA is interested and investing in technologies that will help to overcome the remaining issues.

  4. RFID: A Revolution in Automatic Data Recognition

    ERIC Educational Resources Information Center

    Deal, Walter F., III

    2004-01-01

    Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…

  5. A tool management system based on RFID

    NASA Astrophysics Data System (ADS)

    Wang, Z. G.; Xu, L. D.; Cai, D. S.; Xu, L.; Yu, H. H.

    2010-12-01

    Built the RFID (Radio Frequency Identification) hardware system then developed a tool management system based on Labview in the paper. The software can control the read/write device to read/write data through the serial port and use the database management module to add, query, modify and delete record. So, the automatic identification and management of cutting tool is realized.

  6. A tool management system based on RFID

    NASA Astrophysics Data System (ADS)

    Wang, Z. G.; Xu, L. D.; Cai, D. S.; Xu, L.; Yu, H. H.

    2011-05-01

    Built the RFID (Radio Frequency Identification) hardware system then developed a tool management system based on Labview in the paper. The software can control the read/write device to read/write data through the serial port and use the database management module to add, query, modify and delete record. So, the automatic identification and management of cutting tool is realized.

  7. Development and evaluation of a boat-mounted RFID antenna for monitoring freshwater mussels

    USGS Publications Warehouse

    Fischer, Jesse R.; Neebling, Travis E.; Quist, Michael C.

    2012-01-01

    Development of radio frequency identification (RFID) technology and passive integrated transponder (PIT) tags has substantially increased the ability of researchers and managers to monitor populations of aquatic organisms. However, use of transportable RFID antenna systems (i.e., backpack-mounted) is currently limited to wadeable aquatic environments (<1.4 m water depth). We describe the design, construction, and evaluation of a boat-mounted RFID antenna to detect individually PIT-tagged benthic aquatic organisms (mussels). We evaluated the effects of tag orientation on detection distances in water with a 32-mm half-duplex PIT tag. Detection distances up to 50 cm from the antenna coils were obtained, but detection distance was dependent on tag orientation. We also evaluated detection distance of PIT tags beneath the sediment to simulate detection of burrowing mussels with 23- and 32-mm tags. In sand substrate, the maximum detection distance varied from 3.5 cm and 4.5 cm (vertical tag orientation) to 24.7 cm and 39.4 cm (45° tag orientation) for the 23- and 32-mm PIT tags, respectively. Our results suggest a 1.4-m total detection width for tagged mussels on the substrate surface by the boat-mounted antenna system regardless of tag orientation. However, burrowed mussels may require multiple passes to increase detection that would be influenced by depth, tag orientation, and tag size. Construction of the boat-mounted antenna was relatively low in cost (<500 USD) and had several advantages (less labor and time intensive, increased safety) over traditional mussel sampling techniques (diving, snorkeling) in nonwadeable habitats.

  8. Investment Evaluation of RFID TechnologyApplications: An Evolution Perspective

    NASA Astrophysics Data System (ADS)

    Dimakopoulou, Andriana; Pramatari, Katerina; Karagiannaki, Angeliki; Papadopoulos, George; Paraskevopoulos, Antonis

    Prior empirical research on the evaluation of RFID technologytreats and assesses individual RFID applications independently and in isolation from each other. However, literature on investment evaluation of information technologies has recognised and utilised the significance of evaluating "interdependent" information systems (IS) projects with synergies. Moreover, previous studies when appraising the business value of an RFID investment ignore its opportunity to offer and evolve into additional follow-on investments in the future. Nevertheless, the importance of this notion has been acknowledged by the pertinent literature for the evaluation of other information technologies. This chapter proposes an approach for the investment evaluation of RFID applications considering them rather as a bundle of interdependent and sequential investments than as stand-alone ones. The results from a case study demonstrate how the proposed approach can be employed for the evaluation of RFID projects and offering an additional insight into evaluating investments in RFID applications.

  9. RFID - based Staff Control System (SCS) in Kazakhstan

    NASA Astrophysics Data System (ADS)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  10. Assessment of RFID Read Accuracy for ISS Water Kit

    NASA Technical Reports Server (NTRS)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  11. Evaluation of Efficiency Improvement in Vital Documentation Using RFID Devices.

    PubMed

    Kimura, Eizen; Nakai, Miho; Ishihara, Ken

    2016-01-01

    We introduced medical devices with RFID tags and the terminal with RFID reader in our hospital. Time study was conducted in two phases. In phase I, nurses round as usual, and in phase II, the nurse round the ward with a terminal installed on a cart. This study concluded that RFID system shortens the time for vital sign documentation. However, deploying the terminals at every bedside did not contribute the more time reduction. PMID:27332473

  12. The Application used RFID in Third Party Logistics*

    NASA Astrophysics Data System (ADS)

    Mingxiu, Zheng; Chunchang, Fu; Minggen, Yang

    RFID is a non-contact automatic identification technology, which will be the future information storage extraction and processing technology. In recent years the mainstream of the large-scale development has manifested the situation. RFID is the key technology of tripartite logistics information and automation. RFID-based logistics system can enlarge the logistics operation capacity, and improve labor productivity to reduce logistics operations mistakes.

  13. Low-cost inkjet antennas for RFID applications

    NASA Astrophysics Data System (ADS)

    Çiftçi, T.; Karaosmanoğlu, B.; Ergül, Ö.

    2016-03-01

    We present paper-based inkjet antennas that are fabricated by using silver-based cartridges in standard printers. In addition to their low costs, the produced antennas are flexible, environmentally friendly, and suitable for radio-frequency identification (RFID) applications. Among alternative choices, hybrid structures involving loop and parasitic meander parts are preferred and successfully combined with passive RFID chips. We also discuss main challenges in the design and fabrication of low-cost inkjet antennas and the related RFID tags.

  14. RFIDs can improve the patient care supply chain.

    PubMed

    Revere, Lee; Black, Ken; Zalila, Faiza

    2010-01-01

    Technologies that increase efficiency, enhance quality, and improve patient safety are essential for all healthcare organizations. Radio frequency identification devices (RFIDs) seem to be right for this challenge. RFIDs can be integrated into all areas of the internal patient supply chain, serving as clearinghouses of information. By providing timely information on patients, processes, and equipment, RFIDs can save time and reduce costs while simultaneously improving quality and patient safety. Healthcare leaders owe it to all constituencies to take a serious look at what RFIDs can offer. PMID:20194108

  15. Permissible Link Quality for RFID Anti-Collision in a Practical Environment

    NASA Astrophysics Data System (ADS)

    Kawakita, Yuusuke; Nakamura, Osamu; Murai, Jun

    UHF radio frequency identification (RFID) has gathered significant interest in the field of long-distance automatic identification applications. Since UHF RFID shares the frequency band with other RFID and/or other wireless systems, it is important to determine how much interference can be applied without causing a significant degradation of anti-collision speed. In this paper, the permissible link quality for RFID anti-collision in a practical environment is discussed by considering an erroneous communication link, taking into account of bit encoding and the type of interference. We approach the quantification of permissible link quality experimentally along with protocol simulations and the mathematical analyses. An international standard protocol, employing frame slotted ALOHA, was used as the air protocol. For these investigations, the present authors developed a protocol simulator. The simulation results were compared with analytical values based on Poisson distribution. The investigation in the return (tag to reader) link, and the forward (reader to tag) link, were analyzed separately. As result of the protocol simulation, it is generally important to secure the Pulse Error Rate 10-4 or better in both return and forward links for the anti-collision of 64 or less tags. The quality of the return link may be relaxed when the application does not require fast anti-collision. The degradation of the forward link, on the other hand, may entail loss of important commands, resulting in extremely slow anti-collision. It is measured experimentally that the required link quality can be relaxed by up to 10dB in the return links and by 5dB in the forward link when the primary source of interference originates in the interfering readers.

  16. A new laboratory radio frequency identification (RFID) system for behavioural tracking of marine organisms.

    PubMed

    Aguzzi, Jacopo; Sbragaglia, Valerio; Sarriá, David; García, José Antonio; Costa, Corrado; del Río, Joaquín; Mànuel, Antoni; Menesatti, Paolo; Sardà, Francesc

    2011-01-01

    Radio frequency identification (RFID) devices are currently used to quantify several traits of animal behaviour with potential applications for the study of marine organisms. To date, behavioural studies with marine organisms are rare because of the technical difficulty of propagating radio waves within the saltwater medium. We present a novel RFID tracking system to study the burrowing behaviour of a valuable fishery resource, the Norway lobster (Nephrops norvegicus L.). The system consists of a network of six controllers, each handling a group of seven antennas. That network was placed below a microcosm tank that recreated important features typical of Nephrops' grounds, such as the presence of multiple burrows. The animals carried a passive transponder attached to their telson, operating at 13.56 MHz. The tracking system was implemented to concurrently report the behaviour of up to three individuals, in terms of their travelled distances in a specified unit of time and their preferential positioning within the antenna network. To do so, the controllers worked in parallel to send the antenna data to a computer via a USB connection. The tracking accuracy of the system was evaluated by concurrently recording the animals' behaviour with automated video imaging. During the two experiments, each lasting approximately one week, two different groups of three animals each showed a variable burrow occupancy and a nocturnal displacement under a standard photoperiod regime (12 h light:12 h dark), measured using the RFID method. Similar results were obtained with the video imaging. Our implemented RFID system was therefore capable of efficiently tracking the tested organisms and has a good potential for use on a wide variety of other marine organisms of commercial, aquaculture, and ecological interest. PMID:22163710

  17. A New Laboratory Radio Frequency Identification (RFID) System for Behavioural Tracking of Marine Organisms

    PubMed Central

    Aguzzi, Jacopo; Sbragaglia, Valerio; Sarriá, David; García, José Antonio; Costa, Corrado; del Río, Joaquín; Mànuel, Antoni; Menesatti, Paolo; Sardà, Francesc

    2011-01-01

    Radio frequency identification (RFID) devices are currently used to quantify several traits of animal behaviour with potential applications for the study of marine organisms. To date, behavioural studies with marine organisms are rare because of the technical difficulty of propagating radio waves within the saltwater medium. We present a novel RFID tracking system to study the burrowing behaviour of a valuable fishery resource, the Norway lobster (Nephrops norvegicus L.). The system consists of a network of six controllers, each handling a group of seven antennas. That network was placed below a microcosm tank that recreated important features typical of Nephrops’ grounds, such as the presence of multiple burrows. The animals carried a passive transponder attached to their telson, operating at 13.56 MHz. The tracking system was implemented to concurrently report the behaviour of up to three individuals, in terms of their travelled distances in a specified unit of time and their preferential positioning within the antenna network. To do so, the controllers worked in parallel to send the antenna data to a computer via a USB connection. The tracking accuracy of the system was evaluated by concurrently recording the animals’ behaviour with automated video imaging. During the two experiments, each lasting approximately one week, two different groups of three animals each showed a variable burrow occupancy and a nocturnal displacement under a standard photoperiod regime (12 h light:12 h dark), measured using the RFID method. Similar results were obtained with the video imaging. Our implemented RFID system was therefore capable of efficiently tracking the tested organisms and has a good potential for use on a wide variety of other marine organisms of commercial, aquaculture, and ecological interest. PMID:22163710

  18. Rfid Based Traceability System For Sheepbreeding

    NASA Astrophysics Data System (ADS)

    Xing, Yan; Li, Hui; Zhang, Jian; Fu, Zetian

    As China's meat production is growing, the quality safety of meat food as an important human food sources has increasingly become a major issue which related to the national economy and people's livelihood. Using early warning technique, tracking and tracing techniques and so on in the key link of meat food production in order to fulfill quality control is an important method which can effectively guarantee the food quality and safety. The use of RFID techniques and handhelds can automatically collect information about sheep breeding. Meanwhile this information could be inquired conveniently through Internet. This study uses C/S (Client/Server) model structure, and builds the sheep breeding traceability system based on RFID.

  19. Reliable Food Traceability Using RFID Tagging

    NASA Astrophysics Data System (ADS)

    Azuara, Guillermo; Salazar, José L.; Tornos, José L.; Piles, Joan J.

    Radio Frequency IDentification (RFID) technology has numerous potential applications in various industries. One important use is for complete traceability of a specific product with the added advantage of being able to verify that quality controls have been passed, with all the necessary steps complied with and for the time required. The aim of this work is to present a food traceability system using RFID tags with contents guaranteed secure by the use of public-key cryptography and at an affordable cost without the need for substantial investment in infrastructure. Aggregate signatures are used so that all the steps can be signed in a reduced memory space. This type of signature is a cryptographic primitive that "consolidates" several signatures into one in such a way that if n users sign n messages, all the signatures can be grouped into one single signature.

  20. ISS Asset Tracking Using SAW RFID Technology

    NASA Technical Reports Server (NTRS)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  1. An Estimation for Availability of Battery less LF Band RFID Tag to Identify Patients in Operation Room from Viewpoint of Engineering

    NASA Astrophysics Data System (ADS)

    Hosaka, Ryosuke

    Nowadays, medical accidents increase in Japanese patient environment. Especially, misidentification of the patients occurred in operation room of higher level hospitals. It is considered that the great deals of accidents are due to mistakes by nurse. However, the accidents are prevented by management of patients. If a suitable patient identification system is developed, the accidents are prevented. In this study, new patient identification system using battery less LF band RFID(Radio Frequency Identification) is proposed. In the method, battery less RFID tag is attached to patient. In operation room, patient is identified before operation using the proposed system. However, identification distance of RFID is small. It is important that extension of the distance. In this study, antennas of RFID tag and sensor are designed. Two types of tag are proposed. One of them is set on wristband. An antenna for the tag is designed as a circular shape with 30mm in diameter. The other one is shaped like a necklace. The antenna is also designed 220mm, 240mm and 260mm in diameter. Using necklace type new antenna, sufficient identification distance for detection of the tag in the operation room is realized. The patient identification is realized using the proposed system

  2. A POI-Based RFID Reader Deployment and Associated Interference Effect

    NASA Astrophysics Data System (ADS)

    An, Donghun; Yang, Hoongee; Yang, Sunghyun; Kim, Youngsoo; Yook, Jonggwan; Kang, Bongsoon

    This paper presents a simulation based method to predict the amount of frequency interference in a passive type RFID system. To judge occurrence of frequency interference, we use a parameter POI (probability of interference) that depends on several factors such as multiple access method, emission mask, the number of channel, etc. Due to its dependence on several factors, a Monte-carlo based simulation is suitably used. Through the simulation, we draw minimum separation distance between two readers and examine performance degradation due to aggregate interfering readers. Moreover, we present a reader deployment strategy based on the average POI of active readers operating in some area.

  3. Evolution of RFID Applications in Construction: A Literature Review

    PubMed Central

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  4. Evolution of RFID Applications in Construction: A Literature Review.

    PubMed

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  5. Systems and Methods for RFID-Enabled Dispenser

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  6. Systems and Methods for RFID-Enabled Pressure Sensing Apparatus

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  7. System and Method for RFID-Enabled Information Collection

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  8. Mobile robot trajectory tracking using noisy RSS measurements: an RFID approach.

    PubMed

    Miah, M Suruz; Gueaieb, Wail

    2014-03-01

    Most RF beacons-based mobile robot navigation techniques rely on approximating line-of-sight (LOS) distances between the beacons and the robot. This is mostly performed using the robot's received signal strength (RSS) measurements from the beacons. However, accurate mapping between the RSS measurements and the LOS distance is almost impossible to achieve in reverberant environments. This paper presents a partially-observed feedback controller for a wheeled mobile robot where the feedback signal is in the form of noisy RSS measurements emitted from radio frequency identification (RFID) tags. The proposed controller requires neither an accurate mapping between the LOS distance and the RSS measurements, nor the linearization of the robot model. The controller performance is demonstrated through numerical simulations and real-time experiments. PMID:24268746

  9. Sediment routing through channel confluences: RFID tracer experiments from a gravel-bed river headwaters

    NASA Astrophysics Data System (ADS)

    Imhoff, K.; Wilcox, A. C.

    2014-12-01

    Tributary confluences may significantly impact large-scale patterns of sediment transport because of their role in connecting individual streams in a network. These unique locations feature complex flow structures and geomorphic features, and may represent ecological hotspots. Sediment transport across confluences is poorly understood, however. We present research on coarse sediment transport and dispersion through confluences using sediment tracers in the East Fork Bitterroot River, Montana, USA. We tagged a range of gravel (>40 mm) and cobble particles with Radio Frequency Identification (RFID) tags and painted smaller (10-40 mm) gravels, and then we traced them through confluences in a montane river's headwaters. We measured the effects of confluences on dispersion, path length, and depositional location and compare properties of sediment routing with a non-confluence control reach. We also measured topographic change through repeat bed surveys and combined topography, hydraulics, and tracer measurements to calculate basal shear and critical Shields stresses for different grain sizes. Field observations suggest that tagged particles in confluences routed along flanks of scour holes in confluences, with sediment depositing further downstream along bank-lateral bars than within the channel thalweg. Travel distances of RFID-tagged particles ranged up to 35 meters from original seeding points, with initial recovery rates of RFID-tagged tracers ranging between 84-89%. In both confluence and control reaches only partial mobility was observed within the entire tracer population, suggesting a hiding effect imposed by the roughness of the bed. Particles seeded in the channel thalweg experienced further travel distances than those seeded towards the banks and on bars. Differences in dispersion between confluence and control reaches are implied by field observation. This study quantified patterns of sediment routing within confluences and provided insight to the importance

  10. Signal and array processing techniques for RFID readers

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Amin, Moeness; Zhang, Yimin

    2006-05-01

    Radio Frequency Identification (RFID) has recently attracted much attention in both the technical and business communities. It has found wide applications in, for example, toll collection, supply-chain management, access control, localization tracking, real-time monitoring, and object identification. Situations may arise where the movement directions of the tagged RFID items through a portal is of interest and must be determined. Doppler estimation may prove complicated or impractical to perform by RFID readers. Several alternative approaches, including the use of an array of sensors with arbitrary geometry, can be applied. In this paper, we consider direction-of-arrival (DOA) estimation techniques for application to near-field narrowband RFID problems. Particularly, we examine the use of a pair of RFID antennas to track moving RFID tagged items through a portal. With two antennas, the near-field DOA estimation problem can be simplified to a far-field problem, yielding a simple way for identifying the direction of the tag movement, where only one parameter, the angle, needs to be considered. In this case, tracking of the moving direction of the tag simply amounts to computing the spatial cross-correlation between the data samples received at the two antennas. It is pointed out that the radiation patterns of the reader and tag antennas, particularly their phase characteristics, have a significant effect on the performance of DOA estimation. Indoor experiments are conducted in the Radar Imaging and RFID Labs at Villanova University for validating the proposed technique for target movement direction estimations.

  11. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    PubMed

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction. PMID:22079476

  12. An Active RFID Accountability System (RAS) for Constrained Wireless Environments

    SciTech Connect

    Barker, Alan M; Hanson, Gregory R; Sexton, Angela Kay; Jones Jr, J P; Freer, Eva B; Sjoreen, Andrea L

    2011-01-01

    A team from Oak Ridge National Laboratory (ORNL) has developed an RFID Accountability System (RAS) that allows items with active RFID tags to be tracked in environments where tags may not be able to transmit their location continuously. The system uses activators that transmit a short range signal. Active RFID tags are in a sleep state until they encounter an activator. Then they transmit a signal that is picked up by the antennas installed throughout the building. This paper presents the theory of operation, application areas, lessons learned, and key features developed over the course of seven years of development and use.

  13. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    PubMed

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity. PMID:25308613

  14. Investigation of Interference Models for RFID Systems.

    PubMed

    Zhang, Linchao; Ferrero, Renato; Gandino, Filippo; Rebaudengo, Maurizio

    2016-01-01

    The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols. PMID:26861326

  15. A secure RFID authentication protocol adopting error correction code.

    PubMed

    Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  16. Ethical implications of implantable radiofrequency identification (RFID) tags in humans.

    PubMed

    Foster, Kenneth R; Jaeger, Jan

    2008-08-01

    This article reviews the use of implantable radiofrequency identification (RFID) tags in humans, focusing on the VeriChip (VeriChip Corporation, Delray Beach, FL) and the associated VeriMed patient identification system. In addition, various nonmedical applications for implanted RFID tags in humans have been proposed. The technology offers important health and nonhealth benefits, but raises ethical concerns, including privacy and the potential for coercive implantation of RFID tags in individuals. A national discussion is needed to identify the limits of acceptable use of implantable RFID tags in humans before their use becomes widespread and it becomes too late to prevent misuse of this useful but ethically problematic technology. PMID:18802863

  17. A Graph Summarization Algorithm Based on RFID Logistics

    NASA Astrophysics Data System (ADS)

    Sun, Yan; Hu, Kongfa; Lu, Zhipeng; Zhao, Li; Chen, Ling

    Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will generate a complete history of all the individual locations that it occupied at every point in time. The movement trails of such RFID data form gigantic commodity flowgraph representing the locations and durations of the path stages traversed by each item. In this paper, we use graph to construct a warehouse of RFID commodity flows, and introduce a database-style operation to summarize graphs, which produces a summary graph by grouping nodes based on user-selected node attributes, further allows users to control the hierarchy of summaries. It can cut down the size of graphs, and provide convenience for users to study just on the shrunk graph which they interested. Through extensive experiments, we demonstrate the effectiveness and efficiency of the proposed method.

  18. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  19. Outward Bound.

    ERIC Educational Resources Information Center

    Outward Bound, Inc., Andover, MA.

    The Outward Bound concept was developed in Germany and Great Britain with the saving of human life as the ultimate goal. Courses are designed to help students discover their true physical and mental limits through development of skills including emergency medical aid, firefighting, search and rescue, mountaineering, and sailing. Five Outward Bound…

  20. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed. PMID:21751015

  1. Processing Uncertain RFID Data in Traceability Supply Chains

    PubMed Central

    Xie, Dong; Xiao, Jie

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries. PMID:24737978

  2. Processing uncertain RFID data in traceability supply chains.

    PubMed

    Xie, Dong; Xiao, Jie; Guo, Guangjun; Jiang, Tong

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries. PMID:24737978

  3. Application of RFID technology-upper extremity rehabilitation training.

    PubMed

    Chen, Chih-Chen; Chen, Yu-Luen; Chen, Shih-Ching

    2016-01-01

    [Purpose] Upper extremity rehabilitation after an injury is very important. This study proposes radio frequency identification (RFID) technology to improve and enhance the effectiveness of the upper extremity rehabilitation. [Subjects and Methods] People use their upper extremities to conduct daily activities. When recovering from injuries, many patients neglect the importance of rehabilitation, which results in degraded function. This study recorded the training process using the traditional rehabilitation hand gliding cart with a RFID reader, RFID tags in the panel, and a servo host computer. [Results] Clinical evidence, time taken to achieve a full score, counts of missing the specified spots, and Brunnstrom stage of aided recovery, the proximal part of the upper extremity show that the RFID-based upper extremity training significantly and reduce negative impacts of the disability in daily life and activities. [Conclusion] This study combined a hand-gliding cart with an RFID reader, and when patients moved the cart, the movement could be observed via the activated RFID tags. The training data was collected and quantified for a better understanding of the recovery status of the patients. Each of the participating patients made progress as expected. PMID:27065539

  4. Application of RFID technology—upper extremity rehabilitation training

    PubMed Central

    Chen, Chih-Chen; Chen, Yu-Luen; Chen, Shih-Ching

    2016-01-01

    [Purpose] Upper extremity rehabilitation after an injury is very important. This study proposes radio frequency identification (RFID) technology to improve and enhance the effectiveness of the upper extremity rehabilitation. [Subjects and Methods] People use their upper extremities to conduct daily activities. When recovering from injuries, many patients neglect the importance of rehabilitation, which results in degraded function. This study recorded the training process using the traditional rehabilitation hand gliding cart with a RFID reader, RFID tags in the panel, and a servo host computer. [Results] Clinical evidence, time taken to achieve a full score, counts of missing the specified spots, and Brunnstrom stage of aided recovery, the proximal part of the upper extremity show that the RFID-based upper extremity training significantly and reduce negative impacts of the disability in daily life and activities. [Conclusion] This study combined a hand-gliding cart with an RFID reader, and when patients moved the cart, the movement could be observed via the activated RFID tags. The training data was collected and quantified for a better understanding of the recovery status of the patients. Each of the participating patients made progress as expected. PMID:27065539

  5. A Qualitative Approach to Mobile Robot Navigation Using RFID

    NASA Astrophysics Data System (ADS)

    Hossain, M.; Rashid, M. M.; Bhuiyan, M. M. I.; Ahmed, S.; Akhtaruzzaman, M.

    2013-12-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot.

  6. Characterizing coarse bedload transport during floods with RFID and accelerometer tracers, in-stream RFID antennas and HEC-RAS modeling

    NASA Astrophysics Data System (ADS)

    Olinde, L.; Johnson, J. P.

    2013-12-01

    By monitoring the transport timing and distances of tracer grains in a steep mountains stream, we collected data that can constrain numerical bedload transport models considered for these systems. We captured bedload activity during a weeks-spanning snowmelt period in Reynolds Creek, Idaho by deploying Radio Frequency Identification (RFID) and accelerometer embedded tracers with in-stream stationary RFID antennas. During transport events, RFID dataloggers recorded the times when tracers passed over stationary antennas. The accelerometer tracers also logged x, y, z-axis accelerations every 10 minutes to identify times of motion and rest. After snowmelt flows receded, we found tracers with mobile antennas and surveyed their positions. We know the timing and tracer locations when accelerometer tracers were initially entrained, passed stationary antennas, and were finally deposited at the surveyed locations. The fraction of moving accelerometers over time correlates well with discharge. Comparisons of the transported tracer fraction between rising and falling limbs over multiple flood peaks suggest that some degree of clockwise hysteresis persisted during the snowmelt period. Additionally, we apply accelerometer transport durations and displacement distances to calculate virtual velocities over full tracer path lengths and over lengths between initial locations to stationary antennas as well as between stationary antennas to final positions. The accelerometer-based virtual velocities are significantly faster than those estimated from traditional tracer methods that estimate bedload transport durations by assuming threshold flow conditions. We also subsample the motion data to calculate how virtual velocities change over the measurement intervals. Regressions of these relations are in turn used to extrapolate virtual velocities at smaller sampling timescales. Minimum hop lengths are also evaluated for each accelerometer tracer. Finally, flow conditions during the

  7. Cognitive distance

    NASA Astrophysics Data System (ADS)

    Shu, Hong; Edwards, Geoffrey; Qi, Cuihong

    2001-09-01

    In geographic space, it is well known that spatial behaviors of humans are directly driven by their spatial cognition, rather than by the physical or geometrical reality. The cognitive distance in spatial cognition is fundamental in intelligent pattern recognition. More precisely, the cognitive distance can be used to measure the similarities (or relevance) of cognized geographic objects. In the past work, the physical or Euclidean distances are used very often. In practice, many inconsistencies are found between the cognitive distance and the physical distance. Usually the physical distance is overestimated or underestimated in the process of human spatial behaviors and pattern recognition. These inconsistencies are termed distance distortions. The aim of this paper is to illustrate the conceptions of cognitive distance and distance distortion. And if the cognitive distance is argued to be two-dimensional, it exists in heterogeneous space and the property of quasi-metric is shown. If the cognitive distance is multi-dimensional, it exists in homogeneous space and the property of metric is shown. We argue that distance distortions arise from the transformation of homogeneous to heterogeneous space and from the transformation of the two-dimensional cognitive distance to the multi-dimensional cognitive distance. In some sense, the physical distance is an instance of cognitive distance.

  8. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    ERIC Educational Resources Information Center

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  9. Implications of RFID in Location-Aware Wi-Fi Networks

    ERIC Educational Resources Information Center

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  10. Compact Miniaturized Antenna for 210 MHz RFID

    NASA Technical Reports Server (NTRS)

    Lee, Richard Q.; Chun, Kue

    2008-01-01

    This paper describes the design and simulation of a miniaturized square-ring antenna. The miniaturized antenna, with overall dimensions of approximately one tenth of a wavelength (0.1 ), was designed to operate at around 210 MHz, and was intended for radio-frequency identification (RFID) application. One unique feature of the design is the use of a parasitic element to improve the performance and impedance matching of the antenna. The use of parasitic elements to enhance the gain and bandwidth of patch antennas has been demonstrated and reported in the literature, but such use has never been applied to miniaturized antennas. In this work, we will present simulation results and discuss design parameters and their impact on the antenna performance.

  11. Deterministic propagation model for RFID using site-specific and FDTD

    NASA Astrophysics Data System (ADS)

    Cunha de Azambuja, Marcelo; Passuelo Hessel, Fabiano; Luís Berz, Everton; Bauermann Porfírio, Leandro; Ruhnke Valério, Paula; De Pieri Baladei, Suely; Jung, Carlos Fernando

    2015-06-01

    The conduction of experiments to evaluate a tag orientation and its readability in a laboratory offers great potential for reducing time and costs for users. This article presents a novel methodology for developing simulation models for RFID (radio-frequency identification) environments. The main challenges in adopting this model are: (1) to find out how the properties of each one of the materials, on which the tag is applied, influence the read range and to determine the necessary power for tag reading and (2) to find out the power of the backscattered signal received by the tag when energised by the RF wave transmitted by the reader. The validation tests, performed in four different kinds of environments, with tags applied to six different kinds of materials, six different distances and with a reader configured with three different powers, showed achievements on the average of 95.3% accuracy in the best scenario and 87.0% in the worst scenario. The methodology can be easily duplicated to generate simulation models to other different RFID environments.

  12. A Closed Loop Wireless Power Transmission System Using a Commercial RFID Transceiver for Biomedical Applications

    PubMed Central

    Kiani, Mehdi

    2010-01-01

    This paper presents a standalone closed loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio frequency identification (RFID) transceiver (MLX90121) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop fashion. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either malfunction or excessive heat dissipation. RFID transceivers are often used open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 1.48 mW over a range of 6 to 12 cm, while the transmitter power consumption changed from 0.3 W to 1.21 W. The closed loop system can also oppose voltage variations as a result of sudden changes in load current. PMID:19963595

  13. An RFID-Based Closed-Loop Wireless Power Transmission System for Biomedical Applications

    PubMed Central

    Kiani, Mehdi; Ghovanloo, Maysam

    2010-01-01

    This brief presents a standalone closed-loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio-frequency identification (RFID) reader (TRF7960) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either a malfunction or excessive heat dissipation. RFID circuits are often used in an open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 11.2 mW over a range of 0.5 to 2 cm, while the transmitter power consumption changed from 78 mW to 1.1 W. The closed-loop system can also oppose voltage variations as a result of sudden changes in the load current. PMID:21179391

  14. A closed loop wireless power transmission system using a commercial RFID transceiver for biomedical applications.

    PubMed

    Kiani, Mehdi; Ghovanloo, Maysam

    2009-01-01

    This paper presents a standalone closed loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio frequency identification (RFID) transceiver (MLX90121) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop fashion. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either malfunction or excessive heat dissipation. RFID transceivers are often used open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 1.48 mW over a range of 6 to 12 cm, while the transmitter power consumption changed from 0.3 W to 1.21 W. The closed loop system can also oppose voltage variations as a result of sudden changes in load current. PMID:19963595

  15. An RFID-Based Closed-Loop Wireless Power Transmission System for Biomedical Applications.

    PubMed

    Kiani, Mehdi; Ghovanloo, Maysam

    2010-04-01

    This brief presents a standalone closed-loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio-frequency identification (RFID) reader (TRF7960) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either a malfunction or excessive heat dissipation. RFID circuits are often used in an open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 11.2 mW over a range of 0.5 to 2 cm, while the transmitter power consumption changed from 78 mW to 1.1 W. The closed-loop system can also oppose voltage variations as a result of sudden changes in the load current. PMID:21179391

  16. An RFID tag system-on-chip with wireless ECG monitoring for intelligent healthcare systems.

    PubMed

    Wang, Cheng-Pin; Lee, Shuenn-Yuh; Lai, Wei-Chih

    2013-01-01

    This paper presents a low-power wireless ECG acquisition system-on-chip (SoC), including an RF front-end circuit, a power unit, an analog front-end circuit, and a digital circuitry. The proposed RF front-end circuit can provide the amplitude shift keying demodulation and distance to digital conversion to accurately receive the data from the reader. The received data will wake up the power unit to provide the required supply voltages of analog front-end (AFE) and digital circuitry. The AFE, including a pre-amplifier, an analog filter, a post-amplifier, and an analog-to-digital converter, is used for the ECG acquisition. Moreover, the EPC Class I Gen 2 UHF standard is employed in the digital circuitry for the handshaking of communication and the control of the system. The proposed SoC has been implemented in 0.18-µm standard CMOS process and the measured results reveal the communication is compatible to the RFID protocol. The average power consumption for the operating chip is 12 µW. Using a Sony PR44 battery to the supply power (605mAh@1.4V), the RFID tag SoC operates continuously for about 50,000 hours (>5 years), which is appropriate for wireless wearable ECG monitoring systems. PMID:24110979

  17. Two-Way Communication Using RFID Equipment and Techniques

    NASA Technical Reports Server (NTRS)

    Jedry, Thomas; Archer, Eric

    2007-01-01

    Equipment and techniques used in radio-frequency identification (RFID) would be extended, according to a proposal, to enable short-range, two-way communication between electronic products and host computers. In one example of a typical contemplated application, the purpose of the short-range radio communication would be to transfer image data from a user s digital still or video camera to the user s computer for recording and/or processing. The concept is also applicable to consumer electronic products other than digital cameras (for example, cellular telephones, portable computers, or motion sensors in alarm systems), and to a variety of industrial and scientific sensors and other devices that generate data. Until now, RFID has been used to exchange small amounts of mostly static information for identifying and tracking assets. Information pertaining to an asset (typically, an object in inventory to be tracked) is contained in miniature electronic circuitry in an RFID tag attached to the object. Conventional RFID equipment and techniques enable a host computer to read data from and, in some cases, to write data to, RFID tags, but they do not enable such additional functions as sending commands to, or retrieving possibly large quantities of dynamic data from, RFID-tagged devices. The proposal would enable such additional functions. The figure schematically depicts an implementation of the proposal for a sensory device (e.g., a digital camera) that includes circuitry that converts sensory information to digital data. In addition to the basic sensory device, there would be a controller and a memory that would store the sensor data and/or data from the controller. The device would also be equipped with a conventional RFID chipset and antenna, which would communicate with a host computer via an RFID reader. The controller would function partly as a communication interface, implementing two-way communication protocols at all levels (including RFID if needed) between the

  18. PHASE II VAULT TESTING OF THE ARGONNE RFID SYSTEM

    SciTech Connect

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-06-25

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase

  19. Distance Education.

    ERIC Educational Resources Information Center

    ASPBAE Courier, 1984

    1984-01-01

    This publication is devoted to distance education. "The Future of Distance Teaching Universities in a Worldwide Perspectives" (John S. Daniel) examines challenges likely to face the various countries and regions of the world in the next decade. "An Australian University's Approach to Distance Education--Formal and Non-Formal" (Peter M. Grayson)…

  20. Distance Learning.

    ERIC Educational Resources Information Center

    Academe, 1998

    1998-01-01

    The American Association of University Professors' government relations committee report on distance learning addresses issues and makes recommendations concerning the political context of the growth of distance learning; definitions, descriptions, and claims of distance learning; academic freedom; intellectual property rights; faculty workload…

  1. Distance Learning.

    ERIC Educational Resources Information Center

    Orey, Michael; Koenecke, Lynne; Snider, Richard C.; Perkins, Ross A.; Holmes, Glen A.; Lockee, Barbara B.; Moller, Leslie A.; Harvey, Douglas; Downs, Margaret; Godshalk, Veronica M.

    2003-01-01

    Contains four articles covering trends and issues on distance learning including: the experience of two learners learning via the Internet; a systematic approach to determining the scalability of a distance education program; identifying factors that affect learning community development and performance in asynchronous distance education; and…

  2. 3-D transponder antennas for future SHF RFID applications

    NASA Astrophysics Data System (ADS)

    Zichner, R.; Baumann, R. R.

    2011-12-01

    The radio frequency identification (RFID) technology is omnipresent since a few years. Some of the most popular fields of application are the use for security tasks, for logistics and for the consumer segment. For example, chip card or key ring sized RFID transponders can allow wireless access to secured rooms. The number of applications for wireless data transmission for the identification and tracking of objects increases every year. There is a large development need for highly functional and inexpensive RFID transponders due to the ever-increasing demand on improved reliability, higher data rates and read and write ranges of the RFID systems. Therefore, research was performed on new 3-D transponder antennas for the Super High Frequency Band around 5.8 GHz. Additionally, wave propagation effects and the influence of different dielectric environments were considered. Parallel to the design of the novel antenna structures, the printing process for inexpensive manufacturing was investigated. The gained results are the basis for prospective RFID applications.

  3. Radio Frequency Identification (RFID) technology and patient safety

    PubMed Central

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors. PMID:24381626

  4. Loosely-Bound Diatomic Molecules.

    ERIC Educational Resources Information Center

    Balfour, W. J.

    1979-01-01

    Discusses concept of covalent bonding as related to homonuclear diatomic molecules. Article draws attention to the existence of bound rare gas and alkaline earth diatomic molecules. Summarizes their molecular parameters and offers spectroscopic data. Strength and variation with distance of interatomic attractive forces is given. (Author/SA)

  5. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    PubMed

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords. PMID:24578170

  6. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    PubMed

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks. PMID:24997856

  7. Healthcare in Disasters and the Role of RFID.

    PubMed

    Madanian, Samaneh; Parry, David; Norris, Tony

    2015-01-01

    Disasters either natural or man-made are inevitable, and therefore disaster management has always been an important function of government. Since during a disaster healthcare is often adversely affected, a lot of effort has been made in terms of researching effective responses and ways of improving the quality of delivered care to direct casualties and the rest of the community. In this regard, information technology plays an important role to help healthcare systems achieve this goal. One of these technologies that has become popular recently is Radio-Frequency Identification (RFID). This paper explores the relationship between emergency management and disaster healthcare and examines the role of RFID. It is suggested that RFID will become an integral part of disaster healthcare and a means of improving response performance. PMID:26262309

  8. Integrating RFID technique to design mobile handheld inventory management system

    NASA Astrophysics Data System (ADS)

    Huang, Yo-Ping; Yen, Wei; Chen, Shih-Chung

    2008-04-01

    An RFID-based mobile handheld inventory management system is proposed in this paper. Differing from the manual inventory management method, the proposed system works on the personal digital assistant (PDA) with an RFID reader. The system identifies electronic tags on the properties and checks the property information in the back-end database server through a ubiquitous wireless network. The system also provides a set of functions to manage the back-end inventory database and assigns different levels of access privilege according to various user categories. In the back-end database server, to prevent improper or illegal accesses, the server not only stores the inventory database and user privilege information, but also keeps track of the user activities in the server including the login and logout time and location, the records of database accessing, and every modification of the tables. Some experimental results are presented to verify the applicability of the integrated RFID-based mobile handheld inventory management system.

  9. Performance assessment of an RFID system for automatic surgical sponge detection in a surgery room.

    PubMed

    Dinis, H; Zamith, M; Mendes, P M

    2015-01-01

    A retained surgical instrument is a frequent incident in medical surgery rooms all around the world, despite being considered an avoidable mistake. Hence, an automatic detection solution of the retained surgical instrument is desirable. In this paper, the use of millimeter waves at the 60 GHz band for surgical material RFID purposes is evaluated. An experimental procedure to assess the suitability of this frequency range for short distance communications with multiple obstacles was performed. Furthermore, an antenna suitable to be incorporated in surgical materials, such as sponges, is presented. The antenna's operation characteristics are evaluated as to determine if it is adequate for the studied application over the given frequency range, and under different operating conditions, such as varying sponge water content. PMID:26736960

  10. RFID authentication protocol to enhance patient medication safety.

    PubMed

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain. PMID:24122350

  11. RFID Technology Implementation in Two Libraries in New Delhi

    ERIC Educational Resources Information Center

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  12. Implementation of RFID Technology in University of Pune Library

    ERIC Educational Resources Information Center

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  13. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations. PMID:23949845

  14. Legal Regulation and Consumers: The RFID Industry's Perspective

    NASA Astrophysics Data System (ADS)

    Ronzani, Daniel

    Many journal articles have presented research on the adoption and diffusion of Radio Frequency Identification (RFID) from a regulatory or consumer perspective. This research takes a reverse viewpoint. It researches the industry's experience with regulation by law and its experience with consumers. First, semi-structured interviews with RFID industry stakeholders are conducted on the topics of (UHF) frequency law, database law, and privacy law. Second, the industry's experience with (i) regulation by law and (ii) the consumers is collected in a worldwide online survey with companies and organisations that research, produce, sell, and consult on RFID technology. Third, empirical data is evaluated by different territories and industries to discuss four observations about legal regulation and consumers made by the authors with four feedback observations from the online survey. Given the evaluation of the empirical data, this article recommends that the RFID industry engage in better constructive dialogue with the legal regulator , strengthen its knowledge on applicable legislation, and re-evaluate its information policy to the consumer.

  15. Indoor Navigation Design Integrated with Smart Phones and Rfid Devices

    NASA Astrophysics Data System (ADS)

    Ortakci, Y.; Demiral, E.; Atila, U.; Karas, I. R.

    2015-10-01

    High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification) device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  16. Traceability System For Agricultural Productsbased on Rfid and Mobile Technology

    NASA Astrophysics Data System (ADS)

    Sugahara, Koji

    In agriculture, it is required to establish and integrate food traceability systems and risk management systems in order to improve food safety in the entire food chain. The integrated traceability system for agricultural products was developed, based on innovative technology of RFID and mobile computing. In order to identify individual products on the distribution process efficiently,small RFID tags with unique ID and handy RFID readers were applied. On the distribution process, the RFID tags are checked by using the readers, and transit records of the products are stored to the database via wireless LAN.Regarding agricultural production, the recent issues of pesticides misuse affect consumer confidence in food safety. The Navigation System for Appropriate Pesticide Use (Nouyaku-navi) was developed, which is available in the fields by Internet cell-phones. Based on it, agricultural risk management systems have been developed. These systems collaborate with traceability systems and they can be applied for process control and risk management in agriculture.

  17. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    EPA Science Inventory

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  18. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    ERIC Educational Resources Information Center

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  19. A System Implementation for Cooperation between UHF RFID Reader and TCP/IP Device

    NASA Astrophysics Data System (ADS)

    Lee, Sang Hoon; Jin, Ik Soo

    This paper presents a system implementation for cooperation between UHF RFID reader and TCP/IP device that can be used as a home gateway. The system consists of an UHF RFID tag, an UHF RFID reader, a RF end-device, a RF coordinator and a TCP/IP I/F. The UHF RFID reader is compatible with EPC Class-0/Gen1, Class-1/Gen1, 2 and ISO18000-6B, operating at the 915MHz. In particular, UHF RFID reader can be combined with a RF end device/coordinator for ZigBee(IEEE 802.15.4) interface which is low power wireless standard. The TCP/IP device is communicated with RFID reader via wired type. On the other hand, it is connected with ZigBee end-device via wireless type. The experimental results show that the developed system can provide the right networking.

  20. Comparison of RFID Systems for Tracking Clinical Interventions at the Bedside

    PubMed Central

    Ohashi, Kumiko; Ota, Sakiko; Ohno-Machado, Lucila; Tanaka, Hiroshi

    2008-01-01

    In recent years, there have been high expectations for RFID technologies applied in the medical field, particularly for automatic identification and location of patients and medical supplies. However, few studies have measured the applicability of currently available RFID technologies in a medical environment. To determine the technical factors that affect the performance of RFID systems, we examined the performance of different types of tags for medications, medical equipment, nurses, and patients under different experimental conditions. Three kinds of passive RFID tags and one active RFID tag were used in our study. Passive tags were affected by materials such as liquid and metal. Tags based on 13.56MHz were most suited for identifying medications. Tag placement was one of the main factors involved in correct identification of nurses, patients, and medical equipment. The results of this study may help decision makers decide whether (which) RFID technologies are useful for tracking clinical workflow. PMID:18998888

  1. Development of the RFID System for nuclear materials management.

    SciTech Connect

    Chen, K.; Tsai, H.; Liu, Y. Y.

    2008-01-01

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclear materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field

  2. Minimal distances between SCFTs

    NASA Astrophysics Data System (ADS)

    Buican, Matthew

    2014-01-01

    We study lower bounds on the minimal distance in theory space between four-dimensional superconformal field theories (SCFTs) connected via broad classes of renormalization group (RG) flows preserving various amounts of supersymmetry (SUSY). For = 1 RG flows, the ultraviolet (UV) and infrared (IR) endpoints of the flow can be parametrically close. On the other hand, for RG flows emanating from a maximally supersymmetric SCFT, the distance to the IR theory cannot be arbitrarily small regardless of the amount of (non-trivial) SUSY preserved along the flow. The case of RG flows from =2 UV SCFTs is more subtle. We argue that for RG flows preserving the full =2 SUSY, there are various obstructions to finding examples with parametrically close UV and IR endpoints. Under reasonable assumptions, these obstructions include: unitarity, known bounds on the c central charge derived from associativity of the operator product expansion, and the central charge bounds of Hofman and Maldacena. On the other hand, for RG flows that break = 2 → = 1, it is possible to find IR fixed points that are parametrically close to the UV ones. In this case, we argue that if the UV SCFT possesses a single stress tensor, then such RG flows excite of order all the degrees of freedom of the UV theory. Furthermore, if the UV theory has some flavor symmetry, we argue that the UV central charges should not be too large relative to certain parameters in the theory.

  3. RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis

    NASA Astrophysics Data System (ADS)

    Zhang, Min; Li, Peichong

    Agri-food supply chain management (SCM), a management method to optimize internal costs and productivities, has evolved as an application of e-business technologies. These days, RFID has been widely used in many fields. In this paper, we analyze the characteristics of agri-food supply chain. Then the disadvantages of RFID are discussed. After that, we study the application strategies of RFID based on benefit and safety degree.

  4. Array processing for RFID tag localization exploiting multi-frequency signals

    NASA Astrophysics Data System (ADS)

    Zhang, Yimin; Li, Xin; Amin, Moeness G.

    2009-05-01

    RFID is an increasingly valuable business and technology tool for electronically identifying, locating, and tracking products, assets, and personnel. As a result, precise positioning and tracking of RFID tags and readers have received considerable attention from both academic and industrial communities. Finding the position of RFID tags is considered an important task in various real-time locating systems (RTLS). As such, numerous RFID localization products have been developed for various applications. The majority of RFID positioning systems is based on the fusion of pieces of relevant information, such as the range and the direction-of-arrival (DOA). For example, trilateration can determine the tag position by using the range information of the tag estimated from three or more spatially separated reader antennas. Triangulation is another method to locate RFID tags that use the direction-of-arrival (DOA) information estimated at multiple spatially separated locations. The RFID tag positions can also be determined through hybrid techniques that combine the range and DOA information. The focus of this paper to study the design and performance of the localization of passive RFID tags using array processing techniques in a multipath environment, and exploiting multi-frequency CW signals. The latter are used to decorrelate the coherent multipath signals for effective DOA estimation and for the purpose of accurate range estimation. Accordingly, the spatial and frequency dimensionalities are fully utilized for robust and accurate positioning of RFID tags.

  5. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    PubMed Central

    Massawe, Libe Valentine; Kinyua, Johnson D. M.; Vermaak, Herman

    2012-01-01

    Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach. PMID:22666027

  6. A Proposal of a Novel RFID Tag with Biomedical Signal Sensing Functions

    NASA Astrophysics Data System (ADS)

    Nakajima, Akira; Inoue, Takahiro; Tsuneda, Akio

    A novel RFID tag with sensing functions of biomedical signals is proposed in this paper. This RFID tag is developed for sensing heart rate, respiration, and body temperature of a human, which is intended for a secure and intensive health care of humans at hospital or at home. The features of this RFID tag are identification of indivisuals by ID call and collation, on-demand measurement of vital signals, and a medium-range(<8m) data communication. The developed prototype RFID tag works at ±1.5V supply voltage, and it was implemented on a PCB attached to a belt. Its performances were confirmed with experiments.

  7. ECC-based grouping-proof RFID for inpatient medication safety.

    PubMed

    Lin, Qiping; Zhang, Fangguo

    2012-12-01

    Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications. PMID:21785968

  8. Recognition Technique by Tag Selection Using Multi-Reader in RFID Environment

    NASA Astrophysics Data System (ADS)

    Jang, Bong-Im; Kim, Yong-Tae; Park, Gil-Cheol

    The use of RFID(Radio Frequency Identification) is recently increasing for the realization of Ubiquitous computing. Reducing the process time of tag recognition is crucial as RFID system has to recognize multiple objects in a short amount of time. In this manuscript, therefore, an effective scheme is suggested to improve processing speed for tag authentication in RFID system. The suggested scheme retrieves selected tag ID only by using multi-reader in the process of tag authentication and consequently reduces the processing time required for tag authentication in database. The use of the suggested scheme cuts down on the process amount of arithmetic throughput bringing about performance improvement of RFID system.

  9. Quantifying detection performance of a passive low-frequency RFID system in an environmental preference chamber for laying hens

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Radio Frequency Identification (RFID) systems have been widely used in production livestock systems for identifying, tracing, and registering animals and improving subsidy management. Adaptations have been made to extend RFID technology to animal behavior and welfare research. An RFID system was imp...

  10. Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup

    NASA Astrophysics Data System (ADS)

    Pathak, Rohit; Joshi, Satyadhar

    In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the analysis of Nano RFID (Radio Frequency Identification) systems. We have shown the modeling and simulation and demonstrated some novel ideas and library development for Nano RFID. Multi scale modeling plays a very important role in nanotech enabled devices properties of which cannot be explained sometimes by abstraction level theories. Reliability and packaging still remains one the major hindrances in practical implementation of Nano RFID based devices. And to work on them modeling and simulation will play a very important role. CNTs is the future low power material that will replace CMOS and its integration with CMOS, MEMS circuitry will play an important role in realizing the true power in Nano RFID systems. RFID based on innovations in nanotechnology has been shown. MEMS modeling of Antenna, sensors and its integration in the circuitry has been shown. Thus incorporating this we can design a Nano-RFID which can be used in areas like human implantation and complex banking applications. We have proposed modeling of RFID using the concept of multi scale modeling to accurately predict its properties. Also we give the modeling of MEMS devices that are proposed recently that can see possible application in RFID. We have also covered the applications and the advantages of Nano RFID in various areas. RF MEMS has been matured and its devices are being successfully commercialized but taking it to limits of nano domains and integration with singly chip RFID needs a novel approach which is being proposed. We have modeled MEMS based transponder and shown the distribution for multi scale modeling for Nano RFID.

  11. Distance Education.

    ERIC Educational Resources Information Center

    Feasley, Charles E.

    The magnitude, diversity, and impact of distance education are discussed in this international review of its implementation in economically diverse countries. Uses of the following media are described: (1) print--correspondence study, programmed instruction, modularized instruction, newspaper; (2) audio media--telephone, radio, subsidiary…

  12. A note on the path interval distance.

    PubMed

    Coons, Jane Ivy; Rusinko, Joseph

    2016-06-01

    The path interval distance accounts for global congruence between locally incongruent trees. We show that the path interval distance provides a lower bound for the nearest neighbor interchange distance. In contrast to the Robinson-Foulds distance, random pairs of trees are unlikely to be maximally distant from one another under the path interval distance. These features indicate that the path interval distance should play a role in phylogenomics where the comparison of trees on a fixed set of taxa is becoming increasingly important. PMID:27040521

  13. Creating TUIs Using RFID Sensors--A Case Study Based on the Literacy Process of Children with Down Syndrome.

    PubMed

    Jadán-Guerrero, Janio; Guerrero, Luis; López, Gustavo; Cáliz, Doris; Bravo, José

    2015-01-01

    Teaching children with intellectual disabilities is a big challenge for most parents and educators. Special education teachers use learning strategies to develop and enhance motivation for complex learning tasks. Literacy acquisition is an essential and life-long skill for a child with intellectual disabilities. In this context, technology can support specific strategies that will help children learn to read. This paper introduces a Tangible User Interface (TUI) system based on Radio Frequency Identification (RFID) technology to support literacy for children with Down syndrome. Our proposed system focuses on the integration of RFID tags in 3D printed objects and low cost toys. The paper describes the experience of using some materials covering the tags and the different problems related to the material and distance of radio wave propagation. The results of a preliminary evaluation in a special education institution showed that the system helps to improve the interaction between teachers and children. The use of a TUI seems to give a physical sensory experience to develop literacy skills in children with Down syndrome. PMID:26115455

  14. A Hybrid Positioning Strategy for Vehicles in a Tunnel Based on RFID and In-Vehicle Sensors

    PubMed Central

    Song, Xiang; Li, Xu; Tang, Wencheng; Zhang, Weigong; Li, Bin

    2014-01-01

    Many intelligent transportation system applications require accurate, reliable, and continuous vehicle positioning. How to achieve such positioning performance in extended GPS-denied environments such as tunnels is the main challenge for land vehicles. This paper proposes a hybrid multi-sensor fusion strategy for vehicle positioning in tunnels. First, the preliminary positioning algorithm is developed. The Radio Frequency Identification (RFID) technology is introduced to achieve preliminary positioning in the tunnel. The received signal strength (RSS) is used as an indicator to calculate the distances between the RFID tags and reader, and then a Least Mean Square (LMS) federated filter is designed to provide the preliminary position information for subsequent global fusion. Further, to improve the positioning performance in the tunnel, an interactive multiple model (IMM)-based global fusion algorithm is developed to fuse the data from preliminary positioning results and low-cost in-vehicle sensors, such as electronic compasses and wheel speed sensors. In the actual implementation of IMM, the strong tracking extended Kalman filter (STEKF) algorithm is designed to replace the conventional extended Kalman filter (EKF) to achieve model individual filtering. Finally, the proposed strategy is evaluated through experiments. The results validate the feasibility and effectiveness of the proposed strategy. PMID:25490581

  15. A hybrid positioning strategy for vehicles in a tunnel based on RFID and in-vehicle sensors.

    PubMed

    Song, Xiang; Li, Xu; Tang, Wencheng; Zhang, Weigong; Li, Bin

    2014-01-01

    Many intelligent transportation system applications require accurate, reliable, and continuous vehicle positioning. How to achieve such positioning performance in extended GPS-denied environments such as tunnels is the main challenge for land vehicles. This paper proposes a hybrid multi-sensor fusion strategy for vehicle positioning in tunnels. First, the preliminary positioning algorithm is developed. The Radio Frequency Identification (RFID) technology is introduced to achieve preliminary positioning in the tunnel. The received signal strength (RSS) is used as an indicator to calculate the distances between the RFID tags and reader, and then a Least Mean Square (LMS) federated filter is designed to provide the preliminary position information for subsequent global fusion. Further, to improve the positioning performance in the tunnel, an interactive multiple model (IMM)-based global fusion algorithm is developed to fuse the data from preliminary positioning results and low-cost in-vehicle sensors, such as electronic compasses and wheel speed sensors. In the actual implementation of IMM, the strong tracking extended Kalman filter (STEKF) algorithm is designed to replace the conventional extended Kalman filter (EKF) to achieve model individual filtering. Finally, the proposed strategy is evaluated through experiments. The results validate the feasibility and effectiveness of the proposed strategy. PMID:25490581

  16. Creating TUIs Using RFID Sensors—A Case Study Based on the Literacy Process of Children with Down Syndrome

    PubMed Central

    Jadán-Guerrero, Janio; Guerrero, Luis; López, Gustavo; Cáliz, Doris; Bravo, José

    2015-01-01

    Teaching children with intellectual disabilities is a big challenge for most parents and educators. Special education teachers use learning strategies to develop and enhance motivation for complex learning tasks. Literacy acquisition is an essential and life-long skill for a child with intellectual disabilities. In this context, technology can support specific strategies that will help children learn to read. This paper introduces a Tangible User Interface (TUI) system based on Radio Frequency Identification (RFID) technology to support literacy for children with Down syndrome. Our proposed system focuses on the integration of RFID tags in 3D printed objects and low cost toys. The paper describes the experience of using some materials covering the tags and the different problems related to the material and distance of radio wave propagation. The results of a preliminary evaluation in a special education institution showed that the system helps to improve the interaction between teachers and children. The use of a TUI seems to give a physical sensory experience to develop literacy skills in children with Down syndrome. PMID:26115455

  17. Temperature increase in the fetus exposed to UHF RFID readers.

    PubMed

    Fiocchi, Serena; Parazzini, Marta; Liorni, Ilaria; Samaras, Theodoros; Ravazzani, Paolo

    2014-07-01

    Exposure to electromagnetic fields (EMFs) has prominently increased during the last decades due to the rapid development of new technologies. Among the various devices emitting EMFs, those based on Radio-frequency identification (RFID) technologies are used in all aspects of everyday life, and expose people unselectively. This scenario could pose a potential risk for some groups of the general population, such as pregnant women, who are expected to be possibly more sensitive to the thermal effects produced by EMF exposure. This is the first paper that addresses the estimation of temperature rise in two pregnant women models exposed to ultrahigh frequency RFID by computational techniques. Results show that the maximum temperature increase of the fetus and of the pregnancy-related tissues is relatively high (even about 0.7 °C), not too far from the known threshold of biological effects. However, this increase is confined to a small volume in the tissues. PMID:24956619

  18. Considerations for RFID-Based Indoor Simultaneous Tracking

    NASA Astrophysics Data System (ADS)

    Papapostolou, Apostolia; Chaouchi, Hakima

    Context-aware applications is not just a vision. Advances in wireless communications and mobile capabilities have revolutionized the way services are brought to users, i.e. adapted to their context. Location is a key attribute of the term context and thus, an accurate location determination system is of paramount importance. RFID (Radio Frequency IDentification) is an emerging technology and recently has been explored for its applicability in location sensing systems. In this paper, we focus on an RFID-based localization approach in an indoor multi-user environment and model its most adverse implicating factors, that is collisions among its main components and interference from indoor characteristics. Extensive simulations are conducted to characterize and evaluate the performance behavior of the proposed scheme in environments with different levels of severity.

  19. Miniaturization design and implementation of magnetic field coupled RFID antenna

    NASA Astrophysics Data System (ADS)

    Hu, Tiling

    2013-03-01

    The development of internet of things has brought new opportunities and challenges to the application of RFID tags. Moreover, the Miniaturization application trend of tags at present has become the mainstream of development. In this paper, the double-layer design is to reduce the size of HF antenna, and the magnetic null point of magnetic reconnection region between the RLC resonant circuit and the reader provides sufficient energy to the miniaturization of antenna. The calculated and experimental results show that the miniaturization of HF antennas can meet the reading and writing requirement of the international standard ISO/IEC14443 standard. The results of this paper may make a positive contribution to the applications of RFID technology.

  20. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    SciTech Connect

    Nekoogar, F; Dowla, F; Wang, T

    2010-01-27

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable {sup 3}He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  1. A RFID grouping proof protocol for medication safety of inpatient.

    PubMed

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented. PMID:20052898

  2. A flexible surface wetness sensor using a RFID technique.

    PubMed

    Yang, Cheng-Hao; Chien, Jui-Hung; Wang, Bo-Yan; Chen, Ping-Hei; Lee, Da-Sheng

    2008-02-01

    This paper presents a flexible wetness sensor whose detection signal, converted to a binary code, is transmitted through radio-frequency (RF) waves from a radio-frequency identification integrated circuit (RFID IC) to a remote reader. The flexible sensor, with a fixed operating frequency of 13.56 MHz, contains a RFID IC and a sensor circuit that is fabricated on a flexible printed circuit board (FPCB) using a Micro-Electro-Mechanical-System (MEMS) process. The sensor circuit contains a comb-shaped sensing area surrounded by an octagonal antenna with a width of 2.7 cm. The binary code transmitted from the RFIC to the reader changes if the surface conditions of the detector surface changes from dry to wet. This variation in the binary code can be observed on a digital oscilloscope connected to the reader. PMID:17665308

  3. RFID-Based Asset Management for Space Habitats

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.

    2013-01-01

    Remote habitats are often densely packed - items necessary to sustain life - items necessary to conduct work center dot Inhabitant's time is often quite valuable, if not priceless. Resupply shipments can be infrequent and expensive. Inaccurate inventory knowledge can lead to unnecessary overstocking, which can lead to insufficient work and/or living volume. Not being able to find items when they are needed can present: - safety issues - morale issues. RFID technology has the potential solve a lot of these issues.

  4. Optimization of RFID network planning using Zigbee and WSN

    NASA Astrophysics Data System (ADS)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  5. A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme.

    PubMed

    Yang, Ming Hour; Luo, Jia Ning; Lu, Shao Yong

    2015-01-01

    To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping proofs because of the considerable amount of time it takes to scan a high number of tags. Thus, applying grouping proof methods in the current logistics industry is difficult. To solve this problem, this paper proposes a method for generating multilayered offline grouping proofs. The proposed method provides tag anonymity; moreover, resolving disputes between recipients and transporters over the integrity of cargo deliveries can be expedited by generating grouping proofs and automatically authenticating the consistency between the receipt proof and pick proof. The proposed method can also protect against replay attacks, multi-session attacks, and concurrency attacks. Finally, experimental results verify that, compared with other methods for generating grouping proofs, the proposed method can efficiently generate offline grouping proofs involving several parties in a supply chain using mobile RFID. PMID:26512673

  6. A reliable RFID mutual authentication scheme for healthcare environments.

    PubMed

    Wu, Zhen-Yu; Chen, Lichin; Wu, Ju-Chuan

    2013-04-01

    Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments. PMID:23321974

  7. Using RFID yoking proof protocol to enhance inpatient medication safety.

    PubMed

    Chen, Chin-Ling; Wu, Chun-Yi

    2012-10-01

    The low birth rate has led to an aging society; the burgeoning number of elderly patients may affect the medical quality and result in negative medical incidents. There are many factors that lead to medical errors, such as similar medication names, erroneous labels and packaging, as well as staff shortages, fatigue and carelessness. Determining how to reduce medical errors has become an important issue. As RFID exhibits powerful identification characteristics, it can help nurses to quickly identify patients and their corresponding medicine. Currently, there are numerous practical applications for improving the efficiency of Radio Frequency Identification (RFID) systems. In this paper, we use an RFID yoking proof mechanism which conforms to EPCglobal Class 1 Generation 2 standards to improve patient safety and reduce medical errors. Our scheme can achieve different goals such as resist numerous known attacks, achieve mutual authentication, anonymity and non-repudiation. It also provides a practical medical care and offer higher quality of medical care. The pharmacist cannot deny that this prescription was confirmed for the patient and the nurse cannot also deny he or she dispensed this medicine to the patient for protecting the patients' interests. PMID:21811800

  8. A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme

    PubMed Central

    Yang, Ming Hour; Luo, Jia Ning; Lu, Shao Yong

    2015-01-01

    To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping proofs because of the considerable amount of time it takes to scan a high number of tags. Thus, applying grouping proof methods in the current logistics industry is difficult. To solve this problem, this paper proposes a method for generating multilayered offline grouping proofs. The proposed method provides tag anonymity; moreover, resolving disputes between recipients and transporters over the integrity of cargo deliveries can be expedited by generating grouping proofs and automatically authenticating the consistency between the receipt proof and pick proof. The proposed method can also protect against replay attacks, multi-session attacks, and concurrency attacks. Finally, experimental results verify that, compared with other methods for generating grouping proofs, the proposed method can efficiently generate offline grouping proofs involving several parties in a supply chain using mobile RFID. PMID:26512673

  9. Impact of RFID on Retail Value Chain: A Mixed Method Study

    ERIC Educational Resources Information Center

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  10. Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains

    NASA Astrophysics Data System (ADS)

    Mo, John P. T.; Li, Xue

    Radio Frequency Identification (RFID) is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight. This creates tremendous opportunities for linking real world objects into a world of "Internet of things". Application of RFID to Fast Moving Consumer Goods sector will introduce billions of RFID tags in the world. Almost everything is tagged for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of processing of RFID events and data. This chapter uses two national demonstrator projects in Australia as case studies to introduce an event managementframework to process high volume RFID data streams in real time and automatically transform physical RFID observations into business-level events. The model handles various temporal event patterns, both simple and complex, with temporal constraints. The model can be implemented in a data management architecture that allows global RFID item tracking and enables fast, large-scale RFID deployment.

  11. Design of a Covert RFID Tag Network for Target Discovery and Target Information Routing

    PubMed Central

    Pan, Qihe; Narayanan, Ram M.

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag’s location is saved at command center, which can determine where a RFID tag is located based on each RFID tag’s ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design. PMID:22163693

  12. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles

    PubMed Central

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-01-01

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control. PMID:24599188

  13. RFID-based vehicle positioning and its applications in connected vehicles.

    PubMed

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-01-01

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control. PMID:24599188

  14. Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm

    NASA Astrophysics Data System (ADS)

    Kim, Yoonjeong; Ohm, Seongyong; Yi, Kang

    In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length.

  15. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    NASA Astrophysics Data System (ADS)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  16. High-level managers' considerations for RFID adoption in hospitals: an empirical study in Taiwan.

    PubMed

    Lai, Hui-Min; Lin, I-Chun; Tseng, Ling-Tzu

    2014-02-01

    Prior researches have indicated that an appropriate adoption of information technology (IT) can help hospitals significantly improve services and operations. Radio Frequency Identification (RFID) is believed to be the next generation innovation technology for automatic data collection and asset/people tracking. Based on the Technology-Organization-Environment (TOE) framework, this study investigated high-level managers' considerations for RFID adoption in hospitals. This research reviewed literature related IT adoption in business and followed the results of a preliminary survey with 37 practical experts in hospitals to theorize a model for the RFID adoption in hospitals. Through a field survey of 102 hospitals and hypotheses testing, this research identified key factors influencing RFID adoption. Follow-up in-depth interviews with three high-level managers of IS department from three case hospitals respectively also presented an insight into the decision of RFID's adoption. Based on the research findings, cost, ubiquity, compatibility, security and privacy risk, top management support, hospital scale, financial readiness and government policy were concluded to be the key factors influencing RFID adoption in hospitals. For practitioners, this study provided a comprehensive overview of government policies able to promote the technology, while helping the RFID solution providers understand how to reduce the IT barriers in order to enhance hospitals' willingness to adopt RFID. PMID:24445396

  17. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    EPA Science Inventory

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  18. Position Statement in RFID S&P Panel: RFID and the Middleman

    NASA Astrophysics Data System (ADS)

    Anderson, Ross

    Existing bank-card payment systems, such as EMV, have two serious vulnerabilities: the user does not have a trustworthy interface, and the protocols are vulnerable in a number of ways to man-in-the-middle attacks. Moving to RFID payments may, on the one hand, let bank customers use their mobile phones to make payments, which will go a fair way towards fixing the interface problem; on the other hand, protocol vulnerabilities may become worse. By 2011 the NFC vendors hope there will be 500,000,000 NFC-enabled mobile phones in the world. If these devices can act as cards or terminals, can be programmed by their users, and can communicate with each other, then they will provide a platform for deploying all manner of protocol attacks. Designing the security protocols to mitigate such attacks may be difficult. First, it will include most of the hot topics of IT policy over the last ten years (from key escrow through DRM to platform trust and accessory control) as subproblems. Second, the incentives may lead the many players to try to dump the liability on each other, leading to overall system security that is equivalent to the weakest link rather than to sum-of-efforts and is thus suboptimal.

  19. Documentation pckage for the RFID temperature monitoring system (Of Model 9977 packages at NTS).

    SciTech Connect

    Chen, K.; Tsai, H.; Decision and Information Sciences

    2009-02-20

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  20. Energy efficient in-network RFID data filtering scheme in wireless sensor networks.

    PubMed

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes' energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  1. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

    PubMed Central

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes. PMID:22163999

  2. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement. PMID:25096968

  3. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    NASA Astrophysics Data System (ADS)

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal food safety traceability using GS1 and RFID. This framework uses RFID tags encoding with EPCglobal tag data standards. Each information server has access tier, business tier and resource tier. These servers are heterogeneous and distributed, providing user access interfaces by SOAP or HTTP protocols. For sharing dynamic data, discovery service and object name service are used to locate dynamic distributed information servers.

  4. Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs

    NASA Astrophysics Data System (ADS)

    Choi, Woo-Yong; Chatterjee, Mainak

    2015-03-01

    With the growing use of RFID (Radio Frequency Identification), it is becoming important to devise ways to read RFID tags in real time. Access points (APs) of IEEE 802.11-based wireless Local Area Networks (LANs) are being integrated with RFID networks that can efficiently collect real-time RFID data. Several schemes, such as multipolling methods based on the dynamic search algorithm and random sequencing, have been proposed. However, as the number of RFID readers associated with an AP increases, it becomes difficult for the dynamic search algorithm to derive the multipolling sequence in real time. Though multipolling methods can eliminate the polling overhead, we still need to enhance the performance of the multipolling methods based on random sequencing. To that extent, we propose a real-time cluster-based multipolling sequencing algorithm that drastically eliminates more than 90% of the polling overhead, particularly so when the dynamic search algorithm fails to derive the multipolling sequence in real time.

  5. Measuring the drinking behaviour of individual pigs housed in group using radio frequency identification (RFID).

    PubMed

    Maselyne, J; Adriaens, I; Huybrechts, T; De Ketelaere, B; Millet, S; Vangeyte, J; Van Nuffel, A; Saeys, W

    2016-09-01

    Changes in the drinking behaviour of pigs may indicate health, welfare or productivity problems. Automated monitoring and analysis of drinking behaviour could allow problems to be detected, thus improving farm productivity. A high frequency radio frequency identification (HF RFID) system was designed to register the drinking behaviour of individual pigs. HF RFID antennas were placed around four nipple drinkers and connected to a reader via a multiplexer. A total of 55 growing-finishing pigs were fitted with radio frequency identification (RFID) ear tags, one in each ear. RFID-based drinking visits were created from the RFID registrations using a bout criterion and a minimum and maximum duration criterion. The HF RFID system was successfully validated by comparing RFID-based visits with visual observations and flow meter measurements based on visit overlap. Sensitivity was at least 92%, specificity 93%, precision 90% and accuracy 93%. RFID-based drinking duration had a high correlation with observed drinking duration (R 2=0.88) and water usage (R 2=0.71). The number of registrations after applying the visit criteria had an even higher correlation with the same two variables (R 2=0.90 and 0.75, respectively). There was also a correlation between number of RFID visits and number of observed visits (R 2=0.84). The system provides good quality information about the drinking behaviour of individual pigs. As health or other problems affect the pigs' drinking behaviour, analysis of the RFID data could allow problems to be detected and signalled to the farmer. This information can help to improve the productivity and economics of the farm as well as the health and welfare of the pigs. PMID:25959418

  6. On the Optimal Identification of Tag Sets in Time-Constrained RFID Configurations

    PubMed Central

    Vales-Alonso, Javier; Bueno-Delgado, María Victoria; Egea-López, Esteban; Alcaraz, Juan José; Pérez-Mañogil, Juan Manuel

    2011-01-01

    In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags. PMID:22163777

  7. Rigorous bounds for optimal dynamical decoupling

    SciTech Connect

    Uhrig, Goetz S.; Lidar, Daniel A.

    2010-07-15

    We present rigorous performance bounds for the optimal dynamical decoupling pulse sequence protecting a quantum bit (qubit) against pure dephasing. Our bounds apply under the assumption of instantaneous pulses and of bounded perturbing environment and qubit-environment Hamiltonians such as those realized by baths of nuclear spins in quantum dots. We show that if the total sequence time is fixed the optimal sequence can be used to make the distance between the protected and unperturbed qubit states arbitrarily small in the number of applied pulses. If, on the other hand, the minimum pulse interval is fixed and the total sequence time is allowed to scale with the number of pulses, then longer sequences need not always be advantageous. The rigorous bound may serve as a testbed for approximate treatments of optimal decoupling in bounded models of decoherence.

  8. Modifications of the Griesmer bound

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Solomon, G.

    1991-01-01

    The Griesmer bound is a classical technique (developed in 1960) for estimating the minimum length n required for a binary linear code with a given dimension k and minimum distance d. In this article, a unified derivation of the Griesmer bound and two new variations on it are presented. The first variation deals with linear codes which contain the all-ones vector; such codes are quite common and are useful in practice because of their 'transparent' properties. The second variation deals with codes that are constrained to contain a word of weight greater than or equal to M. In both cases these constraints (the all-ones word or a word of high weight) can increase the minimum length of a code with given k and d.

  9. 18,000 displacement vectors and 44 positions surveys of RFID tracers show a normal diffusion of the bedload in a proglacial stream (Bossons glacier, France)

    NASA Astrophysics Data System (ADS)

    Guillon, Hervé; Mugnier, Jean-Louis; Buoncristiani, Jean-François

    2016-04-01

    distributions were tested against the observed travel distances. Regardless of the time scale, heavy- and light-tailed distributions provide a convincing statistical description of measured data. No single distribution is significantly better than the others. Conversely, the distribution of tracers positions in the system and its time evolution is best described by the normal distribution. Its standard deviation scales with time as σ ∝ t0.45±0.12 which suggests a nearly normal diffusive behaviour. The measured virtual velocities and a simple probabilistic model using the time evolution of the mean (i.e. drift) and standard deviation (i.e diffusion) show that the mean bedload transfer time is greater than 5 years. RFID tracers appear as a promising tool to investigate stochastic characteristics of bedload transport.

  10. Bound states and the Bekenstein bound

    SciTech Connect

    Bousso, Raphael

    2003-10-16

    We explore the validity of the generalized Bekenstein bound, S<= pi M a. We define the entropy S as the logarithm of the number of states which have energy eigenvalue below M and are localized to a flat space region of width alpha. If boundary conditions that localize field modes are imposed by fiat, then the bound encounters well-known difficulties with negative Casimir energy and large species number, as well as novel problems arising only in the generalized form. In realistic systems, however, finite-size effects contribute additional energy. We study two different models for estimating such contributions. Our analysis suggests that the bound is both valid and nontrivial if interactions are properly included, so that the entropy S counts the bound states of interacting fields.

  11. Entropy bounds and dark energy

    NASA Astrophysics Data System (ADS)

    Hsu, Stephen D. H.

    2004-07-01

    Entropy bounds render quantum corrections to the cosmological constant Λ finite. Under certain assumptions, the natural value of Λ is of order the observed dark energy density ~10-10 eV4, thereby resolving the cosmological constant problem. We note that the dark energy equation of state in these scenarios is w≡p/ρ=0 over cosmological distances, and is strongly disfavored by observational data. Alternatively, Λ in these scenarios might account for the diffuse dark matter component of the cosmological energy density. Permanent address: Institute of Theoretical Science and Department of Physics, University of Oregon, Eugene, OR 97403.

  12. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    PubMed

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983

  13. Determinants of RFID adoption in Malaysia's healthcare industry: occupational level as a moderator.

    PubMed

    Zailani, Suhaiza; Iranmanesh, Mohammad; Nikbin, Davoud; Beng, Jameson Khoo Cheong

    2015-01-01

    With today's highly competitive market in the healthcare industry, Radio Frequency Identification (RFID) is a technology that can be applied by hospitals to improve operational efficiency and to gain a competitive advantage over their competitors. The purpose of this study is to investigate the factors that may effect RFID adoption in Malaysia's healthcare industry. In addition, the moderating role of occupational level was tested. Data was collected from 223 managers as well as healthcare and supporting staffs. This data was analyzed using the partial least squares technique. The results show that perceived ease of use and usefulness, government policy, top management support, and security and privacy concerns have an effect on the intent to adopt RFID in hospitals. There is a wide gap between managers and healthcare staff in terms of the factors that influence RFID adoption. The results of this study will help decision makers as well as managers in the healthcare industry to better understand the determinants of RFID adoption. Additionally, it will assist in the process of RFID adoption, and therefore, spread the usage of RFID technology in more hospitals. PMID:25503418

  14. A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    PubMed Central

    Fan, Hua; Wu, Quanyuan; Lin, Yisong; Zhang, Jianfeng

    2013-01-01

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products. Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance. PMID:23645112

  15. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    PubMed Central

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983

  16. A Framework for Mining Actionable Navigation Patterns from In-Store RFID Datasets via Indoor Mapping

    PubMed Central

    Shen, Bin; Zheng, Qiuhua; Li, Xingsen; Xu, Libo

    2015-01-01

    With the quick development of RFID technology and the decreasing prices of RFID devices, RFID is becoming widely used in various intelligent services. Especially in the retail application domain, RFID is increasingly adopted to capture the shopping tracks and behavior of in-store customers. To further enhance the potential of this promising application, in this paper, we propose a unified framework for RFID-based path analytics, which uses both in-store shopping paths and RFID-based purchasing data to mine actionable navigation patterns. Four modules of this framework are discussed, which are: (1) mapping from the physical space to the cyber space, (2) data preprocessing, (3) pattern mining and (4) knowledge understanding and utilization. In the data preprocessing module, the critical problem of how to capture the mainstream shopping path sequences while wiping out unnecessary redundant and repeated details is addressed in detail. To solve this problem, two types of redundant patterns, i.e., loop repeat pattern and palindrome-contained pattern are recognized and the corresponding processing algorithms are proposed. The experimental results show that the redundant pattern filtering functions are effective and scalable. Overall, this work builds a bridge between indoor positioning and advanced data mining technologies, and provides a feasible way to study customers’ shopping behaviors via multi-source RFID data. PMID:25751076

  17. A split-path schema-based RFID data storage model in supply chain management.

    PubMed

    Fan, Hua; Wu, Quanyuan; Lin, Yisong; Zhang, Jianfeng

    2013-01-01

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance. PMID:23645112

  18. An RFID-based luggage and passenger tracking system for airport security control applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  19. A framework for mining actionable navigation patterns from in-store RFID datasets via indoor mapping.

    PubMed

    Shen, Bin; Zheng, Qiuhua; Li, Xingsen; Xu, Libo

    2015-01-01

    With the quick development of RFID technology and the decreasing prices of RFID devices, RFID is becoming widely used in various intelligent services. Especially in the retail application domain, RFID is increasingly adopted to capture the shopping tracks and behavior of in-store customers. To further enhance the potential of this promising application, in this paper, we propose a unified framework for RFID-based path analytics, which uses both in-store shopping paths and RFID-based purchasing data to mine actionable navigation patterns. Four modules of this framework are discussed, which are: (1) mapping from the physical space to the cyber space, (2) data preprocessing, (3) pattern mining and (4) knowledge understanding and utilization. In the data preprocessing module, the critical problem of how to capture the mainstream shopping path sequences while wiping out unnecessary redundant and repeated details is addressed in detail. To solve this problem, two types of redundant patterns, i.e., loop repeat pattern and palindrome-contained pattern are recognized and the corresponding processing algorithms are proposed. The experimental results show that the redundant pattern filtering functions are effective and scalable. Overall, this work builds a bridge between indoor positioning and advanced data mining technologies, and provides a feasible way to study customers' shopping behaviors via multi-source RFID data. PMID:25751076

  20. Setups for in vitro assessment of RFID interference on pacemakers

    NASA Astrophysics Data System (ADS)

    Mattei, E.; Censi, F.; Delogu, A.; Ferrara, A.; Calcagnini, G.

    2013-08-01

    The aim of this study is to propose setups for in vitro assessment of RFID (radiofrequency identification) interference on pacemakers (PM). The voltage induced at the input stage of the PM by low-frequency (LF) and high-frequency (HF) RFID transmitters has been used to quantify the amount of the interference. A commercial PM was modified in order to measure the voltage at its input stage when exposed to a sinusoidal signal at 125 kHz and 13.56 MHz. At both frequencies, two antennas with different dimensions (diameter = 10 cm and 30 cm, respectively) were used to generate the interfering field, and the induced voltage was measured between the lead tip and the PM case (unipolar voltage), and between the tip and ring electrodes (bipolar voltage). The typical lead configurations adopted in similar studies or proposed by international standards, as well as lead paths closer to actual physiological implants were tested. At 125 kHz, the worst-case condition differs for the two antennas: the 10 cm antenna induced the highest voltage in the two-loop spiral configuration, whereas the 30 cm antenna in the 225 cm2 loop configuration. At 13.56 MHz, the highest voltage was observed for both the antennas in the 225 cm2 loop configuration. Bipolar voltages were found to be lower than the unipolar voltages induced in the same configurations, this difference being not as high as one could expect from theoretical considerations. The worst-case scenario, in terms of the induced voltage at the PM input stage, has been identified both for LF and HF readers, and for two sizes of transmitting antennas. These findings may provide the basis for the definition of a standard implant configuration and a lead path to test the EMI effects of LF and HF RFID transmitters on active implantable devices.

  1. Interoperation of an UHF RFID reader and a TCP/IP device via wired and wireless links.

    PubMed

    Lee, Sang Hoon; Jin, Ik Soo

    2011-01-01

    A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4) interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device. PMID:22346665

  2. Interoperation of an UHF RFID Reader and a TCP/IP Device via Wired and Wireless Links

    PubMed Central

    Lee, Sang Hoon; Jin, Ik Soo

    2011-01-01

    A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4) interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device. PMID:22346665

  3. RFID in healthcare environment: electromagnetic compatibility regulatory issues.

    PubMed

    Censi, Federica; Calcagnini, Giovanni; Mattei, Eugenio; Triventi, Michele; Bartolini, Pietro

    2010-01-01

    Several wireless technology applications (RFID, WiFi, GSM, GPRS) have been developed to improve patient care, reaching a significant success and diffusion in healthcare. Given the potential development of such a technology, care must be paid on the potential risks deriving from the use of wireless device in healthcare, among which one of the most important is the electromagnetic interference with medical devices. The analysis of the regulatory issues concerning the electromagnetic compatibility of medical devices is essential to evaluate if and how the application of the current standards allows an effective control of the possible risks associated to the electromagnetic interference on medical devices. PMID:21096973

  4. A Guide Management System Based on RFID and Bluetooth Technology

    NASA Astrophysics Data System (ADS)

    Li, Han-Sheng; Wang, Jun-Jun

    The most fundamental and important requirement of the tour guide in the tour process is to ensure the safety of tourists. In this paper, a portable guide management system is designed based on RFID technology, the Android software and blue-tooth communication technology. Through this system, the guide can get real-time information if some tourists are l behind, and send text message or dial to those tourists who are l behind immediately. The system reduces the roll-calling time on the tourists, improves the tour guide work efficiency and service quality.

  5. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments. PMID:25666925

  6. An Adaptive RFID Anti-Collision Algorithm Based on Dynamic Framed ALOHA

    NASA Astrophysics Data System (ADS)

    Lee, Chang Woo; Cho, Hyeonwoo; Kim, Sang Woo

    The collision of ID signals from a large number of colocated passive RFID tags is a serious problem; to realize a practical RFID systems we need an effective anti-collision algorithm. This letter presents an adaptive algorithm to minimize the total time slots and the number of rounds required for identifying the tags within the RFID reader's interrogation zone. The proposed algorithm is based on the framed ALOHA protocol, and the frame size is adaptively updated each round. Simulation results show that our proposed algorithm is more efficient than the conventional algorithms based on the framed ALOHA.

  7. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack. PMID:25491577

  8. Research and design on system of asset management based on RFID

    NASA Astrophysics Data System (ADS)

    Guan, Peng; Du, HuaiChang; Jing, Hua; Zhang, MengYue; Zhang, Meng; Xu, GuiXian

    2011-10-01

    By analyzing the problems in the current assets management, this thesis proposing RFID technology will be applied to asset management in order to improve the management level of automation and information. This paper designed the equipment identification based on 433MHz RFID tag and reader which was deeply studied on the basis of RFID tag and card reader circuits, and this paper also illustrates the system of asset management. The RS232 converts Ethernet is a innovative technology to transfer data to PC monitor software, and implement system of asset management based on WEB techniques (PHP and MySQL).

  9. New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Rodemich, E. R.; Rumsey, H., Jr.; Welch, L. R.

    1977-01-01

    An upper bound on the rate of a binary code as a function of minimum code distance (using a Hamming code metric) is arrived at from Delsarte-MacWilliams inequalities. The upper bound so found is asymptotically less than Levenshtein's bound, and a fortiori less than Elias' bound. Appendices review properties of Krawtchouk polynomials and Q-polynomials utilized in the rigorous proofs.

  10. Transport of RFID tracers in a glacierized Andean stream (Estero Morales, Chile)

    NASA Astrophysics Data System (ADS)

    Rainato, Riccardo; Toro, Matteo; Mao, Luca; Fraccarollo, Luigi; Brardinoni, Francesco; Aristide Lenzi, Mario

    2015-04-01

    A proper quantification of bedload transport is crucial in order to improve the knowledge on the morphology and dynamics of river systems. Unfortunately, bedload surveys in mountain streams are notoriously difficult. Also, equations for predicting the transport capacity often overestimate the actual bedload rates, and field measurement are still rare. An alternative to direct bedload sampling during floods is the use of tracers, which allow to obtain precious data on sediment dynamic and transport due to different conditions of hydraulic forcing, especially in mountain streams. In this work, the results obtained by the employment of passive RFID tracers in a steep Andean channel are presented. The study site is the Estero Morales, a high-gradient stream located in the Metropolitan Region (central Chile). The channel bed exhibits boulder-cascade, step-pool and plane bed morphologies while the average slope is of about 9.5%. The basin (27 km2) hosts the San Francisco glacier (1.8 km2) that strongly affects the hydrological regime. In particular during the melt period (December-March) the glacier ensures daily discharge fluctuations with highly variable associated bedload transport rates. Overall, 429 RFID tracers were installed in the Estero Morales and the displacements over a reach of approximately 700 m were monitored through 15 surveys, performed between January and March 2014. The recovery rate ranges between 19% and 97%. Tracers travel distance were paired to the peaks of stream power per unit area (ω, in W/m2) that occurred during the study period. Due to the wide range of flow magnitude observed, the values of stream power were grouped in three classes: low (650-750 W/m2), moderate (750-800 W/m2), and high (800-900 W/m2). Despite the different conditions of hydraulic forcing, moderate and low classes show mean displacement very similar, equal to 33 m and 24 m, respectively. In either cases a size selective transport was observed. On the other hand, the high

  11. 2-SR-based electrically small antenna for RFID applications

    NASA Astrophysics Data System (ADS)

    Paredes, Ferran; Zuffanelli, Simone; Aguilà, Pau; Zamora, Gerard; Martin, Ferran; Bonache, Jordi

    2016-04-01

    In this work, the 2-turn spiral resonator (2-SR) is proposed as an electrically small antenna for passive radio frequency identification (RFID) tags at the European ultra-high frequency (UHF) band. The radiation properties are studied in order to explore the viability of the 2-SR applied to tag antenna design. Based on analytical calculations, the radiation pattern is found to provide a cancelation of the radiation nulls. This results in a mitigation of the blind spots in the read range, which are present in typical UHF-RFID tags as an undesired feature. As a proof of concept, a passive tag of size 35 mm × 40 mm (λ 0/10 × λ 0/9) based on the 2-SR antenna is designed and fabricated. Good radiation efficiency (75 %) and a quasi-isotropic radiation pattern are obtained. The experimental tag read range for different directions is in good agreement with the simulation results. The measured read range exhibits maximum and minimum values of 6.7 and 3.5 m, respectively.

  12. Adhesive RFID Sensor Patch for Monitoring of Sweat Electrolytes.

    PubMed

    Rose, Daniel P; Ratterman, Michael E; Griffin, Daniel K; Hou, Linlin; Kelley-Loughnane, Nancy; Naik, Rajesh R; Hagen, Joshua A; Papautsky, Ian; Heikenfeld, Jason C

    2015-06-01

    Wearable digital health devices are dominantly found in rigid form factors such as bracelets and pucks. An adhesive radio-frequency identification (RFID) sensor bandage (patch) is reported, which can be made completely intimate with human skin, a distinct advantage for chronological monitoring of biomarkers in sweat. In this demonstration, a commercial RFID chip is adapted with minimum components to allow potentiometric sensing of solutes in sweat, and surface temperature, as read by an Android smartphone app with 96% accuracy at 50 mM Na(+) (in vitro tests). All circuitry is solder-reflow integrated on a standard Cu/polyimide flexible-electronic layer including an antenna, but while also allowing electroplating for simple integration of exotic metals for sensing electrodes. Optional paper microfluidics wick sweat from a sweat porous adhesive allowing flow to the sensor, or the sensor can be directly contacted to the skin. The wearability of the patch has been demonstrated for up to seven days, and includes a protective textile which provides a feel and appearance similar to a standard Band-Aid. Applications include hydration monitoring, but the basic capability is extendable to other mM ionic solutes in sweat (Cl(-), K(+), Mg(2+), NH4(+), and Zn(2+)). The design and fabrication of the patch are provided in full detail, as the basic components could be useful in the design of other wearable sensors. PMID:25398174

  13. An Implantable RFID Sensor Tag toward Continuous Glucose Monitoring.

    PubMed

    Xiao, Zhibin; Tan, Xi; Chen, Xianliang; Chen, Sizheng; Zhang, Zijian; Zhang, Hualei; Wang, Junyu; Huang, Yue; Zhang, Peng; Zheng, Lirong; Min, Hao

    2015-05-01

    This paper presents a wirelessly powered implantable electrochemical sensor tag for continuous blood glucose monitoring. The system is remotely powered by a 13.56-MHz inductive link and utilizes an ISO 15693 radio frequency identification (RFID) standard for communication. This paper provides reliable and accurate measurement for changing glucose level. The sensor tag employs a long-term glucose sensor, a winding ferrite antenna, an RFID front-end, a potentiostat, a 10-bit sigma-delta analog to digital converter, an on-chip temperature sensor, and a digital baseband for protocol processing and control. A high-frequency external reader is used to power, command, and configure the sensor tag. The only off-chip support circuitry required is a tuned antenna and a glucose microsensor. The integrated chip fabricated in SMIC 0.13-μm CMOS process occupies an area of 1.2 mm ×2 mm and consumes 50 μW. The power sensitivity of the whole system is -4 dBm. The sensor tag achieves a measured glucose range of 0-30 mM with a sensitivity of 0.75 nA/mM. PMID:25823049

  14. Investigation of Interference Models for RFID Systems †

    PubMed Central

    Zhang, Linchao; Ferrero, Renato; Gandino, Filippo; Rebaudengo, Maurizio

    2016-01-01

    The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols. PMID:26861326

  15. Equipment location in hospitals using RFID-based positioning system.

    PubMed

    Shirehjini, Ali Asghar Nazari; Yassine, Abdulsalam; Shirmohammadi, Shervin

    2012-11-01

    Throughout various complex processes within hospitals, context-aware services and applications can help to improve the quality of care and reduce costs. For example, sensors and radio frequency identification (RFID) technologies for e-health have been deployed to improve the flow of material, equipment, personal, and patient. Bed tracking, patient monitoring, real-time logistic analysis, and critical equipment tracking are famous applications of real-time location systems (RTLS) in hospitals. In fact, existing case studies show that RTLS can improve service quality and safety, and optimize emergency management and time critical processes. In this paper, we propose a robust system for position and orientation determination of equipment. Our system utilizes passive (RFID) technology mounted on flooring plates and several peripherals for sensor data interpretation. The system is implemented and tested through extensive experiments. The results show that our system's average positioning and orientation measurement outperforms existing systems in terms of accuracy. The details of the system as well as the experimental results are presented in this paper. PMID:24218700

  16. ODINS: On-Demand Indoor Navigation System RFID Based.

    PubMed

    Bianchi, Federico; Masciadri, Andrea; Salice, Fabio

    2015-01-01

    This paper presents an On-Demand Indoor Navigation System (ODINS) based on RFID technology. ODINS is a distributed infrastructure where a set of information points (Fixed Stations - FS) provides the direction to a user who has to reach the destination point he/she has previously selected. ODINS system is proposed for residencies hosting people with mild cognitive disabilities and elderly but it can be also applied to structures where people could be disoriented. The destination is configured at some reception points or it is a predefined (e.g. the bed room or a selected "safe" point). The destination is associated with a RFID disposable bracelet assigned to her/him. The path is algorithmically computed and spread to all FSs. Every time the user is disoriented, she/he can search for the closest FS that displays the right directition. FSs should be located in strategic positions and provide a user-friendly interface such as bright arrows. The complexity is "system-side" making ODINS usable for everyone. PMID:26294495

  17. Physical Uncertainty Bounds (PUB)

    SciTech Connect

    Vaughan, Diane Elizabeth; Preston, Dean L.

    2015-03-19

    This paper introduces and motivates the need for a new methodology for determining upper bounds on the uncertainties in simulations of engineered systems due to limited fidelity in the composite continuum-level physics models needed to simulate the systems. We show that traditional uncertainty quantification methods provide, at best, a lower bound on this uncertainty. We propose to obtain bounds on the simulation uncertainties by first determining bounds on the physical quantities or processes relevant to system performance. By bounding these physics processes, as opposed to carrying out statistical analyses of the parameter sets of specific physics models or simply switching out the available physics models, one can obtain upper bounds on the uncertainties in simulated quantities of interest.

  18. Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine

    PubMed Central

    Coustasse, Alberto; Cunningham, Brian; Deslich, Stacie; Willson, Eric; Meadows, Pamela

    2015-01-01

    Radio-frequency identification (RFID) technology is used by hospital supply chains to track medical products and monitor inventories. Hospitals have also begun incorporating RFID technology as part of their transfusion processes. The purpose of this review was to analyze how healthcare organization supply chains can benefit from the utilization of RFID systems in transfusion service departments. The methodology for this study was a literature review following the steps of a systematic review with a total of 52 sources referenced. RFID technology is used to manage and track blood products from the initial donor phlebotomy to final disposition or product transfusion. RFID-enabled transfusion practices have successfully increased provider productivity and product quality through work-time reduction and error reduction. Findings of this research study suggest that RFID has provided improvements in quality of care and efficiency, while initial costs, security, and privacy appear to be the principal barriers to adoption. PMID:26396555

  19. Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine.

    PubMed

    Coustasse, Alberto; Cunningham, Brian; Deslich, Stacie; Willson, Eric; Meadows, Pamela

    2015-01-01

    Radio-frequency identification (RFID) technology is used by hospital supply chains to track medical products and monitor inventories. Hospitals have also begun incorporating RFID technology as part of their transfusion processes. The purpose of this review was to analyze how healthcare organization supply chains can benefit from the utilization of RFID systems in transfusion service departments. The methodology for this study was a literature review following the steps of a systematic review with a total of 52 sources referenced. RFID technology is used to manage and track blood products from the initial donor phlebotomy to final disposition or product transfusion. RFID-enabled transfusion practices have successfully increased provider productivity and product quality through work-time reduction and error reduction. Findings of this research study suggest that RFID has provided improvements in quality of care and efficiency, while initial costs, security, and privacy appear to be the principal barriers to adoption. PMID:26396555

  20. Design of an HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization.

    PubMed

    Mi, Jian; Takahashi, Yasutake

    2016-01-01

    Radio frequency identification (RFID) technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL) method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF)-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot. PMID:27483279

  1. Asymptotic entropy bounds

    NASA Astrophysics Data System (ADS)

    Bousso, Raphael

    2016-07-01

    We show that known entropy bounds constrain the information carried off by radiation to null infinity. We consider distant, planar null hypersurfaces in asymptotically flat spacetime. Their focusing and area loss can be computed perturbatively on a Minkowski background, yielding entropy bounds in terms of the energy flux of the outgoing radiation. In the asymptotic limit, we obtain boundary versions of the quantum null energy condition, of the generalized Second Law, and of the quantum Bousso bound.

  2. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems. PMID:26573649

  3. A secure 2G-RFID-Sys mechanism for applying to the medical emergency system.

    PubMed

    Chen, Yu-Yi; Wang, Yao-Jen; Jan, Jinn-Ke

    2013-06-01

    In the Medical Emergency System, any moment of delay in an emergency such as ambulance dispatch, ambulance diversion and clinical handover communication can significantly reduce a patient's chance of survival. Without the disadvantage of centralized management, a new type of RFID application named 2G-RFID-Sys will be more efficient. It is suitable for the tagged ambulance dispatch management in a huge range. In this article, the prototype of 2G-RFID-Sys and the responsibility of each participant are refined. We take an example of applying the 2G-RFID-Sys to the Medical Emergency System, the traffic condition of the ambulance will be able to ensure. PMID:23519704

  4. Indoor localization using pedestrian dead reckoning updated with RFID-based fiducials.

    PubMed

    House, Samuel; Connell, Sean; Milligan, Ian; Austin, Daniel; Hayes, Tamara L; Chiang, Patrick

    2011-01-01

    We describe a low-cost wearable system that tracks the location of individuals indoors using commonly available inertial navigation sensors fused with radio frequency identification (RFID) tags placed around the smart environment. While conventional pedestrian dead reckoning (PDR) calculated with an inertial measurement unit (IMU) is susceptible to sensor drift inaccuracies, the proposed wearable prototype fuses the drift-sensitive IMU with a RFID tag reader. Passive RFID tags placed throughout the smart-building then act as fiducial markers that update the physical locations of each user, thereby correcting positional errors and sensor inaccuracy. Experimental measurements taken for a 55 m × 20 m 2D floor space indicate an over 1200% improvement in average error rate of the proposed RFID-fused system over dead reckoning alone. PMID:22256097

  5. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    NASA Astrophysics Data System (ADS)

    Kiama, J. W.; Raman, V.; Patrick, T. H. H.

    2014-02-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity.

  6. Performance Evaluation of RTLS Based on Active RFID Power Measurement for Dense Moving Objects

    NASA Astrophysics Data System (ADS)

    Kim, Taekyu; Lee, Jin; Lee, Seungbeom; Park, Sin-Chong

    Tracking a large quantity of moving target tags simultaneously is essential for the localization and guidance of people in welfare facilities like hospitals and sanatoriums for the aged. The locating system using active RFID technology consists of a number of fixed RFID readers and tags carried by the target objects, or senior people. We compare the performances of several determination algorithms which use the power measurement of received signals emitted by the moving active RFID tags. This letter presents a study on the effect of collision in tracking large quantities of objects based on active RFID real time location system (RTLS). Traditional trilateration, fingerprinting, and well-known LANDMARC algorithm are evaluated and compared with varying number of moving tags through the SystemC-based computer simulation. From the simulation, we show the tradeoff relationship between the number of moving tags and estimation accuracy.

  7. RFID-Based Critical Path Expert System for Agility Manufacture Process Management

    NASA Astrophysics Data System (ADS)

    Cheng, Haifang; Xiang, Yuli

    This paper presents a critical path expert system for the agility manufacture process management based on radio frequency identification (RFID) technology. The paper explores that the agility manufacture processes can be visible and controllable with RFID. The critical paths or activities can be easily found out and tracked by the RFID tracing technology. And the expert system can optimize the bottle neck of the task process of the agility management with the critical path adjusting and reforming method. Finally, the paper gives a simple application example of the system to discuss how to adjust the critical paths and how to make the process more agility and flexibility with the critical path expert system. With an RFID-based critical path expert system, the agility manufacture process management will be more effective and efficient.

  8. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  9. Integrated algorithms for RFID-based multi-sensor indoor/outdoor positioning solutions

    NASA Astrophysics Data System (ADS)

    Zhu, Mi.; Retscher, G.; Zhang, K.

    2011-12-01

    Position information is very important as people need it almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques but these techniques are difficult to be used indoors since GPS signal reception is limited. The alternative techniques that can be used for indoor positioning include, to name a few, Wireless Local Area Network (WLAN), bluetooth and Ultra Wideband (UWB) etc.. However, all of these have limitations. The main objectives of this paper are to investigate and develop algorithms for a low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) and its integration with other positioning systems. An RFID system consists of three components, namely a control unit, an interrogator and a transponder that transmits data and communicates with the reader. An RFID tag can be incorporated into a product, animal or person for the purpose of identification and tracking using radio waves. In general, for RFID positioning in urban and indoor environments three different methods can be used, including cellular positioning, trilateration and location fingerprinting. In addition, the integration of RFID with other technologies is also discussed in this paper. A typical combination is to integrate RFID with relative positioning technologies such as MEMS INS to bridge the gaps between RFID tags for continuous positioning applications. Experiments are shown to demonstrate the improvements of integrating multiple sensors with RFID which can be employed successfully for personal positioning.

  10. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.