Science.gov

Sample records for rfid distance bounding

  1. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Distance measure with improved lower bound for multivariate time series

    NASA Astrophysics Data System (ADS)

    Li, Hailin

    2017-02-01

    Lower bound function is one of the important techniques used to fast search and index time series data. Multivariate time series has two aspects of high dimensionality including the time-based dimension and the variable-based dimension. Due to the influence of variable-based dimension, a novel method is proposed to deal with the lower bound distance computation for multivariate time series. The proposed method like the traditional ones also reduces the dimensionality of time series in its first step and thus does not directly apply the lower bound function on the multivariate time series. The dimensionality reduction is that multivariate time series is reduced to univariate time series denoted as center sequences according to the principle of piecewise aggregate approximation. In addition, an extended lower bound function is designed to obtain good tightness and fast measure the distance between any two center sequences. The experimental results demonstrate that the proposed lower bound function has better tightness and improves the performance of similarity search in multivariate time series datasets.

  4. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-11-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  5. A lower bound on the minimum Euclidean distance of trellis-coded modulation schemes

    NASA Technical Reports Server (NTRS)

    Rouanne, Marc; Costello, Daniel J., Jr.

    1988-01-01

    A lower bound on the minimum free Euclidean distance of trellis-coded modulation (TCM) is derived that guarantees the existence of good TCM codes of any complexity. The bound is used to compare trellis codes combined with phase-shift keying, pulse amplitude modulation, and quadrature amplitude-shift keying modulation. This random coding bound is the first lower bound on the free distance of trellis codes, is tighter than any upper bound for large constraint lengths, and predicts the asymptotic performance of TCM when the complexity of the code becomes large. The bound can be used with any code rate and any modulation scheme and shows that the free distance increases linearly with the constraint length for large values of the constraint length.

  6. Sensors closeness test based on an improved [0, 1] bounded Mahalanobis distance Δ{sup 2}

    SciTech Connect

    Masnan, Maz Jamilah; Mahat, Nor Idayu; Shakaff, Ali Yeon Md Abdullah, Abu Hassan

    2015-12-11

    Mahalanobis distance Δ{sup 2} values are commonly in the range of 0 to +∞ where higher values represent greater distance between class means or points. The increase in Mahalanobis distance is unbounded as the distance multiply. To certain extend, the unbounded distance values pose difficulties in the evaluation and decision for instance in the sensors closeness test. This paper proposes an approach to [0, 1] bounded Mahalanobis distance Δ{sup 2} that enable researcher to easily perform sensors closeness test. The experimental data of four different types of rice based on three different electronic nose sensors namely InSniff, PEN3, and Cyranose320 were analyzed and sensor closeness test seems successfully performed within the [0, 1] bound.

  7. Sensors closeness test based on an improved [0, 1] bounded Mahalanobis distance Δ2

    NASA Astrophysics Data System (ADS)

    Masnan, Maz Jamilah; Mahat, Nor Idayu; Shakaff, Ali Yeon Md; Abdullah, Abu Hassan

    2015-12-01

    Mahalanobis distance Δ2 values are commonly in the range of 0 to +∞ where higher values represent greater distance between class means or points. The increase in Mahalanobis distance is unbounded as the distance multiply. To certain extend, the unbounded distance values pose difficulties in the evaluation and decision for instance in the sensors closeness test. This paper proposes an approach to [0, 1] bounded Mahalanobis distance Δ2 that enable researcher to easily perform sensors closeness test. The experimental data of four different types of rice based on three different electronic nose sensors namely InSniff, PEN3, and Cyranose320 were analyzed and sensor closeness test seems successfully performed within the [0, 1] bound.

  8. Tight Uniform Continuity Bounds for Quantum Entropies: Conditional Entropy, Relative Entropy Distance and Energy Constraints

    NASA Astrophysics Data System (ADS)

    Winter, Andreas

    2016-10-01

    We present a bouquet of continuity bounds for quantum entropies, falling broadly into two classes: first, a tight analysis of the Alicki-Fannes continuity bounds for the conditional von Neumann entropy, reaching almost the best possible form that depends only on the system dimension and the trace distance of the states. Almost the same proof can be used to derive similar continuity bounds for the relative entropy distance from a convex set of states or positive operators. As applications, we give new proofs, with tighter bounds, of the asymptotic continuity of the relative entropy of entanglement, E R , and its regularization {E_R^{∞}}, as well as of the entanglement of formation, E F . Using a novel "quantum coupling" of density operators, which may be of independent interest, we extend the latter to an asymptotic continuity bound for the regularized entanglement of formation, aka entanglement cost, {E_C=E_F^{∞}}. Second, we derive analogous continuity bounds for the von Neumann entropy and conditional entropy in infinite dimensional systems under an energy constraint, most importantly systems of multiple quantum harmonic oscillators. While without an energy bound the entropy is discontinuous, it is well-known to be continuous on states of bounded energy. However, a quantitative statement to that effect seems not to have been known. Here, under some regularity assumptions on the Hamiltonian, we find that, quite intuitively, the Gibbs entropy at the given energy roughly takes the role of the Hilbert space dimension in the finite-dimensional Fannes inequality.

  9. Miniaturizing RFID for magnamosis.

    PubMed

    Jiang, Hao; Chen, Shijie; Kish, Shad; Loh, Lokkee; Zhang, Junmin; Zhang, Xiaorong; Kwiat, Dillon; Harrison, Michael; Roy, Shuvo

    2014-01-01

    Anastomosis is a common surgical procedure using staples or sutures in an open or laparoscopic surgery. A more effective and much less invasive alternative is to apply the mechanical pressure on the tissue over a few days [1]. Since the pressure is produced by the attractive force between two permanent magnets, the procedure is called magnamosis[1]. To ensure the two magnets are perfectly aligned during the surgery, a miniaturized batteryless Radio Frequency IDentification (RFID) tag is developed to wirelessly telemeter the status of a pressure sensitive mechanical switch. Using the multi-layer circular spiral coil design, the diameter of the RFID tag is shrunk to 10, 15, 19 and 27 mm to support the magnamosis for children as well as adults. With the impedance matching network, the operating distance of these four RFID tags are longer than 10 cm in a 20 × 22 cm(2) area, even when the tag's normal direction is 45° off the antenna's normal direction. Measurement results also indicate that there is no noticeable degradation on the operating distance when the tag is immersed in saline or placed next to the rare-earth magnet. The miniaturized RFID tag presented in this paper is able to support the magnamosis and other medical applications that require the miniaturized RFID tag.

  10. Long-term passive distance-bounded relative motion in the presence of perturbations

    NASA Astrophysics Data System (ADS)

    Chu, Jing; Guo, Jian; Gill, Eberhard K. A.

    2015-04-01

    This paper presents closed-form solutions for the problem of long-term satellite relative motion in the presence of perturbations, and introduces a design methodology for long-term passive distance-bounded relative motion. There are two key ingredients of closed-form solutions.One is the model of relative motion; the other is the Hamiltonian model and its canonical solution of the -perturbed absolute motion. The model of relative motion makes no assumptions on the eccentricity of the reference orbit or on the magnitude of the relative distances. Besides, the relative motion model is concise with straightforward physical insight, and consistent with the Hamiltonian model. The Hamiltonian model takes into account the secular, long-periodic and short-periodic effects of the perturbation. It also remains separable in terms of spherical coordinates to ensure the application of the Hamilton-Jacobi theory to derive the canonical solution. When deriving the canonical solution, pseudo-circular and pseudo-elliptical orbits are treated separately and Carlson's method is employed to calculate elliptic integrals, which takes advantage of the symmetry of the integrand. These symmetry properties hold physical insights of the -perturbed absolute motion. To design the long-term distance-bounded relative motion, the nodal period and the drift of right ascension of the ascending node (RAAN) per nodal period are, respectively, matched non-instantaneously. Even though the nodal period and the drift of RAAN per nodal period can be obtained via the canonical solution, action-angle variables are used to obtain the frequency of the system without finding the complete solution to the perturbed orbital motion.

  11. Distance constraints on activation of TRPV4 channels by AKAP150-bound PKCα in arterial myocytes.

    PubMed

    Tajada, Sendoa; Moreno, Claudia M; O'Dwyer, Samantha; Woods, Sean; Sato, Daisuke; Navedo, Manuel F; Santana, L Fernando

    2017-06-05

    TRPV4 (transient receptor potential vanilloid 4) channels are Ca(2+)-permeable channels that play a key role in regulating vascular tone. In arterial myocytes, opening of TRPV4 channels creates local increases in Ca(2+) influx, detectable optically as "TRPV4 sparklets." TRPV4 sparklet activity can be enhanced by the action of the vasoconstrictor angiotensin II (AngII). This modulation depends on the activation of subcellular signaling domains that comprise protein kinase C α (PKCα) bound to the anchoring protein AKAP150. Here, we used super-resolution nanoscopy, patch-clamp electrophysiology, Ca(2+) imaging, and mathematical modeling approaches to test the hypothesis that AKAP150-dependent modulation of TRPV4 channels is critically dependent on the distance between these two proteins in the sarcolemma of arterial myocytes. Our data show that the distance between AKAP150 and TRPV4 channel clusters varies with sex and arterial bed. Consistent with our hypothesis, we further find that basal and AngII-induced TRPV4 channel activity decays exponentially as the distance between TRPV4 and AKAP150 increases. Our data suggest a maximum radius of action of ∼200 nm for local modulation of TRPV4 channels by AKAP150-associated PKCα. © 2017 Tajada et al.

  12. Distance-from-the-wall scaling of turbulent motions in wall-bounded flows

    NASA Astrophysics Data System (ADS)

    Baidya, R.; Philip, J.; Hutchins, N.; Monty, J. P.; Marusic, I.

    2017-02-01

    An assessment of self-similarity in the inertial sublayer is presented by considering the wall-normal velocity, in addition to the streamwise velocity component. The novelty of the current work lies in the inclusion of the second velocity component, made possible by carefully conducted subminiature ×-probe experiments to minimise the errors in measuring the wall-normal velocity. We show that not all turbulent stress quantities approach the self-similar asymptotic state at an equal rate as the Reynolds number is increased, with the Reynolds shear stress approaching faster than the streamwise normal stress. These trends are explained by the contributions from attached eddies. Furthermore, the Reynolds shear stress cospectra, through its scaling with the distance from the wall, are used to assess the wall-normal limits where self-similarity applies within the wall-bounded flow. The results are found to be consistent with the recent prediction from the work of Wei et al. ["Properties of the mean momentum balance in turbulent boundary layer, pipe and channel flows," J. Fluid Mech. 522, 303-327 (2005)], Klewicki ["Reynolds number dependence, scaling, and dynamics of turbulent boundary layers," J. Fluids Eng. 132, 094001 (2010)], and others that the self-similar region starts and ends at z+˜O (√{δ+}) and O (δ+) , respectively. Below the self-similar region, empirical evidence suggests that eddies responsible for turbulent stresses begin to exhibit distance-from-the-wall scaling at a fixed z+ location; however, they are distorted by viscous forces, which remain a leading order contribution in the mean momentum balance in the region z+≲O (√{δ+}) , and thus result in a departure from self-similarity.

  13. A Novel Communication Range Recognition (CRR) Scheme for Spatial Localization of Passive RFID Tags

    NASA Astrophysics Data System (ADS)

    Wada, Tomotaka; Uchitomi, Norie; Ota, Yuuki; Hori, Toshihiro; Mutsuura, Kouichi; Okada, Hiromi

    RFID (Radio Frequency Identification) technology is expected to be used as a localization tool. By the localization of RFID tags, a mobile robot equipped with an RFID reader can recognize the surrounding environment. In this paper, we propose a novel effective scheme called the communication range recognition (CRR) scheme for localizing RFID tags. In this scheme, an RFID reader determines the boundaries of the communication range when it is appropriately positioned by the robot. We evaluate the estimated position accuracy through numerous experiments. We show that the moving distance of the RFID reader in the proposed scheme is lower than that in conventional schemes.

  14. Similarity searching in databases of flexible 3D structures using autocorrelation vectors derived from smoothed bounded distance matrices.

    PubMed

    Rhodes, Nicholas; Clark, David E; Willett, Peter

    2006-01-01

    This paper presents an exploratory study of a novel method for flexible 3-D similarity searching based on autocorrelation vectors and smoothed bounded distance matrices. Although the new approach is unable to outperform an existing 2-D similarity searching in terms of enrichment factors, it is able to retrieve different compounds at a given percentage of the hit-list and so may be a useful adjunct to other similarity searching methods.

  15. Effect of Cultural Distance on Translation of Culture-Bound Texts

    ERIC Educational Resources Information Center

    Rafieyan, Vahid

    2016-01-01

    Sociolinguistic and sociocultural features of the source language can be ideally transferred to the target language when the translator's cultural background knowledge has a high overlap with the source language culture. This signifies the crucial role of national cultural distance from the source language society in the quality of translation of…

  16. NASA RFID Applications

    NASA Technical Reports Server (NTRS)

    Fink, Patrick, Ph.D.; Kennedy, Timothy, Ph.D; Powers, Anne; Haridi, Yasser; Chu, Andrew; Lin, Greg; Yim, Hester; Byerly, Kent, Ph.D.; Barton, Richard, Ph.D.; Khayat, Michael, Ph.D.; Studor, George; Brocato, Robert; Ngo, Phong; Arndt, G. D., Ph.D.; Gross, Julia; Phan, Chau; Ni, David, Ph.D.; Dusl, John; Dekome, Kent

    2007-01-01

    This viewgraph document reviews some potential uses for Radio Frequency Identification in space missions. One of these is inventory management in space, including the methods used in Apollo, the Space Shuttle, and Space Station. The potential RFID uses in a remote human outpost are reviewed. The use of Ultra-Wideband RFID for tracking are examined such as that used in Sapphire DART The advantages of RFID in passive, wireless sensors in NASA applications are shown such as: Micrometeoroid impact detection and Sensor measurements in environmental facilities The potential for E-textiles for wireless and RFID are also examined.

  17. Overview of RFID technology and its applications in the food industry.

    PubMed

    Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D

    2009-10-01

    Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.

  18. Security aspects of RFID communication systems

    NASA Astrophysics Data System (ADS)

    Bîndar, Valericǎ; Popescu, Mircea; Bǎrtuşicǎ, Rǎzvan; Craciunescu, Razvan; Halunga, Simona

    2015-02-01

    The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a communication system including RFID transponder and the tag reader, and it has been determined that the uplink signal level is 62 dB larger than the average value of the noise at the distance of 1m from the tag, therefore the shielding effectiveness has to exceed this threshold. Next, the card has been covered with several shielding materials and measurements were carried, under similar conditions to test the recovery of compromising signals. A very simple protection measure to prevent unauthorized reading of the data stored on the card has been proposed, and some electromagnetic shielding materials have been proposed and tested.

  19. Neural Decoding and “Inner” Psychophysics: A Distance-to-Bound Approach for Linking Mind, Brain, and Behavior

    PubMed Central

    Ritchie, J. Brendan; Carlson, Thomas A.

    2016-01-01

    A fundamental challenge for cognitive neuroscience is characterizing how the primitives of psychological theory are neurally implemented. Attempts to meet this challenge are a manifestation of what Fechner called “inner” psychophysics: the theory of the precise mapping between mental quantities and the brain. In his own time, inner psychophysics remained an unrealized ambition for Fechner. We suggest that, today, multivariate pattern analysis (MVPA), or neural “decoding,” methods provide a promising starting point for developing an inner psychophysics. A cornerstone of these methods are simple linear classifiers applied to neural activity in high-dimensional activation spaces. We describe an approach to inner psychophysics based on the shared architecture of linear classifiers and observers under decision boundary models such as signal detection theory. Under this approach, distance from a decision boundary through activation space, as estimated by linear classifiers, can be used to predict reaction time in accordance with signal detection theory, and distance-to-bound models of reaction time. Our “neural distance-to-bound” approach is potentially quite general, and simple to implement. Furthermore, our recent work on visual object recognition suggests it is empirically viable. We believe the approach constitutes an important step along the path to an inner psychophysics that links mind, brain, and behavior. PMID:27199652

  20. Electromagnetic compatibility of implantable neurostimulators to RFID emitters

    PubMed Central

    2011-01-01

    Background The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Methods Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz Results The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. Conclusions The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters. PMID:21658266

  1. Electromagnetic compatibility of implantable neurostimulators to RFID emitters.

    PubMed

    Pantchenko, Oxana S; Seidman, Seth J; Guag, Joshua W; Witters, Donald M; Sponberg, Curt L

    2011-06-09

    The objective of this study is to investigate electromagnetic compatibility (EMC) of implantable neurostimulators with the emissions from radio frequency identification (RFID) emitters. Six active implantable neurostimulators with lead systems were tested for susceptibility to electromagnetic fields generated by 22 RFID emitters. These medical devices have been approved for marketing in the U.S. for a number of intended uses that include: epilepsy, depression, incontinence, Parkinsonian tremor and pain relief. Each RFID emitter had one of the following carrier frequencies: 125 kHz, 134 kHz, 13.56 MHz, 433 MHz, 915 MHz and 2.45 GHz. The test results showed the output of one of the implantable neurostimulators was inhibited by 134 kHz RFID emitter at separation distances of 10 cm or less. The output of the same implantable neurostimulator was also inhibited by another 134 kHz RFID emitter at separation distances of 10 cm or less and also showed inconsistent pulsing rate at a separation distance of 15 cm. Both effects occurred during and lasted through out the duration of the exposure. The clinical significance of the effects was assessed by a clinician at the U.S. Food and Drug Administration. The effects were determined to be clinically significant only if they occurred for extended period of time. There were no observed effects from the other 5 implantable neurostimulators or during exposures from other RFID emitters.

  2. Threats to Networked RFID Systems

    NASA Astrophysics Data System (ADS)

    Mitrokotsa, Aikaterini; Beye, Michael; Peris-Lopez, Pedro

    RFID technology is an area currently undergoing active development. An issue, which has received a lot of attention, is the security risks that arise due to the inherent vulnerabilities of RFID technology. Most of this attention, however, has focused on related privacy issues. The goal of this chapter is to present a more global overview of RFID threats. This can not only help experts perform risk analyses of RFID systems but also increase awareness and understanding of RFID security issues for non-experts. We use clearly defined and widely accepted concepts from both the RFID area and classical risk analysis to structure this overview.

  3. Panel: RFID Security and Privacy

    NASA Astrophysics Data System (ADS)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  4. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    PubMed Central

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  5. Managing RFID sensors networks with a general purpose RFID middleware.

    PubMed

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  6. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  7. RFID solution benefits Cambridge hospital.

    PubMed

    James, Andrew

    2013-10-01

    Keeping track of thousands of pieces of equipment in a busy hospital environment is a considerable challenge, but, according to RFID tagging and asset tracking specialist, Harland Simon, RFID technology can make the task considerably simpler. Here Andrew James, the company's RFID sales manager, describes the positive benefits the technology has brought the Medical Equipment Library (MEL) at Addenbrooke's Hospital, one of the world's most famous teaching hospitals.

  8. An RFID-based on-lens sensor system for long-term IOP monitoring.

    PubMed

    Hsu, Shun-Hsi; Chiou, Jin-Chern; Liao, Yu-Te; Yang, Tzu-Sen; Kuei, Cheng-Kai; Wu, Tsung-Wei; Huang, Yu-Chieh

    2015-01-01

    In this paper, an RFID-based on-lens sensor system is proposed for noninvasive long-term intraocular pressure monitoring. The proposed sensor IC, fabricated in a 0.18um CMOS process, consists of capacitive sensor readout circuitry, RFID communication circuits, and digital processing units. The sensor IC is integrated with electroplating capacitive sensors and a receiving antenna on the contact lens. The sensor IC can be wirelessly powered, communicate with RFID compatible equipment, and perform IOP measurement using on-lens capacitive sensor continuously from a 2cm distance while the incident power from an RFID reader is 20 dBm. The proposed system is compatible to Gen2 RFID protocol, extending the flexibility and reducing the self-developed firmware efforts.

  9. Indoor localization using passive RFID

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Segou, Olga E.; Mitilineos, Stelios A.; Thomopoulos, Stelios C. A.

    2011-06-01

    Radio frequency identification (RFID) systems based on passive tags are used successfully in a wide range of object identification applications. However, the increasing needs to meet new demands on applications of localization and tracking create a new field for evolution of the RFID technology. This paper presents the design, implementation, and evaluation of a cost-effective localization system for in-building usage that is able to localize objects that carry passive RFID tags. The RFID reading is performed by a single Reader and an array of directional antennas through multiplexing. Evaluation and experimental results from three localization algorithms based on RSSI are presented.

  10. RFID identity theft and countermeasures

    NASA Astrophysics Data System (ADS)

    Herrigel, Alexander; Zhao, Jian

    2006-02-01

    This paper reviews the ICAO security architecture for biometric passports. An attack enabling RFID identity theft for a later misuse is presented. Specific countermeasures against this attack are described. Furthermore, it is shown that robust high capacity digital watermarking for the embedding and retrieving of binary digital signature data can be applied as an effective mean against RFID identity theft. This approach requires only minimal modifications of the passport manufacturing process and is an enhancement of already proposed solutions. The approach may also be applied in combination with a RFID as a backup solution (damaged RFID chip) to verify with asymmetric cryptographic techniques the authenticity and the integrity of the passport data.

  11. Cutting Edge RFID Technologies for NASA Applications

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.

    2007-01-01

    This viewgraph document reviews the use of Radio-frequency identification (RFID) for NASA applications. Some of the uses reviewed are: inventory management in space; potential RFID uses in a remote human outpost; Ultra-Wideband RFID for tracking; Passive, wireless sensors in NASA applications such as Micrometeoroid impact detection and Sensor measurements in environmental facilities; E-textiles for wireless and RFID.

  12. Precise RFID localization in impaired environment through sparse signal recovery

    NASA Astrophysics Data System (ADS)

    Subedi, Saurav; Zhang, Yimin D.; Amin, Moeness G.

    2013-05-01

    Radio frequency identification (RFID) is a rapidly developing wireless communication technology for electronically identifying, locating, and tracking products, assets, and personnel. RFID has become one of the most important means to construct real-time locating systems (RTLS) that track and identify the location of objects in real time using simple, inexpensive tags and readers. The applicability and usefulness of RTLS techniques depend on their achievable accuracy. In particular, when multilateration-based localization techniques are exploited, the achievable accuracy primarily relies on the precision of the range estimates between a reader and the tags. Such range information can be obtained by using the received signal strength indicator (RSSI) and/or the phase difference of arrival (PDOA). In both cases, however, the accuracy is significantly compromised when the operation environment is impaired. In particular, multipath propagation significantly affects the measurement accuracy of both RSSI and phase information. In addition, because RFID systems are typically operated in short distances, RSSI and phase measurements are also coupled with the reader and tag antenna patterns, making accurate RFID localization very complicated and challenging. In this paper, we develop new methods to localize RFID tags or readers by exploiting sparse signal recovery techniques. The proposed method allows the channel environment and antenna patterns to be taken into account and be properly compensated at a low computational cost. As such, the proposed technique yields superior performance in challenging operation environments with the above-mentioned impairments.

  13. RFID receiver apparatus and method

    DOEpatents

    Scott, Jeffrey Wayne [Pasco, WA

    2006-12-26

    An RFID backscatter interrogator for transmitting data to an RFID tag, generating a carrier for the tag, and receiving data from the tag modulated onto the carrier, the interrogator including a single grounded-coplanar wave-guide circuit board and at least one surface mount integrated circuit supported by the circuit board.

  14. Design considerations and tradeoffs for passive RFID tags

    NASA Astrophysics Data System (ADS)

    Hussien, Faisal A.; Turker, Didem Z.; Srinivasan, Rangakrishnan; Mobarak, Mohamed S.; Cortes, Fernando P.; Sanchez-Sinencio, Edgar

    2005-06-01

    Radio Frequency Identification (RFID) systems are widely used in a variety of tracking, security and tagging applications. Their operation in non line-of-sight environments makes them superior over similar devices such as barcode and infrared tags. RFID systems span a wide range of applications: medical history storage, dental prosthesis tracking, oil drilling pipe and concrete stress monitoring, toll ways services, animal tracking applications, etc. Passive RFID tags generate their power from the incoming signal; therefore, they do not require a power source. Accordingly, minimizing the power consumption and the implementation area are usually the main design considerations. This paper presents a complete analysis on designing a passive RFID tag. A system design methodology is introduced including the main issues and tradeoffs between different design parameters. The uplink modulation techniques used (ASK, PSK, FSK, and PWM) are illustrated showing how to choose the appropriate signaling scheme for a specific data rate, a certain distance of operation and a limited power consumption budget. An antenna system (transmitter and receiver) is proposed providing the maximum distance of operation with the transmitted power stated by FCC regulations. The backscatter modulation scheme used in the downlink is shown whether to be ASK-BM or PSK-BM and the differences between them are discussed. The key building blocks such as the charge pump, voltage reference, and the regulator used to generate the DC supply voltage from the incoming RF signal are discussed along with their design tradeoffs. A complete architecture for a passive RFID tag is provided as an example to illustrate the proposed RFID tag design methodology.

  15. Commercial Product Activation Using RFID

    NASA Technical Reports Server (NTRS)

    Jedrey, Thomas

    2008-01-01

    Radio-frequency identification (RFID) would be used for commercial product activation, according to a proposal. What is new here is the concept of combining RFID with activation - more specifically, using RFID for activating commercial products (principally, electronic ones) and for performing such ancillary functions as tracking individual product units on production lines, tracking shipments, and updating inventories. According to the proposal, an RFID chip would be embedded in each product. The information encoded in the chip would include a unique number for identifying the product. An RFID reader at the point of sale would record the number of the product and would write digital information to the RFID chip for either immediate activation of the product or for later interrogation and processing. To be practical, an RFID product-activation system should satisfy a number of key requirements: the system should be designed to be integrable into the inventory-tracking and the data-processing and -communication infrastructures of businesses along the entire supply chain from manufacture to retail; the system should be resistant to sophisticated hacking; activation codes should be made sufficiently complexity to minimize the probability of activating stolen products; RFID activation equipment at points of sale must be capable to two-way RF communication for the purposes of reading information from, and writing information to, embedded RFID chips; the equipment at points of sale should be easily operable by sales clerks with little or no training; the point-of-sale equipment should verify activation and provide visible and/or audible signals indicating verification or lack thereof; and, the system should be able to handle millions of products per year with minimal human intervention, among other requirements.

  16. Field and flume applications of RFID and accelerometer-embedded gravel and cobble tracers to constrain transport during floods

    NASA Astrophysics Data System (ADS)

    Johnson, J. P.; Olinde, L.; Goodwin, K.

    2014-12-01

    Individually identifiable tracer particles and instrumented clasts provide a wealth of information about coarse bedload transport during floods. The dispersive nature of sediment transport means that tracer methods may constrain effects of spatial variability in the underlying topography of the channel, and effects of temporal variability in discharge (e.g., hydrographs). We highlight results from recent field and flume work that employed both radio frequency identification (RFID) and accelerometer tracers. The overall goal is to demonstrate that a broad range of quantitative constraints on sediment transport can be pulled from these unique datasets. In the field, tracer transport was monitored along ~11 km of Reynolds Creek, Idaho, a snowmelt-dominated gravel-bedded stream with local reach slopes of roughly 0.5% to 7%. Three antennas were installed on the channel bed near a gauging station to measure the exact times that RFID tracers passed the antennas during high flows. The combination of transport data, discharge and flow modeling allows us to calculate a hiding function that quantifies size-dependent thresholds of motion in this particular reach. During transport, RFID and accelerometer tracers became distributed along ~11 and ~2 km of the channel, respectively. The timing of individual particle movements was measured in 10 minute intervals by the accelerometers. These data constrained transport probabilities and bedload hysteresis as a function of changing discharge. Additionally, cumulative travel distances of the accelerometers allow us to put bounds on particle velocities and average individual step lengths. We find that average tracer transport distances are well correlated with cumulative discharge. Using flood magnitude-frequency relations based on the >50 year discharge record of Reynolds creek, the seasonal flow with an ~10 year recurrence interval likely transports coarse gravel the farthest average distance. Finally, in flume experiments on gravel

  17. Survey of RFID and Its Application to International Ocean/Air Container Tracking

    NASA Astrophysics Data System (ADS)

    Katayama, Minoru; Nakada, Hiroshi; Hayashi, Hitoshi; Shimizu, Masashi

    “Internet of Things” (IoT) requires information to be collected from “anything”, “anytime”, and “anywhere”. In order to achieve this, wireless devices are required that have (1) automatic data acquisition capability, (2) small size, (3) long life, and (4) long range communication capability. One way to meet these requirements is to adopt active Radio Frequency Identification (RFID) systems. Active RFID is more advantageous than passive RFID and enables higher data reading performance over longer distances. This paper surveys active RFID systems, the services they currently promise to provide, technical problems common to these services, and the direction in which research should head in the future. It also reports the results of EPCglobal (EPC: Electronic Product Code) pilot tests conducted on global logistics for tracking ocean/air container transportation using active RFID systems for which we developed several new types of active RFID tags. The test results confirm that our active RFID tags have sufficient capability and low power consumption to well support ocean/air transportation and logistics service.

  18. User Privacy in RFID Networks

    NASA Astrophysics Data System (ADS)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  19. A low-power RFID integrated circuits for intelligent healthcare systems.

    PubMed

    Lee, Shuenn-Yuh; Wang, Liang-Hung; Fang, Qiang

    2010-11-01

    This paper presents low-power radio-frequency identification (RFID) technology for intelligent healthcare systems. With attention to power-efficient communication in the body sensor network, RF power transfer was estimated and the required low-power ICs, which are important in the development of a healthcare system with miniaturization and system integration, are discussed based on the RFID platform. To analyze the power transformation, this paper adopts a 915-MHz industrial, scientific, and medical RF with a radiation power of 70 mW to estimate the power loss under the 1-m communication distance between an RFID reader (bioinformation node) and a transponder (biosignal acquisition nodes). The low-power ICs of the transponder will be implemented in the TSMC 0.18-μm CMOS process. The simulation result reveals that the transponder's IC can fit in with the link budget of the UHF RFID system.

  20. Characterization of polymer silver pastes for screen printed flexible RFID antennas

    NASA Astrophysics Data System (ADS)

    Janeczek, Kamil; Jakubowska, Małgorzata; Futera, Konrad; MłoŻniak, Anna; Kozioł, GraŻyna; Araźna, Aneta

    Radio Frequency Identification (RFID) systems have become more and more popular in the last few years because of their wide application fields, such as supply chain management and logistics. To continue their development further investigations of new conductive materials for fabrication of RFID transponders' antennas are necessary to be carried out. These materials should provide high flexibility and good radiation performance of printed antennas. In this paper, two polymer silver pastes based on silver flakes were characterized with regard to manufacturing of flexible RFID antennas with screen printing technique. Foil and paper were used as a substrate materials. Surface profile of the printed antennas was measured using an optical profilometer and their resistance was measured with a four-point-probe method. Antenna flexibility was evaluated in cyclic bending tests and its performance with reflection coefficient measurements with the use of differential probe connected to a vector network analyzer. In addition, a maximum read distance of a fabricated RFID transponder was measured.

  1. Investigation of RFID tag readability for pharmaceutical products at item level.

    PubMed

    Erdem, Ergin; Zeng, Hai; Zhou, Junyi; Shi, Jing; Wells, David L

    2009-11-01

    The applications of radio frequency identification (RFID) technology carry a tremendous potential for pharmaceutical industry. There is a pressing need to analyze the performance of RFID tags attached to various pharmaceutical dosage forms. The readability of RFID-tagged pharmaceutical products is, for the first time, systematically investigated by experiments. Factors considered include dosage forms, ion concentration in solution, angle of rotation, and distance between the RFID tag and the interrogator. Compared with empty container, the filling of any representative dosage forms causes deteriorated readability for the tag attached to container. Analysis of variance reveals that the effects of dosage forms, angle of rotation, and their interaction are statistically significant. In addition, an increase in distance (equivalent to higher RF attenuation level) and higher ion concentration in solution beyond a certain level have detrimental effect on tag readability. The analysis shows that the RFID tag readability is strongly dependent on the factors that are experimented with. The level of the factors for optimum RFID system performance should be adjusted based on the particular application.

  2. Experimental studies of high-accuracy RFID localization with channel impairments

    NASA Astrophysics Data System (ADS)

    Pauls, Eric; Zhang, Yimin D.

    2015-05-01

    Radio frequency identification (RFID) systems present an incredibly cost-effective and easy-to-implement solution to close-range localization. One of the important applications of a passive RFID system is to determine the reader position through multilateration based on the estimated distances between the reader and multiple distributed reference tags obtained from, e.g., the received signal strength indicator (RSSI) readings. In practice, the achievable accuracy of passive RFID reader localization suffers from many factors, such as the distorted RSSI reading due to channel impairments in terms of the susceptibility to reader antenna patterns and multipath propagation. Previous studies have shown that the accuracy of passive RFID localization can be significantly improved by properly modeling and compensating for such channel impairments. The objective of this paper is to report experimental study results that validate the effectiveness of such approaches for high-accuracy RFID localization. We also examine a number of practical issues arising in the underlying problem that limit the accuracy of reader-tag distance measurements and, therefore, the estimated reader localization. These issues include the variations in tag radiation characteristics for similar tags, effects of tag orientations, and reader RSS quantization and measurement errors. As such, this paper reveals valuable insights of the issues and solutions toward achieving high-accuracy passive RFID localization.

  3. Spatial and temporal analysis on the distribution of active radio-frequency identification (RFID) tracking accuracy with the Kriging method.

    PubMed

    Liu, Xin; Shannon, Jeremy; Voun, Howard; Truijens, Martijn; Chi, Hung-Lin; Wang, Xiangyu

    2014-10-29

    Radio frequency identification (RFID) technology has already been applied in a number of areas to facilitate the tracking process. However, the insufficient tracking accuracy of RFID is one of the problems that impedes its wider application. Previous studies focus on examining the accuracy of discrete points RFID, thereby leaving the tracking accuracy of the areas between the observed points unpredictable. In this study, spatial and temporal analysis is applied to interpolate the continuous distribution of RFID tracking accuracy based on the Kriging method. An implementation trial has been conducted in the loading and docking area in front of a warehouse to validate this approach. The results show that the weak signal area can be easily identified by the approach developed in the study. The optimum distance between two RFID readers and the effect of the sudden removal of readers are also presented by analysing the spatial and temporal variation of RFID tracking accuracy. This study reveals the correlation between the testing time and the stability of RFID tracking accuracy. Experimental results show that the proposed approach can be used to assist the RFID system setup process to increase tracking accuracy.

  4. Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method

    PubMed Central

    Liu, Xin; Shannon, Jeremy; Voun, Howard; Truijens, Martijn; Chi, Hung-Lin; Wang, Xiangyu

    2014-01-01

    Radio frequency identification (RFID) technology has already been applied in a number of areas to facilitate the tracking process. However, the insufficient tracking accuracy of RFID is one of the problems that impedes its wider application. Previous studies focus on examining the accuracy of discrete points RFID, thereby leaving the tracking accuracy of the areas between the observed points unpredictable. In this study, spatial and temporal analysis is applied to interpolate the continuous distribution of RFID tracking accuracy based on the Kriging method. An implementation trial has been conducted in the loading and docking area in front of a warehouse to validate this approach. The results show that the weak signal area can be easily identified by the approach developed in the study. The optimum distance between two RFID readers and the effect of the sudden removal of readers are also presented by analysing the spatial and temporal variation of RFID tracking accuracy. This study reveals the correlation between the testing time and the stability of RFID tracking accuracy. Experimental results show that the proposed approach can be used to assist the RFID system setup process to increase tracking accuracy. PMID:25356648

  5. The Use of Mn(II) Bound to His-tags as Genetically Encodable Spin-Label for Nanometric Distance Determination in Proteins.

    PubMed

    Ching, H Y Vincent; Mascali, Florencia C; Bertrand, Hélène C; Bruch, Eduardo M; Demay-Drouhard, Paul; Rasia, Rodolfo M; Policar, Clotilde; Tabares, Leandro C; Un, Sun

    2016-03-17

    A genetically encodable paramagnetic spin-label capable of self-assembly from naturally available components would offer a means for studying the in-cell structure and interactions of a protein by electron paramagnetic resonance (EPR). Here, we demonstrate pulse electron-electron double resonance (DEER) measurements on spin-labels consisting of Mn(II) ions coordinated to a sequence of histidines, so-called His-tags, that are ubiquitously added by genetic engineering to facilitate protein purification. Although the affinity of His-tags for Mn(II) was low (800 μM), Mn(II)-bound His-tags yielded readily detectable DEER time traces even at concentrations expected in cells. We were able to determine accurately the distance between two His-tag Mn(II) spin-labels at the ends of a rigid helical polyproline peptide of known structure, as well as at the ends of a completely cell-synthesized 3-helix bundle. This approach not only greatly simplifies the labeling procedure but also represents a first step towards using self-assembling metal spin-labels for in-cell distance measurements.

  6. Positive Root Bounds and Root Separation Bounds

    NASA Astrophysics Data System (ADS)

    Herman, Aaron Paul

    In this thesis, we study two classes of bounds on the roots of a polynomial (or polynomial system). A positive root bound of a polynomial is an upper bound on the largest positive root. A root separation bound of a polynomial is a lower bound on the distance between the roots. Both classes of bounds are fundamental tools in computer algebra and computational real algebraic geometry, with numerous applications. In the first part of the thesis, we study the quality of positive root bounds. Higher quality means that the relative over-estimation (the ratio of the bound and the largest positive root) is smaller. We find that all known positive root bounds can be arbitrarily bad. We then show that a particular positive root bound is tight for certain important classes of polynomials. In the remainder of the thesis, we turn to root separation bounds. We observe that known root separation bounds are usually very pessimistic. To our surprise, we also find that known root separation bounds are not compatible with the geometry of the roots (unlike positive root bounds). This motivates us to derive new root separation bounds. In the second part of this thesis, we derive a new root separation for univariate polynomials by transforming a known bound into a new improved bound. In the third part of this thesis, we use a similar strategy to derive a new improved root separation bound for polynomial systems.

  7. Monitoring System of Railway Using Passive RFID in UHF Band

    NASA Astrophysics Data System (ADS)

    Makimura, Hidetoshi; Watanabe, Kota; Igarashi, Hajime; Waki, Hiroshi

    This paper presents a novel temperature measurement system based on passive RFID operating at UHF band for monitoring system of conventional railways. The goal of this study is to realize wireless temperature measurement using UHF-band RFID whose communication distance is several meters under the assumption that the RFID reader/writer (R/W) has 4 W EIRP. A low power temperature measurement circuit, which is vital for the above purpose, has been developed using a thermistor and comparator. The temperature measured by this sensor, ranging from zero to 80 Celsius, is shown to be in good agreement with theoretical value. The consumption power of this circuit is evaluated to be 8 μW by experiment. The sensor circuit is connected to an IC tag, which composed of a meander line antenna, whose shape has been optimized by genetic algorithm, Cockcroft-Walton circuit for booster and rectifier, and PIC for digital control. It is shown that the present wireless sensing system works well when distance between the IC tag and R/W, whose gain is 13 dBi, is set to 1 m and input power to R/W is 1 mW. From this result, the communication distance for 4 W EIRP is roughly estimated to be more than 10 m when neglecting polarization losses and other negative effects.

  8. Local positioning with sensor-enabled passive multistandard RFID transponders

    NASA Astrophysics Data System (ADS)

    Heidrich, J.; Brenk, D.; Essel, J.; Schwarzer, S.; Herschmann, R.; Geck, B.; Fischer, G.; Weigel, R.

    2010-11-01

    RFID is used today in many fields of every day life like access control, anti-theft protection or logistics. Within this article a short overview of the basic RFID principles and the EPC protocol flow is given at first. Afterwards new design approaches for RFID systems within the scope of the research project RFID-S are presented.

  9. IP-RFID Based Container Monitoring System

    NASA Astrophysics Data System (ADS)

    Choi, Hyung-Rim; Park, Byung-Kwon; Park, Yong-Sung; Lee, Chang-Sup; Park, Chang-Hyun

    RFID technology in container management field is considered for increasing productivity and efficiency in logistics industry. But there are a lot of problems caused by inappropriate application of RFID technology in shipping logistics. Therefore, technology development based on IP is needed for accepting diverse technology applied before and offering better service to develop container management technology involved with RFID. In this study, realtime container monitoring system using IP-RFID is designed and implemented for supplementing weakness of information gathering using existing RFID and transferring data in real time to user.

  10. New Directions in RFID Security

    NASA Astrophysics Data System (ADS)

    Blass, Erik-Oliver; Molva, Refik

    Current research in RFID security focuses on basic authentication protocols between a tag and a reader. In this paper, we claim that, in future, different new RFID-based scenarios will play an increasing role. In particular, we propose two new research directions: 1. Multi-Tag Security, and 2. RFID-based Payment. In multi-tag security, multiple tags try to jointly compute an information while using the reader either as the focal point of all communication or as a relay for tag-to-tag communication. In this scenario, the security of the computation has to be guaranteed while also privacy of individual tags must be protected. In a payment scenario, tags are used as electronic wallets similar to the notions of traditional electronic cash. Payment must be secured against malicious spending, and the privacy of tags and their payments must be protected.

  11. Analysis and Design of a Long Range PTFE Substrate UHF RFID Tag for Cargo Container Identification

    NASA Astrophysics Data System (ADS)

    Petrariu, Adrian-Ioan; Popa, Valentin

    2016-01-01

    In this paper, a high-performances microstrip antenna for UHF (ultra high frequency) RFID (radio frequency identification) tag is designed, prototyped and tested. The antenna consists of two main components: a 1.52 mm RT/duroid 5880 laminate substrate on which the antenna is designed and a 10 mm polytetrafluoroethylene (PTFE) dielectric material placed as a separator between the antenna and the reference ground plane for the microstrip antenna. With this structure, the RFID tag can reach a maximum reading distance of 19 m, although the antenna has a compact size of 80 mm × 50 mm. The long reading distance is obtained by attaching to the antenna an RFID chip that can provide a reading sensitivity of -20.5 dBm. The high bandwidth from 677 MHz to 947 MHz measured at -10 dB, makes the tag being usable worldwide especially for cargo container identification, the main purpose of this research.

  12. Localization of Passive RFID Tags by Using Broad-Type Multi-Sensing-Range (B-MSR) Method

    NASA Astrophysics Data System (ADS)

    Fujimoto, Manato; Wada, Tomotaka; Inada, Atsuki; Nakamori, Emi; Oda, Yuki; Mutsuura, Kouichi; Okada, Hiromi

    The radio frequency identification (RFID) system has attracting attention as a new identification source that achieves a ubiquitous environment. Each RFID tag has a unique ID code, and is attached on an object whose information it contains. A user reads the unique ID code using RFID readers and obtains information about the object. One of the important applications of RFID technology is the indoor position estimation of RFID tags. It can be applied to navigation systems for people in complex buildings. In this paper, we propose an effective position estimation method named Broad-type Multi-Sensing-Range (B-MSR) method to improve the estimation error of the conventional methods using sensor model. A new reader antenna with two flexible antenna elements is introduced into B-MSR. The distance between two flexible antenna elements can be adjusted. Thus, two kinds of system parameters can be controlled, the distance between two antenna elements and the transmission power of the RFID reader. In this paper, four sensing ranges are settled by controlling the values of two parameters. The performance evaluation shows four characteristics of B-MSR. Firstly, it reduces the initial estimation error. Secondly, it reduces the moving distance. Thirdly, it reduces the number of different sensing points. Fourthly, it shortens the required estimation time.

  13. On the use of one-step perturbation to investigate the dependence of NOE-derived atom-atom distance bound violations of peptides upon a variation of force-field parameters.

    PubMed

    Lin, Zhixiong; Oostenbrink, Chris; van Gunsteren, Wilfred F

    2014-03-01

    The method of one-step perturbation can be used to predict from a single molecular dynamics simulation the values of observable quantities as functions of variations in the parameters of the Hamiltonian or biomolecular force field used in the simulation. The method is used to predict violations of nuclear overhauser effect (NOE) distance bounds measured in nuclear magnetic resonance (NMR) experiments by atom-atom distances of the NOE atom pairs when varying force-field parameters. Predictions of NOE distance bound violations between different versions of the GROMOS force field for a hexa-β-peptide in solution show that the technique works for rather large force-field parameter changes as well as for very different NOE bound violation patterns. The effect of changing individual force-field parameters on the NOE distance bound violations of the β-peptide and an α-peptide was investigated too. One-step perturbation, which in this case is equivalent to reweighting configurations, constitutes an efficient technique to predict many values of different quantities from a single conformational ensemble for a particular system, which makes it a powerful force-field development technique that easily reduces the number of required separate simulations by an order of magnitude.

  14. A Framework for Sediment Particle Tracking via Radio Frequency IDentification (RFID)

    NASA Astrophysics Data System (ADS)

    Tsakiris, Achilleas; Papanicolaou, Thanos; Abban, Benjamin

    2016-04-01

    The study of sedimentary and morphodynamic processes in riverine environments has recently been shifting from the traditional Eulerian, static perspective to a Lagrangian perspective, which considers the movement characteristics of the individual transported particles, such as their travel and resting distance and time. The Lagrangian framework, in turn allows to better study processes such as bedload particle diffusion, erosion and deposition within a river reach, to more accurately predict bedload fluxes especially through the use of stochastic Discrete Particle models. A technology that goes hand-in-hand with this Lagrangian perspective is Radio Frequency IDentification (RFID), which has been recently applied for tracking the movement of tagged sediment particles within the river continuum. RFID allows the wireless, bidirectional exchange of information between a base station, known as the reader, with a typically large number of transponders (or tags) via an (excitation) antenna. RFID allows essentially the unique, wireless detection and identification of a transponder over a distance. The goal of this study is to further enhance the utility of RFID in riverine applications by developing a framework that allows extracting the 3D location of RFID tagged sediment particles in nearly real-time. To address the goal of this coupled theoretical and experimental study, a semi-theoretical approach based on antenna inductive coupling was combined with experimental measurements for developing a relationship that provides an estimate of the distance between a tagged particle and the antenna using the Return Signal Strength Indication (RSSI). The RSSI quantifies the magnetic energy transmitted from the transponder to the antenna. The RFID system used in this study was a passive, Low-Frequency (LF) system, which ensured that the LF radio waves could penetrate through the river bed material. The RSSI of the signal transmitted from each transponder was measured with an

  15. Group Management Method of RFID Passwords for Privacy Protection

    NASA Astrophysics Data System (ADS)

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.

  16. Optimal Detection Range of RFID Tag for RFID-based Positioning System Using the k-NN Algorithm.

    PubMed

    Han, Soohee; Kim, Junghwan; Park, Choung-Hwan; Yoon, Hee-Cheon; Heo, Joon

    2009-01-01

    Positioning technology to track a moving object is an important and essential component of ubiquitous computing environments and applications. An RFID-based positioning system using the k-nearest neighbor (k-NN) algorithm can determine the position of a moving reader from observed reference data. In this study, the optimal detection range of an RFID-based positioning system was determined on the principle that tag spacing can be derived from the detection range. It was assumed that reference tags without signal strength information are regularly distributed in 1-, 2- and 3-dimensional spaces. The optimal detection range was determined, through analytical and numerical approaches, to be 125% of the tag-spacing distance in 1-dimensional space. Through numerical approaches, the range was 134% in 2-dimensional space, 143% in 3-dimensional space.

  17. RFID Technology for Inventory Management

    SciTech Connect

    2012-05-01

    The Pacific Northwest National Laboratory is leveraging the use and application of radio frequency identification (RFID) technology to a variety of markets. Tagging and tracking of individual items for inventory control is revealing rich rewards through increased time efficiency and reduced human intervention.

  18. RFID Technology for Inventory Management

    ScienceCinema

    None

    2016-07-12

    The Pacific Northwest National Laboratory is leveraging the use and application of radio frequency identification (RFID) technology to a variety of markets. Tagging and tracking of individual items for inventory control is revealing rich rewards through increased time efficiency and reduced human intervention.

  19. Some Fundamental Limits on SAW RFID Tag Information Capacity and Collision Resolution

    NASA Technical Reports Server (NTRS)

    Barton, Richard J.

    2013-01-01

    In this paper, we apply results from multi-user information theory to study the limits of information capacity and collision resolution for SAW RFID tags. In particular, we derive bounds on the achievable data rate per tag as a function of fundamental parameters such as tag time-bandwidth product, tag signal-to-noise ratio (SNR), and number of tags in the environment. We also discuss the implications of these bounds for tag waveform design and tag interrogation efficiency

  20. Simulation Distances

    NASA Astrophysics Data System (ADS)

    Černý, Pavol; Henzinger, Thomas A.; Radhakrishna, Arjun

    Boolean notions of correctness are formalized by preorders on systems. Quantitative measures of correctness can be formalized by real-valued distance functions between systems, where the distance between implementation and specification provides a measure of "fit" or "desirability." We extend the simulation preorder to the quantitative setting, by making each player of a simulation game pay a certain price for her choices. We use the resulting games with quantitative objectives to define three different simulation distances. The correctness distance measures how much the specification must be changed in order to be satisfied by the implementation. The coverage distance measures how much the implementation restricts the degrees of freedom offered by the specification. The robustness distance measures how much a system can deviate from the implementation description without violating the specification. We consider these distances for safety as well as liveness specifications. The distances can be computed in polynomial time for safety specifications, and for liveness specifications given by weak fairness constraints. We show that the distance functions satisfy the triangle inequality, that the distance between two systems does not increase under parallel composition with a third system, and that the distance between two systems can be bounded from above and below by distances between abstractions of the two systems. These properties suggest that our simulation distances provide an appropriate basis for a quantitative theory of discrete systems. We also demonstrate how the robustness distance can be used to measure how many transmission errors are tolerated by error correcting codes.

  1. Antenna for passive RFID tags

    NASA Astrophysics Data System (ADS)

    Schiopu, Paul; Manea, Adrian; Cristea, Ionica; Grosu, Neculai; Vladescu, Marian; Craciun, Anca-Ileana; Craciun, Alexandru

    2015-02-01

    Minuscule devices, called RFID tags are attached to objects and persons and emit information which positioned readers may capture wirelessly. Many methods of identification have been used, but that of most common is to use a unique serial number for identification of person or object. RFID tags can be characterized as either active or passive [1,2]. Traditional passive tags are typically in "sleep" state until awakened by the reader's emitted field. In passive tags, the reader's field acts to charge the capacitor that powers the badge and this can be a combination of antenna and barcodes obtained with SAW( Surface Acoustic Wave) devices [1,2,3] . The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader. The paper contribution are targeted to antenna for passive RFID tags. The electromagnetic field generated by the reader is somehow oriented by the reader antenna and power is induced in the tag only if the orientation of the tag antenna is appropriate. A tag placed orthogonal to the reader yield field will not be read. This is the reason that guided manufacturers to build circular polarized antenna capable of propagating a field that is alternatively polarized on all planes passing on the diffusion axis. Passive RFID tags are operated at the UHF frequencies of 868MHz (Europe) and 915MHz (USA) and at the microwave frequencies of 2,45 GHz and 5,8 GHz . Because the tags are small dimensions, in paper, we present the possibility to use circular polarization microstrip antenna with fractal edge [2].

  2. Extended-Range Passive RFID and Sensor Tags

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.; Kennedy, Timothy F.; Lin, Gregory Y.; Barton, Richard

    2012-01-01

    Extended-range passive radio-frequency identification (RFID) tags and related sensor tags are undergoing development. A tag of this type incorporates a retroreflective antenna array, so that it reflects significantly more signal power back toward an interrogating radio transceiver than does a comparable passive RFID tag of prior design, which does not incorporate a retroreflective antenna array. Therefore, for a given amount of power radiated by the transmitter in the interrogating transceiver, a tag of this type can be interrogated at a distance greater than that of the comparable passive RFID or sensor tag of prior design. The retroreflective antenna array is, more specifically, a Van Atta array, named after its inventor and first published in a patent issued in 1959. In its simplest form, a Van Atta array comprises two antenna elements connected by a transmission line so that the signal received by each antenna element is reradiated by the other antenna element (see Figure 1). The phase relationships among the received and reradiated signals are such as to produce constructive interference of the reradiated signals; that is, to concentrate the reradiated signal power in a direction back toward the source. Hence, an RFID tag equipped with a Van Atta antenna array automatically tracks the interrogating transceiver. The effective gain of a Van Atta array is the same as that of a traditional phased antenna array having the same number of antenna elements. Additional pairs of antenna elements connected by equal-length transmission lines can be incorporated into a Van Atta array to increase its directionality. Like some RFID tags here-to-fore commercially available, an RFID or sensor tag of the present developmental type includes one-port surface-acoustic-wave (SAW) devices. In simplified terms, the mode of operation of a basic one-port SAW device as used heretofore in an RFID device is the following: An interrogating radio signal is converted, at an input end, from

  3. RFID Benefits; Looking Beyond ROI

    DTIC Science & Technology

    2005-12-01

    and sustainment cargo .” (NAVSUP 2004) Linear Barcode is the standard technology currently in use for all retail operations. The black and white...requires hands on scanning similar to a barcode . They are most functional at managing piece level data. They provide a lot of potential in the area of...technologies enabling the automatic capture of source data, to enhance the ability to identify, track, document Active RFID Linear Barcode 2D Barcode

  4. Passive RFID tag based heart rate monitoring from an ECG signal.

    PubMed

    Vora, Shrenik; Dandekar, Kapil; Kurzweg, Timothy

    2015-08-01

    In this paper, we propose a monitoring system that employs a passive RFID tag to transmit heart rate using an ECG signal as its source. This system operates without a battery and has been constructed with easily available commercial components. Here, an RFID tag is used as an on-off keying device, wherein it is normally transmitting, but turns off every time a heart beat is detected. Heart beats ranging from 30BPM through 300BPM are successfully measured using our device. It is shown that the system is capable of providing accurate heart rate measurements up to a distance of ten feet with a standard deviation of less than one beat per minute without a local power source. The proposed system is also found to be resilient in the presence of an additional RFID tag.

  5. Evaluation of RFID Tags to Permanently Mark Trees in Natural Populations

    PubMed Central

    Marczewski, Tobias; Ma, Yongpeng; Sun, Weibang

    2016-01-01

    Long-term ecological and genetic studies in natural populations of tree species require marking techniques so that individuals can be re-visited over time, even in difficult terrain. Both GPS coordinates and physical labels have disadvantages that can make re-finding trees difficult. We tested passive and semi-active radio frequency identification (RFID) tags and readers as a means to relocate individual trees. Passive RFID tags do not provide a good solution because of low transmission power of hand-held readers and strong directionality. Semi-active RFID tags provide detection over longer distances, but also suffer from strong directionality. Active RFID tags promise an improvement over semi-passive tags, and could be evaluated in a future study. We conclude that RFID technology has the potential to improve the ability of researchers to locate individual trees repeatedly under natural conditions, and can be used in conjunction with other marking techniques such as physical tags and GPS coordinates. PMID:27630662

  6. An analysis for specifications of medical use RFID system as a wireless communication.

    PubMed

    Hosaka, Ryosuke

    2007-01-01

    Most of medical accidents around patients are depended on misidentification of human or medical articles. The accidents can be reduced, if information about the human or medical articles are managed automatically. RFID(Radio Frequency IDentification) tag can be identified automatically, since the tag uses wireless communication for identification. However, a specification of medical use RFID system as a communication medium was not discussed. In this study, the problems and suitable specification of the system are discussed. Anti metal tag is useful for medical environment. Small identification distance of the tag can be improved by some ways. In the case of 125 kHz, confliction between another wireless communications can be reduced, since small number of communications are located in the band. The tag circuit can be made small in size to choice 2.45 GHz band. In Japan, 0.4mm square sized tag is realized. The tag can be included in each tablets or capsules. Automatically identification is recommended in most of medical environment. Most of RFID tags are small in size and weight, and will not disturb the daily life of the patient, even if it is attached to the wristband and so on. However, it is necessary to discuss the principal factors of RFID as wireless communication media. Medical use RFID system can not be effective and safety management system without the discussion.

  7. Temporal and Location Based RFID Event Data Management and Processing

    NASA Astrophysics Data System (ADS)

    Wang, Fusheng; Liu, Peiya

    Advance of sensor and RFID technology provides significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management. RFID data are temporal and history oriented, multi-dimensional, and carrying implicit semantics. Moreover, RFID applications are heterogeneous. RFID data management or data warehouse systems need to support generic and expressive data modeling for tracking and monitoring physical objects, and provide automated data interpretation and processing. We develop a powerful temporal and location oriented data model for modeling and queryingRFID data, and a declarative event and rule based framework for automated complex RFID event processing. The approach is general and can be easily adapted for different RFID-enabled applications, thus significantly reduces the cost of RFID data integration.

  8. The Next Generation of RFID Technology

    NASA Astrophysics Data System (ADS)

    Cole, Peter H.; Turner, Leigh H.; Hu, Zhonghao; Ranasinghe, Damith C.

    The next generation of RFID will be governed by developments which have occurred in the production of printed semiconductors and in the manufacturing techniques by which RFID tags can be produced using these new materials. The paper considers all of these matters as well as protocols that are appropriate for printed tags.

  9. Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol

    PubMed Central

    Mikami, Shugo; Watanabe, Dai; Li, Yang; Sakiyama, Kazuo

    2015-01-01

    Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID market is expected to grow, concerns about security and privacy of the RFID tag should be overcome for the future use. To overcome these issues, privacy-preserving authentication protocols based on cryptographic algorithms have been designed. However, to the best of our knowledge, evaluation of the whole tag, which includes an antenna, an analog front end, and a digital processing block, that runs authentication protocols has not been studied. In this paper, we present an implementation and evaluation of a fully integrated passive UHF RFID tag that runs a privacy-preserving mutual authentication protocol based on a hash function. We design a single chip including the analog front end and the digital processing block. We select a lightweight hash function supporting 80-bit security strength and a standard hash function supporting 128-bit security strength. We show that when the lightweight hash function is used, the tag completes the protocol with a reader-tag distance of 10 cm. Similarly, when the standard hash function is used, the tag completes the protocol with the distance of 8.5 cm. We discuss the impact of the peak power consumption of the tag on the distance of the tag due to the hash function. PMID:26491714

  10. RFID tags as a direct tracer for water and sediment dynamics

    NASA Astrophysics Data System (ADS)

    Sommerer, Erik; Plate, Simon; Güntner, Andreas

    2014-05-01

    derived transport distances and velocities for a one year period. The transport behavior of the RFID tags was similar to the micrite limestone material of the badland. These results indicate the important role of terrain position and vegetation patches for erosion patterns, sediment transfer and the associated time scales along the catchment. We assess the potentials and limitations of the RFID technique as a direct tracer for assessing water and sediment connectivity along hillslopes to first order channels.

  11. Research of RFID middleware model with CEP based on SOA

    NASA Astrophysics Data System (ADS)

    Wang, Zhao; Ma, Zhifeng

    2012-01-01

    RFID middleware is regarded as the nerve of RFID systems. Firstly this paper analysis and discuss relatively mature RFID middleware, and propose a RFID middleware which based on service-oriented architecture. Then in this paper we introduce the CEP (complex event processing), and it is a new technology for event and data processing. With the widespread usage of RFID technology, complex event processing becomes a very important part in RFID application. Through introducing its work, we indicate the basis of introducing CEP to RFID middleware. We focus on the complex event processing technology in RFID data processing, and present a based on CEP data processing model, and study cache, Event Filter and Complex Event Builder key technologies. Moreover, a query language for detecting RFID complex events is also introduced.

  12. Research of RFID middleware model with CEP based on SOA

    NASA Astrophysics Data System (ADS)

    Wang, Zhao; Ma, Zhifeng

    2011-12-01

    RFID middleware is regarded as the nerve of RFID systems. Firstly this paper analysis and discuss relatively mature RFID middleware, and propose a RFID middleware which based on service-oriented architecture. Then in this paper we introduce the CEP (complex event processing), and it is a new technology for event and data processing. With the widespread usage of RFID technology, complex event processing becomes a very important part in RFID application. Through introducing its work, we indicate the basis of introducing CEP to RFID middleware. We focus on the complex event processing technology in RFID data processing, and present a based on CEP data processing model, and study cache, Event Filter and Complex Event Builder key technologies. Moreover, a query language for detecting RFID complex events is also introduced.

  13. Applications of Radio Frequency Identification (RFID) in Mining Industries

    NASA Astrophysics Data System (ADS)

    Khairul Nizam Mahmad, Mohd; Z, Mohd Remy Rozainy M. A.; Baharun, Norlia

    2016-06-01

    RFID technology has recently become a dream of many companies or organizations because of its strategic potential in transforming mining operations. Now is the perfect time, for RFID technology arise as the next revolution in mining industries. This paper will review regarding the application of RFID in mining industries and access knowledge regarding RFID technology and overseen the opportunity of this technology to become an importance element in mining industries. The application of Radio-Frequency Identification (RFID) in mining industries includes to control of Personal Protective Equipment (PPE), control of personnel to access mining sites and RFID solutions for tracking explosives.

  14. RFID Torque Sensing Tag System for Fasteners

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2016-01-01

    The present invention provides an RFID-based torque sensor that can be used to quickly monitor off the shelf fasteners including fasteners that are used in expensive satellites or other uses where fastener failure can be very costly. In one embodiment, an antenna, RFID ring and spring comprise a sensor tag that can be interrogated with an interrogation signal produced by an interrogator device. When sufficient torque is applied to the fastener, an RFID circuit is connected, and produces a radio frequency (RF) signal that can be read by the interrogator. In one embodiment, the RFID circuit does not transmit when the spring member is not compressed, thereby indicating insufficient tensioning of the fastener. The present invention offers the ability to remotely, quickly, and inexpensively verify that any number of fasteners are torqued properly upon initial installation. Where applicable, the present invention allows low cost monitoring over the life of the fastener.

  15. Applying RFID technology in nuclear materials management.

    SciTech Connect

    Tsai, H.; Chen, K.; Liu, Y.; Norair, J. P.; Bellamy, S.; Shuler, J.; SRL; Savi Technology; DOE

    2008-01-01

    The Packaging Certification Program (PCP) of US Department of Energy (DOE) Environmental Management (EM), Office of Safety Management and Operations (EM-60), has developed a radio frequency identification (RFID) system for the management of nuclear materials. Argonne National Laboratory, a PCP supporting laboratory, and Savi Technology, a Lockheed Martin Company, are collaborating in the development of the RFID system, a process that involves hardware modification (form factor, seal sensor and batteries), software development and irradiation experiments. Savannah River National Laboratory and Argonne will soon field test the active RFID system on Model 9975 drums, which are used for storage and transportation of fissile and radioactive materials. Potential benefits of the RFID system are enhanced safety and security, reduced need for manned surveillance, real time access of status and history data, and overall cost effectiveness.

  16. RFID as a Tool in Cyber Warfare

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 P4 - 1 RFID as a Tool in Cyber Warfare Mikko Kiviharju P.O.Box 10 FIN-11311 Riihimaki FINLAND mikko.kiviharju@mil.fi...auditing existing systems and planning new establishments. 1 INTRODUCTION Cyber warfare , especially computer network operations (CNO) have a deep...SUBTITLE RFID as a Tool in Cyber Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK

  17. Behavior-based cleaning for unreliable RFID data sets.

    PubMed

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations.

  18. Behavior-Based Cleaning for Unreliable RFID Data Sets

    PubMed Central

    Fan, Hua; Wu, Quanyuan; Lin, Yisong

    2012-01-01

    Radio Frequency IDentification (RFID) technology promises to revolutionize the way we track items and assets, but in RFID systems, missreading is a common phenomenon and it poses an enormous challenge to RFID data management, so accurate data cleaning becomes an essential task for the successful deployment of systems. In this paper, we present the design and development of a RFID data cleaning system, the first declarative, behavior-based unreliable RFID data smoothing system. We take advantage of kinematic characteristics of tags to assist in RFID data cleaning. In order to establish the conversion relationship between RFID data and kinematic parameters of the tags, we propose a movement behavior detection model. Moreover, a Reverse Order Filling Mechanism is proposed to ensure a more complete access to get the movement behavior characteristics of tag. Finally, we validate our solution with a common RFID application and demonstrate the advantages of our approach through extensive simulations. PMID:23112595

  19. Detection of erosion/deposition depth using a low frequency passive Radio Frequency Identification (RFID) technology

    NASA Astrophysics Data System (ADS)

    Moustakidis, Iordanis Vlasios

    This thesis presents an experimental study both in the laboratory and field to develop and test a method for continuously measuring and monitoring scour using an automated identification technology known as Radio Frequency Identification (RFID). RFID systems consist of three main components, namely (a) the reader which controls the system, (b) the transponder (derived from transmitter/responder) that transmits data to the reader and (c) the excitation antenna that allows the communication between the reader and the transponder. The study provides an insight into the RFID technology and develops the framework for using this technology to eventually address two central themes in river mechanics and sediment transport; (a) the determination of the active layer thickness and (b) the scour/deposition depth around a hydraulic structure. In particular, this study develops the methodology for relating the signal strength of a radio frequency (RF) device with the distance between an excitation antenna and the RF device. The experiments presented herein are classified into two main groups, (1) the laboratory and (2) the RF signal vs. the detection distance experiments (field experiments). The laboratory experiments were designed to understand the effect of key RFID parameters (e.g., transponder orientation with respect to the excitation antenna plane, maximum antenna-transponder detection distance), measured in terms of the transponder return RF signal strength for various antenna-transponder distances, transponder orientations with respect to the excitation antenna plane and different mediums in between the excitation antenna and the transponder, on the overall performance of the RFID system. On the other hand, the RF signal vs. the detection distance experiments were based on the results obtained during the laboratory experiments and focused on developing calibration curves by relating the transponder return RF signal strength with the distance between the excitation

  20. Development of Wireless RFID Glove for Various Applications

    NASA Astrophysics Data System (ADS)

    Lee, Changwon; Kim, Minchul; Park, Jinwoo; Oh, Jeonghoon; Eom, Kihwan

    Radio Frequency Identification is increasingly popular technology with many applications. The majority of applications of RFID are supply-chain management. In this paper, we proposed the development of wireless RFID Glove for various applications in real life. Proposed wireless RFID glove is composed of RFID reader of 13.56 MHz and RF wireless module. Proposed Gloves were applied to two applications. First is the interactive leaning and second is Meal aid system for blind people. The experimental results confirmed good performances.

  1. [Automatic tracking of cleaned dental instruments by means of the RFID technique].

    PubMed

    Krejci, Ivo; Ney, Hervé; Bonny, Diane; Bréhier, Céline; Massa, Nicole; Negrin, Nadège; Bovet, Marc

    2013-01-01

    For dental care professionals, the availability and cleanliness of reusable instruments is of major importance. In order to guarantee a proper reprocessing (cleaning, sterilization) of each instrument and ensure optimum safety for the patients, a single instrument traceability solution can be implemented. The RFID (Radio Frequency Identification) technology is the only approach that can provide a fully automated identification of instruments, and a precise monitoring throughout the reprocessing cycle. It consists in integrating a miniature electronic component (RFID tag) to each instrument able to communicate with a transmitter located at a relatively close distance and capable of uniquely identifying each element in any given container, even when closed. In 2011, a pilot project was implemented in collaboration with the Division of Dentistry (SMD) of the University of Geneva and the central sterilization of the Geneva University Hospitals (HUG). This project has demonstrated the applicability and usefulness of RFID technology for tracking reusable dental instruments. In particular, the time saved by the operators and the massive risk reduction when compared to the possible errors during the process of manual identification are two major elements that justify the implementation of an RFID-based instrument traceability solution.

  2. The design of RFID convey or belt gate systems using an antenna control unit.

    PubMed

    Park, Chong Ryol; Lee, Seung Joon; Eom, Ki Hwan

    2011-01-01

    This paper proposes an efficient management system utilizing a Radio Frequency Identification (RFID) antenna control unit which is moving along with the path of boxes of materials on the conveyor belt by manipulating a motor. The proposed antenna control unit, which is driven by a motor and is located on top of the gate, has an array structure of two antennas with parallel connection. The array structure helps improve the directivity of antenna beam pattern and the readable RFID distance due to its configuration. In the experiments, as the control unit follows moving materials, the reading time has been improved by almost three-fold compared to an RFID system employing conventional fixed antennas. The proposed system also has a recognition rate of over 99% without additional antennas for detecting the sides of a box of materials. The recognition rate meets the conditions recommended by the Electronic Product Code glbal network (EPC)global for commercializing the system, with three antennas at a 20 dBm power of reader and a conveyor belt speed of 3.17 m/s. This will enable a host of new RFID conveyor belt gate systems with increased performance.

  3. The Design of RFID Convey or Belt Gate Systems Using an Antenna Control Unit

    PubMed Central

    Park, Chong Ryol; Lee, Seung Joon; Eom, Ki Hwan

    2011-01-01

    This paper proposes an efficient management system utilizing a Radio Frequency Identification (RFID) antenna control unit which is moving along with the path of boxes of materials on the conveyor belt by manipulating a motor. The proposed antenna control unit, which is driven by a motor and is located on top of the gate, has an array structure of two antennas with parallel connection. The array structure helps improve the directivity of antenna beam pattern and the readable RFID distance due to its configuration. In the experiments, as the control unit follows moving materials, the reading time has been improved by almost three-fold compared to an RFID system employing conventional fixed antennas. The proposed system also has a recognition rate of over 99% without additional antennas for detecting the sides of a box of materials. The recognition rate meets the conditions recommended by the Electronic Product Code glbal network (EPC)global for commercializing the system, with three antennas at a 20 dBm power of reader and a conveyor belt speed of 3.17 m/s. This will enable a host of new RFID conveyor belt gate systems with increased performance. PMID:22164119

  4. On the Security of RFID Group Scanning Protocols

    NASA Astrophysics Data System (ADS)

    Dang, Duc Nguyen; Kim, Kwangjo

    A RFID group scanning protocol enables a RFID reader to produce a proof of co-existence of multiple RFID tags. This type of protocol is also referred to as yoking-proof, grouping-proof and co-existence proof. In this letter, we show that all of the previous group scanning protocols are vulnerable to relay attack.

  5. PATL: A RFID Tag Localization based on Phased Array Antenna

    PubMed Central

    Qiu, Lanxin; Liang, Xiaoxuan; Huang, Zhangqin

    2017-01-01

    In RFID systems, how to detect the position precisely is an important and challenging research topic. In this paper, we propose a range-free 2D tag localization method based on phased array antenna, called PATL. This method takes advantage of the adjustable radiation angle of the phased array antenna to scan the surveillance region in turns. By using the statistics of the tags’ number in different antenna beam directions, a weighting algorithm is used to calculate the position of the tag. This method can be applied to real-time location of multiple targets without usage of any reference tags or additional readers. Additionally, we present an optimized weighting method based on RSSI to increase the locating accuracy. We use a Commercial Off-the-Shelf (COTS) UHF RFID reader which is integrated with a phased array antenna to evaluate our method. The experiment results from an indoor office environment demonstrate the average distance error of PATL is about 21 cm and the optimized approach achieves an accuracy of 13 cm. This novel 2D localization scheme is a simple, yet promising, solution that is especially applicable to the smart shelf visualized management in storage or retail area. PMID:28295014

  6. PATL: A RFID Tag Localization based on Phased Array Antenna.

    PubMed

    Qiu, Lanxin; Liang, Xiaoxuan; Huang, Zhangqin

    2017-03-15

    In RFID systems, how to detect the position precisely is an important and challenging research topic. In this paper, we propose a range-free 2D tag localization method based on phased array antenna, called PATL. This method takes advantage of the adjustable radiation angle of the phased array antenna to scan the surveillance region in turns. By using the statistics of the tags' number in different antenna beam directions, a weighting algorithm is used to calculate the position of the tag. This method can be applied to real-time location of multiple targets without usage of any reference tags or additional readers. Additionally, we present an optimized weighting method based on RSSI to increase the locating accuracy. We use a Commercial Off-the-Shelf (COTS) UHF RFID reader which is integrated with a phased array antenna to evaluate our method. The experiment results from an indoor office environment demonstrate the average distance error of PATL is about 21 cm and the optimized approach achieves an accuracy of 13 cm. This novel 2D localization scheme is a simple, yet promising, solution that is especially applicable to the smart shelf visualized management in storage or retail area.

  7. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    ERIC Educational Resources Information Center

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  8. HF RFID versus UHF RFID--Technology for Library Service Transformation at City University of Hong Kong

    ERIC Educational Resources Information Center

    Ching, Steve H.; Tai, Alice

    2009-01-01

    Since libraries first used RFID systems in the late 1990s, more and more libraries have identified the advantages of the technology. With advances in HF and UHF RFID, both alternatives are now viable in library applications. While some librarians are still skeptical towards UHF RFID as unproven in the library arena, the City University of Hong…

  9. An Approach for Removing Redundant Data from RFID Data Streams

    PubMed Central

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches. PMID:22163730

  10. An approach for removing redundant data from RFID data streams.

    PubMed

    Mahdin, Hairulnizam; Abawajy, Jemal

    2011-01-01

    Radio frequency identification (RFID) systems are emerging as the primary object identification mechanism, especially in supply chain management. However, RFID naturally generates a large amount of duplicate readings. Removing these duplicates from the RFID data stream is paramount as it does not contribute new information to the system and wastes system resources. Existing approaches to deal with this problem cannot fulfill the real time demands to process the massive RFID data stream. We propose a data filtering approach that efficiently detects and removes duplicate readings from RFID data streams. Experimental results show that the proposed approach offers a significant improvement as compared to the existing approaches.

  11. An RFID Based Smart Feeder for Hummingbirds.

    PubMed

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  12. Enhanced UHF RFID tags for drug tracing.

    PubMed

    Catarinucci, Luca; Colella, Riccardo; De Blasi, Mario; Patrono, Luigi; Tarricone, Luciano

    2012-12-01

    Radio Frequency Identification (RFID) technology is playing a crucial role for item-level tracing systems in healthcare scenarios. The pharmaceutical supply chain is a fascinating application context, where RFID can guarantee transparency in the drug flow, supporting both suppliers and consumers against the growing counterfeiting problem. In such a context, the choice of the most adequate RFID tag, in terms of shape, frequency, size and reading range, is crucial. The potential presence of items containing materials hostile to the electromagnetic propagation exasperates the problem. In addition, the peculiarities of the different RFID-based checkpoints make even more stringent the requirements for the tag. In this work, the performance of several commercial UHF RFID tags in each step of the pharmaceutical supply chain has been evaluated, confirming the expected criticality. On such basis, a guideline for the electromagnetic design of new high-performance tags capable to overcome such criticalities has been defined. Finally, driven by such guidelines, a new enhanced tag has been designed, realized and tested. Due to patent pending issues, the antenna shape is not shown. Nevertheless, the optimal obtained results do not lose their validity. Indeed, on the one hand they demonstrate that high performance item level tracing systems can actually be implemented also in critical operating conditions. On the other hand, they encourage the tag designer to follow the identified guidelines so to realize enhanced UHF tags.

  13. An RFID Based Smart Feeder for Hummingbirds

    PubMed Central

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F.; Tang, Wei

    2015-01-01

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future. PMID:26694402

  14. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    NASA Astrophysics Data System (ADS)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  15. Study of Development for RFID System to Hospital Environment.

    PubMed

    Hong, Seung Kwon; Sung, Myung-Whun

    2015-01-01

    RFID/USN develops information systems for anytime, anywhere to anybody access Electronic Medical Records (EMR). The goal of the present study is to develop a RFID/USN-based information system for the hospital environment. First, unable to recognize, second, able to recognize as a pursuit of place and suppose the time of medical examination. A retrospective analysis of 235 RFID monitoring results, from four ENT ambulatory clinics of Seoul National University Hospital were extracted by a reader program and monitoring of RFID tag (2006.11.16~2006.12.16). RFID detection for sensing reader of this study has been put into representing "place" and "spending time" of patients for medical history taking and examination. Through the RFID of detection for specific place and spending time of medical examination, RFID/USN develops information system progressing in the EMR of hospital system.

  16. Thoracoscopic surgery support system using passive RFID marker.

    PubMed

    Takahata, Hiromi; Kojima, Fumitsugu; Okada, Minoru; Sugiura, Tadao; Sato, Toshihiko; Oshiro, Osamu

    2012-01-01

    This paper proposes a RFID based thoracoscopic surgery support system, which is capable of marking a tumor inside organ tissue. The marker composed of small RFID-tags is implanted in the vicinity of tumor found in the endoscopy test. In the thoracoscopic surgery operation for removing the tumor, an RFID detector determines the accurate position of the implanted RFID-tag markers by measuring the strength of the signal emitted from the target tag. Due to limitation in the size of RFID-tag, the proposed system employs a passive RFID. To activate the passive tag implanted in the organ tissue, this paper designs a saddle-shape efficient power supply antenna. A sensitive and frequency-selective receiver is then designed for detecting the weak signal from the tag. The feasibility test confirms that the proposed method is capable of determining the accurate location of RFID tags implanted in the patient's organ tissue.

  17. Design and Implementation of Embedded RFID Middleware

    NASA Astrophysics Data System (ADS)

    Zhen-xiang, Li.; Yu-xiang, Zhang

    An embedded RFID (Radio Frequency Identification) middleware based on ARM Linux operating system and S3C2410 hardware platform was designed and implemented. The system architecture and platform of software and hardware of this middleware were introduced. The key technology applied in some device management and tag data processing and the application of SQLite were specialized. Since its rich standard interfaces offered by the hardware platform, the middleware can connect with different kind of readers from different manufacturers without cosidering the diversity and complexity of RFID bottom layer hardware. So, it can supply upper layer application of system with a powerful, uniform platform, and lay a broader, richer foundation for the application of RFID.

  18. Semantic-Based RFID Data Management

    NASA Astrophysics Data System (ADS)

    de Virgilio, Roberto; di Sciascio, Eugenio; Ruta, Michele; Scioscia, Floriano; Torlone, Riccardo

    Traditional Radio-Frequency IDentification (RFID) applications have been focused on replacing bar codes in supply chain management. Leveraging a ubiquitous computing architecture, the chapter presents a framework allowing both quick decentralized on-line item discovery and centralized off-line massive business logic analysis, according to needs and requirements of supply chain actors. A semantic-based environment, where tagged objects become resources exposing to an RFID reader not a trivial identification code but a semantic annotation, enables tagged objects to describe themselves on the fly without depending on a centralized infrastructure. On the other hand, facing on data management issues, a proposal is formulated for an effective off-line multidimensional analysis of huge amounts of RFID data generated and stored along the supply chain.

  19. Energy Efficient Approach in RFID Network

    NASA Astrophysics Data System (ADS)

    Mahdin, Hairulnizam; Abawajy, Jemal; Salwani Yaacob, Siti

    2016-11-01

    Radio Frequency Identification (RFID) technology is among the key technology of Internet of Things (IOT). It is a sensor device that can monitor, identify, locate and tracking physical objects via its tag. The energy in RFID is commonly being used unwisely because they do repeated readings on the same tag as long it resides in the reader vicinity. Repeated readings are unnecessary because it only generate duplicate data that does not contain new information. The reading process need to be schedule accordingly to minimize the chances of repeated readings to save the energy. This will reduce operational cost and can prolong the tag's battery lifetime that cannot be replaced. In this paper, we propose an approach named SELECT to minimize energy spent during reading processes. Experiments conducted shows that proposed algorithm contribute towards significant energy savings in RFID compared to other approaches.

  20. Pharmaceutical counterfeiting and the RFID technology intervention.

    PubMed

    Coustasse, Alberto; Arvidson, Cody; Rutsohn, Phil

    2010-07-01

    Both nationally and internationally, pharmaceutical counterfeiting has become a problem that is threatening economic stability and public health. The purpose of the present research study review was to analyze the scope and severity of pharmaceutical counterfeiting and to establish if the implantation of the Radio Frequency Identification Device (RFID) model can more efficiently be used within the pharmaceutical supply chain to reduce the problem counterfeit drugs impose on public health and international economic stability. Results indicated that implementing the RFID model for tracking drugs at the item level in the pharmaceutical supply chain has potential to alleviate the scope of the counterfeit drug problem. Recommendations for how the pharmaceutical industry may sooner adopt the RFID model are made.

  1. An expression of uncertainty and its application to positioning: a quality-metric and optimal ranges for the identification of cells with RFID.

    PubMed

    Del Rio, Eduardo; Ferreira, Luiz Felipe

    2015-01-01

    Here we devise an approach to model error and its propagation. Without approximations, we define the uncertainty of a measurement as its maximum possible error (maper). Thus, we propose and solve analytically two optimization problems. The one designed to determine the uncertainty of a measurement, the other specifically designed to optimize the accuracy of a RFID location system. The usefulness of this general approach is shown by applying it to the particular instance of estimating the coordinates of a person in real-time using RFID devices. This way, exact formulae to evaluate the quality of this measurement are mathematically deduced, which is useful, for example, to predict whether an inexpensive RFID location technology can meet a desired quality standard or not. The second optimization problem proposed here defines an optimal range (orange) for the RFID devices employed. Again, analytically, its exact formulae were derived. We propose an approach to distribute RFID tags for a positioning system based solely on RFID technology. In the light of the formulae, its quality is good enough as to locate emergency phone calls in real time. We found that key to an optimal performance is the range used and the distance between consecutive tags.

  2. Coupling and quality factors in RFID

    NASA Astrophysics Data System (ADS)

    Cole, Peter H.

    2001-11-01

    The performance of a wide variety of RFID systems depends critically on: how efficiently energy is coupled to and from an electronically coded label; on how effectively it is used within the label; and sometimes on how effectively it is transformed from one form to another within the label. The paper considers the definition of appropriate coupling factors and quality factors which describe these processes, and their role in regulating system performance in the near and far fields of both linear and non-linear process based technologies. Calculations allowing feasibility estimates of some new process combinations on which some RFID systems may be based are presented.

  3. Design and evaluation of RFID deployments in a trauma resuscitation bay.

    PubMed

    Parlak, Siddika; Ayyer, Shriniwas; Liu, Ying Yu; Marsic, Ivan

    2014-05-01

    We examined configuring a radio frequency identification (RFID) equipment for the best object use detection in a trauma bay. Unlike prior work on RFID, we 1) optimized the accuracy of object use detection rather than just object detection; and 2) quantitatively assessed antenna placement while addressing issues specific to tag placement likely to occur in a trauma bay. Our design started with an analysis of the environment requirements and constraints. We designed several antenna setups with different number of components (RFID tags or antennas) and their orientations. Setups were evaluated under scenarios simulating a dynamic medical setting. We used three metrics with increasing complexity and bias: read rate, received signal strength indication distribution distance, and target application performance. Our experiments showed that antennas above the regions with high object density are most suitable for detecting object use. We explored tagging strategies for challenging objects so that sufficient readout rates are obtained for computing evaluation metrics. Among the metrics, distribution distance was correlated with target application performance, and also less biased and simpler to calculate, which made it an excellent metric for context-aware applications. We present experimental results obtained in the real trauma bay to validate our findings.

  4. Energy-balanced algorithm for RFID estimation

    NASA Astrophysics Data System (ADS)

    Zhao, Jumin; Wang, Fangyuan; Li, Dengao; Yan, Lijuan

    2016-10-01

    RFID has been widely used in various commercial applications, ranging from inventory control, supply chain management to object tracking. It is necessary for us to estimate the number of RFID tags deployed in a large area periodically and automatically. Most of the prior works use passive tags to estimate and focus on designing time-efficient algorithms that can estimate tens of thousands of tags in seconds. But for a RFID reader to access tags in a large area, active tags are likely to be used due to their longer operational ranges. But these tags use their own battery as energy supplier. Hence, conserving energy for active tags becomes critical. Some prior works have studied how to reduce energy expenditure of a RFID reader when it reads tags IDs. In this paper, we study how to reduce the amount of energy consumed by active tags during the process of estimating the number of tags in a system and make the energy every tag consumed balanced approximately. We design energy-balanced estimation algorithm that can achieve our goal we mentioned above.

  5. Radio Frequency Identification (RFID) in Space

    NASA Technical Reports Server (NTRS)

    Bacon, John B.

    2011-01-01

    The ISS has some significant inventory management challenges. RFID solves many of these, and was deployed 8/2011. Significant issues (some unique to spacecraft) remain. NASA is interested and investing in technologies that will help to overcome the remaining issues.

  6. Introducing RFID at Middlesex University Learning Resources

    ERIC Educational Resources Information Center

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  7. Introducing RFID at Middlesex University Learning Resources

    ERIC Educational Resources Information Center

    Hopkinson, Alan; Chandrakar, Rajesh

    2006-01-01

    Purpose: To describe the first year of the implementation of radio frequency identification (RFID) in Middlesex University Learning Resources. Design/methodology/approach: The technology is explained in detail to set the scene. Information on the implementation is presented in chronological order. Findings: Problems which would generally be…

  8. RFID: A Revolution in Automatic Data Recognition

    ERIC Educational Resources Information Center

    Deal, Walter F., III

    2004-01-01

    Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…

  9. RFID: A Revolution in Automatic Data Recognition

    ERIC Educational Resources Information Center

    Deal, Walter F., III

    2004-01-01

    Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna…

  10. Development and evaluation of a boat-mounted RFID antenna for monitoring freshwater mussels

    USGS Publications Warehouse

    Fischer, Jesse R.; Neebling, Travis E.; Quist, Michael C.

    2012-01-01

    Development of radio frequency identification (RFID) technology and passive integrated transponder (PIT) tags has substantially increased the ability of researchers and managers to monitor populations of aquatic organisms. However, use of transportable RFID antenna systems (i.e., backpack-mounted) is currently limited to wadeable aquatic environments (<1.4 m water depth). We describe the design, construction, and evaluation of a boat-mounted RFID antenna to detect individually PIT-tagged benthic aquatic organisms (mussels). We evaluated the effects of tag orientation on detection distances in water with a 32-mm half-duplex PIT tag. Detection distances up to 50 cm from the antenna coils were obtained, but detection distance was dependent on tag orientation. We also evaluated detection distance of PIT tags beneath the sediment to simulate detection of burrowing mussels with 23- and 32-mm tags. In sand substrate, the maximum detection distance varied from 3.5 cm and 4.5 cm (vertical tag orientation) to 24.7 cm and 39.4 cm (45° tag orientation) for the 23- and 32-mm PIT tags, respectively. Our results suggest a 1.4-m total detection width for tagged mussels on the substrate surface by the boat-mounted antenna system regardless of tag orientation. However, burrowed mussels may require multiple passes to increase detection that would be influenced by depth, tag orientation, and tag size. Construction of the boat-mounted antenna was relatively low in cost (<500 USD) and had several advantages (less labor and time intensive, increased safety) over traditional mussel sampling techniques (diving, snorkeling) in nonwadeable habitats.

  11. RFID Continuance Usage Intention in Health Care Industry.

    PubMed

    Iranmanesh, Mohammad; Zailani, Suhaiza; Nikbin, Davoud

    Radio-frequency identification (RFID) has been proved to be an effective tool both for improving operational efficiency and for gaining competitive advantage in the health care industry despite its relatively low-usage rate in hospitals. The sustained use of RFID by health care professionals will promote its development in the long term. This study evaluates the acceptance continuance of RFID among health care professionals through technology continuance theory (TCT). Data were collected from 178 medical professionals in Malaysia and were then analyzed using the partial least squares technique. The analysis showed that the TCT model provided not only a thorough understanding of the continuance behavior of health care professionals toward RFID but also the attitudes, satisfaction, and perceived usefulness of professionals toward it. The results of this study are expected to assist policy makers and managers in the health care industry in implementing the RFID technology in hospitals by understanding the determinants of continuance of RFID usage intention.

  12. Assessment of RFID Read Accuracy for ISS Water Kit

    NASA Technical Reports Server (NTRS)

    Chu, Andrew

    2011-01-01

    The Space Life Sciences Directorate/Medical Informatics and Health Care Systems Branch (SD4) is assessing the benefits Radio Frequency Identification (RFID) technology for tracking items flown onboard the International Space Station (ISS). As an initial study, the Avionic Systems Division Electromagnetic Systems Branch (EV4) is collaborating with SD4 to affix RFID tags to a water kit supplied by SD4 and studying the read success rate of the tagged items. The tagged water kit inside a Cargo Transfer Bag (CTB) was inventoried using three different RFID technologies, including the Johnson Space Center Building 14 Wireless Habitat Test Bed RFID portal, an RFID hand-held reader being targeted for use on board the ISS, and an RFID enclosure designed and prototyped by EV4.

  13. An overview of radio frequency identification (RFID) tags technology

    NASA Astrophysics Data System (ADS)

    Falinski, Wojciech

    2006-10-01

    RFID (Radio Frequency Identification) is the technology of wireless identification of tagged products. It is one of the fastest developing technologies in electronic market and it is predicted to replace soon the barcodes which are in common usage in today's economy. There are several advantages of RFID tags over barcode. The main are reading without must of scanning the product and the possibility to keep much more information on chip of the tag. In the article there are introduced the possible applications of RFID technology. There are also presented the classification of the RFID tags and the difference between working frequency. It is introduced every steps of manufacturing RFID tags with focus on the technology aspects (technologies of producing antenna, attaching the chip and creation of electrical connection between antenna and chip). Tele and Radio Research Institute is now starting to realize the project of manufacturing the RFID tags antenna. There is presented our guideline of the project.

  14. RFID - based Staff Control System (SCS) in Kazakhstan

    NASA Astrophysics Data System (ADS)

    Saparkhojayev, N.

    2015-06-01

    RFID - based Staff Control System (SCS) will allow complete hands-free access control, monitoring the whereabouts of employee and record the attendance of the employee as well. Moreover, with a help of this system, it is possible to have a nice report at the end of the month and based on the total number of worked hours, the salary will be allocated to each personnel. The access tag can be read up to 10 centimeters from the RFID reader. The proposed system is based on UHF RFID readers, supported with antennas at gate and transaction sections, and employee identification cards containing RFID-transponders which are able to electronically store information that can be read / written even without the physical contact with the help of radio medium. This system is an innovative system, which describes the benefits of applying RFID- technology in the Education System process of Republic of Kazakhstan. This paper presents the experiments conducted to set up RFID based SCS.

  15. A Framework for RFID Survivability Requirement Analysis and Specification

    NASA Astrophysics Data System (ADS)

    Zuo, Yanjun; Pimple, Malvika; Lande, Suhas

    Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.

  16. The Application used RFID in Third Party Logistics*

    NASA Astrophysics Data System (ADS)

    Mingxiu, Zheng; Chunchang, Fu; Minggen, Yang

    RFID is a non-contact automatic identification technology, which will be the future information storage extraction and processing technology. In recent years the mainstream of the large-scale development has manifested the situation. RFID is the key technology of tripartite logistics information and automation. RFID-based logistics system can enlarge the logistics operation capacity, and improve labor productivity to reduce logistics operations mistakes.

  17. Low-cost inkjet antennas for RFID applications

    NASA Astrophysics Data System (ADS)

    Çiftçi, T.; Karaosmanoğlu, B.; Ergül, Ö.

    2016-03-01

    We present paper-based inkjet antennas that are fabricated by using silver-based cartridges in standard printers. In addition to their low costs, the produced antennas are flexible, environmentally friendly, and suitable for radio-frequency identification (RFID) applications. Among alternative choices, hybrid structures involving loop and parasitic meander parts are preferred and successfully combined with passive RFID chips. We also discuss main challenges in the design and fabrication of low-cost inkjet antennas and the related RFID tags.

  18. What is the Right RFID for Your Process?

    DTIC Science & Technology

    2006-04-30

    short as 12-18 months (Armanino, 2005). Real Options Approach to RFID Investments Net Present Value ( NPV ), Return on Investment (ROI), and Payback ...a level appropriate for an informed managerial decision. To better understand the RFID configurations that have been used in practice in a wide...net- present value and payback period calculations, and conclude that the approach of real options is better suited for justifying RFID technology than

  19. Systems, Apparatuses and Methods for Beamforming RFID Tags

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Ngo, Phong H. (Inventor); Kennedy, Timothy F. (Inventor)

    2017-01-01

    A radio frequency identification (RFID) system includes an RFID interrogator and an RFID tag having a plurality of information sources and a beamforming network. The tag receives electromagnetic radiation from the interrogator. The beamforming network directs the received electromagnetic radiation to a subset of the plurality of information sources. The RFID tag transmits a response to the received electromagnetic radiation, based on the subset of the plurality of information sources to which the received electromagnetic radiation was directed. Method and other embodiments are also disclosed.

  20. Ethical implications of implantable radiofrequency identification (RFID) tags in humans.

    PubMed

    Foster, Kenneth R; Jaeger, Jan

    2008-08-01

    This article reviews the use of implantable radiofrequency identification (RFID) tags in humans, focusing on the VeriChip (VeriChip Corporation, Delray Beach, FL) and the associated VeriMed patient identification system. In addition, various nonmedical applications for implanted RFID tags in humans have been proposed. The technology offers important health and nonhealth benefits, but raises ethical concerns, including privacy and the potential for coercive implantation of RFID tags in individuals. A national discussion is needed to identify the limits of acceptable use of implantable RFID tags in humans before their use becomes widespread and it becomes too late to prevent misuse of this useful but ethically problematic technology.

  1. A review of tags anti-collision and localization protocols in RFID networks.

    PubMed

    Ullah, S; Alsalih, W; Alsehaim, A; Alsadhan, N

    2012-12-01

    Radio Frequency IDentification (RFID) has allowed the realization of ubiquitous tracking and monitoring of physical objects wirelessly with minimum human interactions. It plays a key role in a wide range of applications including asset tracking, contactless payment, access control, transportation and logistics, and other industrial applications. On the other side, RFID systems face several technical challenges that need to be overcome in order to achieve their potential benefits; tags collisions and localization of tagged objects are two important challenges. Numerous anti-collision and localization protocols have been proposed to address these challenges. This paper reviews the state-of-art tags' anti-collision and localization protocols, and provides a deep insight into technical issues of these protocols. The probabilistic and deterministic anti-collision protocols are critically studied and compared in terms of different parameters. We further review distance estimation, scene analysis, and proximity localization schemes and provide useful suggestions. We also introduce a new hybrid direction that utilizes power control to spatially partition the interrogation range of a reader for more efficient anti-collision and localization. Finally, we present the applications of RFID systems in healthcare sectors.

  2. Computational exposure assessment of electromagnetic fields generated by an RFID system for mother--newborn identity reconfirmation.

    PubMed

    Fiocchi, Serena; Parazzini, Marta; Paglialonga, Alessia; Ravazzani, Paolo

    2011-07-01

    Radio frequency identification (RFID) is an innovative technology currently applied in a large number of industrial and consumer applications. The spread of RFID technology does not correspond to a parallel increase in studies on its possible impact on health in terms of electromagnetic field (EMF) exposure. The aim of this paper is to estimate, by computational techniques, the EMF generated by passive RFID systems for mother-newborn identity reconfirmation. The computation was performed on realistic models of newborn and mother for three different reader positions. The compliance with EMF exposure guidelines was investigated as a function of the change in reader-tag specifications (magnetic field threshold and maximum distance of the reader to awake the tag) and time of use of the reader close to the body. The results show that attention should be paid to the identification of the optimal reader-tag technical specifications to be used in this type of application. That should be done by an accurate exposure assessment investigation, in particular for newborn exposure. The need to reduce the exposure time as much as possible indicates the importance of specific training on the practical applications of the RFID (DATALOGIC J-series, Bologna, Italy) device. Copyright © 2011 Wiley-Liss, Inc.

  3. A new laboratory radio frequency identification (RFID) system for behavioural tracking of marine organisms.

    PubMed

    Aguzzi, Jacopo; Sbragaglia, Valerio; Sarriá, David; García, José Antonio; Costa, Corrado; del Río, Joaquín; Mànuel, Antoni; Menesatti, Paolo; Sardà, Francesc

    2011-01-01

    Radio frequency identification (RFID) devices are currently used to quantify several traits of animal behaviour with potential applications for the study of marine organisms. To date, behavioural studies with marine organisms are rare because of the technical difficulty of propagating radio waves within the saltwater medium. We present a novel RFID tracking system to study the burrowing behaviour of a valuable fishery resource, the Norway lobster (Nephrops norvegicus L.). The system consists of a network of six controllers, each handling a group of seven antennas. That network was placed below a microcosm tank that recreated important features typical of Nephrops' grounds, such as the presence of multiple burrows. The animals carried a passive transponder attached to their telson, operating at 13.56 MHz. The tracking system was implemented to concurrently report the behaviour of up to three individuals, in terms of their travelled distances in a specified unit of time and their preferential positioning within the antenna network. To do so, the controllers worked in parallel to send the antenna data to a computer via a USB connection. The tracking accuracy of the system was evaluated by concurrently recording the animals' behaviour with automated video imaging. During the two experiments, each lasting approximately one week, two different groups of three animals each showed a variable burrow occupancy and a nocturnal displacement under a standard photoperiod regime (12 h light:12 h dark), measured using the RFID method. Similar results were obtained with the video imaging. Our implemented RFID system was therefore capable of efficiently tracking the tested organisms and has a good potential for use on a wide variety of other marine organisms of commercial, aquaculture, and ecological interest.

  4. A New Laboratory Radio Frequency Identification (RFID) System for Behavioural Tracking of Marine Organisms

    PubMed Central

    Aguzzi, Jacopo; Sbragaglia, Valerio; Sarriá, David; García, José Antonio; Costa, Corrado; del Río, Joaquín; Mànuel, Antoni; Menesatti, Paolo; Sardà, Francesc

    2011-01-01

    Radio frequency identification (RFID) devices are currently used to quantify several traits of animal behaviour with potential applications for the study of marine organisms. To date, behavioural studies with marine organisms are rare because of the technical difficulty of propagating radio waves within the saltwater medium. We present a novel RFID tracking system to study the burrowing behaviour of a valuable fishery resource, the Norway lobster (Nephrops norvegicus L.). The system consists of a network of six controllers, each handling a group of seven antennas. That network was placed below a microcosm tank that recreated important features typical of Nephrops’ grounds, such as the presence of multiple burrows. The animals carried a passive transponder attached to their telson, operating at 13.56 MHz. The tracking system was implemented to concurrently report the behaviour of up to three individuals, in terms of their travelled distances in a specified unit of time and their preferential positioning within the antenna network. To do so, the controllers worked in parallel to send the antenna data to a computer via a USB connection. The tracking accuracy of the system was evaluated by concurrently recording the animals’ behaviour with automated video imaging. During the two experiments, each lasting approximately one week, two different groups of three animals each showed a variable burrow occupancy and a nocturnal displacement under a standard photoperiod regime (12 h light:12 h dark), measured using the RFID method. Similar results were obtained with the video imaging. Our implemented RFID system was therefore capable of efficiently tracking the tested organisms and has a good potential for use on a wide variety of other marine organisms of commercial, aquaculture, and ecological interest. PMID:22163710

  5. RFID Communication Using Software Defined Radio Technique

    NASA Astrophysics Data System (ADS)

    Hannan, M. A.; Islam, M.; Samad, S. A.; Hussain, A.

    2010-06-01

    Radio Frequency Identification (RFID) is currently the hottest technology in wireless applications area. Its unique advantages such as data transmission with extreme low power or even without power in tag can be the biggest beneficial for goods management. Software Defined Radio (SDR) is a wireless communications system where all of the signal processing is implemented in software. By simply downloading a new program, a software radio is able to interoperate with different wireless protocols, incorporate new services, and upgrade to new standards. In this paper, we build an RFID application simulation environment over the SDR. We do the source to sink transmission simulation by using Quadrature Amplitude Modulation, Then, we compare the differences of BER versus SNR performances for input and output signals.

  6. Rfid Based Traceability System For Sheepbreeding

    NASA Astrophysics Data System (ADS)

    Xing, Yan; Li, Hui; Zhang, Jian; Fu, Zetian

    As China's meat production is growing, the quality safety of meat food as an important human food sources has increasingly become a major issue which related to the national economy and people's livelihood. Using early warning technique, tracking and tracing techniques and so on in the key link of meat food production in order to fulfill quality control is an important method which can effectively guarantee the food quality and safety. The use of RFID techniques and handhelds can automatically collect information about sheep breeding. Meanwhile this information could be inquired conveniently through Internet. This study uses C/S (Client/Server) model structure, and builds the sheep breeding traceability system based on RFID.

  7. Reliable Food Traceability Using RFID Tagging

    NASA Astrophysics Data System (ADS)

    Azuara, Guillermo; Salazar, José L.; Tornos, José L.; Piles, Joan J.

    Radio Frequency IDentification (RFID) technology has numerous potential applications in various industries. One important use is for complete traceability of a specific product with the added advantage of being able to verify that quality controls have been passed, with all the necessary steps complied with and for the time required. The aim of this work is to present a food traceability system using RFID tags with contents guaranteed secure by the use of public-key cryptography and at an affordable cost without the need for substantial investment in infrastructure. Aggregate signatures are used so that all the steps can be signed in a reduced memory space. This type of signature is a cryptographic primitive that "consolidates" several signatures into one in such a way that if n users sign n messages, all the signatures can be grouped into one single signature.

  8. ISS Asset Tracking Using SAW RFID Technology

    NASA Technical Reports Server (NTRS)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  9. ISS Asset Tracking Using SAW RFID Technology

    NASA Technical Reports Server (NTRS)

    Schellhase, Amy; Powers, Annie

    2004-01-01

    A team at the NASA Johnson Space Center (JSC) is undergoing final preparations to test Surface Acoustic Wave (SAW) Radio Frequency Identification (RFID) technology to track assets aboard the International Space Station (ISS). Currently, almost 10,000 U.S. items onboard the ISS are tracked within a database maintained by both the JSC ground teams and crew onboard the ISS. This barcode-based inventory management system has successfully tracked the location of 97% of the items onboard, but its accuracy is dependant on the crew to report hardware movements, taking valuable time away from science and other activities. With the addition of future modules, the volume of inventory to be tracked is expected to increase significantly. The first test of RFID technology on ISS, which will be conducted by the Expedition 16 crew later this year, will evaluate the ability of RFID technology to track consumable items. These consumables, which include office supplies and clothing, are regularly supplied to ISS and can be tagged on the ground. Automation will eliminate line-of-sight auditing requirements, directly saving crew time. This first step in automating an inventory tracking system will pave the way for future uses of RFID for inventory tracking in space. Not only are there immediate benefits for ISS applications, it is a crucial step to ensure efficient logistics support for future vehicles and exploration missions where resupplies are not readily available. Following a successful initial test, the team plans to execute additional tests for new technology, expanded operations concepts, and increased automation.

  10. Passive RFID Rotation Dimension Reduction via Aggregation

    NASA Astrophysics Data System (ADS)

    Matthews, Eric

    Radio Frequency IDentification (RFID) has applications in object identification, position, and orientation tracking. RFID technology can be applied in hospitals for patient and equipment tracking, stores and warehouses for product tracking, robots for self-localisation, tracking hazardous materials, or locating any other desired object. Efficient and accurate algorithms that perform localisation are required to extract meaningful data beyond simple identification. A Received Signal Strength Indicator (RSSI) is the strength of a received radio frequency signal used to localise passive and active RFID tags. Many factors affect RSSI such as reflections, tag rotation in 3D space, and obstacles blocking line-of-sight. LANDMARC is a statistical method for estimating tag location based on a target tag's similarity to surrounding reference tags. LANDMARC does not take into account the rotation of the target tag. By either aggregating multiple reference tag positions at various rotations, or by determining a rotation value for a newly read tag, we can perform an expected value calculation based on a comparison to the k-most similar training samples via an algorithm called K-Nearest Neighbours (KNN) more accurately. By choosing the average as the aggregation function, we improve the relative accuracy of single-rotation LANDMARC localisation by 10%, and any-rotation localisation by 20%.

  11. Stage implementation of RFID in hospitals.

    PubMed

    Kumar, Sameer; Livermont, Gregory; McKewan, Gregory

    2010-01-01

    The use of radio frequency identification device (RFID) technology within the healthcare industry was researched and specific instances of implementation of this technology in the hospital environment were examined. The study primarily makes use of ideas from operations and supply chain management, such as work flow diagrams, value stream mapping, and poka-yokes (mistake proofing measures) for investigations of processes, failures, and solutions. This study presents a step-by-step approach of how to implement the use of RFID tracking systems within the entire hospital. A number of poka-yokes were also devised for improving the safety of the patient and cost effectiveness of the hospital to insure the success of the hospital health care delivery system. Many players in the hospital environment may be impacted. This includes patients, doctors, nurses, technicians, administrators, and other hospital personnel. Insurance and government agencies may be impacted as well. Different levels of training of hospital personnel will be required based on the degree of interaction with the RFID system. References to costs, Return On Investment, change management, ethical and legal considerations are also made to help the reader understand the benefits and implications of the technology in the hospital environment.

  12. Z-path SAW RFID tag.

    PubMed

    Härmä, Sanna; Plessky, Victor P; Hartmann, Clinton S; Steichen, William

    2008-01-01

    Surface acoustic wave (SAW) radio-frequency identification (RFID) tags are soon expected to be produced in very high volumes. The size and cost of a SAW RFID tag will be key parameters for many applications. Therefore, it is of primary importance to reduce the chip size. In this work, we describe the design principles of a 2.4-GHz SAW RFID tag that is significantly smaller than earlier reported tags. We also present simulated and experimental results. The coded signal should arrive at the reader with a certain delay (typically about 1 micros), i.e., after the reception of environmental echoes. If the tag uses a bidirectional interdigital transducer (IDT), space for the initial delay is needed on both sides of the IDT. In this work, we replace the bidirectional IDT by a unidirectional one. This halves the space required by the initial delay because all the code reflectors must now be placed on the same side of the IDT. We reduce tag size even further by using a Z-path geometry in which the same space in x-direction is used for both the initial delay and the code reflectors. Chip length is thus determined only by the space required by the code reflectors.

  13. Radio Frequency Identification (RFID) for Naval Medical Treatment Facilities (MTF)

    DTIC Science & Technology

    2006-09-01

    5 1. An Emerging Market ...cost and size in addition to power requirements and communication range. This set the stage for mass market RFID. In the 1990s, millions of RFID...tags were incorporated into various applications including toll roads, entry access cards and container tracking. The first mass- market deployment of

  14. Evaluating bedload transport with RFID and accelerometer tracers, airborne LiDAR, and HEC-GeoRAS modeling: field experiments in Reynolds Creek, Idaho

    NASA Astrophysics Data System (ADS)

    Olinde, L.; Johnson, J. P.; Pierson, F. B.

    2012-12-01

    Relationships between bedload transport, channel geometry, and bed topography in upland channels are not well understood due in part to a lack of quantitative field data. With this motivation, we are performing field experiments related to (i) bedload travel distances within and between transport events, (ii) style of bedload motion during transport events, and (iii) channel characteristics of depositional areas. To address these objectives, we deployed gravel and cobble Radio Frequency Identification (RFID) and accelerometer tracers, installed permanent RFID antennas, utilized airborne LiDAR, and conducted stream surveys in Reynolds Creek, Idaho. This gauged coarse alluvial stream is located at the USDA-Agricultural Research Service Reynolds Creek Experimental Watershed within the Owyhee Mountains. Flood discharges generally consist of occasional flashy winter rain-on-snow flows spanning less than a day, large spring snowmelt events lasting several weeks, and no high summer discharges during our experiments. Through repeat surveys of tracer clast positions, to date we have quantified travel distances of 800 RFID particles. Spring 2011 discharge transported RFID tracers nearly seven kilometers while the shorter Spring 2012 flow only displaced particles up to approximately three kilometers. During Winter 2011 rain-on-snow events, tracers moved a maximum of 200 meters. Statistical distributions of transport distances vary with deployment location and season- uniform distributions fit some datasets best while gamma distributions fit others better. Permanent cross-stream RFID antennas constrain periods of bedload motion and rest. In Spring 2012, antennas recorded significant RFID tracer motion initiating just when discharge began to rise due to snowmelt, travel times between antennas decreasing as flow increased, and RFID particles no longer passing almost immediately after the hydrograph peaked. Accelerometer tracers deployed in Spring 2012 expanded bedload motion

  15. High-Speed Access to RFID Data: Meeting Real-Time Requirements in Distributed Value Chains

    NASA Astrophysics Data System (ADS)

    Ziekow, Holger; Fabian, Benjamin; Müller, Cristian

    Using RFID data within operational processes requires fast data access. In distributed value chains, RFID data is not only captured locally, but also accessed from remote locations. However, retrieving data from remote RFID repositories may pose significant delays and slow down the operations. This paper analyses how companies can exchange RFID data in the presence of real-time requirements. We analyze results of performance experiments with globally distributed RFID repositories and propose novel architectures for speeding up data access.

  16. A POI-Based RFID Reader Deployment and Associated Interference Effect

    NASA Astrophysics Data System (ADS)

    An, Donghun; Yang, Hoongee; Yang, Sunghyun; Kim, Youngsoo; Yook, Jonggwan; Kang, Bongsoon

    This paper presents a simulation based method to predict the amount of frequency interference in a passive type RFID system. To judge occurrence of frequency interference, we use a parameter POI (probability of interference) that depends on several factors such as multiple access method, emission mask, the number of channel, etc. Due to its dependence on several factors, a Monte-carlo based simulation is suitably used. Through the simulation, we draw minimum separation distance between two readers and examine performance degradation due to aggregate interfering readers. Moreover, we present a reader deployment strategy based on the average POI of active readers operating in some area.

  17. Evolution of RFID Applications in Construction: A Literature Review.

    PubMed

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-07-03

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper.

  18. Systems and Methods for RFID-Enabled Pressure Sensing Apparatus

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  19. Systems and Methods for RFID-Enabled Dispenser

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2015-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  20. System and Method for RFID-Enabled Information Collection

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W. (Inventor); Lin, Gregory Y. (Inventor); Kennedy, Timothy F. (Inventor); Ngo, Phong H. (Inventor); Byerly, Diane (Inventor)

    2016-01-01

    Methods, apparatuses and systems for radio frequency identification (RFID)-enabled information collection are disclosed, including an enclosure, a collector coupled to the enclosure, an interrogator, a processor, and one or more RFID field sensors, each having an individual identification, disposed within the enclosure. In operation, the interrogator transmits an incident signal to the collector, causing the collector to generate an electromagnetic field within the enclosure. The electromagnetic field is affected by one or more influences. RFID sensors respond to the electromagnetic field by transmitting reflected signals containing the individual identifications of the responding RFID sensors to the interrogator. The interrogator receives the reflected signals, measures one or more returned signal strength indications ("RSSI") of the reflected signals and sends the RSSI measurements and identification of the responding RFID sensors to the processor to determine one or more facts about the influences. Other embodiments are also described.

  1. Evolution of RFID Applications in Construction: A Literature Review

    PubMed Central

    Valero, Enrique; Adán, Antonio; Cerrada, Carlos

    2015-01-01

    Radio frequency identification (RFID) technology has been widely used in the field of construction during the last two decades. Basically, RFID facilitates the control on a wide variety of processes in different stages of the lifecycle of a building, from its conception to its inhabitance. The main objective of this paper is to present a review of RFID applications in the construction industry, pointing out the existing developments, limitations and gaps. The paper presents the establishment of the RFID technology in four main stages of the lifecycle of a facility: planning and design, construction and commission and operation and maintenance. Concerning this last stage, an RFID application aiming to facilitate the identification of pieces of furniture in scanned inhabited environments is presented. Conclusions and future advances are presented at the end of the paper. PMID:26151210

  2. Low Power Near Field Communication Methods for RFID Applications of SIM Cards

    PubMed Central

    Chen, Yicheng; Zheng, Zhaoxia; Gong, Mingyang; Yu, Fengqi

    2017-01-01

    Power consumption and communication distance have become crucial challenges for SIM card RFID (radio frequency identification) applications. The combination of long distance 2.45 GHz radio frequency (RF) technology and low power 2 kHz near distance communication is a workable scheme. In this paper, an ultra-low frequency 2 kHz near field communication (NFC) method suitable for SIM cards is proposed and verified in silicon. The low frequency transmission model based on electromagnetic induction is discussed. Different transmission modes are introduced and compared, which show that the baseband transmit mode has a better performance. The low-pass filter circuit and programmable gain amplifiers are applied for noise reduction and signal amplitude amplification. Digital-to-analog converters and comparators are used to judge the card approach and departure. A novel differential Manchester decoder is proposed to deal with the internal clock drift in range-controlled communication applications. The chip has been fully implemented in 0.18 µm complementary metal-oxide-semiconductor (CMOS) technology, with a 330 µA work current and a 45 µA idle current. The low frequency chip can be integrated into a radio frequency SIM card for near field RFID applications. PMID:28420104

  3. Mobile robot trajectory tracking using noisy RSS measurements: an RFID approach.

    PubMed

    Miah, M Suruz; Gueaieb, Wail

    2014-03-01

    Most RF beacons-based mobile robot navigation techniques rely on approximating line-of-sight (LOS) distances between the beacons and the robot. This is mostly performed using the robot's received signal strength (RSS) measurements from the beacons. However, accurate mapping between the RSS measurements and the LOS distance is almost impossible to achieve in reverberant environments. This paper presents a partially-observed feedback controller for a wheeled mobile robot where the feedback signal is in the form of noisy RSS measurements emitted from radio frequency identification (RFID) tags. The proposed controller requires neither an accurate mapping between the LOS distance and the RSS measurements, nor the linearization of the robot model. The controller performance is demonstrated through numerical simulations and real-time experiments. ©2013 Published by ISA. All rights reserved.

  4. Sediment routing through channel confluences: RFID tracer experiments from a gravel-bed river headwaters

    NASA Astrophysics Data System (ADS)

    Imhoff, K.; Wilcox, A. C.

    2014-12-01

    Tributary confluences may significantly impact large-scale patterns of sediment transport because of their role in connecting individual streams in a network. These unique locations feature complex flow structures and geomorphic features, and may represent ecological hotspots. Sediment transport across confluences is poorly understood, however. We present research on coarse sediment transport and dispersion through confluences using sediment tracers in the East Fork Bitterroot River, Montana, USA. We tagged a range of gravel (>40 mm) and cobble particles with Radio Frequency Identification (RFID) tags and painted smaller (10-40 mm) gravels, and then we traced them through confluences in a montane river's headwaters. We measured the effects of confluences on dispersion, path length, and depositional location and compare properties of sediment routing with a non-confluence control reach. We also measured topographic change through repeat bed surveys and combined topography, hydraulics, and tracer measurements to calculate basal shear and critical Shields stresses for different grain sizes. Field observations suggest that tagged particles in confluences routed along flanks of scour holes in confluences, with sediment depositing further downstream along bank-lateral bars than within the channel thalweg. Travel distances of RFID-tagged particles ranged up to 35 meters from original seeding points, with initial recovery rates of RFID-tagged tracers ranging between 84-89%. In both confluence and control reaches only partial mobility was observed within the entire tracer population, suggesting a hiding effect imposed by the roughness of the bed. Particles seeded in the channel thalweg experienced further travel distances than those seeded towards the banks and on bars. Differences in dispersion between confluence and control reaches are implied by field observation. This study quantified patterns of sediment routing within confluences and provided insight to the importance

  5. Outward Bound.

    ERIC Educational Resources Information Center

    Outward Bound, Inc., Andover, MA.

    The Outward Bound concept was developed in Germany and Great Britain with the saving of human life as the ultimate goal. Courses are designed to help students discover their true physical and mental limits through development of skills including emergency medical aid, firefighting, search and rescue, mountaineering, and sailing. Five Outward Bound…

  6. Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System

    DTIC Science & Technology

    2008-12-01

    RFID VS. IUID MANAGEMENT DEFINITION AND PURPOSE FOR THE DOD...Corps. A. RFID VS. IUID MANAGEMENT DEFINITION AND PURPOSE FOR THE DOD The purpose and definition of RFID and UID technology throughout the DoD and

  7. Applying radio-frequency identification (RFID) technology in transfusion medicine.

    PubMed

    Hohberger, Clive; Davis, Rodeina; Briggs, Lynne; Gutierrez, Alfonso; Veeramani, Dhamaraj

    2012-05-01

    ISO/IEC 18000-3 mode 1 standard 13.56 MHz RFID tags have been accepted by the International Society for Blood Transfusion (ISBT) and the United States Food and Drug Administration (FDA) as data carriers to integrate with and augment ISBT 128 barcode data carried on blood products. The use of 13.56 MHz RFID carrying ISBT 128 data structures allows the global deployment and use of RFID, supporting both international transfer of blood and international disaster relief. The deployment in process at the BloodCenter of Wisconsin and testing at the University of Iowa Health Center is the first FDA-permitted implementation of RFID throughout in all phases of blood banking, donation through transfusion. RFID technology and equipment selection will be discussed along with FDA-required RF safety testing; integration with the blood enterprise computing system and required RFID tag performance. Tag design and survivability is an issue due to blood bag centrifugation and irradiation. Deployment issues will be discussed. Use of RFID results in significant return on investment over the use of barcodes in the blood center operations through labor savings and error reduction.

  8. Signal and array processing techniques for RFID readers

    NASA Astrophysics Data System (ADS)

    Wang, Jing; Amin, Moeness; Zhang, Yimin

    2006-05-01

    Radio Frequency Identification (RFID) has recently attracted much attention in both the technical and business communities. It has found wide applications in, for example, toll collection, supply-chain management, access control, localization tracking, real-time monitoring, and object identification. Situations may arise where the movement directions of the tagged RFID items through a portal is of interest and must be determined. Doppler estimation may prove complicated or impractical to perform by RFID readers. Several alternative approaches, including the use of an array of sensors with arbitrary geometry, can be applied. In this paper, we consider direction-of-arrival (DOA) estimation techniques for application to near-field narrowband RFID problems. Particularly, we examine the use of a pair of RFID antennas to track moving RFID tagged items through a portal. With two antennas, the near-field DOA estimation problem can be simplified to a far-field problem, yielding a simple way for identifying the direction of the tag movement, where only one parameter, the angle, needs to be considered. In this case, tracking of the moving direction of the tag simply amounts to computing the spatial cross-correlation between the data samples received at the two antennas. It is pointed out that the radiation patterns of the reader and tag antennas, particularly their phase characteristics, have a significant effect on the performance of DOA estimation. Indoor experiments are conducted in the Radar Imaging and RFID Labs at Villanova University for validating the proposed technique for target movement direction estimations.

  9. Implementation and extension of a GNU-Radio RFID reader

    NASA Astrophysics Data System (ADS)

    Smietanka, G.; Brato, S.; Freudenberg, M.; Götze, J.

    2013-07-01

    The development of a flexible software defined RFID is discused. Commercial reader systems only allow a top level view on the communication and restrict the variation for many transmission parameters. Recently a software reader from the CGran project was proposed which uses the GNU Radio environment in combination with an USRP front end. Because most of the signal processing is done on a common host PC, this reader offers high flexibility, but also has several disadvantages. One of the main hardware limitations is the usage of only one separated antenna per transmit and receive path. Commercial readers usually use four antennas which are time multiplexed and can be used as transmitter and receiver. In this work a HF multiplexer for the USRP device is introduced. With this extension up to four transmit and receive antennas can be used in combination with the software reader. It is shown that the multiplexer achieves good read rates for a switching interval of 100 ms. Using this multiplexer the read range of the system decrease compared to the basic software reader, but distances over two meters can still be realized without additional hardware extensions.

  10. Review on SAW RFID tags.

    PubMed

    Plessky, Victor P; Reindl, Leonhard M

    2010-03-01

    SAW tags were invented more than 30 years ago, but only today are the conditions united for mass application of this technology. The devices in the 2.4-GHz ISM band can be routinely produced with optical lithography, high-resolution radar systems can be built up using highly sophisticated, but low-cost RF-chips, and the Internet is available for global access to the tag databases. The "Internet of Things," or I-o-T, will demand trillions of cheap tags and sensors. The SAW tags can overcome semiconductor-based analogs in many aspects: they can be read at a distance of a few meters with readers radiating power levels 2 to 3 orders lower, they are cheap, and they can operate in robust environments. Passive SAW tags are easily combined with sensors. Even the "anti-collision" problem (i.e., the simultaneous reading of many nearby tags) has adequate solutions for many practical applications. In this paper, we discuss the state-of-the-art in the development of SAW tags. The design approaches will be reviewed and optimal tag designs, as well as encoding methods, will be demonstrated. We discuss ways to reduce the size and cost of these devices. A few practical examples of tags using a time-position coding with 10(6) different codes will be demonstrated. Phase-coded devices can additionally increase the number of codes at the expense of a reduction of reading distance. We also discuss new and exciting perspectives of using ultra wide band (UWB) technology for SAW-tag systems. The wide frequency band available for this standard provides a great opportunity for SAW tags to be radically reduced in size to about 1 x 1 mm(2) while keeping a practically infinite number of possible different codes. Finally, the reader technology will be discussed, as well as detailed comparison made between SAW tags and IC-based semiconductor device.

  11. The potential of RFID technology in Blood Center processes.

    PubMed

    Kebo, V; Klement, P; Cermáková, Z; Gottfried, J; Sommerová, M; Palecek, A

    2010-01-01

    Current RFID technology deployment is limited by safety, procedural and physical limitations in healthcare field. It is important to define and ensure safe operation of technologies without actual deployment in real operation. Potential problems could arise due to the consequences of technical and physical characteristics of RFID technology and its improper location. This article deals with manipulation of blood products and the definition of suitable places for radio identification. Each suitable place must undergo laboratory experiments and tests. The results can provide a convenient base for defining efficient and safe deployment of RFID technology in Blood Centers with substantial financial savings for Czech healthcare.

  12. An Active RFID Accountability System (RAS) for Constrained Wireless Environments

    SciTech Connect

    Barker, Alan M; Hanson, Gregory R; Sexton, Angela Kay; Jones Jr, J P; Freer, Eva B; Sjoreen, Andrea L

    2011-01-01

    A team from Oak Ridge National Laboratory (ORNL) has developed an RFID Accountability System (RAS) that allows items with active RFID tags to be tracked in environments where tags may not be able to transmit their location continuously. The system uses activators that transmit a short range signal. Active RFID tags are in a sleep state until they encounter an activator. Then they transmit a signal that is picked up by the antennas installed throughout the building. This paper presents the theory of operation, application areas, lessons learned, and key features developed over the course of seven years of development and use.

  13. RFID in the pharmaceutical industry: addressing counterfeits with technology.

    PubMed

    Taylor, Douglas

    2014-11-01

    The use of Radio Frequency Identification (RFID) in the pharmaceutical industry has grown in recent years. The technology has matured from its specialized tracking and retail uses to a systemic part of supply chain management in international pharmaceutical production and distribution. Counterfeit drugs, however, remain a significant challenge for governments, pharmaceutical companies, clinicians, and patients and the use of RFID to track these compounds represents an opportunity for development. This paper discusses the medical, technological, and economic factors that support widespread adoption of RFID technology in the pharmaceutical industry in an effort to prevent counterfeit medicines from harming patients and brand equity.

  14. Development of Identification Unit for Gathered RFID-Tag with UHF Band

    NASA Astrophysics Data System (ADS)

    Ochiai, Maiko; Okano, Yoshinobu

    Recently, radio-frequency identification (RFID) has been gaining interest as a distribution management system to replace bar codes. An important difference between the RFID system and the bar code system is that, in the former, data are changeable by remote control. A system for managing gathered tags (13.56 MHz carrier wave) and a system for long-distance identification (953 MHz carrier wave) are now suitable for practical use. For continuous operation, these must integrate seamlessly. However, some disadvantages exist in long-distance identification with the 13.56 MHz carrier wave systems. To identify a gathered tag accurately, mutual interference must be suppressed. Therefore, we developed a novel emission device based on the coaxial cable leakage of a railway cellular phone service. Specifically, multiple small slots are opened on a flat shielded microstrip line. The result of an investigation into the optimum slot shape to suppress mutual interference is reported here. It is also experimentally confirmed that the proposed system can accurately identify gathered tags.

  15. An Adaptive Likelihood Distribution Algorithm for the Localization of Passive RFID Tags

    NASA Astrophysics Data System (ADS)

    Ota, Yuuki; Hori, Toshihiro; Onishi, Taiki; Wada, Tomotaka; Mutsuura, Kouichi; Okada, Hiromi

    The RFID (Radio Frequency IDentification) tag technology is expected as a tool of localization. By the localization of RFID tags, a mobile robot which installs in RFID readers can recognize surrounding environments. In addition, RFID tags can be applied to a navigation system for walkers. In this paper, we propose an adaptive likelihood distribution scheme for the localization of RFID tags. This method adjusts the likelihood distribution depending on the signal intensity from RFID tags. We carry out the performance evaluation of estimated position error by both computer simulations and implemental experiments. We show that the proposed system is more effective than the conventional system.

  16. Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure

    NASA Astrophysics Data System (ADS)

    Desmedt, Yvo

    RFID is now in fashion. Exactly 20 years ago it was pointed out that identification based on electronic tokens suffer from the middleman attack. So, obviously RFIDs do too. Worse, the middleman attack is even easier to set up. Privacy advocates have expressed concerns about the use of RFIDs. Two implementations are compared: the use of RFID cards in the underground in Shanghai (similarly for Singapore) and the use in the London system. We conclude that privacy concerns can sometimes be addressed succesfully. We also address reliabilty concerns since RFID cards are easy to break. Finally we address the psychological issue that RFIDs are believed to be secure.

  17. Investigation of Interference Models for RFID Systems.

    PubMed

    Zhang, Linchao; Ferrero, Renato; Gandino, Filippo; Rebaudengo, Maurizio

    2016-02-04

    The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

  18. A Graph Summarization Algorithm Based on RFID Logistics

    NASA Astrophysics Data System (ADS)

    Sun, Yan; Hu, Kongfa; Lu, Zhipeng; Zhao, Li; Chen, Ling

    Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. The volume of data generated by a typical RFID application will be enormous as each item will generate a complete history of all the individual locations that it occupied at every point in time. The movement trails of such RFID data form gigantic commodity flowgraph representing the locations and durations of the path stages traversed by each item. In this paper, we use graph to construct a warehouse of RFID commodity flows, and introduce a database-style operation to summarize graphs, which produces a summary graph by grouping nodes based on user-selected node attributes, further allows users to control the hierarchy of summaries. It can cut down the size of graphs, and provide convenience for users to study just on the shrunk graph which they interested. Through extensive experiments, we demonstrate the effectiveness and efficiency of the proposed method.

  19. A Secure RFID Authentication Protocol Adopting Error Correction Code

    PubMed Central

    Zheng, Xinying; Chen, Pei-Yu

    2014-01-01

    RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619

  20. CRISP: a flexible integrated development platform for RFID systems

    NASA Astrophysics Data System (ADS)

    Jamali, Behnam

    2008-12-01

    In this paper we present an introduction to Cognitive RFID Integrated System Platform (CRISP), a framework for development and implementation of RFID communication protocols. The framework enables advanced research in the area of RFID wireless communication protocols and algorithms by interfacing a large class of experimental medium access control (MAC) with custom physical layer (PHY) implementations. As such, CRISP provides a flexible, scalable, configurable and high performance RFID research tool. The low level protocol handling routines are written in VHDL and higher level functions are programmed in C and targeted to embedded Microblaze soft-core processor within the Xilinx Virtex 5 class of FPGAs. Furthermore, the online open-access repository from The University of Adelaide is available to document and share different architecture and designs with other researchers in the field.

  1. Securing the Use of RFID-Enabled Banknotes

    NASA Astrophysics Data System (ADS)

    Martínez, Santi; Roig, Concepció; Valls, Magda

    The use of RFID tags (radio-frequency identification tags) in banknotes presents a main challenge that may discourage their usage: how to avoid a possible attacker to count the amount of tags. Such a drawback is faced in this paper by designing an appropriate Medium Access Control (MAC) for this scenario. A MAC is the set of mechanisms and protocols that allows devices to share the communication channel. In a RFID system, a MAC protocol makes it possible for several tags to communicate within a common environment with the RFID reader. In this paper, we present a new MAC protocol that is suitable for ensuring security in the use of RFID-enabled banknotes. It also guarantees privacy and fits scalability requirements when the number of tags is increasing.

  2. Printed organic transistors for low-cost RFID applications

    NASA Astrophysics Data System (ADS)

    Subramanian, V.; Frechet, J. M. J.; Chang, P. C.; de la Fuente Vornbrock, A.; Huang, D. C.; Lee, J. B.; Mattis, B. A.; Molesa, S.; Murphy, A. R.; Redinger, D. R.; Volkman, S. K.

    2005-08-01

    Printed electronics is attractive as a pathway towards the realization of ultra-low-cost RFID tags for replacement of conventional optical barcodes. While this application has received tremendous attention in recent years, it also represents one of the most challenging applications for organic transistors, based on both the performance requirements and the process complexity and cost implications. Here, we report on our progress in developing materials and processes for the realization of printed transistors for low-cost RFID applications. Using inkjet printing of novel conductors, dielectrics, and organic semiconductors, we have realized printed transistors with mobilities >0.1cm2/V-s, which is approaching the requirements of certain RFID applications. We review the performance of these devices, and discuss optimization strategies for achieving the ultimate performance goals requisite for realizing printed RFID.

  3. Low-cost passive UHF RFID tags on paper substrates

    NASA Astrophysics Data System (ADS)

    Sajal, Sayeed Zebaul Haque

    To reduce the significant cost in the widespread deployment of UHF radio frequency identification (RFID) systems, an UHF RFID tag design is presented on paper substrates. The design is based on meander-line miniaturization techniques and open complementary split ring resonator (OCSRR) elements that reduce required conducting materials by 30%. Another passive UHF RFID tag is designed to sense the moisture based on the antenna's polarization. An inexpensive paper substrate and copper layer are used for flexibility and low-cost. The key characteristic of this design is the sensitivity of the antenna's polarization on the passive RFID tag to the moisture content in the paper substrate. In simulations, the antenna is circularly-polarized when the substrate is dry and is linearly-polarized when the substrate is wet. It was shown that the expected read-ranges and desired performance could be achieved reducing the over-all cost of the both designs.

  4. A design of tamper resistant prescription RFID access control system.

    PubMed

    Chen, Yu-Yi; Huang, Der-Chen; Tsai, Meng-Lin; Jan, Jinn-Ke

    2012-10-01

    In this paper, we propose a tamper resistant prescription RFID access control protocol for different authorized readers. Not only the authentication mechanism but also the access right authorization mechanism is designed in our scheme. Only the specific doctor, usually the patient's doctor, can access the tag. Moreover, some related information of patient's prescription is attached to a RFID tag for tamper resistance. The patients' rights will be guaranteed.

  5. Processing Uncertain RFID Data in Traceability Supply Chains

    PubMed Central

    Xie, Dong; Xiao, Jie

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries. PMID:24737978

  6. A Qualitative Approach to Mobile Robot Navigation Using RFID

    NASA Astrophysics Data System (ADS)

    Hossain, M.; Rashid, M. M.; Bhuiyan, M. M. I.; Ahmed, S.; Akhtaruzzaman, M.

    2013-12-01

    Radio Frequency Identification (RFID) system allows automatic identification of items with RFID tags using radio-waves. As the RFID tag has its unique identification number, it is also possible to detect a specific region where the RFID tag lies in. Recently it is widely been used in mobile robot navigation, localization, and mapping both in indoor and outdoor environment. This paper represents a navigation strategy for autonomous mobile robot using passive RFID system. Conventional approaches, such as landmark or dead-reckoning with excessive number of sensors, have complexities in establishing the navigation and localization process. The proposed method satisfies less complexity in navigation strategy as well as estimation of not only the position but also the orientation of the autonomous robot. In this research, polar coordinate system is adopted on the navigation surface where RFID tags are places in a grid with constant displacements. This paper also presents the performance comparisons among various grid architectures through simulation to establish a better solution of the navigation system. In addition, some stationary obstacles are introduced in the navigation environment to satisfy the viability of the navigation process of the autonomous mobile robot.

  7. Application of RFID technology—upper extremity rehabilitation training

    PubMed Central

    Chen, Chih-Chen; Chen, Yu-Luen; Chen, Shih-Ching

    2016-01-01

    [Purpose] Upper extremity rehabilitation after an injury is very important. This study proposes radio frequency identification (RFID) technology to improve and enhance the effectiveness of the upper extremity rehabilitation. [Subjects and Methods] People use their upper extremities to conduct daily activities. When recovering from injuries, many patients neglect the importance of rehabilitation, which results in degraded function. This study recorded the training process using the traditional rehabilitation hand gliding cart with a RFID reader, RFID tags in the panel, and a servo host computer. [Results] Clinical evidence, time taken to achieve a full score, counts of missing the specified spots, and Brunnstrom stage of aided recovery, the proximal part of the upper extremity show that the RFID-based upper extremity training significantly and reduce negative impacts of the disability in daily life and activities. [Conclusion] This study combined a hand-gliding cart with an RFID reader, and when patients moved the cart, the movement could be observed via the activated RFID tags. The training data was collected and quantified for a better understanding of the recovery status of the patients. Each of the participating patients made progress as expected. PMID:27065539

  8. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  9. Processing uncertain RFID data in traceability supply chains.

    PubMed

    Xie, Dong; Xiao, Jie; Guo, Guangjun; Jiang, Tong

    2014-01-01

    Radio Frequency Identification (RFID) is widely used to track and trace objects in traceability supply chains. However, massive uncertain data produced by RFID readers are not effective and efficient to be used in RFID application systems. Following the analysis of key features of RFID objects, this paper proposes a new framework for effectively and efficiently processing uncertain RFID data, and supporting a variety of queries for tracking and tracing RFID objects. We adjust different smoothing windows according to different rates of uncertain data, employ different strategies to process uncertain readings, and distinguish ghost, missing, and incomplete data according to their apparent positions. We propose a comprehensive data model which is suitable for different application scenarios. In addition, a path coding scheme is proposed to significantly compress massive data by aggregating the path sequence, the position, and the time intervals. The scheme is suitable for cyclic or long paths. Moreover, we further propose a processing algorithm for group and independent objects. Experimental evaluations show that our approach is effective and efficient in terms of the compression and traceability queries.

  10. Design and realization of confidential data management system RFID-based

    NASA Astrophysics Data System (ADS)

    Huang, Wei; Wang, Zhong; Wang, Xin

    2017-03-01

    This paper introduces the composition of RFID system, and then analyzes the hardware design and software design systems, and finally summarizes the realization and application of the confidential data management system RFID-based.

  11. Characterizing coarse bedload transport during floods with RFID and accelerometer tracers, in-stream RFID antennas and HEC-RAS modeling

    NASA Astrophysics Data System (ADS)

    Olinde, L.; Johnson, J. P.

    2013-12-01

    By monitoring the transport timing and distances of tracer grains in a steep mountains stream, we collected data that can constrain numerical bedload transport models considered for these systems. We captured bedload activity during a weeks-spanning snowmelt period in Reynolds Creek, Idaho by deploying Radio Frequency Identification (RFID) and accelerometer embedded tracers with in-stream stationary RFID antennas. During transport events, RFID dataloggers recorded the times when tracers passed over stationary antennas. The accelerometer tracers also logged x, y, z-axis accelerations every 10 minutes to identify times of motion and rest. After snowmelt flows receded, we found tracers with mobile antennas and surveyed their positions. We know the timing and tracer locations when accelerometer tracers were initially entrained, passed stationary antennas, and were finally deposited at the surveyed locations. The fraction of moving accelerometers over time correlates well with discharge. Comparisons of the transported tracer fraction between rising and falling limbs over multiple flood peaks suggest that some degree of clockwise hysteresis persisted during the snowmelt period. Additionally, we apply accelerometer transport durations and displacement distances to calculate virtual velocities over full tracer path lengths and over lengths between initial locations to stationary antennas as well as between stationary antennas to final positions. The accelerometer-based virtual velocities are significantly faster than those estimated from traditional tracer methods that estimate bedload transport durations by assuming threshold flow conditions. We also subsample the motion data to calculate how virtual velocities change over the measurement intervals. Regressions of these relations are in turn used to extrapolate virtual velocities at smaller sampling timescales. Minimum hop lengths are also evaluated for each accelerometer tracer. Finally, flow conditions during the

  12. RFID in the healthcare supply chain: usage and application.

    PubMed

    Kumar, Sameer; Swanson, Eric; Tran, Thuy

    2009-01-01

    The purposes of this study are to first, determine the most efficient and cost effective portions of the healthcare supply chain in which radio frequency identification devices (RFID) can be implemented. Second, provide specific examples of RFID implementation and show how these business applications will add to the effectiveness of the healthcare supply chain. And third, to describe the current state of RFID technology and to give practical information for managers in the healthcare sector to make sound decisions about the possible implementation of RFID technology within their organizations. Healthcare industry literature was reviewed and examples of specific instances of RFID implementation were examined using an integrated simulation model developed with Excel, @Risk and Visio software tools. Analysis showed that the cost of implementing current RFID technology is too expensive for broad and sweeping implementation within the healthcare sector at this time. However, several example applications have been identified in which this technology can be effectively leveraged in a cost-effective way. This study shows that RFID technology has come a long way in the recent past and has potential to improve healthcare sector productivity and efficiency. Implementation by large companies such as Wal-mart has helped to make the technology become much more economical in its per unit cost as well as its supporting equipment and training costs. The originality of this study lies in the idea that few practical and pragmatic approaches have been taken within the academic field of study for the implementation of RFID into the healthcare supply chain. Much of the research has focused on specific companies or portions of the supply chain and not the entire supply chain. Also, many of the papers have discussed the future of the supply chain that is heavily dependent on advances in RFID technology. A few viable applications of how RFID technology can be implemented in the healthcare

  13. Loosely-Bound Diatomic Molecules.

    ERIC Educational Resources Information Center

    Balfour, W. J.

    1979-01-01

    Discusses concept of covalent bonding as related to homonuclear diatomic molecules. Article draws attention to the existence of bound rare gas and alkaline earth diatomic molecules. Summarizes their molecular parameters and offers spectroscopic data. Strength and variation with distance of interatomic attractive forces is given. (Author/SA)

  14. Loosely-Bound Diatomic Molecules.

    ERIC Educational Resources Information Center

    Balfour, W. J.

    1979-01-01

    Discusses concept of covalent bonding as related to homonuclear diatomic molecules. Article draws attention to the existence of bound rare gas and alkaline earth diatomic molecules. Summarizes their molecular parameters and offers spectroscopic data. Strength and variation with distance of interatomic attractive forces is given. (Author/SA)

  15. Compact Miniaturized Antenna for 210 MHz RFID

    NASA Technical Reports Server (NTRS)

    Lee, Richard Q.; Chun, Kue

    2008-01-01

    This paper describes the design and simulation of a miniaturized square-ring antenna. The miniaturized antenna, with overall dimensions of approximately one tenth of a wavelength (0.1 ), was designed to operate at around 210 MHz, and was intended for radio-frequency identification (RFID) application. One unique feature of the design is the use of a parasitic element to improve the performance and impedance matching of the antenna. The use of parasitic elements to enhance the gain and bandwidth of patch antennas has been demonstrated and reported in the literature, but such use has never been applied to miniaturized antennas. In this work, we will present simulation results and discuss design parameters and their impact on the antenna performance.

  16. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  17. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Identification (RFID) using passive tags. 552.211-92 Section 552.211-92 Federal Acquisition Regulations System... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  18. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    ERIC Educational Resources Information Center

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  19. Implications of RFID in Location-Aware Wi-Fi Networks

    ERIC Educational Resources Information Center

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  20. Evaluation of RFID for Information Visibility Based Job-Shop Scheduling in Lean Manufacturing Environments

    ERIC Educational Resources Information Center

    Chongwatpol, Jongsawas

    2012-01-01

    This dissertation investigates the impact of radio frequency identification (RFID) in manufacturing. Two simulation studies of an organization that is considering implementing RFID on a production line are conducted. First, we investigate whether addition of RFID technologies in the manufacturing process can complement Lean initiatives.…

  1. Position Statement in RFID S&P Panel: Contactless Smart Cards

    NASA Astrophysics Data System (ADS)

    Callas, Jon

    When considering the security and risks of RFID systems, we must be careful to consider the issues that are specific to the device being an RFID as opposed to the inherent security issues of the device itself. RFID devices fall into two main categories:

  2. Implications of RFID in Location-Aware Wi-Fi Networks

    ERIC Educational Resources Information Center

    Duhainy, Robert

    2010-01-01

    The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…

  3. A Closed Loop Wireless Power Transmission System Using a Commercial RFID Transceiver for Biomedical Applications

    PubMed Central

    Kiani, Mehdi

    2010-01-01

    This paper presents a standalone closed loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio frequency identification (RFID) transceiver (MLX90121) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop fashion. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either malfunction or excessive heat dissipation. RFID transceivers are often used open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 1.48 mW over a range of 6 to 12 cm, while the transmitter power consumption changed from 0.3 W to 1.21 W. The closed loop system can also oppose voltage variations as a result of sudden changes in load current. PMID:19963595

  4. Novel Concrete Temperature Monitoring Method Based on an Embedded Passive RFID Sensor Tag

    PubMed Central

    Liu, Yongsheng; Deng, Fangming; He, Yigang; Li, Bing; Liang, Zhen; Zhou, Shuangxi

    2017-01-01

    This paper firstly introduces the importance of temperature control in concrete measurement, then a passive radio frequency identification (RFID) sensor tag embedded for concrete temperature monitoring is presented. In order to reduce the influences of concrete electromagnetic parameters during the drying process, a T-type antenna is proposed to measure the concrete temperature at the required depth. The proposed RFID sensor tag is based on the EPC generation-2 ultra-high frequency (UHF) communication protocol and operates in passive mode. The temperature sensor can convert the sensor signals to corresponding digital signals without an external reference clock due to the adoption of phase-locked loop (PLL)-based architecture. Laboratory experimentation and on-site testing demonstrate that our sensor tag embedded in concrete can provide reliable communication performance in passive mode. The maximum communicating distance between reader and tag is 7 m at the operating frequency of 915 MHz and the tested results show high consistency with the results tested by a thermocouple. PMID:28640188

  5. A closed loop wireless power transmission system using a commercial RFID transceiver for biomedical applications.

    PubMed

    Kiani, Mehdi; Ghovanloo, Maysam

    2009-01-01

    This paper presents a standalone closed loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio frequency identification (RFID) transceiver (MLX90121) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop fashion. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either malfunction or excessive heat dissipation. RFID transceivers are often used open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 1.48 mW over a range of 6 to 12 cm, while the transmitter power consumption changed from 0.3 W to 1.21 W. The closed loop system can also oppose voltage variations as a result of sudden changes in load current.

  6. Novel Concrete Temperature Monitoring Method Based on an Embedded Passive RFID Sensor Tag.

    PubMed

    Liu, Yongsheng; Deng, Fangming; He, Yigang; Li, Bing; Liang, Zhen; Zhou, Shuangxi

    2017-06-22

    This paper firstly introduces the importance of temperature control in concrete measurement, then a passive radio frequency identification (RFID) sensor tag embedded for concrete temperature monitoring is presented. In order to reduce the influences of concrete electromagnetic parameters during the drying process, a T-type antenna is proposed to measure the concrete temperature at the required depth. The proposed RFID sensor tag is based on the EPC generation-2 ultra-high frequency (UHF) communication protocol and operates in passive mode. The temperature sensor can convert the sensor signals to corresponding digital signals without an external reference clock due to the adoption of phase-locked loop (PLL)-based architecture. Laboratory experimentation and on-site testing demonstrate that our sensor tag embedded in concrete can provide reliable communication performance in passive mode. The maximum communicating distance between reader and tag is 7 m at the operating frequency of 915 MHz and the tested results show high consistency with the results tested by a thermocouple.

  7. An RFID-Based Closed-Loop Wireless Power Transmission System for Biomedical Applications.

    PubMed

    Kiani, Mehdi; Ghovanloo, Maysam

    2010-04-01

    This brief presents a standalone closed-loop wireless power transmission system that is built around a commercial off-the-shelf (COTS) radio-frequency identification (RFID) reader (TRF7960) operating at 13.56 MHz. It can be used for inductively powering implantable biomedical devices in a closed loop. Any changes in the distance and misalignment between transmitter and receiver coils in near-field wireless power transmission can cause a significant change in the received power, which can cause either a malfunction or excessive heat dissipation. RFID circuits are often used in an open loop. However, their back telemetry capability can be utilized to stabilize the received voltage on the implant. Our measurements showed that the delivered power to the transponder was maintained at 11.2 mW over a range of 0.5 to 2 cm, while the transmitter power consumption changed from 78 mW to 1.1 W. The closed-loop system can also oppose voltage variations as a result of sudden changes in the load current.

  8. Distance Learning.

    ERIC Educational Resources Information Center

    Orey, Michael; Koenecke, Lynne; Snider, Richard C.; Perkins, Ross A.; Holmes, Glen A.; Lockee, Barbara B.; Moller, Leslie A.; Harvey, Douglas; Downs, Margaret; Godshalk, Veronica M.

    2003-01-01

    Contains four articles covering trends and issues on distance learning including: the experience of two learners learning via the Internet; a systematic approach to determining the scalability of a distance education program; identifying factors that affect learning community development and performance in asynchronous distance education; and…

  9. Two-Way Communication Using RFID Equipment and Techniques

    NASA Technical Reports Server (NTRS)

    Jedry, Thomas; Archer, Eric

    2007-01-01

    Equipment and techniques used in radio-frequency identification (RFID) would be extended, according to a proposal, to enable short-range, two-way communication between electronic products and host computers. In one example of a typical contemplated application, the purpose of the short-range radio communication would be to transfer image data from a user s digital still or video camera to the user s computer for recording and/or processing. The concept is also applicable to consumer electronic products other than digital cameras (for example, cellular telephones, portable computers, or motion sensors in alarm systems), and to a variety of industrial and scientific sensors and other devices that generate data. Until now, RFID has been used to exchange small amounts of mostly static information for identifying and tracking assets. Information pertaining to an asset (typically, an object in inventory to be tracked) is contained in miniature electronic circuitry in an RFID tag attached to the object. Conventional RFID equipment and techniques enable a host computer to read data from and, in some cases, to write data to, RFID tags, but they do not enable such additional functions as sending commands to, or retrieving possibly large quantities of dynamic data from, RFID-tagged devices. The proposal would enable such additional functions. The figure schematically depicts an implementation of the proposal for a sensory device (e.g., a digital camera) that includes circuitry that converts sensory information to digital data. In addition to the basic sensory device, there would be a controller and a memory that would store the sensor data and/or data from the controller. The device would also be equipped with a conventional RFID chipset and antenna, which would communicate with a host computer via an RFID reader. The controller would function partly as a communication interface, implementing two-way communication protocols at all levels (including RFID if needed) between the

  10. PHASE II VAULT TESTING OF THE ARGONNE RFID SYSTEM

    SciTech Connect

    Willoner, T.; Turlington, R.; Koenig, R.

    2012-06-25

    The U.S. Department of Energy (DOE) (Environmental Management [EM], Office of Packaging and Transportation [EM-45]) Packaging and Certification Program (DOE PCP) has developed a Radio Frequency Identification (RFID) tracking and monitoring system, called ARG-US, for the management of nuclear materials packages during transportation and storage. The performance of the ARG-US RFID equipment and system has been fully tested in two demonstration projects in April 2008 and August 2009. With the strong support of DOE-SR and DOE PCP, a field testing program was completed in Savannah River Site's K-Area Material Storage (KAMS) Facility, an active Category I Plutonium Storage Facility, in 2010. As the next step (Phase II) of continued vault testing for the ARG-US system, the Savannah River Site K Area Material Storage facility has placed the ARG-US RFIDs into the 910B storage vault for operational testing. This latest version (Mark III) of the Argonne RFID system now has the capability to measure radiation dose and dose rate. This paper will report field testing progress of the ARG-US RFID equipment in KAMS, the operability and reliability trend results associated with the applications of the system, and discuss the potential benefits in enhancing safety, security and materials accountability. The purpose of this Phase II K Area test is to verify the accuracy of the radiation monitoring and proper functionality of the ARG-US RFID equipment and system under a realistic environment in the KAMS facility. Deploying the ARG-US RFID system leads to a reduced need for manned surveillance and increased inventory periods by providing real-time access to status and event history traceability, including environmental condition monitoring and radiation monitoring. The successful completion of the testing program will provide field data to support a future development and testing. This will increase Operation efficiency and cost effectiveness for vault operation. As the next step (Phase

  11. RFID-enabled healthcare applications, issues and benefits: an archival analysis (1997-2011).

    PubMed

    Fosso Wamba, Samuel

    2012-12-01

    In this paper, a comprehensive review of articles published between 1997 and 2011 in the Journal of Medical Systems (JMS) on RFID technology is presented. A total of 22 papers are analyzed using a classification framework that has three dimensions: RFID-enabled healthcare applications, RFID-enabled healthcare issues, and RFID-enabled healthcare benefits. In addition, an invitation sent to all authors of the papers accepted for the special issue on RFID for the JMS allows them to position their various papers within the classification framework. Finally, a list of future research directions is presented.

  12. Radio Frequency Identification (RFID) technology and patient safety

    PubMed Central

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-01-01

    Background: Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. Materials and Methods: This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. Results: The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. Conclusion: We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors. PMID:24381626

  13. Radio Frequency Identification (RFID) technology and patient safety.

    PubMed

    Ajami, Sima; Rajabzadeh, Ahmad

    2013-09-01

    Radio frequency identification (RFID) systems have been successfully applied in areas of manufacturing, supply chain, agriculture, transportation, healthcare, and services to name a few. However, the different advantages and disadvantages expressed in various studies of the challenges facing the technology of the use of the RFID technology have been met with skepticism by managers of healthcare organizations. The aim of this study was to express and display the role of RFID technology in improving patient safety and increasing the impact of it in healthcare. This study was non-systematical review, which the literature search was conducted with the help of libraries, books, conference proceedings, PubMed databases and also search engines available at Google, Google scholar in which published between 2004 and 2013 during Febuary 2013. We employed the following keywords and their combinations; RFID, healthcare, patient safety, medical errors, and medication errors in the searching areas of title, keywords, abstract, and full text. The preliminary search resulted in 68 articles. After a careful analysis of the content of each paper, a total of 33 papers was selected based on their relevancy. We should integrate RFID with hospital information systems (HIS) and electronic health records (EHRs) and support it by clinical decision support systems (CDSS), it facilitates processes and reduce medical, medication and diagnosis errors.

  14. 3-D transponder antennas for future SHF RFID applications

    NASA Astrophysics Data System (ADS)

    Zichner, R.; Baumann, R. R.

    2011-12-01

    The radio frequency identification (RFID) technology is omnipresent since a few years. Some of the most popular fields of application are the use for security tasks, for logistics and for the consumer segment. For example, chip card or key ring sized RFID transponders can allow wireless access to secured rooms. The number of applications for wireless data transmission for the identification and tracking of objects increases every year. There is a large development need for highly functional and inexpensive RFID transponders due to the ever-increasing demand on improved reliability, higher data rates and read and write ranges of the RFID systems. Therefore, research was performed on new 3-D transponder antennas for the Super High Frequency Band around 5.8 GHz. Additionally, wave propagation effects and the influence of different dielectric environments were considered. Parallel to the design of the novel antenna structures, the printing process for inexpensive manufacturing was investigated. The gained results are the basis for prospective RFID applications.

  15. Two RFID-based solutions for secure inpatient medication administration.

    PubMed

    Yen, Yi-Chung; Lo, Nai-Wei; Wu, Tzong-Chen

    2012-10-01

    Medication error can easily cause serious health damage to inpatients in hospital. Consequently, the whole society has to spend huge amount of extra resources for additional therapies and medication on those affected inpatients. In order to prevent medication errors, secure inpatient medication administration system is required in a hospital. Using RFID technology, such administration system provides automated medication verification for inpatient's medicine doses and generates corresponding medication evidence, which may be audited later for medical dispute. Recently, Peris-Lopez et al. (Int. J. Med. Inform., 2011) proposed an IS-RFID system to enhance inpatient medication safety. Nevertheless, IS-RFID system does not detect the denial of proof attack efficiently and the generated medication evidence cannot defend against counterfeit evidence generated from the hospital. That is, the hospital possesses enough privilege from the design of IS-RFID system to modify generated medication evidence whenever it is necessary. Hence, we design two lightweight RFID-based solutions for secure inpatient medication administration, one for online verification environment and the other for offline validation situation, to achieve system security on evidence generation and provide early detection on denial of proof attack.

  16. Theory and experiments on Peano and Hilbert curve RFID tags

    NASA Astrophysics Data System (ADS)

    McVay, John; Hoorfar, Ahmad; Engheta, Nader

    2006-05-01

    Recently, there has been considerable interest in the area of Radio Frequency Identification (RFID) and Radio Frequency Tagging (RFTAG). This emerging area of interest can be applied for inventory control (commercial) as well as friend/foe identification (military) to name but a few. The current technology can be broken down into two main groups, namely passive and active RFID tags. Utilization of Space-Filling Curve (SFC) geometries, such as the Peano and Hilbert curves, has been recently investigated for use in completely passive RFID applications [1, 2]. In this work, we give an overview of our work on the space-filling curves and the potential for utilizing the electrically small, resonant characteristics of these curves for use in RFID technologies with an emphasis on the challenging issues involved when attempting to tag conductive objects. In particular, we investigate the possible use of these tags in conjunction with high impedance ground-planes made of Hilbert or Peano curve inclusions [3, 4] to develop electrically small RFID tags that may also radiate efficiently, within close proximity of large conductive objects [5].

  17. Design and Implementation of User-Created Information Systems with Mobile RFID

    NASA Astrophysics Data System (ADS)

    Lee, Jae Kwoen; Chin, Sungho; Kim, Hee Cheon; Chung, Kwang Sik

    RFID (Radio Frequency Identification) has been usually applied at physical distribution field. The Mobile RFID can be the only technology that we can lead the market. In our country, ETRI standardizes MOBION (MOBile Identification ON), and the mobile-telecommunication companies provide the trial-mobile RFID service from 2006. In the trial-mobile RFID services, the Broker model is used to decode the mobile RFID code. However, the Broker model has some problems, such as communication overhead caused by the frequent ODS query, service performance, and various services for users. In this paper, we developed device application that is capable for filtering unrelated code from RFID service to improve the decoding performance. We also improve the performance through simplifying connection process between device application and the broker. Finally, we propose and develop the user-created information system to widely distribute the Mobile RFID service.

  18. The adoption and implementation of RFID technologies in healthcare: a literature review.

    PubMed

    Yao, Wen; Chu, Chao-Hsien; Li, Zang

    2012-12-01

    Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use of RFID in healthcare/hospitals following a formal innovation-decision framework. We aim to identify the common applications, potential benefits, barriers, and critical success factors. Our study facilitates quick assessment and provides guidance for researchers and practitioners in adopting RFID in medical arenas. Many earlier adopters in healthcare found RFID to be functional and useful in such areas as asset tracking and patient identification. Major barriers to adoption include technological limitations, interference concerns, prohibitive costs, lack of global standards and privacy concerns. Better designed RFID systems with low cost and privacy issues addressed are needed to increase acceptance of RFID in healthcare.

  19. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    PubMed

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.

  20. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    PubMed

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  1. Data Recognition and Filtering Based on Efficient RFID Data Processing Control Schemes

    NASA Astrophysics Data System (ADS)

    Kung, Hsu-Yang; Kuo, Chiung-Wen; Tsai, Ching-Ping

    Radio Frequency Identification (RFID) applications have changed gradually from a single vendor and single application to being integrated into applications for supply chains. The primary function of RFID middleware is to process large amounts of data within a short period. High performance and efficiency are difficult to achieve in a RFID data processing control scheme when the volume of RFID data is large. This work is designed the core functions of RFID middleware and developed data processing control scheme that includes data recognition, data filtering and data searching processes. The control scheme for RFID data recognition is used to identify data with false positives and then to obtain corrected data objects. The data filtering control scheme is used to solve problems associated with RFID expansion under a large amount of work and data. The proposed data searching method is based on the EPC (Electronic Product Code) and uses the Hash to accelerate information filtering efficiency.

  2. Healthcare in Disasters and the Role of RFID.

    PubMed

    Madanian, Samaneh; Parry, David; Norris, Tony

    2015-01-01

    Disasters either natural or man-made are inevitable, and therefore disaster management has always been an important function of government. Since during a disaster healthcare is often adversely affected, a lot of effort has been made in terms of researching effective responses and ways of improving the quality of delivered care to direct casualties and the rest of the community. In this regard, information technology plays an important role to help healthcare systems achieve this goal. One of these technologies that has become popular recently is Radio-Frequency Identification (RFID). This paper explores the relationship between emergency management and disaster healthcare and examines the role of RFID. It is suggested that RFID will become an integral part of disaster healthcare and a means of improving response performance.

  3. A new specimen management system using RFID technology.

    PubMed

    Shim, Hun; Uh, Young; Lee, Seung Hwan; Yoon, Young Ro

    2011-12-01

    The specimen management system with barcode needs to be improved in order to solve inherent problems in work performance. This study describes the application of Radio Frequency Identification (RFID) which is the solution for the problems associated with specimen labeling and management. A new specimen management system and architecture with RFID technology for clinical laboratory was designed. The suggested system was tested in various conditions such as durability to temperature and aspect of effective utilization of new work flow under a virtual hospital clinical laboratory environment. This system demonstrates its potential application in clinical laboratories for improving work flow and specimen management. The suggested specimen management system with RFID technology has advantages in comparison to the traditional specimen management system with barcode in the aspect of mass specimen processing, robust durability of temperature, humidity changes, and effective specimen tracking.

  4. Integrating RFID technique to design mobile handheld inventory management system

    NASA Astrophysics Data System (ADS)

    Huang, Yo-Ping; Yen, Wei; Chen, Shih-Chung

    2008-04-01

    An RFID-based mobile handheld inventory management system is proposed in this paper. Differing from the manual inventory management method, the proposed system works on the personal digital assistant (PDA) with an RFID reader. The system identifies electronic tags on the properties and checks the property information in the back-end database server through a ubiquitous wireless network. The system also provides a set of functions to manage the back-end inventory database and assigns different levels of access privilege according to various user categories. In the back-end database server, to prevent improper or illegal accesses, the server not only stores the inventory database and user privilege information, but also keeps track of the user activities in the server including the login and logout time and location, the records of database accessing, and every modification of the tables. Some experimental results are presented to verify the applicability of the integrated RFID-based mobile handheld inventory management system.

  5. Two RFID-based solutions to enhance inpatient medication safety.

    PubMed

    Chien, Hung-Yu; Yang, Chia-Chuan; Wu, Tzong-Chen; Lee, Chin-Feng

    2011-06-01

    Owing to the low cost and convenience of identifying an object without physical contact, Radio Frequency Identification (RFID) systems provide innovative, promising and efficient applications in many domains. An RFID grouping protocol is a protocol that allows an off-line verifier to collect and verify the evidence of two or more tags simultaneously present. Recently, Huang and Ku (J. Med. Syst, 2009) proposed an efficient grouping protocol to enhance medication safety for inpatients based on low-cost tags. However, the Huang-Ku scheme is not secure; an attacker can easily make up fake grouping records to cheat the verifier. This weakness would seriously endanger the safety of inpatient medication safety. This paper will show the weaknesses, and then propose two RFID-based solutions to enhance medication safety for two different scenarios. The proposed schemes are practical, secure and efficient for medication applications.

  6. Inline SAW RFID tag using time position and phase encoding.

    PubMed

    Härmä, Sanna; Arthur, Wesley G; Hartmann, Clinton S; Maev, Roman G; Plessky, Victor P

    2008-08-01

    Surface acoustic wave (SAW) radio-frequency identification (RFID) tags are encoded according to partial reflections of an interrogation signal by short metal reflectors. The standard encryption method involves time position encoding that uses time delays of response signals. However, the data capacity of a SAW RFID tag can be significantly enhanced by extracting additional phase information from the tag responses. In this work, we have designed, using FEM-BEM simulations, and fabricated, on 128 degrees -LiNbO3, inline 2.44-GHz SAW RFID tag samples that combine time position and phase encoding. Each reflective echo has 4 possible time positions and a phase of 0 degrees , -90 degrees , -180 degrees , or -270 degrees. This corresponds to 16 different states, i.e., 4 bits of data, per code reflector. In addition to the enhanced data capacity, our samples also exhibit a low loss level of -38 dB for code reflections.

  7. Performance assessment of an RFID system for automatic surgical sponge detection in a surgery room.

    PubMed

    Dinis, H; Zamith, M; Mendes, P M

    2015-01-01

    A retained surgical instrument is a frequent incident in medical surgery rooms all around the world, despite being considered an avoidable mistake. Hence, an automatic detection solution of the retained surgical instrument is desirable. In this paper, the use of millimeter waves at the 60 GHz band for surgical material RFID purposes is evaluated. An experimental procedure to assess the suitability of this frequency range for short distance communications with multiple obstacles was performed. Furthermore, an antenna suitable to be incorporated in surgical materials, such as sponges, is presented. The antenna's operation characteristics are evaluated as to determine if it is adequate for the studied application over the given frequency range, and under different operating conditions, such as varying sponge water content.

  8. RFID antenna design for circular polarization in UHF band

    NASA Astrophysics Data System (ADS)

    Shahid, Hamza; Khan, Muhammad Talal Ali; Tayyab, Umais; Irshad, Usama Bin; Alkhazraji, Emad; Javaid, Muhammad Sharjeel

    2017-05-01

    A miniature half cross dipole antenna for defense and aerospace RFID applications in UHF band is presented. The dipole printed line arms are half crossed shape on top of dielectric substrate backed by reactive impedance surface. The antenna fed by a coaxial cable at the gap separating the dipole arms. Our design is intended to work at 2.42 GHz for RFID readers. The radiation pattern obtained has HPBW of 112, return loss of 22.24 dB and 90 MHz bandwidth.

  9. Radio Frequency Identification (RFID) in healthcare: a literature review.

    PubMed

    Kolokathi, Aikaterini; Rallis, Panagiotis

    2013-01-01

    Creating and maintaining a safe and high-quality health care environment is of great importance for global community. New technologies and their applications can help us achieve this goal. Radio-Frequency Identification (RIFD) technology is considered one of those technologies and even today there are some interesting deployments in the health industry. As a result, this work aims to present the basic idea behind RFID solutions, problems that can be addressed with the adoption of RFID and the benefits of relative applications.

  10. A Study on the RFID Tag Encryption using Fast SEED

    NASA Astrophysics Data System (ADS)

    Ko, Hoon; Kim, Jiyeon; Jung, Jongjin; Joe, Susan; Lee, Yongjun; Chang, Yoonseok

    2007-12-01

    We have to solve the problem of SEED to apply the SEED algorithm in RFID Tag. Because it must keep both a fast performance and low electronic, also it has the limitation of the physical character to it. Although the SEED is more safety than other encryption algorithms, it has a physical trouble when they try to apply it in Tag. Therefore, In this paper we proposed the way to reduce into the 8 rounds, and we implemented the 8 rounded SEED algorithm to RFID tag encryption.

  11. RFID authentication protocol to enhance patient medication safety.

    PubMed

    Kaul, Sonam Devgan; Awasthi, Amit K

    2013-12-01

    Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.

  12. Monitoring, control and diagnostics using RFID infrastructure.

    PubMed

    Pleteršek, Anton; Sok, Miha; Trontelj, Janez

    2012-12-01

    This work demonstrates the developed application for disinfection control by the sensing of chemical agents. The objective was to develop an Automatic Disinfectant Tracker (ADT) that would verify the disinfection of the hands of nurses, doctors, staff, patients, and visitors in hospitals within a required time frame. We have successfully investigated the development of hand disinfection control mechanisms and demonstrated two approaches, both based on the wireless Ultra-High-Frequency-based Radio-Frequency Identification (UHF-RFID) technology. The 100 % efficacy of detecting propanol and ethanol concentration was achieved by using the static disinfectant control (SDC-ADT) method. The time domain response provides an accurate determination of their performance in practice simply by measuring the applied disinfectant concentration and the duration of application. The present paper resulted from the measurements of a capacitive chemical sensor fabricated in the Laboratory for Microelectronics, (LMFE) and on measurements, based on a commercially available resistive type of sensor. A graphic user interface (IDS-GUI) is designed to successfully set the logger parameters and display the results.

  13. Indoor Navigation Design Integrated with Smart Phones and Rfid Devices

    NASA Astrophysics Data System (ADS)

    Ortakci, Y.; Demiral, E.; Atila, U.; Karas, I. R.

    2015-10-01

    High rise, complex and huge buildings in the cities are almost like a small city with their tens of floors, hundreds of corridors and rooms and passages. Due to size and complexity of these buildings, people need guidance to find their way to the destination in these buildings. In this study, a mobile application is developed to visualize pedestrian's indoor position as 3D in their smartphone and RFID Technology is used to detect the position of pedestrian. While the pedestrian is walking on his/her way on the route, smartphone will guide the pedestrian by displaying the photos of indoor environment on the route. Along the tour, an RFID (Radio-Frequency Identification) device is integrated to the system. The pedestrian will carry the RFID device during his/her tour in the building. The RFID device will send the position data to the server directly in every two seconds periodically. On the other side, the pedestrian will just select the destination point in the mobile application on smartphone and sent the destination point to the server. The shortest path from the pedestrian position to the destination point is found out by the script on the server. This script also sends the environment photo of the first node on the acquired shortest path to the client as an indoor navigation module.

  14. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    EPA Science Inventory

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  15. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  16. RFID Technology Implementation in Two Libraries in New Delhi

    ERIC Educational Resources Information Center

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  17. Implementation of RFID Technology in University of Pune Library

    ERIC Educational Resources Information Center

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  18. City motor vehicle management system based on RFID

    NASA Astrophysics Data System (ADS)

    Yi, Zheng-jiang; Liu, San-jun

    2013-03-01

    Aiming at the shortcomings of the traditional vehicle management, a new motor vehicle management solutions is provided. The system manage the vehicles using the radio frequency long-range identification based on RFID technology.The system can identify the vehicles in 12 meters with a maximum speed of 100km/h and provides a new solution for the city motor vehicle management.

  19. Implementation of RFID Technology in University of Pune Library

    ERIC Educational Resources Information Center

    Bansode, Sadanand Y.; Desale, Sanjay K.

    2009-01-01

    Purpose: The purpose of this paper is to describe the implementation of a radio frequency identification (RFID) system in Pune University Library. Design/methodology/approach: The paper provides a brief overview of background of the project, barriers faced and changes that have been experienced after the implementation of the technology. Findings:…

  20. RFID Technology Implementation in Two Libraries in New Delhi

    ERIC Educational Resources Information Center

    Madhusudhan, Margam

    2010-01-01

    Purpose: The purpose of this paper is to examine the use and implementation of RFID technology at the Indian Law Institute Library and National Social Science Documentation Centre Library, New Delhi. Design/methodology/approach: A survey was conducted at the two libraries, using a structured questionnaire comprising 20 questions. Findings: It was…

  1. Traceability System For Agricultural Productsbased on Rfid and Mobile Technology

    NASA Astrophysics Data System (ADS)

    Sugahara, Koji

    In agriculture, it is required to establish and integrate food traceability systems and risk management systems in order to improve food safety in the entire food chain. The integrated traceability system for agricultural products was developed, based on innovative technology of RFID and mobile computing. In order to identify individual products on the distribution process efficiently,small RFID tags with unique ID and handy RFID readers were applied. On the distribution process, the RFID tags are checked by using the readers, and transit records of the products are stored to the database via wireless LAN.Regarding agricultural production, the recent issues of pesticides misuse affect consumer confidence in food safety. The Navigation System for Appropriate Pesticide Use (Nouyaku-navi) was developed, which is available in the fields by Internet cell-phones. Based on it, agricultural risk management systems have been developed. These systems collaborate with traceability systems and they can be applied for process control and risk management in agriculture.

  2. Legal Regulation and Consumers: The RFID Industry's Perspective

    NASA Astrophysics Data System (ADS)

    Ronzani, Daniel

    Many journal articles have presented research on the adoption and diffusion of Radio Frequency Identification (RFID) from a regulatory or consumer perspective. This research takes a reverse viewpoint. It researches the industry's experience with regulation by law and its experience with consumers. First, semi-structured interviews with RFID industry stakeholders are conducted on the topics of (UHF) frequency law, database law, and privacy law. Second, the industry's experience with (i) regulation by law and (ii) the consumers is collected in a worldwide online survey with companies and organisations that research, produce, sell, and consult on RFID technology. Third, empirical data is evaluated by different territories and industries to discuss four observations about legal regulation and consumers made by the authors with four feedback observations from the online survey. Given the evaluation of the empirical data, this article recommends that the RFID industry engage in better constructive dialogue with the legal regulator , strengthen its knowledge on applicable legislation, and re-evaluate its information policy to the consumer.

  3. The Future of Hazardous Waste Tracking: Radio Frequency Identification (RFID)

    EPA Science Inventory

    The capability and performance of various RFID technologies to track hazardous wastes and materials (HAZMAT) across international borders will be verified in the El Paso, Texas-Ciudad Juarez, Mexico area under EPA's Environmental Technology Verification (ETV)/Environmental and S...

  4. High-Power Proxies for Enhancing RFID Privacy and Utility

    DTIC Science & Technology

    2005-01-01

    Library tracking system spawns Big Brother ire. San Francisco Chronicle, 2 July 2004. 22. R. Stapleton-Gray. Would Macy’s scan Gimbels? competitive ... intelligence and RFID. Technical report, Stapleton-Gray & Associates, Inc., 2003. Available at http://www.stapleton-gray.com/papers/ci-20031027.PDF. 23. K

  5. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    ERIC Educational Resources Information Center

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  6. RFID Student Educational Experiences at the UNT College of Engineering: A Sequential Approach to Creating a Project-Based RFID Course

    ERIC Educational Resources Information Center

    Vaidyanathan, V. V.; Varanasi, M. R.; Kougianos, E.; Wang, Shuping; Raman, H.

    2009-01-01

    This paper describes radio frequency identification (RFID) projects, designed and implemented by students in the College of Engineering at the University of North Texas, as part of their senior-design project requirement. The paper also describes an RFID-based project implemented at Rice Middle School in Plano, TX, which went on to win multiple…

  7. Development of the RFID System for nuclear materials management.

    SciTech Connect

    Chen, K.; Tsai, H.; Liu, Y. Y.

    2008-01-01

    Radio frequency identification (RFID) is one of today's most rapidly growing technologies in the automatic data collection industry. Although commercial applications are already widespread, the use of this technology for managing nuclear materials is only in its infancy. Employing an RFID system has the potential to offer an immense payback: enhanced safety and security, reduced need for manned surveillance, real-time access to status and event history data, and overall cost-effectiveness. The Packaging Certification Program (PCP) in the U.S. Department of Energy's (DOE's) Office of Environmental Management (EM), Office of Packaging and Transportation (EM-63), is developing an RFID system for nuclear materials management. The system consists of battery-powered RFID tags with onboard sensors and memories, a reader network, application software, a database server and web pages. The tags monitor and record critical parameters, including the status of seals, movement of objects, and environmental conditions of the nuclear material packages in real time. They also provide instant warnings or alarms when preset thresholds for the sensors are exceeded. The information collected by the readers is transmitted to a dedicated central database server that can be accessed by authorized users across the DOE complex via a secured network. The onboard memory of the tags allows the materials manifest and event history data to reside with the packages throughout their life cycles in storage, transportation, and disposal. Data security is currently based on Advanced Encryption Standard-256. The software provides easy-to-use graphical interfaces that allow access to all vital information once the security and privilege requirements are met. An innovative scheme has been developed for managing batteries in service for more than 10 years without needing to be changed. A miniature onboard dosimeter is being developed for applications that require radiation surveillance. A field

  8. Comparison of RFID Systems for Tracking Clinical Interventions at the Bedside

    PubMed Central

    Ohashi, Kumiko; Ota, Sakiko; Ohno-Machado, Lucila; Tanaka, Hiroshi

    2008-01-01

    In recent years, there have been high expectations for RFID technologies applied in the medical field, particularly for automatic identification and location of patients and medical supplies. However, few studies have measured the applicability of currently available RFID technologies in a medical environment. To determine the technical factors that affect the performance of RFID systems, we examined the performance of different types of tags for medications, medical equipment, nurses, and patients under different experimental conditions. Three kinds of passive RFID tags and one active RFID tag were used in our study. Passive tags were affected by materials such as liquid and metal. Tags based on 13.56MHz were most suited for identifying medications. Tag placement was one of the main factors involved in correct identification of nurses, patients, and medical equipment. The results of this study may help decision makers decide whether (which) RFID technologies are useful for tracking clinical workflow. PMID:18998888

  9. Comparison of RFID systems for tracking clinical interventions at the bedside.

    PubMed

    Ohashi, Kumiko; Ota, Sakiko; Ohno-Machado, Lucila; Tanaka, Hiroshi

    2008-11-06

    In recent years, there have been high expectations for RFID technologies applied in the medical field, particularly for automatic identification and location of patients and medical supplies. However, few studies have measured the applicability of currently available RFID technologies in a medical environment. To determine the technical factors that affect the performance of RFID systems, we examined the performance of different types of tags for medications, medical equipment, nurses, and patients under different experimental conditions. Three kinds of passive RFID tags and one active RFID tag were used in our study. Passive tags were affected by materials such as liquid and metal. Tags based on 13.56MHz were most suited for identifying medications. Tag placement was one of the main factors involved in correct identification of nurses, patients, and medical equipment. The results of this study may help decision makers decide whether (which) RFID technologies are useful for tracking clinical workflow.

  10. Analysis of UHF RFID CMOS rectifier structures and input impedance characteristics

    NASA Astrophysics Data System (ADS)

    Jamali, Behnam; Ranasinghe, Damith C.; Cole, Peter H.

    2005-12-01

    Passive radio frequency identification (RFID) systems deployment efforts are revolutionizing supply chain logistics by providing unprecedented supply chain visibility. The widely used bandwidth of operation in modern systems is the UHF ISM (industrial, scientific, and medical) band. The performance of UHF RFID systems are largely reliant on low power CMOS circuits, efficient power rectification and the ability of RFID label antennas to match to the input impedance of the RFID label IC. This paper examines a new rectifying structure and considers it for its merits in RFID applications while analysing contribution of the rectifying structure to the input impedance of RFID chips as this is an important consideration in impedance matching to an external antenna.

  11. A System Implementation for Cooperation between UHF RFID Reader and TCP/IP Device

    NASA Astrophysics Data System (ADS)

    Lee, Sang Hoon; Jin, Ik Soo

    This paper presents a system implementation for cooperation between UHF RFID reader and TCP/IP device that can be used as a home gateway. The system consists of an UHF RFID tag, an UHF RFID reader, a RF end-device, a RF coordinator and a TCP/IP I/F. The UHF RFID reader is compatible with EPC Class-0/Gen1, Class-1/Gen1, 2 and ISO18000-6B, operating at the 915MHz. In particular, UHF RFID reader can be combined with a RF end device/coordinator for ZigBee(IEEE 802.15.4) interface which is low power wireless standard. The TCP/IP device is communicated with RFID reader via wired type. On the other hand, it is connected with ZigBee end-device via wireless type. The experimental results show that the developed system can provide the right networking.

  12. Analysis of Tobyhanna Army Depot’s Radio Frequency Identification (RFID) Pilot Program: RFID as an Asset Management Tool

    DTIC Science & Technology

    2005-06-01

    23 Susan Kuchinskas. U.K. Retailer Tests Smart Tags on Clothing. Ecommerce . October 16, 2003 24...Susan Kuchinskas. U.K. Retailer Tests Smart Tags on Clothing. Ecommerce . October 16, 2003. TradeLink-Ebiz.com. Tuning into RFID. October 2004

  13. ECRI audio conference focuses on RFID: the possible benefits are significant, but proceed slowly.

    PubMed

    2005-07-01

    This article highlights key points raised during ECRI's May 18, 2005, audio conference, "Radio-Frequency Identification (RFID) for Tracking Medical Devices: Planning for Today and Tomorrow." The conference gave attendees the opportunity to hear the experiences of two healthcare professionals managing RFID pilot programs at healthcare facilities. Information on ordering a recording of the event, including presentation materials and our recent Health Devices article on RFID, is provided at the end of this article.

  14. RFID Application Strategy in Agri-Food Supply Chain Based on Safety and Benefit Analysis

    NASA Astrophysics Data System (ADS)

    Zhang, Min; Li, Peichong

    Agri-food supply chain management (SCM), a management method to optimize internal costs and productivities, has evolved as an application of e-business technologies. These days, RFID has been widely used in many fields. In this paper, we analyze the characteristics of agri-food supply chain. Then the disadvantages of RFID are discussed. After that, we study the application strategies of RFID based on benefit and safety degree.

  15. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Defense Microelectronics Activity (DMEA)

    DTIC Science & Technology

    2011-12-01

    process must be considered. Whereas barcodes are read upon direct interaction with a scanner , RFID tags transmit sometimes indiscriminately. This can...grouped in the category of automatic identification technologies, along with barcodes , magnetic stripes, smart cards and biometrics. RFID uses...DISADVANTAGES The main rival technology to RFID is barcoding , which is very cheap, easy to use, and can have a high return on investment if the

  16. Performance Analysis of Effective Range and Orientation of UHF Passive RFID

    DTIC Science & Technology

    2008-03-01

    identify an object and retrieve data from the object that is later used for a particular application. The objects have an RFID tag attached or implanted ...around a ferrite rod that is connected to a capacitor leading to a microchip [2]. 6 Figure 2. Glass RFID Transponder [14] Another popular...PERFORMANCE ANALYSIS OF EFFECTIVE RANGE AND ORIENTATION FOR UHF PASSIVE RFID THESIS Paul N

  17. How Killdeer Mountain Manufacturing is Optimizing Aerospace Supply Chain Visibility Using RFID (Postprint)

    DTIC Science & Technology

    2008-02-01

    This project is a trial RFID Supply Chain Optimization pilot for the purpose of determining the optimal method to enhance supply chain capability and responsiveness by implementing RFID processes along with Lean/Six Sigma and e-commerce that is intended to be deployed into small and medium manufacturing and supply chain facilities. A key goal of this program is not only to comply with DOD shipping mandates, but also implement RFID solutions that will provide enhanced product visibility and reduced cost.

  18. Reducing False Negative Reads in RFID Data Streams Using an Adaptive Sliding-Window Approach

    PubMed Central

    Massawe, Libe Valentine; Kinyua, Johnson D. M.; Vermaak, Herman

    2012-01-01

    Unreliability of the data streams generated by RFID readers is among the primary factors which limit the widespread adoption of the RFID technology. RFID data cleaning is, therefore, an essential task in the RFID middleware systems in order to reduce reading errors, and to allow these data streams to be used to make a correct interpretation and analysis of the physical world they are representing. In this paper we propose an adaptive sliding-window based approach called WSTD which is capable of efficiently coping with both environmental variation and tag dynamics. Our experimental results demonstrate the efficacy of the proposed approach. PMID:22666027

  19. A secure 2G-RFID-Sys mechanism for applying to the medical emergency system.

    PubMed

    Chen, Yu-Yi; Wang, Yao-Jen; Jan, Jinn-Ke

    2013-06-01

    In the Medical Emergency System, any moment of delay in an emergency such as ambulance dispatch, ambulance diversion and clinical handover communication can significantly reduce a patient's chance of survival. Without the disadvantage of centralized management, a new type of RFID application named 2G-RFID-Sys will be more efficient. It is suitable for the tagged ambulance dispatch management in a huge range. In this article, the prototype of 2G-RFID-Sys and the responsibility of each participant are refined. We take an example of applying the 2G-RFID-Sys to the Medical Emergency System, the traffic condition of the ambulance will be able to ensure.

  20. Research on RFID technology in medical temperature measurement system and anti-collision

    NASA Astrophysics Data System (ADS)

    Zhao, Wenge

    2012-04-01

    RFID is a new technology developed in the nineties, using the wireless technology to achieve the non-contact data reading. It has a great advantage compared with traditional technology in reading data by wireless. And it is widely used in transportation, material management system, and medical areas etc. In this paper, it mainly introduces the RFID application in the field of medical temperature measurement system which can real-timely get and trace patient's temperature. Firstly, it introduces the structure of RFID, and then study and realizes the patient's temperature gathering and storage, lastly, realizing the RFID anti-collision algorithm.

  1. Array processing for RFID tag localization exploiting multi-frequency signals

    NASA Astrophysics Data System (ADS)

    Zhang, Yimin; Li, Xin; Amin, Moeness G.

    2009-05-01

    RFID is an increasingly valuable business and technology tool for electronically identifying, locating, and tracking products, assets, and personnel. As a result, precise positioning and tracking of RFID tags and readers have received considerable attention from both academic and industrial communities. Finding the position of RFID tags is considered an important task in various real-time locating systems (RTLS). As such, numerous RFID localization products have been developed for various applications. The majority of RFID positioning systems is based on the fusion of pieces of relevant information, such as the range and the direction-of-arrival (DOA). For example, trilateration can determine the tag position by using the range information of the tag estimated from three or more spatially separated reader antennas. Triangulation is another method to locate RFID tags that use the direction-of-arrival (DOA) information estimated at multiple spatially separated locations. The RFID tag positions can also be determined through hybrid techniques that combine the range and DOA information. The focus of this paper to study the design and performance of the localization of passive RFID tags using array processing techniques in a multipath environment, and exploiting multi-frequency CW signals. The latter are used to decorrelate the coherent multipath signals for effective DOA estimation and for the purpose of accurate range estimation. Accordingly, the spatial and frequency dimensionalities are fully utilized for robust and accurate positioning of RFID tags.

  2. RFID of next generation network for enhancing customer relationship management in healthcare industries.

    PubMed

    Alzahrani, Ahmed; Qureshi, Muhammad Shuaib; Thayananthan, Vijey

    2017-07-25

    This paper aims to analyze possible next generation of networked radio frequency identification (NGN-RFID) system for customer relationship management (CRM) in healthcare industries. Customer relationship and its management techniques in a specific healthcare industry are considered in this development. The key objective of using NGN-RFID scheme is to enhance the handling of patients' data to improve the CRM efficiency in healthcare industries. The proposed NGN-RFID system is one of the valid points to improve the ability of CRM by analyzing different prior and current traditional approaches. The legacy of customer relationship management will be improved by using this modern NGN-RFID technology without affecting the novelty.

  3. ECC-based grouping-proof RFID for inpatient medication safety.

    PubMed

    Lin, Qiping; Zhang, Fangguo

    2012-12-01

    Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.

  4. Entropy Bounds and Entanglement

    NASA Astrophysics Data System (ADS)

    Fisher, Zachary

    The generalized covariant entropy bound, or Bousso bound, is a holographic bound on the entropy of a region of space in a gravitational theory. It bounds the entropy passing through certain null surfaces. The bound remains non-trivial in the weak-gravity limit, and provides non-trivial constraints on the entropy of ordinary quantum states even in a regime where gravity is negligible. In the first half of this thesis, we present a proof of the Bousso bound in the weak-gravity regime within the framework of quantum field theory. The bound uses techniques from quantum information theory which relate the energy and entropy of quantum states. We present two proofs of the bound in free and interacting field theory. In the second half, we present a generalization of the Bousso bound called the quantum focussing conjecture. Our conjecture is a bound on the rate of entropy generation in a quantum field theory coupled semiclassically to gravity. The conjecture unifies and generalizes several ideas in holography. In particular, the quantum focussing conjecture implies a bound on entropies which is similar to, but subtly different from, the Bousso bound proven in the first half. The quantum focussing conjecture implies a novel non-gravitational energy condition, the quantum null energy condition, which gives a point-wise lower bound on the null-null component of the stress tensor of quantum matter. We give a proof of this bound in the context of free and superrenormalizable bosonic quantum field theory.

  5. [Distance Education.

    ERIC Educational Resources Information Center

    Wallace, Teri, Ed.; Weatherman, Dick, Ed.

    1995-01-01

    This newsletter theme issue on distance education serving individuals with disabilities considers historical developments, technology, staff training strategies, and staff training materials. It is noted that improving access to training for staff members can improve the quality of services for individuals with disabilities. The following articles…

  6. Quantifying detection performance of a passive low-frequency RFID system in an environmental preference chamber for laying hens

    USDA-ARS?s Scientific Manuscript database

    Radio Frequency Identification (RFID) systems have been widely used in production livestock systems for identifying, tracing, and registering animals and improving subsidy management. Adaptations have been made to extend RFID technology to animal behavior and welfare research. An RFID system was imp...

  7. A Cost Benefit Analysis of Radio Frequency Identification (RFID) Implementation at the Naval Postgraduate School’s Dudley Knox Library

    DTIC Science & Technology

    2006-12-01

    estimates. The qualitative analysis addressed the advantages and disadvantages of an RFID system as well as privacy and other ancillary issues...qualitative analysis addressed the advantages and disadvantages of an RFID system as well as privacy and other ancillary issues surrounding its...9 G. DISADVANTAGES OF LIBRARY RFID IMPLEMENTATION...........10 1. High Cost

  8. Temperature increase in the fetus exposed to UHF RFID readers.

    PubMed

    Fiocchi, Serena; Parazzini, Marta; Liorni, Ilaria; Samaras, Theodoros; Ravazzani, Paolo

    2014-07-01

    Exposure to electromagnetic fields (EMFs) has prominently increased during the last decades due to the rapid development of new technologies. Among the various devices emitting EMFs, those based on Radio-frequency identification (RFID) technologies are used in all aspects of everyday life, and expose people unselectively. This scenario could pose a potential risk for some groups of the general population, such as pregnant women, who are expected to be possibly more sensitive to the thermal effects produced by EMF exposure. This is the first paper that addresses the estimation of temperature rise in two pregnant women models exposed to ultrahigh frequency RFID by computational techniques. Results show that the maximum temperature increase of the fetus and of the pregnancy-related tissues is relatively high (even about 0.7 °C), not too far from the known threshold of biological effects. However, this increase is confined to a small volume in the tissues.

  9. Enhanced automated platform for 2D characterization of RFID communications

    NASA Astrophysics Data System (ADS)

    Vuza, Dan Tudor; Vlǎdescu, Marian

    2016-12-01

    The characterization of the quality of communication between an RFID reader and a transponder at all expected positions of the latter on the reader antenna is of primal importance for the evaluation of performance of an RFID system. Continuing the line of instruments developed for this purpose by the authors, the present work proposes an enhanced version of a previously introduced automated platform for 2D evaluation. By featuring higher performance in terms of mechanical speed, the new version allows to obtain 2D maps of communication with a higher resolution that would have been prohibitive in terms of test duration with the previous version. The list of measurement procedures that can be executed with the platform is now enlarged with additional ones, such as the determination of the variation of the magnetic coupling between transponder and antenna across the antenna surface and the utilization of transponder simulators for evaluation of the quality of communication.

  10. A flexible surface wetness sensor using a RFID technique.

    PubMed

    Yang, Cheng-Hao; Chien, Jui-Hung; Wang, Bo-Yan; Chen, Ping-Hei; Lee, Da-Sheng

    2008-02-01

    This paper presents a flexible wetness sensor whose detection signal, converted to a binary code, is transmitted through radio-frequency (RF) waves from a radio-frequency identification integrated circuit (RFID IC) to a remote reader. The flexible sensor, with a fixed operating frequency of 13.56 MHz, contains a RFID IC and a sensor circuit that is fabricated on a flexible printed circuit board (FPCB) using a Micro-Electro-Mechanical-System (MEMS) process. The sensor circuit contains a comb-shaped sensing area surrounded by an octagonal antenna with a width of 2.7 cm. The binary code transmitted from the RFIC to the reader changes if the surface conditions of the detector surface changes from dry to wet. This variation in the binary code can be observed on a digital oscilloscope connected to the reader.

  11. Lighten Encryption Schemes for Secure and Private RFID Systems

    NASA Astrophysics Data System (ADS)

    Canard, Sébastien; Coisel, Iwen; Etrog, Jonathan

    We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precisely, we give the first instantiation of the Vaudenay's result by using the IND-CCA secure DHAES cryptosystem. Next we argue that weaker cryptosystems can also be used by recalling the WIPR RFID system and giving a new protocol based on the El Gamal encryption scheme. After that, we introduce a new generic construction based on the use of any IND-CPA secure public key cryptosystem together with a MAC scheme and describe a possibility using the Hash El Gamal cryptosystem. We finally compare all these schemes, both in terms of implementation and security, proving that, nowadays the DHAES and our Hash El Gamal based solutions appear as the most promising schemes.

  12. Integration of a RFID System in a Social Robot

    NASA Astrophysics Data System (ADS)

    Corrales, A.; Salichs, M. A.

    This article presents the integration of a system of detection and identification of RFID tags in a social robot, with the goal of improving its sensorial system and to accomplish several specific tasks, such as: recognition of objects or navigation. For this purpose, basic skills of reading and writing have been designed, following the pattern of the basic element skill of the robot software architecture. The system has been implemented physically adding two RFID interrogators with built-in antenna to the sensorial robot system. The application has been implemented and tested as a skill in the detection of products such as medicines and diverse objects in order to assist visually impaired people, users of the third age and people who cannot read.

  13. An Application of RFID in Monitoring Agricultural Material Products

    NASA Astrophysics Data System (ADS)

    Du, Jianhui; Li, Peipei; Gao, Wanlin; Wang, Dezhong; Wang, Qing; Zhu, Yilong

    With the development of modern agriculture, more and more agricultural material products are used in it. While how to keep these things safe is a big problem at present, which needs to be paid more attention. This article develops an agricultural material products monitor system based on RFID which gives alarm as soon as possible if there is anything unmoral. Every warehouse exit is equipped with a RFID reader, while each agricultural material product has a tag on them. When passing though, the reader identifies the tag's information and transfer it to the PC, The PC inquiries the database storing all tags' information, and tells which one is not taken out legally by alarming aloud.

  14. FDA, companies test RFID tracking to prevent drug counterfeiting.

    PubMed

    James, John S

    2005-12-01

    The U.S. has an apparently growing problem with fake, counterfeit drugs entering the mainstream drug supply, and being fraudulently sold at full price in regular pharmacies and hospitals; some have no active ingredient, or too little, or substitute a cheap drug for an expensive one. The FDA has asked drug manufacturers to develop technology to track all shipments electronically as they move through the distribution chain; currently, RFID (radio frequency identification) is the preferred method for doing so. This article explains what is happening, and why we do not believe that this use of RFID is a privacy threat--though other privacy issues are among the most important questions we face today.

  15. Miniaturization design and implementation of magnetic field coupled RFID antenna

    NASA Astrophysics Data System (ADS)

    Hu, Tiling

    2013-03-01

    The development of internet of things has brought new opportunities and challenges to the application of RFID tags. Moreover, the Miniaturization application trend of tags at present has become the mainstream of development. In this paper, the double-layer design is to reduce the size of HF antenna, and the magnetic null point of magnetic reconnection region between the RLC resonant circuit and the reader provides sufficient energy to the miniaturization of antenna. The calculated and experimental results show that the miniaturization of HF antennas can meet the reading and writing requirement of the international standard ISO/IEC14443 standard. The results of this paper may make a positive contribution to the applications of RFID technology.

  16. A RFID grouping proof protocol for medication safety of inpatient.

    PubMed

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  17. Ultra Wide Band RFID Neutron Tags for Nuclear Materials Monitoring

    SciTech Connect

    Nekoogar, F; Dowla, F; Wang, T

    2010-01-27

    Recent advancements in the ultra-wide band Radio Frequency Identification (RFID) technology and solid state pillar type neutron detectors have enabled us to move forward in combining both technologies for advanced neutron monitoring. The LLNL RFID tag is totally passive and will operate indefinitely without the need for batteries. The tag is compact, can be directly mounted on metal, and has high performance in dense and cluttered environments. The LLNL coin-sized pillar solid state neutron detector has achieved a thermal neutron detection efficiency of 20% and neutron/gamma discrimination of 1E5. These performance values are comparable to a fieldable {sup 3}He based detector. In this paper we will discuss features about the two technologies and some potential applications for the advanced safeguarding of nuclear materials.

  18. An Gen2 Based Security Authentication Protocol for RFID System

    NASA Astrophysics Data System (ADS)

    Yi, Xiaoluo; Wang, Liangmin; Mao, Dongmei; Zhan, Yongzhao

    EPC Class-1 Generation-2 specification(Gen2 in brief) has been accepted as the standard for RFID tags under grant number ISO18000-6C. However, Gen2 does not pay due attention to security. For this reason, a Gen2 based security authentication protocol is developed in this paper. In details, we study the security requirements presented in the current Gen2 based RFID authentication protocols[7-13]. Then we point out the security flaws of Chien's mutual authentication protocol[7], and improve the protocol based on a 11 security requirements. Our improved protocol merely uses CRC and PRNG operations supported by Gen2 and meets the 11 security requirements. In contrast to the similar work [14,15] on Chien's protocol or other Gen2 based schemes, our protocol is more secure and our security analysis is much more comprehensive and qualitative.

  19. A Hybrid Positioning Strategy for Vehicles in a Tunnel Based on RFID and In-Vehicle Sensors

    PubMed Central

    Song, Xiang; Li, Xu; Tang, Wencheng; Zhang, Weigong; Li, Bin

    2014-01-01

    Many intelligent transportation system applications require accurate, reliable, and continuous vehicle positioning. How to achieve such positioning performance in extended GPS-denied environments such as tunnels is the main challenge for land vehicles. This paper proposes a hybrid multi-sensor fusion strategy for vehicle positioning in tunnels. First, the preliminary positioning algorithm is developed. The Radio Frequency Identification (RFID) technology is introduced to achieve preliminary positioning in the tunnel. The received signal strength (RSS) is used as an indicator to calculate the distances between the RFID tags and reader, and then a Least Mean Square (LMS) federated filter is designed to provide the preliminary position information for subsequent global fusion. Further, to improve the positioning performance in the tunnel, an interactive multiple model (IMM)-based global fusion algorithm is developed to fuse the data from preliminary positioning results and low-cost in-vehicle sensors, such as electronic compasses and wheel speed sensors. In the actual implementation of IMM, the strong tracking extended Kalman filter (STEKF) algorithm is designed to replace the conventional extended Kalman filter (EKF) to achieve model individual filtering. Finally, the proposed strategy is evaluated through experiments. The results validate the feasibility and effectiveness of the proposed strategy. PMID:25490581

  20. Creating TUIs Using RFID Sensors--A Case Study Based on the Literacy Process of Children with Down Syndrome.

    PubMed

    Jadán-Guerrero, Janio; Guerrero, Luis; López, Gustavo; Cáliz, Doris; Bravo, José

    2015-06-24

    Teaching children with intellectual disabilities is a big challenge for most parents and educators. Special education teachers use learning strategies to develop and enhance motivation for complex learning tasks. Literacy acquisition is an essential and life-long skill for a child with intellectual disabilities. In this context, technology can support specific strategies that will help children learn to read. This paper introduces a Tangible User Interface (TUI) system based on Radio Frequency Identification (RFID) technology to support literacy for children with Down syndrome. Our proposed system focuses on the integration of RFID tags in 3D printed objects and low cost toys. The paper describes the experience of using some materials covering the tags and the different problems related to the material and distance of radio wave propagation. The results of a preliminary evaluation in a special education institution showed that the system helps to improve the interaction between teachers and children. The use of a TUI seems to give a physical sensory experience to develop literacy skills in children with Down syndrome.

  1. Creating TUIs Using RFID Sensors—A Case Study Based on the Literacy Process of Children with Down Syndrome

    PubMed Central

    Jadán-Guerrero, Janio; Guerrero, Luis; López, Gustavo; Cáliz, Doris; Bravo, José

    2015-01-01

    Teaching children with intellectual disabilities is a big challenge for most parents and educators. Special education teachers use learning strategies to develop and enhance motivation for complex learning tasks. Literacy acquisition is an essential and life-long skill for a child with intellectual disabilities. In this context, technology can support specific strategies that will help children learn to read. This paper introduces a Tangible User Interface (TUI) system based on Radio Frequency Identification (RFID) technology to support literacy for children with Down syndrome. Our proposed system focuses on the integration of RFID tags in 3D printed objects and low cost toys. The paper describes the experience of using some materials covering the tags and the different problems related to the material and distance of radio wave propagation. The results of a preliminary evaluation in a special education institution showed that the system helps to improve the interaction between teachers and children. The use of a TUI seems to give a physical sensory experience to develop literacy skills in children with Down syndrome. PMID:26115455

  2. A hybrid positioning strategy for vehicles in a tunnel based on RFID and in-vehicle sensors.

    PubMed

    Song, Xiang; Li, Xu; Tang, Wencheng; Zhang, Weigong; Li, Bin

    2014-12-05

    Many intelligent transportation system applications require accurate, reliable, and continuous vehicle positioning. How to achieve such positioning performance in extended GPS-denied environments such as tunnels is the main challenge for land vehicles. This paper proposes a hybrid multi-sensor fusion strategy for vehicle positioning in tunnels. First, the preliminary positioning algorithm is developed. The Radio Frequency Identification (RFID) technology is introduced to achieve preliminary positioning in the tunnel. The received signal strength (RSS) is used as an indicator to calculate the distances between the RFID tags and reader, and then a Least Mean Square (LMS) federated filter is designed to provide the preliminary position information for subsequent global fusion. Further, to improve the positioning performance in the tunnel, an interactive multiple model (IMM)-based global fusion algorithm is developed to fuse the data from preliminary positioning results and low-cost in-vehicle sensors, such as electronic compasses and wheel speed sensors. In the actual implementation of IMM, the strong tracking extended Kalman filter (STEKF) algorithm is designed to replace the conventional extended Kalman filter (EKF) to achieve model individual filtering. Finally, the proposed strategy is evaluated through experiments. The results validate the feasibility and effectiveness of the proposed strategy.

  3. Viscosity bound versus the universal relaxation bound

    NASA Astrophysics Data System (ADS)

    Hod, Shahar

    2017-10-01

    For gauge theories with an Einstein gravity dual, the AdS/CFT correspondence predicts a universal value for the ratio of the shear viscosity to the entropy density, η / s = 1 / 4 π. The holographic calculations have motivated the formulation of the celebrated KSS conjecture, according to which all fluids conform to the lower bound η / s ≥ 1 / 4 π. The bound on η / s may be regarded as a lower bound on the relaxation properties of perturbed fluids and it has been the focus of much recent attention. In particular, it was argued that for a class of field theories with Gauss-Bonnet gravity dual, the shear viscosity to entropy density ratio, η / s, could violate the conjectured KSS bound. In the present paper we argue that the proposed violations of the KSS bound are strongly constrained by Bekenstein's generalized second law (GSL) of thermodynamics. In particular, it is shown that physical consistency of the Gauss-Bonnet theory with the GSL requires its coupling constant to be bounded by λGB ≲ 0 . 063. We further argue that the genuine physical bound on the relaxation properties of physically consistent fluids is ℑω(k > 2 πT) > πT, where ω and k are respectively the proper frequency and the wavenumber of a perturbation mode in the fluid.

  4. RFID-Based Asset Management for Space Habitats

    NASA Technical Reports Server (NTRS)

    Fink, Patrick W.

    2013-01-01

    Remote habitats are often densely packed - items necessary to sustain life - items necessary to conduct work center dot Inhabitant's time is often quite valuable, if not priceless. Resupply shipments can be infrequent and expensive. Inaccurate inventory knowledge can lead to unnecessary overstocking, which can lead to insufficient work and/or living volume. Not being able to find items when they are needed can present: - safety issues - morale issues. RFID technology has the potential solve a lot of these issues.

  5. Patient safety through RFID: vulnerabilities in recently proposed grouping protocols.

    PubMed

    Wickboldt, Anne-Katrin; Piramuthu, Selwyn

    2012-04-01

    As RFID-tagged systems become ubiquitous, acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past eight years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. Recently, the Journal of Medical Systems published two papers addressing security/privacy issues through cryptographic protocols. We consider the proposed protocols and identify some existing vulnerabilities.

  6. A Reliability Study of RFID Technology in a Fading Channel

    DTIC Science & Technology

    2007-06-01

    systems. Bit and tag error probabilities are computed for various OOK and M-CSK modulation schemes in a varying Nakagami - m fading channel, and the best...performing schemes are identified for future employment. 15. NUMBER OF PAGES 69 14. SUBJECT TERMS RFID, Fading Channel, Nakagami , On-off...and tag error probabilities are computed for various OOK and M-CSK modulation schemes in a varying Nakagami - m fading channel, and the best performing

  7. Rigorous bounds for optimal dynamical decoupling

    SciTech Connect

    Uhrig, Goetz S.; Lidar, Daniel A.

    2010-07-15

    We present rigorous performance bounds for the optimal dynamical decoupling pulse sequence protecting a quantum bit (qubit) against pure dephasing. Our bounds apply under the assumption of instantaneous pulses and of bounded perturbing environment and qubit-environment Hamiltonians such as those realized by baths of nuclear spins in quantum dots. We show that if the total sequence time is fixed the optimal sequence can be used to make the distance between the protected and unperturbed qubit states arbitrarily small in the number of applied pulses. If, on the other hand, the minimum pulse interval is fixed and the total sequence time is allowed to scale with the number of pulses, then longer sequences need not always be advantageous. The rigorous bound may serve as a testbed for approximate treatments of optimal decoupling in bounded models of decoherence.

  8. Optimization of RFID network planning using Zigbee and WSN

    NASA Astrophysics Data System (ADS)

    Hasnan, Khalid; Ahmed, Aftab; Badrul-aisham, Bakhsh, Qadir

    2015-05-01

    Everyone wants to be ease in their life. Radio frequency identification (RFID) wireless technology is used to make our life easier. RFID technology increases productivity, accuracy and convenience in delivery of service in supply chain. It is used for various applications such as preventing theft of automobiles, tolls collection without stopping, no checkout lines at grocery stores, managing traffic, hospital management, corporate campuses and airports, mobile asset tracking, warehousing, tracking library books, and to track a wealth of assets in supply chain management. Efficiency of RFID can be enhanced by integrating with wireless sensor network (WSN), zigbee mesh network and internet of things (IOT). The proposed system is used for identifying, sensing and real-time locating system (RTLS) of items in an indoor heterogeneous region. The system gives real-time richer information of object's characteristics, location and their environmental parameters like temperature, noise and humidity etc. RTLS reduce human error, optimize inventory management, increase productivity and information accuracy at indoor heterogeneous network. The power consumption and the data transmission rate of the system can be minimized by using low power hardware design.

  9. Influence of RFID tags on recyclability of plastic packaging.

    PubMed

    Aliaga, César; Ferreira, Beatriz; Hortal, Mercedes; Pancorbo, María Ángeles; López, José Manuel; Navas, Francisco Javier

    2011-06-01

    The use of Radio Frequency IDentification Technology (RFID) in the packaging sector is an important logistical improvement regarding the advantages offered by this technology in comparison with barcodes. Nevertheless, the presence of these devices in plastic packaging, and consequently in plastic waste, can cause several problems in the recycling plants due to the materials included in these devices. In this study, the mentioned recycling constraints have been experimentally identified in a pilot scale recycling study consisting in three recycling tests with an increasing presence of RFID tags. Differences in each test were evaluated. Furthermore, the quality of the recycled material of each test was studied through the injection and testing of tests probes. The results of the pilot scale recycling tests did not show a decrease in the quality of the recycled plastic due to the presence of RFID tags. Nevertheless, several operational problems during the recycling process were observed such as the obstruction of the screens, which lessened the process yield and created process interruptions, as well as the loss of extruded plastic during the process. These recycling constraints cannot be directly extrapolated to the industrial plants due to the different working scales. Nevertheless, technological solutions are proposed in order to avoid these recycling constraints if they appear.

  10. A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme

    PubMed Central

    Yang, Ming Hour; Luo, Jia Ning; Lu, Shao Yong

    2015-01-01

    To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping proofs because of the considerable amount of time it takes to scan a high number of tags. Thus, applying grouping proof methods in the current logistics industry is difficult. To solve this problem, this paper proposes a method for generating multilayered offline grouping proofs. The proposed method provides tag anonymity; moreover, resolving disputes between recipients and transporters over the integrity of cargo deliveries can be expedited by generating grouping proofs and automatically authenticating the consistency between the receipt proof and pick proof. The proposed method can also protect against replay attacks, multi-session attacks, and concurrency attacks. Finally, experimental results verify that, compared with other methods for generating grouping proofs, the proposed method can efficiently generate offline grouping proofs involving several parties in a supply chain using mobile RFID. PMID:26512673

  11. Using RFID yoking proof protocol to enhance inpatient medication safety.

    PubMed

    Chen, Chin-Ling; Wu, Chun-Yi

    2012-10-01

    The low birth rate has led to an aging society; the burgeoning number of elderly patients may affect the medical quality and result in negative medical incidents. There are many factors that lead to medical errors, such as similar medication names, erroneous labels and packaging, as well as staff shortages, fatigue and carelessness. Determining how to reduce medical errors has become an important issue. As RFID exhibits powerful identification characteristics, it can help nurses to quickly identify patients and their corresponding medicine. Currently, there are numerous practical applications for improving the efficiency of Radio Frequency Identification (RFID) systems. In this paper, we use an RFID yoking proof mechanism which conforms to EPCglobal Class 1 Generation 2 standards to improve patient safety and reduce medical errors. Our scheme can achieve different goals such as resist numerous known attacks, achieve mutual authentication, anonymity and non-repudiation. It also provides a practical medical care and offer higher quality of medical care. The pharmacist cannot deny that this prescription was confirmed for the patient and the nurse cannot also deny he or she dispensed this medicine to the patient for protecting the patients' interests.

  12. A comprehensive RFID solution to enhance inpatient medication safety.

    PubMed

    Peris-Lopez, Pedro; Orfila, Agustin; Mitrokotsa, Aikaterini; van der Lubbe, Jan C A

    2011-01-01

    Errors involving medication administration can be costly, both in financial and in human terms. Indeed, there is much potential for errors due to the complexity of the medication administration process. Nurses are often singled out as the only responsible of these errors because they are in charge of drug administration. Nevertheless, the interventions of every actor involved in the process and the system design itself contribute to errors (Wakefield et al. (1998). Proper inpatient medication safety systems can help to reduce such errors in hospitals. In this paper, we review in depth two recent proposals (Chien et al. (2010); Huang and Ku (2009)) that pursue the aforementioned objective. Unfortunately, they fail in their attempt mainly due to their security faults but interesting ideas can be drawn from both. These security faults refer to impersonation and replay attacks that could produce the generation of a forged proof stating that certain medication was administered to an inpatient when it was not. We propose a leading-edge solution to enhance inpatient medication safety based on RFID technology that overcomes these weaknesses. Our solution, named Inpatient Safety RFID system (IS-RFID), takes into account the Information Technology (IT) infrastructure of a hospital and covers every phase of the drug administration process. From a practical perspective, our system can be easily integrated within hospital IT infrastructures, has a moderate cost, is very ease to use and deals with security aspects as a key point.

  13. A reliable RFID mutual authentication scheme for healthcare environments.

    PubMed

    Wu, Zhen-Yu; Chen, Lichin; Wu, Ju-Chuan

    2013-04-01

    Radio frequency identification (RFID) applications have the potential to increase the reliability of healthcare environments. However, there are obvious security and privacy concerns with regard to storing personal and medical data in RFID tags, and the lack of secure authentication systems in healthcare environments remains as a challenge the further use of this technology, one that touches on issues of confidentiality, unforgeability, location privacy, and scalability. This study proposes a novel mutual authentication protocol that considers all of these issues and solves the tradeoff between location privacy and scalability in healthcare environments. A formal proof and analysis is demonstrated to prove the effectiveness of the proposed scheme, and that high reliability has and can be easily deployed and managed. This study also provides a scenario example that applied proposed protocol in the newborn care and management. The result shows that the proposed scheme solves the related tradeoff problem, and is capable of providing both location privacy and scalability. To apply the authentication scheme proposed in this work would be able to increase confidence in future implementations of RFID systems in healthcare environments.

  14. Position Statement in RFID S&P Panel: RFID and the Middleman

    NASA Astrophysics Data System (ADS)

    Anderson, Ross

    Existing bank-card payment systems, such as EMV, have two serious vulnerabilities: the user does not have a trustworthy interface, and the protocols are vulnerable in a number of ways to man-in-the-middle attacks. Moving to RFID payments may, on the one hand, let bank customers use their mobile phones to make payments, which will go a fair way towards fixing the interface problem; on the other hand, protocol vulnerabilities may become worse. By 2011 the NFC vendors hope there will be 500,000,000 NFC-enabled mobile phones in the world. If these devices can act as cards or terminals, can be programmed by their users, and can communicate with each other, then they will provide a platform for deploying all manner of protocol attacks. Designing the security protocols to mitigate such attacks may be difficult. First, it will include most of the hot topics of IT policy over the last ten years (from key escrow through DRM to platform trust and accessory control) as subproblems. Second, the incentives may lead the many players to try to dump the liability on each other, leading to overall system security that is equivalent to the weakest link rather than to sum-of-efforts and is thus suboptimal.

  15. RFID-Based Vehicle Positioning and Its Applications in Connected Vehicles

    PubMed Central

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-01-01

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control. PMID:24599188

  16. RFID-based vehicle positioning and its applications in connected vehicles.

    PubMed

    Wang, Jianqiang; Ni, Daiheng; Li, Keqiang

    2014-03-04

    This paper proposed an RFID-based vehicle positioning approach to facilitate connected vehicles applications. When a vehicle passes over an RFID tag, the vehicle position is given by the accurate position stored in the tag. At locations without RFID coverage, the vehicle position is estimated from the most recent tag location using a kinematics integration algorithm till updates from the next tag. The accuracy of RFID positioning is verified empirically in two independent ways with one using radar and the other a photoelectric switch. The former is designed to verify whether the dynamic position obtained from RFID tags matches the position measured by radar that is regarded as accurate. The latter aims to verify whether the position estimated from the kinematics integration matches the position obtained from RFID tags. Both means supports the accuracy of RFID-based positioning. As a supplement to GPS which suffers from issues such as inaccuracy and loss of signal, RFID positioning is promising in facilitating connected vehicles applications. Two conceptual applications are provided here with one in vehicle operational control and the other in Level IV intersection control.

  17. Design of a Covert RFID Tag Network for Target Discovery and Target Information Routing

    PubMed Central

    Pan, Qihe; Narayanan, Ram M.

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag’s location is saved at command center, which can determine where a RFID tag is located based on each RFID tag’s ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design. PMID:22163693

  18. Design of a covert RFID tag network for target discovery and target information routing.

    PubMed

    Pan, Qihe; Narayanan, Ram M

    2011-01-01

    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  19. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Radio Frequency... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  20. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Radio Frequency... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  1. 48 CFR 552.211-92 - Radio Frequency Identification (RFID) using passive tags.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Radio Frequency... Provisions and Clauses 552.211-92 Radio Frequency Identification (RFID) using passive tags. As prescribed in 511.204(b)(11), insert the following clause: Radio Frequency Identification (RFID) Using Passive Tags...

  2. Secure Integration of Radio Frequency Identification (RFID) Technology into a Supply Chain

    DTIC Science & Technology

    2005-09-01

    Considerations[2]. RFID Tag suppliers include: Alien Technology – http://www.alientechnology.com Avery Dennison – http://www.averydennison.com...durable than bar code labels[1]. However, both rely on the some sort of adhesive to attach them to the item. The most vulnerable portion of an RFID tag is

  3. Autonomous Navigation System for Mobile Robot Using Randomly Distributed Passive RFID Tags

    NASA Astrophysics Data System (ADS)

    Park, Sunhong; Hashimoto, Shuji

    This paper presents an autonomous navigation system for a mobile robot using randomly distributed passive RFID tags. In the case of randomly distributed RFID tags, it is difficult to provide the precise location of the robot especially in the area of sparse RFID tag distribution. This, combined with the wide turning radius of the robot, can cause the robot to enter a zigzag exploration path and miss the goal. In RFID-based navigation, the key is to reduce both the number of RFID tags and the localization error for practical use in a large space. To cope with these, we utilized the Read time, which measures the reading time of each RFID tag. With this, we could estimate accurately the localization and orientation without using any external sensors or increasing the RFID tags. The average estimation errors of 7.8cm in localization and 11 degrees in orientation were achieved with 102 RFID tags in the area of 4.2m by 6.2m. Our proposed method is verified with the path trajectories produced during navigation compared with conventional approaches.

  4. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    EPA Science Inventory

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  5. High-level managers' considerations for RFID adoption in hospitals: an empirical study in Taiwan.

    PubMed

    Lai, Hui-Min; Lin, I-Chun; Tseng, Ling-Tzu

    2014-02-01

    Prior researches have indicated that an appropriate adoption of information technology (IT) can help hospitals significantly improve services and operations. Radio Frequency Identification (RFID) is believed to be the next generation innovation technology for automatic data collection and asset/people tracking. Based on the Technology-Organization-Environment (TOE) framework, this study investigated high-level managers' considerations for RFID adoption in hospitals. This research reviewed literature related IT adoption in business and followed the results of a preliminary survey with 37 practical experts in hospitals to theorize a model for the RFID adoption in hospitals. Through a field survey of 102 hospitals and hypotheses testing, this research identified key factors influencing RFID adoption. Follow-up in-depth interviews with three high-level managers of IS department from three case hospitals respectively also presented an insight into the decision of RFID's adoption. Based on the research findings, cost, ubiquity, compatibility, security and privacy risk, top management support, hospital scale, financial readiness and government policy were concluded to be the key factors influencing RFID adoption in hospitals. For practitioners, this study provided a comprehensive overview of government policies able to promote the technology, while helping the RFID solution providers understand how to reduce the IT barriers in order to enhance hospitals' willingness to adopt RFID.

  6. RFID Tag as a Sensor - A Review on the Innovative Designs and Applications

    NASA Astrophysics Data System (ADS)

    Meng, Zhaozong; Li, Zhen

    2016-12-01

    The Radio Frequency Identification (RFID) technology has gained interests in both academia and industry since its invention. In addition to the applications in access control and supply chain, RFID is also a cost-efficient solution for Non-Destructive Testing (NDT) and pervasive monitoring. The battery free RFID tags are used as independent electromagnetic sensors or energy harvesting and data transmission interface of sensor modules for different measurement purposes. This review paper aims to provide a comprehensive overview of the innovative designs and applications of RFID sensor technology with new insights, identify the technical challenges, and outline the future perspectives. With a brief introduction to the fundamentals of RFID measurement, the enabling technologies and recent technical progress are illustrated, followed by an extensive discussion of the novel designs and applications. Then, based on an in-depth analysis, the potential constraints are identified and the envisaged future directions are suggested, including printable/wearable RFID, System-on-Chip (SoC), ultra-low power, etc. The comprehensive discussion of RFID sensor technology will be inspirational and useful for academic and industrial communities in investigating, developing, and applying RFID for various measurement applications.

  7. Impact of RFID on Retail Value Chain: A Mixed Method Study

    ERIC Educational Resources Information Center

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  8. Impact of RFID on Retail Value Chain: A Mixed Method Study

    ERIC Educational Resources Information Center

    Bhattacharya, Mithu

    2011-01-01

    Radio Frequency Identification (RFID) mandates by large retailers and various government agencies have driven a large number of organizations to roll out the technology. Despite these commitments the business case for RFID is far from reality and is still at its infancy. This dissertation work aims at providing realistic perspective on the…

  9. USE OF RFID TO TRACK HAZARDOUS WASTE SHIPMENTS ACROSS DOMESTIC AND INTERNATIONAL BORDERS

    EPA Science Inventory

    Radio-frequency identification system (RFID) is an emerging commodity tracking technology that is being tested and implemented in a large number of applications worldwide. RFID is a method of transmitting data using radio waves, usually through communication with a tag. Both ac...

  10. Efficient Method of Achieving Agreements between Individuals and Organizations about RFID Privacy

    NASA Astrophysics Data System (ADS)

    Cha, Shi-Cho

    This work presents novel technical and legal approaches that address privacy concerns for personal data in RFID systems. In recent years, to minimize the conflict between convenience and the privacy risk of RFID systems, organizations have been requested to disclose their policies regarding RFID activities, obtain customer consent, and adopt appropriate mechanisms to enforce these policies. However, current research on RFID typically focuses on enforcement mechanisms to protect personal data stored in RFID tags and prevent organizations from tracking user activity through information emitted by specific RFID tags. A missing piece is how organizations can obtain customers' consent efficiently and flexibly. This study recommends that organizations obtain licenses automatically or semi-automatically before collecting personal data via RFID technologies rather than deal with written consents. Such digitalized and standard licenses can be checked automatically to ensure that collection and use of personal data is based on user consent. While individuals can easily control who has licenses and license content, the proposed framework provides an efficient and flexible way to overcome the deficiencies in current privacy protection technologies for RFID systems.

  11. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    DTIC Science & Technology

    2007-12-01

    decision process to adopt DoD mandates for RFID and UID, it is important to understand what role these individuals serve within the organization. The...Awareness of DoD Mandates for RFID and UID Implementation ....28 3. Influencers vs. Decision Makers...41 a. Reasons for Buying the Equipment ............................................41 b. Reason for Outsourcing the Process

  12. Event Management of RFID Data Streams: Fast Moving Consumer Goods Supply Chains

    NASA Astrophysics Data System (ADS)

    Mo, John P. T.; Li, Xue

    Radio Frequency Identification (RFID) is a wireless communication technology that uses radio-frequency waves to transfer information between tagged objects and readers without line of sight. This creates tremendous opportunities for linking real world objects into a world of "Internet of things". Application of RFID to Fast Moving Consumer Goods sector will introduce billions of RFID tags in the world. Almost everything is tagged for tracking and identification purposes. This phenomenon will impose a new challenge not only to the network capacity but also to the scalability of processing of RFID events and data. This chapter uses two national demonstrator projects in Australia as case studies to introduce an event managementframework to process high volume RFID data streams in real time and automatically transform physical RFID observations into business-level events. The model handles various temporal event patterns, both simple and complex, with temporal constraints. The model can be implemented in a data management architecture that allows global RFID item tracking and enables fast, large-scale RFID deployment.

  13. RFID Meets GWOT: Considering a New Technology for a New Kind of War

    DTIC Science & Technology

    2006-06-01

    Patrick Sweeny, RFID for Dummies (Hoboken: Wiley Publishing, Inc., 2005), 17. 18 Figure 7. Speedpass tag. (From: RFI Sourcebook, p. 81...New York: McGraw Hill, 2005. Sweeny, Patrick. RFID for Dummies . Hoboken: Wiley Publishing, Inc., 2005. Tiernan, Robert, ed. “The End of Privacy

  14. Bound states and the Bekenstein bound

    SciTech Connect

    Bousso, Raphael

    2003-10-16

    We explore the validity of the generalized Bekenstein bound, S<= pi M a. We define the entropy S as the logarithm of the number of states which have energy eigenvalue below M and are localized to a flat space region of width alpha. If boundary conditions that localize field modes are imposed by fiat, then the bound encounters well-known difficulties with negative Casimir energy and large species number, as well as novel problems arising only in the generalized form. In realistic systems, however, finite-size effects contribute additional energy. We study two different models for estimating such contributions. Our analysis suggests that the bound is both valid and nontrivial if interactions are properly included, so that the entropy S counts the bound states of interacting fields.

  15. Voronoi Diagrams Without Bounding Boxes

    NASA Astrophysics Data System (ADS)

    Sang, E. T. K.

    2015-10-01

    We present a technique for presenting geographic data in Voronoi diagrams without having to specify a bounding box. The method restricts Voronoi cells to points within a user-defined distance of the data points. The mathematical foundation of the approach is presented as well. The cell clipping method is particularly useful for presenting geographic data that is spread in an irregular way over a map, as for example the Dutch dialect data displayed in Figure 2. The automatic generation of reasonable cell boundaries also makes redundant a frequently used solution to this problem that requires data owners to specify region boundaries, as in Goebl (2010) and Nerbonne et al (2011).

  16. Documentation pckage for the RFID temperature monitoring system (Of Model 9977 packages at NTS).

    SciTech Connect

    Chen, K.; Tsai, H.; Decision and Information Sciences

    2009-02-20

    The technical basis for extending the Model 9977 shipping package periodic maintenance beyond the one-year interval to a maximum of five years is based on the performance of the O-ring seals and the environmental conditions. The DOE Packaging Certification Program (PCP) has tasked Argonne National Laboratory to develop a Radio-Frequency Identification (RFID) temperature monitoring system for use by the facility personnel at DAF/NTS. The RFID temperature monitoring system, depicted in the figure below, consists of the Mk-1 RFId tags, a reader, and a control computer mounted on a mobile platform that can operate as a stand-alone system, or it can be connected to the local IT network. As part of the Conditions of Approval of the CoC, the user must complete the prescribed training to become qualified and be certified for operation of the RFID temperature monitoring system. The training course will be administered by Argonne National Laboratory on behalf of the Headquarters Certifying Official. This is a complete documentation package for the RFID temperature monitoring system of the Model 9977 packagings at NTS. The documentation package will be used for training and certification. The table of contents are: Acceptance Testing Procedure of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Acceptance Testing Result of MK-1 RFID Tags for DOE/EM Nuclear Materials Management Applications; Performance Test of the Single Bolt Seal Sensor for the Model 9977 Packaging; Calibration of Built-in Thermistors in RFID Tags for Nevada Test Site; Results of Calibration of Built-in Thermistors in RFID Tags; Results of Thermal Calibration of Second Batch of MK-I RFID Tags; Procedure for Installing and Removing MK-1 RFID Tag on Model 9977 Drum; User Guide for RFID Reader and Software for Temperature Monitoring of Model 9977 Drums at NTS; Software Quality Assurance Plan (SQAP) for the ARG-US System; Quality Category for the RFID Temperature Monitoring System; The

  17. Impact of radio-frequency identification (RFID) technologies on the hospital supply chain: a literature review.

    PubMed

    Coustasse, Alberto; Tomblin, Shane; Slack, Chelsea

    2013-01-01

    Supply costs account for more than one-third of the average operating budget and constitute the second largest expenditure in hospitals. As hospitals have sought to reduce these costs, radio-frequency identification (RFID) technology has emerged as a solution. This study reviews existing literature to gauge the recent and potential impact and direction of the implementation of RFID in the hospital supply chain to determine current benefits and barriers of adoption. Findings show that the application of RFID to medical equipment and supplies tracking has resulted in efficiency increases in hospitals with lower costs and increased service quality. RFID technology can reduce costs, improve patient safety, and improve supply chain management effectiveness by increasing the ability to track and locate equipment, as well as monitoring theft prevention, distribution management, and patient billing. Despite ongoing RFID implementation in the hospital supply chain, barriers to widespread and rapid adoption include significant total expenditures, unclear return on investment, and competition with other strategic imperatives.

  18. RFID technology in health environment opportunities and challenges for modern cancer care.

    PubMed

    Safdari, Reza; Maserat, Elham; Maserat, Elnaz

    2012-01-01

    Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

  19. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    PubMed

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  20. Energy efficient in-network RFID data filtering scheme in wireless sensor networks.

    PubMed

    Bashir, Ali Kashif; Lim, Se-Jung; Hussain, Chauhdary Sajjad; Park, Myong-Soon

    2011-01-01

    RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes' energy and affects network lifetime. In this paper, we propose an in-network RFID data filtering scheme that efficiently eliminates the duplicate data. For this we use a clustering mechanism where cluster heads eliminate duplicate data and forward filtered data towards the base station. Simulation results prove that our approach saves considerable amounts of energy in terms of communication and computational cost, compared to existing filtering schemes.

  1. A multi-domain trust management model for supporting RFID applications of IoT.

    PubMed

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  2. Cluster-Based Multipolling Sequencing Algorithm for Collecting RFID Data in Wireless LANs

    NASA Astrophysics Data System (ADS)

    Choi, Woo-Yong; Chatterjee, Mainak

    2015-03-01

    With the growing use of RFID (Radio Frequency Identification), it is becoming important to devise ways to read RFID tags in real time. Access points (APs) of IEEE 802.11-based wireless Local Area Networks (LANs) are being integrated with RFID networks that can efficiently collect real-time RFID data. Several schemes, such as multipolling methods based on the dynamic search algorithm and random sequencing, have been proposed. However, as the number of RFID readers associated with an AP increases, it becomes difficult for the dynamic search algorithm to derive the multipolling sequence in real time. Though multipolling methods can eliminate the polling overhead, we still need to enhance the performance of the multipolling methods based on random sequencing. To that extent, we propose a real-time cluster-based multipolling sequencing algorithm that drastically eliminates more than 90% of the polling overhead, particularly so when the dynamic search algorithm fails to derive the multipolling sequence in real time.

  3. General Framework for Animal Food Safety Traceability Using GS1 and RFID

    NASA Astrophysics Data System (ADS)

    Cao, Weizhu; Zheng, Limin; Zhu, Hong; Wu, Ping

    GS1 is global traceability standard, which is composed by the encoding system (EAN/UCC, EPC), the data carriers identified automatically (bar codes, RFID), electronic data interchange standards (EDI, XML). RFID is a non-contact, multi-objective automatic identification technique. Tracing of source food, standardization of RFID tags, sharing of dynamic data are problems to solve urgently for recent traceability systems. The paper designed general framework for animal food safety traceability using GS1 and RFID. This framework uses RFID tags encoding with EPCglobal tag data standards. Each information server has access tier, business tier and resource tier. These servers are heterogeneous and distributed, providing user access interfaces by SOAP or HTTP protocols. For sharing dynamic data, discovery service and object name service are used to locate dynamic distributed information servers.

  4. A multi-domain trust management model for supporting RFID applications of IoT

    PubMed Central

    Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate. PMID:28708855

  5. WiFi RFID demonstration for resource tracking in a statewide disaster drill.

    PubMed

    Cole, Stacey L; Siddiqui, Javeed; Harry, David J; Sandrock, Christian E

    2011-01-01

    To investigate the capabilities of Radio Frequency Identification (RFID) tracking of patients and medical equipment during a simulated disaster response scenario. RFID infrastructure was deployed at two small rural hospitals, in one large academic medical center and in two vehicles. Several item types from the mutual aid equipment list were selected for tracking during the demonstration. A central database server was installed at the UC Davis Medical Center (UCDMC) that collected RFID information from all constituent sites. The system was tested during a statewide disaster drill. During the drill, volunteers at UCDMC were selected to locate assets using the traditional method of locating resources and then using the RFID system. This study demonstrated the effectiveness of RFID infrastructure in real-time resource identification and tracking. Volunteers at UCDMC were able to locate assets substantially faster using RFID, demonstrating that real-time geolocation can be substantially more efficient and accurate than traditional manual methods. A mobile, Global Positioning System (GPS)-enabled RFID system was installed in a pediatric ambulance and connected to the central RFID database via secure cellular communication. This system is unique in that it provides for seamless region-wide tracking that adaptively uses and seamlessly integrates both outdoor cellular-based mobile tracking and indoor WiFi-based tracking. RFID tracking can provide a real-time picture of the medical situation across medical facilities and other critical locations, leading to a more coordinated deployment of resources. The RFID system deployed during this study demonstrated the potential to improve the ability to locate and track victims, healthcare professionals, and medical equipment during a region-wide disaster.

  6. Measuring the drinking behaviour of individual pigs housed in group using radio frequency identification (RFID).

    PubMed

    Maselyne, J; Adriaens, I; Huybrechts, T; De Ketelaere, B; Millet, S; Vangeyte, J; Van Nuffel, A; Saeys, W

    2016-09-01

    Changes in the drinking behaviour of pigs may indicate health, welfare or productivity problems. Automated monitoring and analysis of drinking behaviour could allow problems to be detected, thus improving farm productivity. A high frequency radio frequency identification (HF RFID) system was designed to register the drinking behaviour of individual pigs. HF RFID antennas were placed around four nipple drinkers and connected to a reader via a multiplexer. A total of 55 growing-finishing pigs were fitted with radio frequency identification (RFID) ear tags, one in each ear. RFID-based drinking visits were created from the RFID registrations using a bout criterion and a minimum and maximum duration criterion. The HF RFID system was successfully validated by comparing RFID-based visits with visual observations and flow meter measurements based on visit overlap. Sensitivity was at least 92%, specificity 93%, precision 90% and accuracy 93%. RFID-based drinking duration had a high correlation with observed drinking duration (R 2=0.88) and water usage (R 2=0.71). The number of registrations after applying the visit criteria had an even higher correlation with the same two variables (R 2=0.90 and 0.75, respectively). There was also a correlation between number of RFID visits and number of observed visits (R 2=0.84). The system provides good quality information about the drinking behaviour of individual pigs. As health or other problems affect the pigs' drinking behaviour, analysis of the RFID data could allow problems to be detected and signalled to the farmer. This information can help to improve the productivity and economics of the farm as well as the health and welfare of the pigs.

  7. On the optimal identification of tag sets in time-constrained RFID configurations.

    PubMed

    Vales-Alonso, Javier; Bueno-Delgado, María Victoria; Egea-López, Esteban; Alcaraz, Juan José; Pérez-Mañogil, Juan Manuel

    2011-01-01

    In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags.

  8. On the Optimal Identification of Tag Sets in Time-Constrained RFID Configurations

    PubMed Central

    Vales-Alonso, Javier; Bueno-Delgado, María Victoria; Egea-López, Esteban; Alcaraz, Juan José; Pérez-Mañogil, Juan Manuel

    2011-01-01

    In Radio Frequency Identification facilities the identification delay of a set of tags is mainly caused by the random access nature of the reading protocol, yielding a random identification time of the set of tags. In this paper, the cumulative distribution function of the identification time is evaluated using a discrete time Markov chain for single-set time-constrained passive RFID systems, namely those ones where a single group of tags is assumed to be in the reading area and only for a bounded time (sojourn time) before leaving. In these scenarios some tags in a set may leave the reader coverage area unidentified. The probability of this event is obtained from the cumulative distribution function of the identification time as a function of the sojourn time. This result provides a suitable criterion to minimize the probability of losing tags. Besides, an identification strategy based on splitting the set of tags in smaller subsets is also considered. Results demonstrate that there are optimal splitting configurations that reduce the overall identification time while keeping the same probability of losing tags. PMID:22163777

  9. SURBAL: computerized metes and bounds surveying

    Treesearch

    Roger N. Baughman; James H. Patric

    1970-01-01

    A computer program has been developed at West Virginia University for use in metes and bounds surveying. Stations, slope distances, slope angles, and bearings are primary information needed for this program. Other information needed may include magnetic deviation, acceptable closure error, desired map scale, and title designation. SURBAL prints out latitudes and...

  10. A framework for performance and data quality assessment of Radio Frequency IDentification (RFID) systems in health care settings.

    PubMed

    van der Togt, Remko; Bakker, Piet J M; Jaspers, Monique W M

    2011-04-01

    RFID offers great opportunities to health care. Nevertheless, prior experiences also show that RFID systems have not been designed and tested in response to the particular needs of health care settings and might introduce new risks. The aim of this study is to present a framework that can be used to assess the performance of RFID systems particularly in health care settings. We developed a framework describing a systematic approach that can be used for assessing the feasibility of using an RFID technology in a particular healthcare setting; more specific for testing the impact of environmental factors on the quality of RFID generated data and vice versa. This framework is based on our own experiences with an RFID pilot implementation in an academic hospital in The Netherlands and a literature review concerning RFID test methods and current insights of RFID implementations in healthcare. The implementation of an RFID system within the blood transfusion chain inside a hospital setting was used as a show case to explain the different phases of the framework. The framework consists of nine phases, including an implementation development plan, RFID and medical equipment interference tests, data accuracy- and data completeness tests to be run in laboratory, simulated field and real field settings. The potential risks that RFID technologies may bring to the healthcare setting should be thoroughly evaluated before they are introduced into a vital environment. The RFID performance assessment framework that we present can act as a reference model to start an RFID development, engineering, implementation and testing plan and more specific, to assess the potential risks of interference and to test the quality of the RFID generated data potentially influenced by physical objects in specific health care environments. Copyright © 2010 Elsevier Inc. All rights reserved.

  11. New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities

    NASA Technical Reports Server (NTRS)

    Mceliece, R. J.; Rodemich, E. R.; Rumsey, H., Jr.; Welch, L. R.

    1977-01-01

    An upper bound on the rate of a binary code as a function of minimum code distance (using a Hamming code metric) is arrived at from Delsarte-MacWilliams inequalities. The upper bound so found is asymptotically less than Levenshtein's bound, and a fortiori less than Elias' bound. Appendices review properties of Krawtchouk polynomials and Q-polynomials utilized in the rigorous proofs.

  12. 18,000 displacement vectors and 44 positions surveys of RFID tracers show a normal diffusion of the bedload in a proglacial stream (Bossons glacier, France)

    NASA Astrophysics Data System (ADS)

    Guillon, Hervé; Mugnier, Jean-Louis; Buoncristiani, Jean-François

    2016-04-01

    distributions were tested against the observed travel distances. Regardless of the time scale, heavy- and light-tailed distributions provide a convincing statistical description of measured data. No single distribution is significantly better than the others. Conversely, the distribution of tracers positions in the system and its time evolution is best described by the normal distribution. Its standard deviation scales with time as σ ∝ t0.45±0.12 which suggests a nearly normal diffusive behaviour. The measured virtual velocities and a simple probabilistic model using the time evolution of the mean (i.e. drift) and standard deviation (i.e diffusion) show that the mean bedload transfer time is greater than 5 years. RFID tracers appear as a promising tool to investigate stochastic characteristics of bedload transport.

  13. Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks

    DTIC Science & Technology

    2006-01-01

    than preventing or deterring, collusion attacks. We show that colluding verifiers who are capable of implementing wormhole attacks can defeat even...away. We will illustrate this using (a) standard collusion and also (b) wormhole in Figure 2. A wormhole attack is one in which a fast link is set up...be- tween the victims and an attacker who is outside of the normal range. The wormhole attack may appear to be an overkill for this problem since

  14. Physical Uncertainty Bounds (PUB)

    SciTech Connect

    Vaughan, Diane Elizabeth; Preston, Dean L.

    2015-03-19

    This paper introduces and motivates the need for a new methodology for determining upper bounds on the uncertainties in simulations of engineered systems due to limited fidelity in the composite continuum-level physics models needed to simulate the systems. We show that traditional uncertainty quantification methods provide, at best, a lower bound on this uncertainty. We propose to obtain bounds on the simulation uncertainties by first determining bounds on the physical quantities or processes relevant to system performance. By bounding these physics processes, as opposed to carrying out statistical analyses of the parameter sets of specific physics models or simply switching out the available physics models, one can obtain upper bounds on the uncertainties in simulated quantities of interest.

  15. An RFID-based luggage and passenger tracking system for airport security control applications

    NASA Astrophysics Data System (ADS)

    Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.

    2014-06-01

    Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.

  16. Fuzzy logic-based approach to detecting a passive RFID tag in an outpatient clinic.

    PubMed

    Min, Daiki; Yih, Yuehwern

    2011-06-01

    This study is motivated by the observations on the data collected by radio frequency identification (RFID) readers in a pilot study, which was used to investigate the feasibility of implementing an RFID-based monitoring system in an outpatient eye clinic. The raw RFID data collected from RFID readers contain noise and missing reads, which prevent us from determining the tag location. In this paper, fuzzy logic-based algorithms are proposed to interpret the raw RFID data to extract accurate information. The proposed algorithms determine the location of an RFID tag by evaluating its possibility of presence and absence. To evaluate the performance of the proposed algorithms, numerical experiments are conducted using the data observed in the outpatient eye clinic. Experiments results showed that the proposed algorithms outperform existing static smoothing method in terms of minimizing both false positives and false negatives. Furthermore, the proposed algorithms are applied to a set of simulated data to show the robustness of the proposed algorithms at various levels of RFID reader reliability.

  17. Factors affecting RFID adoption in the agricultural product distribution industry: empirical evidence from China.

    PubMed

    Shi, Ping; Yan, Bo

    2016-01-01

    We conducted an exploratory investigation of factors influencing the adoption of radio frequency identification (RFID) methods in the agricultural product distribution industry. Through a literature review and field research, and based on the technology-organization-environment (TOE) theoretical framework, this paper analyzes factors influencing RFID adoption in the agricultural product distribution industry in reference to three contexts: technological, organizational, and environmental contexts. An empirical analysis of the TOE framework was conducted by applying structural equation modeling based on actual data from a questionnaire survey on the agricultural product distribution industry in China. The results show that employee resistance and uncertainty are not supported by the model. Technological compatibility, perceived effectiveness, organizational size, upper management support, trust between enterprises, technical knowledge, competitive pressure and support from the Chinese government, which are supported by the model, have significantly positive effects on RFID adoption. Meanwhile, organizational size has the strongest positive effect, while competitive pressure levels have the smallest effect. Technological complexities and costs have significantly negative effects on RFID adoption, with cost being the most significantly negative influencing factor. These research findings will afford enterprises in the agricultural products supply chain with a stronger understanding of the factors that influence RFID adoption in the agricultural product distribution industry. In addition, these findings will help enterprises remain aware of how these factors affect RFID adoption and will thus help enterprises make more accurate and rational decisions by promoting RFID application in the agricultural product distribution industry.

  18. Determinants of RFID adoption in Malaysia's healthcare industry: occupational level as a moderator.

    PubMed

    Zailani, Suhaiza; Iranmanesh, Mohammad; Nikbin, Davoud; Beng, Jameson Khoo Cheong

    2015-01-01

    With today's highly competitive market in the healthcare industry, Radio Frequency Identification (RFID) is a technology that can be applied by hospitals to improve operational efficiency and to gain a competitive advantage over their competitors. The purpose of this study is to investigate the factors that may effect RFID adoption in Malaysia's healthcare industry. In addition, the moderating role of occupational level was tested. Data was collected from 223 managers as well as healthcare and supporting staffs. This data was analyzed using the partial least squares technique. The results show that perceived ease of use and usefulness, government policy, top management support, and security and privacy concerns have an effect on the intent to adopt RFID in hospitals. There is a wide gap between managers and healthcare staff in terms of the factors that influence RFID adoption. The results of this study will help decision makers as well as managers in the healthcare industry to better understand the determinants of RFID adoption. Additionally, it will assist in the process of RFID adoption, and therefore, spread the usage of RFID technology in more hospitals.

  19. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    PubMed

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  20. A Split-Path Schema-Based RFID Data Storage Model in Supply Chain Management

    PubMed Central

    Fan, Hua; Wu, Quanyuan; Lin, Yisong; Zhang, Jianfeng

    2013-01-01

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products. Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance. PMID:23645112

  1. A split-path schema-based RFID data storage model in supply chain management.

    PubMed

    Fan, Hua; Wu, Quanyuan; Lin, Yisong; Zhang, Jianfeng

    2013-05-03

    In modern supply chain management systems, Radio Frequency IDentification (RFID) technology has become an indispensable sensor technology and massive RFID data sets are expected to become commonplace. More and more space and time are needed to store and process such huge amounts of RFID data, and there is an increasing realization that the existing approaches cannot satisfy the requirements of RFID data management. In this paper, we present a split-path schema-based RFID data storage model. With a data separation mechanism, the massive RFID data produced in supply chain management systems can be stored and processed more efficiently. Then a tree structure-based path splitting approach is proposed to intelligently and automatically split the movement paths of products . Furthermore, based on the proposed new storage model, we design the relational schema to store the path information and time information of tags, and some typical query templates and SQL statements are defined. Finally, we conduct various experiments to measure the effect and performance of our model and demonstrate that it performs significantly better than the baseline approach in both the data expression and path-oriented RFID data query performance.

  2. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    PubMed Central

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983

  3. A Framework for Mining Actionable Navigation Patterns from In-Store RFID Datasets via Indoor Mapping

    PubMed Central

    Shen, Bin; Zheng, Qiuhua; Li, Xingsen; Xu, Libo

    2015-01-01

    With the quick development of RFID technology and the decreasing prices of RFID devices, RFID is becoming widely used in various intelligent services. Especially in the retail application domain, RFID is increasingly adopted to capture the shopping tracks and behavior of in-store customers. To further enhance the potential of this promising application, in this paper, we propose a unified framework for RFID-based path analytics, which uses both in-store shopping paths and RFID-based purchasing data to mine actionable navigation patterns. Four modules of this framework are discussed, which are: (1) mapping from the physical space to the cyber space, (2) data preprocessing, (3) pattern mining and (4) knowledge understanding and utilization. In the data preprocessing module, the critical problem of how to capture the mainstream shopping path sequences while wiping out unnecessary redundant and repeated details is addressed in detail. To solve this problem, two types of redundant patterns, i.e., loop repeat pattern and palindrome-contained pattern are recognized and the corresponding processing algorithms are proposed. The experimental results show that the redundant pattern filtering functions are effective and scalable. Overall, this work builds a bridge between indoor positioning and advanced data mining technologies, and provides a feasible way to study customers’ shopping behaviors via multi-source RFID data. PMID:25751076

  4. A framework for mining actionable navigation patterns from in-store RFID datasets via indoor mapping.

    PubMed

    Shen, Bin; Zheng, Qiuhua; Li, Xingsen; Xu, Libo

    2015-03-05

    With the quick development of RFID technology and the decreasing prices of RFID devices, RFID is becoming widely used in various intelligent services. Especially in the retail application domain, RFID is increasingly adopted to capture the shopping tracks and behavior of in-store customers. To further enhance the potential of this promising application, in this paper, we propose a unified framework for RFID-based path analytics, which uses both in-store shopping paths and RFID-based purchasing data to mine actionable navigation patterns. Four modules of this framework are discussed, which are: (1) mapping from the physical space to the cyber space, (2) data preprocessing, (3) pattern mining and (4) knowledge understanding and utilization. In the data preprocessing module, the critical problem of how to capture the mainstream shopping path sequences while wiping out unnecessary redundant and repeated details is addressed in detail. To solve this problem, two types of redundant patterns, i.e., loop repeat pattern and palindrome-contained pattern are recognized and the corresponding processing algorithms are proposed. The experimental results show that the redundant pattern filtering functions are effective and scalable. Overall, this work builds a bridge between indoor positioning and advanced data mining technologies, and provides a feasible way to study customers' shopping behaviors via multi-source RFID data.

  5. Setups for in vitro assessment of RFID interference on pacemakers

    NASA Astrophysics Data System (ADS)

    Mattei, E.; Censi, F.; Delogu, A.; Ferrara, A.; Calcagnini, G.

    2013-08-01

    The aim of this study is to propose setups for in vitro assessment of RFID (radiofrequency identification) interference on pacemakers (PM). The voltage induced at the input stage of the PM by low-frequency (LF) and high-frequency (HF) RFID transmitters has been used to quantify the amount of the interference. A commercial PM was modified in order to measure the voltage at its input stage when exposed to a sinusoidal signal at 125 kHz and 13.56 MHz. At both frequencies, two antennas with different dimensions (diameter = 10 cm and 30 cm, respectively) were used to generate the interfering field, and the induced voltage was measured between the lead tip and the PM case (unipolar voltage), and between the tip and ring electrodes (bipolar voltage). The typical lead configurations adopted in similar studies or proposed by international standards, as well as lead paths closer to actual physiological implants were tested. At 125 kHz, the worst-case condition differs for the two antennas: the 10 cm antenna induced the highest voltage in the two-loop spiral configuration, whereas the 30 cm antenna in the 225 cm2 loop configuration. At 13.56 MHz, the highest voltage was observed for both the antennas in the 225 cm2 loop configuration. Bipolar voltages were found to be lower than the unipolar voltages induced in the same configurations, this difference being not as high as one could expect from theoretical considerations. The worst-case scenario, in terms of the induced voltage at the PM input stage, has been identified both for LF and HF readers, and for two sizes of transmitting antennas. These findings may provide the basis for the definition of a standard implant configuration and a lead path to test the EMI effects of LF and HF RFID transmitters on active implantable devices.

  6. Target tracking and surveillance by fusing stereo and RFID information

    NASA Astrophysics Data System (ADS)

    Raza, Rana H.; Stockman, George C.

    2012-06-01

    Ensuring security in high risk areas such as an airport is an important but complex problem. Effectively tracking personnel, containers, and machines is a crucial task. Moreover, security and safety require understanding the interaction of persons and objects. Computer vision (CV) has been a classic tool; however, variable lighting, imaging, and random occlusions present difficulties for real-time surveillance, resulting in erroneous object detection and trajectories. Determining object ID via CV at any instance of time in a crowded area is computationally prohibitive, yet the trajectories of personnel and objects should be known in real time. Radio Frequency Identification (RFID) can be used to reliably identify target objects and can even locate targets at coarse spatial resolution, while CV provides fuzzy features for target ID at finer resolution. Our research demonstrates benefits obtained when most objects are "cooperative" by being RFID tagged. Fusion provides a method to simplify the correspondence problem in 3D space. A surveillance system can query for unique object ID as well as tag ID information, such as target height, texture, shape and color, which can greatly enhance scene analysis. We extend geometry-based tracking so that intermittent information on ID and location can be used in determining a set of trajectories of N targets over T time steps. We show that partial-targetinformation obtained through RFID can reduce computation time (by 99.9% in some cases) and also increase the likelihood of producing correct trajectories. We conclude that real-time decision-making should be possible if the surveillance system can integrate information effectively between the sensor level and activity understanding level.

  7. Soil particle tracing using RFID tags for elucidating the behavior of radiocesium on bare soil surfaces in Fukushima

    NASA Astrophysics Data System (ADS)

    Manome, Ryo; Onda, Yuichi; Patin, Jeremy; Stefani, Chiara; Yoshimura, Kazuya; Parsons, Tony; Cooper, James

    2014-05-01

    Radioactive materials are generally associated with soil particles in terrestrial environment and therefore the better understanding soil erosion processes is expected to improve the mitigation of radioactive risks. Spatial variability in soil erosion has been one of critical issues for soil erosion management. This study attempts to track soil particle movement on soil surfaces by employing Radio Frequency Identification (RFID) tags for the better understanding radiocesium behavior. A RFID tag contains a specific electronically identifier and it permits tracing its movement by reading the identifier. In this study, we made artificial soil particles by coating the RFID tags with cement material. The particle diameters of the artificial soil particles approximately ranged from 3 to 5 mm. The artificial soil particles were distributed in a reticular pattern on a soil erosion plot (bare soil surface, 22.13 m length × 5 m width, 4.4° slope) in Kawamata town where radiocesium deposited because of the Fukushima Dai-ichi power plant accident. After their distribution on October 2012, we had read the identifiers of RFID tags and recorded their locations on the plot for 14 times by September 2013. Moving distance (MD) was calculated based on the difference of the location for each sampling date. The topographical changes on the plot were also monitored with a laser scanner to describe interrill erosion and rill erosion area on 11occasions. Median MD is 10.8cm for all the observations. Median MD on interrill and rill erosion areas were 9.8 cm and 20.7 cm, respectively. Seasonal variation in MD was observed; an extremely large MD was found in May 2013, at the first reading after the winter season. This large MD after winter suggests that snowmelt runoff was the dominant process which transported the soil particles. Comparing the MD with the observed amounts of rainfall, sediment and runoff on the plot, significant positive correlation were found if the data of May, 2013

  8. A Guide Management System Based on RFID and Bluetooth Technology

    NASA Astrophysics Data System (ADS)

    Li, Han-Sheng; Wang, Jun-Jun

    The most fundamental and important requirement of the tour guide in the tour process is to ensure the safety of tourists. In this paper, a portable guide management system is designed based on RFID technology, the Android software and blue-tooth communication technology. Through this system, the guide can get real-time information if some tourists are l behind, and send text message or dial to those tourists who are l behind immediately. The system reduces the roll-calling time on the tourists, improves the tour guide work efficiency and service quality.

  9. RFID in healthcare environment: electromagnetic compatibility regulatory issues.

    PubMed

    Censi, Federica; Calcagnini, Giovanni; Mattei, Eugenio; Triventi, Michele; Bartolini, Pietro

    2010-01-01

    Several wireless technology applications (RFID, WiFi, GSM, GPRS) have been developed to improve patient care, reaching a significant success and diffusion in healthcare. Given the potential development of such a technology, care must be paid on the potential risks deriving from the use of wireless device in healthcare, among which one of the most important is the electromagnetic interference with medical devices. The analysis of the regulatory issues concerning the electromagnetic compatibility of medical devices is essential to evaluate if and how the application of the current standards allows an effective control of the possible risks associated to the electromagnetic interference on medical devices.

  10. RFID reader design for identification of industrial metallic objects

    NASA Astrophysics Data System (ADS)

    Szczurkowski, M.; Jankowski, H.; Worek, C.; Maksymowicz, L. J.

    2006-10-01

    An electronic circuit design of the RFID (Radio Frequency Identification) reader was the aim of our research. This device is designed for identification of transponders, which are present on the surface of metal elements or inside machine elements made of metal. In order to achieve that, we optimized the antenna reader circuit, that works in near field (magnetic coupling), by means of field flux lines analysis (using finite elements method) and experimental data collecting. Finally, one obtaines a specific shaped magnetic field around the reader.

  11. UHF front-end feeding RFID-based body sensor networks by exploiting the reader signal

    NASA Astrophysics Data System (ADS)

    Pasca, M.; Colella, R.; Catarinucci, L.; Tarricone, L.; D'Amico, S.; Baschirotto, A.

    2016-05-01

    This paper presents an integrated, high-sensitivity UHF radio frequency identification (RFID) power management circuit for body sensor network applications. The circuit consists of a two-stage RF-DC Dickson's rectifier followed by an integrated five-stage DC-DC Pelliconi's charge pump driven by an ultralow start-up voltage LC oscillator. The DC-DC charge pump interposed between the RF-DC rectifier and the output load provides the RF to load isolation avoiding losses due to the diodes reverse saturation current. The RF-DC rectifier has been realized on FR4 substrate, while the charge pump and the oscillator have been realized in 180 nm complementary metal oxide semiconductor (CMOS) technology. Outdoor measurements demonstrate the ability of the power management circuit to provide 400 mV output voltage at 14 m distance from the UHF reader, in correspondence of -25 dBm input signal power. As demonstrated in the literature, such output voltage level is suitable to supply body sensor network nodes.

  12. Individual Ranging Behaviour Patterns in Commercial Free-Range Layers as Observed through RFID Tracking.

    PubMed

    Larsen, Hannah; Cronin, Greg M; Gebhardt-Henrich, Sabine G; Smith, Carolynn L; Hemsworth, Paul H; Rault, Jean-Loup

    2017-03-09

    In this exploratory study, we tracked free-range laying hens on two commercial flocks with Radio Frequency Identification (RFID) technology with the aim to examine individual hen variation in range use. Three distinct outdoor zones were identified at increasing distances from the shed; the veranda [0-2.4 m], close range [2.4-11.4 m], and far range [>11.4 m]. Hens' movements between these areas were tracked using radio frequency identification technology. Most of the hens in both flocks (68.6% in Flock A, and 82.2% in Flock B) accessed the range every day during the study. Of the hens that accessed the range, most hens accessed all three zones (73.7% in Flock A, and 84.5% in Flock B). Hens spent half of their time outdoors in the veranda area. Within-individual consistency of range use (daily duration and frequency) varied considerably, and hens which were more consistent in their daily range use spent more time on the range overall (p < 0.001). Understanding variation within and between individuals in ranging behaviour may help elucidate the implications of ranging for laying hens.

  13. Interoperation of an UHF RFID Reader and a TCP/IP Device via Wired and Wireless Links

    PubMed Central

    Lee, Sang Hoon; Jin, Ik Soo

    2011-01-01

    A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4) interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device. PMID:22346665

  14. Interoperation of an UHF RFID reader and a TCP/IP device via wired and wireless links.

    PubMed

    Lee, Sang Hoon; Jin, Ik Soo

    2011-01-01

    A main application in radio frequency identification (RFID) sensor networks is the function that processes real-time tag information after gathering the required data from multiple RFID tags. The component technologies that contain an RFID reader, called the interrogator, which has a tag chip, processors, coupling antenna, and a power management system have advanced significantly over the last decade. This paper presents a system implementation for interoperation between an UHF RFID reader and a TCP/IP device that is used as a gateway. The proposed system consists of an UHF RFID tag, an UHF RFID reader, an RF end-device, an RF coordinator, and a TCP/IP I/F. The UHF RFID reader, operating at 915 MHz, is compatible with EPC Class-0/Gen1, Class-1/Gen1 and 2, and ISO18000-6B. In particular, the UHF RFID reader can be combined with the RF end-device/coordinator for a ZigBee (IEEE 802.15.4) interface, which is a low-power wireless standard. The TCP/IP device communicates with the RFID reader via wired links. On the other hand, it is connected to the ZigBee end-device via wireless links. The web based test results show that the developed system can remotely recognize information of multiple tags through the interoperation between the RFID reader and the TCP/IP device.

  15. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  16. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    PubMed

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  17. ICA-based UHF RFID multi-tag hybrid data blind separation

    NASA Astrophysics Data System (ADS)

    Li, Hua; Wang, Hong-jun; Song, Zi-liang

    2013-03-01

    This work presents an ICA-based UHF RFID multi-tag hybrid data blind separation algorithm. After analysis, we find that UHF RFID multi-tag hybrid data is consistent with the requirements of ICA algorithm. Simulated experimental results show that excellent results can be obtained by using ICA techniques in blind separating of tags data. For evaluating the separation performance objectively, a new indicator- the Similarity of Sources and Results (SSR) is defined. The anti- noise performance of this algorithm is analyzed quantitatively too. A good theoretical and experimental basis for applying blind separation technology to UHF RFID tags anti-collision algorithm has been established in this paper.

  18. Research and design on system of asset management based on RFID

    NASA Astrophysics Data System (ADS)

    Guan, Peng; Du, HuaiChang; Jing, Hua; Zhang, MengYue; Zhang, Meng; Xu, GuiXian

    2011-10-01

    By analyzing the problems in the current assets management, this thesis proposing RFID technology will be applied to asset management in order to improve the management level of automation and information. This paper designed the equipment identification based on 433MHz RFID tag and reader which was deeply studied on the basis of RFID tag and card reader circuits, and this paper also illustrates the system of asset management. The RS232 converts Ethernet is a innovative technology to transfer data to PC monitor software, and implement system of asset management based on WEB techniques (PHP and MySQL).

  19. A RFID authentication protocol based on infinite dimension pseudo random number generator for image recognition system

    NASA Astrophysics Data System (ADS)

    Tong, Qiaoling; Zou, Xuecheng; Tong, Hengqing

    2009-10-01

    Radio Frequency Identification (RFID) technology has been widely used in the image recognition system. However, the feature of the RFID system may bring out security threatens. In this paper, we analyze the existing RFID authentication protocols and state an infinite dimension pseudo random number generator to strengthen the protocol security. Then an authentication protocol based on infinite dimension pseudo random number generator is proposed. Compared to the traditional protocols, our method could resist various attack approaches, and protect the tag information and the location privacy of the tag holder efficiently.

  20. Transport of RFID tracers in a glacierized Andean stream (Estero Morales, Chile)

    NASA Astrophysics Data System (ADS)

    Rainato, Riccardo; Toro, Matteo; Mao, Luca; Fraccarollo, Luigi; Brardinoni, Francesco; Aristide Lenzi, Mario

    2015-04-01

    A proper quantification of bedload transport is crucial in order to improve the knowledge on the morphology and dynamics of river systems. Unfortunately, bedload surveys in mountain streams are notoriously difficult. Also, equations for predicting the transport capacity often overestimate the actual bedload rates, and field measurement are still rare. An alternative to direct bedload sampling during floods is the use of tracers, which allow to obtain precious data on sediment dynamic and transport due to different conditions of hydraulic forcing, especially in mountain streams. In this work, the results obtained by the employment of passive RFID tracers in a steep Andean channel are presented. The study site is the Estero Morales, a high-gradient stream located in the Metropolitan Region (central Chile). The channel bed exhibits boulder-cascade, step-pool and plane bed morphologies while the average slope is of about 9.5%. The basin (27 km2) hosts the San Francisco glacier (1.8 km2) that strongly affects the hydrological regime. In particular during the melt period (December-March) the glacier ensures daily discharge fluctuations with highly variable associated bedload transport rates. Overall, 429 RFID tracers were installed in the Estero Morales and the displacements over a reach of approximately 700 m were monitored through 15 surveys, performed between January and March 2014. The recovery rate ranges between 19% and 97%. Tracers travel distance were paired to the peaks of stream power per unit area (ω, in W/m2) that occurred during the study period. Due to the wide range of flow magnitude observed, the values of stream power were grouped in three classes: low (650-750 W/m2), moderate (750-800 W/m2), and high (800-900 W/m2). Despite the different conditions of hydraulic forcing, moderate and low classes show mean displacement very similar, equal to 33 m and 24 m, respectively. In either cases a size selective transport was observed. On the other hand, the high

  1. Bounding Species Distribution Models

    NASA Technical Reports Server (NTRS)

    Stohlgren, Thomas J.; Jarnevich, Cahterine S.; Morisette, Jeffrey T.; Esaias, Wayne E.

    2011-01-01

    Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS) might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for "clamping" model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART) and maximum entropy (Maxent) models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used [Current Zoology 57 (5): 642-647, 2011].

  2. Bounding species distribution models

    USGS Publications Warehouse

    Stohlgren, T.J.; Jarnevich, C.S.; Esaias, W.E.; Morisette, J.T.

    2011-01-01

    Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS) might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for "clamping" model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART) and maximum entropy (Maxent) models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used. ?? 2011 Current Zoology.

  3. Causality and Tsirelson's bounds

    SciTech Connect

    Buhrman, H.; Massar, S.

    2005-11-15

    We study the properties of no-signaling correlations that cannot be reproduced by local measurements on entangled quantum states. We say that such correlations violate Tsirelson bounds. We show that if these correlations are obtained by some reversible unitary quantum evolution U, then U cannot be written in the product form U{sub A}xU{sub B}. This implies that U can be used for signaling and for entanglement generation. This result is completely general and in fact can be viewed as a characterization of Tsirelson bounds. We then show how this result can be used as a tool to study Tsirelson bounds and we illustrate this by rederiving the Tsirelson bound of 2{radical}(2) for the Clauser-Horn-Shimony-Holt inequality, and by deriving a new Tsirelson bound for qutrits.

  4. Bounding Species Distribution Models

    NASA Technical Reports Server (NTRS)

    Stohlgren, Thomas J.; Jarnevich, Cahterine S.; Morisette, Jeffrey T.; Esaias, Wayne E.

    2011-01-01

    Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS) might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for "clamping" model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART) and maximum entropy (Maxent) models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used [Current Zoology 57 (5): 642-647, 2011].

  5. Adhesive RFID Sensor Patch for Monitoring of Sweat Electrolytes.

    PubMed

    Rose, Daniel P; Ratterman, Michael E; Griffin, Daniel K; Hou, Linlin; Kelley-Loughnane, Nancy; Naik, Rajesh R; Hagen, Joshua A; Papautsky, Ian; Heikenfeld, Jason C

    2015-06-01

    Wearable digital health devices are dominantly found in rigid form factors such as bracelets and pucks. An adhesive radio-frequency identification (RFID) sensor bandage (patch) is reported, which can be made completely intimate with human skin, a distinct advantage for chronological monitoring of biomarkers in sweat. In this demonstration, a commercial RFID chip is adapted with minimum components to allow potentiometric sensing of solutes in sweat, and surface temperature, as read by an Android smartphone app with 96% accuracy at 50 mM Na(+) (in vitro tests). All circuitry is solder-reflow integrated on a standard Cu/polyimide flexible-electronic layer including an antenna, but while also allowing electroplating for simple integration of exotic metals for sensing electrodes. Optional paper microfluidics wick sweat from a sweat porous adhesive allowing flow to the sensor, or the sensor can be directly contacted to the skin. The wearability of the patch has been demonstrated for up to seven days, and includes a protective textile which provides a feel and appearance similar to a standard Band-Aid. Applications include hydration monitoring, but the basic capability is extendable to other mM ionic solutes in sweat (Cl(-), K(+), Mg(2+), NH4(+), and Zn(2+)). The design and fabrication of the patch are provided in full detail, as the basic components could be useful in the design of other wearable sensors.

  6. Copper thin film for RFID UHF antenna on flexible substrate

    NASA Astrophysics Data System (ADS)

    Tran, Nhan Ai; Tran, Huy Nam; Chien Dang, Mau; Fribourg-Blanc, Eric

    2010-06-01

    A process flow using photolithography and sputtering was studied for copper antenna fabrication on thin poly(ethylene terephthalate) (PET) substrate. The lift-off route was chosen for its flexibility at laboratory scale. It was clarified that the cleaning of PET is an important step that necessitates mild oxygen plasma etching. Then copper is sputter deposited after photolithographic definition of the antenna. Care is necessary since PET, as a very flexible substrate, is temperature sensitive. The temperature increase generated by the impact of deposited copper should be maintained below the glass transition temperature of the polymer to avoid detrimental deformation. dc power of 40 to 50 W was found to be the maximum possible sputtering power for commercial PET. It was found that the resistivity of the thin film is below two times the bulk resistivity of copper for a deposition pressure below 4×10-3 mbar and thickness above 450 nm. These results enable the reliable fabrication of copper RFID UHF antennae on a PET substrate for further testing of new tag designs. The present paper summarizes the effort to test new designs of antennae for RadioFrequency IDentification (RFID) Ultra High Frequency (UHF) tags, for use in various applications (e.g. object tracking and environment monitoring) in Vietnam.

  7. An Implantable RFID Sensor Tag toward Continuous Glucose Monitoring.

    PubMed

    Xiao, Zhibin; Tan, Xi; Chen, Xianliang; Chen, Sizheng; Zhang, Zijian; Zhang, Hualei; Wang, Junyu; Huang, Yue; Zhang, Peng; Zheng, Lirong; Min, Hao

    2015-05-01

    This paper presents a wirelessly powered implantable electrochemical sensor tag for continuous blood glucose monitoring. The system is remotely powered by a 13.56-MHz inductive link and utilizes an ISO 15693 radio frequency identification (RFID) standard for communication. This paper provides reliable and accurate measurement for changing glucose level. The sensor tag employs a long-term glucose sensor, a winding ferrite antenna, an RFID front-end, a potentiostat, a 10-bit sigma-delta analog to digital converter, an on-chip temperature sensor, and a digital baseband for protocol processing and control. A high-frequency external reader is used to power, command, and configure the sensor tag. The only off-chip support circuitry required is a tuned antenna and a glucose microsensor. The integrated chip fabricated in SMIC 0.13-μm CMOS process occupies an area of 1.2 mm ×2 mm and consumes 50 μW. The power sensitivity of the whole system is -4 dBm. The sensor tag achieves a measured glucose range of 0-30 mM with a sensitivity of 0.75 nA/mM.

  8. 2-SR-based electrically small antenna for RFID applications

    NASA Astrophysics Data System (ADS)

    Paredes, Ferran; Zuffanelli, Simone; Aguilà, Pau; Zamora, Gerard; Martin, Ferran; Bonache, Jordi

    2016-04-01

    In this work, the 2-turn spiral resonator (2-SR) is proposed as an electrically small antenna for passive radio frequency identification (RFID) tags at the European ultra-high frequency (UHF) band. The radiation properties are studied in order to explore the viability of the 2-SR applied to tag antenna design. Based on analytical calculations, the radiation pattern is found to provide a cancelation of the radiation nulls. This results in a mitigation of the blind spots in the read range, which are present in typical UHF-RFID tags as an undesired feature. As a proof of concept, a passive tag of size 35 mm × 40 mm (λ 0/10 × λ 0/9) based on the 2-SR antenna is designed and fabricated. Good radiation efficiency (75 %) and a quasi-isotropic radiation pattern are obtained. The experimental tag read range for different directions is in good agreement with the simulation results. The measured read range exhibits maximum and minimum values of 6.7 and 3.5 m, respectively.

  9. Implementing RFID in a hospital library: a scoping study.

    PubMed

    Norwood, Joseph; Skinner, Ben

    2012-06-01

    This article discusses a scoping study on implementing radio frequency identification device (RFID) in a hospital library context, conducted by Joseph Norwood for his MA dissertation at the University of Brighton. The study was carried out during the summer of 2011 to support possible RFID implementation at the Brighton and Sussex University Hospitals (BSUH) Trust, and the library staff were able to use the findings to good effect to create a business plan. This article also acts as the template for the new Dissertations into Practice feature, which was introduced in the March issue (Marshall, A. Health Information and Libraries Journal 2012, 29, 72). The dissertation highlighted here is very practical in nature and had immediate and quantifiable benefits for the Trust library. Future feature articles are likely to reflect the range of health-related dissertation topics which students choose and will include studies on user information behaviour, information services related to mental health and well-being, as well as the impact of technology on health-related library or information services.AM. © 2012 The authors. Health Information and Libraries Journal © 2012 Health Libraries Group.

  10. RMAIS: RFID-based medication Adherence Intelligence System.

    PubMed

    McCall, Corey; Maynes, Branden; Zou, Cliff C; Zhang, Ning J

    2010-01-01

    There has been compelling evidence that outpatients, especially those who are elderly or taking multiple complexly scheduled drugs, are not taking their medicines as directed, leading to unnecessary disease progression, complications, functional disabilities, lower quality of life, and even mortality. Existing technologies for monitoring and improving drug adherence are either costly or too complicated for general patients to use. In this paper, we introduce the detailed design and the complete prototype of a marketable Radio-Frequency Identification (RFID)-based Medication Adherence Intelligence System (RMAIS) that can be conveniently used at a residential home by ordinary patients. RMAIS is designed to maintain patients' independence and enable them to take multiple daily medicine dosages of the right amount at the right time. The system is patient-centered and user-friendly by reminding a patient of the prescribed time for medication and dispensing it in a fully automatic and fool-proof way. This is achieved mainly due to its novel design of a motorized rotation platform and the smooth integration of a scale, an RFID reader, and the rotation platform. In addition, this system has an Internet-based notification function that is used to alert the patient when it is time to take medicine as well as report deviations from the prescribed schedule to the primary care physicians or pharmacists.

  11. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  12. Compressive strain measurement using RFID patch antenna sensors

    NASA Astrophysics Data System (ADS)

    Cho, Chunhee; Yi, Xiaohua; Wang, Yang; Tentzeris, Manos M.; Leon, Roberto T.

    2014-04-01

    In this research, two radiofrequency identification (RFID) antenna sensor designs are tested for compressive strain measurement. The first design is a passive (battery-free) folded patch antenna sensor with a planar dimension of 61mm × 69mm. The second design is a slotted patch antenna sensor, whose dimension is reduced to 48mm × 44mm by introducing slots on antenna conducting layer to detour surface current path. A three-point bending setup is fabricated to apply compression on a tapered aluminum specimen mounted with an antenna sensor. Mechanics-electromagnetics coupled simulation shows that the antenna resonance frequency shifts when each antenna sensor is under compressive strain. Extensive compression tests are conducted to verify the strain sensing performance of the two sensors. Experimental results confirm that the resonance frequency of each antenna sensor increases in an approximately linear relationship with respect to compressive strain. The compressive strain sensing performance of the two RFID antenna sensors, including strain sensitivity and determination coefficient, is evaluated based on the experimental data.

  13. Zeroth order resonator (ZOR) based RFID antenna design

    NASA Astrophysics Data System (ADS)

    Masud, Muhammad Mubeen

    Meander-line and multi-layer antennas have been used extensively to design compact UHF radio frequency identification (RFID) tags; however the overall size reduction of meander-line antennas is limited by the amount of parasitic inductance that can be introduced by each meander-line segment, and multi-layer antennas can be too costly. In this study, a new compact antenna topology for passive UHF RFID tags based on zeroth order resonant (ZOR) design techniques is presented. The antenna consists of lossy coplanar conductors and either inter-connected inter-digital capacitor (IDC) or shunt inductor unit-cells with a ZOR frequency near the operating frequency of the antenna. Setting the ZOR frequency near the operating frequency is a key component in the design process because the unit-cells chosen for the design are inductive at the operating frequency. This makes the unit-cells very useful for antenna miniaturization. These new designs in this work have several benefits: the coplanar layout can be printed on a single layer, matching inductive loops that reduce antenna efficiency are not required and ZOR analysis can be used for the design. Finally, for validation, prototype antennas are designed, fabricated and tested.

  14. ODINS: On-Demand Indoor Navigation System RFID Based.

    PubMed

    Bianchi, Federico; Masciadri, Andrea; Salice, Fabio

    2015-01-01

    This paper presents an On-Demand Indoor Navigation System (ODINS) based on RFID technology. ODINS is a distributed infrastructure where a set of information points (Fixed Stations - FS) provides the direction to a user who has to reach the destination point he/she has previously selected. ODINS system is proposed for residencies hosting people with mild cognitive disabilities and elderly but it can be also applied to structures where people could be disoriented. The destination is configured at some reception points or it is a predefined (e.g. the bed room or a selected "safe" point). The destination is associated with a RFID disposable bracelet assigned to her/him. The path is algorithmically computed and spread to all FSs. Every time the user is disoriented, she/he can search for the closest FS that displays the right directition. FSs should be located in strategic positions and provide a user-friendly interface such as bright arrows. The complexity is "system-side" making ODINS usable for everyone.

  15. Equipment location in hospitals using RFID-based positioning system.

    PubMed

    Shirehjini, Ali Asghar Nazari; Yassine, Abdulsalam; Shirmohammadi, Shervin

    2012-11-01

    Throughout various complex processes within hospitals, context-aware services and applications can help to improve the quality of care and reduce costs. For example, sensors and radio frequency identification (RFID) technologies for e-health have been deployed to improve the flow of material, equipment, personal, and patient. Bed tracking, patient monitoring, real-time logistic analysis, and critical equipment tracking are famous applications of real-time location systems (RTLS) in hospitals. In fact, existing case studies show that RTLS can improve service quality and safety, and optimize emergency management and time critical processes. In this paper, we propose a robust system for position and orientation determination of equipment. Our system utilizes passive (RFID) technology mounted on flooring plates and several peripherals for sensor data interpretation. The system is implemented and tested through extensive experiments. The results show that our system's average positioning and orientation measurement outperforms existing systems in terms of accuracy. The details of the system as well as the experimental results are presented in this paper.

  16. Organically bound tritium

    SciTech Connect

    Diabate, S.; Strack, S. )

    1993-12-01

    Tritium released into the environment may be incorporated into organic matter. Organically bound tritium in that case will show retention times in organisms that are considerably longer than those of tritiated water which has significant consequences on dose estimates. This article reviews the most important processes of organically bound tritium production and transport through food networks. Metabolic reactions in plant and animal organisms with tritiated water as a reaction partner are of great importance in this respect. The most important production process, in quantitative terms, is photosynthesis in green plants. The translocation of organically bound tritium from the leaves to edible parts of crop plants should be considered in models of organically bound tritium behavior. Organically bound tritium enters the human body on several pathways, either from the primary producers (vegetable food) or at a higher tropic level (animal food). Animal experiments have shown that the dose due to ingestion of organically bound tritium can be up to twice as high as a comparable intake of tritiated water in gaseous or liquid form. In the environment, organically bound tritium in plants and animals is often found to have higher specific tritium concentrations than tissue water. This is not due to some tritium enrichment effects but to the fact that no equilibrium conditions are reached under natural conditions. 66 refs.

  17. On the complexity of uSPR distance.

    PubMed

    Bonet, Maria Luisa; St John, Katherine

    2010-01-01

    We show that subtree prune and regraft (uSPR) distance on unrooted trees is fixed parameter tractable with respect to the distance. We also make progress on a conjecture of Steel on the preservation of uSPR distance under chain reduction, improving on lower bounds of Hickey et al.

  18. Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine.

    PubMed

    Coustasse, Alberto; Cunningham, Brian; Deslich, Stacie; Willson, Eric; Meadows, Pamela

    2015-01-01

    Radio-frequency identification (RFID) technology is used by hospital supply chains to track medical products and monitor inventories. Hospitals have also begun incorporating RFID technology as part of their transfusion processes. The purpose of this review was to analyze how healthcare organization supply chains can benefit from the utilization of RFID systems in transfusion service departments. The methodology for this study was a literature review following the steps of a systematic review with a total of 52 sources referenced. RFID technology is used to manage and track blood products from the initial donor phlebotomy to final disposition or product transfusion. RFID-enabled transfusion practices have successfully increased provider productivity and product quality through work-time reduction and error reduction. Findings of this research study suggest that RFID has provided improvements in quality of care and efficiency, while initial costs, security, and privacy appear to be the principal barriers to adoption.

  19. Benefits and Barriers of Implementation and Utilization of Radio-Frequency Identification (RFID) Systems in Transfusion Medicine

    PubMed Central

    Coustasse, Alberto; Cunningham, Brian; Deslich, Stacie; Willson, Eric; Meadows, Pamela

    2015-01-01

    Radio-frequency identification (RFID) technology is used by hospital supply chains to track medical products and monitor inventories. Hospitals have also begun incorporating RFID technology as part of their transfusion processes. The purpose of this review was to analyze how healthcare organization supply chains can benefit from the utilization of RFID systems in transfusion service departments. The methodology for this study was a literature review following the steps of a systematic review with a total of 52 sources referenced. RFID technology is used to manage and track blood products from the initial donor phlebotomy to final disposition or product transfusion. RFID-enabled transfusion practices have successfully increased provider productivity and product quality through work-time reduction and error reduction. Findings of this research study suggest that RFID has provided improvements in quality of care and efficiency, while initial costs, security, and privacy appear to be the principal barriers to adoption. PMID:26396555

  20. Performance of low-power RFID tags based on modulated backscattering

    NASA Astrophysics Data System (ADS)

    Mhanna, Zeinab; Sibille, Alain; Contreras, Richard

    2017-02-01

    Ultra Wideband (UWB) modulated backscattering (MBS) passive Radio-Frequency IDentification (RFID) systems provide a promising solution to overcome many limitations of current narrowband RFID devices. This work addresses the performance of such systems from the point of view of the radio channel between the readers and the tags. Such systems will likely combine several readers, in order to provide both the detection and localization of tags operating in MBS. Two successive measurements campaigns have been carried out in an indoor reference scenario environment. The first is intended to verify the methods and serves as a way to validate the RFID backscattering measurement setup. The second represents a real use case for RFID application and allows one to quantitatively analyze the path loss of the backscattering propagation channel. xml:lang="fr"

  1. Fully Printed Flexible Single-Chip RFID Tag with Light Detection Capabilities

    PubMed Central

    Falco, Aniello; Salmerón, Jose F.; Loghin, Florin C.; Lugli, Paolo; Rivadeneyra, Almudena

    2017-01-01

    A printed passive radiofrequency identification (RFID) tag in the ultra-high frequency band for light and temperature monitoring is presented. The whole tag has been manufactured by printing techniques on a flexible substrate. Antenna and interconnects are realized with silver nanoparticles via inkjet printing. A sprayed photodetector performs the light monitoring, whereas temperature measurement comes from an in-built sensor in the silicon RFID chip. One of the advantages of this system is the digital read-out and transmission of the sensors information on the RFID tag that ensures reliability. Furthermore, the use of printing techniques allows large-scale manufacturing and the direct fabrication of the tag on the desired surface. This work proves for the first time the feasibility of the embedment of large-scale organic photodetectors onto inkjet printed RFID tags. Here, we solve the problem of integration of different manufacturing techniques to develop an optimal final sensor system. PMID:28282850

  2. Fully Printed Flexible Single-Chip RFID Tag with Light Detection Capabilities.

    PubMed

    Falco, Aniello; Salmerón, Jose F; Loghin, Florin C; Lugli, Paolo; Rivadeneyra, Almudena

    2017-03-08

    A printed passive radiofrequency identification (RFID) tag in the ultra-high frequency band for light and temperature monitoring is presented. The whole tag has been manufactured by printing techniques on a flexible substrate. Antenna and interconnects are realized with silver nanoparticles via inkjet printing. A sprayed photodetector performs the light monitoring, whereas temperature measurement comes from an in-built sensor in the silicon RFID chip. One of the advantages of this system is the digital read-out and transmission of the sensors information on the RFID tag that ensures reliability. Furthermore, the use of printing techniques allows large-scale manufacturing and the direct fabrication of the tag on the desired surface. This work proves for the first time the feasibility of the embedment of large-scale organic photodetectors onto inkjet printed RFID tags. Here, we solve the problem of integration of different manufacturing techniques to develop an optimal final sensor system.

  3. RFID sensors as the common sensing platform for single-use biopharmaceutical manufacturing

    NASA Astrophysics Data System (ADS)

    Potyrailo, Radislav A.; Surman, Cheryl; Monk, David; Morris, William G.; Wortley, Timothy; Vincent, Mark; Diana, Rafael; Pizzi, Vincent; Carter, Jeffrey; Gach, Gerard; Klensmeden, Staffan; Ehring, Hanno

    2011-08-01

    The lack of reliable single-use sensors prevents the biopharmaceutical industry from fully embracing single-use biomanufacturing processes. Sensors based on the same detection platform for all critical parameters in single-use bioprocess components would be highly desirable to significantly simplify their installation, calibration and operation. We review here our approach for passive radio-frequency identification (RFID)-based sensing that does not rely on costly proprietary RFID memory chips with an analog input but rather implements ubiquitous passive 13.56 MHz RFID tags as inductively coupled sensors with at least 16 bit resolution provided by a sensor reader. The developed RFID sensors combine several measured parameters from the resonant sensor antenna with multivariate data analysis and deliver unique capability of multiparameter sensing and rejection of environmental interferences with a single sensor. This general sensing approach provides an elegant solution for both analytical measurement and identification and documentation of the measured location.

  4. 78 FR 43916 - Certain Radio Frequency Identification (RFID) Products and Components Thereof; Commission...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... From the Federal Register Online via the Government Publishing Office INTERNATIONAL TRADE COMMISSION Certain Radio Frequency Identification (RFID) Products and Components Thereof; Commission Determination Not To Review an Initial Determination Terminating Investigation Based on a Settlement...

  5. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  6. Low-cost RFID-based palm oil monitoring system (PMS): First prototype

    NASA Astrophysics Data System (ADS)

    Kiama, J. W.; Raman, V.; Patrick, T. H. H.

    2014-02-01

    Under collaboration with our local oil palm plantation enterprise, our research focuses on producing proof-of-concept by using RFID technology to monitor palm oil productivity. Passive RFID tags are used in the plantation field to uniquely identify each palm oil tree and their Fresh Fruit Bunches (FFB) production is collected and monitored by scanning the passive RFID tags using high frequency RFID scanners. This technology aims to convert the harvest data into digital information which can be processed and analyzed by PMS system and presented as informative outputs such as dynamic charts. This analyzed information is further used as input to a proprietary GIS system where it is mapped as color-coded spatial data which enables an accurate evaluation and monitoring of the overall plantation productivity.

  7. Introducing RFID technology in dynamic and time-critical medical settings: requirements and challenges.

    PubMed

    Parlak, Siddika; Sarcevic, Aleksandra; Marsic, Ivan; Burd, Randall S

    2012-10-01

    We describe the process of introducing RFID technology in the trauma bay of a trauma center to support fast-paced and complex teamwork during resuscitation. We analyzed trauma resuscitation tasks, photographs of medical tools, and videos of simulated resuscitations to gain insight into resuscitation tasks, work practices and procedures. Based on these data, we discuss strategies for placing RFID tags on medical tools and for placing antennas in the environment for optimal tracking and activity recognition. Results from our preliminary RFID deployment in the trauma bay show the feasibility of our approach for tracking tools and for recognizing trauma team activities. We conclude by discussing implications for and challenges to introducing RFID technology in other similar settings characterized by dynamic and collocated collaboration. Copyright © 2012 Elsevier Inc. All rights reserved.

  8. Application studies of RFID technology in the process of coal logistics transport

    NASA Astrophysics Data System (ADS)

    Qiao, Bingqin; Chang, Xiaoming; Hao, Meiyan; Kong, Dejin

    2012-04-01

    For quality control problems in coal transport, RFID technology has been proposed to be applied to coal transportation process. The whole process RFID traceability system from coal production to consumption has been designed and coal supply chain logistics tracking system integration platform has been built, to form the coal supply chain traceability and transport tracking system and providing more and more transparent tracking and monitoring of coal quality information for consumers of coal. Currently direct transport and combined transport are the main forms of coal transportation in China. The means of transport are cars, trains and ships. In the booming networking environment of RFID technology, the RFID technology will be applied to coal logistics and provide opportunity for the coal transportation tracking in the process transportation.

  9. Indoor localization using pedestrian dead reckoning updated with RFID-based fiducials.

    PubMed

    House, Samuel; Connell, Sean; Milligan, Ian; Austin, Daniel; Hayes, Tamara L; Chiang, Patrick

    2011-01-01

    We describe a low-cost wearable system that tracks the location of individuals indoors using commonly available inertial navigation sensors fused with radio frequency identification (RFID) tags placed around the smart environment. While conventional pedestrian dead reckoning (PDR) calculated with an inertial measurement unit (IMU) is susceptible to sensor drift inaccuracies, the proposed wearable prototype fuses the drift-sensitive IMU with a RFID tag reader. Passive RFID tags placed throughout the smart-building then act as fiducial markers that update the physical locations of each user, thereby correcting positional errors and sensor inaccuracy. Experimental measurements taken for a 55 m × 20 m 2D floor space indicate an over 1200% improvement in average error rate of the proposed RFID-fused system over dead reckoning alone.

  10. An Improved GPS/RFID Integration Method Based on Sequential Iterated Reduced Sigma Point Kalman Filter

    NASA Astrophysics Data System (ADS)

    Peng, Jing; Wu, Falin; Zhu, Ming; Wang, Feixue; Zhang, Kefei

    In this paper, an improved GPS/RFID integration method based on Sequential Iterated Reduced Sigma Point Kalman Filter (SIRSPKF) is proposed for vehicle navigation applications. It is applied to improve the accuracy, reliability and availability of satellite positioning in the areas where the satellite visibility is limited. An RFID system is employed to assist the GPS system in achieving high accuracy positioning. Further, to reduce the measurement noise and decrease the computational complexity caused by the integrated GPS/RFID, SIRSPKF is investigated as the dominant filter for the proposed integration. Performances and computational complexities of different integration scenarios with different filters are compared in this paper. A field experiment shows that both accuracy and availability of positioning can be improved significantly by this low-cost GPS/RFID integration method with the reduced computational load.

  11. Design of an HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization.

    PubMed

    Mi, Jian; Takahashi, Yasutake

    2016-07-29

    Radio frequency identification (RFID) technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL) method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF)-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot.

  12. Design of an HF-Band RFID System with Multiple Readers and Passive Tags for Indoor Mobile Robot Self-Localization

    PubMed Central

    Mi, Jian; Takahashi, Yasutake

    2016-01-01

    Radio frequency identification (RFID) technology has already been explored for efficient self-localization of indoor mobile robots. A mobile robot equipped with RFID readers detects passive RFID tags installed on the floor in order to locate itself. The Monte-Carlo localization (MCL) method enables the localization of a mobile robot equipped with an RFID system with reasonable accuracy, sufficient robustness and low computational cost. The arrangements of RFID readers and tags and the size of antennas are important design parameters for realizing accurate and robust self-localization using a low-cost RFID system. The design of a likelihood model of RFID tag detection is also crucial for the accurate self-localization. This paper presents a novel design and arrangement of RFID readers and tags for indoor mobile robot self-localization. First, by considering small-sized and large-sized antennas of an RFID reader, we show how the design of the likelihood model affects the accuracy of self-localization. We also design a novel likelihood model by taking into consideration the characteristics of the communication range of an RFID system with a large antenna. Second, we propose a novel arrangement of RFID tags with eight RFID readers, which results in the RFID system configuration requiring much fewer readers and tags while retaining reasonable accuracy of self-localization. We verify the performances of MCL-based self-localization realized using the high-frequency (HF)-band RFID system with eight RFID readers and a lower density of RFID tags installed on the floor based on MCL in simulated and real environments. The results of simulations and real environment experiments demonstrate that our proposed low-cost HF-band RFID system realizes accurate and robust self-localization of an indoor mobile robot. PMID:27483279

  13. Bound entangled states with extremal properties

    NASA Astrophysics Data System (ADS)

    BadziaÂģ, Piotr; Horodecki, Karol; Horodecki, Michał; Jenkinson, Justin; Szarek, Stanisław J.

    2014-07-01

    Following recent work of Beigi and Shor, we investigate positive partial transpose (PPT) states that are "heavily entangled." We first exploit volumetric methods to show that in a randomly chosen direction, there are PPT states whose distance in trace norm from separable states is (asymptotically) at least 1/4. We then provide explicit examples of PPT states which are nearly as far from separable ones as possible. To obtain a distance of 2-ɛ from the separable states, we need a dimension of 2poly [log(1/ɛ)], as opposed to 2poly (1/ɛ) given by the construction of Beigi and Shor [J. Math. Phys. 51, 042202 (2010), 10.1063/1.3364793]. We do so by exploiting the so-called private states, introduced earlier in the context of quantum cryptography. We also provide a lower bound for the distance between private states and PPT states and investigate the distance between pure states and the set of PPT states.

  14. Integrated algorithms for RFID-based multi-sensor indoor/outdoor positioning solutions

    NASA Astrophysics Data System (ADS)

    Zhu, Mi.; Retscher, G.; Zhang, K.

    2011-12-01

    Position information is very important as people need it almost everywhere all the time. However, it is a challenging task to provide precise positions indoor/outdoor seamlessly. Outdoor positioning has been widely studied and accurate positions can usually be achieved by well developed GPS techniques but these techniques are difficult to be used indoors since GPS signal reception is limited. The alternative techniques that can be used for indoor positioning include, to name a few, Wireless Local Area Network (WLAN), bluetooth and Ultra Wideband (UWB) etc.. However, all of these have limitations. The main objectives of this paper are to investigate and develop algorithms for a low-cost and portable indoor personal positioning system using Radio Frequency Identification (RFID) and its integration with other positioning systems. An RFID system consists of three components, namely a control unit, an interrogator and a transponder that transmits data and communicates with the reader. An RFID tag can be incorporated into a product, animal or person for the purpose of identification and tracking using radio waves. In general, for RFID positioning in urban and indoor environments three different methods can be used, including cellular positioning, trilateration and location fingerprinting. In addition, the integration of RFID with other technologies is also discussed in this paper. A typical combination is to integrate RFID with relative positioning technologies such as MEMS INS to bridge the gaps between RFID tags for continuous positioning applications. Experiments are shown to demonstrate the improvements of integrating multiple sensors with RFID which can be employed successfully for personal positioning.

  15. RFID Equivalent Model for Prediction of Functional and EMC Performances in Complex Aeronautic Environments

    NASA Astrophysics Data System (ADS)

    Piche, Alexandre; Perraud, Richard; Peres, Gilles; Nguyen, Francois; Herlem, Yannick

    2016-05-01

    Wireless networks are widely used in urban or office environments and are increasingly considered as an attractive solution for various aeronautic applications. Current investigations focus in particular on RFID technologies because of their widespread use, low cost and ease of installation. The objective of this publication is to propose a concept of RFID equivalent model to predict functional and EMC performances in complex aeronautic areas.

  16. A Comparable Market Study of RFID for Manual Item-Level Accountability Inventory and Tracking Systems

    DTIC Science & Technology

    2007-03-01

    reluctance to adopt RFID as an automated identify data and capture ( AIDC ) capability in item-level visibility for applicable business processes. The...microwave frequencies (LF, HF, UHF, and MW respectively) these components are applicable to all RFID technologies; access control, AIDC , track...only use AIDC information in-house, for instance a clinic tracking patient records with staff of 40 doctors. WORM tags have information

  17. EDMC: An enhanced distributed multi-channel anti-collision algorithm for RFID reader system

    NASA Astrophysics Data System (ADS)

    Zhang, YuJing; Cui, Yinghua

    2017-05-01

    In this paper, we proposes an enhanced distributed multi-channel reader anti-collision algorithm for RFID environments which is based on the distributed multi-channel reader anti-collision algorithm for RFID environments (called DiMCA). We proposes a monitor method to decide whether reader receive the latest control news after it selected the data channel. The simulation result shows that it improves interrogation delay.

  18. Investigating the Department of Defense’s Implementation of Passive Radio Frequency Identification (RFID)

    DTIC Science & Technology

    2006-04-30

    barriers that arose in the implementation of this emerging technology and possible solutions to those barriers. The authors conducted interviews with key...processes. Their analysis reveals the following: (1) passive RFID implementation is progressing in a manner conducive to the implementation of an emerging ... technology beset by so many problems, (2) the GAO’s recommendation that "passive RFID needs better management to work" offers little assistance in the

  19. Investigation of Using Radio Frequency Identification (RFID) System for Gear Tooth Crack Detection

    DTIC Science & Technology

    2014-06-01

    protection required (such as a housing to protect the tag/reader from heat, cold, and chemicals). To make a general comparison between the LF/HF RFID...include the price of antenna and cabling. Dumb readers are generally cheaper but only have limited computing power. Intelligent readers are considerably...The price of HF and UHF RFID readers can range from $500 to $3000 depending on the function and frequency range required [16, 21]. Generally, the LF/HF

  20. A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol

    NASA Astrophysics Data System (ADS)

    Jeng, Albert; Chang, Li-Chung; Chen, Sheng-Hui

    There are many protocols proposed for protecting Radio Frequency Identification (RFID) system privacy and security. A number of these protocols are designed for protecting long-term security of RFID system using symmetric key or public key cryptosystem. Others are designed for protecting user anonymity and privacy. In practice, the use of RFID technology often has a short lifespan, such as commodity check out, supply chain management and so on. Furthermore, we know that designing a long-term security architecture to protect the security and privacy of RFID tags information requires a thorough consideration from many different aspects. However, any security enhancement on RFID technology will jack up its cost which may be detrimental to its widespread deployment. Due to the severe constraints of RFID tag resources (e. g., power source, computing power, communication bandwidth) and open air communication nature of RFID usage, it is a great challenge to secure a typical RFID system. For example, computational heavy public key and symmetric key cryptography algorithms (e. g., RSA and AES) may not be suitable or over-killed to protect RFID security or privacy. These factors motivate us to research an efficient and cost effective solution for RFID security and privacy protection. In this paper, we propose a new effective generic binary tree based key agreement protocol (called BKAP) and its variations, and show how it can be applied to secure the low cost and resource constraint RFID system. This BKAP is not a general purpose key agreement protocol rather it is a special purpose protocol to protect privacy, un-traceability and anonymity in a single RFID closed system domain.

  1. Multivariable passive RFID vapor sensors: roll-to-roll fabrication on a flexible substrate.

    PubMed

    Potyrailo, Radislav A; Burns, Andrew; Surman, Cheryl; Lee, D J; McGinniss, Edward

    2012-06-21

    We demonstrate roll-to-roll (R2R) fabrication of highly selective, battery-free radio frequency identification (RFID) sensors on a flexible polyethylene terephthalate (PET) polymeric substrate. Selectivity of our developed RFID sensors is provided by measurements of their resonance impedance spectra, followed by the multivariate analysis of spectral features, and correlation of these spectral features to the concentrations of vapors of interest. The multivariate analysis of spectral features also provides the ability for the rejection of ambient interferences. As a demonstration of our R2R fabrication process, we employed polyetherurethane (PEUT) as a "classic" sensing material, extruded this sensing material as 25, 75, and 125-μm thick films, and thermally laminated the films onto RFID inlays, rapidly producing approximately 5000 vapor sensors. We further tested these RFID vapor sensors for their response selectivity toward several model vapors such as toluene, acetone, and ethanol as well as water vapor as an abundant interferent. Our RFID sensing concept features 16-bit resolution provided by the sensor reader, granting a highly desired independence from costly proprietary RFID memory chips with a low-resolution analog input. Future steps are being planned for field-testing of these sensors in numerous conditions.

  2. Evaluation of MRI issues for an access port with a radiofrequency identification (RFID) tag.

    PubMed

    Titterington, Blake; Shellock, Frank G

    2013-10-01

    A medical implant that contains metal, such as an RFID tag, must undergo proper MRI testing to ensure patient safety and to determine that the function of the RFID tag is not compromised by exposure to MRI conditions. Therefore, the objective of this investigation was to assess MRI issues for a new access port that incorporates an RFID tag. Samples of the access port with an RFID tag (Medcomp Power Injectable Port with CertainID; Medcomp, Harleysville, PA) were evaluated using standard protocols to assess magnetic field interactions (translational attraction and torque; 3-T), MRI-related heating (3-T), artifacts (3-T), and functional changes associated with different MRI conditions (nine samples, exposed to different MRI conditions at 1.5-T and 3-T). Magnetic field interactions were not substantial and will pose no hazards to patients. MRI-related heating was minimal (highest temperature change, 1.7°C; background temperature rise, 1.6°C). Artifacts were moderate in size in relation to the device. Exposures to MRI conditions at 1.5-T and 3-T did not alter or damage the functional aspects of the RFID tag. Based on the findings of the test, this new access port with an RFID tag is acceptable (or, MR conditional, using current MRI labeling terminology) for patients undergoing MRI examinations at 1.5-T/64-MHz and 3-T/128-MHz. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  4. Performance Evaluation of a UWB-RFID System for Potential Space Applications

    NASA Technical Reports Server (NTRS)

    Phan, Chan T.; Arndt, D.; Ngo, P.; Gross, J.; Ni, Jianjun; Rafford, Melinda

    2006-01-01

    This talk presents a brief overview of the ultra-wideband (UWB) RFID system with emphasis on the performance evaluation of a commercially available UWB-RFID system. There are many RFID systems available today, but many provide just basic identification for auditing and inventory tracking. For applications that require high precision real time tracking, UWB technology has been shown to be a viable solution. The use of extremely short bursts of RF pulses offers high immunity to interference from other RF systems, precise tracking due to sub-nanosecond time resolution, and robust performance in multipath environments. The UWB-RFID system Sapphire DART (Digital Active RFID & Tracking) will be introduced in this talk. Laboratory testing using Sapphire DART is performed to evaluate its capability such as coverage area, accuracy, ease of operation, and robustness. Performance evaluation of this system in an operational environment (a receiving warehouse) for inventory tracking is also conducted. Concepts of using the UWB-RFID technology to track astronauts and assets are being proposed for space exploration.

  5. Tag-to-Tag Interference Suppression Technique Based on Time Division for RFID

    PubMed Central

    Khadka, Grishma; Hwang, Suk-Seung

    2017-01-01

    Radio-frequency identification (RFID) is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is already well established in technical areas, and many companies have developed corresponding standards and measurement techniques. In the construction industry, effective monitoring of materials and equipment is an important task, and RFID helps to improve monitoring and controlling capabilities, in addition to enabling automation for construction projects. However, on construction sites, there are many tagged objects and multiple RFID tags that may interfere with each other’s communications. This reduces the reliability and efficiency of the RFID system. In this paper, we propose an anti-collision algorithm for communication between multiple tags and a reader. In order to suppress interference signals from multiple neighboring tags, the proposed algorithm employs the time-division (TD) technique, where tags in the interrogation zone are assigned a specific time slot so that at every instance in time, a reader communicates with tags using the specific time slot. We present representative computer simulation examples to illustrate the performance of the proposed anti-collision technique for multiple RFID tags. PMID:28045440

  6. RFID in healthcare: a Six Sigma DMAIC and simulation case study.

    PubMed

    Southard, Peter B; Chandra, Charu; Kumar, Sameer

    2012-01-01

    The purpose of this paper is to develop a business model to generate quantitative evidence of the benefits of implementing radio frequency identification (RFID) technology, limiting the scope to outpatient surgical processes in hospitals. The study primarily uses the define-measure-analyze-improve-control (DMAIC) approach, and draws on various analytical tools such as work flow diagrams, value stream mapping, and discrete event simulation to examine the effect of implementing RFID technology on improving effectiveness (quality and timeliness) and efficiency (cost reduction) of outpatient surgical processes. The analysis showed significant estimated annual cost and time savings in carrying out patients' surgical procedures with RFID technology implementation for the outpatient surgery processes in a hospital. This is largely due to the elimination of both non-value added activities of locating supplies and equipment and also the elimination of the "return" loop created by preventable post operative infections. Several poka-yokes developed using RFID technology were identified to eliminate those two issues. Several poka-yokes developed using RFID technology were identified for improving the safety of the patient and cost effectiveness of the operation to ensure the success of the outpatient surgical process. Many stakeholders in the hospital environment will be impacted including patients, physicians, nurses, technicians, administrators and other hospital personnel. Different levels of training of hospital personnel will be required, based on the degree of interaction with the RFID system. Computations of costs and savings will help decision makers understand the benefits and implications of the technology in the hospital environment.

  7. Tag-to-Tag Interference Suppression Technique Based on Time Division for RFID.

    PubMed

    Khadka, Grishma; Hwang, Suk-Seung

    2017-01-01

    Radio-frequency identification (RFID) is a tracking technology that enables immediate automatic object identification and rapid data sharing for a wide variety of modern applications using radio waves for data transmission from a tag to a reader. RFID is already well established in technical areas, and many companies have developed corresponding standards and measurement techniques. In the construction industry, effective monitoring of materials and equipment is an important task, and RFID helps to improve monitoring and controlling capabilities, in addition to enabling automation for construction projects. However, on construction sites, there are many tagged objects and multiple RFID tags that may interfere with each other's communications. This reduces the reliability and efficiency of the RFID system. In this paper, we propose an anti-collision algorithm for communication between multiple tags and a reader. In order to suppress interference signals from multiple neighboring tags, the proposed algorithm employs the time-division (TD) technique, where tags in the interrogation zone are assigned a specific time slot so that at every instance in time, a reader communicates with tags using the specific time slot. We present representative computer simulation examples to illustrate the performance of the proposed anti-collision technique for multiple RFID tags.

  8. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  9. RFID in the blood supply chain--increasing productivity, quality and patient safety.

    PubMed

    Briggs, Lynne; Davis, Rodeina; Gutierrez, Alfonso; Kopetsky, Matthew; Young, Kassandra; Veeramani, Raj

    2009-01-01

    As part of an overall design of a new, standardized RFID-enabled blood transfusion medicine supply chain, an assessment was conducted for two hospitals: the University of Iowa Hospital and Clinics (UIHC) and Mississippi Baptist Health System (MBHS). The main objectives of the study were to assess RFID technological and economic feasibility, along with possible impacts to productivity, quality and patient safety. A step-by-step process analysis focused on the factors contributing to process "pain points" (errors, inefficiency, product losses). A process re-engineering exercise produced blueprints of RFID-enabled processes to alleviate or eliminate those pain-points. In addition, an innovative model quantifying the potential reduction in adverse patient effects as a result of RFID implementation was created, allowing improvement initiatives to focus on process areas with the greatest potential impact to patient safety. The study concluded that it is feasible to implement RFID-enabled processes, with tangible improvements to productivity and safety expected. Based on a comprehensive cost/benefit model, it is estimated for a large hospital (UIHC) to recover investment from implementation within two to three years, while smaller hospitals may need longer to realize ROI. More importantly, the study estimated that RFID technology could reduce morbidity and mortality effects substantially among patients receiving transfusions.

  10. Design and implementation of a volume conduction based RFID system for smart implants.

    PubMed

    Liu, Xiaoyu; Ogirala, Ajay; Berger, Lee; Mickle, Marlin

    2011-01-01

    As the population ages, knee and hip replacement surgeries are more and more popular, and embedding an RFID (radio frequency identification) tag on these implants for identification becomes an important issue. Traditional operation of an RFID tag by wireless means will not work on the implantable knees or hips which are made of metal because of the interference caused by metallic objects degrading the field strength near the RFID tag. This paper proposes a method of operating an RFID tag using volume conduction while avoiding the RF interference in a metallic environment. To increase the efficiency of power transmission, electrodes in this paper are designed and optimized for a real knee implant. Experiments using saline have been conducted and the results have shown that volume conduction has a better performance than wireless methods in that signal attenuation is far less in metallic environments. Finally, the experiment on reading an implanted RFID tag through pig skin shows that volume conduction is an effective method to operate an RFID tag embedded on a metallic implant.

  11. Virial Expansion Bounds

    NASA Astrophysics Data System (ADS)

    Tate, Stephen James

    2013-10-01

    In the 1960s, the technique of using cluster expansion bounds in order to achieve bounds on the virial expansion was developed by Lebowitz and Penrose (J. Math. Phys. 5:841, 1964) and Ruelle (Statistical Mechanics: Rigorous Results. Benjamin, Elmsford, 1969). This technique is generalised to more recent cluster expansion bounds by Poghosyan and Ueltschi (J. Math. Phys. 50:053509, 2009), which are related to the work of Procacci (J. Stat. Phys. 129:171, 2007) and the tree-graph identity, detailed by Brydges (Phénomènes Critiques, Systèmes Aléatoires, Théories de Jauge. Les Houches 1984, pp. 129-183, 1986). The bounds achieved by Lebowitz and Penrose can also be sharpened by doing the actual optimisation and achieving expressions in terms of the Lambert W-function. The different bound from the cluster expansion shows some improvements for bounds on the convergence of the virial expansion in the case of positive potentials, which are allowed to have a hard core.

  12. RFID and Memory Devices Fabricated Integrally on Substrates

    NASA Technical Reports Server (NTRS)

    Schramm, Harry F.

    2004-01-01

    Electronic identification devices containing radio-frequency identification (RFID) circuits and antennas would be fabricated integrally with the objects to be identified, according to a proposal. That is to say, the objects to be identified would serve as substrates for the deposition and patterning of the materials of the devices used to identify them, and each identification device would be bonded to the identified object at the molecular level. Vacuum arc vapor deposition (VAVD) is the NASA derived process for depositing layers of material on the substrate. This proposal stands in contrast to the current practice of fabricating RFID and/or memory devices as wafer-based, self-contained integrated-circuit chips that are subsequently embedded in or attached to plastic cards to make smart account-information cards and identification badges. If one relies on such a chip to store data on the history of an object to be tracked and the chip falls off or out of the object, then one loses both the historical data and the means to track the object and verify its identity electronically. Also, in contrast is the manufacturing philosophy in use today to make many memory devices. Today s methods involve many subtractive processes such as etching. This proposal only uses additive methods, building RFID and memory devices from the substrate up in thin layers. VAVD is capable of spraying silicon, copper, and other materials commonly used in electronic devices. The VAVD process sprays most metals and some ceramics. The material being sprayed has a very strong bond with the substrate, whether that substrate is metal, ceramic, or even wood, rock, glass, PVC, or paper. An object to be tagged with an identification device according to the proposal must be compatible with a vacuum deposition process. Temperature is seldom an issue as the substrate rarely reaches 150 F (66 C) during the deposition process. A portion of the surface of the object would be designated as a substrate for

  13. Copyright law and distance nursing education.

    PubMed

    Rhoads, Jacqueline; White, Carolyn

    2008-01-01

    The authors present essential information regarding the copyright law and online education. This information provides the reader specific aids to assist in designing and implementing distance education courses within the bounds of the Technology, Education, and Copyright Harmonization Act and fair use guidelines. From their research, the authors, who are distance education experts, offer a wide array of educational and legal data to inform nurse educators.

  14. Passive UHF RFID Tag with Multiple Sensing Capabilities

    PubMed Central

    Fernández-Salmerón, José; Rivadeneyra, Almudena; Martínez-Martí, Fernando; Capitán-Vallvey, Luis Fermín; Palma, Alberto J.; Carvajal, Miguel A.

    2015-01-01

    This work presents the design, fabrication, and characterization of a printed radio frequency identification tag in the ultra-high frequency band with multiple sensing capabilities. This passive tag is directly screen printed on a cardboard box with the aim of monitoring the packaging conditions during the different stages of the supply chain. This tag includes a commercial force sensor and a printed opening detector. Hence, the force applied to the package can be measured as well as the opening of the box can be detected. The architecture presented is a passive single-chip RFID tag. An electronic switch has been implemented to be able to measure both sensor magnitudes in the same access without including a microcontroller or battery. Moreover, the chip used here integrates a temperature sensor and, therefore, this tag provides three different parameters in every reading. PMID:26506353

  15. Passive UHF RFID tag with multiple sensing capabilities.

    PubMed

    Fernández-Salmerón, José; Rivadeneyra, Almudena; Martínez-Martí, Fernando; Capitán-Vallvey, Luis Fermín; Palma, Alberto J; Carvajal, Miguel A

    2015-10-22

    This work presents the design, fabrication, and characterization of a printed radio frequency identification tag in the ultra-high frequency band with multiple sensing capabilities. This passive tag is directly screen printed on a cardboard box with the aim of monitoring the packaging conditions during the different stages of the supply chain. This tag includes a commercial force sensor and a printed opening detector. Hence, the force applied to the package can be measured as well as the opening of the box can be detected. The architecture presented is a passive single-chip RFID tag. An electronic switch has been implemented to be able to measure both sensor magnitudes in the same access without including a microcontroller or battery. Moreover, the chip used here integrates a temperature sensor and, therefore, this tag provides three different parameters in every reading.

  16. RFID Tag Helix Antenna Sensors for Wireless Drug Dosage Monitoring.

    PubMed

    Huang, Haiyu; Zhao, Peisen; Chen, Pai-Yen; Ren, Yong; Liu, Xuewu; Ferrari, Mauro; Hu, Ye; Akinwande, Deji

    2014-01-01

    Miniaturized helix antennas are integrated with drug reservoirs to function as RFID wireless tag sensors for real-time drug dosage monitoring. The general design procedure of this type of biomedical antenna sensors is proposed based on electromagnetic theory and finite element simulation. A cost effective fabrication process is utilized to encapsulate the antenna sensor within a biocompatible package layer using PDMS material, and at the same time form a drug storage or drug delivery unit inside the sensor. The in vitro experiment on two prototypes of antenna sensor-drug reservoir assembly have shown the ability to monitor the drug dosage by tracking antenna resonant frequency shift from 2.4-2.5-GHz ISM band with realized sensitivity of 1.27 [Formula: see text] for transdermal drug delivery monitoring and 2.76-[Formula: see text] sensitivity for implanted drug delivery monitoring.

  17. A CMOS Humidity Sensor for Passive RFID Sensing Applications

    PubMed Central

    Deng, Fangming; He, Yigang; Zhang, Chaolong; Feng, Wei

    2014-01-01

    This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The humidity sensing element is implemented in standard CMOS technology without any further post-processing, which results in low fabrication costs. The interface of this humidity sensor employs a PLL-based architecture transferring sensor signal processing from the voltage domain to the frequency domain. Therefore this architecture allows the use of a fully digital circuit, which can operate on ultra-low supply voltage and thus achieves low-power consumption. The proposed humidity sensor has been fabricated in the TSMC 0.18 μm CMOS process. The measurements show this humidity sensor exhibits excellent linearity and stability within the relative humidity range. The sensor interface circuit consumes only 1.05 μW at 0.5 V supply voltage and reduces it at least by an order of magnitude compared to previous designs. PMID:24841250

  18. Rfid-Based Automatic Bus Ticketing: Features and Trends

    NASA Astrophysics Data System (ADS)

    Oudah, A.

    2016-02-01

    Recent advancements in various technologies have made remarkable developments in various fields for public welfare and public transport is one such area. In the near future public bus transport system with advanced technologies like Radio Frequency Identification Device (RFID), GSM, GPS, ZigBee and RF modules will gain spotlight due to their advantage of higher convenience and greater life standards as compared to the conventional bus systems. In this paper, a comprehensive review of all several proposed bus ticketing and bus information methods has been presented in detail. The study brings out improved solution in terms of cost, convenience, user satisfaction and future implementation. The choice of working modules and their efficient performance has been discussed along with the highlighted importance of the need of technology for welfare of common public and visually impaired.

  19. A CMOS humidity sensor for passive RFID sensing applications.

    PubMed

    Deng, Fangming; He, Yigang; Zhang, Chaolong; Feng, Wei

    2014-05-16

    This paper presents a low-cost low-power CMOS humidity sensor for passive RFID sensing applications. The humidity sensing element is implemented in standard CMOS technology without any further post-processing, which results in low fabrication costs. The interface of this humidity sensor employs a PLL-based architecture transferring sensor signal processing from the voltage domain to the frequency domain. Therefore this architecture allows the use of a fully digital circuit, which can operate on ultra-low supply voltage and thus achieves low-power consumption. The proposed humidity sensor has been fabricated in the TSMC 0.18 μm CMOS process. The measurements show this humidity sensor exhibits excellent linearity and stability within the relative humidity range. The sensor interface circuit consumes only 1.05 µW at 0.5 V supply voltage and reduces it at least by an order of magnitude compared to previous designs.

  20. A novel FEA simulation model for RFID SAW tag.

    PubMed

    Peng, Dasong; Yu, Fengqi

    2009-08-01

    Based on finite element analysis, we propose a simulation model for radio frequency identification (RFID) SAW tag devices. Electric properties of metal electrode on substrate greatly affect the characteristics of the device and are discussed in the paper. Then the right and left boundary conditions for the device are applied to remove large unwanted waves generated by wave propagation near the boundaries. To save computation time, a 2-D model is proposed, where some mesh skills are applied. The tag device is simulated in 2 steps. First, we use modal analysis to get the device phase velocity and harmonic frequency. Second, a tag with multireflectors is simulated. Based on the simulations, we have designed and fabricated a SAW tag. A comparison is made between simulation and experimental results and shows our simulation model agrees with the experiment very well.

  1. RFID Ownership Transfer with Positive Secrecy Capacity Channels

    PubMed Central

    Munilla, Jorge; Burmester, Mike; Peinado, Alberto; Yang, Guomin; Susilo, Willy

    2016-01-01

    RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i) is formally secure in the proposed communication model and (ii) achieves privacy with a noisy tag wiretap channel without TTPs. PMID:28036085

  2. Defining Distance Learning and Distance Education.

    ERIC Educational Resources Information Center

    King, Frederick B.; Young, Michael F.; Drivere-Richmond, Kelly; Schrader, P. G.

    2001-01-01

    This paper offers precise definitions of distance learning and distance education, and their interrelationship. First, a single definition of learning is proposed, and then the concept of learning is broken down into three subcategories: instruction, exploration, and serendipity. Each is defined and the concepts of distance learning and distance…

  3. Validation of EMP bounds

    SciTech Connect

    Warne, L.K.; Merewether, K.O.; Chen, K.C.; Jorgenson, R.E.; Morris, M.E.; Solberg, J.E.; Lewis, J.G.; Derr, W.

    1996-07-01

    Test data on canonical weapon-like fixtures are used to validate previously developed analytical bounding results. The test fixtures were constructed to simulate (but be slightly worse than) weapon ports of entry but have known geometries (and electrical points of contact). The exterior of the test fixtures exhibited exterior resonant enhancement of the incident fields at the ports of entry with magnitudes equal to those of weapon geometries. The interior consisted of loaded transmission lines adjusted to maximize received energy or voltage but incorporating practical weapon geometrical constraints. New analytical results are also presented for bounding the energies associated with multiple bolt joints and for bounding the exterior resonant enhancement of the exciting fields.

  4. Energy efficient cooperation in underlay RFID cognitive networks for a water smart home.

    PubMed

    Nasir, Adnan; Hussain, Syed Imtiaz; Soong, Boon-Hee; Qaraqe, Khalid

    2014-09-30

    Shrinking water resources all over the world and increasing costs of water consumption have prompted water users and distribution companies to come up with water conserving strategies. We have proposed an energy-efficient smart water monitoring application in [1], using low power RFIDs. In the home environment, there exist many primary interferences within a room, such as cell-phones, Bluetooth devices, TV signals, cordless phones and WiFi devices. In order to reduce the interference from our proposed RFID network for these primary devices, we have proposed a cooperating underlay RFID cognitive network for our smart application on water. These underlay RFIDs should strictly adhere to the interference thresholds to work in parallel with the primary wireless devices [2]. This work is an extension of our previous ventures proposed in [2,3], and we enhanced the previous efforts by introducing a new system model and RFIDs. Our proposed scheme is mutually energy efficient and maximizes the signal-to-noise ratio (SNR) for the RFID link, while keeping the interference levels for the primary network below a certain threshold. A closed form expression for the probability density function (pdf) of the SNR at the destination reader/writer and outage probability are derived. Analytical results are verified through simulations. It is also shown that in comparison to non-cognitive selective cooperation, this scheme performs better in the low SNR region for cognitive networks. Moreover, the hidden Markov model's (HMM) multi-level variant hierarchical hidden Markov model (HHMM) approach is used for pattern recognition and event detection for the data received for this system [4]. Using this model, a feedback and decision algorithm is also developed. This approach has been applied to simulated water pressure data from RFID motes, which were embedded in metallic water pipes.

  5. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications.

    PubMed

    Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-12-24

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol.

  6. Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications

    PubMed Central

    Fernández-Caramés, Tiago M.; Fraga-Lamas, Paula; Suárez-Albela, Manuel; Castedo, Luis

    2016-01-01

    The Internet of Things (IoT) is a distributed system of physical objects that requires the seamless integration of hardware (e.g., sensors, actuators, electronics) and network communications in order to collect and exchange data. IoT smart objects need to be somehow identified to determine the origin of the data and to automatically detect the elements around us. One of the best positioned technologies to perform identification is RFID (Radio Frequency Identification), which in the last years has gained a lot of popularity in applications like access control, payment cards or logistics. Despite its popularity, RFID security has not been properly handled in numerous applications. To foster security in such applications, this article includes three main contributions. First, in order to establish the basics, a detailed review of the most common flaws found in RFID-based IoT systems is provided, including the latest attacks described in the literature. Second, a novel methodology that eases the detection and mitigation of such flaws is presented. Third, the latest RFID security tools are analyzed and the methodology proposed is applied through one of them (Proxmark 3) to validate it. Thus, the methodology is tested in different scenarios where tags are commonly used for identification. In such systems it was possible to clone transponders, extract information, and even emulate both tags and readers. Therefore, it is shown that the methodology proposed is useful for auditing security and reverse engineering RFID communications in IoT applications. It must be noted that, although this paper is aimed at fostering RFID communications security in IoT applications, the methodology can be applied to any RFID communications protocol. PMID:28029119

  7. Energy Efficient Cooperation in Underlay RFID Cognitive Networks for a Water Smart Home

    PubMed Central

    Nasir, Adnan; Hussain, Syed Imtiaz; Soong, Boon-Hee; Qaraqe, Khalid

    2014-01-01

    Shrinking water resources all over the world and increasing costs of water consumption have prompted water users and distribution companies to come up with water conserving strategies. We have proposed an energy-efficient smart water monitoring application in [1], using low power RFIDs. In the home environment, there exist many primary interferences within a room, such as cell-phones, Bluetooth devices, TV signals, cordless phones and WiFi devices. In order to reduce the interference from our proposed RFID network for these primary devices, we have proposed a cooperating underlay RFID cognitive network for our smart application on water. These underlay RFIDs should strictly adhere to the interference thresholds to work in parallel with the primary wireless devices [2]. This work is an extension of our previous ventures proposed in [2,3], and we enhanced the previous efforts by introducing a new system model and RFIDs. Our proposed scheme is mutually energy efficient and maximizes the signal-to-noise ratio (SNR) for the RFID link, while keeping the interference levels for the primary network below a certain threshold. A closed form expression for the probability density function (pdf) of the SNR at the destination reader/writer and outage probability are derived. Analytical results are verified through simulations. It is also shown that in comparison to non-cognitive selective cooperation, this scheme performs better in the low SNR region for cognitive networks. Moreover, the hidden Markov model’s (HMM) multi-level variant hierarchical hidden Markov model (HHMM) approach is used for pattern recognition and event detection for the data received for this system [4]. Using this model, a feedback and decision algorithm is also developed. This approach has been applied to simulated water pressure data from RFID motes, which were embedded in metallic water pipes. PMID:25271565

  8. Long range ultra-high frequency (UHF) radio frequency identification (RFID) antenna design

    NASA Astrophysics Data System (ADS)

    Reynolds, Nathan D.

    There is an ever-increasing demand for radio frequency identification (RFID) tags that are passive, long range, and mountable on multiple surfaces. Currently, RFID technology is utilized in numerous applications such as supply chain management, access control, and public transportation. With the combination of sensory systems in recent years, the applications of RFID technology have been extended beyond tracking and identifying. This extension includes applications such as environmental monitoring and healthcare applications. The available sensory systems usually operate in the medium or high frequency bands and have a low read range. However, the range limitations of these systems are being overcome by the development of RFID sensors focused on utilizing tags in the ultra-high frequency (UHF) band. Generally, RFID tags have to be mounted to the object that is being identified. Often the objects requiring identification are metallic. The inherent properties of metallic objects have substantial effects on nearby electromagnetic radiation; therefore, the operation of the tag antenna is affected when mounted on a metallic surface. This outlines one of the most challenging problems for RFID systems today: the optimization of tag antenna performance in a complex environment. In this research, a novel UHF RFID tag antenna, which has a low profile, long range, and is mountable on metallic surfaces, is designed analytically and simulated using a 3-D electromagnetic simulator, ANSYS HFSS. A microstrip patch antenna is selected as the antenna structure, as patch antennas are low profile and suitable for mounting on metallic surfaces. Matching and theoretical models of the microstrip patch antenna are investigated. Once matching and theory of a microstrip patch antenna is thoroughly understood, a unique design technique using electromagnetic band gap (EBG) structures is explored. This research shows that the utilization of an EBG structure in the patch antenna design yields

  9. A lower bound for the decoder error probability of the linear MDS code

    NASA Technical Reports Server (NTRS)

    Cheung, K.-M.

    1988-01-01

    A lower bound for the decoder error probability (P sub E (u)) of a linear maximum distance separable (MDS) code is derived by counting the dominant types of decoding words around code words. It is shown that the lower bound derived is similar in form, and close numerically, to the upper bound derived.

  10. Comparison of Phase-Based 3D Near-Field Source Localization Techniques for UHF RFID

    PubMed Central

    Parr, Andreas; Miesen, Robert; Vossiek, Martin

    2016-01-01

    In this paper, we present multiple techniques for phase-based narrowband backscatter tag localization in three-dimensional space with planar antenna arrays or synthetic apertures. Beamformer and MUSIC localization algorithms, known from near-field source localization and direction-of-arrival estimation, are applied to the 3D backscatter scenario and their performance in terms of localization accuracy is evaluated. We discuss the impact of different transceiver modes known from the literature, which evaluate different send and receive antenna path combinations for a single localization, as in multiple input multiple output (MIMO) systems. Furthermore, we propose a new Singledimensional-MIMO (S-MIMO) transceiver mode, which is especially suited for use with mobile robot systems. Monte-Carlo simulations based on a realistic multipath error model ensure spatial correlation of the simulated signals, and serve to critically appraise the accuracies of the different localization approaches. A synthetic uniform rectangular array created by a robotic arm is used to evaluate selected localization techniques. We use an Ultra High Frequency (UHF) Radiofrequency Identification (RFID) setup to compare measurements with the theory and simulation. The results show how a mean localization accuracy of less than 30 cm can be reached in an indoor environment. Further simulations demonstrate how the distance between aperture and tag affects the localization accuracy and how the size and grid spacing of the rectangular array need to be adapted to improve the localization accuracy down to orders of magnitude in the centimeter range, and to maximize array efficiency in terms of localization accuracy per number of elements. PMID:27347976

  11. Calculating Reuse Distance from Source Code

    SciTech Connect

    Narayanan, Sri Hari Krishna; Hovland, Paul

    2016-01-26

    The efficient use of a system is of paramount importance in high-performance computing. Applications need to be engineered for future systems even before the architecture of such a system is clearly known. Static performance analysis that generates performance bounds is one way to approach the task of understanding application behavior. Performance bounds provide an upper limit on the performance of an application on a given architecture. Predicting cache hierarchy behavior and accesses to main memory is a requirement for accurate performance bounds. This work presents our static reuse distance algorithm to generate reuse distance histograms. We then use these histograms to predict cache miss rates. Experimental results for kernels studied show that the approach is accurate.

  12. Computing Graphical Confidence Bounds

    NASA Technical Reports Server (NTRS)

    Mezzacappa, M. A.

    1983-01-01

    Approximation for graphical confidence bounds is simple enough to run on programmable calculator. Approximation is used in lieu of numerical tables not always available, and exact calculations, which often require rather sizable computer resources. Approximation verified for collection of up to 50 data points. Method used to analyze tile-strength data on Space Shuttle thermal-protection system.

  13. Born Level Bound States

    NASA Astrophysics Data System (ADS)

    Hoyer, Paul

    2017-05-01

    Bound state poles in the S-matrix of perturbative QED are generated by the divergence of the expansion in α . The perturbative corrections are necessarily singular when expanding around free, {O}( α ^0 ) in and out states that have no overlap with finite-sized atomic wave functions. Nevertheless, measurables such as binding energies do have well-behaved expansions in powers of α (and log α ). It is desirable to formulate the concept of "lowest order" for gauge theory bound states such that higher order corrections vanish in the α → 0 limit. This may allow to determine a lowest order term for QCD hadrons which incorporates essential features such as confinement and chiral symmetry breaking, and thus can serve as the starting point of a useful perturbative expansion. I discuss a "Born" (no loop, lowest order in \\hbar ) approximation. Born level states are bound by gauge fields which satisfy the classical field equations. Gauss' law determines a distinct field A^0({\\varvec{x}}) for each instantaneous position of the charges. A Poincaré covariant boundary condition for the gluon field leads to a confining potential for q\\bar{q} and qqq states. In frames where the bound state is in motion the classical gauge field is obtained by a Lorentz boost of the rest frame field.

  14. Computing Graphical Confidence Bounds

    NASA Technical Reports Server (NTRS)

    Mezzacappa, M. A.

    1983-01-01

    Approximation for graphical confidence bounds is simple enough to run on programmable calculator. Approximation is used in lieu of numerical tables not always available, and exact calculations, which often require rather sizable computer resources. Approximation verified for collection of up to 50 data points. Method used to analyze tile-strength data on Space Shuttle thermal-protection system.

  15. Essays on the Effect of Radio Frequency Identification (RFID) on the Management of Healthcare Supply Chain Performance

    ERIC Educational Resources Information Center

    Cakici, Ozden Engin

    2012-01-01

    This dissertation examines three issues on the effect of Radio Frequency Identification (RFID) on the management of healthcare supply chain performance within the context of inventory management. Motivated by a case study conducted in a radiology practice, the second chapter analyzes the incremental benefits of RFID over barcodes for managing…

  16. Essays on the Effect of Radio Frequency Identification (RFID) on the Management of Healthcare Supply Chain Performance

    ERIC Educational Resources Information Center

    Cakici, Ozden Engin

    2012-01-01

    This dissertation examines three issues on the effect of Radio Frequency Identification (RFID) on the management of healthcare supply chain performance within the context of inventory management. Motivated by a case study conducted in a radiology practice, the second chapter analyzes the incremental benefits of RFID over barcodes for managing…

  17. Comparison of Self Powered EPC/ISO Compliant Tags with Real Time-RFID Systems and Impact on Asset Tracking

    DTIC Science & Technology

    2012-07-01

    Compliant Tags with Real Time- RFID Systems and Impact on Asset Tracking PRINCIPAL INVESTIGATOR: Tim Stettheimer...REPORT DATE: July 2012 TYPE OF REPORT: Final PREPARED FOR: U.S. Army Medical Research and Materiel Command...June 2012 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Comparison of Self Powered EPC/ISO Compliant Tags with Real Time- RFID Systems and Impact on

  18. Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System

    DTIC Science & Technology

    2008-12-04

    IUID Management Definition and Purpose for the DoD ...............................................................................................69 B...RFID vs. IUID Management Definition and Purpose for the DoD The purpose and definition of RFID and IUID technology throughout the DoD and business

  19. Nonclassical distance in multimode bosonic systems

    NASA Astrophysics Data System (ADS)

    Nair, Ranjith

    2017-06-01

    We revisit the notion of nonclassical distance of states of bosonic quantum systems introduced in Phys. Rev. A 35, 725 (1987), 10.1103/PhysRevA.35.725 in a general multimode setting. After reviewing its definition, we establish some of its general properties. We obtain new upper and lower bounds on the nonclassical distance in terms of the supremum of the Husimi function of the state. Considering several examples, we elucidate the cases for which our lower bound is tight, which include the multimode number states and a class of multimode NOON states. The latter provide examples of states of definite photon number n ≥2 whose nonclassical distance can be made arbitrarily close to the upper limit of 1 by increasing the number of modes. We show that the nonclassical distance of the even and odd Schrödinger cat states is bounded away from unity regardless of how macroscopic the superpositions are, and that the nonclassical distance is not necessarily monotonically increasing with respect to macroscopicity.

  20. Effects of radiation from a radiofrequency identification (RFID) microchip on human cancer cells.

    PubMed

    Lai, Henry C; Chan, Ho Wing; Singh, Narendra P

    2016-01-01

    Radiofrequency identification (RFID) microchips are used to remotely identify objects, e.g. an animal in which a chip is implanted. A passive RFID microchip absorbs energy from an external source and emits a radiofrequency identification signal which is then decoded by a detector. In the present study, we investigated the effect of the radiofrequency energy emitted by a RFID microchip on human cancer cells. Molt-4 leukemia, BT474 breast cancer, and HepG2 hepatic cancer cells were exposed in vitro to RFID microchip-emitted radiofrequency field for 1 h. Cells were counted before and after exposure. Effects of pretreatment with the spin-trap compound N-tert-butyl-alpha-phenylnitrone or the iron-chelator deferoxamine were also investigated. Results We found that the energy effectively killed/retarded the growth of the three different types of cancer cells, and the effect was blocked by the spin-trap compound or the iron-chelator, whereas an inactive microchip and energy from the external source had no significant effect on the cells. Conclusions Data of the present study suggest that radiofrequency field from the microchip affects cancer cells via the Fenton Reaction. Implantation of RFID microchips in tumors may provide a new method for cancer treatment.

  1. Abnormal Condition Monitoring of Workpieces Based on RFID for Wisdom Manufacturing Workshops

    PubMed Central

    Zhang, Cunji; Yao, Xifan; Zhang, Jianming

    2015-01-01

    Radio Frequency Identification (RFID) technology has been widely used in many fields. However, previous studies have mainly focused on product life cycle tracking, and there are few studies on real-time status monitoring of workpieces in manufacturing workshops. In this paper, a wisdom manufacturing model is introduced, a sensing-aware environment for a wisdom manufacturing workshop is constructed, and RFID event models are defined. A synthetic data cleaning method is applied to clean the raw RFID data. The Complex Event Processing (CEP) technology is adopted to monitor abnormal conditions of workpieces in real time. The RFID data cleaning method and data mining technology are examined by simulation and physical experiments. The results show that the synthetic data cleaning method preprocesses data well. The CEP based on the Rifidi® Edge Server technology completed abnormal condition monitoring of workpieces in real time. This paper reveals the importance of RFID spatial and temporal data analysis in real-time status monitoring of workpieces in wisdom manufacturing workshops. PMID:26633418

  2. Abnormal Condition Monitoring of Workpieces Based on RFID for Wisdom Manufacturing Workshops.

    PubMed

    Zhang, Cunji; Yao, Xifan; Zhang, Jianming

    2015-12-03

    Radio Frequency Identification (RFID) technology has been widely used in many fields. However, previous studies have mainly focused on product life cycle tracking, and there are few studies on real-time status monitoring of workpieces in manufacturing workshops. In this paper, a wisdom manufacturing model is introduced, a sensing-aware environment for a wisdom manufacturing workshop is constructed, and RFID event models are defined. A synthetic data cleaning method is applied to clean the raw RFID data. The Complex Event Processing (CEP) technology is adopted to monitor abnormal conditions of workpieces in real time. The RFID data cleaning method and data mining technology are examined by simulation and physical experiments. The results show that the synthetic data cleaning method preprocesses data well. The CEP based on the Rifidi(®) Edge Server technology completed abnormal condition monitoring of workpieces in real time. This paper reveals the importance of RFID spatial and temporal data analysis in real-time status monitoring of workpieces in wisdom manufacturing workshops.

  3. RFID based indoor navigational aid for persons with severe visual impairments.

    PubMed

    Szeto, Andrew Y J; Sharma, Satish K

    2007-01-01

    A flexible, low cost, and portable indoor navigational aid for persons who are blind or have severe visual impairments remains an unmet need and a technical challenge. Whereas devices using global positioning system (GPS) signals hold promise for navigational assistance in the outdoor environment, they do not work where GPS signals are absent or greatly attenuated. Thus a network of navigational beacons is needed for the indoor environment. This paper describes the promise of an indoor navigational aid that relies on a network of custom extended-range RFID tags. RFID (radio-frequency identification) technology has the advantages of being low cost, unobtrusive, and highly flexible in the sense that sight impaired travelers can use personalized RFID tags to mark indoor locations of their particular interest. However, commercially available RFID tags have very short detection ranges. To make them suitable as indoor electronic beacons, their range of detection must be greatly extended. Some of the technical challenges and proposed solutions that can extend the detection range are discussed in this paper following an overview of the proposed RFID based indoor navigational aid.

  4. Adding intelligence to mobile asset management in hospitals: the true value of RFID.

    PubMed

    Castro, Linda; Lefebvre, Elisabeth; Lefebvre, Louis A

    2013-10-01

    RFID (Radio Frequency Identification) technology is expected to play a vital role in the healthcare arena, especially in times when cost containments are at the top of the priorities of healthcare management authorities. Medical equipment represents a significant share of yearly healthcare operational costs; hence, ensuring an effective and efficient management of such key assets is critical to promptly and reliably deliver a diversity of clinical services at the patient bedside. Empirical evidence from a phased-out RFID implementation in one European hospital demonstrates that RFID has the potential to transform asset management by improving inventory management, enhancing asset utilization, increasing staff productivity, improving care services, enhancing maintenance compliance, and increasing information visibility. Most importantly, RFID allows the emergence of intelligent asset management processes, which is, undoubtedly, the most important benefit that could be derived from the RFID system. Results show that the added intelligence can be rather basic (auto-status change) or a bit more advanced (personalized automatic triggers). More importantly, adding intelligence improves planning and decision-making processes.

  5. Creation of a RFID based real time tracking (R-RTT) system for small healthcare clinics.

    PubMed

    Chen, Joseph C; Collins, Thomas J

    2012-12-01

    A well-managed healthcare system improves the quality of the patient experience. However, many small healthcare clinics have suboptimal systems for scheduling and locating patients and medical staff, delaying the relay of information and creating poor resource and room utilization. This paper proposes a Radio Frequency Identification (RFID)-based Real-Time Tracking (R-RTT) System for optimizing small healthcare facility operations, enabling further optimization of throughput time, room utilization, and patient flow. In the proposed scenario, RFID readers were equipped in strategic locations throughout the facility. Patients and medical staff were issued personalized RFID tags. When they pass through the reader's interrogation zone, it reads their RFID tag and sends the information to a central computer equipped with software capable of filtering the RFID data into useable information. A Visual Basic Application (VBA) program uses the information received from the ID tags to display the location of the patients and staff as they move throughout the facility. This increases their visibility within the facility by allowing medical staff to determine where their colleagues and patients are at all times. The VBA program was also able to record the data in order to track the time each stage of the appointment process takes to complete. The recorded time data can be broken into processes, making it easier to determine if it adds value. This data can then be transformed into a value stream map for further analysis and improvement.

  6. Battery-free radio frequency identification (RFID) sensors for food quality and safety.

    PubMed

    Potyrailo, Radislav A; Nagraj, Nandini; Tang, Zhexiong; Mondello, Frank J; Surman, Cheryl; Morris, William

    2012-09-05

    Market demands for new sensors for food quality and safety stimulate the development of new sensing technologies that can provide an unobtrusive sensor form, battery-free operation, and minimal sensor cost. Intelligent labeling of food products to indicate and report their freshness and other conditions is one important possible application of such new sensors. This study applied passive (battery-free) radio frequency identification (RFID) sensors for the highly sensitive and selective detection of food freshness and bacterial growth. In these sensors, the electric field generated in the RFID sensor antenna extends from the plane of the RFID sensor and is affected by the ambient environment, providing the opportunity for sensing. This environment may be in the form of a food sample within the electric field of the sensing region or a sensing film deposited onto the sensor antenna. Examples of applications include monitoring of milk freshness, fish freshness, and bacterial growth in a solution. Unlike other food freshness monitoring approaches that require a thin film battery for operation of an RFID sensor and fabrication of custom-made sensors, the passive RFID sensing approach developed here combines the advantages of both battery-free and cost-effective sensor design and offers response selectivity that is impossible to achieve with other individual sensors.

  7. RFID sensor-tags feeding a context-aware rule-based healthcare monitoring system.

    PubMed

    Catarinucci, Luca; Colella, Riccardo; Esposito, Alessandra; Tarricone, Luciano; Zappatore, Marco

    2012-12-01

    Along with the growing of the aging population and the necessity of efficient wellness systems, there is a mounting demand for new technological solutions able to support remote and proactive healthcare. An answer to this need could be provided by the joint use of the emerging Radio Frequency Identification (RFID) technologies and advanced software choices. This paper presents a proposal for a context-aware infrastructure for ubiquitous and pervasive monitoring of heterogeneous healthcare-related scenarios, fed by RFID-based wireless sensors nodes. The software framework is based on a general purpose architecture exploiting three key implementation choices: ontology representation, multi-agent paradigm and rule-based logic. From the hardware point of view, the sensing and gathering of context-data is demanded to a new Enhanced RFID Sensor-Tag. This new device, de facto, makes possible the easy integration between RFID and generic sensors, guaranteeing flexibility and preserving the benefits in terms of simplicity of use and low cost of UHF RFID technology. The system is very efficient and versatile and its customization to new scenarios requires a very reduced effort, substantially limited to the update/extension of the ontology codification. Its effectiveness is demonstrated by reporting both customization effort and performance results obtained from validation in two different healthcare monitoring contexts.

  8. Accurate Vehicle Location System Using RFID, an Internet of Things Approach.

    PubMed

    Prinsloo, Jaco; Malekian, Reza

    2016-06-04

    Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID) technology in combination with GPS and the Global system for Mobile communication (GSM) technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz). The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved.

  9. Impact of Radio-Frequency Identification (RFID) Technologies on the Hospital Supply Chain: A Literature Review

    PubMed Central

    Coustasse, Alberto; Tomblin, Shane; Slack, Chelsea

    2013-01-01

    Supply costs account for more than one-third of the average operating budget and constitute the second largest expenditure in hospitals. As hospitals have sought to reduce these costs, radio-frequency identification (RFID) technology has emerged as a solution. This study reviews existing literature to gauge the recent and potential impact and direction of the implementation of RFID in the hospital supply chain to determine current benefits and barriers of adoption. Findings show that the application of RFID to medical equipment and supplies tracking has resulted in efficiency increases in hospitals with lower costs and increased service quality. RFID technology can reduce costs, improve patient safety, and improve supply chain management effectiveness by increasing the ability to track and locate equipment, as well as monitoring theft prevention, distribution management, and patient billing. Despite ongoing RFID implementation in the hospital supply chain, barriers to widespread and rapid adoption include significant total expenditures, unclear return on investment, and competition with other strategic imperatives. PMID:24159272

  10. Battery-free radio frequency identification (RFID) sensors for food quality and safety

    PubMed Central

    Potyrailo, Radislav A.; Nagraj, Nandini; Tang, Zhexiong; Mondello, Frank J.; Surman, Cheryl; Morris, William

    2012-01-01

    The market demands for new sensors for food quality and safety stimulate the development of new sensing technologies that can provide an unobtrusive sensor form factor, battery-free operation, and minimal sensor cost. Intelligent labeling of food products to indicate and report their freshness and other conditions is one of important possible applications of such new sensors. We have applied passive (battery-free) radio frequency identification (RFID) sensors for highly sensitive and selective detection of food freshness and bacterial growth. In these sensors, the electric field generated in the RFID sensor antenna extends out from the plane of the RFID sensor and is affected by the ambient environment providing the opportunity for sensing. This environment may be in the form of a food sample within the electric field of the sensing region or a sensing film deposited onto the sensor antenna. Examples of applications include monitoring of freshness of milk, freshness of fish, and bacterial growth in a solution. Unlike other food freshness monitoring approaches that require a thin film battery for operation of an RFID sensor and fabrication of custom-made sensors, our developed passive RFID sensing approach combines advantages of both battery-free and cost-effective sensor design and offers response selectivity that is impossible to achieve with other individual sensors. PMID:22881825

  11. Accurate Vehicle Location System Using RFID, an Internet of Things Approach

    PubMed Central

    Prinsloo, Jaco; Malekian, Reza

    2016-01-01

    Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID) technology in combination with GPS and the Global system for Mobile communication (GSM) technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz). The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved. PMID:27271638

  12. Data collection in a live mass casualty incident simulation: automated RFID technology versus manually recorded system.

    PubMed

    Ingrassia, Pier Luigi; Carenzo, Luca; Barra, Federico Lorenzo; Colombo, Davide; Ragazzoni, Luca; Tengattini, Marco; Prato, Federico; Geddo, Alessandro; Della Corte, Francesco

    2012-02-01

    To demonstrate the applicability and the reliability of a radio frequency identification (RFID) system to collect data during a live exercise. A rooftop collapse of a crowded building was simulated. Fifty-three volunteers were trained to perform as smart victims, simulating clinical conditions, using dynamic data cards, and capturing delay times and triage codes. Every victim was also equipped with a RFID tag. RFID antenna was placed at the entrance of the advanced medical post (AMP) and emergency department (ED) and recorded casualties entering the hospital. A total of 12 victims entered AMP and 31 victims were directly transferred to the ED. 100% (12 of 12 and 31 of 31) of the time cards reported a manually written hospital admission time. No failures occurred in tag reading or data transfers. A correlation analysis was performed between the two methods plotting the paired RFID and manual times and resulted in a r=0.977 for the AMP and r=0.986 for the ED with a P value of less than 0.001. We confirmed the applicability of RFID system to the collection of time delays. Its use should be investigated in every aspect of data collection (triage, treatments) during a disaster exercise.

  13. A Novel RFID-Based Sensing Method for Low-Cost Bolt Loosening Monitoring

    PubMed Central

    Wu, Jian; Cui, Xingmei; Xu, Yunpeng

    2016-01-01

    In coal mines, bolt loosening in the cage guide is affected by the harsh environmental factors and cage hoist vibration, leading to significant threats to work safety. It is crucial, to this effect, to successfully detect the status of multipoint bolts of guide structures. This paper proposes a system to monitor bolt status in harsh environments established based on the RFID technique. A proof-of-concept model was demonstrated consisting of a bolt gearing system, passive UHF RFID tags, a reader, and monitoring software. A tinfoil metal film is fixed on the retaining plate and an RFID tag bonded to a large gear, with the bolt to be detected fixed in the center of a smaller gear. The radio-frequency signal cannot be received by the reader if the tag is completely obscured by the tinfoil, and if the bolt is loose, the tag’s antenna is exposed when the gear revolves. A radio-frequency signal that carries corresponding bolt’s information is transmitted by the RFID tag to the RFID reader due to coil coupling, identifying loose bolt location and reporting them in the software. Confirmatory test results revealed that the system indeed successfully detects bolt loosening and comparative test results (based on a reed switch multipoint bolt loosening monitor system) provided valuable information regarding the strengths and weaknesses of the proposed system. PMID:26828498

  14. RFID technology for tracking and tracing explosives and detonators in mining services applications

    NASA Astrophysics Data System (ADS)

    Mishra, P. K.; Bolic, Miodrag; Yagoub, Mustapha C. E.; Stewart, Ron F.

    2012-01-01

    The purpose of this study is to assess issues related to the usage of Radio Frequency Identification (RFID) technology for certain mining services applications. In addition, it discusses current RFID solutions and inventions related to mining services applications. Main goals of this study are to investigate if RFID technology is suitable for inventory management of detonators and boosters, security, tracing of explosives and detonators, and retrieval of the assembly from the blast debris in the event of a misfire. Attempt has been made to address the best RFID solution for the same. IEEE 1902.1(RuBee) technology may show great potential in this field since it can achieve long reading ranges and it is not affected by proximity of rocks or metals. A hybrid solution that incorporates both near-field and far-field capabilities may be reliable for reading all the boosters and detonators at predefined locations. The safety facets for using RFID with the explosives and in hazardous areas are also highlighted.

  15. Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol

    Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.

  16. Passive multivariable temperature and conductivity RFID sensors for single-use biopharmaceutical manufacturing components.

    PubMed

    Potyrailo, Radislav A; Wortley, Timothy; Surman, Cheryl; Monk, David; Morris, William G; Vincent, Mark; Diana, Rafael; Pizzi, Vincent; Carter, Jeffrey; Gach, Gerard; Klensmeden, Staffan; Ehring, Hanno

    2011-01-01

    Single-use biopharmaceutical manufacturing requires monitoring of critical manufacturing parameters. We have developed an approach for passive radio-frequency identification (RFID)-based sensing that converts ubiquitous passive 13.56 MHz RFID tags into inductively coupled sensors. We combine several measured parameters from the resonant sensor antenna with multivariate data analysis and deliver unique capability of multiparameter sensing and rejection of environmental interferences with a single sensor. We demonstrate here the integration of these RFID sensors into single-use biopharmaceutical manufacturing components. We have tested these sensors for over 500 h for measurements of temperature and solution conductivity with the accuracy of 0.1°C (32-48°C range) and accuracy of 0.3-2.9 mS/cm (0.5-230 mS/cm range). We further demonstrate simultaneous temperature and conductivity measurements with an individual RFID sensor with the accuracy of 0.2°C (5-60°C range) and accuracy of 0.9 mS/cm (0.5-183 mS/cm range). Developed RFID sensors provide several important features previously unavailable from other single-use sensing technologies such as the same sensor platform for measurements of physical, chemical, and biological parameters; multi-parameter monitoring with individual sensors; and simultaneous digital identification.

  17. A Novel RFID-Based Sensing Method for Low-Cost Bolt Loosening Monitoring.

    PubMed

    Wu, Jian; Cui, Xingmei; Xu, Yunpeng

    2016-01-28

    In coal mines, bolt loosening in the cage guide is affected by the harsh environmental factors and cage hoist vibration, leading to significant threats to work safety. It is crucial, to this effect, to successfully detect the status of multipoint bolts of guide structures. This paper proposes a system to monitor bolt status in harsh environments established based on the RFID technique. A proof-of-concept model was demonstrated consisting of a bolt gearing system, passive UHF RFID tags, a reader, and monitoring software. A tinfoil metal film is fixed on the retaining plate and an RFID tag bonded to a large gear, with the bolt to be detected fixed in the center of a smaller gear. The radio-frequency signal cannot be received by the reader if the tag is completely obscured by the tinfoil, and if the bolt is loose, the tag's antenna is exposed when the gear revolves. A radio-frequency signal that carries corresponding bolt's information is transmitted by the RFID tag to the RFID reader due to coil coupling, identifying loose bolt location and reporting them in the software. Confirmatory test results revealed that the system indeed successfully detects bolt loosening and comparative test results (based on a reed switch multipoint bolt loosening monitor system) provided valuable information regarding the strengths and weaknesses of the proposed system.

  18. A Movement Account of Long-Distance Reflexives

    ERIC Educational Resources Information Center

    McKeown, Rebecca Katherine

    2013-01-01

    This thesis examines reflexive pronouns, such as Icelandic "sig" (Cf. Thrainsson 2007), which may be bound from outside of an infinitive clause (which I call MD "medium distance" binding) in addition to being bound locally. I propose that such reflexives are linked to their antecedents via sisterhood followed by movement: the…

  19. A Movement Account of Long-Distance Reflexives

    ERIC Educational Resources Information Center

    McKeown, Rebecca Katherine

    2013-01-01

    This thesis examines reflexive pronouns, such as Icelandic "sig" (Cf. Thrainsson 2007), which may be bound from outside of an infinitive clause (which I call MD "medium distance" binding) in addition to being bound locally. I propose that such reflexives are linked to their antecedents via sisterhood followed by movement: the…

  20. Read distance performance and variation of 5 low-frequency radio frequency identification panel transceiver manufacturers.

    PubMed

    Ryan, S E; Blasi, D A; Anglin, C O; Bryant, A M; Rickard, B A; Anderson, M P; Fike, K E

    2010-07-01

    Use of electronic animal identification technologies by livestock managers is increasing, but performance of these technologies can be variable when used in livestock production environments. This study was conducted to determine whether 1) read distance of low-frequency radio frequency identification (RFID) transceivers is affected by type of transponder being interrogated; 2) read distance variation of low-frequency RFID transceivers is affected by transceiver manufacturer; and 3) read distance of various transponder-transceiver manufacturer combinations meet the 2004 United States Animal Identification Plan (USAIP) bovine standards subcommittee minimum read distance recommendation of 60 cm. Twenty-four transceivers (n = 5 transceivers per manufacturer for Allflex, Boontech, Farnam, and Osborne; n = 4 transceivers for Destron Fearing) were tested with 60 transponders [n = 10 transponders per type for Allflex full duplex B (FDX-B), Allflex half duplex (HDX), Destron Fearing FDX-B, Farnam FDX-B, and Y-Tex FDX-B; n = 6 for Temple FDX-B (EM Microelectronic chip); and n = 4 for Temple FDX-B (HiTag chip)] presented in the parallel orientation. All transceivers and transponders met International Organization for Standardization 11784 and 11785 standards. Transponders represented both one-half duplex and full duplex low-frequency air interface technologies. Use of a mechanical trolley device enabled the transponders to be presented to the center of each transceiver at a constant rate, thereby reducing human error. Transponder and transceiver manufacturer interacted (P < 0.0001) to affect read distance, indicating that transceiver performance was greatly dependent upon the transponder type being interrogated. Twenty-eight of 30 combinations of transceivers and transponders evaluated met the minimum recommended USAIP read distance. The mean read distance across all 30 combinations was 45.1 to 129.4 cm. Transceiver manufacturer and transponder type interacted to affect read

  1. Petawatt laser absorption bounded

    PubMed Central

    Levy, Matthew C.; Wilks, Scott C.; Tabak, Max; Libby, Stephen B.; Baring, Matthew G.

    2014-01-01

    The interaction of petawatt (1015 W) lasers with solid matter forms the basis for advanced scientific applications such as table-top particle accelerators, ultrafast imaging systems and laser fusion. Key metrics for these applications relate to absorption, yet conditions in this regime are so nonlinear that it is often impossible to know the fraction of absorbed light f, and even the range of f is unknown. Here using a relativistic Rankine-Hugoniot-like analysis, we show for the first time that f exhibits a theoretical maximum and minimum. These bounds constrain nonlinear absorption mechanisms across the petawatt regime, forbidding high absorption values at low laser power and low absorption values at high laser power. For applications needing to circumvent the absorption bounds, these results will accelerate a shift from solid targets, towards structured and multilayer targets, and lead the development of new materials. PMID:24938656

  2. Distance Education Council.

    ERIC Educational Resources Information Center

    Indira Gandhi National Open University, New Delhi (India). Distance Education Council.

    Since its inception in India in 1962, distance education has grown in popularity. The Distance Education Council (DEC) directs distance learning within India's higher education system. The DEC's promotion, coordination, and maintenance of standards for distance education are its three major roles. Its initiatives include grants, support for…

  3. Facilitating Distance Education.

    ERIC Educational Resources Information Center

    Rossman, Mark H., Ed.; Rossman, Maxine E., Ed.

    1995-01-01

    This collection of articles on distance learning reflects the perspectives and concerns of the learner and the facilitator of learning in distance education setting. Eight chapters are included: (1) "The Evolution and Advantages of Distance Education" (John E. Cantelon) traces the history of distance education and demonstrates how it transcends…

  4. Distance Education in Turkey

    ERIC Educational Resources Information Center

    Ruzgar, Nursel Selver

    2004-01-01

    Many countries of the world are using distance education with various ways, by INTERNET, by post and by TV. In this work, development of distance education in Turkey has been presented from the beginning. After discussing types and applications for different levels of distance education in Turkey, the distance education was given in the cultural…

  5. Facilitating Distance Education.

    ERIC Educational Resources Information Center

    Rossman, Mark H., Ed.; Rossman, Maxine E., Ed.

    1995-01-01

    This collection of articles on distance learning reflects the perspectives and concerns of the learner and the facilitator of learning in distance education setting. Eight chapters are included: (1) "The Evolution and Advantages of Distance Education" (John E. Cantelon) traces the history of distance education and demonstrates how it transcends…

  6. A novel sensor-assisted RFID-based indoor tracking system for the elderly living alone.

    PubMed

    Hsu, Chien-Chang; Chen, Jun-Hao

    2011-01-01

    The population of elderly people is increasing rapidly in many developed nations. Providing safe and comfortable care to aging people is an important social goal. Moreover, obtaining correct activity and location information for an elderly person is an important research goal. This work proposes a novel intelligent RFID-based indoor tracking system for elderly people living alone. The proposed system uses environment information for inhabitants and received signal strength of an RFID reader to estimate the probable location of an inhabitant. The proposed system then coordinates with the wireless sensor node of a three-axis accelerometer and uses a genetic algorithm to compute the location of the inhabitant. The proposed system also uses context and gait information to improve inhabitant-tracking accuracy. Experiment results show that the accuracy of the proposed system is better than that of existing RFID-based systems.

  7. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography.

    PubMed

    Zhang, Zezhong; Qi, Qingqing

    2014-05-01

    Medication errors are very dangerous even fatal since it could cause serious even fatal harm to patients. In order to reduce medication errors, automated patient medication systems using the Radio Frequency Identification (RFID) technology have been used in many hospitals. The data transmitted in those medication systems is very important and sensitive. In the past decade, many security protocols have been proposed to ensure its secure transition attracted wide attention. Due to providing mutual authentication between the medication server and the tag, the RFID authentication protocol is considered as the most important security protocols in those systems. In this paper, we propose a RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography (ECC). The analysis shows the proposed protocol could overcome security weaknesses in previous protocols and has better performance. Therefore, the proposed protocol is very suitable for automated patient medication systems.

  8. A High-Gain Passive UHF-RFID Tag with Increased Read Range

    PubMed Central

    Zuffanelli, Simone; Aguila, Pau; Zamora, Gerard; Paredes, Ferran; Martin, Ferran; Bonache, Jordi

    2016-01-01

    In this work, a passive ultra-high frequency radio-frequency identification UHF-RFID tag based on a 1.25 wavelengths thin dipole antenna is presented for the first time. The length of the antenna is properly chosen in order to maximize the tag read range, while maintaining a reasonable tag size and radiation pattern. The antenna is matched to the RFID chip by means of a very simple matching network based on a shunt inductance. A tag prototype, based on the Alien Higgs-3 chip, is designed and fabricated. The overall dimensions are 400 mm × 14.6 mm, but the tag width for most of its length is delimited by the wire diameter (0.8 mm). The measured read range exhibits a maximum value of 17.5 m at the 902–928 MHz frequency band. This represents an important improvement over state-of-the-art passive UHF-RFID tags. PMID:27455274

  9. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.

    PubMed

    Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram

    2016-07-01

    To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.

  10. Deployment of RFID in healthcare facilities-experimental design in MRI department.

    PubMed

    Cheng, Chen-Yang; Chai, Jyh-Wen

    2012-12-01

    Patient safety has become an important issue due to medical errors. Some health care systems use Radio Frequency Identification (RFID) to identify patients during medical procedures. However, the RFID data readability especially depends upon the environment, an investigation of data reliability and signal loss is essential to making an effective deployment plan. The operation of Magnetic Resonance Imaging (MRI) is the major source of electromagnetic interference in the hospital. Therefore, this research conducts an experimental design of reading performance considering various notable factors in the MRI department. In addition to the readability experiment, this paper also measures the efficiency and reliability of implementing RFID technology in the MRI department using a simulation approach and helps hospitals by providing the measured outcomes.

  11. Monitoring Activity of Taking Medicine by Incorporating RFID and Video Analysis

    PubMed Central

    Hasanuzzaman, Faiz M.; Yang, Xiaodong; Tian, YingLi; Liu, Qingshan; Capezuti, Elizabeth

    2013-01-01

    In this paper, we present a new framework to monitor medication intake for elderly individuals by incorporating a video camera and Radio Frequency Identification (RFID) sensors. The proposed framework can provide a key function for monitoring activities of daily living (ADLs) of elderly people at their own home. In an assistive environment, RFID tags are applied on medicine bottles located in a medicine cabinet so that each medicine bottle will have a unique ID. The description of the medicine data for each tag is manually input to a database. RFID readers will detect if any of these bottles are taken away from the medicine cabinet and identify the tag attached on the medicine bottle. A video camera is installed to continue monitoring the activity of taking medicine by integrating face detection and tracking, mouth detection, background subtraction, and activity detection. The preliminary results demonstrate that 100% detection accuracy for identifying medicine bottles and promising results for monitoring activity of taking medicine. PMID:23914344

  12. A Novel Sensor-Assisted RFID-Based Indoor Tracking System for the Elderly Living Alone

    PubMed Central

    Hsu, Chien-Chang; Chen, Jun-Hao

    2011-01-01

    The population of elderly people is increasing rapidly in many developed nations. Providing safe and comfortable care to aging people is an important social goal. Moreover, obtaining correct activity and location information for an elderly person is an important research goal. This work proposes a novel intelligent RFID-based indoor tracking system for elderly people living alone. The proposed system uses environment information for inhabitants and received signal strength of an RFID reader to estimate the probable location of an inhabitant. The proposed system then coordinates with the wireless sensor node of a three-axis accelerometer and uses a genetic algorithm to compute the location of the inhabitant. The proposed system also uses context and gait information to improve inhabitant-tracking accuracy. Experiment results show that the accuracy of the proposed system is better than that of existing RFID-based systems. PMID:22346631

  13. An RFID-Based Manufacturing Control Framework for Loosely Coupled Distributed Manufacturing System Supporting Mass Customization

    NASA Astrophysics Data System (ADS)

    Chen, Ruey-Shun; Tsai, Yung-Shun; Tu, Arthur

    In this study we propose a manufacturing control framework based on radio-frequency identification (RFID) technology and a distributed information system to construct a mass-customization production process in a loosely coupled shop-floor control environment. On the basis of this framework, we developed RFID middleware and an integrated information system for tracking and controlling the manufacturing process flow. A bicycle manufacturer was used to demonstrate the prototype system. The findings of this study were that the proposed framework can improve the visibility and traceability of the manufacturing process as well as enhance process quality control and real-time production pedigree access. Using this framework, an enterprise can easily integrate an RFID-based system into its manufacturing environment to facilitate mass customization and a just-in-time production model.

  14. RFID-based information visibility for hospital operations: exploring its positive effects using discrete event simulation.

    PubMed

    Asamoah, Daniel A; Sharda, Ramesh; Rude, Howard N; Doran, Derek

    2016-10-12

    Long queues and wait times often occur at hospitals and affect smooth delivery of health services. To improve hospital operations, prior studies have developed scheduling techniques to minimize patient wait times. However, these studies lack in demonstrating how such techniques respond to real-time information needs of hospitals and efficiently manage wait times. This article presents a multi-method study on the positive impact of providing real-time scheduling information to patients using the RFID technology. Using a simulation methodology, we present a generic scenario, which can be mapped to real-life situations, where patients can select the order of laboratory services. The study shows that information visibility offered by RFID technology results in decreased wait times and improves resource utilization. We also discuss the applicability of the results based on field interviews granted by hospital clinicians and administrators on the perceived barriers and benefits of an RFID system.

  15. A High-Gain Passive UHF-RFID Tag with Increased Read Range.

    PubMed

    Zuffanelli, Simone; Aguila, Pau; Zamora, Gerard; Paredes, Ferran; Martin, Ferran; Bonache, Jordi

    2016-07-22

    In this work, a passive ultra-high frequency radio-frequency identification UHF-RFID tag based on a 1.25 wavelengths thin dipole antenna is presented for the first time. The length of the antenna is properly chosen in order to maximize the tag read range, while maintaining a reasonable tag size and radiation pattern. The antenna is matched to the RFID chip by means of a very simple matching network based on a shunt inductance. A tag prototype, based on the Alien Higgs-3 chip, is designed and fabricated. The overall dimensions are 400 mm × 14.6 mm, but the tag width for most of its length is delimited by the wire diameter (0.8 mm). The measured read range exhibits a maximum value of 17.5 m at the 902-928 MHz frequency band. This represents an important improvement over state-of-the-art passive UHF-RFID tags.

  16. Training for Distance Teaching through Distance Learning.

    ERIC Educational Resources Information Center

    Cadorath, Jill; Harris, Simon; Encinas, Fatima

    2002-01-01

    Describes a mixed-mode bachelor degree course in English language teaching at the Universidad Autonoma de Puebla (Mexico) that was designed to help practicing teachers write appropriate distance education materials by giving them the experience of being distance students. Includes a course outline and results of a course evaluation. (Author/LRW)

  17. Training for Distance Teaching through Distance Learning.

    ERIC Educational Resources Information Center

    Cadorath, Jill; Harris, Simon; Encinas, Fatima

    2002-01-01

    Describes a mixed-mode bachelor degree course in English language teaching at the Universidad Autonoma de Puebla (Mexico) that was designed to help practicing teachers write appropriate distance education materials by giving them the experience of being distance students. Includes a course outline and results of a course evaluation. (Author/LRW)

  18. Individual Ranging Behaviour Patterns in Commercial Free-Range Layers as Observed through RFID Tracking

    PubMed Central

    Larsen, Hannah; Cronin, Greg M.; Gebhardt-Henrich, Sabine G.; Smith, Carolynn L.; Hemsworth, Paul H.; Rault, Jean-Loup

    2017-01-01

    Simple Summary Understanding of how free-range laying hens on commercial farms utilize the outdoor space provided is limited. In order to optimise use of the range, it is important to understand whether hens vary in their ranging behaviour, both between and within individual hens. In our study, we used individual tracking technology to assess how hens in two commercial free-range flocks used the range and whether they varied in their use of the range. We assessed use of three areas at increasing distance from the shed; the veranda [0–2.4 m], close range [2.4–11.4 m], and far range [>11.4 m]. Most hens accessed the range every day (68.6% in Flock A, and 82.2% in Flock B), and most hens that ranged accessed all three areas (73.7% in Flock A, and 84.5% in Flock B). Hens spent half of their time outside in the veranda adjacent to the shed. We found that some hens within the flocks would range consistently (similar duration and frequency) daily, whereas others would range inconsistently. Hens that were more consistent in their ranging behaviour spent more time on the range overall than those that were inconsistent. These different patterns of range use should be taken into account to assess the implications of ranging for laying hens. Abstract In this exploratory study, we tracked free-range laying hens on two commercial flocks with Radio Frequency Identification (RFID) technology with the aim to examine individual hen variation in range use. Three distinct outdoor zones were identified at increasing distances from the shed; the veranda [0–2.4 m], close range [2.4–11.4 m], and far range [>11.4 m]. Hens’ movements between these areas were tracked using radio frequency identification technology. Most of the hens in both flocks (68.6% in Flock A, and 82.2% in Flock B) accessed the range every day during the study. Of the hens that accessed the range, most hens accessed all three zones (73.7% in Flock A, and 84.5% in Flock B). Hens spent half of their time

  19. Particle tracking via RFID technology to monitor bedload sediment dynamics in mountain streams

    NASA Astrophysics Data System (ADS)

    Toro, Matteo; Fraccarollo, Luigi; Corbo, Simona; Maggioni, Alberto; Brardinoni, Francesco

    2015-04-01

    In this contribution we present preliminary results on the monitoring of bedload entrainment and transport in two mountain streams, the Grigno Creek (90 km2) and its tributary, the Tolvà Creek (14 km2), located in Valsugana, Autonomous Province of Trento. In particular, we monitor bedload by means of Radio Frequency Identification (RFID) technology in conjunction with Passive Integrated Transponders (PIT) (e.g., Lamarre et al., 2005) injected into pebble-to-cobble sized tracer stones (b-axis ranging from 30 to 130 mm). In the Grigno Creek 120 PITs were released in December 2013 along a 100-m channel reach and have been surveyed 10 times. In the Tolvà Creek 100 PITs were released in July 2013 along a 100-m channel reach, and the site has been surveyed 4 times. Particle tracking is conducted by integrating two complementary antenna types: (i) a portable one, which enables to estimate travel distances of tagged clasts; and (ii) a set of four fixed antennas (25m apart from each other), which allows detecting motion/rest periods of particles, entrainment thresholds and transport velocities. Particle tracking is combined with on-site high-frequency (i.e., 10 minutes) water stage monitoring. Salt dilution method is monthly applied to relate flow discharge to water stage. The analyzed river reaches extend over different morphologic units (steps, pools, glides and boulder-cascades). We are looking to estimate (i) the channel forming discharge; (ii) a quantitative evaluation of specific bedload transport. These information will be associated to the surficial bed texture and bed morphology. Data collected from fixed and mobile antennas will enable to infer statistical information of the trajectories run by tracer ensemble, in particular the step lengths, the total travel distances and the rest periods. Lamarre H., MacVicar B., Roy A.G. 2005 Using Passive Integrated Transponder (PIT) tags to investigate sediment transport in gravel-bed rivers. Journal of Sedimentary Research

  20. Ultra-low-power electronics and devices for a multisensing RFID tag

    NASA Astrophysics Data System (ADS)

    Zampolli, Stefano; Elmi, Ivan; Cardinali, Gian Carlo; Scorzoni, Andrea; Cicioni, Michele; Marco, Santiago; Palacio, Francisco; Gómez-Cama, Jose M.; Sayhan, Ilker; Becker, Thomas

    2007-05-01

    A multisensing flexible Tag microlab (FTM) with RFID communication capabilities and integrated physical and chemical sensors for logistic datalogging applications is being developed. For this very specific scenario, several constraints must be considered: power consumption must be limited for long-term operation, reliable ISO compliant RFID communication must be implemented, and special encapsulation issues must be faced for reliable sensor integration. In this work, the developments on application specific electronic interfaces and on ultra-low-power MOX gas sensors in the framework of the GoodFood FP6 Integrated Project will be reported. The electronics for sensor control and readout as well as for RFID communication are based on an ultra-low-power MSP430 microcontroller from Texas Instruments together with a custom RFID front-end based on analog circuitry and a CPLD digital device, and are designed to guarantee a passive ISO15693 compliant RFID communication in a range up to 6 cm. A thin film battery for sensor operation is included, allowing data acquisition and storage when no reader field is present. This design allows the user to access both the traceability and sensor information even when the on-board battery is exhausted. The physical sensors for light, temperature and humidity are commercially available devices, while for chemical gas sensing innovative MOX sensors are developed, based on ultra-low-power micromachined hotplate arrays specifically designed for flexible Tag integration purposes. A single MOX sensor requires only 8.9 mW for continuous operation, while temperature modulation and discontinuous sensor operation modes are implemented to further reduce the overall power consumption. The development of the custom control and RFID electronics, together with innovative ultra-low-power MOX sensor arrays with flexible circuit encapsulation techniques will be reported in this work.

  1. Analysis and verification of a proposed antenna design for an implantable RFID Tag at 915 MHz

    NASA Astrophysics Data System (ADS)

    Bakore, Rahul

    This work focused on design and analysis of an antenna to be used with an RFID tag that is implanted in human brain tissue. The goal is to maximize the power transferred between the external RFID measurement system and the implanted RFID tag while minimizing the power dissipated within the surrounding tissue. The commercial computational electromagnetics software package COMSOL, based on finite element method (FEM) has been used for design process. The COMSOL models have been validated against additional simulations using the FEKO commercial package based on method of moments (MOM) as well as against measurement of test antenna structures radiating in bulk homogeneous medium. The proposed antenna geometry is compatible with the human tissue and viable for use in implantable RFID Tag. The proposed antenna is a planar folded dipole made from a gold conductor that acts as a biocompatible material. The metal thickness is 1 micrometer and the overall antenna dimensions are 22 mm × 3.5 mm. The antenna structure also includes a dielectric substrate and an acrylic coating. The antenna impedance is 28 + j201.5 Ω at 915 MHz. The inductive reactance is high enough to compensate the capacitive reactance of RFID tag and the antenna resistance is close to effective chip resistance providing a conjugate match. This antenna fulfills the criteria for minimizing the power dissipation within the human tissue. Also, a radiation efficiency of 87% is achieved with this antenna at 915 MHz. The quality factor of greater than 10 is achieved which is sufficient to turn on the diodes in the electronic circuit of the RFID tag due to the high D.C voltage obtained.

  2. Generalised time functions and finiteness of the Lorentzian distance

    NASA Astrophysics Data System (ADS)

    Rennie, Adam; Whale, Ben E.

    2016-08-01

    We show that finiteness of the Lorentzian distance is equivalent to the existence of generalised time functions with gradient uniformly bounded away from light cones. To derive this result we introduce new techniques to construct and manipulate achronal sets. As a consequence of these techniques we obtain a functional description of the Lorentzian distance extending the work of Franco (2010) and Moretti (2003).

  3. Secure optionally passive RFID tag or sensor with external power source and data logging

    DOEpatents

    Nekoogar, Faranak; Reynolds, Matthew; Lefton, Scott; Dowla, Farid; Twogood, Richard

    2016-05-31

    A secure optionally passive RFID tag or sensor system comprises a passive RFID tag having means for receiving radio signals from at least one base station and for transmitting radio signals to at least one base station, where the tag is capable of being powered exclusively by received radio energy, and an external power and data logging device having at least one battery and electronic circuitry including a digital memory configured for storing and recalling data. The external power and data logging device has a means for powering the tag, and also has a means.

  4. Towards a single-chip, implantable RFID system: is a single-cell radio possible?

    PubMed Central

    Rutherglen, Christopher

    2009-01-01

    We present an overview of progress towards single-chip RFID solutions. To date heterogeneous integration has been appropriate for non-biological systems. However, for in-vivo sensors and even drug delivery systems, a small form factor is required. We discuss fundamental limits on the size of the form factor, the effect of the antenna, and propose a unified single-chip RFID solution appropriate for a broad range of biomedical in-vivo device applications, both current and future. Fundamental issues regarding the possibility of single cell RF radios to interface with biological function are discussed. PMID:19169827

  5. Investigation on an RFID planar coil for a wireless communicative aortic stent

    NASA Astrophysics Data System (ADS)

    Talleb, Hakeim; Faci, Salim; Lautru, David; Hanna, Victor Fouad; Wiart, Joe

    2013-05-01

    This paper presents an investigation on a potential biomedical RFID planar coil operating at 13.56 MHz for measuring the blood pressure level, mounted inside an abdominal aortic aneurysm. The results show that a wireless communication is achieved in a perimeter of 60 cm, while respecting the ISO 15693 standard for vicinity contactless cards. Measurement and electromagnetic simulation results show that the inductive coupling is deteriorating if the planar coil is in direct contact with water without correctly encapsulating this coil. An electric model is given for our proposed RFID planar coil immersed in water.

  6. Towards a single-chip, implantable RFID system: is a single-cell radio possible?

    PubMed

    Burke, Peter; Rutherglen, Christopher

    2010-08-01

    We present an overview of progress towards single-chip RFID solutions. To date heterogeneous integration has been appropriate for non-biological systems. However, for in-vivo sensors and even drug delivery systems, a small form factor is required. We discuss fundamental limits on the size of the form factor, the effect of the antenna, and propose a unified single-chip RFID solution appropriate for a broad range of biomedical in-vivo device applications, both current and future. Fundamental issues regarding the possibility of single cell RF radios to interface with biological function are discussed.

  7. Rigorous performance bounds for quadratic and nested dynamical decoupling

    SciTech Connect

    Xia, Yuhou; Uhrig, Goetz S.; Lidar, Daniel A.

    2011-12-15

    We present rigorous performance bounds for the quadratic dynamical decoupling pulse sequence which protects a qubit from general decoherence, and for its nested generalization to an arbitrary number of qubits. Our bounds apply under the assumptions of instantaneous pulses and of bounded perturbing environment and qubit-environment Hamiltonians such as those realized by baths of nuclear spins in quantum dots. We prove that if the total sequence time is fixed then the trace-norm distance between the unperturbed and protected system states can be made arbitrarily small by increasing the number of applied pulses.

  8. Universal bounds on current fluctuations

    NASA Astrophysics Data System (ADS)

    Pietzonka, Patrick; Barato, Andre C.; Seifert, Udo

    2016-05-01

    For current fluctuations in nonequilibrium steady states of Markovian processes, we derive four different universal bounds valid beyond the Gaussian regime. Different variants of these bounds apply to either the entropy change or any individual current, e.g., the rate of substrate consumption in a chemical reaction or the electron current in an electronic device. The bounds vary with respect to their degree of universality and tightness. A universal parabolic bound on the generating function of an arbitrary current depends solely on the average entropy production. A second, stronger bound requires knowledge both of the thermodynamic forces that drive the system and of the topology of the network of states. These two bounds are conjectures based on extensive numerics. An exponential bound that depends only on the average entropy production and the average number of transitions per time is rigorously proved. This bound has no obvious relation to the parabolic bound but it is typically tighter further away from equilibrium. An asymptotic bound that depends on the specific transition rates and becomes tight for large fluctuations is also derived. This bound allows for the prediction of the asymptotic growth of the generating function. Even though our results are restricted to networks with a finite number of states, we show that the parabolic bound is also valid for three paradigmatic examples of driven diffusive systems for which the generating function can be calculated using the additivity principle. Our bounds provide a general class of constraints for nonequilibrium systems.

  9. Intelligent medicine case system with distributed RFID readers.

    PubMed

    Suzuki, Takuo; Oyama, Yuya; Nakauchi, Yasushi

    2010-01-01

    In Japan, the number of elderly recipients who take medicines regularly has been increasing due to population aging. Since they have many risks of incorrect medication, we have developed the intelligent medicine case system (iMec System) for assisting their caretakers in medication monitoring. The system confirms the type, quantity and timing of medication every time a recipient picks medicines up. And then, the system notifies the caretakers about the adequacy of the type, quantity, and timing. Since the way of medication is also specified on prescription by their doctors, we have strengthened the system so that it confirms the way of medication when the recipient picks medicines up. For realizing the function, we placed RFID readers in the iMec and the recipient's house. The readers measure the movement of objects such as medicines, foods, drinks, dishes, utensils. By using the information, the iMec could evaluate the adequacy about how to take medicines. We confirmed that the new system was able to recognize foods, drinks and utensils by experiments. In this paper, we propose an adequacy evaluation method by applying fuzzy inference.

  10. RFID Tag Helix Antenna Sensors for Wireless Drug Dosage Monitoring

    PubMed Central

    Huang, Haiyu; Zhao, Peisen; Chen, Pai-Yen; Ren, Yong; Liu, Xuewu; Ferrari, Mauro; Hu, Ye; Akinwande, Deji

    2014-01-01

    Miniaturized helix antennas are integrated with drug reservoirs to function as RFID wireless tag sensors for real-time drug dosage monitoring. The general design procedure of this type of biomedical antenna sensors is proposed based on electromagnetic theory and finite element simulation. A cost effective fabrication process is utilized to encapsulate the antenna sensor within a biocompatible package layer using PDMS material, and at the same time form a drug storage or drug delivery unit inside the sensor. The in vitro experiment on two prototypes of antenna sensor-drug reservoir assembly have shown the ability to monitor the drug dosage by tracking antenna resonant frequency shift from 2.4–2.5-GHz ISM band with realized sensitivity of 1.27 \\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$\\mu~{\\rm l}/{\\rm MHz}$\\end{document} for transdermal drug delivery monitoring and 2.76-\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{upgreek} \\usepackage{mathrsfs} \\setlength{\\oddsidemargin}{-69pt} \\begin{document} }{}$\\mu~{\\rm l}/{\\rm MHz}$\\end{document} sensitivity for implanted drug delivery monitoring. PMID:27170865

  11. Novel ID-based anti-collision approach for RFID

    NASA Astrophysics Data System (ADS)

    Zhang, De-Gan; Li, Wen-Bin

    2016-09-01

    Novel correlation ID-based (CID) anti-collision approach for RFID under the banner of the Internet of Things (IOT) has been presented in this paper. The key insights are as follows: according to the deterministic algorithms which are based on the binary search tree, we propose a method to increase the association between tags so that tags can initiatively send their own ID under certain trigger conditions, at the same time, we present a multi-tree search method for querying. When the number of tags is small, by replacing the actual ID with the temporary ID, it can greatly reduce the number of times that the reader reads and writes to tag's ID. Active tags send data to the reader by the way of modulation binary pulses. When applying this method to the uncertain ALOHA algorithms, the reader can determine the locations of the empty slots according to the position of the binary pulse, so it can avoid the decrease in efficiency which is caused by reading empty slots when reading slots. Theory and experiment show that this method can greatly improve the recognition efficiency of the system when applied to either the search tree or the ALOHA anti-collision algorithms.

  12. RFID technology for hazardous waste management and tracking.

    PubMed

    Namen, Anderson Amendoeira; Brasil, Felipe da Costa; Abrunhosa, Jorge José Gouveia; Abrunhosa, Glaucia Gomes Silva; Tarré, Ricardo Martinez; Marques, Flávio José Garcia

    2014-09-01

    The illegal dumping of hazardous waste is one of the most concerning occurrences related to illegal waste activities. The waste management process is quite vulnerable, especially when it comes to assuring the right destination for the delivery of the hazardous waste. The purpose of this paper is to present a new system design and prototype for applying the RFID technology so as to guarantee the correct destination for the hazardous waste delivery. The aim of this innovative approach, compared with other studies that employ the same technology to the waste disposal process, is to focus on the certification that the hazardous waste will be delivered to the right destination site and that no inappropriate disposal will occur in the transportation stage. These studies were carried out based on data collected during visits to two hazardous waste producer companies in Brazil, where the material transportation and delivery to a company in charge of the waste disposal were closely monitored. © The Author(s) 2014.

  13. A secure RFID-based WBAN for healthcare applications.

    PubMed

    Ullah, Sana; Alamri, Atif

    2013-10-01

    A Wireless Body Area Network (WBAN) allows the seamless integration of small and intelligent invasive or non-invasive sensor nodes in, on or around a human body for continuous health monitoring. These nodes are expected to use different power-efficient protocols in order to extend the WBAN lifetime. This paper highlights the power consumption and security issues of WBAN for healthcare applications. Numerous power saving mechanisms are discussed and a secure RFID-based protocol for WBAN is proposed. The performance of the proposed protocol is analyzed and compared with that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols using extensive simulations. It is shown that the proposed protocol is power-efficient and protects patients' data from adversaries. It is less vulnerable to different attacks compared to that of IEEE 802.15.6-based CSMA/CA and preamble-based TDMA protocols. For a low traffic load and a single alkaline battery of capacity 2.6 Ah, the proposed protocol could extend the WBAN lifetime, when deployed on patients in hospitals or at homes, to approximately five years.

  14. Using Kalman filters to reduce noise from RFID location system.

    PubMed

    Abreu, Pedro Henriques; Xavier, José; Silva, Daniel Castro; Reis, Luís Paulo; Petry, Marcelo

    2014-01-01

    Nowadays, there are many technologies that support location systems involving intrusive and nonintrusive equipment and also varying in terms of precision, range, and cost. However, the developers some time neglect the noise introduced by these systems, which prevents these systems from reaching their full potential. Focused on this problem, in this research work a comparison study between three different filters was performed in order to reduce the noise introduced by a location system based on RFID UWB technology with an associated error of approximately 18 cm. To achieve this goal, a set of experiments was devised and executed using a miniature train moving at constant velocity in a scenario with two distinct shapes-linear and oval. Also, this train was equipped with a varying number of active tags. The obtained results proved that the Kalman Filter achieved better results when compared to the other two filters. Also, this filter increases the performance of the location system by 15% and 12% for the linear and oval paths respectively, when using one tag. For a multiple tags and oval shape similar results were obtained (11-13% of improvement).

  15. Using Kalman Filters to Reduce Noise from RFID Location System

    PubMed Central

    Xavier, José; Reis, Luís Paulo; Petry, Marcelo

    2014-01-01

    Nowadays, there are many technologies that support location systems involving intrusive and nonintrusive equipment and also varying in terms of precision, range, and cost. However, the developers some time neglect the noise introduced by these systems, which prevents these systems from reaching their full potential. Focused on this problem, in this research work a comparison study between three different filters was performed in order to reduce the noise introduced by a location system based on RFID UWB technology with an associated error of approximately 18 cm. To achieve this goal, a set of experiments was devised and executed using a miniature train moving at constant velocity in a scenario with two distinct shapes—linear and oval. Also, this train was equipped with a varying number of active tags. The obtained results proved that the Kalman Filter achieved better results when compared to the other two filters. Also, this filter increases the performance of the location system by 15% and 12% for the linear and oval paths respectively, when using one tag. For a multiple tags and oval shape similar results were obtained (11–13% of improvement). PMID:24592186

  16. Direct evidence of acceleration from a distance modulus redshift graph

    NASA Astrophysics Data System (ADS)

    Gong, Yungui; Wang, Anzhong; Wu, Qiang; Zhang, Yuan-Zhong

    2007-08-01

    The energy conditions give upper bounds on the luminosity distance. We apply these upper bounds to the 192 ESSENCE supernova Ia data to show that the Universe has experienced accelerated expansion. This conclusion is drawn directly from the distance modulus redshift graph. In addition to being a very simple method, this method is also totally independent of any cosmological model. From the degeneracy of the distance modulus at low redshift, we argue that the choice of w0 for probing the property of dark energy is misleading. One explicit example is used to support this argument.

  17. Multifunctions of bounded variation

    NASA Astrophysics Data System (ADS)

    Vinter, R. B.

    2016-02-01

    Consider control systems described by a differential equation with a control term or, more generally, by a differential inclusion with velocity set F (t , x). Certain properties of state trajectories can be derived when it is assumed that F (t , x) is merely measurable w.r.t. the time variable t. But sometimes a refined analysis requires the imposition of stronger hypotheses regarding the time dependence. Stronger forms of necessary conditions for minimizing state trajectories can be derived, for example, when F (t , x) is Lipschitz continuous w.r.t. time. It has recently become apparent that significant addition properties of state trajectories can still be derived, when the Lipschitz continuity hypothesis is replaced by the weaker requirement that F (t , x) has bounded variation w.r.t. time. This paper introduces a new concept of multifunctions F (t , x) that have bounded variation w.r.t. time near a given state trajectory, of special relevance to control. We provide an application to sensitivity analysis.

  18. Membrane-bound selenoproteins.

    PubMed

    Liu, Jun; Rozovsky, Sharon

    2015-10-01

    Selenoproteins employ selenium to supplement the chemistry available through the common 20 amino acids. These powerful enzymes are affiliated with redox biology, often in connection with the detection, management, and signaling of oxidative stress. Among them, membrane-bound selenoproteins play prominent roles in signaling pathways, Ca(2+) regulation, membrane complexes integrity, and biosynthesis of lipophilic molecules. The number of selenoproteins whose physiological roles, protein partners, expression, evolution, and biosynthesis are characterized is steadily increasing, thus offering a more nuanced view of this specialized family. This review focuses on human membrane selenoproteins, particularly the five least characterized ones: selenoproteins I, K, N, S, and T. Membrane-bound selenoproteins are the least understood, as it is challenging to provide the membrane-like environment required for their biochemical and biophysical characterization. Hence, their studies rely mostly on biological rather than structural and biochemical assays. Another aspect that has not received much attention is the particular role that their membrane association plays in their physiological function. Findings cited in this review show that it is possible to infer the structure and the membrane-binding mode of these lesser-studied selenoproteins and design experiments to examine the role of the rare amino acid selenocysteine.

  19. Lazy checkpoint coordination for bounding rollback propagation

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Fuchs, W. Kent

    1992-01-01

    Independent checkpointing allows maximum process autonomy but suffers from potential domino effects. Coordinated checkpointing eliminates the domino effect by sacrificing a certain degree of process autonomy. In this paper, we propose the technique of lazy checkpoint coordination which preserves process autonomy while employing communication-induced checkpoint coordination for bounding rollback propagation. The introduction of the notion of laziness allows a flexible trade-off between the cost for checkpoint coordination and the average rollback distance. Worst-case overhead analysis provides a means for estimating the extra checkpoint overhead. Communication trace-driven simulation for several parallel programs is used to evaluate the benefits of the proposed scheme for real applications.

  20. Lazy checkpoint coordination for bounding rollback propagation

    NASA Technical Reports Server (NTRS)

    Wang, Yi-Min; Fuchs, W. K.

    1993-01-01

    Independent checkpointing allows maximum process autonomy but suffers from potential domino effects. Coordinated checkpointing eliminates the domino effect by sacrificing a certain degree of process autonomy. In this paper, we propose the technique of lazy checkpoint coordination which preserves process autonomy while employing communication-induced checkpoint coordination for bounding rollback propagation. The introduction of the notion of laziness allows a flexible trade-off between the cost for checkpoint coordination and the average rollback distance. Worst-case overhead analysis provides a means for estimating the extra checkpoint overhead. Communication trace-driven simulation for several parallel programs is used to evaluate the benefits of the proposed scheme for real applications.

  1. Bounding the bias of contrastive divergence learning.

    PubMed

    Fischer, Asja; Igel, Christian

    2011-03-01

    Optimization based on k-step contrastive divergence (CD) has become a common way to train restricted Boltzmann machines (RBMs). The k-step CD is a biased estimator of the log-likelihood gradient relying on Gibbs sampling. We derive a new upper bound for this bias. Its magnitude depends on k, the number of variables in the RBM, and the maximum change in energy that can be produced by changing a single variable. The last reflects the dependence on the absolute values of the RBM parameters. The magnitude of the bias is also affected by the distance in variation between the modeled distribution and the starting distribution of the Gibbs chain.

  2. Going the Distance.

    ERIC Educational Resources Information Center

    Leno, Arthur J.

    2003-01-01

    Describes the development and implementation of the distance education program at Peirce College. This Internet-mediated distance learning program focuses on practical fields of study, drawing on the college's strengths in business administration, information technology, and paralegal studies. (SLD)

  3. Culture-bound syndromes.

    PubMed

    Levine, R E; Gaw, A C

    1995-09-01

    Since its inception, scholars have struggled with the concept of CBSs. This struggle is reflected in the continuing use of a term that is confusing and inaccurate. Most authors would agree that the term "culture-bound syndrome" was intended to describe forms of otherwise common mental illness that are rendered unusual because of the pathoplastic influence of culture. It was intended not only to describe specific syndromes, but also meanings of illness and non-Western notions of disease causation. The term has become an anachronism, for the word, "syndrome," implies specific disease entities, not illnesses of attribution of idioms of distress. Furthermore, the word "bound" implies that the entities described are restricted to a single culture. Close examination reveals that many of the so-called "culture-bound" syndromes are found in multiple cultures that have in common only that they are "non-Western." It may be unreasonable to expect one term to describe these different concepts. The most accurate of the designations offered might be "folk diagnostic categories." Perhaps the most difficult question remaining is "How can we understand (and classify) these phenomena in such a way that highlights their uniqueness but does not dismiss them as too rare and exotic to warrant attention?" The first step is to recognize that the CBSs are a heterogeneous group of conditions. We must next acknowledge that the concepts represented may be difficult for the average Western clinician to recognize but, in their respective cultures, are neither rare nor unusual. With 80% of our increasingly shrinking world coming from "non-Western" cultures, a familiarity with non-Western notions of disease causation is particularly important for modern clinicians. Many authors have recommended that those CBSs that are "true" syndromes be classified together with their Western counterparts. In order to do this, the folk labels need to be put aside and the fundamental components of each disorder

  4. Theme: Distance Education.

    ERIC Educational Resources Information Center

    Whittington, M. Susie, Ed.; And Others

    1994-01-01

    Includes "Next Best Thing to Being There" (Whittington); "Taking the Distance out of Distance Education" (Miller, King); "Preparing a Course for Distance Delivery" (Newcomb); "Team Teaching via Two-Way Interactive Video" (Nichols, Trout); "Using the Ag Ed Network" (Peal); "Student's Perspective" (Schoellhorn); "Need for Instruction in Agriculture…

  5. Going the Distance

    ERIC Educational Resources Information Center

    Waters, John K.

    2012-01-01

    Whoever said "Distance education begins in the 10th row" was taking a jab at the comatose kids at the back of his classroom, but the comment also taps into the old image of distance learners as disengaged themselves. That was then. Today, distance-learning programs are booming, in part due to demographic realities but also because recent advances…

  6. Making Distance Education Borderless.

    ERIC Educational Resources Information Center

    Srisa-An, Wichit

    1997-01-01

    Begins with a tribute to Professor G. Ram Reddy (founder of Indira Gandhi National Open University), then focuses on enhancing the role of open universities in providing borderless distance education. Highlights include the need for open distance-education; philosophy and vision; the distance teaching system; the role of information technology;…

  7. Displacement of RFID tracers in a steep mountain stream (Rio Cordon, Italy)

    NASA Astrophysics Data System (ADS)

    Rainato, Riccardo; Mao, Luca; Aristide Lenzi, Mario; Picco, Lorenzo

    2015-04-01

    The bedload transport plays a fundamental role in the mountain streams affecting several aspects as morphology and ecological status of the fluvial system, influencing fields as engineering, natural hazard and river management. The monitoring, assessment and quantification of this type of transport is not simple due to impulsive nature that distinguishes it. Moreover, in mountain streams the particle motion is strongly affected by the bed structures as well as by the highly heterogeneous bed material, acting especially through the hiding/exposure, consolidation and embedding effects. Thanks to the assumption that bedload transport may be understood as the result of random individual particle displacements, the sediment tracing method was widely employed in the last years. Such method allow to obtain precious data concerning sediment dynamic in mountain streams, improving the results obtainable by samplers, traps and permanent monitoring stations. In this work, the results obtained by two years of RFID tracers monitoring are presented. This typology of tracers was employed in a steep mountain stream in order to investigate the displacement due to different conditions of hydraulic forcing. The Rio Cordon (northeast Italy) is a typical alpine channel characterized by step-pool and riffle-pool morphology and by a mean slope equal to 13%. The catchment extended 5 km2 exhibits a nivo-pluvial runoff regime. Overall, 250 tracers were seeded in the channel bed, monitoring the travel distance along a study reach 318 m long. For this purpose a mobile antenna in combination with a laser rangefinder were used. The measurement campaign was carried out from 2013 to 2014, performing a survey every 2 months as well as after every flood event occurred. Following such approach 7 tracers monitoring were performed, reaching a mean tracers recovery rate of roughly 65%. During the study period the peak of flood discharges is ranged between 0.85 to 2.10 m3 s-1, therefore allowing to

  8. Design and testing of RFID sensor tag fabricated using inkjet-printing and electrodeposition

    NASA Astrophysics Data System (ADS)

    Chien Dang, Mau; Son Nguyen, Dat; Dung Dang, Thi My; Tedjini, Smail; Fribourg-Blanc, Eric

    2014-06-01

    The passive RFID tag with an added sensing function is of interest to many applications. In particular, applications where RFID tagging is already considered to be the next step, such as food items, are a specific target. This paper demonstrates a flexible RFID tag sensor fabricated using a low cost technique with an added zero-cost sensing function. It is more specifically applied to the sensing of degradable food, in particular beef meat in our demonstrated example. To reach this, the antenna is designed in such a way to be sensitive to the variation of the dielectric permittivity of the meat over time. The design of the sensing tag as well as its fabrication process are described. The fabrication involves inkjet printing of a silver nanoparticle based ink on a commercial low cost PET film to create a seed layer. It is followed by a copper electrodeposition step on top of the silver pattern to complete the tag to obtain the desired thickness and conductivity of the tag antenna. The results of the electrical tests showed that with the inkjet printing-electrodeposition combination it is possible to produce flexible electrically conductive patterns for practical RFID applications. The tag was then tested in close-to-real-world conditions and it is demonstrated that it can provide a sensing function to detect the consumption limit of the packaged beef.

  9. Outdoor Education Support System with Location Awareness Using RFID and Symbology Tags

    ERIC Educational Resources Information Center

    Osawa, Noritaka; Noda, Katsuji; Tsukagoshi, Satoru; Noma, Yutaka; Ando, Akikazu; Shibuya, Tomoharu; Kondo, Kimio

    2007-01-01

    A support system for outdoor learning using exploratory observation was developed. The system uses radio frequency identification (RFID) tags and two-dimensional (2D) symbology tags to locate positions on a horticultural farm and its surrounding forests. Students were able to get a location-dependent description and an educational hint for…

  10. Experimental assessment of an RFID-based crack sensor for steel structures

    NASA Astrophysics Data System (ADS)

    E Martínez-Castro, R.; Jang, S.; Nicholas, J.; Bansal, R.

    2017-08-01

    The use of welded steel cover plates had been a common design practice to increase beam section capacity in regions of high moment for decades. Many steel girder bridges with cover plates are still in service. Steel girder bridges are subject to cyclic loading, which can initiate crack formation at the toe of the weld and reduce beam capacity. Thus, timely detection of fatigue cracks is of utmost importance in steel girder bridge monitoring. To date, crack monitoring methods using in-house radio frequency identification (RFID)-based sensors have been developed to complement visual inspection and provide quantitative information of damage level. Offering similar properties at a reduced cost, commercial ultra-high frequency (UHF) passive RFID tags have been identified as a more financially viable option for pervasive crack monitoring using a dense array of sensors. This paper presents a study on damage sensitivity of low-cost commercial UHF RFID tags for crack detection and monitoring on metallic structures. Using backscatter power as a parameter for damage identification, a crack sensing system has been developed for single and multiple tag configurations for increased sensing pervasiveness. The effect on backscatter power of the existence and stage of crack propagation has been successfully characterized. For further automation of crack detection, a damage index based on the variation of backscatter power has also been established. The tested commercial RFID-based crack sensor contributes to the usage of this technology on steel girder bridges.

  11. Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips

    PubMed Central

    Liu, Zilong; Liu, Dongsheng; Zou, Xuecheng; Lin, Hui; Cheng, Jian

    2014-01-01

    Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an efficient architecture of Elliptic Curve Cryptography (ECC) Processor for RFID tag chip is presented. We adopt a new inversion algorithm which requires fewer registers to store variables than the traditional schemes. A new method for coordinate swapping is proposed, which can reduce the complexity of the controller and shorten the time of iterative calculation effectively. A modified circular shift register architecture is presented in this paper, which is an effective way to reduce the area of register files. Clock gating and asynchronous counter are exploited to reduce the power consumption. The simulation and synthesis results show that the time needed for one elliptic curve scalar point multiplication over GF(2163) is 176.7 K clock cycles and the gate area is 13.8 K with UMC 0.13 μm Complementary Metal Oxide Semiconductor (CMOS) technology. Moreover, the low power and low cost consumption make the Elliptic Curve Cryptography Processor (ECP) a prospective candidate for application in the RFID tag chip. PMID:25264952

  12. Multiport Circular Polarized RFID-Tag Antenna for UHF Sensor Applications.

    PubMed

    Zaid, Jamal; Abdulhadi, Abdulhadi; Kesavan, Arun; Belaizi, Yassin; Denidni, Tayeb A

    2017-07-05

    A circular polarized patch antenna for UHF RFID tag-based sensor applications is presented, with the circular polarization (CP) generated by a new antenna shape, an asymmetric stars shaped slotted microstrip patch antenna (CP-ASSSMP). Four stars etched on the patch allow the antenna's size to be reduced by close to 20%. The proposed antenna is matched with two RFID chips via inductive-loop matching. The first chip is connected to a resistive sensor and acts as a sensor node, and the second is used as a reference node. The proposed antenna is used for two targets, serving as both reference and sensor simultaneously, thereby eliminating the need for a second antenna. Its reader can read the RFID chips at any orientation of the tag due to the CP. The measured reading range is about 25 m with mismatch polarization. The operating frequency band is 902-929 MHz for the two ports, which is covered by the US RFID band, and the axial-ratio bandwidth is about 7 MHz. In addition, the reader can also detect temperature, based on the minimum difference in the power required by the reference and sensor.

  13. Design of an Elliptic Curve Cryptography processor for RFID tag chips.

    PubMed

    Liu, Zilong; Liu, Dongsheng; Zou, Xuecheng; Lin, Hui; Cheng, Jian

    2014-09-26

    Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an efficient architecture of Elliptic Curve Cryptography (ECC) Processor for RFID tag chip is presented. We adopt a new inversion algorithm which requires fewer registers to store variables than the traditional schemes. A new method for coordinate swapping is proposed, which can reduce the complexity of the controller and shorten the time of iterative calculation effectively. A modified circular shift register architecture is presented in this paper, which is an effective way to reduce the area of register files. Clock gating and asynchronous counter are exploited to reduce the power consumption. The simulation and synthesis results show that the time needed for one elliptic curve scalar point multiplication over GF(2163) is 176.7 K clock cycles and the gate area is 13.8 K with UMC 0.13 μm Complementary Metal Oxide Semiconductor (CMOS) technology. Moreover, the low power and low cost consumption make the Elliptic Curve Cryptography Processor (ECP) a prospective candidate for application in the RFID tag chip.

  14. Locatable-Body Temperature Monitoring Based on Semi-Active UHF RFID Tags

    PubMed Central

    Liu, Guangwei; Mao, Luhong; Chen, Liying; Xie, Sheng

    2014-01-01

    This paper presents the use of radio-frequency identification (RFID) technology for the real-time remote monitoring of body temperature, while an associated program can determine the location of the body carrying the respective sensor. The RFID chip's internal integrated temperature sensor is used for both the human-body temperature detection and as a measurement device, while using radio-frequency communication to broadcast the temperature information. The adopted RFID location technology makes use of reference tags together with a nearest neighbor localization algorithm and a multiple-antenna time-division multiplexing location system. A graphical user interface (GUI) was developed for collecting temperature and location data for the data fusion by using RFID protocols. With a puppy as test object, temperature detection and localization experiments were carried out. The measured results show that the applied method, when using a mercury thermometer for comparison in terms of measuring the temperature of the dog, has a good consistency, with an average temperature error of 0.283 °C. When using the associated program over the area of 12.25 m2, the average location error is of 0.461 m, which verifies the feasibility of the sensor-carrier location by using the proposed program. PMID:24675759

  15. Improved Kalman filter method for measurement noise reduction in multi sensor RFID systems.

    PubMed

    Eom, Ki Hwan; Lee, Seung Joon; Kyung, Yeo Sun; Lee, Chang Won; Kim, Min Chul; Jung, Kyung Kwon

    2011-01-01

    Recently, the range of available radio frequency identification (RFID) tags has been widened to include smart RFID tags which can monitor their varying surroundings. One of the most important factors for better performance of smart RFID system is accurate measurement from various sensors. In the multi-sensing environment, some noisy signals are obtained because of the changing surroundings. We propose in this paper an improved Kalman filter method to reduce noise and obtain correct data. Performance of Kalman filter is determined by a measurement and system noise covariance which are usually called the R and Q variables in the Kalman filter algorithm. Choosing a correct R and Q variable is one of the most important design factors for better performance of the Kalman filter. For this reason, we proposed an improved Kalman filter to advance an ability of noise reduction of the Kalman filter. The measurement noise covariance was only considered because the system architecture is simple and can be adjusted by the neural network. With this method, more accurate data can be obtained with smart RFID tags. In a simulation the proposed improved Kalman filter has 40.1%, 60.4% and 87.5% less mean squared error (MSE) than the conventional Kalman filter method for a temperature sensor, humidity sensor and oxygen sensor, respectively. The performance of the proposed method was also verified with some experiments.

  16. SCRMS: An RFID and Sensor Web-Enabled Smart Cultural Relics Management System

    PubMed Central

    Xiao, Changjiang; Chen, Nengcheng; Li, Dandan; Lv, You; Gong, Jianya

    2016-01-01

    Cultural relics represent national or even global resources of inestimable value. How to efficiently manage and preserve these cultural relics is a vitally important issue. To achieve this goal, this study proposed, designed, and implemented an RFID and Sensor Web–enabled smart cultural relics management system (SCRMS). In this system, active photovoltaic subtle energy-powered Radio Frequency Identification (RFID) is used for long-range contactless identification and lifecycle management of cultural relics during their storage and circulation. In addition, different types of ambient sensors are integrated with the RFID tags and deployed around cultural relics to monitor their environmental parameters, helping to ensure that they remain in good condition. An Android-based smart mobile application, as middleware, is used in collaboration with RFID readers to collect information and provide convenient management for the circulation of cultural relics. Moreover, multiple sensing techniques are taken advantage of simultaneously for preservation of cultural relics. The proposed system was successfully applied to a museum in the Yongding District, Fujian Province, China, demonstrating its feasibility and advantages for smart and efficient management and preservation of cultural relics. PMID:28042820

  17. Combinatorial screening of polymeric sensing materials using RFID sensors: combined effects of plasticizers and temperature.

    PubMed

    Potyrailo, Radislav A; Surman, Cheryl; Morris, William G

    2009-01-01

    Recently, we have developed battery-free, passive RFID chemical and biological sensors that are attractive in diverse applications where sensor performance is needed at a low cost and when battery-free operation is critical. In this study, we apply this attractive low-cost sensing platform for the combinatorial screening of formulated sensing materials. As a model system, a 6 x 8 array of polymer-coated RFID sensors was constructed to study the combined effects of polymeric plasticizers and annealing temperature. A solid polymer electrolyte Nafion was formulated with five different phthalate plasticizers: dimethyl phthalate, butyl benzyl phthalate, di-(2-ethylhexyl) phthalate, dicapryl phthalate, and diisotridecyl phthalate. These sensing film formulations and control sensing films without a phthalate plasticizer were deposited onto 9-mm diameter RFID sensors, exposed to eight temperatures ranging from 40 to 140 degrees C using a gradient temperature heater, and evaluated for their response stability and gas-selectivity response patterns. This study demonstrated that our RFID-based sensing approach permits rapid cost-effective combinatorial screening of dielectric properties of sensing materials.

  18. Impact of RFID Information-Sharing Coordination over a Supply Chain with Reverse Logistics

    ERIC Educational Resources Information Center

    Nativi Nicolau, Juan Jose

    2016-01-01

    Companies have adopted environmental practices such as reverse logistics over the past few decades. However, studies show that aligning partners inside the green supply chain can be a substantial problem. This lack of coordination can increase overall supply chain cost. Information technology such as Radio Frequency Identification (RFID) has the…

  19. Improving the Quality and Cost of Healthcare Delivery: The Potential of Radio Frequency Identification (RFID) Technology

    ERIC Educational Resources Information Center

    Vilamovska, Anna-Marie

    2010-01-01

    The study investigated whether an upcoming class of health information technology (HIT) can be used to address currently outstanding issues in the quality and cost of healthcare delivery. Expert interviews and a literature review were used to describe the 2009 universe of in- and outpatient healthcare RFID applications and to identify those…

  20. Outdoor Education Support System with Location Awareness Using RFID and Symbology Tags

    ERIC Educational Resources Information Center

    Osawa, Noritaka; Noda, Katsuji; Tsukagoshi, Satoru; Noma, Yutaka; Ando, Akikazu; Shibuya, Tomoharu; Kondo, Kimio

    2007-01-01

    A support system for outdoor learning using exploratory observation was developed. The system uses radio frequency identification (RFID) tags and two-dimensional (2D) symbology tags to locate positions on a horticultural farm and its surrounding forests. Students were able to get a location-dependent description and an educational hint for…