A Radio Frequency Identification (RFID)-based wireless sensor device for drug compliance measurement
|
|
- Hannah Melton
- 8 years ago
- Views:
Transcription
1 A Radio Frequency Identification (RFID)-based wireless sensor device for drug compliance measurement Alan Montefiore, Dave Parry, Ann Philpott AURA Laboratory and School of Computing and Mathematical Sciences Auckland University of Technology, Auckland Abstract PROBLEM: A high level of non-compliance relating to taking of medication can lead to compromised health benefits and wasted money. Improving patient compliance has the potential for improving issues related to Cardiovascular Disorder (CVD) and many other diseases. Although there are many telecare-based home monitoring schemes for clinical measurement, current solutions for medication tracking and reminding either lack needed functionality or are much too costly to be used in a home care environment. METHOD: The Intel Wireless Sensor Platform (WISPs) are compact microprocessor based systems that communicate with and are powered by RFID readers. This was used as an aid for developing a prototype system for monitoring medication dosages in a home health care environment. A number of prototypes were developed and tested based on various methods of pill dispensing. CONCLUSION: The combination of an RFID technology the Intel Wireless Sensor Platform(WISPs) and the construction of a specific pill dispensing container in this prototype demonstrated that it is possible to use RFID technology to effectively and ubiquitously monitor and track drug taking compliance. With further refinements on the dispensing unit and optimisations in the software, this product could be manufactured and released to home care patients to help increase compliance and reduce health related issues. RFID-based technology and an array of ubiquitous home health devices may provide both support for and monitoring information that improves healthcare outcomes for people with chronic conditions. 1. Introduction A high level of non-compliance (or non-adherance) in regards to taking prescription medicine is a cause of compromised health benefits and wasted money. A large review in 2001 [1] indicated that 30%-50% of patients fail to comply completely with treatment. Compliance issues have become a major focus for research and many interventions have taken place to help reduce the impact of non-compliance. Improving patient compliance has a great potential for improving issues related to Cardiovascular Disorder (CVD) and many other important chronic diseases. There are a number of ways that people can fail to comply with prescribed treatment, from whether they actually fill the prescription to whether they take the medication according to the prescribed regimen. This study is concerned with secondary non-compliance, that is when patients have physical possession of the medication but do not follow the instructions exactly. Studying secondary non-compliance is difficult as this generally occurs within the patient s own home and it is not reflected in statistics that are routinely collected e.g. in terms of prescriptions filled. There have been many developments in information technology intended to allow ubiquitous monitoring of a patient s health in their own homes, however demonstration of benefit is still elusive [2]. These approaches may be particularly beneficial for patients who have to live on their own and/or patients who can t make regular trips to the hospital [3]. Current demographic trends from Statistics NZ show that New Zealand s population in the 65+ age bracket is going to increase by 30,000 in the next five years. (Statistics NZ - The issue of population ageing prompts the need for improving home-based monitoring products as the elderly population often requires long-term care. These statistics along with health care being one of the highest expenditures of the gross domestic product (GDP) justify the need for more ubiquitous and more affordable solutions to health care issues [4].
2 2. Enabling Technology This section deals with some of the technology being used in the pilot device RFID Technology Radio Frequency Identification (RFID) has become an integral part of our lives, in many application areas [5], perhaps the most familiar being the proximity access card. RFID is a short-range radio technology that is best suited for communicating digital information about specific objects. In a typical scenario there are multiple RFID Tags/Transponders which are small and inexpensive and only one RFID Reader/Interrogator. Information can be sent from the tags by generating, modulating and transmitting a radio signal the reader can detect. A number of modulation techniques can be used to enable read-only or read-write communication. The use of passive RFID tags provides many benefits. They are inexpensive, disposable, and durable. These benefits allow the tags to be placed in many objects for gathering information for structural, medical and monitoring purposes. The major limitation of traditional Ultra High Frequency (UHF) tags is that they require a close proximity to a RFID reader to send data. This limits their functionality in scenarios such as supply chains or other applications where a reader is not always present. A common alternative to passive tags are active tags which use a battery to enable processing of sensor data when away from the reader. This however introduces new issues such as battery lifespan, recharging capabilities and the use of hazardous chemicals such lithium, complicating disposal Wireless Identification and Sensing Platform (WISP) WISP [6] is a new RFID tag technology that introduces a power model that is different to standard passive or active tags. WISPs are similar to passive tags in the sense that they only use power harvested from the reader s RF signals, and like active tags they can continue collecting data away from readers. This ability is achieved by storing the harvested energy in a capacitor for later use. This is particularly useful for applications that have limited contact with readers. WISPs have been designed to run on the standardised EPC Gen 2 infrastructure. ( This allows the use of commercially available readers that are compatible with EPC Gen 2 tags to collect tag data from the WISP (Figure 1). By allowing data capture and processing to continue while not within range of the reader, these tags are potentially an extremely flexible means of collecting summary data from the environment. The WISP has three in-built sensors - temperature, capacitance and a 3D accelerometer. Data from these sensors and a general purpose voltage sensor can be read when within range of an interrogator/reader via the normal EPC gen2 air interface, after loading a simple command program into the WISP onboard memory. The reader used was an IMPINJ Speedway reader, a standard UHF Reader, connected to a PC via Ethernet. This reader has a normal operational range of around 1 metre with a 30cm square antenna. As with many other readers, multiple antennae can be attached to a single reader. Figure 1. WISP mode of action
3 2.3. Prototype development The prototype was designed to allow reliable recording of the number of pills dispensed from a container. The prototype pill counter was built based on the following requirements: Each pill being dispensed would be detected, and movement of the container that did not result in a pill being dispensed would not result in a false count Because of limitations in the development environment for the WISP on-board computer, all data collection will occurr within range of the RFID reader, with minimal on-board processing. Pill dispensing should be based on a simple operation or set of operations. The rest of this section is divided into subsections dealing with the physical design of the pill container and the software design Physical Design The development of a physical container is required to demonstrate the ability to dispense pills in such a way that it can be monitored and tracked using the WISP technology. The 3D accelerometer sensor was used to detect movement in the container whether it be a specific pattern or a difference in values from two or more WISPs. There was also the possibility of using a combination of the sensors such as using the temperature sensor to detect a hand and the 3D accelerometer to detect movement. The following sections will discuss the evaluation of a series of prototype containers First Approach The first design approach aimed to produce a container that could detect dosages by recognising a specific movement using one WISP tag. The aim was to require a maze like movement before a pill was released such as tilt down, then up, then down. This could be easily detected by the software. The initial approach was to construct an alternative lid that had an inbuilt maze trap as seen in Figure 2. The first noticeable flaw found when constructing this was it would be difficult to ensure only one pill was released as the design was relying the corner to only allow one pill to go through. This design also had the capability of inconsistencies between actual pill count and what the software detected. If two pills managed to get into the second compartment in the maze the software would not be able to detect it. One advantage of this design if it could be engineered correctly would be that it be very easy to include a WISP chip and develop the software to detect the specific movement. However due to this simplicity it would also be prone to errors in detection when the container was just being shaken around, etc. Figure 2. Pill Container with maze type lid
4 Figure 3. Pill container with catchment The second design was similar to the first design in regards to the detection of a specific movement; however the design of the pill dispensing mechanism was much more advanced and reliable. This design incorporated a catchment area that could only fit one pill. The sequence of how this idea works can be seen in Figure 3. The idea was that when the container was turned on end all the pills would fall into the top section, then when turned back up-right they would all fall back apart from one which would be trapped in the catchment, then when inverted again the trapped pill would be free to fall out of the cap. The major problem with this design was the inability to construct it as precisely as needed for it to function correctly. Often the pills would not get trapped in the catchment, or more than one pill would escape when the container was inverted the second time. This design was again using the WISP tag to detect a specific movement (down, up, down) Second Approach Both these designs were unsatisfactory. However, another approach based on a lolly dispenser that had a more complex mechanism yet was still low cost seemed promising. We used the Smint dispenser as seen in Figure 4. This design could not utilise a single WISP for movement. The incorporation of two WISP tags allows the application to detect differences between their values, so when the button is pressed one of the WISPs rotates with respect to the other. The difference in values is detected by the system and if the difference is great enough it can be inferred that a pill was dispensed. The angle noise of the accelerometer is +/- 0.6 of a degree when stationary so the amount of rotation has to be greater than 2 degrees to reliably determine that the button was pushed. Any gross movement of the container will be picked up by both WISPS and hence will be cancelled out in the processing phase. To achieve the ability to rotate the rotating WISP we built an internal mechanism that forces the WISP to rotate around the point specified in Figure 5. The spring ensures the WISP locks back into place when the button is released; the bar is used for holding one side of the WISP up while the other drops. A second WISP tag is placed anywhere on the container and calibrated to return the same values during gross movement of the whole devices as the rotating tag. This design can handle being dropped and shaken around as the detection is based on differences rather than individual movements. Some considerations taken into account were isolating the sensors from elements that might affect reliability of results and distinguishing between actual dispensing of pills and general handling of the pill container. Figure 4. Smint dispenser. (
5 Figure 5. How the internal tilting mechanism works. (only one WISP shown for clarity) Software development Process The software development was fairly simple involving modules to calibrate the two WISPs, a module to read the unique tag IDs and record the angle as derived from the onboard sensors, and a calculation module to calculate the difference between the two angles and count pills dispensed. The pills dispensed algorithm is based on an angle difference of more than 6 degrees occurring, and then returning to less than this figure. 3. Results For testing the system as a whole (including container, static and dynamic tags, software and users) a number of tasks were used to ensure the system provided reliable results in all situations. The data collected from each test included a test number, software detected result (binary), actual result (binary), tilt value of static tag, tilt value of dynamic tag and the tilt difference. When evaluating the results the software detected result and the actual result pair were studied to see how closely the samples agree. The initial test was completed with a known number of pills using very deliberate movements when pushing the button. This was designed to test the functionality of the container and software when being used in ideal conditions. Each test was performed separately with values being recorded after each press. Results are shown in Table 1 for: Detected Result: Whether or not the software detected that a pill had been dispensed. Actual Result: If a pill was dispensed from the device. Tilt Static Chip: The tilt value returned from the WISP for the tag that does not move. Tilt Dynamic Chip: The tilt value returned from the WISP for the tag that rotates when the button is pressed. Difference Tilt: The difference between the tilt values. Used for determining if the button has been pushed. The second stage of testing the application and pill dispensing container was to get three people to use the device without giving them direct instructions on how it works. They were instructed to dispense five pills (lollies) at a random interval. The attempts from each user can be seen in Table 2. The results from the tests show that the software and container were performing as expected. With a 100% success in detection under general usage it can be seen that the device performs reliably. An interesting figure that was extracted from the test results was the mean of the tilt difference. Knowing the mean of the tilt difference allowed us to double check that the values that were coded into the software were correct. With a mean tilt difference of 38, we were confident that the detection range (30-50) was accurate and would provide reliable results.
6 Table 1. Initial calibration Test Detected Result Actual Result Tilt Static Chip Tilt Dynamic Chip Difference Tilt Table 2. Test user results Test Detected Result Actual Result Tilt Static Chip Tilt Dynamic Chip Difference Tilt Table 3. Limits to dispensing angle Test Detected Result Actual Result Tilt Static Chip Tilt Dynamic Chip Difference Tilt
7 Figure 6. Scatter plot showing relationship between the tilt values of the static and dynamic tags, The red dots represent the extreme values at which dispensing is physically possible After plotting a scatter graph of the static vs. dynamic tilt values as seen in Figure 6. It was observed that user three (tests ) was holding the device on a downwards tilt to dispense the pills where as other users all held it upright. It was reassuring to see that the tilt difference was still well in the range limits. These results prompted tests around the limits of when a pill would be dispensed, from the physical mechanism for example if the dispenser was held upside down a pill would not be dispensed. The following two tests (Table 3) show the extreme boundary conditions, for the angle at which the dispenser was held. These values were introduced into the software to ensure there are no false positives when the device is tilted to far before the button is pushed. Test 14 represents the backwards tilt limit, and test 15 for the forwards tilt limit. The boundary values have been added to the scatter graph to show the range in which all recorded results should fall (points in red). The one issue surrounding the boundary values is the 0.6 degree variance in the data returned from the WISP. The boundary conditions in the software have been set to the inner most value of each boundary because actually falling within the 0.6 degree variance in both tags is very slim. To check the degree of the relationship between the static and dynamic tilt values, i.e. whether the sensors would still work within the range in which dispensing was possible, a regression plot was constructed (Figure 6). After viewing the plot it was possible to see that the relationship was between the variables was positive as higher static values pair with higher dynamic values and vice-versa. A t-test and linear regression were performed. The results showed a p< This gave us confidence that the devices would record dispensing accurately during any physically reasonable dispensing process. 4. Conclusions The results from the tests show a completely reliable software detection result. This result was obtained from a series of four users including one of the authors. After plotting and analysing the data it was clear to see that all the results form a linear pattern that is determined by the degree of tilt of the device. The correlation result of 0.97 showed a very strong positive relationship between the static and dynamic tilt variables, during dispensing. The combination of RFID technology (WISPs) and the construction of a specific pill dispensing container in this prototype has proved to demonstrate that it is possible to use RFID technology to effectively and ubiquitously monitor and track drug taking compliance. With further refinements on the dispensing unit and optimisations in the software this product could be manufactured and released to home care patients to help increase compliance and reduce health related issues. Because the WISP devices can include other sensors, and record data, this approach would allow identification of which drug is being dispensed. This could be extended to identifying the user doing the dispensing, for example if the user was to wear one as a wristband, during the dispensing. As the WISP continues to record data even when it is outside the
8 detection range of the RFID reader, this is a potentially very flexible device. Other sensors such as heat or light detection could also be used to gain a better understanding of the storage conditions of the drugs. Because the RFID detector is a standard type, this could also be integrated into a drug reminder/identification system [7], or systems that might be used for other sorts of homecare such as those designed to support the visually impaired. Cost of the system depends on the cost of WISPs which are not currently commercially available, as well as the RFID detector and associated computer system. The RFID detector used (Impinj) is accessed via an Ethernet connection, so it is possible that wireless connection to this device could be established. These devices may become part of a home healthcare hub that would support both assisted living technology, and the recording of appropriate clinical data. Such systems are being advanced for particular user groups such as people with neurological impairment [8] By building devices that use common standards and that have low infrastructure requirements, the acceptance of these devices is more likely. A comparison can be made with home entertainment technology, where devices can be linked in a complex and expensive, but high performing system, home theatre, or as individual items, or somewhere in-between. It may be that considering home telecare as a branch of consumer electronics, rather than as the transplantation of hospital equipment, clinical transformation is more easily enabled. 5. Acknowledgments The authors would like to acknowledge the generous support of the INTEL WISP Challenge team and IMPINJ 6. References [1] Vermeire E, et al., Patient adherence to treatment: three decades of research. A comprehensive review. J Clin Pharm Ther, : p [2] Martin S, et al., Smart home technologies for health and social care support. Cochrane Database of Systematic Reviews:, (4). [3] Choi JM, et al. A System for Ubiquitous Health Monitoring in the Bedroom via a Bluetooth Network and Wireless LAN. in Engineering in Medicine and Biology Society, IEMBS '04. 26th Annual International Conference of the IEEE [4] Otto C, et al., System architecture of a wireless body area sensor network for ubiquitous health monitoring. Journal of Mobile Multimedia,, (4): p [5] Landt J, The history of RFID. Potentials, IEEE, (4): p [6] Sample AP, et al., Design of an RFID-Based Battery-Free Programmable Sensing Platform. Instrumentation and Measurement, IEEE Transactions on, (11): p [7] Houliston B, Merry A, and Parry DT, Sensors and Insensibility: Monitoring Anaesthetic Activity with RFID, in Health Informatics New Zealand Forum. 2008, HINZ: Rotorua. [8] Gentry T, Smart homes for people with neurological disability: State of the art. NeuroRehabilitation, (3): p
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationIknaia Asset and Personnel Tracking Management System for the Construction Industry
Iknaia Asset and Personnel Tracking Management System for the Construction Industry Introduction The UK construction industry accounts for over 7%* of the UK s Gross Domestic Product and employs over two
More informationEfficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More informationWireless Technologies take Personnel Safety in the Process Industries to a New Level
324808 Issue 3 Wireless Technologies take Personnel Safety in the Process Industries to a New Level October 2010 WHITE PAPER John Hartley Managing Director Copyright Extronics Ltd 2009 The information
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationEnergy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments
White Paper Energy Harvesting Powered Wireless Sensor Node and Asset Tracking Solutions in Random Vibration Environments by Anurag Kasyap, Ph.D. April 2009 Copyright 2009 AdaptivEnergy LLC. All rights
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationThe Research and Application of College Student Attendance System based on RFID Technology
The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,
More informationIknaia Asset and Personnel Tracking Management System for the Healthcare Industry
Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry July 2014 Introduction Trying to find your way around a large hospital or locating a high-value medical device such as
More informationENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION
ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851
More informationMilitary Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
More informationEvolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
More informationPERSONAL MOBILE DEVICE FOR SITUATED INTERACTION
PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. bowbowshen@yahoo.com.tw
More informationA Guide to Community Alarm and Telecare Equipment
Telecare in North West Surrey Contact Information If you would like further advice or information on any of the products mentioned in this brochure please contact your local North West Surrey Borough Council
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationThe use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.
Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways
More informationWireless Multimedia Technologies for Assisted Living
Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004) Challenges and Opportunities for Engineering Education, Research and Development 2-4 June
More informationWHITE PAPER PALLETS AND RETURNABLE ASSET TRACKING
WHITE PAPER PALLETS AND RETURNABLE ASSET TRACKING PALLETS AND RETURNABLE ASSET TRACKING Across asset supply chains, the ability to reduce the cost of asset loss, increase asset cycle time, and reduce asset
More informationWAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
More informationRemote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare
Remote Monitoring of Livestock Wireless and the Wii Improving Livestock Welfare Ian McCauley Greg Cronin Michelle Watt Samantha Borg Future Farming Systems Research, DPI Vic Outline Wireless Technologies
More informationDesign for Management Information System Based on Internet of Things
Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, 413789256@qq.com Abstract
More informationVersion Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.
+3 # Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.2011 Jpo Reset button added 1. Purpose of this user manual...
More informationAn RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies
An RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies R. Hornbaker Department of Agricultural and Consumer Economics College of ACES, University of Illinois
More informationBURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One
More informationPerformance Evaluation of a UWB-RFID System for Potential Space Applications Abstract
Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract This talk presents a brief overview of the ultra-wideband (UWB) RFID system with emphasis on the performance evaluation
More informationEnabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
More informationSecure Active RFID Tag System
Secure Active RFID Tag System Isamu Yamada 1, Shinichi Shiotsu 1, Akira Itasaki 2, Satoshi Inano 1, Kouichi Yasaki 2, and Masahiko Takenaka 2 1 Fujitsu Laboratories Ltd. 64 Nishiwaki, Ohkubo-cho, Akashi
More informationUSB Plus+ RFID Reader Setup Guide
875-0042-03 RevA USB Plus+ RFID Reader Setup Guide 1 Government Limited Rights Notice: All documentation and manuals were developed at private expense and no part of it was developed using Government funds.
More informationR&D Access Touch 3.1 User Manual Version 1.00 Public 1 (13) User Manual. Access Touch 3.1
Public 1 (13) User Manual Access Touch 3.1 Version Date Author Description 1.00 30.09.2011 Pah First version Public 2 (13) 1. Purpose of this user manual... 3 2. Description of Access Touch 3.1... 3 3.
More informationRFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008
RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical
More informationReactec s HAVmeter depends on CoreRFID. A Case Study.
Reactec s HAVmeter depends on CoreRFID The design and supply service provided by CoreRFID has helped to ensure the success of the HAVmeter system in very demanding working environments. Mark-Paul Buckingham,
More informationREAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
More informationDr Louise Schaper, PhD CEO, Health Informatics Society of Australia
Dr Louise Schaper, PhD CEO, Health Informatics Society of Australia 1. Older adults using ICT 2. Technologies, used by health care professionals, to enhance quality of care and health 3. Advanced ICT to
More informationOverview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology
More informationGuide to remote Care technology
Guide to remote Care technology Technology Can Help Keep Your Loved One Safe at Home You cannot replace the caring hands of human touch, but you do need to make sure that your loved-ones have access to
More informationEffective Use of Android Sensors Based on Visualization of Sensor Information
, pp.299-308 http://dx.doi.org/10.14257/ijmue.2015.10.9.31 Effective Use of Android Sensors Based on Visualization of Sensor Information Young Jae Lee Faculty of Smartmedia, Jeonju University, 303 Cheonjam-ro,
More informationRFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd
Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationHP Brazil RFID CoE Center of Excellence
HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe
More informationHvor går RFID forskning og utvikling?
Technology for a better society Enabling the Real Time Enterprise Hvor går RFID forskning og utvikling? Ovidiu Vermesan, SINTEF IKT og Edvin Holsæter, Telenor Iris Plan for presentasjonen RFID segmenter
More informationHow To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
More informationDesign And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
More informationThe Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
More informationEXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION
EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION Abiola A. Akanmu 1, Chimay J. Anumba 2, John I. Messner 2, Sanghoon Lee 2, and Deepa Kundur 3 abiola.akanmu@wmich.edu,
More informationGetting Started with TraSer from Requirements to a Solution
Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for
More informationGETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G
GETTING TO KNOW YOUR PRE-PAID TELSTRA WI-FI 4G LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Pre-Paid Telstra Wi-Fi 4G. This guide will help you get connected as quickly and
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationInternational school in Qatar pilot project for a RFID-based STUDENT TRACKING SYSTEM
International school in Qatar pilot project for a RFID-based STUDENT TRACKING SYSTEM Automated school bus and student tracking for multiple buses and bus routes Live route tracking and data transmission
More informationTo effectively manage and control a factory, we need information. How do we collect it?
Auto-ID 321 Auto-ID Data-collection needs: What is our WIP? What is productivity or assignment of employees? What is utilization of machines? What is progress of orders? What is our inventory? What must
More informationFruit Quality Monitoring System Using the Smart RFID Tag
Fruit Quality Monitoring System Using the Smart RFID Tag Nghia Truong Van 1,1, Lin Sen 1, Kyung Kwon Jung 2, Joo Woong Kim 1 and Ki Hwan Eom 1 1 Department of Electronics and Electrical Engineering Dongguk
More informationKeeping Your Clients in Their Homes Through the Use of Technology
Keeping Your Clients in Their Homes Through the Use of Technology Presented by: Cathy Barton Director of Living Safe Technologies Lutheran Senior Services www.thebuttonbylss.org Challenges of Private Duty
More informationACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai
ACTA UNIVERSITATIS APULENSIS No 9/2005 IMPLEMENTING A DOCUMENT MANAGEMENT SYSTEM USING RFID TECHNOLOGY Burja Lucian and Tanase Mihai Abstract.With strong support in the industry from important players
More informationFigure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
More informationTT-RFID platform - Introduction
TT-RFID platform - Introduction Version 0.7 01/06/2011 INDEX 1. RFID PROTOCOL - MAIN FEATURES...1 2. COMMAND DISPLAY FOR THE RFID PROTOCOL...2 3. GUIDELINES FOR USING THE RFID PROTOCOL... 4 3.1. CONFIGURATION
More informationCHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
More informationRFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate
More informationDAKTON µ BOX MANUAL µbox User Manual 1
µbo User Manual 1 DAKTON µ BO: compact data logger and sensor µ BO is a sensor and a data logger together. It records data processed by DAKTON DASHBOARD with the addition of lateral and longitudinal accelerations.
More informationANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
More informationWhite Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now
Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking
More informationRF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
More informationTowards a Transparent Proactive User Interface for a Shopping Assistant
Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany mschneid@cs.uni-sb.de
More informationIndustrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about
More informationWi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
More informationIMPLEMENTING VEHICLE LOCATION SYSTEM FOR PUBLIC BUSES IN SINGAPORE
IMPLEMENTING VEHICLE LOCATION SYSTEM FOR PUBLIC BUSES IN SINGAPORE Silvester Prakasam 1 and Adeline Wang 1 ABSTRACT A Vehicle Location System will be implemented in Singapore in conjunction with the contactless
More informationDr Louise Schaper, PhD CEO, Health Informatics Society of Australia
Dr Louise Schaper, PhD CEO, Health Informatics Society of Australia Megatrend One: Older population Megatrend One: Older population Megatrend One: Older population Megatrend Two: Digital technology in
More informationWHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
More informationIntroducing AUDIT- BUDDY
Introducing AUDIT- BUDDY Monitoring Temperature and Humidity for Greater Data Center Efficiency 202 Worcester Street, Unit 5, North Grafton, MA 01536 www.purkaylabs.com info@purkaylabs.com 1.774.261.4444
More informationAnalysis of identification technologies and an automatic lock for school lockers
EUROPEAN JOURNAL FOR YOUNG SCIENTISTS AND ENGINEERS Analysis of identification technologies and an automatic lock for school lockers David Marn Abstract The main objective of the project was the improvement
More informationIdentification and tracking of persons using RFID-tagged items
Page 1 of 9 Identification and tracking of persons using RFID-tagged items Abstract ( 1 of 1 ) United States Patent Application 20020165758 Kind Code A1 Hind, John R. ; et al. November 7, 2002 A method
More informationAutomated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
More informationPersonal Assistance System Owner's Guide
Owner's Guide PSC07 READ THIS FIRST This equipment generates and uses radio frequency energy, and if not installed and used properly, that is, in strict accordance with the manufacturers instructions,
More informationZME_05459 Wall Blind Control Set for Busch-Jaeger DURO 2000 Firmware Version : 1.8
ZME_05459 Wall Blind Control Set for Busch-Jaeger DURO 2000 Firmware Version : 1.8 Quick Start A This device is a Z-Wave Actuator. Triple click one of the buttons on the device will include the device.
More informationPlease refer to the chapters below for detailed information about all aspects of the products usage.
EUR_STELLAZ Wall Radiator Thermostat Valve Control Firmware Version : 0.4 Quick Start S This device is a wireless sensor. All operation is performed using the little button behind the round hole in the
More informationEDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit
EDK 350 (868 MHz) EDK 350U (902 MHz) EnOcean Developer Kit EDK 350 User Manual Important Notes This information describes the type of component and shall not be considered as assured characteristics. No
More informationA Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
More informationPractices for Using Passive, Low-Cost RFID for Improved Asset Tracking
RFID Technology Review Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking Sponsored by: Presented by: Shane Snyder President 2014 MHI Copyright claimed as to audiovisual works of seminar
More informationMicrochip FAQ's All you wanted to know about microchips but were afraid to ask!
Microchip FAQ's All you wanted to know about microchips but were afraid to ask! International Committee for Animal Recording (ICAR) ICAR Newsletter - March 1999 Electronic Identification Special Edition
More informationCHAPTER 6 A NOVEL ARCHITECTURE FOR NETWORK-CODED ELECTRONIC HEALTH RECORD STORAGE SYSTEM
138 CHAPTER 6 A NOVEL ARCHITECTURE FOR NETWORK-CODED ELECTRONIC HEALTH RECORD STORAGE SYSTEM 6.1 INTRODUCTION The fundamental idea of network coding has spread its potential in various network performance
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationCM921 - User Guide. Description. Features. 1 day Wireless Programmable Room Thermostat with LoT technology WHAT IS A PROGRAMMABLE ROOM THERMOSTAT?
WHAT IS A PROGRAMMABLE ROOM THERMOSTAT?...an explanation for householders A programmable room thermostat is both a programmer and a room thermostat. A programmer allows you to set On and Off time periods
More informationINSTRUMENTATION AND CONTROL TUTORIAL 3 SIGNAL PROCESSORS AND RECEIVERS
INSTRUMENTATION AND CONTROL TUTORIAL 3 SIGNAL PROCESSORS AND RECEIVERS This tutorial provides an overview of signal processing and conditioning for use in instrumentation and automatic control systems.
More informationUnderstanding the Benefits of Active RFID for Asset Tracking
Understanding the Benefits of Active RFID for Asset Tracking How companies can address their auto-identification challenges with active RFID technology For more information, visit us online at Understanding
More information1. Introduction... 3. 2.Fixture exterior view... 3. 3. Connecting the Robe Universal Interface... 4. 3.1 Software update of the fixture...
1 Table of contests 1. Introduction... 3 2.Fixture exterior view... 3 3. Connecting the Robe Universal Interface... 4 3.1 Software update of the fixture... 4 3.2 Connecting a DMX console to the Media Fusion...
More informationConnected drug delivery systems : Increase patient compliance and enable comprehensive, coordinated treatments
Connected drug delivery systems : Increase patient compliance and enable comprehensive, coordinated treatments Eric Dessertenne, PharmD, MBA Head of Business Development & Commercial Operations edessertennne@biocorp.fr
More informationAn Intelligent Middleware Platform and Framework for RFID Reverse Logistics
International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics
More informationThe NXT Generation. A complete learning solution
The NXT Generation A complete learning solution The NXT Generation LEGO MINDSTORMS Education is the latest in educational robotics, enabling students to discover ICT, science, D&T and maths concepts in
More informationIdentitovigilance technologies
Identitovigilance technologies Typologies and future developments Séverine Dewerpe, Healthcare & Barcodes Manager, GS1 Belgilux Tuesday, 10 th of March 2015 100 000 130 270 million 3 30 years 4 Agenda
More informationUbiquitous Computing Applications: Healthcare & Smart Homes. Emmanuel Agu
Ubiquitous Computing Applications: Healthcare & Smart Homes Emmanuel Agu Paper 1: Moving out of the Lab: Deploying Pervasive Technologies in a Hospital Many ubicomp ideas, research projects Few deployed
More informationUC CubeSat Main MCU Software Requirements Specification
UC CubeSat Main MCU Software Requirements Specification 23 November 2012 Adam Goodwin Table of Contents 1. Introduction... 3 2. Problem Statement and Scope... 3 3. Software Sequences... 4 3.1. Overall
More informationRFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
More informationSelecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application
Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Have camera/image-based code readers replaced traditional laser scanners? Has
More informationVolume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Hospital
More informationModern Multipurpose Security Management System
Modern Multipurpose Security Management System Swaranambigai 1,Sabari 2 Dhanabal 3 1 Assistant Professor, 2,3 PG Scholar Department of Electronics and Communication Engineering Jay Shriram Group of Institutions
More informationRFID in the Hospital Environment
RFID in the Health Care Industry RFID in the Hospital Environment Speaker: Daniel Engels, Ph.D. Director of Research MIT Auto-ID Labs I. Mun, Ph.D. Director, Bio-Medical Research Aventura Hospital & Medical
More informationIMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
More informationA Highly Efficient Power Management System for Charging Mobile Phones using RF Energy Harvesting
A Highly Efficient Power Management System for Charging Mobile Phones using RF Energy Harvesting Ajay Sivaramakrishnan, Kailarajan Jeyaprakash Jegadishkumar 2 B.E Electronics & Communication, II year,
More information