Boarding School Students Monitoring Systems (E-ID) Using Radio Frequency Identification
|
|
|
- Sheila Weaver
- 9 years ago
- Views:
Transcription
1 Journal of Social Sciences 5(3): , 2009 ISSN Science Publications Boarding School Students Monitoring Systems (E-ID) Using Radio Frequency Identification Herdawatie Bt Abdul Kadir, Mohd Helmy Abd. Wahab and Siti Nurul Aqmariah Bt Mohd Kanafiah Faculty of Electrical and Electronic Engineering, University Tun Hussein Onn Malaysia, Parit Raja, Batu Pahat, Johor, Malaysia Abstract: Problem statement: Monitoring Boarding school student movement using the oldfashioned study system is inefficient and brings difficulty to the hostel management to check attendance manually. By using RFID technology, student movement is quick and easy. Approach: The application of RFID Matrix Card system as a boarding school students monitoring system (E- ID) were purposed to improve school management system and to monitor interest group movement. The RFID tags enable school management to track the students movements in and out of the hostel. An individual without RFID card will trigger the alarm and this will inform school management about availability of students using an online monitoring system. Results: This system used main component of passive RFID system, database management system and wireless networking. When RFID tag pass through the RFID reader in read range zone, system recorded data from the RFID tag to the database system. Data sent online to the management for the supervision of students. This ease management to monitor availability of boarding school students and access the students personal records. Conclusion: This research study offer important implication for monitoring the boarding school students. Although this project cannot control the punctuation of student but it can ease the workload of school management and save time. Key words: RFID, monitoring system, passive tag, boarding school INTRODUCTION Auto-ID technologies have been used to reduce the time and man power to input data manually. There are still some auto-id technologies require someone to manually scan the tag to capture the data such as in barcoding technology. In contrast, Radio Technology Identification (RFID) is a technology which does not require anyone to do any manual scanning, but it uses radio waves to detect man, animals, data, or any other materials plugged with RFID tag automatically. The RFID tag combines a type of microchip and an antenna, to detect the subjects and transmit the data. The subjects are detected by the microchip and the information is transmitted by an antenna. The advantage that RFID can detect subjects from a range makes it highly usable for data storage or data extraction. An RFID system is composed of three main components; (1) An antenna or coil, (2) A transceiver (with decoder) and (3) An RFID tag. The antenna will transmit radio signal to activate the tag so the data could be read or written. Data storage and retrieval purposes are performed using a special device, the RFID tag. The tag is very small and can be placed anywhere on anything or inserted in human body. Literatures show that RFID has been applied in various fields such as supply chain [1], construction [2] and library [3] and health [4], the use of RFID system can reduce operating cost and simplify data storage and retrieval. In the medical or health line, RFID is used to store patient records and preparation of medicine. Based on the above-described overview on RFID, this study attempts to apply the technology in monitoring students of Boarding Schools (BS). Currently, the BS management has to record students in and out of the school manually. From an initial study involving three BS in Malaysia, the management found that maintaining students in/out records are difficult. In current system, misinformation always happens because students tend to provide untrue information. This results in difficulties to locate students if necessary. This study proposes a system named Boarding School Students Monitoring Systems (E-ID) to solve the above-described limitation, with the aims to outline Corresponding Author: Herdawatie Bt Abdul Kadir, Faculty of Electrical and Electronic Engineering, Universitiy Tun Hussein Onn Malaysia, Parit Raja, Batu Pahat, Johor, Malaysia 206
2 the system requirement, to investigate the effects of environment to RFID signal and to justify whether RFID can be used for monitoring students in/out of BS. MATERIALS AND METHODS RFID is getting attention in many areas of application toward increasing the ability to obtain a vast array of data of chosen entity that can be physically tagged and wirelessly scanned [5]. In construction industry, RFID system is used to obtain information about the truck and its contents [6]. The device allows the trucks to be scanned while in motion as they pass through a gate, material to be scan while being picked up by material-handling equipment and misplaced items to be found by scanning in likely places. Besides that, it can be scanned several items simultaneously such as a truckload of material or several concrete cylinders in a tank and ability for the tag to retain information on the contents of trucks or attributes of the construction material. To detect hazardous workplaces and worker safety, RFID are used in surface and underground work environments such as mining operations [7]. These new developments in show promise for reducing the number of collisions that cause injury to many workers. Also, RFID technology has a growing market in home and business security systems. RFID cards may be used to provide a hands-free access control system. With an embedded tag that acts as the key to apartments and homes, the card opens the door when it passes within close proximity, eliminating the need to tumble with keys or locks [8,9]. Agricultural fields may well be considered the birthplace of RFID technologies is to manage animals. RFID animal tag is embedded under the animal s skin; most commonly known use is to identify household pets. RFID tags help farmer to identify and track their farm animals, also used in wildlife conservation [10]. And more recently, near microscopic TIRIS (Texas Instruments Registration and Identification System) tags are being implanted in Antarctic Penguins for longterm study [11]. In libraries system, RFID can be highly beneficial, particularly for circulation staff. The implementation of RFID promises fast patron self check, decrease pilferage and offer accurate and timely inventory management [12]. Health monitoring in hospital has been an interest to researchers and healthcare practitioners for a long time The RFID technology help to track processes in patient and medical equipment also been discussed in [13,14]. Although tagging object, such as medical equipment, drugs, etc, is a potential area for RFID in hospitals, the tagging of patients involves both more J. Social Sci., 5(3): , 2009 value & more challenging because it involves patients, physicians and medical know-how and practical & organization issues. Based on the success stories in the above paragraphs, this study deduces that RFID can be implemented in monitoring BS students. In overall concept, RFID will be detected when someone with an RFID tag passes through the RFID reader. Then, data from RFID tag will be searched in the database. List of students in the database will be displayed on the host computer and is directly sent to the school management using online system. Figure 1 shows an illustration on the interaction flows in BS monitoring system. The system requirement is divided into hardware and software part. First, the project criteria was examined and outlined in the following paragraph. The remaining paragraphs elaborate the hardware and software. The criteria for E-ID were first determined, through observations during the initial interview with the three BS. Accordingly, some important criteria for consideration are listed with brief proposed solution in Table 1. Figure 2 shows the overall design and implementation of E-ID. Briefly, E-ID comprised of three parts, the system interface, the processing engines and the database. These three parts are connected through the Open Database Connectivity Driver (ODBC). In addition, E-ID employs a database with three table; (1) Attendance, (2) Student_Registration and (3) Users. Table 2 provides descriptions about each table. Fig. 1: System architecture of monitoring system Fig. 2: Development of hardware and software system 207
3 Table 1: E-ID system specification Criteria Proposed solution Type of RFID Passive Frequency MHz (high frequency) Range 3 meters Life Unlimited Source of power Uses the radio wave broadcast supply by the reader to energize its operation (magnetic alternating field) Principle is similar to an electromagnet transferring power via magnetic force, but RFID reverse the process to transform magnetic force into a power source. Other typical application Access control, item level tracking, smart card Networking Local area network J. Social Sci., 5(3): , 2009 Table 2: Tables in E-ID with attributes Table Function Field name Data type Attendance save the No (primary key) Auto No. attendance Matric No. Tag ID Name Time Date/Time Date Date/time Status Student_ Registration Save the Matric_No student (Primary) key information Tag ID Student name Registration_Date_Time Date/Time IC_No. Sesi_form Address Postcode City State Gender Phone_No Handphone_No. Block Pics Users Save the user ID and Password Fig. 3: Registering a new RFID tag Fig. 4: Attendance taking The implementation of E-ID is elaborated in this paragraph and the remaining. First, the RFID set should be turn ON and the tag must be placed in a reading range. Antenna will generated the radio frequency field to the tag. Then, RFID will be detected after the reader receive signal from the tag. There are two inspections, either the RFID tag has been registered or RFID tag has not been registered. E-ID provides an option to register the tag which has not yet been registered in which the flow is illustrated in Fig. 3. Meanwhile, Fig. 4 shows the interaction flow if the tag has been registered. The functions above are combined in E-ID and the model for combined functions is illustrated in Fig. 5. The model above has been experimented, to investigate whether it functions well as intended in different environment. Fig. 5: The E-ID Monitoring system 208
4 J. Social Sci., 5(3): , 2009 Fig. 6: The effect of the distance v/s conversion of power in vacuum condition RESULTS Fig. 7: The effect of the distance v/s conversion of power in outdoor without noise and normal moisture level Due to the nature of geographical area and physical size of the magnetic field produced by the tags, the placing tags in certain geographical areas such as polar region, moisture content and deserts due to any EM discharge may affect E-ID system functionality. Several experiments have been conducted in order to test the functionality and performance of E-ID in different condition which are in shielding room, outside room and outside room with noises present. In the first condition, the tag and the reader were placed in a noise-free environment. Since a bistatic antenna was used for reading tags, the tags were aligned with respect to the transmit antenna. From the results in Fig. 6, it can be noticed that the operating maximum power in dbm is dbm. It conveys meaning that tags give good performance when they are aligned with the transmit antenna and not affected by environment interferences but effected by reflection and absorption; where the signal wave collides with a reflected wave and hits a solid object, the object may absorb some of the waves energy. In this second condition, the tag and reader antenna were placed outside the room without any noise in terms of people and hand phone. Since a bistatic antenna was used for reading tags, the tags were aligned with respect to the transmit antenna. From the results in Fig. 7, it can be noticed that the operating maximum power is 24.14dBm, due to minimum environments producing the electromagnetic (EM) noise and normal moisture levels within the air. The radiation pattern of an RFID tag antenna determines the ability to read the tag in any orientation but it still has a problem with the RFID tag that cannot read the data. When RFID tags are exposed to noise such as of people and hand phone, the operation maximum power is dbm, which can be seen in the results in Fig. 8. A bistatic antenna was used for reading tags, the tags were aligned with respect to the transmit antenna. There disturbance occur in data analysis because of the present of many noises in the environment due to carrier interference; absorption, reflecting /nulling, electrical and skip interference. Fig. 8: The effect of the distance v/s conversion of power, outdoor with noise and normal moisture level DISCUSSION From the results, although these tags are slightly influenced by different conditions to provide power to the tag and have different reading ranges, but there is nothing about them which makes them safe against a variant of this power-analysis attack due to environment changes especially by hand phones. The modern hand phones air interface protocol is more complex than the RFID air interface, it can be used to attack and kill UHF tags although have different frequencies and antennas. With capable of attacking HF tags and this situation is very crucial while the E-ID system is acquiring data from the matrix card due to the data lost and conflict. Figure 9 shows the Flow Chart for Boarding School Student. Monitoring System in this project. First, the RFID set should be turn on and the tag must be placed in a reading range. Antenna will generated the radio frequency field to the tag. Then, RFID will be detected after reader receive signal from the tag. If RFID tag has been registered, system will take the attendance automatically and the label at the interface will show the message Please enter. Attendance student will be saved in database. If tag has not been registered, the label in the interface will show the message No data available, please register. Some snapshots of E-ID are provided in Fig. 10 and
5 J. Social Sci., 5(3): , 2009 Fig. 9: Boarding school student monitoring system (Visual Basic System) Fig. 11: Registration menu Fig. 12: The organization of Web administration Fig. 10: Main menu for monitoring system The web server (dream-weaver) has been developed to ease the management system to monitor the student movement in everywhere. The function of web server is to register the student information (except Tag ID) and to look the attendance list of the students in everywhere in the web server without looking at the static place using the old-fashioned paper system. To display to the web server, it must be saved at C: /Inetpub/wwwroot/UTHM after install the Internet Information Service (IIS). This system has chosen ASP (Active Server Page) as a programming language for the Web Server. Figure 12 shows the Flow Chart of the linked pages Development System. A snapshot of E-ID online system is provided in Fig Fig. 13: Student management menu CONCLUSION The earlier part of this article reveals the requirement to develop E-ID, which was proposed to monitor students movement in BS. Next, E-ID was experimented in three different conditions, to
6 investigate whether RFID is influenced by noise. It was found that tags give better performance when they are aligned with the transmit antenna, the radiation pattern of an RFID tag antenna determines the ability to read the tag in any orientation and RFID performance is low when it operates in the presence of an interfering signal. To this point, this study has fulfilled the first two aims. In short conclusion, based on the above two findings, this study deduces that RFID is suitable to be implemented for monitoring students of BS. As for future research expansion, some system defensive mechanism will be added to enable the system to be immune outside knock such as manipulation, sniffing of radio signal for replicate/ modify signals and viruses. ACKNOWLEDGEMENT This study was supported in part by Centre of Research and Innovation Management UTHM under Short Term Grant. REFERENCES 1. Ozelkan, E.C., Y. Sireli, M.P. Muñoz and S. Mahadevan, A decision model to analyze costs and benefits of RFID for superior supply chain performance. Proceeding of the Technology Management for the Global Future, July 2006, IEEE Xplore Press, Istanbul, pp: DOI: /PICMET Lu, M., W. Chen, X. Shen, H.C. Lam and J. Liu, Positioning and tracking construction vehicles in highly dense urban areas and building construction sites. Automat. Construct., 16: DOI: /j.autcon Singh, J., N. Brar and C. Fong, The state of RFID applications in libraries. Inform. Technol. Libraries, 25: Wang, S.W., W.H. Chen, C.H. Ong, L. Liu and Y.W. Chuang, RFID Application in hospitals: A case study on a demonstration rfid project in a Taiwan hospital. Proceeding of the 39th Annual Hawaii International Conference on System Sciences, Jan , IEEE Xplore Press, USA., pp: DOI: /HICSS Curtin, J., R.J. Kauffman and F.J. Riggins, Making the MOST out of RFID technology: A research agenda for the study of the adoption, usage and impact of RFID. Inform. Technol. Manage., 8: DOI: /s J. Social Sci., 5(3): , Jaselskis, E.J., M.R. Anderson, C.T. Jahren and Y. Rodriguez, Radio frequency identification application construction industry. J. Construct. Eng. Manage., 121: Ruff, T.M. and D. Hession-Kunz, Application of radio-frequency identification systems to collision avoidance in metal/nonmetal mines. IEEE Trans. Ind. Appli., 37: DOI: / Pala, Z. and N. Inanc, Smart parking applications using RFID technology RFID. Proceeding of the 1st Annual Eurasia, Sept. 5-6, IEEE Xplore Press, Istanbul, pp: 1-3. DOI: /RFIDEURASIA Fujikawa, M., H. Doi and S. Tsujii, Proposal for a new home security system in terms of userfriendliness and prompt intrusion notification. Proceeding of the IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, Oct , IEEE Xplore Press, Alexandria, VA., pp: DOI: /CIHSPS Laursen, W., Managing the mega flock (individual animal management systems). IEEE Rev., 52: umber= &isnumber= Beigel, M., The penguin project: RFID technology development. 12. Paul, G. and T. Vanesa, Work in progress: Performance and reliability of Radio Frequency Identification (RFID) library system. Proceeding of the International Conference on Multimedia and Ubiquitous Engineering, Apr , IEEE Xplore Press, USA., pp: DOI: /MUE Sangwan, R.S., R.G. Qiu and D. Jessen, Using RFID tags for tracking patients, charts and medical equipment within an integrated health delivery network. Proceeding of the IEEE Networking, Sensing and Control, Mar , IEEE Xplore Press, USA., pp: DOI: /ICNSC Cavalleri, M., R. Morstabilini and G. Reni, A wearable device for a fully automated in-hospital staff and patient identification. Proceeding of the 26th Annual International Conference on Engineering in Medicine and Biology Society, Sept. 1-5, IEEE Xplore Press, USA., pp: rnumber= &isnumber=30463
BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID
267 BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID Herdawatie binti Abdul Kadir, Siti Nurul Aqmariah binti Mohd Kanafiah and Mohd Helmy bin Abd. Wahab Faculty of Electrical and Electronic
Online Student Monitoring System Using Passive RFID
Online Student Monitoring System Using Passive RFID Mr.Tushar T. Tanpure 1, Mr.Harshad S. Sonawane 2,Mr.Chaitanya R. Sonawane 3, Ms.Priyanka V. Ovhal 4, Mr. Vikas B. Maral 5 Students, Dept. of Computer
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Time & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits
The IT Guide to RFID Solutions for Schools The Technology, Applications, and Benefits Radio frequency identification, or RFID, has become a leading technology in providing automated and reliable location
GSM Based Electrical Control System for Smart Home Application
Journal of Convergence Information Technology GSM Based Electrical Control System for Smart Home Application Faculty of Electrical and Electronic Engineering Universiti Tun Hussein Onn Malaysia, 86400
INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM
Journal of Computer Science 10 (2): 361-365, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.361.365 Published Online 10 (2) 2014 (http://www.thescipub.com/jcs.toc) INTEGRATING RADIO FREQUENCY IDENTIFICATION
A Review of Security System for Smart Home Applications
Journal of Computer Science 8 (7): 1165-1170, 2012 ISSN 1549-3636 2012 Science Publications A Review of Security System for Smart Home Applications Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly Department
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
RFID-Based Equipment Monitoring System
11 RFID-Based Equipment Monitoring System Mohd Helmy Abd Wahab, Herdawatie Abdul Kadir, Zarina Tukiran, Nor aisah Sudin, Mohd Hafiz A. Jalil and Ayob Johari Universiti Tun Hussein Onn Malaysia Malaysia
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
The Place of Emerging RFID Technology in National Security and Development
The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University
ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai
ACTA UNIVERSITATIS APULENSIS No 9/2005 IMPLEMENTING A DOCUMENT MANAGEMENT SYSTEM USING RFID TECHNOLOGY Burja Lucian and Tanase Mihai Abstract.With strong support in the industry from important players
Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial
WHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking
E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY
E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY 1 Dr. S. Padmapriya M.E., PhD Head of the Department (IT) 1 [email protected] 2 R. Siva Kumar M.Tech Assistant Professor
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
Control and Surveillance Secure System on Entrance Gate Based on Wireless Control and Internet
Research Journal of Applied Sciences, Engineering and Technology 10(4): 443-453, 2015 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2015 Submitted: February 13, 2015 Accepted: March
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Hospital
Embedded Web Server for Infra Red Remote Control
Embedded Web Server for Infra Red Remote Control 1 Nor Azarina Nordin, 2 Siti Zarina Mohd. Muji, 3 Mohd Helmy Abd Wahab, 4 Muhammad Syukri Ahmad 1,2,3 Department of Computer Engineering, Faculty of Electrical
Optimal Library Inventory System Using EMID Technology. [email protected]
Optimal Library Inventory System Using EMID Technology Sung-Tsun Shih 1, Chin-Ming Hsu 2, Chian-Yi Chao 3 1 Department of Electronic Engineering, Cheng Shiu University, Kaohsiung, Taiwan 2 Department of
Improving Supply Chain Traceability Using RFID Technology
Said A. Elshayeb 1, Khalid Bin Hasnan 2 and Chua Yik Yen 3 1 UTHM, [email protected] 2 UTHM, [email protected] 3 UTHM, [email protected] Abstract One of the major issues in the supply chain
Study of Logistics Warehouse Management System Based on RFID
Advanced Materials Research Vol. 748 (2013) pp 1281-1284 Online available since 2013/Aug/30 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.748.1281
Automated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions [email protected] Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
NFC APPLICATIONS IN THE TRACKING SYSTEMS
Advanced Logistic Systems, Vol. 7, No. 2 (2013), pp. 41 48. NFC APPLICATIONS IN THE TRACKING SYSTEMS TAMÁS HARTVÁNYI 1 CSABA I. HENCZ 2 Abstract: Radio Frequency Identification (RFID) and a Near Field
Radio Frequency Identification (RFID) Vs Barcodes
Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want
Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru
Business models in the Internet of Things Miriam Cordero Head of Strategy - BT Group @miricoru IoT applications bring a set of benefits Increase efficiency Scarce resources New services End to end supply
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about
915MHz RFID State of the Art RFID
915MHz RFID State of the Art RFID LIBRARY BOOK / MEDIA MANAGEMENT and RFID TRACKING SYSTEM Executive Overview More and more libraries worldwide are utilizing RFID to automate the issue and return of books,
CHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
Passive RFID Solutions for Asset Tracking and Inventory Management
Passive RFID Solutions for Asset Tracking and Inventory Management Introduction: In the present context of business, it is becoming essential for the business world to provide electronic commerce in addition
Application of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
A Multilevel Home Security System (MHSS)
A Multilevel Home Security System (MHSS) Jer-Vui Lee, Yea-Dat Chuah and Chin-Tin Chai Department of Mechatronics and Biomedical Engineering, Faculty of Engineering and Science, Universiti Tunku Abdul Rahman,
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
A RFID based Inventory Control System for Nigerian Supermarkets
A RFID based Inventory Control System for Nigerian Supermarkets Olutayo Boyinbode Department of Computer Science, Federal University of Technology, Akure Olufemi Akinyede Department of Computer Science,
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
RTLS 101 What It Is and Why You Need It
RTLS 101 What It Is and Why You Need It RTLS 101 WHAT IT IS AND WHY YOU NEED IT In business, knowledge is power, and with it comes efficiency, productivity, safety, and profits. Real Time Locating Systems
RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd
Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS
The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari
The Marriage of Passive and Active Technologies in Healthcare Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari Automated Identification Technologies in Healthcare
Military Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
Evaluating Cell Phone and Personal Communications Equipment and their EMC Effects on Automotive Audio and In-Cabin Modules
Evaluating Cell Phone and Personal Communications Equipment and their EMC Effects on Automotive Audio and In-Cabin Modules Craig W. Fanning Elite Electronic Engineering, Inc. 1516 Centre Circle Downers
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Healthcare versus Biochemical Industries
RFID in Healthcare Healthcare versus Biochemical Industries Where is the infusion pump? Where is patient Brown? Has Mrs. Jones already left the department? I cannot find the device that needs maintenance!
Android based Secured Vehicle Key Finder System
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri
RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.
RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers
Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail
Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,
Web-Based Appointment System using Short Message Service Technology: Usability Aspect
Web-Based Appointment System using Short Message Service Technology: Usability Aspect Mohd Helmy Abd Wahab 1, Ooi Lee Lee 2, Ariffin Abdul Mutalib 3, Norlida Hassan 4, Roslina Mohd Sidek 5, Mohamad Farhan
Automobile Speed Violation Detection System using RFID and GSM Technologies
Automobile Speed Violation Detection System using RFID and GSM Technologies Lujaina Al-Shabibi Student, Telecommunications Engineering Caledonian College of Engineering Muscat, Oman Nadarajan Jayaraman
Cloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
OIL AND GAS SOLUTION OVERVIEW
OIL AND GAS SOLUTION OVERVIEW Delivering visibility to the oil and gas industry to improve safety and uncover business intelligence for better decision making. Core offers an integrated solution that maximises
LibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
Modern Multipurpose Security Management System
Modern Multipurpose Security Management System Swaranambigai 1,Sabari 2 Dhanabal 3 1 Assistant Professor, 2,3 PG Scholar Department of Electronics and Communication Engineering Jay Shriram Group of Institutions
RFID Design Principles
RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum
Hills wireless security alarm DIY range
Hills wireless security alarm DIY range EASY TO INSTALL DIY system PEACE OF MIND Receive SMS/calls when alarm is armed INTERACTIVE Arm and disarm by SMS or via smartphone app Control your alarm via smart
A transportation security system applying RFID and GPS
Journal of Industrial Engineering and Management JIEM, 2013 6(1):163-174 Online ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.668 A transportation security system applying RFID and
Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application
Selecting the Correct Automatic Identification & Data Collection Technologies for your Retail Distribution Center Application Have camera/image-based code readers replaced traditional laser scanners? Has
CFCFA Logistics Management Training Supply Chain Management Technology
Your Logo Here CFCFA Logistics Management Training Supply Chain Management Technology Supply Chain Management Technology Supply Chain Management Location Tracking Technologies Satellite-based Positioning
Turnkey Cloud Based RFID Solutions. We put a light on all the things you search for
We put a light on all the things you search for 1 Scan Perform Visualize - Decide Support the work where the work is done Suppress all unnecessary information Provide the information needed for the job
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will
Applying RFID in traffic junction monitoring
Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: [email protected]
RFID for Mining. Safety: Real time visibility of the accurate location and status of employees is paramount at all times,
RFID for Mining Mining is a perfect example of an industry with a strong need for real time location that had not been realized until the advent of Wi Fi based active RFID systems. Mining operations around
White Paper. Wonderware Mobile Solutions RFID Technology. What s Inside: Invensys is now
Invensys is now White Paper Wonderware Mobile Solutions RFID Technology Author: Don Frieden, VP Mobile Solutions, Invensys What s Inside: 1. Radio Frequency Identification (RFID) 2. The Wonderware Tracking
The Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
Efficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking
RFID Technology Review Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking Sponsored by: Presented by: Shane Snyder President 2014 MHI Copyright claimed as to audiovisual works of seminar
Secure Active RFID Tag System
Secure Active RFID Tag System Isamu Yamada 1, Shinichi Shiotsu 1, Akira Itasaki 2, Satoshi Inano 1, Kouichi Yasaki 2, and Masahiko Takenaka 2 1 Fujitsu Laboratories Ltd. 64 Nishiwaki, Ohkubo-cho, Akashi
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
RFID Receiver Antenna Project for 13.56 Mhz Band
RFID Receiver Antenna Project for 13.56 Mhz Band Fatih Eken TE 401 Microwave Course Term Project, Fall 2004 Supervised by Asst. Prof. İbrahim Tekin Telecommunication Program in Faculty of Engineering and
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Integration of radio frequency identification and building information modelling for decentralised information management
icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) Integration of radio frequency identification and building
Divvela.Santhosh Raghava Rao [1],Sreevardhan cheerla [2]
Signal Strength Enhancement Using Cellular Repeater On Three Frequency Bands For Low Signal Coverage Areas (GSM900, GSM 1800/DCS, 3G) Divvela.Santhosh Raghava Rao [1],Sreevardhan cheerla [2] [1] B.tech
RFID System Description for Logistics & Inventory
RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.
