How To Spread Pheromone In An Rfid Tag

Size: px
Start display at page:

Download "How To Spread Pheromone In An Rfid Tag"

Transcription

1 Physical Deployment of Digital Pheromones Through RFID Technology Marco Mamei, Franco Zambonelli {mamei.marco, Università

2 Outline Università Motivation RFID Pheromone Deployment Pheromone-based Object Tracking Experiments Conclusion

3 Motivation Università Stigmergy and in particular pheromone-based interaction are inspiring several pervasive and ubiquitous computing applications Users and robots navigation and coordination Implementations are often troublesome. The reason for this problem is rather clear: where to store pheromones in pervasive computing environment?

4 Where to Store Pheromones? (Related Works) Remotely-accessible database bottleneck, single point of failure, scalability concerns. Ad-hoc network consistency problems, requires nodes at high-density, costly. Sensor network very promising, but still very costly. Real physical markers who really wants pheromone-graffiti covering home?!

5 RFID Tags RFID Tags and Readers Radio-Frequency Identification Tags are passive Dynamic Read-Write Capabilities Each tag has a small amount of storage Each tag costs less than 0.20 It is likely they will be on every object, like barcode today!

6 Deploy Pheromones in RFID Università Tags Write pheromones!

7 Deploy Pheromones in RFID Università Tags - details Call L(t) the set of location-tags being read at time t. TAG ID INDEX An application agent sees that the user is moving if L(t) L(t-1) and, to spread pheromone O, it will write O in all the L(t)-L(t-1) tags as it moves. Moreover, an increasing counter C(O) and a timestamp T(O) are needed to give direction and evaporation Since tags are passive, evaporation have to be carried on by users. Users delete old pheromones when crossing upon them. PHEROMONE ID #1 COUNTER #1 TIMESTAMP #1 PHEROMONE ID #n COUNTER #n TIMESTAMP ID #n

8 Deploy Pheromones in RFID Università Tags Want to spread pheromone O= Marco L(t) = (door-tag, laserjet-tag) In all the L(t) tags write: [Marco, 1, 3:05:40]

9 Deploy Pheromones in RFID Università Tags L(t-1) = (door-tag, laserjet-tag) L(t) = (inject-tag) L(t)!= L(t-1) the user has moved! Write [Marco, 2, 3:05:41] in all the L(t) tags

10 RFID Pheromones Paths 1 3:05:40 2 3:05:41

11 Pheromone-based Object Università Tracking Let s present an application to find everyday objects (glasses, keys, etc.) forgot somewhere in our homes. The application allows everyday objects to leave virtual pheromone trails. Objects can be easily tracked afterwards, by following the relative pheromone trail.

12 Spreading Object Pheromones Let us call O(t) the set of object-tags being sensed at time t. If the agent senses an object-tag O such that O O(t), O O(t-1), and L(t) L(t-1), then the user picked-up the object O and the object is moving around. In this situation, the agent has to spread O pheromone in the new location. Similarly, if O O(t-1), but O O(t), then the agent infers that the user left object O and stops spreading O pheromone.

13 Tracking Objects To track an object O the agent will start looking for an O-pheromone within the sensed location-tags L(t). If such a pheromone is found, this implies that the user crossed a suitable pheromone trail. Two alternatives: L(t) contains two location-tags having O-pheromones with different C(O) Gradient Search L(t) contains only one location-tag. Local Search

14 Implementation

15 # locations searched before finding an obj ect Experiments time BLIND SEARCH LOCAL SEARCH GRAD SEARCH # locations searched before finding an object time If the number of locations is small, then local search is almost equal to random search. Lot of time is wasted dowsing in the neighborhood. If the number of location is high the local search is almost equal to gradient search. Time spent dowsing is negligible

16 # locations searched b efo re fin d in g an obj ect BLIND SEARCH LOCAL SEARCH GRAD SEARCH Experiments t ag st orage capacit y # locations searched b e f o r e f in d in g a n o b je c t GRAD SEARCH (T = 500) GRAD SEARCH (T = 50) GRAD SEARCH (T = 5) tag storage capacity When tags become full, objects are moved without leaving traces. This breaks the pheromone trails. The problem cannot be solved by simply using different pheromone evaporation rates. Still, with current RFID technology (~KB storage, the approach scales to hundreds of objects being tracked)

17 Other Applications and Future Università Development Besides the presented application, RFID pheromone deployment can be applied to a number of scenarios: Context-awareness: complex pheromones representing structured contextual information Motion coordination Robotic coordination Our future research aims at solving the tag saturation problem Idea: store pheromones also in the object tag. The system becomes automatically scalable. The more object, the more space. But need to manage object reconfigurations.

18 Further Info

PHYSICAL DEPLOYMENT OF DIGITAL PHEROMONES THROUGH RFID TECHNOLOGY

PHYSICAL DEPLOYMENT OF DIGITAL PHEROMONES THROUGH RFID TECHNOLOGY PHYSICAL DEPLOYMENT OF DIGITAL PHEROMONES THROUGH RFID TECHNOLOGY Marco Mamei, Franco Zambonelli DISMI Università di Modena e Reggio Emilia Via Allegri 13 Reggio Emilia ITALY {mamei.marco, franco.zambonelli}@unimore.it

More information

Autonomic Services for Browsing the World

Autonomic Services for Browsing the World Autonomic Services for Browsing the World F. Zambonelli & The Outline Future pervasive computing scenarios The Browsing the World concept Key research challenges Our current researches directions Overlay

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

RFID in the Hospital Environment

RFID in the Hospital Environment RFID in the Health Care Industry RFID in the Hospital Environment Speaker: Daniel Engels, Ph.D. Director of Research MIT Auto-ID Labs I. Mun, Ph.D. Director, Bio-Medical Research Aventura Hospital & Medical

More information

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna

Towards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition

More information

From Self-Organising Mechanisms to Design Patterns

From Self-Organising Mechanisms to Design Patterns Self-aware Pervasive Service Ecosystems From Self-Organising Mechanisms to Design Patterns University of Geneva Giovanna.Dimarzo@unige.ch 1 Outline Motivation: Spatial Structures and Services Self-Organising

More information

The ebbits project: from the Internet of Things to Food Traceability

The ebbits project: from the Internet of Things to Food Traceability The ebbits project: from the Internet of Things to Food Traceability Smart AgriMatics2014 Contribution to session 5.2 Meat Information Provenance 18-19 June 2014 Paolo Brizzi Istituto Superiore Mario Boella

More information

Mining Network Relationships in the Internet of Things

Mining Network Relationships in the Internet of Things Mining Network Relationships in the Internet of Things PAT DOODY, DIRECTOR OF THE CENTRE FOR INNOVATION IN DISTRIBUTED SYSTEMS (CIDS) INSTITUTE OF TECHNOLOGY TRALEE ANDREW SHIELDS IRC FUNDED RESEARCHER

More information

RF-Compass: Robot Object Manipulation Using RFIDs

RF-Compass: Robot Object Manipulation Using RFIDs RF-Compass: Robot Object Manipulation Using RFIDs Jue Wang Fadel Adib, Ross Knepper, Dina Katabi, Daniela Rus Limitation of Today s Robotic Automation Fixed-position, single-task robot Limited to large-volume

More information

Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage

Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage Gurhan Avdan Computer Engineering Department Istanbul Technical University Istanbul, Turkey Esin Ergen, Gursans

More information

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. bowbowshen@yahoo.com.tw

More information

Healthcare versus Biochemical Industries

Healthcare versus Biochemical Industries RFID in Healthcare Healthcare versus Biochemical Industries Where is the infusion pump? Where is patient Brown? Has Mrs. Jones already left the department? I cannot find the device that needs maintenance!

More information

Internet of Things 2015/2016

Internet of Things 2015/2016 Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:

More information

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

Tackling Security and Privacy Issues in Radio Frequency Identification Devices Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,

More information

Redundant Data Removal Technique for Efficient Big Data Search Processing

Redundant Data Removal Technique for Efficient Big Data Search Processing Redundant Data Removal Technique for Efficient Big Data Search Processing Seungwoo Jeon 1, Bonghee Hong 1, Joonho Kwon 2, Yoon-sik Kwak 3 and Seok-il Song 3 1 Dept. of Computer Engineering, Pusan National

More information

Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications

Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Udana Bandara 1,2 Masateru Minami 1,3 Mikio Hasegawa 1 Masugi Inoue 1 Hiroyuki Morikawa 1,2

More information

Loyalty Systems over Near Field Communication (NFC)

Loyalty Systems over Near Field Communication (NFC) Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal diogo.simoes@tagus.ist.utl.pt Abstract.

More information

Systèmes d information diffus avec l environnement SPREAD

Systèmes d information diffus avec l environnement SPREAD Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain

More information

Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags

Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Markus Hansen Sebastian Meissner Independent Centre for Privacy Protection Schleswig-Holstein

More information

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Comparison of WCA with AODV and WCA with ACO using clustering algorithm Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks

More information

REROUTING VOICE OVER IP CALLS BASED IN QOS

REROUTING VOICE OVER IP CALLS BASED IN QOS 1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware

More information

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 RFID, GPS, sensor, and other auto-id technologies promise to revolutionize enterprise asset

More information

People, Places, Things: Web Presence for the Real World

People, Places, Things: Web Presence for the Real World People, Places, Things: Web Presence for the Real World Internet & Mobile Systems Laboratory, Palo Alto Tim Kindberg Overview A little history: HEHAW to CoolTown The design problem: Nomadicity Web presence

More information

BY THE NUMBERS. IT Asset Management: Calculating the ROI of a ITAM Solution. For More Information: (866) 787-3271 Sales@PTSdcs.com

BY THE NUMBERS. IT Asset Management: Calculating the ROI of a ITAM Solution. For More Information: (866) 787-3271 Sales@PTSdcs.com 11000 00011 100 000 001 111 011 000 1 1100 00000 11111 000 000 11111 000 111 00 1 00000 00111 000 0 1001111 0 1 0 10011 1 1 0 1 010 101 0011111 0 010 101 10000 001 110 000 000 111 001 0 DATA CENTER SOLUTIONS

More information

Multi-Robot Traffic Planning Using ACO

Multi-Robot Traffic Planning Using ACO Multi-Robot Traffic Planning Using ACO DR. ANUPAM SHUKLA, SANYAM AGARWAL ABV-Indian Institute of Information Technology and Management, Gwalior INDIA Sanyam.iiitm@gmail.com Abstract: - Path planning is

More information

Improving Supply Chain Traceability Using RFID Technology

Improving Supply Chain Traceability Using RFID Technology Said A. Elshayeb 1, Khalid Bin Hasnan 2 and Chua Yik Yen 3 1 UTHM, saidelshayeb@hotmail.com 2 UTHM, khalid@uthm.edu.my 3 UTHM, saidelshayeb@hotmail.com Abstract One of the major issues in the supply chain

More information

The Place of Emerging RFID Technology in National Security and Development

The Place of Emerging RFID Technology in National Security and Development The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University

More information

REUSABLE CONTAINER MANAGEMENT & TRACKING

REUSABLE CONTAINER MANAGEMENT & TRACKING REUSABLE CONTAINER MANAGEMENT & TRACKING Why And How To Evaluate An Asset Tracking Program An asset tracking program offers a number of advantages. From increased supply chain visibility to reduced transportation

More information

Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper

Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup

More information

Overview to the Cisco Mobility Services Architecture

Overview to the Cisco Mobility Services Architecture Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly

More information

Wildcat Web Student Guide

Wildcat Web Student Guide Wildcat Web Student Guide Section I: Access and login to Wildcat Web Account Following are the steps to log in to your Wildcat Web account. View your class schedule, set up meetings with your advisor,

More information

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539

Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539 Software Requirements Specification for Schlumberger Scheduling Assistant Page 1 Software Requirements Specification for Schlumberger Scheduling Assistant Version 0.2 Prepared by Design Team A Rice University

More information

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about

More information

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda

More information

Data Analysis Methods for Library Marketing in Order to Provide Advanced Patron Services

Data Analysis Methods for Library Marketing in Order to Provide Advanced Patron Services Data Analysis Methods for Library Marketing in Order to Provide Advanced Patron Services Toshiro Minami 1,2 and Eunja Kim 3 1 Kyushu Institute of Information Sciences, 6-3-1 Saifu, Dazaifu, Fukuoka 818-0117

More information

Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments

Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments Increase your efficiency in asset tracking, inventory management, security and process

More information

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3 2014-11-05 CENIT AG Author: Stefan Bettighofer 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 Definitions...

More information

Google Analytics tags migration to Google Tag Manager in a multi-site environment Monday, 28 September 2015 07:55

Google Analytics tags migration to Google Tag Manager in a multi-site environment Monday, 28 September 2015 07:55 Introduction More than one year ago my colleague Stephane wrote an article about Google Tag Manager implementation basics. As a reminder this tool is a tag management system launched in 2012 by Google.

More information

JBoss Forums Guide. 1. Introduction

JBoss Forums Guide. 1. Introduction JBoss s Guide @author Ryszard Kozmik 1. Introduction JBoss s is a subproject of JBoss Portal product. It is simply a forums portlet with all needed functionality for deploying

More information

The Drug Quality & Security Act

The Drug Quality & Security Act The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply

More information

Technology Shift 1: Ubiquitous Telecommunications Infrastructure

Technology Shift 1: Ubiquitous Telecommunications Infrastructure Ubiquitous networks and cloud computing May 10 th 2009 Enrica M. Porcari Chief Information Officer, CGIAR Abstract Major changes are in progress in Internet-based computing which will continue for years

More information

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,

More information

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks

More information

Practical Cassandra. Vitalii Tymchyshyn tivv00@gmail.com @tivv00

Practical Cassandra. Vitalii Tymchyshyn tivv00@gmail.com @tivv00 Practical Cassandra NoSQL key-value vs RDBMS why and when Cassandra architecture Cassandra data model Life without joins or HDD space is cheap today Hardware requirements & deployment hints Vitalii Tymchyshyn

More information

Smart Vehicles Speed Monitoring System Using RFID

Smart Vehicles Speed Monitoring System Using RFID Smart Vehicles Speed Monitoring System Using RFID Farrukh Hafeez 1, Mohammad Al Shammrani 2, Omar Al Shammary 3 Lecturer, Department of EEE, Jubail Industrial College, Jubail, KSA 1 Bachelor Student, Department

More information

Endoscope Tracking System

Endoscope Tracking System Endoscope Tracking System ENDORA Tracking System Workflow Storage: Displays which cabinet the endoscope is in Timestamps when endoscope enters the cabinet Procedure: Links patient ID to endoscope used

More information

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,

More information

An RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies

An RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies An RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies R. Hornbaker Department of Agricultural and Consumer Economics College of ACES, University of Illinois

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

EPiServer Operator's Guide

EPiServer Operator's Guide EPiServer Operator's Guide Abstract This document is mainly intended for administrators and developers that operate EPiServer or want to learn more about EPiServer's operating environment. The document

More information

Back-end Server Reader Tag

Back-end Server Reader Tag A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu

More information

entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200

entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200 entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200 10 Success Factors for RFID Deployments How to maximize ROI on RFID asset tracking deployments RFID

More information

Using Smart Objects to build the Internet of Things

Using Smart Objects to build the Internet of Things Using Smart Objects to build the Internet of Things Tomás Sánchez López, Damith C. Ranasinghe, Mark Harrison, Duncan McFarlane This paper was published in IEEE Internet Computing Why this paper might be

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

RFID: The Solution to Automating IT & Data Center Asset Management

RFID: The Solution to Automating IT & Data Center Asset Management RFID: The Solution to Automating IT & Data Center Asset Management THE IMPORTANCE OF ACCURATE INVENTORY MANAGEMENT Now, more than ever, organizations need to increase the accuracy of their IT inventory.

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Recalling A Sent Message in Outlook 2010

Recalling A Sent Message in Outlook 2010 Recall or replace an email message that you sent The recall feature in Microsoft Outlook tries to stop delivery and, optionally, replace an email message that you have already sent to another Microsoft

More information

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

The State of Cloud Storage

The State of Cloud Storage 205 Industry Report A Benchmark Comparison of Speed, Availability and Scalability Executive Summary Both 203 and 204 were record-setting years for adoption of cloud services in the enterprise. More than

More information

Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace

Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace What is IBM WebSphere extreme Scale (WXS)? From IBM: WebSphere extreme Scale operates as an in-memory grid that dynamically processes,

More information

Analysis of identification technologies and an automatic lock for school lockers

Analysis of identification technologies and an automatic lock for school lockers EUROPEAN JOURNAL FOR YOUNG SCIENTISTS AND ENGINEERS Analysis of identification technologies and an automatic lock for school lockers David Marn Abstract The main objective of the project was the improvement

More information

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

RFID Based Centralized Patient Monitoring System and Tracking (RPMST) IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 08-15 RFID Based Centralized Patient Monitoring System and Tracking

More information

Programming Pervasive and Mobile Computing Applications: the TOTA Approach

Programming Pervasive and Mobile Computing Applications: the TOTA Approach Programming Pervasive and Mobile Computing Applications: the TOTA Approach MARCO MAMEI and FRANCO ZAMBONELLI Università di Modena e Reggio Emilia Pervasive and mobile computing call for suitable middleware

More information

Achieving ROI through Automated Physical IT Asset Tracking. White Paper

Achieving ROI through Automated Physical IT Asset Tracking. White Paper Achieving ROI through Automated Physical IT Asset Tracking White Paper Introduction Tracking and managing physical IT assets in organizations is a never-ending challenge. Experience indicates that the

More information

SAP BusinessObjects Dashboards

SAP BusinessObjects Dashboards SAP BusinessObjects Dashboards Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license

More information

Dr. Alexander Zeier Director Strategic Projects SAP AG 14. Juli 2005, TU Dresden

Dr. Alexander Zeier Director Strategic Projects SAP AG 14. Juli 2005, TU Dresden RFID & Beyond: Real World Awareness Architecture, Standards & Business Value Dr. Alexander Zeier Director Strategic Projects SAP AG 14. Juli 2005, TU Dresden Business Navigation, RFID and Real World Awareness

More information

SpaceCode RFID for Diamond Sales Offices

SpaceCode RFID for Diamond Sales Offices SpaceCode RFID for Diamond Sales Offices Contents 1)Introduction... 2 What is RFID ( Radio Frequency Identification)?... 2 Why RFID?... 3 SpaceCode Who we are and what do we do?... 3 Plexus SmartDevices...

More information

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba

More information

Pervasive Computing. (A Very Short Introduction)

Pervasive Computing. (A Very Short Introduction) Pervasive Computing (A Very Short Introduction) Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted for

More information

Co-Fields: A Physically Inspired Approach to Distributed Motion Coordination

Co-Fields: A Physically Inspired Approach to Distributed Motion Coordination Co-Fields: A Physically Inspired Approach to Distributed Motion Coordination Marco Mamei 1,2, Franco Zambonelli 2, Letizia Leonardi 1 1 Dipartimento di Ingegneria dell Informazione Università di Modena

More information

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Why Has the Development in RFID Technology Made Asset Management More Urgent? E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,

More information

Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail

Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail Better Data Center IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail IT asset managers and facilities managers for Data Centers worldwide are being

More information

Automatically identify your pallets and storage locations. Our Auto ID solutions will save you time and money.

Automatically identify your pallets and storage locations. Our Auto ID solutions will save you time and money. Automatically identify your pallets and storage locations. Our Auto ID solutions will save you time and money. 1 Are you looking for efficient identification strategies for your warehouse? We can supply

More information

Best Practices in Mobilizing IT Asset Management

Best Practices in Mobilizing IT Asset Management make IT mobile White Paper Best Practices in Mobilizing IT Asset Management Executive Summary 1 Mobilizing IT Asset Management as a Process Improvement 2 Determining if RFID is Right for Your ITAM Environment

More information

How To Balance Load In Rdi With Power Conservation In A Power Efficient System

How To Balance Load In Rdi With Power Conservation In A Power Efficient System EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

Rapid Application Development with Bison Technology

Rapid Application Development with Bison Technology Rapid Application Development with Bison Technology 11.4.2013 Christof Oberholzer Why another business software development platform???? Faster, faster, more efficient, less costs, more features -Life

More information

TRANSITION- WORKS SOLUTIONS

TRANSITION- WORKS SOLUTIONS TRANSITION- WORKS SOLUTIONS OVERVIEW TransitionWorks is a privately held limited liability company with a complete range of products and services aimed at improving the operational performance of its customers

More information

Business Models for Cellular Phones with RFID-Modules

Business Models for Cellular Phones with RFID-Modules Business Models for Cellular Phones with RFID-Modules Diplomarbeit zur Erlangung des Grades eines Diplom-Ökonomen der Wirtschaftswissenschaftlichen Fakultät der Leibniz Universität Hannover vorgelegt von

More information

Context-aware Library Management System using Augmented Reality

Context-aware Library Management System using Augmented Reality International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library

More information

Asset Tracking Application Can It Drive Business Efficiencies?

Asset Tracking Application Can It Drive Business Efficiencies? Asset Tracking Application Can It Drive Business Efficiencies? Executive Summary In today s competitive environment, businesses are continuously looking for ways to improve their business processes and

More information

Load Manager Administrator s Guide For other guides in this document set, go to the Document Center

Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access

More information

HP Brazil RFID CoE Center of Excellence

HP Brazil RFID CoE Center of Excellence HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe

More information

Efficient Node Discovery in Mobile Wireless Sensor Networks

Efficient Node Discovery in Mobile Wireless Sensor Networks Efficient Node Discovery in Mobile Wireless Sensor Networks Vladimir Dyo, Cecilia Mascolo 1 Department of Computer Science, University College London Gower Street, London WC1E 6BT, UK v.dyo@cs.ucl.ac.uk

More information

Wireless Sensor Enabled Public Transportation System

Wireless Sensor Enabled Public Transportation System Int. J. Communications, Network and System Sciences, 2015, 8, 187-196 Published Online May 2015 in SciRes. http://www.scirp.org/journal/ijcns http://dx.doi.org/10.4236/ijcns.2015.85020 Wireless Sensor

More information

Solving Business Pains with SQL Server Integration Services. SQL Server 2005 / 2008

Solving Business Pains with SQL Server Integration Services. SQL Server 2005 / 2008 Solving Business Pains with SQL Server Integration Services SQL Server 2005 / 2008 Jason Strate Who Am I? SQL Server MVP Enterprise Consultant with Digineer Working with SQL Server since 1997 jstrate@digineer.com

More information

China s Internet+, Clouds & Innovation practice of cloud DataCenter. Patrick Li, Tencent

China s Internet+, Clouds & Innovation practice of cloud DataCenter. Patrick Li, Tencent China s Internet+, Clouds & Innovation practice of cloud DataCenter Patrick Li, Tencent Internet+ Internet+ 1. Simply speaking, Internet+ = Internet + All Traditional Industry 2. People need Internet,

More information

SiteSense Equipment Tracking

SiteSense Equipment Tracking Free-up foreman time on project sites Foreman can printout a list of equipment at the beginning of each shift with their exact positions to get them to the work crews, decreasing wait times at the workface.

More information

Contents. Resource Manager Web User Guide AUG/14 Page 2 of 32

Contents. Resource Manager Web User Guide AUG/14 Page 2 of 32 Resource Manager Web User Guide 2014 Contents Disclaimer... 4 Introduction... 5 Overview... 5 Resource Manager Web... 6 Salamander Barcode & Smart Card Information... 6 Personnel Container... 7 Personnel

More information

PARTICIPANTS GUIDE TO SCHOOL OF PSYCHOLOGY (SOP) PLYMOUTH PSYLAB PAID SYSTEM

PARTICIPANTS GUIDE TO SCHOOL OF PSYCHOLOGY (SOP) PLYMOUTH PSYLAB PAID SYSTEM PARTICIPANTS GUIDE TO SCHOOL OF PSYCHOLOGY (SOP) PLYMOUTH PSYLAB PAID SYSTEM Contents: Signing up to the database Page 2 Logging in Page 3 Complete the questionnaire Page 5 Change your password Page 6

More information

On the Security of RFID

On the Security of RFID On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com

More information

Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down

Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down Rony Kay www.cpacket.com, 2012 Pervasive Visibility, Monitoring, and Drill Down cpacket delivers solutions for intelligent

More information

Location Based Services: do they have a role on the health care scenario?

Location Based Services: do they have a role on the health care scenario? Location Based Services: do they have a role on the health care scenario? ( Current on Ubiquitous Computing and AI at DEI) Carlos Bento Francisco Pereira Ana Oliveira 1 Agenda The Group for UbiComp @ Univ.

More information

Singtel Business Fibre Broadband Security Suite. Customer User Guide

Singtel Business Fibre Broadband Security Suite. Customer User Guide Singtel Business Fibre Broadband Security Suite Customer User Guide Table of Contents 1. Introduction... 3 2. Customer Portal... 4 2.1 Email Notification... 4 2.2 Activate your account.... 5 2.3 Manage

More information

Global Asset Tagging & Identification System for Hydraulic Hose Assemblies

Global Asset Tagging & Identification System for Hydraulic Hose Assemblies Parker Tracking System (PTS) White Paper No.101 Global Asset Tagging & Identification System for Hydraulic Hose Assemblies William E. Sayavich, Business Development Manager Parker Hannifin Corporation,

More information