How To Spread Pheromone In An Rfid Tag
|
|
- Lee Nichols
- 3 years ago
- Views:
Transcription
1 Physical Deployment of Digital Pheromones Through RFID Technology Marco Mamei, Franco Zambonelli {mamei.marco, Università
2 Outline Università Motivation RFID Pheromone Deployment Pheromone-based Object Tracking Experiments Conclusion
3 Motivation Università Stigmergy and in particular pheromone-based interaction are inspiring several pervasive and ubiquitous computing applications Users and robots navigation and coordination Implementations are often troublesome. The reason for this problem is rather clear: where to store pheromones in pervasive computing environment?
4 Where to Store Pheromones? (Related Works) Remotely-accessible database bottleneck, single point of failure, scalability concerns. Ad-hoc network consistency problems, requires nodes at high-density, costly. Sensor network very promising, but still very costly. Real physical markers who really wants pheromone-graffiti covering home?!
5 RFID Tags RFID Tags and Readers Radio-Frequency Identification Tags are passive Dynamic Read-Write Capabilities Each tag has a small amount of storage Each tag costs less than 0.20 It is likely they will be on every object, like barcode today!
6 Deploy Pheromones in RFID Università Tags Write pheromones!
7 Deploy Pheromones in RFID Università Tags - details Call L(t) the set of location-tags being read at time t. TAG ID INDEX An application agent sees that the user is moving if L(t) L(t-1) and, to spread pheromone O, it will write O in all the L(t)-L(t-1) tags as it moves. Moreover, an increasing counter C(O) and a timestamp T(O) are needed to give direction and evaporation Since tags are passive, evaporation have to be carried on by users. Users delete old pheromones when crossing upon them. PHEROMONE ID #1 COUNTER #1 TIMESTAMP #1 PHEROMONE ID #n COUNTER #n TIMESTAMP ID #n
8 Deploy Pheromones in RFID Università Tags Want to spread pheromone O= Marco L(t) = (door-tag, laserjet-tag) In all the L(t) tags write: [Marco, 1, 3:05:40]
9 Deploy Pheromones in RFID Università Tags L(t-1) = (door-tag, laserjet-tag) L(t) = (inject-tag) L(t)!= L(t-1) the user has moved! Write [Marco, 2, 3:05:41] in all the L(t) tags
10 RFID Pheromones Paths 1 3:05:40 2 3:05:41
11 Pheromone-based Object Università Tracking Let s present an application to find everyday objects (glasses, keys, etc.) forgot somewhere in our homes. The application allows everyday objects to leave virtual pheromone trails. Objects can be easily tracked afterwards, by following the relative pheromone trail.
12 Spreading Object Pheromones Let us call O(t) the set of object-tags being sensed at time t. If the agent senses an object-tag O such that O O(t), O O(t-1), and L(t) L(t-1), then the user picked-up the object O and the object is moving around. In this situation, the agent has to spread O pheromone in the new location. Similarly, if O O(t-1), but O O(t), then the agent infers that the user left object O and stops spreading O pheromone.
13 Tracking Objects To track an object O the agent will start looking for an O-pheromone within the sensed location-tags L(t). If such a pheromone is found, this implies that the user crossed a suitable pheromone trail. Two alternatives: L(t) contains two location-tags having O-pheromones with different C(O) Gradient Search L(t) contains only one location-tag. Local Search
14 Implementation
15 # locations searched before finding an obj ect Experiments time BLIND SEARCH LOCAL SEARCH GRAD SEARCH # locations searched before finding an object time If the number of locations is small, then local search is almost equal to random search. Lot of time is wasted dowsing in the neighborhood. If the number of location is high the local search is almost equal to gradient search. Time spent dowsing is negligible
16 # locations searched b efo re fin d in g an obj ect BLIND SEARCH LOCAL SEARCH GRAD SEARCH Experiments t ag st orage capacit y # locations searched b e f o r e f in d in g a n o b je c t GRAD SEARCH (T = 500) GRAD SEARCH (T = 50) GRAD SEARCH (T = 5) tag storage capacity When tags become full, objects are moved without leaving traces. This breaks the pheromone trails. The problem cannot be solved by simply using different pheromone evaporation rates. Still, with current RFID technology (~KB storage, the approach scales to hundreds of objects being tracked)
17 Other Applications and Future Università Development Besides the presented application, RFID pheromone deployment can be applied to a number of scenarios: Context-awareness: complex pheromones representing structured contextual information Motion coordination Robotic coordination Our future research aims at solving the tag saturation problem Idea: store pheromones also in the object tag. The system becomes automatically scalable. The more object, the more space. But need to manage object reconfigurations.
18 Further Info
PHYSICAL DEPLOYMENT OF DIGITAL PHEROMONES THROUGH RFID TECHNOLOGY
PHYSICAL DEPLOYMENT OF DIGITAL PHEROMONES THROUGH RFID TECHNOLOGY Marco Mamei, Franco Zambonelli DISMI Università di Modena e Reggio Emilia Via Allegri 13 Reggio Emilia ITALY {mamei.marco, franco.zambonelli}@unimore.it
More informationAutonomic Services for Browsing the World
Autonomic Services for Browsing the World F. Zambonelli & The Outline Future pervasive computing scenarios The Browsing the World concept Key research challenges Our current researches directions Overlay
More informationRFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
More informationRFID in the Hospital Environment
RFID in the Health Care Industry RFID in the Hospital Environment Speaker: Daniel Engels, Ph.D. Director of Research MIT Auto-ID Labs I. Mun, Ph.D. Director, Bio-Medical Research Aventura Hospital & Medical
More informationTowards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna
Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition
More informationFrom Self-Organising Mechanisms to Design Patterns
Self-aware Pervasive Service Ecosystems From Self-Organising Mechanisms to Design Patterns University of Geneva Giovanna.Dimarzo@unige.ch 1 Outline Motivation: Spatial Structures and Services Self-Organising
More informationThe ebbits project: from the Internet of Things to Food Traceability
The ebbits project: from the Internet of Things to Food Traceability Smart AgriMatics2014 Contribution to session 5.2 Meat Information Provenance 18-19 June 2014 Paolo Brizzi Istituto Superiore Mario Boella
More informationMining Network Relationships in the Internet of Things
Mining Network Relationships in the Internet of Things PAT DOODY, DIRECTOR OF THE CENTRE FOR INNOVATION IN DISTRIBUTED SYSTEMS (CIDS) INSTITUTE OF TECHNOLOGY TRALEE ANDREW SHIELDS IRC FUNDED RESEARCHER
More informationRF-Compass: Robot Object Manipulation Using RFIDs
RF-Compass: Robot Object Manipulation Using RFIDs Jue Wang Fadel Adib, Ross Knepper, Dina Katabi, Daniela Rus Limitation of Today s Robotic Automation Fixed-position, single-task robot Limited to large-volume
More informationEvaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage
Evaluation of RFID and Wireless Sensor Technologies for Local Search and Rescue Data Storage Gurhan Avdan Computer Engineering Department Istanbul Technical University Istanbul, Turkey Esin Ergen, Gursans
More informationPERSONAL MOBILE DEVICE FOR SITUATED INTERACTION
PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. bowbowshen@yahoo.com.tw
More informationHealthcare versus Biochemical Industries
RFID in Healthcare Healthcare versus Biochemical Industries Where is the infusion pump? Where is patient Brown? Has Mrs. Jones already left the department? I cannot find the device that needs maintenance!
More informationInternet of Things 2015/2016
Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:
More informationTackling Security and Privacy Issues in Radio Frequency Identification Devices
Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,
More informationRedundant Data Removal Technique for Efficient Big Data Search Processing
Redundant Data Removal Technique for Efficient Big Data Search Processing Seungwoo Jeon 1, Bonghee Hong 1, Joonho Kwon 2, Yoon-sik Kwak 3 and Seok-il Song 3 1 Dept. of Computer Engineering, Pusan National
More informationDesign and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications
Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Udana Bandara 1,2 Masateru Minami 1,3 Mikio Hasegawa 1 Masugi Inoue 1 Hiroyuki Morikawa 1,2
More informationLoyalty Systems over Near Field Communication (NFC)
Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal diogo.simoes@tagus.ist.utl.pt Abstract.
More informationSystèmes d information diffus avec l environnement SPREAD
Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain
More informationIdentification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags
Identification and Tracking of Individuals and Social Networks using the Electronic Product Code on RFID Tags Markus Hansen Sebastian Meissner Independent Centre for Privacy Protection Schleswig-Holstein
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationREROUTING VOICE OVER IP CALLS BASED IN QOS
1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware
More informationInfinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010
Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 RFID, GPS, sensor, and other auto-id technologies promise to revolutionize enterprise asset
More informationPeople, Places, Things: Web Presence for the Real World
People, Places, Things: Web Presence for the Real World Internet & Mobile Systems Laboratory, Palo Alto Tim Kindberg Overview A little history: HEHAW to CoolTown The design problem: Nomadicity Web presence
More informationBY THE NUMBERS. IT Asset Management: Calculating the ROI of a ITAM Solution. For More Information: (866) 787-3271 Sales@PTSdcs.com
11000 00011 100 000 001 111 011 000 1 1100 00000 11111 000 000 11111 000 111 00 1 00000 00111 000 0 1001111 0 1 0 10011 1 1 0 1 010 101 0011111 0 010 101 10000 001 110 000 000 111 001 0 DATA CENTER SOLUTIONS
More informationMulti-Robot Traffic Planning Using ACO
Multi-Robot Traffic Planning Using ACO DR. ANUPAM SHUKLA, SANYAM AGARWAL ABV-Indian Institute of Information Technology and Management, Gwalior INDIA Sanyam.iiitm@gmail.com Abstract: - Path planning is
More informationImproving Supply Chain Traceability Using RFID Technology
Said A. Elshayeb 1, Khalid Bin Hasnan 2 and Chua Yik Yen 3 1 UTHM, saidelshayeb@hotmail.com 2 UTHM, khalid@uthm.edu.my 3 UTHM, saidelshayeb@hotmail.com Abstract One of the major issues in the supply chain
More informationThe Place of Emerging RFID Technology in National Security and Development
The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University
More informationREUSABLE CONTAINER MANAGEMENT & TRACKING
REUSABLE CONTAINER MANAGEMENT & TRACKING Why And How To Evaluate An Asset Tracking Program An asset tracking program offers a number of advantages. From increased supply chain visibility to reduced transportation
More informationUpgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper
Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup
More informationOverview to the Cisco Mobility Services Architecture
Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly
More informationWildcat Web Student Guide
Wildcat Web Student Guide Section I: Access and login to Wildcat Web Account Following are the steps to log in to your Wildcat Web account. View your class schedule, set up meetings with your advisor,
More informationSoftware Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539
Software Requirements Specification for Schlumberger Scheduling Assistant Page 1 Software Requirements Specification for Schlumberger Scheduling Assistant Version 0.2 Prepared by Design Team A Rice University
More informationIBM Solution for Pharmaceutical Track & Trace
Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about
More informationRFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
More informationData Analysis Methods for Library Marketing in Order to Provide Advanced Patron Services
Data Analysis Methods for Library Marketing in Order to Provide Advanced Patron Services Toshiro Minami 1,2 and Eunja Kim 3 1 Kyushu Institute of Information Sciences, 6-3-1 Saifu, Dazaifu, Fukuoka 818-0117
More informationZ-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments
Z-MOBILE : a real time wireless RFID monitoring system ready for positioning & tracking in indoor & outdoor environments Increase your efficiency in asset tracking, inventory management, security and process
More informationEnterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer
Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3 2014-11-05 CENIT AG Author: Stefan Bettighofer 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 Definitions...
More informationGoogle Analytics tags migration to Google Tag Manager in a multi-site environment Monday, 28 September 2015 07:55
Introduction More than one year ago my colleague Stephane wrote an article about Google Tag Manager implementation basics. As a reminder this tool is a tag management system launched in 2012 by Google.
More informationJBoss Forums Guide. 1. Introduction
JBoss s Guide @author Ryszard Kozmik 1. Introduction JBoss s is a subproject of JBoss Portal product. It is simply a forums portlet with all needed functionality for deploying
More informationThe Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
More informationTechnology Shift 1: Ubiquitous Telecommunications Infrastructure
Ubiquitous networks and cloud computing May 10 th 2009 Enrica M. Porcari Chief Information Officer, CGIAR Abstract Major changes are in progress in Internet-based computing which will continue for years
More informationSystem Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,
More informationSensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks
More informationPractical Cassandra. Vitalii Tymchyshyn tivv00@gmail.com @tivv00
Practical Cassandra NoSQL key-value vs RDBMS why and when Cassandra architecture Cassandra data model Life without joins or HDD space is cheap today Hardware requirements & deployment hints Vitalii Tymchyshyn
More informationSmart Vehicles Speed Monitoring System Using RFID
Smart Vehicles Speed Monitoring System Using RFID Farrukh Hafeez 1, Mohammad Al Shammrani 2, Omar Al Shammary 3 Lecturer, Department of EEE, Jubail Industrial College, Jubail, KSA 1 Bachelor Student, Department
More informationEndoscope Tracking System
Endoscope Tracking System ENDORA Tracking System Workflow Storage: Displays which cabinet the endoscope is in Timestamps when endoscope enters the cabinet Procedure: Links patient ID to endoscope used
More informationBest Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail
Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,
More informationAn RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies
An RFID Agricultural Product and Food Security Tracking System Using GPS and Wireless Technologies R. Hornbaker Department of Agricultural and Consumer Economics College of ACES, University of Illinois
More informationA Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
More informationSwanLink: Mobile P2P Environment for Graphical Content Management System
SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes
More informationUBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology,
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationEPiServer Operator's Guide
EPiServer Operator's Guide Abstract This document is mainly intended for administrators and developers that operate EPiServer or want to learn more about EPiServer's operating environment. The document
More informationBack-end Server Reader Tag
A Privacy-preserving Lightweight Authentication Protocol for Low-Cost RFID Tags Shucheng Yu, Kui Ren, and Wenjing Lou Department of ECE, Worcester Polytechnic Institute, MA 01609 {yscheng, wjlou}@wpi.edu
More informationentigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200
entigral whitepaper 10 Success Factors for RFID Asset Tracking Deployments www.entigral.com 877.822.0200 10 Success Factors for RFID Deployments How to maximize ROI on RFID asset tracking deployments RFID
More informationUsing Smart Objects to build the Internet of Things
Using Smart Objects to build the Internet of Things Tomás Sánchez López, Damith C. Ranasinghe, Mark Harrison, Duncan McFarlane This paper was published in IEEE Internet Computing Why this paper might be
More informationREAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
More informationRFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
More informationRFID: The Solution to Automating IT & Data Center Asset Management
RFID: The Solution to Automating IT & Data Center Asset Management THE IMPORTANCE OF ACCURATE INVENTORY MANAGEMENT Now, more than ever, organizations need to increase the accuracy of their IT inventory.
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationRecalling A Sent Message in Outlook 2010
Recall or replace an email message that you sent The recall feature in Microsoft Outlook tries to stop delivery and, optionally, replace an email message that you have already sent to another Microsoft
More informationSelf-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationAutoconfiguration and maintenance of the IP address in ad-hoc mobile networks
1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166
More informationThe State of Cloud Storage
205 Industry Report A Benchmark Comparison of Speed, Availability and Scalability Executive Summary Both 203 and 204 were record-setting years for adoption of cloud services in the enterprise. More than
More informationMonitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace
Monitoring IBM WebSphere extreme Scale (WXS) Calls With dynatrace What is IBM WebSphere extreme Scale (WXS)? From IBM: WebSphere extreme Scale operates as an in-memory grid that dynamically processes,
More informationAnalysis of identification technologies and an automatic lock for school lockers
EUROPEAN JOURNAL FOR YOUNG SCIENTISTS AND ENGINEERS Analysis of identification technologies and an automatic lock for school lockers David Marn Abstract The main objective of the project was the improvement
More informationRFID Based Centralized Patient Monitoring System and Tracking (RPMST)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 08-15 RFID Based Centralized Patient Monitoring System and Tracking
More informationProgramming Pervasive and Mobile Computing Applications: the TOTA Approach
Programming Pervasive and Mobile Computing Applications: the TOTA Approach MARCO MAMEI and FRANCO ZAMBONELLI Università di Modena e Reggio Emilia Pervasive and mobile computing call for suitable middleware
More informationAchieving ROI through Automated Physical IT Asset Tracking. White Paper
Achieving ROI through Automated Physical IT Asset Tracking White Paper Introduction Tracking and managing physical IT assets in organizations is a never-ending challenge. Experience indicates that the
More informationSAP BusinessObjects Dashboards
SAP BusinessObjects Dashboards Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license
More informationDr. Alexander Zeier Director Strategic Projects SAP AG 14. Juli 2005, TU Dresden
RFID & Beyond: Real World Awareness Architecture, Standards & Business Value Dr. Alexander Zeier Director Strategic Projects SAP AG 14. Juli 2005, TU Dresden Business Navigation, RFID and Real World Awareness
More informationSpaceCode RFID for Diamond Sales Offices
SpaceCode RFID for Diamond Sales Offices Contents 1)Introduction... 2 What is RFID ( Radio Frequency Identification)?... 2 Why RFID?... 3 SpaceCode Who we are and what do we do?... 3 Plexus SmartDevices...
More informationWearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space
Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba
More informationPervasive Computing. (A Very Short Introduction)
Pervasive Computing (A Very Short Introduction) Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted for
More informationCo-Fields: A Physically Inspired Approach to Distributed Motion Coordination
Co-Fields: A Physically Inspired Approach to Distributed Motion Coordination Marco Mamei 1,2, Franco Zambonelli 2, Letizia Leonardi 1 1 Dipartimento di Ingegneria dell Informazione Università di Modena
More informationWhy Has the Development in RFID Technology Made Asset Management More Urgent?
E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,
More informationBetter Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail
Better Data Center IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail IT asset managers and facilities managers for Data Centers worldwide are being
More informationAutomatically identify your pallets and storage locations. Our Auto ID solutions will save you time and money.
Automatically identify your pallets and storage locations. Our Auto ID solutions will save you time and money. 1 Are you looking for efficient identification strategies for your warehouse? We can supply
More informationBest Practices in Mobilizing IT Asset Management
make IT mobile White Paper Best Practices in Mobilizing IT Asset Management Executive Summary 1 Mobilizing IT Asset Management as a Process Improvement 2 Determining if RFID is Right for Your ITAM Environment
More informationHow To Balance Load In Rdi With Power Conservation In A Power Efficient System
EFFECTIVE LOAD BALANCING WITH POWER CONSERVATION IN RFID Vijayakumar.G.Dhas 1, Ramanathan Muthukaruppan 2, Konguvel Balakrishnan 2, Rajarajan Ganesan 2 1 Lecturer, Department of Information Technology,
More informationCisco Context-Aware Mobility Solution: Put Your Assets in Motion
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will
More informationRapid Application Development with Bison Technology
Rapid Application Development with Bison Technology 11.4.2013 Christof Oberholzer Why another business software development platform???? Faster, faster, more efficient, less costs, more features -Life
More informationTRANSITION- WORKS SOLUTIONS
TRANSITION- WORKS SOLUTIONS OVERVIEW TransitionWorks is a privately held limited liability company with a complete range of products and services aimed at improving the operational performance of its customers
More informationBusiness Models for Cellular Phones with RFID-Modules
Business Models for Cellular Phones with RFID-Modules Diplomarbeit zur Erlangung des Grades eines Diplom-Ökonomen der Wirtschaftswissenschaftlichen Fakultät der Leibniz Universität Hannover vorgelegt von
More informationContext-aware Library Management System using Augmented Reality
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library
More informationAsset Tracking Application Can It Drive Business Efficiencies?
Asset Tracking Application Can It Drive Business Efficiencies? Executive Summary In today s competitive environment, businesses are continuously looking for ways to improve their business processes and
More informationLoad Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
More informationHP Brazil RFID CoE Center of Excellence
HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe
More informationEfficient Node Discovery in Mobile Wireless Sensor Networks
Efficient Node Discovery in Mobile Wireless Sensor Networks Vladimir Dyo, Cecilia Mascolo 1 Department of Computer Science, University College London Gower Street, London WC1E 6BT, UK v.dyo@cs.ucl.ac.uk
More informationWireless Sensor Enabled Public Transportation System
Int. J. Communications, Network and System Sciences, 2015, 8, 187-196 Published Online May 2015 in SciRes. http://www.scirp.org/journal/ijcns http://dx.doi.org/10.4236/ijcns.2015.85020 Wireless Sensor
More informationSolving Business Pains with SQL Server Integration Services. SQL Server 2005 / 2008
Solving Business Pains with SQL Server Integration Services SQL Server 2005 / 2008 Jason Strate Who Am I? SQL Server MVP Enterprise Consultant with Digineer Working with SQL Server since 1997 jstrate@digineer.com
More informationChina s Internet+, Clouds & Innovation practice of cloud DataCenter. Patrick Li, Tencent
China s Internet+, Clouds & Innovation practice of cloud DataCenter Patrick Li, Tencent Internet+ Internet+ 1. Simply speaking, Internet+ = Internet + All Traditional Industry 2. People need Internet,
More informationSiteSense Equipment Tracking
Free-up foreman time on project sites Foreman can printout a list of equipment at the beginning of each shift with their exact positions to get them to the work crews, decreasing wait times at the workface.
More informationContents. Resource Manager Web User Guide AUG/14 Page 2 of 32
Resource Manager Web User Guide 2014 Contents Disclaimer... 4 Introduction... 5 Overview... 5 Resource Manager Web... 6 Salamander Barcode & Smart Card Information... 6 Personnel Container... 7 Personnel
More informationPARTICIPANTS GUIDE TO SCHOOL OF PSYCHOLOGY (SOP) PLYMOUTH PSYLAB PAID SYSTEM
PARTICIPANTS GUIDE TO SCHOOL OF PSYCHOLOGY (SOP) PLYMOUTH PSYLAB PAID SYSTEM Contents: Signing up to the database Page 2 Logging in Page 3 Complete the questionnaire Page 5 Change your password Page 6
More informationOn the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
More informationDistributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down
Distributed Monitoring Pervasive Visibility & Monitoring, Selective Drill-Down Rony Kay www.cpacket.com, 2012 Pervasive Visibility, Monitoring, and Drill Down cpacket delivers solutions for intelligent
More informationLocation Based Services: do they have a role on the health care scenario?
Location Based Services: do they have a role on the health care scenario? ( Current on Ubiquitous Computing and AI at DEI) Carlos Bento Francisco Pereira Ana Oliveira 1 Agenda The Group for UbiComp @ Univ.
More informationSingtel Business Fibre Broadband Security Suite. Customer User Guide
Singtel Business Fibre Broadband Security Suite Customer User Guide Table of Contents 1. Introduction... 3 2. Customer Portal... 4 2.1 Email Notification... 4 2.2 Activate your account.... 5 2.3 Manage
More informationGlobal Asset Tagging & Identification System for Hydraulic Hose Assemblies
Parker Tracking System (PTS) White Paper No.101 Global Asset Tagging & Identification System for Hydraulic Hose Assemblies William E. Sayavich, Business Development Manager Parker Hannifin Corporation,
More information