DEPLOYING RFID – CHALLENGES, SOLUTIONS, AND OPEN ISSUES pptx

396 304 0
DEPLOYING RFID – CHALLENGES, SOLUTIONS, AND OPEN ISSUES pptx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

DEPLOYINGRFID– CHALLENGES,SOLUTIONS, ANDOPENISSUES  EditedbyCristinaTurcu              Deploying RFID Challenges, Solutions, and Open Issues Edited by Cristina Turcu Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Davor Vidic Technical Editor Teodora Smiljanic Cover Designer Martina Sirotic Image Copyright Albert Lozano, 2010. Used under license from Shutterstock.com First published August, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Deploying RFID Challenges, Solutions, and Open Issues, Edited by Cristina Turcu p. cm. ISBN 978-953-307-380-4 free online editions of InTech Books and Journals can be found at www.intechopen.com   Contents  Preface IX Chapter 1 The Challenges and Issues Facing the Deployment of RFID Technology 1 Peter Darcy, Prapassara Pupunwiwat and Bela Stantic Chapter 2 RFID Components, Applications and System Integration with Healthcare Perspective 27 Kamran Ahsan Chapter 3 Development of a Neonatal Interactive Simulator by Using an RFID Module for Healthcare Professionals Training 51 Loreana Arrighi, Jenny Cifuentes, Daniel Fonseca, Luis Méndez, Flavio Prieto and Jhon J. Ramírez Chapter 4 RFID Technology in Preparation and Administration of Cytostatic Infusions 83 Šárka Kozáková and Roman Goněc Chapter 5 Application of RFID Technology in eHealth 103 Cristina Turcu, Tudor Cerlinca, Marius Cerlinca and Remus Prodan Chapter 6 RFID Technology and Multi-Agent Approaches in Healthcare 127 Felicia Gîză, Cristina Turcu and Cornel Turcu Chapter 7 Farm Operation Monitoring System with Wearable Sensor Devices Including RFID 141 Tokihiro Fukatsu and Teruaki Nanseki Chapter 8 The Application of RFID in Automatic Feeding Machine for Single Daily Cow 159 Zhijiang Ni, Zhenjiang Gao and Hai Lin VI Contents Chapter 9 The U.S. National Animal Identification System (NAIS) & the U.S. Beef-Cattle Sector: A Post-Mortem Analysis of NAIS 167 Rhonda Skaggs Chapter 10 Mine Planning Using RFID 179 Vladimir Konyukh Chapter 11 The Applicability of RFID for Indoor Localization 203 Apostolia Papapostolou and Hakima Chaouchi Chapter 12 Use of Active RFID and Environment-Embedded Sensors for Indoor Object Location Estimation 219 Hiroaki Fukada, Taketoshi Mori, Hiroshi Noguchi and Tomomasa Sato Chapter 13 RFID Sensor Modeling by Using an Autonomous Mobile Robot 237 Grazia Cicirelli, Annalisa Milella and Donato Di Paola Chapter 14 Location of Intelligent Carts Using RFID 249 Yasushi Kambayashi and Munehiro Takimoto Chapter 15 Services, Use Cases and Future Challenges for Near Field Communication: the StoLPaN Project 265 Carlo Maria Medaglia, Alice Moroni, Valentina Volpi, Ugo Biader Ceipidor, András Vilmos and Balázs Benyó Chapter 16 RFID Applications in Cyber-Physical System 291 Nan Wu and Xiangdong Li Chapter 17 SAW Transponder RFID for Extreme Conditions 303 Alfred Binder, Gudrun Bruckner and René Fachberger Chapter 18 Internetworking Objects with RFID 319 Rune Hylsberg Jacobsen, Qi Zhang and Thomas Skjødebjerg Toftegaard Chapter 19 Applying RFID Technology to Improve User Interaction in Novel Environments 335 Elena de la Guía, María D. Lozano and Víctor M.R. Penichet Chapter 20 Building Blocks of the Internet of Things: State of the Art and Beyond 351 Alexandru Serbanati, Carlo Maria Medaglia and Ugo Biader Ceipidor Contents VII Chapter 21 RFID Security and Privacy 367 Michel Arnaud Chapter 22 The Ethics of RFID Technology 377 Joël Schlatter and Fouad Chiadmi  Preface  Radio frequency identification (RFID) is a technology that is rapidly gaining popularity due to its several benefits in a wide area of applications like inventory tracking, supply chain management, automated manufacturing, healthcare,  etc. The benefits of implementing RFID technologies can be seen in terms of efficiency (increasedspeedinproduction,reduced sh rinkage,lowererrorrates, improved asset tracking etc.) or effectiveness (services that companies provide to the customers). Despite these numerous benefits, the technology has limited widespread implementation, due to the insufficient robustness and reliability of the RFID technology, cheaper alternatives to RFID (bar‐codes), the costs‐benefits balance of RFIDimplementationandtheabsenceofc ommonstandardsandinteroperability. Intheseconditions,itistheresearchers’goaltocontributetotheimprovementofthis technologyandtheprovidingofnewandvaluablesolutionstotheindustrypersonnel. ThebookincludesinterestingresearchstudiesfromexperiencedscientistsintheRFID domain. Inchapter1,theauthorspre senttheimportanceofRFIDandtheshortcomingsofthe currentapproachesdesignedtocorrectsomeissuesamongtheintegrationofsystems includingsecurity,privacy,anddataabnormalities.Theyalsorecommendsolutionsto theseissues. Chapter2dealswiththestudyoftheRFIDcomponentssuchasantennaandreader.It alsod iscussestheRFIDactiveandpassivetags,andcomparesthesetags,considering both advantages and disadvantages of RFID system. RFID applications are explored and a technical model is analyzed. The chapter also considers the healthcare perspectivesandRFIDusewithinhealthcaresettings.Thisstudyoutlinesamodelfor connected RFID applications, which provides quick support for various healthcare functionsandenhancesflexibilityfordifferentsystems’componentsintegration. Chapter 3outlines the experienceand achievements attained in a projectcarried out by the National University of Colombia. This project was intended to design and implement RFID‐based  tool s for trainingstudents in medical and nursingtechniques appliedonneonatalpatients. X Preface Theauthorsofchapter4 proposeanRFID‐basedsolutiontoreducethehumanfactor inthepreparationandadministrationofcytostaticinfusions. In chapter 5 the authors propose an RFID‐based system that integrates RFID and multi‐agent technologies in health care in order to make patient emergency care as efficient and risk‐free as pos sible, by providing doctors with as much information about a patient and as quickly as possible. Also they describe a general purpose architectureanddatamodelthatisdesignedforbothcollectingambulatorydatafrom variousexistingdevicesandsystems,andstoringclinicallysignificantinformationin ordertobeacces sedbytheemergencycarephysician. Inchapter6theauthorsproposeanRFID‐basedmulti‐agentsystem,thatfacilitatesthe integrationofdatafromheterogeneoussourcesinordertoachieveacompletepatient electronicmedicalrecord.Theadoptionofthissystemdoesnotrequiremajorchanges intermsofthesoftwareresou rcesexistinginthemedicalunits. Inchapter7theauthorsproposeafarm operation monitoring systemusingwearable sensordeviceswithRFIDreadersandvarioussensingdevicessuchasmotionsensors, cameras,andaGPS.Thissystemrecognizesdetailedfarmingoperationsautomatically invarioussituationsby analyzingthedatafromsensorsanddetectedRFIDtags.The tagsandsenso rsareattachedtorelevantobjectssuchas farmingmaterials,machinery, facilities,andsoon.Inthischapter,theauthors,basedontheirresearch,describethe concept and features ofthissystem and theresultsofseveral experiments condu cted ona prototype system. The majorapplications and extensionsof the current systems arealsooutlined. In chapter 8, the authors introduce the application of RFID in day‐to day activity in cow industry, regarding the use of RFID technology in automatic cow feeding machine. Chapter9focusesonthecow‐calfsector ,withanoverviewofU.S.agricultureandthe beef‐cattlesector.Finally,theauthorpresentswhatcanbecalled“theNationalAnimal IdentificationSystem(NAIS)Pushback”. In chapter 10 the author presents the new potential of RFID‐applications in mine planning.AnRFID‐based systemcanbeused to visualizetheplacement of machines inside roadways; to monitor miners with personal transponders; to prevent non‐ permitted control of machines; to prioritize the control of machines; to evaluate the productivity of both machines and mining areas; to evaluate fuel consumption and machine resources, etc. After being gathered, this inform ation is used for the mine management. In chapter 11, the authors investigate the applicability of the RFID technology in location sensing, the main design, and environmental factors that should be consideredbeforedevelopinganRFID‐basedlocalizationscheme.Theauthorspresent a scenario according to whichthe location of m ultiplereader‐enabled terminals need [...]... create a declarative and adaptive smoothing window named SMURF (Statistical sMoothing for Unreliable RFid data) which they have continually improved (Jeffery et al., 2008) 16 16 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH RFID Anti-collision protocols are algorithms used at the edge to avoid missed readings When an RFID scan is performed on several RFID tags, there are... Applications in Information Systems and Technology (PAIST) 1(1): 6 5–7 7 22 22 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH Darcy, P., Stantic, B., Mitrokotsa, A & Sattar, A (2010) Detecting Intrusions within RFID Systems through Non-Monotonic Reasoning Cleaning, Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2010), pp 25 7–2 62 Darcy, P., Stantic, B &... only record the start and end time that an Object is within a Location, thereby saving memory so that observations are not recorded as frequently (Wang et al., 2010) 8 8 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH Fig 5 The various stages taken when transporting various RFID- enabled items in a supply chain 2.5 RFID advantages The main advantage of RFID technology is... actually taking place, and duplicate reads in which a tagged item is stored twice in the 12 12 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH database where it should only be stored once Section 4.4 further expands the error-prone nature of RFID where an analysis together with each of these errors are given Due to the continuous stream of information and the need to constantly... of 4 4 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH Fig 2 The flow of information between the different components of the RFID System Architecture Defence which has developed smarter tags (Collins, 2005) and the Aviation Industry which attaches tags to identify different parts when shipping out items (Collins, 2004) For a more comprehensive analysis of current RFID applications... content of what is being placed into and removed out of storage by the user Through a combination of Facial Recognition, Vital Sign Monitors, Voice Synthesisers and 10 10 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH RFID technologies, the Cabinet can intelligently decide whether or not the person currently interacting with it should be taking the medicine This, in turn,... number itself, as seen in Figure 3, is made up of a Header for 8 bits, EPC Manager for 28 bits, Object Class for 24 bits and Serial Number for 36 bits (Ward et al., 2006) Ward and Kranenburg state that a possible alternative to using the 6 6 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH EPC is to employ IPv6 which is the advanced version of internet addresses These will take... memory being wasted where it could be utilised to store factual information In the sample scenario depicted in Figure 6 and Table 3, Tag 14 14 Deploying RFID Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH T3 is captured by not only the correct Reader R3, but also R4 and R5 resulting in T3 having duplicate entries in the recorded data set Missed Readings, also known as False Negative... use within RFID tags and other low-level architectural components An example encoding of GRAI is demonstrates as follows: urn:epc:id:grai:0652642.12345.1234 The Challenges and Issues Facing the Deployment of RFID Technology The Challenges and Issues Facing the Deployment of RFID Technology 7 7 Fig 4 An example RFID scheme which could be used to house the captured information generated from a RFID system... Probabilistic Inference and Probabilistic Event Extraction The Challenges and Issues Facing the Deployment of RFID Technology The Challenges and Issues Facing the Deployment of RFID Technology 17 17 The P2P Collaboration method, proposed by Peng, Ji, Luo, Wong and Tan (Peng et al., 2008), is an approach utilising Peer-to-Peer (P2P) networks within the RFID data set to detect and remove inaccurate readings . DEPLOYING RFID – CHALLENGES, SOLUTIONS, AND OPEN ISSUES  EditedbyCristinaTurcu              Deploying RFID – Challenges, Solutions, and Open Issues Edited. mobile hand-held tags are used for mainly determining which objects are present within a group, for example, when needing 4 Deploying RFID – Challenges, Solutions, and Open Issues The Challenges and. book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Deploying RFID – Challenges, Solutions, and Open Issues, Edited by Cristina Turcu

Ngày đăng: 29/06/2014, 12:20

Từ khóa liên quan

Mục lục

  • preface_ RFID

  • 01_Darcy

  • 2 Ahsan_final

  • 3 Arrighi_final

  • 4 Kozakova_final

  • 5 Turcu1_final

  • 6 Turcu2_final

  • 7 Fukatsu_final

  • 8 Goa_final

  • 9 Skaggs_final

  • 10 Konyukh_final

  • 11_Papapostolou

  • 12_Fukada

  • 13 Cicirell

  • 14 kambayashi_final

  • 15 Medaglia_final1

  • 16 Li_final

  • 17 Binder_final

  • 18 Toftegaard

  • 19 Lozano_final

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan