Deploying RFID Challenges Solutions and Open Issues Part 1 pot

30 326 1
Deploying RFID Challenges Solutions and Open Issues Part 1 pot

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

DEPLOYINGRFID– CHALLENGES,SOLUTIONS, ANDOPENISSUES  EditedbyCristinaTurcu              Deploying RFID – Challenges, Solutions, and Open Issues Edited by Cristina Turcu Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2011 InTech All chapters are Open Access articles distributed under the Creative Commons Non Commercial Share Alike Attribution 3.0 license, which permits to copy, distribute, transmit, and adapt the work in any medium, so long as the original work is properly cited. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published articles. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Davor Vidic Technical Editor Teodora Smiljanic Cover Designer Martina Sirotic Image Copyright Albert Lozano, 2010. Used under license from Shutterstock.com First published August, 2011 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Deploying RFID – Challenges, Solutions, and Open Issues, Edited by Cristina Turcu p. cm. ISBN 978-953-307-380-4 free online editions of InTech Books and Journals can be found at www.intechopen.com   Contents  Preface IX Chapter 1 The Challenges and Issues Facing the Deployment of RFID Technology 1 Peter Darcy, Prapassara Pupunwiwat and Bela Stantic Chapter 2 RFID Components, Applications and System Integration with Healthcare Perspective 27 Kamran Ahsan Chapter 3 Development of a Neonatal Interactive Simulator by Using an RFID Module for Healthcare Professionals Training 51 Loreana Arrighi, Jenny Cifuentes, Daniel Fonseca, Luis Méndez, Flavio Prieto and Jhon J. Ramírez Chapter 4 RFID Technology in Preparation and Administration of Cytostatic Infusions 83 Šárka Kozáková and Roman Goněc Chapter 5 Application of RFID Technology in eHealth 103 Cristina Turcu, Tudor Cerlinca, Marius Cerlinca and Remus Prodan Chapter 6 RFID Technology and Multi-Agent Approaches in Healthcare 127 Felicia Gîză, Cristina Turcu and Cornel Turcu Chapter 7 Farm Operation Monitoring System with Wearable Sensor Devices Including RFID 141 Tokihiro Fukatsu and Teruaki Nanseki Chapter 8 The Application of RFID in Automatic Feeding Machine for Single Daily Cow 159 Zhijiang Ni, Zhenjiang Gao and Hai Lin VI Contents Chapter 9 The U.S. National Animal Identification System (NAIS) & the U.S. Beef-Cattle Sector: A Post-Mortem Analysis of NAIS 167 Rhonda Skaggs Chapter 10 Mine Planning Using RFID 179 Vladimir Konyukh Chapter 11 The Applicability of RFID for Indoor Localization 203 Apostolia Papapostolou and Hakima Chaouchi Chapter 12 Use of Active RFID and Environment-Embedded Sensors for Indoor Object Location Estimation 219 Hiroaki Fukada, Taketoshi Mori, Hiroshi Noguchi and Tomomasa Sato Chapter 13 RFID Sensor Modeling by Using an Autonomous Mobile Robot 237 Grazia Cicirelli, Annalisa Milella and Donato Di Paola Chapter 14 Location of Intelligent Carts Using RFID 249 Yasushi Kambayashi and Munehiro Takimoto Chapter 15 Services, Use Cases and Future Challenges for Near Field Communication: the StoLPaN Project 265 Carlo Maria Medaglia, Alice Moroni, Valentina Volpi, Ugo Biader Ceipidor, András Vilmos and Balázs Benyó Chapter 16 RFID Applications in Cyber-Physical System 291 Nan Wu and Xiangdong Li Chapter 17 SAW Transponder – RFID for Extreme Conditions 303 Alfred Binder, Gudrun Bruckner and René Fachberger Chapter 18 Internetworking Objects with RFID 319 Rune Hylsberg Jacobsen, Qi Zhang and Thomas Skjødebjerg Toftegaard Chapter 19 Applying RFID Technology to Improve User Interaction in Novel Environments 335 Elena de la Guía, María D. Lozano and Víctor M.R. Penichet Chapter 20 Building Blocks of the Internet of Things: State of the Art and Beyond 351 Alexandru Serbanati, Carlo Maria Medaglia and Ugo Biader Ceipidor Contents VII Chapter 21 RFID Security and Privacy 367 Michel Arnaud Chapter 22 The Ethics of RFID Technology 377 Joël Schlatter and Fouad Chiadmi  Preface  Radio frequency identification (RFID) is a technology that is rapidly gaining popularity due to its several benefits in a wide area of applications like inventory tracking, supply chain management, automated manufacturing, healthcare,  etc. The benefits of implementing RFID technologies can be seen in terms of efficiency (increasedspeedinproduction,reduced sh rinkage,lowererrorrates, improved asset tracking etc.) or effectiveness (services that companies provide to the customers). Despite these numerous benefits, the technology has limited widespread implementation, due to the insufficient robustness and reliability of the RFID technology, cheaper alternatives to RFID (bar‐codes), the costs‐benefits balance of RFIDimplementationandtheabsenceofc ommonstandardsandinteroperability. Intheseconditions,itistheresearchers’goaltocontributetotheimprovementofthis technologyandtheprovidingofnewandvaluablesolutionstotheindustrypersonnel. ThebookincludesinterestingresearchstudiesfromexperiencedscientistsintheRFID domain. Inchapter1,theauthorspre senttheimportanceofRFIDandtheshortcomingsofthe currentapproachesdesignedtocorrectsomeissuesamongtheintegrationofsystems includingsecurity,privacy,anddataabnormalities.Theyalsorecommendsolutionsto theseissues. Chapter2dealswiththestudyoftheRFIDcomponentssuchasantennaandreader.It alsod iscussestheRFIDactiveandpassivetags,andcomparesthesetags,considering both advantages and disadvantages of RFID system. RFID applications are explored and a technical model is analyzed. The chapter also considers the healthcare perspectivesandRFIDusewithinhealthcaresettings.Thisstudyoutlinesamodelfor connected RFID applications, which provides quick support for various healthcare functionsandenhancesflexibilityfordifferentsystems’componentsintegration. Chapter 3outlines the experienceand achievements attained in a projectcarried out by the National University of Colombia. This project was intended to design and implement RFID‐based  tool s for trainingstudents in medical and nursingtechniques appliedonneonatalpatients. X Preface Theauthorsofchapter4 proposeanRFID‐basedsolutiontoreducethehumanfactor inthepreparationandadministrationofcytostaticinfusions. In chapter 5 the authors propose an RFID‐based system that integrates RFID and multi‐agent technologies in health care in order to make patient emergency care as efficient and risk‐free as pos sible, by providing doctors with as much information about a patient and as quickly as possible. Also they describe a general purpose architectureanddatamodelthatisdesignedforbothcollectingambulatorydatafrom variousexistingdevicesandsystems,andstoringclinicallysignificantinformationin ordertobeacces sedbytheemergencycarephysician. Inchapter6theauthorsproposeanRFID‐basedmulti‐agentsystem,thatfacilitatesthe integrationofdatafromheterogeneoussourcesinordertoachieveacompletepatient electronicmedicalrecord.Theadoptionofthissystemdoesnotrequiremajorchanges intermsofthesoftwareresou rcesexistinginthemedicalunits. Inchapter7theauthorsproposeafarm operation monitoring systemusingwearable sensordeviceswithRFIDreadersandvarioussensingdevicessuchasmotionsensors, cameras,andaGPS.Thissystemrecognizesdetailedfarmingoperationsautomatically invarioussituationsby analyzingthedatafromsensorsanddetectedRFIDtags.The tagsandsenso rsareattachedtorelevantobjectssuchas farmingmaterials,machinery, facilities,andsoon.Inthischapter,theauthors,basedontheirresearch,describethe concept and features ofthissystem and theresultsofseveral experiments condu cted ona prototype system. The majorapplications and extensionsof the current systems arealsooutlined. In chapter 8, the authors introduce the application of RFID in day‐to day activity in cow industry, regarding the use of RFID technology in automatic cow feeding machine. Chapter9focusesonthecow‐calfsector ,withanoverviewofU.S.agricultureandthe beef‐cattlesector.Finally,theauthorpresentswhatcanbecalled“theNationalAnimal IdentificationSystem(NAIS)Pushback”. In chapter 10 the author presents the new potential of RFID‐applications in mine planning.AnRFID‐based systemcanbeused to visualizetheplacement of machines inside roadways; to monitor miners with personal transponders; to prevent non‐ permitted control of machines; to prioritize the control of machines; to evaluate the productivity of both machines and mining areas; to evaluate fuel consumption and machine resources, etc. After being gathered, this inform ation is used for the mine management. In chapter 11, the authors investigate the applicability of the RFID technology in location sensing, the main design, and environmental factors that should be consideredbeforedevelopinganRFID‐basedlocalizationscheme.Theauthorspresent a scenario according to whichthe location of m ultiplereader‐enabled terminals need [...]... when and where the object it is attached to should have been physically within proximity Figure 6 contains an example of a RFID- enabled shelf which has also generated the three anomalies, the recorded data may be seen in Table 3 What is Recorded Tag EPC Timestamp Reader ID T1 13 /10 /2 010 14 : 31: 05 R1 T2 13 /10 /2 010 14 : 31: 05 R3 T3 13 /10 /2 010 14 : 31: 05 R3 T3 13 /10 /2 010 14 : 31: 05 R4 T3 13 /10 /2 010 14 : 31: 05... 14 : 31: 05 R3 T3 13 /10 /2 010 14 : 31: 05 R4 T3 13 /10 /2 010 14 : 31: 05 R5 What is meant to be Recorded Tag EPC Timestamp Reader ID T1 13 /10 /2 010 14 : 31: 05 R1 T2 13 /10 /2 010 14 : 31: 05 R2 T3 13 /10 /2 010 14 : 31: 05 R3 T4 13 /10 /2 010 14 : 31: 05 R5 Table 3 The recordings that took place from the example in Figure 6 and the observations that should have been recorded Wrong Readings, also known as Unreliable Readings or Ghost Reads... mining and analytical evaluations EPC Reader Timestamp 030000E500023C000431BA3 0 01 2008-07-29 14 :05:08.002 030000E500023C000431BA3 003 2008-07-29 14 :32 :12 .042 030000E500023C000431BA3 002 2008-07-29 14 :45:54.028 030000E500023C000431BA3 004 2008-07-29 15 :02:06.029 030000E500023C000431BA3 007 2008-07-29 15 :18 :49. 016 Table 1 A table populated with sample RFID Data containing the information of EPC, Reader and. .. Second World War to its modern usage The basic architecture of RFID itself The Challenges and Issues Facing the Deployment of RFID Technology The Challenges and Issues Facing the Deployment of RFID Technology 3 3 Fig 1 The timeline of recent RFID history from the 19 40s through to the present day (Landt, 20 01) consists of a tag, reader and middleware to perform advanced analysis on the data which makes... use within RFID tags and other low-level architectural components An example encoding of GRAI is demonstrates as follows: urn:epc:id:grai:0652642 .12 345 .12 34 The Challenges and Issues Facing the Deployment of RFID Technology The Challenges and Issues Facing the Deployment of RFID Technology 7 7 Fig 4 An example RFID scheme which could be used to house the captured information generated from a RFID system... between actual tags and readers • Unauthorised Tag Disabling: When an external reader disables a tag not allowing it to be utilised again The Challenges and Issues Facing the Deployment of RFID Technology The Challenges and Issues Facing the Deployment of RFID Technology 11 11 • Unauthorised Tag Manipulation: Manipulating the tag data using an external reader Until these security issues existing in... create a declarative and adaptive smoothing window named SMURF (Statistical sMoothing for Unreliable RFid data) which they have continually improved (Jeffery et al., 2008) 16 16 Deploying RFID – Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH RFID Anti-collision protocols are algorithms used at the edge to avoid missed readings When an RFID scan is performed on several RFID tags, there are... actually taking place, and duplicate reads in which a tagged item is stored twice in the 12 12 Deploying RFID – Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH database where it should only be stored once Section 4.4 further expands the error-prone nature of RFID where an analysis together with each of these errors are given Due to the continuous stream of information and the need to constantly... actually correct the missing data but, rather, alerts the user to a False-Negative anomaly The Challenges and Issues Facing the Deployment of RFID Technology The Challenges and Issues Facing the Deployment of RFID Technology 15 15 5 .1 Physical approaches One common solution to improve the tag reads in RFID systems is to employ Physical Approaches This enhances the environment where the scanning is... only record the start and end time that an Object is within a Location, thereby saving memory so that observations are not recorded as frequently (Wang et al., 2 010 ) 8 8 Deploying RFID – Challenges, Solutions, and Open Issues Will-be-set-by-IN-TECH Fig 5 The various stages taken when transporting various RFID- enabled items in a supply chain 2.5 RFID advantages The main advantage of RFID technology is . DEPLOYING RFID – CHALLENGES, SOLUTIONS,  AND OPEN ISSUES  EditedbyCristinaTurcu              Deploying RFID – Challenges, Solutions, and Open Issues Edited. architecture of RFID itself 2 Deploying RFID – Challenges, Solutions, and Open Issues The Challenges and Issues Facing the Deployment of RFID Technology 3 Fig. 1. The timeline of recent RFID history. mobile hand-held tags are used for mainly determining which objects are present within a group, for example, when needing 4 Deploying RFID – Challenges, Solutions, and Open Issues The Challenges and

Ngày đăng: 19/06/2014, 14:20

Từ khóa liên quan

Tài liệu cùng người dùng

Tài liệu liên quan