RFID Applications Research Papers - Academia.edu (original) (raw)

This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides... more

This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides recommendations, regarding the installation of sensors in the building. We also present the communication protocols of the computer network used in order to ensure the efficient communication between the space examined and the sensor network. Finally, we describe the process of creating a website, which is designed to store and view the data.

A simple, compact, rechargeable handheld radio-frequency identifi cation (RFID) reader was designed to detect the orientation of tagged objects. The system uses a linearly polarized reader antenna and the orientation sensor of the mobile... more

A simple, compact, rechargeable handheld radio-frequency identifi cation (RFID) reader was designed to detect the orientation of tagged objects. The system uses a linearly polarized reader antenna and the orientation sensor of the mobile device to identify the orientation of the tag. The system works in the ultra-high-frequency (UHF) RFID band. Detailed testing was done in different surroundings with various materials and tags. The system was able to correctly identify the orientation in several cases with an average angular error of less than 10°. This system can also be used to demonstrate the concept of polarization.

This paper presents the design of UHF RFID read/write (R/W) antenna for the variety of smart shelf retail applications. Antenna operation is based on the EM coupling between the open-ended or shorted MS feed line and periodic planar metal... more

This paper presents the design of UHF RFID read/write (R/W) antenna for the variety of smart shelf retail applications. Antenna operation is based on the EM coupling between the open-ended or shorted MS feed line and periodic planar metal strips of certain layout. The proposed antenna can be easily customized for the required volume of smart shelf RFID interrogation. Several antenna prototypes have been designed, produced and measured. The antenna performance has been evaluated in UHF RFID system for the simultaneous detection of arbitrary oriented tagged apparel items placed on the antenna surface. The proposed antenna demonstrates excellent ability to provide strong and uniform E-field distribution at the distances up to 50 cm form the antenna surface.

This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides... more

This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides recommendations, regarding the installation of sensors in the building. We also present the communication protocols of the computer network used in order to ensure the efficient communication between the space examined and the sensor network. Finally, we describe the process of creating a website, which is designed to store and view the data.

Background: This warehouse has three main problems: poor accuracy of inventory location, long cycle time of receiving process and non-real time empty storage location. Therefore, the objective of this research is to improve the process in... more

Background: This warehouse has three main problems: poor accuracy of inventory location, long cycle time of receiving process and non-real time empty storage location. Therefore, the objective of this research is to improve the process in the warehouse by applying radio frequency identification (RFID) technology. Methods: There are four steps in this research. First of all, the current of the receiving process and the picking process are studied. Second is to give the guideline for RFID application. Third is to implement of RFID system in this warehouse. The last one is to compare the result of the current process and the proposed process. Results and conclusions: The passive ultra high frequency (UHF) RFID is selected for used in this warehouse. The RFID readers are attached on forklift trucks, the warehouse entrance and loading dock area. The system used RFID tags in two forms: one form used to identify pallets and another to indicate the locations of shelves on which pallets are ...

A new fuel recognition system based on Radio Frequency Identification (RFID) technology aims to provide a solution for the problems that occur during refueling process of vehicles such as wrong type of fuel filling and misusage of pumps,... more

A new fuel recognition system based on Radio Frequency Identification (RFID) technology aims to provide a solution for the problems that occur during refueling process of vehicles such as wrong type of fuel filling and misusage of pumps, especially in fuel stations. The RFID tags are placed both in vehicles and stations consistently due to the proposed system. A software interface is designed for visual tracking of the system using the C# programming language. The developed interface works with the integrated RFID application development kit. Reading and writing operations on tags are performed via this kit. The results are shown at the interface display. The process of data storage is done by means of a created database, both on server systems and in the memory of the tag. Also in the mini-survey results carried out under this thesis, it is inferred that this system would be a solution for the financial and depreciative loss of fuel stations. As a result, with the system developed in this study, an effective and practical solution is provided against refueling errors. Thus, it would be possible to overcome this kind of errors which cause traffic and vehicle problems.

The purpose of this report is to describe how Genway ECK-03A RfId door lock control system (or any other similar) can be extended to work with smart building system based on Elastic stack. Although, the whole project is not commercial one... more

The purpose of this report is to describe how Genway ECK-03A RfId door lock control system (or any other similar) can be extended to work with smart building system based on Elastic stack. Although, the whole project is not commercial one and most of the work was done just for fun, the results may be as well used as a product. Many of currently available cheap RfId door control systems is very simple, they do not allow easy to connect them to BMS (Building Management System). In the paper, Genway ECK-03A device has been extended with ESP-01 chip to allow wireless communication to MQTT server. With such solution it was easy to integrate the device with Elasticsearch based IoT hub.

This warehouse has three main problems: poor accuracy of inventory location, long cycle time of receiving process and non-real time empty storage location. Therefore, the objective of this research is to improve the process in the... more

This warehouse has three main problems: poor accuracy of inventory location, long cycle time of receiving process and non-real time empty storage location. Therefore, the objective of this research is to improve the process in the warehouse by applying radio frequency identification (RFID) technology. Methods: There are four steps in this research. First of all, the current of the receiving process and the picking process are studied. Second is to give the guideline for RFID application. Third is to implement of RFID system in this warehouse. The last one is to compare the result of the current process and the proposed process. Results and conclusions: The passive ultra high frequency (UHF) RFID is selected for used in this warehouse. The RFID readers are attached on forklift trucks, the warehouse entrance and loading dock area. The system used RFID tags in two forms: one form used to identify pallets and another to indicate the locations of shelves on which pallets are stored. After using RFID system in this warehouse, the results showed that the accuracy of inventory location increased from 78.2% to 100%. The cycle time reduces from 66 minutes to 47 minutes which is down to 28.79%. Moreover, the empty storage location are known real time.

past researches. In this paper, historical perspectives used to establish the requi which, the idea of invention of technologies done related to project. Keywords Energy is nothing but the ability to do work. Power has turned into help... more

past researches. In this paper, historical perspectives used to establish the requi which, the idea of invention of technologies done related to project. Keywords Energy is nothing but the ability to do work. Power has turned into help for the human population nowadays. Its request is expanding rapidly. Day to day, life different activities. Power gener numerous energy resources are produced and wasted. Electricity is generally generated from resources like water, wind, coal, etc. for generating the electricity from these high maintenance and high cost. In like manner, it is the target of the present development to give the technique for electrical power generation from which regularly expanding human populace that natural resources. This innovation depends on a rule called the piezoelectric effect impact, in which certain materials can develop an electrical charge from having weight, the strain applied to them. The piezoelectric effect the effect of specific materials used to generate the electric charge in response to applied mechanical stress on it. Due to applied mechanical stress on piezo sensors energy is stored in the battery. The RFID card used to distribute power using user identification number which is 12 digit within limit A. B.

The Wireless Identification and Sensing Platform (WISP) conjugates the identification potential of the RFID technology and the sensing and computing capability of the wireless sensors. Practical issues, such as the need of periodically... more

The Wireless Identification and Sensing Platform (WISP) conjugates the identification potential of the RFID technology and the sensing and computing capability of the wireless sensors. Practical issues, such as the need of periodically recharging WISPs, challenge the effective deployment of large-scale RFID Sensor Networks (RSNs) consisting of RFID readers and WISP nodes. In this view, the paper proposes cooperative solutions to energize the WISP devices in a wide-area sensing network while reducing the data collection delay. The main novelty is the fact that both data transmissions and energy transfer are based on the RFID technology only: RFID mobile readers gather data from the WISP devices, wirelessly recharge them, and mutually cooperate to reduce the data delivery delay to the sink. Communication between mobile readers relies on two proposed solutions: a tag-based relay scheme, where RFID tags are exploited to temporarily store sensed data at predetermined contact points between the readers; and a tag-based data channel scheme, where the WISPs are used as a virtual communication channel for real time data transfer between the readers. Both solutions require: (i) clustering the WISP nodes; (ii) dimensioning the number of required RFID mobile readers; (iii) planning the tour of the readers under the energy and time constraints of the nodes. A simulative analysis demonstrates the effectiveness of the proposed solutions when compared to non-cooperative approaches. Differently from classic schemes in the literature, the solutions proposed in this paper better cope with scalability issues, which is of utmost importance for wide area networks.

This project is about the design and implementation of books identifier on the bookshelf. When any book is placed on the wrong bookshelf, the system will pop out a message in the computer to alert the librarian of the misplaced book. The... more

This project is about the design and implementation of books identifier on the bookshelf. When any book is placed on the wrong bookshelf, the system will pop out a message in the computer to alert the librarian of the misplaced book. The popped out message doesn’t just show the information of misplaced books, but it also shows the details of the book to be placed on that shelf. When the books belonging to that bookshelf are correctly placed, the alert message will not pop out. For ease of demonstration in the prototype, two books were used for testing; a bookshelf was designed to place only two books and one interface system to connect the bookshelf to the computer. To display the alert message, a simple GUI window is designed and it runs independently in the computer to identify the misplacement of books on the bookshelf.

Background: This warehouse has three main problems: poor accur y of inventory location, long cycle time of receiving process and non-real time empty s torage location. Therefore, the objective of this r e earch is to improve the process... more

Background: This warehouse has three main problems: poor accur y of inventory location, long cycle time of receiving process and non-real time empty s torage location. Therefore, the objective of this r e earch is to improve the process in the warehouse by applying radio freq uency identification (RFID) technology. Methods: There are four steps in this research. First of al l, the current of the receiving process and the pic king process are studied. Second is to give the guideline for RFI D application. Third is to implement of RFID system in this warehouse. The last one is to compare the result of the current process and the proposed process. Results and conclusions: The passive ultra high frequency (UHF) RFID is sel ected for used in this warehouse. The RFID readers are attached on forklift trucks, the wa rehouse entrance and loading dock area. The system us d RFID tags in two forms: one form used to identify pallets and another to indicate the locations of shelves on wh ich pall...

This report is a summary of the work carried out by the Lukasiewicz - Institute of Logistics and Warehousing under the Marelitt Baltic project. The introduction to the research conducted in the Laboratory of Identification Technologies of... more

This report is a summary of the work carried out by the Lukasiewicz -
Institute of Logistics and Warehousing under the Marelitt Baltic project. The introduction to the research conducted in the Laboratory of Identification Technologies of the Institute is a description of fishing gears used on the Baltic Sea and introduction to radio identification technologies (RFID). As part of the project, the Institute dealt with eveloping a solution that would allow marking all fishing gears available and used on the Baltic Sea. In the course of the works, ready-made solutions on the market were verified, enabling the marking of gears used in difficult conditions (up to 100 m below sea level) in connection with existing net elements (floats of different types and sizes), however their cost had a significant impact on the price of fishing gears. As a result of these arrangements, in consultation with project partners
and experts cooperating with the project team, Identification Technology
Laboratory committed to develop prototypes enabling mass marking of
fishing gears while maintaining a low cost of this solution. In further
laboratory work, the aforementioned prototypes were developed (both 3D projects as well as physical implementations of these projects using various techniques - 3D printing or polyurethane foam molding). Prepared prototypes were then subjected to laboratory tests and after their positive results, also sea trials, in real environment and most importantly in real fishing processes (both with the use of gillnets and trawl nets). The obtained results confirmed the resistance of prototypes to unfavorable working conditions and the possibility of keeping inventories of fishing nets continuously, during the implementation of fishing processes (during casting or pulling out the nets and during operations in the port).
As a result of the works carried out, solutions were proposed that were
accepted by the assessment of the project team for the mass implementation and recommendation of appropriate legal solutions. The method of identification of the owner of a given fishing gear remains an open question, and as a basis, the project team proposed using global identifiers and standardization compliant with GS1 standards (e.g. GRAI or GIAI identifier developed on their basis in cooperation with the GS1 organization).
The result of the project are both 3D prototype projects, prototypes made in the project, as well as this report constituting both the technical
documentation of the proposed solution as well as a description of the
research and development works carried out.

The recent developments in technology that permits the use of radio frequency (RF) technology such as Bluetooth, and radio spectrum have enabled different devices to have capabilities of communicating with each other. Radio frequency (RF)... more

The recent developments in technology that permits the use of radio frequency (RF) technology such as Bluetooth, and radio spectrum have enabled different devices to have capabilities of communicating with each other. Radio frequency (RF) is a new technology, which has at its center, the goal of eliminating wired communication among electronic devices. Instead of connecting with wires, every appliance has small RF transmitter/receivers.

—Recently, students attendance have been considered as one of the crucial elements or issues that reflects the academic achievements and the performance contributed to any university compared to the traditional methods that impose... more

—Recently, students attendance have been considered as one of the crucial elements or issues that reflects the academic achievements and the performance contributed to any university compared to the traditional methods that impose time-consuming and inefficiency. Diverse automatic identification technologies have been more in vogue such as Radio Frequency Identification (RFID). An extensive research and several applications are produced to take maximum advantage of this technology and bring about some concerns. RFID is a wireless technology which uses to a purpose of identifying and tracking an object via radio waves to transfer data from an electronic tag, called RFID tag or label to send data to RFID reader. The current study focuses on proposing an RFID based Attendance Management System (AMS) and also information service system for an academic domain by using RFID technology in addition to the programmable Logic Circuit (such as Arduino), and web-based application. The proposed system aims to manage student's attendance recording and provides the capabilities of tracking student absentee as well, supporting information services include students grading marks, daily timetable, lectures time and classroom numbers, and other student-related instructions provided by faculty department staff. Based on the results, the proposed attendance and information system is time-effective and it reduces the documentation efforts as well as, it does not have any power consumption. Besides, students attendance RFID based systems that have been proposed are also analyzed and criticized respect to systems functionalities and main findings. Future directions for further researchers are focused and identified.

In the modern age, there is a constraint of a system with connected devices, persons, time, places and networks, which is completely integrated is called as Internet of Things (IoT). Internet of Things has become the vital building blocks... more

In the modern age, there is a constraint of a system with connected devices, persons, time, places and networks, which is completely integrated is called as Internet of Things (IoT). Internet of Things has become the vital building blocks in the development of healthcare monitoring system, agriculture, business, home monitoring etc. The aim of a well-organized IoT healthcare system is to provide real time remote monitoring of patient health condition, to prevent the critical patient conditions and to improve the quality of life through smart IoT environments. New challenge with IoT is security of systems and processes and also with the privacy issues of person's medical data. Information security using IoT is very complicated and difficult in IoT environment. Security and privacy by design need to be part of any IoT use case, project or deployment. Few papers have proposed different types of protocols for healthcare related authentication. After going through the methodology for authentication protocol a combined methodology is proposed to be adopted to pool the gap in between them in medical IoT application. In this paper we discussed various healthcare IoT techniques and mechanisms, challenges and security issues they faced in developing those systems, we also concluded with major problem identification in those systems to be focused as future enhancement for upcoming projects. Keywords-Internet of Things (IoT); BSNCare; Radio Frequency Identification (RFID); Elliptic Curve Cryptography (ECC); A lightweight break-glass access control (LiBAC); NDN-based smart health IoT (NHealthIoT) system; I. INTRODUCTION Internet of Things (IoT) is a network with connected devices having unique identification number talking with each other and taking appropriate actions without human intervention [5]. It is also known as Machine to Machine communication. The devices can range from sensors to actuators make the job easy for the end users. Internet of things (IoT) is a new term but it is the latest revolution in the technology market and creating a plethora [8] of business opportunities which includes well established companies to new start-ups. There are multiple reasons why IoT is emerging as one of the promising areas for doing business. We have 3G, 4G network which allow data transfer faster than that in earlier years.

There has been a revolution in tracking and tracing of products and goods in the supply chain using passive radio frequency identification (RFID) systems. Recommendations to the suppliers have been released to various major retailers and... more

There has been a revolution in tracking and tracing of products and goods in the supply chain using passive radio frequency identification (RFID) systems. Recommendations to the suppliers have been released to various major retailers and government agencies after realizing the potential of RFID systems. This paper outlines some research done to identify a set of parameters which can help us in comparing the performance of Ultra High Frequency (UHF) passive RFID tags to be set as benchmarks. This paper is published on the notes of the above paragraph to provide a survey on radio frequency identification (RFID) technology. Primarily the RFID tags were developed to eventually replace barcodes in supply chains due to their advantages of being able to be read wirelessly and without line of sight, they contain more information than barcodes, and are obviously more robust. The RFID technology did not stop at item-level tagging. This paper tries to unfold the various studies and research done on the RFID beyond their just feature of being used as a tag. It tells us about the latest technology research that focuses on locating and tracking labeled objects that move using RFID. Passive radio frequency identification (RFID) systems are revolutionizing the way products and goods are tracked and traced in the supply chain. Radio frequency identification (RFID) and barcode technology are similar in some ways as they both are an automatic identification technology. Nowadays RFID is mostly involved in numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. This paper highlights the RFID technology, its working, its architecture and its applications. With the help of RFID the world is moving towards automation with reduced labor levels, enhanced visibility, and improved inventory management. This paper also underlines the different types of RFID tags. RFID is applicable in many fields like retail industry, agriculture, vehicle management, underwater applications, healthcare, smart homes and for security and safety purposes to name a few.. It enables distant identification unlike earlier bar-code technology it does not require a line of sight. This paper also addresses current RFID technology in terms of systems, components, and propagation, and provides a look forward towards its future applications.

“Technology has made our lives more full, yet at the same time we’ve become uncomfortably “full”. (Maeda, 2006, p.I). After considering these words within marketing context we can see that each day we are dealing with an information... more

“Technology has made our lives more full, yet at the same time we’ve become uncomfortably “full”.
(Maeda, 2006, p.I). After considering these words within marketing context we can see
that each day we are dealing with an information flow. Although there is a lot of
information about almost everything (sold products, barcodes, invoices, information
from the supplier, prices, customer data, competitors etc.) today’s managers are more
unsecure to take certain decisions. They also don’t have enough time to pay attention for
these controllable or uncontrollable forces. During a business process the way from
production to wholesalers and than to retailers is very complicated. After products finally
meet the customers, feedbacks are coming back to the companies and the cycle begins
from the start. This product and information flow makes business processes very complex
because different people (engineers, sales staff, consumers, managers) interfere this cycle.
In this study our aim is - based on the simplicity theory of John Maeda – with the help of
RFID technology to create a simple process model for retailers. By using RFID tags in their
warehouses and stores they might be able to serve better and more efficiently to their
customers and have a better overview in a short period of time. The information supplied
via RFID allows corporations to plan their internal processes more efficiently. We also
would like to analyze the pitfalls of RFID with a case from Turkish retail industry
especially for In-Store usage of RFID.

Maulana Azad Library is the Central Library of the Aligarh Muslim University which caters to the educational, research and extension needs of the University. The Library holds invaluable collection of books and journals in almost all the... more

Maulana Azad Library is the Central Library of the Aligarh Muslim University which caters to the educational, research and extension needs of the University. The Library holds invaluable collection of books and journals in almost all the disciplines of study. It is world famous for manuscripts and rare books in Oriental Languages and ranked the largest library system of India and second largest in Asia with over 110 satellite libraries. The Information Technology (IT) played a vital role in the advancement of each and every segment of our society. Now a days, libraries are capable of and trying to accomplish the new IT based services to fulfil the information needs of the patrons in more enhanced and speedy manner. This paper is aimed to highlight the developments and modernization activities of Maulana Azad Library system of AMU. It elaborates as how with the use and impact of IT, the huge traditional library system has swiftly turned into a modern and advanced library system in a short span of time and there is a paradigm shift in its resources, services and products. The study also talks about social networking tools, currently used for engaging directly with the people/patrons.

Objective of the Project The main objective of this project is to provide security to organizations like Schools, Hospitals, Office spaces, Industrial areas etc by limiting the access to a secured area only to the authorized personnel... more

Objective of the Project The main objective of this project is to provide security to organizations like Schools, Hospitals, Office spaces, Industrial areas etc by limiting the access to a secured area only to the authorized personnel with a valid RFID Tag. A security lock is created using an RFID Reader module and RFID Tags. Access will be granted to people who hold an authorized RFID Tag only. Security is very important to each and every organization. Restricting access to very important and administrative areas are a priority nowadays in many organizations. Such areas are called " secured areas " where access is limited to a certain set of people who are authorized. Proposed Working Model An RFID based Door Lock or Access Control System is based on some simple concepts. We store a set of RFID tag data (unique RFID codes/keys) inside our program/system, say 3 or 10 RFID tag data (the number varies according to requirements of user, say 10 tags needed if access needs to be granted to 10 people). The system comprises of a micro controller (8051 series), an RFID Reader module, an LCD module (16x2) to display messages, a 12 volts relay (to control output), and a power supply circuitry to give power to microcontroller, RFID module, LCD module and the relay. When the person with the right RFID tag (compatible to the data preloaded in our program/system) come and swipes his RFID tag near the RFID reader, access will be granted (a success message will be displayed on the LCD module and the relay will be turned ON). When the person with the wrong RFID card (whose data is not loaded in our system) swipes his RFID tag, access will be denied (a denial message will be displayed on the LCD module and the relay will not be turned ON). The 16x2 LCD module will display different status messages. Hardware Requirements Component Specification Microcontroller 8051 Series (AT89S51) RFID Reader EM­18 Reader module (125Khz)

The marketing mix models proposed to this day do not support the management of micro connexions and virtual networks linked to a given product with all its ramifications in the chain of business and economic networks. This article... more

The marketing mix models proposed to this day do not support the management of micro connexions and virtual networks linked to a given product with all its ramifications in the chain of business and economic networks. This article provides answers to these theoretical and practical preoccupations and contributes to digital life management in the context of Sustainable Development (SD) with efficient use of virtual networks, Information Analysis Technology (IAT)… It conceptualizes a model of “green” quantum / numeric marketing mix in 5P (Price, Product, Promotion, Place and puce).
The research method is based on case study approach. The methodological approach for making an application to a fuel distribution company, the group's 11th-largest global oil companies is presented in this article. At this stage of this research, the model uses proactive approaches, forward-looking and subject to the "strategic imagination." It also puts in a very similar use of quantum networks (2020).

Nowadays, the RFID technology can be found in different sectors and implemented in a big number of applications and it is commonly accepted that its use has offered powerful benefits to its adopters. But, it has also caused intense... more

Nowadays, the RFID technology can be found in different sectors and implemented in a big number of applications and it is commonly accepted that its use has offered powerful benefits to its adopters. But, it has also caused intense reactions and privacy debates. In many cases privacy is set in danger because of its ability to process and transfer data wirelessly, even without line of sight.
It is a challenging technology for the privacy regulation and the regulators must be vigilant. Since 2005, significant actions have taken place that lead to the technology’s safe implementation. The European Commission and the Article 29 Data Protection Working Party in collaboration with interested parties, including manufacturers and deployers of the RFID technology as well as with privacy advocates, published a series of working documents and opinions and resulted in developing a Privacy and Data Protection Impact Assessment Framework.
This paper focuses on the steps that have been done until today for the safe implementation of the RFID systems and especially to the final Revised PIA Framework that was recommended and endorsed.

Radio Frequency Identification (RFID) technology is in wide deployment and has been used to many applications for decades. The principal advantage of this technology is that it automatically identifies objects using electromagnetic waves... more

Radio Frequency Identification (RFID) technology is in wide deployment and has been used to many applications for decades. The principal advantage of this technology is that it automatically identifies objects using electromagnetic waves to communicate with a reader without requiring contact and line of sight. As the technology evolved and offered large memory capacity it was used as a storage medium for electronic passports (e-passports). The e-passport is the digital version of the paper passport and its goal is to provide stronger identity authentication than the classic one. It was believed that it was able to ease identity checks, lessen the amount of human errors, protect against manipulation of travel documents and improve border security. But the fact that biometric data can be stored to the e-passport; privacy and security risks are posed for the holders. So, this new passport turned out to be much more intrusive than the traditional one. RFID chips used in e-passports are equipped with protection mechanisms but they still have lots of technical flaws and they are vulnerable to skimming and eavesdropping. The main problem stems from the fact that the data contained on the e-passport are transferred wirelessly, so it is vulnerable to anyone having the necessary equipment. This paper focuses on the use of RFID technology in EU e-passports. Particularly a short description of the technology and its advantages are given and even more attention is given to the threats that are posed to the holder's privacy. Finally, data protection issues and the proposed EU Regulation are presented.

The recent stock management control system uses 1D and 2D barcodes which is difficult to maintain because it is not durable and reusable and also the barcodes are not rewritable. The researched based project is about managing stock using... more

The recent stock management control system uses 1D and 2D barcodes which is difficult to maintain because it is not durable and reusable and also the barcodes are not rewritable. The researched based project is about managing stock using android smartphone with RFID technology system. An android application has to be developed and designed using Android Studio software where the android smartphone requires having the NFC enabled in it, so it can in-cooperate with the RFID tags to allow the data transfer between the smartphone and the RFID tag. The software prototype of the SSMC was created and tested based on different types of testing approach. And the system has zero errors visible because the approach of the programming of the application and debugging the codes ensures that the errors can be located and solved within a short period of time. The system would be more realistic if the database created is based on real time events where auto syncing is available directly to computer instead of backing up manually on SD card and transfer via wireless. Moreover the graphical user interface of the software prototype can be improved to make it more professional.

The Wireless Identification and Sensing Platform (WISP) conjugates the identification potential of the RFID technology and the sensing and computing capability of the wireless sensors. Practical issues, such as the need of periodically... more

The Wireless Identification and Sensing Platform (WISP) conjugates the identification potential of the RFID technology and the sensing and computing capability of the wireless sensors. Practical issues, such as the need of periodically recharging WISPs, challenge the effective deployment of large-scale RFID Sensor Networks (RSNs) consisting of RFID readers and WISP nodes. In this view, the paper proposes cooperative solutions to energize the WISP devices in a wide-area sensing network while reducing the data collection delay. The main novelty is the fact that both data transmissions and energy transfer are based on the RFID technology only: RFID mobile readers gather data from the WISP devices, wirelessly recharge them, and mutually cooperate to reduce the data delivery delay to the sink. Communication between mobile readers relies on two proposed solutions: a tag-based relay scheme, where RFID tags are exploited to temporarily store sensed data at predetermined contact points between the readers; and a tag-based data channel scheme, where the WISPs are used as a virtual communication channel for real time data transfer between the readers. Both solutions require: (i) clustering the WISP nodes; (ii) dimensioning the number of required RFID mobile readers; (iii) planning the tour of the readers under the energy and time constraints of the nodes. A simulative analysis demonstrates the effectiveness of the proposed solutions when compared to non-cooperative approaches. Differently from classic schemes in the literature, the solutions proposed in this paper better cope with scalability issues, which is of utmost importance for wide area networks.

With the world facing an information technology and communication revolution, RFID technology is one of the active sides among the different technologies that are following this revolution. Yet, as with any other technology, there were... more

With the world facing an information technology and communication revolution, RFID technology is one of the active sides among the different technologies that are following this revolution. Yet, as with any other technology, there were many aspects and issues which arose alongside the rapid development of RFID implementations in different industries such as smart labs, libraries and VANETs, etc. These issues include security, privacy, scalability, RFID tag collision and issues in the process of ownershiptransfer of the RFID tags. These issues were of great concern not only for the researchers, but also for the consumers and industry managers who implement this technology to develop a better innovative structure for their businesses. In today's world, itis very important to make any industry secure and reliable - especially in the field of IT - as it delves into the very distinct details that might cause the loss of fortunes when leaking information or processing unsecure operations due to a faulty operation process. In this book, the authors will introduce the reader to RFID implementation in different industries and will also survey the aspects and new ideas which will help researchers to secure and address some of these threats. This book also takes into consideration the experiences of many scholars who have investigated and surveyed these challenges, technology aspects, implementations, threats and solutions

With the technological advance and software improvement, Vehicular Ad-Hoc Networks have made a huge and impressive development in the recent years. This literature surveys different aspects of VANETs. The aim of the paper is to give an... more

With the technological advance and software improvement, Vehicular Ad-Hoc Networks have made a huge and impressive development in the recent years. This literature surveys different aspects of VANETs. The aim of the paper is to give an overview of the applications and systems embedded within VANETs. After a historical view of the main aspects of intelligent vehicles, various VANETs applications are to be presented mainly safety, commercial, comfort, productive and efficiency applications. The embedded systems in VANETs based on the RFID technology are to be described, as well.

Many hospitals, these days depend on the Information Technology (IT) to achieve perfection in the health services and operation management. The said dependency is because of the ability of emerging technologies to solve the problem of... more

Many hospitals, these days depend on the Information Technology (IT) to achieve perfection in the health services and operation management. The said dependency is because of the ability of emerging technologies to solve the problem of different nature. One of the problems where applicability of the IT can produce revolutionary solution is the cradle kidnapping and swapping of newborns in hospitals. It can be achieved with proper usage of the Radio frequency identification (RFID) technology. The present work is an attempt to explore and then utilize RFID technology in healthcare to protect the newborns in the hospitals from kidnapping and swapping. Apart from implementing a sample case the present work also characterize the RFID system in terms of the different elements that it constitutes (readers, tags, software, and security programs).

The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective was accomplished by integrating... more

The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective was accomplished by integrating hardware and software. The hardware consisted of two WSN nodes – the RFID node connected to one of the WSN nodes, and a computer connected to the other WSN node. For the RFID equipment, we used the SM130-EK kit, which included the RFID reader and the RFID tags; and for the WSN, we used the Synapse Network Evaluation kit, which included the two sensor nodes. The software consisted of a program module developed in Python to control the microprocessors of the nodes; and a database controlled by a simple program to manage the tag IDs of people wearing them. The WSN and RFID nodes were connected through I2C interfacing. Also, the work of sending commands to the RFID node, to make it read a tag and send it back to the computer, was accomplished by the Python code developed which also controls the data signals. At the computer, the received tag ID is evaluated with other existing tag IDs on the database, to check if that tag has authorization or not to be in the covered area. Our research has the potential of being adapted for use with secure real-time access control applications involving WSN and RFID technologies.

An ultra-high frequency (UHF) passive radio frequency identification (RFID) tag consisting of flexible antenna and built-in temperature sensor chip is utilized for temperature monitoring of human body. A series of experiments were... more

An ultra-high frequency (UHF) passive radio frequency identification (RFID) tag consisting of flexible antenna and built-in temperature sensor chip is utilized for temperature monitoring of human body. A series of experiments were performed to study the body effects on temperature measurements. The tags were mounted at different positions of the body and in the different tag orientations as well. The experimental study of sensor integrated RFID tag shows that performance of the tag is more stable, yielding good signal strength and more consistent temperature measurement given the small form factor and arm attachment. Minimizing the deteriorating effect of human body on tag's performance and the accuracy of measurements in different scenarios gives the perspective for implementation in real-time physiological monitoring as per the medical requirements.

—This paper presents the design and EM analysis of a near-field RFID antenna for the smart shelf applications where spatially-reconfigurable interrogation zone is required. Antenna operation is based on the EM coupling between the... more

—This paper presents the design and EM analysis of a near-field RFID antenna for the smart shelf applications where spatially-reconfigurable interrogation zone is required. Antenna operation is based on the EM coupling between the open-ended or shorted microstrip (MS) feed line and parallel planar metal strips printed on top of a dielectric layer. The novelty of the proposed design corresponds to utilizing the RF switches altering the length of meander MS line and thus changing the phase distribution of the radiating antenna elements. Near-field distributions calculated in the planes parallel and normal to the antenna surface illustrate the mechanism of extending an area of strong E-field necessary to activate multiple RFID tags.

Digitalised supply-chain traceability systems can offer wide prospects both for improving safety as well as enhancing perceived quality. However, the coupling between physical goods and information is often difficult for agri-food items.... more

Digitalised supply-chain traceability systems can offer wide prospects both for improving safety as well as enhancing perceived quality. However, the coupling between physical goods and information is often difficult for agri-food items. A solution could be the use of RFID (Radio Frequency IDentification) systems. Due to its wide reading range, Ultra-High Frequency (UHF) technology is already widely used in logistics and warehousing, mostly for the identification of batches of items. A growing interest is also emerging in Near Field Communication (NFC), as several smartphones embed an integrated NFC antenna. This paper deals with the automatic identification of meat products at item level, proposing and evaluating the adoption of different RFID technologies. Different UHF and NFC solutions are proposed, which benchmark tag performances in different configurations, including four meat types (fatty beef, lean beef, chicken and pork), by using a specifically designed test bench. As avoiding the application of two different tags could be advantageous, dual frequency devices (UHF and NFC) are also considered. Significant differences in tag performances, which also depend on meat type and packaging, are highlighted. The paper highlights that tag positioning should consider the geometry of the packaging and the relative positioning of tag, meat and reader antenna.

The use of radio frequency identification (RFID) technology for the automatic identification and communication of physical parameters with on board integrated sensor attracts vast applications on a large scale ranging from mobile... more

The use of radio frequency identification (RFID) technology for the automatic identification and communication of physical parameters with on board integrated sensor attracts vast applications on a large scale ranging from mobile healthcare to logistics, supply chains, robotics and many others. Recently, sensor RFID tags have been considered in wearable electronics. However, these devices are still empowered by a battery. In this paper, we proposed and designed a self-sustainable sensor integrated RFID tag for wearable electronics applications. A polyvinylidene ßuoride (PVDF) integrated dual-gate thin film transistor (TFT) was used to harvest energy from daily human activities such as arm/finger movements. Numerical analysis and preliminary results of such energy harvester was reported in addition to system design of sensor integrated chip-based active RFID tag.

Radio Frequency Identification (RFID) systems have been used in libraries and Information centre for security issues and multiple purposes. RFID developed for military applications in the 1940s, it had found its application in many other... more

Radio Frequency Identification (RFID) systems have been used in libraries and Information centre for security issues and multiple purposes. RFID developed for military applications in the 1940s, it had found its application in many other areas including the libraries. The system components, standards and protocols for RFID based systems with special reference to library application are discussed in detail. Also discussed are the advantages and disadvantages of RFID application in libraries. This paper briefly traces the origin of this technology and its applications in various sectors.
Keywords: Libraries. Radio Frequency Identification, RFID, Surveillance Systems, Security.

This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides... more

This publication presents a method responsible for counting tracking and monitoring visitors inside a building. The site examined is Manos Hatzidakis' House, situated in Xanthi. Specifically, we have conducted a study, which provides recommendations, regarding the installation of sensors in the building. We also present the communication protocols of the computer network used in order to ensure the efficient communication between the space examined and the sensor network. Finally, we describe the process of creating a website, which is designed to store and view the data.

Energy-harvesting passive RFID (radio frequency identification) tags provide countless possibilities as so-called smart tags. Smart tags can communicate with existing RFID readers or interrogators while providing a battery-less platform... more

Energy-harvesting passive RFID (radio frequency identification) tags provide countless possibilities as so-called smart tags. Smart tags can communicate with existing RFID readers or interrogators while providing a battery-less platform for internal and external sensors to enrich available information about the environment and smart tag it. A reduced cost and size as well as an increased lifespan and durability of battery-free smart tags offer improvements in areas such as transportation and product tracking. Battery-free smart tags can ideally support arbitrarily complex sensor measurements, but in reality energy limitations can introduce great reductions in operating range and thus application range. In this work, we present an example application of a smart tag with a passive HF (high-frequency) RFID tag IC (integrated circuit) and MEMS (micro electro-mechanical structure) sensor. A standard HF RFID reader connected to a PC (personal computer) allowed the RF (radio frequency) field to power and communicate with the smart tag. A Kalman filter, implemented on a PC, was used to correct and improve the raw sensor data of smart tag orientation. Measurement results showed that the MEMS sensor on the smart tag could be powered for continuous operation and that raw smart tag orientation data could be read while in the RF field of a standard HF RFID reader, but at a limited range.

The advancement and proliferations in Information and Communication Technology (ICTs) has led to migration of learning beyond the traditional classroom Face-to-Face (F2F) to different types of learning such as Distance Flexible Learning... more

The advancement and proliferations in Information and Communication Technology (ICTs) has led to migration of learning beyond the traditional classroom Face-to-Face (F2F) to different types of learning such as Distance Flexible Learning (DFL), Electronic Learning (E Learning) and to everywhere and anytime known as Mobile Learning (M-Learning). This paper presents an attempt to exploit mobile technologies to simplify the exam management and performance assessment activities of a learning process. The work focuses on key aspects of mobile device and platform oriented design, lightweight and efficient implementation, interface usability issues related to fast and convenient question navigation, and performance assessment. A prototype system, implemented on Google Android OS, is also illustrated.

The confinement of the detection region is one of the most challenging issues in Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) systems. Here, we propose a new paradigm to confine the interrogation zone of standard UHF... more

The confinement of the detection region is one of the most challenging issues in Ultra-High Frequency (UHF) Radio Frequency Identification (RFID) systems. Here, we propose a new paradigm to confine the interrogation zone of standard UHF RFID systems. Our approach relies on the use of an all-planar metamaterial wire grid to block the radiation field (i.e., the far-field) of the reader antenna, and thereby obtain a spatially well-confined detection region in the near-field. This solution is analytically and numerically investigated, and then experimentally verified through near-field and tag-reading measurements, demonstrating its effectiveness and robustness under external perturbations.