scholarly journals Design of Dual Mode RFID Antenna for Inventory Management and IV Fluid Level Warning System

2017 ◽  
Vol 2017 ◽  
pp. 1-7 ◽  
Author(s):  
Ssu-Han Ting ◽  
Chih-Kuang Wu ◽  
Ching-Hsing Luo

Radio frequency identification (RFID) readers are powered RF devices that communicate with an RFID tag to read necessary information. Using this capability, a dual use system for short distance inventory management and moderate distance automatic warning system for low intravenous (IV) fluid levels is designed. The RFID is affixed on the IV drip bag; the fluid in bag affects the antenna transmission distance by fluid dielectric conditions. This allows for two different operational modes (moderate and short distance). For pharmaceutical management, a handheld RFID reader can be used for short distance application. Another stationary RFID system can serve as a warning system for long distance application such as hospital care.

Author(s):  
Mike Burmester ◽  
Jorge Munilla

Radio Frequency Identification (RFID) is a challenging wireless technology with a great potential for supporting supply and inventory management. In this chapter the authors consider a particular application in which a group of tagged items are scanned to generate a record of simultaneous presence called a grouping-proof. Grouping-proofs can be used, for instance, to guarantee that drugs are shipped (or dispensed) accompanied by their corresponding information leaflets, to couple the user’s electronic passport with his/her bags, to recognize the presence of groups of individuals and/or equipment and more generally to support the security of supply and inventory systems. Although it is straightforward to design solutions when the verifier is online since it is sufficient for individual tags to authenticate themselves to the verifier, interesting security engineering challenges arise when the trusted server (or verifier) is not online during the scan activity. So, the field of grouping-proofs is very active, and many works have been published so far. This chapter details the setting for RFID grouping-proofs and discuss the threat model for such applications. The authors analyze some of the grouping-proofs proposed in the literature describing their advantages and disadvantages. Then, general guidelines for designing secure grouping-proofs are proposed. Finally, some examples of grouping-proofs that are provably secure in a strong security framework are presented.


2020 ◽  
Vol 6 (2) ◽  
pp. 83-90
Author(s):  
Ridho Syukuryansyah ◽  
Didik Setiyadi ◽  
Syahbaniar Rofiah

Technology in this modernization era helps many workers and human needs. Various fields have been encroached upon by technology and one cannot be released again, one of which is security systems. The need for increased security is based on human needs for a sense of comfort with the assets they have in a safe condition and can be monitored from anytime and anywhere. This research aims to build a security system using RFID and Arduino which can be monitored through the website. An early warning system for unknown objects is also embedded therein using a magnetic switch sensor on the door, buzzer to create sound frequencies that can attract the attention of the surrounding environment and the Arduino camera module to capture images of objects. The results of this research RFID can facilitate access in and out of the door and increase security compared to conventional keys. Only registered / known objects can access the room through the door. In and out activities are monitored through a website that can be accessed anytime and anywhere.


In the workspace, when we are working at home it is vital for property holders to keep up vital records and information. In this manner, the security of the workspace entryway is extremely important to build security and it can avoid burglary when the workspace isn't utilized or relinquished. The easiest security for the entryway is introducing a manual key. Yet, manual key is anything but difficult to break. With advancement of entryway security innovation it utilizes watchword, finger check, and numerous others, yet security is just to open and shutting entryway. Yet, when the entryway was persuasively opened or harmed by hoodlums, the property holder still had no data that the entryway was broken. To conquer this issue, a framework that can supplant the manual entryway bolt to a more advanced entryway security framework is required with the goal that it is difficult to separate and can see whether the entryway is opened or harmed by a cheat. To run this framework, 3 parts are utilized, to be specific RFID card as a key re-arrangement apparatus, a sensor to gauge vibration on the entryway when it is constrained open or harmed by criminals and tells the mortgage holder by means of SMS


2021 ◽  
Author(s):  
R. Deepalakshmi ◽  
R. Vijayalakshmi ◽  
S. Lavanya ◽  
T.K. Rakshitha Rasmi ◽  
S.B. Sathiya

The Absolute time monitoring, detecting and Alerting System for vehicles and children is required to trace and transmit the collected information at regular intervals to ensure safety and security of children. The illustration of the Realtime detecting and warning System consists of two units: Tracing Unit that traces the location information, transfers to the monitoring area, records the data in the database and takes the help of these data to locate the exact point of area of the vehicle with Google/other maps. The second unit is Alerting Unit that tracks the students using active Radio Frequency Identification Devices (RFID)which will be placed on student ID card. radio-wave trans-receiver transmits a common radio wave which is received by the RFID in the ID card. This radio-wave is modified by the RFID’s coil and resent to the receive RFID tags are also used for attendance which is updated directly to the database and displays the other student information.


Author(s):  
Ertunga C. Özelkan ◽  
Agnes Galambosi

Radio Frequency Identification (RFID) is believed to change how supply chains operate today. While RFID’s promise for improved inventory visibility and automation in inventory management is making many supply chain players hopeful for increased sales and reduced operating costs, these benefits do come at a cost and involve risks. This paper presents a financial returns analysis that captures RFID’s costs and benefits, and quantifies the financial risks of implementing RFID for various business sizes and products with different unit profits to understand when RFID makes business sense. More precisely, the returns analysis is performed using an econometric model to understand how break-even sales volumes, unit profits, tag prices, return on investment, and risks vary between a manufacturer and a retailer in a supply chain. The results are extended to multi-product cases as well. A sensitivity analysis is also performed to understand the returns in pessimistic and optimistic scenarios.


Author(s):  
Ertunga C. Özelkan ◽  
Agnes Galambosi

Radio frequency identification (RFID) is believed to change how supply chains operate today. While RFID’s promise for improved inventory visibility and automation in inventory management is making many supply chain players hopeful for increased sales and reduced operating costs, these benefits do come at a cost and involve risks. This article presents financial returns analysis that captures RFID’s costs and benefits, and quantifies the financial risks of implementing RFID for various business sizes and products with different unit profits to understand when RFID makes business sense. More precisely, the returns analysis is performed using an econometric model to understand how break-even sales volumes, unit profits, tag prices, return on investment, and risks vary between a manufacturer and a retailer in a supply chain. The results are extended to multiproduct cases as well. A sensitivity analysis is also performed to understand the returns in pessimistic and optimistic scenarios.


Author(s):  
Marc Pasquet ◽  
Delphine Vacquez ◽  
Joan Reynaud ◽  
Félix Cuozzo

The radio frequency identification (RFID) reading technology enables the transfer, by radio, of information from electronic circuit to a reader, opened up some interesting possibilities in the area of epayment (Domdouzis, Kumar, & Anumba, 2007). Today, the near field communication technology (NFC) opens up even more horizons, because it can be used to set up communications between different electronic devices (Eckert, 2005). Contactless cards, telephones with NFC capacities, RFID tag have been developed in industry and the services (Bendavid, Fosso Wamba, & Lefebvre, 2006). They are similar, but, some major differences explain the specificity of these three applications and the corresponding markets. The label, or marker, is a small size electronic element that transmits, on request, its numerical identification to a reader. The RFID identification makes it possible to store and recover data at short distance by using these miniature markers or labels (see Figure 1) associated to the articles to identify. The cost of the label is only few centimes. An RFID system is made of labels, readers connected to a fixed network, adapted software (collection of information, integration, confidentiality...), adapted services, and management tools that allow the identification of the products through packing. Contactless smartcards (see Figure 2) contain a microprocessor that can communicate under a short distance with a reader similar to those of RFID technology (Khu-smith & Mitchell, 2002). The originality of NFC is the fact that they were conceived for the protected bilateral transmission with other systems. NFC respects the standard ISO-14443 (Bashan, 2003) and thus, can be used as a contactless card. It can be used as a contactless terminal communicating with a contactless card or another NFC phone (ISO-18092). Services available through NFC are very limited today, but many experiments are in progress and electronic ticketing experiences (subways and bus) started in Japanb. There are two types of NFC phones: The mono chip composed of only one chip for GSM services (called the SIM) and NFC services. In that case, an NFC service is dependent of the phone operator. • The dual chip shows a clear separation of the two functions within two different chips. That completely isolates the operator and allows independent NFC services… We define the technology standards, the main platforms and actors in the background section. The main trust develops some contactless payment applications, and analyses the benefits and constraints of the different solutions. The future trends section concerns the research and technology evolution in contactless payment applications.


Author(s):  
Marc Pasquet ◽  
Delphine Vacquez ◽  
Joan Reynaud ◽  
Félix Cuozzo

The radio frequency identification (RFID) reading technology enables the transfer, by radio, of information from electronic circuit to a reader, opened up some interesting possibilities in the area of e-payment (Domdouzis, Kumar, & Anumba, 2007). Today, the near field communication technology (NFC) opens up even more horizons, because it can be used to set up communications between different electronic devices (Eckert, 2005). Contactless cards, telephones with NFC capacities, RFID tag have been developed in industry and the services (Bendavid, Fosso Wamba, & Lefebvre, 2006). They are similar, but, some major differences explain the specificity of these three applications and the corresponding markets. The label, or marker, is a small size electronic element that transmits, on request, its numerical identification to a reader. The RFID identification makes it possible to store and recover data at short distance by using these miniature markers or labels (see Figure 1) associated to the articles to identify. The cost of the label is only few centimes. An RFID system is made of labels, readers connected to a fixed network, adapted software (collection of information, integration, confidentiality...), adapted services, and management tools that allow the identification of the products through packing. Contactless smartcards (see Figure 2) contain a microprocessor that can communicate under a short distance with a reader similar to those of RFID technology (Khu-smith & Mitchell, 2002). The originality of NFC is the fact that they were conceived for the protected bilateral transmission with other systems. NFC respects the standarda ISO-14443 (Bashan, 2003) and thus, can be used as a contactless card. It can be used as a contactless terminal communicating with a contactless card or another NFC phone (ISO-18092). Services available through NFC are very limited today, but many experiments are in progress and electronic ticketing experiences (subways and bus) started in Japan.


Author(s):  
In Lee

Radio Frequency Identification (RFID) technology is rapidly expanding its application area from simple inventory management to advanced location tracking and supply chain management in a wide range of industries. Because of the potential benefits gained and high investment costs incurred by RFID, firms need to carefully assess every RFID opportunity and challenge to ensure that their resources are spent judiciously. Because of the lack of analytical methods for measuring the benefits and costs, this chapter presents a mathematical model for the evaluation of RFID investment in manufacturing and supply chain. This model provides a basis for the authors’ understanding of RFID value creation and ways to build an RFID business case for an RFID investment justification.


Sign in / Sign up

Export Citation Format

Share Document