Pub Date : 1900-01-01DOI: 10.5220/0002411301330140
Chanan Glezer, S. Krishnamurthy, K. Schloeder, Omer Anson, Gil Tahan
This research conceptualizes an architecture (M2MGen) aimed at generating M2M applications as a service offered by a telecommunications network provider. M2MGen employs various plug-ins and knowledge constructs which can be configured to meet requirements of clients from various industry sectors interested in deploying M2M applications. The architecture addresses the following aspects: Data-acquisition Management, Communication Management, Business-service Management and Control Management.
{"title":"M2MGen- An Application Generator for Machine to Machine (M2M) Applications","authors":"Chanan Glezer, S. Krishnamurthy, K. Schloeder, Omer Anson, Gil Tahan","doi":"10.5220/0002411301330140","DOIUrl":"https://doi.org/10.5220/0002411301330140","url":null,"abstract":"This research conceptualizes an architecture (M2MGen) aimed at generating M2M applications as a service offered by a telecommunications network provider. M2MGen employs various plug-ins and knowledge constructs which can be configured to meet requirements of clients from various industry sectors interested in deploying M2M applications. The architecture addresses the following aspects: Data-acquisition Management, Communication Management, Business-service Management and Control Management.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122345395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0003017300970107
U. S. Mohammed, Mostafa Salah
This paper describes a simple fast protocol of counter based anticollision approaches. The tag processing is depending on one depth counter and conflict pointer to determine its replying order and the current replying bit. The main advantage of the proposed protocol is the simple one bit reader response in the identification process. The one bit reader response will provide the tags all information about the new state of the current depth position of replying. The tags will transmit its IDs without reader interruption until the reader detects the collision state or the identification state. Based on this idea, the identification process will be faster than the traditional counter based anti collision protocols and the overhead information will be reduced. Performed computer simulations have shown that the collision recovery scheme is very fast and simple. The simulation results shows that the proposed technique outperforms most of the recent techniques in most cases.
{"title":"Fast and Simple Anti-collision Protocol based on Up-down Counter and one Bit Reader Response","authors":"U. S. Mohammed, Mostafa Salah","doi":"10.5220/0003017300970107","DOIUrl":"https://doi.org/10.5220/0003017300970107","url":null,"abstract":"This paper describes a simple fast protocol of counter based anticollision approaches. The tag processing is depending on one depth counter and conflict pointer to determine its replying order and the current replying bit. The main advantage of the proposed protocol is the simple one bit reader response in the identification process. The one bit reader response will provide the tags all information about the new state of the current depth position of replying. The tags will transmit its IDs without reader interruption until the reader detects the collision state or the identification state. Based on this idea, the identification process will be faster than the traditional counter based anti collision protocols and the overhead information will be reduced. Performed computer simulations have shown that the collision recovery scheme is very fast and simple. The simulation results shows that the proposed technique outperforms most of the recent techniques in most cases.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001733301420148
M. Barboni, F. Rizzo, Graziano Azzalin, Marco Sironi
The Project’s objective is the development of an integrated system to increase mobility of people with disabilities and their personal safety and security, by identifying a secure path to walk through selected areas, particularly for people with visual disability. This is done through the use of mature and proven technologies (RFID, antennas, bluetooth, etc.) which only have to be integrated for this specific application.The system is based on 3 main components: a path made of transponders, a customdesigned walking cane and a smart phone. Each RFID tag is associated to a message or a small beep. The system describes the environment and warns the user if there is a potential danger such as a road crossing
{"title":"How RFID Technology can Assist the Visually Impaired: The Sesamonet System","authors":"M. Barboni, F. Rizzo, Graziano Azzalin, Marco Sironi","doi":"10.5220/0001733301420148","DOIUrl":"https://doi.org/10.5220/0001733301420148","url":null,"abstract":"The Project’s objective is the development of an integrated system to increase mobility of people with disabilities and their personal safety and security, by identifying a secure path to walk through selected areas, particularly for people with visual disability. This is done through the use of mature and proven technologies (RFID, antennas, bluetooth, etc.) which only have to be integrated for this specific application.The system is based on 3 main components: a path made of transponders, a customdesigned walking cane and a smart phone. Each RFID tag is associated to a message or a small beep. The system describes the environment and warns the user if there is a potential danger such as a road crossing","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"375 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002429300820092
T. Berezny, K. Hassanein
RFID technology is experiencing wide adoption in a number of industries while providing numerous unique benefits to each. However, the healthcare industry has been slow to adopt this promising technology, with some claiming cost constraints, satisfaction with barcodes or lack of universal standards as reasons. This paper provides an overview of RFID technology, and discusses the facilitating and inhibiting factors for its adoption within hospital environments. It further provides an analysis of the needs and concerns of the main hospital stakeholders impacted by this technology with the goal of maximizing the potential for realizing its full promise to improve and optimize healthcare delivery.
{"title":"RFID Use in Hospitals: A Business Perspective","authors":"T. Berezny, K. Hassanein","doi":"10.5220/0002429300820092","DOIUrl":"https://doi.org/10.5220/0002429300820092","url":null,"abstract":"RFID technology is experiencing wide adoption in a number of industries while providing numerous unique benefits to each. However, the healthcare industry has been slow to adopt this promising technology, with some claiming cost constraints, satisfaction with barcodes or lack of universal standards as reasons. This paper provides an overview of RFID technology, and discusses the facilitating and inhibiting factors for its adoption within hospital environments. It further provides an analysis of the needs and concerns of the main hospital stakeholders impacted by this technology with the goal of maximizing the potential for realizing its full promise to improve and optimize healthcare delivery.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"11 13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134642952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002433800500060
Paul Golding, Vanesa M. Tennant
A throwaway cutting tip (31) has two substantially polygonal main surfaces (32, 33) and cutting edges (42, 43, 44, 45, 49, 50) in the form of a curved line projecting inwardly in the direction of the thickness of the tip. The cutting edges extend between nose portions (38, 39, 40, 41) positioned at apexes of the polygon. The main surface has a flat central portion (47) in the middle. A rake surface having two portions extends between the flat central portion and the cutting edge. The rake surface (51) has a flat portion (56) and a curved, concave portion (53). The curved concave surface portion (53) connecting the lowermost edge (52) of the flat rake surface portion to the flat central portion functions as a chip breaking surface. The chip breaking is enhanced by a plurality of projections (55) arranged along the curved concave surface portion. Each nose portion has a nose protecting surface (38a, 39a, 40a, 41a) extending parallel to the flat central portion inwardly from an end edge defined between lateral surfaces (34, 35, 36, 37) and the main surface.
{"title":"Performance Review of RFID in the Supply Chain","authors":"Paul Golding, Vanesa M. Tennant","doi":"10.5220/0002433800500060","DOIUrl":"https://doi.org/10.5220/0002433800500060","url":null,"abstract":"A throwaway cutting tip (31) has two substantially polygonal main surfaces (32, 33) and cutting edges (42, 43, 44, 45, 49, 50) in the form of a curved line projecting inwardly in the direction of the thickness of the tip. The cutting edges extend between nose portions (38, 39, 40, 41) positioned at apexes of the polygon. The main surface has a flat central portion (47) in the middle. A rake surface having two portions extends between the flat central portion and the cutting edge. The rake surface (51) has a flat portion (56) and a curved, concave portion (53). The curved concave surface portion (53) connecting the lowermost edge (52) of the flat rake surface portion to the flat central portion functions as a chip breaking surface. The chip breaking is enhanced by a plurality of projections (55) arranged along the curved concave surface portion. Each nose portion has a nose protecting surface (38a, 39a, 40a, 41a) extending parallel to the flat central portion inwardly from an end edge defined between lateral surfaces (34, 35, 36, 37) and the main surface.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002431601250132
C. Cerrada, Ismael Abad, J. A. Cerrada, Vicente Dies
The huge growth of the RFID devices market, such as EPC (Electronic Product Code) elements in the most varied areas of the industry and the services, joined to the new advantages that every day are discovered on their intensive use, have provoked the immediate attention of multitude of HW, SW and custom solutions providers. The heterogeneous applications in which these devices can be used makes that the methods and develops for their management and control differ from the classical ones known till now. In this type of applications it is necessary to include some mechanism of acquisition and management of the radio frequency information. In this article a possible solution for this question is presented. It represents a middleware solution based on a pipeline and filter architecture that brings together the suitable proportion of flexibility, power of calculation, connectivity and simplicity of use to achieve suitable solutions for automation, management and control of goods and services. It has been developed in a more generic framework, that we call DEPCAS (Data EPC Acquisition System), and it is denoted as Pipe-DEPCAS. This specific solution contributes in this field with the best practices of design at the time that it assures an effective control of cost on having used standards of opened code and very known, simple and refined architectures. The paper describes DEPCAS and Pipe-DEPCAS new concepts and developments.
{"title":"Pipe-DEPCAS: A Middleware Solution for EPC-RFID Data Acquisition Systems","authors":"C. Cerrada, Ismael Abad, J. A. Cerrada, Vicente Dies","doi":"10.5220/0002431601250132","DOIUrl":"https://doi.org/10.5220/0002431601250132","url":null,"abstract":"The huge growth of the RFID devices market, such as EPC (Electronic Product Code) elements in the most varied areas of the industry and the services, joined to the new advantages that every day are discovered on their intensive use, have provoked the immediate attention of multitude of HW, SW and custom solutions providers. The heterogeneous applications in which these devices can be used makes that the methods and develops for their management and control differ from the classical ones known till now. In this type of applications it is necessary to include some mechanism of acquisition and management of the radio frequency information. In this article a possible solution for this question is presented. It represents a middleware solution based on a pipeline and filter architecture that brings together the suitable proportion of flexibility, power of calculation, connectivity and simplicity of use to achieve suitable solutions for automation, management and control of goods and services. It has been developed in a more generic framework, that we call DEPCAS (Data EPC Acquisition System), and it is denoted as Pipe-DEPCAS. This specific solution contributes in this field with the best practices of design at the time that it assures an effective control of cost on having used standards of opened code and very known, simple and refined architectures. The paper describes DEPCAS and Pipe-DEPCAS new concepts and developments.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116099488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001742101750180
L. Catarinucci, L. Tarricone, R. Colella, A. Esposito
The use of Radio Frequency Identification (RFID) technology for the automatic transmission of physical parameters in wireless sensor networks, could undoubtedly pave the way to a large class of attractive applications, ranging from healthcare, automotive, diagnostic systems, robotics and many others. Nevertheless, although some RFID tags capable to transmit sensor-like information are already on the market, only a restrict number of sensors, such as those for temperature or pressure measurement, can be easily miniaturized and embedded in the RFID chip. The integration of more complex sensors, in fact, appears to be complicated and extremely expensive. In this paper, a costeffective general-purpose multi-ID tag is proposed. It can be connected to generic sensors, and is capable to transmit a proper combination of ID codes depending on the actual value at its input. Such a tag represents the natural evolution of standard RFID technology: neither the digital design nor the cost of the tag is substantially modified.
{"title":"Enhancing Sensor Network Capabilities through a Cost-Effective RFID Tag for Sensor Data Transmission","authors":"L. Catarinucci, L. Tarricone, R. Colella, A. Esposito","doi":"10.5220/0001742101750180","DOIUrl":"https://doi.org/10.5220/0001742101750180","url":null,"abstract":"The use of Radio Frequency Identification (RFID) technology for the automatic transmission of physical parameters in wireless sensor networks, could undoubtedly pave the way to a large class of attractive applications, ranging from healthcare, automotive, diagnostic systems, robotics and many others. Nevertheless, although some RFID tags capable to transmit sensor-like information are already on the market, only a restrict number of sensors, such as those for temperature or pressure measurement, can be easily miniaturized and embedded in the RFID chip. The integration of more complex sensors, in fact, appears to be complicated and extremely expensive. In this paper, a costeffective general-purpose multi-ID tag is proposed. It can be connected to generic sensors, and is capable to transmit a proper combination of ID codes depending on the actual value at its input. Such a tag represents the natural evolution of standard RFID technology: neither the digital design nor the cost of the tag is substantially modified.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127821491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002172400170026
M. Singh, Xue Li
RFID tracking systems are in an open system environment, where different organizations have different business workflows and operate on different standards and protocols. RFID tracking to be effective, it is imperative for RFID tracking systems to trust each other and be collaborative. However, RFID tracking systems operating in the open system environment are constantly evolving and hence, the related trust and the collaborations need to be dynamic to changes. This paper presents a seven-layer RFID trust framework to promote the resolution of merging with both social and technology traits in enhancing security, privacy and integrity of global RFID tracking systems. An example of integration of our trust framework with supply-chain management applications and trust evaluation is also presented.
{"title":"Trust Framework for RFID Tracking in Supply Chain Management","authors":"M. Singh, Xue Li","doi":"10.5220/0002172400170026","DOIUrl":"https://doi.org/10.5220/0002172400170026","url":null,"abstract":"RFID tracking systems are in an open system environment, where different organizations have different business workflows and operate on different standards and protocols. RFID tracking to be effective, it is imperative for RFID tracking systems to trust each other and be collaborative. However, RFID tracking systems operating in the open system environment are constantly evolving and hence, the related trust and the collaborations need to be dynamic to changes. This paper presents a seven-layer RFID trust framework to promote the resolution of merging with both social and technology traits in enhancing security, privacy and integrity of global RFID tracking systems. An example of integration of our trust framework with supply-chain management applications and trust evaluation is also presented.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001738800730086
Aikaterini Mitrokotsa, Melanie R. Rieback, A. Tanenbaum
RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Although RFID networks have many advantages, they also present a number of inherent vulnerabilities with serious potential security implications. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID systems so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be developed.
{"title":"Classification of RFID Attacks","authors":"Aikaterini Mitrokotsa, Melanie R. Rieback, A. Tanenbaum","doi":"10.5220/0001738800730086","DOIUrl":"https://doi.org/10.5220/0001738800730086","url":null,"abstract":"RFID (Radio Frequency Identification) systems are emerging as one of the most pervasive computing technologies in history due to their low cost and their broad applicability. Although RFID networks have many advantages, they also present a number of inherent vulnerabilities with serious potential security implications. This paper develops a structural methodology for risks that RFID networks face by developing a classification of RFID attacks, presenting their important features, and discussing possible countermeasures. The goal of the paper is to categorize the existing weaknesses of RFID systems so that a better understanding of RFID attacks can be achieved and subsequently more efficient and effective algorithms, techniques and procedures to combat these attacks may be \u0000developed.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121271980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0003015700030012
Peter Darcy, Bela Stantic, A. Sattar
Recently, passive Radio Frequency Identification (RFID) systems have received an exponential amount of attention as researchers have worked tirelessly to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and enhance the dirty data using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages against a currently utilised cleaning technique and achieves a higher cleaning rate.
{"title":"X-CleLo: Intelligent Deterministic RFID Data Transformer","authors":"Peter Darcy, Bela Stantic, A. Sattar","doi":"10.5220/0003015700030012","DOIUrl":"https://doi.org/10.5220/0003015700030012","url":null,"abstract":"Recently, passive Radio Frequency Identification (RFID) systems have received an exponential amount of attention as researchers have worked tirelessly to implement a stable and reliable system. Unfortunately, despite vast improvements in the quality of RFID technology, a significant amount of erroneous data is still captured in the system. Currently, the problems associated with RFID have been addressed by cleaning algorithms to enhance the data quality. In this paper, we present X-CleLo, a means to intelligently clean and enhance the dirty data using Clausal Defeasible Logic. The extensive experimental study we have conducted has shown that the X-CleLo method has several advantages against a currently utilised cleaning technique and achieves a higher cleaning rate.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122377227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}