Pub Date : 1900-01-01DOI: 10.5220/0003007300890096
E. Stringa, C. Bergonzi, Graziano Azzalin
This paper presents an innovative RFID solution to manage sensitive document archives. The system aims at: i) automatically tracing all document accesses at level of each page (who read the document and when); ii) knowing at any time where a document is; iii) providing periodical archive inventory; and iv) automatically signaling anomalies detected in the archive. The system represents an important tool for national/international security, as it allows a quick document recovery in case of emergencies. Moreover, with the proposed system the institution in charge of sensitive document archives can demonstrate the secure management of the entrusted material. This paper describes how the system has been implemented and reports tests performed in laboratory by simulating different scenarios, showing that the solution allows a reliable management of sensitive documents.
{"title":"Integrating RFID and Security Devices for an Innovative System to Manage Classified Documents","authors":"E. Stringa, C. Bergonzi, Graziano Azzalin","doi":"10.5220/0003007300890096","DOIUrl":"https://doi.org/10.5220/0003007300890096","url":null,"abstract":"This paper presents an innovative RFID solution to manage sensitive document archives. The system aims at: i) automatically tracing all document accesses at level of each page (who read the document and when); ii) knowing at any time where a document is; iii) providing periodical archive inventory; and iv) automatically signaling anomalies detected in the archive. The system represents an important tool for national/international security, as it allows a quick document recovery in case of emergencies. Moreover, with the proposed system the institution in charge of sensitive document archives can demonstrate the secure management of the entrusted material. This paper describes how the system has been implemented and reports tests performed in laboratory by simulating different scenarios, showing that the solution allows a reliable management of sensitive documents.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0003040801140125
A. Karagiannaki, K. Pramatari
Empowered by the possibility to automatically identify unique product instances, the emerging Radio Frequency Identification (RFID) technology is expected to revolutionize the supply chain processes. However, in view of the numerous possible ways that RFID can be implemented within the processes, the issue of supporting the process redesign based on a credible assessment between the current (as-is) and the future (to-be) processes has become a matter of considerable concern and debate for both practitioners and academics alike. To design RFID implementations in the supply chain using a robust dynamic analysis, we resort to discrete event simulation. As a result, based on a simulation study, the two factors of object identification level and RFID labeling responsibility are identified as key decision factors to design the RFID-enabled processes.
{"title":"RFID-enabled Supply Chain Process Redesign using Simulation","authors":"A. Karagiannaki, K. Pramatari","doi":"10.5220/0003040801140125","DOIUrl":"https://doi.org/10.5220/0003040801140125","url":null,"abstract":"Empowered by the possibility to automatically identify unique product instances, the emerging Radio Frequency Identification (RFID) technology is expected to revolutionize the supply chain processes. However, in view of the numerous possible ways that RFID can be implemented within the processes, the issue of supporting the process redesign based on a credible assessment between the current (as-is) and the future (to-be) processes has become a matter of considerable concern and debate for both practitioners and academics alike. To design RFID implementations in the supply chain using a robust dynamic analysis, we resort to discrete event simulation. As a result, based on a simulation study, the two factors of object identification level and RFID labeling responsibility are identified as key decision factors to design the RFID-enabled processes.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001730300430052
Daniele Biondo, A. Iera, A. Molinaro, Massimiliano Mattei, S. Polito
In this paper we introduce Location Estimation through Proximity Information (LEPI), an algorithm that aims at locating portable RFID readers in areas where active-RFID grids are settled. Location estimation is accomplished through a proximity information, which the reader derives by performing tag interrogation at increasing RF power levels. RFID tags surrounding the reader are incrementally detected and their known positions are eventually averaged, this providing an accurate estimation of the reader location. The performance of the proposed approach is assessed by experimental trials, conducted in indoor environments. They testify both to the actual feasibility of such a solution and to its better accuracy when compared to other reference RFID-based location tech-
{"title":"Location through Proximity in RFID Systems","authors":"Daniele Biondo, A. Iera, A. Molinaro, Massimiliano Mattei, S. Polito","doi":"10.5220/0001730300430052","DOIUrl":"https://doi.org/10.5220/0001730300430052","url":null,"abstract":"In this paper we introduce Location Estimation through Proximity Information (LEPI), an algorithm that aims at locating portable RFID readers in areas where active-RFID grids are settled. Location estimation is accomplished through a proximity information, which the reader derives by performing tag interrogation at increasing RF power levels. RFID tags surrounding the reader are incrementally detected and their known positions are eventually averaged, this providing an accurate estimation of the reader location. The performance of the proposed approach is assessed by experimental trials, conducted in indoor environments. They testify both to the actual feasibility of such a solution and to its better accuracy when compared to other reference RFID-based location tech-","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125478524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002201001170124
R. Mogre, A. Perego, A. Tumino
There is a growing attention towards the application of Radio Frequency Identification (RFId) technology in the Fashion & Apparel supply chain. This paper describes a Lateral Trans-shipment replenishment policy enabled by item-level RFId tagging. In fact, in order to adopt a Lateral Transshipment policy, a firm should have an accurate visibility of both the inventory level in its warehouses and in each store. Such visibility can be provided by RFId technology. An analytical model has been developed to evaluate the convenience of applying a Lateral Trans-shipment policy, and the main managerial implications are discussed.
{"title":"RFID-enabled Lateral Trans-shipments in the Fashion & Apparel Supply Chain","authors":"R. Mogre, A. Perego, A. Tumino","doi":"10.5220/0002201001170124","DOIUrl":"https://doi.org/10.5220/0002201001170124","url":null,"abstract":"There is a growing attention towards the application of Radio Frequency Identification (RFId) technology in the Fashion & Apparel supply chain. This paper describes a Lateral Trans-shipment replenishment policy enabled by item-level RFId tagging. In fact, in order to adopt a Lateral Transshipment policy, a firm should have an accurate visibility of both the inventory level in its warehouses and in each store. Such visibility can be provided by RFId technology. An analytical model has been developed to evaluate the convenience of applying a Lateral Trans-shipment policy, and the main managerial implications are discussed.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129318474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001731500530062
I. Sánchez, J. Riekki, Mikko Pyykkönen
We suggest controlling local services using an NFC capable mobile phone and RFID tags placed in the local environment behind control icons. When a user touches a control icon, a control event is sent to the corresponding service. The service processes the event and performs the requested action. We present a platform realizing this control approach and a prototype service playing videos on a wall display. We compare this touch-based control with controlling the same service using the mobile phone's keypad.
{"title":"Touch & Control: Interacting with Services by Touching RFID Tags","authors":"I. Sánchez, J. Riekki, Mikko Pyykkönen","doi":"10.5220/0001731500530062","DOIUrl":"https://doi.org/10.5220/0001731500530062","url":null,"abstract":"We suggest controlling local services using an NFC capable mobile phone and RFID tags placed in the local environment behind control icons. When a user touches a control icon, a control event is sent to the corresponding service. The service processes the event and performs the requested action. We present a platform realizing this control approach and a prototype service playing videos on a wall display. We compare this touch-based control with controlling the same service using the mobile phone's keypad.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121985032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002172900270038
J. Jantunen, I. Oliver, S. Boldyrev, Jukka Honkola
As devices become more ubiquitous and information more pervasive technologies such as Semantic Web and Space-Based computing come to the fore as a platform for user-interaction with their environment. Integrating technologies such as advanced RF memory Tag with mobile devices and combining this with computation platforms such as those supporting Semantic Web principles provides for the user innovative and novel applications.
{"title":"Agent/Space-based Computing and RF Memory Tag Interaction","authors":"J. Jantunen, I. Oliver, S. Boldyrev, Jukka Honkola","doi":"10.5220/0002172900270038","DOIUrl":"https://doi.org/10.5220/0002172900270038","url":null,"abstract":"As devices become more ubiquitous and information more pervasive technologies such as Semantic Web and Space-Based computing come to the fore as a platform for user-interaction with their environment. Integrating technologies such as advanced RF memory Tag with mobile devices and combining this with computation platforms such as those supporting Semantic Web principles provides for the user innovative and novel applications.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122034390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001729001290135
J. Dunkel, Ralf Bruns
RFID technology is usually not well integrated with business processes and backend enterprise information systems. Current enterprise information systems cannot deal with high volume of events and their complex dependencies. In this paper we propose a reference architecture for event-driven RFID applications. The key concept of the approach is complex event processing as the model for processing and managing of event-driven information systems. In order to prove the practical usefulness of the reference architecture we present a case study for tracking samples in large research laboratories using RFID.
{"title":"Reference Architecture for Event-Driven RFID Applications","authors":"J. Dunkel, Ralf Bruns","doi":"10.5220/0001729001290135","DOIUrl":"https://doi.org/10.5220/0001729001290135","url":null,"abstract":"RFID technology is usually not well integrated with business processes and backend enterprise information systems. Current enterprise information systems cannot deal with high volume of events and their complex dependencies. In this paper we propose a reference architecture for event-driven RFID applications. The key concept of the approach is complex event processing as the model for processing and managing of event-driven information systems. In order to prove the practical usefulness of the reference architecture we present a case study for tracking samples in large research laboratories using RFID.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0002194501010108
Kerstin Werner, A. Schill
Decreasing sizes and a static decline in production costs are fostering the use of RFID tags and sensors in cross-company logistics networks. Additionally, the EPCIS specification comprises interface standards for capturing and querying RFID based event data and storing it in a standardized data format. This contribution examines the potential of the given technological means for the automatic monitoring of complex inter-organizational logistics processes. We identify requirements for the monitoring of individual quality objectives using distributed event data and describe the architecture of a monitoring system addressing them. Furthermore, we argue that such a system can be nearly seamlessly integrated into existing EPCglobal compliant RFID infrastructures.
{"title":"Automatic Monitoring of Logistics Processes using Distributed RFID based Event Data","authors":"Kerstin Werner, A. Schill","doi":"10.5220/0002194501010108","DOIUrl":"https://doi.org/10.5220/0002194501010108","url":null,"abstract":"Decreasing sizes and a static decline in production costs are fostering the use of RFID tags and sensors in cross-company logistics networks. Additionally, the EPCIS specification comprises interface standards for capturing and querying RFID based event data and storing it in a standardized data format. This contribution examines the potential of the given technological means for the automatic monitoring of complex inter-organizational logistics processes. We identify requirements for the monitoring of individual quality objectives using distributed event data and describe the architecture of a monitoring system addressing them. Furthermore, we argue that such a system can be nearly seamlessly integrated into existing EPCglobal compliant RFID infrastructures.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128752062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0001738501570166
Mike Krey
The tasks and objectives of automatic identification (Auto-ID) are to provide information on goods and products. It has already been established for years in the areas of logistics and trading and can no longer be ignored by the German health care sector [3, 9]. Some German hospitals have already discovered the capabilities of Auto-ID. Improvements in quality, safety and reductions in risk, cost and time are aspects and areas where improvements are achievable. Privacy protection, legal restraints, and the personal rights of patients and staff members are just a few aspects which make the heath care sector a sensible field for the implementation of Auto-ID [4]. Auto-ID in this context contains the different technologies, methods and products for the registration, provision and storage of relevant data [6] With the help of a quantifiable and science-based evaluation, an answer is sought as to which Auto-ID has the highest capability to be implemented in health care business.
{"title":"Evaluation of Automatic Identification Technologies (Auto-ID) to be Implemented in the Health Care Sector","authors":"Mike Krey","doi":"10.5220/0001738501570166","DOIUrl":"https://doi.org/10.5220/0001738501570166","url":null,"abstract":"The tasks and objectives of automatic identification (Auto-ID) are to provide information on goods and products. It has already been established for years in the areas of logistics and trading and can no longer be ignored by the German health care sector [3, 9]. Some German hospitals have already discovered the capabilities of Auto-ID. Improvements in quality, safety and reductions in risk, cost and time are aspects and areas where improvements are achievable. Privacy protection, legal restraints, and the personal rights of patients and staff members are just a few aspects which make the heath care sector a sensible field for the implementation of Auto-ID [4]. Auto-ID in this context contains the different technologies, methods and products for the registration, provision and storage of relevant data [6] With the help of a quantifiable and science-based evaluation, an answer is sought as to which Auto-ID has the highest capability to be implemented in health care business.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"115 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124090468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.5220/0003027200400052
A. Laurence, Jérôme Le Moulec, J. Madelaine, Ivan Bedini
This paper presents a platform called IOTA, an open implementation of the EPCglobal architecture. It aims to collect and to store events about object involving in a given supply chain. Iota uses a Petri net simulator to emulate the lower layers including the RFID readers. Iota focuses on the design of a non centralized Discovery Services and experiments in a real network environment. This paper presents the experiments of a solution for distributed Discovery Services and its impact on the overall architecture in terms of performance issues.
{"title":"Experiments of Discovery Services Interconnection","authors":"A. Laurence, Jérôme Le Moulec, J. Madelaine, Ivan Bedini","doi":"10.5220/0003027200400052","DOIUrl":"https://doi.org/10.5220/0003027200400052","url":null,"abstract":"This paper presents a platform called IOTA, an open implementation of the EPCglobal architecture. It aims to collect and to store events about object involving in a given supply chain. Iota uses a Petri net simulator to emulate the lower layers including the RFID readers. Iota focuses on the design of a non centralized Discovery Services and experiments in a real network environment. This paper presents the experiments of a solution for distributed Discovery Services and its impact on the overall architecture in terms of performance issues.","PeriodicalId":164388,"journal":{"name":"International Workshop on RFID Technology","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131828637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}