scholarly journals A High Throughput Anticollision Protocol to Decrease the Energy Consumption in a Passive RFID System

2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hugo Landaluce ◽  
Laura Arjona ◽  
Asier Perallos ◽  
Lars Bengtsson ◽  
Nikola Cmiljanic

One of the main existing problems in Radio Frequency Identification (RFID) technology is the tag collision problem. When several tags try to respond to the reader under the coverage of the same reader antenna their messages collide, degrading bandwidth and increasing the number of transmitted bits. An anticollision protocol, based on the classical Binary Tree (BT) protocol, with the ability to decrease the number of bits transmitted by the reader and the tags, is proposed here. Simulations results show that the proposed protocol increases the throughput with respect to other recent state-of-the-art protocols while keeping a low energy consumption of a passive RFID system.

2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Adnan Mehmood ◽  
Han He ◽  
Xiaochen Chen ◽  
Aleksi Vianto ◽  
Ville Vianto ◽  
...  

This paper introduces ClothFace, a shirtsleeve-integrated human-technology interface platform, which comprises two wrist antennas and three radio frequency identification (RFID) integrated circuits (ICs), each with a unique ID. The platform prototype, which is created on a shirtsleeve by cutting the antennas and antenna-IC interconnections from copper tape, can be used for push button and swipe controlling. Each IC can be activated, i.e., electrically connected to the two antennas, by touching the IC. These ICs can act as wireless input buttons to the technology around us. Due to the used passive ultrahigh-frequency (UHF) RFID technology, there is no need for clothing-integrated energy sources, but the interface platform gets all the needed energy from an external RFID reader. The platform prototype was found to be readable with an external RFID reader from all directions at distances of 70–80 cm. Further, seven people giving altogether 1400 inputs tested the prototype sleeves on a table and on body. In these first tests, 96–100% (table) and 92–100% (on-body) success rates were achieved in a gamelike testing setup. Further, the platform was proved to be readable with an off-the-shelf handheld RFID reader from a distance of 40 cm. Based on these initial results, this implementation holds the potential to be used as a touch interface blended into daily clothing, as well as a modular touch-based interaction platform that can be integrated into the surfaces of electronic devices, such as home appliances.


2011 ◽  
Vol 314-316 ◽  
pp. 1325-1329
Author(s):  
Lei Xu ◽  
Hui Ming Huang

Radio frequency identification (RFID) technology may be applied to cylindrical objects, but the curving of an RFID tag brings on an increase in resonant frequency of the tag antenna. The tag can not function in an excessively curving case, since the deviation of the antenna resonant frequency from working frequency makes a reduction in inductive energy supplied by a transmitter. The variation in antenna resonant frequency is dependant upon column radius of the cylinder and curving angle of the tag. Analytically, it is found that a reduction in central distance, which is determined by column radius and curving angle, between compound straight tracks leads to the decreasing of overall antenna-coil inductance after the curving of the tag. By introducing a curving turn exponent, the overall antenna-coil inductance is calculated. After neglecting the less variation in overall tag capacitance, the antenna resonant frequency may be estimated. The result provides an instruction for designing a curving tag antenna to fit the tag antenna resonant frequency for working frequency of an RFID system.


Author(s):  
Ching-Nung Yang ◽  
Jyun-Yan He ◽  
Yu-Ching Kun

A tag collision problem (or missed reads) in Radio Frequency Identification (RFID) system happens when multiple tags respond to a reader simultaneously. At this time, the reader cannot differentiate these tags correctly. This problem is often seen whenever a large volume of RFID tags are read together in the same radio frequency field. Tag collisions will degrade identification efficiency, and this unreliable identification will compromise the usefulness of RFID system. This chapter introduces tag collision problem and discusses tag anti-collision protocols, including ALOHA-based protocol, Binary Tree (BT) protocol, and Query Tree (QT) protocol. To date, most tag anti-collision protocols are QT protocols. Thus, in this chapter, the authors briefly describe some elegant researches on QT protocols, and also introduce their recent research results on QT protocols.


Author(s):  
Atmiasri ◽  
Eko Andris Kosmono

The development of information technology has now been widely used to facilitate, accelerate, and streamline work. The recording system that is still being applied is a type of recording using a manual system using paper media and is inefficient when viewed from a time perspective, recapitulating attendance data and the accuracy or authenticity of the data presented. There is still a frequent habit of voting in the village head elections or not being present at the voting process. Contrary to these problems, this research has developed a recording system using RFID (Radio Frequency Identification) technology. RFID will use sensors to read data. The use of RFID which can make it easier for KPPS officers at TPS. The use of both active and passive RFID technology is able to help record and move data in KPPS, Use of RFID technology, data will be recorded only by passing through a sensor reader on the device, thus the attendance data present by pilkades participants will be stored automatically in storage. So that the attendance of election participants will be easier to do, faster and avoid human error or fraud in the absence of pilkades


Author(s):  
Vishwajeet V. Jituri

The usage of RFID technology is rapidly increasing. The RFID system provides distinct advantages over the traditional barcode system. The RFID technology is being used in many areas like toll collection, shopping and retail, agriculture, transportation, industries, academics etc. There are some limitations also with the RFID technology including the privacy issues. This paper describes some of the RFID uses which result in ease of life.


2018 ◽  
Vol 38 (1) ◽  
pp. 27 ◽  
Author(s):  
Faizul Nisha

<p>Radio Frequency IDentification (RFID) as a tool is being used for the better governance and management of libraries. A RFID system offers a complete package from security, theft detection, tracking, monitoring, inventory control, and act as an expedient in books circulation or charging and discharging of books; and, lessens the burden of librarians, who could be better redeployed to other productive activities in the service of the readers. RFID technology was implemented in Defence Science Library, Defence Scientific Information &amp; Documentation Centre (DESIDOC), Delhi, in 2013. The study describes the process of implementation of RFID system in the Defence Science Library, at DESIDOC. It provides an overview of the work to implement the RFID system including the philosophy or the background or thought process that had gone into deciding in its implementation, the various features, technical specification of the library automation software and system itself. The constraints faced during the data migration and the visible advantages from the users’ perspective vis-à-vis manual operation are also covered. The study concludes that implementation of RFID technology has brought a bouquet of benefits to librarians, the staff and scientists or user of the Library. </p>


2019 ◽  
Vol 36 (4) ◽  
pp. 13-16
Author(s):  
Hirak Jyoti Hazarika ◽  
S. Ravikumar

Purpose The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions. Design/methodology/approach The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software. Findings From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users Research limitations/implications There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port. Practical implications This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET. Originality/value This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.


2013 ◽  
Vol 315 ◽  
pp. 103-107 ◽  
Author(s):  
Azli Nawawi ◽  
C.K.M. Lee ◽  
Khalid Hasnan

Remanufacturing operations deal with numerous types of used products and parts. For that reason, any missing parts will lead to the extension of remanufacturing lead-time because searching for the missing parts is time consuming. In order to detect the real-time locations for used parts, this paper proposes the application of RFID technology. A proof of concept RFID system is developed on SISCOM Assembly Cell-200. SISCOM is assumed as a small scale remanufacturing facility. The RFID system middleware is developed using LabVIEW 9 and the database is built using PHP & phpMyAdmin. With the availability of this system, the location of missing parts can be detected and the remanufacturing labor hours can be focused on value added activities.


2021 ◽  
Vol 13 (9) ◽  
pp. 235
Author(s):  
Abdallah Y. Alma’aitah ◽  
Mohammad A. Massad

Radio frequency identification (RFID) technology facilitates a myriad of applications. In such applications, an efficient reader–tag interrogation process is crucial. Nevertheless, throughout reader–tag communication, significant amounts of time and power are consumed on inescapable simultaneous tag replies (i.e., collisions) due to the lack of carrier sensing at the tags. This paper proposes the modulation cutoff intervals (MCI) process as a novel reader–tag interaction given the lack of carrier sensing constraints in passive RFID tags. MCI is facilitated through a simple digital baseband modulation termination (DBMT) circuit at the tag. DBMT detects the continuous-wave cutoff by the reader. In addition, DBMT provides different flags based on the duration of the continuous-wave cutoff. Given this capability at the tag, the reader cuts off its continuous-wave transmission for predefined intervals to indicate different commands to the interrogated tag(s). The MCI process is applied to tag interrogation (or anti-collision) and tag-counting protocols. The MCI process effect was evaluated by the two protocols under high and low tag populations. The performance of such protocols was significantly enhanced with precise synchronization within time slots with more than 50% and more than 55.6% enhancement on time and power performance of anti-collision and counting protocols, respectively. Through the MCI process, fast and power-efficient tag identification is achieved in inventory systems with low and high tag mobility; alternatively, in addition to the rapid and power efficient interaction with tags, anonymous tag counting is conducted by the proposed process.


Author(s):  
Diane A. Desierto

This paper describes Bayan Muna et al. v. Mendoza et al., a 2009 Philippine Supreme Court petition involving the first and ongoing certiorari challenge to the Philippine government’s implementation of passive Radio Frequency Identification (RFID) technology in the registration of all motor vehicles in the Philippines. As a matter of constitutional jurisprudence and policy, the passive use of RFID technology in this context does not infringe constitutionally-protected privacy expectations, entirely consistent with the Executive Branch’s law enforcement powers. The paper shows how the proposed RFID tagging of motor vehicles in the Philippines satisfies the tests of reasonable expectations, and by dealing only with already publicly available information, avoids spectral fears of data mining and government abuse.


Sign in / Sign up

Export Citation Format

Share Document