scholarly journals Smart Security System for Health Centers

2018 ◽  
Vol 7 (2.24) ◽  
pp. 220
Author(s):  
Gayathri V ◽  
Suprajha Kanna ◽  
Umamakeswari A

In the modern world, Radio Frequency identification system plays a major role that automatically identifies and tracks tag attached to an object. RFID technology has  been extensively used in many areas including agriculture, manufacturing, healthcare, transportation, etc. RFID  system can be used in hospitals to increase the safety of patients by providing an RFID tag to the persons who visit them including doctors, nurses, and relatives. This method can be used along with a door lock but in the case of emergency, it becomes risky. Also, the same method can be used for secured access to pharmaceutical supplies which avoid illegal access to the medicines.  Sensor network which is the core of IoT technology can be integrated with the RFID system to make it more efficient to be deployed in several application services. In this paper, a solution is proposed that can integrate the RFID system with the IoT technology by using IR sensors which help to get rid of illegal entry or access in hospitals. 

2011 ◽  
Vol 314-316 ◽  
pp. 1325-1329
Author(s):  
Lei Xu ◽  
Hui Ming Huang

Radio frequency identification (RFID) technology may be applied to cylindrical objects, but the curving of an RFID tag brings on an increase in resonant frequency of the tag antenna. The tag can not function in an excessively curving case, since the deviation of the antenna resonant frequency from working frequency makes a reduction in inductive energy supplied by a transmitter. The variation in antenna resonant frequency is dependant upon column radius of the cylinder and curving angle of the tag. Analytically, it is found that a reduction in central distance, which is determined by column radius and curving angle, between compound straight tracks leads to the decreasing of overall antenna-coil inductance after the curving of the tag. By introducing a curving turn exponent, the overall antenna-coil inductance is calculated. After neglecting the less variation in overall tag capacitance, the antenna resonant frequency may be estimated. The result provides an instruction for designing a curving tag antenna to fit the tag antenna resonant frequency for working frequency of an RFID system.


2019 ◽  
Vol 8 (3) ◽  
pp. 37 ◽  
Author(s):  
Ghaith Khalil ◽  
Robin Doss ◽  
Morshed Chowdhury

Counterfeiting has always been a concern, costing a significant amount of money and causing losses in international trading markets. Radio frequency identification (RFID) tag Anti-counterfeiting is a conceptual solution that has received attention in the past few years. In this article, we present a survey study on the research topic of anti-counterfeiting products using RFID tags on merchandise. As this issue evolved in industry, there were several techniques used to address the problem; each technique uses a different concept and mechanism in resolving the issue. Each technique also has different pros and cons which we will address at the end of this paper with our findings. As we explore RFID technology and its implementation, we will discuss previous research before proceeding to the core of the topic of RFID Anti-counterfeiting based on the methods used. We compare the different techniques used at the end of the paper.


2019 ◽  
Vol 36 (4) ◽  
pp. 13-16
Author(s):  
Hirak Jyoti Hazarika ◽  
S. Ravikumar

Purpose The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions. Design/methodology/approach The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software. Findings From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users Research limitations/implications There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port. Practical implications This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET. Originality/value This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.


Author(s):  
HENDI HANDIAN RACHMAT ◽  
GILBERT ALLEGRO HUTABARAT

ABSTRAKPada penelitian ini, sistem RFID (Radio Frequency Identification) dimanfaatkan sebagai kartu identifikasi personal pada sistem akses ruangan. Keberadaan sistem ini ditujukan untuk menjaga keamanan dan privasi ruangan dari seseorang yang tidak memiliki otoritas untuk memasuki ruangan tersebut. Melalui perancangan dan implementasi sistem akses ruangan ini, dilakukan evaluasi sistem kerja kunci elektrik berbasis komponen solenoid serta jarak dan posisi optimal pembacaan RFID tag guna memberikan kenyamanan pada pengguna ketika mengakses ruangan. RFID tag yang dipergunakan dalam sistem ini berbentuk kartu tipe EM4001 dan menyimpan kode unik yang digunakan sebagai identifikasi personal. Kode ini dibaca oleh RFID reader tipe ID-12 dan divalidasi otoritasnya dengan mikrokontroler ATMega32 untuk mengatur sistem kerja kunci elektrik yang dirancang sendiri menggunakan solenoid. Sistem ini dilengkapi pula dengan sistem database untuk pencatatan pengguna yang mengakses ruangan. Dari hasil pengujian, seluruh (100%) RFID tag dapat dikenali oleh RFID reader dalam tiga posisi berbeda dengan jarak optimal sejauh 5 cm (vertikal) dan 2 cm (horisontal). Keseluruhan (100%) aktifitas pengguna yang mengakses ruangan dapat tercatat dalam sistem database. Hasil penelitian ini dapat disimpulkan bahwa teknologi RFID dapat digunakan secara nyaman dan aman sebagai alternatif sistem identifikasi personal untuk sistem akses ruangan.Kata Kunci: kunci elektrik, RFID, sistem akses ruangan, sistem database, solenoid.ABSTRACTIn this research, RFID system was utilized as a personal identification security card in access room system. This system was aimed to secure a room and to have privacy from unauthorized person to enter the room. By designing and implementing the system, a solenoid based electric key system as well as an optimal distance and position of RFID tag were evaluated to know the most convenience condition for all users during accessing the room. RFID tag used in this system was a card type of EM4001 that has a unique code as a personal identification. This code was read by an ID-12 RFID reader and then validated by microcontroller ATMega32 to control a customized electric key. This system was also equipped with database system to record some users who accessing the room. The results showed that 100% of RFID tag could be read by RFID reader in three different positions with optimum distance of 5cm vertically and 2cm horizontally. All users’ activities during accessing the room have been recorded successfully by database system. This research concluded that RFID technology could be applied conveniently and securely as an alternative of personal identification system to access a room.Keywords: Access room system, database system, electric key, RFID, solenoid.


2021 ◽  
Vol 13 (7) ◽  
pp. 3684
Author(s):  
Bibiana Bukova ◽  
Jiri Tengler ◽  
Eva Brumercikova

The paper focuses on the environmental burden created by Radio Frequency Identification (RFID) tags in the Slovak Republic (SR). In order to determine the burden there, a model example was created to calculate electronic waste produced by households in the SR by placing RFID tags into municipal waste. The paper presents a legislative regulatory approach towards the environmental impacts from using RFID tags in the SR, as well as an analysis of the environmental burden of using RFID tags throughout the world. The core of the paper is focused on the research conducted in order to calculate the environmental burden of a model household in the SR, where the number of used RFID tags per year was observed; then, the volume of e-waste produced by households of the Slovak Republic per year was determined. In the conclusion, we provide the results of the research presented and discuss including our own proposal for solving the problems connected with the environmental burden of RFID technology.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


ForScience ◽  
2019 ◽  
Vol 7 (2) ◽  
Author(s):  
Cátia Valéria Dos Santos Passos Brito ◽  
Welson Barbosa Dos Santos ◽  
Cristiane Xavier Galhardo ◽  
Vivianni Marques Leite dos Santos

A realização de um inventário não é uma tarefa fácil, principalmente em universidades federais, que possuem muitos bens permanentes. A gestão patrimonial é realizada através de procedimentos de identificação, tombamento, localização, contagem, preservação e desfazimento de bens. Devido a grande quantidade de informações e necessidade de segurança, confiabilidade e celeridade nos processos, deve-se buscar alternativas para melhorar a gestão, reduzir índices de não conformidades e aprimorar o planejamento de compras. O sistema RFID (Radio-Frequency Identification), por exemplo, funciona por meio da comunicação via radiofrequência, com uso de um chip passivo inserido em etiqueta inteligente. Dessa forma, o objetivo deste artigo é analisar a viabilidade do uso da tecnologia RFID para o aperfeiçoamento da gestão patrimonial na Universidade Federal do Vale do São Francisco - Univasf por meio do levantamento de suas vantagens, desvantagens e custos para implantação. Para isto, são realizadas pesquisas em periódicos e bases de patentes, além da realização de entrevistas e análise documental. Entre os principais resultados, constata-se que o processo de gerenciamento de bens da Univasf é realizado de forma manual e desgastante para servidores membros de comissão, para a qual são convocados sem consulta prévia, verificando-se ainda que os prazos são, comumente, ultrapassados. Por outro lado, o custo para implantação do sistema RFID para controle do número atual de bens da Univasf corresponde a apenas 0,78% do valor alocado para as ações orçamentárias referentes às despesas correntes e investimentos, constituindo fatores favoráveis a sua aquisição pela Instituição.Palavras-chave: Radiofrequência. Gestão patrimonial. Universidades públicas. Internet das coisas. Smart tags in the public administration: feasibility analysis in thepatrimonial control of the UNIVASFAbstractThe construction of an inventory is not an easy task, especially at federal universities, which have many permanent assets. The patrimonial management is carried through procedures of identification, tipping, localization, counting, preservation and undoing of assets. Due to the large amount of information and the need for security, reliability and speed in the processes, alternatives should be sought to improve management, reduce nonconformity rates, and improve procurement planning. The RFID (Radio Frequency Identification) system, for example, works by means of radio frequency communication, using a passive chip inserted in a smart tag. Thus, the objective of this paper is to analyze the feasibility of using RFID technology to improve asset management at the Federal University of Vale do São Francisco -Univasf by surveying its advantages, disadvantages and costs for implementation. For this, research is carried out in journals and patent bases, as well as interviews and document analysis. Among the main results, it can be seen that Univasf's asset management process is carried out manually and exhausting for commission member servers, to which they are summoned without prior consultation, and it is also verified that the deadlines are commonly outdated. On the other hand, the cost of implementing the RFID system to control Univasf's current number of assets corresponds to only 0.78% of the amount allocated to budget actions related to current expenses and investments, constituting favorable factors for their acquisition by the Institution.Keywords: Radiofrequency. Patrimonial Management. Public universities. Internet of things. 


2012 ◽  
Vol 85 ◽  
pp. 59-64
Author(s):  
Hiromasa Nakajima ◽  
Masaharu Takahashi ◽  
Kazuyuki Saito ◽  
Koichi Ito

Radio frequency identification (RFID) system has been expected to be expanded in new fields. This paper shows a sensing system for urination by embedding an RFID tag into a paper diaper. The urination could be checked by change of the antenna characteristics. It could be possible to reduce physical and mental strain of both patients and their care personnel. In order to detect the urination, the RFID antenna was designed and the characteristics of the antenna were calculated. In addition, the antenna characteristics were measured with a phantom. As the result, urination considerably changes the antenna characteristics and that the system can be used to detect the urination.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hugo Landaluce ◽  
Laura Arjona ◽  
Asier Perallos ◽  
Lars Bengtsson ◽  
Nikola Cmiljanic

One of the main existing problems in Radio Frequency Identification (RFID) technology is the tag collision problem. When several tags try to respond to the reader under the coverage of the same reader antenna their messages collide, degrading bandwidth and increasing the number of transmitted bits. An anticollision protocol, based on the classical Binary Tree (BT) protocol, with the ability to decrease the number of bits transmitted by the reader and the tags, is proposed here. Simulations results show that the proposed protocol increases the throughput with respect to other recent state-of-the-art protocols while keeping a low energy consumption of a passive RFID system.


This study represents a device to identify the location of an Autism Spectrum Disorder(ASD) child using an Radio Frequency Identification (RFID). This is a wearable device, that is to be worn by the autism child, which allows the parent to track the child anytime, anywhere .The RFID technology is implied for the location tracking, The RFID Tag is affixed on the device, the reader which is supposed to sense the RFID tag is placed at the spots such as classroom etc. The reader when it senses the tag notifies the parent through a message. When an RFID tag passes through the electromagnetic zone, it detects the activation signal produced by the reader. The encoded data present in the integrated circuit of the tag is being encoded by the reader and the data is delivered to the host computer for processing. The location can be sent to parent in the form of a normal text message via GSM. Autism children deserve to acquire knowledge and explore the environment. To overcome the obstruction this device will be of immense help.


Sign in / Sign up

Export Citation Format

Share Document