Framework for Testing Critical Technology Systems’ Reliability in Space

2018 ◽  
Vol 2 (12) ◽  
Author(s):  
Gnanesswaran Vettrivel

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.

2018 ◽  
Vol 1 (03) ◽  
Author(s):  
Vettrivel Gnaneswaran

Radio frequency identification (RFID) system is an automatic data capturing system that relies on remotely retrieving data stored on tags using devices called readers. The National Aeronautics and Space Administration (NASA) and a team of contractors, university researchers and technology vendors collaborated to investigate the reliability of RFID systems for automated crew-free inventory control aboard the ISS. In this manuscript we detail the decade long research accomplishments and the maturity of this RFID technology that is being currently used in Space for inventory management.


2021 ◽  
Author(s):  
Narges Kasiri

Radio Frequency Identification (RFID) technology is one of the latest product tracking technologies being utilized by retailers. Operations management improvements were among the first recognized applications of this technology earlier in the century. RFID applications in managing retail operations, such as inventory management and control, lead to significant benefits. However, RFID applications are not limited to operations management and go beyond the operations side to offer improvements in other areas in retail such as marketing and managing customers’ shopping experiences. In this research, we review the applications of RFID technology in retail since its introduction and how those applications have evolved over the last two decades to help retailers provide omnichannel services to their customers in the current market. We will demonstrate what strategic and tactical factors have helped retailers implement this technology and what factors have slowed down the process of adoption. We will also report on the latest status of the utilization of RFID in the retail sector.


Author(s):  
Jaspal Singh

This paper discusses the implementation of Radio Frequency Identification (RFID) in Supply Chain Management (SCM) to control inventory, tracking of object, supply chain management in warehouses, stores, etc. and benefits of RFID Technology. Various RFID systems can be obtained by combining different tags, readers, frequencies and levels of tagging, etc.


2014 ◽  
Vol 552 ◽  
pp. 373-376
Author(s):  
Zhi Yuan Fu ◽  
Jing Yu Hu ◽  
Xu Bing Chen

In order to solve the practical issues that the management of container inventory is difficult, time-consuming and overuse of manpower in manufacturing enterprises.A method is presented for the material container inventory management, that is, through radio frequency identification technology to achieve positioning and quantity of material containers. Then, the traditional manual inventory becomes automatic inventory which occurs at each container’s transfer process. The material container inventory management based on RFID is designed in the paper through the introduction of the applied RFID technology, architecture system design, hardware selection and software design. At last the practicability and superiority of the system is tested by run the system in a factory.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2021 ◽  
pp. 28-35
Author(s):  
N. Yu. Barkova

The article considers ways to use the technology of radio frequency identification of data in retail companies. The author studies the traditional directions of using RFID technology, such as identification of data on the goods carried out at its acceptance, tracking the movement of goods along the supply chain, accounting of commodity units when loading into the vehicle and when picking the order, inventory of the goods. The paper also considers promising, but at the moment little common areas of application of technology in retail: personal digital assistants for managing the placement of goods on the shelves of the store, “smart fitting,” systems for automatic payment of goods and some others. Today, RFID technology can also be used for marketing research, to prevent theft in stores, to organize an improved customer service, to create inventory management systems. The author highlights the advantages received by retailers when applying RFID technology, and the barriers that prevent its active implementation.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2008 ◽  
Vol 3 (1) ◽  
pp. 55-70
Author(s):  
Dharmaraj Veeramani ◽  
Jenny Tang ◽  
Alfonso Gutierrez

Radio frequency identification (RFID) is a rapidly evolving technology for automatic identification and data capture of products. One of the barriers to the adoption of RFID by organizations is difficulty in assessing the potential return on investment (ROI). Much of the research and analyses to date of ROI in implementing RFID technology have focused on the benefits to the retailer. There is a lack of a good understanding of the impact of RFID at upper echelons of the supply chain. In this paper, we present a framework and models for assessing the value of RFID implementation by tier-one suppliers to major retailers. We also discuss our real-life application of this framework to one of Wal-Mart’s top 100 suppliers


Sign in / Sign up

Export Citation Format

Share Document