scholarly journals Reader–Tag Commands via Modulation Cutoff Intervals in RFID Systems

2021 ◽  
Vol 13 (9) ◽  
pp. 235
Author(s):  
Abdallah Y. Alma’aitah ◽  
Mohammad A. Massad

Radio frequency identification (RFID) technology facilitates a myriad of applications. In such applications, an efficient reader–tag interrogation process is crucial. Nevertheless, throughout reader–tag communication, significant amounts of time and power are consumed on inescapable simultaneous tag replies (i.e., collisions) due to the lack of carrier sensing at the tags. This paper proposes the modulation cutoff intervals (MCI) process as a novel reader–tag interaction given the lack of carrier sensing constraints in passive RFID tags. MCI is facilitated through a simple digital baseband modulation termination (DBMT) circuit at the tag. DBMT detects the continuous-wave cutoff by the reader. In addition, DBMT provides different flags based on the duration of the continuous-wave cutoff. Given this capability at the tag, the reader cuts off its continuous-wave transmission for predefined intervals to indicate different commands to the interrogated tag(s). The MCI process is applied to tag interrogation (or anti-collision) and tag-counting protocols. The MCI process effect was evaluated by the two protocols under high and low tag populations. The performance of such protocols was significantly enhanced with precise synchronization within time slots with more than 50% and more than 55.6% enhancement on time and power performance of anti-collision and counting protocols, respectively. Through the MCI process, fast and power-efficient tag identification is achieved in inventory systems with low and high tag mobility; alternatively, in addition to the rapid and power efficient interaction with tags, anonymous tag counting is conducted by the proposed process.

2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Hugo Landaluce ◽  
Laura Arjona ◽  
Asier Perallos ◽  
Lars Bengtsson ◽  
Nikola Cmiljanic

One of the main existing problems in Radio Frequency Identification (RFID) technology is the tag collision problem. When several tags try to respond to the reader under the coverage of the same reader antenna their messages collide, degrading bandwidth and increasing the number of transmitted bits. An anticollision protocol, based on the classical Binary Tree (BT) protocol, with the ability to decrease the number of bits transmitted by the reader and the tags, is proposed here. Simulations results show that the proposed protocol increases the throughput with respect to other recent state-of-the-art protocols while keeping a low energy consumption of a passive RFID system.


2020 ◽  
Vol 2020 ◽  
pp. 1-8
Author(s):  
Adnan Mehmood ◽  
Han He ◽  
Xiaochen Chen ◽  
Aleksi Vianto ◽  
Ville Vianto ◽  
...  

This paper introduces ClothFace, a shirtsleeve-integrated human-technology interface platform, which comprises two wrist antennas and three radio frequency identification (RFID) integrated circuits (ICs), each with a unique ID. The platform prototype, which is created on a shirtsleeve by cutting the antennas and antenna-IC interconnections from copper tape, can be used for push button and swipe controlling. Each IC can be activated, i.e., electrically connected to the two antennas, by touching the IC. These ICs can act as wireless input buttons to the technology around us. Due to the used passive ultrahigh-frequency (UHF) RFID technology, there is no need for clothing-integrated energy sources, but the interface platform gets all the needed energy from an external RFID reader. The platform prototype was found to be readable with an external RFID reader from all directions at distances of 70–80 cm. Further, seven people giving altogether 1400 inputs tested the prototype sleeves on a table and on body. In these first tests, 96–100% (table) and 92–100% (on-body) success rates were achieved in a gamelike testing setup. Further, the platform was proved to be readable with an off-the-shelf handheld RFID reader from a distance of 40 cm. Based on these initial results, this implementation holds the potential to be used as a touch interface blended into daily clothing, as well as a modular touch-based interaction platform that can be integrated into the surfaces of electronic devices, such as home appliances.


Author(s):  
Atmiasri ◽  
Eko Andris Kosmono

The development of information technology has now been widely used to facilitate, accelerate, and streamline work. The recording system that is still being applied is a type of recording using a manual system using paper media and is inefficient when viewed from a time perspective, recapitulating attendance data and the accuracy or authenticity of the data presented. There is still a frequent habit of voting in the village head elections or not being present at the voting process. Contrary to these problems, this research has developed a recording system using RFID (Radio Frequency Identification) technology. RFID will use sensors to read data. The use of RFID which can make it easier for KPPS officers at TPS. The use of both active and passive RFID technology is able to help record and move data in KPPS, Use of RFID technology, data will be recorded only by passing through a sensor reader on the device, thus the attendance data present by pilkades participants will be stored automatically in storage. So that the attendance of election participants will be easier to do, faster and avoid human error or fraud in the absence of pilkades


Author(s):  
Nur’Aifaa Zainudin ◽  
Hairulnizam Mahdin ◽  
Deden Witarsyah ◽  
Mokhairi Makhtar ◽  
Mohd Izuan Hafez Ninggal ◽  
...  

RFID technology is a Radio frequency identification system that provides a reader reading the data item from its tag. Nowadays, RFID system has rapidly become more common in our life because of its autonomous advantages compared to the traditional barcode. It can detect hundreds of tagged items automatically at a time. However, in RFID, missing tag detection can occur due to signal collisions and interferences. It will cause the system to report incorrect tag’s count due to an incorrect number of tags being detected. The consequences of this problem can be enormous to business, as it will cause incorrect business decisions to be made. Thus, a Missing Tag Detection Algorithm (MTDA) is proposed to solve the missing tag detection problem. There are many other existing approaches has been proposed including Window Sub-range Transition Detection (WSTD), Efficient Missing-Tag Detection Protocol (EMD) and Multi-hashing based Missing Tag Identification (MMTI) protocol. The result from experiments shows that our proposed approach performs better than the other in terms of execution time and reliability.


2013 ◽  
Vol 284-287 ◽  
pp. 2657-2661
Author(s):  
Wei Cheng Lin ◽  
Ching Chun Lan ◽  
Long Kun Lee ◽  
Kai Yang Luo ◽  
Wei Zhou Hong

This paper presents a brand new hardware framework of wireless personal area monitoring system (WPAMS) in order to form a point-to-point simply connected personal area identification network with the applications of ubiquitous monitoring personal valuable belongings. The WPAMS consists of sub-1GHz radio frequency identification (RFID) interrogator subsystem, antenna subsystem and passive RFID transponder subsystem with salient features of low-cost, tiny and power-efficient. The hardware frameworks of two commercial interrogator prototypes have been identified and simulated. With the connection of 5.7dBi right-hand circularly polarized antenna and in the adherence of local power regulation (within 1watt), the identified range of all types of commercial transponders from sideward and upward directions can be reached to 2 meters. The current PCB size of interrogator is 88mm45mm and can be reduced in the near future.


Author(s):  
Diane A. Desierto

This paper describes Bayan Muna et al. v. Mendoza et al., a 2009 Philippine Supreme Court petition involving the first and ongoing certiorari challenge to the Philippine government’s implementation of passive Radio Frequency Identification (RFID) technology in the registration of all motor vehicles in the Philippines. As a matter of constitutional jurisprudence and policy, the passive use of RFID technology in this context does not infringe constitutionally-protected privacy expectations, entirely consistent with the Executive Branch’s law enforcement powers. The paper shows how the proposed RFID tagging of motor vehicles in the Philippines satisfies the tests of reasonable expectations, and by dealing only with already publicly available information, avoids spectral fears of data mining and government abuse.


2012 ◽  
Vol 573-574 ◽  
pp. 233-238
Author(s):  
Wu Wen ◽  
Mao Zhu Jin ◽  
Pei Yu Ren

A growing number of organizations around the world are considering the implementation of radio frequency identification (RFID) systems to improve their business and operations processes in project management of the environment friendly industry. Environment friendly industry attempts to effectively obtain real-time information and enhance dynamic control and management via information sharing and analysis from involved participants to effective production and reduce conflicts. RFID technology is used in a great number of possible applications, like product tracking, animal identification, inventory systems and others. The paper (born from the authors’ experience on the field) introduces a new methodological framework in order to face the feasibility study for the application of the RFID technology, illustrating two cases in the environment friendly industry that today have exceeded the experimentation phase.


Data Mining ◽  
2013 ◽  
pp. 1778-1793
Author(s):  
Diane A. Desierto

This paper describes Bayan Muna et al. v. Mendoza et al., a 2009 Philippine Supreme Court petition involving the first and ongoing certiorari challenge to the Philippine government’s implementation of passive Radio Frequency Identification (RFID) technology in the registration of all motor vehicles in the Philippines. As a matter of constitutional jurisprudence and policy, the passive use of RFID technology in this context does not infringe constitutionally-protected privacy expectations, entirely consistent with the Executive Branch’s law enforcement powers. The paper shows how the proposed RFID tagging of motor vehicles in the Philippines satisfies the tests of reasonable expectations, and by dealing only with already publicly available information, avoids spectral fears of data mining and government abuse.


2015 ◽  
Vol 3 ◽  
pp. 475-481
Author(s):  
Ondrej Maslák ◽  
Ivana Andrisková

This article discusses the topic of labeling postal shipments by passive radio frequency identification (RFID) tags. Every delivery company needs to have all necessary information for every single postal shipment package it carries. Shipment package labeling is essential for processing and tracking the postal shipments along its delivery process. Using RFID technology for the process brings advantages in more efficient delivery and data collection along with regular information updates of shipment status across complete delivery chain.In this article, we focused on the problem of logical log of key shipment package information into EPC memory of the RFID smart label. We have taken into account the National postal administrator and its current system of shipment labeling. In the end, we presented a design for conversion of contemporary labeling using bar codes into labeling using RFID tags.


Sign in / Sign up

Export Citation Format

Share Document