The Use of Embedded Mobile, RFID, and Augmented Reality in Mobile Devices

2013 ◽  
pp. 126-137
Author(s):  
Greg Gogolin

The proliferation of mobile devices such as smart phones and other handheld devices has stimulated the development of a broad range of functionality, including medical, retail, and personal applications. Technology that has been leveraged to enable many of these uses includes radio frequency identification (RFID), embedded mobile, and augmented reality. RFID involves communication between a tag and a reader. Mobile RFID extends the technology by tagging the mobile device with an RFID tag to perform tasks on the device. Embedded mobile refers to preprogrammed tasks that are performed on a mobile device. Personal care and monitoring is one of the most common uses of embedded mobile. Augmented reality involves the use of computer generated or enhanced sensory input such as audio and visual components to enhance the perception of reality. This is commonly used in situations such as video games where there is feedback in the game controllers.

2017 ◽  
Vol 8 (1) ◽  
pp. 42-52 ◽  
Author(s):  
Greg Gogolin ◽  
Erin Gogolin

The proliferation of mobile devices such as smart phones and other handheld appliances has stimulated the development of a broad range of functionality, including medical, retail, gaming, and personal applications. Technology that has been leveraged to enable many of these uses includes embedded mobile, radio frequency identification, location based services, and augmented reality. Embedded mobile refers to preprogrammed tasks that are performed on a mobile device. Personal care and monitoring is one of the most common uses of embedded mobile. RFID involves communication between a tag and a reader. Mobile RFID extends the technology by tagging the mobile device with an RFID tag to perform tasks on the device. Near field communication is frequently utilized in mobile payment systems. Advertisers find this of significant use in focusing advertisements based on the location of an individual. Augmented reality involves the use of computer generated or enhanced sensory input such as audio and visual components to enhance the perception of reality.


Author(s):  
Miguel A. Sánchez-Acevedo ◽  
Beatriz A. Sabino-Moxo ◽  
José A. Márquez-Domínguez

Users who have access to a mobile device have increased in recent years. Therefore, it is possible to use a mobile device as a tool which helps to users in their daily life activities, not only for communication. On the other hand, augmented reality is a growing technology which allows the interaction with real and virtual information at the same time. Mixing mobile devices and augmented reality open the possibility to develop useful applications that users can carry with them all the time. This chapter describes recent advances in the application of mobile augmented reality in automotive industry, commerce, education, entertainment, and medicine; also identifies the different devices used to generate augmented reality, highlights factors to be taken into account for developing mobile augmented applications, introduces challenges to be addressed, and discusses future trends.


2018 ◽  
pp. 200-221 ◽  
Author(s):  
Miguel A. Sánchez-Acevedo ◽  
Beatriz A. Sabino-Moxo ◽  
José A. Márquez-Domínguez

Users who have access to a mobile device have increased in recent years. Therefore, it is possible to use a mobile device as a tool which helps to users in their daily life activities, not only for communication. On the other hand, augmented reality is a growing technology which allows the interaction with real and virtual information at the same time. Mixing mobile devices and augmented reality open the possibility to develop useful applications that users can carry with them all the time. This chapter describes recent advances in the application of mobile augmented reality in automotive industry, commerce, education, entertainment, and medicine; also identifies the different devices used to generate augmented reality, highlights factors to be taken into account for developing mobile augmented applications, introduces challenges to be addressed, and discusses future trends.


2015 ◽  
Vol 2 (2) ◽  
pp. 86-96 ◽  
Author(s):  
M. Zomorrodi ◽  
N.C. Karmakar

The electromagnetic (EM) imaging technique at mm-band 60 GHz is proposed for data encoding purpose in the chipless Radio Frequency Identification (RFID) systems. The fully printable chipless RFID tag comprises tiny conductive EM polarizers to create high cross-polar radar cross-section. Synthetic aperture radar approach is applied for formation of the tag's EM-image and revealing the tag's content. The achieved high data encoding capacity of 2 bits/cm2in this technique based on a fully printable tag is very convincing for many applications. The system immunity to multipath interference, bending effect, and printing inaccuracy suggests huge potentials for low-cost item tagging. Tags are also readable through a tick paper envelop; hence secure identification is provided by the proposed technique.


Author(s):  
Shahid Habib ◽  
Amjad Ali ◽  
Ghaffer Iqbal Kiani ◽  
Wagma Ayub ◽  
Syed Muzahir Abbas ◽  
...  

Abstract This paper presents a polarization-independent 11-bit chipless RFID tag based on frequency-selective surface which has been designed for encoding and relative humidity (RH) sensing applications. The 10 exterior U-shaped resonators are used for item encoding whereas Kapton has been incorporated with the interior resonator for RH sensing. This radio-frequency identification (RFID) tag operates in S- and C-frequency bands. The proposed design offers enhanced fractional bandwidth up to 88% with the density of 4.46 bits/cm2. Both single- and dual-layer tags have been investigated. The simulated results are in good agreement with measured results and a comparison with existing literature is presented to show the performance. Simple geometry, high code density, large frequency signature bandwidth, high magnitude bit, high radar cross-section, and angular stability for more than 75° are the unique outcomes of the proposed design. In addition, RH sensing has been achieved by integrating the Kapton on the same RFID tag.


Author(s):  
Yubao Hou ◽  
Hua Liang ◽  
Juan liu

In the traditional RFID (Radio Frequency IDentification) system, a secure wired channel communication is used between the reader and the server. The newly produced mobile RFID system is different from the traditional RFID system, the communication between the reader and the server is based on a wireless channel, and the authentication protocol is suitable for traditional RFID systems, but it cannot be used in mobile RFID systems. To solve this problem, a mutual authentication protocol MSB (Most Significant Bit) for super lightweight mobile radio frequency identification system is proposed based on bit replacement operation. MSB is a bitwise operation to encrypt information and reduce the computational load of communication entities. Label, readers, and servers authenticate first and then communicate, MSB may be used to resistant to common attacks. The security analysis of the protocol shows that the protocol has high security properties, the performance analysis of the protocol shows that the protocol has the characteristics of low computational complexity, the formal analysis of the protocol based on GNY logic Gong et al. (1990) provides a rigorous reasoning proof process for the protocol.


2019 ◽  
Vol 8 (1) ◽  
pp. 13-19
Author(s):  
Meli Mildawati ◽  
Wildian Wildian

Sistem pengaman sepeda motor menggunakan radio frequency identification (RFID) dan notifikasi melalui handphone yang dikontrol dengan modul Arduino Uno telah dirancang bangun. RFID terdiri dari sebuah RFID tag dan RFID reader. RFID tag yang memiliki kode yang berbeda-beda, digunakan sebagai kunci untuk menghidupkan sepeda motor setelah kunci kontak digunakan. RFID reader dapat membaca tag pada jarak maksimal 1,26 cm. Sepeda motor yang dihidupkan tanpa menggunakan RFID tag atau RFID tag tidak sesuai menyebabkan aktifnya reed switch pada pelek roda depan. Ketika roda telah berputar sebanyak empat kali, maka alarm aktif dan GSM SIM 800L mengirimkan notifikasi berupa SMS sebanyak satu kali dan misscall sebanyak tiga kali ke nomor handphone pemilik sepeda motor. Waktu delay rata-rata SMS dan miscall berturut-turut adalah 5,42 s, 8,62 s, 61,14 s dan 113,16 s. Kata kunci: sistem pengaman sepeda motor, RFID, Arduino Uno , reed switch, GSM SIM 800L


2008 ◽  
Vol 07 (01) ◽  
pp. 9-14 ◽  
Author(s):  
Selwyn Piramuthu

Radio Frequency Identification (RFID) is promising, as a technique, to enable tracking of essential information about objects as they pass through supply chains. Information thus tracked can be utilised to efficiently operate the supply chain. Effective management of the supply chain translates to huge competitive advantage for the firms involved. Among several issues that impede seamless integration of RFID tags in a supply chain, one of the problems encountered while reading RFID tags is that of collision, which occurs when multiple tags transmit data to the same receiver slot. Data loss due to collision necessitates re-transmission of lost data. We consider this problem when Framed Slotted ALOHA protocol is used. Using machine learning, we adaptively configure the number of slots per frame to reduce the number of collisions while improving throughput.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


Author(s):  
Ana Grasielle Dionísio Corrêa

One of the methods of teaching that has brought significant contributions to the field of education is augmented reality. This technology transformed learning into a more motivating, enjoyable, fun, and interesting activity. This chapter contributes an augmented reality application for mobile devices that complements and supports the learning of geometric figures. The application, called AGeRA, consists of a geometry book and software capable of reading special markers inserted into the book's content. When this book is placed in front of the camera of a mobile device, 3D objects, sounds, animations, and other interactive elements leap from book pages making learning more fun and exciting. Preliminary tests were made with teachers and students and showed good acceptance of the application to support the teaching of geometry.


Sign in / Sign up

Export Citation Format

Share Document