Logistic Information Perception Interactive System Formed by Combination of RFID and TC35i

2011 ◽  
Vol 52-54 ◽  
pp. 2151-2156
Author(s):  
Yuan Li Yang

By analysis on the realization for RFID (Radio Frequency Identification) technology, TC35i module of CTI (Computer Telecommunication Integration) technology, this article provided a solution and technology realization method for Logistic Information Perception Interactive System. The Logistic Information Perception Interactive System is a combinational application of Internet Of Things (IOT)) RFID, CTI and internet technology, the system consists of three levels system structure of perception level, network level and interaction level, which is supported by RFID reader, RFID logistic tag, TC35i module and other software and hardware as well as interface technologies, integrates and build logistic business flow and information perception interactive section link for supply chain, forms interactive system of RFID logistic, TC35i equipments, user mobile communication, internet communication and other sections. In the Logistic Information Perception Interactive System, it uses AT signal, API (Application Programming Interface) interface program to design short message logistic business interactive program based on TC35i and RFID, realizes isomerism application of communication, technology in terms of logistic information application means, realizes the ubiquitous links and distribution management of perception logistic.

2011 ◽  
Vol 217-218 ◽  
pp. 1349-1354
Author(s):  
Yuan Li Yang

Through the analysis on internet of things (IOT) technology, logistic information system and information perception technology, according to the requirements of modern logistic information technology and information status perception development in environment of internet of things, suggest the solution for building logistic system information perception model in the environment of internet of things. The logistic system information perception model is a combinational application of RFID (Radio Frequency Identification), internet technology and telecom technology, to build a three layer system structure of physical layer, network layer and information perception, by KBI (Key Business Index) to connect precaution affairs for each monitoring object during the logistic business flow, represent the business status by evaluation according to the regulations, establish an information perception model integrated with four cycles of information collection, event normalization, correlation analysis of information as well as warning & processing, and by evaluation method of periodicity factor for logistic information perception to quantitively evaluate on each information perception model. By example of calculation of evaluation model for periodicity factor, the logistic system information perception model in the environment of internet of things proves to be feasible.


In the workspace, when we are working at home it is vital for property holders to keep up vital records and information. In this manner, the security of the workspace entryway is extremely important to build security and it can avoid burglary when the workspace isn't utilized or relinquished. The easiest security for the entryway is introducing a manual key. Yet, manual key is anything but difficult to break. With advancement of entryway security innovation it utilizes watchword, finger check, and numerous others, yet security is just to open and shutting entryway. Yet, when the entryway was persuasively opened or harmed by hoodlums, the property holder still had no data that the entryway was broken. To conquer this issue, a framework that can supplant the manual entryway bolt to a more advanced entryway security framework is required with the goal that it is difficult to separate and can see whether the entryway is opened or harmed by a cheat. To run this framework, 3 parts are utilized, to be specific RFID card as a key re-arrangement apparatus, a sensor to gauge vibration on the entryway when it is constrained open or harmed by criminals and tells the mortgage holder by means of SMS


2019 ◽  
Vol 4 (1) ◽  
pp. 70-77
Author(s):  
Kustori Kustori

Politeknik Penerbangan Surabaya memiliki Laboratorium Airfield Lighting System yang sudah menggunakan Fingerprint dalam pengoperasiannya, tetapi karena kurangnya pengawasan terhadap suatu alat yang akan dipinjam mengakibatkan hilangnya barang atau peralatan yang ada pada laboratorium. Permasalahan yang dikaji dalam penelitian ini adalah belum adanya pengawasan terhadap peminjaman alat yang ada pada laboratorium Airfield Lighting System serta kurangnya sisi keamanan pada laboratorium. Penulisan penelitian ini bertujuan untuk merancang suatu sistem proteksi otomatis pada laboratorium Airfield Lighting System Politeknik Penerbangan Surabaya dengan menggunakan Motion Detector sebagai pendeteksi gerakan manusia, Radio Frequency Identification (RFID) sebagai pendeteksi peralatan dan CCTV sebagai Monitor keadaan yang ada pada laboratorium. Pengontrolan dilakukan secara wireless yaitu dengan menggunakan media Short Message Service (SMS). Hasil dari rancangan ini adalah terciptanya suatu alat bantu untuk memonitor peminjaman alat yang ada pada laboratorium dan menambah sistem keamanan untuk mencegah terjadinya pencurian pada laboratorium Airfield Lighting System


2021 ◽  
Vol 17 (4) ◽  
pp. 122-131
Author(s):  
V. R. Niveditha ◽  
D. Usha ◽  
P. S. Rajakumar ◽  
B. Dwarakanath ◽  
Magesh S.

Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).


2021 ◽  
Vol 4 (2) ◽  
pp. 127-133
Author(s):  
Anggi Martua Valentino Sianipar ◽  
Solikhun Solikhun ◽  
Widodo Saputra ◽  
Iin Parlina ◽  
Zulaini Masruro Nasution

In the era of the industrial revolution 4.0 today, many technologies are used by humans to help their daily activities, one of which is in the field of home door security. To improve the security of home doors, we can use the Arduino Mega2560 as a control center, we can design a prototype for a door security system using E-KTP which is equipped with several sensors to improve the security of the door that is used as access for entry and exit. E-KTP is a card that is used as a person's identification and can also be used as a tool to open the door in the design of this tool, because in it there is a chip that can be read using electromagnetic waves. RFID (Radio Frequency Identification) is a sensor that can be used to read E-KTP, and to control it remotely, we can use the SMS (Short Message Service) service that is on every Cellphone / Smartphone so that the security of the house door is better because it is also equipped with Magnetic sensors and Buzzer as security if the door is forced to open by an irresponsible person.


Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


2012 ◽  
Vol 203 ◽  
pp. 139-141 ◽  
Author(s):  
Wen Ding

the IOT (Internet of Things) technology is another major breakthrough in the contemporary information technology, a new information technology outcome after the computer and Internet technology which is very important to change the way of our future life and production. This paper studies the composing principles of the IOT system and analyzes the application of RFID (radio frequency identification) technology in the IOT in detail.


2013 ◽  
Vol 722 ◽  
pp. 389-392
Author(s):  
Su Xu ◽  
Wan Li Teng

Along with the increase of the number of motor vehicles in urban areas, the relatively backward parking lot management has resulted in many problems such as the difficulty of parking and chaos management. In this paper, a RFID-based vehicle intelligent management system is designed, and its system structure, working flow and software design idea are also introduced in details. This intelligent vehicle management system is cored at ultrahigh RFID (radio frequency identification device), in which legal vehicles are unnecessary to stop in entering and exiting, and also all identification and judgment are automatically implemented by the system from a remote distance.


2015 ◽  
pp. 735-752
Author(s):  
Shu Wen Lee ◽  
Pek Hia Lai

Most governments around the world have implemented or are in the midst of implementing electronic government (e-Government). E-Government has its share of advantages, disadvantages and limitations. The rise of mobile technologies can be seen as the answer to complement e-Government. With the high adoption level of mobile devices and the rising demands for instant information and interactions with government bodies, mobile government (m-Government) is born. Unlike e-Government, m-Government is not restricted to being internet-based. Different wireless or mobile communication modes such as Short Message Service (SMS), mobile applications, and Radio Frequency Identification (RFID) have provided different avenues to implement or enhance M-Government. Both e-Government and m-Government implementations create different values for the different stakeholders. This chapter examines an e-Government and m-Government Component Assessment Cube Framework for value assessment of both e-Government and m-Government information technology project implementations. The three main groups explored in the framework are namely (value) components, stages, and stakeholders.


Sign in / Sign up

Export Citation Format

Share Document