An Estimation of Resonant Frequency of a Curving RFID Tag

2011 ◽  
Vol 314-316 ◽  
pp. 1325-1329
Author(s):  
Lei Xu ◽  
Hui Ming Huang

Radio frequency identification (RFID) technology may be applied to cylindrical objects, but the curving of an RFID tag brings on an increase in resonant frequency of the tag antenna. The tag can not function in an excessively curving case, since the deviation of the antenna resonant frequency from working frequency makes a reduction in inductive energy supplied by a transmitter. The variation in antenna resonant frequency is dependant upon column radius of the cylinder and curving angle of the tag. Analytically, it is found that a reduction in central distance, which is determined by column radius and curving angle, between compound straight tracks leads to the decreasing of overall antenna-coil inductance after the curving of the tag. By introducing a curving turn exponent, the overall antenna-coil inductance is calculated. After neglecting the less variation in overall tag capacitance, the antenna resonant frequency may be estimated. The result provides an instruction for designing a curving tag antenna to fit the tag antenna resonant frequency for working frequency of an RFID system.

2012 ◽  
Vol 85 ◽  
pp. 59-64
Author(s):  
Hiromasa Nakajima ◽  
Masaharu Takahashi ◽  
Kazuyuki Saito ◽  
Koichi Ito

Radio frequency identification (RFID) system has been expected to be expanded in new fields. This paper shows a sensing system for urination by embedding an RFID tag into a paper diaper. The urination could be checked by change of the antenna characteristics. It could be possible to reduce physical and mental strain of both patients and their care personnel. In order to detect the urination, the RFID antenna was designed and the characteristics of the antenna were calculated. In addition, the antenna characteristics were measured with a phantom. As the result, urination considerably changes the antenna characteristics and that the system can be used to detect the urination.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 391
Author(s):  
Soumyasanta Rakshit ◽  
Dr. S. S. Sridhar

Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID. RFID has three building blocks: small tags built around microchips that carry a digital identification code; The RFID scanners also known as readers, the readers are also known as interrogators and networking hardware and the software to link scanners to the main computer databases that can be in hardware or cloud storage. In this project, we describe the implementation of RFID technology in the platform of asset management system in an organization. Using RFID technology track the all of the assets is the main aim of the project. The RFID interrogators open a serial port and then reads a RFID tag to use it as a unique parameter in the database to access and show the record associated to the RFID chip. Any change is wirelessly synchronized to the main database server.An admin will look after the whole server as an administration. If any new asset is introduced which is not in the main database, when the RFID scanner detects that the admin will get a notification message also in anyway if any asset will tamper by anything or anyone or if someone will try to steal any asset then again, the admin will get a notification message instantly.


Author(s):  
Ching-Nung Yang ◽  
Jyun-Yan He ◽  
Yu-Ching Kun

A tag collision problem (or missed reads) in Radio Frequency Identification (RFID) system happens when multiple tags respond to a reader simultaneously. At this time, the reader cannot differentiate these tags correctly. This problem is often seen whenever a large volume of RFID tags are read together in the same radio frequency field. Tag collisions will degrade identification efficiency, and this unreliable identification will compromise the usefulness of RFID system. This chapter introduces tag collision problem and discusses tag anti-collision protocols, including ALOHA-based protocol, Binary Tree (BT) protocol, and Query Tree (QT) protocol. To date, most tag anti-collision protocols are QT protocols. Thus, in this chapter, the authors briefly describe some elegant researches on QT protocols, and also introduce their recent research results on QT protocols.


Author(s):  
Vishwajeet V. Jituri

The usage of RFID technology is rapidly increasing. The RFID system provides distinct advantages over the traditional barcode system. The RFID technology is being used in many areas like toll collection, shopping and retail, agriculture, transportation, industries, academics etc. There are some limitations also with the RFID technology including the privacy issues. This paper describes some of the RFID uses which result in ease of life.


Author(s):  
Chao Bian ◽  
Qingjin Peng ◽  
Gong Zhang

Radio Frequency Identification (RFID), as the name suggests, is technology that makes use of radio frequency electromagnetic wave to automatically identify objects. In spite of its broad applications, a RFID system might inherently produce some false and duplicate readings. Such reading data would affect the accuracy of the RFID system and might result in an unreliable performance or even complete unavailability of the system. In this paper, a reading rate-based algorithm is proposed to efficiently clean RFID data for a local business in product tracking. The method takes advantage of the proportional relationship between reading rate of a RFID tag and its distance to the reader to filter among raw data sets. Using the proposed reading rate-based algorithm, the reading accuracy of the RFID system in the local business is greatly improved.


2019 ◽  
Vol 36 (4) ◽  
pp. 13-16
Author(s):  
Hirak Jyoti Hazarika ◽  
S. Ravikumar

Purpose The purpose of this paper is to explain how the author had carried out the implementation of the radio-frequency identification (RFID) system at Central Library, Fakiragram College and to explain to the library professional on how to integrate RFID with Koha integrated library management system (ILMS) in their respective library without taking IT/technical experts assistance. This paper will encourage library professionals to implement RFID technology for the library security and embrace open source software in their institutions. Design/methodology/approach The paper describes the author’s practical experiences regarding implementation of the RFID system and integration of middleware RFID software with library management software. Findings From the present study, it was found that the library staff are having a positive attitude toward embracing RFID technology in their library. The present implementation of RFID technology in the studies area gives a clear picture about integrating a third-party software/tool like RFID to the existing systems and how the new system has helped the library to provide better service to their users Research limitations/implications There were some teething problems at the start between the Koha ILMS SIP2 software and the RFID system. The main issue faced while integration was with setting up the hostname, integrating the instance (i.e. database) and with setting up the port. Practical implications This paper will help librarians to implement RFID technology in a practical way to their libraries. The author implemented Koha ILMS with RFID system at the Central Library, Fakiragram College within 1 month and the author migrated data from common communication format (CCF) format to MARC 21 formats. CCF is basically used in SOUL 2.0 developed by INFLIBNET. Originality/value This study discusses issues and possible solutions in the process of implementing RFID applications for two innovative applications in library services. This will influence library professionals to learn Koha ILMS and RFID technology implement it in their libraries.


Author(s):  
Amarjeet Singh Chauhan ◽  
Dayal Nigam

The Smart Bag is a very innovative and helpful project that uses RFID Technology [1] for identifying books / items smartly. The Radio Frequency Identification sensor uses a reader to get information about the item from a tag attached to it. Smart Bag initially used this technology. Technologies or devices which are used in development of The Smart Bag are RFID Sensor, HX711 Load Cell Sensor, NodeMCU, Arduino, and GPS. The Books / items can be identified by using RFID tag and it will store the count of books / items to its memory and matches the items according to schedule. The circuit for communication comprises of NodeMCU and RFID receiver in which passing of messages / alerts, reading of books / item is done. When the books / items are placed inside the bag, the RFID receiver reads the RFID Tag and sends the Books / items in the bag to the NodeMCU [2]. The NodeMCU compares it with the schedule list. If any book / item is missing then the NodeMCU generates an alert of missing books / item. The smart bag has GPS function also, which sends the Real-time Location of a Bag or a Kid to the Guardian or Parents. Initially, this project is for those small kids who regularly go to school.


Author(s):  
Abdülkadir ÇAKIR ◽  
Halil KAYGISIZ

The current study aimed to reveal that personnel control by the employer should be conducted using Radio Frequency Identification (RFID) technology in an easier and more modular way. The most important feature differentiating the RFID from the existing technologies is that it works wirelessly. The hardware used in the study can be managed via Ethernet port. In this study, it is ensured that data be transmitted via Internet by using a mobile cellular communication system. The control of the set up system can be conducted wirelessly via any environment in which an Internet connection can be established. Thanks to the created system, information about arrival and departure dates of the places to where the mobile personnel should go can be monitored 24/7 from anywhere that has internet connection. As a result of the tests and applications that have been conducted, it has been seen that the data could not be transmitted in a radio-frequency environment because of the error caused by the RFID tag. As a result of the calculations made after the application, it has been put forward that the error margin is 7±1%.


2018 ◽  
Vol 7 (2.24) ◽  
pp. 220
Author(s):  
Gayathri V ◽  
Suprajha Kanna ◽  
Umamakeswari A

In the modern world, Radio Frequency identification system plays a major role that automatically identifies and tracks tag attached to an object. RFID technology has  been extensively used in many areas including agriculture, manufacturing, healthcare, transportation, etc. RFID  system can be used in hospitals to increase the safety of patients by providing an RFID tag to the persons who visit them including doctors, nurses, and relatives. This method can be used along with a door lock but in the case of emergency, it becomes risky. Also, the same method can be used for secured access to pharmaceutical supplies which avoid illegal access to the medicines.  Sensor network which is the core of IoT technology can be integrated with the RFID system to make it more efficient to be deployed in several application services. In this paper, a solution is proposed that can integrate the RFID system with the IoT technology by using IR sensors which help to get rid of illegal entry or access in hospitals. 


Author(s):  
Rogério Teixeira Reis ◽  
Bruno Pereira Barella ◽  
Marcelo Henrique Stoppa

Here is presented a survey of the most common cattle identification methods comparing advantages, disadvantages and costs in the utilization of a new Identification model that uses tags with Radio Frequency Identification Devices (RFID). From there, a RFID system of evaluation is proposed for management automated. When the herd pass through a monitored portal, it can be obtained the immediate identification of each animal. Three tests were performed to verify the better position of the RFID reader in order to determine a setting for it and verify that the settings selected for the assembly of the system remains adequate. The use of this system gives the producer an electronic identification,  facilitating the management, identification and control of the herd.


Sign in / Sign up

Export Citation Format

Share Document