read rate
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 7)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
pp. 1-7
Author(s):  
Glorin SEBASTIAN

Data privacy is becoming one of the major risks faced by organizations. With the emergence of new technologies such as Internet of Things (IoT), Automated vehicles, mobile payments, privacy is no longer a compliance issue, but also a user responsibility to ensure users are aware of the risks of sharing personal data with third parties.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kasper Abcouwer ◽  
Emiel van Loon

PurposeLow read rates are a general problem in library inventories. The purpose of this study is to examine the factors that contribute to the success of library inventory by means of a radio-frequency identification (RFID) inventory taker. The factors investigated were tag position, tag orientation, book thickness, tag density (related to thickness of a sequence of books) and position on the shelf.Design/methodology/approachA total of 210 books were placed in eight random permutations on three fixed book shelves. For each configuration, the RFID tags were read forty times. The resulting data were analysed by means of a generalized linear model, relating the combined contribution of tag position, tag orientation, book thickness and position on the bookshelf to the read rate.FindingsThe tags positioned directly next to the spine were always read, but those near the opening of the book (far from the spine and inventory reader) were not always read. Considering only books with tags near the opening, tag orientation and position on the shelf appeared not to be related to the read rate, while book thickness, thickness over three books and spine tag density appeared to have a small positive contribution to the read rate.Practical implicationsLow read rates during a library inventory can be prevented by placing the tags near the book spine – the other book specific factors (listed in the previous paragraph) are of little influence. When not scanned during a first sweep, repeated scanning can increase the read rate with 0.15.Originality/valueThis paper is one of the first to analyse the influence of tag location and book specific factors on the read rate of RFID tags in library books. The experimental approach sets an example for future work.


2019 ◽  
Vol 8 (4) ◽  
pp. 7137-7142

RFID is one of the most suitable technologies for today’s world. RFID technology is mainly focused for tracking and locating the objects. The objects may be either moving or immovable. Normally RFID communication is based on the RFID Tag and the Reader permutations. The Readers were deployed in different locations for the better communication between the tag and reader. This paper is focused on the structured deployment of RFID readers to form a network using clustering mechanism. The performance of the network will be analyzed by various network attribute such as throughput, Accuracy, Missing tag ratio, Read Rate and Delay. For an efficient communication, the structured deployment of the RFID Reader’s is most important. The clustering method is used for the proper deployment of RFID readers for efficient communication. Cluster is the grouping of RFID readers based on the geographical locations. Every cluster has a cluster head (CH) and these Cluster heads are responsible for every transaction between the cluster to cluster communications. This cluster head have selected according to their energy level and the centrality of the adjunct. This paper detailed how the RFID readers and tags are communicated using the clustering mechanism and performance of the RFID network is analyzed and discuss the results.


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3148 ◽  
Author(s):  
Gentza Souto ◽  
Florian Muralter ◽  
Laura Arjona ◽  
Hugo Landaluce ◽  
Asier Perallos

Currently, there is an increasing interest in the use of Radio Frequency Identification (RFID) tags which incorporate passive or battery-less sensors. These systems are known as computational RFID (CRFID). Several CRFID tags together with a reader set up an RFID sensor network. The reader powers up the tags’ microcontroller and their attached sensor using radio frequency waves, and tags backscatter, not only their EPC code but also the value of those sensors. The current standard for interrogating these CRFID tags is the EPC global Class 1 Generation 2 (EPC C1G2). When several tags are located inside the reader interrogation area, the EPC C1G2 results in very poor performance to obtain sensor data values. To solve this problem, a novel protocol called Sensor Frmed Slotted Aloha (sFSA) for streaming sensor data dealing with the tag collisions is presented. The proposed protocol increases the Sensor Read Rate (SRR), defined as the number of sensor data reads per second, compared to the standard. Additionally, this paper presents a prototype of an RFID sensor network to compare the proposed sFSA with the standard, increasing the SRR by more than five times on average. Additionally, the proposed protocol keeps a constant sensor sampling frequency for a suitable streaming of these tag sensors.


Author(s):  
Mukesh Kumar Khandelwal

RFID technology has been widely adapted in industries for uses in logistical tracking, highway tolling, building access, and transportation ticketing. These applications have generally been limited to the original intended use of RFID, that is identification and a replacement for bar codes. Research in this area focuses on increasing the read rate, range, and reliability of their RF tags. The WPT is the enabling technology for realizing a true internet of things. Broad sensor networks capable of monitoring environmental pollutants, health-related biological data, and building utility usage are just a small fraction of the applications which are part of an ever-evolving ubiquitous lifestyle. Realizing these systems requires a means of powering their electronics sans batteries. Removing the batteries from the trillions of these envisioned devices not only reduces their size and lowers their cost, but also avoids an ecological catastrophe. This chapter discusses new theoretical models of RFID, communication standards, radio channel characteristics, RFID readers and tags.


Proceedings ◽  
2018 ◽  
Vol 2 (19) ◽  
pp. 1234 ◽  
Author(s):  
Laura Arjona ◽  
Hugo Landaluce ◽  
Asier Perallos ◽  
Gentza Souto

Currently, there is an increasing interest in the use of Radio Frequency Identification (RFID) tags which incorporate passive or battery-less sensors. These systems are known as computational RFID (CRFID). Several CRFID tags together with a reader set up an RFID sensor network. The reader powers up the tags’ microcontroller and their attached sensor using radio frequency waves, and tags backscatter, not only their E P C code but also the value of those sensors. The current standard for interrogating these CRFID tags is the EPC global Class 1 Generation 2 (EPC C1G2). When several tags are located inside the reader interrogation area, the EPC C1G2 results in very poor performance to obtain sensor data values. To solve this problem, a novel protocol for streaming sensor data is presented. The proposed protocol increases the Sensor Read Rate ( S R R ), defined as the number of sensor data reads per second, compared to the standard. Additionally, this paper presents a prototype of an RFID sensor network to compare the proposed custom protocol with the standard, obtaining a 53% of improvement in S R R with respect to the EPC C1G2.


2018 ◽  
Vol 10 (10) ◽  
pp. 96
Author(s):  
Isam Hussein ◽  
Basil Jasim ◽  
Ramzy Ali

Radio frequency identification (RFID) technology has widely been used in the last few years. Its applications focus on auto identification, tracking, and data capturing issues. However, RFID suffers from the main problem of tags collision when multiple tags simultaneously respond to the reader request. Many protocols were proposed to solve the collision problems with good identification efficiency and an acceptable time delay, such as the blocking anti-collision protocol (BA). Nevertheless, most of these protocols assumed that the RFID reader could decode the tag’s signal only when there was one tag responding to the reader request once each time. Hence, they ignored the phenomenon of the capture effect, which results in identifying the tag with the stronger signal as the multiple tags simultaneously respond. As a result, many tags will not be identified under the capture effect. Therefore, the purpose of this paper is to take the capture effect phenomenon into consideration in order to modify the blocking BA protocol to ensure a full read rate, i.e., identifying all the tags in the frame without losing any tag. Moreover, the modifications include distinguishing between collision and interference responses (for the period of staying tags) in the noisy environments, for the purpose of enhancing the efficiency of the identification. Finally, the simulation and analytical results show that our modifications and MBA protocol outperform the previous protocols in the same field, such as generalized query tree protocols (GQT1 and GQT2), general binary tree (GBT), and tweaked binary tree (TBT).


Respati ◽  
2017 ◽  
Vol 12 (3) ◽  
Author(s):  
Yudi Susanto

INTISARILayanan Pesan Singkat atau Short Message Services(SMS) merupakan salah satu layanan jaringan telepon seluler yang digunakan untuk mengirimkan pesan pendek. Kemudahan dalam penggunaannya menjadikan SMS sebagai salah satu pengirim pesan yang banyak digunakan. Menurut Jamie Tolentino dalam artikelnya yang berjudul “Why are people still using SMS in 2015?” yang dipublikasikan dihalaman thenextweb.com mengatakan bahwa SMS merupakan cara berkomunikasi yang paling efektif dalam menjangkau pengguna dengan prosentasi 90 % dibaca dalam waktu satu menit. SMS adalah satu untuk semua solusi yang membuat siapa saja (yang mempunyai nomor ponsel) dapat dijangkau. Teknologi untuk mengirim dan menerima SMS tidak bergantung pada internet berkecepatan tinggi, yang pada dasarnya membuat siapa pun dalam masyarakat dapat dijangkau.Sistem Pelaporan Kerusakan Laboratorium merupakan sebuah sistem yang digunakan untuk mencatat berbagai permasalahan yang terjadi meliputi lokasi laboratorium, nomor komputer dan detil permasalahannya. Sistem informasi ini berbasiskan web dengan harapan sistem ini dapat diakses dari komputer manapun dan kapanpun. Dengan menggunakan sistem tersebut maka dapat dilihat secara detail segala permasalahan yang terjadi pada laboratorium sehingga pengelola laboratorium dapat menyiapkan langkah-langkah untuk menanganinya. Namun pada praktiknya banyak permasalahan yang tidak diselesaikan karena informasi permasalahan tersebut tidak sampai kepada para teknisi. Hal ini disebabkan karena untuk mengakses informasi kerusakan teknisi harus login melalui komputer sehingga memakan waktu. Dengan cara pengiriman notifikasi permasalahan yang terjadi pada laboratorium melalui sms maka setiap ada laporan permasalahan yang masuk ke Sistem Pelaporan Kerusakan akan langsung diteruskan ke teknisi secara langsung melalui pesan sms tanpa harus melakukan akses ke sistem. Hal ini dapat mempercepat proses sampainya informasi permasalahan laboratorium kepada teknisi sehingga penanganan permasalahan dapat dilakukan dengan cepat.Untuk mengintegrasikan Sistem Pelaporan Kerusakan Laboratorium dengan notifikasi SMS dapat dilakukan dengan pendekatan Service Oriented Architecture (SOA) sehingga proses integrasi tidak perlu merubah sistem yang sudah ada.Kata Kunci : Sistem Informasi, Service Oriented Architecture, SOA, Kylix, SMS GatewayABSTRACTThe Short Message Services (SMS) service is one of the mobile phone network services used to deliver short messages. Ease of use makes SMS as one of the most widely used message senders. According to Jamie Tolentino in his article entitled "Why are people still using SMS in 2015?" Published on page thenextweb.com said that SMS is the most effective way to reach users, with a 90 percent read rate in minutes. SMS is a one- size- fits- all solution which makes anybody (with a mobile number) reachable.The technology for sending and receiving SMS is not reliant on high speed internet, essentially making anyone in modern society reachable.Laboratory Damage Reporting System is a system used to record various problems that occur include the location of the laboratory, computer number and details of the problem. This information system is web based in the hope that this system can be accessed from any computer and anytime. By using the system it can be viewed in detail all the problems that occur in the laboratory so that the laboratory manager can prepare the steps to handle it. But in practice many problems are not resolved because the problem information is not up to the technicians. This is because to access the information the technician must log on through the computer so that it takes time.By way of notification of problems that occur in the laboratory through sms then any existing problems report into the Laboratory Damage Reporting System will be directly forwarded to the technician directly through sms messages without having to access the system. This can speed up the process of getting the information of laboratory problems to the technician so that problem handling can be done quickly.To integrate Laboratory Hazard Reporting System with SMS notification can be done with Service Oriented Architecture (SOA) approach so that the integration process does not need to change the existing system.Keywords : Information Systems, Service Oriented Architecture, SOA, Kylix, SMS Gateway


Sign in / Sign up

Export Citation Format

Share Document