14,338 results on '"RFID"'
Search Results
2. Multisensing IIoT Platform Enabled by Custom BAP RFID TAG
- Author
-
Ria, Andrea, Cecchi, Glauco, Motroni, Andrea, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Yang, Xin-She, editor, Sherratt, R. Simon, editor, Dey, Nilanjan, editor, and Joshi, Amit, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Supporting disaster relief operations through RFID: enabling visibility and coordination
- Author
-
Wagner, Stephan M., Ramkumar, M., Kumar, Gopal, and Schoenherr, Tobias
- Published
- 2024
- Full Text
- View/download PDF
4. Applications of metaverse-related technologies in the services of US urban libraries
- Author
-
Guo, Yajun, Yuan, Yiming, Li, Shuai, Guo, Yiruo, Fu, Yiyang, and Jin, Zihan
- Published
- 2024
- Full Text
- View/download PDF
5. Sexual size dimorphism of brood-parasitic nestlings does not affect host chick survival, size or fledging phenology.
- Author
-
Scharf, H.M., Hauber, M.E., Blumentritt, E., and Schelsky, W.M.
- Subjects
- *
BROWN-headed cowbird , *LIFE history theory , *SEXUAL dimorphism , *BROOD parasites , *BABY birds , *COWBIRDS , *BIRD eggs - Abstract
Intraspecific variability in parasite virulence holds significant ecological and evolutionary implications as it can result in uneven costs incurred by individuals of a host species. Obligate brood parasites, birds that lay their eggs in the nest of another species and do not raise their own young, differ in interspecific virulence, as some species kill all host nestmates directly while other species do not. However, variation in the intraspecific virulence of a brood-parasitic species has rarely been investigated. One source of this variability could arise through sexual size dimorphism, because many brood-parasitic species are sexually dimorphic in size starting at the nestling stage, and nestling size often impacts competitive ability in the brood. Here, we investigated the sex-specific effects of nestling brood-parasitic brown-headed cowbirds, Molothrus ater , on one of their hosts, the prothonotary warbler, Protonotaria citrea. We predicted that larger male cowbird nestlings would cause host chicks to have lower survival and size and altered life history in the form of delayed fledging. Using experimentally parasitized broods, we found that although male brood-parasitic cowbird nestlings are heavier than females, there was no effect of cowbird sex on the survival, size or fledging phenology of the host nestlings. Furthermore, there were no differences in fledging phenology between the male and female cowbird chicks. Instead, we found that wing length, which was similar between the parasitic nestlings' sexes, was an important predictor for age and order of fledging. These findings show that the extent of development is critical for the timing of fledging of both parasitic and host species. Notably, the lack of effect of cowbird nestling sex on host chick survival and fledging suggests that the presence of a parasite is more influential for host nestlings than the size of parasites. • Nest-sharing obligate brood parasite chicks often outcompete smaller host nestmates. • Several brood-parasitic species display sexual size dimorphism at the chick stage. • Sex-specific virulence of larger male parasitic chicks could affect host demography. • Parasitic chick sex did not affect host chick survival or fledging. • Parasites decreased host chick survival and delayed fledging regardless of mass. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation.
- Author
-
Huang, Xing, Li, Li, Wang, Wei, Liu, Lu, and Li, Meng
- Subjects
- *
CONVOLUTIONAL neural networks , *ELECTRIC power equipment , *DIGITAL transformation , *FAULT diagnosis , *SYSTEM safety , *DATA transmission systems - Abstract
In order to meet the needs of digital development of power system and ensure the safety of power communication equipment, an intelligent patrol inspection method for power communication equipment with low code enabling based on digital transformation is proposed. Build an intelligent patrol platform for low code enabled power communication equipment based on digital transformation. The data acquisition module of the infrastructure layer scans the RFID tags on the communication equipment through the patrol personnel's handheld devices to obtain the specific information of the current equipment. The UDT data transmission protocol of the data transmission module transmits the equipment information collected by the patrol personnel to the patrol application layer; The fault diagnosis module of patrol application layer uses convolutional neural network to analyze patrol data and complete fault detection of power communication equipment; The integrated component layer uses the application components developed by visual tools to enable the platform with low code through the low threshold platform development technology; The front-end service layer, supported by the technology of the integrated component layer, implements the simplification and configurable processing of front-end display results such as patrol results display, and views and manages the patrol results of the platform through the user terminal layer. The experiment shows that the method is accurate in data acquisition, fast in data transmission and high in fault diagnosis accuracy. It is a highly practical intelligent patrol method for power communication equipment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. DroneSilient (drone + resilient): an anti-drone system.
- Author
-
Nair, Meghna Manoj, Sriraman, Harini, Sai, Gadiparthy Harika, and Pattabiraman, V.
- Subjects
CONVOLUTIONAL neural networks ,CLOUD computing ,ORNITHOPTERS ,ALGORITHMS - Abstract
It is imperative to take a holistic strategy to thwarting drone threats, including the identification of drones and drone-like gadgets like ornithopters that visually imitate birds. In this study, we present the DroneSilient System, a novel anti-drone system that combines different parts. The DroneSilient system includes components that connect to RF identification technology and image-capture technology. A modified bloom filter method is used to further identify the recognized object after a drone-like object has been found, allowing for the differentiation between regular drones, ornithopters, and genuine birds. The CNN (Convolutional Neural Network) method, created using the Google Cloud Platform and AutoML widget, is used in our model for object identification and categorization. DroneSilient has an RF sensor that can identify and imitate the threat presented by recognized drones. Convolutional Network, Modified Blooms Algorithm, RFID, and RF Sensor systems are all integrated into the DroneSilient system as part of this methodology combination, which provides a thorough method for identifying and eliminating drone threats. The bloom filter proposed takes 27.6 to 12.4 microseconds. Overall time for handling the unauthorized drone will be less than 180 s. By tackling every facet of the problem, our strategy outperforms many current anti-drone solutions in terms of functionality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Design and Implementation of Digital Calibration Certificate for RFID Tag Storage.
- Author
-
Kan, Kan, Wang, Shuaizhe, Liu, Zilong, and Xiong, Xingchuang
- Abstract
The digital transformation of metrology is one of the most active activities in the field of metrology at present, where the digital calibration certificate (DCC) being developed is the topic receiving the most concern in the current digital transformation. In practical industrial applications, the issue of storage carrier for the DCC plays a crucial role in its promotion and implementation. To address this issue, a DCC meta-model called DCC-Lite schema has been designed along with a corresponding processing method. This solution involves compressing and segmenting the DCC to make it suitable for storage using RFID tags. These RFID tags are affixed to the instruments and accompany them throughout their usage. Additionally, the DCC-RFID processing system has been developed to validate the effectiveness of the DCC meta-model and its corresponding processing method within a wireless temperature acquisition system. Experimental results demonstrate that the system successfully reads and writes the DCC stored within the RFID tag group. Furthermore, it enables automated parsing of the DCC calibration data by the machine and real-time compensation of measurement data to reduce measurement errors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. The potential of RFID technology for tracking Mangalica pigs in the extensive farming system-a research from Hungary.
- Author
-
Alexy, Marta, Pai, Rohit Rameshkumar, Ferenci, Tamas, and Haidegger, Tamas
- Subjects
RADIO frequency identification systems ,SWINE farms ,SUSTAINABILITY ,SPECIES specificity ,PRECISION farming - Abstract
Context: In recent years, the focus on sustainable meat production in largescale pig farming has increased. An essential element is acquiring and evaluating digital data on ecological, outdoor pig housing environments and individuals. Objective: Some of the precision farming Internet of Things (IoT) tools that can be used in pasture-based, extensive pig production include those that have been proven in pasture-based ruminants and have been used in confined pig production for many years. These include Radio Frequency IDentification (RFID) technology, in which passive RFID tags attached to pigs' ears capture signals from a reader equipped with an antenna. The reader can also be used to collect weather parameters. Methods: In our on-farm research, which lasted 7 months and covered three seasons, we used RFID technology to investigate the effects of ambient temperature, humidity, air pressure, and hour of day on the appearance of breeding sows kept on pasture at the wallowing site. Results and conclusion: We found that all three weather parameters and hourof- day had a significant effect (p < 0.001) on the appearance of sows at the wallow. We calculated the THI (Temperature Humidity Index) and found days in summer and early autumn when there was a risk of heat stress. This is essential information for the pig farmer because heat stress has a strong negative effect on sow fertility. Our on-farm study found that RFID technology is suitable for detecting the presence of pigs in the pasture. However, the limitations of the technology, both in terms of the housing environment and the species specificity of the pigs, need to be taken into account. Significance: In pasture-based pig production systems, the meat production process is performed under extensive conditions of natural animalenvironment interaction. The negative impact on the natural environment is much lower, but animal welfare is higher than in intensive pig farming. It is also a profit-oriented activity, where the production of traceable and reliable animal products is a social and economic requirement. Collecting information from trusted sources using precision livestock farming (PLF) techniques is also feasible in this type of farming, providing significant added value for pig farmers and consumers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Effects of personality and social context on movement tendencies in three-spined sticklebacks.
- Author
-
Gismann, J., Ramesh, A., Groothuis, T.G.G., Weissing, F.J., and Nicolaus, M.
- Subjects
- *
SOCIAL groups , *THREESPINE stickleback , *CONFORMITY , *SOCIAL movements , *MIGRATORY fishes , *STICKLEBACKS - Abstract
Assessing social effects on individual behaviour is challenging because knowledge of an individual's social environment is often difficult to gain, especially for animals that form dynamic social groups. We here report on an experiment where the social environment could be manipulated. To this end, we capitalized on the availability of populations of migrant and resident sticklebacks, Gasterosteus aculeatus , that exhibit strong differences in movement tendencies. This allowed us to create mixed shoals with different proportions of migrants and residents, to investigate the occurrence of social effects between migrant and resident fish. In a mesocosm consisting of linearly connected ponds, we found that the overall movement patterns, as quantified by the number of pond transitions, remained consistently higher in migrants than in residents, regardless of the social group composition. The fish's intrinsic movement tendency was the main predictor of the observed variation between populations. However, at the start of the experiment, when social effects were expected to be strongest, residents were more likely to leave the starting pond in the presence of migrants than in their absence. As this increase in movement tendency was not related to the frequency of migrants in the mixed groups it cannot solely be ascribed to social conformity. Additionally, we found an effect of being part of the majority on movement: the first fish to leave the starting pond was almost always a member of the majority group (be it migrants or residents). In conclusion, we found little evidence for social modulation of movement based on differences in the populations' movement tendencies, but rather an effect of being in a majority group. • We experimentally manipulated the social environment under seminatural conditions. • Movements between ponds remained consistently higher in migratory fish. • Residents were more likely to leave the starting pond in the presence of migrants. • Habituation to the experimental set-up likely played a role. • The first fish to leave the starting pond was almost always from the majority group. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. 基于射频识别和双目视觉技术的车辆基地 施工区域人员闯入预警系统.
- Author
-
高晓鹏 and 郭世成
- Abstract
Copyright of Urban Mass Transit is the property of Urban Mass Transit Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
12. Linen Rental Laundry Human Capital Plan with RFID Technology in PT. Think Clean Laundry.
- Author
-
Virtadaniati, Wenny, Indradewa, Rhian, Nugroho, Sukmo Hadi, and Iskandar, Muhammad Dhafi
- Subjects
INVENTORY control ,LAUNDRY industry ,TALENT management ,EMPLOYEE recruitment ,HOSPITALITY industry - Abstract
in the laundry industry has become an effective solution to address current challenges. The implementation of RFID in the Linen Rental system can enhance inventory management efficiency and minimize errors in record-keeping. PT. Think Clean Laundry is a service provider of RFID Laundry and Linen Rental, offering laundry and linen rental services for hospitals, hotels, manufacturing, and transportation, supported by adequate technology and resources. The company is located at Jl. Kawasan Industri Bekasi Fajar Blok D18 Mekar Wangi MM2100 Industrial Town, Mekar Wangi, Cikarang Barat, Kab. Bekasi, West Java. Human capital refers to the knowledge and research discussing the role and contribution of human resources in the context of business and management. Human capital encompasses the knowledge, skills, experience, and abilities possessed by individuals within an organization. Planning Human Capital to ensure the success of the Linen Rental Laundry business using RFID technology at PT. Think Clean Laundry plays a crucial role in attracting and selecting the right employees, ensuring that the team has the skills and attitudes that align with the company's needs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
13. Security and privacy risks in drone-based last mile delivery.
- Author
-
Tu, Yu-Ju and Piramuthu, Selwyn
- Abstract
The consideration of drones for last mile delivery brings with it several challenges that include both physical ones such as battery life, drone range, carrying capacity, and form factor of the drone as well as those related to security and privacy of the parties associated with any given packet as well as its content. Privacy and security aspects are significant since last mile delivery drones operate outside the warehouse and are not under complete control of the delivery service operator. This is especially salient with respect to communications between the drone and outside entities that are not necessarily authorised for such communication by the operator. Even if such outside entities are authorised to communicate with the drone, while it is in the open, there may be restrictions on the types of information it can reveal to any given external entity. In addition to an overview of the main security and privacy issues in drone-based last mile delivery, we discuss general security and privacy issues and how these translate to drone-based last mile delivery. We consider various facets of issues related to privacy and security of drone-based last mile delivery. Specifically, we study risks associated with privacy and security in this environment with specific emphasis on those related to codes, external entities, and communication signals. We then identify some of the gaps in associated extant academic literature that could potentially be addressed in future studies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. 基于RFID的无源无线螺栓松动故障定位算法.
- Author
-
冉运蒸, 鲁罗平, 谢蓉, 宋坤, 田相鹏, 梁会军, 钟建伟, and 廖红华
- Abstract
Copyright of Journal of Hubei Minzu University (Natural Science Edition) is the property of Journal of Hubei Minzu University (Natural Sciences Edition) Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
15. Toward next generation mixed reality games: a research through design approach.
- Author
-
Xiao, Ruowei, Zhang, Rongzheng, Buruk, Oğuz, Hamari, Juho, and Virkki, Johanna
- Abstract
Mixed reality (MR) games refer to games that integrate physical entities with digitally mediated contents. Currently, it entails game creators to integrate heterogeneous virtual and physical components, which is often time-consuming and labor-intensive, without the support of a coherent technology stack. The underlying technodiversity manifested by the research corpus suggests a complicated, multi-dimensional design space that goes beyond merely technical concerns. In this research, we adopted a research-through-design approach and proposed an MR game technology stack that facilitates flexible, low-code game development. As design grounding, we first surveyed 34 state-of-the-art studies, and results were synergized into three different spectra of technological affordances, respectively activity range, user interface and feedback control, to inform our next design process. We then went through an iterative prototyping phase and implemented an MR game development toolset. A co-design workshop was conducted, where we invited 15 participants to try the prototype tools and co-ideate the potential use scenarios for the proposed technology stack. First-hand user feedback was collected via questionnaires and semi-structured interviews. As a result, four conceptual game designs with three major design implications were generated, which conjointly reflect a broader understanding on MR gameful experience and contribute fresh insights to this emerging research domain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Pengembangan Sistem Absensi menggunakan Teknologi RFID.
- Author
-
Raditya, Alifian Aurelyo
- Abstract
Copyright of Journal of Social & Technology / Jurnal Sosial dan Teknologi (SOSTECH) is the property of Green Publisher and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
17. DroneSilient (drone + resilient): an anti-drone system
- Author
-
Meghna Manoj Nair, Harini Sriraman, Gadiparthy Harika Sai, and V. Pattabiraman
- Subjects
Anti-drone systems ,Drone detection ,Convolutional neural network ,Jamming ,RFID ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract It is imperative to take a holistic strategy to thwarting drone threats, including the identification of drones and drone-like gadgets like ornithopters that visually imitate birds. In this study, we present the DroneSilient System, a novel anti-drone system that combines different parts. The DroneSilient system includes components that connect to RF identification technology and image-capture technology. A modified bloom filter method is used to further identify the recognized object after a drone-like object has been found, allowing for the differentiation between regular drones, ornithopters, and genuine birds. The CNN (Convolutional Neural Network) method, created using the Google Cloud Platform and AutoML widget, is used in our model for object identification and categorization. DroneSilient has an RF sensor that can identify and imitate the threat presented by recognized drones. Convolutional Network, Modified Blooms Algorithm, RFID, and RF Sensor systems are all integrated into the DroneSilient system as part of this methodology combination, which provides a thorough method for identifying and eliminating drone threats. The bloom filter proposed takes 27.6 to 12.4 microseconds. Overall time for handling the unauthorized drone will be less than 180 s. By tackling every facet of the problem, our strategy outperforms many current anti-drone solutions in terms of functionality.
- Published
- 2024
- Full Text
- View/download PDF
18. CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management
- Author
-
Konstantinos Markantonakis, Ghada Arfaoui, Sarah Abu Ghazalah, Carlton Shepherd, Raja Naeem Akram, and Damien Sauveron
- Subjects
CO-TSM ,NFC ,smart cards ,IoT ,RFID ,security ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit widespread adoption due to their centralised control mechanisms. The CO-TSM model addresses these issues by decentralising management and offering greater flexibility and scalability, making it more adaptable to the evolving needs of embedded systems, particularly in the context of the Internet of Things (IoT) and Radio Frequency Identification (RFID) technologies. This paper provides a comprehensive analysis of the CO-TSM model, highlighting its application in various technological domains such as smart cards, HCE-based NFC mobile phones, TEE-enabled smart home IoT devices, and RFID-based smart supply chains. By evaluating the CO-TSM model’s architecture, implementation challenges, and practical deployment scenarios, this paper demonstrates how CO-TSM can overcome the limitations of traditional TSM approaches. The case studies presented offer practical insights into the model’s adaptability and effectiveness in real-world scenarios. Through this examination, the paper aims to underscore the CO-TSM model’s role in enhancing scalability, flexibility, and user autonomy in secure embedded device management, while also identifying areas for future research and development.
- Published
- 2024
- Full Text
- View/download PDF
19. Personnel Intrusion into Construction Area Warning System Based on RFID and Binocular Vision in Vehicle Base
- Author
-
GAO Xiaopeng and GUO Shicheng
- Subjects
urbam rail transit ,vehicle base ,rfid ,binocular vision technology ,construction management ,warning system ,Transportation engineering ,TA1001-1280 - Abstract
Objective Construction management at urban rail transit vehicle bases typically relies on work permission and work closure method to control construction safety. However, there is a lack of real-time protective technologies for monitoring the illegal construction. Unauthorized construction personnel entry into non-construction areas poses safety risks such as personnel electrical hazards and human-vehicle collisions. Therefore, it is crucial to conduct research on construction safety protective technologies to reduce the incidence of on-site accidents. Method Based on RFID (radio frequency identification) technology and binocular vision personnel identification technology, a system that verifies access permissions and locates individuals in construction areas through real-time analysis of RFID identity information and signal strength is developed. Meanwhile, this information is compared with the number of personnel entering/exiting the construction area identified by binocular vision technology to automatically issue warnings to unauthorized personnel intrusion. Result & Conclusion Through an in-depth analysis of construction area division methods and construction management processes at urban rail transit vehicle bases, a warning system based on RFID and binocular vision for construction area personnel intrusion is proposed.
- Published
- 2024
- Full Text
- View/download PDF
20. Design of agricultural product traceability system based on blockchain and RFID
- Author
-
Li Li, Pengbo Tian, Jiapeng Dai, and Fengjuan Miao
- Subjects
Traceability of agricultural products ,RFID ,Blockchain ,SM3 ,HSM ,Internet of things technology ,Medicine ,Science - Abstract
Abstract Ensuring the traceability of agricultural products is essential for quality control and food safety. Recent technological advances have provided new ways to enhance traceability systems. This study aims to use blockchain technology, centralized database and RFID tags to develop a secure agricultural product traceability system, retain the detailed information of agricultural products traceability, ensure that the summary information of agricultural products on the chain cannot be modified, and optimize the SM3 algorithm to effectively summarize the traceability data and improve the efficiency of the system. The aggregated data is time-stamped, recorded on the blockchain, and written into an RFID tag. The optimization of the SM3 algorithm improved the efficiency by 30% and reduced the execution time of 192-byte messages to 210µs. The system ensures accurate linking of traceability data through secure data retention and unalterable summaries on the blockchain. The integrated use of blockchain, centralized database and RFID technology, as well as the enhanced SM3 algorithm, allows the system to meet the standards for data accuracy and performance requirements in agricultural traceability applications.
- Published
- 2024
- Full Text
- View/download PDF
21. An Effective Tag Estimation Method Based upon Artificial Neural Networks and Signal Strength for Anticollision in Radio Frequency Identification Systems
- Author
-
Shakir A. H. Alhuthali, Mohsin Murad, Imran A. Tasadduq, Mohammad Hamza Awedh, Ali M. Rushdi, and Sultan Alotaibi
- Subjects
ANNs ,RFID ,Passive UHF RFID tags ,RN16 ,RSSI ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Radio frequency identification (RFID) technology has been widely used in applications such as access control, inventory management, spatial positioning, and object identification. Accurate tag estimation is one of the major challenges in RFID reader systems particularly in areas where large tag populations are to be identified such as shopping carts, warehouse inventory monitoring, and small ruminant farms. This paper proposes a new tag estimation technique employing artificial neural networks (ANNs) and signal strength to read large tag populations. The technique estimates the number of tags through the signal strength of the backscatter channel for efficient implementation of dynamic framed slotted Aloha (DFSA) protocol by analyzing the RN16 and the received signal strength indicator (RSSI). The ANN model is trained using the signal strength of various tag populations and can identify the number of tags with minimal errors. The proposed technique does not require any modification in the tags and is implemented as a minimal software script to be added to the tag estimation module of the reader. The proposed signal strength-ANN model is able to estimate the accurate number of tags thereby improving the performance of the employed DFSA model.
- Published
- 2024
- Full Text
- View/download PDF
22. Passive IoT-based positioning technology development status and evolutionary trends
- Author
-
QIAN Hongyu, LI Yuan, WANG Qing, WANG Yamin, and XIAO Shanpeng
- Subjects
passive IoT ,positioning ,RFID ,Telecommunication ,TK5101-6720 ,Technology - Abstract
Passive IoT-based positioning systems are low-cost and taggable, making them suitable for scenarios that require the positioning of a large number of targets. Traditional passive IoT positioning is mostly applied to indoor scenarios such as asset management, material tracking. With the emergence of cellular passive IoT, passive IoT positioning technology will have a broader range of applications. On the basis of analyzing the principles and characteristics of different positioning technologies, the latest research progress of passive IoT positioning was introduced, and the passive IoT positioning technologies were summarized into three categories: geometrical measurement-based positioning methods, fingerprint feature-based positioning methods, and imaging technology-based positioning methods, according to their implementation principles. In view of the fact that most of the current research adopted the data obtained under the traditional passive IoT architecture and protocol for localization, the future development direction of passive IoT positioning technology was analyzed from three dimensions: architectures, protocols and data. The aim is to provide new ideas for researching passive IoT positioning technology.
- Published
- 2024
- Full Text
- View/download PDF
23. 无源物联网定位技术发展现状及演进趋势
- Author
-
钱泓宇, 李源, 王晴, 王亚敏, 肖善鹏
- Subjects
无源物联网 ,定位 ,rfid ,Telecommunication ,TK5101-6720 ,Technology - Abstract
基于无源物联网的定位系统具有低成本、可标记的特点,适用于需要对大量目标进行定位的场景。传统无源物联网定位多应用于资产管理、物料跟踪等室内场景,随着蜂窝无源物联网的兴起,无源物联网定位技术将拥有更广阔的应用空间。基于此背景,在分析不同定位技术的原理及特点的基础上,介绍了无源物联网定位的最新研究进展,并根据实现原理将无源物联网定位技术总结为基于几何测量、基于指纹特征和基于成像技术的3类定位方法。鉴于当前研究大多采用在传统无源物联网架构和协议下获取的数据进行定位,从架构、协议、数据3个层面分析无源物联网定位技术的未来发展方向,以期为无源物联网定位技术研究提供新的思路。
- Published
- 2024
- Full Text
- View/download PDF
24. RFID-based High-temperature Superconducting Maglev Train Positioning Method
- Author
-
WANG Yijian, ZHANG Huibo, HUANG Lijuan, LIANG Le, and DENG Zigang
- Subjects
maglev train ,high-temperature superconductivity ,rfid ,Transportation engineering ,TA1001-1280 - Abstract
Objective Targeting the inapplicability of conventional train positioning technologies to HTS (high-temperature superconducting) maglev trains, as well as the limitations of existing positioning technologies for such trains, a method based on RFID (radio frequency identification) technology for monitoring train position is proposed. Method The RFID positioning technology is introduced, and a theoretical error model for this technology in system application are proposed. The positioning software and hardware systems are designed and constructed. To improve positioning accuracy of the system, the influence of train operating speed, reader response time, and reader-tag distance on positioning errors are analyzed. On this basis, an experimental platform is established in consideration of the specific operating environment of HTS maglev trains, and the feasibility of the proposed RFID positioning method is verified. Result & Conclusion The designed RFID-based positioning method for HTS maglev trains can achieve relatively high precision positioning of maglev trains running on circular test tracks. The proposed RFID system exhibits advantages such as high reliability, low cost, and easy maintenance.
- Published
- 2024
- Full Text
- View/download PDF
25. Enhanced Indoor Positioning Using RSSI and Time-Distributed Auto Encoder-Gated Recurrent Unit Model.
- Author
-
Wei, Zhe, Zhou, Zhanpeng, Yu, Shuyan, and Chen, Jialei
- Subjects
- *
RADIO frequency identification systems , *KALMAN filtering , *DEEP learning , *SIGNAL filtering , *FORECASTING - Abstract
This study presents a novel approach to indoor positioning leveraging radio frequency identification (RFID) technology based on received signal strength indication (RSSI). The proposed methodology integrates Gaussian Kalman filtering for effective signal preprocessing and a time-distributed auto encoder-gated recurrent unit (TAE-GRU) model for precise location prediction. Addressing the prevalent challenges of low accuracy and extended localization times in current systems, the proposed method significantly enhances the preprocessing of RSSI data and effectively captures the temporal relationships inherent in the data. Experimental validation demonstrates that the proposed approach achieves a 75.9% improvement in localization accuracy over simple neural network methods and markedly enhances the speed of localization, thereby proving its practical applicability in real-world indoor localization scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Multifrequency Impedance Characterization for Radio Frequency Identification Chip.
- Author
-
Scrofani, Benoît, Deleruyelle, Thibaut, Loussert, Alain, and Artigue, Olivier
- Subjects
REFLECTANCE ,PASSIVE components ,FREQUENCY spectra ,FRAMES (Social sciences) ,BANDWIDTHS - Abstract
This article introduces an innovative methodology for measuring the impedance of RFID (Radio Frequency Identification) chips. The primary objective is to develop a technique that enables impedance measurement across a range of frequencies, centered around the critical operational frequency of RFID systems, specifically 13.56 MHz. Unlike conventional methods, which typically focus solely on the impedance at 13.56 MHz, this approach utilizes the reflection coefficient of the device under test (DUT) to measure impedance over a broader frequency spectrum. This spectrum encompasses the frequencies within the ISO14443 communication bandwidth. The excitation signal is carefully selected to closely mimic an actual RFID communication frame. The experimental results demonstrate the feasibility of this method by comparing the impedance measurements of passive component pairs against those obtained using a vector network analyzer (VNA). Subsequently, the technique is applied to an RFID chip, underscoring its practical applicability and accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. A novel algorithm LWFO for redundant reader elimination in RFID networks.
- Author
-
Samani, Mahia, Khademzadeh, Ahmad, and Badie, Kambiz
- Subjects
RADIO frequency identification systems ,COMPUTER algorithms ,PERFORMANCE evaluation ,APPROXIMATION theory ,COMPUTER simulation - Abstract
Today, the Radio frequency identification system is widely used in various applications on a large scale. The readers must be densely deployed in order to cover their entire work area. If the number of readers is not optimal, some readers will be redundant, which will reduce the efficiency of the whole system. In more detail, redundant readers increase system overhead, unnecessary tag-reader communication, tag collision, and reader collision, and also, decrease the lifetime of RFID networks. The redundant reader elimination problem is a process that finds the least number of readers to cover all system tags. It is proved that the redundant reader elimination problem is NP hard. One of the useful tasks in eliminating redundant readers is improving the performance of existing approximation algorithms. In this paper, we propose a distributed algorithm, the LWFO algorithm, which combines the count base algorithm (CBA) and a weighting algorithm. The simulation results show that the proposed algorithm reduces reader redundancy compared to existing algorithms also processing time is reasonable. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. A Wireless Network for Monitoring Pesticides in Groundwater: An Inclusive Approach for a Vulnerable Kenyan Population.
- Author
-
Mutunga, Titus, Sinanovic, Sinan, and Harrison, Colin
- Subjects
- *
GSM communications , *GROUNDWATER monitoring , *PESTICIDES , *PESTICIDE residues in food , *AGRICULTURAL pollution , *RADIO frequency identification systems , *RURAL population - Abstract
Safe drinking water is essential to a healthy lifestyle and has been recognised as a human right by numerous countries. However, the realisation of this right remains largely aspirational, particularly in impoverished nations that lack adequate resources for water quality testing. Kenya, a Sub-Saharan country, bears the brunt of this challenge. Pesticide imports in Kenya increased by 144% from 2015 to 2018, with sales data indicating that 76% of these pesticides are classified as highly hazardous. This trend continues to rise. Over 70% of Kenya's population resides in rural areas, with 75% of the rural population engaged in agriculture and using pesticides. Agriculture is the country's main economic activity, contributing over 30% of its gross domestic product (GDP). The situation is further exacerbated by the lack of monitoring for pesticide residues in surface water and groundwater, coupled with the absence of piped water infrastructure in rural areas. Consequently, contamination levels are high, as agricultural runoff is a major contaminant of surface water and groundwater. The increased use of pesticides to enhance agricultural productivity exacerbates environmental degradation and harms water ecosystems, adversely affecting public health. This study proposes the development of a wireless sensor system that utilizes radio-frequency identification (RFID), Long-range (LoRa) protocol and a global system for mobile communications (GSM) for monitoring pesticide prevalence in groundwater sources. From the system design, individuals with limited literacy skills, advanced age, or non-expert users can utilize it with ease. The reliability of the LoRa protocol in transmitting data packets is thoroughly investigated to ensure effective communication. The system features a user-friendly interface for straightforward data input and facilitates broader access to information by employing various remote wireless sensing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. DNA TRIKKY Based Security Mechanism for Radio Frequency Identification Protocol.
- Author
-
V, Vishu, Kumar, Keerthipati, A, Revathi, and R, Raja Kumar
- Subjects
- *
RADIO frequency identification systems , *CONTACTLESS payment systems , *DNA - Abstract
Radio frequency identification (RFID) technology has seen rapid expansion in recent years, used in a variety of applications like tracking, monitoring, ticketing, supply-chain management, contactless payments, etc. Several researchers have recommended elliptical curve cryptography (ECC) as a great cryptosystem to pair with RFID technology to increase security and privacy. However, RFID systems have major problems with insecure communication routes, which pose security concerns. In this research, a DNA TRIKKY based security mechanism has been proposed for RFID protocol to mutually authenticate the RFID tag and reader through insecure channels. The proposed solution uses a sponge structure and DNA-XOR to enhance the hash function generation process, preventing sensitive data from being leaked from the backend server. Informal security evaluations provide proof that the proposed method can withstand many attacks. According to performance evaluation, the proposed method performs better than the current protocols, making it ideal for use with RFID systems since it necessitates less processing time, communication costs, and storage costs particularly for the tag. According to the results, the proposed authentication paradigm works well with RFID tags that have limited resources. A comparison of the proposed protocol to other protocols shows that it performs more securely. Studies have found that this method outperforms other existing strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Digital Twin Modeling for Hydropower System Based on Radio Frequency Identification Data Collection.
- Author
-
Cai, Zhi, Wang, Yanfeng, Zhang, Dawei, Wen, Lili, Liu, Haiyang, Xiong, Zhijie, Wajid, Khan, and Feng, Renhai
- Subjects
RADIO frequency identification systems ,DIGITAL twins ,DEEP learning ,ACQUISITION of data ,WATER power - Abstract
The safe and steady operation of hydropower generation systems is crucial for electricity output in the grid. However, hydropower stations have complicated interior structures, making defect detection difficult without disassembly inspections. The application of digital modeling to hydropower stations will effectively promote the intelligent transformation of hydropower stations as well as reduce the maintenance costs of the system. This study provides a model of the power generating and transmission system for hydropower plants, with an emphasis on primary equipment and measured data. The model utilizes PSCAD to digitalize state response in hydropower plants with various short-circuit faults. The fault information is identified and learned using the Adaptive Time–Frequency Memory (AD-TFM) deep learning model. It is demonstrated that our proposed method can effectively obtain the fault information through radio frequency identification (RFID). The accuracy of the traditional method is 0.90, while the results for AD-TFM show a fault classification accuracy of 0.92, which is more than enough to identify multiple fault types compared to the existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Data Immunity in Near Field Radio Frequency Communication Systems—NFC as an Aspect of Electromagnetic Information Security.
- Author
-
Firlej, Andrzej, Musial, Slawomir, and Kubiak, Ireneusz
- Subjects
INFORMATION technology security ,RADIO frequency ,TELECOMMUNICATION systems ,RADIO frequency identification systems ,RADIO (Medium) ,MOBILE communication systems - Abstract
The NFC and MIFARE systems (referred to as HF-band RFID) are a special case of Radio Frequency Identification (RFID) technology using a radio frequency of 13.56 MHz for communication. The declared range of such communication is usually several cm and is characterized by the need to bring the data carrier close to the system reader. Due to the possibility of transmitting sensitive data in this type of system, an important problem seems to be the electromagnetic security of the transmitted data between the cards (tags) and the reader and within the system. In most of the available research studies, the security of RFID systems comes down to the analysis of the effectiveness of encryption of transmitted data or testing the range of communication between the reader and the identifier. In this research, however, special attention is paid to the so-called electromagnetic information security without the analysis of cryptographic protection. In some cases (e.g., data retransmission), encryption may not be an effective method of securing data (because, e.g., encrypted data might be used to open and start a car with a keyless system). In addition, the research draws attention to the fact that the data from the identifier can be accessed not only from the identifier, but also from the control system (reader, wiring, controller, etc.) from which the data can be radiated (unintentionally) at a much greater distance than the communication range between the identifier and the reader. In order to determine the security of the transmitted data in the HF-band RFID systems, a number of tests were carried out with the use of specialized equipment. During the measurements, both the data carriers themselves (cards, key fobs, stickers, tags) and exemplary systems for reading data from the media (a writable card reader, a mobile phone with NFC function, and an extensive access control system) were tested. The experiments carried out made it possible to determine the safety of NFC and MIFARE systems during their use and only storage (e.g., the ability to read data from an identification card stored in a pocket). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Digital Twin for Monitoring the Experimental Assembly Process Using RFID Technology.
- Author
-
Demčák, Jakub, Židek, Kamil, and Krenický, Tibor
- Subjects
DIGITAL twins ,RADIO technology ,CONVEYOR belts ,MANUFACTURING processes ,ASSEMBLY line methods ,RADIO frequency identification systems - Abstract
Despite the considerable advances that industrial manufacturing has undergone as a result of digitalization, the real-time monitoring of assembly processes continues to present a significant technical challenge. This article presents a solution to this problem by integrating digital twin technology with radio frequency identification (RFID) in order to improve the monitoring and optimization of assembly processes. The objective of this research is to develop a methodology that ensures synchronized data exchange between physical components and their digital counterparts using RFID for improved visibility and accuracy. The methodology entails the configuration of radio frequency identification systems to track the positions of products on conveyor belts, thereby facilitating real-time monitoring and the prompt detection of any deviations. This integration enhances remote monitoring capabilities and markedly optimizes assembly processes in comparison to traditional methods. The research findings suggest that this approach offers real-time data and monitoring capabilities, which can contribute to improved operational efficiency. This study presents an introduction to digital twins and RFID technology, a review of related research, a detailed methodology, an implementation plan, results and analysis, a discussion of the findings, and conclusions with future recommendations. This article presents a comprehensive discussion of the configuration of an RFID-based digital twin for an assembly line, highlighting the benefits and challenges of integrating these technologies into industrial processes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. 基于射频识别的高温超导磁浮列车定位方法.
- Author
-
王一坚, 张辉波, 黄莉娟, 梁乐, and 邓自刚
- Abstract
Copyright of Urban Mass Transit is the property of Urban Mass Transit Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
34. RFID-Based Tracking System For Real-Time Monitoring Of Students And Professors.
- Author
-
Saxena, Shruti, Saxena, Shivani, and Chauhan, Parth
- Abstract
Managing the complex dynamics of a college campus requires an innovative and efficient tracking system for students and professors. Existing methods often fall short of delivering accurate real-time monitoring, leading to logistical challenges and communication gaps. In this research paper, we present a visionary solution--a futuristic RFID-based tracking system that revolutionizes campus management. By seamlessly integrating cuttingedge technologies, this system addresses the limitations of traditional methods and offers a transformative approach. Our proposed methodology centers on RFID tags, which act as digital fingerprints for individuals. These tags capture real-time location data, unlocking a treasure trove of insights. Leveraging advanced algorithms and data processing techniques, the system stores and analyzes this information in a centralized file, creating a comprehensive and dynamic view of the campus. Results from our initial trials showcase the system's remarkable accuracy and reliability. Real-time tracking enables precise monitoring of student and professor movements, facilitating timely interventions and efficient resource allocation. Moreover, a user-friendly search functionality empowers students and professors to effortlessly locate individuals based on their names, fostering seamless communication and collaboration. This holistic approach to campus management holds tremendous potential for improving operational efficiency, communication, and overall campus experience. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Textronic Capacitive Sensor with an RFID Interface.
- Author
-
Pyt, Patryk, Skrobacz, Kacper, Jankowski-Mihułowicz, Piotr, and Węglarski, Mariusz
- Subjects
- *
CAPACITIVE sensors , *ELECTRIC circuits , *ANTENNAS (Electronics) , *LITERATURE reviews , *CAPACITANCE measurement , *DETECTORS - Abstract
This article presents an innovative combination of textile electrical circuits with advanced capabilities of electronic RFID sensors, indicating the revolutionary nature of the development of textronics, which is used in various areas of life, from fashion to medicine. A review of the literature relating to the construction of textronic RFID identifiers and capacitive textronic sensors is performed. Various approaches to measuring capacity using RFID tags are discussed. This article focuses on presenting the concept of a capacitive sensor with an RFID interface, consisting of a microelectronic part and a textile part. The textile part is based on the WL4007 material, where antennas and capacitive sensors are embroidered using SPARKFUN DEV 11791 conductive thread. The antenna is a half-wave dipole designed to operate at a frequency of 860 MHZ. The microelectronic part is sewn to the textile part and consists of a microcontroller, an RFID-integrated circuit and a coupling loop, placed on the PCB. The embroidered antenna is coupled with a loop on the microelectronic module. This article focuses on presenting various designs of textronic electrodes, enabling various types of measurements. Article presents capacitance measurements of individual sensor electrodes, made using a measuring bridge and a built RFID tag. The sensors' capacity measurement results are shown. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Battery‐less RF‐powered circuits for non‐contact voltage monitoring of electric systems: Circuit modeling and SPICE analysis.
- Author
-
Colella, Riccardo, Catarinucci, Luca, and Grassi, Giuseppe
- Abstract
Monitoring electric power systems is essential for avoiding disruptions, improving efficiency, and detecting faults. Traditional methods involve interrupting the power lines and pose safety risks. On the contrary, non‐contact power meters allow for safe power measurement without touching the wires but designing them presents challenges related to battery life and sustainability. This paper introduces a novel battery‐less RF‐powered wireless circuit that overcomes these limitations and optimizes the performance of the sensing of the voltage. This circuit includes an efficient RF‐DC converter, a designed non‐contact flexible and curved AC voltage sensor, a signal conditioning circuit, a digital processing unit, and a passive UHF Radio‐Frequency Identification interface for wireless communication. It harnesses electromagnetic energy from the radio front end to power the entire system. The circuit has been properly conceptualized, developed, and analyzed through electrical modeling and SPICE simulations. Transient and steady‐state analyses have been carefully conducted on individual circuit blocks to analyze their electric characteristics. Finally, a proof‐of‐concept circuit has been realized and experimentally verified to validate the simulation outcomes. With a bandwidth of 3 kHz, an RF‐DC conversion sensitivity of −16 dBm, a current consumption of only 2.2 mA, and an efficient power management procedure, this energy‐autonomous, non‐contact metering circuit offers very high RF and sensing sensitivities and ultra‐low power consumption, making it ideal for monitoring AC electric systems, particularly in inaccessible environments where battery‐based solutions are impractical. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Evaluation of Radio Frequency Identification Power and Unmanned Aerial Vehicle Altitude in Plant Inventory Applications.
- Author
-
Patiluna, Van, Maja, Joe Mari, and Robbins, James
- Subjects
- *
RADIO frequency identification systems , *ALTITUDES , *ORNAMENTAL plants , *POWER plants , *INVENTORIES , *COMMERCIAL drones , *PLANT nurseries - Abstract
In the business of growing and selling ornamental plants, it is important to keep track of plants from nursery to distribution. Radio Frequency Identification (RFID) technology provides an easier tracking method for inventories of plants by attaching tags with unique identifiers. Due to the vast area of most nurseries, there is a need to have an efficient method of scanning RFID tags. This paper investigates the use of drones and RFID, specifically, the effects of RFID reader power and flight altitude on tag counts. The experimental setup evaluated three RFID reader power levels (15 dBm, 20 dBm, and 27 dBm), three flight altitudes (3 m, 5 m, and 7 m), the number of passes (one or two), and two plant types ('Green Giant' arborvitae and 'Sky Pencil' holly). For RFID tags, four types were used (L5, L6, L8, and L9), with two antenna types (dog-bone and square-wave) and two attachment types (loop-lock and stake). For each power level, the UAV was flown to three different altitudes of 3 m, 5 m, and 7 m above the ground. At each altitude, two scan passes were performed at a constant speed of approximately 1.5 m/s. Each plot of plants (two in total) was randomly tagged with a total of 40 RFID tags per plot. Field data were collected from September to December 2023 (on a total of eight dates). The data showed that a power level of 15 dBm and an altitude of 3 m yielded a tag count of 53%, while counts of 34% and 16% were achieved at 5 m and 7 m, respectively. At 20 dBm and an altitude of 3 m, the count accuracy across all tag types and both plants was 90%. When the altitude was increased to 5 m and 7 m, tag-count accuracy dropped to 75% and 33%, respectively. The highest count accuracy was observed at 27 dBm and an altitude of 3 m, with a reading accuracy of 98%. Tag types L6 and L9 performed better at any power level and altitude, while L5 and L8 performed well at a higher power level and lower altitude. In this experiment, canopy properties (size and shape) had no effect on the number of tags read. This study aimed to evaluate the RFID power and UAV altitude achieving the highest accuracy in scanning the RFID tags. Furthermore, it also assessed the effects of plant growth on the scanning efficiency and accuracy of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Propagation Analysis of an RFID System in the UHF Band in the Honeycomb Frame of a Beehive.
- Author
-
Lorenzo-López, José and Juan-Llácer, Leandro
- Subjects
- *
HONEYCOMB structures , *RADIO frequency identification systems , *HONEYCOMBS , *SHORTWAVE radio , *METALLIC wire , *BEEKEEPING , *BEEHIVES , *HONEYBEES , *TELECOMMUNICATION systems - Abstract
In recent years, communication systems, including RFID, have been used in intelligent beehives for beekeeping. RFID systems in the UHF frequency band offer reading distances of tens of centimetres, allowing the localisation and identification of the queen bee inside the hive. With this purpose, this work proposes an analysis of an environment of propagation that consists of a honeycomb frame, where the reader is placed within the frame, and the tag is placed in different positions over it. A honeycomb frame consists of a wooden box containing a honey wax panel, supported by metallic wires. The environment is modelled theoretically using its S-parameters and simulated in CST Studio. An analysis of these results and empirical measurements is performed. The results show that a periodicity in the received power of the tag is found with respect to the distance to the reader when the tag is located in a direction parallel to the wire, where local maximum and minimum values are found. Additionally, when the tag is placed over a wire of the frame, a higher received power is obtained compared to the case where the tag is placed between two wires. Furthermore, it has been observed that the reading range has increased with respect to free space, covering the full frame. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Pretty small low-cost bandpass filter using a single square open-loop resonator with a centered stub for WLAN/Bluetooth/ZigBee/RFID and ISM band applications.
- Author
-
El Ouadi, Zakaria, Amadid, Jamal, Khabba, Asma, El Yassini, Abdessalam, Ibnyaich, Saida, and Zeroual, Abdelouhab
- Subjects
- *
BANDPASS filters , *WIRELESS LANs , *ZIGBEE , *MICROWAVE filters , *WIRELESS communications , *INSERTION loss (Telecommunication) , *REFLECTANCE - Abstract
In recent years, microwave filtering technologies have known great advancement and wide employment in wireless communication systems, necessitating the development of miniaturization techniques to respect the size limitation in wireless communication devices and reduce the cost, in order to satisfy the consumer and be more competitive. Accordingly, the design of a microwave filter is chosen based on its electrical performance, size, and manufacturing price. Therefore, it is necessary to make a good compromise between the mentioned criteria to satisfy the industrial requirements. This paper proposes a small and inexpensive bandpass filter (BPF), where the proposed structure is carefully constructed over a low-price FR4 Epoxy substrate with a full dimension of (17.6 × 9 × 1.6) mm3. The proposed filter offers good electrical performance in terms of reflection coefficient (S11), insertion loss (S21), Voltage Standing Wave Ratio (VSWR), and selectivity. A filter prototype is fabricated and tested to affirm the simulation results. Consequently, the measured results show a good agreement with the simulation, proving the suitability of the proposed filter for different wireless applications, including WLAN, Bluetooth, ZigBee, RFID, and ISM bands. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Quantifying the impact of crop coverings on honey bee orientation and foraging in sweet cherry orchards using RFID.
- Author
-
Warren, Ryan J., Colin, Théotime, Quarrell, Stephen R., Barron, Andrew B., and Allen, Geoff R.
- Subjects
- *
HONEYBEES , *SWEET cherry , *RADIO frequency identification systems , *INSECT pollinators , *AGRICULTURAL productivity , *PLANT growth - Abstract
Advancements in agricultural production have seen the rapid adoption of protected cropping systems globally. Such systems have been optimized for plant growth and efficiency, with little understanding of the potential impacts to key insect pollinators. Here, we investigate the effect of bird netting and polythene rain covers on the health and performance of honey bees (Apis mellifera L.) during the pollination of sweet cherry crops. Over two consecutive seasons, 12 full‐strength colonies were equipped with tagged bees and radio frequency identification (RFID) systems. The colonies were equally divided between open control, bird netted and polythene (semi‐permanent VOEN in 2019 and retractable Cravo in 2020) groups. Over 1300 individual bees were monitored for the duration of the commercial pollination period to determine behavioural parameters such as foraging commencement age, number and duration of trips and overall survival. Bees began foraging within the optimum age range (mean 15.7–24.1 days) under all covering types, with little indication of prolonged stress or increased mortality during the short season. Polythene covers (VOEN & Cravo) were found to significantly increase the total time needed for bees to orientate successfully. Once orientated, bees placed under covers conducted up to 155% more foraging trips, with a longer cumulative duration. Covering type was found to significantly impact the amount and type of pollen collected, with the most restrictive system (VOEN) yielding the highest proportion of cherry pollen. Overall, we found little evidence to suggest that the tested protective covers have a detrimental impact to honey bee foraging in cherry crops. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Performance Limit: Fuzzy Logic Based Anti-Collision Algorithm for Industrial Internet of Things Applications.
- Author
-
Zhong, Dongbo, Cui, Zhiyong, and Xie, Yufei
- Subjects
- *
INTERNET of things , *FUZZY logic , *SHORTWAVE radio , *ALGORITHMS , *ASSET management , *RADIO frequency identification systems - Abstract
Passive RFID has the advantages of rapid identification of multi-target objects and low implementation cost. It is the most critical technology in the Industrial Internet of Things information-gathering layer and is extensively applied in various industries, such as smart production, asset management, and monitoring. The signal collision caused by the communication between the reader/writer and tags sharing the same wireless channel has caused a series of problems, such as the reduction of the identification efficiency of the reader/writer and the increment of the missed reading rate, thus restricting the further development of RFID. At present, many hybrid anti-collision algorithms integrate the advantages of Aloha and TS algorithms to optimize RFID system performance, but these solutions also suffer from performance bottlenecks. In order to break through such performance bottleneck, based on the ISE-BS algorithm, we combined the sub-frame observation mechanism and the Q value adjustment strategy and proposed two hybrid anti-collision algorithms. The experimental results show that the two algorithms proposed in this paper have obvious advantages in system throughput, time efficiency and other metrics, surpassing existing UHF RFID anti-collision algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Additively Manufactured, Flexible 5G Electronics for MIMO, IoT, Digital Twins, and Smart Cities Applications.
- Author
-
Callis, Theodore W., Hu, Kexin, Jamal, Hani Al, and Tentzeris, Manos M.
- Subjects
- *
SMART cities , *DIGITAL twins , *FLEXIBLE electronics , *PHASED array antennas , *INTEGRATED circuits - Abstract
This review encompasses additive manufacturing techniques for crafting 5G electronics, showcasing how these methods innovate device creation with novel examples. A wearable phased array device on commonplace 3D printed material is described, with integrated microfluidic cooling channels used for thermal regulation of integrated circuit bulk components. Mechanical and electrical tunability are exemplified in an origami-inspired phased array structure. A 3D printed IoT cube structure shows the flexibility in the number of geometries additively manufactured 5G devices can adhere to. Finally, integrating 3D optical lenses with 5G electronics is shown. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Perceptions on the Deployment and Adoption of Implant RFID Technology to Enhance Security in Nigeria.
- Author
-
Sikiru, Ismaeel Abiodun, Oyekunle, Rafiat Ajibade, Opeyemi, Ajibola Olasunkanmi, Mabayoje, Modinat Abolore, Akinrotimi, Akinyemi Omololu, and Akintola, Ganiyat Abimbola
- Subjects
RADIO frequency identification systems ,SOCIAL conflict ,WILLINGNESS to pay ,EARLY death ,DATA privacy ,EMOTIONAL trauma ,JUDGMENT sampling - Abstract
Kidnapping has the power to generate insecurity, social tension, psychological trauma, premature death, and many other problems in society. Therefore, any solution to the challenges caused by kidnapping in Nigeria is worth implementing. This study was conducted to determine the perspectives of the citizens in the states with a high incidence of kidnapping and their willingness to adopt implant radio frequency identification (iRFID) as a security measure against the ravaging menace. Purposive sampling technique, Taro Yamane's method at 92% confidence level and error margin ±8% were employed. A Google Form questionnaire was distributed to the residents in the concerned states, and the first 150 responses were countenanced and analyzed. Findings show that the middle-aged range (18-50 years) is the main target of the kidnappers, representing 94.7% of the respondents. Only 54.7% of the respondents know iRFID chips, and 56.7% are willing to be iRFID-chipped when deployed. Findings further revealed that the unwilling respondents hold an erroneous perspective of iRFID based on privacy, health, culture, and religion, and it is hoped that orientation programs would remedy such a perspective. The study concludes that the citizens are willing to be iRFIDchipped against the kidnapping menace despite privacy, health, cultural, and religious concerns. It is recommended that government should facilitate the deployment of iRFID. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Blockchain-Based Model for Warehouse Management Systems for Artworks and Collectibles †.
- Author
-
Maleshkov, Venelin, Valchanov, Hristo, and Aleksieva, Veneta
- Subjects
WAREHOUSE management systems ,WAREHOUSE management ,TRANSACTION records ,ENVIRONMENTAL monitoring ,HUMAN error ,RADIO frequency identification systems - Abstract
In the area of artworks and collectibles, secure storage and accurate management play crucial roles. Increased attention to the provenance, condition, and authenticity of items challenges traditional warehouse management systems (WMS). This paper introduces a novel blockchain model combined with internet of things (IoT) devices and radio-frequency identification (RFID) tags, all dedicated to the management of warehouses. It proposes a secure and accountable way to track art pieces with an immutable ledger for transaction records and real-time monitoring of IoT environmental conditions. The model addresses key challenges in the art sector, such as the security and provenance verification of the artworks, enhances inventory accuracy, reduces human error and provides a solution in terms of tracking valuable items. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. A Survey of Short-Range Wireless Communication for Ultra-Low-Power Embedded Systems.
- Author
-
Baker, Billy, Woods, John, Reed, Martin J., and Afford, Martin
- Subjects
WIRELESS communications ,NEAR field communication ,MICROCONTROLLERS ,DATA transmission systems ,INTERNET of things ,POWER transmission - Abstract
Wireless short-range communication has become widespread in the modern era, partly due to the advancement of the Internet of Things (IoT) and smart technology. This technology is now utilized in various sectors, including lighting, medical, and industrial applications. This article aims to examine the historical, present, and forthcoming advancements in wireless short-range communication. Additionally, the review will analyze the modifications made to communication protocols, such as Bluetooth, RFID and NFC, in order to better accommodate modern applications. Batteryless technology, particularly batteryless NFC, is an emerging development in short-range wireless communication that combines power and data transmission into a single carrier. This modification will significantly influence the trajectory of short-range communication and its applications. The foundation of most low-power, short-range communication applications relies on an ultra-low-power microcontroller. Therefore, this study will encompass an analysis of ultra-low-power microcontrollers and an investigation into the potential limitations they might encounter in the future. In addition to offering a thorough examination of current Wireless short-range communication, this article will also attempt to forecast future patterns and identify possible obstacles that future research may address. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. A review on positioning techniques of mobile robots.
- Author
-
Semborski, Jakub and Idzkowski, Adam
- Subjects
MOBILE robots ,RADIO waves ,TRIANGULATION - Abstract
In this article, we have reviewed the available positioning, localization and navigation techniques for mobile robots. Different localization techniques based on diverse technologies are compared with one another, along with diverse algorithms and techniques for analyzing this information. The article highlights algorithms based on odometry, triangulation, visual analysis, and marker detection. The analysis included global, local, and personal location. One acquires knowledge on which method is suitable for indoor use and which for outdoor use, as well as the appropriate environmental conditions for each. The accuracy of the individual methods was compared with that of integrated systems consisting of several methods. For practical knowledge, it is possible to determine whether a particular method is cost-effective for a particular solution and to compare the expenses involved. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Design, Fabrication and Testing of a Multifrequency Microstrip RFID Tag Antenna on Si.
- Author
-
Korfiati, Timothea, Vazouras, Christos N., Bolakis, Christos, Stavrinidis, Antonis, Stavrinidis, Giorgos, and Arapogianni, Aggeliki
- Subjects
ANTENNAS (Electronics) ,MICROSTRIP transmission lines ,HORN antennas ,PHOTOLITHOGRAPHY ,REFLECTANCE ,SPIRAL antennas - Abstract
A configurable design of a microstrip square spiral RFID tag antenna, for a wide range of microwave frequencies in the S- and C-band, is presented. The design is parameterized in dimensions, and hence changing the design frequency (or frequencies) is easy, by changing only an initial value for the spiral geometry. A tag specimen was fabricated using a Cu electroplating technique according to the design for frequencies of interest in the areas of 2.4 and 5.8 GHz. The substrate material is 320 μm high-resistivity Si and the bridge dielectric is 15 μm polyimide PI2525. The steps of the microfabrication process involve metallic structure pattern transfer techniques with optical UV lithography procedures. The reflection coefficient and antenna gain of the specimen were measured inside an anechoic enclosure using a vector network analyzer (VNA) and a TEM horn test antenna over a frequency range of up to 6 GHz. Simulated and measured results, exhibiting reasonable agreement, are presented and discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Development and Implementation of an RFID-Enabled Automatic Rice Vending System Using Arduino Mega 2560.
- Author
-
Ritzkal, Prakosa, Bayu Adhi, Aprian, Alief Juan, Ikhsan, Safaruddin Hidayat Al, Muljono, and Zaky, Umar
- Subjects
RADIO frequency identification systems ,LIQUID crystal displays ,RADIO technology - Abstract
A technology known as radio frequency identification (RFID) makes it possible to automatically and connectionless identify items using radio frequency. The development of the RFID system, the production of the prototype, and the integration of the system with the rice sales prototype are the many steps of this research. The purpose of this research is to propose the creation and development of an automated rice sales prototype with RFID capabilities, which offers a customization feature through a keypad to select the desired amount of rice. To enhance customer convenience in understanding the amount of rice and total cost, a Liquid Crystal Display (LCD) is integrated into the hardware interface of the rice selling prototype. RFID reader modules and RFID cards are used as a secure payment method. The utilization of this RFID system allows for a faster and more secure transaction process. The results of this research include the development of an automated rice sales tool prototype that successfully uses RFID technology to identify buyers. Performance evaluation of the prototype showed efficiency in the sales process and enhanced transaction security. The successful integration of RFID enables quick identification of buyers, increases sales productivity, and provides a more convenient purchasing experience. These findings confirm the potential of RFID in improving automation and security in rice selling systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. SwiftQ: A Time-Efficient RFID Collision Arbitration Algorithm for Gen2-Based RFID Systems.
- Author
-
Donghwan Lee and Wonjun Lee
- Abstract
In the realm of large-scale identification deployments, the EPCglobal Class-1 Generation-2 (Gen2) standard serves as a cornerstone, facilitating rapid processing of numerous passive RFID tags. The Q-Algorithm has garnered considerable attention for its potential to markedly enhance the efficiency of Gen2-based RFID systems with minimal adjustments. This paper introduces a groundbreaking iteration of the Q-Algorithm, termed Time-Efficient Q-Algorithm (SwiftQ), specifically designed to push the boundaries of time efficiency within Gen2-based RFID systems. Through exhaustive simulations, our study substantiates that SwiftQ outperforms existing algorithms by a significant margin, demonstrating exceptional expediency that positions it as a formidable contender in the landscape of large-scale identification environments. By prioritizing time efficiency, SwiftQ offers a promising solution to meet the escalating demands of contemporary Internet of Things applications, underscoring its potential to catalyze advancements in RFID technology for diverse industrial and logistical contexts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. A Billion Little Pieces, by Jordan Frith
- Author
-
Joel Blechinger
- Subjects
data ,infrastructure ,privacy ,radio-frequency identification ,RFID ,Bibliography. Library science. Information resources - Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.