RFID Project Technical Report
|
|
- Dominick Welch
- 6 years ago
- Views:
Transcription
1 RFID Project Technical Report Bernard Ghanem 1. Introduction The use of Radio Frequency Identification (RFID) technology extends historically to the 1970 s, when the first commercial products emerged. The introduction of this technology motivated future research that sought to integrate RFID into various applications ranging from inventory control/monitoring to human/animal tracking. However, the practical significance of this technology was not fully realized, until mass manufacturing of RFID tags and readers, at different scales and for different ranges, was made possible. Currently, RFID-based systems are being proposed as alternatives to previously established technologies (e.g. Wi-Fi for indoor identification and tracking) and as extensions to others (e.g. GPS localization and tracking in indoor settings). A basic RFID system is comprised of three main elements, as follows: RFID tags/transponders: These are simple communication devices that are activated by incoming registration from the RFID reader, when it is in its operating range (e.g. 3m-10m). They usually contain a small amount of readable/writable memory, which is used to save a unique ID and other important information (e.g. temperature logs). RFID reader: On one side, the reader communicates with and accesses the RFID tags via an antenna, whose size is dictated by the desired range of the reader and its power constraint. On the other, it connects to a processing unit, which initiates read/write operations and is responsible for post processing of the data acquired. Processing unit: This can be either a stationary (e.g. PC) or mobile platform (e.g. PDA). It integrates the reader-tag subsystem into a higher level application (e.g. tag deployment, temperature monitoring, etc.). The concept of RFID systems has been available for a long time, yet only recently has its potential been manifested in applications of ever-growing demand. The recent popularity of RFID technology is due to the following fundamental properties that characterize the production, deployment, and functionality of RFID systems. (1) The recent ability to acquire low cost and power efficient RFID equipment has supported a novel trend in RFID system research that seeks to replace current technologies. (2) Its non-contact, non line-of-sight functionality allows for remote access of data through a variety of substances such as concrete, paint, and wood, which pose impeding obstacles to its optical counterparts (e.g. barcodes). (3) Due to its data storage capacity and the addition of diverse sensors to RFID tags, this technology has the potential of bridging the growing gap between the digital networked world and the physical world [3]. This provides a low cost means for ubiquitous sensing of environmental parameters, which is not restricted to measurement alone, but it can also render intelligent monitoring of these parameters and their temporal fluctuations. For example, RFID tags equipped with humidity and temperature sensors have been utilized during the transport and delivery of perishable products including fruits, vegetables, and meat (e.g. Sensitech Inc.). In this report, we describe details of an ongoing project that aims at integrating RFID technology into building infrastructure non-invasively. We present the significance of utilizing RFID within buildings as a cornerstone for 1
2 ubiquitous sensing and describe three applications we have developed: RFID tag management, continuous temperature monitoring, and real-time indoor location sensing. These applications are user-friendly implementations that facilitate the manipulation of the data stored in the RFID tags especially in regards to location information and temperature logs. 2. Current System Setup We are using an RFID system based on Intelligent Long Range (ILR) technology provided by IDENTEC SOLUTIONS. Figure 1 illustrates the overall setup of our RFID system. We make use of two types of semi-passive RFID tags (i.e. i-d2 and i-q32t), which share common properties, but are characterized by complimentary functionality. In what follows, we provide a brief description of each tag. i-d2 tags are used for location sensing; they can be detected by a mobile reader unit up to 6m away. These tags can be mounted on the walls of corridors and/or rooms in order to span the required space. They contain a small amount of volatile memory (i.e. 64 bytes), which is used to save its unique ID, location information, and other local properties. They are equipped with an LED that facilitates identification of the tag. i-q32t tags log temperature measurements over time at a user defined rate and transmit them to a reader up to 100m away. They contain a relatively larger memory capacity (i.e. approximately 6000 bytes). They also have embedded LEDs for visual identification. Figure 1. (a) shows the two types of tags currently being used. The gray tag on the right is an i-d2 tag, while the black one is the i-q32t tag. (b) shows an i-cardiii RFID reader, which can be embedded into a PC or PDA processing unit via a PCMCIA type II slot. (c) shows two types of antennas that are used depending on the application. The longer antenna on the left increases the range of the reader to 100m and is primarily used with a PC configuration. On the other hand, the shorter antenna is meant for mobility and is connected to a reader embedded in a PDA. The range of this antenna is an order of magnitude smaller than the longer one. Since indoor settings are being considered, we require the tags to be spatially fixed, while the reader can be either spatially fixed or allowed to roam. Consequently, the tags are non-invasively attached to building infrastructure at locations that are convenient for its underlying functionality. For example, since i-d2 tags will be used for location sensing and tracking, they are positioned uniformly along walls, such that the tag-to-tag distance allows for adequate RF coverage. On the other hand, since the i-q32t tags will be used for temperature logging, they are positioned in strategic positions within rooms to account for local temperature distribution. In Section 3, we describe how we exploited this simple setup to implement an RFID system, which is capable of three main applications: tag deployment, temperature monitoring, and location sensing. 3. Description of System Components In this section, we illustrate how an RFID distributed system, as described previously, can be applied to three real world problems prevalent in indoor settings: (1) tag management/deployment, (2) continuous temperature monitoring, and (3) distributed location sensing. Figure 2 illustrates an overview of all three applications. (1) is
3 essential since the other applications assume that the tags have been deployed successfully within the building. (2) & (3) build on the location-based information available through tag deployment to respectively manage higherlevel local information (i.e. temperature measurements) and deduce more global characteristics (i.e. sensing the position of a handheld RFID reader from the deployment information of tags in its vicinity). Figure 2. Application (1) is responsible for storing the user-defined deployment information on the corresponding tags. Application (2) allows for continuous monitoring of room temperature based on the temperature measurements relayed by the i-q32t tags. Application (3) performs real-time location sensing of an RFID reader, given the location and power information of the tags in its vicinity Application (1): Tag Deployment/Management Inherently, each RFID tag is given a unique ID, which enables the reader to distinguish it amongst other tags. Although this uniqueness is vital for any RFID application, it does not give much insight on the local properties of the tag, most importantly its locale. Consequently, we propose to make each tag aware of its local position, which is determined by its image coordinates within a map among a set of predefined maps. In fact, each tag stores these local coordinates in addition to the map name, which uniquely identifies that map (e.g. floor number within a multi-floor building). For this purpose, we developed a user interactive application, which allows building administrators to manage the deployment of RFID tags as they are installed within the building. Figure 3 gives an overview of this application s functionality. Indeed, it is responsible for transferring the desired deployment information (i.e. position information and tag options) to the tags themselves. Figure 4 depicts the interface of this application. The user simply chooses the tag to be positioned and identifies its local position by clicking on the corresponding position on the given map. In this case, there are four maps to choose from. Also, navigation between tags and maps is facilitated, as the selected deployed tag is bounded by a green box. All deployed tags are represented by red blobs at their corresponding positions within the map.
4 Figure 3. Flow chart for the functionality of Application (1) When an i-q32t tag is being installed, its temperature logging interval (i.e. the interval of time between any two time stamps corresponding to consecutive temperature measurements) should be set by the user. The default log interval is one minute. Here, we note that a secondary application was developed to allow the user to define the rooms designated for RFID usage (color coded on the map in yellow) and set their individual properties (e.g. temperature thresholds that will be used in Section 3.2). Figure 4. The user interface to the deployment application. Tags are identified by their type (i.e. id2 or i-q32t) and their unique ID. A deployed tag is marked by an asterisk and the selected tag is identified by a green box. The Deploy button is responsible for storing the user-defined location and map ID onto the selected tag. The Undeploy button reverses the results of the Deploy button. The Scan button permits additional scanning when new tags are introduced to the vicinity. This interface allows for three main functions, which hide the underlying operations required to successfully
5 complete them. (1) By clicking the Deploy button, the label of the chosen map and the local coordinates in this map (as denoted in the X and Y coordinate labels) are stored on the respective tag by writing them as a single string to that tag. A deployed tag is identified by an asterisk. For an i-q32t tag, the specified logging interval is also written to it. (2) When the Undeploy button is clicked, the deployment information of the selected tag is cleared from its memory. This function is essential for the purpose of redeployment or decommissioning of tags that are to be relocated or disposed of. (3) The Scan button allows the user to rescan the vicinity for all possible tags. This function is required in order to deploy new tags that were not visible previously. Moreover, the deployed tag information can be stored offline in a tag description database, which must be kept up-to-date to the current tag status. In summary, this tag management tool provides user-friendly visualization of where a tag is (or will be) deployed within a map. More importantly, it forms a basis for the higher-level applications to be discussed in Sections 3.2 and Application (2): Temperature Monitoring In this section, we show how an i-q32t tag s ability to measure temperature in its proximity is combined with its location information to render a continuous temperature monitoring system. Such a system finds important use in case of fire, when a locally powered distributed system can be exploited to give a rapid assessment of the extent, history, and location of the hazard. In Figure 5, we illustrate the flow of information and decisions within the framework of this application. Basically, the temperature daemon scans the vicinity for deployed i-q32t tags, extracts their temperature logs, and decides whether a thermal irregularity has occurred. Such an irregularity is defined by the inherent properties of the room within which these tags are located. If such an irregularity is observed, a warning log is formed for future reference and an immediate emergency response is initiated (i.e. sound a fire alarm, contact authorities, etc.). In our implementation, we designate a single i-q32t tag to a given room and restrict the emergency response to a simple beeping. Figure 5. Flow chart for the functionality of Application (2) Once temperature logging tags are deployed, the user can easily monitor and visualize the temporal variations in individual rooms, by using the interface depicted in Figure 6. Two modes of operation are made available. (1) In manual mode, the user can scroll the time line through the temperature logs of each room over the last 24 hour period. These variations are depicted via a color map, which defines thresholds for the three regions of
6 operation: cold, moderate, and warm. Also, the user can view temporal variations of temperature logs for a single tag by right-clicking the tag in the list and viewing its temperature plot, as shown in Figure 7. (2) Continuous temperature monitoring is the second mode of operation for this application. In this mode, only the most recent temperature of the rooms under study is portrayed, while the tags are scanned at a periodic interval specified by the user. This mode supports the detection of any temperature irregularity, which might occur in case the threshold assigned to a given room in the map is exceeded. The application checks for such irregularities at every new scan of the tags in the vicinity. When the permissible threshold is exceeded, a warning is issued and it is saved to a warning log file. This warning identifies the location, time, and extent (most recent temperature recorded) of the irregularity. Figure 6. This figure shows the user interface for Application (2) Application (3): Indoor Location Sensing The location information stored on the i-d2 RFID tags can be exploited to implement a location tracking system, which estimates the approximate position of the RFID reader relative to the positions of the tags detected in its immediate vicinity. Previous work on RFID-based, indoor, location sensing/tracking [1, 2] aimed at tracking an RFID tag relative to stationary reference RFID readers. Our goal is just the reverse, where the tags are fixed to the building s infrastructure and the reader is the mobile agent, whose relative position needs to be estimated. Deployment information accessible from the tags permits estimation of the global position of the reader with
7 Figure 7. A temporal plot of the temperature measured by the selected i-q32t tag. respect to the map that they belong to. This application is of significant importance during emergency situations, where an agent requires real-time localization and possible path planning towards a certain destination (e.g. an exit during a fire). Figure 8 illustrates the main components of this application. In essence, this application is loaded into a mobile agent (a PDA in our case), which is equipped with an RFID reader and a short range antenna. It scans for deployed i-d2 tags in its proximity. From their deployment information, it deduces which map it should belong to, populates this map with the positions of the tags, and proceeds to estimate its own position. We propose to use a form of triangulation to render an adequate approximation of the reader s global position. Our approach utilizes a direct neighborhood algorithm that takes into account the ranges of the detected tags, and their received power profiles. In order to provide a more accurate estimation, we conduct offline experiments to determine the power vs. range relationship of a typical i-d2 tag. Figure 9 shows the transmission power profile of an RFID reader through a range of distances. So, from the received power signature of each scanned tag (i.e. the transmission power setting of the reader once the tag is detected), an estimate of its distance to the reader is attained according to this defined mapping. By assuming omni-directional transmission, we can draw a simple geometric equivalence from the problem of estimating the reader s global position. Each tag can be represented as a disc, whose center is located at the respective tag position in the map and radius is the estimated distance from the reader. This distance is proportional to the uncertainty that the reader lies within this range. Hence, location sensing becomes a problem of determining the intersection of all these discs. Obviously, if more tags are deployed in the vicinity of the reader, the intersection area will be smaller and the position estimate will be more accurate. Figure 10 shows the result of a location sensing task, with three deployed tags in the reader s range. There are three partially visible circles of different radii, whose intersection identifies the region enclosing the reader. We define the largest enclosed disc (color coded in green) within this intersection region to be the area within which the reader is located (approximated as
8 Figure 8. Flow chart for the functionality of Application (3) Figure 9. Experimental results for the relationship between the maximum power needed by the RFID reader to successfully access an i-d2 tag located at a certain distance from the reader. We resort to linear interpolation to acquire a continuous mapping between distance and transmission power. its center).
9 Figure 10. Interface of Application (3) on a PDA equipped with an RFID reader. 4. Conclusion and Future Work In this report, we have described a user-centric RFID-based system for indoor environment monitoring and location sensing. Currently, three user-friendly applications have been implemented that hide the underlying complexity of operating the RFID equipment, while providing the desired functionality. For future work, we aim at conducting more extensive experiments to validate the accuracy of our location sensing implementation. In fact, these experiments will entitle the following scenario: a number of tags are placed uniformly along a hallway, which the hand-held reader traverses. In this controlled environment, we will compare the groundtruth localization to that estimated by our application. Further, experiments should be conducted to estimate the number of uniformly spaced tags needed to approximate a reader s position with a given precision. Moreover, we aim at embedding the location sensing application into a real-time tracking system and extending it to include a path planner. This provides the user with not only his/her locale, but also navigational information for a given pair of destination and source locations. These extensions will incorporate more detailed information about the surroundings and map structure. References [1] D. Cox, V. Kindratenko, and D. Pointer. Intellibadgetm: Towards providing location-aware value-added services at academic conferences. Proc. of the International Conference on Ubiquitous Computing, pages , [2] L. M. Ni, Y. Liu, Y. C. Lau, and A. Patil. LANDMARC: Indoor location sensing using active RFID. Proc. of the International Conference on Pervasive Computing and Communications, pages , [3] R. Want. Enabling ubiquitous sensing with RFID. IEEE Computer Society: Invisible Computing, 37(4):84 86, 2004.
Imagine the Power of Knowing. An introduction to our Company
Imagine the Power of Knowing. An introduction to our Company RFID Hardware, Software, and Systems. We offer one of the world s largest selections of RFID products and solutions. Who is GAO RFID Inc.? GAO
More informationTHE AUTONOMOUS REAL-TIME SYSTEM FOR UBIQUITOUS CONSTRUCTION RESOURCE TRACKING. Edmonton, Canada T6G 2W2 (*Corresponding author:
THE AUTONOMOUS REAL-TIME SYSTEM FOR UBIQUITOUS CONSTRUCTION RESOURCE TRACKING * M. Soleimanifar 1, D. Beard 2, P. Sissons 2, M. Lu 1, M. Carnduff 3, 1 University of Alberta Edmonton, Canada T6G 2W2 (*Corresponding
More informationResearch Activities. RFID and Wireless Technologies for Transportation Industry
RFID and Wireless Technologies for Transportation Industry Radisson SAS Scandinavia Hotel, Oslo, 30 April 2008 Research Activities RFID and Wireless Technologies for Transportation Industry O. Vermesan,
More informationAvonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web:
RFID For Inventory Control & Security Presented By: Avonwood Developments Ltd. Avonwood Developments Ltd. Innovative products and services for identification and asset management under the brand name Eureka
More informationTips for Deploying Wireless Networks for AS/RS and AGV Systems. Calvin Chuko Product Manager
Tips for Deploying Wireless Networks for AS/RS and AGV Systems Calvin Chuko Product Manager Abstract Modern factories are increasingly deploying AS/RS and AGV systems in their facilities worldwide to optimize
More informationWHY RFID FOR LIBRARIES
RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARY TRACKING RFID-enabled systems have moved beyond security to become tracking and management systems that combine security with more efficient tracking of
More informationCenter for Innovative Technology (CIT) In conjunction with our partners Smart City Works, LLC and TechNexus (the SCITI Program)
Center for Innovative Technology (CIT) In conjunction with our partners Smart City Works, LLC and TechNexus (the SCITI Program) Requests Innovators with capabilities in the following area Technical Specification:
More informationHEALTHCARE INDUSTRY VISION: SMART INVENTORY MANAGEMENT SYSTEM
HEALTHCARE INDUSTRY VISION: SMART INVENTORY MANAGEMENT SYSTEM TERSO SOLUTIONS SMART INVENTORY MANAGEMENT SYSTEM AN INDUSTRY VISION SUMMARY: This paper will enable executives in the healthcare sector to
More informationModule 7 Evaluation and Selection
Module 7 Evaluation and Selection RFID systems can be made up of many different components, standards and differing RFID technology; any combination of which can have different performance, cost and implementation
More informationP R O D U C T I O N I N V E N T O R Y S C A N N I N G G L O B A L B A K E P R EP A R E D B Y :G L O B A LB AK E 1 D E C E MB E R
PRODUCTION INVENTORY SCANNING G L O B A L B A K E PREPARED BY:GLOBALBAKE 1 DECEMBER 2007 CONTENTS INTRODUCTION......... 3 OVERVIEW......... 4 SOLUTION DELIVERY......... 6 SOFTWARE... 6 HARDWARE... 6 HANDHELD
More informationTop 7 Considerations to Choose the Right RFID Tag
Top 7 Considerations to Choose the Right RFID Tag With thousands of RFID tag configurations to choose from, and new ones introduced almost daily, how do you sort through the sea of passive transponders
More informationWhat is Automated Data Collection (ADC)?
What is Automated Data Collection (ADC)? A technology network designed by both hardware and software vendors in which devices and software may work independently or together to automate processes within
More informationS P O N S O R E D B Y. Place logo here
S P O N S O R E D B Y Place logo here DIRECTV Broadcast Systems: Asset Management Program In 2010 implemented a comprehensive program for management of all Physical/Hardware Assets. Currently 200,000 line
More informationDon t Make the Mistake of Using RFID Technology With an Application Built for Barcodes
An Entigral White Paper 3716 National Drive Suite 200 Raleigh, North Carolina 27612 919-787-5885 www.entigral.com Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes
More informationThe Monitoring System of Marine Refrigerated Containers Based on RFID Temperature Tags
Research Journal of Applied Sciences, Engineering and Technology 5(8): 2551-2555, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September
More informationFoundation Certification Blueprint. Version 1.0
Foundation Certification Blueprint Version 1.0 Date: Sept. 3, 2013 Foundation Certification Blueprint Sept. 3, 2013 Page 1 TABLE OF CONTENTS 1 Introduction... 2 1.1 Purpose...2 1.2 Scope...2 1.3 Document
More informationThe Goat. Precision Agriculture in the Citrus Industry
The Goat Precision Agriculture in the Citrus Industry Outline Goat System GPS Background Information System Configuration Citrus Harvesting Goat Application The Goat A Simple, Easy to Use, Data Collection
More informationCHAPTER 7 DESIGN AND IMPLEMENTATION OF AN APPLICATION LAYER ORIENTED ARCHITECTURE FOR RFID SYSTEMS
CHAPTER 7 DESIGN AND IMPLEMENTATION OF AN APPLICATION LAYER ORIENTED ARCHITECTURE FOR RFID SYSTEMS 7.1 INTRODUCTION This part of the work proposes an Application layer oriented architecture and its implementation
More informationContent. 5. Appendix Technical Specifications... 13
User Manual v1.0 Content Content... 1 1. Disclaimer and Warning... 2 2. XLink at a glance... 2 System requirements... 2 Parts list... 2 What s included... 3 Terminology... 3 3. 2.4G Bluetooth digital transmitter...
More informationNormalization, Dilution and Transfer Methods for the Maxprep TM Liquid Handler Technical Manual
Normalization, Dilution and Transfer Methods for the Maxprep TM Liquid Handler Technical Manual Instructions for use of Products AS9100, AS9101, AS9200, AS9201 TM530 11/17 Table of Contents 1 Description...2
More informationAn RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises
An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises Turcu, Cristina Elena Prodan, Remus Catalin Popa, Valentin 14 th December 2005
More informationLetter Report: An RFID-enabled Warehouse at DRDC Valcartier
Letter Report: An RFID-enabled Warehouse at DRDC Valcartier Prepared for: Resources Management, DRDC Valcartier From: Qinghan Xiao, Network Information Operations Section, DRDC Ottawa Date: April 16, 2010
More informationRFID - Making It So...With Some Help From the University of Florida 1
CIR1465 RFID - Making It So...With Some Help From the University of Florida 1 Bruce A. Welt and Jean-Pierre Emond 2 Introduction Recent advances in passive radio frequency identification (RFID) technologies
More informationCross Industrial IOT Application Stephen Wai Sr. Mgr. Business Development
Cross Industrial IOT Application Stephen Wai Sr. Mgr. Business Development swai@lscm.hk LSCM R&D Centre [Source:Postscape - https://www.postscapes.com/what-exactly-is-the-internet-of-things-infographic/
More informationDRONE DETECTION SYSTEM F.A.Q. SHEET - AARTOS MADE IN GERMANY. aaronia.com/drone. aaronia.com/d
WWW.AARONIA.DE F.A.Q. SHEET - AARTOS DRONE DETECTION SYSTEM 180 225 90 270 315 0 45 90 135 180 rone aaronia.com/d All-In-One Solution, NO Additional Hardware or Software Required Real-Time Remote Controllable
More informationThe RTLS GUIDE 2.0. Real-Time Location Systems
The RTLS GUIDE Real-Time Location Systems 2.0 CHAPTER 1 The Basics: What is RTLS? CHAPTER 2 The Variety of RTLS Options CHAPTER 3 Practical Applications for RTLS and Key Benefits CHAPTER 4 Virtually Limitless
More informationAlien RTU Guide Version 3.9
Alien RTU Guide Version 3.9 OSSI W228 N727 Westmound Dr Waukesha WI 53186 USA TEL: 262-522-1870 FAX: 262-522-1872 Ossi-usa.com Intelli-Site Security Management Software Alien RTU Guide PC Software RTU
More informationBasics of EPC. Training
Basics of EPC Training Introduction Objectives: - Create awareness of the concepts - Develop technical knowledge - Show benefits of implementation - Explain 5 steps of Implementation 2 Programme Introduction
More informationIQ On Metal Labels User Guide and FAQ
IQ On Metal Labels User Guide and FAQ Omni-ID office locations: US UK China India Germany PAG001866-05 - Omni-ID User Guide - IQ labels - 05132017 CONTENTS INTRODUCTION... 3 MEMORY VERSUS READ RANGE...
More informationScheduler Book Mode User Guide Version 4.81
Scheduler Book Mode User Guide Version 4.81 Contents Introduction...2 Scheduler Active Tab...2 Appointment Colors and Markings...2 Setting Book Mode...3 Active Tab Options...3 Active Tab Use...3 Active
More informationAGENDA. Asset Trail Active Tracking solution
AIDC platform Asset Trail - Active Tracking AGENDA Company Brief Introduction Asset Trail Active Tracking solution Asset Trail Product Brief Asset Trail Solution samples Summary About us A joint venture
More informationRFID, Web-Based, and Artificial Intelligence Integration in Facilities Management
RFID, Web-Based, and Artificial Intelligence Integration in Facilities Management Chien-Ho Ko Department of Civil Engineering, National Pingtung University of Science and Technology, Taiwan E-mail: ko@mailnpustedutw
More informationCONSTRUCTION MANAGEMENT TOOLS USING 3D-CAD, VIRTUAL REALITY, RFID, AND PHOTOGRAPHY TECHNOLOGIES
CONSTRUCTION MANAGEMENT TOOLS USING 3D-CAD, VIRTUAL REALITY, RFID, AND PHOTOGRAPHY TECHNOLOGIES Naruo Kano, Dr.Eng Professor, Department of Architecture Waseda University 3-4-1 Okubo,Shinjuku, Tokyo, JAPAN
More informationThe Internet of Things (IoT) in Supply Chain and Logistics
The Internet of Things (IoT) in Supply Chain and Logistics 2016 Research Findings IoT is changing the way supply chain and logistics are managed. We polled 600 supply chain decision-makers to learn about
More informationLeading manufacturer of water purifiers required a RFID-based INVENTORY MANAGEMENT SYSTEM
Leading manufacturer of water purifiers required a RFID-based INVENTORY MANAGEMENT SYSTEM Intelligent search and management of component inventory in manufacturing water purifiers Accurate monitoring of
More informationSICK Airport Innovations. Sensors and solutions
SICK Airport Innovations Sensors and solutions THIS IS SICK Airport innovations The most important processes at an airport take place on the ground. Numerous logistics processes at the airport run smoothly
More informationRETAIL ITEM INTELLIGENCE
RETAIL ITEM INTELLIGENCE DRIVE SALES & IMPROVE STORE OPERATIONS Automate processes and streamline operations with RAIN RFID STYLE: 212 COLOR: WHITE SIZE: S ITEM INTELLIGENCE Brings Visibility and Insight
More informationRFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas
RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision
More informationAN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS
A APPLICATIO OF RFID I MOITORIG AGRICULTURAL MATERIAL PRODUCTS Jianhui Du 1, 2, Peipei Li 1, Wanlin Gao 1,*, Dezhong Wang 1, Qing Wang 1, ilong Zhu 1 1 College of Information and Electrical Engineering,
More informationSIMATIC RF300 level up: Reading accuracy for the material flows of tomorrow siemens.com/rf300
State-of-the-RFID RF300 level up: Reading accuracy for the material flows of tomorrow siemens.com/rf300 Even more convenient Even more efficient Distinguishing features of the new RF300 reader generation
More informationITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS
ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS Automate processes and streamline operations with RAIN RFID WAREHOUSE 2 DOCK 12 RECEIVED 2017 Impinj, Inc. 1 ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS
More informationCombat Feeding RFID Technical Demonstration Feb 23-26, 2004 CW4 Stephen Moody U.S. Army RDECOM, Natick Soldier Center Combat Feeding Directorate
Executive Conference Hilton Chicago March 29 to 31, 2004 Combat Feeding RFID Technical Demonstration Feb 23-26, 2004 CW4 Stephen Moody U.S. Army RDECOM, Natick Soldier Center Combat Feeding Directorate
More informationUWB IEEE a Ultra Wide Band wireless technology
RTLS TECHNOLOGY OVERVIEW Real time location system features wireless UWB technology enabling superior precise object tracking for months of battery lifetime. UWB IEEE 802.15.4 a Ultra Wide Band wireless
More informationRemote AMD Operator Manual
Remote AMD Operator Manual SOFTWARE Remote AMD V1.0.3 User manual (English) Project name: Project: Order / Project NO.: 1-2 Index 1. Introduction ---------------------------------------------------- 1-4
More informationTUBE INSPECTION SYSTEM
PRODUCT BROCHURE TUBE INSPECTION SYSTEM Tube measurement and production with the ROMER Absolute Arm 2 TUBE INSPECTION SYSTEM HIGHLIGHTS TUBE MEASUREMENT HAS A NEW SHAPE Hexagon Metrology s Tube Inspection
More informationKeyedIn Projects ios App User Guide Version 2.0 June 2015
KeyedIn Projects ios App User Guide Version 2.0 June 2015 KeyedIn Projects ios App User Guide 1 of 18 Introduction 3 Core Features 3 Advantages 3 Benefits 3 Requirements 4 Logging In 4 Navigation 5 Home
More informationNox DoD. User Guide. Version 3.0.x. Nox for DoD User Guide! Page 1
Nox DoD User Guide Version 3.0.x Nox for DoD User Guide! Page 1 Contents Overview! 3 Shipment Manager -- Nox Administrator Roles! 3 Floor Manager / Packaging -- Nox User Roles! 4 Helpful Notes! 5 Creating
More informationSummary. CAEN group overview. CAEN RFID products. Cold Chain Case Histories
RFID Conference in Struer, 12-13th October 2011 Summary CAEN group overview CAEN RFID products Cold Chain Case Histories CAEN: from High Energy Physics to RFID Founded in 1980, Headquarters in Viareggio
More informationNovel Tag Anti-collision Algorithm with Adaptive Grouping
Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract
More informationHow RFID/RTLS solutions create productivity and efficiency gains, reduce lead-times and save cost
How RFID/RTLS solutions create productivity and efficiency gains, reduce lead-times and save cost The presentation tells the story of the world s largest RTLS (Real Time Locating System) at Vehnet s customer,
More informationDeltek Touch Time & Expense for GovCon 1.2. User Guide
Deltek Touch Time & Expense for GovCon 1.2 User Guide May 19, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical errors
More informationIntegrated System Display
RAIL SOLUTIONS Integrated System Display SPACE SAVING Use as a single display for multiple auxillary systems. Subsystems that were typically installed in the drivers cab can now be installed at other convenient
More informationGuidelines for Using RFID Tags in Ontario Public Libraries
Guidelines for Using RFID Tags in Ontario Public Libraries Information and Privacy Commissioner/Ontario Ann Cavoukian, Ph.D. Commissioner June 2004 Acknowledgements These Guidelines build upon three previous
More informationRFID-based self-service baggage-counter with base-36 security key algorithm
RFID-based self-service baggage-counter with base-36 security key algorithm 1 Jahdiel S. Villosa, 1 John A. Bacus, 1 Jeffrey G. Garrido, 1 King Roland N. Geyrozaga, 2* Rodrigo S. Pangantihon Jr. 1,2 Computer
More informationUSER S GUIDE. ESTCP Project ER Methods for Minimization and Management of Variability in Long-Term Groundwater Monitoring Results
USER S GUIDE Methods for Minimization and Management of Variability in Long-Term Groundwater Monitoring Results ESTCP Project ER-201209 Dr. Thomas McHugh GSI Environmental, Inc. SEPTEMBER 2015 Distribution
More informationIdentification & Traceability Solutions for the Industry
www.rfidea.com Identification & Traceability Solutions for the Industry Development & Integration of Global Traceability Solutions Expert in RFID technology NEUTRAL positioning towards manufacturers &
More informationLogistics Gate with SIMATIC RF600
Application Example 07/2015 Logistics Gate with SIMATIC RF600 RF600 / Windows application https://support.industry.siemens.com/cs/ww/en/view/109476352 Warranty and Liability Warranty and Liability Note
More informationMicrosoft Dynamics GP 2015 Benefit Self Service Released: December 5, 2014
Microsoft Dynamics GP 2015 Benefit Self Service Released: December 5, 2014 Benefit Self Service User s Guide 1 Conditions and Terms of Use Microsoft Partner - See Terms of Use [NDA Required] This training
More informationPerformance Analysis,Modeling & Capacity Planning with IBM Content Capacity Planner Tool
Performance Analysis,Modeling & Capacity Planning with IBM Content Capacity Planner Tool Table of Contents: 1. Introduction 2. Overview of IBM Content Capacity Planner Tool. 3. Benefits of using IBM Content
More informationFROM RFID TO THE INTERNET OF THINGS. Intelligent and Networked Products A product and manufacturing perspective
Pervasive Networked Systems Intelligent and Networked Products A product and manufacturing perspective Klaus-Dieter Thoben tho@biba.uni-bremen.de The Progress of Competitive Advantage Competitive Position
More informationDEVELOPMENT OF RFID-BASED FLOW EXAMINATION SYSTEM
DEVELOPMENT OF RFID-BASED FLOW EXAMINATION SYSTEM Tetsu KONDO, Shigeru UCHIDA, Tomoya KANEKO, Koji HAMADA Building Construction Engineering Department, Technical Research Institute, OBAYASHI Corporation
More informationEnergy Efficiency Impact Study
Energy Efficiency Impact Study for the Preferred Resources Pilot February, 2016 For further information, contact PreferredResources@sce.com 2 1. Executive Summary Southern California Edison (SCE) is interested
More informationKeys to a successful WAREHOUSE MANAGEMENT SYSTEM (WMS)
Keys to a successful WAREHOUSE MANAGEMENT SYSTEM (WMS) www.lidd.ca table of contents Understand How to Evaluate your Current WMS vs Other Solutions on the Market...3 W stands for Warehouse...4 M stands
More informationlbfoster.com CXT CONCRETE TIES CATALOG
CXT CONCRETE TIES CATALOG L.B. Foster offers a complete line of CXT concrete railroad ties. Our catalog of concrete ties includes standard track, turnout, gantry and specialty ties, such as guard rail,
More information// The powerful All-Rounder for your Quality Assurance: ipq-center. Be inspired. Move forward.
// The powerful All-Rounder for your Quality Assurance: ipq-center. Be inspired. Move forward. CONSTANT QUALITY ASSURANCE AS A CHALLENGE. In the printing industry demands on the product quality are high,
More informationTable of contents. Reports...15 Printing reports Resources...30 Accessing help...30 Technical support numbers...31
WorldShip 2018 User Guide The WorldShip software provides an easy way to automate your shipping tasks. You can quickly process all your UPS shipments, print labels and invoices, electronically transmit
More informationCyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO
Cyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO WEIGANG.NEO: Our Philosophy Leading innovator in production organisation of the future WEIGANG.NEO stands for modern, revolutionary
More informationApplying RFID Hand-Held Device for Factory Equipment Diagnosis
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,
More informationNIMBUS Security & Surveillance Solutions Designing Solutions That Protect
Address Suites 6, 2nd Floor, Evacuee Trust Complex, Sir Agha Khan Road, F-5/1, Islamabad Phone & Fax +92 51 999 111 333 +92 51 999 111 333 Email & Website info@companyname.com www.companyname.com Facebook
More informationRFID enabled Solutions TYRE MANAGEMENT
RFID enabled Solutions TYRE MANAGEMENT Why RFID Bar Code Requires Line of - Site Requires correct orientation Easily obscured by dirt Easily scratched or damaged Contents cannot be modified Can only read
More informationLong-Range Reader/Writer
Features Read and Write to Dozens of Tags Simultaneously (Multiple-Tag-In-Field) Industrial Strength Reader/Writer (IP66) Large Read/Write Area International Recognized Frequency of 13.56 MHz RS422 Bus
More informationTransnet RFID System April 10,2012
Transnet RFID System April 10,2012 Alex Moore (Chief Executive Officer) Database query processing RFID reader programming Daniel Frigo (Chief Operations Officer) Image processing development Integration
More informationOptimising Inbound, Warehousing and Outbound Strategies
Warehouse Management EXECUTIVE SUMMARY Optimising Inbound, Warehousing and Outbound Strategies Control the movement of stock within a warehouse or across multiple facilities. Process associated transactions
More information3M Ariba Light Account Network Collaboration for Suppliers
SAP Training Source To Pay 3M Ariba Light Account Network Collaboration for Suppliers External User Training Version: 1.0 Last Updated: 31-Aug-2017 3M Business Transformation & Information Technology Progress
More informationOrigin-Destination Trips and Skims Matrices
Origin-Destination Trips and Skims Matrices presented by César A. Segovia, AICP Senior Transportation Planner AECOM September 17, 2015 Today s Webinar Content Matrix Estimation Data sources Florida Application
More informationUsing RFID-Capable Cell Phones for Creating an Extended Navigation Assistance
Using RFID-Capable Cell Phones for Creating an Extended Navigation Assistance Andreas Loeffler and Dina Kuznetsova Chair of Information Technologies Departement of Electrical, Electronic and Communication
More informationPeopleSoft Financials epro Process Guide
epro Process Guide General Stores Requisitions Information Management Client Support Services DCATS 210 567 7777 / Option 5 epro Process Guide Version 2 May 2011 Introduction to the PeopleSoft Financials
More informationWinning in Retail With RFID: Today and Tomorrow SML RFID is a division of SML Group Limited
Winning in Retail With RFID: Today and Tomorrow 1 Winning in Retail With RFID: Today and Tomorrow Arguably, the roots of RFID technology can be traced back to the invention of radar when radio technology
More informationManaging the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER
Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER Copyrights 2004 ZIH Corp. All product names and numbers are Zebra
More informationThe Relevance of IoT and Big Data Analytics in Semiconductor Manufacturing Duncan Lee
The Relevance of IoT and Big Data Analytics in Semiconductor Manufacturing Duncan Lee Intel Technology Sdn. Bhd. Manufacturing IT Principal Engineer Agenda Intel IOT Factory Story Why We Are Still Interested
More informationMadgeTech Data Loggers
MadgeTech Data Loggers Patrick Gallagher Office: 603-456-2011 Cell: 724-591-4231 Email: pat@madgetech.com 879 Maple St Contoocook, NH 03278 www.madgetech.com -- Quality Assurance Quality assurance, or
More informationHow the IoT and Data Analytics Will Drive the Future of the Supply Chain
How the IoT and Data Analytics Will Drive the Future of the Supply Chain Dan Romary VP, Data Analytics Presented by: 2018 MHI Copyright claimed for audiovisual works and sound recordings of seminar sessions.
More informationUsing Barcodes with WinLIMS
Using Barcodes with WinLIMS The use of barcode labels as a means to quickly and positively identify samples is an ideal way to track samples to and through the laboratory. Although seemingly mysterious,
More informationCisco Connected Asset Manager for IoT Intelligence
Cisco Connected Asset Manager for IoT Intelligence Enabling Digital Transformation Across Industries 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved.
More informationScaffolding Management Software
16 Feet NON PRODUCTIVE HOUR RECORD ACTUAL SCAFFOLD PHOTOGRAPHS & ANNOTATION MATERIAL CONSUMPTION RECORD HAZARD ANALYSIS & SAFETY INSPECTION MEASURE AND COMPARE TEAM PERFORMANCE 8 Feet 4 Feet PRELIMINARY
More informationApplication of plastic containers with RFID in the marketing of fruit and vegetables in Taiwan
March, 2012 Int J Agric & Biol Eng Vol. 5 No.1 35 Application of plastic containers with RFID in the marketing of fruit and vegetables in Taiwan Chih-Cheng Hung, Chung-Teh Sheng (Department of Bio-industrial
More informationone Introduction chapter Overview Chapter
one Introduction Chapter chapter Overview 1.1 Introduction to Decision Support Systems 1.2 Defining a Decision Support System 1.3 Decision Support Systems Applications 1.4 Textbook Overview 1.5 Summary
More informationHy-Rail Limits Compliance. Functional Description. And. Human / Machine Interface
Hy-Rail Limits Compliance Functional Description And Human / Machine Interface February 11, 2002 Author: Andrew J. Schiestl General Superintendent Burlington Northern Santa Fe Railway 1 DESCRIPTION The
More informationUser s Guide. Localization system StarGazer TM for Intelligent Robots.
User s Guide Localization system StarGazer TM for Intelligent Robots www.hagisonic.com User s Guide Table of Contents 1. Product Overview -------------------------------------------------------------------------------------------------
More informationELECTRONIC TRAIN ORDERS
ELECTRONIC TRAIN ORDERS and TRAIN CONTROL Inspired Systems Pty Ltd 70 Mordaunt Circuit, Canning Vale, Western Australia Ph +618 94565666 Fax +61 8 94565778 ELECTRONIC TRAIN ORDERS When you just don t have
More informationHYPERION SYSTEM 9 PLANNING
HYPERION SYSTEM 9 PLANNING RELEASE 4.1, 4.1.1, AND 9.2 NEW FEATURES This document describes the new features included in Hyperion System 9 Planning Release 4.1, 4.1.1, and 9.2. This release expands functionality
More informationWeb-Based Decision Support System for the Quantitative Analysis of the Customers Behavior
Web-Based Decision Support System for the Quantitative Analysis of the Customers Behavior Nikos Tsourakis 1, Dimitris Pratsolis 1 and Nikos Matsatsinis 2 Technical University of Crete 1 {ntsourak, pratsdim}@telecom.tuc.gr,
More informationBio-Well GloveManual
Bio-Well Glove Manual Ver. 10-2017 Bio-Well GloveManual October 2017 Contents Terms...3 Purpose...4 Important note...4 Technical Information about Bio-Well device...5 Important Remarks and Safety Measures...5
More informationPhotogrammetric Week '03 Dieter Fritsch (Ed.) Wichmann Verlag, Heidelberg, The Way Forward. PAUL G. GARLAND, Z/I Imaging Corporation, Huntsville
Photogrammetric Week '03 Dieter Fritsch (Ed.) Wichmann Verlag, Heidelberg, 2003 Garland 17 The Way Forward PAUL G. GARLAND, Z/I Imaging Corporation, Huntsville ABSTRACT The ambition for photogrammetric
More informationRF Location Maintenance. Release (Eterm)
RF Location Maintenance Release 8.6.3 (Eterm) Legal Notices 2008 Activant Solutions Inc. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Activant and the Activant logo
More informationtempmate. -GS Stay Online and Well-Informed to Avoid Unpleasant Surprises: Cold Chain Monitoring 4.0
tempmate. -GS Real-Time Data Logger for Temperature, Humidity, Light, Impact and Location Stay Online and Well-Informed to Avoid Unpleasant Surprises: Cold Chain Monitoring 4.0 Glo-data: Global Monitoring
More informationProduct Documentation SAP Business ByDesign February Business Configuration
Product Documentation PUBLIC Business Configuration Table Of Contents 1 Business Configuration.... 4 2 Business Background... 5 2.1 Configuring Your SAP Solution... 5 2.2 Watermark... 7 2.3 Scoping...
More informationINTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID
INTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID 1 DONG HUANG, 2 HE WEI 1 School of Mathematics and Computers Science, Qinzhou University, Qinzhou 535000,China 2 Jiaxing Vocational
More informationitrack Mines Ore Movement Monitoring System (with RFID & GPS option)
1 Track Softech Solutions Kiran Patravali Flat No. 002, Ground Floor, K.T.Apartment 15, 10 th Main Road, Malleshwaram Bangalore - 560003 Cell:+91 9844751047, 09481511047 Email: kiran@tracksoftech.com Kiran.v.patravali@gmail.com
More informationThe Application used RFID in Third Party Logistics
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 2045 2049 2012 International Conference on Solid State Devices and Materials Science The Application used RFID in Third Party Logistics
More information