An Improved Anti-collision Algorithm in RFID System

Size: px
Start display at page:

Download "An Improved Anti-collision Algorithm in RFID System"

Transcription

1 An Improved Anti-collision Algorithm in RFID System Leian Liu, Zhenhua Xie, Jingtian Xi, Shengli Lai School of Electronic and Information Engineering South China University of Technology Guangzhou, , China gudu420(4163com Abstract-Collision is a familiar problem in a RFID (Radio * When there is a barrier in front of a barcode, the Frequency Identification) system. How to solve this problem barcode can not be read by a reader, but a tag can be effectively is very important to the whole RFID system. A RFID read due to the different working style; system is always made up of two indispensable components: one * A tag can be scanned by a reader more quickly than a is the tag, the other is the reader. Collisions occur when there are barcode; so many tags within the interrogation zone of a reader * A tag has a much longer life than a barcode especially communicating with the reader synchronously. Binary search when the working condition is extremely bad; algorithm is an important anti-collision algorithm to solve the * Using tags is much safer than using barcodes. collision problems. But the main disadvantage of any existing Because of merits mentioned above, RFID systems arouse algorithm based on binary search algorithm is the rate of much interest. Several big companies such as IBM, Sun and identifying the identification codes (IDs) of tags is slow. In this Microsoft have launched such programs. So in recent years, paper, an improved anti-collision algorithm is proposed. Using RFID systems develop very fast and have been used in many this algorithm will recognize more tags in less time compared areas. Identity identification and assets management are two with other existing algorithms. areas in which RFID techniques are used widely and maturely. Electronic tags are embed into lots of cards (ID cards, passports Keywords-wireless RF communication, RFID, anti-collision and employees' cards, etc) to identify people's identity, such as algorithm, multiple access access control management, access permission checking-up, etc. In the assets management area, a successful case is using I. INTRODUCTION RFID techniques to manage passengers' luggage in an airport. The RFID system is an important branch of the automatic Preventing from fakes is another use of RFID techniques. In identification system. In a RFID system, wireless RF this area, because electronic tags have lots of merits (tags can communication techniques are used. The omnipresent barcode be identified very quickly and are very difficult to be forged labels that triggered a revolution in identification systems and also the price of a tag is very low), difficulties of faking are some considerable time ago, are being found to be inadequate greatly increased. Fakers may shrink back from difficulties. in an increasing number of cases [1]. Now here comes RFID. Commercial supply chain is one of the most widely area in Compared with the barcode, a RFID system has many merits which RFID techniques are used. By supply chain, goods in the as below: chain can be run after and people can get the information of * Tags can be used repeatedly and the information stored them anywhere and anytime. in them can be reprogrammed, but barcodes can not; A RFID system is always made up of three components (we * The information stored in a tag is much larger than that can see this clearly in the following figure 1). in a barcode;

2 by which the reader can get the information stored in Data "FID reader / \T <*==> Clock Energy Antenna of the reader /on Antenna of the tag D td manqgemjbht gygltm Data management system Network Figure 1. The structure of RFID system The first one is the transponder or can also be called the tag, which is located on the object and usually has a special identification code by which the tag can be identified. The tag can be divided into two different parts: the antenna by which the tag can extract energy from the reader and an electronic microchip which controls the tag to work effectively. The second one is the interrogator or can also be called the reader. The reader includes two different parts: the antenna and the reader. In addition, many readers are fitted with an additional interface, such as RS232, RS485, etc, to enable them to forward the data received to another system (PC, robot control system, etc) [1]. Depending upon the design and the technology used, the reader may be a read or read/write device. But usually, it is called as "reader". The reader transmits signals to "wakeup" the tag and transmits instructions to the tag and then receives the return data stored in the tag. The useful data (the data that have been filtrated by the reader) can be used by the data management system by the network. The last one is the data management system. The function of the data management system is storing information and managing data. The data management system can communicate with the reader which is located in the remote place and can get the information of the tag anytime. In conclusion, the function or aim of a RFID system is to identify tags, that is, to get the identification codes of these tags and then get the data stored in tags. At last, the data which have been filtrated are stored and managed by the data management system. The working process of the RFID system is as follows: * The reader transmits interrogation signals at first; * If a tag is within the interrogation zone of the reader,becit e becoes ctiv an the comuncate wih th reder the tag. From all the above, we can see that if there are many tags within the interrogation zone of the reader, and they communicate with the reader at the same time, the reader will not know which one it should "talk" with at first. The reader will get the wrong information of the tags if the problem which is called as "collision" is not dealt with properly. To deal with the collision problem in a RFID system, several correlative commands are needed. These commands are called as anti-collision commands or anti-collision algorithms which are discussed in this paper. In the mechanics of communication, communication collision problems always exist. In the same time, lots of methods have been found in order to solve these problems. Generally, these methods can be divided into four parts: SDMA (Space Division Multiple Access), FDMA (Frequency Division Multiple Access), CDMA (Code Division Multiple Access) and TDMA (Time Division Multiple Access). But unfortunately, all these methods can not be used in a RFID system directly because they are much too complicated. To solve collision problems in a RFID system, just like in a communication system, there are always three methods: spatial domain method, frequency domain method, and time domain method. But in most RFID systems, time domain method which means every tag communicates with the reader in the different time is used because it is easier to be put in practice. In general, time domain method has two branches: one is assured algorithm, the other is un-assured algorithm. What is discussed in this paper belongs to assured algorithm. 1. SOME ExiSTIG ANTI-COLLISION ALGORITHMS Solving the collision problem is the basic and the most important task in a RFID system. That is, only there is no collision, can a RFID system work properly. So how to solve this problem and how to solve this problem effectively are crucial to the whole RFID system. Until now, there are some methods as follows: A. Bit Arbitration Based Anti-collision Algorithm [2] In this algorithm, all unidentified tags in the interrogation azone of the reader are active at the beginnng. All active tags will take part in the arbitration process. Newly entering tags

3 will not take part in the arbitration process if the arbitration the broken lines in figure 2. Then the reader can know process is in process. The pivotal idea of this algorithm is: collisions occur in these two bits. In binary search algorithm, When there is a request from the reader, all active tags send tags whose first collided bit is logical "1" do not respond to the value of a given bit of their identification codes. Then tags the reader's next request. But tags whose first collided bit is will be divided into two groups according to the given bit. The logical "O" send their identification codes to the reader's next reader will choose one group to continue another bit request. After each request, the collided bits become less. arbitration step and then inquire of next bit until the The searching process keeps going until the identification identification code of a tag is recognized. The identification code of a tag is recognized. When the identification code of time of one tag of bit arbitration based algorithm is one tag is recognized, the searching process will be repeated independent of the number of tags in the interrogation zone of from the beginning until the identification codes of all the tags the reader, but linearly dependent of the identification code are recognized. length. So if there are n tags in the interrogation zone of the C g. C. Anti-collision Algorithm Balsed on Jumping and Dynalmic reader and the length of every tag's identification code is m, Searching[4] the total number of iterations of bit arbitration based algorithm This algorithm is the same to binary search algorithm is mxn. except for two aspects. They are: B. Binary Search algorithm [3] * After the identification code of a tag is recognized, the In this algorithm, Manchester code is used in order to process of anti-collision algorithm based on jumping recognize the bit where there is a collision. In Manchester and dynamic searching is not just repeated as binary code, the ascending edge is coded as logical "O" and the search algorithm. The code which the reader will send descending edge is coded as logical "1". So when the reader next is not the same as that the previous process sent at receives an identification code and the states of the code do the beginning. It is the second code (counting not change in some bits, the reader can know where collisions backwards) that the previous process sent. Then the occur (we can see this in figure 2). third code (counting backwards), the fourth code (counting backwards), etc, until the identification codes ID of tagl: of all the tags are recognized. In the first Request command, the reader sends a code "1" instead of sending a maximal code whose length is ID of Tag2: the same to the tags' identification codes and every bit F; of the code is logical "1". In the next Request command, the reader sends the known bits instead of Received ID by the reader: lox lix 11 sending all the bits as do in binary search algorithm. ILJTLfL W VLF -f-1vl VL...VI..Like binary search algorithm, the searching process is from the top bit to the bottom bit. If the higher bits of Figure 2. Collisions in received ID the tags' identification codes are the same to the known In figure 2, there are two tags. These two tags will answer bits, the corresponding tags will send their the reader when the reader sends a Request command to them identification codes to the reader. at the first time. We can see from figure 2 that the values of bit5 and bit2 of tagl's identification code are logical "O" and III. THE IMPROVED ANTI-COLLISION ALGORITHM logical "I" respectively, but those of the same bits of tag2's The proposed anti-collision algorithm is an improved one, identification code are logical "1" and logical "0" respectively, compared with binary search algorithm and anti-collision thus the states of the identification code that the reader algorithm based on jumping and dynamic searching. Its goal is receives will not change in these two bits which are shown by to enhance the speed of identifying tags when collisions occur

4 in succession. In this algorithm, just like binary search existing algorithms mentioned above, the next Request algorithm, there are some stipulations: command directly equals to the old one plus one. Keep * The encoding style must be Manchester code. Only on sending Request command after having it added to using Manchester code can a reader find each collision one, until all the tags in the interrogation zone have bit easily and recognize all the tags in its interrogation been identified. zone at last. We can see the process clearly from the following example. * Several commands are used. The first one is Request Assuming there are 8 tags whose identification codes are command. In the beginning, a reader sends a request (tagl), (tag2), (tag3), command. Tags will reply if they meet a certain (tag4), (tag5), (tag6), condition. The second one is Select command. If the (tag7), and (tag8) in the interrogation reader receives an identification code and there is no zone of the reader, the process of the algorithm is as follows: collision, the tag which has been identified will be To begin with, the reader sends a Request command (1), and selected by the reader, and then other commands will all the tags in the interrogation zone of the reader will answer be executed (e.g. the Read/Write data command). The the reader. According to the principle of Manchester code, the third one is Read/Write data command. Data stored in reader receives the code 1OxxxOO1, so the reader can know the selected tag will be read or changed according to that collisions occur in bits D5, D4, and D3. The higher bits Read/Write data command. The last command is where collisions occur are D5 and D4. According to this Unselect command. If a tag acts upon this command, it algorithm, D5 and D4 are set to zero. Bits that are higher than will enter a "sleeping" state, in which the tag will not D5 will not be changed, so D7 D6=10. answer any command sent by the reader unless it Then the reader sends a Request command (1000). The leaves the interrogation zone of the reader and enters reader receives the code 1OOOxOO1. Because there is only one again. bit where the collision occurs, it is no need to send Request * The key point of this algorithm is all the tags must command again. The reader can get the identification codes of answer the reader at the same time, so that tags can tagl and tag2. Then the reader runs Read/Write command to send their identification codes to the reader deal with tagl and tag2. At last, the reader runs Unselect synchronously. Only under such condition can the command in order to turn tagl and tag2 into "sleep" state. algorithm work well. Next, the reader sends a Request command (1001). The All of the above are the same with binary search algorithm reader receives the code 1001xOO1. Now D3 is the only bit and anti-collision algorithm based on jumping and dynamic where the collision occurs. Similarly, the reader can get the searching, but the proposed improved algorithm in this paper identification codes of tag3 and tag4. Then the reader deals has two major differences compared with the other two with tag3 and tag4 and turns them into "sleep" state at last. algorithms as follows: Furthermore, the reader sends a Request command (1010). * Due to the mutually exclusive value of a binary bit, if The reader receives the code 101OxOO1. D3 is the only bit there is only one collided bit no matter where it is, the where the collision occurs. So the reader can get the reader does not need to send Request command again identification codes of tag5 and tag6. Then the reader deals and can automatically identify two tags once. with tag5 and tag6 and turns them into "sleep" state at last. * Different search algorithm will be used if collisions Finally, the reader sends a Request command (1011). The occur in succession. After successive collisions have reader receives the code 1011xOO1. D3 is the only bit where been detected, every correlative bit but the last in the collision occurs. So the reader can get the identification Request command will be set to zero. Then two tags codes of tag7 and tag8. Now all the tags are recognized by the which collided at the last bit of the collision sequence reader. The whole process is described in the following table will be identified synchronously. Contrasted with the 1.

5 TABLE I The searching process of the improved anti-collision algorithm correct rate of being read by the reader is not as high as people wish and the rate of identifying the identification codes of tags 1st search 2 nd search 3rdsearch 4th search 5th search is not very fast. So how to solve the collision problems and enhance the rate of identifying the tags is crucial to the whole Request RFID system. It is urgent to find new ways to solve these Received 10xxool problems. In this paper, an improved anti-collision algorithm ID is proposed. Compared with other existing algorithm, it has Tagl great advantages especially when the number of collisions Tag becomes larger. And the fact is that the probability that Tag collisions occur rapidly increases with the number of tags. In Tag the final analysis, it is reasonably better to use this algorithm TagS I l oo l Tag o Tag to deal with more tags and it is of great significance to the development and application of RFID system. REFERENCES [1] Klaus Finkenzeller, RFID Handbook: Fundamentals and Tag Applications in Contactless Smart Cards and Identification, 2nd ed. John Wiley & Sons Ltd, From the table 1, we can know that the total number of [2] Marcel Jacomet, Adrian Ehrsam, and Urs Gehrig, "Contactless Identification Device With Anticollision Algorithm," IEEE Computer iterations of the improved anti-collision algorithm is 5. But if Society CSCC99, Conference on Circuits, Systems, Computers and anti-collision algorithm based on jumping and dynamic Communications,Jul. 4-8, Athens, [3] Klaus Finkenzeller, RFID Handbook: Radio-Frequency Identification searching is used, the total number of iterations will be 15. Fundamentals and applications, John Wiley & Sons Ltd, Else if binary search algorithm is used, the total number of [4] Songsen Yu, Yiju Zhan, Zhiping Wang, and Zhongping Tang, "Anti-collision Algorithm Based on Jumping and Dynamic Searching iterations will be larger. Compared with binary search and Its Analysis," Computer Engineering, Vol.31, pp.19-20, algorithm and anti-collision algorithm based on jumping and dynamic searching, the total number of iterations of the improved anti-collision algorithm is greatly decreased. In fact, successive collisions mean colliding in succession both physically and logically. The simplification in this paper aims to address the essence of the proposed algorithm easily. In fact, physical succession of collided bits is not necessary, because physically discrete collisions can be regarded as logically successive collisions. So all the conclusions deduced above are established all the same. Using the algorithm proposed in this paper, we can demonstrate the conclusion that if n-bit successive collisions (physically) are detected, 2n tags can be recognized at best with only 2n-1+1 commands transmitted. IV. CONCLUSION RFID systems are used in many areas today and are becoming more and more important. But when RFID techniques are concerned, because the working condition of the tags and the reader is very complicated, to the tags, the

Novel Tag Anti-collision Algorithm with Adaptive Grouping

Novel Tag Anti-collision Algorithm with Adaptive Grouping Wireless Sensor Network, 2009, 1, 475-481 doi:10.4236/wsn.2009.15057 Published Online December 2009 (http://www.scirp.org/journal/wsn). Novel Tag Anti-Collision Algorithm with Adaptive Grouping Abstract

More information

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises Turcu, Cristina Elena Prodan, Remus Catalin Popa, Valentin 14 th December 2005

More information

A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems

A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Improved Frame Slotted Aloha Protocol with Early End in Mobile RFID Systems 1 Xiaowu Li, 2 Zhenjiang Wang, 3 Xin Ren, 4 Yuyan Liu, 5 Qing

More information

A simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols

A simulation study on the energy efficiency of pure and slotted Aloha based RFID tag reading protocols University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 9 A simulation study on the energy efficiency of pure and slotted Aloha

More information

Introduction to RFID

Introduction to RFID Introduction to RFID Hu Hai Year 1 Mphil Student 2004. 09. 11 1. What is RFID? Radio frequency identification, or RFID, is a generic term for that use radio waves to automatically identify people or objects.

More information

Implementation and Application of RFID EPC Information Service for Forward and Reverse Logistics

Implementation and Application of RFID EPC Information Service for Forward and Reverse Logistics Implementation and Application of RFID EPC Information Service for Forward and Reverse Logistics Shih-Chih Chen, Ph.D. Student, Tatung University, Taiwan Huei-Huang Chen, Professor, Tatung University,

More information

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision

More information

RFID Applications in Railway Industry

RFID Applications in Railway Industry RFID Applications in Railway Industry G.Sucharitha P.G. Scholar (M. Tech), Department of ECE, Modugula Kalavathamma Institute of Technology for Women, Rajampet, Kadapa District. Abstract: The increased

More information

WHY RFID FOR LIBRARIES

WHY RFID FOR LIBRARIES RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARY TRACKING RFID-enabled systems have moved beyond security to become tracking and management systems that combine security with more efficient tracking of

More information

RFID, Web-Based, and Artificial Intelligence Integration in Facilities Management

RFID, Web-Based, and Artificial Intelligence Integration in Facilities Management RFID, Web-Based, and Artificial Intelligence Integration in Facilities Management Chien-Ho Ko Department of Civil Engineering, National Pingtung University of Science and Technology, Taiwan E-mail: ko@mailnpustedutw

More information

Applying RFID Hand-Held Device for Factory Equipment Diagnosis

Applying RFID Hand-Held Device for Factory Equipment Diagnosis Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Applying RFID Hand-Held Device for Factory Equipment Diagnosis Kai-Ying Chen,

More information

SICK Airport Innovations. Sensors and solutions

SICK Airport Innovations. Sensors and solutions SICK Airport Innovations Sensors and solutions THIS IS SICK Airport innovations The most important processes at an airport take place on the ground. Numerous logistics processes at the airport run smoothly

More information

The Application used RFID in Third Party Logistics

The Application used RFID in Third Party Logistics Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 2045 2049 2012 International Conference on Solid State Devices and Materials Science The Application used RFID in Third Party Logistics

More information

RFID-Based Inventory and Security System

RFID-Based Inventory and Security System RFID-Based Inventory and Security System Wael Abu Shehab 1 Ghadeer Al-Shabaan 1 Wael Al-Sawalmeh 2 1.Department of Electrical Engineering, College of Engineering, Al-Hussein Bin Talal University, 71111

More information

Campus Tracking System Based On IoT Yibiao Pi

Campus Tracking System Based On IoT Yibiao Pi Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking

More information

Real World Applications of RFID. Mr. Mike Rogers Bryan Senior High School Omaha, NE

Real World Applications of RFID. Mr. Mike Rogers Bryan Senior High School Omaha, NE Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE RFID= Radio Frequency Identification RFID Overview RFID is based on wireless communication over the air that reads or

More information

Changes of Clothing Distribution Logistics Management RFID Technology

Changes of Clothing Distribution Logistics Management RFID Technology Science Journal of Business and Management 2016; 4(3): 72-76 http://www.sciencepublishinggroup.com/j/sjbm doi: 10.11648/j.sjbm.20160403.12 ISSN: 2331-0626 (Print); ISSN: 2331-0634 (Online) Changes of Clothing

More information

Imagine the Power of Knowing. An introduction to our Company

Imagine the Power of Knowing. An introduction to our Company Imagine the Power of Knowing. An introduction to our Company RFID Hardware, Software, and Systems. We offer one of the world s largest selections of RFID products and solutions. Who is GAO RFID Inc.? GAO

More information

Development of RFID EPC Gen2 Tag for Multi Access Control System

Development of RFID EPC Gen2 Tag for Multi Access Control System International Journal of Electrical and Computer Engineering (IJECE) Vol. 3, No. 6, December 2013, pp. 724~731 ISSN: 2088-8708 724 Development of RFID EPC Gen2 Tag for Multi Access Control System Evizal

More information

Character Proximity For RFID Smart Certificate System: A Revolutionary Security Measure To Curb Forgery Menace.

Character Proximity For RFID Smart Certificate System: A Revolutionary Security Measure To Curb Forgery Menace. Character Proximity For RFID Smart Certificate System: A Revolutionary Security Measure To Curb Forgery Menace. Eze Chika Victor, Adeniji Oluwashola David Abstract: Generating certificates for the graduating

More information

The Role of RFID in the IDENTIFICATION of Things

The Role of RFID in the IDENTIFICATION of Things The Role of RFID in the IDENTIFICATION of Things Presented by: Mike Hetrick VP & GM, Tag Solution Services PRESENTATION TITLE 2017 MHI Copyright claimed for audiovisual works and sound recordings of seminar

More information

Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes

Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes An Entigral White Paper 3716 National Drive Suite 200 Raleigh, North Carolina 27612 919-787-5885 www.entigral.com Don t Make the Mistake of Using RFID Technology With an Application Built for Barcodes

More information

ELECTRONIC TOLL COLLECTION SYSTEM USING ZIGBEE AND RFID

ELECTRONIC TOLL COLLECTION SYSTEM USING ZIGBEE AND RFID International Journal of Civil Engineering and Technology (IJCIET) Volume 8, Issue 4, April 2017, pp. 1714-1719, Article ID: IJCIET_08_04_193 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=8&itype=4

More information

Recent Trends in Library Management System: RFID Technology

Recent Trends in Library Management System: RFID Technology Recent Trends in Library Management System: RFID Technology --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------_

More information

RAIN Radio Protocol. December 2015

RAIN Radio Protocol. December 2015 RAIN Radio Protocol December 2015 Background RAIN reader tag communications use the UHF Gen2 radio protocol. The MIT Auto-ID Center pioneered the early work on the UHF Gen2 protocol in 2002, transitioning

More information

Constructing the Process Models for the Traceability of Rice Production and Distribution

Constructing the Process Models for the Traceability of Rice Production and Distribution Constructing the Process Models for the Traceability of Rice Production and Distribution Huei-Huang CHEN Department of Information Management, Tatung University No.40, Sec. 3, Chungshan North Road, Taipei,

More information

RFIDPlanner A Coverage Planning Tool for RFID Networks

RFIDPlanner A Coverage Planning Tool for RFID Networks RFIDPlanner A Coverage Planning Tool for RFID Networks DDP Thesis Presentation by Nitesh Gupta Under the guidance of Prof. Sridhar Iyer Radio Frequency Identification or RFID Technology Uses radio frequency

More information

DESIGN AND REALIZATION OF VEHICLE INTELLIGENT MANAGEMENT SYSTEM

DESIGN AND REALIZATION OF VEHICLE INTELLIGENT MANAGEMENT SYSTEM DESIGN AND REALIZATION OF VEHICLE INTELLIGENT MANAGEMENT SYSTEM 1 XUEHUA JIANG 1 Electric Vehicle & New Energy Technology Research Institute, Linyi University, Linyi, 276000, China E-mail: jxhyx@163.com

More information

AN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS

AN APPLICATION OF RFID IN MONITORING AGRICULTURAL MATERIAL PRODUCTS A APPLICATIO OF RFID I MOITORIG AGRICULTURAL MATERIAL PRODUCTS Jianhui Du 1, 2, Peipei Li 1, Wanlin Gao 1,*, Dezhong Wang 1, Qing Wang 1, ilong Zhu 1 1 College of Information and Electrical Engineering,

More information

The Role of RFID in the IDENTIFICATION of Things

The Role of RFID in the IDENTIFICATION of Things The Role of RFID in the IDENTIFICATION of Things Presented by: Mike Hetrick VP Global Sales 2018 MHI Copyright claimed for audiovisual works and sound recordings of seminar sessions. All rights reserved.

More information

1. Introduction. 2. Description of the experimentation IAEA-CN-184/228

1. Introduction. 2. Description of the experimentation IAEA-CN-184/228 1 IAEA-CN-184/228 1. Introduction The Seals & Identification Laboratory (SILab) is a laboratory within the Traceability & Vulnerability Assessment Unit, part of the Institute for the Protection & Security

More information

RFID BASED SMART TROLLEY FOR SUPERMARKET AUTOMATION

RFID BASED SMART TROLLEY FOR SUPERMARKET AUTOMATION RFID BASED SMART TROLLEY FOR SUPERMARKET AUTOMATION ANJALI PERADATH 1, ANJALI PURUSHOTHAMAN 2, ANJANA GOPINATH 3, ANUSREE K M 4 Mr.NITHIN JOE 5 1,2,3,4 Third year student,dept. of Electronics and Communication

More information

RFID Basic Terms and Frequently Asked Questions

RFID Basic Terms and Frequently Asked Questions RFID Basic Terms and Frequently Asked Questions What is RFID? Radio Frequency Identification (RFID) is an automatic identification method that stores and remotely retrieves data via an RFID tag or transponder.

More information

Grouping Based Dynamic Framed Slotted ALOHA for Tag Anti-Collision Protocol in the Mobile RFID Systems

Grouping Based Dynamic Framed Slotted ALOHA for Tag Anti-Collision Protocol in the Mobile RFID Systems Appl. Math. Inf. Sci. 7, No. 2L, 655-659 (2013) 655 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/072l40 Grouping Based Dynamic Framed Slotted ALOHA

More information

Cyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO

Cyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO Cyber-physical systems for processes and organisation NEO SKILLS PORTFOLIO WEIGANG.NEO: Our Philosophy Leading innovator in production organisation of the future WEIGANG.NEO stands for modern, revolutionary

More information

RFID. About Stephanie Handy. Technical Services & Research Librarian Northrop Grumman Electronic Systems. Freelance Editorial Consultant

RFID. About Stephanie Handy. Technical Services & Research Librarian Northrop Grumman Electronic Systems. Freelance Editorial Consultant RFID Considerations for Implementation About Stephanie Handy Technical Services & Research Librarian Northrop Grumman Electronic Systems Freelance Editorial Consultant www.stephaniehandy.net 1 Overview

More information

Avonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web:

Avonwood Developments Ltd. Tel: +44 (0) Fax: +44 (0) Web: RFID For Inventory Control & Security Presented By: Avonwood Developments Ltd. Avonwood Developments Ltd. Innovative products and services for identification and asset management under the brand name Eureka

More information

Implementation and Design of Digital System for High Frequency RFID Tag Chip

Implementation and Design of Digital System for High Frequency RFID Tag Chip Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Implementation and Design of Digital System for High Frequency RFID Tag Chip Wenwen Zhang, * Weiping Jing, Bin Jiang antong

More information

Implementation of RFID Technology in Parking Lot Access Control System

Implementation of RFID Technology in Parking Lot Access Control System Implementation of RFID Technology in Parking Lot Access Control System G. Ostojic, S. Stankovski, M. Lazarevic Faculty of Technical Sciences Novi Sad, Trg D. Obradovica 6, 21000 Novi Sad, Republic of Serbia

More information

Designed with the Programmer in Mind

Designed with the Programmer in Mind Agilent Technologies 8960 Series 10 Wireless Communications Test Set Product Note Designed with the Programmer in Mind Agilent Technologies 8960 Series 10 Designed with the programmer in mind T he Agilent

More information

Expert System Applied to High-Speed Railway Track Circuit Coding and Its Simulation

Expert System Applied to High-Speed Railway Track Circuit Coding and Its Simulation Expert System Applied to High-Speed Railway Track Circuit Coding and Its Simulation Yan Li, Dewang Chen, and Xuan Yang State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University,

More information

CHAPTER 1 INTRODUCTION This chapter briefly discuss on the overview of this research. It contains five sections. The first section is introduction; follow by the problem statement. Next are the objectives

More information

Passengers Rights Boarding pass using Radio frequency identification

Passengers Rights Boarding pass using Radio frequency identification Passengers Rights Boarding pass using Radio frequency identification SAUTY Aurélien, Institut de Formation Universitaire et de Recherche du Transport Aérien. aurelien_sauty@yahoo.com The reason of this

More information

AUTOMATIC VEHICLE IDENTIFICATION AND TOLL COLLECTION USING RFID

AUTOMATIC VEHICLE IDENTIFICATION AND TOLL COLLECTION USING RFID AUTOMATIC VEHICLE IDENTIFICATION AND TOLL COLLECTION USING RFID Sahil Bhosale 1, Rohit Chavan 2, Sunil Bhadvan 3, Prajakta Mohite 4 1, 2, 3 Student, Electronics and Telecommunication Engineering, Holy-Wood

More information

Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials

Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln October 2005 Use of RFID Technology

More information

Automated link analysis using radio frequency identification (RFID)

Automated link analysis using radio frequency identification (RFID) Loughborough University Institutional Repository Automated link analysis using radio frequency identification (RFID) This item was submitted to Loughborough University's Institutional Repository by the/an

More information

Identification & Traceability Solutions for the Industry

Identification & Traceability Solutions for the Industry www.rfidea.com Identification & Traceability Solutions for the Industry Development & Integration of Global Traceability Solutions Expert in RFID technology NEUTRAL positioning towards manufacturers &

More information

Root Beer Game in Progress

Root Beer Game in Progress Root Beer Game in Progress Root Beer Game Completion Schedule Practice session (completed in class) February 4 Complete Round 1 February 11 Team decision (via e-mail to professor) on Round 2 change by

More information

The research and design of the RFID track and trace system based on web services

The research and design of the RFID track and trace system based on web services Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 513-517, pp 1123-1126 doi:10.4028/www.scientific.net/amm.513-517.1123 2014 Trans Tech Publications, Switzerland The research and

More information

Passive RFID Positioning Technology and Applications. Dr. Zhu Hailong Senior Manager, R&D, LSCM

Passive RFID Positioning Technology and Applications. Dr. Zhu Hailong Senior Manager, R&D, LSCM Passive RFID Positioning Technology and Applications Dr. Zhu Hailong Senior Manager, R&D, LSCM outline 1 Introduction 2 AOA-based RFID RTLS 3 RSSI-based RFID RTLS 4 PDOA-based RFID RTLS 1 Introduction

More information

LITeTag: Design and Implementation of an RFID System for IT-based Port Logistics

LITeTag: Design and Implementation of an RFID System for IT-based Port Logistics 48 JOURNAL OF COMMUNICATIONS, VOL. 1, NO. 4, JULY 2006 LITeTag: Design and Implementation of an RFID System for IT-based Port Logistics Hyuntae Cho Pusan National University, Busan, Republic of Korea Email:

More information

RFID Refrigerator Project Proposal

RFID Refrigerator Project Proposal RFID Refrigerator Project Proposal Jeffrey Lee - jilee9 Yuanhao Wang - ywang272 William Mercado - wmercad2 TA: Yuchen He 2/8/2017 1 Contents 1 Introduction 3 1.1 Objective.....................................

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 24753 First edition 2011-09-01 Information technology Radio frequency identification (RFID) for item management Application protocol: encoding and processing rules for sensors

More information

Smart Trolley System Based on Android

Smart Trolley System Based on Android IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 10 April 2017 ISSN (online): 2349-784X Smart Trolley System Based on Android Ms. Neha A Anpat Ms. Karuna V Belgudri NBN

More information

An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things

An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things Sun Zhiguo 1,2, Xia Hui 3, and Wang Wensheng 1,2 1 Agricultural

More information

A Secured Mutual Authentication Protocol For RFID System

A Secured Mutual Authentication Protocol For RFID System A Secured Mutual Authentication Protocol For RFID System Rajarshi Roy Chowdhury, Md. Abdul Awal Ansary Abstract: Contactless automatic RFID system is intended to replace existing barcode scheme, since

More information

RFID AND INFORMATION SYSTEMS IN COMMERCE

RFID AND INFORMATION SYSTEMS IN COMMERCE RFID AND INFORMATION SYSTEMS IN COMMERCE Prof. Valentin Litoiu Ph. D University of Craiova Faculty of Economics and Business Administration Craiova, Romania Student Vlad Litoiu ESADE Business School Master

More information

INTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID

INTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID INTELLIGENT LOGISTICS SYSTEM BASED ON THREE-TIER ARCHITECTURE AND RFID 1 DONG HUANG, 2 HE WEI 1 School of Mathematics and Computers Science, Qinzhou University, Qinzhou 535000,China 2 Jiaxing Vocational

More information

RFID: Technology and Applications

RFID: Technology and Applications RFID: Technology and Applications Outline Overview of RFID Reader-Tag; Potential applications RFID Technology Internals RF communications Reader/Tag protocols Middleware architecture RFID Business Aspects

More information

NLS-EM1395 Embedded 1D Barcode Scan Engine. User Guide

NLS-EM1395 Embedded 1D Barcode Scan Engine. User Guide NLS-EM1395 Embedded 1D Barcode Scan Engine User Guide Disclaimer 2014 Fujian Newland Auto-ID Tech. Co., Ltd. All rights reserved. Please read through the manual carefully before using the product and operate

More information

Module 7 Evaluation and Selection

Module 7 Evaluation and Selection Module 7 Evaluation and Selection RFID systems can be made up of many different components, standards and differing RFID technology; any combination of which can have different performance, cost and implementation

More information

RFID (Radio Frequency Identification)

RFID (Radio Frequency Identification) RFID (Radio Frequency Identification) The Business Benefit of RFID Radio Frequency Identification (RFID) is a data collection system based on tiny microchips in combination with radio antennas, which make

More information

Applications of RFID and mobile technology in tracking of equipment for maintenance in the mining industry

Applications of RFID and mobile technology in tracking of equipment for maintenance in the mining industry University of Wollongong Research Online Coal Operators' Conference Faculty of Engineering and Information Sciences 2010 Applications of RFID and mobile technology in tracking of equipment for maintenance

More information

Real Time Automatic Ration Material Distribution System

Real Time Automatic Ration Material Distribution System IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 05-09 www.iosrjournals.org Real Time Automatic Ration Material Distribution System Pranjal Pedwal 1 1 (pnpedwal@gmail.com,

More information

Smart Ration Card Using RFID and GSM Technique

Smart Ration Card Using RFID and GSM Technique Smart Ration Card Using RFID and GSM Technique Mohit Agarwal 1 Manish Sharma 2 1 Electronics and Communication Engineering 2 Electronics and Communication Engineering mohitagarwal202@gmail.com msharma14@amity.edu

More information

RFID. Myths, Facts and Reality

RFID. Myths, Facts and Reality RFID Myths, Facts and Reality What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically identify things Happens with a serial number that

More information

Design of Automobiles speed control system using RFID

Design of Automobiles speed control system using RFID Design of Automobiles speed control system using RFID Harsh Mohan Lal #1, Prateek Bumb *2, John Daniel #3,Yedukondala Rao *4 # Dept.of Mechatronics,Manipal Institute of Technology,Manipal, India. Abstract-

More information

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 A Review of RFID ISO Standards & CEN TC225 Developments Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 RFID Standards Types of Standard Technology - air interface

More information

Outbound Delivery Using RFID in Sap System

Outbound Delivery Using RFID in Sap System Outbound Delivery Using RFID in Sap System Sheng Wang, Dong Wang Class B0303395 School of Software Shanghai Jiao Tong University Shanghai, China 800 Dong Chuan Road Phone: 086-021-62933040; 086-13764599933

More information

Letter Report: An RFID-enabled Warehouse at DRDC Valcartier

Letter Report: An RFID-enabled Warehouse at DRDC Valcartier Letter Report: An RFID-enabled Warehouse at DRDC Valcartier Prepared for: Resources Management, DRDC Valcartier From: Qinghan Xiao, Network Information Operations Section, DRDC Ottawa Date: April 16, 2010

More information

The Monitoring System of Marine Refrigerated Containers Based on RFID Temperature Tags

The Monitoring System of Marine Refrigerated Containers Based on RFID Temperature Tags Research Journal of Applied Sciences, Engineering and Technology 5(8): 2551-2555, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: July 31, 2012 Accepted: September

More information

RFID, Identification & Wireless Systems for the Middle East & North Africa

RFID, Identification & Wireless Systems for the Middle East & North Africa Taglogic RFID Administrative Office: P.O.Box 415, Templar House, Don Road, St. Helier, Jersey, JE4 8WH, Channel Islands Main Branch: 2 nd Floor, Tour de Lyon bldg, Emile Eddeh str, Hamra, P.O.Box: 1135366

More information

Basics of EPC. Training

Basics of EPC. Training Basics of EPC Training Introduction Objectives: - Create awareness of the concepts - Develop technical knowledge - Show benefits of implementation - Explain 5 steps of Implementation 2 Programme Introduction

More information

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com

More information

Cardiac Rhythm Management // Patient Brochure // BioMonitor 2. BioMonitor 2. Patient Information

Cardiac Rhythm Management // Patient Brochure // BioMonitor 2. BioMonitor 2. Patient Information Cardiac Rhythm Management // Patient Brochure // BioMonitor 2 BioMonitor 2 Patient Information BioMonitor 2 We Listen to Your Heart Dear patient, Your doctor has decided to implant a cardiac monitor BioMonitor

More information

RFID Tags and Readers

RFID Tags and Readers RFID Tags and Readers RFID Tagging RFID tagging is an ID system for identification and tracking purposes that uses radio frequency identification devices. An RFID tagging system consists of the tag, a

More information

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches Overview RFID is an automatic identification technology that uses radio waves to capture data from tags, rather than optically

More information

The Research of Middleware Architecture of Intelligent Logistics System Based on SOA

The Research of Middleware Architecture of Intelligent Logistics System Based on SOA American Journal of Software Engineering and Applications 2015; 4(6): 115-120 Published online October 23, 2015 (http://www.sciencepublishinggroup.com/j/ajsea) doi: 10.11648/j.ajsea.20150406.13 ISSN: 2327-2473

More information

Laboratory Management Based on Internet of Things. Jianming Huang

Laboratory Management Based on Internet of Things. Jianming Huang Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on

More information

Ahrma Technology Whitepaper

Ahrma Technology Whitepaper Ahrma Technology Whitepaper Ahrma Track & Trace IoT Platform Ahrma Holding BV was founded in 2014. Headquarters and the production plant are located in The Netherlands (Deventer). Ahrma is serving clients

More information

RFid based Toll Collection System

RFid based Toll Collection System For more Project details visit: http://www.projectsof8051.com/rfid-based-highway-toll-tax-collection-system/ Code Project Title 1515 RFid Based Highway Toll Tax Collection System Synopsis for RFid based

More information

RFID Technology: Security System in Modern Libraries

RFID Technology: Security System in Modern Libraries International Journal of Librarianship and Administration Volume 1, Number 1 (2010), pp. 31-43 Research India Publications http://www.ripublication.com/ijla.htm RFID Technology: Security System in Modern

More information

Permanent parts marking on aircraft components. Utilization in MRO-Processes and on OEM units manufactured by LH Technik

Permanent parts marking on aircraft components. Utilization in MRO-Processes and on OEM units manufactured by LH Technik Permanent parts marking on aircraft components Utilization in MRO-Processes and on OEM units manufactured by LH Technik Product Divisions of the Lufthansa Technik Group to enhance the solutions for our

More information

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 02, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 02, 2016 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 4, Issue 02, 2016 ISSN (online): 2321-0613 RFID Application for Railway Hazards Finding Mahesh R. Nimje 1 Prof. S.V. Bhalerao 2

More information

What should the Residents use?

What should the Residents use? Access Control Credentials for your Gated Community. What should the Residents use? Hancock Gate Operator Systems Inc. notices on many inquires that clients/prospects have various ideas and reasons for

More information

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University

More information

Computational Intelligence Lecture 20:Intorcution to Genetic Algorithm

Computational Intelligence Lecture 20:Intorcution to Genetic Algorithm Computational Intelligence Lecture 20:Intorcution to Genetic Algorithm Farzaneh Abdollahi Department of Electrical Engineering Amirkabir University of Technology Fall 2012 Farzaneh Abdollahi Computational

More information

abhisam RFID Discover the power of e-learning!

abhisam RFID Discover the power of e-learning! RFID Introduction : Radio Frequency Identification Technology (RFID in short) is the hottest new technology today, with applications ranging from car parking systems to hospitals and supply chain management.

More information

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development

Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development Unclassified DSTI/ICCP/IE(2007)6/FINAL DSTI/ICCP/IE(2007)6/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 27-Nov-2007

More information

Standards for RFID systems in Australian Libraries What does it all mean and why should you care?

Standards for RFID systems in Australian Libraries What does it all mean and why should you care? Standards for RFID systems in Australian Libraries What does it all mean and why should you care? The topic of Radio Frequency Identification (RFID) standards is not well understood within the Australian

More information

Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network

Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network Xinjian Xiang College of Automation & Electrical Engineering, Zhejiang University of Science and Technology,Zhejiang,

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 18000-3 First edition 2004-09-15 Information technology Radio frequency identification for item management Part 3: Parameters for air interface communications at 13,56 MHz

More information

RFID Project Technical Report

RFID Project Technical Report RFID Project Technical Report Bernard Ghanem 1. Introduction The use of Radio Frequency Identification (RFID) technology extends historically to the 1970 s, when the first commercial products emerged.

More information

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER Copyrights 2004 ZIH Corp. All product names and numbers are Zebra

More information

RFID and the Internet of Things

RFID and the Internet of Things RFID and the Internet of Things ICT Trends and Challenges in a Global Era MSU/INT/BSL Programme, 4 July 2005 Lara Srivastava Strategy and Policy Unit Note: The views expressed in this presentation are

More information

Nox DoD. User Guide. Version 3.0.x. Nox for DoD User Guide! Page 1

Nox DoD. User Guide. Version 3.0.x. Nox for DoD User Guide! Page 1 Nox DoD User Guide Version 3.0.x Nox for DoD User Guide! Page 1 Contents Overview! 3 Shipment Manager -- Nox Administrator Roles! 3 Floor Manager / Packaging -- Nox User Roles! 4 Helpful Notes! 5 Creating

More information

ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS

ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS Automate processes and streamline operations with RAIN RFID WAREHOUSE 2 DOCK 12 RECEIVED 2017 Impinj, Inc. 1 ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS

More information

Near Field Communication Tag-based System in Retail Marketing

Near Field Communication Tag-based System in Retail Marketing , pp.67-76 http://dx.doi.org/10.14257/ijfgcn.2017.10.7.06 Near Field Communication Tag-based System in Retail Marketing Qiyan Wang, Sabah Mohammed and Jinan Fiaidhi Department of Computer Science, Lakehead

More information

Introduction Figure 1:

Introduction Figure 1: Introduction The information accuracy and labor efficiency that bar codes and radio frequency identification (RFID) tags provide are essential for activities managed with Oracle Warehouse Management (WMS)

More information

Keywords RFID, field management, bulk material inventory, nuclear plant, area subdivision.

Keywords RFID, field management, bulk material inventory, nuclear plant, area subdivision. International Journal of Innovative Research in Engineering & Management (IJIREM) ISSN: 2350-0557, Volume-4, Issue-1, January-2017 DOI: 10.21276/ijirem.2017.4.1.4 Strategies for Field Management Using

More information