Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 12
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Industry 4.0 (I4) as a concept offers powerful opportunities for many businesses. The set of Industry 4.0 technologies is still discussed, and boundaries are not perfectly clear. However, implementation of Industry 4.0 concept becomes strategic principle, and necessary condition for succeeding on turbulent markets. Radio Frequency Identification (RFID) was used before I4 emerged. However, it should be treated as its important part and even enabler. The question arises how adoption of RFID was impacted by I4 paradigm. Therefore, to answer this question a set of technology management tools was selected and applied to forecast RFID potential development in forthcoming years. Moreover, case studies were conducted for technology management tools and their applications for RFID for qualitative discussion of its relevance. It aimed to prove that existing toolset should be applied for modern technologies related to I4. Tools were proven to be necessary and successful. However, some specific challenges were observed and discussed.
Go to article

Authors and Affiliations

Bartlomiej Gladysz
1
Donatella Corti
2
Elias Montini
2

  1. Warsaw University of Technology, Institute of Production Systems Organization, Warsaw, Poland
  2. University of Applied Science and Arts of Southern Switzerland, Department of Innovative Technologies
Download PDF Download RIS Download Bibtex

Abstract

This article concerns the use of an integrated RFID system with a mobile robot for the navigation and mapping of closed spaces. The architecture of a prototype mobile robot equipped with a set of RFID readers that performs the mapping functions is described. Laboratory tests of the robot have been carried out using a test stand equipped with a grid of appropriately programmed RFID transponders. A simulation model of the effectiveness of transponder reading by the robot has been prepared. The conclusions from measurements and tests are discussed, and methods for improving the solution are proposed.
Go to article

Authors and Affiliations

Bartosz Pawłowicz
1
ORCID: ORCID
Mariusz Skoczylas
1
ORCID: ORCID
Bartosz Trybus
2
ORCID: ORCID
Mateusz Salach
3
ORCID: ORCID
Marcin Hubacz
2
ORCID: ORCID
Damian Mazur
4
ORCID: ORCID

  1. Departmentof Electronic and Telecommunications Systems, Rzeszów University of Technology, WincentegoPola 2, 35-959 Rzeszow, Poland
  2. Department of Computer and ControlEngineering, Rzeszow University of Technology, Wincentego Pola 2, 35-959 Rzeszow, Poland
  3. Department of Complex Systems, Rzeszow Universityof Technology, Wincentego Pola 2, 35-959 Rzeszow, Poland
  4. Department of Electrical andComputer Engineering Fundamentals, Rzeszow University of Technology, Wincentego Pola 2, 35-959Rzeszow, Poland
Download PDF Download RIS Download Bibtex

Abstract

Effective recognition of tags in the dynamic measurement system would significantly improve the reading performance of the tag group, but the blurred outline and appearance of tag images captured in motion seriously limit the effectiveness of the existing tag group recognition. Thus, this paper proposes passive tag group recognition in the dynamic environment based on motion blur estimation and improved YOLOv2. Firstly, blur angles are estimated with a Gabor filter, and blur lengths are estimated through nonlinear modelling of a Generalized Regression Neural Network (GRNN). Secondly, tag recognition based on YOLOv2 improved by a Gaussian algorithm is proposed. The features of the tag group are analyzed by the Gaussian algorithm, the region of interest of the dynamic tag is effectively framed, and the tag foreground is extracted; Secondly, the data set of tag groups are trained by the end-to-end YOLOv2 algorithm for secondary screening and recognition, and finally the specific locations of tags are framed to meet the effective identification of tag groups in different scenes. A considerable number of experiments illustrate that the fusion algorithm can significantly improve recognition accuracy. Combined with the reading distance, the research presented in this paper can more accurately optimize the three-dimensional structure of the tag group, improve the reading performance of the tag group, and avoid the interference and collision of tags in the communication channel. Compared with the previous template matching algorithm, the tag group recognition ability put forward in this paper is improved by at least 13.9%, and its reading performance is improved by at least 6.2% as shown in many experiments.
Go to article

Authors and Affiliations

Lin Li
1 2
Xiao-Lei Yu
1 2
Zhen-Lu Liu
1
Zhi-Min Zhao
1
Ke Zhang
1
Shan-Hao Zhou
1

  1. College of Science, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
  2. National Quality Supervision and Testing Center for RFID Product Jiangsu, Nanjing 210029, China
Download PDF Download RIS Download Bibtex

Abstract

The operating principles of RFID antennas should be considered differently than it is applied in the classical theory of radio communication systems. The procedure of measuring the radiation pattern of antennas that could be applied to RFID transponders operating in the UHF band is seldom discussed correctly in the scientific literature. The problem consists in the variability of the RFID chip impedance that strongly influences measurement results. The authors propose the proper methodology for determining the radiation pattern with respect to an individual transponder as well as an electronically tagged object. The advantage of the solution consists in the possibility of using components of different measuring systems that are available in typical antenna laboratories. The proposed procedure is particularly important in terms of parameter validation - the identification efficiency and costs of an RFID system implementation can be evaluated properly only on the basis of real values of considered parameters.

Go to article

Authors and Affiliations

Piotr Jankowski-Mihułowicz
Mariusz Węglarski
Download PDF Download RIS Download Bibtex

Abstract

The authors paid particular attention to the problem of antenna impedance measurements in the RFID technique. These measurements have to be realized by using two ports of a vector network analyzer and dedicated passive differential probes. Since the measurement process and estimated parameters depend on the frequency band, operating conditions, type of the system component and antenna designs used, appropriate verification of the impedance parameters on the basis of properly conducted experiments is a crucial stage in the antenna synthesis of transponders and read/write devices. Accordingly, a systematized procedure of impedance measurements is proposed. It can be easily implemented by designers preparing antennas for different kinds of RFID applications. The essence of indirect measurements of the differential impedance parameters is discussed in details. The experimental verification has been made on the basis of a few representative examples.

Go to article

Authors and Affiliations

Piotr Jankowski-Mihułowicz
Grzegorz Pitera
Mariusz Węglarski
Download PDF Download RIS Download Bibtex

Abstract

A mixed pseudo-orthogonal frequency coding (Mixed-POFC) structure is proposed as a new spreadspectrum technique in this paper, which employs frequency and time diversity to enhance tag properties and balances the spectrum utilization and code diversity. The coding method of SAW RFID tags in this paper uses Mixed-POFC with multi-track chip arrangements. The cross-correlation and auto correlation of Mixed-POFC and POFC are calculated to demonstrate the reduced overlap between the adjacent center frequencies with the Mixed-POFC method. The center frequency of the IDT and Bragg reflectors is calculated by a coupling of modes (COM) module. The combination of the calculation results of the Bragg reflectors shows that compared with a 7-chip POFC, the coding number of a 7-chip Mixed-POFC is increased from 120 to 144 with the same fractional bandwidth of 12%. To demonstrate the validity of Mixed-POFC, finite element analysis (FEA) technology is used to analyze the frequency characteristics of Mixed-POFC chips. The maximum error between designed frequencies and simulation frequencies is only 1.7%, which verifies that the Mixed-POFC method is feasible.

Go to article

Authors and Affiliations

Mengru Xu
Xia Xiao
Qing Yuan
Yong Zong
Download PDF Download RIS Download Bibtex

Abstract

The operation of an anti-collision RFID system is characterized by the interrogation zone which should be estimated in any direction of 3D space for a group of electronic transponders. The interrogation zone should be as large as possible. However, the many problems in this area are due to the fact that energy can be transferred to transponders only on a limited distance. The greatest flexibility in developing RFID applications and shaping the interrogation zone can be achieved using the system with an antenna multiplexer. Therefore the problem of the interrogation zone determination in HF RFID systems with two orthogonal RWD antennas is presented in the paper. The perceived issues have been effectively dealt with and the solution has been proposed on the basis of the elaborated model. Conducted studies have been used to develop the software tool JankoRFIDmuxHF in the Mathcad environment. The research results are analysed in an example system configuration. The specialized measuring stand has been used for experimental verification of the identification efficiency. The convergence of the measurements and calculations confirms a practical usefulness of the presented concept of interrogation zone determination in anti-collision systems. It also shows the practical utility of the developed model and software tools.

Go to article

Authors and Affiliations

Piotr Jankowski-Mihułowicz
Mariusz Węglarski
Download PDF Download RIS Download Bibtex

Abstract

Temperature change is one of key factors which should be taken into account in logistics during transportation or storage of many types of goods. In this study, a passive UHF RFID-enabled sensor system for elevated temperature (above 58°C) detection has been demonstrated. This system consists of an RFID reader and disposable temperature sensor comprising an UHF antenna, chip and temperature sensitive unit. The UHF antenna was designed and simulated in an IE3D software. The properties of the system were examined depending on the temperature level, type of package which contains the studied objects and the type of antenna substrate.

Go to article

Authors and Affiliations

Kamil Janeczek
Małgorzata Jakubowska
Grażyna Kozioł
Piotr Jankowski-Mihułowicz
Download PDF Download RIS Download Bibtex

Abstract

RFID systems are one of the essential technologies and used many diverse applications. The security and privacy are the primary concern in RFID systems which are overcome by using suitable authentication protocols. In this manuscript, the costeffective RFID-Mutual Authentication (MA) using a lightweight Extended Tiny encryption algorithm (XTEA) is designed to overcome the security and privacy issues on Hardware Platform. The proposed design provides two levels of security, which includes secured Tag identification and mutual authentication. The RFIDMA mainly has Reader and Tag along with the backend Server. It establishes the secured authentication between Tag and Reader using XTEA. The XTEA with Cipher block chaining (CBC) is incorporated in RFID for secured MA purposes. The authentication process completed based on the challenge and response between Reader and Tag using XTEA-CBC. The present work is designed using Verilog-HDL on the Xilinx environment and implemented on Artix-7 FPGA. The simulation and synthesis results discussed with hardware constraints like Area, power, and time. The present work is compared with existing similar approaches with hardware constraints improvements.
Go to article

Bibliography

[1] A. Ibrahim and G. Dalkılıc, “Review of different classes of RFID authentication protocols,” Wireless Networks, Vol.25, No. 3, pp.961-974, 2019, https://doi.org/10.1007/s11276-017-1638-3
[2] G. Hatzivasilis, K. Fysarakis, I. Papaefstathiou and C. Manifavas. “A review of lightweight block ciphers,” Journal of Cryptographic Engineering, Vol. 8, No. 2, pp.141-184, 2018, https://doi.org/10.1007/s13389-017-0160-y
[3] J. Kaur, A. Kumar, M. Bansal. “Lightweight cipher algorithms for smart cards security: A survey and open challenges,” 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 541-546, 2017, https://doi.org/10.1109/ISPCC.2017.8269738
[4] X. Chen, K. Ma, D. Geng, J. Zhai, W. Liu, H. Zhang, T. Zhu, and X. Piao. “Untraceable Analysis of Scalable RFID Security Protocols,” Wireless Personal Communications, pp.1-21,2019, https://doi.org/10.1007/s11277-019-06650-1
[5] M.G. Samaila, M. Neto, D. AB. Fernandes, M. M. Freire, and P. RM. Inácio. “Security challenges of the Internet of Things,” Beyond the Internet of Things, pp. 53-82, 2017.
[6] M. M-Kermani, K. Tian, R. Azarderakhsh, and S. B-Sarmadi, “Fault-resilient lightweight cryptographic block ciphers for secure embedded systems,” IEEE Embedded Systems Letters, Vol. 6, No. 4, pp.89-92, 2014, https://doi.org/10.1109/LES.2014.2365099
[7] Y.S. Kang, E.O. Sullivan, D. Choi, and M. O’Neill, “Security Analysis on RFID Mutual Authentication Protocol,” in International Workshop on Information Security Applications, Springer, Cham, pp. 65-74, 2015, https://doi.org/https://doi.org/10.1007/978-3-319-31875-2_6
[8] M. Feldhofer and J. Wolkerstorfer, “Hardware implementation of symmetric algorithms for RFID security,” in RFID security, Springer, Boston, MA, pp. 373-415, 2008, https://doi.org/10.1007/978-0-387-76481-8_15
[9] B. Toiruul and K.O. Lee, “An advanced mutual-authentication algorithm using AES for RFID systems,” International Journal of Computer Science and Network Security, Vol. 6, No. 9B, pp.156-162, 2006
[10] M. Feldhofer, S. Dominikus and J. Wolkerstorfer, “Strong authentication for RFID systems using the AES algorithm,” in International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, pp. 357-370, 2004.
[11] R. Baashirah, A. Kommareddy, S. K. Batchu, V. Sunku, R. S. Ginjupalli, and S. Abuzneid, “Security implementation using present-puffin protocol in RFID devices,” in IEEE Long Island Systems, Applications and Technology Conference (LISAT), pp. 1-5, 2018, https://doi.org/10.1109/LISAT.2018.8378024
[12] N. Dinarvand and H. Barati, “An efficient and secure RFID authentication protocol using elliptic curve cryptography,” Wireless Networks, Vol. 25, No. 1, pp.415-428, 2019, https://doi.org/10.1007/s11276-017-1565-3
[13] J. Kang, “Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments,” The Journal of Supercomputing, Vol. 75, No. 8, pp. 4529-4542, 2019, https://doi.org/10.1007/s11227-016-1788-6
[14] J. Yu, G. Khan, and F. Yuan, “XTEA encryption based novel RFID security protocol,” In 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 000058-000062, 2011, https://doi.org/10.1109/CCECE.2011.6030408
[15] G.N. Khan, X. Yu, and F. Yuan, “A novel XTEA based authentication protocol for RFID systems,” in URSI General Assembly and Scientific Symposium, pp. 1-4, 2011, https://doi.org/10.1109/URSIGASS.2011.6050584
[16] G.N. Khan and G. Zhu, “Secure RFID authentication protocol with key updating technique,” in 22nd International Conference on Computer Communication and Networks (ICCCN), pp. 1-5, 2013, https://doi.org/10.1109/ICCCN.2013.6614192
[17] G. Zhu and G. N. Khan, “Symmetric key based RFID authentication protocol with a secure key-updating scheme,” in 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1-5, 2013, https://doi.org/10.1109/CCECE.2013.6567741
[18] G.N. Khan and M. Moessner, “Low-cost authentication protocol for passive, computation capable RFID tags,” Wireless Networks, Vol. 21, No. 2, pp. 565-580, 2015, https://doi.org/10.1007/s11276-014-0803-1
[19] S. Seshabhattar, S. K. Jagannatha, and D. W. Engels, “Security implementation within GEN2 protocol,” in IEEE International Conference on RFID-Technologies and Applications, pp. 402-407, 2011, https://doi.org/10.1109/RFID-TA.2011.6068669
[20] M. Saxena, R. N. Shaw, and J.K. Verma. “A Novel Hash-Based Mutual RFID Tag Authentication Protocol,” in Data and Communication Networks, pp. 1-12, 2019, https://doi.org/10.1007/978-981-13-2254-9_1
[21] K. Zang, H. Xu, F. Zhu, and P. Li, “Analysis and Design of Group RFID Tag Security Authentication Protocol,” in Conference on Complex, Intelligent, and Software Intensive Systems, Springer, Cham, pp. 637-645, 2019, https://doi.org/10.1007/978-3-030-22354-0_57
[22] F. Zhu, P. Li, H. Xu, and R. Wang, “A Lightweight RFID Mutual Authentication Protocol with PUF,” Sensor, Vol. 19, No. 13, pp. 2957, 2019, https://doi.org/10.3390/s19132957.
[23] R. Jain , K. G. Maradiab, “Comparative Analysis of SEA and XTEA for Resource Constrained Embedded Systems,” International Journal of Innovative and Emerging Research in Engineering, Vol. 3 No.4, pp. 78-82, 2016
[24] R. Anusha and V.V. D.Shastrimath “LCBC-XTEA: High Throughput Lightweight Cryptographic Block Cipher Model for Low-Cost RFID Systems,” in Computer Science On-line Conference, Springer, Cham, pp. 185-196, 2019, https://doi.org/10.1007/978-3-030-19813-8_20
Go to article

Authors and Affiliations

R. Anusha
1
V. Veena Devi Shastrimath
1

  1. Department of Electronics and Communication Engineering, N.M.A.M Institute of Technology, Visvesvaraya Technological University, Belagavi, Karnataka, India
Download PDF Download RIS Download Bibtex

Abstract

The three-dimensional (3D) coordinate measurement of radio frequency identification (RFID) multi-tag

networks is one of the important issues in the field of RFID, which affects the reading performance of

RFID multi-tag networks. In this paper, a novel method for 3D coordinate measurement of RFID multitag

networks is proposed. A dual-CCD system (vertical and horizontal cameras) is used to obtain images of

RFID multi-tag networks from different angles. The iterative threshold segmentation and the morphological

filtering method are used to process the images. The template matching method is respectively used to

determine the two-dimensional (2D) coordinate and the vertical coordinate of each tag. After that, the

3D coordinate of each tag is obtained. Finally, a back-propagation (BP) neural network is used to model

the nonlinear relationship between the RFID multi-tag network and the corresponding reading distance.

The BP neural network can predict the reading distances of unknown tag groups and find out the optimal

distribution structure of the tag groups corresponding to the maximum reading distance. In the future work,

the corresponding in-depth research on the neural network to adjust the distribution of tags will be done.

Go to article

Authors and Affiliations

Zhuang Xiao
Xiaolei Yu
Zhimin Zhao
Wenjie Zhang
Zhenlu Liu
Dongsheng Lu
Dingbang Dong
Download PDF Download RIS Download Bibtex

Abstract

The paper discusses possible applications of wireless technologies in support of lean manufacturing tools. The typology of lean tools is provided. It distinguishes three main categories, which are identification and analysis of waste, improvement implementation, and process monitoring. The set of lean tools was analyzed in terms of information requirements. On the other hand, the typology of wireless technologies was discussed including RFID and Wi-Fi. The literature review of wireless technology applications for support of lean tools was conducted. The literature was systematically reviewed from the point of view of specific technologies and specific tools which were the subjects of the analyzed publications. Both typologies were synthesized to establish a framework for wireless technologies applications in the context of lean manufacturing implementation. It also could serve as a guideline for lean practitioners and implies future research directions. This paper is an extended version of paper published by [1].

Go to article

Authors and Affiliations

Bartlomiej Gladysz
Aleksander Buczacki

This page uses 'cookies'. Learn more