首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The use of RFID middleware to support application development for and integration of RFID hardware into information systems has become quite common in RFID applications where reader devices remain stationary, which currently represents the largest part of all RFID applications in use. Another field for applying RFID technology which is offering a huge set of novel possibilities and applications are mobile applications, where readers are no longer fixed. In order to address the specific issues of mobile RFID-enabled applications and to support developers in rapid application development, we present ID-Services, an architecture for an RFID middleware that is designed to support mobile applications. The ID-Services approach has been used to implement MoVIS (Mobile Visitor Information System), a mobile application which allows museum visitors to request individually adapted multimedia information about exhibits in an intuitive way.  相似文献   

2.
Abstract

Radio frequency identification (RFID) is an automatic identification (auto- ID) technology developed by the Auto-ID Center at the Massachusetts Institute of Technology, relying on storing and remotely retrieving data using devices called RFID tags and readers (Auto-ID Center, 2002; Doyle, 2004; EPC, 2004b; Finkenzeller, 2000; Shepard, 2005). With RFID technology, physical assets will have embedded intelligence that allows them to communicate with each other and with the tracking points (Auto-ID Center, 2002; IBM, 2003; VeriSign, 2004).  相似文献   

3.
Location awareness is the key capability of mobile computing applications. Despite high demand, indoor location technologies have not become truly ubiquitous mainly due to their requirements of costly infrastructure and dedicated hardware components. Received signal strength (RSS) based location systems are poised to realize economical ubiquity as well as sufficient accuracy for variety of applications. Nevertheless high resolution RSS based location awareness requires tedious sensor data collection and training of classifier which lengthens location system development life cycle. We present a rapid development approach based on online and incremental learning method which significantly reduces development time while providing competitive accuracy in comparison with other methods. ConSelFAM (Context-aware, Self-scaling Fuzzy ArtMap) extends the Fuzzy ArtMap neural network system. It enables on the fly expansion and reconstruction of location systems which is not possible in previous systems.  相似文献   

4.
In this work the development and optimization of the main components for a multisensing flexible Tag with RFID communication capabilities and integrated physical and chemical sensors for logistic datalogging applications will be reported. For this specific scenario, several constraints must be considered: power consumption must be limited for long-term operation, reliable ISO compliant RFID communication must be implemented, and special encapsulation issues must be faced for reliable sensor integration. In this work, the developments on application specific electronic interfaces and on ultra-low-power Metal OXdide semiconductor (MOX) gas sensors will be reported. The electronics for sensor control and readout as well as for RFID communication are based on an ultra-low-power MSP430 microcontroller from Texas Instruments together with a custom RFID front-end based on analog circuitry and a CPLD digital device, and are designed to guarantee a passive ISO15693 compliant RFID communication in a range up to 6 cm. A thin film battery for sensor operation is included, thus data acquisition and storage can be accomplished when no reader field is present. This design allows the user to access both the traceability and sensor information even when the on-board battery is exhausted. The physical sensors for light, temperature and humidity are commercially available devices, while for chemical gas sensing innovative MOX sensors are developed, based on ultra-low-power micromachined hotplate arrays specifically designed for flexible Tag integration purposes. A single MOX sensor requires only 8.9 mW for continuous operation, while temperature modulation and discontinuous sensor operation modes are implemented to further reduce the overall power consumption. The development of the custom control and RFID front-end electronics, together with innovative ultra-low-power MOX sensor arrays with flexible circuit encapsulation techniques will be described.  相似文献   

5.
In healthcare facilities most of the daily activities require strict coordination between clinicians, who often operate under heavy workloads and minimal workforce conditions in environments filled with increasingly complex technology. Ubiquitous Computing applications constitute a suitable solution for both reducing medical costs and improving patient safety by better supporting clinical processes. In this study we introduce an intelligent infrastructure for smart hospitals which implements basic services to optimize medical staff/patient interactions and grants ubiquitous and transparent access to clinical data stored in standard clinical databases. This infrastructure relies on the integration of Radio Frequency IDentification (RFID) and photosensor technologies to identify, locate and track clinicians and patients equipped with mobile devices and wearable RFID tags.  相似文献   

6.
The RFID technology is becoming ever more popular in the development of ubiquitous computing applications. A full exploitation of the RFID potential requires the study and implementation of human–computer interaction (HCI) modalities to be able to support wide usability by the target audience. This implies the need for programming methodologies specifically dedicated to support the easy and efficient prototyping of applications to have feedback from early tests with users. On the basis of our field‐working experience, we have designed oDect, a high‐level language and platform‐independent application programming interface (API), ad hoc designed to meet the needs of typical applications for mobile devices (smart phones and PDAs). oDect aims at allowing application developers to create their prototypes focusing on the needs of the final users, without having to care about the low‐level software that interacts with the RFID hardware. Further, in an end‐user developing (EUD) approach, oDect provides specific support for the application end‐user herself to cope with typical problems of RFID applications in detecting objects. We describe in detail the features of the API and discuss the findings of a test with four programmers, where we analyse and evaluate the use of the API in four sample applications. We also present results of an end‐user test, which investigated strengths and weaknesses of the territorial agenda (TA) concept. The TA is an RFID‐based citizen guide that aids—through time‐ and location‐based reminders—users in their daily activities in a city. The TA directly exploits EUD features of oDect, in particular concerning the possibility of linking detected objects with custom actions. Copyright © 2008 John Wiley & Sons, Ltd.  相似文献   

7.

RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client–server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag–reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  相似文献   

8.
Complex RFID event processing   总被引:1,自引:0,他引:1  
Advances of sensor and radio frequency identification (RFID) technology provide significant new power for humans to sense, understand and manage the world. RFID provides fast data collection with precise identification of objects with unique IDs without line of sight, thus it can be used for identifying, locating, tracking and monitoring physical objects. Despite these benefits, RFID poses many challenges for data processing and management: (i) RFID observations have implicit meanings, which have to be transformed and aggregated into semantic data represented in their data models; and (ii) RFID data are temporal, streaming, and in high volume, and have to be processed on the fly. Thus, a general RFID data processing framework is needed to automate the transformation of physical RFID observations into the virtual counterparts in the virtual world linked to business applications. In this paper, we take an event-oriented approach to process RFID data, by devising RFID application logic into complex events. We then formalize the specification and semantics of RFID events and rules. We discover that RFID events are highly temporal constrained, and include non-spontaneous events, and develop an RFID event detection engine that can effectively process complex RFID events. The declarative event-based approach greatly simplifies the work of RFID data processing, and can significantly reduce the cost of RFID data integration. This work was done by F. Wang while working at Siemens Corporate Research. This work was done by S. Liu while visiting Siemens Corporate Research.  相似文献   

9.
Localization of randomly distributed wireless sensor nodes is a significant and fundamental problem in a broad range of emerging civil engineering applications. Densely deployed in physical environments, they are envisioned to form ad hoc communication networks and provide sensed data without relying on a fixed communications infrastructure. To establish ad hoc communication networks among wireless sensor nodes, it is useful and sometimes necessary to determine sensors’ positions in static and dynamic sensor arrays. As well, the location of sensor nodes becomes of immediate use if construction resources, such as materials and components, are to be tracked. Tracking the location of construction resources enables effortless progress monitoring and supports real-time construction state sensing. This paper compares several models for localizing RFID nodes on construction job sites. They range from those based on triangulation with reference to transmission space maps, to roving RFID reader and tag systems using multiple proximity constraints, to approaches for processing uncertainty and imprecision in proximity measurements. They are compared qualitatively on the basis of cost, flexibility, scalability, computational complexity, ability to manage uncertainty and imprecision, and ability to handle dynamic sensor arrays. Results of field experiments and simulations are also presented where applicable.  相似文献   

10.
Abstract

The number of radiometric quantizing levels required for satellite monitoring of vegetation resources was evaluated by using in situ collected spectral reflectance data, an atmospheric radiative transfer simulation model and a satellite sensor simulation model. Reflectance data were converted to radiance data; passed through a model atmosphere to an altitude of 706 km; and subsequently quantized at 16,32,64,128,256 and 512 digital count levels for Thematic Mapper bands TM3 (0·63-0·69 μm) and TM4 (0·76-0·90 μm), The simulated digital count data were regressed against in situ biological data to quantify the relationship(s) between quantizing levels.

Results of the analysis demonstrated that solar zenith angle had an effect on QEΔρ, that 256 quantizing levels gave a 1-3 per cent improvement per channel over 64 quantizing levels, and that 256 quantizing levels gave a 1 per cent improvement per channel over 128 quantizing levels. No improvements were found for 256 versus 512 quantizing levels.  相似文献   

11.
A typical pervasive monitoring system like a smart building depends on an infrastructure composed of hundreds of heterogeneous wireless sensor devices. Managing the energy consumption of these devices poses a challenging problem that affects the overall efficiency and usability. Existing approaches for sensor energy consumption typically assume a single monitoring application to consume sensor data and a static configuration for sensor devices. In this paper, we focus on a multi-application context with dynamic requirements and multi-modal sensor devices. We present 3SoSM, an approach to optimize interactions between application requirements and wireless sensor environment in real-time. It relies on an energy-aware dynamic configuration of sensor devices to lower energy consumption while fulfilling application requirements. To bind together sensor configuration and dynamic management of data streams, we design a sustainable multi-application monitoring system architecture for pervasive environments that collects application requirements for sensor data streams and optimizes them into sensor configurations. To demonstrate the effectiveness of our approach, a set of experiments are designed in the context of smart buildings. We comparatively evaluate our approach to show how dynamic sensor configuration for multiple monitoring applications indeed outperforms the mainstream duty-cycling method.  相似文献   

12.
Recently, various smart application services have been developed using GPS (Global Positioning System), RFID (Radio Frequency IDentification) and sensor networks. The GPS has been successfully applied for outdoor location tracking by many applications, but it might still be insufficient in an indoor environment where GPS signals are often severely obstructed. The RFID technology has been utilized to play an important role in location tracking for indoor smart applications. Therefore, in this paper, we present the scenario and architecture of an indoor location tracking service for things or space in an exhibition environment based on mobile RFID. The RFID tags of things or spaces are identified as the locations of point being passed and we obtain the spatial data from the tags using mobile RFID readers, Web server and Database server. We have designed and implemented the prototype of location tracking system for exhibition scenario using Microsoft .NET framework. Additionally, we have verified the functionality of this system so various other indoor smart services may be provided using the proposed system.  相似文献   

13.
Wireless sensor networks (WSNs) have become an increasingly compelling platform for Structural Health Monitoring (SHM) applications, since they can be installed relatively inexpensively onto existing infrastructure. Existing approaches to SHM in WSNs typically address computing system issues or structural engineering techniques, but not both in conjunction. In this paper, we propose a holistic approach to SHM that integrates a decentralized computing architecture with the Damage Localization Assurance Criterion algorithm. In contrast to centralized approaches that require transporting large amounts of sensor data to a base station, our system pushes the execution of portions of the damage localization algorithm onto the sensor nodes, reducing communication costs by two orders of magnitude in exchange for moderate additional processing on each sensor. We present a prototype implementation of this system built using the TinyOS operating system running on the Intel Imote2 sensor network platform. Experiments conducted using two different physical structures demonstrate our system’s ability to accurately localize structural damage. We also demonstrate that our decentralized approach reduces latency by 65.5% and energy consumption by 64.0% compared to a typical centralized solution.  相似文献   

14.
The wireless connectivity in pervasive computing has ephemeral character and can be used for creating ad hoc networks, sensor networks, connection with RFID (Radio Frequency Identification) tags etc. The communication tasks in such wireless networks often involve an inquiry over a shared channel, which can be invoked for: discovery of neighboring devices in ad hoc networks, counting the number of RFID tags that have a certain property, estimating the mean value contained in a group of sensors etc. Such an inquiry solicits replies from possibly large number of terminals n. This necessitates the usage of algorithms for resolving batch collisions (conflicts) with unknown conflict multiplicity n. In this paper we present a novel approach to the problem of collision resolution for batch conflicts. We show how the conventional tree algorithms for collision resolution can be used to obtain progressively accurate estimation of the multiplicity. We use the estimation to propose a more efficient binary tree algorithm, termed Estimating Binary Tree (EBT) algorithm. The EBT algorithm is suited for implementation when the conflicting nodes are passive, such as e.g. RFID tags. We extend the approach to design the Interval Estimation Conflict Resolution (IECR) algorithm. For n→∞ we prove that the efficiency achieved by IECR for batch arrivals is identical with the efficiency that Gallager’s FCFS algorithm achieves for Poisson packet arrivals. For finite n, the simulation results show that IECR is, to the best of our knowledge, the most efficient batch resolution algorithm reported to date.  相似文献   

15.
In this paper, we describe a meta-framework that helps guide development of sensor network (SN) cyberinfrastructure in a way that enables emerging sensor infrastructures, including advances in sensor hardware, communication, monitoring applications, and knowledge representation, to interoperate. This framework is guided by the DAST principle. That is, the overall goal of any SN infrastructure is essentially the same: to acquire the right Data from the right Area using the right Sensors at the right Time. In conformity with this principle, our meta-framework integrates SN infrastructures along axes related to the answers to five questions: Why has processing been requested? What are the goals of the processing? Where is it carried out? How is it carried out? And, when will the results be provided? The infrastructure components are integrated by using various data standards and technologies currently available from various SN research groups, and mapping them to an overarching knowledge-based meta-framework. In concrete terms, we show in this paper how four distinct sensor technology projects under development in our research lab are used to fit these five axes of SN infrastructure and how they can be indirectly integrated through the use of software agent-based tools, which embody the meta-framework: an ontology-based decision support system that applies models of SN infrastructure to its evaluation techniques; SN configuration tools that enable network configurations to be exported into common geospatial standards; a transformation engine that converts these SN configurations, along with collected data, into a representation that meshes with our infrastructure models so that they may be used within our decision support environment; and a Virtual SN to handle many of the management and control aspects of SNs.  相似文献   

16.
Ultra wideband (UWB) systems are currently an important wireless infrastructure for high performance short-range communications and mobile applications. Indeed, forming ad-hoc networks among various UWB enabled devices is considered as an important mobile data exchange operating environment. In our study, we explore the problem of jointly optimizing the power level and data rate used in the devices in such a UWB based ad-hoc network. We propose a practical optimization algorithm based on judicious power control for real-time applications and opportunistic scheduling for non-real-time applications. Simulation results indicate that our proposed techniques are effective under various practical scenarios.
Yu-Kwong KwokEmail:
  相似文献   

17.
Technology, Standards, and Real-World Deployments of the EPC Network   总被引:2,自引:0,他引:2  
The EPC Network is a global RFID data sharing infrastructure based on standards that are built around the Electronic Product Code (EPC), an unambiguous numbering scheme for the designation of physical goods. The authors present the fundamental concepts and applications of the EPC Network, its integration with enterprise systems, and its functionality for data exchange between organizations in the supply chain.  相似文献   

18.

This paper introduces the notion of physical hypermedia, addressing the problem of organizing material in mixed digital and physical environments. Based on empirical studies, we propose concepts for collectional actions and meta-data actions, and present prototypes combining principles from augmented reality and hypermedia to support organization of mixtures of digital and physical materials. Our prototype of a physical hypermedia system is running on an augmented architect's desk and digital walls utilizing Radio Frequency Identifier (RFID) tags as well as visual tags tracked by cameras. It allows users to tag physical materials, and have these tracked by readers (antennas) that may become pervasive in our work environments. In the physical hypermedia system, we work with three categories of RFID tags: simple object tags, collectional tags, and tooltags invoking operations such as grouping and linking of physical material. In addition, we utilize visual ARToolKit tags for linking and navigating 3D models on a physical desk. Our primary application domain is architecture and design, and so we discuss the use of augmented collectional artifacts primarily for this domain.  相似文献   

19.
物联网技术的研究综述   总被引:1,自引:0,他引:1  
刘志杰 《软件》2013,34(5):164-168
物联网打破了将物理基础设施和IT基础设施分开的传统思维,是信息领域一次重大的发展和变革机遇。物联网涉及众多领域,当前国内外的研究和开发都还处于起步阶段。对物联网研究的现实基础以及关键问题展开了讨论,介绍了物联网的四种具有代表性的定义和三种关键性的基本特征;分析了基于RFID的物联网应用架构、基于泛在传感网的物联网应用架构和基于M2M的物联网应用架构;给出了大致被公认为的四个层次的物联网关键技术框架;最后描述了物联网的典型应用领域。  相似文献   

20.
The operational environment can be a valuable source of information about the behavior of software applications and their usage context. Although a single instance of an application has limited evidence of the range of the possible behaviors and situations that might be experienced in the field, the collective knowledge composed by the evidence gathered by the many instances of a same application running in several diverse user environments (eg, a browser) might be an invaluable source of information. This information can be exploited by applications able to autonomously analyze how they behave in the field and adjust their behavior accordingly. Augmenting applications with the capability to collaborate and directly share information about their behavior is challenging because it requires the definition of a fully decentralized and dependable networked infrastructure whose nodes are the user machines. The nodes of the infrastructure must be collaborative, to share information, and autonomous, to exploit the available information to change their behavior, for instance, to better accommodate the needs of the users to prevent known problems. This paper describes the initial results that we obtained with the design and the development of an infrastructure that can enable the execution of collaborative scenarios in a fully decentralized way. Our idea is to combine the agent-based paradigm, which is well suited to design collaborative and autonomous nodes, and the peer-to-peer paradigm, which is well suited to design distributed and dynamic network infrastructures. To demonstrate our idea, we augmented the popular JADE agent-based platform with a software layer that supports both the creation of a fully decentralized peer-to-peer network of JADE platforms and the execution of services within that network, thus enabling JADE multiagent systems (MASs) to behave as peer-to-peer networks. The resulting platform can be used to study the design of collaborative applications running in the field.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号