As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem su...As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some展开更多
In order to construct a resource-saving and environmentfriendly society,the advantages of radio frequency identification(RFID) were considered.And it put forward the idea of introducing RFID in the recycling activitie...In order to construct a resource-saving and environmentfriendly society,the advantages of radio frequency identification(RFID) were considered.And it put forward the idea of introducing RFID in the recycling activities of waste products.Taking into account such elements as the technical level of RFID,cost saving from remanufacturing and the cost of RFID tags,both centralized and decentralized supply chain models with different participants in waste product collection were created,in order to determine the optimal pricing strategy and RFID technical level.In the end,sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFID on pricing and RFID technology level,and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.展开更多
A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the per...A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification.展开更多
A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This pr...A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.展开更多
The radio frequency identification (RFID) technology progressing is becoming a increasing interest in several application areas. To accommodate diverse and changing requirements from applications,RFID middleware shoul...The radio frequency identification (RFID) technology progressing is becoming a increasing interest in several application areas. To accommodate diverse and changing requirements from applications,RFID middleware should be reconfigurable. However,current RFID middleware is limited in its ability to support reconfiguration. To solve this problem,we adopt the service-oriented component-based approach in building the middleware. Component-based design enables decomposition of middleware functionality and is easier than the current one to manage and modify the structure of the middleware both statically and dynamically. Applying service-oriented architecture (SOA) can further reduce the coupling between components and external software and ease the integration between middleware and applications. We propose a two-layered service component architecture (SCA) open service gateway initiative (OSGi) component model so as to enable reconfigurability. Based on the proposed component model,we build a standard-based RFID middleware-SCA-OSGi based RFID middleware (SORM) which supports flexible deployment topologies and reconfigurability. The design and implementation details of SORM are illustrated.展开更多
In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in...In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs.展开更多
Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge...Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge surge of research so as to make smarter refrigerators.According to a survey by the Food and Agriculture Organization of the United Nations(FAO),it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself.Smart refrigerators have been very successful in playing a pivotal role in mitigating this problem of food wastage.But a major issue is the high cost of available smart refrigerators and the lack of accurate design algorithms which can help achieve computer vision in any ordinary refrigerator.To address these issues,this work proposes an automated identification algorithm for computer vision in smart refrigerators using InceptionV3 and MobileNet Convolutional Neural Network(CNN)architectures.The designed module and algorithm have been elaborated in detail and are considerably evaluated for its accuracy using test images on standard fruits and vegetable datasets.A total of eight test cases are considered with accuracy and training time as the performance metric.In the end,real-time testing results are also presented which validates the system’s performance.展开更多
Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher iden...Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms.展开更多
The surface acoustic wave (SAW) identification (ID)-tags have great potential for application in radio frequency identification (RFID) due to their characteristics of wireless sensing and passive operation. In t...The surface acoustic wave (SAW) identification (ID)-tags have great potential for application in radio frequency identification (RFID) due to their characteristics of wireless sensing and passive operation. In the measurements based on the frequency domain sampling (FDS), to expand the range of detection and allow the system work in harsh environments, it is necessary to enhance the identification capability at low SNR. In addition, to identify the tags in real time, it is important to reduce identification time. Therefore, estimation of signal parameters based on the Procrustes rotations via the rotational invariance technique (PRO-ESPRIT) is adopted. Experimental results show that good identification capability is achieved with a relatively faster measurement speed.展开更多
In order to increase the productivity of construction industry, emerging technologies have been constantly introduced and applied in this traditional industry by pilot researchers. This paper provides an integrated mo...In order to increase the productivity of construction industry, emerging technologies have been constantly introduced and applied in this traditional industry by pilot researchers. This paper provides an integrated model of radio-frequency identification (RFID) and four-dimensional Computer-Aided Design (4D CAD) in construction management. RFID involves the use of tags that collect data and transmit data. RFID can collect data by radio waves instead of light waves. RFID technology is surpassing barcode technology where light waves are easily blocked and barcode labels are easy to fall off or become unreadable due to dust, dirt, or other contaminants. 4D CAD which involves 3D construction models and construction schedules presents visualized construction process. Integration of RFID and 4D CAD in this paper built a dynamic construction management and control system which would reduce the time of capturing data on site and control quality of construction materials efficiently. Pilot test result shows that a construction manager can easily understand how and what a complicated construction project will be accomplished. Although further analysis is necessary, RFID and 4D CAD show promises of being a beneficial technology in construction management.展开更多
A new comb shaped antenna for radio frequency identification is proposed. The kind of antenna can replace some antenna array. So it is very convenient for omnidirectional identification. The test result proves this a...A new comb shaped antenna for radio frequency identification is proposed. The kind of antenna can replace some antenna array. So it is very convenient for omnidirectional identification. The test result proves this antenna is viable.展开更多
The main motive of our research work is security enhancement and light energy conservation. This paper describes a study investigating the potential of a controlled office solution by integrating the Internet of Thing...The main motive of our research work is security enhancement and light energy conservation. This paper describes a study investigating the potential of a controlled office solution by integrating the Internet of Things (IoT) with wireless sensor networks (WSNs). A prototype of a smart office is developed using a global system of mobile Bluetooth and Radio Frequency Identification (RFID) technology. The user can turn on and off the fan remotely at any time. This prototype focuses on security and provides human-friendly assistance when in or out of the Office by integrating a mobile application platform. The innovative automated smart Office is designed with intelligent Security doors, lights, alarms, temperature humidifiers, and bright Liquid Crystal Display (LCD) screens for viewing. Our study has opened up virtual possibilities for producing cheap innovative frameworks in this Generation of IoT and the fifth Generation (5G) technology. Therefore, when implemented, this innovation will ease and improve human quality of life. So, this paper aims to provide a low-cost, effective Internet of the things-based automated smart Office.展开更多
The method of acquiring the real-time data has influenced the implementation of the manufacturing execution system (MES). Accompanied with turning the MES into service-oriented manufacturing execution system (so-ME...The method of acquiring the real-time data has influenced the implementation of the manufacturing execution system (MES). Accompanied with turning the MES into service-oriented manufacturing execution system (so-MES), real-time e-quality tracking (e-QT), in which real-time data are computed, has played more and more important roles in manufacturing. This paper presents an e-QT model through the study of real-time status data tracking and quality data collecting. An implementing architecture of the e-QT model is constructed on the basis of radio frequency identification devices (RFID) data-tracking network. In order to develop the e-QT system, some key enabling technologies, such as configuration, data collection, and data processing, etc, are studied. The relation schema between hardware is built for the RFID data-tracking network based on the configuration technique. Real-time data are sampled by using data collecting technique. Furthermore, real-time status and quality data in a shop-floor can be acquired in terms of using the real-time data computing method. Finally, a prototype system is developed and a running example is given so as to verify the feasibility of methods proposed in this paper. The proposed research provides effective e-quality tracking theoretical foundation through the use of RFID technology for the discrete manufacturing.展开更多
Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possib...Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.展开更多
The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align ...The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed.展开更多
Recently,object identification with radio frequency identification(RFID)technology is becoming increasingly popular.Identification time is a key performance metric to evaluate the RFID system.The present paper analyze...Recently,object identification with radio frequency identification(RFID)technology is becoming increasingly popular.Identification time is a key performance metric to evaluate the RFID system.The present paper analyzes the deficiencies of the state-of-the-arts algorithms and proposes a novel sub-frame-based algorithm with adaptive frame breaking policy to lower the tag identification time for EPC global C1 Gen2 UHF RFID standard.Through the observation of slot statistics in a sub-frame,the reader estimates the tag quantity and efficiently calculates an optimal frame size to fit the unread tags.Only when the expected average identification time in the calculated frame size is less than that in the previous frame size,the reader starts the new frame.Moreover,the estimation of the proposed algorithm is implemented by the look-up tables,which allows dramatically reduction in the computational complexity.Simulation results show noticeable throughput and time efficiency improvements of the proposed solution over the existing approaches.展开更多
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi...By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.展开更多
基金Supported by the Project of the National "948" (2006-Z12)
文摘As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some
基金National Natural Science Foundation of China(No.71301038)
文摘In order to construct a resource-saving and environmentfriendly society,the advantages of radio frequency identification(RFID) were considered.And it put forward the idea of introducing RFID in the recycling activities of waste products.Taking into account such elements as the technical level of RFID,cost saving from remanufacturing and the cost of RFID tags,both centralized and decentralized supply chain models with different participants in waste product collection were created,in order to determine the optimal pricing strategy and RFID technical level.In the end,sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFID on pricing and RFID technology level,and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.
基金the National Natural Science Foundation of China (No. 61071078)
文摘A radio frequency identification (RFID) reader will fail to identify tags if a collision occurs. This paper proposes a bi-slotted binary tree algorithm (BSBTA) with stack for RFID tag anti-collision to improve the performance of binary tree algorithm (BTA). In BSBTA, the reader detects collisions by Manchester code and stores colliding prefixes in a stack. The query is composed of a two-bit prefix and an index value. Following every reader query, there are two timeslots for tags whose pointers and identities (IDs) match the query to respond, one for the tag whose next bit is 0 and the other for the tag with 1 as its next bit. Performance analysis and evaluation are also given. The time complexity and the communication complexity of BTA and BSBTA are derived. The simulation results compare the performance of BSBTA with several related anti-collision algorithms. It is shown that BSBTA outperforms BTA in terms of the average number of responded bits and timeslots for one tag identification.
基金the National Science Council(No. NSC99-2218-E-260-002)
文摘A radio frequency identification (RFID) yoking proof scheme can generate proofs of simultaneous presence of two tags in the range of a specified reader so that an off-line verifier can verify the proofs later. This proof has found several interesting applications. However, many existing RFID yoking schemes are vulnerable to replay attacks. To overcome the weaknesses, Cho et al. proposed a new RFID yoking proof protocol and a new grouping protocol. Unfortunately, Cho et al.'s schemes are still vulnerable to replay attacks. In this paper, in addition to demonstrating weaknesses, we further discuss the rationale behind these weaknesses to provide a guide line for designing secure RFID yoking schemes. Based on the guide line, we propose a new RFID yoking scheme and a new RFID grouping scheme. Performance evaluation shows that our scheme outperforms its counterparts.
基金the National High Technology Research and Development Program (863) of China(No. 2006AA04A114)
文摘The radio frequency identification (RFID) technology progressing is becoming a increasing interest in several application areas. To accommodate diverse and changing requirements from applications,RFID middleware should be reconfigurable. However,current RFID middleware is limited in its ability to support reconfiguration. To solve this problem,we adopt the service-oriented component-based approach in building the middleware. Component-based design enables decomposition of middleware functionality and is easier than the current one to manage and modify the structure of the middleware both statically and dynamically. Applying service-oriented architecture (SOA) can further reduce the coupling between components and external software and ease the integration between middleware and applications. We propose a two-layered service component architecture (SCA) open service gateway initiative (OSGi) component model so as to enable reconfigurability. Based on the proposed component model,we build a standard-based RFID middleware-SCA-OSGi based RFID middleware (SORM) which supports flexible deployment topologies and reconfigurability. The design and implementation details of SORM are illustrated.
基金supported by the National Natural Science Foundation of China(61762093)the 17th Batches of Young and Middle-aged Leaders in Academic and Technical Reserved Talents Project of Yunnan Province(2014HB019)+1 种基金the Key Applied and Basic Research Foundation of Yunnan Province(2018FA036)the Program for Innovative Research Team(in Science and Technology)in University of Yunnan Province。
文摘In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs.
基金This work was supported by Taif University Researchers Supporting Project(TURSP)under number(TURSP-2020/10),Taif University,Taif,Saudi Arabia.
文摘Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge surge of research so as to make smarter refrigerators.According to a survey by the Food and Agriculture Organization of the United Nations(FAO),it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself.Smart refrigerators have been very successful in playing a pivotal role in mitigating this problem of food wastage.But a major issue is the high cost of available smart refrigerators and the lack of accurate design algorithms which can help achieve computer vision in any ordinary refrigerator.To address these issues,this work proposes an automated identification algorithm for computer vision in smart refrigerators using InceptionV3 and MobileNet Convolutional Neural Network(CNN)architectures.The designed module and algorithm have been elaborated in detail and are considerably evaluated for its accuracy using test images on standard fruits and vegetable datasets.A total of eight test cases are considered with accuracy and training time as the performance metric.In the end,real-time testing results are also presented which validates the system’s performance.
基金supported in part by the National Natural Science Foundation of China(61762093)the 17th Batch of Young and Middle-aged Leaders in Academic and Technical Reserved Talents Project of Yunnan Province(2014HB019)the Program for Innovative Research Team(in Science and Technology)in University of Yunnan Province
文摘Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms.
文摘The surface acoustic wave (SAW) identification (ID)-tags have great potential for application in radio frequency identification (RFID) due to their characteristics of wireless sensing and passive operation. In the measurements based on the frequency domain sampling (FDS), to expand the range of detection and allow the system work in harsh environments, it is necessary to enhance the identification capability at low SNR. In addition, to identify the tags in real time, it is important to reduce identification time. Therefore, estimation of signal parameters based on the Procrustes rotations via the rotational invariance technique (PRO-ESPRIT) is adopted. Experimental results show that good identification capability is achieved with a relatively faster measurement speed.
文摘In order to increase the productivity of construction industry, emerging technologies have been constantly introduced and applied in this traditional industry by pilot researchers. This paper provides an integrated model of radio-frequency identification (RFID) and four-dimensional Computer-Aided Design (4D CAD) in construction management. RFID involves the use of tags that collect data and transmit data. RFID can collect data by radio waves instead of light waves. RFID technology is surpassing barcode technology where light waves are easily blocked and barcode labels are easy to fall off or become unreadable due to dust, dirt, or other contaminants. 4D CAD which involves 3D construction models and construction schedules presents visualized construction process. Integration of RFID and 4D CAD in this paper built a dynamic construction management and control system which would reduce the time of capturing data on site and control quality of construction materials efficiently. Pilot test result shows that a construction manager can easily understand how and what a complicated construction project will be accomplished. Although further analysis is necessary, RFID and 4D CAD show promises of being a beneficial technology in construction management.
文摘A new comb shaped antenna for radio frequency identification is proposed. The kind of antenna can replace some antenna array. So it is very convenient for omnidirectional identification. The test result proves this antenna is viable.
文摘The main motive of our research work is security enhancement and light energy conservation. This paper describes a study investigating the potential of a controlled office solution by integrating the Internet of Things (IoT) with wireless sensor networks (WSNs). A prototype of a smart office is developed using a global system of mobile Bluetooth and Radio Frequency Identification (RFID) technology. The user can turn on and off the fan remotely at any time. This prototype focuses on security and provides human-friendly assistance when in or out of the Office by integrating a mobile application platform. The innovative automated smart Office is designed with intelligent Security doors, lights, alarms, temperature humidifiers, and bright Liquid Crystal Display (LCD) screens for viewing. Our study has opened up virtual possibilities for producing cheap innovative frameworks in this Generation of IoT and the fifth Generation (5G) technology. Therefore, when implemented, this innovation will ease and improve human quality of life. So, this paper aims to provide a low-cost, effective Internet of the things-based automated smart Office.
基金supported by Natinoal Basic Research Program of China (973 Program, Grant No. 2011CB706805)National Natural Science Foundation of China (Grant No. 50875204)
文摘The method of acquiring the real-time data has influenced the implementation of the manufacturing execution system (MES). Accompanied with turning the MES into service-oriented manufacturing execution system (so-MES), real-time e-quality tracking (e-QT), in which real-time data are computed, has played more and more important roles in manufacturing. This paper presents an e-QT model through the study of real-time status data tracking and quality data collecting. An implementing architecture of the e-QT model is constructed on the basis of radio frequency identification devices (RFID) data-tracking network. In order to develop the e-QT system, some key enabling technologies, such as configuration, data collection, and data processing, etc, are studied. The relation schema between hardware is built for the RFID data-tracking network based on the configuration technique. Real-time data are sampled by using data collecting technique. Furthermore, real-time status and quality data in a shop-floor can be acquired in terms of using the real-time data computing method. Finally, a prototype system is developed and a running example is given so as to verify the feasibility of methods proposed in this paper. The proposed research provides effective e-quality tracking theoretical foundation through the use of RFID technology for the discrete manufacturing.
基金supported by the National High Technology Research and Development Program of China(863 Program)(2006AA4A119).
文摘Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.
基金supported by the Aviation Science Foundation(ASFC-20181352009).
文摘The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed.
文摘Recently,object identification with radio frequency identification(RFID)technology is becoming increasingly popular.Identification time is a key performance metric to evaluate the RFID system.The present paper analyzes the deficiencies of the state-of-the-arts algorithms and proposes a novel sub-frame-based algorithm with adaptive frame breaking policy to lower the tag identification time for EPC global C1 Gen2 UHF RFID standard.Through the observation of slot statistics in a sub-frame,the reader estimates the tag quantity and efficiently calculates an optimal frame size to fit the unread tags.Only when the expected average identification time in the calculated frame size is less than that in the previous frame size,the reader starts the new frame.Moreover,the estimation of the proposed algorithm is implemented by the look-up tables,which allows dramatically reduction in the computational complexity.Simulation results show noticeable throughput and time efficiency improvements of the proposed solution over the existing approaches.
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
基金supported by the 863 Program under Grant No. 2008AA04A107
文摘By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.