As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem su...As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some展开更多
A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited rin...A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited ring modified from a traditional split-ring resonator(SRR)antenna and an inner SRR load,so the antenna can be regarded as a short-circuited ring loaded with SRR.According to the transmission line theory,to conjugate match with the capacitive input-impedance of a tag chip,the length of the short-circuited ring isλg/4 shorter than that of an open-circuited dipole of a traditional SRR antenna,whereλg is the wavelengh of the operating frequency.Hence,the size of the proposed antenna is more compact than that of the traditional SRR antenna.Thereafter,the proposed antenna is simulated and optimized by ANSYS high-frequency structure simulator(HFSS).The impedance,efficiency,and mutual coupling of the fabricated antenna are tested in a reverberation chamber(RC).The results show that the size of the presented antenna is 83%smaller than that of the traditional SRR antenna and the proposed antenna can cover the whole UHF RFID operating frequency band worldwide(840—960 MHz).The measured read range of the tag exhibits maximum values of 45 cm in free space and 37 cm under dense tag environment.展开更多
In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling ac...In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling activities of waste products. Taking into account such elements as the technical level of RFID, cost saving from remanufacturing and the cost of RFID tags, both centralized and decentralized supply chain models with different participants in waste product collection were created, in order to determine the optimal pricing strategy and RFID technical level. In the end, sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFED on pricing and RFID technology level, and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.展开更多
In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in...In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs.展开更多
Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher iden...Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms.展开更多
This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature...This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature monitoring. We call this system a PPS-RFID for short. The RFID systems have been found to have many applications in the internet of things (IOT) in the past decade. But semi-active RFID tags require an onboard battery which limits their applications in many fields. For these reasons, our research focuses on power sources for the RFID tags. This paper emphasizes the circuit design and simulation of PPS. In our tests, 0.283 mW was generated by PPS at 1 Hz vibration by a 650 N impact force. The results showed that the integrated PPS could supply sufficient power for the designed PPS-RFID tag. The PPS-RFID tag can be widely used for temperature monitoring during mobile transport of perishable items such as medicines or food.展开更多
The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interroga...The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM.展开更多
The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align ...The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed.展开更多
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequen...Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.展开更多
In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,w...In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.展开更多
Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge...Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge surge of research so as to make smarter refrigerators.According to a survey by the Food and Agriculture Organization of the United Nations(FAO),it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself.Smart refrigerators have been very successful in playing a pivotal role in mitigating this problem of food wastage.But a major issue is the high cost of available smart refrigerators and the lack of accurate design algorithms which can help achieve computer vision in any ordinary refrigerator.To address these issues,this work proposes an automated identification algorithm for computer vision in smart refrigerators using InceptionV3 and MobileNet Convolutional Neural Network(CNN)architectures.The designed module and algorithm have been elaborated in detail and are considerably evaluated for its accuracy using test images on standard fruits and vegetable datasets.A total of eight test cases are considered with accuracy and training time as the performance metric.In the end,real-time testing results are also presented which validates the system’s performance.展开更多
A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:...A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:positive pumping voltage(VPP=4.75 V) ,negative pumping voltage(VNN=4.75 V) ,and VNNL(=VNN/2) generation circuit were proposed.In addition,switching powers CG high voltage(CG_HV) ,CG low voltage(CG_LV) ,TG high voltage(TG_HV) ,TG low voltage(TG_LV) ,VNNL_CG and VNNL_TG switching circuit were supplied for the CG and TG driving circuit.Furthermore,a sequential pumping scheme and a new ring oscillator with a dual oscillation period were proposed.To reduce a power consumption of EEPROM in the write mode,the reference voltages VREF_VPP for VPP and VREE_VNN for VNN were used by dividing VDD(1.2 V) supply voltage supplied from the analog block in stead of removing the reference voltage generators.A voltage level detector using a capacitive divider as a low-power DC-DC converter design technique was proposed.The result shows that the power dissipation is 0.34μW in the read mode,13.76μW in the program mode,and 13.66μW in the erase mode.展开更多
To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communic...To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented.展开更多
Radio frequency identification(RFID) is a ubiquitous identification technology nowadays. An on-chip high-performance transmit/receive(T/R) switch is designed and simulated in 0.13-μm CMOS technology for reader-less R...Radio frequency identification(RFID) is a ubiquitous identification technology nowadays. An on-chip high-performance transmit/receive(T/R) switch is designed and simulated in 0.13-μm CMOS technology for reader-less RFID tag. The switch utilizes only the transistor width and length(W/L) optimization, proper gate bias resistor and resistive body floating technique and therefore,exhibits 1 d B insertion loss, 31.5 d B isolation and 29.2 d Bm 1-d B compression point(P1d B). Moreover, the switch dissipates only786.7 n W power for 1.8/0 V control voltages and is capable of switching in 794 fs. Above all, as there is no inductor or capacitor used in the circuit, the size of the switch is 0.00208 mm2 only. This switch will be appropriate for reader-less RFID tag transceiver front-end as well as other wireless transceivers operated at 2.4 GHz band.展开更多
Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production contro...Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production control and production transparency. Meanwhile, it generates increasing production data that are sometimes discrete, uncorrelated, and hard-to-use. Thus,an efficient analysis method is needed to utilize the invaluable data. This work provides an RFID-based production data analysis method for production control in Io T-enabled smart job-shops.The physical configuration and operation logic of Io T-enabled smart job-shop production are firstly described. Based on that,an RFID-based production data model is built to formalize and correlate the heterogeneous production data. Then, an eventdriven RFID-based production data analysis method is proposed to construct the RFID events and judge the process command execution. Furthermore, a near big data approach is used to excavate hidden information and knowledge from the historical production data. A demonstrative case is studied to verify the feasibility of the proposed model and methods. It is expected that our work will provide a different insight into the RFIDbased production data analysis.展开更多
In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of ...In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C.展开更多
Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that,...Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications.展开更多
基金Supported by the Project of the National "948" (2006-Z12)
文摘As a kind of brand-new technology, radio frequency identification management, data control and acquisition. This paper introduced food safety system construction, analyzed the advantages and problems in dairy modem suggestions for solution according to the practical situation. (RFID) plays an important role in dairy information tracing and culture function extension of managing breeding technology, and finally put forward some
文摘A compact antenna formed by three concentric split rings for ultra-high frequency(UHF)radio frequency identification(RFID)tag is proposed in this paper.The antenna is composed of two parts,an outer short-circuited ring modified from a traditional split-ring resonator(SRR)antenna and an inner SRR load,so the antenna can be regarded as a short-circuited ring loaded with SRR.According to the transmission line theory,to conjugate match with the capacitive input-impedance of a tag chip,the length of the short-circuited ring isλg/4 shorter than that of an open-circuited dipole of a traditional SRR antenna,whereλg is the wavelengh of the operating frequency.Hence,the size of the proposed antenna is more compact than that of the traditional SRR antenna.Thereafter,the proposed antenna is simulated and optimized by ANSYS high-frequency structure simulator(HFSS).The impedance,efficiency,and mutual coupling of the fabricated antenna are tested in a reverberation chamber(RC).The results show that the size of the presented antenna is 83%smaller than that of the traditional SRR antenna and the proposed antenna can cover the whole UHF RFID operating frequency band worldwide(840—960 MHz).The measured read range of the tag exhibits maximum values of 45 cm in free space and 37 cm under dense tag environment.
基金National Natural Science Foundation of China(No.71301038)
文摘In order to construct a resource-saving and environment- friendly society, the advantages of radio frequency identification (RFID) were considered. And it put forward the idea of introducing RFID in the recycling activities of waste products. Taking into account such elements as the technical level of RFID, cost saving from remanufacturing and the cost of RFID tags, both centralized and decentralized supply chain models with different participants in waste product collection were created, in order to determine the optimal pricing strategy and RFID technical level. In the end, sensitivity analyses were conducted to analyze the impacts of scaling parameter for additional increased recovery rate with RFED on pricing and RFID technology level, and impacts of cost saving on the profits of participants in different remanufacturing closed-loop supply chain models.
基金supported by the National Natural Science Foundation of China(61762093)the 17th Batches of Young and Middle-aged Leaders in Academic and Technical Reserved Talents Project of Yunnan Province(2014HB019)+1 种基金the Key Applied and Basic Research Foundation of Yunnan Province(2018FA036)the Program for Innovative Research Team(in Science and Technology)in University of Yunnan Province。
文摘In a passive ultra-high frequency(UHF)radio frequency identification(RFID)system,the recovery of collided tag signals on a physical layer can enhance identification efficiency.However,frequency drift is very common in UHF RFID systems,and will have an influence on the recovery on the physical layer.To address the problem of recovery with the frequency drift,this paper adopts a radial basis function(RBF)network to separate the collision signals,and decode the signals via FM0 to recovery collided RFID tags.Numerical results show that the method in this paper has better performance of symbol error rate(SER)and separation efficiency compared to conventional methods when frequency drift occurs.
基金supported in part by the National Natural Science Foundation of China(61762093)the 17th Batch of Young and Middle-aged Leaders in Academic and Technical Reserved Talents Project of Yunnan Province(2014HB019)the Program for Innovative Research Team(in Science and Technology)in University of Yunnan Province
文摘Dynamic framed slotted Aloha algorithm is one of popular passive radio frequency identification(RFID) tag anticollision algorithms. In the algorithm, a frame length requires dynamical adjustment to achieve higher identification efficiency.Generally, the adjustment of the frame length is not only related to the number of tags, but also to the occurrence probability of capture effect. Existing algorithms could estimate both the number of tags and the probability of capture effect. Under large-scale RFID tag identification, however, the number of tags would be much larger than an initial frame length. In this scenario, the existing algorithm's estimation errors would substantially increase. In this paper, we propose a novel algorithm called capture-aware Bayesian estimate, which adopts Bayesian rules to accurately estimate the number and the probability simultaneously. From numerical results, the proposed algorithm adapts well to the large-scale RFID tag identification. It has lower estimation errors than the existing algorithms. Further,the identification efficiency from the proposed estimate is also higher than the existing algorithms.
基金supported by the MEMS subject construction fund of the Kunming University of Science and Technology (Grant No. 14078024)
文摘This paper presents a design for a self-powered radio frequency identification (RFID) tag with a thin film bulk acoustic reso- nating piezoelectric power supply (PPS), which can be used for portable remote temperature monitoring. We call this system a PPS-RFID for short. The RFID systems have been found to have many applications in the internet of things (IOT) in the past decade. But semi-active RFID tags require an onboard battery which limits their applications in many fields. For these reasons, our research focuses on power sources for the RFID tags. This paper emphasizes the circuit design and simulation of PPS. In our tests, 0.283 mW was generated by PPS at 1 Hz vibration by a 650 N impact force. The results showed that the integrated PPS could supply sufficient power for the designed PPS-RFID tag. The PPS-RFID tag can be widely used for temperature monitoring during mobile transport of perishable items such as medicines or food.
文摘The 13.56 MHz analog front-end circuit for ISO/IEC 15693-compatible radio frequency identification (RFID) trans- ponder IC presented in this paper converts RF power to DC and extracts clock and data from the interrogator by 10% or 100% ASK modulation. The transponder sends data back to the interrogator by load modulation technology. The electrostatic discharge (ESD) protection circuits function to limit RF voltage to a safe level. An inductive coupling simulation modelling for 13.56 MHz RFID system is presented, with simulation results showing that the transponder operates over a wide range of electromagnetic field strength from Hmin (150 mA/m) to Hmax (5 A/m). The transponder IC is implemented in SMIC 0.35-μm three-metal two-poly mixed signal CMOS technology with embedded EEPROM.
基金supported by the Aviation Science Foundation(ASFC-20181352009).
文摘The existing active tag-based radio frequency identi-fication(RFID)localization techniques show low accuracy in practical applications.To address such problems,we propose a chaotic adaptive genetic algorithm to align the passive tag ar-rays.We use chaotic sequences to generate the intersection points,the weakest single point intersection is used to ensure the convergence accuracy of the algorithm while avoiding the optimization jitter problem.Meanwhile,to avoid the problem of slow convergence and immature convergence of the algorithm caused by the weakening of individual competition at a later stage,we use adaptive rate of change to improve the optimiza-tion efficiency.In addition,to remove signal noise and outliers,we preprocess the data using Gaussian filtering.Experimental results demonstrate that the proposed algorithm achieves high-er localization accuracy and improves the convergence speed.
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
基金Project(2009BADB9B09)supported by the National Key Technologies R&D Program of China
文摘Warehouse operation has become a critical activity in supply chain. Position information of pallets is important in warehouse management which can enhance the efficiency of pallets picking and sortation. Radio frequency identification(RFID) has been widely used in warehouse for item identifying. Meanwhile, RFID technology also has great potential for pallets localization which is underutilized in warehouse management. RFID-based checking-in and inventory systems have been applied in warehouse management by many enterprises. Localization approach is studied, which is compatible with existing RFID checking-in and inventory systems. A novel RFID localization approach is proposed for pallets checking-in. Phase variation of nearby tags was utilized to estimate the position of added pallets. A novel inventory localization approach combing angle of arrival(AOA) measurement and received signal strength(RSS) is also proposed for pallets inventory. Experiments were carried out using standard UHF passive RFID system. Experimental results show an acceptable localization accuracy which can satisfy the requirement of warehouse management.
基金the National Natural Science Foundation of China under Grant 61502411Natural Science Foundation of Jiangsu Province under Grant BK20150432 and BK20151299+7 种基金Natural Science Research Project for Universities of Jiangsu Province under Grant 15KJB520034China Postdoctoral Science Foundation under Grant 2015M581843Jiangsu Provincial Qinglan ProjectTeachers Overseas Study Program of Yancheng Institute of TechnologyJiangsu Provincial Government Scholarship for Overseas StudiesTalents Project of Yancheng Institute of Technology under Grant KJC2014038“2311”Talent Project of Yancheng Institute of TechnologyOpen Fund of Modern Agricultural Resources Intelligent Management and Application Laboratory of Huzhou Normal University.
文摘In RFID(Radio Frequency IDentification)system,when multiple tags are in the operating range of one reader and send their information to the reader simultaneously,the signals of these tags are superimposed in the air,which results in a collision and leads to the degrading of tags identifying efficiency.To improve the multiple tags’identifying efficiency due to collision,a physical layer network coding based binary search tree algorithm(PNBA)is proposed in this paper.PNBA pushes the conflicting signal information of multiple tags into a stack,which is discarded by the traditional anti-collision algorithm.In addition,physical layer network coding is exploited by PNBA to obtain unread tag information through the decoding operation of physical layer network coding using the conflicting information in the stack.Therefore,PNBA reduces the number of interactions between reader and tags,and improves the tags identification efficiency.Theoretical analysis and simulation results using MATLAB demonstrate that PNBA reduces the number of readings,and improve RFID identification efficiency.Especially,when the number of tags to be identified is 100,the average needed reading number of PNBA is 83%lower than the basic binary search tree algorithm,43%lower than reverse binary search tree algorithm,and its reading efficiency reaches 0.93.
基金This work was supported by Taif University Researchers Supporting Project(TURSP)under number(TURSP-2020/10),Taif University,Taif,Saudi Arabia.
文摘Machine Learning has evolved with a variety of algorithms to enable state-of-the-art computer vision applications.In particular the need for automating the process of real-time food item identification,there is a huge surge of research so as to make smarter refrigerators.According to a survey by the Food and Agriculture Organization of the United Nations(FAO),it has been found that 1.3 billion tons of food is wasted by consumers around the world due to either food spoilage or expiry and a large amount of food is wasted from homes and restaurants itself.Smart refrigerators have been very successful in playing a pivotal role in mitigating this problem of food wastage.But a major issue is the high cost of available smart refrigerators and the lack of accurate design algorithms which can help achieve computer vision in any ordinary refrigerator.To address these issues,this work proposes an automated identification algorithm for computer vision in smart refrigerators using InceptionV3 and MobileNet Convolutional Neural Network(CNN)architectures.The designed module and algorithm have been elaborated in detail and are considerably evaluated for its accuracy using test images on standard fruits and vegetable datasets.A total of eight test cases are considered with accuracy and training time as the performance metric.In the end,real-time testing results are also presented which validates the system’s performance.
基金Project supported by the Second Stage of Brain Korea 21
文摘A 512-bit EEPROM IP was designed by using just logic process based devices.To limit the voltages of the devices within 5.5 V,EEPROM core circuits,control gate(CG) and tunnel gate(TG) driving circuits,DC-DC converters:positive pumping voltage(VPP=4.75 V) ,negative pumping voltage(VNN=4.75 V) ,and VNNL(=VNN/2) generation circuit were proposed.In addition,switching powers CG high voltage(CG_HV) ,CG low voltage(CG_LV) ,TG high voltage(TG_HV) ,TG low voltage(TG_LV) ,VNNL_CG and VNNL_TG switching circuit were supplied for the CG and TG driving circuit.Furthermore,a sequential pumping scheme and a new ring oscillator with a dual oscillation period were proposed.To reduce a power consumption of EEPROM in the write mode,the reference voltages VREF_VPP for VPP and VREE_VNN for VNN were used by dividing VDD(1.2 V) supply voltage supplied from the analog block in stead of removing the reference voltage generators.A voltage level detector using a capacitive divider as a low-power DC-DC converter design technique was proposed.The result shows that the power dissipation is 0.34μW in the read mode,13.76μW in the program mode,and 13.66μW in the erase mode.
基金Program for New Century Excellent Talents in University of Fujian Province (No.X04139)
文摘To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. Using this model, a secure communication protocol that can be used for anti-counterfeiting, automatic identification and privacy preservation is then developed. In order to manage the number of parties, data records of items, and complicated transitions of access permissions in an item-level traceability context, a well-designed access control protocol is proposed to parties that can prove the physical possession of an item;meanwhile, to address the privacy issues during data sharing in an RFID network, a vision of database systems that take responsibility for the privacy of the data they manage is also presented.
基金supported by the research grant Economic Transformation Programme (ETP-2013-037) from Universiti Kebangsaan Malaysia and the Ministry of Science, Technology and Innovation (MOSTI) respectively
文摘Radio frequency identification(RFID) is a ubiquitous identification technology nowadays. An on-chip high-performance transmit/receive(T/R) switch is designed and simulated in 0.13-μm CMOS technology for reader-less RFID tag. The switch utilizes only the transistor width and length(W/L) optimization, proper gate bias resistor and resistive body floating technique and therefore,exhibits 1 d B insertion loss, 31.5 d B isolation and 29.2 d Bm 1-d B compression point(P1d B). Moreover, the switch dissipates only786.7 n W power for 1.8/0 V control voltages and is capable of switching in 794 fs. Above all, as there is no inductor or capacitor used in the circuit, the size of the switch is 0.00208 mm2 only. This switch will be appropriate for reader-less RFID tag transceiver front-end as well as other wireless transceivers operated at 2.4 GHz band.
基金supported by the National Natural Science Foundation of China(71571142,51275396)
文摘Under industry 4.0, internet of things(IoT), especially radio frequency identification(RFID) technology, has been widely applied in manufacturing environment. This technology can bring convenience to production control and production transparency. Meanwhile, it generates increasing production data that are sometimes discrete, uncorrelated, and hard-to-use. Thus,an efficient analysis method is needed to utilize the invaluable data. This work provides an RFID-based production data analysis method for production control in Io T-enabled smart job-shops.The physical configuration and operation logic of Io T-enabled smart job-shop production are firstly described. Based on that,an RFID-based production data model is built to formalize and correlate the heterogeneous production data. Then, an eventdriven RFID-based production data analysis method is proposed to construct the RFID events and judge the process command execution. Furthermore, a near big data approach is used to excavate hidden information and knowledge from the historical production data. A demonstrative case is studied to verify the feasibility of the proposed model and methods. It is expected that our work will provide a different insight into the RFIDbased production data analysis.
基金Supported by the National Natural Science Foundation of China(No.61340005)Beijing Natural Science Foundation(No.4132012)+2 种基金Beijing Education Committee Science and Technology Development Plan(No.KM201411232011)Beijing Outstanding Personnel Training Project(No.2013D005007000006)Scientific Research Improving Project-Intelligent Sense and Information Processing(No.5211524100)
文摘In this work,an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-( 16,4,1) codes instead of RN16 s. Therefore,readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover,the proposed scheme changes little to the existing standard. Thus,it is easy to implement and compatible with ISO 18000-6C.
基金supported by Fundamental Research Funds for the Central Universities of China (No.N100323001)Scientific Research Foundation of the Higher Education Institutions of Hebei Province of China (No.Z2010215)
文摘Radio frequency identification (RFID) system is a contactless automatic identification system, which uses small and low cost RFID tags. The primary problem of current security and privacy preserving schemes is that, in order to identify only one single tag, these schemes require a linear computational complexity on the server side. We propose an efficient mutual authentication protocol for passive RFID tags that provides confidentiality, untraceability, mutual authentication, and efficiency. The proposed protocol shifts the heavy burden of asymmetric encryption and decryption operations on the more powerful server side and only leaves lightweight hash operation on tag side. It is also efficient in terms of time complexity, space complexity, and communication cost, which are very important for practical large-scale RFID applications.