Conference PaperPDF Available

Design and implementation of RFID-based anti-theft system

Authors:

Abstract and Figures

High value assets loss due to theft can be reduced if the attempt to remove the asset is detected at once. This paper study the design of anti-theft system based on RFID technology. The RFID tag that attaches to an object is integrated with motion sensor. The interrupt function is utilized to the tag to automatically detect motion of an object. The real-time notification of theft is realized using multi-communication principle between a tag and a reader. The anti-theft system proposed here was tested for motion detection efficiency and RF communication performance in multi-floored building to verify its reliability.
Content may be subject to copyright.
Design and Implementation of RFID-based
Anti-Theft System
Shabinar Binti Abdul Hamid1
Anis Diyana Rosli2
Universiti Teknologi MARA
Permatang Pauh, Malaysia
1shabinar@ppinang.uitm.edu.my
2anis.diyana@ppinang.uitm.edu.my
Widad Ismail
School of Electrical &Electronic
Engineering
Universiti Sains Malaysia
eewidad@eng.usm.my
Aimi Zulliayana Rosli
Universiti Teknologi MARA
Machang, Malaysia
zullia068@kelantan.uitm.edu.my
Abstract—High value assets loss due to theft can be reduced
if the attempt to remove the asset is detected at once. This paper
study the design of anti-theft system based on RFID technology.
The RFID tag that attaches to an object is integrated with
motion sensor. The interrupt function is utilized to the tag to
automatically detect motion of an object. The real-time
notification of theft is realized using multi-communication
principle between a tag and a reader. The anti-theft system
proposed here was tested for motion detection efficiency and RF
communication performance in multi-floored building to verify
its reliability.
Index Terms--- motion sensor, UHF RFID, active RFID,
anti-theft device
I. INTRODUCTION
RFID (Radio Frequency Identification) is a technology
that employed the storing and retrieving data remotely and
provides identity codes to the monitored object. It comprises
of RFID reader and RFID tag. The RFID tag is attached to the
monitored object. The identity codes in the form of unique
identification number is stored in the RFID tag, contains all
information about the monitored object. In common
application, the RFID reader queries the tag to transmit
identification data when in the interrogation zone. The process
of capturing, processing and transmission of data are executed
in real-time. The function of RFID is further enhanced by
integrating the sensor to the tag.
One of the application benefits from the integration is an
anti-theft solution [1],[2]. In common scenario the owner will
only realize the asset missing when it was already out of sight.
A clear trend indicates that users are looking for the anti-theft
systems that not only capable to protect asset but also to
prevent loss. The prevention can only be realized if the
subscriber is alerted in real-time and the details of occurrence
are recorded in the monitoring system for tracking.
This paper describes the design of anti-theft system based
on RFID technology to protect high-value asset such as items
in the museum. The items such as artwork, museum artifacts
and rare book are seldom moved by curatorial staffs. The tag
designed in this project is used to monitor high value asset that
rarely moved.
II. BASIC OPERATING STRUCTURE OF THE SYSTEM
The anti-theft system consists of RFID reader, RFID tag
and interfacing unit. The setup of proposed RFID-based
anti-theft system is illustrated in Fig. 1. The proposed system
is functioning such that when the tag which is attached to the
monitored asset senses the tampered event, it will
immediately send the alert signal to the RFID reader. Upon
successfully receiving the alert signal, the reader will send the
information to the interfacing unit to circulate the warning.
The transmission power of the reader is constant throughout
the process. With immediate alert from the tampered asset, the
curators may have enough time to react before the stolen asset
is going out of sight. This enables an active communication
path between the tag and the user, as long as the ends are
within the operating range of 30 to 100 meters, depending on
type of the reader antenna.
Fig. 1. Illustration of the proposed anti-theft system
The functional block diagram of RFID reader is given in
Fig. 2. The main components of reader are controller unit,
CC1100 RF transceiver module and MAX3222 transceiver.
There are two micro-switches used in the RFID reader. One is
functioning as a reset switch and the other one used as a
request button. After the reader is powered up, a request
button is pressed in order to start the tag collection process.
The tags that are located in the reader interrogation zone will
respond to the reader request by transmitting their
2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia
978-1-4673-3143-2/12/$31.00 ©2012 IEEE
452
identification data. Then, the reader sends an
acknowledgment signal to the corresponding tag as a delivery
confirmation. The tags turn to sleep mode after received an
acknowledgement signal. If the tag senses the tamper event, it
automatically wakes up and transmits an alert signal to the
reader.
Fig. 2. RFID reader functional block diagram
The main components assembled in the tag are not much
different than the one built in the reader except the motion
sensor and power supply circuit. The tag is integrated with
passive motion sensor to minimize the power consumption
during continuous active mode. The basic functional block
diagram of RFID tag is shown in Fig.3.
Fig. 3. RFID tag functional block diagram
.
III. MOTION SENSOR SIGNAL PROCESSING
The motion sensor is integrated to the tag. To enable the
tag instantly detects the tamper event, the motion sensor is
connected to an interrupt pin of the microcontroller. Any
changes to the signal pattern will immediately trigger
microcontroller to analyze the input signal. The motion sensor
built in with a number of balls that act as a switch as shown in
Fig. 4. When at rest, the balls make contact with the
conducting body terminal which allows electric current to
flow through. While in motion, the balls move around and
intermittently make contact with the body terminal. This
triggers the switch to be in high or low state. The continuous
changes of the switch state produce the waveform as shown in
Fig. 5. The status of asset motion state is determined by
calculating the number of high state for a certain period of
time. Since switch state changes very fast while moving, the
suitable sampling rate need to be evaluated to ensure the
controller unit can capture these changes. The method used to
determine the suitable sampling period is explained in the next
paragraph.
(a) (b)
Fig. 4. Motion sensor behavior when (a) at rest and (b) in motion.
Sampling period is required to process the continuous data
of motion sensor at a discrete time. To determine the sampling
period, output signal of motion sensor was analyzed using the
oscilloscope. The waveform is captured during the sensor in
continuous movement. Analysis was conducted on a few
samples of the waveforms to measure the switch closure
period. The Nyquist-Shannon sampling theorem states that the
perfect reconstruction of signal is possible when the sampling
frequency is greater than twice the maximum frequency of the
signal being sampled [3]. The most important parameter for
sampling period measurement is the minimum switch closure
period, σmin. The lower range of sampling period is
estimated as σmin/2 [4]. Research from [4] found that the
switch closure must be sampled at least three times within the
maximum switch closure, σmax /3. Therefore, the range of
sampling period can be denoted as follows.
σmin/2 sampling period σmax /3 (1)
σmin/2 is lower range of sampling period while σmax /3 is upper
range of sampling period. The minimum and maximum
interval of switch closure captured using oscilloscope is
shown in Fig. 5.
2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia
453
Fig. 5. Minimum and maximum interval of switch closure
From the output signal measured, it is found that the lower
range of sampling period is 25 µs while upper range is 250 µs.
Test was conducted to determine the best sampling period
should be used in the motion sensor algorithm to determine
the motion status of the tag within that range. The sensor was
moved horizontally and vertically to calculate the number of
detected movement data. Both direction was tested to ensure
the motion can be detect when the asset move slowly at any
directions. As shown on Table I, the sampling period of 25 µs
has better sensitivity to detect motion event.
Tab le I. Average detection data captured in horizontal and vertical direction
Sampling
Period
(µs)
Stationary Sensor
move
horizontally
Sensor
move
vertically
Average
#
motion
detected
slow fast slow fast
25 0 63 184 436 323 252
50 0 45 67 131 324 142
100 0 38 128 74 270 128
150 0 11 131 97 219 115
200 0 19 66 26 127 60
250 0 3 52 46 87 47
IV. IMPLEMENTATION AUTO SWITCHING MODE
Besides capable to process motion signal effectively, the
tag must also be able to send data efficiently to the reader. The
RTF mode is implemented during tags collection process
which executed at the beginning of the system activation.
Then the TTF mode is activated for tag to send subsequent
data to reader. The method of switching from one mode to
another can be many ways. For example, active RFID tag
listens to RFID reader broadcast command before switching
from RTF to TTF mode [5]. Meanwhile, in [6] design, the
RFID tag is switchable between TTF to RTF mode within a
switching time frame based on RFID tag’s transceiver
configuration. In this project, the mode switching method is
controlled two interrupt sources; real-time clock alarm and
motion sensor of RFID tag. During initial cycle, the system is
programmed to communicate in RTF mode to identify all tags
within reader read range. After tag identifies itself to the
reader, it will automatically turn to sleep mode. If the interrupt
source either from the real-time clock or motion event
triggered the tag to wake up, the tag will automatically switch
from RTF to TTF mode to send data to the reader. The
implementation of auto switching mode from RTF to TTF is
described in Fig. 6.
Fig. 6. Implementation scheme of RTF and TTF modes
V. FIELD TEST RESULTS AND DISCUSSION
A. Testing for motion detection efficiency
The motion detection efficiency was tested by moving the
laptop with the tag attach on it. The tag is properly sealed to
the laptop to ensure it will detect the laptop’s movements
rather than itself. The proper setup is crucial for anti-theft
device to function effectively. The arrangement for the test is
shown in Fig. 7. The laptop was moved up and down for 50
times. Once the tag senses the movement, the alert signal will
be transmitted to the reader. The information is displayed on
the Hyper Terminal as shown in Fig. 8. Upon successful
transmission, the tag transmits information which contains the
reader identification, tag identification, asset identification,
motion status and RSSI readout (dBm). The reader processes
the received data, add timestamp to the data and send them to
2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia
454
the host computer. The RSSI is negative integer expressing in
–dBm and is a measurement of signal strength. This value is
used to estimate the distance between the tag and the reader.
The number of detected motion is recorded based on the result
displayed on Hyper Terminal screen.
The efficiency of tag to detect motion is calculated by
dividing total number of received data with total number of
occurrences times a hundred. The result obtained shows that
the tag can detect all the movement created. It is learned that
the tag must properly attach to the asset in order to avoid false
alarm so that the motion status sent is belong to the asset and
not the tag.
The result shows that the proposed RFID-based anti-theft
system is reliable to detect motion of tagged objects
efficiently. It can be seen from the timestamp information
shown in Fig. 8 that the RFID tag is reliable to be used in
anti-theft application as the user or monitoring station could
receive motion alert signal at less than 1 second from the
moment the asset set in motion.
Fig. 7. The experimental arrangement for tag accuracy test in detecting
motion of tagged object
Fig. 8. Information received from tag
2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia
455
B. Testing for RF Communication Performance in
Multi-Floored Build
It is often desirable to use anti-theft RFID system in the
confined areas such as within multi-floored buildings to
ensure the asset can be monitored in all types of environment.
The objective of this experiment is to verify the read range
coverage of the proposed RFID reader in multi-floored
building that can detect the movement of tagged-asset. The
experiment is conducted in four levels building.
The test bed arrangement is shown in Fig. 9. The reader
antenna is positioned at vertical polarization. In order to find
the maximum read range, the reader has to be placed at the
highest floor, L1. The measurement setup is repeated at the
reader position L2, L3 and L4. The reader was tested with
Whip and Vivaldi antenna.
Fig. 9. The experimental arrangement for multi-floored read range
measurement
The angle is calculated using tangent function which equal
to the opposite length, h divide the adjacent length, δ. From
the experiment, it is found that the reader has longer read
range when the tag is in the same level. As the tag moves to
higher level or lower level, the received signal deteriorates.
The reader with Whip antenna cannot receive the tag’s data
when the tag is directly above it. The measured distance
versus angle is plotted as shown in Fig. 10 and Fig. 11. Zero
degree angle represents the tag location is directly above the
reader. 90° and 270° angle represent the tag is in the same
level as the reader. By using Whip antenna to the reader, the
tag can be detected in omni-directional but has smaller read
range as compare to Vivaldi antenna. Vivaldi antenna has
better read range but only focus at one direction.
This experiment is useful to optimize the placement of the
readers and the number of readers required in the building.
The reader that has long read range could minimize the
required number of the readers hence the maintenance cost
can be reduced.
Fig. 10. Measured radiation pattern of Whip antenna as a function of read
range (meter) in multi-floored building
Fig. 11. Measured radiation pattern of Vivaldi antenna as a function of read
range (meter) in multi-floored building
VI. CONCLUSIONS
The proposed RFID-based anti-theft system is capable to
detect movement of the asset that attached to the RFID tag.
The design of the motion-sensitive RFID tag with interrupt
function is capable to send the motion alert signal to the reader
in real-time. This feature is reliable to be used in anti-theft
system for efficient high-value asset monitoring.
ACKNOWLEDGMENT
The authors would like to thank University Technology
MARA (UiTM), Excellence Fund for sponsoring this work.
REFERENCES
[1] B. Khoo,, Y. Cheng, “Using RFID for Anti-Theft in a Chinese
Electrical Supply Company: A Cost-Benefit Analysis,”
Wireless Telecommunications symposium (WTS), pp. 1-6,
2011.
[2] G. Jayendra, S. Kumarawadu and L. Meegahapola,
“RFID-Based Anti-Theft Auto Security System with an
Immobilizer,” Confererence on Industrial and Information
System, pp. 441-446, 2007.
2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia
456
[3] C. E. Shahnon, (1998) Communication in the Presence of Noise.
Proceedings of the IEEE. 86(2), 447-457.
[4] M. Moy, D. B. Stewart, “An Engineering Approach to
Determining Sampling Rates for Switches and Sensors in Real
Time Systems,” Symposium on Real-Time Technology and
Applications, pp. 34–35, 2000.
[5] H. L. Van Eeden, (2009) Wireless Communication System. US
Patent 0045923.
[6] H. Haar, K. Bischof, & H. Scharke, (2006) RFID transponder.
WO Patent 109212.
2012 IEEE International Conference on Control System, Computing and Engineering, 23 - 25 Nov. 2012, Penang, Malaysia
457
... A gallery anti-stealing device was created using the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID [19]. Additionally, researchers have developed anti-theft systems that exclusively use RFID [20]. Researchers addressed the applications, advantages, and limitations of RFID technology for maintaining security in Turkish museums [21]. ...
Article
Full-text available
Currently, museums lack preventive security measures, leading to the theft of precious artifacts. Safeguarding artifacts and any sacred items in museums is a challenging job, as they need to be secured while at the same time being accessible to all visitors. This calls for an integrated security system to prevent theft and decrease crimes involving artifacts. This paper proposes a novel IoT-enabled, computer vision-based, holistic approach for protecting artifacts in museums. A camera functions as the imaging device that is employed to detect the movement of any artifact from a predetermined position, while the Raspberry Pi 4B manages the processing and operations of the system. This system further utilizes an image processing technique, i.e., the Haar Cascade algorithm and OpenCV, to detect artifact movement. In addition, the device will also record the photos of any authorized or unauthorized individuals anytime it detects any movement of the artifact. The system has produced a high accuracy of 93.33% and high precision of 96.29%, indicating a higher level of reliability with very few false alarms. This method will serve as an efficient mechanism for protecting artifacts at a reduced cost. The proposed system can be implemented at any kind of museum or cultural site.
... In addition to the standard library administration operations, this system employs machine learning ideas to assist in the categorization of books, as well as other analytics related to prediction and classification. The design and implementation of a general anti-theft system by [23] employed the use of RFID technology for storing and retrieving data remotely and providing identity codes to the monitored object. The system also comprised of a motion sensor which was integrated with the tag to detect tampering instantly, a PIC Microcontroller for processing and interpreting signals, memory to serve as external storage and a Chipcon Transceiver Module for transmission and reception of signals. ...
Article
Full-text available
The Kwame Nkrumah University of Science and Technology (KNUST) Library is one of the most important services on the school’s campus. It provides a serene atmosphere for studies as well as a multitude of resources for research and learning. Unfortunately, this opportunity is abused by some individuals who steal books, causing others who need them to be found wanting and incurs unnecessary costs on the school to replace those materials. In this project, we propose the use of an Electronic Article Surveillance (EAS) system to identify and keep track of books in the library. The proposed system would use Radio Fre�quency Identification (RFID) to raise an alarm when a book is being taken out of the library without having gone through the required procedures put in place for the borrowing of books. An alarm serves to notify the security guards and library staff stationed for quick alert and response to the book theft as well as to deter individuals from attempting to do so. If implemented correctly, a very high accuracy of detection can be achieved. The proposed system is limited in that it cannot prevent a student from borrowing a book without return, and some individuals may find a way to tamper with the tags to avoid being detected by the EAS system.
... In this the paper [1] proposes that decreasing high worth property misfortune because of robbery if the endeavor to discard the property is found all the while. This paper Read the plan of the counter robbery framework in light of RFID innovation. ...
Article
Full-text available
A rising number of novice rash drivers, indiscreet driving, and postponed admittance to emergency treatment to casualties has been a significant reason for passings. Instances of provocation, burglary in taxis are ascending with additional individuals utilizing current taxi administrations. Driver weariness checking, mishap anticipation measures, GPS-based area and closest clinic ready, savvy slowing mechanisms, brilliant airbags, and so forth are a portion of the highlights presently executed in a couple of the very good quality extravagance level vehicles. There hasn't been an expense proficient model produced for the low-end financial plan vehicles. It is vital to give open well-being measures in the vehicle to limit the endanger of death toll. This undertaking plans to foster an expense productive brilliant vehicle framework that can assist with helping not many of the causes. This research paper is written to take care for all such things and come up with a novel idea.
... The advantage of this device is that even if the thief carefully implements the theft, the system will alarm if the detected frequency is offset during the detection process. However, the shortcoming of this system is that it may receive interference from external physical information, such as thunder and rain, talking sounds, etc., and it is easy to be touched [7]. In recent years, cameras have been installed in major museums to detect collections in venues and to employ the image recognition technology for theft prevention. ...
Article
Full-text available
With the advancement of society, the museum has exhibited more and more cultural relics, the number of visitors has also increased rapidly, and more and more criminals have stolen cultural relics. The traditional anti-theft methods cannot completely block their pace. This paper proposes a museum anti-theft scheme based on the Internet of Things (IoT) technology, which identifies whether the cultural relics are within the safe range through the passive RFID readers/writers. Once stolen, the cultural relics will leave the effective RFID identification range, which results in immediately alarming, then the system starts the anti-theft plan. The method is free from the drawbacks of the traditional infrared anti-theft, door magnetic detection and the like, the proposed anti-theft method monitoring has the immediacy and the safety factor is higher. Finally, in this paper, hardware circuit designs, software development and a series of tests are carried out to achieve the desired results.
... When an effort is made to steal the object, a real-time notification of theft is sent to the store staff. This is particularly useful to secure safety of high value items (Khoo and Cheng, 2011;Hamid et al., 2012). ...
Article
Full-text available
RFID has brought transformation of business processes in the present time. It has overcome the limitations of barcode scanners and is also becoming cost effective. Due to this, there is an increase in adoption of RFID by the businesses across the globe. In this paper, the applications of RFID in various business situations have been studied. The transformation brought by the RFID in companies like Walmart, American Apparel, Spectrum Health’s Meijer Heart Center, Agricultural Bank of China have been examined. It has been found that RFID has made their processes more automated, streamlined, efficient, reliable, secure and adaptive. In order to conduct strategic analysis of RFID implementation, SWOT and TOWS analyses haves been conducted in Agricultural Bank of China. The strategic analysis shows that Bank has become more efficient, effective, streamlined and consistent after implementing RFID. However, the Bank needs to address RFID installation, connectivity and privacy issues. It should deploy data analytics and data mining based on data collected from RFID to retain its competitive edge.
... Although the narrowband conventional RFID technology has established its candidature to be reasonably adequate for numerous applications such as toll collection [1,2], anti-theft systems [3,4] and so on, its limitations become apparent when the horizon of its targeted usage is extended to applications like precise indoor positioning, issuing secure electronic IDs for passport-tag etc.. The limitations of narrowband RFID include easy signal detection and jamming, privacy issues, limited range of operation for passive tags, regulatory constraints in worldwide operation, multipath effects etc. [5,6]. ...
Conference Paper
Full-text available
In this paper, a high-voltage and high-e±ciency UWB-RFID transmitter MMIC is presented. It is targeted for precision localization and tracking of mobile objects in wireless sensor networks within a cluttered indoor environment. The proposed pulse generator MMIC has a peak output power of 24.15 dBm, with 1.2mW power consumption at 1MHz pulse repetition frequency and an e±ciency of 18.4%. The high output voltage is achieved by overcoming the breakdown phenomena of the transistor by using cascode transistor pair. The 2 ¹m GaAs HBT process is used for fabrication of the proposed MMIC. The power spectrum of the generated pulse fully utilizes the FCC peak power limit spectrum mask. The generated UWB pulse is centered at 4.25 GHz with apeak-to-peak amplitude of 10.2V fora 50-ohm load and has a full width at half maxima of 0.85 nsec.
Chapter
Identification, safety and impact of vehicle on the surroundings depend upon the vehicle documents like its license, PUC, RC book, insurance papers, etc. This work aims to build a system for dematerialization of vehicle documents using IoT infrastructure. This system will make that all the documents are available with us all the time and are stored securely. Also, the documents can be checked for renewals and notification can be sent to the concerned departments and the end user. Implementation of proposed work in vehicles does not need substantial modifications in the vehicles. An IoT device can be fitted with vehicles to acquire backward compatibility. Other notable feature of proposed method is that an IoT infrastructure is built introducing IoT devices in existing toll plazas and check posts which makes the work feasible, affordable and sustainable. Developed Web site architecture in this work helps to communicate the end user with all the concerned departments as well as helps the IoT devices to communicate with the IoT infrastructure using the databases and works on the principle of API endpoints.KeywordsIoTVehicle dematerializationASP.NET CoreAPI end points
Chapter
Microorganisms play a crucial role in earth’s ecosystem and contribute both positively and in negative aspect to a greater extent. Bacteria are responsible for various diseases in humans, but few bacteria species like tuberculosis, cholera, leprosy, etc. are extremely dangerous in nature. The species level classification of these microbes is very crucial in drug discovery for studying humans and plants micro biome. The manual classification of bacteria species based on phenotypic characteristics is very exhaustive and cumbersome task. The whole procedure depends on human expertise and expensive equipment. A deep learning-based bacterial image classification system can save both time and human efforts through automation of the entire process. Over the past few years, deep learning has contributed tremendously in the field of solving complex problem related to image classification. In this paper, a deep learning-based framework using convolutional neural network has been proposed to classify microscopic images of stained bacteria species. Three bacteria species: Bacillus Coagulans, Staphylococcus Aureus and Clostridium Perfringens have been undertaken for the study. The dataset consists of 900 microscopic bacterial images, which is further enhanced by applying data augmentation techniques like flipping, shearing, etc. The proposed classification model achieved training and testing accuracy of 96.75% and 81.35%, respectively.KeywordsDeep learningConvolutional neural networkBacteriaMicroscopic imagesClassification
Article
Full-text available
The theft of telecommunication tower supporting devices or commonly known as Base Transceiver Station (BTS), continues to increase every year, as reported by digital media viva.co.id from several operators who stated that they found significant losses from the theft. Reported by the daily Republika.co.id, in 2013, Telkomsel operators claimed to have lost up to Three billion rupiahs more due to the theft of BTS batteries in only a few districts and cities in South Sulawesi. Therefore it is necessary to evaluate the method of using technology to prevent damage. The vandalism prevention system can design by utilizing the Internet of Things (IoT) technology. The design uses a Raspberry Pi computing module, which is accompanied by a GSM transmission module to send a response signal to the motion captured by the camera. Photos are sent to the server, in this case, the Telegram Bot
Patent
Full-text available
A method of commissioning wireless network devices in a communication network includes assigning a user-defined number to a wireless network device. The method further includes generating, by the wireless network device, an identification number based on the user-defined number using a first hashing algorithm, generating, by the wireless network device, an encryption key based on the user-defined number using a second hashing algorithm, and transmitting, by the wireless network device, a message that is encrypted using the encryption key for joining the wireless network device to the communication network. The user-defined number is to be provided by a user using an input device that is coupled to, or integral to, the wireless network device.
Article
Full-text available
Utility companies lose large amounts of money every year because of fraud by electricity customers. This paper proposes a system that implements RFID technology to help the electricity supply company deal with its ammeter inventory management and prevent electricity theft. Cost-benefit theory is used to analyse different value changes caused by the system then derive a cost-benefit model. A case study about one electricity board of an electricity supply company and its administrative area is used to calculate the costs and benefits. The value of the ROI shows positive returns from the investment of installing the RFID system.
Conference Paper
Full-text available
Usually wireless communication is preferred to wired communication within caves considering the known difficulties of laying wires and related equipment in such rugged environments. Nevertheless both the inner structures of the caves and RF challenging conditions within the caves make the use of wireless solutions, like walkie-talkies or CB radios, deficient. In this paper, we propose a Wireless Multimedia Sensor Network (WMSN) based communication architecture which can guarantee a desired level of uninterrupted connectivity and communication quality. Our proposed system, which is called In-Cave Wireless Communication System (ICWCS), consists of backbone nodes and mobile nodes which design is based on our previous general purpose wireless sensor node VF1A. Backbone nodes are basically responsible for the connectivity within the ICWCS network, whereas mobile nodes have similar functionality like cellular phones. ICWCS provides reliable and efficient communication within caves.
Article
A method is developed for representing any communication system geometrically. Messages and the corresponding signals are points in two `function spaces,' and the modulation process is a mapping of one space into the other. Using this representation, a number of results in communication theory are deduced concerning expansion and compression of bandwidth and the threshold effect. Formulas are found for the maximum rate of transmission of binary digits over a system when the signal is perturbed by various types of noise. Some of the properties of `ideal' systems which transmit at this maximum rate are discussed. The equivalent number of binary digits per second for certain information sources is calculated.
Conference Paper
This paper presents a novel radio frequency identification (RFID) based vehicle immobilizer system, which features low hacking probability while preserving the safety of the passengers of the hijacked vehicle. The immobilizer uses the active RFID technology where the tag is generated with comparatively large character sets. The receiving unit is intelligently integrated into three control circuits in the vehicle, namely, ignition circuit, power control unit, and automatic gear changing system, enabling it to bring the vehicle speed down to zero in a safe step by step manner. The anti-theft auto security system proposed here was tested under different weather conditions and possible signal distortion situations to verify its reliability.
Conference Paper
An objective of our work is to find more systematic methods of designing and implementing real-time device drivers for embedded systems. As part of this objective, we answer the question “what is the best sampling rate to use for reading data from sensors that provide continuous data?” Our experiences in answering this question for digital switch and analog sensor inputs is described. We first present a model of a real-time device driver that enables the driver to execute as its own thread of control, independent of whatever control task is using the data. We then present an engineering approach towards determining a good sample rate for reading digital switches and analog sensors that provide continuous data. Rather than providing a single value for the sample rate, ranges that are based on application parameters are derived analytically. An application designer can use these equations to quickly determine the minimum and maximum sampling rates for their device driver task
Article
A method is developed for representing any communication system geometrically. Messages and the corresponding signals are points in two "function spaces," and the modulation process is a mapping of one space into the other. Using this representation, a number of results in communication theory are deduced concerning expansion and compression of bandwidth and the threshold effect. Formulas are found for the maxmum rate of transmission of binary digits over a system when the signal is perturbed by various types of noise. Some of the properties of "ideal" systems which transmit at this maxmum rate are discussed. The equivalent number of binary digits per second for certain information sources is calculated.
RFID transponder. WO Patent 109212
  • H Haar
  • K Bischof
  • H Scharke
H. Haar, K. Bischof, & H. Scharke, (2006) RFID transponder. WO Patent 109212. 2012 IEEE International Conference on Control System, Computing and Engineering, 23 -25 Nov. 2012, Penang, Malaysia