Beruflich Dokumente
Kultur Dokumente
Polyethylene Terephthalate (PET). The chip and antenna combo, called an inlay, is then converted or
sandwiched between a printed label and its adhesive backing or inserted into a more durable structure.
The tag's chip or integrated circuit (IC) delivers performance, memory and extended features to
the tag. The chip is pre-programmed with a tag identifier (TID), a unique serial number assigned by the
chip manufacturer, and includes a memory bank to store the items' unique tracking identifier (called an
electronic product code or EPC). Tag antennas collect energy and channel it to the chip to turn it on.
Generally, the larger the tag antenna's area, the more energy it will be able to collect and channel toward
the tag chip, and the further read range the tag will have. [6]
RFID technology has the capability to both greatly enhance and protect the lives of consumers,
and also revolutionize the way companies do business. As the most flexible auto-identification
technology, RFID can be used to track and monitor the physical world automatically and with accuracy.
RFID use is increasing rapidly with the capability to tag any item with an inexpensive communications
chip and then read that tag with a reader. Endless applications range from supply chain management to
asset tracking to authentication of frequently counterfeited pharmaceuticals. Applications are limited, in
fact, only by the imagination of the user. [7]
Frequency
120 - 140 KHz
13.56 MHz
868 - 928 MHz
2.45 & 5.8 GHz
3.1 10.6 GHz
applications, in contrast to the microprocessors used in personal computers or other general purpose
applications consisting of various discrete chips. A microcontroller is usually used for sensing input from
the real world and controlling devices based on that input. Most electronic devices you use today have a
microcontroller in them of some form or another. Microcontrollers are easy to use with simple sensors
and output devices, and they can communicate with desktop computers fairly simply as well. Theyre also
very useful for when youre designing a simple interactive device that doesnt need the full power of a
desktop computer, but does need to be smaller or cheaper.
There are several different levels of microcontrollers and microcontroller systems. Some are very
small, chip-size devices to which you have to connect your own electronics. Others are larger, composed
of several components and ports for input output, ready to plug right into other devices. Higher level
microcontrollers will have a simple hardware interface to other devices, usually a plug or a couple of
wires, and a simpler programming language, if at all. A lower level microcontrollers will require more
work, both in terms of hardware connections and in terms of programming. However, lower level
processors are generally cheapest and most flexible in terms of what you can make them do. [8]
The first microprocessor was the 4-bit Intel 4004 released in 1971, with the Intel 8008 and other
more capable microprocessors becoming available over the next several years. However, both processors
required external chips to implement a working system, raising total system cost, and making it
impossible to economically computerize appliances. The Smithsonian Institution credits TI engineers
Gary Boone and Michael Cochran with the successful creation of the first microcontroller in 1971.It
combined read-only memory, read/write memory, processor and clock on one chip and was targeted at
embedded systems. [9] In 1993, the introduction of EEPROM memory allowed microcontrollers to be
electrically erased quickly without an expensive package as required for EPROM, allowing both rapid
prototyping. The same year, Atmel introduced the first microcontroller using Flash memory, a special type
of EEPROM. Nowadays microcontrollers are cheap and readily available for hobbyists, with large online
communities around certain processors. [10]
2.1.2.6 Arduino
Arduino is an open-source electronics platform based on easy-to-use hardware and
software. Arduino boards are able to read inputs - light on a sensor or a finger on a button - and turn it
into an output - activating a motor, turning on an LED, publishing something online. It can tell your board
what to do by sending a set of instructions to the microcontroller on the board. To do so it uses
the Arduino programming language, and the Arduino Software (IDE), based on Processing.
Over the years, Arduino has been the brain of thousands of projects, from everyday objects to
complex scientific instruments. A worldwide community of makers - students, hobbyists, artists,
programmers, and professionals - has gathered around this open-source platform, their contributions have
added up to an incredible amount of accessible knowledge that can be of great help to novices and experts
alike.
Arduino was born at the Ivrea Interaction Design Institute as an easy tool for fast prototyping,
aimed at students without a background in electronics and programming. As soon as it reached a wider
community, the Arduino board started changing to adapt to new needs and challenges, differentiating its
offer from simple 8-bit boards to products for IoT applications, wearable, 3D printing, and embedded
environments. All Arduino boards are completely open-source, empowering users to build them
independently and eventually adapt them to their particular needs. The software, too, is open-source, and
it is growing through the contributions of users worldwide. [11]
The basic idea of integration of RFID with wireless sensing network is to connect the RFID
reader to an RF transceiver, which has routing function and can forward information to and from other
readers. Users are able to read tags from distance 100-200m that is well beyond normal range of readers.
Integration of RFID and wireless sensing network can provide RFID to work in multi-hop to extend
application of RFID to operate in a wider area. The integrated wireless sensing network node consists of
an RFID reader, an RF transceiver, and micro-controller that coordinate different components in the node.
The micro-controller is also used to control the RFID reader and other components which go to sleep
mode when they are idle. Integrated tags with wireless sensing network can communicate with other tags
and form a multiple loop network. Each integrated node transmits not only its unique ID number but also
details of its sensed data to all other nodes. The integrated tag listens to the RFID reader radio of
neighboring nodes. If some channel activity is detected, the tag awakes the sensor to listen to the channel
and then receive data through the RF sensor radio, otherwise nodes can stay in sleeping status. To wake
up the node, a wakeup signal is sent. RFID radio uses much less energy than the RF sensor radio. RFID
tags features can be added or integrated with sensor nodes.
Combining RFID reader enabled cell phones and RFID sensor tags in a cellular network or the
Internet, the consumers will be able to read any RFID sensor tag in almost any application. Information of
RFID tag can be downloaded to cell phone from a remote database for some applications. When you stroll
around a super market with RFID reader enabled mobile phone, you can receive information about any
product and buy only what you need. RFID Technology enables mobile phone handsets to make payment
once credit card information is embedded into cell phone. [12]
2.1.2.8 Wi-Fi
Wi-Fi is a low power wireless communication that is used by various electronic devices like
smart phones, laptops, etc. In this setup, a router works as a communication hub wirelessly. These
networks allow users to connect only within close proximity to a router. Wi-Fi is a technology that allows
electronic devices to connect to a wireless land area network (WLAN), mainly using the 2.4 gigahertz
(12 cm) UHF and 5 gigahertz (6 cm) SHF ISM radio bands. Wi-Fi works with no physical wired
connection between sender and receiver by using radio frequency (RF) technology -- a frequency within
the electromagnetic spectrum associated with radio wave propagation. When an RF current is supplied to
an antenna, an electromagnetic field is created that then is able to propagate through space.
Wi-Fi is a trademark of the Wi-Fi Alliance. The "Wi-Fi Certified" trademark can only be used by
Wi-Fi products that successfully complete Wi-Fi Alliance interoperability certification testing. Devices
which can use Wi-Fi technology include personal computers, video-game consoles, smart phones, digital
cameras, tablet computers, digital audio players and modern printers. Wi-Fi compatible devices can
connect to the Internet via a WLAN network and a wireless access point. Such an access point
(or hotspot) has a range of about 20 meters (66 feet) indoors and a greater range outdoors. Wi-Fi is less
secure than wired connections, such as Ethernet, precisely because an intruder does not need a physical
connection. Web pages that use TLS are secure, but unencrypted Internet access can easily be detected by
intruders. Because of this, Wi-Fi has adopted various encryption technologies. [13]
For home and business computer users who have high-speed Internet connections, a wireless
router can also act as a hardware firewall. This is true even if the home or business has only one
computer. Many engineers believe that the use of a router provides superior protection against hacking
because individual computer IP addresses are not directly exposed to the Internet. A wireless router also
does not consume computer resources as a firewall program does.
Wireless router technology has improved in recent years, providing more bandwidth and allowing
for the connection of more computers to a WLAN. The newer wireless routers use the 802.11g
specification, a standard that offers transmission over short distances at up to 54 megabits per seconds
(Mbps), compared with the 11 Mbps theoretical maximum with the earlier 802.11b standard. [14]
2.3.2.10 LCD
LCD (liquid crystal display) is the technology used for displays in notebook and other smaller
computers. Like light-emitting diode (LED) and gas-plasma technologies, LCDs allow displays to be
much thinner than cathode ray tube (CRT) technology. LCDs consume much less power than LED and
gas-display displays because they work on the principle of blocking light rather than emitting it. A liquidcrystal display is a flat-panel display or other electronic visual display that uses the light-modulating
properties of liquid crystals. Liquid crystals do not emit light directly. LCDs are available to display
arbitrary image or fixed images with low information content, which can be displayed or hidden, such as
preset words, digits, and 7-segmentdisplays, as in a digital clock.
LCDs are used in a wide range of applications including computer monitors, televisions,
instrument, panels, aircraft cockpit displays, and indoor and outdoor signage. Small LCD screens are
common in portable consumer devices such as digital cameras, watches, calculators, and mobile
telephones, including smart phones. [15] An LCD is made with either a passive matrix or an active matrix
display grid. The active matrix LCD is also known as a thin film transistor (TFT) display. The passive
matrix LCD has a grid of conductors with pixels located at each intersection in the grid. A current is sent
across two conductors on the grid to control the light for any pixel. An active matrix has
a transistor located at each pixel intersection, requiring less current to control the luminance of a pixel.
[16]
that
are
compatible
with
2 RFID readers and can provide read ranges in excess of 1.5 meters (5 feet). Currently, my firm offers
four
types
of sensor tagstemperature,
pressure,
orientation and
switchesin
variety
of antenna designs and sizes, to adapt performance to a particular application. They can also be
encapsulated in an IP67 or IP68 casing for usage within harsh environments.
The main advantage of such sensors is that they operate without batteries, thereby allowing for a wide
range of opportunities using different sensor types in applications for which accessibility is restricted, or
in which the use of batteries is not recommended. Typical examples of applications per sensor type
include:
2.1.2.16 iGlove
The researchers created the iGlove in 2003 as part of our first effort to track object use with
RFID. While the early prototype was too crude for true long-term deployment, it was usable and durable
enough that we were able to enlist 14 volunteers to wear it while conducting a range of daily household
tasks, averaging approximately 45 minutes per user. By tracking the objects they grasped, we were
generally able to figure out which activities they performed and when. For next test of the concept, they
set number of users to wear it while performing a true workplace task. Collaborating with the University
of Washington Medical School, they enlisted seven faculty volunteers to use their simulation lab to
perform test procedures while wearing iGloves. All reported the form factor to be acceptable, and they
were able to collect a good set of sensor data. [22]
2.1.2.17 iBracelet
iBracelet are aesthetically and ergonomically much preferred to gloves. They needed to extend
the read range from the 12 cm of a palm antenna to the 1015 cm of a bracelet while staying lightweight,
low power, and within regulatory limits on exposure to electromagnetic fields. We have been able to
achieve these goals by using a tuned circular loop antenna worn coaxially around the arm.. The iBracelet
is evolving into something truly wearable by a larger population. The iBracelet retains the desirable
features of the iGlove while moving to a less-obtrusive, more broadly acceptable form factor.[22]
On 31st of July 1997, the United States Patent and Trademark Office granted to a patent for
Personal tracking and recovery system. the apparatus was made for tracking and recovering humans
utilizes an implantable transceiver incorporating a power supply and actuation system allowing the unit to
remain implanted and functional for years without maintenance. The patented device can be used as a
safeguard against kidnapping and to facilitate prompt medical dispatch in the event of heart attack or
similar medical emergency. The patent was an indicator for the approaching application of humanimplanted RFID chips.
The transponder implanted into the hands. For example, by using the transponder, it was able to
open doors that previously required smart card access. It was also able to turn on lights simply by entering
into the room. In the patent, it was stated that in future experiments, the implants needs to be placed
nearer to the brain into the spinal cord or onto the optic nerve, where there is a more powerful setup for
transmitting and receiving specific complex sensory signals. [23]
Glove.
our
first
We
effort
created
to
track
the
object
iGlove
use
in
2003
as
RFID.
part
of
ue
early
prototype
was
too
crude
for
tr
deployment,
we
were
able
it
to
was
enlist
usable
14
volunteers
and
durable
to
wear
enough
it
while
that
conducting
ing
approximately
a
range
of
minutes
daily
household
per
user.
tasks,
By
tracking
averagthe
ure
objects
out
which
they
activities
grasped,
they
we
performed
were
generally
and
when
able
to
[7].
figusers
For
our
to
next
wear
test
it
while
of
the
performing
concept,
we
a
true
wanted
workplace
a
set
of
task.
ton
with
enlisted
the
University
seven
faculty
of
Washingvolunteers
procedures
wearing
simulation
iGloves
lab
to
(see
perform
Figure
test
1,
left).
All
epor
ted
be
acceptable,
and
wcrude
RFID.
usable
While
and
durable
the
early
enough
prototype
that
was
we
were
too
able
to
for
enlist
true
long-term
14
volunteers
deployment,
to
wear
itit task.
was
while
minutes
conducting
per
user.
a45
By
range
tracking
of
daily
the
household
objects
they
tasks,
grasped,
averaging
we
were
approximately
generally
able
45
to
figure
concept,
out
we
which
wanted
activities
a
set
of
they
users
performed
and
it
while
when
performing
[7].
For
our
a to
true
next
workplace
test
of
the
Collaborating
faculty
volunteers
with
to
use
University
their
simulation
of
Washington
lab
to
perform
Medical
School,
test
procedures
we
enlisted
while
seven
wearing
and
we
iGloves
(see
Figure
1,
left).
All
reported
the
form
factor
be
acceptable,
track
object
iGlove
use
in
2003
with
as
RFID.
part
While
of
too
crude
for
tr
enlist
usable
14
volunteers
and
durable
to
wear
enough
it
while
that
minutes
daily
household
per
user.
tasks,
By
tracking
averagactivities
grasped,
they
we
performed
were
generally
and
when
able
to
[7].
figperforming
concept,
we
awith
true
wanted
workplace
aWhile
set
of
Medical
Collaborating
with
we
enlisted
the
University
seven
faculty
of
Washingvolunto
use
while
their
wearing
simulation
iGloves
lab
to
(see
perform
Figure
test
1,
left).
rlong-term
the
form
factor
to
be
acceptable,
and
w
G
our
love.
first
We
effort
created
to
track
the
object
iGlove
use
in
2003
with
as
RFID.
part
While
of
ue
long-term
early
prototype
was
too
crude
for
tr
deployment,
we
were
able
it
to
was
enlist
usable
14
volunteers
and
durable
to
wear
enough
it
while
that
conducting
ing
approximately
aSchool,
range
45
of
minutes
daily
household
per
user.
tasks,
By
tracking
averagthe
ure
objects
out
which
they
activities
grasped,
they
we
performed
were
generally
and
when
able
to
[7].
figFor
users
our
to
next
wear
test
it
while
of
the
performing
concept,
we
a
true
wanted
workplace
a
set
of
task.
ton
with
enlisted
the
University
seven
faculty
of
Washingvolunteers
procedures
wearing
simulation
iGloves
lab
to
(see
perform
Figure
test
1,
left).
All
epor
ted
e
be
acceptable,
and
w
2.2 Related Studies
2.2.1 Foreign Studies
2.2.1.1 A Human Object Interaction Detection System Based on Passive UHF RFID
In order to enable unobtrusive human object interaction detection, we propose a minimalistic
approach to instrumenting everyday objects with passive (i.e. battery-free) UHF RFID tags. By measuring
the changes in the physical layer of the communication channel between the RFID tag and reader (such as
RSSI, RF phase, and read rate) we are able to classify, in real-time, tag/object motion events along with
two types of touch events.
They have demonstrated the versatility of their system; first an interactive storytelling scenario
was demonstrated where toys were tagged so that they could be augmented by digital media. Second, they
showed for the first time that low-cost, commercially available RFID tags could be used to infer daily
activities in a home setting without the need to wear a reader. Lastly, they showed that implementing the
system in a retail scenario can enable the identification of real-time shopping behaviors. Ultimately, the
system makes sensing human interaction with everyday objects easy and unobtrusive, by minimally
augmenting objects with low-cost and long-lived RFID tags. [24]
staff/student by just staying in a particular place and without wasting human power & time. RFID tags
may soon become the most pervasive microchip in history.
This study has identified and explained the nature of RFID technology evolution with respect to
RFID applications. RFID applications could reduce the number of errors by tagging an individual and by
tracking the location in a timely manner. RFID based timely information about the location of a person
would increase the efficiency and effectiveness of the tracking system. RFID technology will open new
doors to organizations & companies to make them more secure, reliable, and accurate. The system
enables the integration and optimization of resources while improving accuracy and minimizing time
leading to improvements in tracking the location. [26]
2.2.1.5 Internet of Things (IOT) based Attendance and Intrusion Detection System
The researchers developed an attendance maintenance system for schools, colleges and well as
organizations which also has the provision to detect any form of intrusion in restricted areas and report it
immediately. The research is understood using a RFID reader to confirm the identity of the person in
room. The proposed research concluded that RFID scans for identification of the person within the given
time frame, identity of the person is identified using the tag in his card, his attendance is registered.
However, if the tag of the card is not identified by the RFID from its registered database, a picture of the
room is sent with an unauthorized access alarm. Also, if no tag is read by the RFID in the given time
frame, a picture of the room is sent with an intrusion alarm. [9]
facilitate convenience to the students by just wearing or hanging the identification card with RF tag every
time the student enters and exits the school premises. [29]
2.2.2.2 Polytechnic University of the Philippines Student Monitoring using RFID with SMS
Advisory
The purpose of the system is to monitor the arrival and departure of Polytechnic University of the
Philippines students. The students will use their RFID card to enter in the school premises. The RFID
reader will detect if the RFID card is registered on the database of the school. The function of SMS
advisory is it will give the parents the information regarding the time of the arrival and departure of their
children in the PUP campus even though they are at home. [30]
2.2.2.3 Christ the King College of Science and Technology - Student Monitoring System with RFID
Technology
This paper describes the development of a student logging monitoring system based on RFID
technology. The existing traditional student monitoring system requires students to be manually
monitored by the guards at the gate every time they attend a class and checked by their teachers using
their class records. As common as it seems, such system lacks of automation, where a number of
problems may arise, this include the time unnecessarily consumed by the students as they are being
monitored by the guards and checked their identification cards, and the attendance sheet mat got lost.
The paper concluded the functionality and the usability of the system. It also shows the
improvements that they applied to their system. Its recommendation is to put online attendance viewing
so it will be easy for them to go to the website and to download the daily attendance report. [31]
Moreover, the system allows alerts as a last recourse for people often called up to report to a
particular office. After a series of written communication and still the person refuses to be summoned,
upon tapping at the EzLogger of the entry area, a flasher will be displayed on an overhead monitor. The
security guard on-duty now takes cue to escort him/her to that specific office that demands his/her
presence. [33]
INPUT
Conceptualization
of
the
structure
Research, gathering data, and
related studies and theories
Finalizing the device
Checking availability and
buying the needed components
PROCESS
OUTPUT
Professors
Presence
Detection System via RFID
and Sensor Technology
The figure shows a flow chart of minimized step by step conceptualized project activities. It
contains input which provides the conceptual ideas and information needed to start the actual project.
Process that contains gradual method on conducting the implementation of the project and the output
which is the completed system to be implemented.
Electromagnetism a type of physical interaction that occurs between electrically charged particles.
EEPROM stands for Electrically Erasable Programmable Read-Only Memory and is a type of nonvolatile memory used in computers and other electronic devices to store relatively small amounts of data
but allowing individual bytes to be erased and reprogrammed.
EPROM stands for erasable programmable read-only memory, is a type of memory chip that retains its
data when its power supply is switched off.
GPS stands for Global Positioning System, is a global navigation satellite system (GNSS) that provides
location and time information in all weather conditions, anywhere on or near the Earth where there is an
unobstructed line of sight to four or more GPS satellites
Ethernet is a family of computer networking technologies commonly used in local area
networks (LANs) and metropolitan area networks (MANs).
Notes in Chapter 2
[9] The Most Widely Used Computer on a Chip: The TMS 1000. State of the Art: A Photographic History
of the Integrated Circuit, Augarten, New York, 1983,
http://www.computerhistory.org/siliconengine/general-purpose-microcontroller-family-is-announced/
[10]Atmel's Self-Programming Flash Microcontrollers, Odd Jostein Svendsli, 2003,
http://www.atmel.com/images/doc1644.pdf
[11] Arduino, Arduino.cc, https://www.arduino.cc/en/Guide/Introduction#
[12] RFID and Wireless Sensor Networks, K.P.Vijaygopalan, 2012,
http://www.paredox.com/foswiki/pub/Luichart/RFIDandWirelessSensorNetworks/RFID_and_Wireless_Se
nsor_Networks.pdf
[13]Brute forcing Wi-Fi Protected Setup, https://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
[14] Wireless Router, Margaret Rouse, 2005,
http://searchmobilecomputing.techtarget.com/definition/wireless-router
[15]LCD Image Persistence, 2011, http://www.revolvy.com/main/index.php?s=LCD
%20Screen&item_type=topic
[16] LCD (liquid crystal display), Margaret Rouse , September 2015,
http://whatis.techtarget.com/definition/LCD-liquid-crystal-display
[17] Passive UHF Tags will Help Drive RFID Growth, Michael Choperena, 2011,
http://www.rfidjournal.com/articles/view?10784/2
[18]
[19] Human Movement Detection and Idengification Using Pyroelectric Infrared Sensors, Jaeseok Yun,
May 2014, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4063065/
[20] Human detection in surveillance videos and its applications - a review, Manoranjan Paul,
November 2013, http://asp.eurasipjournals.springeropen.com/articles/10.1186/1687-6180-2013-176
[21] OMRON Develops the World's First* 16x16 Element MEMS Non-Contact Thermal Sensor for Use
in Human Presence Sensors Utilizing Wafer-Level Vacuum Packaging Technology, Omron, May 2013,
http://www.omron.com/media/press/2013/05/e0529.html
[22] Rfid-Based Techniques For Human-Activity Detection, Joshua R. Smith, et. al., 2005,
https://www.researchgate.net/publication/220426408_RFID-based_techniques_for_humanactivity_detection
[23]Human Implanted RFID chips, Daniel Dimov, 2014, http://resources.infosecinstitute.com/humanimplanted-rfid-chips/
[24]IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID, Hanchuan Li,
et.al., 2007, https://s3-us-west-1.amazonaws.com/disneyresearch/wpcontent/uploads/20150406214909/IDSense-A-Human-Object-Interaction-Detection-System-Based-onPassive-UHF-RFID-Paper.pdf
[25] Human Activity Tracking using RFID Tags, S Srinivasa Rao, et. al., January 2009,
http://paper.ijcsns.org/07_book/200901/20090154.pdf
[26] Indoor Location Tracking System Using RFID Technology,P.Karthika, et.al., 2015,
file:///C:/Users/Fujitsu/Downloads/Indoor%20Location%20Tracking%20System%20Using%20RFID
%20Technology-1082.pdf
[27] Unobtrusive Long-Range Detection of Passive RFID Tag Motion, Bing Jiang, et. al., February 2006,
http://ieeexplore.ieee.org/document/1583880/
[28] Internet of Things (IOT) based Attendance and Intrusion Detection System, Karthikeyan B, et. al.,
March 2016, http://www.ijircce.com/upload/2016/march/55_Internet_NEW.pdf
[29] Student Monitoring System with the Use of Low Frequency Radio Frequency Identification (RFID)
and Short Messaging Service (SMS), Rhowell M. Dellosa, Lyceum of the Philippines, 2011,
http://ejournals.ph/article.php?id=6683
[30] Polytechnic University of the Philippines Student Monitoring using RFID with SMS Advisory,
Rommel Del Rosario, 2012, https://www.behance.net/gallery/4271023/PUP-Student-Monitoring-UsingRFID-with-SMS-Technology
[31] CKSM Student Attendance Monitoring System with RFID Technology, Christian B. Espiritu, et.al.,
March 2016, https://www.scribd.com/doc/314128975/Student-Monitong-using-RFID-Technology-withSMS-Notification-system-and-wireles-online-viewing
[32] Developing a User Monitoring System for the LPU-Laguna Library, Elinor Hemedes, Lyceum of the
Philippines, 2014, http://www.iosrjen.org/Papers/vol4_issue6%20(part-2)/A04620109.pdf
[33] Access Control, Maria Eleoner E. Valeros, 2013, http://www.philstar.com/cebulifestyle/2013/07/28/1023531/access-control