Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Literature Review On Rfid Technology

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

A literature review on RFID (Radio-Frequency Identification) technology can be an arduous task for

many individuals due to its complexity and the vast amount of research available on the subject.
Conducting a comprehensive review requires sifting through numerous academic papers, journals,
articles, and other sources to gather relevant information and insights into the topic.

The process of writing a literature review involves critically analyzing existing literature to identify
key themes, trends, gaps, and debates within the field of RFID technology. It requires a deep
understanding of the subject matter, as well as the ability to synthesize and evaluate information
from various sources.

One of the challenges of writing a literature review on RFID technology is the constantly evolving
nature of the field. New research findings, advancements in technology, and emerging applications
of RFID can quickly render existing literature outdated. Therefore, staying up-to-date with the latest
developments and incorporating them into the review is essential but can be time-consuming.

Moreover, ensuring the accuracy and reliability of the information gathered is crucial, as inaccuracies
or biases in the literature can undermine the credibility of the review. This requires careful scrutiny of
sources and cross-referencing information to verify its validity.

For individuals who find themselves overwhelmed by the daunting task of writing a literature
review on RFID technology, seeking assistance from professional writing services such as ⇒
StudyHub.vip ⇔ can be beneficial. These services offer expert guidance and support, helping clients
navigate the complexities of literature review writing and delivering high-quality, well-researched
papers that meet academic standards.

By entrusting their literature review to experienced professionals, individuals can save time and
effort while ensuring that their work is comprehensive, accurate, and effectively communicates their
understanding of RFID technology. ⇒ StudyHub.vip ⇔ provides a reliable and efficient solution for
those in need of assistance with their literature review, allowing them to focus on other aspects of
their research or academic endeavors.
Once the building is inhabited, there exists a variety of components that need maintenance tasks.
Tropical Medicine and Infectious Disease (TropicalMed). The system has been tested in different
furnished scenarios and is able to identify and precisely pose in the scene common pieces of
furniture, likes chairs, tables and wardrobes. If you happen to need a lot of these tags, that adds up to
a major business expense. Obviously, it can be used for theft prevention and asset tracking, as you
have probably guessed. But did you know that there’s another power technology that businesses and
laboratories are using to accomplish even more. Although the use of RFID technology and its
applications have been in existence for a long period, its use in the library is more recent. RFID
technology which is a matured technology that has been widely deployed by various organizations as
part of their automation systems. In this study, an RFID based system has been built in order to
produce a time-attendance management system. Multiple requests from the same IP address are
counted as one view. The label’s data carrier, known as an inlay, erases all information embedded
once torn from its adhered surface. This explains why radio waves have been used for so many
things. RFID tags embedded in uniforms can be used to know the number of hours an employee
spends to complete a par- ticular task. Table 1 shows the different operation bands and their field of
action. Latest technologies have brought costs down and standards are being developed. The benefits
of using RFID increases day by day and this have led to enormous research in order to develop
models and frameworks to acquire implement and strengthen the system. In these cases, the
automation of the fire rescue procedure can greatly reduce the delays and even save lives. The next
section will provide a brief overview of the implementation process of rfid solutions in UAE. Cranes
and excavators are dangerous vehicles that can cause accidents during the building process. With the
use of wireless technology, RFID tags do not need a direct line-of-sight to the RFID reader, which
brings some significant advantages compared to the barcode scanners widely used in the industry
today. RFID tags track objects in supply chains, and are working their way into the pockets,
belongings, and even the bodies of consumers. Journal of Otorhinolaryngology, Hearing and Balance
Medicine (JOHBM). If we have done a good job in this, please fill out the contact form below. The
reader is what receives and converts the radio waves into digital data on a computer database. The
challenge of cost is further compounded by additional costs that are linked to the application
software and other peripheral equipment. Near-field is the most common approach used for
implementing passive RFIDs, and used for near range communications. Cost constraints can force a
library with more collections to implement RFID in patches. Table 8 summarizes different solutions in
which several technologies are combined with RFID. 7.1. RFID and PDAs In a multitude of tasks,
several users are required to interact with the RFID system. In 1977 this new knowledge was made
for use by the civic sector, this was suggested by a group of conglomerates, and it is at this time and
by the companies that several applications of this technology were explored. EPC memory is used to
store a specific EPC number that is associated solely with that chip and typically contains 96-128
bits, while some have more. Anytime you need to keep track of something, an RFID system can be
helpful.
Despite efforts like the Reproducibility Project: Cancer Biology it remains an issue, so. Furthermore,
reading problems can occur if tags are surrounded by metal. The RFID tags are even used to control
out- breaks of animal diseases. Tagfront refers to a line of clothing in which specialized washable
rfid (radio-frequency identification) chips have been inserted. Radio frequency identification can be
used to track products through the product lifecycle, data collection to analyze logistics, and
production flow to enhance the manufacturing process. The most recent development in the history
of such devices is the competition faced by differentiation of different manufacturers. The system
has been tested in different furnished scenarios and is able to identify and precisely pose in the scene
common pieces of furniture, likes chairs, tables and wardrobes. An example of a changing
environment can be demonstrated in a grocery store. Journal of Cardiovascular Development and
Disease (JCDD). In a building under construction, we need to control some information related to
components or even people, which are sparse in the environment. A different approach is using Tag
passwords so that a tag could emit important information only if receives the right password. It is a
fact that RFID can detect objects at a long range while identifying them without getting into contact
with the same objects. This technology would prevent the spread of company data to unwanted
parties, which usually is a security issue to be considered with RFID technology. Sometimes, those
who are legally prescribed narcotic medications will be made to use a pill tracker. This type of bulk-
data scanning of numerous items simultaneously can save a tremendous amount of time that would
normally be spent scanning individual barcodes one-by-one. Section 7 tackles new lines of research,
in which several technologies are combined with RFID. For those of you who don’t like the metric
system, a meter is about the same distance as a yard. There is need for the development of RFID
technologies and infrastructure that are less costly in order to enhance their use in libraries.
Summary: GA International has developed a unique new breakthrough label technology, SnapPEEL,
that allows rectangle and dot labels to be peeled and applied with. Among these operations, a wide
variety of them are carried out before the building work starts. The management of the information
linked to these works greatly improves with the addition of RFID technologies to the facility
management field. Table 8 summarizes different solutions in which several technologies are
combined with RFID. 7.1. RFID and PDAs In a multitude of tasks, several users are required to
interact with the RFID system. For instance, people on house arrest will often have to wear an ankle
bracelet that contains an RFID chip. Most of the major powers involved in that war were using radar
to track aircraft, but they were often unable to tell the difference between friendly aircraft and the
enemy. The initial step of RFID was during World War II, when the British used it to identify
whether planes belonged to “friend or foe”. Cost, size, lifetime make them impractical for regular
use. You can download the paper by clicking the button above. A wave is a disturbance that travels
through space or a medium such as air or water. This technology has a very high understanding and
precision. Please let us know what you think of our products and services.
This is because in checking out the books, the individual does not need to pass them at an angled as
with the case with the bar code reader; here, they will only pass it through some range. The printed
sensors integration onto the RFID smart labels is another employment of RFID technology. For
example, an object with an embedded RFID tag that is moving through a production line or a
warehouse equipped with RFID readers, can be scanned at different production stations and thus its
progress can be automatically tracked. And terrorists could scan digital passports to target specific
nationalities. In the implementation and use of any technology in a field, standards plat crucial role
in promoting the use of such technology over a wide area. Works dealing with the initial stages of
the construction process. The tags can be attached to assets to send data to the antenna. Some
businesses could even track rental items like bicycles or medical supplies. The Time-Attendance
System (Graphic User Interface) GUI was developed using visual basic.Net. The Time-Attendance
Management System provides the functionalities of the overall system such as displaying live ID
tags transactions, registering ID, deleting ID, recording attendance and other minor functions. The
RFID reader, which is a low-frequency reader (125 kHz), is connected to the host computer via a
serial to USB converter cable. Unfortunately, most of us don’t have the luxury of deciding whether
or not this technology is worth using. While it is, a fact that this technology was first used in other
areas of the industry, such as logistics, the automation of baggage in airlines and in the circulation of
parcels. As such, it pays to know a little bit about RFID and how it works. RFID is used in many
applications and industries, including pharma, retail, agriculture and medical care, as well as tracking
vehicles, pets, and livestock. Several works in which radio frequency identification is used to locate
users and to navigate interiors are shown in Section 6. They have a far greater risk of collision
because the driver’s vision can be impaired due to carrying large loads, the vehicle can be large and
have many blind spots, or even have moving parts such as th. It is used among others in the
identification of fleet vehicles, differentiating objects from a far distance. You might have at least
three or four RFID tags in the clothes that you’re wearing right now. For instance, the accessibility
of the RFID system can be compromised by blocking the radio signal by either aluminium foil or by
sandwiching the tag with two items to cancel the signal from the radio (Singh and Midha, 2008).
Radio Frequency Identification (RFID) is an established technology dating back to its earliest
prototypes in 1973, when engineer Mario Cardullo first patented a device that could emit a coded
signal in response to remote radio frequencies. In order to make these works easier and to improve
their efficiency, they can be automatized by means of certain systems, which involves the use of
different technologies. The communication between devices makes collaborative tasks and the
sharing of information about works in progress or the maintenance of certain components easier.
RFID principles are discussed in Section 2, Section 3 discusses RFID applications, and Section 4
discusses RFID security and technical solutions. Clearly the extent to which use RFID is to be used
is still an open debate. The use of RFID is limited by security concerns and delays in standardization.
For theft protection and asset tracking, this is the only good option. In some cases, libraries may
experience an increase in patronage as more and more people take advantage of the innovative
services that have been introduced to the library world. Cost, size, lifetime make them impractical for
regular use. Something that’s important to me while traveling, is keeping a. Similarly, the improper
implementation and use of the RFID technology in libraries, especially the RFID tags has the
potential of compromising and jeopardizing the privacy of all users in the library.
Because of the way the technology works, it can be adapted for many different purposes. They have
a far greater risk of collision because the driver’s vision can be impaired due to carrying large loads,
the vehicle can be large and have many blind spots, or even have moving parts such as th. Gram
staining is one of the oldest and most commonly used techniques in bacteriology. It’s likely that
you’ve encountered this technology in your day-to-day life, whether speeding through checkouts
with your tap-to-pay chip, stepping through scanners on your way out of the store, or scanning your
toll pass on the way to work. Preventing effective cloning of RFID tags is still an open and
challenging problem. LabTAG scientists were busy throughout 2023 designing and testing new
identification technologies to help laboratories better track and manage samples. In addition, it uses
an RFID reader and an RFID antenna. Just let me know where to send it (takes 5 seconds): Chapters
What is RFID (Radio Frequency Identification) Technology. The British then built upon this idea
and built the first active RFID devices. These components are associated with a critical and costly
process going through design, fabrication, delivery, storage, installation and inspection. With this
kind of range, you will have a much bigger window of opportunity in which to catch a would-be
thief or scammer. Obstacles to the Use of RFID in Libraries Privacy and Security It is evident that
RFID play integral role in libraries. Histochemical analysis is an integral component of pathology
laboratories, providing patients with diagnostic and prognostic information, which is critical for
making treatment-related decisions. However. The system has been tested in different furnished
scenarios and is able to identify and precisely pose in the scene common pieces of furniture, likes
chairs, tables and wardrobes. The paper also discusses on the current and imagined fields of
application, as well as advantages and disadvantages of use. The dilemma is in the reader having to
know the tag identity. Near-field is the most common approach used for implementing passive
RFIDs, and used for near range communications. Materials are diverse according to the sort of
construction; i.e., weather is different depending on the location, and the chosen solution varies if
works are carried out indoors, outdoors or buried. High Cost Cost is another barrier that affects the
implementation and use of RFID in libraries and it is a fact that its implementation and use are the
major disadvantages and a primary obstacle. Download Free PDF View PDF See Full PDF
Download PDF Loading Preview Sorry, preview is currently unavailable. The key to an RFID
strategy is to align your use of the technology with your company's goals, e.g., reduce production
costs, better customer relationships, optimising operations, and more. These tags are used in DVD
Kiosks, Personal ID cards, gaming, and poker chips because their primary frequency range is around
13.56 MHz. Ultra high frequency is the third type of RFID tags. The inconsistency and non-
uniformity in RFID standards have led to a situation where it is currently hard to purchase RFID
systems that are tailored to a particular library (Butters, 2007). From tracking inventory to reducing
manual data entry, RFID could mean much more accuracy and less labor costs. RFID tags are
embedded inside animals for tracking purposes. In order for this EPC number to tell us anything
about the item, it needs to be used to look up a corresponding entry in a database. Gout, Urate, and
Crystal Deposition Disease (GUCDD). In the libraries, the technology is quite helpful as it is used to
make sure that the flow of books out of the library as they are borrowed and the inflow as they are
returned is accurate, and this enhances both the competence and value of the library operations. Over
the years, several works have improved this location system. Radio frequency identification can be
used to track products through the product lifecycle, data collection to analyze logistics, and
production flow to enhance the manufacturing process.
Different RFID applications for materials manufacturing and transport are compared in Table 4. 4.
Construction and Commission Control Using RFID Technologies In the course of building activities,
thousands of materials and a crew of workers equipped with tools and vehicles are permanently
changing their position in the workplace. High Cost Cost is another barrier that affects the
implementation and use of RFID in libraries and it is a fact that its implementation and use are the
major disadvantages and a primary obstacle. In addition, you can read the data from an RFID tag
without an optical scanner which is essential when it comes to barcodes. Passive ID systems use the
standard RFID setup described above, in which the chip uses the radio waves as a power source to
return the signal at a different frequency. Radio Frequency Identification or RFID is a specific type
of radio technology that uses radio waves to identify tags attached to an object and thus identify the
object. Click below to be the first to know what’s happening in my world. Table 2 shows the
differences between the different kinds of tags. 3. RFID Technology in the Initial Stages of the
Constructive Process: Planning and Design Radio frequency identification technology demonstrates
a great potential in the monitoring of constructive processes. It is used among others in the
identification of fleet vehicles, differentiating objects from a far distance. They offer a little more
range than the low-frequency device. Characteristics of different combinations of technologies.
Anytime you need to keep track of something, an RFID system can be helpful. Chapter 2 RFID
Tags: Categories, Frequencies, and Applications RFID transmits data to a reader through different
frequencies of electromagnetic fields. Gram staining is one of the oldest and most commonly used
techniques in bacteriology. RFID principles are discussed in Section 2, Section 3 discusses RFID
applications, and Section 4 discusses RFID security and technical solutions. Download Free PDF
View PDF RADIO FREQUENCY IDENTIFICATION (RFID) BASED ATTENDANCE SYSTEM
WITH AUTOMATIC DOOR UNIT Gordon Ononiwu Radio-frequency identification (RFID) is a
technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label,
attached to an object, through a reader for the purpose of identifying and tracking the object. Ink is
among the most common substances in all sectors, from healthcare and medicine to the automotive
industry, construction, and educational institutions. Another alternative to prevent leaking of data
from RFID tags is the use of cryptography as measure of privacy. This system consists of two main
parts which include: the hardware and the software. E-ZPass tags are RFID transp onders attached
to the car license plate and sends ac count information to the equipment built into lane-based or
open toll collection lanes. Summary: GA International has developed a unique new Histology
cassette that can be securely labeled throughout the histological process. Clearly the extent to which
use RFID is to be used is still an open debate. Integration of RFID with other technologies: One of
the stronger research lines in the future concerns the proposals related to the integration of RFID
with personal digital assistants or other wireless devices, because of the rising market and the
lowering of prices of this kind of gadget. Most part of these defects is due to human factors, such as
the inefficient supervision of the constructive process. Let me send you a copy so you can read it
when it's convenient for you. The above-mentioned tasks involve the transportation of materials from
the factory to the construction site. In spite of the safety conditions in the construction scenes,
thousands of workers are wounded every year. The paper also discusses on the current and imagined
fields of application, as well as advantages and disadvantages of use. All of these energy forms are
constantly oscillating, which is a fancy way of saying that they are always moving and changing.
Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals
from around the world. Journal of Theoretical and Applied Electronic Commerce Research (JTAER).
Supply chain management will benefit from data being transferred faster in real-time. 5G signals will
be more reliable than older types of cell signals. I would like to say that the efficiency, accuracy and
the ROI that RFID system ensures makes it most favourable choice for many industries from retail
to library management. Because of the batteries, the active devices will also run you a little bit more
in shipping costs. This information, stored in RFID tags, is mainly related to the geometry of the
basic pieces of furniture where tags are adhered. Conflicts of Interest The authors declare no conflict
of interest. Journal of Theoretical and Applied Electronic Commerce Research (JTAER). Despite the
roster of RFID benefits that have been enumerated in the preceding section, there are known
drawbacks and obstacles with regard to the use of RFID in libraries. Please let us know what you
think of our products and services. Still can read the tags in multiple numbers and these makes the
inventory management in the libraries so manageable that the users find it easy to gather information
needed so fast. Histochemical analysis is an integral component of pathology laboratories, providing
patients with diagnostic and prognostic information, which is critical for making treatment-related
decisions. However. RFID technology which is a matured technology that has been widely deployed
by various organizations as part of their automation systems. In this study, an RFID based system
has been built in order to produce a time-attendance management system. The continuous movement
of materials and workers in the job site, together with the advances in the works, make the
monitoring of resources in the construction environment truly complicated. Download Free PDF
View PDF RFID (Radio Frequency Identification): Principles and Applications Show-man vitorino
silva Download Free PDF View PDF Automatic Door Unit Radio Frequency Identification (RFID)
Based Attendance System Onyebuchi Chikezie Radio Frequency Identification (RFID) technology
is a smart object tracking and automated data collection solution. The better solution is to use EPC
kill command as a pro-privacy technology after selling the products. RFID advantages can be br iefly
explained as follows. In every industrial project, constructors install an important amount of unique
pipe spools. In the field of healthcare, there exist works in which RFID technologies are used to
manage different aspects of a hospital. This technology is applicable in most libraries due to the onset
of automation of the modern libraries requires them to be equipped with a recent form of
identification technology an act done wholly by RFID as it is the most modern form of such a kind
if identification. d. Objective This paper is formulated with the objective of exploring the factors that
affect the implementation of RFID technology in Libraries either public or private. The development
of this form of technology started all the way in 1945 when the British developed a simple form of
the technology to help them in the identification of the aircrafts for the enemies and theirs. The
RFID reader does the work for activating and communicating with the tag. RFID technology which
is a matured technology that has been widely deployed by various organizations as part of their
automation systems. In this research, an RFID based system has been built in order to produce a
time-attendance management system. RFID uses longer wavelengths on the slower end of the
electromagnetic spectrum, which encompasses radio waves and microwaves. LabTAG scientists were
busy throughout 2023 designing and testing new identification technologies to help laboratories
better track and manage samples. After reviewing the state-of-the-art in this framework, there exist
several limitations and gaps that cause contractors to choose other available technologies. In fact, an
additional surface must be placed between the tag and the object in many cases. Firstly, a lot of data
can be stored at the smart label technology and RFID tags. Simply scan a container while its
contents are read and recorded in seconds. The cost is even more expensive for libraries that have
larger collections, usually extending beyond 100,000 items. Therefore, for libraries that have several
collections, the implementation and use of RFID can be an arduous task in terms of the amount of
money needed. European Journal of Investigation in Health, Psychology and Education (EJIHPE).
ZoneSafe significantly reduces the risk of accidents, injury and damage to.
For example, IoT solutions can manage energy, security, and lighting in a home or workplace. If you
take a closer look at the electromagnetic scale that we presented earlier, you can see that radio
frequencies have an extremely wide range. Despite efforts like the Reproducibility Project: Cancer
Biology it remains an issue, so. For instance, if all the runners in a race wear an RFID device, then a
tracker at the finish line can immediately determine the winner, and can also track lap times for all
runners. Still, when you triple ten centimeters, you only get an effective range of 30 centimeters. In
Section 3, certain applications of RFID in the initial stages of the constructive process are presented.
Characteristics of different combinations of technologies. While geared toward the non specialist, the
survey may also serve as a reference for specialist readers. Standardization: The different legislation
existing worldwide about the use of RFID antennas can lead to some supposed difficulties in the
trade of tagged components. The aim here is to present RFID as a valuable tool in the field of
automatic BIM. Placing different tags in an inhabited environment and equipping the robot with two
RFID antennas, the relative position of the mobile device can be calculated. Among applica- tions
already developed, RFID tags are being used in clothing for billing and security purposes. It was the
Germans who first figured out that they could create a slightly different radar signature by rolling the
plane in a certain way. The ZoneSafe Vehicle Access Control System provides a hands. This creates
a 3-9 metre 360 o continuous detection zone around the. International Journal of Environmental
Research and Public Health (IJERPH). RFID has developed a measure that ensures that the ability to
analyse and do a correction of library inventory is done without physically laying hands on the items.
In line with the management of the library property, RFID has greatly helped libraries in the curb of
theft through its high performance anti-theft technology. RFID technology uses RFID tags or smart
labels which have digital data encoded in them. Let me send you a copy so you can read it when it's
convenient for you. The transceiver communicates with a computer by means of an application,
which manages the data stored in the tags. Using RFID tags to track animals is not a new application,
but it has evolved from the usage of detecting of missed cattle to the tracking of its movements and
behavior. Both of these organizations have policies that require all of their suppliers to use RFID tags
in their products. A blind navigation system using RFID for indoor environments. This explains why
radio waves have been used for so many things. In order to be human-readable, please install an RSS
reader. The continuous movement of materials and workers in the job site, together with the
advances in the works, make the monitoring of resources in the construction environment truly
complicated. Unfortunately, most of us don’t have the luxury of deciding whether or not this
technology is worth using. This makes it much easier to find specific documents and records.
Scientific reproducibility continues to be a pressing issue facing scientific research. Find support for
a specific problem in the support section of our website.

You might also like